• Research
  • About
  • Experts
Carnegie India logoCarnegie lettermark logo
AI
{
  "authors": [
    "Lyu Jinghua"
  ],
  "type": "legacyinthemedia",
  "centerAffiliationAll": "dc",
  "centers": [
    "Carnegie Endowment for International Peace"
  ],
  "collections": [
    "Major Power Tech Relations"
  ],
  "englishNewsletterAll": "ctw",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie Endowment for International Peace",
  "programAffiliation": "TIA",
  "programs": [
    "Technology and International Affairs"
  ],
  "projects": [],
  "regions": [
    "North America",
    "United States",
    "East Asia",
    "China",
    "Iran"
  ],
  "topics": [
    "Security",
    "Foreign Policy",
    "Technology"
  ]
}

Source: Getty

In The Media

Keeping China–U.S. Cyber Conflict Off the Cards

Both China and the United States have vested interests in fighting against cyber crimes, countering cyberterrorism, and promoting cyber norms. But with the rapid deterioration of bilateral relations, the most worrisome are in the security domain.

Link Copied
By Lyu Jinghua
Published on Jan 11, 2019

Source: East Asia Forum

Cyber relations between China and the United States have always been an integral part of the bilateral relationship. As debate on whether the two countries are entering a new Cold War intensifies, similar concerns about their cyber relations are arising: are the two destined for rivalry in the cybersphere? If so, how can cyber conflict be prevented or limited?

Despite some differences in cyberspace, convergent interests have generally been greater than divergent ones between the largest (China) and the most advanced (the United States) cyber powers. Both are tempting targets for malicious actors and vulnerable to destructive cyber attacks. So both have vested interests in fighting against cyber crimes, countering cyberterrorism and promoting cyber norms. These overlapping interests facilitated the successful completion and release of United Nations Group of Government Experts (UN GGE) consensus reports in 2013 and 2015.

But with the rapid deterioration of bilateral relations, there are signs of cyberspace behaviour following suit: less cooperation, more confrontation and higher risk of conflict. Among the potential developments, such as a new technology Cold War or failure to agree on cyber rules, the most worrisome are in the security domain.

US concerns over Chinese military modernisation and issues in the Taiwan Strait, East China Sea, South China Sea and beyond are growing. China holds similar concerns over the United States’ recent assessment that China is its primary security challenge both in a general sense and in cyberspace, and over the change in US policy direction from its ‘pivot to Asia’ to the Indo-Pacific strategy.

If conflict erupts, one of the earliest and most destabilising venues would be conflict in cyberspace. Cyber actions are more inclined to be escalatory due to the difficulties of differentiating intentions and predicting consequences. To prevent such a scenario, several precautionary measures can and should be implemented.

Although there are channels for bilateral communication and coordination, such as the High-Level Joint Dialogue on Cybercrime and Related Issues, the Law Enforcement and Cybersecurity Dialogue, and cooperation between computer emergency response teams (CERTs), they all lack the involvement of militaries. Because of this, they are far from sufficient to avert potentially explosive incidents in the security sphere.

An ongoing bilateral coordination mechanism is urgently needed. The Ministry of National Defense–Department of Defense telephone link was once used to discuss tensions in the South China Sea by the US and Chinese navies. It could be given the same function for communication in cyber crises.

To enhance information sharing and mutual understanding, it is also worth considering how to apply the Memorandum of Understanding on Notification of Major Military Activities in cyberspace. The two sides could explore similar ways of increasing transparency such as briefing each other on their cyber strategy publications, interpreting their cyber doctrines and inviting one another to observe cyber exercises.

The United States and China should exercise self-restraint in cyber conflicts and encourage similar responses from other countries as the foundation for establishing accepted rules of behaviour. To this end, rules prohibiting the use of escalatory, cross-domain deterrence measures — such as the computer worm Stuxnet that was used against Iranian nuclear facilities and the ‘Left of Launch’ cyber efforts to disable the launch of North Korean missiles — require further discussion. As do rules forbidding attacks on specific targets such as critical infrastructure, and rules regarding after-use damage control such as the function of self-destruction mechanisms.

The United States and China already have several agreed crisis management principles in place, such as sending clear signals, avoiding commitment traps and making proportionate responses. Now it is time to think about how to apply these principles in cyberspace. Cyber crisis management should become an important topic in security dialogues at all levels. To start with, think tanks can explore crisis scenarios and management measures by conducting tabletop exercises and relevant discussions.

More importantly, China and the United States need to develop a deeper understanding of one another’s critical interests in cyberspace. Both sides must behave cautiously and maintain strategic constraint to avoid eroding those critical interests, leaving enough space for either side to make concessions and ease tensions.

No matter what suspicions and differences remain, China and the United States can and should seek to cooperate, even as rivals, on conflict prevention in cyberspace.

This article was originally published by East Asia Forum.

About the Author

Lyu Jinghua

Former Visiting Scholar, Cyber Policy Initiative

Lyu Jinghua was a visiting scholar with Carnegie’s Cyber Policy Initiative. Her research focuses primarily on cybersecurity and China-U.S. defense relations.

    Recent Work

  • Paper
    China-U.S. Cyber-Nuclear C3 Stability
      • +4

      George Perkovich, Ariel (Eli) Levite, Lyu Jinghua, …

  • Q&A
    What Is the U.S. Ban on TikTok and WeChat All About?
      • Jon Bateman

      Jon Bateman, Lyu Jinghua

Lyu Jinghua
Former Visiting Scholar, Cyber Policy Initiative
SecurityForeign PolicyTechnologyNorth AmericaUnited StatesEast AsiaChinaIran

Carnegie India does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie India

  • Article
    India’s Oil Security Strategy: Structural Vulnerabilities and Strategic Choices

    This piece argues that the present Indian strategy, based on opportunistic diversification and utilization of limited strategic reserves, remains inadequate when confronting supply disruptions. It evaluates India’s options in the short, medium, and long terms.

      Vrinda Sahai

  • Article
    What Could a Reciprocal Defense Procurement Agreement Do for U.S.-India Ties?

    India and the United States are close to concluding a Reciprocal Defense Procurement Agreement (RDPA) that will allow firms from the two countries to sell to each other’s defense establishments more easily. While this may not remedy the specific grievances both sides may have regarding larger bilateral issues, an RDPA could restore some momentum, following the trade deal announcement.

      Konark Bhandari

  • Commentary
    India Signs the Pax Silica—A Counter to Pax Sinica?

    On the last day of the India AI Impact Summit, India signed Pax Silica, a U.S.-led declaration seemingly focused on semiconductors. While India’s accession to the same was not entirely unforeseen, becoming a signatory nation this quickly was not on the cards either.

      Konark Bhandari

  • Commentary
    The PSLV Setback: Restoring India’s Workhorse

    On January 12, 2026, India's "workhorse," the Polar Satellite Launch Vehicle, experienced a consecutive mission failure for the first time in its history. This commentary explores the implications of this incident on India’s space sector and how India can effectively address issues stemming from the incident.

      Tejas Bharadwaj

  • Commentary
    AI Adoption Journey for Population Scale

    Connecting real-world AI use cases across sectors such as health, education, agriculture, and livelihoods can help policymakers, innovators, and institutions align around a shared goal. This article looks at a framework ensuring that AI works for everyone.

      Shalini Kapoor, Tanvi Lall

Get more news and analysis from
Carnegie India
Carnegie India logo, white
Unit C-4, 5, 6, EdenparkShaheed Jeet Singh MargNew Delhi – 110016, IndiaPhone: 011-40078687
  • Research
  • About
  • Experts
  • Projects
  • Events
  • Contact
  • Careers
  • Privacy
  • For Media
Get more news and analysis from
Carnegie India
© 2026 Carnegie Endowment for International Peace. All rights reserved.