Taiwan Under Siege: 
The Chinese Cyber Threat

China-based hackers have increased their attempts to disrupt Taiwanese services and these attempts have additionally become increasingly sophisticated. This has involved the targeting of critical Taiwanese infrastructure and also the Taiwanese military. Taiwanese cybersecurity experts have also stated that Taiwan is preparing for a ‘cyber D-day’ in the event of a potential outbreak of conflict. Additionally, hacking attempts have targeted companies in Taiwan in order to cause mass disruption to the already targeted economy which is under threat from Chinese cyber incursions.

Key Judgment 1. It is highly likely that China-based hackers will increase hacking attempts against telecommunication and chip production companies. 

Key Judgment 2. It is highly likely that China-based hackers will increasingly target the Taiwanese military in order to compromise communications networks and command-and-control systems.

Key Judgment 3. It is highly likely that China-based hackers will escalate hacking attempts targeting Taiwanese society and critical infrastructure to cause widespread disruption and undermine public confidence. 

Rest of this post is for paying members only

Already have an account?  Log in

Free Plan
Free
Secret Plan
$14.99
/ month
Recommended
Top Secret Plan
$39.99
/ month
Free Plan
Free
Secret Plan
$14.99
/ month
Recommended
Top Secret Plan
$39.99
/ month
Table of Contents

Related Content

Terrorism in Ghana: A 6-month Outlook

Location:_ West Africa

Russia’s New Nuclear Doctrine: Strategic Implications

Location:_ Europe

Shadow Fleet: Russia’s Sanction Dodging Oil Tankers

Location:_ Eurasia, Europe

Fire from Above: The Impact of Ukraine’s Dragon Drones

Location:_ Europe

Eritrea’s Hybrid Warfare: A Situational Assessment

Location:_ Horn of Africa

Jihadist Advance: Mali Security Threat Assessment 

Location:_ West Africa

Stay in the loop

Get a free weekly email that makes reading intel articles and reports actually enjoyable.

Log in

Stay in the loop

Get a free weekly email that makes reading Intelligence Reports and Articles actually enjoyable.

Table of Contents

Contact

Contact

"*" indicates required fields

This field is for validation purposes and should be left unchanged.