跳到主要內容

臺灣博碩士論文加值系統

(44.200.194.255) 您好!臺灣時間:2024/07/15 02:33
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:易安祖
研究生(外文):Yi, Andrew
論文名稱:中國對台灣網路戰爭研究
論文名稱(外文):A Study on Chinese Cyber Warfare on Taiwan
指導教授:趙建民趙建民引用關係
指導教授(外文):Chao, Chien-Min
口試委員:趙春山劉復國
口試委員(外文):Zhao, Chun-ShanLiu, Fu-Guo
口試日期:2020-06-29
學位類別:碩士
校院名稱:國立政治大學
系所名稱:亞太研究英語碩士學位學程(IMAS)
學門:社會及行為科學學門
學類:區域研究學類
論文種類:學術論文
論文出版年:2020
畢業學年度:108
語文別:英文
論文頁數:68
中文關鍵詞:網絡安全台灣政治
外文關鍵詞:TaiwanCyber WarfareCybersecurityCyber StrategyCross-strait RelationsU.S.-Taiwan RelationCCP Politics
相關次數:
  • 被引用被引用:0
  • 點閱點閱:286
  • 評分評分:
  • 下載下載:86
  • 收藏至我的研究室書目清單書目收藏:0
Cybersecurity is one of the most pressing issues facing modern, technologically advanced states. Building cyber capabilities has allowed states to execute strategic tasks and achieve goals previously thought impossible in real time. Cyber is the domain of tomorrow and no country has better utilized those capabilities than China. Currently, Taiwan and the United States face the constant threat of cyberattacks from its adversaries, China being chief among those. Because of flaws and weaknesses in both countries' cybersecurity networks, foreign actors seek to utilize cyber capabilities to destabilize society in order to achieve strategic goals. The PRC has been utilizing its cyber capabilities first on Taiwan, and later against other foreign adversaries such as the United States. Experts frequently cite Taiwan as a testing ground for Chinese hacks because of its proximity to the mainland and its cultural similarities. In this thesis, I attempt to answer the question of: what is China’s Cyber Warfare Strategy against Taiwan? Taiwan is a strategic goal of the Chinese government, who is willing to go to any lengths short of war to subdue to the island government to its force. The process of conducting this research paper was a daunting task, but I hope to help further the discussion and research of Chinese Cyber-activities by contextualizing China’s Political Warfare campaign against Taiwan to better understand their activities. This thesis will explain how the CCP is carrying out a coordinated political warfare campaign that utilizes cyber warfare in order to undermine Taiwan’s democracy. It utilizes what publically available English resources are available regarding Taiwan and China’s cyber capabilities and relies on translations sources from Chinese. The effectiveness and extent of Chinese activities in Taiwan requires further research and study for accuracy.
Chapter 1 – Methodology …………… 1
Introduction …………… 2
Chinese Views of Cyber …………… 5
Chapter 2 – Importance and Need for Cyber Theory …………… 14
Political Warfare Re-Contextualized …………… 16
China’s “Three Warfares” …………… 22
Waldo’s Five Pillars for Societal Stability …………… 24
Chapter 3 – China’s Objectives and Tactics …………… 27
Importance of the People’s Liberation Army to the Chinese Dream …………… 29
Why is Taiwan Important to China? …………… 32
Chinese Tactics and Strategies: Public Opinion Warfare …………… 33
Chinese Social Media Activities …………… 37
Chinese Military Activities …………… 43
China’s Strategic Objective: Taiwan’s Pillars of Societal Stability …………… 47
Chapter 4 – Taiwan’s Counter Strategy …………… 51
Notable Cyber-Attacks on Taiwane …………… 52
What is Taiwan Currently Doing? …………… 53
What Can Taiwan Do? …………… 57
Conclusion …………… 60
Bibliography …………… 63
1. Areddy, James T. “Meet 3PLA, China's Version of the NSA.” The Wall Street Journal. Dow Jones & Company, July 9, 2014. https://blogs.wsj.com/chinarealtime/2014/07/08/meet-3pla-chinas-version-of-the-nsa/
2. Burton, Rachael. “Project 2049 Institute.” Project 2049 Institute, September 25, 2018. https://project2049.net/2018/09/25/the-peoples-liberation-army-strategic-support-force-leadership-and-structure/.
3. Cheng, Dean. “For the Chinese, Political Warfare Is War by Other Means.” The Heritage Foundation, April 2, 2020. https://www.heritage.org/asia/commentary/the-chinese-political-warfare-war-other-means.
4. Cheng, Dean. “Winning Without Fighting: Chinese Public Opinion Warfare and the Need for a Robust American Response,” The Heritage Foundation, No. 2745, November 26, 2012, http://www.heritage.org/research/reports/2012/11/winningwithout-fighting-chinese-public-opinion-warfare-and-the-need-for-a-robust-americanresponse.
5. Cordesman, Anthony H. & Steven Colley, “Chinese Strategy and Military Modernization in 2015: A Comparative Analysis,” Center for Strategic and International Studies (October 10, 2015), 121.
6. Easton, Ian. The Chinese Invasion Threat: Taiwan’s Defense and American Strategy in Asia. Manchester: Eastbridge Books, 2019.
7. Finkle, Jim, Joseph Menn, and Aruna Viswanatha. “U.S. Accuses China of Cyber Spying on American Companies.” Reuters, November 21, 2014. https://www.reuters.com/article/us-cybercrime-usa-china-idUSKCN0J42M520141120.
8. Finkelstein, David M., “China’s National Military Strategy,” in The People’s Liberation Army in the Information Age by James C. Mulvenon and Richard H. Yang, eds., (Santa Monica, CA: RAND Corporation, 1999), 103.
9. Glaser, Bonnie, and Matthew P. Funaiole. “China's Provocations Around Taiwan Aren't a Crisis.” Foreign Policy, May 15, 2020. https://foreignpolicy.com/2020/05/15/chinas-provocations-around-taiwan-arent-a-crisis/.
10. Iasiello, Emilio. "China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities." Journal of Strategic Security 9, no. 2 (2016): 45-69. Accessed May 23, 2020. www.jstor.org/stable/26466776.
11. Jing Nanxiang, “Cyber Freedom and Cyber Self-Discipline,” Liberation Army Daily, December 20, 2011, from “Summary: JFJB on Cyber Freedom and Cyber Self-Discipline for PRC Netizens,” translated by OSC, CPP20111221088010.
12. Kahn, Robert E., Mike McConnell, Joseph S. Nye, Peter Schwartz, Nova J. Daly, Nathaniel Fick, Martha Finnemore, Richard Fontaine, Daniel E. Geer, David A. Gross, Jason Healey, James A. Lewis, M. Ethan Lucarelli, Thomas G. Mahnken, Gary McGraw, Roger H. Miksad, Gregory J. Rattray, Will Rogers, and Christopher M. Schroeder. America’s Cyber Future: Security and Prosperity in the Information Age. Report. Edited by Lord Kristin M. and Sharp Travis. Center for a New American Security, 2011. 20-31. Accessed March 26, 2020. www.jstor.org/stable/resrep06319.7.
13. Kallberg, Jan. "Strategic Cyberwar Theory - A Foundation for Designing Decisive Strategic Cyber Operations." The Cyber Defense Review 1, no. 1 (2016): 113-28. Accessed March 20, 2020. www.jstor.org/stable/26267302.
14. Kolton, Michael. "Interpreting China’s Pursuit of Cyber Sovereignty and Its Views on Cyber Deterrence." The Cyber Defense Review 2, no. 1 (2017): 119-54. Accessed May 22, 2020. www.jstor.org/stable/26267405.
15. Kania, Elsa B. “China's Strategic Support Force At 3.” The Diplomat. December 29, 2018. https://thediplomat.com/2018/12/chinas-strategic-support-force-at-3/.
16. Krejsa, Harry, and Hannah Suh. Report. Center for a New American Security, 2017. Accessed March 26, 2020. www.jstor.org/stable/resrep06143.
17. Lindsay, Jon R. “Exaggerating the Chinese Cyber Threat.” Belfer Center For Science and International Affairs, May 2015. https://www.belfercenter.org/sites/default/files/files/publication/linsday-china-cyber-pb-final.pdf.
18. Lü Jinghua [吕晶华], “Gongtong goujian heping anquan kaifang hezuo de wangluo kongjian,” [共同构建和平安全开放 合作的网络空间] (Jointly building a peaceful and safe cyberspace through open cooperation) PLA Daily, October 18, 2016, http://www.81.cn/jfjbmap/content/2015-10/18/content_126334.htm.
19. Lu Hsin-hui, Hsieh Chia-chen, Yeh Tzu-kang and Elizabeth Hsu. “Authorities Deny Rumor of Ban on Incense, Ghost Money Burning,” Central News Agency (Taiwan), July 21, 2017. https://focustaiwan.tw/politics/201707210016.
20. Lyu, Jinghua. “What Are China's Cyber Capabilities and Intentions?” IPI Global Observatory, March 22, 2019. https://theglobalobservatory.org/2019/03/what-are-chinas-cyber-capabilities-intentions/.
21. Mattis, Peter. “China's 'Three Warfares' in Perspective.” War on the Rocks, January 30, 2018. https://warontherocks.com/2018/01/chinas-three-warfares-perspective/.
22. Mazarr, Michael J., Abigail Casey, Alyssa Demus, Scott W. Harold, Luke J. Matthews, Nathan Beauchamp-Mustafaga, and James Sladden, Hostile Social Manipulation: Present Realities and Emerging Trends. Santa Monica, CA: RAND Corporation, 2019. https://www.rand.org/pubs/research_reports/RR2713.html.
23. Miao, Zhong-han, Yen-hsi Lai, and Yi-ching Chiang. “70 Percent of Fake COVID-19 News from China: Investigation Bureau.” Focus Taiwan. Focus Taiwan - CNA English News, April 8, 2020. https://focustaiwan.tw/cross-strait/202004080010.
24. Morgan, Scott. “Taiwan Biggest User of Mobile Data in Asia, s...” Taiwan News, July 23, 2018. https://www.taiwannews.com.tw/en/news/3488375.
25. Murong Xuecun, “The New Face of Chinese Propaganda,” New York Times, December 20, 2013.
https://www.nytimes.com/2013/12/21/opinion/sunday/murong-the-new-face-of-chinese-propaganda.html.
26. Nestoras, Antonios. “Political Warfare: Competition in the Cyber Era.” Martens Centre For European Studies, April 2019. https://www.martenscentre.eu/sites/default/files/publication-files/cyber-warfare-politics-era.pdf.
27. Swaine, Michael D. “Chinese Views on Cybersecurity in Foreign Relations.” The Carnegie Endowment for International Peace, September 20, 2013.
28. Shi-Kupfer, Kristin. “Governance Through Information Control,” China Monitor, No. 26, Mercator Institute for China Studies, January 19, 2016.
29. Sardarizadeh, Shayan, and Olga Robinson. “Coronavirus: US and China Trade Conspiracy Theories.” BBC News. BBC, April 26, 2020. https://www.bbc.com/news/world-52224331.
30. Pan, Jason. “Taiwan to Go Ahead with Cyberarmy Plan: Ministry,” Taipei Times, May 27, 2016, http://www.taipeitimes.com/News/taiwan/archives/2016/05/27/2003647240.
31. Paterson, Thomas & Hanley, Lauren. (2020). Political warfare in the digital age: cyber subversion, information operations and ‘deep fakes’. Australian Journal of International Affairs. 1-16. 10.1080/10357718.2020.1734772.
32. Reichenbach, Dominique. “Taiwan's Electoral System Puts the US to Shame.” The Diplomat, February 13, 2020. https://thediplomat.com/2020/02/taiwans-electoral-system-puts-the-us-to-shame/.
33. Robinson, Linda, Todd C. Helmus, Raphael S. Cohen, Alireza Nader, Andrew Radin, Madeline Magnuson, and Katya Migacheva, The Growing Need to Focus on Modern Political Warfare. (Santa Monica, CA: RAND Corporation, 2019). https://www.rand.org/pubs/research_briefs/RB10071.html.
34. Swaine, Michael D., “Xi Jinping’s Address to the Central Conference on Work Relating to Foreign Affairs: Assessing and Advancing Major- Power Diplomacy with Chinese Characteristics,” China Leadership Monitor 46 (March 19, 2015); David M. Finkelstein, “China’s National Military Strategy,” by James C. Mulvenon and Richard H. Yang, eds., in The People’s Liberation Army in the Information Age (Santa Monica, CA: RAND Corporation, 1999), 103.
35. Shen, Ming-shih. “China's Cyber Warfare Strategy and Approaches toward Taiwan.” Taiwan Strategists, no. 2 (June 2019): 1–18.
https://www.pf.org.tw/article-pfch-2122-6510.
36. Thompson, Stephen. “Spotlight on China's Hackers after Accusation against PLA Unit 61398.” South China Morning Post. Accessed April 21, 2013. https://www.scmp.com/lifestyle/technology/article/1219328/spotlight-chinas-hackers-after-accusations-against-pla-unit.
37. Ye Zheng, “From Cyberwarfare to Cybersecurity in the Asia-Pacific and Beyond,” translated by Yang Fan in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, edited by Jon R. Lindsay, Tai Ming Cheung, and Derek S. Reveron (London: Oxford Scholarship Online, April 2015), 132, doi:10.1093/acprof:oso/9780190201265.001.0001.
38. Yin Pumin, “Mapping Out Success: New five-year blueprint lays down specific objectives for a prosperous China,” Beijing Review 45 (November 5, 2015), accessed January 10, 2016, http://www.bjreview.com.cn/Current_Issue/Editor_ Choice/201511/t20151102_800041696.html.
39. “US Says Taiwan's Exclusion from WHO Caused Loss of Lives.” Al Jazeera. Al Jazeera News, May 13, 2020.
https://www.aljazeera.com/news/2020/05/taiwan-exclusion-caused-loss-lives-200513025007789.html.
40. “Taiwan’s Taoists Protest Against Curbs on Incense and Firecrackers,” BBC, BBC News, July 23, 2017.
https://www.bbc.com/news/world-asia-40699113.
41. “APT1 - Exposing One of China's Cyber Espionage Units.” Fireeye, February 18, 2013. https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf.

Chinese Sources
42. “Cyber Crime Prevention.” 法務部調查局, Ministry of Justice Investigation Bureau, 11 July 2016,
www.mjib.gov.tw/EditPage/?PageID=cccf1206-a941-466d-84c0-5b505a3c4acb.
43. “The Information Security Workstation of the Bureau of Investigation of the Ministry of Justice Was Officially Unveiled.” 法務部調查局, Ministry of Justice Investigation Bureau, 24 Apr. 2020, www.mjib.gov.tw/news/Details/1/600.
44. Huaxia, ed., “Highlights of Xi's Internet speech,” Xinhua, December 16, 2015, http://news. xinhuanet.com/english/2015-12/16/c_134923855.htm.
45. “National Security Unit: Anti–Pension Reform Protests Had Intervention from Chinese Forces” [“國安單位:反年改陳抗 有中國勢力介入”], Liberty Times, July 18, 2017; “Taiwan Cuts 18 Pct Interest in Civil Service Pension Reform Bill,” Reuters, June 27, 2017; “Taking on Taiwan’s Ruinous and Partisan Pension System,” Economist, May 18, 2017.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊