Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-dfsvx Total loading time: 0 Render date: 2024-04-27T13:13:49.472Z Has data issue: false hasContentIssue false

9 - Cybersecurity and EU–China Relations

Published online by Cambridge University Press:  05 September 2016

Sebastian Bersick
Affiliation:
Ruhr University Bochum
George Christou
Affiliation:
University of Warwick
Shen Yi
Affiliation:
Fudan University, Shanghai
Emil J. Kirchner
Affiliation:
University of Essex
Thomas Christiansen
Affiliation:
Universiteit Maastricht, Netherlands
Han Dorussen
Affiliation:
University of Essex
Get access

Summary

Security Threats Emanating from a Global Cyberspace

Compared to the increasing relevance of global cyberspace to the societal, commercial and military sectors in both the European Union and China, cybersecurity is the blind spot in the overall EU–China relationship. It was only in 2013 that the EU and China formally expressed a common general interest in cyberspace (EEAS 2013). At the same time, both actors, with differences in content, scope and timing, have developed their own approaches to cybersecurity and the respective threats they perceive in global cyberspace.

Cybersecurity policy has been on the radar of the EU for many years. It established the European Network and Information Security Agency in 2004 in order to facilitate a movement toward shared knowledge and improved “best” practice among EU member states. There was also a clear security (sub)dimension connected to the evolution of the EU's “information society” agenda. The issue was moved up the EU's political agenda in 2007, with NATO, the EU and other actors forced to radically rethink their approach following distributed denial of service (DDoS) attacks on Estonia's public and private infrastructure. Thus the EU's threat perception and vulnerability in relation to cybersecurity is connected to Europe's economic transformation, as well as the social and political consequences of cybercrime, attacks on information systems and protecting cyberspace in order to ensure its effective operation in military and civilian dimensions. Cyberspace, if not secured, from an EU perspective, threatens the very existence and evolution of all Europeans across social, economic and political realms.

The EU's policy has since developed and been underpinned by the need to achieve the objectives it has set for itself in its document on the digital agenda for Europe (European Commission 2010), and equally as significant, the driving force of such an agenda, the Europe 2020 strategy (EEAS 2013). In addition, it has recognized that, as a security issue, the protection of cyberspace is borderless, and it has highlighted these issues in its policy documents and internal security strategies, including a set of principles and guidelines for internet resilience and stability (European Commission 2011) and a cybersecurity strategy (European Commission 2013). Furthermore, it has recognized the importance of working in partnership with global partners to address the civilian and military aspects of cybersecurity challenges.

Type
Chapter
Information
Security Relations between China and the European Union
From Convergence to Cooperation?
, pp. 167 - 186
Publisher: Cambridge University Press
Print publication year: 2016

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Anon. 2009. “Cyber Monitoring Providing New Driving Force for Anti-Corruption and Building of a Harmonious Network,” People's Daily, February 3. Available at: http://news.xinhuanet.com/newmedia/2009-02/03/content_10753884.htm (accessed November 11, 2014).
Anon. 2014a. “Jiefangjun fuzongzhang yaoqiu chexiao dui zhongguo wu ming junguan qisu [Deputy chief of staff asked the United States to withdraw charges against five PLA officers,” Hexun, November 9. Available at: http://news.hexun.com/2014-11-09/170197431.html (accessed November 11, 2014).
Anon. 2014b. “Self-Control Is the Keyword to Ensure Information Security,” Legal Daily, May 5. Available at: www.legaldaily.com.cn/index_article/content/2014-05/05/content_5495782.htm?node = 5955 (accessed November 11, 2014).
Bendiek, A. 2014. “Tests of Partnership: Transatlantic Cooperation in Cyber Security, Internet Governance and Data Protection.” SWP Research Paper No. 5. Berlin: Stiftung Wissenschaft und Politik.
Bersick, S. 2014. “Der bedeutsamste aussenpolitische Fehler der Regierung Merkel?” Available at: www.euractiv.de/section/eu-aussenpolitik/opinion/der-bedeutsamste-aussenpolitische-fehler-der-regierung-merkel/ (accessed April 26, 2016).
Brewster, T. 2014. “UK Forges Close Cyber Ties with China Despite ‘Endemic Espionage’,” Guardian, June 18. Available at: www.theguardian.com/technology/2014/jun/18/uk-china-cybercrime-espionage-hacking (accessed April 26, 2016).
CCID Consulting. 2014. “White Paper on Information Security of IT Systems in China.” Available at: http://event.ccidconsulting.com/zt/2014/itxt/index.html (accessed November 11, 2014).
Christou, G. 2015. Cybersecurity in the European Union: Resilience and Adaptability in Governance Policy. Basingstoke: Palgrave Macmillan.
CMFA (Chinese Ministry of Foreign Affairs). 2014. “China's Policy Paper on the EU: Deepen the China–EU Comprehensive Strategic Partnership for Mutual Benefit and Win-Win Cooperation.” Available at: www.fmprc.gov.cn/mfa_eng/wjdt_665385/wjzcs/t1143406.shtml (accessed October 11, 2014).
CMIIT (Chinese Ministry of Industry and Information Technology). 2009. “Decision of the Standing Committee of the National People's Congress on Safeguarding Internet Security.” Available at: www.miit.gov.cn/n11293472/n11294912/n11296092/11904851.html (accessed November 11, 2014).
Dai, Xu. 2014. “Zhongguo ruhe ying dui xinxi sixiang zhan [How to counter the challenge of psychological warfare],” Guangmingwang, January 30. Available at: http://theory.gmw.cn/2014-01/30/content_10183128.htm (accessed November 11, 2014).
Deibert, R. J. 2003. “Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace,” Millennium: Journal of International Studies 32(3): 501–30.Google Scholar
Denmark, A.M. and Mulvenon, J. (eds.) 2010. Contested Commons: The Future of American Power in a Multipolar World. Washington: Center for a New American Security.
EEAS (European External Action Service). 2013. “EU–China 2020 Strategic Agenda for Cooperation.” Available at: http://eeas.europa.eu/china/docs/20131123_agenda_2020__en.pdf (accessed April 18, 2016).
European Commission. 2009. “Internet Governance: The Next Steps.” Document COM (2009) 277 final. Available at: http://eur-lex.europa.eu/procedure/EN/198347 (accessed June 13, 2016).
European Commission. 2010. “Digital Agenda for Europe.” Available at: http://ec.europa.eu/digital-agenda/en (accessed September 1, 2015).
European Commission. 2011. “European Principles and Guidelines for Internet Resilience and Stability.” Available at: http://ec.europa.eu/danmark/documents/alle_emner/videnskabelig/110401_rapport_cyberangreb_en.pdf (accessed March 11, 2014).
European Commission. 2013. “Cybersecurity Strategy of the EU: An Open, Safe and Secure Cyberspace.” Document JOIN (2013) 1 FINAL. Available at: https://ec.europa.eu/digital-single-market/en/news/eu-cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security (accessed May 9, 2016).
European Commission. 2014a. “European Cybercrime Centre – One Year On.” Press release. Available at: http://europa.eu/rapid/press-release_IP-14-129_en.htm (accessed April 26, 2016).
European Commission. 2014b. “Table on the Implementation of the ‘Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace’.” Document JOIN (2014) 1. Previously available at: http://ec.europa.eu/digital-agenda/en/news/EU–cybersecurity-strategy-high-level-conference-0 (accessed March 24, 2014).
European Commission. 2015. “Network and Information Security (NIS) Directive.” Available at: http://ec.europa.eu/digital-agenda/en/news/network-and-information-security-nis-directive (accessed September 1, 2015).
EUROPOL. 2014. “European Cybercrime Centre: First Year Report.” Available at: www.europol.europa.eu/content/european-cybercrime-center-ec3-first-year-report (accessed April 26, 2016).
Gao, Yiping. 2014. “Zhong fang jiu hulian wang fazhan tichu jiu dian changyi [China raises nine initiatives on the development of the internet],” Xinlang, November 22. Available at: http://news.sina.com.cn/o/2014-11-22/032031184383.shtml (accessed December 16, 2014).
Goldsmith, J. 2011. “Cybersecurity Treaties: A Sceptical View.” Future Challenges Essay. Stanford: Hoover Institution, Stanford University.
Healey, J. 2011a. “Breakthrough or Just Broken? China and Russia's UNGA Proposal on Cyber Norms.” Available at: www.atlanticcouncil.org/blogs/new-atlanticist/breakthrough-or-just-broken-china-and-russia-s-unga-proposal-on-cyber-norms (accessed April 26, 2016).
Healey, J. 2011b. “Comparing Norms for National Conduct in Cyberspace.” Available at: www.atlanticcouncil.org/blogs/new-atlanticist/comparing-norms-for-national-conduct-in-cyberspace (accessed April 26, 2016).
ISO (International Organization for Standardization). 2012. “ISO/IEC 27032:2012. Information Technology – Security Techniques – Guidelines for Cybersecurity.” Available at: www.iso27001security.com/html/27032.html (accessed September 1, 2015).
Klimburg, A. and Tirmaa-Klaar, H. 2011. “Cybersecurity and Cyberpower: Concepts, Conditions and Capabilities for Cooperation for Action within the EU.” Policy Department, Directorate-General for External Policies, European Parliament. Available at: www.europarl.europa.eu/RegData/etudes/etudes/join/2011/433828/EXPO-SEDE_ET(2011)433828_EN.pdf (accessed April 26, 2016).
Li, Guojie. 2011. “Wei jianli zizhu kekong de jisuanji jishu tixi er fendou” [Striving for the build-up of a secure and controllable computer technology system].” Institute of Computing Technology, Chinese Academy of Sciences. Available at: www.ict.ac.cn/liguojiewenxuan/wzlj/lgjxsbg/201103/t20110310_3081940.html (accessed November 11, 2014).
Martina, M. 2015, “China Adopts New Security Law to Make Networks, Systems ‘Controllable’,” Reuters, July 1. Available at: http://uk.reuters.com/article/uk-china-security-idUKKCN0PB3AY20150701 (accessed April 26, 2016).
Robinson, N. 2013. “The European Cyber Security Strategy: Too Big to Fail?” Available at: www.rand.org/blog/2013/02/the-european-cyber-security-strategy-too-big-to-fail.html (accessed April 26, 2016).
Robinson, N., 2014. “EU Cyber-Defence: A Work in Progress.” European Union Institute for Security Studies, Brief No. 10. Available at: www.iss.europa.eu/uploads/media/Brief_10_Cyber_defence.pdf (accessed April 26, 2016).
Shen, Yi. 2013a. “Ensure Cybersecurity via Power or via Governance: Two Versions of Cybersecurity Strategy and Choice of China,” Foreign Affairs Review 3: 140–8.Google Scholar
Shen, Yi. 2013b. “A Deep Look at PRISM,” Guancha, December 13. Available at: www.guancha.cn/60549/2013_12_13_184759.shtml (accessed November 11, 2014).
Smeaton, R. and Röhrig, W. 2014. “Cyber Security and Cyber Defence in the European Union.” Available at: www.eeas.europa.eu/csdp/structures-instruments-agencies/eu-military-staff/documents/impetus_n18.pdf (accessed September 1, 2015).
Stone, M. 2014. “UK Private Concerns about Chinese Cyber Spies,” Sky News, May 20. Available at: http://news.sky.com/story/1265334/uks-private-concerns-about-chinese-cyber-spies (accessed April 26, 2016).
United Nations. 2010. “Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security.” Document A/65/201, Study Series 33. Available at: http://docplayer.net/1069266-and-telecommunications-international-security-in-the-context-of.html (accessed June 10, 2016).
WGIG (Working Group on Internet Governance). 2005. “Report of the Working Group on Internet Governance.” Available at: www.wgig.org/docs/WGIGREPORT.pdf (accessed November 11, 2014).
Xinhua (Xinhua News Agency). 2014a. “Xi Jinping de wang luo an quan guan [Xi Jinping's perception of cyber security],” Xinhuawang, November 27. Available at: http://news.xinhuanet.com/video/2014-11/27/c_127255235.htm (accessed December 16, 2014).
Xinhua. 2014b. “Xi Jinping: Ba woguo cong wangluo daguo jianshe chengwei wangluo qiangguo [Xi Jinping: developing China from an important actor to a great power in cyberspace],” Xinhuawang, February 27. Available at: http://news.xinhuanet.com/2014-02/27/c_119538788.htm (accessed December 12, 2014).
Xinhua. 2015. “China Mulls Cyber Security Law,” China.org.cn, June 24. Available at: www.china.org.cn/china/2015-06/24/content_35903800.htm (accessed April 26, 2016).
Yang, Tiehu. 2014. “Guoji hulianwang zhili ying zhiding pubian shiyong de guoji guifan [International norms are required for the governance of the internet],” People.cn, June 6. Available at: http://world.people.com.cn/n/2014/0606/c1002-25115202.html (accessed December 12, 2014).
Zhongsheng, . 2014. “Heli yingdui wangluo anquan tiaozhan [Cooperating to face the challenge of cyber security],” People's Daily, November 26. Available at: http://news.cnr.cn/native/gd/201411/t20141126_516885385.shtml (accessed December 12, 2014).

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×