China's Cyber Security Policy and the Democratic World

China's Cyber Security Policy and the Democratic World

Irakli Kervalishvili
DOI: 10.4018/978-1-6684-8846-1.ch015
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In the modern world, transferring data into digital format, electronic commerce, social media, and receiving public services through online platforms are very relevant. The more states become dependent on cyberspace, the more reasons and means hostile actors have for cyberattacks, stealing and distorting information, and paralyzing systems. We must keep in mind that cyber security is not only about computer programming and information technology. Cyber security is a vital part of national security, as cyber-attacks target people, public opinion, and public and business sectors. China is indeed quite an aggressive cyber actor, but there is another, non-democratic state that has much greater economic-technological resources, ambition, and aspiration for cyber expansionism.
Chapter Preview
Top

Introduction. The National Cyber Security Strategy And The Emergence Of Hard Digital Frontiers

The development of the Internet, and the innovation that is associated with it, have been facilitated by an environment that has been relatively free from control. Unfortunately, however, as a result of deep integration into the social framework, the Internet has become a potential tool for influencing geopolitical conflicts, including interference in the internal affairs of other states, undermining national security, destabilizing financial infrastructure, and attacking critical infrastructure. While states derive social and economic benefits from the Internet, they fear the threat it poses to national security. In response to these threats, countries are beginning to tighten their Internet borders and develop their cyber weapons not only as a tool for deterrence but also to apply pressure during conflicts. The potential downside of such state-by-state regulation is slowing down the innovation process that the Internet has traditionally spurred and limiting the freedom of speech that has contributed to social inclusion in society. On the other hand, innovation and freedom cannot flourish in a chaotic environment with rampant crime and a lack of rules, norms, and ethics. With this in mind, national policymakers face the challenge of finding a balance between regulation and the potential chaos of the Internet, while at the same time promoting the development of freedoms. In trying to strike such a balance in the national interest, cyberspace boundaries play an important role alongside international efforts to build confidence in cyberspace and slow down Internet fragmentation.

The sophistication and effectiveness of cyberattacks have steadily increased since the first Morris worm cyberattack in 1988 and have recently become a key part of the national defense strategies of several countries. Cyberspace is now considered a separate domain of conflict along with land, sea, air, and space, clearly defined in the military doctrines of the world's most powerful states, including China. Each country is strengthening its defenses while at the same time working furiously to develop cyber weapons and testing the cyber defenses of other countries. Cyber attacks have already been used to supplement military interventions in response to the policies and actions of other countries and to interfere in the elections of other countries. The ferocious cyber arms race shows no signs of abating. States now face a dilemma: whether to work together to de-escalate the cyber arms race and allow the Internet to thrive unhindered or to build boundaries on the Internet and threaten its growth and evolution.

Several attempts have been made to work out a treaty to curb the growth of cyber weapons; however, the lack of attribution, the increase in vulnerabilities, and the escalation of economic rivalry between states make reaching a consensus on these treaties very difficult. Although the attribution of cyber incidents is constantly improving due to improved analytic technologies, the activities of states in the development of cyber weapons are still undercover. From a game theory perspective, the situation suggests that each state is trying to maximize its cyber arsenal in the belief that other countries are also maximizing their efforts to develop cyber arsenals. The earliest use of cyber weapons took place in conflicts between Russia and the former Soviet republics of Georgia and Estonia. In these cases, the attacks were used for media propaganda, website corruption, and so on. Over time, however, cyberattacks have become more sophisticated, targeted, and dangerous. Likewise, more nation-states are turning to cyberattacks and starting to use cyberattacks to achieve their geopolitical goals.

Key Terms in this Chapter

National Cyber Security Strategy of China: Illustrates and reaffirms China's main positions and propositions on cyberspace development and security and serves as the guide for China's cybersecurity work. The Strategy aims to build China into a cyber power while promoting orderly, secure, and open cyberspace and safeguarding national sovereignty.

Cyber Warfare: Is usually defined as a cyber-attack or series of attacks that target a country. It has the potential to wreak havoc on government and civilian infrastructure and disrupt critical systems, resulting in damage to the state and even loss of life.

Political System of China: The People's Republic of China is a one-party Marxist-Leninist state ruled exclusively by the Communist Party of China (CCP), making it one of the last countries in the world to be ruled by the Communist Party. China's constitution states that the PRC “is a socialist state governed by a people's democratic dictatorship led by the working class and based on an alliance of workers and peasants” and that public institutions “should follow the principle of democratic centralism. The body of the constitution also states that “The defining feature of socialism with Chinese characteristics is the leadership of the Communist Party of China (CCP).”

Political Regime of China: Although the CCP describes China as a “socialist consultative democracy”, the country is commonly referred to as an authoritarian one-party surveillance state and dictatorship. According to the Economist Intelligence Unit's Democracy Index, China consistently ranks low as an “authoritarian regime”, ranking 156th out of 167 countries in 2022. It has also been described as authoritarian and corporatist, with some of the tightest restrictions in the entire world in many areas primarily against freedom of the press, freedom of assembly, the right to have children, the free formation of public organizations, freedom of religion and free access to the Internet. Its current political, ideological, and economic system has been described by its leaders as “all-process people's democracy”, “people's democratic dictatorship”, “socialism with Chinese characteristics” (that is, Marxism adapted to Chinese conditions), and “socialist market economy” respectively.

Cyber Attack: An attack, via cyberspace, targeting an enterprise's use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.

National Cyber Security Strategy: The Strategy defines the scope of CII as including but not limited to basic communication and broadcasting networks, energy, finance, transportation, education, scientific research, hydraulic systems, industrial manufacturing, healthcare, social welfare, public service, and important information and internet application systems for government agencies. To ensure the protection of CII, the cybersecurity review regime will continue to expand.

Complete Chapter List

Search this Book:
Reset