Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the "Chinese threat." It is therefore important to better understand today's challenges related to cyber dimension in regard of the rise of China. Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension: Is Cyberspace changing the scene of international relations? How China does apprehend cybersecurity and cyberdefense? What are the issues, challenges? What is the role of China in the global cyberspace?
Author Biographies xi
Introduction xv
Chapter 1 China's Internet Development And 1 (54)
Cybersecurity - Policies And Practices
Xu Longdi
1.1 Introduction 1 (1)
1.2 Internet development in China: an 2 (3)
overview
1.3 China's policies towards Internet 5 (4)
development
1.3.1 From the very beginning of its 6 (2)
development, China's Internet has been
closely linked to the Chinese economy,
and was programmed and integrated into
its macro economic development blueprints
1.3.2 In addition to lending full policy 8 (1)
support to Internet development, China
also invests heavily in building Internet
infrastructures.
1.3.3 The Chinese government actively 8 (1)
promotes the R&D of next-generation
Internet (NGI).
1.3.4 China practices a policy of 9 (1)
managing cyber affairs in line with law,
adhering to the principles of scientific
and effective administration in its
Internet governance
1.4 Cyber legislation and Internet 9 (18)
administration
1.4.1 Basic principles and practices of 10 (6)
Internet administration in China
1.4.2 Guaranteeing the free and secure 16 (11)
flow of information in cyberspace
1.5 Cybersecurity and diplomacy: an 27 (14)
international perspective
1.5.1 Cyber policy dialogue and 28 (2)
consultation
1.5.2 Regional cyber cooperation 30 (2)
1.5.3 Track II cyber diplomacy 32 (1)
1.5.4 Legal cooperation in combating 33 (2)
cybercrimes
1.5.5 Technical cooperation 35 (5)
1.5.6 Office for Cyber Affairs of the MFA 40 (1)
1.6 A cybersecurity strategy in the making? 41 (12)
1.6.1 Significance of the Internet for 45 (1)
China
1.6.2 Goals and objectives 45 (1)
1.6.3 Cyber threat landscape 45 (3)
1.6.4 Means for strategic goals 48 (5)
1.7 Conclusion 53 (2)
Chapter 2 PLA Views On Informationized Warfare, 55 (26)
Information Warfare And Information Operations
Dean Cheng
2.1 The evolution of Chinese military 56 (3)
thinking
2.2 The growing importance of information 59 (5)
2.3 Information operations 64 (8)
2.3.1 Command and control missions 65 (1)
2.3.2 Offensive information missions 66 (4)
2.3.3 Defensive information missions 70 (1)
2.3.4 Information support and 71 (1)
safeguarding missions
2.4 Key types of information operations 72 (7)
2.4.1 Electronic combat 72 (1)
2.4.2 Network combat 73 (1)
2.4.3 Psychological combat 74 (1)
2.4.4 Intelligence combat 75 (1)
2.4.5 Command and control combat 76 (2)
2.4.6 Physical combat 78 (1)
2.5 Computer network warfare and 79 (2)
information operations
Chapter 3 China's Adaptive Internet Management 81 (20)
Strategy After The Emergence Of Social Networks
Alice Exman
3.1 Weibo: the turning point 82 (7)
3.1.1 Adaptive behaviors 82 (5)
3.1.2 Participative behaviors 87 (2)
3.2 Latest adjustments under Xi Jinping 89 (10)
3.2.1 Smart management of the Internet: a 89 (7)
top priority under the new leadership
3.2.2 "Guiding public opinion" 96 (1)
3.2.3 while seizing economic opportunities 97 (2)
3.3 Bibliography 99 (2)
Chapter 4 India's Cybersecurity - The Landscape 101(28)
Cherian Samuel
4.1 A snapshot of Asian cyberspace 102(12)
4.1.1 Aspects of cyberconflict in Asia 106(1)
4.1.2 West Asia 106(4)
4.1.3 East Asia 110(4)
4.2 The Indian cyber landscape 114(3)
4.3 The China challenge: a case study 117(4)
4.4 Responses 121(2)
4.4.1 Implementing a national 121(2)
cybersecurity policy
4.5 Creating an institutional framework 123(3)
4.5.1 Ensuring supply chain integrity 124(2)
4.6 Takeaways 126(3)
Chapter 5 China And Southeast Asia: Offline 129(28)
Information Penetration And Suspicions Of
Online Hacking - Strategic Implications From A
Singaporean Perspective
Alan Chong
5.1 Offline sphere: latent "diasporic" 133(16)
information power and official Chinese soft
power
5.2 The online sphere: hacktivism as mostly 149(3)
projections
5.3 Conclusion: offline politics 152(1)
strategically obscure online projections
5.4 Bibliography 153(4)
Chapter 6 Impact Of Mongolia's Choices In 157(20)
International Politics On Cybersecurity
Daniel Ventre
6.1 Mongolia's cyberspace 158(2)
6.2 Cyberspace and political stakes 160(8)
6.2.1 Mongolia targeted by cyber-attacks 160(7)
6.2.2 Nationalism on the Internet 167(1)
6.3 Information-space security policy 168(9)
Chapter 7 China-Iran-Russia - A Cybercommunity 177(22)
Of Information?
Thomas Flichy De La Neuville
7.1 The hall marks of cyber-cooperation 178(3)
7.1.1 Pax cyber-mongolica 178(1)
7.1.2 A cyber-community of information - 179(1)
the proof of Syria
7.1.3 The counter-point of Mali 180(1)
7.2 The geopolitical bases for the 181(13)
cyber-mongol empire
7.2.1 An undeniable closer Sino-Iranian 182(2)
relationship
7.2.2 Arms sales in Russo-Iranian and 184(2)
Sino-Iranian relations
7.2.3 Sino-Russian support for Iranian 186(1)
civil nuclear development
7.2.4 A clear-cut Sino-Russian diplomatic 187(3)
position on the Iranian program
7.2.5 Oil and gas at the heart of 190(4)
economic relations
7.3 Order in cyberspace: an absolute 194(9)
necessity within China
7.3.1 Interior order and exterior disorder 194(2)
7.3.2 The appearance of peace and the 196(3)
necessity of secrecy
Chapter 8 Discourse Regarding China: Cyberspace 199(84)
And Cybersecurity
Daniel Ventre
8.1 Identification of prevailing themes 203(44)
8.1.1 Depictions of the Internet in China 203(4)
8.1.2 Impact of cyberspace on Chinese 207(7)
society
8.1.3 The Chinese cyber threat 214(9)
8.1.4 The Chinese army: its practices, 223(5)
capabilities and strategies
8.1.5 Espionage 228(12)
8.1.6 China, cyberspace and international 240(4)
relations
8.1.7 Particular points from the Western 244(3)
perspective
8.2 The evolution of American discourse 247(30)
about China, cybersecurity and cyber defense
8.2.1 The annual reports of the US 248(15)
Defense Department
8.2.2 Speeches of the Secretaries of 263(9)
Defense
8.2.3 Prospective analyses conducted by 272(5)
the National Intelligence Council
8.3 Conclusion 277(6)
General Conclusion 283(12)
List Of Authors 295(2)
Index 297