政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/131285
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 113656/144643 (79%)
造訪人次 : 51751741      線上人數 : 563
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/131285


    題名: 中國對台灣網路戰爭研究
    A Study on Chinese Cyber Warfare on Taiwan
    作者: 易安祖
    Yi, Andrew
    貢獻者: 趙建民
    Chao, Chien-Min
    易安祖
    Yi, Andrew
    關鍵詞: 網絡安全
    台灣政治
    Taiwan
    Cyber Warfare
    Cybersecurity
    Cyber Strategy
    Cross-strait Relations
    U.S.-Taiwan Relation
    CCP Politics
    日期: 2020
    上傳時間: 2020-08-03 18:30:08 (UTC+8)
    摘要: Not Available
    Cybersecurity is one of the most pressing issues facing modern, technologically advanced states. Building cyber capabilities has allowed states to execute strategic tasks and achieve goals previously thought impossible in real time. Cyber is the domain of tomorrow and no country has better utilized those capabilities than China. Currently, Taiwan and the United States face the constant threat of cyberattacks from its adversaries, China being chief among those. Because of flaws and weaknesses in both countries` cybersecurity networks, foreign actors seek to utilize cyber capabilities to destabilize society in order to achieve strategic goals. The PRC has been utilizing its cyber capabilities first on Taiwan, and later against other foreign adversaries such as the United States. Experts frequently cite Taiwan as a testing ground for Chinese hacks because of its proximity to the mainland and its cultural similarities. In this thesis, I attempt to answer the question of: what is China’s Cyber Warfare Strategy against Taiwan? Taiwan is a strategic goal of the Chinese government, who is willing to go to any lengths short of war to subdue to the island government to its force. The process of conducting this research paper was a daunting task, but I hope to help further the discussion and research of Chinese Cyber-activities by contextualizing China’s Political Warfare campaign against Taiwan to better understand their activities. This thesis will explain how the CCP is carrying out a coordinated political warfare campaign that utilizes cyber warfare in order to undermine Taiwan’s democracy. It utilizes what publically available English resources are available regarding Taiwan and China’s cyber capabilities and relies on translations sources from Chinese. The effectiveness and extent of Chinese activities in Taiwan requires further research and study for accuracy.
    參考文獻: 1. Areddy, James T. “Meet 3PLA, China`s Version of the NSA.” The Wall Street Journal. Dow Jones & Company, July 9, 2014. https://blogs.wsj.com/chinarealtime/2014/07/08/meet-3pla-chinas-version-of-the-nsa/
    2. Burton, Rachael. “Project 2049 Institute.” Project 2049 Institute, September 25, 2018. https://project2049.net/2018/09/25/the-peoples-liberation-army-strategic-support-force-leadership-and-structure/.
    3. Cheng, Dean. “For the Chinese, Political Warfare Is War by Other Means.” The Heritage Foundation, April 2, 2020. https://www.heritage.org/asia/commentary/the-chinese-political-warfare-war-other-means.
    4. Cheng, Dean. “Winning Without Fighting: Chinese Public Opinion Warfare and the Need for a Robust American Response,” The Heritage Foundation, No. 2745, November 26, 2012, http://www.heritage.org/research/reports/2012/11/winningwithout-fighting-chinese-public-opinion-warfare-and-the-need-for-a-robust-americanresponse.
    5. Cordesman, Anthony H. & Steven Colley, “Chinese Strategy and Military Modernization in 2015: A Comparative Analysis,” Center for Strategic and International Studies (October 10, 2015), 121.
    6. Easton, Ian. The Chinese Invasion Threat: Taiwan’s Defense and American Strategy in Asia. Manchester: Eastbridge Books, 2019.
    7. Finkle, Jim, Joseph Menn, and Aruna Viswanatha. “U.S. Accuses China of Cyber Spying on American Companies.” Reuters, November 21, 2014. https://www.reuters.com/article/us-cybercrime-usa-china-idUSKCN0J42M520141120.
    8. Finkelstein, David M., “China’s National Military Strategy,” in The People’s Liberation Army in the Information Age by James C. Mulvenon and Richard H. Yang, eds., (Santa Monica, CA: RAND Corporation, 1999), 103.
    9. Glaser, Bonnie, and Matthew P. Funaiole. “China`s Provocations Around Taiwan Aren`t a Crisis.” Foreign Policy, May 15, 2020. https://foreignpolicy.com/2020/05/15/chinas-provocations-around-taiwan-arent-a-crisis/.
    10. Iasiello, Emilio. "China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities." Journal of Strategic Security 9, no. 2 (2016): 45-69. Accessed May 23, 2020. www.jstor.org/stable/26466776.
    11. Jing Nanxiang, “Cyber Freedom and Cyber Self-Discipline,” Liberation Army Daily, December 20, 2011, from “Summary: JFJB on Cyber Freedom and Cyber Self-Discipline for PRC Netizens,” translated by OSC, CPP20111221088010.
    12. Kahn, Robert E., Mike McConnell, Joseph S. Nye, Peter Schwartz, Nova J. Daly, Nathaniel Fick, Martha Finnemore, Richard Fontaine, Daniel E. Geer, David A. Gross, Jason Healey, James A. Lewis, M. Ethan Lucarelli, Thomas G. Mahnken, Gary McGraw, Roger H. Miksad, Gregory J. Rattray, Will Rogers, and Christopher M. Schroeder. America’s Cyber Future: Security and Prosperity in the Information Age. Report. Edited by Lord Kristin M. and Sharp Travis. Center for a New American Security, 2011. 20-31. Accessed March 26, 2020. www.jstor.org/stable/resrep06319.7.
    13. Kallberg, Jan. "Strategic Cyberwar Theory - A Foundation for Designing Decisive Strategic Cyber Operations." The Cyber Defense Review 1, no. 1 (2016): 113-28. Accessed March 20, 2020. www.jstor.org/stable/26267302.
    14. Kolton, Michael. "Interpreting China’s Pursuit of Cyber Sovereignty and Its Views on Cyber Deterrence." The Cyber Defense Review 2, no. 1 (2017): 119-54. Accessed May 22, 2020. www.jstor.org/stable/26267405.
    15. Kania, Elsa B. “China`s Strategic Support Force At 3.” The Diplomat. December 29, 2018. https://thediplomat.com/2018/12/chinas-strategic-support-force-at-3/.
    16. Krejsa, Harry, and Hannah Suh. Report. Center for a New American Security, 2017. Accessed March 26, 2020. www.jstor.org/stable/resrep06143.
    17. Lindsay, Jon R. “Exaggerating the Chinese Cyber Threat.” Belfer Center For Science and International Affairs, May 2015. https://www.belfercenter.org/sites/default/files/files/publication/linsday-china-cyber-pb-final.pdf.
    18. Lü Jinghua [吕晶华], “Gongtong goujian heping anquan kaifang hezuo de wangluo kongjian,” [共同构建和平安全开放 合作的网络空间] (Jointly building a peaceful and safe cyberspace through open cooperation) PLA Daily, October 18, 2016, http://www.81.cn/jfjbmap/content/2015-10/18/content_126334.htm.
    19. Lu Hsin-hui, Hsieh Chia-chen, Yeh Tzu-kang and Elizabeth Hsu. “Authorities Deny Rumor of Ban on Incense, Ghost Money Burning,” Central News Agency (Taiwan), July 21, 2017. https://focustaiwan.tw/politics/201707210016.
    20. Lyu, Jinghua. “What Are China`s Cyber Capabilities and Intentions?” IPI Global Observatory, March 22, 2019. https://theglobalobservatory.org/2019/03/what-are-chinas-cyber-capabilities-intentions/.
    21. Mattis, Peter. “China`s `Three Warfares` in Perspective.” War on the Rocks, January 30, 2018. https://warontherocks.com/2018/01/chinas-three-warfares-perspective/.
    22. Mazarr, Michael J., Abigail Casey, Alyssa Demus, Scott W. Harold, Luke J. Matthews, Nathan Beauchamp-Mustafaga, and James Sladden, Hostile Social Manipulation: Present Realities and Emerging Trends. Santa Monica, CA: RAND Corporation, 2019. https://www.rand.org/pubs/research_reports/RR2713.html.
    23. Miao, Zhong-han, Yen-hsi Lai, and Yi-ching Chiang. “70 Percent of Fake COVID-19 News from China: Investigation Bureau.” Focus Taiwan. Focus Taiwan - CNA English News, April 8, 2020. https://focustaiwan.tw/cross-strait/202004080010.
    24. Morgan, Scott. “Taiwan Biggest User of Mobile Data in Asia, s...” Taiwan News, July 23, 2018. https://www.taiwannews.com.tw/en/news/3488375.
    25. Murong Xuecun, “The New Face of Chinese Propaganda,” New York Times, December 20, 2013.
    https://www.nytimes.com/2013/12/21/opinion/sunday/murong-the-new-face-of-chinese-propaganda.html.
    26. Nestoras, Antonios. “Political Warfare: Competition in the Cyber Era.” Martens Centre For European Studies, April 2019. https://www.martenscentre.eu/sites/default/files/publication-files/cyber-warfare-politics-era.pdf.
    27. Swaine, Michael D. “Chinese Views on Cybersecurity in Foreign Relations.” The Carnegie Endowment for International Peace, September 20, 2013.
    28. Shi-Kupfer, Kristin. “Governance Through Information Control,” China Monitor, No. 26, Mercator Institute for China Studies, January 19, 2016.
    29. Sardarizadeh, Shayan, and Olga Robinson. “Coronavirus: US and China Trade Conspiracy Theories.” BBC News. BBC, April 26, 2020. https://www.bbc.com/news/world-52224331.
    30. Pan, Jason. “Taiwan to Go Ahead with Cyberarmy Plan: Ministry,” Taipei Times, May 27, 2016, http://www.taipeitimes.com/News/taiwan/archives/2016/05/27/2003647240.
    31. Paterson, Thomas & Hanley, Lauren. (2020). Political warfare in the digital age: cyber subversion, information operations and ‘deep fakes’. Australian Journal of International Affairs. 1-16. 10.1080/10357718.2020.1734772.
    32. Reichenbach, Dominique. “Taiwan`s Electoral System Puts the US to Shame.” The Diplomat, February 13, 2020. https://thediplomat.com/2020/02/taiwans-electoral-system-puts-the-us-to-shame/.
    33. Robinson, Linda, Todd C. Helmus, Raphael S. Cohen, Alireza Nader, Andrew Radin, Madeline Magnuson, and Katya Migacheva, The Growing Need to Focus on Modern Political Warfare. (Santa Monica, CA: RAND Corporation, 2019). https://www.rand.org/pubs/research_briefs/RB10071.html.
    34. Swaine, Michael D., “Xi Jinping’s Address to the Central Conference on Work Relating to Foreign Affairs: Assessing and Advancing Major- Power Diplomacy with Chinese Characteristics,” China Leadership Monitor 46 (March 19, 2015); David M. Finkelstein, “China’s National Military Strategy,” by James C. Mulvenon and Richard H. Yang, eds., in The People’s Liberation Army in the Information Age (Santa Monica, CA: RAND Corporation, 1999), 103.
    35. Shen, Ming-shih. “China`s Cyber Warfare Strategy and Approaches toward Taiwan.” Taiwan Strategists, no. 2 (June 2019): 1–18.
    https://www.pf.org.tw/article-pfch-2122-6510.
    36. Thompson, Stephen. “Spotlight on China`s Hackers after Accusation against PLA Unit 61398.” South China Morning Post. Accessed April 21, 2013. https://www.scmp.com/lifestyle/technology/article/1219328/spotlight-chinas-hackers-after-accusations-against-pla-unit.
    37. Ye Zheng, “From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond,” translated by Yang Fan in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, edited by Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron (London: Oxford Scholarship Online, April 2015), 132, doi:10.1093/acprof:oso/9780190201265.001.0001.
    38. Yin Pumin, “Mapping Out Success: New five-year blueprint lays down specific objectives for a prosperous China,” Beijing Review 45 (November 5, 2015), accessed January 10, 2016, http://www.bjreview.com.cn/Current_Issue/Editor_ Choice/201511/t20151102_800041696.html.
    39. “US Says Taiwan`s Exclusion from WHO Caused Loss of Lives.” Al Jazeera. Al Jazeera News, May 13, 2020.
    https://www.aljazeera.com/news/2020/05/taiwan-exclusion-caused-loss-lives-200513025007789.html.
    40. “Taiwan’s Taoists Protest Against Curbs on Incense and Firecrackers,” BBC, BBC News, July 23, 2017.
    https://www.bbc.com/news/world-asia-40699113.
    41. “APT1 - Exposing One of China`s Cyber Espionage Units.” Fireeye, February 18, 2013. https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf.

    Chinese Sources
    42. “Cyber Crime Prevention.” 法務部調查局, Ministry of Justice Investigation Bureau, 11 July 2016,
    www.mjib.gov.tw/EditPage/?PageID=cccf1206-a941-466d-84c0-5b505a3c4acb.
    43. “The Information Security Workstation of the Bureau of Investigation of the Ministry of Justice Was Officially Unveiled.” 法務部調查局, Ministry of Justice Investigation Bureau, 24 Apr. 2020, www.mjib.gov.tw/news/Details/1/600.
    44. Huaxia, ed., “Highlights of Xi`s Internet speech,” Xinhua, December 16, 2015, http://news. xinhuanet.com/english/2015-12/16/c_134923855.htm.
    45. “National Security Unit: Anti–Pension Reform Protests Had Intervention from Chinese Forces” [“國安單位:反年改陳抗 有中國勢力介入”], Liberty Times, July 18, 2017; “Taiwan Cuts 18 Pct Interest in Civil Service Pension Reform Bill,” Reuters, June 27, 2017; “Taking on Taiwan’s Ruinous and Partisan Pension System,” Economist, May 18, 2017.
    描述: 碩士
    國立政治大學
    亞太研究英語碩士學位學程(IMAS)
    107926016
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0107926016
    資料類型: thesis
    DOI: 10.6814/NCCU202000853
    顯示於類別:[亞太研究英語博/碩士學位學程(IDAS/IMAS)] 學位論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    601601.pdf924KbAdobe PDF2157檢視/開啟


    在政大典藏中所有的資料項目都受到原著作權保護.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋