Hostname: page-component-cd9895bd7-jkksz Total loading time: 0 Render date: 2024-12-25T08:07:04.520Z Has data issue: false hasContentIssue false

A Chinese perspective on cyber war

Published online by Cambridge University Press:  15 April 2013

Abstract

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Comments and Opinions
Copyright
Copyright © International Committee of the Red Cross 2013 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 ‘International Strategy for Cyberspace – Prosperity, Security and Openness in a Networked World’, The White House, May 2011, available at: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf. All internet references were accessed in September 2012, unless otherwise stated.

2 Ibid., p. 14.

3 In the 1990s, some scholars in the United Kingdom and United States proposed the concept of ‘cyber power’ or ‘information power’. See Jordan, Tim, Cyberpower: The Culture and Politics of Cyberspace and the Internet, Routledge, London/New York, 1999CrossRefGoogle Scholar; Nye, Joseph S., The Paradox of American Power: Why the World's Only Superpower Can't Go it Alone, Oxford University Press, Oxford/New York, 2002Google Scholar; Kramer, Franklin, Starr, Stuart, and Wentz, Larry K. (eds.), Cyberpower and National Security, National Defense University Press, Potomac Books, Washington, DC, 2009Google Scholar.

4 Available (only in Chinese) at: http://www.donews.com/net/201210/1678402.shtm.

6 Menn, Joseph, ‘Defence groups turn to cybersecurity’, in The Financial Times, 10 October 2011Google Scholar, available at: http://www.ft.com/intl/cms/s/0/84697a96-b834-11e0-8d23-00144feabdc0.html#axzz2BeHfWRvK.

7 ‘U.S., Australia to add cyber realm to defense treaty’, in Reuters, 14 September 2011, available at: http://www.reuters.com/article/2011/09/15/us-usa-cyber-australia-idUSTRE78E05I20110915.

8 Ministry of Foreign Affairs of the People's Republic of China, ‘China, Russia and other countries submit the document of International Code of Conduct for Information Security to the United Nations’, 19 March 2011, available at: http://www.fmprc.gov.cn/eng/zxxx/t858978.htm.

9 Speech by HE Ambassador Wang Qun at the First Committee of the 66th Session of the UN General Asssembly on Information and Cyberspace Security, New York, 20 October 2011, available at: http://www.fmprc.gov.cn/eng/wjdt/zyjh/t869580.htm.

10 See Sterling, Bruce, ‘Cyberspace with Chinese characteristics’, in Wired, 8 October 2012Google Scholar, available at: http://www.wired.com/beyond_the_beyond/2012/10/cyberspace-with-chinese-characteristics-%E7%BD%91%E7%BB%9C%E7%A9%BA%E9%97%B4/; and

11 Office of the Vice-President, ‘VP's remarks to London Cyberspace Conference’, The White House, 1 November 2011, transcript and video available at: http://www.whitehouse.gov/the-press-office/2011/11/01/vps-remarks-london-cyberspace-conference.

12 Secretary of Treaty and Law of the Ministry of Foreign Affairs Huang Huikang's speech in Budapest, available at: http://news.xinhuanet.com/tech/2012-10/05/c_113280788.htm.