Taiwan Under Siege: 
The Chinese Cyber Threat

China-based hackers have increased their attempts to disrupt Taiwanese services and these attempts have additionally become increasingly sophisticated. This has involved the targeting of critical Taiwanese infrastructure and also the Taiwanese military. Taiwanese cybersecurity experts have also stated that Taiwan is preparing for a ‘cyber D-day’ in the event of a potential outbreak of conflict. Additionally, hacking attempts have targeted companies in Taiwan in order to cause mass disruption to the already targeted economy which is under threat from Chinese cyber incursions.

Key Judgment 1. It is highly likely that China-based hackers will increase hacking attempts against telecommunication and chip production companies. 

Key Judgment 2. It is highly likely that China-based hackers will increasingly target the Taiwanese military in order to compromise communications networks and command-and-control systems.

Key Judgment 3. It is highly likely that China-based hackers will escalate hacking attempts targeting Taiwanese society and critical infrastructure to cause widespread disruption and undermine public confidence. 

Rest of this post is for paying members only

Already have an account?  Log in

Free Plan
Free
Secret Plan
$14.99
/ month
Recommended
Top Secret Plan
$39.99
/ month
Free Plan
Free
Secret Plan
$14.99
/ month
Recommended
Top Secret Plan
$39.99
/ month
Table of Contents

Related Content

Chinese Cyber Espionage and the Dutch Political Scene

Location:_ Europe, Far East

North Korea: Trash Balloons and the Return of Cold War Tactics

Location:_ Far East

Taiwan and Legislative Contempt: A Situational Assessment

Location:_ Far East

A New North Korea-Russia Alliance

Location:_ Eurasia, Far East

Indo-Qatari Relations: A Spy Scandal in Qatar

Location:_ MENA

Russian Warheads in Cuba: “Cuban Missile Crisis” Part II?

Location:_ Latin America, Europe

Stay in the loop

Get a free weekly email that makes reading intel articles and reports actually enjoyable.

Log in

Stay in the loop

Get a free weekly email that makes reading Intelligence Reports and Articles actually enjoyable.

Table of Contents

Contact

Contact

"*" indicates required fields

This field is for validation purposes and should be left unchanged.