E-book
Author Krejsa, Harry, author

Title Phishing in troubled waters : confronting cyber espionage across the Pacific and the Strait of Taiwan / Harry Krejsa and Hannah Suh
Published Washington, DC : Center for a New American Security, [2017]
©2017

Copies

Description 1 online resource (16 pages) : color illustrations
Contents Executive summary -- Taiwan and the United States are China's biggest targets -- The nature of the threat to the United States -- Notable hacks in the United States -- The nature of the threat to Taiwan -- Notable hacks in Taiwan -- Toward collaborative solutions -- Policy recommendations
Summary "Because China's two chief targets of strategic attention are the United States and Taiwan, they are understandably also Beijing's chief targets of cyberattack and espionage. Both countries have high-skilled economies with open, democratic systems, and Washington and Taipei unfortunately possess comparable vulnerabilities to cyberattacks. Facing similar threats and suffering from similar weaknesses, the United States and Taiwan should collaborate on developing shared solutions. This report analyzes the asymmetric nature of cyber capabilities that make the United States and Taiwan so attractive for Chinese strategic planners. It examines the immense costs -- tangible and intangible -- that have been borne by the United States and Taiwan as a result of Chinese cyber intrusions so far. The diffuse nature of these costs also explains why the private sector has not yet been able or willing to fully develop the technologies and practices necessary to significantly hinder these attacks. Because of poor private-sector incentives to confront cybersecurity more directly, interventions and initiatives by the U.S. and Taiwanese governments will increasingly be necessary. This will require thinking about cybersecurity more as a domain of conflict requiring continuous attention and strategic analysis than as a singular issue to be mitigated with ad hoc policy tweaks. Washington and Taipei will need to approach the shared threat of Chinese cyber capabilities collaboratively, but also innovatively. Cyber threats will not be mitigated through traditional templates of bilateral cooperation, whether they are joint production agreements or memoranda of understanding on information sharing. Rigorous real-world exercises to identify existing gaps in capabilities and gauge progress over time on rectifying them, and more specialized government-to-government contacts must be developed through the Department of Homeland Security and its Taiwanese counterparts. International public-private partnerships will be a necessary start -- with the crucial supplement of learning about confronting asymmetric threats strategically from successful counterterrorism initiatives. This administration has already shown a willingness to nudge U.S.-Taiwan relations beyond what has previously been considered politically palatable -- which may augur well for such experimentation in cyber collaboration"--Publisher's web site
Notes "April 2017."
Bibliography Includes bibliographical references (pages 13-16)
Notes Description based on online resource; title from PDF title page (CNAS, viewed April 11, 2017)
Subject Cyberterrorism -- China
Cyberterrorism -- United States -- Prevention
Cyberterrorism -- Taiwan -- Prevention
Cyberterrorism -- Prevention -- International cooperation
Cyberterrorism.
Cyberterrorism -- Prevention.
China.
Taiwan.
United States.
Form Electronic book
Author Suh, Hannah, author
Center for a New American Security, publisher.