Preliminary considerations on China's international cooperation in cyber security: legislation, competent authorities, and challenges


  • Andreea-Maria PIERȘINARU National University for Political and Administrative Studies (SNSPA)



China, cyber security, cyber sovereignty, cyber espionage, international cooperation, cyber superpower.


This article addressed general issues regarding the Chinese legislative framework, competent authorities, China’s strategic objectives and the challenges in terms of international cooperation in the field of cybersecurity. The main objective of the research is to identify the actors involved in ensuring China’s cybersecurity, describe their responsibilities and correlate them with Chinese cyber-security legislation and China Cyber Security Cooperation Strategy. This study traces preliminary considerations for future in-depth analyses of the impact of China’s actions in the field of international cybersecurity. Among the main findings of the study the aspects briefly identified were related to the influences of the policies and narratives of the Chinese Communist Party presented in China’s International Cyber Security Cooperation Strategy, as well as to the fact that, despite China’s intention to become a cyber power, open to cooperation, international reactions are quite reluctant due to allegations of cyber espionage and domestic surveillance problems existing at the national level, among others.


ABC News. 2015. US and China Reach Agreement to Stop Commercial Cyber Espionage.

Atlantic Council. 2023. The 5×5—China’s cyber operations.

CAC (Cyberspace Administration of China). n.d. 中央网络安全和信息化委员会办室.

Carolan, Ciara. 2024. Europe and Belgium are ‘unresponsive’ in the face of Chinese cyberattacks, says hacked MP.

Cary, Dakota. 2021. China’s National Cybersecurity Center. A Base for Military-Civil Fusion in the Cyber Domain.

—. 2023. Community watch: China’s vision for the future of the internet.

CCTV News. 2023. Strategy for International Cooperation in Cyberspace.

Cheung, Sunny. 2023. Examining China’s Grand Strategy For RISC-V.

Chinese Embassy in UK. 2011. China’s Perspective on Cybersecurity.

Chinese Ministry of Education. 2017. Management Measures for the Demonstration Project of Building a First-Class Cibersecurity College.

CNCERT/CC (National Computer network Emergency Response technical Team/Coordination Center of China). n.d. 国家互联网应急中心.

CNNIC (China Internet Network Information Center). n.d. 中国互联网络信息中心.

Consiliul de Stat al Chinei. 1994. Regulations of the People’s Republic of China on ComputerInformation System Security Protection.

Creemers, Rogier. 2023. Cybersecurity Law and Regulation in China: Securing the Smart State.

Cyber Security Association of China (CSAC). n.d. 中国网络空间安全协会.

Cyberspace Administration of China. 2017. 关于发布《网络关键设备和网络安全专用产品目录(第一批)》的公告 [Announcement on the release of the “Catalogue of Critical Network Equipment and Network Security Special Products (First Batch)”].

CYWARE. 2022. APT10: A Chinese Threat on a Global Espionage Mission.

Dandong, Han. 2019. Legal Daily.

EIAS. 2023. EU Digital Dialogue and Cooperation with China: The Way Forward?

European Commission. 2019. “EU-CHINA - A Strategic Outlook.”

European Council. 2021. China: Declaration by the High Representative on behalf of the European Union urging Chinese authorities to take action against malicious cyber activities undertaken from its territory.

Fraser, Nalani, Fred Plan, Jacqueline O’Leary, Raymond Leong Vincent Cannon, DanPerez, and Chi-en Shen. 2019. APT41: A Dual Espionage and Cyber Crime Operation.

Fulton Library. n.d. Quantitative Research Methodologies.

GMF. 2021. NATO, EU, and allies attribute email intrusion to Chinese state-backed hackers.

Goswami, Namrata. 2023. China Prioritizes 3 Strategic Technologies in Its Great Power Competition. 2016. 中华人民共和国网络安全法_滚动新闻_中国网 [Cybersecurity Lawof the People’s Republic of China]. content_5129723.htm. 2024. UK holds China state-affiliated organisations and individuals responsible for malicious cyber activity.

Guo, Meirong. 2018. “China’s cybersecurity legislation, it’s relevance to critical infrastructures and the challenges it faces.” International Journal of Critical Infrastructure Protection vol. 22: pp. 139-149. doi:10.1016/j.ijcip.2018.06.006.

Handler, Simon. 2023. Atlantic Council.

Hmaidi, Antoni. 2023. “Here to stay” – Chinese state-affiliated hacking for strategic goals.

Julian, Nicholas. 2021. United States’ and China’s Cybersecurity Policies: Collaboration or Confrontation?

Kremlin. 2017. Russia and China Enhance Cybersecurity Cooperation.

Li, H. 2018. “BRICS and the Internet: Building a New Global Consensus.” InternationalAffairs 94 (5): 1125-1145.

Mandiant. 2022. APT41 (Double Dragon): A Dual Espionage and Cyber Crime Operation.

MFA CN (Ministry of Foreign Affairs of the People’s Republic of China). 2017. Ministry of Foreign Affairs Holds Briefing for Chinese and Foreign Media on President Xi Jinping’s State Visits to Russia and Germany and Attendance at 12th G20 Summit.

—. 2023. Proposal of the People’s Republic of China on the Reform and Development of Global Governance.

National Cyber Security Centre. 2018. APT10 continuing to target UK organisations.

NPC.GOV.CN. 2021. “Data Security Law of the People’s Republic of China.”

O’Donnell, Lindsay. 2018. APT10 Under Close Scrutiny as Potentially Linked to Chinese Ministry of State Security.

Office of Public Affairs. 2024. Seven Hackers Associated with Chinese Government Charged with Computer Intrusions Targeting Perceived Critics of China and U.S. Businesses and Politicians.

—. 2020. Seven International Cyber Defendants, Including “Apt41” Actors, Charged In Connection With Computer Intrusion Campaigns Against More Than 100 Victims Globally.

—. 2018. Two Chinese Hackers Associated With the Ministry of State Security Charged with Global Computer Intrusion Campaigns Targeting Intellectual Property and Confidential Business Information.

Pleil, Helen. 2023. Being a Cyberpower – China’s Ambitions in Cyberspace.

PwC Indonesia. 2023. A comparison of cybersecurity regulations: China.

Saffa, Azizah. 2024. Thailand and China Strengthen Cybersecurity Cooperation.

Shen, Yi. 2016. “Cyber Sovereignty and the Governance of Global Cyberspace.” ChinesePolitical Science Review vol. 1: pp. 81-93.

Smith, J. 2023. China and Solomon Islands Sign Security Pact.

Stanford. n.d. Free speech vs Maintaining Social Cohesion.

Sustainable Development. 2016. World Summit on the Information Society (WSIS).

TC260 (National Cybersecurity Standardization Technical Committee). n.d. 全国网络安全标准化技术委员会.

The White House. 2015. U.S.-China Cyber Agreement.

Thomas, Nicholas. 2009. “Cyber Security in East Asia: Governing Anarchy.” Asian Security5 (1): 3-23.

Truong, Sylvie. 2024. Chinese espionage campaigns and cyberattacks on critical infrastructure in Southeast Asia.

UK GOV. 2024. UK holds China state-affiliated organisations and individuals responsible for malicious cyber activity. organisations-and-individuals-responsible-for-malicious-cyber-activity.

US Department of the Treasury. 2024. Treasury Sanctions China-Linked Hackers for Targeting U.S. Critical Infrastructure.

Vijayan, Jay. 2017. China-Based Threat Actor APT10 Ramps Up Cyber Espionage Activity.

Wagner, B. 2019. “Cybersecurity in East Asia: Government Policies and Sectoiral Responses.” Journal of Cyber Policy 4 (1): 55-72.

Xinhua. 2019.

Xinhua News Agency. 2017. 网络空间国际合作战略 [Cyberspace International Cooperation Strategy].

Yamaguchi, Mari. 2021. Japan, Vietnam Look to Cyber Defense Against China.

Yerushalmy, Jonathan. 2024. China cyber-attacks explained: who is behind the hacking operation against the US and UK?

Zhang, Duanhong, Wenjia Ding, Yang Wang, and Siwen Liu. 2022. Exploring the Role of International Research Collaboration in Building China’s World-Class Universities.

Zulhusni, Muhammad. n.d. China’s new tech policies challenge Intel and AMD in a shifting landscape.




How to Cite

PIERȘINARU, A.-M. . (2024). Preliminary considerations on China’s international cooperation in cyber security: legislation, competent authorities, and challenges. BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY, 13(2), 121–141.