The Organization and Actions of China\'s Cyber Warfare under Xi Jinping
碩士 === 國立政治大學 === 外交學系戰略與國際事務碩士在職專班 === 107 === This master’s thesis closely examines the organization and actions of China's cyber warfare under Xi Jinping. It starts with introducing the “863 Program,” which was related to the Chinese Communist Party (CCP)'s military network stealing ope...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/twt5u2 |
id |
ndltd-TW-107NCCU5322003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-107NCCU53220032019-11-28T05:22:51Z http://ndltd.ncl.edu.tw/handle/twt5u2 The Organization and Actions of China\'s Cyber Warfare under Xi Jinping 習近平主政下中國的網路戰之組織與作為 邱建嶧 碩士 國立政治大學 外交學系戰略與國際事務碩士在職專班 107 This master’s thesis closely examines the organization and actions of China's cyber warfare under Xi Jinping. It starts with introducing the “863 Program,” which was related to the Chinese Communist Party (CCP)'s military network stealing operation approved by Deng Xiaoping in March 1986, and was included in the "Seventh Five-Year Plan" for the economic construction of the CPC Central Committee. The US National Counterintelligence Executive Office reported in 2011 that this program provided various funds and guidelines for the Chinese People's Liberation Army and hackers to obtain US technology and sensitive economic information. Then, it goes on to analyze the "301 clause" survey update report, which was released by the US Trade Representative Office in 2018, directly pinned down the CCP for using the secret hacker organization APT10 to lock in the industry highlighted in the "Thirteenth Five-Year Plan 2016-2020" technology policy. In recent years, due to the implementation of Netcom equipment and the future network security of 5G infrastructure, Chinese state-owned enterprises such as ZTE and Huawei triggered uneasiness world-wide about China's vision of governance network space, including the over-limit use of network warfare, the concept of cyberspace freedom in the United States, finding new global network governance models, and embracing different definitions of network security which shifting away from Western countries’. Moreover, from the early development of China's network strategy to the latest establishment of a national information security strategy and network governance organization (i.e. the CCP Central Network Security and Informatization Commission), evdience has shown that structural adjustment and the creation of the PLA's Strategic Support Force to promote cyberspace security are the Chinese government's top priority governance program. In the concluding chapter of this thesis, it sums up Xi Jinping's guidance on his policy of "military and civilian integration," which has played an important role in the long-term development track of the cooperation and development of traditional military-civilian organizations. In recent years, it has become the most favorable tool for political and economic network espionage activities in Mainland China. Looking forward to China's model of domestic network governance and overseas network cyber hacking, it is trying to create a super-strong international political landscape in cyberspace. In the future, while pursuing Internet monopoly, it will also cause global network political conflicts and frictions. Events with disputes will be foreseeable. 盧業中 2019 學位論文 ; thesis 179 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立政治大學 === 外交學系戰略與國際事務碩士在職專班 === 107 === This master’s thesis closely examines the organization and actions of China's cyber warfare under Xi Jinping. It starts with introducing the “863 Program,” which was related to the Chinese Communist Party (CCP)'s military network stealing operation approved by Deng Xiaoping in March 1986, and was included in the "Seventh Five-Year Plan" for the economic construction of the CPC Central Committee. The US National Counterintelligence Executive Office reported in 2011 that this program provided various funds and guidelines for the Chinese People's Liberation Army and hackers to obtain US technology and sensitive economic information. Then, it goes on to analyze the "301 clause" survey update report, which was released by the US Trade Representative Office in 2018, directly pinned down the CCP for using the secret hacker organization APT10 to lock in the industry highlighted in the "Thirteenth Five-Year Plan 2016-2020" technology policy. In recent years, due to the implementation of Netcom equipment and the future network security of 5G infrastructure, Chinese state-owned enterprises such as ZTE and Huawei triggered uneasiness world-wide about China's vision of governance network space, including the over-limit use of network warfare, the concept of cyberspace freedom in the United States, finding new global network governance models, and embracing different definitions of network security which shifting away from Western countries’. Moreover, from the early development of China's network strategy to the latest establishment of a national information security strategy and network governance organization (i.e. the CCP Central Network Security and Informatization Commission), evdience has shown that structural adjustment and the creation of the PLA's Strategic Support Force to promote cyberspace security are the Chinese government's top priority governance program.
In the concluding chapter of this thesis, it sums up Xi Jinping's guidance on his policy of "military and civilian integration," which has played an important role in the long-term development track of the cooperation and development of traditional military-civilian organizations. In recent years, it has become the most favorable tool for political and economic network espionage activities in Mainland China. Looking forward to China's model of domestic network governance and overseas network cyber hacking, it is trying to create a super-strong international political landscape in cyberspace. In the future, while pursuing Internet monopoly, it will also cause global network political conflicts and frictions. Events with disputes will be foreseeable.
|
author2 |
盧業中 |
author_facet |
盧業中 邱建嶧 |
author |
邱建嶧 |
spellingShingle |
邱建嶧 The Organization and Actions of China\'s Cyber Warfare under Xi Jinping |
author_sort |
邱建嶧 |
title |
The Organization and Actions of China\'s Cyber Warfare under Xi Jinping |
title_short |
The Organization and Actions of China\'s Cyber Warfare under Xi Jinping |
title_full |
The Organization and Actions of China\'s Cyber Warfare under Xi Jinping |
title_fullStr |
The Organization and Actions of China\'s Cyber Warfare under Xi Jinping |
title_full_unstemmed |
The Organization and Actions of China\'s Cyber Warfare under Xi Jinping |
title_sort |
organization and actions of china\'s cyber warfare under xi jinping |
publishDate |
2019 |
url |
http://ndltd.ncl.edu.tw/handle/twt5u2 |
work_keys_str_mv |
AT qiūjiànyì theorganizationandactionsofchinascyberwarfareunderxijinping AT qiūjiànyì xíjìnpíngzhǔzhèngxiàzhōngguódewǎnglùzhànzhīzǔzhīyǔzuòwèi AT qiūjiànyì organizationandactionsofchinascyberwarfareunderxijinping |
_version_ |
1719298406028935168 |