G2TT
来源类型Research Reports
规范类型报告
DOIhttps://doi.org/10.7249/RR1335
ISBN9780833092496
来源IDRR-1335-RC
Getting to Yes with China in Cyberspace
Scott W. Harold; Martin C. Libicki; Astrid Stuth Cevallos
发表日期2016
出版年2016
页码120
语种英语
结论

Chinese and U.S. Views of Cybersecurity Have Very Little Overlap

  • The United States and China have very different perspectives on cyberspace. The United States emphasizes extending the rule of law internationally. China stresses the maintenance of state sovereignty.
  • The most important U.S. interest on the bilateral agenda is for China to eliminate espionage for commercial gain and modulate its other cyber-espionage activities. The hack of the Office of Personnel Management was a particular sore point.
  • Within the bilateral relationship, the United States places more importance on cyberspace issues than China does. Chinese behavior in cyberspace is often the top item on the bilateral agenda; U.S. behavior in cyberspace rarely makes China's top-ten list.

Avoiding Targeting or Carrying Out Espionage on Critical Infrastructure Provides Prospects for Negotiating a Set of Norms

  • The Chinese appear interested in norms against countries attacking one another's critical infrastructure. They also understand that such a norm would also have to forbid espionage against critical infrastructure (distinguishing espionage from implanting attacks is very hard).
  • The United States believes it can catch Chinese cheating and would like some process by which cheating, once discovered, is acknowledged — with possible consequences to follow.
  • The Chinese believe they are unlikely to catch cheating by the United States and are apprehensive of any agreement that would put them at a corresponding disadvantage.
  • Any serious agreement would need a process that both sides could trust and may require some way to increase China's confidence it is own attribution capabilities.
摘要
  • The United States should negotiate with China over cyber rules by linking the issue more directly to the broader health of the overall relationship between the two countries.
  • China and the United States could possibly achieve progress in cybersecurity negotiations by means of an agreement that would have both countries refrain from attacking each other's critical infrastructure or carrying out cyber espionage that could leave behind implants that could facilitate such attacks.
  • The United States might consider assisting China by sharing insights into attribution if, in exchange, China would to agree to common evidentiary standards and credibly commit to prosecuting those found to have violated them. Such an agreement would require some mutually approved method of determining when one or the other side had violated its part of the bargain in ways that would have the guilty party accord legitimacy to such findings and admit what it has done.
  • The United States may need to simultaneously incentivize China to come to and stay at the bargaining table by raising the costs if China continues its economically motivated cyber-espionage activities, while exploring the potential role of a quid pro quo in facilitating agreements that can be monitored.
主题China ; Cyber and Data Sciences ; Cyber Warfare ; Cybercrime ; International Diplomacy ; The Internet ; United States
URLhttps://www.rand.org/pubs/research_reports/RR1335.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/108422
推荐引用方式
GB/T 7714
Scott W. Harold,Martin C. Libicki,Astrid Stuth Cevallos. Getting to Yes with China in Cyberspace. 2016.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
x1535052883251.jpg(7KB)智库出版物 限制开放CC BY-NC-SA浏览
RAND_RR1335.pdf(781KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Scott W. Harold]的文章
[Martin C. Libicki]的文章
[Astrid Stuth Cevallos]的文章
百度学术
百度学术中相似的文章
[Scott W. Harold]的文章
[Martin C. Libicki]的文章
[Astrid Stuth Cevallos]的文章
必应学术
必应学术中相似的文章
[Scott W. Harold]的文章
[Martin C. Libicki]的文章
[Astrid Stuth Cevallos]的文章
相关权益政策
暂无数据
收藏/分享
文件名: x1535052883251.jpg
格式: JPEG
文件名: RAND_RR1335.pdf
格式: Adobe PDF

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。