<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE root>
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.2" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">RUDN Journal of World History</journal-id><journal-title-group><journal-title xml:lang="en">RUDN Journal of World History</journal-title><trans-title-group xml:lang="ru"><trans-title>Вестник Российского университета дружбы народов. Серия: Всеобщая история</trans-title></trans-title-group></journal-title-group><issn publication-format="print">2312-8127</issn><issn publication-format="electronic">2312-833X</issn><publisher><publisher-name xml:lang="en">Peoples’ Friendship University of Russia named after Patrice Lumumba (RUDN University)</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">30934</article-id><article-id pub-id-type="doi">10.22363/2312-8127-2022-14-2-197-210</article-id><article-categories><subj-group subj-group-type="toc-heading" xml:lang="en"><subject>East and West: contacts and contradictions</subject></subj-group><subj-group subj-group-type="toc-heading" xml:lang="ru"><subject>Восток-Запад: контакты и противоречия</subject></subj-group><subj-group subj-group-type="article-type"><subject>Research Article</subject></subj-group></article-categories><title-group><article-title xml:lang="en">Chinese Concepts and Opportunities in Information Warfare: China-US Rivalry in Cyberspace</article-title><trans-title-group xml:lang="ru"><trans-title>Китайские концепции и возможности в информационной войне: соперничество КНР и США в киберпространстве</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="en"><surname>Katkova</surname><given-names>Evgeniya Yu.</given-names></name><name xml:lang="ru"><surname>Каткова</surname><given-names>Евгения Юрьевна</given-names></name></name-alternatives><bio xml:lang="en">candidate of sciences (history), senior lecturer, Department of theory and history of international relations</bio><bio xml:lang="ru">кандидат исторических наук, старший преподаватель кафедры теории и истории международных отношений</bio><email>katkova-eyu@rudn.ru</email><xref ref-type="aff" rid="aff1"/></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="en"><surname>Yunyushkina</surname><given-names>Anna S.</given-names></name><name xml:lang="ru"><surname>Юнюшкина</surname><given-names>Анна Сергеевна</given-names></name></name-alternatives><bio xml:lang="en">Master’s student, Department of theory and history of international relations</bio><bio xml:lang="ru">магистрант кафедры теории и истории международных отношений</bio><email>an.yuniushkina2014@yandex.ru</email><xref ref-type="aff" rid="aff1"/></contrib></contrib-group><aff-alternatives id="aff1"><aff><institution xml:lang="en">Peoples’ Friendship University of Russia (RUDN University)</institution></aff><aff><institution xml:lang="ru">Российский университет дружбы народов</institution></aff></aff-alternatives><pub-date date-type="pub" iso-8601-date="2022-04-29" publication-format="electronic"><day>29</day><month>04</month><year>2022</year></pub-date><volume>14</volume><issue>2</issue><issue-title xml:lang="en">VOL 14, NO2 (2022)</issue-title><issue-title xml:lang="ru">ТОМ 14, №2 (2022)</issue-title><fpage>197</fpage><lpage>210</lpage><history><date date-type="received" iso-8601-date="2022-04-29"><day>29</day><month>04</month><year>2022</year></date></history><permissions><copyright-statement xml:lang="en">Copyright ©; 2022, Katkova E.Y., Yunyushkina A.S.</copyright-statement><copyright-statement xml:lang="ru">Copyright ©; 2022, Каткова Е.Ю., Юнюшкина А.С.</copyright-statement><copyright-year>2022</copyright-year><copyright-holder xml:lang="en">Katkova E.Y., Yunyushkina A.S.</copyright-holder><copyright-holder xml:lang="ru">Каткова Е.Ю., Юнюшкина А.С.</copyright-holder><ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/><license><ali:license_ref xmlns:ali="http://www.niso.org/schemas/ali/1.0/">http://creativecommons.org/licenses/by/4.0</ali:license_ref></license></permissions><self-uri xlink:href="https://journals.rudn.ru/world-history/article/view/30934">https://journals.rudn.ru/world-history/article/view/30934</self-uri><abstract xml:lang="en"><p style="text-align: justify;">The research is devoted to the emergence of threats to information security and competition in cyberspace between the two largest powers - China and the United States. Over the past ten years, China has been actively developing offensive cyber capabilities, turning into a state with a combat- ready and modern army. Its technological level is behind the United States in many areas, but Beijing is rapidly closing the gap. Today, the information confrontation between these countries is of a strategic nature. Both China and the United States are investing large sums of money in the development of cyber technologies. The authors examine the different approaches of China and the United States to the methods of waging information wars and countering various challenges and threats in cyberspace. In conclusion, the authors come to the opinion that China will actively develop information technologies and build up its strategic potential in this area in the near future, which will lead to tougher competition among major powers in cyberspace.</p></abstract><trans-abstract xml:lang="ru"><p style="text-align: justify;">В статье авторы затрагивают возникающие угрозы информационной безопасности, имеющиеся между двумя крупными державами - Китаем и США. Информационное противостояние между этими странами носит стратегический характер, истоки которого уходят в киберпространство. В статье анализируются различные подходы специалистов из КНР и США к политике по оказанию противодействия данным угрозам. Также авторы рассматривают формы и методы, необходимые для урегулирования возникающих вызовов и угроз в информационной сфере. Жесткое соперничество Китая и США, которые являются самыми крупными экономиками и больше всего инвестируют средства на развитие военно-технического комплекса, будет явно отражаться в информационной сфере.</p></trans-abstract><kwd-group xml:lang="en"><kwd>information war</kwd><kwd>cybersecurity</kwd><kwd>China</kwd><kwd>USA</kwd><kwd>information technology</kwd><kwd>strategic potential</kwd></kwd-group><kwd-group xml:lang="ru"><kwd>информационная война</kwd><kwd>кибербезопасность</kwd><kwd>КНР</kwd><kwd>США</kwd><kwd>информационные технологии</kwd><kwd>стратегии</kwd><kwd>потенциал</kwd></kwd-group><funding-group/></article-meta></front><body></body><back><ref-list><ref id="B1"><label>1.</label><citation-alternatives><mixed-citation xml:lang="en">Buzan B. The Logic and Contradictions of Peaceful Rise. Development as China’s Grand Strategy. The Chinese Journal of International Politics. 2014;4(7):381–420.</mixed-citation><mixed-citation xml:lang="ru">Buzan B. The Logic and Contradictions of Peaceful Rise / Development as China’s Grand Strategy // The Chinese Journal of International Politics. 2014. № 7 (4). P. 381-420.</mixed-citation></citation-alternatives></ref><ref id="B2"><label>2.</label><citation-alternatives><mixed-citation xml:lang="en">Theohary CA. Information Warfare: Issues for Congress. Washington, DC: Congressional Research Service, 2018.</mixed-citation><mixed-citation xml:lang="ru">Theohary C.A. Information Warfare: Issues for Congress. Washington, DC: Congressional Research Service, 2018.</mixed-citation></citation-alternatives></ref><ref id="B3"><label>3.</label><citation-alternatives><mixed-citation xml:lang="en">Sun Tzu. The Art of War: Chinese Military Strategy. Translated from English. SPb: Dilya publ., 2006. (In Russ.).</mixed-citation><mixed-citation xml:lang="ru">Сунь-Цзы. Искусство войны. Основы китайской военной стратегии / пер. с англ. СПб: Диля, 2006.</mixed-citation></citation-alternatives></ref><ref id="B4"><label>4.</label><citation-alternatives><mixed-citation xml:lang="en">Paterson T., Hanley L. Political warfare in the digital age: cyber subversion, information operations and ‘deep fakes’. Australian Journal of International Affairs. 2020;74(4):439–454.</mixed-citation><mixed-citation xml:lang="ru">Paterson T., Hanley L. Political warfare in the digital age: cyber subversion, information operations and ‘deep fakes’ // Australian Journal of International Affairs. 2020. Vol. 74. № 4. P. 439-454.</mixed-citation></citation-alternatives></ref><ref id="B5"><label>5.</label><citation-alternatives><mixed-citation xml:lang="en">Adams J. Virtual Defense. Foreign Affairs. 2001;80(3):98–112.</mixed-citation><mixed-citation xml:lang="ru">Adams J. Virtual Defense // Foreign Affairs. 2001. Vol. 80. № 3. Р. 98-112.</mixed-citation></citation-alternatives></ref><ref id="B6"><label>6.</label><citation-alternatives><mixed-citation xml:lang="en">Migunov AL. Tendentsii kitayskoy strategii vedeniya informatsionnoy voyny [Trends in Chinese Information Warfare Strategy]. Voyennaya mysl’. 2008;(11):62–67. (In Russ.).</mixed-citation><mixed-citation xml:lang="ru">Мигунов А.Л. Тенденции китайской стратегии ведения информационной войны // Военная мысль. 2008. № 11. C. 62-67.</mixed-citation></citation-alternatives></ref><ref id="B7"><label>7.</label><citation-alternatives><mixed-citation xml:lang="en">Military and Security Developments Involving the People’s Republic of China. Annual Report to Congress. Washington, DC: Office of the Secretary of Defense, 2019.</mixed-citation><mixed-citation xml:lang="ru">Military and Security Developments Involving the People’s Republic of China // Annual Report to Congress. Washington, DC: Office of the Secretary of Defense, 2019.</mixed-citation></citation-alternatives></ref><ref id="B8"><label>8.</label><citation-alternatives><mixed-citation xml:lang="en">Yevdokimov YV. Politika Kitaya v global’nom informatsionnom prostranstve [China’s policy in the global information space]. Mezhdunarodnyye protsessy. 2011;9.1(25):74–83. (In Russ.).</mixed-citation><mixed-citation xml:lang="ru">Евдокимов Е.В. Политика Китая в глобальном информационном пространстве // Международные процессы. 2011. Т. 9. № 1 (25). С. 74-83.</mixed-citation></citation-alternatives></ref><ref id="B9"><label>9.</label><mixed-citation>Krekel B. Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. Washington, DC: Northrop Grumman Corporation, 2009.</mixed-citation></ref><ref id="B10"><label>10.</label><citation-alternatives><mixed-citation xml:lang="en">Cyberpower and National Security. American Foreign Policy Interests. 2013;35(1):45–58.</mixed-citation><mixed-citation xml:lang="ru">Cyberpower and National Security // American Foreign Policy Interests. 2013. № 35 (1). P. 45-58.</mixed-citation></citation-alternatives></ref><ref id="B11"><label>11.</label><citation-alternatives><mixed-citation xml:lang="en">Inkster N. Chinese Intelligence in the Cyber Age. Survival: Global Politics and Strategy. 2013;55(1):45–66.</mixed-citation><mixed-citation xml:lang="ru">Inkster N. Chinese Intelligence in the Cyber Age // Survival: Global Politics and Strategy. 2013. Vol. 55. № 1. Р. 45-66.</mixed-citation></citation-alternatives></ref><ref id="B12"><label>12.</label><citation-alternatives><mixed-citation xml:lang="en">Ford CA. The Evolution of International Security Capacity Building. U.S. Department of State. 20.11.2020. Available from: https://www.state.gov/the-evolution-of-international-security-capacitybuilding/ [Accessed: 28.12.2020].</mixed-citation><mixed-citation xml:lang="ru">Ford C.A. The Evolution of International Security Capacity Building. U.S. Department of State. 20.11.2020. URL: https://www.state.gov/the-evolution-of-international-security-capacity-building/ [Accessed: 28.12.2020].</mixed-citation></citation-alternatives></ref><ref id="B13"><label>13.</label><citation-alternatives><mixed-citation xml:lang="en">Tai Ming Cheung. The rise of China as a cybersecurity industrial power: balancing national security, geopolitical, and development priorities. Journal of Cyber Policy. 2018;3(3):306–326. https://doi.org/10.1080/23738871.2018.1556720</mixed-citation><mixed-citation xml:lang="ru">Tai Ming Cheung. The rise of China as a cybersecurity industrial power: balancing national security, geopolitical, and development priorities // Journal of Cyber Policy. 2018. Vol. 3. № 3. P. 306-326. https://doi.org/10.1080/23738871.2018.1556720</mixed-citation></citation-alternatives></ref><ref id="B14"><label>14.</label><citation-alternatives><mixed-citation xml:lang="en">Military and Security Developments Involving the People’s Republic of China 2013. Annual Report to Congress. Washington, DC: Office of the Secretary of Defense, 2013.</mixed-citation><mixed-citation xml:lang="ru">Military and Security Developments Involving the People’s Republic of China 2013 // Annual Report to Congress. Washington, DC: Office of the Secretary of Defense, 2013.</mixed-citation></citation-alternatives></ref><ref id="B15"><label>15.</label><citation-alternatives><mixed-citation xml:lang="en">Chuck Hagel. Speech At The Shangri-La Dialogue, June 1, 2013. USC US-China Institute. 01.06.2013. Available from: https://china.usc.edu/chuck-hagel-%E2%80%9Cspeech-shangri-ladialogue%E2%80%9D-june-1-2013 [Accessed: 28.12.2020].</mixed-citation><mixed-citation xml:lang="ru">Chuck Hagel. Speech At The Shangri-La Dialogue, June 1, 2013. USC US-China Institute. 01.06.2013. URL: https://china.usc.edu/chuck-hagel-%E2%80%9Cspeech-shangri-la-dialogue%E2%80%9D-june-1-2013 [Accessed: 28.12.2020].</mixed-citation></citation-alternatives></ref><ref id="B16"><label>16.</label><citation-alternatives><mixed-citation xml:lang="en">Béraud-Sudreau L. Assessing Chinese defence spending: proposals for new methodologies. International Institute for Strategic Studies (IISS). 31.03.2020. Available from: https://www.iiss.org/blogs/research-paper/2020/03/assessing-chinese-defence-spending [Accessed: 28.12.2020].</mixed-citation><mixed-citation xml:lang="ru">Béraud-Sudreau L. Assessing Chinese defence spending: proposals for new methodologies. International Institute for Strategic Studies (IISS). 31.03.2020. URL: https://www.iiss.org/blogs/research-paper/2020/03/assessing-chinese-defence-spending [Accessed: 28.12.2020].</mixed-citation></citation-alternatives></ref><ref id="B17"><label>17.</label><citation-alternatives><mixed-citation xml:lang="en">Popov IM. Voyna budushchego: vzglyad iz-za okeana: Voyennyye teorii i kontseptsii sovremennykh SSHA [War of the Future: A View from Overseas: Military Theories and Concepts of the Modern United States]. Moscow: Tranzitkniga, AST, Astrel’, 2004. 443 p. (In Russ.).</mixed-citation><mixed-citation xml:lang="ru">Попов И.М. Война будущего: взгляд из-за океана: Военные теории и концепции современных США. М.: Транзиткнига, АСТ, Астрель, 2004. 443 с.</mixed-citation></citation-alternatives></ref><ref id="B18"><label>18.</label><citation-alternatives><mixed-citation xml:lang="en">Panarin IN. Informatsionnaya voyna, PR i mirovaya politika [Information warfare, PR and the world politics]. Moscow: Goryachaya liniya Telekom, 2006. 351 p. (In Russ.).</mixed-citation><mixed-citation xml:lang="ru">Панарин И.Н. Информационная война, PR и мировая политика. М.: Горячая линия-Телеком, 2006. 351 с.</mixed-citation></citation-alternatives></ref><ref id="B19"><label>19.</label><citation-alternatives><mixed-citation xml:lang="en">Koshurnikova NA. Osobennosti informatsionnoy politiki sovremennogo Kitaya [Features of the information policy of modern China].Kitay: istoriya i sovremennost’: materialy IX mezhdunarodnoy nauchno-prakticheskoy konferentsii. Yekaterinburg, 21–23 oktyabrya 2015 g. Yekaterinburg: Izdatel’stvo Ural’skogo universiteta, 2016. P. 279–284. (In Russ.).</mixed-citation><mixed-citation xml:lang="ru">Кошурникова Н.А. Особенности информационной политики современного Китая // Китай: история и современность: материалы IX международной научно-практической конференции. Екатеринбург, 21-23 октября 2015 г. Екатеринбург: Издательство Уральского университета, 2016. С. 279-284.</mixed-citation></citation-alternatives></ref><ref id="B20"><label>20.</label><citation-alternatives><mixed-citation xml:lang="en">Panarin IN. Tekhnologiya informatsionnoy voyny [Information war technology]. Moscow: KSP+, 2003. 319 p. (In Russ.).</mixed-citation><mixed-citation xml:lang="ru">Панарин И.Н. Технология информационной войны. М.: КСП+, 2003. 319 с.</mixed-citation></citation-alternatives></ref><ref id="B21"><label>21.</label><citation-alternatives><mixed-citation xml:lang="en">Dimlevich N. Informatsionnyye voyny v kiberprostranstve – Kitay i Indiya [Information Wars in Cyberspace – China and India]. Mezhdunarodnaya zhizn’. 03.02.2011. Available from: https://interaffairs.ru/news/show/614 [Accessed: 28.12.2020]. (In Russ.).</mixed-citation><mixed-citation xml:lang="ru">Димлевич Н. Информационные войны в киберпространстве - Китай и Индия // Международная жизнь. 03.02.2011. URL: https://interaffairs.ru/news/show/614 (дата обращения: 28.12.2020).</mixed-citation></citation-alternatives></ref><ref id="B22"><label>22.</label><citation-alternatives><mixed-citation xml:lang="en">Kennedy AB. Can the Weak Defeat the Strong? Mao’s Evolving Approach to Asymmetric Warfare in Yan’an. The China Quarterly. 2008;(196):884–899.</mixed-citation><mixed-citation xml:lang="ru">Kennedy A.B. Can the Weak Defeat the Strong? Mao’s Evolving Approach to Asymmetric Warfare in Yan’an // The China Quarterly. 2008. № 196. P. 884-899.</mixed-citation></citation-alternatives></ref><ref id="B23"><label>23.</label><citation-alternatives><mixed-citation xml:lang="en">Starkin SV. Vliyaniye geopoliticheskoy sredy na transformatsiyu kontrrazvedyvatel’noy paradigmy spetssluzhb SSHA [The influence of the geopolitical environment on the transformation of the counterintelligence paradigm of the US intelligence services]. Vestnik Bryanskogo gosudarstvennogo universiteta. 2011;(2):130–134.</mixed-citation><mixed-citation xml:lang="ru">Старкин С.В. Влияние геополитической среды на трансформацию контрразведывательной парадигмы спецслужб США // Вестник Брянского государственного университета. 2011. № 2. С. 130-134.</mixed-citation></citation-alternatives></ref><ref id="B24"><label>24.</label><citation-alternatives><mixed-citation xml:lang="en">Wang Baocun, Li Fei. Information Warfare. Federation of American Scientists. 20.06.1995. Available from: https://fas.org/irp/world/china/docs/iw_wang.htm [Accessed: 28.12.2020].</mixed-citation><mixed-citation xml:lang="ru">Wang Baocun, Li Fei. Information Warfare. Federation of American Scientists. 20.06.1995. URL: https://fas.org/irp/world/china/docs/iw_wang.htm [Accessed: 28.12.2020].</mixed-citation></citation-alternatives></ref><ref id="B25"><label>25.</label><citation-alternatives><mixed-citation xml:lang="en">Lotrionte C. Countering State-Sponsored Cyber Economic Espionage Under International Law. North Carolina International Law and Commercial Regulation. 2014;40(2):443–541.</mixed-citation><mixed-citation xml:lang="ru">Lotrionte C. Countering State-Sponsored Cyber Economic Espionage Under International Law // North Carolina International Law and Commercial Regulation. 2014. Vol. 40. № 2. P. 443-541.</mixed-citation></citation-alternatives></ref><ref id="B26"><label>26.</label><citation-alternatives><mixed-citation xml:lang="en">Joske A. Picking Flowers Making Honey. The Chinese military’s collaboration with foreign universities. The Australian Strategic Policy Institute. 30.10.2018. Available from: https://www.aspi.org.au/report/picking-flowers-making-honey [Accessed: 28.12.2020].</mixed-citation><mixed-citation xml:lang="ru">Joske A. Picking Flowers Making Honey. The Chinese military’s collaboration with foreign universities. The Australian Strategic Policy Institute. 30.10.2018. URL: https://www.aspi.org.au/report/picking-flowers-making-honey [Accessed: 28.12.2020].</mixed-citation></citation-alternatives></ref><ref id="B27"><label>27.</label><citation-alternatives><mixed-citation xml:lang="en">Iasiello E. China’s Three Warfares Strategy Mitigates Fallout from Cyber Espionage Activities. Journal of Strategic Security. 2016;9(2):45–69.</mixed-citation><mixed-citation xml:lang="ru">Iasiello E. China’s Three Warfares Strategy Mitigates Fallout from Cyber Espionage Activities // Journal of Strategic Security. 2016. Vol. 9. № 2. P. 45-69.</mixed-citation></citation-alternatives></ref><ref id="B28"><label>28.</label><citation-alternatives><mixed-citation xml:lang="en">Taiwan 2020 Polls. Datawrapper. 2020. Available from: https://www.datawrapper.de/_/3piBg/ [Accessed: 28.12.2020].</mixed-citation><mixed-citation xml:lang="ru">Taiwan 2020 Polls. Datawrapper. 2020. URL: https://www.datawrapper.de/_/3piBg/ [Accessed: 28.12.2020].</mixed-citation></citation-alternatives></ref><ref id="B29"><label>29.</label><citation-alternatives><mixed-citation xml:lang="en">Kurlantzick J. How China Is Interfering in Taiwan’s Election. Council on Foreign Relations. 07.11.2019. Available from: https://www.cfr.org/in-brief/how-china-interfering-taiwans-election [Accessed: 28.12.2020].</mixed-citation><mixed-citation xml:lang="ru">Kurlantzick J. How China Is Interfering in Taiwan’s Election. Council on Foreign Relations. 07.11.2019. URL: https://www.cfr.org/in-brief/how-china-interfering-taiwans-election [Accessed: 28.12.2020].</mixed-citation></citation-alternatives></ref><ref id="B30"><label>30.</label><citation-alternatives><mixed-citation xml:lang="en">Nichiporuk B. U.S. military opportunities: information-warfare concepts of operation. Strategic appraisal: the changing role of information in warfare. Santa Monica: RAND Corporation, 1999. P. 179–215.</mixed-citation><mixed-citation xml:lang="ru">Nichiporuk B. U.S. military opportunities: information-warfare concepts of operation // Strategic appraisal: the changing role of information in warfare. Santa Monica: RAND Corporation, 1999. P. 179-215.</mixed-citation></citation-alternatives></ref></ref-list></back></article>
