Michael D. Swaine
{
"authors": [
"Michael D. Swaine"
],
"type": "legacyinthemedia",
"centerAffiliationAll": "dc",
"centers": [
"Carnegie Endowment for International Peace",
"Carnegie China"
],
"collections": [
"China’s Foreign Relations",
"U.S.-China Relations"
],
"englishNewsletterAll": "asia",
"nonEnglishNewsletterAll": "",
"primaryCenter": "Carnegie Endowment for International Peace",
"programAffiliation": "AP",
"programs": [
"Asia"
],
"projects": [],
"regions": [
"China",
"Japan"
],
"topics": [
"Military",
"Security",
"Technology"
]
}Source: Getty
Chinese Views on Cybersecurity in Foreign Relations
The apparent unanimity of viewpoints within China on cybersecurity suggests that this issue will remain a major source of tension and differences in the Sino-U.S. relationship.
Source: China Leadership Monitor
During the past few years, cybersecurity has become a major concern among many countries, as a result of the continued rapid expansion and deepening technological sophistication of the Internet, alongside the growing reliance of governments and societies on cyberbased systems for everything from communications and information storage to military operations and commercial activities.
In recent months, this issue has become a major source of both tension and potential cooperation for the U.S.-China relationship in particular. Stemming from a Western (and especially U.S.) assessment that a growing number of destructive cyberattacks on commercial enterprises and government institutions originate not only from Chinese individuals, but also most likely from Chinese government (and especially military) sources, Washington has greatly intensified its expression of concern to Beijing.
Beijing has repeatedly denied carrying out cyberattacks against any other country, while calling for both bilateral and multilateral cooperation, free from accusations, to formulate agreed-upon norms for the operation of the global Internet as well as place its oversight in the hands of a broadly representative international structure. The United States has resisted the latter proposal.
These developments have elevated the issue of cybersecurity to a top priority within the overall bilateral relationship. In response to the importance and urgency of the issue, Washington and Beijing recently agreed to form a Cyber Working Group (CWG) as part of the bilateral Strategic and Economic Dialogue (S&ED), with the first Bilateral Cybersecurity Working Group Dialogue held in Washington D.C. on 8 July.Thus far, however, little progress has occurred in reducing suspicion and developing cooperation in this area. To the contrary, the United States and presumably China are strengthening their capacity to engage in both defensive and offensive cyber actions against each other, presenting the prospect of a cyber arms race while potentially intensifying the already high level of distrust between the two countries.
To understand the challenges and opportunities presented to the Sino-U.S. relationship by the cybersecurity issue, it is important to examine in some detail the views, beliefs, and apparent assumptions of Chinese observers toward the subject. This article addresses Chinese thinking on four basic aspects of the issue:
The Definition of Cybersecurity and the Challenge It Presents
The Cybersecurity Threat Posed by the United States and Other Countries
The Origins and Motives Behind Foreign Cybersecurity Threats
Chinese Preferences for Mitigating Cybersecurity Threats
As they have in several previous editions of CLM, our examination of Chinese views on these topics will distinguish between three basic types of Chinese sources: authoritative; quasi-authoritative; and non-authoritative.
For each area, particular attention is given to: a) the authoritative PRC government viewpoint (if publicly available); b) views toward the United States in particular; and c) any variations that might exist among Chinese commentators, in both substance and tone. The article addresses several specific questions: to what extent and in what manner do Chinese definitions of cybersecurity and Chinese views on the cybersecurity threat differ from those of the United States and other countries? How do Chinese sources respond to U.S. and Western accusations against China? In all these areas, can one discern any significant differences: among authoritative Chinese sources, between military and civilian sources (of all types), and among authoritative, quasi-authoritative, and non-authoritative sources in general?
The article concludes with a summary and some implications for the future.
This article was originally published in the China Leadership Monitor.
About the Author
Former Senior Fellow, Asia Program
Swaine was a senior fellow at the Carnegie Endowment for International Peace and one of the most prominent American analysts in Chinese security studies.
- What Kind of Global Order Should Washington and Beijing Strive For?Other
- A Smarter U.S. Strategy for China in Four StepsCommentary
Michael D. Swaine
Recent Work
Carnegie India does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.
More Work from Carnegie India
- For People, Planet, and Progress: Perspectives from India's AI Impact SummitResearch
This collection of essays by scholars from Carnegie India’s Technology and Society program traces the evolution of the AI summit series and examines India’s framing around the three sutras of people, planet, and progress. Scholars have catalogued and assessed the concrete deliverables that emerged and assessed what the precedent of a Global South country hosting means for the future of the multilateral conversation.
- +3
Nidhi Singh, Tejas Bharadwaj, Shruti Mittal, …
- India’s Press Note 3 Gamble: Opening the FDI Door to ChinaArticle
On March 10, 2026, India’s Union Cabinet approved amendments to Press Note 3, a regulation that mandated government approval on all foreign direct investment (FDI) from countries sharing a land border with India. This amendment raises questions primarily about whether its stated benefits will materialize and if the risks have been adequately weighed. This piece will address the same.
Konark Bhandari
- The Coming of Age of India’s Nuclear TriadCommentary
The induction of INS Aridhaman, which features several technological enhancements, now gives India the third nuclear ballistic missile submarine to ensure continuous at-sea deterrent.
Dinakar Peri
- India’s Oil Security Strategy: Structural Vulnerabilities and Strategic ChoicesArticle
This piece argues that the present Indian strategy, based on opportunistic diversification and utilization of limited strategic reserves, remains inadequate when confronting supply disruptions. It evaluates India’s options in the short, medium, and long terms.
Vrinda Sahai
- What Could a Reciprocal Defense Procurement Agreement Do for U.S.-India Ties?Article
India and the United States are close to concluding a Reciprocal Defense Procurement Agreement (RDPA) that will allow firms from the two countries to sell to each other’s defense establishments more easily. While this may not remedy the specific grievances both sides may have regarding larger bilateral issues, an RDPA could restore some momentum, following the trade deal announcement.
Konark Bhandari