2016
DOI: 10.7249/rr1335
|View full text |Cite
|
Sign up to set email alerts
|

Getting to Yes with China in Cyberspace

Abstract: This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…However, progress has been made in limiting the activities of intelligence agencies and prosecuting foreign adversary hackers when involved in commercial cyberespionage, and there has been some attempt to reach agreements between the leading powers to limit the scope of commercial cyberespionage, as in the case of the agreement between Xi Jinping and President Obama in 2016. Avoiding security dilemmas will also involve ongoing dialogue and negotiation between the states even within a context of 'cheating'measures taken to circumvent existing agreements, which is what has occurred since the agreement between the US and China, with a notable increase in Chinese espionage observed during the Trump administration (Harold, Libicki, and Cevallos 2016). Buchanan further argues that mitigating the cybersecurity dilemma involves building baseline defences (these will be particularly important in the societal sector), building trust between adversaries (difficult in the existing deteriorating environment, but not impossible), taking unilateral steps to increase international stability (including, for example, reporting zero-day vulnerabilities, and establishing and communicating a posture for dealing with the intrusions when they inevitable do occur).…”
Section: Desecuritisation and Cybersecuritymentioning
confidence: 99%
“…However, progress has been made in limiting the activities of intelligence agencies and prosecuting foreign adversary hackers when involved in commercial cyberespionage, and there has been some attempt to reach agreements between the leading powers to limit the scope of commercial cyberespionage, as in the case of the agreement between Xi Jinping and President Obama in 2016. Avoiding security dilemmas will also involve ongoing dialogue and negotiation between the states even within a context of 'cheating'measures taken to circumvent existing agreements, which is what has occurred since the agreement between the US and China, with a notable increase in Chinese espionage observed during the Trump administration (Harold, Libicki, and Cevallos 2016). Buchanan further argues that mitigating the cybersecurity dilemma involves building baseline defences (these will be particularly important in the societal sector), building trust between adversaries (difficult in the existing deteriorating environment, but not impossible), taking unilateral steps to increase international stability (including, for example, reporting zero-day vulnerabilities, and establishing and communicating a posture for dealing with the intrusions when they inevitable do occur).…”
Section: Desecuritisation and Cybersecuritymentioning
confidence: 99%
“…Specifically, internet-based technologies have enabled open conversations. Indeed, of all the areas where the relationship between state and society is troubled, the information highway has been the most contentious [33]. By ways of illustration, micro-blogging platforms, transformed how people relate to themselves.…”
Section: The Micro-blogospherementioning
confidence: 99%
“…This pathway is a strategy carried out from country A to country B in sharpening relations between countries with their respective national interests [14]. Reference [15] stated that China has always been the concern of the United States government. The question that continues to emerge is whether China will and has an obsession to become hegemonic in cyberspace.…”
Section: A Strategy Through the First Trackmentioning
confidence: 99%
“…This agreement agreed not to hack each other's private companies for commercial gain and other adverse cyber activities. In essence, China and the United States agree with each other to jointly [15]: 1) Provide timely responses to requests for information and assistance regarding dangerous cyber activities. 2) Refrain from being involved or intentionally / consciously supporting theft of intellectual property.…”
Section: A Strategy Through the First Trackmentioning
confidence: 99%