PREVENTING NUCLEAR WAR BETWEEN CHINA AND THE U.S. OVER TAIWAN
  • Welcome
  • E-Books
    • Strait Talk >
      • Chapter 1: Historical, Cultural, Legal, and Geographical Factors
      • Chapter 2: The Political Factor
      • Chapter 3: The Economic Factor
      • Chapter 4: The Military Factor
      • Chapter 5: The Issues
      • Chapter 6: The Negotiations
      • Chapter 7: Conclusions
      • Appendices
      • Images
    • An Analysis of China's National Interests
    • One China, Five Interpretations
  • Blogs
  • Cross-Strait Info
    • Cross-Strait Timeline >
      • 2018-2019
      • 2016-2017
      • 2000-2015
      • 1980-1999
      • 1950-1979
      • 1911-1949
      • pre 1911
    • Official Documents >
      • Official Documents Library
      • 中国人民共和国​
      • 中華民國 (台湾)
    • Major Actors >
      • PRC
      • ROC
      • US
      • Japan
    • Military Balance
    • Political Warfare
    • Key Issues >
      • 1992 Consensus
      • Anti-Secession Law
      • One China
      • 'One Country, Two Systems'
      • Status Quo
      • Taiwan Independence
      • Taiwan Strait Crises
      • U.S. Arms Sales
      • Use of Force
    • Cooperation >
      • ROC
      • PRC
      • Signed Agreements
      • Cross-Strait Links
      • Peace Proposal
      • Military Talks
    • Glossary
    • Additional Resources on Cross-Strait Relations >
      • Books
      • Reports, Articles & Interviews
      • Multimedia
  • Photos
    • A Photographic Journey Through Old China

CYBERSPACE: U.S.-PRC-TAIWAN RELATIONS

Picture
Picture
Picture

​CYBERSPACE

There are no clear criteria yet for determining whether a cyberattack is criminal, an act of hactivism, terrorism, or a nation-state’s use of force equivalent to an armed attack. Likewise, no international, legally binding instruments have yet been drafted explicitly to regulate inter-state relations in cyberspace.
CRS: Cyberwarfare and Cyberterrorism: In Brief (2015)

Background on Cyberspace

Picture
Coming soon.


Implications for the Cross-Strait Relationship

Picture
Coming soon.

CYBERSPACE

Picture
Picture
Picture
CYBERSECURITY ISSUES AND CHALLENGES: IN BRIEF

Cyberspace has been called the fastest evolving technology space in human history, both in scale and properties.  

Picture
CRS REPORTS
Cybersecurity: Legislation, Hearings, and Executive Branch Documents (2017)
​


Defense Primer: Cyberspace Operations (2016)

​
Cybersecurity Issues and Challenges: In Brief (2016)


Cyberwarfare and Cyberterrorism: In Brief (2015)


Cyber Operations in DOD Policy and Plans: Issues for Congress (2015) 


Cybersecurity: Data, Statistics, and Glossaries (2015)
Picture
UNITED STATES
Statement by President Donald J. Trump on the Elevation of Cyber Command (2017)


National Security Strategy (2017)


Executive Order -- "Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities" (2015)


Our Latest Tool to Combat Cyber Attacks: What You Need to Know (2015)​


​Expanding Our Ability to Combat Cyber Threats (2015)


National Security Strategy (2010) 
Picture
UNITED STATES POLICY DIRECTIVES
Presidential Policy Directive / PPD-20 ​
​
National Security Presidential Directive (NSPD)-54/Homeland Security Presidential Directive (HSPD)-23 on "Cybersecurity Policy" of January 8, 2008

PPD-8 on "National Preparedness" of March 30, 2011

National Security Presidential Directive (NSPD)-38 of July 7, 2004

National Security Directive (NSD)-42 on "National Policy for the Security of National Security Telecommunications and Information Systems" of July 5, 1990

Picture
UNITED STATES CONGRESS
H.R. 5576, Cyber Deterrence and Response Act of 2018
​

H.R. 3776 Cyber Diplomacy Act of 2017
​

H.R. 600 Digital Global Access Policy Act
Picture
UNITED STATES DEPARTMENT OF DEFENSE
Department of Defense / Defense Science Board: Task Force on Cyber as a Strategic Capability (June 2018)
​
Department of Defense: Cyber Strategy


Department of Defense Cyber Strategy (2015)


Picture
UNITED STATES DEPARTMENT OF JUSTICE

Department of Justice: An Overview of Cybersecurity and Cybercrime in Taiwan 

Picture
UNITED STATES DEPARTMENT OF COMMERCE
Department of Commerce:  Cyber Security: Overview, Regulatory Trends, and Opportunities in Taiwan 

Picture
THE WASSENAAR ARRANGEMENT
​New Changes To Wassenaar Arrangement Export Controls Will Benefit Cybersecurity
Statement by the Plenary Chair on 2017 Outcomes, 7 Dec. 2017
List of Dual-Use Goods and Technologies & Munitions List (Dec. 2017)
What is the Wassenaar Arrangement?
Picture
OTHER REPORTS
ASPI: Cyber trends in 2017: the rise of the global cyberattack (2017)
ASPI: ​Cyber Maturity in the Asia Pacific Region (2017)
Brookings Institution: Cybersecurity and US-China Relations (2012)
Picture
CHINA
Core technology depends on one's own efforts: President Xi (2018)
Translation: Xi Jinping’s  Speech at the National Cybersecurity and Informatization Work Conference (2018)
China-developed cyber mimic defense withstands 500,000 attacks (2018)
Xi outlines blueprint to develop China's strength in cyberspace (2018)
International Strategy of Cooperation on Cyberspace (2017)
Cyberspace Security Strategy (in Chinese) (2016)
PRC Internet Security Law (in Chinese) (2016)
Picture
ADDITIONAL RESOURCES
Australian Strategic Policy Institute (ASPI)
Council on Foreign Relations: Digital and Cyberspace Policy Program
Cross-Taiwan Strait Relations in an Era of Technological Change: Security
Cyberspace in Peace and War (Transforming War)
Shaping the Cyber Arms Race of the Future
Taiwan a canary in the coalmine of cyber warfare
Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation 
Deciphering China’s AI Dream 
National Security Archive’s Cyber Vault Project: CyberWar Map
National Security Archives ​Cyber Brief: Threats from the Chinese Telecom Industry
Picture
TAIWAN
New regulations to boost cybersecurity (2018)
Information and Communication Security Management Act (資通安全管理法)
Military hospitals endure 162m cyberattacks: report (2018)
​National Cyber Security Program of Taiwan (2017 to 2020)
National Center for Cyber Security Technology (NCCST) ​
The National Information and Communication Security Taskforce (NICST)
National Computer Emergency Response Team (TWNCERT) 
Strengthening Taiwan’s cybersecurity capabilities
Picture
​Taiwan National Defense Report (2013)
About us


Policies
Search
Copyright © 2018 The East Asia Peace & Security Initiative. All Rights Reserved. 
  • Welcome
  • E-Books
    • Strait Talk >
      • Chapter 1: Historical, Cultural, Legal, and Geographical Factors
      • Chapter 2: The Political Factor
      • Chapter 3: The Economic Factor
      • Chapter 4: The Military Factor
      • Chapter 5: The Issues
      • Chapter 6: The Negotiations
      • Chapter 7: Conclusions
      • Appendices
      • Images
    • An Analysis of China's National Interests
    • One China, Five Interpretations
  • Blogs
  • Cross-Strait Info
    • Cross-Strait Timeline >
      • 2018-2019
      • 2016-2017
      • 2000-2015
      • 1980-1999
      • 1950-1979
      • 1911-1949
      • pre 1911
    • Official Documents >
      • Official Documents Library
      • 中国人民共和国​
      • 中華民國 (台湾)
    • Major Actors >
      • PRC
      • ROC
      • US
      • Japan
    • Military Balance
    • Political Warfare
    • Key Issues >
      • 1992 Consensus
      • Anti-Secession Law
      • One China
      • 'One Country, Two Systems'
      • Status Quo
      • Taiwan Independence
      • Taiwan Strait Crises
      • U.S. Arms Sales
      • Use of Force
    • Cooperation >
      • ROC
      • PRC
      • Signed Agreements
      • Cross-Strait Links
      • Peace Proposal
      • Military Talks
    • Glossary
    • Additional Resources on Cross-Strait Relations >
      • Books
      • Reports, Articles & Interviews
      • Multimedia
  • Photos
    • A Photographic Journey Through Old China