The Cybersecurity Ecosystem

Chapter
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)

Abstract

China conducts more cyber espionage on itself than any other country does. The ecosystem for security in cyberspace is distorted by the country’s political system. The chapter lays out China’s definition of the problem set, and describes key features of the 2016 National Cyber Security Strategy. It then gives some background on the national policy shift in 2014 represented by Xi’s declaration of the ambition for China to become a cyber power.

Keywords

Definition National strategy Military power National security Authoritarianism Censorship Sovereignty Communist party Cyber power Great firewall Great wall Public security Organizational structure Legislation Standards 

References

  1. Alasabah N (2016) Information control 2.0: the cyberspace administration of China tames the internet. In: Merics China Monitor, 15 Sept 2016. http://www.merics.org/fileadmin/user_upload/downloads/China-Monitor/MERICS_China_Monitor_32_Eng.pdf
  2. APCERT (2017) APCERT annual report 2016. In: Asia Pacific Computer Emergency Response Team. https://www.apcert.org/documents/pdf/APCERT_Annual_Report_2016.pdf
  3. AsiaOne (2017) Nexusguard Places in Top 25 on Cybersecurity 500 List for Eight Quarters in a Row, 21 Feb 2017. http://www.asiaone.com/corporate-news-media-outreach/nexusguard-places-in-top-25-on-cybersecurity-500-list-for-eight
  4. Asia Society (2013) Complete Transcript: Thomas Donilon at Asia Society New York, 11 March 2013. https://asiasociety.org/new-york/complete-transcript-thomas-donilon-asia-society-new-york
  5. Austin G (2014) Cyber policy in China. Polity, CambridgeGoogle Scholar
  6. Austin G (2015) China’s Cyberespionage: The National Security Distinction and U.S. Diplomacy. In: The diplomat, May 2015. http://thediplomat.com/wp-content/uploads/2015/05/thediplomat_2015-05-21_22-14-05.pdf
  7. Bing C (2017) Former U.S. spies say anti-virus software makes for a perfect espionage platform. In: Cyberscoop, 13 Oct 2017. https://www.cyberscoop.com/former-u-s-spies-say-anti-virus-software-makes-perfect-espionage-platform/
  8. Branigan T (2013) China’s new premier, Li Keqiang, vows to tackle bureaucracy and corruption. In: The guardian, 17 March 2013. https://www.theguardian.com/world/2013/mar/17/china-premier-li-keqiang-bureaucracy
  9. CAC (2016) China’s National Cybersecurity Strategy, issued by the Cyberspace Administration of China. In Chinese. 27 Dec 2016. Original at http://www.cac.gov.cn/2016-12/27/c_1120195926.htm
  10. Chen B (2016) WIN10 misses government procurement. Joint venture will be difficult. In: 21st century business Herald. In Chinese. 16 Aug 2016. http://m.21jingji.com/article/20160816/59622c1aef2877eb1625ec8b526de861.html
  11. Chen S (2013) Great fire wall architect Fang Binxing quits as president of Beijing university. South China Morning Post. http://www.scmp.com/news/china/article/1270213/father-chinas-great-firewall-says-he-will-quit-university-head
  12. China.org (2017) Xi calls for global vision in China’s national security work, 18 Feb 2017. http://www.china.org.cn/video/2017-02/18/content_40313020.htm
  13. China Daily (2017a) Open image in new window [wǎngyou xiāojìn]: Online game curfew. In English, 07 Feb 2017. http://www.chinadaily.com.cn/opinion/2017-02/07/content_28121149.htm
  14. China Daily (2017b) China to introduce review commission on cybersecurity, 07 Feb 2017. http://www.chinadaily.com.cn/business/tech/2017-02/08/content_28135358.htm
  15. China Digital Times (2017) China reinforces great firewall With new VPN rules, 23 Jan 2017. https://chinadigitaltimes.net/2017/01/china-reinforces-great-firewall-new-vpn-rules/
  16. Clapper J (2013) Remarks as delivered by James R. Clapper, Director of national intelligence, worldwide threat assessment to the house permanent select committee on intelligence, Washington DC, 11 April 2013, https://www.dni.gov/files/documents/Intelligence%20Reports/HPSCI%20WWTA%20Remarks%20as%20delivered%2011%20April%202013.pdf
  17. Feng D (2014) Preface. China Science Bulletin. 59:4161–4162CrossRefGoogle Scholar
  18. Feng S (2017) What is Obama’s military legacy. In: Chinamil.com, 17 Jan 2017. The people’s liberation army daily (trans), http://www.81.cn/jwywpd/2017-01/16/content_7454421.htm
  19. Hathaway M, Klimburg A (2012) Preliminary considerations on national cybersecurity. In: Klimburg A (ed) National cybersecurity manual. NATO CCDCOE, Tallin, pp. 1–43Google Scholar
  20. Inkster N (2015) The Chinese intelligence agencies. In: Lindsay J, Cheung TM, Deveron DS (eds) China and cybersecurity: espionage, strategy, and politics in the digital revolution. Oxford University Press, pp. 29–50CrossRefGoogle Scholar
  21. Li J (2015) Network information security challenges and relevant strategic thinking as highlighted by “PRISM”. In: Huang Z, Sun X, Luo J, Wang J (eds) Cloud computing and security. Lecture notes in computer science, vol 9483.Springer, Heidelberg, pp. 147–156CrossRefGoogle Scholar
  22. Li X (2015) Regulation of cyber space: An analysis of Chinese law on cyber crime. Int J Cyber Criminol 9(2): 185–204 (July–December)Google Scholar
  23. Marro N (2016) The five levels of cybersecurity in China. China Business Review. 5 December 2016. http://www.chinabusinessreview.com/the-5-levels-of-information-security-in-china/
  24. Mi Y (2017) Public’s leaked personal information seized in online safety campaign. In: China daily, 5 Jan 2017, http://www.chinadaily.com.cn/regional/2017-01/05/content_27870730.htm
  25. Microsoft (2016) China invites Microsoft to join technical committee 260 (TC260) to draft cybersecurity rules. 26 Aug 2016, https://mspoweruser.com/china-invites-microsoft-to-join-technical-committee-260-tc260-to-draft-cybersecurity-rules/
  26. Moriuchi P, Ladd B (2017) China’s ministry of state security likely influences national network vulnerability publications. In: Recorded future blog, 16 Nov 2017, https://www.recordedfuture.com/chinese-mss-vulnerability-influence/
  27. SAC (2016) Standards administration of China national information security standardization technical committee general assembly held in Beijing, 15 Jan 2016, http://www.sac.gov.cn/xw/bzhxw/201601/t20160115_200544.htm
  28. Shih G (2015) Huawei CEO questions China’s cybersecurity policies. In: Christian Science Monitor, 22 April 2015, https://www.csmonitor.com/Technology/2015/0422/Huawei-CEO-questions-China-s-cybersecurity-policies
  29. State Council (1994) Regulations for safety protection of computer information systems. Decree No. 147, 18 Feb 1994. Available at AsianLII, http://www.asianlii.org/cn/legis/cen/laws/rfspocis719/
  30. State Council (2015) Full text: China’s military strategy, China daily, 26 May 2015, http://www.chinadaily.com.cn/china/2015-05/26/content_20820628.htm
  31. USITO (2016) TC260 new committee opened to foreign participation. http://www.usito.org/news/tc260-new-committee-opened-foreign-participation
  32. Waldron A (1983) The problem of the great wall of China. Harv J Asiatic Stud 43(2):643–663CrossRefGoogle Scholar
  33. White House (2013) Readout of the president’s phone call with Chinese president Xi Jinping, 14 March 2013. https://obamawhitehouse.archives.gov/the-press-office/2013/03/14/readout-president-s-phone-call-chinese-president-xi-jinping
  34. Xi J (2015) Remarks by H.E., Xi Jinping president of the people’s republic of China at the opening ceremony of the second world internet conference, Wuzhen, 16 Dec 2015. http://www.fmprc.gov.cn/mfa_eng/wjdt_665385/zyjh_665391/t1327570.shtml
  35. Xi J (2016) Speech at the national meeting on cyber security and informatization. In Chinese. 25 Apr 2016. http://www.xinhuanet.com/politics/2016-04/25/c_1118731175.htm
  36. Xinhua (2014) Xi Jinping leads internet security group, 27 Feb 2014. http://news.xinhuanet.com/english/china/2014-02/27/c_133148273.htm
  37. Xinhua (2017a) Thousands of illegal apps taken offline in south China, 24 Jan 2017. http://news.xinhuanet.com/english/2017-01/23/c_136007345.htm
  38. Xinhua (2017b) Procuratorates approve arrest of 19,000 telecom fraud suspects, 14 Jan 2017. http://news.xinhuanet.com/english/2017-01/14/c_135982423.htm
  39. Xinhua (2016) China’s first national NPO in cybersecurity founded, 25 March 2016. http://news.xinhuanet.com/english/2016-03/25/c_135223674.htm
  40. Zhang S (2016) China sets goals of informatization, CRI news. 28 July 2016. http://english.cri.cn/12394/2016/07/28/3821s935816.htm
  41. Zuo M (2016) China aims to become internet superpower by 2050, South China morning post, 28 July 2016. http://www.scmp.com/news/china/policies-politics/article/1995936/china-aims-become-internet-cyberpower-2020

Copyright information

© The Author(s) 2018

Authors and Affiliations

  1. 1.Australian Centre for Cyber SecurityUniversity of New South WalesCanberraAustralia

Personalised recommendations