Book
Licensed
Unlicensed
Requires Authentication
China And Its Embrace of Offensive Cyberespionage
-
Kristan Stoddart
Language:
English
Published/Copyright:
2025
About this book
The West is under challenge from the rise of China as a global power. Cyberespionage has enhanced China’s economy, military, and political influence, and it is now a peer rival to the American-led West across land, sea, air, and space. China can conduct cyberespionage on a scale that no other nation can currently match. Its Belt and Road Initiative is a modern-day Silk Route for both overland and maritime trade.
Under President Xi Jingpin, China is now much closer to parity in conventional forces should it begin hard-power contestation and enter the realm of ‘Thucydides’ Trap’; a belief that a rising power will challenge a hegemon. Chinese cyberespionage is a real long-term challenge to the United States and the West in general. This book discusses what the implications are and what might still be to come.
Under President Xi Jingpin, China is now much closer to parity in conventional forces should it begin hard-power contestation and enter the realm of ‘Thucydides’ Trap’; a belief that a rising power will challenge a hegemon. Chinese cyberespionage is a real long-term challenge to the United States and the West in general. This book discusses what the implications are and what might still be to come.
- Critically examines Chinese uses of cyberespionage past, present, and future.
- Discusses global issues and implications relating to China’s rise.
- Theoretically and technically informed, but empirically driven through micro-macro levels of analysis.
Author / Editor information
Dr Kristan Stoddart is an Associate Professor at Swansea University where he is director of the Geopolitical Challenges Research Institute. Previously he was a Reader in the Department of International Politics at Aberystwyth University. From 2014 to 2017, Kristan was part of a £1.2 million project examining Cyber Security Lifecycles funded by Airbus Group and the Welsh Government. He also was a member of the UK’s Independent Digital Ethics in Policing Panel for around four years through to 2018. He is a Fellow of the Higher Education Academy, a Fellow of the Royal Historical Society, and a Fellow of the Royal Society of Arts. He is the author of eight books and many articles and book chapters.
Topics
-
Download PDFPublicly Available
Frontmatter
I -
Requires Authentication UnlicensedLicensed
Acknowledgments
-
Download PDFPublicly Available
Contents
ix -
Requires Authentication UnlicensedLicensed
List of abbreviations and concepts
-
Requires Authentication UnlicensedLicensed
Introduction
1 -
Requires Authentication UnlicensedLicensed
Chapter 1 Decoding the dragon: Chinese theories of cyberespionage and cyberwarfare
44 -
Requires Authentication UnlicensedLicensed
Chapter 2 China: critical infrastructure pre-positioning and holding it “at risk”
110 -
Requires Authentication UnlicensedLicensed
Chapter 3 Chinese intellectual property theft: “the greatest transfer of wealth in history”
172 -
Requires Authentication UnlicensedLicensed
Chapter 4 IP theft, military modernization, and China’s rise
213 -
Requires Authentication UnlicensedLicensed
Final conclusions
264 -
Requires Authentication UnlicensedLicensed
Appendix
311 -
Requires Authentication UnlicensedLicensed
Bibliography[1]
-
Requires Authentication UnlicensedLicensed
Index
Publishing information
Pages and Images/Illustrations in book
eBook published on:
September 22, 2025
eBook ISBN:
9783111575513
Hardcover published on:
September 22, 2025
Hardcover ISBN:
9783111575100
Pages and Images/Illustrations in book
Main content:
316
Illustrations:
2
Coloured Illustrations:
1
Tables:
1
Audience(s) for this book
Scholars and students of International Relations, Cybersecurity, Security, Political Science, Diplomacy.
Safety & product resources
-
Manufacturer information:
Walter de Gruyter GmbH
Genthiner Straße 13
10785 Berlin
productsafety@degruyterbrill.com