The Organization and Actions of China\'s Cyber Warfare under Xi Jinping

碩士 === 國立政治大學 === 外交學系戰略與國際事務碩士在職專班 === 107 === This master’s thesis closely examines the organization and actions of China's cyber warfare under Xi Jinping. It starts with introducing the “863 Program,” which was related to the Chinese Communist Party (CCP)'s military network stealing ope...

Full description

Bibliographic Details
Main Author: 邱建嶧
Other Authors: 盧業中
Format: Others
Language:zh-TW
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/handle/twt5u2
id ndltd-TW-107NCCU5322003
record_format oai_dc
spelling ndltd-TW-107NCCU53220032019-11-28T05:22:51Z http://ndltd.ncl.edu.tw/handle/twt5u2 The Organization and Actions of China\'s Cyber Warfare under Xi Jinping 習近平主政下中國的網路戰之組織與作為 邱建嶧 碩士 國立政治大學 外交學系戰略與國際事務碩士在職專班 107 This master’s thesis closely examines the organization and actions of China's cyber warfare under Xi Jinping. It starts with introducing the “863 Program,” which was related to the Chinese Communist Party (CCP)'s military network stealing operation approved by Deng Xiaoping in March 1986, and was included in the "Seventh Five-Year Plan" for the economic construction of the CPC Central Committee. The US National Counterintelligence Executive Office reported in 2011 that this program provided various funds and guidelines for the Chinese People's Liberation Army and hackers to obtain US technology and sensitive economic information. Then, it goes on to analyze the "301 clause" survey update report, which was released by the US Trade Representative Office in 2018, directly pinned down the CCP for using the secret hacker organization APT10 to lock in the industry highlighted in the "Thirteenth Five-Year Plan 2016-2020" technology policy. In recent years, due to the implementation of Netcom equipment and the future network security of 5G infrastructure, Chinese state-owned enterprises such as ZTE and Huawei triggered uneasiness world-wide about China's vision of governance network space, including the over-limit use of network warfare, the concept of cyberspace freedom in the United States, finding new global network governance models, and embracing different definitions of network security which shifting away from Western countries’. Moreover, from the early development of China's network strategy to the latest establishment of a national information security strategy and network governance organization (i.e. the CCP Central Network Security and Informatization Commission), evdience has shown that structural adjustment and the creation of the PLA's Strategic Support Force to promote cyberspace security are the Chinese government's top priority governance program. In the concluding chapter of this thesis, it sums up Xi Jinping's guidance on his policy of "military and civilian integration," which has played an important role in the long-term development track of the cooperation and development of traditional military-civilian organizations. In recent years, it has become the most favorable tool for political and economic network espionage activities in Mainland China. Looking forward to China's model of domestic network governance and overseas network cyber hacking, it is trying to create a super-strong international political landscape in cyberspace. In the future, while pursuing Internet monopoly, it will also cause global network political conflicts and frictions. Events with disputes will be foreseeable. 盧業中 2019 學位論文 ; thesis 179 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立政治大學 === 外交學系戰略與國際事務碩士在職專班 === 107 === This master’s thesis closely examines the organization and actions of China's cyber warfare under Xi Jinping. It starts with introducing the “863 Program,” which was related to the Chinese Communist Party (CCP)'s military network stealing operation approved by Deng Xiaoping in March 1986, and was included in the "Seventh Five-Year Plan" for the economic construction of the CPC Central Committee. The US National Counterintelligence Executive Office reported in 2011 that this program provided various funds and guidelines for the Chinese People's Liberation Army and hackers to obtain US technology and sensitive economic information. Then, it goes on to analyze the "301 clause" survey update report, which was released by the US Trade Representative Office in 2018, directly pinned down the CCP for using the secret hacker organization APT10 to lock in the industry highlighted in the "Thirteenth Five-Year Plan 2016-2020" technology policy. In recent years, due to the implementation of Netcom equipment and the future network security of 5G infrastructure, Chinese state-owned enterprises such as ZTE and Huawei triggered uneasiness world-wide about China's vision of governance network space, including the over-limit use of network warfare, the concept of cyberspace freedom in the United States, finding new global network governance models, and embracing different definitions of network security which shifting away from Western countries’. Moreover, from the early development of China's network strategy to the latest establishment of a national information security strategy and network governance organization (i.e. the CCP Central Network Security and Informatization Commission), evdience has shown that structural adjustment and the creation of the PLA's Strategic Support Force to promote cyberspace security are the Chinese government's top priority governance program. In the concluding chapter of this thesis, it sums up Xi Jinping's guidance on his policy of "military and civilian integration," which has played an important role in the long-term development track of the cooperation and development of traditional military-civilian organizations. In recent years, it has become the most favorable tool for political and economic network espionage activities in Mainland China. Looking forward to China's model of domestic network governance and overseas network cyber hacking, it is trying to create a super-strong international political landscape in cyberspace. In the future, while pursuing Internet monopoly, it will also cause global network political conflicts and frictions. Events with disputes will be foreseeable.
author2 盧業中
author_facet 盧業中
邱建嶧
author 邱建嶧
spellingShingle 邱建嶧
The Organization and Actions of China\'s Cyber Warfare under Xi Jinping
author_sort 邱建嶧
title The Organization and Actions of China\'s Cyber Warfare under Xi Jinping
title_short The Organization and Actions of China\'s Cyber Warfare under Xi Jinping
title_full The Organization and Actions of China\'s Cyber Warfare under Xi Jinping
title_fullStr The Organization and Actions of China\'s Cyber Warfare under Xi Jinping
title_full_unstemmed The Organization and Actions of China\'s Cyber Warfare under Xi Jinping
title_sort organization and actions of china\'s cyber warfare under xi jinping
publishDate 2019
url http://ndltd.ncl.edu.tw/handle/twt5u2
work_keys_str_mv AT qiūjiànyì theorganizationandactionsofchinascyberwarfareunderxijinping
AT qiūjiànyì xíjìnpíngzhǔzhèngxiàzhōngguódewǎnglùzhànzhīzǔzhīyǔzuòwèi
AT qiūjiànyì organizationandactionsofchinascyberwarfareunderxijinping
_version_ 1719298406028935168