Abstract
China conducts more cyber espionage on itself than any other country does. The ecosystem for security in cyberspace is distorted by the country’s political system. The chapter lays out China’s definition of the problem set, and describes key features of the 2016 National Cyber Security Strategy. It then gives some background on the national policy shift in 2014 represented by Xi’s declaration of the ambition for China to become a cyber power.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alasabah N (2016) Information control 2.0: the cyberspace administration of China tames the internet. In: Merics China Monitor, 15 Sept 2016. http://www.merics.org/fileadmin/user_upload/downloads/China-Monitor/MERICS_China_Monitor_32_Eng.pdf
APCERT (2017) APCERT annual report 2016. In: Asia Pacific Computer Emergency Response Team. https://www.apcert.org/documents/pdf/APCERT_Annual_Report_2016.pdf
AsiaOne (2017) Nexusguard Places in Top 25 on Cybersecurity 500 List for Eight Quarters in a Row, 21 Feb 2017. http://www.asiaone.com/corporate-news-media-outreach/nexusguard-places-in-top-25-on-cybersecurity-500-list-for-eight
Asia Society (2013) Complete Transcript: Thomas Donilon at Asia Society New York, 11 March 2013. https://asiasociety.org/new-york/complete-transcript-thomas-donilon-asia-society-new-york
Austin G (2014) Cyber policy in China. Polity, Cambridge
Austin G (2015) China’s Cyberespionage: The National Security Distinction and U.S. Diplomacy. In: The diplomat, May 2015. http://thediplomat.com/wp-content/uploads/2015/05/thediplomat_2015-05-21_22-14-05.pdf
Bing C (2017) Former U.S. spies say anti-virus software makes for a perfect espionage platform. In: Cyberscoop, 13 Oct 2017. https://www.cyberscoop.com/former-u-s-spies-say-anti-virus-software-makes-perfect-espionage-platform/
Branigan T (2013) China’s new premier, Li Keqiang, vows to tackle bureaucracy and corruption. In: The guardian, 17 March 2013. https://www.theguardian.com/world/2013/mar/17/china-premier-li-keqiang-bureaucracy
CAC (2016) China’s National Cybersecurity Strategy, issued by the Cyberspace Administration of China. In Chinese. 27 Dec 2016. Original at http://www.cac.gov.cn/2016-12/27/c_1120195926.htm
Chen B (2016) WIN10 misses government procurement. Joint venture will be difficult. In: 21st century business Herald. In Chinese. 16 Aug 2016. http://m.21jingji.com/article/20160816/59622c1aef2877eb1625ec8b526de861.html
Chen S (2013) Great fire wall architect Fang Binxing quits as president of Beijing university. South China Morning Post. http://www.scmp.com/news/china/article/1270213/father-chinas-great-firewall-says-he-will-quit-university-head
China.org (2017) Xi calls for global vision in China’s national security work, 18 Feb 2017. http://www.china.org.cn/video/2017-02/18/content_40313020.htm
China Daily (2017a) [wǎngyou xiāojìn]: Online game curfew. In English, 07 Feb 2017. http://www.chinadaily.com.cn/opinion/2017-02/07/content_28121149.htm
China Daily (2017b) China to introduce review commission on cybersecurity, 07 Feb 2017. http://www.chinadaily.com.cn/business/tech/2017-02/08/content_28135358.htm
China Digital Times (2017) China reinforces great firewall With new VPN rules, 23 Jan 2017. https://chinadigitaltimes.net/2017/01/china-reinforces-great-firewall-new-vpn-rules/
Cisco (2017) What is a firewall? In: Cisco website. https://www.Cisco.com/c/en_au/products/security/firewalls/what-is-a-firewall.html
Clapper J (2013) Remarks as delivered by James R. Clapper, Director of national intelligence, worldwide threat assessment to the house permanent select committee on intelligence, Washington DC, 11 April 2013, https://www.dni.gov/files/documents/Intelligence%20Reports/HPSCI%20WWTA%20Remarks%20as%20delivered%2011%20April%202013.pdf
Feng D (2014) Preface. China Science Bulletin. 59:4161–4162
Feng S (2017) What is Obama’s military legacy. In: Chinamil.com, 17 Jan 2017. The people’s liberation army daily (trans), http://www.81.cn/jwywpd/2017-01/16/content_7454421.htm
Hathaway M, Klimburg A (2012) Preliminary considerations on national cybersecurity. In: Klimburg A (ed) National cybersecurity manual. NATO CCDCOE, Tallin, pp. 1–43
Inkster N (2015) The Chinese intelligence agencies. In: Lindsay J, Cheung TM, Deveron DS (eds) China and cybersecurity: espionage, strategy, and politics in the digital revolution. Oxford University Press, pp. 29–50
Li J (2015) Network information security challenges and relevant strategic thinking as highlighted by “PRISM”. In: Huang Z, Sun X, Luo J, Wang J (eds) Cloud computing and security. Lecture notes in computer science, vol 9483.Springer, Heidelberg, pp. 147–156
Li X (2015) Regulation of cyber space: An analysis of Chinese law on cyber crime. Int J Cyber Criminol 9(2): 185–204 (July–December)
Marro N (2016) The five levels of cybersecurity in China. China Business Review. 5 December 2016. http://www.chinabusinessreview.com/the-5-levels-of-information-security-in-china/
Mi Y (2017) Public’s leaked personal information seized in online safety campaign. In: China daily, 5 Jan 2017, http://www.chinadaily.com.cn/regional/2017-01/05/content_27870730.htm
Microsoft (2016) China invites Microsoft to join technical committee 260 (TC260) to draft cybersecurity rules. 26 Aug 2016, https://mspoweruser.com/china-invites-microsoft-to-join-technical-committee-260-tc260-to-draft-cybersecurity-rules/
Moriuchi P, Ladd B (2017) China’s ministry of state security likely influences national network vulnerability publications. In: Recorded future blog, 16 Nov 2017, https://www.recordedfuture.com/chinese-mss-vulnerability-influence/
Nakashima E (2013) U.S. said to be target of massive cyber-espionage campaign. In: Washington post, 10 Feb 2013. https://www.washingtonpost.com/world/national-security/us-said-to-be-target-of-massive-cyber-espionage-campaign/2013/02/10/7b4687d8-6fc1-11e2-aa58-243de81040ba_story.html?utm_term=.11552f05b1cc
SAC (2016) Standards administration of China national information security standardization technical committee general assembly held in Beijing, 15 Jan 2016, http://www.sac.gov.cn/xw/bzhxw/201601/t20160115_200544.htm
Shih G (2015) Huawei CEO questions China’s cybersecurity policies. In: Christian Science Monitor, 22 April 2015, https://www.csmonitor.com/Technology/2015/0422/Huawei-CEO-questions-China-s-cybersecurity-policies
State Council (1994) Regulations for safety protection of computer information systems. Decree No. 147, 18 Feb 1994. Available at AsianLII, http://www.asianlii.org/cn/legis/cen/laws/rfspocis719/
State Council (2015) Full text: China’s military strategy, China daily, 26 May 2015, http://www.chinadaily.com.cn/china/2015-05/26/content_20820628.htm
USITO (2016) TC260 new committee opened to foreign participation. http://www.usito.org/news/tc260-new-committee-opened-foreign-participation
Waldron A (1983) The problem of the great wall of China. Harv J Asiatic Stud 43(2):643–663
White House (2013) Readout of the president’s phone call with Chinese president Xi Jinping, 14 March 2013. https://obamawhitehouse.archives.gov/the-press-office/2013/03/14/readout-president-s-phone-call-chinese-president-xi-jinping
Xi J (2015) Remarks by H.E., Xi Jinping president of the people’s republic of China at the opening ceremony of the second world internet conference, Wuzhen, 16 Dec 2015. http://www.fmprc.gov.cn/mfa_eng/wjdt_665385/zyjh_665391/t1327570.shtml
Xi J (2016) Speech at the national meeting on cyber security and informatization. In Chinese. 25 Apr 2016. http://www.xinhuanet.com/politics/2016-04/25/c_1118731175.htm
Xinhua (2014) Xi Jinping leads internet security group, 27 Feb 2014. http://news.xinhuanet.com/english/china/2014-02/27/c_133148273.htm
Xinhua (2017a) Thousands of illegal apps taken offline in south China, 24 Jan 2017. http://news.xinhuanet.com/english/2017-01/23/c_136007345.htm
Xinhua (2017b) Procuratorates approve arrest of 19,000 telecom fraud suspects, 14 Jan 2017. http://news.xinhuanet.com/english/2017-01/14/c_135982423.htm
Xinhua (2016) China’s first national NPO in cybersecurity founded, 25 March 2016. http://news.xinhuanet.com/english/2016-03/25/c_135223674.htm
Zhang S (2016) China sets goals of informatization, CRI news. 28 July 2016. http://english.cri.cn/12394/2016/07/28/3821s935816.htm
Zuo M (2016) China aims to become internet superpower by 2050, South China morning post, 28 July 2016. http://www.scmp.com/news/china/policies-politics/article/1995936/china-aims-become-internet-cyberpower-2020
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Austin, G. (2018). The Cybersecurity Ecosystem. In: Cybersecurity in China. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-68436-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-68436-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68435-2
Online ISBN: 978-3-319-68436-9
eBook Packages: Computer ScienceComputer Science (R0)