Cyberwarfare between the United States and China 2014 -2022: in Retrospect

Nadia Dian Ardita(1*), Septyanto Galan Prakoso(2), Ferdian Ahya Al Putra(3), Arif Sulistiobudi(4), Randhi Satria(5),

(1) Universitas Sebelas Maret
(2) IPS NSYSU Taiwan; Universitas Sebelas Maret
(3) Universitas Sebelas Maret
(4) Universitas Sebelas Maret
(5) Universitas Sebelas Maret
(*) Corresponding Author


The development of security in the context of international politics and international relations has developed from time to time. Nowadays, the practice of security done by a country's government can be imbued with the advancement of technological innovation, dubbed cyber-influenced. Hence the term cyber-security is often used to indicate the association of information technology with security. The United States and China, as two competing big-power countries, also actively utilize cyber-security over the years. This article will describe the cyberwarfare between The United States and China, focusing from 2014 until 2022. A qualitative descriptive method is used, complemented by cyber security and state sovereignty concepts to analyze the case. Results indicate that both countries are involved in cyberwarfare based on defensive reasoning. The fact that both countries are referred to as great powers in international politics also complicates the case, as they have a high-tension nature of the relationship.

Full Text:



Al Syahrin, M. N. (2018). China versus Amerika Serikat: Interpretasi Rivalitas Keamanan Negara Adidaya Di Kawasan Asia Pasifik. Global & Strategis, 12(1), 145–163. Retrieved from

Aljazeera. (2021, February 20). US Wary China’s New Coast Guard Law Could Escalate Sea Disputes. Retrieved April 30, 2021, from

Baram, G., & Menashri, H. (2019). Why Can’t We Be Friends? Challenges to International Cyberwarfare Cooperation Efforts and The Way Ahead. Comparative Strategy, 38(2), 89–97.

BBC News. (2013, July 9). US-China Cyber Security Working Group Meets. Retrieved March 6, 2023, from

Canongia, C., & Mandarino, R. (2012). Cybersecurity: The New Challenge of The Information Society. In Handbook of Research on Business Social Networking: Organizational, Managerial, and Technological Dimensions (pp. 165–184). Pennsylvania: IGI Global.

Cary, D. (2021). China’s National Cybersecurity Center: A Base for Military-Civil Fusion in the Cyber Domain. Washington D. C.

Committee on National Security Systems. (2017). National Information Assurance Glossary: Committee on National Security Systems (CNSS) Instruction No. 4009.

Craigen, D., Diakun-Thibault, N., & Purse, R. (2014). Defining Cybersecurity. Technology Innovation Management Review, 13–21.

Creemers, R. (2016). Cyber China: Upgrading Propaganda, Public Opinion Work and Social Management for the Twenty-First Century. Journal of Contemporary China, 26(103), 85–100.

Cybersecurity Advisory. (2021). Chinese State-Sponsored Cyber Operations: Observed TTPs.

Daricili, A. B., & Ozdal, B. (2018). Analysis of the Cyber Security Strategies of the People’s Republic of China. Journal of Security Strategies, 14(28), 1–35.

DBpedia. (n.d.). About: Par in Parem non Habet Imperium. Retrieved March 6, 2023, from

Hanumbhawono, W., Radjendra, P., & Ladjide, S. (2022). Policies and Scenarios to Prevent the Use of Nuclear Weapons between the United States and China in the South China Sea. Jurnal Pertahanan, 8(1), 131–156.

Harold, S. W., Libicki, M. C., & SCevallos, A. S. (2016). Getting to Yes with China in Cyberspace.

Harrison, K., & Boyd, T. (2018). The State and Sovereignty. In Understanding Political Ideas and Movements. England: Manchester University Press.

Hunker, J. (2010). U.S. International Policy for Cybersecurity: Five Issues That Won’t Go Away. Journal of National Security Law & Policy, 4(1), 197–216.

Kania, E. B., & Costello, J. (2021). Seizing the Commanding Heights: the PLA Strategic Support Force in Chinese Military Power. Journal of Strategic Studies, 44(2), 218–264.

Kozlowski, A. (2014). The “Cyber Weapons Gap": The Assessment of China’s Cyber Warfare Capabilities and Its Consequences for Potential Conflict over Taiwan.

Lee, M. (2013). Top China College in Focus with Ties to Army’s Cyber-Spying Unit. Retrieved from

Levite, A. E., Jinghua, L., Perkovich, G., Chuanying, L., Manshu, X., Bin, L., & Fan, Y. (2021). China-U.S. Cyber-Nuclear C3 Stability. Washington, DC: Carnegie Endowment for International Peace.

Louie, C. (2017, September 8). U.S.-China Cybersecurity Cooperation. Retrieved March 6, 2023, from

Mallick, P. (2022). China’s Developing Cyber Warfare Capabilities. New Delhi: Center for Land Warfare Studies.

Miao, W., & Lei, W. (2016). Policy Review: The Cyberspace Administration of China. Global Media and Communication, 12(3).

Miles, M. B., & Huberman, A. M. (2014). Qualitative Data Analysis: An Expanded Sourcebook. California: Sage Publications.

Ministry of Foreign Affairs of PRC. (2015). Xi Jinping Meets with President Barack Obama of the US. Retrieved from

Montolalu, R. R. K. (2022). U.S. Indo-Pacific Strategy: The Utilization of The U.S.-Australia Military Alliance as Part of The U.S. Balance of Power Strategy to Respond to China Influence in Indo-Pacific Region. Jurnal Pertahanan, 8(2), 222–233.

Mulvenon, J. (2009). PLA Computer Network Operations: Scenarios, Doctrine, Organizations, and Capability. In Beyond The Strait: PLA Missions Other Than Taiwan. Strategic Studies Institute, US Army War College.

Nakashima, E. (2013). Chinese Hackers Who Breached Google Gained Access to Sensitive Data, U.S. Officials Say. Retrieved from

National Counterintelligence and Security Center. (2018). Foreign Economic Espionage in Cyberspace. Washington, DC: National Counterintelligence and Security Center.

Nye, J. S. (2010). Cyber Power. Cambridge: Belfer Center for Science and International Affairs.

Pitra, H. (2019). China Coercive Diplomacy Through South China Sea Conflict and Belt & Road Initiatives. Jurnal Pertahanan, 5(2), 48–60.

Qian, X. (2019). Cyberspace Security and U.S.-China Relations. AICS 2019: Proceedings of the 2019 International Conference on Artificial Intelligence and Computer Science, 709–712. New York: Association for Computing Machinery.

Rollins, J. W., Lawrence, S. V., Rennack, D. E., & Theohary, C. A. (2015, October 16). U.S.–China Cyber Agreement. CRS Insight.

Sanchez, F. C., Lin, W., & Korunka, K. (2019). Applying Irregular Warfare Principles to Cyber Warfare.

Silalahi, U. (2009). Metode Penelitian Sosial. Bandung: Refika Aditama.

Stanford Encyclopedia of Philosophy. (2003, May 31). Sovereignty. Retrieved March 6, 2023, from

Tabeta, S. (2022, July 9). China to Enforce Cross-Border Data Transfer Rules in September. Retrieved March 6, 2023, from

The State Council Information Office of the People’s Republic of China. (2019). China’s National Defense in the New Era. Beijing: Foreign Languages Press.

The United States Department of Justice. (2014, May 19). U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage. Retrieved March 6, 2023, from

The White House. (2015, April 1). Executive Order -- “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities.” Retrieved March 6, 2023, from

Tunkin, G. I. (2013). Theory of International Law. Cambridge: Harvard University Press.

Wu, T.-H., & Hung, C.-L. (2021). Cyber Warfare Capabilities of the PLA Strategic Support Force. In T.-Y. Su & J.-M. Hung (Eds.), 2021 Report on the Defense Technology Trend Assessment - Assessment of the New Generation of Chinese Communist Party’s Military Technology. Taipei: Institute for National Defense and Security Research.


Journal Terindex di Garuda

Office Address:
Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Republic of Indonesia Defense University
Jl. Salemba Raya No.14, Paseban,Jakarta Pusat, Daerah Khusus Ibukota Jakarta 10440, Indonesia

Lisensi Creative Commons
Jurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism dan Integrity is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.