Jump to ContentJump to Main Navigation
China and CybersecurityEspionage, Strategy, and Politics in the Digital Domain$
Users without a subscription are not able to see the full content.

Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron

Print publication date: 2015

Print ISBN-13: 9780190201265

Published to Oxford Scholarship Online: April 2015

DOI: 10.1093/acprof:oso/9780190201265.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 17 February 2020

The Chinese Intelligence Agencies

The Chinese Intelligence Agencies

Evolution and Empowerment in Cyberspace

Chapter:
(p.29) Chapter 2 The Chinese Intelligence Agencies
Source:
China and Cybersecurity
Author(s):

Nigel Inkster

Publisher:
Oxford University Press
DOI:10.1093/acprof:oso/9780190201265.003.0002

In comparison with other major powers, relatively little has been written about the modern capabilities of the Chinese intelligence agencies. Little coverage is devoted to China’s contemporary intelligence capabilities, in particular in terms of successes in collecting against foreign targets. And there is nothing remotely comparable to the huge expansion in academic writings on all aspects of intelligence that has developed in the West since the end of the Cold War. For China’s intelligence community and corporate sector, cyber espionage has undoubtedly represented a step change in collection capabilities. It is unclear to what extent China’s top leadership has an effective policy grip on what is being done by its intelligence agencies and by other relevant actors in the cyber domain or has undertaken any kind of systematic risk/benefit analysis of such activities.

Keywords:   Chinese intelligence, intelligence services, espionage, cyber exploitation, Ministry of State Security, China

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .