Abstract
The studies addressing cyberwar and depicting electronic doomsday scenarios, such as cyber version of 9/11, are immensely policy-driven. They lack a theoretical rigor in their explanations, causing a theory-policy gap in the study of cyberwar. This gap is more acute in the discussion on cyberwar scenarios between China and the United States (U.S). Additionally, while some used neorealist frameworks to understand the nature of U.S-China relations in cyberspace, they did so mostly with no systematic analysis of the likelihood of cyberwar between the two. I intend to bridge this theory-policy gap by examining the prospect of cyberwar between the U.S. and China using Neorealism and Power Transition Theory (PTT). I argue that PTT offers a more useful framework. Applying PTT indicates that while cyberwar currently seems unlikely, China will become cyberwar-prone to switch the status quo in cyberspace to its favor, especially if it achieves offensive cyberwar capability parity with the U.S. while simultaneously remaining dissatisfied with the cyber order. I utilized secondary empirical sources in the relevant literature in conducting this study.
Similar content being viewed by others
References
Ball, D. 2011. China’s cyber warfare capabilities. Security Challenges 7(2):81–103.
Branigan, T. 2010. Chinese army to target cyber wat threat: New department dedicated to protecting information security follows creation of US cyber command. The Guardian. https://www.theguardian.com/world/2010/jul/22/chinese-army-cyber-war-department. Accessed 18 August 2018.
Bumiller, E., and Shanker, T. 2012. Panetta warns of dire threat of cyberattack on U.S. The New York Times. http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html. Accessed 18 August 2018.
Cai, C., and D. Dati. 2015. Words mightier than hacks: Narratives of cyberwar in the United States and China. Asian Perspective 39(3):541–553.
China Copyright abd Media. 2017. International Strategy of Cooperation on Cyberspace. https://chinacopyrightandmedia.wordpress.com/2017/03/01/international-strategy-of-cooperation-on-cyberspace/. Accessed 18 August 2018.
Choucri, N. 2000. Introduction: CyberPolitics in international relations. International Political Science Review 21(3):243–263.
Choucri, N. 2012. Cyberpolitics in international relations. Cambridge: MIT press.
Christensen, T.J., and A. Snyder. 1990. Chain gangs and passed bucks: Predicting alliance patterns in multipolarity. International Organization 44(2):137.
Clarke, R.A. and Knake, R.K. 2010. Cyber war: The next threat to national security and what to do about it. New York: HarperCollins.
Cohen, M.S., C.D. Freilich, and G. Siboni. 2016. Israel and cyberspace: Unique threat and response. International Studies Perspectives 17(3):307–321. https://doi.org/10.1093/isp/ekv023.
Domingo, F.C. 2016. Conquering a new domain: Explaining great power competition in cyberspace. Comparative Strategy 35(2):154–168. https://doi.org/10.1080/01495933.2016.1176467.
Eun, Y.-S., and J.S. Abmann. 2016. Cyberwar: Taking stock of security and warfare in the digital age. International Studies Perspectives 17(3):343–360. https://doi.org/10.1111/insp.12073.
Farwell, J.P., and R. Rohozinski. 2011. Stuxnet and the future of cyber war. Survival 53(1):23–40. https://doi.org/10.1080/00396338.2011.555586.
Forsythe, M., and Sanger, D.E. 2015. China calls hacking of U.S. workers` data a crime, not a state act. The New York Times. https://www.nytimes.com/2015/12/03/world/asia/china-hacking-us-opm.html.Accessed 18 August 2018.
Friedberg, A.L. 2005. The future of U.S.-China relations: Is conflict inevitable? International Security 30(2):7–45.
Gartzke, E. 2013. The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security 38(2):41–73. https://doi.org/10.1162/ISEC_a_00136.
Goldsmith, J., and Wu, T. 2006. Who controls the internet?: Illusions of a borderless world [eBook]. New York: Oxford University Press.
Han, S. 2009. China's pursuit of peaceful power transition: A case of ICT (information and communications technologies) standard setting. International Area Review 12(3):27–42.
Hjortdal, M. 2011. China's use of cyber warfare: Espionage meets strategic deterrence. Journal of Strategic Security 4(2):1–24. https://doi.org/10.5038/1944-0472.4.2.1.
Hughes, R. 2010. A treaty for cyberspace. International Affairs 86(2):523–541. https://doi.org/10.1111/j.1468-2346.2010.00894.x.
Kaiser, R. 2015. The birth of cyberwar. Political Geography 46:11–20. https://doi.org/10.1016/j.polgeo.2014.10.001.
Kello, L. 2013. The meaning of the cyber revolution: Perils to theory and statecraft. International Security 38(2):7–40. https://doi.org/10.1162/ISEC_a_00138.
Kim, W., and S. Gates. 2015. Power transition theory and the rise of China. International Area Studies Review 18(3):219–226. https://doi.org/10.1177/2233865915598545.
Klimburg, A. 2011. Mobilising cyber power. Survival (00396338) 53(1):41–60. https://doi.org/10.1080/00396338.2011.555595.
Kramer, F.D. 2009. Cyberpower and national secuirty: Policy recommendations for a strategic framework. In Cyberpower and national security, eds. F.D. Kramer, S.H. Starr, and L.K. Wentz, 3–23. Washington, DC: Potomac Books.
Kramer, F. D., Butler, R. J., and Lotrionte, C. 2016. Cyber, extended deterrence, and NATO. Washington, DC: Atlantic Council. http://www.atlanticcouncil.org/images/publications/Cyber_Extended_Deterrence_and_NATO_web_0526.pdf
Kosenkov, A. 2016. Cyber conflict as a new global threat. Future Internet 8(3):1–9. https://doi.org/10.3390/fi8030045.
Kshetri, N. 2014. Cybersecurity and international relations: The U.S. engagment with China and Russia. http://web.isanet.org/Web/Conferences/FLACSO-ISA%20BuenosAires%202014/Archive/6f9b6b91-0f33-4956-89fc-f9a9cde89caf.pdf. Accessed 18 August 2018.
Kuebl, D.T. 2009. From cyberspace to cyberpower: Definin the problem. In Cyberpower and national security, eds. F.K. Kramer, S.H. Starr, and L.K. Wentz, 24–42. Washington, DC: Potomac Books.
Lee, S.H. 2015. Global and regional orders in the 21st century in terms of multi-layered power transition theory: The cases of US–China and China–Japan relations. International Area Studies Review 18(3):266–279.
Lewis, J.A. 2012. In defense of Stuxnet. Military and Strategic Affiars 4(3):65–76.
Libicki, M.C. 2009. Cyberdeterrence and cyberwar. Santa Monica: RAND Corporation.
Liff, A.P. 2012. Cyberwar: A new ‘absolute weapon’? The proliferation of cyberwarfare capabilities and interstate war. Journal of Strategic Studies 35(3):401–428. https://doi.org/10.1080/01402390.2012.663252.
Lim, Y.-H. 2015. How (dis)satisfied is China? A power transition theory perspective. Journal of Contemporary China 24(92):280–297. https://doi.org/10.1080/10670564.2014.932160.
Limnéll, J. 2016. Developing a proportionate response to a cyber attack. Aalto: Aalto University. https://aaltodoc.aalto.fi/handle/123456789/19849.
Lindsay, J.R. 2013. Stuxnet and the limits of cyber warfare. Security Studies 22(3):365–404. https://doi.org/10.1080/09636412.2013.816122.
Lindsay, J.R. 2014. The impact of China on cybersecurity: Fiction and friction. International Security 39(3):7–47. https://doi.org/10.1162/ISEC_a_00189.
Lindsay, J.R., T.M. Cheung, and D.S. Reveron, eds. 2015. China and cybersecurity: Espionage, strategy, and politics in the digital domain. New York: Oxford University Press.
Lobel, H. 2012. Cyber war Inc.: The law of war implications of the private sector's role in cyber conflict. Texas International Law Journal 47(3):617–640.
Lynn, W.J., III. 2010. Defending a new domain: The Pentagon's cyberstrategy. Foreign Affairs 89(5):97–108.
Maness, R.C., and B. Valeriano. 2016. The impact of cyber conflict on international interactions. Armed Forces & Society 42(2):301–323. https://doi.org/10.1177/0095327X15572997.
Manson, G.P., III. 2011. Cyberwar: The United States and China prepare for the next generation of conflict. Comparative Strategy 30(2):121–133. https://doi.org/10.1080/01495933.2011.561730.
Mearsheimer, J. J. 2001. The Tragedy of Great Power Politics. New York: Norton, ©2001.
Morgan, P. M. 2010. Applicability of traditional deterrence concepts and theory to the cyber realm. In Proceedings of a workshop on deterring cyberattacks: Informing strategies and developing options for U.S. policy, 56–76. Washington, DC: The National Academies Press.
Mudrinich, E.M. 2012. Cyber 3.0: The Department of Defense strategy for operating in cyberspace and the attribution problem. Air Force Law Review 68:167–206.
Mueller, M. L. 2010. Networks and states: The global politics of internet governance [eBook]. Cambridge: MIT Press.
Nye, J. S., Jr. 2011. The future of power. New York: PublicAffairs.
Powers, S. M., and Jablonski, M. 2015. The real cyber war: The political economy of internet freedom. Chicago: University of Illinois Press.
O'Connell, M.E. 2012. Cyber security without cyber war. Journal of Conflict & Security Law 17(2):187–209. https://doi.org/10.1093/jcsl/krs017.
Organski, A. F. K. 1968. World politics (2nd ed.). New York: Alfred A. Knopf.
Rid, T. 2012. Cyber war will not take place. The Journal of Strategic Studies 35(1):5–32. https://doi.org/10.1080/01402390.2011.608939.
Said-Moorhouse, L. 2016. US-Iran nuclear deal: Iran’s president warns trump not to ruin agreement. CNN Politics. http://www.cnn.com/2016/12/06/politics/iran-warns-donald-trump-nuclear-deal/. Accessed 18 August 2018.
Schweller, R.L. 2004. Unanswered threats: A neoclassical realist theory of Underbalancing. International Security 29(2):159–201.
Sanger, D. E. 2012. Confront and conceal: Obama’s secret wars and surprising use of American power. New York: Crown Publishers.
Sanger, E.D. 2018. Nations seek the elusive cure for Cyberattaks. The New York Times. https://www.nytimes.com/2018/01/21/business/davos-international-cyberattack-prevention.html. Accessed 18 August 2018.
Singer, P. W., and Friedman, A. 2014. Cybersecurity and cyberwar: What everyone needs to know. New York: Oxford University Press.
Spade, J. M. 2011. China’s cyber power and America’s national security. The U.S. Army War College. http://www.dtic.mil/dtic/tr/fulltext/u2/a552990.pdf. Accessed 18 August 2018.
Strinde, G. 2011. Cyberwar: Connecting classical security theory to a new security domian. http://www.lunduniversity.lu.se/lup/publication/1970395. Accessed 18 August 2018.
Stone, J. 2013. Cyber war will take place! Journal of Strategic Studies 36(1):101–108. https://doi.org/10.1080/01402390.2012.730485.
Taliaferro, J.W. 2000-2001. Security seeking under anarchy: Defensive realism revisited. International Security 25(3):128–161.
Tammen, R. L., Kugler, J., Lemke, D., Stam, A. C., III, Abdollahian, M., …, Organski, A. F. K. 2000. Power transitions: Strategies for the 21st century. New York: Chatham House Publishers.
Tammen, R.L. 2008. The Organski legacy: A fifty-year research program. International Interactions 34(4):314–332. https://doi.org/10.1080/03050620802561769.
Thomas, E. 2016. US-China relations in cyberspace: The benefits and limits of a realist analysis. E-international relations students. http://www.e-ir.info/2016/08/28/us-china-relations-in-cyberspace-the-benefits-and-limits-of-a-realist-analysis/. Accessed 18 August 2018.
Tiezzi, S. 2015. China vows no compromise on ‘cyber sovereignty’: Xi Jinping doubles down on the controversial concept at the 2nd world internet conference. The diplomat. http://thediplomat.com/2015/12/china-vows-no-compromise-on-cyber-sovereignty/. Accessed 18 August 2018.
Valeriano, B., and Maness, R.C. 2015. The dynamic of cyber conflict between rival antagonists. In Cyber hype versus cyber realities: Cyber conflict in the international system [eBook], 78–108. New York: Oxford University Press. https://doi.org/10.1093/acprof:oso/9780190204792.003.0004.
Van Evera, Stephen. 1998. Offense, Defense, and the Causes of War. International Security 22(4):5-43
Wohlforth, W.C. 1999. The stability of a unipolar world. International Security 24(1):5–41.
Walt, S.M. 1985. Alliance formation and the balance of world power. International Security 9(4):3–43.
Waltz, K.N. 1979. Theory of international politics. Reading, Mass.: Addison-Wesley Pub. Co., c1979.
Wang, D., and Mark, G. 2015. Internet censorship in China: Examining user awareness and attitudes. ACM Transactions On Computer-Human Interaction 22(6):1-22. https://doi.org/10.1145/2818997.
Yang, G. 2009. The power of the internet in China: Citizen activism online. New York: Columbia University Press.
Acknowledgements
The author would like to thank to Dr. Steven Roach, Dr. Bernd Reiter, Dr. Jongseok Woo, Dr. Nezir Akyesilmen, and Ph.D. candidate Nathan Barrick for their valuable contribution to this paper. Table 1: “Overall Cyber War Strength” from CYBER WAR by RICHARD A. CLARKE and ROBERT K. KNAKE. Copyright (c) 2010 by Richard A. Clarke and Robert K. Knake. Reprinted by permission of HarperCollins Publishers.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article draws significantly from the Author’s thesis: Akdag, Y. (2017). Cyber Deterrence against Cyberwar between the United States and China: A Power Transition Theory Perspective. (Unpublished master’s thesis). The University of South Florida, Tampa, Florida.
Rights and permissions
About this article
Cite this article
Akdag, Y. The Likelihood of Cyberwar between the United States and China: A Neorealism and Power Transition Theory Perspective. J OF CHIN POLIT SCI 24, 225–247 (2019). https://doi.org/10.1007/s11366-018-9565-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11366-018-9565-4