Research Associate Amy Chang explores the political, economic, and military objectives of China’s cybersecurity apparatus; reveals drivers and intentions of Chinese activity in cyberspace; and analyzes the development of Beijing’s cybersecurity infrastructure over the last three decades.
This report contributes a solid foundation of understanding of China’s cybersecurity strategy, and aims to inform U.S. efforts in negotiating with China on cyber issues. As such, this report hopes to illuminate, though it is not a solution in itself. Ms. Chang notes that any solution must leverage U.S. advantages in this realm and increase China’s risk calculus sufficiently to alter China’s behavior.
More from CNAS
CommentaryGlobal Supply Chains, Economic Decoupling, and U.S.-China Relations, Part 1: The View from the United States
The trade war has defined the current adversarial relationship between the United States and the People’s Republic of China (PRC). While President Donald J. Trump has at times...
By Sagatom Saha & Ashley Feng
CommentaryHow China Is Exploiting the Pandemic to Export Authoritarianism
The Chinese Communist Party is now undertaking its most audacious effort yet at shaping international perceptions....
By David Shullman
ReportsForging an Alliance Innovation Base
Executive Summary This report presents a blueprint for a community of technology innovation and protection anchored by America and its allies. Unless the United States builds ...
By Daniel Kliman, Ben FitzGerald, Kristine Lee & Joshua Fitt
CommentarySharper: Global Coronavirus Response
As regions across the United States enforce states of emergency and a growing list of countries restrict travel, close schools, and quarantine citizens, the economic and human...
By Chris Estep & Cole Stevens