Cyberwarfare between the United States and China 2014 -2022: in Retrospect
(1) Universitas Sebelas Maret
(2) IPS NSYSU Taiwan; Universitas Sebelas Maret
(3) Universitas Sebelas Maret
(4) Universitas Sebelas Maret
(5) Universitas Sebelas Maret
(*) Corresponding Author
Abstract
The development of security in the context of international politics and international relations has developed from time to time. Nowadays, the practice of security done by a country's government can be imbued with the advancement of technological innovation, dubbed cyber-influenced. Hence the term cyber-security is often used to indicate the association of information technology with security. The United States and China, as two competing big-power countries, also actively utilize cyber-security over the years. This article will describe the cyberwarfare between The United States and China, focusing from 2014 until 2022. A qualitative descriptive method is used, complemented by cyber security and state sovereignty concepts to analyze the case. Results indicate that both countries are involved in cyberwarfare based on defensive reasoning. The fact that both countries are referred to as great powers in international politics also complicates the case, as they have a high-tension nature of the relationship.
Full Text:
PDFReferences
Al Syahrin, M. N. (2018). China versus Amerika Serikat: Interpretasi Rivalitas Keamanan Negara Adidaya Di Kawasan Asia Pasifik. Global & Strategis, 12(1), 145–163. Retrieved from https://e-journal.unair.ac.id/JGS/article/view/8153/4838
Aljazeera. (2021, February 20). US Wary China’s New Coast Guard Law Could Escalate Sea Disputes. Retrieved April 30, 2021, from https://www.aljazeera.com/news/2021/2/20/us-wary-chinas-new-coast-guard-law-could-escalate-sea
Baram, G., & Menashri, H. (2019). Why Can’t We Be Friends? Challenges to International Cyberwarfare Cooperation Efforts and The Way Ahead. Comparative Strategy, 38(2), 89–97. https://doi.org/10.1080/01495933.2019.1573069
BBC News. (2013, July 9). US-China Cyber Security Working Group Meets. Retrieved March 6, 2023, from https://www.bbc.com/news/world-asia-china-23177538
Canongia, C., & Mandarino, R. (2012). Cybersecurity: The New Challenge of The Information Society. In Handbook of Research on Business Social Networking: Organizational, Managerial, and Technological Dimensions (pp. 165–184). Pennsylvania: IGI Global. https://doi.org/10.4018/978-1-61350-168-9.CH009
Cary, D. (2021). China’s National Cybersecurity Center: A Base for Military-Civil Fusion in the Cyber Domain. Washington D. C. https://doi.org/10.51593/2020CA016
Committee on National Security Systems. (2017). National Information Assurance Glossary: Committee on National Security Systems (CNSS) Instruction No. 4009.
Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity. Technology Innovation Management Review, 13–21. https://doi.org/10.22215/TIMREVIEW/835
Creemers, R. (2016). Cyber China: Upgrading Propaganda, Public Opinion Work and Social Management for the Twenty-First Century. Journal of Contemporary China, 26(103), 85–100. https://doi.org/10.1080/10670564.2016.1206281
Cybersecurity Advisory. (2021). Chinese State-Sponsored Cyber Operations: Observed TTPs.
Daricili, A. B., & Ozdal, B. (2018). Analysis of the Cyber Security Strategies of the People’s Republic of China. Journal of Security Strategies, 14(28), 1–35. https://doi.org/10.17752/GUVENLIKSTRTJ.495748
DBpedia. (n.d.). About: Par in Parem non Habet Imperium. Retrieved March 6, 2023, from https://dbpedia.org/page/Par_in_parem_non_habet_imperium
Hanumbhawono, W., Radjendra, P., & Ladjide, S. (2022). Policies and Scenarios to Prevent the Use of Nuclear Weapons between the United States and China in the South China Sea. Jurnal Pertahanan, 8(1), 131–156. https://doi.org/10.33172/JP.V8I1.1653
Harold, S. W., Libicki, M. C., & SCevallos, A. S. (2016). Getting to Yes with China in Cyberspace. https://doi.org/10.7249/RR1335
Harrison, K., & Boyd, T. (2018). The State and Sovereignty. In Understanding Political Ideas and Movements. England: Manchester University Press. https://doi.org/10.7765/9781526137951
Hunker, J. (2010). U.S. International Policy for Cybersecurity: Five Issues That Won’t Go Away. Journal of National Security Law & Policy, 4(1), 197–216.
Kania, E. B., & Costello, J. (2021). Seizing the Commanding Heights: the PLA Strategic Support Force in Chinese Military Power. Journal of Strategic Studies, 44(2), 218–264. https://doi.org/10.1080/01402390.2020.1747444
Kozlowski, A. (2014). The “Cyber Weapons Gap": The Assessment of China’s Cyber Warfare Capabilities and Its Consequences for Potential Conflict over Taiwan.
Lee, M. (2013). Top China College in Focus with Ties to Army’s Cyber-Spying Unit. Retrieved from https://www.reuters.com/article/net-us-china-cybersecurity-university-idUSBRE92N01120130324
Levite, A. E., Jinghua, L., Perkovich, G., Chuanying, L., Manshu, X., Bin, L., & Fan, Y. (2021). China-U.S. Cyber-Nuclear C3 Stability. Washington, DC: Carnegie Endowment for International Peace.
Louie, C. (2017, September 8). U.S.-China Cybersecurity Cooperation. Retrieved March 6, 2023, from https://jsis.washington.edu/news/u-s-china-cybersecurity-cooperation/
Mallick, P. (2022). China’s Developing Cyber Warfare Capabilities. New Delhi: Center for Land Warfare Studies.
Miao, W., & Lei, W. (2016). Policy Review: The Cyberspace Administration of China. Global Media and Communication, 12(3). https://doi.org/10.1177/1742766516680879
Miles, M. B., & Huberman, A. M. (2014). Qualitative Data Analysis: An Expanded Sourcebook. California: Sage Publications.
Ministry of Foreign Affairs of PRC. (2015). Xi Jinping Meets with President Barack Obama of the US. Retrieved from https://www.fmprc.gov.cn/mfa_eng/topics_665678/2015zt/xjpffgcxqhbhbldhdjbbwnfjxgsfwbfnfyhnsbzczfhzltfh/201512/t20151202_704618.html
Montolalu, R. R. K. (2022). U.S. Indo-Pacific Strategy: The Utilization of The U.S.-Australia Military Alliance as Part of The U.S. Balance of Power Strategy to Respond to China Influence in Indo-Pacific Region. Jurnal Pertahanan, 8(2), 222–233. https://doi.org/10.33172/JP.V8I2.1659
Mulvenon, J. (2009). PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. In Beyond The Strait: PLA Missions Other Than Taiwan. Strategic Studies Institute, US Army War College.
Nakashima, E. (2013). Chinese Hackers Who Breached Google Gained Access to Sensitive Data, U.S. Officials Say. Retrieved from https://www.washingtonpost.com/world/national-security/chinese-hackers-who-breached-google-gained-access-to-sensitive-data-us-officials-say/2013/05/20/51330428-be34-11e2-89c9-3be8095fe767_story.html
National Counterintelligence and Security Center. (2018). Foreign Economic Espionage in Cyberspace. Washington, DC: National Counterintelligence and Security Center.
Nye, J. S. (2010). Cyber Power. Cambridge: Belfer Center for Science and International Affairs.
Pitra, H. (2019). China Coercive Diplomacy Through South China Sea Conflict and Belt & Road Initiatives. Jurnal Pertahanan, 5(2), 48–60. https://doi.org/10.33172/JP.V5I2.522
Qian, X. (2019). Cyberspace Security and U.S.-China Relations. AICS 2019: Proceedings of the 2019 International Conference on Artificial Intelligence and Computer Science, 709–712. New York: Association for Computing Machinery. https://doi.org/10.1145/3349341.3349495
Rollins, J. W., Lawrence, S. V., Rennack, D. E., & Theohary, C. A. (2015, October 16). U.S.–China Cyber Agreement. CRS Insight.
Sanchez, F. C., Lin, W., & Korunka, K. (2019). Applying Irregular Warfare Principles to Cyber Warfare.
Silalahi, U. (2009). Metode Penelitian Sosial. Bandung: Refika Aditama.
Stanford Encyclopedia of Philosophy. (2003, May 31). Sovereignty. Retrieved March 6, 2023, from https://plato.stanford.edu/entries/sovereignty/
Tabeta, S. (2022, July 9). China to Enforce Cross-Border Data Transfer Rules in September. Retrieved March 6, 2023, from https://asia.nikkei.com/Business/China-tech/China-to-enforce-cross-border-data-transfer-rules-in-September
The State Council Information Office of the People’s Republic of China. (2019). China’s National Defense in the New Era. Beijing: Foreign Languages Press.
The United States Department of Justice. (2014, May 19). U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage. Retrieved March 6, 2023, from https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor
The White House. (2015, April 1). Executive Order -- “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities.” Retrieved March 6, 2023, from https://obamawhitehouse.archives.gov/the-press-office/2015/04/01/executive-order-blocking-property-certain-persons-engaging-significant-m
Tunkin, G. I. (2013). Theory of International Law. Cambridge: Harvard University Press.
Wu, T.-H., & Hung, C.-L. (2021). Cyber Warfare Capabilities of the PLA Strategic Support Force. In T.-Y. Su & J.-M. Hung (Eds.), 2021 Report on the Defense Technology Trend Assessment - Assessment of the New Generation of Chinese Communist Party’s Military Technology. Taipei: Institute for National Defense and Security Research.
DOI: https://doi.org/10.33172/jp.v9i1.1869
INDEXED BY:
Office Address:
Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Republic of Indonesia Defense University
Jl. Salemba Raya No.14, Paseban,Jakarta Pusat, Daerah Khusus Ibukota Jakarta 10440, Indonesia
Email: jurnal.unhan@idu.ac.id
Jurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism dan Integrity is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.