242
Views
0
CrossRef citations to date
0
Altmetric
ARTICLES

President Obama and China: cyber diplomacy and strategy for a new era

ORCID Icon
Pages 48-66 | Received 06 Dec 2022, Accepted 17 Oct 2023, Published online: 20 Nov 2023

References

  • Austin, G., and F. S. Gady. 2012. Cyber Détente Between the United States and China: Shaping the Agenda. New York: East-West Institute.
  • Barrinha, A., and T. Renard. 2017. “Cyber-Diplomacy: The Making of an International Society in the Digital Age.” Global Affairs 3 (4-5): 353–364. https://doi.org/10.1080/23340460.2017.1414924.
  • Belasco, A. 2009. Troop Levels in the Afghan and Iraq Wars FY2001-FY2012: Cost and Other Potential Issues. Washington, DC: Congressional Research Service.
  • Brands, H. 2014. What Good is Grand Strategy? Power and Purpose in American Statecraft from Harry S. Truman to George W. Bush. New York: Cornell University Press.
  • Broeders, D. 2021. “The (Im)possibilities of Addressing Electoral Interference and the Public Core of the Internet in UNGGE and OWEG: A Mid-Process Assessment.” Journal of Cyber Policy 6 (3): 277–297. https://doi.org/10.1080/23738871.2021.1916976.
  • Cai, Cuihong. 2018. “Global Cyber Governance: China’s Contribution and Approach.” China Quarterly of International Strategic Studies 4 (01): 55–76. https://doi.org/10.1142/S2377740018500069.
  • Cate, F. 2015. “China and Information Security Threats: Policy Responses from the United States.” In China and Cybersecurity: Espionage, Strategy and Politics in the Digital Domain, edited by J. Lindsay, 297–332. Oxford: Oxford University Press.
  • Clinton, H. 2010. “Remarks at Press Availability”. Hanoi, Vietnam, July 23. Remarks at Press Availability (state.gov).
  • Clinton, H. 2011. “America's Pacific Century: The Future of Politics will be Decided in Asia, not Afghanistan or Iraq, and the United States will be Right at the Center of the Action.” Foreign Policy. October 11. http://foreignpolicy.com/2011/10/11/americas-pacific-century/
  • Cruz De Castro, R. 2013. “The Obama Administration’s Strategic Pivot to Asia: From a Diplomatic to a Strategic Constrainment of an Emergent China?” The Korean Journal of Defence Analysis 25 (3): 331–349.
  • CYBERCOMM Website: Home USCYBERCOM.
  • Department of Homeland Security. 2009. Press Release: “Secretary Napolitano Announces Key Cybersecurity Personnel.” United States Government, June 1.
  • Dolan, C. 2022. “Containment, Engagement and Continuity: China and the Evolution of Obama’s Foreign Policy Towards the Asia-Pacific.” In Achievements and Legacy of the Obama Presidency: Hope and Change?, edited by M. Grossman, R. E. Matthews, and F. Schortgen, 161–176. Springer International. https://doi.org/10.1007/978-3-030-89529-7
  • Farwell, James P., and Rafal Rohozinski. 2011. “Stuxnet and the Future of Cyber War.” Survival 53 (1): 23–40. https://doi.org/10.1080/00396338.2011.555586.
  • Garrison, J., and M. Wall. 2016. “The Rise of Hedging and Regionalism: An Explanation and Evaluation of President Obama’s China Policy.” Asian Affairs: An American Review 43 (2): 47–63. https://doi.org/10.1080/00927678.2016.1166892.
  • Goldman, Emily. 2023. “From Reaction to Action: Revamping Diplomacy for Strategic Competition.” In Cyberspace and Instability, edited by R. Chesney, J. Shires, and M. Smeets, 153–176. Edinburgh: Edinburgh University Press.
  • Gonçalves de Oliveira, Alana. 2021. “The Mishaps of US Foreign Policy Towards Asia: A Neoclassical Realist Analysis of Asia Pivot Under Barack Obama (2009–2016).” Conjuntura Austral 12 (57): 7–22. https://doi.org/10.22456/2178-8839.101607.
  • Harold, S. W., Martin C. Libicki, and Astrid Cevallos. 2016. Getting to Yes with China in Cyberspace. Santa Monica, CA: RAND Corporation.
  • Information Office of the State Council, PRC. 2011. China’s National Defense in 2010.
  • Joint Chiefs of Staff. 2004. National Military Strategy of the United States of America. Washington, DC: United States Government.
  • Kizekova, A. 2012. The Shanghai Cooperation Organisation: Challenges in Cyberspace. RSIS Commentaries, No. 033. Singapore: Nanyang Technological University.
  • Lancelot, Jonathan. 2020. “Cyber-Diplomacy: Cyberwarfare and the Rules of Engagement.” Journal of Cyber Security Technology 4 (4): 240–254. https://doi.org/10.1080/23742917.2020.1798155.
  • Liff, A. P. 2012. “Cyberwar: A New ‘Absolute Weapon'? The Proliferation of Cyberwarfare Capabilities and Interstate War.” Journal of Strategic Studies 35 (3): 401–428. https://doi.org/10.1080/01402390.2012.663252.
  • Lilli, Eugenio. 2020. “President Obama and US Cyber Security Policy.” Journal of Cyber Policy 5 (2): 265–284. https://doi.org/10.1080/23738871.2020.1778759.
  • Lieberthal, K.G. 2011. The American Pivot to Asia (commentary). The Brookings Institute. https://www.brookings.edu/articles/the-american-pivot-to-asia/
  • Lissner, R. 2021. Wars of Revelation. Oxford: Oxford University Press.
  • Lofflmann, G. 2016. “The Pivot Between Containment, Engagement, and Restraint: President Obama’s Conflicted Grand Strategy in Asia.” Asian Security 12 (2): 92–110. https://doi.org/10.1080/14799855.2016.1190338.
  • Mandiant. 2013. Report: APT 1: Exposing One of China’s Cyber Espionage Units. APT1: Exposing One of China’s Cyber Espionage Units | Mandiant | FireEye.
  • Marks, Joseph. 2019. “The Cybersecurity 202: The Sony Hack Ushered in a Dangerous Era in Cyberspace.” The Washington Post, November 27. https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/11/27/the-cybersecurity-202-the-sony-hack-ushered-in-a-dangerous-era-in-cyberspace/5ddd716c602ff1181f264147/.
  • McCausland, J. 2014. “Deterrence, the Twenty-First Century and the ‘Pivot’.” In The New US Strategy Towards Asia: Adapting to the American Pivot, edited by W. T. Tow, and D. Stuart, 53–73. London: Taylor and Francis Group.
  • Meijer, H., and B. Jensen. 2017. “The Strategist’s Dilemma: Global Dynamic Density and the Making of US ‘China Policy’.” European Journal of International Security 3 (2): 211–234. https://doi.org/10.1017/eis.2017.17.
  • Mureșan, R. C. 2017. “Current Approaches of Diplomacy in the Cyberspace.” Studia Universitatis Babes-Bolyai.Studia Europaea 62 (2): 3–43.
  • Nakashima, E. 2015. “Chinese Hack of Federal Personnel Files Included Security Clearance Database.” Washington Post, June 12. Chinese hack of federal personnel files included security-clearance database - The Washington Post.
  • Office of the National Counter Intelligence Executive. 2011. Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage 2009-11. National Counterintelligence and Security Center, October.
  • Office of the White House Press Secretary. 2011. Fact Sheet: The Administration’s Cybersecurity Accomplishments, May 12. https://obamawhitehouse.archives.gov/the-press-office/2011/05/12/fact-sheet-administrations-cybersecurity-accomplishments.
  • Panetta, L. 2012. “Defending the Nation from Cyber Attack.” Speech to the Business Executives for National Security, New York, October 11. http://www.defense.gov/speeches/speech.aspx?speechID = 1728.
  • President Obama. 2009a. “Remarks on Cyber Security.” New York Times, May 29. Text: Obama’s Remarks on Cyber-Security - The New York Times (nytimes.com).
  • President Obama. 2009b. “State of the Union Address.” President Barack Obama's Inaugural Address | whitehouse.gov (archives.gov).
  • President Obama. 2010. State of the Union Address. Obama's State of the Union Transcript 2010: Full Text - POLITICO.
  • President Obama. 2011a. State of the Union Address. State of the Union 2011 | The White House (archives.gov).
  • President Obama. 2011b. “Remarks by President Obama to the Australian Parliament, Canberra.” November 17. Remarks By President Obama to the Australian Parliament | whitehouse.gov (archives.gov).
  • President Obama. 2012. State of the Union Address. President Obama Delivers the 2012 State of the Union | whitehouse.gov (archives.gov).
  • President Obama. 2013. State of the Union Address. President Obama's 2013 State of the Union | whitehouse.gov (archives.gov).
  • President Obama and President Xi. 2013. “Remarks in Joint Press Conference. Sunnylands Retreat California: June 8.” Remarks by President Obama and President Xi Jinping of the People's Republic of China After Bilateral Meeting | whitehouse.gov (archives.gov).
  • President Obama and President Xi. 2015. “Remarks in Joint Press Conference. September 25.” Remarks by President Obama and President Xi of the People's Republic of China in Joint Press Conference | whitehouse.gov (archives.gov).
  • Riordan, Shaun. 2019. Cyberdiplomacy: Managing Security and Governance Online. Cambridge: Polity Press.
  • Rushe, D. 2015. “OPM Hack: China Blamed for Massive Breach of US Government Data.” The Guardian, June 5. OPM hack: China blamed for massive breach of US government data | Cybercrime | The Guardian.
  • Schiavenza, M. 2013. “What Exactly Does It Mean That the U.S. Is Pivoting to Asia? And Will it Last?” The Atlantic, April 15. https://www.theatlantic.com/china/archive/2013/04/what-exactly-does-it-mean-that-the-us-is-pivoting-to-asia/274936/
  • Segal, Adam. 2014. “Cyberspace: The New Strategic Realm in US-China Relations.” Strategic Analysis 38 (4): 577–581. https://doi.org/10.1080/09700161.2014.918447.
  • Shen, Y. 2016. “Cyber Sovereignty and the Governance of Global Cyberspace.” Chinese Political Science Review 1 (1): 81–93. https://doi.org/10.1007/s41111-016-0002-6.
  • Schmitt, M. N. 2013. Tallinn Manual on the International Law Applicable to Cyber Warfare : Prepared by the International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence. Cambridge: Cambridge University Press.
  • Testimony of Christopher Painter. 2015. Coordinator for Cyber Issues. US Department of State. Hearing Titled: Cybersecurity: Setting the Rules for Responsible Global Behaviour, May 14. https://2009-2017.state.gov/s/cyberissues/releasesandremarks/243801.htm.
  • Tow, W. 2016. “U.S.-Southeast Asia Relations in the Age of the Rebalance.” In Southeast Asian Affairs 2016, edited by M. Cook, and D. Singh, 35–54. Singapore: ISEAS-Yusof Ishak Institute.
  • United States Department of Defense. 2011. The National Military Strategy of the United States of America.
  • United States Department of Justice. 2014. Media Release: “U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage.” United States Government, 19 May. https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor.
  • US Department of State. 2015. Fact Sheet: President Xi Jinping’s State Visit to the United States, September 25.
  • US Senate. 2010. Committee on Homeland Security and Governmental Affairs. Hearing on Securing Critical Infrastructure in the Age of Stuxnet, November 17.
  • US-China Economic and Security Review Commission. 2013. Annual Report to Congress. Section 2: China’s Cyber Activities, Washington, DC.
  • Valeriano, Brandon, Benjamin Jensen and Ryan C. Maness. 2018. Cyber Strategy: The Evolving Character of Power and Coercion. Oxford: Oxford University Press.
  • Wang, C. 2016. Obama’s Challenge to China: The Pivot to Asia. London: Taylor and Francis.
  • Warren, Aiden, and Adam Bartley. 2021. U.S. Foreign Policy and China: Security Challenges During The Bush, Obama and Trump Administrations. Edinburgh: Edinburgh University Press.
  • Weber, Valentin. 2018. “Linking Cyber Strategy with Grand Strategy: The Case of the United States.” Journal of Cyber Policy 3 (2): 236–257. https://doi.org/10.1080/23738871.2018.1511741.
  • Weissmann, M. 2019. “Understanding Power (Shift) in East Asia: The Sino-US Narrative Battle About Leadership in the South China Sea.” Asian Perspective 43 (2): 223–248. https://doi.org/10.1353/apr.2019.0009.
  • Zetter, Kim. 2014. Countdown to Zero Day: Stuxnet and the Launch of the First Digital Weapon. New York: Crown Publishers.
  • Zheng, D. 2015. “2015 DOD Cyber Strategy.” CSIS, April 24. Accessed September 1, 2015. https://www.csis.org/analysis/2015-dod-cyber-strategy.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.