Please use this identifier to cite or link to this item:
A Study on Chinese Cyber Warfare on Taiwan
|Issue Date: ||2020-08-03 18:30:08 (UTC+8)|
|Abstract: ||Not Available|
Cybersecurity is one of the most pressing issues facing modern, technologically advanced states. Building cyber capabilities has allowed states to execute strategic tasks and achieve goals previously thought impossible in real time. Cyber is the domain of tomorrow and no country has better utilized those capabilities than China. Currently, Taiwan and the United States face the constant threat of cyberattacks from its adversaries, China being chief among those. Because of flaws and weaknesses in both countries' cybersecurity networks, foreign actors seek to utilize cyber capabilities to destabilize society in order to achieve strategic goals. The PRC has been utilizing its cyber capabilities first on Taiwan, and later against other foreign adversaries such as the United States. Experts frequently cite Taiwan as a testing ground for Chinese hacks because of its proximity to the mainland and its cultural similarities. In this thesis, I attempt to answer the question of: what is China’s Cyber Warfare Strategy against Taiwan? Taiwan is a strategic goal of the Chinese government, who is willing to go to any lengths short of war to subdue to the island government to its force. The process of conducting this research paper was a daunting task, but I hope to help further the discussion and research of Chinese Cyber-activities by contextualizing China’s Political Warfare campaign against Taiwan to better understand their activities. This thesis will explain how the CCP is carrying out a coordinated political warfare campaign that utilizes cyber warfare in order to undermine Taiwan’s democracy. It utilizes what publically available English resources are available regarding Taiwan and China’s cyber capabilities and relies on translations sources from Chinese. The effectiveness and extent of Chinese activities in Taiwan requires further research and study for accuracy.
|Reference: ||1. Areddy, James T. “Meet 3PLA, China's Version of the NSA.” The Wall Street Journal. Dow Jones & Company, July 9, 2014. https://blogs.wsj.com/chinarealtime/2014/07/08/meet-3pla-chinas-version-of-the-nsa/|
2. Burton, Rachael. “Project 2049 Institute.” Project 2049 Institute, September 25, 2018. https://project2049.net/2018/09/25/the-peoples-liberation-army-strategic-support-force-leadership-and-structure/.
3. Cheng, Dean. “For the Chinese, Political Warfare Is War by Other Means.” The Heritage Foundation, April 2, 2020. https://www.heritage.org/asia/commentary/the-chinese-political-warfare-war-other-means.
4. Cheng, Dean. “Winning Without Fighting: Chinese Public Opinion Warfare and the Need for a Robust American Response,” The Heritage Foundation, No. 2745, November 26, 2012, http://www.heritage.org/research/reports/2012/11/winningwithout-fighting-chinese-public-opinion-warfare-and-the-need-for-a-robust-americanresponse.
5. Cordesman, Anthony H. & Steven Colley, “Chinese Strategy and Military Modernization in 2015: A Comparative Analysis,” Center for Strategic and International Studies (October 10, 2015), 121.
6. Easton, Ian. The Chinese Invasion Threat: Taiwan’s Defense and American Strategy in Asia. Manchester: Eastbridge Books, 2019.
7. Finkle, Jim, Joseph Menn, and Aruna Viswanatha. “U.S. Accuses China of Cyber Spying on American Companies.” Reuters, November 21, 2014. https://www.reuters.com/article/us-cybercrime-usa-china-idUSKCN0J42M520141120.
8. Finkelstein, David M., “China’s National Military Strategy,” in The People’s Liberation Army in the Information Age by James C. Mulvenon and Richard H. Yang, eds., (Santa Monica, CA: RAND Corporation, 1999), 103.
9. Glaser, Bonnie, and Matthew P. Funaiole. “China's Provocations Around Taiwan Aren't a Crisis.” Foreign Policy, May 15, 2020. https://foreignpolicy.com/2020/05/15/chinas-provocations-around-taiwan-arent-a-crisis/.
10. Iasiello, Emilio. "China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities." Journal of Strategic Security 9, no. 2 (2016): 45-69. Accessed May 23, 2020. www.jstor.org/stable/26466776.
11. Jing Nanxiang, “Cyber Freedom and Cyber Self-Discipline,” Liberation Army Daily, December 20, 2011, from “Summary: JFJB on Cyber Freedom and Cyber Self-Discipline for PRC Netizens,” translated by OSC, CPP20111221088010.
12. Kahn, Robert E., Mike McConnell, Joseph S. Nye, Peter Schwartz, Nova J. Daly, Nathaniel Fick, Martha Finnemore, Richard Fontaine, Daniel E. Geer, David A. Gross, Jason Healey, James A. Lewis, M. Ethan Lucarelli, Thomas G. Mahnken, Gary McGraw, Roger H. Miksad, Gregory J. Rattray, Will Rogers, and Christopher M. Schroeder. America’s Cyber Future: Security and Prosperity in the Information Age. Report. Edited by Lord Kristin M. and Sharp Travis. Center for a New American Security, 2011. 20-31. Accessed March 26, 2020. www.jstor.org/stable/resrep06319.7.
13. Kallberg, Jan. "Strategic Cyberwar Theory - A Foundation for Designing Decisive Strategic Cyber Operations." The Cyber Defense Review 1, no. 1 (2016): 113-28. Accessed March 20, 2020. www.jstor.org/stable/26267302.
14. Kolton, Michael. "Interpreting China’s Pursuit of Cyber Sovereignty and Its Views on Cyber Deterrence." The Cyber Defense Review 2, no. 1 (2017): 119-54. Accessed May 22, 2020. www.jstor.org/stable/26267405.
15. Kania, Elsa B. “China's Strategic Support Force At 3.” The Diplomat. December 29, 2018. https://thediplomat.com/2018/12/chinas-strategic-support-force-at-3/.
16. Krejsa, Harry, and Hannah Suh. Report. Center for a New American Security, 2017. Accessed March 26, 2020. www.jstor.org/stable/resrep06143.
17. Lindsay, Jon R. “Exaggerating the Chinese Cyber Threat.” Belfer Center For Science and International Affairs, May 2015. https://www.belfercenter.org/sites/default/files/files/publication/linsday-china-cyber-pb-final.pdf.
18. Lü Jinghua [吕晶华], “Gongtong goujian heping anquan kaifang hezuo de wangluo kongjian,” [共同构建和平安全开放 合作的网络空间] (Jointly building a peaceful and safe cyberspace through open cooperation) PLA Daily, October 18, 2016, http://www.81.cn/jfjbmap/content/2015-10/18/content_126334.htm.
19. Lu Hsin-hui, Hsieh Chia-chen, Yeh Tzu-kang and Elizabeth Hsu. “Authorities Deny Rumor of Ban on Incense, Ghost Money Burning,” Central News Agency (Taiwan), July 21, 2017. https://focustaiwan.tw/politics/201707210016.
20. Lyu, Jinghua. “What Are China's Cyber Capabilities and Intentions?” IPI Global Observatory, March 22, 2019. https://theglobalobservatory.org/2019/03/what-are-chinas-cyber-capabilities-intentions/.
21. Mattis, Peter. “China's 'Three Warfares' in Perspective.” War on the Rocks, January 30, 2018. https://warontherocks.com/2018/01/chinas-three-warfares-perspective/.
22. Mazarr, Michael J., Abigail Casey, Alyssa Demus, Scott W. Harold, Luke J. Matthews, Nathan Beauchamp-Mustafaga, and James Sladden, Hostile Social Manipulation: Present Realities and Emerging Trends. Santa Monica, CA: RAND Corporation, 2019. https://www.rand.org/pubs/research_reports/RR2713.html.
23. Miao, Zhong-han, Yen-hsi Lai, and Yi-ching Chiang. “70 Percent of Fake COVID-19 News from China: Investigation Bureau.” Focus Taiwan. Focus Taiwan - CNA English News, April 8, 2020. https://focustaiwan.tw/cross-strait/202004080010.
24. Morgan, Scott. “Taiwan Biggest User of Mobile Data in Asia, s...” Taiwan News, July 23, 2018. https://www.taiwannews.com.tw/en/news/3488375.
25. Murong Xuecun, “The New Face of Chinese Propaganda,” New York Times, December 20, 2013.
26. Nestoras, Antonios. “Political Warfare: Competition in the Cyber Era.” Martens Centre For European Studies, April 2019. https://www.martenscentre.eu/sites/default/files/publication-files/cyber-warfare-politics-era.pdf.
27. Swaine, Michael D. “Chinese Views on Cybersecurity in Foreign Relations.” The Carnegie Endowment for International Peace, September 20, 2013.
28. Shi-Kupfer, Kristin. “Governance Through Information Control,” China Monitor, No. 26, Mercator Institute for China Studies, January 19, 2016.
29. Sardarizadeh, Shayan, and Olga Robinson. “Coronavirus: US and China Trade Conspiracy Theories.” BBC News. BBC, April 26, 2020. https://www.bbc.com/news/world-52224331.
30. Pan, Jason. “Taiwan to Go Ahead with Cyberarmy Plan: Ministry,” Taipei Times, May 27, 2016, http://www.taipeitimes.com/News/taiwan/archives/2016/05/27/2003647240.
31. Paterson, Thomas & Hanley, Lauren. (2020). Political warfare in the digital age: cyber subversion, information operations and ‘deep fakes’. Australian Journal of International Affairs. 1-16. 10.1080/10357718.2020.1734772.
32. Reichenbach, Dominique. “Taiwan's Electoral System Puts the US to Shame.” The Diplomat, February 13, 2020. https://thediplomat.com/2020/02/taiwans-electoral-system-puts-the-us-to-shame/.
33. Robinson, Linda, Todd C. Helmus, Raphael S. Cohen, Alireza Nader, Andrew Radin, Madeline Magnuson, and Katya Migacheva, The Growing Need to Focus on Modern Political Warfare. (Santa Monica, CA: RAND Corporation, 2019). https://www.rand.org/pubs/research_briefs/RB10071.html.
34. Swaine, Michael D., “Xi Jinping’s Address to the Central Conference on Work Relating to Foreign Affairs: Assessing and Advancing Major- Power Diplomacy with Chinese Characteristics,” China Leadership Monitor 46 (March 19, 2015); David M. Finkelstein, “China’s National Military Strategy,” by James C. Mulvenon and Richard H. Yang, eds., in The People’s Liberation Army in the Information Age (Santa Monica, CA: RAND Corporation, 1999), 103.
35. Shen, Ming-shih. “China's Cyber Warfare Strategy and Approaches toward Taiwan.” Taiwan Strategists, no. 2 (June 2019): 1–18.
36. Thompson, Stephen. “Spotlight on China's Hackers after Accusation against PLA Unit 61398.” South China Morning Post. Accessed April 21, 2013. https://www.scmp.com/lifestyle/technology/article/1219328/spotlight-chinas-hackers-after-accusations-against-pla-unit.
37. Ye Zheng, “From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond,” translated by Yang Fan in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, edited by Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron (London: Oxford Scholarship Online, April 2015), 132, doi:10.1093/acprof:oso/9780190201265.001.0001.
38. Yin Pumin, “Mapping Out Success: New five-year blueprint lays down specific objectives for a prosperous China,” Beijing Review 45 (November 5, 2015), accessed January 10, 2016, http://www.bjreview.com.cn/Current_Issue/Editor_ Choice/201511/t20151102_800041696.html.
39. “US Says Taiwan's Exclusion from WHO Caused Loss of Lives.” Al Jazeera. Al Jazeera News, May 13, 2020.
40. “Taiwan’s Taoists Protest Against Curbs on Incense and Firecrackers,” BBC, BBC News, July 23, 2017.
41. “APT1 - Exposing One of China's Cyber Espionage Units.” Fireeye, February 18, 2013. https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf.
42. “Cyber Crime Prevention.” 法務部調查局, Ministry of Justice Investigation Bureau, 11 July 2016,
43. “The Information Security Workstation of the Bureau of Investigation of the Ministry of Justice Was Officially Unveiled.” 法務部調查局, Ministry of Justice Investigation Bureau, 24 Apr. 2020, www.mjib.gov.tw/news/Details/1/600.
44. Huaxia, ed., “Highlights of Xi's Internet speech,” Xinhua, December 16, 2015, http://news. xinhuanet.com/english/2015-12/16/c_134923855.htm.
45. “National Security Unit: Anti–Pension Reform Protests Had Intervention from Chinese Forces” [“國安單位：反年改陳抗 有中國勢力介入”], Liberty Times, July 18, 2017; “Taiwan Cuts 18 Pct Interest in Civil Service Pension Reform Bill,” Reuters, June 27, 2017; “Taking on Taiwan’s Ruinous and Partisan Pension System,” Economist, May 18, 2017.
|Source URI: ||http://thesis.lib.nccu.edu.tw/record/#G0107926016|
|Data Type: ||thesis|
|Appears in Collections:||[亞太研究英語博/碩士學位學程(IDAS/IMAS)] 學位論文|
Files in This Item:
All items in 政大典藏 are protected by copyright, with all rights reserved.