Skip to main content

Chinese Cybersecurity Policies in the Age of Cyber Sovereignty

  • Chapter
  • First Online:
Quo Vadis, Sovereignty?

Part of the book series: Philosophical Studies Series ((PSSP,volume 154))

  • 245 Accesses

Abstract

China’s cybersecurity policies constitute an important component of global cybersecurity discussions in our current geopolitical environment. China’s rise against America’s relative decline has not only presented China and its Internet as an alternative to the U.S. model of economic and technological development, but has also fueled the great power rivalry between China and the U.S. especially in trade and technology. The US-China conflict is also taking place at a time when waves of populism are sweeping through the world prompting countries to assert sovereignty at home and abroad. As Internet economies and cyber policymaking increasingly gravitate towards the three main models set by the US, China and EU, Chinese cybersecurity policies remain central to global cyber policy debates and research. In the following, the chapter outlines the current Chinese cybersecurity policies, focusing specifically on cyber defense, cybercrime, and public order with the recognition that cybersecurity is a multi-faceted concept and phenomenon of great relevance and importance to China as it strives to become a cyber superpower.

This chapter is developed in large part based on prior work by the author “Cybersecurity Policies in China” that appeared as a chapter in CyberBRICS: Cybersecurity Regulations in the BRICS Countries edited by Dr. Belli and published by Springer (see Jiang 2020a).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    “Important data,” according to a draft of the Data Security Administrative Measures of the PRC under consideration, refers to “the data that might directly affect national security, economic security, social stability and public health and security in case of disclosure, such as non-public government information, population data covering a large area, gene health data, geographic data and mining data.” In practice, authorities have discretion in interpreting what important data is.

References

  • AFP. 2019. Russia Passes Bill to Allow Internet to Be Cut Off from Foreign Servers. The Guardian, April 11, 2019. Accessed 29 June 2023. https://is.gd/hOduIB.

  • Alsabah, Nabil. 2016. “Information Control 2.0: The Cyberspace Administration of China Tames the Internet.” Merics China Monitor. Accessed 29 June 2023. https://is.gd/QkblLb.

  • AP Moscow. 2022. Russia and China Launch Large-Scale Military Drills Amid Tensions with US. The Guardian. September 1, 2022. Accessed June 29, 2023. https://is.gd/8GpMS1.

  • Austin, Greg. 2018. Cybersecurity in China: The Next Wave. Cham: Springer.

    Book  Google Scholar 

  • Bauer, Johannes, and Michael van Eeten. 2009. Cybersecurity: Stakeholder Incentives, Externalities, and Policy Options. Telecommunications Policy 33 (10–11): 706–719.

    Article  Google Scholar 

  • Belli, Luca, ed. 2020. CyberBRICS: Cybersecurity Regulations in BRICS Countries. Berlin: Springer.

    Google Scholar 

  • Bergmann, Max, and Andrew Lohsen. 2022. Understanding the Broader Transatlantic Security Implications of Greater Sino-Russian Military Alignment. Center for Strategic and International Studies. Accessed June 29, 2023. https://is.gd/rOt326.

  • Cao, Siqi, and Shumei Leng. 2019. Cybersecurity Week Kicks Off in China. Global Times, September 16, 2023. Accessed June 29, 2023. http://www.globaltimes.cn/content/1164607.shtml.

  • Chen, Stephen. 2017. China to Build Giant Facial Recognition Database to Identify Any Citizen Within Seconds. South China Morning Post, October 12, 2017. Accessed June 29, 2023. https://is.gd/Ac1Ekj.

  • Chengdu Radio-TV International Viewpoint. 2022. $200 billion! 2022 Chinese military budget released, highest rate of increase, yet trailing the U.S. [1.45万亿!2022年中国军费预算出炉,增速再创新高,但仍不及美国]. QQ.com, March 5, 2022. Accessed June 29, 2023. https://tinyurl.com/3v3udr5t.

  • China Academy of Information and Communications Technology (CAICT). 2019. Chinese Cybersecurity Industry White Paper [中国网络安全产业白皮书]. CAICT. Accessed 29 June 2023. http://www.caict.ac.cn/kxyj/qwfb/bps/201909/P020190923420831742865.pdf.

  • CNCERT. 2019. 2018 summary of China’s Internet network security status [2018年我国互联网网络安全态势综述]. National Computer Network Emergency Response Technical Team/Coordination Center of China [国家计算机网络应急技术处理协调中心]. Accessed June 29, 2023. https://is.gd/z10SHh.

  • Cyberspace Administration of China (CAC). (2016). ‘National Strategies of Cyberspace Security’ released. [《国家网络空间安全战略》发布]. Retrieved from https://tinyurl.com/yc5vm3mb

  • Cyberspace Administration of China (CAC). 2017. Cybersecurity Law of the PRC [English trans. by R. Creemers, P. Triolo, & G. Webster]. New America Foundation. Accessed June 20, 2023. https://is.gd/Nva3H8.

  • ———. 2019. “Measures on Credit Information Management for Seriously Untrustworthy Internet Information Services Entities (Draft for solicitation of comments)” [国家互联网信息办公室关于《互联网信息服务严重失信主体信用信息管理办法(征求意见稿)》公开征求意见的通知]. Last modified July 22, 2019. Accessed June 29, 2023. https://is.gd/YMcaUF.

  • CNNIC (China Internet Network Information Center). 2023. The 51st Statistical Report on China’s Internet Development. Accessed June 29, 2023. https://is.gd/cj3GEV.

  • Demchak, Chris. 2016. Uncivil and Post-Western Cyber Westphalia: Changing Interstate Power Relations of the Cybered Age. The Cyber Defense Review 1 (1): 49–74.

    Google Scholar 

  • Fichtner, Laura. 2019. What Kind of Cyber Security? Theorising Cyber Security and Mapping Approaches. Internet Policy Review 7 (2): 1–19.

    Google Scholar 

  • Ford, Christopher. 2019. Huawei and its siblings, the Chinese tech giants: National security and foreign policy implications. U.S. Department of State. Last modified September 11, 2019. Accessed June 29, 2023. https://2017-2021.state.gov/huawei-and-its-siblings-the-chinese-tech-giants-national-security-and-foreign-policy-implications/.

  • Goldsmith, Jack, and Tim Wu. 2006. Who Controls the Internet? Illusions of a Borderless World. New York: Oxford University Press.

    Book  Google Scholar 

  • Goodman, Marc. 2015. Future Crimes: Inside the Digital Underground and the Battle for Our Connected World. New York: Anchor.

    Google Scholar 

  • Hayward, Freddie. 2019. China Unveils 500 Megapixel Camera That Can Identify Every Face in a Crowd of Tens of Thousands. Telegraph, September 26, 2019. Accessed 29 June 2023. https://is.gd/coBnaM.

  • Hong, Yu. 2017. Networking China: The Digital Transformation of the Chinese Economy. Urbana Champagne: University of Illinois Press.

    Book  Google Scholar 

  • Inkster, Nigel. 2016. China’s Cyber Power. London: Routledge.

    Google Scholar 

  • Jenkins, Nash. 2015. China Shutters 50 Websites for ‘Inciting Panic’ Over the Tianjin Disaster. Time. August 17, 2015. Accessed 29 June 2023. https://is.gd/MjIRYw.

  • Ji, X. 2014. Analysis of the Status and Trends of Crime. China Criminal Law Magazine 14 (3): 116–124.

    Google Scholar 

  • Jiang, Min. 2010. Authoritarian Informationalism: China’s Approach to Internet Sovereignty. SAIS Review of International Affairs 30 (2): 71–89.

    Article  Google Scholar 

  • Jiang, Min, and King-Wa Fu. 2018. Chinese Social Media and Big Data: Big Data, Big Brother, Big Profit? Policy & Internet 10 (4): 372–392. https://doi.org/10.1002/poi3.187.

    Article  Google Scholar 

  • Jiang, Min. 2020a. Cybersecurity Policies in China. In CyberBRICS: Cybersecurity Regulations in BRICS Countries, ed. Luca Belli, 195–212. Berlin: Springer.

    Google Scholar 

  • ———. 2020b. Cybersecurity Country Report: China. In CyberBRICS: Cybersecurity Regulations in BRICS Countries, ed. Luca Belli, 213–239. Berlin: Springer.

    Google Scholar 

  • Kaplan, Fred. 2017. Dark Territory: The Secret History of Cyber War. New York: Simon & Schuster.

    Google Scholar 

  • Kovacs, Anja. 2016. India and the Budapest Convention: To Sign or Not? Considerations for Indian Stakeholders. Internet Democracy Project. Accessed 29 June 2023. https://is.gd/ffGBeA.

  • Liang, Fan, Vishnupriya Das, Nadiya Kostyuk, and Muzammil M. Hussain. 2018. Constructing a Data-Driven Society: China’s Social Credit System as a State Surveillance Infrastructure. Policy & Internet 10 (4): 415–453.

    Article  Google Scholar 

  • Lindsay, Jon. 2014. The Impact of China on cybersecurity: Fiction and Friction. International Security 39 (3): 7–47.

    Article  Google Scholar 

  • Lindsay, Jon, Tai Ming Cheung, and Derek Reveron, eds. 2015. China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain. Oxford: Oxford University Press.

    Google Scholar 

  • Mai, Jun. 2020. Coronavirus ‘Rumour’ Crackdown by Wuhan Police Slammed by China’s Top Court. South China Morning Post. January 29, 2020. Accessed June 29, 2023. https://is.gd/zka8mK.

  • McCarthy, Simone. 2022. In Beijing’s BRICS summit, Putin Is Back on the World Stage. CNN, June 22, 2022. Accessed 29 June 2023. https://is.gd/NNr0NE.

  • Ministry of Digital Development, Communications and Mass Media of the Russian Federation. May 15, 2015. International Consortium for Development of New Mobile Operating System is Being Formed now. Retrieved from: https://digital.gov.ru/en/events/33225/.

  • Mozur, Paul. 2018. Inside China’s Dystopian Dreams: A.I., Shame and Lots of Cameras. New York Times, July 8, 2018. Accessed 29 June 2023. https://is.gd/keI3nH.

  • Net Ease. 2022. China’s 10 Military Bases. What Are They?” [中国在海外的十大军事基地,分别是哪些?] Net Ease. [网易] August 7, 2022. Accessed June 29, 2023. https://www.163.com/dy/article/HE4O9G69055271VA.html.

  • Oppermann, Daniel. 2010. Virtual Attacks and the Problem of Responsibility: The Case of China and Russia. Carta Internacional 5 (2): 11–25.

    Google Scholar 

  • People’s Net. 2017. “Insiders Explain How to ‘Hit Where It Hurts’ When It Comes to Cybercrime.” [业内人士详解如何扼住网络犯罪"七寸"] People’s Net. Accessed 29 June 2023. https://is.gd/tXlkGW.

  • ———. 2018. Cyber Black and Gray Markets Cause annual loss of nearly RMB 100 billion in China. [网络黑灰产已近千亿 个人信息泄露是源头] People’s Net. August 28, 2018. Accessed 29 June 2023. https://is.gd/SBfwib.

  • ———. 2022. Russia-China Joint Statement on International Relations and Global Sustainable Development [中华人民共和国和俄罗斯联邦关于新时代国际关系和全球可持续发展的联合声明]. People’s Net. February 4, 2022. Accessed 29 June 2023. http://politics.people.com.cn/n1/2022/0204/c1001-32345502.html.

  • Qin, An. 2019a. “Military Strategy Behind Russia’s Preparation to Cut Itself from the Internet: Lessons for China?” [秦安:俄罗斯“断网”测试背后的军事博弈,对中国有何启示?] Kunglunce Web, February 20, 2019. Accessed 29 June 2023. https://is.gd/sgLaSJ.

  • ———. 2019b. High Vigilance for American Cyberwar at Its Last Stage of Preparation. [秦安:高度警惕美国网络战争准备已到最后阶段] Kunglunce Web, June 12, 2019. Accessed 29 June 2023. https://is.gd/QbyeYi.

  • Raine, Lee, Janna Anderson, and Jennifer Connolly. 2014. Cyber Attacks Likely to Increase. Pew Research Centers Internet American Life Project. October 29, 2014. Accessed 29 June 2023. https://is.gd/0TkJzx.

  • Raul, Alan C., ed. 2018. Privacy, Data Protection And Cybersecurity Law Review. London: Law Business Research.

    Google Scholar 

  • Schia, Niels, and Lars Gjesvik. 2017. China’s Cyber Sovereignty: Policy Brief. Norwegian Institute of International Affairs.

    Google Scholar 

  • Segal, Adam, Valeriy Akimenko, Keir Giles, Daniel A. Pinkston, James A. Lewis, Benjamin Bartlett, Hsini Huang, and Elina Noor. 2020. Roundtable: The Future of Cybersecurity Across the Asia-Pacific. Asia Policy 15 (2): 57–114.

    Google Scholar 

  • Singer, Peter, and Allan Friedman. 2014. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford: Oxford University Press.

    Book  Google Scholar 

  • Sputnik International. 2018. “China to Continue Cybersecurity Drills Within SCO.” Sputnik International. Accessed June 29, 2023. https://is.gd/7Ij51U.

  • State Council of the PRC. 2015. China’s Military Strategy. State Council of the PRC. May 27, 2015. Accessed 29 June 2023. https://is.gd/AxOByL.

  • State Council Information Office of People’s Public of China (SCIO). (June 8, 2010). The Internet in China. Chinese Central Government. Retrieved from http://www.scio.gov.cn/tt/Document/1011194/1011194.htm (Chinese) https://is.gd/QB4rAe (English Translation)

  • ———. 2019. China’s Defense in the New Era. State Council of the PRC. July 24, 2019. Accessed 29 June 2023. https://is.gd/HMIy01.

  • Tencent. 2016. China’s online black market participants exceed 400,000; Tencent implements five measures to ensure security. Tencent Daqing Net, Last modified May 5, 2016. Accessed 29 June 2023. https://xian.qq.com/a/20160305/035854.htm.

  • U.S. Department of Justice. 2014. U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage. Accessed 29 June 2023. https://is.gd/uNhOUl.

  • Wang, Haokui. 2017. China Has Established 1116 “Cybersecurity Police Units.” [全国已建成“网安警务室”1116家] Guangmin Daily [光明日报]. February 14, 2017. Accessed 29 June 2023. https://is.gd/FwebOV.

  • Xi, Jinping. 2014. Speech by Xi Jinping at the First World Internet Conference [习近平致首届世界互联网大会贺词全文]. People’s Net. [人民网]. November 19, 2014. Accessed 29 June 2023. https://is.gd/82F2wS.

  • Xinhua Net. 2015. Study Strategies: 5 Keywords to Understand President Xi's New Proposal on Cyber Security [学习有方:5个词读懂习近平的网络安全新主张]. Xinhua Net [新华网]. August 6, 2015. Accessed 29 June 2023. https://is.gd/sEcug7.

  • Yu, Zhigang, and Shangcong Wu. 2018. Historical Summary of Cybercrime Legislation, Judicial Interpretation and Theories [我国网络犯罪发展及其立法、司法、理论应对的历史梳理]. Politics & Law [政治与法律] 1: 59–78.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Min Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jiang, M. (2023). Chinese Cybersecurity Policies in the Age of Cyber Sovereignty. In: Timoteo, M., Verri, B., Nanni, R. (eds) Quo Vadis, Sovereignty? . Philosophical Studies Series, vol 154. Springer, Cham. https://doi.org/10.1007/978-3-031-41566-1_5

Download citation

Publish with us

Policies and ethics