Skip to main content
Top
Published in: Journal of Chinese Political Science 1/2023

23-06-2022 | Research Article

The Shift of China’s Strategic Thinking on Cyberwarfare Since the 1990s

Author: Tianjiao Jiang

Published in: Journal of Chinese Political Science | Issue 1/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

It has been widely argued that China has prepared for launching cyberwarfare against the United States for long time. There are two reasons for this. First, the revolution of cyber technology changed the offense-defense balance, which will lead to frequent cyber conflicts. Second, with the relative decline of the United States and the rising up of China in recent years, there has been growing concerns about a Thucydides Trap between the two great powers, and cyberwar is very likely to happen. However, except for disputes on cyber espionage, China showed restraint on the offensive use of its cyberpower. This paper argues that China’s strategic thinking on cyber offense, defense, and cyberwarfare has been evolving over the past decades. Through content analysis of official documents and academic writings, this paper sheds light on the recent discussions and development of China’s cyber offense and defense strategy. With China’s gradual access to the global Internet and extensive participation in the international economic division of labor, maintaining the stability of global cyberspace is of greater significance to China, and the cost of launching cyber warfare is higher and higher. Such findings help avoid miscalculation and maintain strategic stability between China and the United States in cyberspace.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
See [11]; There have been different voices on whether China and the United States can avoid the Thucydides Trap, but tensions between two countries have been rising. See also [12].
 
2
See [15]; For the background of LSG in China’s decision-making, see [16].
 
3
For example, ‘the General Office of the CASS periodically submits two versions of the internal CASS Important Report (Yaobao) to the central government and other agencies: Information Special Report (Xinxi zhuanbao) and Leader Reference (lingdaocanyue)’. See [21].
 
4
Interview with Hao Yeli at Fudan Univ. on September 19th, 2019.
 
Literature
1.
go back to reference Mayer, Maximilian. 2019. China’s Authoritarian Internet and Digital Orientalism. In Redesigning Organizations – Concepts for the Connected Society, ed. Denise Feldner., 177–192. Luzern: Springer. Mayer, Maximilian. 2019. China’s Authoritarian Internet and Digital Orientalism. In Redesigning Organizations – Concepts for the Connected Society, ed. Denise Feldner., 177–192. Luzern: Springer.
2.
go back to reference Mahoney, Josef Gregory. Orientalism. 2015. Yellow Peril,” and the “New Yellow Journalism”. Fudan Journal of the Humanities and Social Sciences 9: 1–24. “ . Mahoney, Josef Gregory. Orientalism. 2015. Yellow Peril,” and the “New Yellow Journalism”. Fudan Journal of the Humanities and Social Sciences 9: 1–24. “ .
3.
go back to reference Pillsbury, Michael. 2016. The Hundred-Year Marathon: China’s Secret Strategy to Replace America as the Global Superpower. St. Martin’s Griffin. Pillsbury, Michael. 2016. The Hundred-Year Marathon: China’s Secret Strategy to Replace America as the Global Superpower. St. Martin’s Griffin.
6.
go back to reference National Research Council of the National Academics. 2012. Terrorism and the Electric Power Delivery System. Washington, D.C.: National Academics Press. National Research Council of the National Academics. 2012. Terrorism and the Electric Power Delivery System. Washington, D.C.: National Academics Press.
7.
go back to reference Schwartau, Winn. 1994. Information Warfare: Chaos on the Electronic Superhighway. New York: Thunder’s Mouth. Schwartau, Winn. 1994. Information Warfare: Chaos on the Electronic Superhighway. New York: Thunder’s Mouth.
8.
go back to reference Arquilla, John, and David Ronfeldt. 1993. Cyberwar is Coming! Comparative Strategy 12 (2): 141–165. Arquilla, John, and David Ronfeldt. 1993. Cyberwar is Coming! Comparative Strategy 12 (2): 141–165.
9.
go back to reference Everard, Jerry. 2000. Virtual States: The Internet and the Boundaries of the Nation-State. London and New York: Routledge. Everard, Jerry. 2000. Virtual States: The Internet and the Boundaries of the Nation-State. London and New York: Routledge.
10.
go back to reference Bendrath, Ralf. 2001. The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection. Information and Security: An International Journal 7: 80–103. Bendrath, Ralf. 2001. The Cyberwar Debate: Perception and Politics in US Critical Infrastructure Protection. Information and Security: An International Journal 7: 80–103.
13.
go back to reference Lindsay, Jon R., Tai Ming Cheung, and Derek S. Reveron, eds. 2015. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. New York: Oxford University Press. Lindsay, Jon R., Tai Ming Cheung, and Derek S. Reveron, eds. 2015. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. New York: Oxford University Press.
14.
go back to reference Lindsay, Jon R. 2014/15. The Impact of China on Cybersecurity: Fiction and Friction. International Security 39 (3): 7–47. Lindsay, Jon R. 2014/15. The Impact of China on Cybersecurity: Fiction and Friction. International Security 39 (3): 7–47.
15.
go back to reference Inkster, Nigel. 2016. China’s Cyber Power. New York: Routledge. Inkster, Nigel. 2016. China’s Cyber Power. New York: Routledge.
16.
go back to reference Miller, Alice L. 2014. More Already on the Central Committee’s Leading Small Groups. China Leadership Monitor 44: 1–8. Miller, Alice L. 2014. More Already on the Central Committee’s Leading Small Groups. China Leadership Monitor 44: 1–8.
17.
go back to reference Shambaugh, David. 2002. China’s International Relations Think Tanks: Evolving Structure and Process. The China Quarterly 171: 581.CrossRef Shambaugh, David. 2002. China’s International Relations Think Tanks: Evolving Structure and Process. The China Quarterly 171: 581.CrossRef
18.
go back to reference Glaser, Bonnie S., and Phillip C. Saunders. 2002. Chinese Civilian Foreign Policy Research Institutes: Evolving Roles and Increasing Influence. The China Quarterly 171: 597–616.CrossRef Glaser, Bonnie S., and Phillip C. Saunders. 2002. Chinese Civilian Foreign Policy Research Institutes: Evolving Roles and Increasing Influence. The China Quarterly 171: 597–616.CrossRef
20.
go back to reference Gill, Bates, and James Mulvenon. 2002. Chinese Military-Related Think Tanks and Research Institutions. The China Quarterly 171: 618.CrossRef Gill, Bates, and James Mulvenon. 2002. Chinese Military-Related Think Tanks and Research Institutions. The China Quarterly 171: 618.CrossRef
21.
go back to reference Zhu, Xufeng. 2011. Government Advisors or Public Advocates? Roles of Think Tanks in China from the Perspective of Regional Variations. The China Quarterly 207: 672.CrossRef Zhu, Xufeng. 2011. Government Advisors or Public Advocates? Roles of Think Tanks in China from the Perspective of Regional Variations. The China Quarterly 207: 672.CrossRef
22.
go back to reference Singer, P. W., and Allan Friedman. 2014. Cybersecurity and Cyberwar. Oxford: Oxford University Press.CrossRef Singer, P. W., and Allan Friedman. 2014. Cybersecurity and Cyberwar. Oxford: Oxford University Press.CrossRef
24.
go back to reference Schmitt, Michael N. 2017. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press.CrossRef Schmitt, Michael N. 2017. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press.CrossRef
25.
go back to reference Krepinevich, Andrew F. 1994. Cavalry to Computer: The Pattern of Military Revolutions. National Interest 37: 30–42. Krepinevich, Andrew F. 1994. Cavalry to Computer: The Pattern of Military Revolutions. National Interest 37: 30–42.
26.
go back to reference Cohen, Eliot A. 1996. A Revolution in Warfare. Foreign Affairs 75 (2): 37–54.CrossRef Cohen, Eliot A. 1996. A Revolution in Warfare. Foreign Affairs 75 (2): 37–54.CrossRef
27.
go back to reference Vickers, Michael G., and Robert C. Martinage. 2004. The Revolution in War. Washington, D.C.: Center for Strategic and Budgetary Assessments. Vickers, Michael G., and Robert C. Martinage. 2004. The Revolution in War. Washington, D.C.: Center for Strategic and Budgetary Assessments.
28.
go back to reference Kello, Lucas. 2013. The Meaning of the Cyber Revolution: Perils to Theory and Statecraft. International Security 38 (2): 26.CrossRef Kello, Lucas. 2013. The Meaning of the Cyber Revolution: Perils to Theory and Statecraft. International Security 38 (2): 26.CrossRef
29.
go back to reference Shen, Changxiang. 1998. Wangluo Anquan Yu Xinxi Zhan [Network Security and Information Warfare]. Jianchuan Dianzi Gongcheng Ship Electronic Engineering 5: 3–5. Shen, Changxiang. 1998. Wangluo Anquan Yu Xinxi Zhan [Network Security and Information Warfare]. Jianchuan Dianzi Gongcheng Ship Electronic Engineering 5: 3–5.
30.
go back to reference Zhang, Zhaozhong. 2001. Wangluo Shidai De Zhanzheng [War in the Internet Age]. Xinxi Anquan yu Tonxin Baomi Information Security and Communication Secrecy 7: 17–19. Zhang, Zhaozhong. 2001. Wangluo Shidai De Zhanzheng [War in the Internet Age]. Xinxi Anquan yu Tonxin Baomi Information Security and Communication Secrecy 7: 17–19.
31.
go back to reference Chen, Yu. 2001. Qiangzhan Weilai Zhigaodian: Zhiwangquan [Seize the Commanding Heights of the Future: Control the Network]. Hongqi Wengao Red Flag Internal Manuscript 16: 14–16. Chen, Yu. 2001. Qiangzhan Weilai Zhigaodian: Zhiwangquan [Seize the Commanding Heights of the Future: Control the Network]. Hongqi Wengao Red Flag Internal Manuscript 16: 14–16.
32.
go back to reference Zhang, Junyong, and Liu Enliang, and Kang Yongsheng. 1999. Zhanzheng Xin Kongjian: Guoji Hulianwang- Cong Kesuowo Zhanzheng Kan Guoji Hulianwang Dui Weilai Zuozhan De Yingxiang [A New Space of War: The Impact of the Internet on Future Warfare from the Perspective of Kosovo War]. Xiandai Junshi Modern Military 10: 3–5. Zhang, Junyong, and Liu Enliang, and Kang Yongsheng. 1999. Zhanzheng Xin Kongjian: Guoji Hulianwang- Cong Kesuowo Zhanzheng Kan Guoji Hulianwang Dui Weilai Zuozhan De Yingxiang [A New Space of War: The Impact of the Internet on Future Warfare from the Perspective of Kosovo War]. Xiandai Junshi Modern Military 10: 3–5.
33.
go back to reference Zhang, Maohua, Yang Daochi, and Wu Xinming. 2001. Wangluozhan- Shuzihua Shidai De Xinweixie [Cyber War: A New Threat in the Digital Age]. Xiandai Junshi Modern Military 4: 44–45. Zhang, Maohua, Yang Daochi, and Wu Xinming. 2001. Wangluozhan- Shuzihua Shidai De Xinweixie [Cyber War: A New Threat in the Digital Age]. Xiandai Junshi Modern Military 4: 44–45.
34.
go back to reference Song, Kuoyi, and Dong He. 2001. Weilai Zhanzheng: Xinxi Anquan Chengwei Zhongtouxi [Future War: Information Security Becomes a Priority]. Guofang Keji National Defense Technology 9: 60–61. Song, Kuoyi, and Dong He. 2001. Weilai Zhanzheng: Xinxi Anquan Chengwei Zhongtouxi [Future War: Information Security Becomes a Priority]. Guofang Keji National Defense Technology 9: 60–61.
35.
go back to reference Chen, Hongchao, Duan Benqin, and Tao Li. 2001. Ershiyi Shiji Zhanzheng Xin Gainian- Wangluozhan [A New Concept of War in the New Century —— Cyber Warfare]. Junshi Tonxin Jishu Military Communication Technology 4: 73–76. Chen, Hongchao, Duan Benqin, and Tao Li. 2001. Ershiyi Shiji Zhanzheng Xin Gainian- Wangluozhan [A New Concept of War in the New Century —— Cyber Warfare]. Junshi Tonxin Jishu Military Communication Technology 4: 73–76.
36.
go back to reference Chen, Jian. 2001. Wangluozhan De Weixie Yu Duice [Threats and Countermeasures of Cyber Warfare]. Jianchuan Dianzi Duikang Electronic Countermeasures on Ships 6: 29–31. Chen, Jian. 2001. Wangluozhan De Weixie Yu Duice [Threats and Countermeasures of Cyber Warfare]. Jianchuan Dianzi Duikang Electronic Countermeasures on Ships 6: 29–31.
37.
go back to reference Wang, Shaowen, and Lou Guocai, and Guo Chunlei. 2004. Nuli Duoqu Wangluozhan Zhong De Zhiwangquan [Strive to Seize the Control of Network in the Cyber Warfare]. Guofang National Defense 6: 23. Wang, Shaowen, and Lou Guocai, and Guo Chunlei. 2004. Nuli Duoqu Wangluozhan Zhong De Zhiwangquan [Strive to Seize the Control of Network in the Cyber Warfare]. Guofang National Defense 6: 23.
38.
go back to reference Liu, Lin,and Li Tiran. 2001. Jisuanji Wangluo Duikang Ji Qi Zhuangbei Fazhan [Computer Network Warfare and Its Equipment Development]. Xiandai Junshi Modern Military 4: 39–40. Liu, Lin,and Li Tiran. 2001. Jisuanji Wangluo Duikang Ji Qi Zhuangbei Fazhan [Computer Network Warfare and Its Equipment Development]. Xiandai Junshi Modern Military 4: 39–40.
39.
go back to reference Lv, Wei. 2001. Wangluo Gongfang Jishu Xianzhuang Ji Qi Fazhan Qushi [The Present Situation and Development of Network Offense and Defense Technology]. Guofang Keji National Defense Technology 2: 54–57. Lv, Wei. 2001. Wangluo Gongfang Jishu Xianzhuang Ji Qi Fazhan Qushi [The Present Situation and Development of Network Offense and Defense Technology]. Guofang Keji National Defense Technology 2: 54–57.
40.
go back to reference Jiang, Panlin. 2001. Wangluozhan Yu Zhihui Kongzhizhan De Guanxi Ji Gongfang Jishu Yanjiu [Research on the Relationship between Network Warfare and Command and Control Warfare and the Techniques of Offense and Defense]. Hangtian Dianzi Duikang Aerospace Electronic Countermeasure 5: 36–40. Jiang, Panlin. 2001. Wangluozhan Yu Zhihui Kongzhizhan De Guanxi Ji Gongfang Jishu Yanjiu [Research on the Relationship between Network Warfare and Command and Control Warfare and the Techniques of Offense and Defense]. Hangtian Dianzi Duikang Aerospace Electronic Countermeasure 5: 36–40.
41.
go back to reference Yu, Ming, and Zhou Xiyuan. 2004. Xinxi Wangluo Duikang Jizhi De Gongfang Fenxi [Analysis of Offense and Defense Mechanism in Information Network War]. Wangluo Anquan Jishu yu Yingyong Cybersecurity Technology and Application 10: 37–39. Yu, Ming, and Zhou Xiyuan. 2004. Xinxi Wangluo Duikang Jizhi De Gongfang Fenxi [Analysis of Offense and Defense Mechanism in Information Network War]. Wangluo Anquan Jishu yu Yingyong Cybersecurity Technology and Application 10: 37–39.
42.
go back to reference Cui, Jianhua, and Ma Tao, and Meng Bo. 2005. Jintie Shizhan Mou Daying [Stick to the Facts and Try to Win]. Zhongguo Minbing China Militia 7: 2. Cui, Jianhua, and Ma Tao, and Meng Bo. 2005. Jintie Shizhan Mou Daying [Stick to the Facts and Try to Win]. Zhongguo Minbing China Militia 7: 2.
43.
go back to reference Zhang, Zhaozhong. 2001. Wangluo Zhanzheng [Cyber Warfare]. Beijing: PLA Literature and Art Publishing House. Zhang, Zhaozhong. 2001. Wangluo Zhanzheng [Cyber Warfare]. Beijing: PLA Literature and Art Publishing House.
44.
go back to reference Liu, Shigang, ed. 2008. Shuzi Diqiu Yu Dandai Zhanzheng [Digital Earth and Contemporary Warfare]. Beijing: Chinese People’s Liberation Army Publishing House. Liu, Shigang, ed. 2008. Shuzi Diqiu Yu Dandai Zhanzheng [Digital Earth and Contemporary Warfare]. Beijing: Chinese People’s Liberation Army Publishing House.
45.
go back to reference Xu, Xiaoyan, ed. 2002. Xinxi Zuozhanxue [Information Warfare]. Beijing: Chinese People’s Liberation Army Publishing House. Xu, Xiaoyan, ed. 2002. Xinxi Zuozhanxue [Information Warfare]. Beijing: Chinese People’s Liberation Army Publishing House.
46.
go back to reference Guo, Shengwei. 2008. Xinxihua Zhanzhengyu Wangdian Budui [Information Warfare and Network Electromagnetic Forces]. Beijing: National Defense University Press. Guo, Shengwei. 2008. Xinxihua Zhanzhengyu Wangdian Budui [Information Warfare and Network Electromagnetic Forces]. Beijing: National Defense University Press.
47.
go back to reference Xiao, Wenguang, and Li Yuanlei. 2007. Jisuanji Wangluoyu Weilai Zhanzheng [Computer Network and Future War]. Jiangsu Hangkong Jiangsu Aviation 1: 31. Xiao, Wenguang, and Li Yuanlei. 2007. Jisuanji Wangluoyu Weilai Zhanzheng [Computer Network and Future War]. Jiangsu Hangkong Jiangsu Aviation 1: 31.
48.
go back to reference Guo. Xinxihua Zhanzhengyu Wangdian Budui, 257 – 59, 265 – 66, 275, 364. Guo. Xinxihua Zhanzhengyu Wangdian Budui, 257 – 59, 265 – 66, 275, 364.
49.
go back to reference Shang, Liang, Yang Guoxin, Shi Jianlai, and Sui Shilong. 2009. Wangluozhan Budui – Geguo Junzhong Xinchong [Cyberwarfare Forces: New Favorites of Services in Various Countries]. Guofang Keji National Defense Technology 4: 89. Shang, Liang, Yang Guoxin, Shi Jianlai, and Sui Shilong. 2009. Wangluozhan Budui – Geguo Junzhong Xinchong [Cyberwarfare Forces: New Favorites of Services in Various Countries]. Guofang Keji National Defense Technology 4: 89.
50.
go back to reference Zhang, Yuliang, ed. 2006. Zhanyixue [Science of Campaign]. Beijing: National Defense University Press. Zhang, Yuliang, ed. 2006. Zhanyixue [Science of Campaign]. Beijing: National Defense University Press.
51.
go back to reference Dai, Qingmin. 2002. Wangdian Yitizhan [Integrated Network and Electromagnetic Warfare]. Beijing: Chinese People’s Liberation Army Publishing House. Dai, Qingmin. 2002. Wangdian Yitizhan [Integrated Network and Electromagnetic Warfare]. Beijing: Chinese People’s Liberation Army Publishing House.
52.
go back to reference Lu, Linzhi. Preemptive Strikes Are Crucial in Limited High-tech Wars. The PLA Daily, February 7, 1996. Lu, Linzhi. Preemptive Strikes Are Crucial in Limited High-tech Wars. The PLA Daily, February 7, 1996.
54.
go back to reference Guo. Xinxihua Zhanzhengyu Wangdian Budui, 223, 280, 281. Guo. Xinxihua Zhanzhengyu Wangdian Budui, 223, 280, 281.
55.
go back to reference Dai. Wangdian Yitizhan, 107–108, 113 – 14, 160. Dai. Wangdian Yitizhan, 107–108, 113 – 14, 160.
56.
go back to reference Lindsay, Jon R., Tai Ming Cheung, and Derek S. Reveron, eds. 2015. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press. Lindsay, Jon R., Tai Ming Cheung, and Derek S. Reveron, eds. 2015. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press.
57.
go back to reference Qiao, Liang, and Wang Xiangsui. 1999. Chaoxianzhan [Unrestricted Warfare]. Beijing: PLA Literature and Arts Publishing House. Qiao, Liang, and Wang Xiangsui. 1999. Chaoxianzhan [Unrestricted Warfare]. Beijing: PLA Literature and Arts Publishing House.
58.
go back to reference Lindsay, Jon R., Tai Ming Cheung, and Derek S. Reveron, eds. 2015. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press. Lindsay, Jon R., Tai Ming Cheung, and Derek S. Reveron, eds. 2015. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press.
59.
go back to reference Inkster, Nigel. 2016. China’s Cyber Power. Routledge. Inkster, Nigel. 2016. China’s Cyber Power. Routledge.
63.
go back to reference Chi, Yannian. 2009. Jingti! Wangluo Zhanzheng Chengwei Yizhong Difengxian De Dianfu Shouduan [Watch out! Cyberwarfare is Becoming a Low-risk Means of Disruption]. Guofang National Defense 11: 71–73. Chi, Yannian. 2009. Jingti! Wangluo Zhanzheng Chengwei Yizhong Difengxian De Dianfu Shouduan [Watch out! Cyberwarfare is Becoming a Low-risk Means of Disruption]. Guofang National Defense 11: 71–73.
64.
go back to reference Lynn, William J. 2010. Defending a New Domain: The Pentagon’s Cyberstrategy. Foreign Affairs 89 (5): 101. Lynn, William J. 2010. Defending a New Domain: The Pentagon’s Cyberstrategy. Foreign Affairs 89 (5): 101.
68.
go back to reference Li, Shan. 2011. Xiankai Stuxnet Bingdu Shenmide Miansha [Lift the Veil of Stuxnet]. Kexueyu Wenhua Science and Culture 4: 19. Li, Shan. 2011. Xiankai Stuxnet Bingdu Shenmide Miansha [Lift the Veil of Stuxnet]. Kexueyu Wenhua Science and Culture 4: 19.
69.
go back to reference Wei, Qinzhi. 2013. Gongye Kongzhi Xitong Anquan Xianzhuangyu Anquan Celue Fenxi [Security Status and Security Strategy Analysis of Industrial Control System]. Xinxi Anquanyu Jishu Information Security Technology 2: 23–24. Wei, Qinzhi. 2013. Gongye Kongzhi Xitong Anquan Xianzhuangyu Anquan Celue Fenxi [Security Status and Security Strategy Analysis of Industrial Control System]. Xinxi Anquanyu Jishu Information Security Technology 2: 23–24.
70.
go back to reference Yu, Xiaoqiu. Wangluo Weisheli Shige Weixiande Youxi [Cyber Deterrence Is a Dangerous Game]. People’s Daily, July 25, 2011. Yu, Xiaoqiu. Wangluo Weisheli Shige Weixiande Youxi [Cyber Deterrence Is a Dangerous Game]. People’s Daily, July 25, 2011.
71.
go back to reference Li, Hong. 2011. Conglin Faze Jiaju Wangluo Zhanzheng Fengxian [Jungle Law Intensifies the Risk of Cyberwar]. People’s Tribune 16: 22–23. Li, Hong. 2011. Conglin Faze Jiaju Wangluo Zhanzheng Fengxian [Jungle Law Intensifies the Risk of Cyberwar]. People’s Tribune 16: 22–23.
72.
go back to reference Shen, Yi. 2011. Meiguo Wangluo Zhanlue “Mohe” Jiaoluan Shijie [The U.S. Cyber Strategy Disturbs the World]. People’s Tribune 16: 25–26. Shen, Yi. 2011. Meiguo Wangluo Zhanlue “Mohe” Jiaoluan Shijie [The U.S. Cyber Strategy Disturbs the World]. People’s Tribune 16: 25–26.
73.
go back to reference He, Qisong. 2013. Meiguo Wangluo Weishe Lilun Zhizheng [The Debate on Cyber Deterrence Theory from the U.S. Scholars]. Guoji Zhengzhi Yanjiu International Politics Quartely 2: 53–74. He, Qisong. 2013. Meiguo Wangluo Weishe Lilun Zhizheng [The Debate on Cyber Deterrence Theory from the U.S. Scholars]. Guoji Zhengzhi Yanjiu International Politics Quartely 2: 53–74.
74.
go back to reference He, Qisong. 2012. Jinnian Meiguo Wangluo Weishe Lilun Yanjiu Shuping [A Research Review on the Theory of Cyber Deterrence in the U.S. in the Recent Year]. Xiandai Guoji Guanxi Contemporary International Relations 10: 7–10. He, Qisong. 2012. Jinnian Meiguo Wangluo Weishe Lilun Yanjiu Shuping [A Research Review on the Theory of Cyber Deterrence in the U.S. in the Recent Year]. Xiandai Guoji Guanxi Contemporary International Relations 10: 7–10.
75.
go back to reference Ren, Lin, and Gong Weian. 2015. Wangluo Anquande Zhanlue Xuanze [Strategic Choice of Cybersecurity]. Guoji Anquan Yanjiu International Security Studies 5: 40–58. Ren, Lin, and Gong Weian. 2015. Wangluo Anquande Zhanlue Xuanze [Strategic Choice of Cybersecurity]. Guoji Anquan Yanjiu International Security Studies 5: 40–58.
76.
go back to reference Dong, Qingling, and Dai Changzheng. 2012. Wangluo Kongjian Weishe: Baofu Shifou Kexing [Cyber Deterrence:Is Retaliatory Strategy Possible]. Shijie Jingjiyu Zhengzhi World Economics and Politics 7: 99–116. Dong, Qingling, and Dai Changzheng. 2012. Wangluo Kongjian Weishe: Baofu Shifou Kexing [Cyber Deterrence:Is Retaliatory Strategy Possible]. Shijie Jingjiyu Zhengzhi World Economics and Politics 7: 99–116.
77.
go back to reference Liang, Kui. Wangluo Weishe: Weier Nanshe [Cyber Deterrence Is Hard to Work]. Zhongguo Guofangbao China Military, August 8, 2011. Liang, Kui. Wangluo Weishe: Weier Nanshe [Cyber Deterrence Is Hard to Work]. Zhongguo Guofangbao China Military, August 8, 2011.
78.
go back to reference Yang, Yanbo. Jujiao Meijun “Wangluo Weishe” [The U.S. Cyber Deterrence Strategy]. Zhongguo Guofangbao China Military, January 9, 2012. Yang, Yanbo. Jujiao Meijun “Wangluo Weishe” [The U.S. Cyber Deterrence Strategy]. Zhongguo Guofangbao China Military, January 9, 2012.
79.
go back to reference Ye, Zheng, and Zhao Baoxian. Wangluozhan, Zenmezhan [How to Deal with Cyberwarfare]. Zhongguo Qingnianbao China Youth Daily, June 3, 2011. Ye, Zheng, and Zhao Baoxian. Wangluozhan, Zenmezhan [How to Deal with Cyberwarfare]. Zhongguo Qingnianbao China Youth Daily, June 3, 2011.
80.
go back to reference Lindsay, Jon R., Tai Ming Cheung, and Derek S. Reveron, eds. 2015. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press. Lindsay, Jon R., Tai Ming Cheung, and Derek S. Reveron, eds. 2015. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press.
81.
go back to reference Wu, Hequan. 2014. Guojijian Wangluo Anquan Gongfang Shi Yichang Chijiuzhan [The Global Cyber Security Battle is a Protracted War]. Chuangxin Keji Innovation Science and Technology 13: 6. Wu, Hequan. 2014. Guojijian Wangluo Anquan Gongfang Shi Yichang Chijiuzhan [The Global Cyber Security Battle is a Protracted War]. Chuangxin Keji Innovation Science and Technology 13: 6.
82.
go back to reference Dong, Qingling. 2016. Wangluo Kongjian Weishe Yanjiu Jiqi Guanjian Wenti [Research on Deterrence in Cyberspace and Its Key Issues]. Xinxi Anquan Yanjiu Journal of Information Security Research 10: 920–925. Dong, Qingling. 2016. Wangluo Kongjian Weishe Yanjiu Jiqi Guanjian Wenti [Research on Deterrence in Cyberspace and Its Key Issues]. Xinxi Anquan Yanjiu Journal of Information Security Research 10: 920–925.
83.
go back to reference Cheng, Qun, and He Qisong. 2015. Goujian Zhongguo Wangluo Weishe Zhanlue [Building China’s Cyber Deterrence Strategy]. Zhongguo Xinxi Anquan China Information Security 11: 40–42. Cheng, Qun, and He Qisong. 2015. Goujian Zhongguo Wangluo Weishe Zhanlue [Building China’s Cyber Deterrence Strategy]. Zhongguo Xinxi Anquan China Information Security 11: 40–42.
84.
go back to reference Li, Bin. 2006. Zhongguo Hezhanlue Bianxi [Analysis of China’s Nuclear Strategy]. Shijiejingji yu Zhengzhi World Economics and Politics 9: 16–22. Li, Bin. 2006. Zhongguo Hezhanlue Bianxi [Analysis of China’s Nuclear Strategy]. Shijiejingji yu Zhengzhi World Economics and Politics 9: 16–22.
85.
go back to reference Fravel, M., Taylor, and Evan S. Medeiros. 2010. China’s Search for Assured Retaliation: The Evolution of Chinese Nuclear Strategy and Force Structure. International Security 35 (2): 71.CrossRef Fravel, M., Taylor, and Evan S. Medeiros. 2010. China’s Search for Assured Retaliation: The Evolution of Chinese Nuclear Strategy and Force Structure. International Security 35 (2): 71.CrossRef
86.
go back to reference Long, Zaiye. 2015. Wangluo Kongjian Weishe Zhiheng Nengli Jianshe De Zhongguo Sikao [China’s Consideration on the Construction of Deterrence and Power Balance in Cyberspace]. Zhongguo Xinxi Anquan China Information Security 11: 36–39. Long, Zaiye. 2015. Wangluo Kongjian Weishe Zhiheng Nengli Jianshe De Zhongguo Sikao [China’s Consideration on the Construction of Deterrence and Power Balance in Cyberspace]. Zhongguo Xinxi Anquan China Information Security 11: 36–39.
87.
go back to reference Jiang, Yamin. 2015. Jiaqiang Wangluo Weishe Liliang Jianshe Shi Xinxi Shidai De Qiangguo Zhi Ce [Strengthening the Construction of Cyber Deterrent Force as a Powerful Strategy in the Information Age]. Zhongguo Xinxi Anquan China Information Security 11: 54–57. Jiang, Yamin. 2015. Jiaqiang Wangluo Weishe Liliang Jianshe Shi Xinxi Shidai De Qiangguo Zhi Ce [Strengthening the Construction of Cyber Deterrent Force as a Powerful Strategy in the Information Age]. Zhongguo Xinxi Anquan China Information Security 11: 54–57.
88.
go back to reference Yuan, Yi. 2015. Qianxi Wangluo Kongjian Weishede Tezheng Leixinghe Yunyong Yaodian [A Brief Analysis of the Characterstic, Types, and Application Points of Cyber Deterrence]. Zhongguo Xinxi Anquan China Information Security 11: 43–46. Yuan, Yi. 2015. Qianxi Wangluo Kongjian Weishede Tezheng Leixinghe Yunyong Yaodian [A Brief Analysis of the Characterstic, Types, and Application Points of Cyber Deterrence]. Zhongguo Xinxi Anquan China Information Security 11: 43–46.
89.
go back to reference Gao, Yan. 2017. Tuijin Wangluo Kongjian Junkong Jiaqiang Wangluo Fangyu Beizhan [Promote Arms Control in Cyberspace and Strengthen Cyber Defense]. Baomi Kexue Jishu Confidential Science and Technology 6: 6–9. Gao, Yan. 2017. Tuijin Wangluo Kongjian Junkong Jiaqiang Wangluo Fangyu Beizhan [Promote Arms Control in Cyberspace and Strengthen Cyber Defense]. Baomi Kexue Jishu Confidential Science and Technology 6: 6–9.
90.
go back to reference Lu, Chuanying. 2017. Wangluo Wuqi Kuosan He Jianxing Jianjin De Wangluozhan [Cyber Weapons Proliferation and Cyber Warfare on the Horizon]. Xinxi Anquan yu Tongxin Baomi Information Security and Confidentiality of Communications 8: 6–7. Lu, Chuanying. 2017. Wangluo Wuqi Kuosan He Jianxing Jianjin De Wangluozhan [Cyber Weapons Proliferation and Cyber Warfare on the Horizon]. Xinxi Anquan yu Tongxin Baomi Information Security and Confidentiality of Communications 8: 6–7.
92.
go back to reference Zhou, Hongren. 2019. Wangluo Kongjian De Xingqi Yu Zhanlue Wending [The Rise of Cyberspace and Strategic Stability]. Guoji Zhanwang Global Review 3: 21–34. Zhou, Hongren. 2019. Wangluo Kongjian De Xingqi Yu Zhanlue Wending [The Rise of Cyberspace and Strategic Stability]. Guoji Zhanwang Global Review 3: 21–34.
93.
go back to reference Luo, Xingguo, Tong Qing, Zhang Zheng, and Wu Jiangxing. 2016. Nitai Fangyu Jishu [Mimic Defense Technology]. Zhongguo Gongcheng Kexue Chinese Engineering Science 6: 69–73. Luo, Xingguo, Tong Qing, Zhang Zheng, and Wu Jiangxing. 2016. Nitai Fangyu Jishu [Mimic Defense Technology]. Zhongguo Gongcheng Kexue Chinese Engineering Science 6: 69–73.
94.
go back to reference Liff, Adam P. 2012. Cyberwar: A New “Absolute Weapon?” The Proliferation of Cyberwarfare Capabilities and Interstate War. Journal of Strategic Studies 35 (3): 401–428.CrossRef Liff, Adam P. 2012. Cyberwar: A New “Absolute Weapon?” The Proliferation of Cyberwarfare Capabilities and Interstate War. Journal of Strategic Studies 35 (3): 401–428.CrossRef
95.
go back to reference Kello, Lucas. 2013. The Meaning of the Cyber Revolution: Perils to Theory and Statecraft. International Security 38 (2): 7–40.CrossRef Kello, Lucas. 2013. The Meaning of the Cyber Revolution: Perils to Theory and Statecraft. International Security 38 (2): 7–40.CrossRef
96.
go back to reference Wu, Jiangxing. 2016. Wangluo Kongjian Nitai Fangyu Yanjiu [Research on Mimic Defense in Cyberspace]. Xinxi Anquan Xuebao Journal of Information Security 4: 1–10. Wu, Jiangxing. 2016. Wangluo Kongjian Nitai Fangyu Yanjiu [Research on Mimic Defense in Cyberspace]. Xinxi Anquan Xuebao Journal of Information Security 4: 1–10.
101.
go back to reference Peng, Guangqian, and Yao Youzhi. 2001. Zhanluexue [Science of Strategy]. Beijing: Military Sciences Press. Peng, Guangqian, and Yao Youzhi. 2001. Zhanluexue [Science of Strategy]. Beijing: Military Sciences Press.
102.
go back to reference Li, Bin. 2006. Zhongguo Hezhanlue Bianxi [Analysis of China’s Nuclear Strategy]. Shijiejingji yu Zhengzhi World Economics and Politics 9: 16–22. Li, Bin. 2006. Zhongguo Hezhanlue Bianxi [Analysis of China’s Nuclear Strategy]. Shijiejingji yu Zhengzhi World Economics and Politics 9: 16–22.
103.
go back to reference Shen, Yi. 2016. Cyber Sovereignty and the Governance of Global Cyberspace. Chinese Political Science Review 1 (1): 81–93.CrossRef Shen, Yi. 2016. Cyber Sovereignty and the Governance of Global Cyberspace. Chinese Political Science Review 1 (1): 81–93.CrossRef
104.
go back to reference Cappelletti, Alessandra. 2019. Between Centrality and Re-scaled Identity: A New Role for the Chinese State in Shaping China’s Image Abroad. Chinese Political Science Review 4 (3): 349–374.CrossRef Cappelletti, Alessandra. 2019. Between Centrality and Re-scaled Identity: A New Role for the Chinese State in Shaping China’s Image Abroad. Chinese Political Science Review 4 (3): 349–374.CrossRef
105.
go back to reference Akdag, Yavuz. 2019. The Likelihood of Cyberwar between the United States and China: A Neorealism and Power Transition Theory Perspective. Journal of Chinese Political Science 24 (2): 225–247.CrossRef Akdag, Yavuz. 2019. The Likelihood of Cyberwar between the United States and China: A Neorealism and Power Transition Theory Perspective. Journal of Chinese Political Science 24 (2): 225–247.CrossRef
Metadata
Title
The Shift of China’s Strategic Thinking on Cyberwarfare Since the 1990s
Author
Tianjiao Jiang
Publication date
23-06-2022
Publisher
Springer Netherlands
Published in
Journal of Chinese Political Science / Issue 1/2023
Print ISSN: 1080-6954
Electronic ISSN: 1874-6357
DOI
https://doi.org/10.1007/s11366-022-09813-3

Other articles of this Issue 1/2023

Journal of Chinese Political Science 1/2023 Go to the issue

Premium Partner