透過您的圖書館登入
IP:3.12.73.64
  • 期刊

川普時期美中網路戰略競逐:以建構主義「敵對共生」途徑分析

The U.S.-China Competition of Cyber Strategy in the Trump Administration: An Analysis using the Constructivism "Adversary Symbiosis" Approach

摘要


資訊時代,數據就是資產,運作在自由、開放的網際空間中,創新人類的生活方式,也開創繁榮的契機。同時,利益競逐與層出不窮的資訊安全問題,也在邊界模糊的網路場域中應運而生,甚至產生資訊武器化的現象,是以世界各國多致力於網路治理研究、大力構築網路安全建設、設立專責機關、研訂相關法規,並尋求國際協作,資安議題顯已超越科技範疇,成為國家重要的戰略選擇。網路戰是資訊戰中的一環,網路戰指的是敵對雙方運用網路技術,企圖在政治、經濟、軍事和科技等領域為爭奪優勢所進行的競爭,本文試就建構主義「敵對共生」途徑,從軍工複合體、自群體的內在團結及投射認同,這三個「敵對共生」型態,分析川普時期中美兩國於網路戰略的競逐狀況,發現從「軍工複合體」來看,雙方都同時在建構發展自己的軍工企業及支持的駭客組織,而「自群體的內在團結」即是能善用網路,凝聚國內民眾的向心,雙方都在「投射認同」,建構對方為敵人,中美兩國均希冀能善用網路戰略,使在大國競爭中,期能獲取較高成功之公算,但是「敵對共生」理論操作,雖有利於凝聚共識,強化內部團結,但也可能加深自我與他者之間的敵意。深化的敵意,反過來限制操作「敵對共生」者的行動自由,讓操作者無法選擇妥協或讓步。

並列摘要


In this information-driven era, data is a valuable asset. In a free and open network space, data can be used to inspire lifestyle-changing innovations, creating opportunities for communal prosperity. Meanwhile, issues such as conflict of interests, countless information security breaches, and even information weaponization have also emerged in the cyber space due to its fuzzy boundaries. Therefore, many countries in the world are conducting research on network governance, building cyber security infrastructure, creating dedicated agencies, establishing new laws and regulations, and seeking international cooperation. As a result, the issues of information security have transcended from the scope of science and technology and become an important topic of the national strategy. Cyber warfare is a part of information warfare and happens when a country and its rival compete to establish and enhance superiority in the domains of politics, economy, military, and science by employing network technology. Using the framework of "adversary symbiosis" from Constructivism, we analyze the competition of cyber strategy between China and the United States during the Trump Administration in this article. We examine the symbiosis from three different perspectives: military-industrial complex, in-group solidarity, and projective identification. First, from the perspective of military-industrial complex, we can find that U.S. and China are developing and expanding military and industrial enterprises as well as supporting hacker organizations. Second, according to the in-group solidarity, both countries would be making the best use of the Internet to unify public sentiment. Lastly, from the aspect of projective identification, the two countries are depicting each other as an enemy. Both the US and China aim to achieve higher chances of success in their competition by incorporating cyber strategies. Although the use of "adversary symbiosis" for a country could align public opinions and strengthen social solidarity, it could also deepen hostility between that country and its rivals. This escalated hostility could, in return, restrict options available to the country that employs "adversary symbiosis" by removing any chance of a comprise or concession.

參考文獻


Hodgson, Q. E. & Ma, L. & Marcinek, K. & Schwindt, K. (2019). Fighting Shadows in the Dark Understanding and Countering Coercion in Cyberspace. RAND Corporation. https://www.rand.org/pubs/research_reports/RR2961.html Hyvärinen, N. (2017, Sep. 29). APT1: What Happened Next? F-Secure. https://blog.f-secure.com/apt1-what-happened-next Intrusion Truth (2020, Jan. 15). Hainan Xiandun Technology Company Is APT40. https://intrusiontruth.wordpress.com/2020/01/15/hainan-xiandun-technology-company-is-apt40 Intrusion Truth (2020, Jan. 16). APT40 is run by the Hainan department of the Chinese Ministry of State Security. https://intrusiontruth.wordpress.com/2020/01/16/apt40-is-run-by-the-hainan-department-of-the-chinese-ministry-of-state-security/#more-587
Johnson, S. J. (2018). China’s Vision of the Future Network-centric Battlefield: Cyber, Space and Electromagnetic Asymmetric Challenges to the United States. Comparative Strategy. 37 (5): 373-390. https://doi.org/10.1080/01495933.2018.1526563
Mercer, J. (1995). Anarchy and identity. International Organization, 49(2): 229-252.
Shibaev, D. & Uibo, N. (2016). State Policy Against Information War. Russian Law Journal, 4(3): 136-156.
Wendt, A. (1999). Social Theory of International Politics. England: Cambridge University Press.

延伸閱讀