lørdag 27. juli 2024

China’s Cyber Operations: The Rising Threat to American Security

This study is based on open source materials. It utilizes a large body of data collected by the research team to examine China’s strategy, tactics, and operations in cyberspace as well as Internet communications in Chinese software development and cyber operations. China’s interest in cyber grew rapidly in response to what it observed in U.S. military operations starting with Operation Desert Storm in 1991. By 2013, China emphasized cyberspace as a crucially important area in the struggle with principal competitors and adversaries such as the United States and the West more generally. 

At present, China’s cyber capabilities and operations have increased exponentially to the point where they pose a highly significant national security threat to the United States and all China’s perceived adversaries. China continues to invest huge sums in this technology path. It is clear that the threat will continue to become even greater than it now is. China’s starting point with respect to international competition in the cyber arena, as in all other things is control: controlling dissent and competition through controlling information while supporting its indigenous entrepreneurs and industries. Theft of intellectual property, personal data, state secrets, and espionage form a central part of China’s approach to achieving information domination.