International Quarterly of Foreign Relations

International Quarterly of Foreign Relations

Cyber Geopolitics at the Crossroads of Power: An Analysis of US Cyber Hegemony in Confrontation with China

Document Type : Original Article

Authors
1 Assistant Professor in International Relations, Supreme National Defense University, Tehran, Iran
2 Ph.D. student in National Security, Supreme National Defense University, Tehran, Iran
3 Master of Regional Studies (North America), Faculty of Law and Political Sciences, Allameh Tabataba'i University, Tehran, Iran
Abstract
The United States of America has long been the primary actor in shaping international cyber law norms and global cyberspace governance frameworks, actively engaging in this domain for nearly two decades. However, China's emergence as a key player in the cyber and technology realm has significantly changed the international landscape in recent years. Consequently, America's influence in this sphere appears to be challenged, and its discourse on cyberspace governance is seemingly declining. This profound investigation seeks to elucidate the far-reaching repercussions of the United States' waning assertive power within the intricate tapestry of international law, juxtaposed against the meteoric rise of China's global influence, on the complicated dynamics of global cyber-geopolitics and the evolving paradigm of internet governance. Therefore, This research delves into the factors contributing to the erosion of US cyber power, including the decline of trust and credibility, policy shifts, and challenges in norm creation and enforcement. To this end, a descriptive-analytical approach examines China's growing influence in international cyber law. This entails a comprehensive analysis of its expanding cyber capabilities (espionage, offensive operations, technological advancements), diplomatic assertiveness in shaping global cyber governance frameworks and promoting alternative, state-centric norms aligned with the Communist Party's vision. Our analysis reveals that China's burgeoning cyber capabilities position it as a formidable competitor to the United States. Additionally, its diplomatic assertiveness enables China to advocate for alternative norms and establish itself as a proponent of national independence in cyberspace governance.
Keywords

Subjects


  • Allahrakha, N. (2023). Balancing Cyber-security and Privacy: Legal and Ethical Considerations in the Digital Age. Legal Issues in the Digital Age, 4(2), 78–121. doi:DOI:10.17323/2713-2749.2023.2.78.12
  • Attatfa, A., Renaud, K., & Paoli, S. D. (2020). Cyber Diplomacy: A Systematic Literature Review. Procedia Computer Science, 176, 60–69. Retrieved from https://doi.org/10.1016/j.procs.2020.08.007
  • Bowden, C. (2013). The US surveillance programmes and their impact on EU citizens' fundamental rights. Brussel: DIRECTORATE GENERAL FOR INTERNAL POLICIES European Parliament. Retrieved from https://www.europarl.europa.eu/RegData/etudes/note/join/2013/474405/IPOL-LIBE_NT(2013)474405_EN.pdf
  • Can the Digital Economy Survive in a Splinternet. (n.d.). Retrieved from The Centre for International Governance Innovation: https://www.cigionline.org/newsletters/can-digital-economy-survive-splinternet/
  • Carr, M. (2016). Crossed Wires: International Cooperation on Cyber Security. Interstate - Journal of International Affairs. Retrieved from https://discovery.ucl.ac.uk/id/eprint/10056277/3/Carr_InterState_Dec2015.pdf
  • Chen, X., & Yang, Y. (2022). Contesting Western and Non-Western Approaches to Global Cyber Governance beyond Westlessness. The International Spectator, 57, 1 - 14. Retrieved from https://www.tandfonline.com/doi/full/10.1080/03932729.2022.2101231
  • Creemers, R. (2021). China’s Emerging Data Protection Framework. Leiden Institute for Area Studies, 4. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3964684
  • Creemers, R. (2022). China’s emerging data protection framework. Journal of Cybersecurity, 8(1). Retrieved from https://doi.org/10.1093/cybsec/tyac011
  • Ettinger, A. (2018). Trump’s National Security Strategy: “America First” meets the establishment. International Journal, 73(3), 474-483. Retrieved from https://doi.org/10.1177/0020702018790274
  • Fedoniuk, S., & Maghdysiuk, S. (2022). US-China Confrontation in Cyber Security. Історико-Політичні Проблеми Сучасного Світу, 45, 113–127. Retrieved from https://doi.org/10.31861/mhpi2022.45.113-127
  • Gao, X. (2022). An Attractive Alternative? China’s Approach to Cyber Governance and Its Implications for the Western Model. The International Spectator, 57(3), 15–30. Retrieved from https://doi.org/10.1080/03932729.2022.2074710
  • Global Free Flow of Information on the Internet. (2010). Retrieved from Federal Register: https://www.federalregister.gov/documents/2010/09/29/2010-24385/global-free-flow-of-information-on-the-internet
  • Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York: Henry Holt and Company.
  • Hameed, F., Agrafiotis, I., Weisser, C., Goldsmith, M., & Creese, S. (2018). Analysing trends and success factors of international cybersecurity capacity−building initiatives. Department of Computer Science University of Oxford. Retrieved from https://ora.ox.ac.uk/objects/uuid:50e9c5aa-4f3d-40f0-a0a0-ff538b735291/files/mf1ff1854d7b0d2cf2a244539752a2274
  • Harnisch, S., & Zettl-Schabath, K. (2022). Secrecy and Norm Emergence in Cyber-Space. The US, China and Russia Interaction and the Governance of Cyber-Espionage. Democracy and Security, 19, 82-110. Retrieved from https://www.tandfonline.com/doi/full/10.1080/17419166.2022.2097074
  • Hoffmann, S., Lazanski, D., & Taylor, E. (2020). Standardising the splinternet: how China’s technical standards could fragment the internet. Journal of Cyber Policy, 5, 1-26. Retrieved from Retrieved from: https://www.researchgate.net/publication/343978312_Standardising_the_splinternet_how_China's_technical_standards_could_fragment_the_internet
  • Hong, Y., & Goodnight, G. T. (2019). How to think about cyber sovereignty: the case of China. Chinese Journal of Communication, 13(1), 8–26. Retrieved from https://doi.org/10.1080/17544750.2019.1687536
  • Jinghua, L. (2019). What Are China’s Cyber Capabilities and Intentions? Retrieved from Carnegie Endowment for International Peace: https://carnegieendowment.org/2019/04/01/what-are-china-s-cyber-capabilities-and-intentions-pub-78734
  • (2023). Joint Statement on the United States-European Union 9th Cyber Dialogue in Brussels - United States Department of State. United States Department of State. Retrieved from https://www.state.gov/joint-statement-on-the-united-states-european-union-9th-cyber-dialogue-in-brussels/
  • Kalen, S., & Howard, W. S. (2016). Reclaiming Accountability: Transparency, Executive Power, and the U.S. Constitution. By Heidi Kitrosser. Chicago: University of Chicago Press, 2015. Pp. 283. ISBN: 978-0-226-19163-8. International Journal of Legal Information, 44(1), 62–65. Retrieved from https://www.cambridge.org/core/journals/international-journal-of-legal-information/article/abs/reclaiming-accountability-transparency-executive-power-and-the-us-constitution-by-heidi-kitrosser-chicago-university-of-chicago-press-2015-pp-283-isbn-978022619
  • Larkin, T. (2022). How China Is Rewriting the Norms of Human Rights. Retrieved from Lawfare: https://www.lawfaremedia.org/article/how-china-rewriting-norms-human-rights
  • Lee, J. (2022). Cyberspace Governance in China, Evolution, Features and Future Trends, ASIE. VISIONS, 129. Retrieved from Retrieved from: https://www.ifri.org/sites/default/files/atoms/files/lee_cyberspace_governance_china_2022.pdf
  • Liaropoulos, A. N. (2017). Cyberspace Governance and State Sovereignty. Democracy and an Open-Economy World Order, 25–35. Retrieved from https://doi.org/10.1007/978-3-319-52168-8_2
  • Lostri, E., Lewis, J. A., & Wood, G. (2022). A Shared Responsibility: Public-Private Cooperation for Cybersecurity. Retrieved from Center for Strategic and International Studies: https://www.csis.org/analysis/shared-responsibility-public-private-cooperation-cybersecurity
  • M Salem Abu Alead, R., & AMHMED AB ALTALIBE, A. (2023). Attribution Challenges in the Era of Cyber Warfare: Unraveling the Identity of Cyber-Attackers. 3(16), 5309-5287. Retrieved from https://doi.org/10.21608/hiss.2023.337323
  • McTague, T. &. (2020, October 29). HOW ‘AMERICA FIRST’ BECAME AMERICA ALONE. Retrieved from The Atlantic: https://www.theatlantic.com/international/archive/2020/10/donald-trump-foreign-policy-america-first/616872/
  • Pijovic, N. (2021). The Cyberspace ‘Great Game’. The Five Eyes, the Sino-Russian Bloc and the Growing Competition to Shape Global Cyberspace Norms. 2021 13th International Conference on Cyber Conflict (CyCon), (pp. 215-231). Tallinn, Estonia. doi:doi: 10.23919/CyCon51939.2021.9468296.
  • Piper, A. (n.d.). Digital surveillance’s threat to human rights. Retrieved from International Bar Association: https://www.ibanet.org/article/CEE365AB-CC04-4E2C-91F6-D5F4D353A0A0
  • Runde, D. F., & Ramanujam, S. R. (2022). Digital Governance: It Is Time for the United States to Lead Again. Retrieved from Center for Strategic and International Studies: https://www.csis.org/analysis/digital-governance-it-time-united-states-lead-again
  • Savaş, S., & Karataş, S. (2022). Cyber governance studies in ensuring cybersecurity: an overview of cybersecurity governance. International Cybersecurity Law Review, 3(1), 7–34. Retrieved from https://doi.org/10.1365/s43439-021-00045-4
  • Schulte, G. L., & Schaffer, A. M. (2012). Enhancing Security by Promoting Responsible Behavior in Space. Strategic Studies Quarterly, 6(1), 9–17. Retrieved from http://www.jstor.org/stable/26270787
  • Segal, A. (2020). China’s Alternative Cyber Governance Regime: Hearing on A ‘China Model?’ Beijing’s Promotion of Alternative Global Norms and Standards. Retrieved from Council on Foreign Relations: https://www.uscc.gov/sites/default/files/testimonies/March%2013%20Hearing_Panel%203_Adam%20Segal%20CFR.pdf
  • Segal, A. (2022, July 12). A New U.S. Foreign Policy for Cyberspace. Retrieved from Council on Foreign Relations: https://www.cfr.org/blog/new-us-foreign-policy-cyberspace
  • Sherman, J. &. (2022). The US must broaden its internet strategy beyond China. Retrieved from Brookings: https://www.brookings.edu/articles/the-us-must-broaden-its-internet-strategy-beyond-china/
  • Studies, C. A. (2019). International Cyberspace Governance. In: Chinese Academy of Cyberspace Studies. In P. Ping, World Internet Development Report 2017 (pp. 235–266). Berlin: Springer.
  • Sullivan, J., & Wang, W. (2022). China’s “Wolf Warrior Diplomacy”: The Interaction of Formal Diplomacy and Cyber-Nationalism. Journal of Current Chinese Affairs, 52(1), 68–88. Retrieved from https://doi.org/10.1177/18681026221079841
  • Telefónica. (2023). History of the Internet: how did it come into being and how has it evolved. Retrieved from Telefónica: https://www.telefonica.com/en/communication-room/blog/history-internet-how-come-being-how-evolved/
  • Tung, R. L., Zander, I., & Fang, T. (2023). The Tech Cold War, the multipolarization of the world economy, and IB research. International Business Review, 32(6). Retrieved from https://www.sciencedirect.com/science/article/pii/S0969593123000951
  • Zinovieva, E. S. (2022). Cyber Diplomacy under Increased Competition Between the Great Powers. MGIMO Review of International Relations, 1–21. Retrieved from https://doi.org/10.24833/2071-8160-2022-olf5