Title

網路戰︰新型態的現代戰爭

Translated Titles

Cyber Warfare:The Chalice of Modern Warfare

Authors

紀冠廷

Key Words

網軍 ; 軟實力 ; 資訊權力 ; 網路攻擊 ; 網路戰 ; 駭客 ; Cyber Army ; Information edge ; Information power ; Cyber Attack ; Cyberwarfare ; Cyberwar ; Hacker

PublicationName

中正大學戰略暨國際事務研究所學位論文

Volume or Term/Year and Month of Publication

2015年

Academic Degree Category

碩士

Advisor

林泰和

Content Language

繁體中文

Chinese Abstract

摘要 網路的重要性在當今已經是不可言喻,從早期只有電腦有辦法連結網路,到現在人手一部的行動、穿戴裝置,甚至是近年提出的「物連網(Internet of Things)」,都顯示了網路所帶來的全面性轉變。如同十九世紀的工業革命一樣,2000年曾經被稱為第二次工業革命或是「資訊革命」,也由於網路就是資訊革命的基載來源,因此本文的第一部分主要先介紹網路的起源,包含一些網路架構的基礎知識,透過這個部份能讓讀者對網路有基礎的認識。 第二部分主要探討的是網路在各個層面所帶來的轉變,舉凡政治、軍事、國防、資訊(網路)安全。自古以來,「資訊」不論是在哪種方面一直都是非常有價值的,上至國家下至人民無一例外,例如國際政治上的外交密電、軍事國防上的情報、國家內部的政策宣傳、公司行號的專利技術皆然。然而網路技術入門的門檻較一般技術為低,傳統戰爭中只有國對國的層級也逐漸被網路技術的進步所改變,許多國家對於資訊安全的重視也日益明顯,美中兩國甚至公開招募「網軍」,我們不難發覺網路對世界的影響日益深遠。 本文最後一個部分列舉了實際應用的案例做為依據,目的在強調小至網路攻擊大至網路戰都並非與我們遙不可及,相對的,網路攻擊卻是時時刻刻在我們身邊上演,甚至每個人都有機會參予其中。而網路攻擊本身並不可怕,藉由文中的一些案例可以知道,網路與駭客的關係並不像一般人認知中只有負面的意思,我們只需要了解網路中這些事情的原因並面對或是改正它。 關鍵字:網路戰、網路攻擊、資訊權力、網軍、駭客

English Abstract

Abstract Internet (and cyber) now becomes more important than old days, from the days that computer is the only way for connection, to now everyone can easily connect to internet just by their own mobile device. In these years, we got a new type of connection called –”Internet of Things”. Just like industrial revolution in 19th century, we got the second industrial revolution also known as “Information Revolution” in 2000. Since internet is the origin of Information Revolution, I will begin with the basic knowledge of internet framework in part one, so that readers can have basic concept of internet. The second part is mainly about the transformation in each layer of internet, such as politics, military, national defense and information (cyber) security. In all the ages, information is always valuable no matter in which field such as, diplomatic cables, military (technology) intelligence, domestic propaganda and patented technology. However, the access to cyberspace is usually no need of advanced technic, making the concept of war we know start to change. Today most countries began to realize the importance of cyber security. Some of them even recruit “cyber army” publicly such as U.S. and China. The last part of this thesis lists lots of real cases, proving that cyberwarfare is not far from us, and even the tiniest cyber attack is always affecting and around us. Moreover you can join them and to be part of them. Nevertheless cyberwarfare sounds terrifying and dangerous, you will understand cyber and hacker are not always negative by learning the cases in this thesis. The most important thing we should know is to understand how the cyber works and the reasons of things cause and fix it. Keywords: Cyberwar, Cyberwarfare, Cyber Attack, Information power, Information edge, Cyber Army, Hacker

Topic Category 社會科學院 > 戰略暨國際事務研究所
社會科學 > 政治學
Reference
  1. Jomini, Antoine Henri著,鈕先鍾譯,戰爭藝術(台北:麥田,2014年)。
    連結:
  2. Richard A. Clarke, Robert K. Knake著,王文勇譯,網路戰爭:下一個國安威脅及因應之道(台北:國防部政務辦公室,2014年)。
    連結:
  3. 胡光夏,「2003 年美伊戰爭新聞處理之研究」,復興崗學報,第78期(2003年1月),頁193-220。
    連結:
  4. 梁德昭,朱志平,林凱薰,「國家主權延伸至網路空間之討論」,前瞻科技與管理,第2卷2期(2012年11月)。
    連結:
  5. 王建南,「資訊環境變遷與資訊權力建構之研究─兼論中共資訊權力」,淡江大學戰略研究所碩士論文,2007年1月。
    連結:
  6. 施旐揚,「台灣發展核武的機會與限制」,中正大學戰略暨國際事務研究所碩士論文,2011年7月。
    連結:
  7. 徐雍,「社群網站與恐怖組織應用研究:以「伊斯蘭國」為例」,中正大學戰略暨國際事務研究所碩士論文,2014年12月。
    連結:
  8. The U.S. National Archives and Records Administration, Bill of Rights, Accessed April 1, 2015, http://www.archives.gov/exhibits/charters/bill_of_rights_transcript.html.
    連結:
  9. Clausewitz, Carl Von, Vom Kriege.
    連結:
  10. Daniel Kuehl, “From Cyberspace to Cyberpower: Defining the Problem,” in Franklin D. Kramer, Stuart H. Starr & Larry K. Wentz (eds.), Cyberpower and National Security (Dulles, VA: Potomac Books, 2009), pp. 25-31.
    連結:
  11. Morozov, Evgeny, The net delusion: the dark side of Internet freedom (New York: PublicAffairs, 2011).
    連結:
  12. Lasswell, Harold D., Propaganda Technique In The World War (New York: Peter Smith, 1938).
    連結:
  13. Levy, Steven, HACKERS, Heroes of the Computer Revolution (New York: Dell Publishing, 1994).
    連結:
  14. Lonsdale, David, The Nature of War in the Information Age: Clausewitzian Future (London: Frank Cass, 2004).
    連結:
  15. Nye, Joseph S., Bound to Lead: The Changing Nature of American Power (New York: Basic Books, 1990).
    連結:
  16. Nye, Joseph S., Soft Power: The Means to Success in World Politics (New York: Public Affairs, 2004).
    連結:
  17. Schelling, Thomas C., The Strategy of Conflict (Boston: Harvard University Press, 1980).
    連結:
  18. Boyd, Danah M., Ellison, Nicole B., "Social Network Sites: Definition, History, and Scholarship, " Journal of Computer-Mediated Communication Vol.13, No.1, 2008, pp. 210-230.
    連結:
  19. Jervis, Robert, “Cooperation Under the Security Dilemma,” World Politics, Vol.30, Issue 2(1978), pp.167-214.
    連結:
  20. Parker, Kevin L., “The Utility of Cyberpower,” Military Review, May-June/2014, pp. 26-33.
    連結:
  21. 一、中文部份
  22. (一)政府文件
  23. 中國國防部,「《2010年中國的國防》白皮書」,網址:http://www.mod.gov.cn/affair/2011-03/31/content_4249942.htm。最後瀏覽日期:2015年3月18日。
  24. 國防部,國軍簡明美華軍語辭典(台北:國防部史政編譯局,五版,2009年)。
  25. 國家發展委員會,「歷年數位機會(落差)調查報告」,網址:http://www.ndc.gov.tw/m1.aspx?sNo=0028380。最後瀏覽日期:2015年3月2日。
  26. (二)書籍
  27. Armistead, Leigh著,國防部譯,資訊作戰─以柔克剛的戰爭(台北:國防部史政編譯室,2008年)。
  28. Arquilla, John, Ronfeldt, David著,國防部譯,網路及網路戰(台北:國防部史政編譯室,2003年)。
  29. Carl Von Clausewitz著,Roger Ashley Leonard編,鈕先鍾譯,戰爭論精華(台北:麥田,1996年)。
  30. David W. Stewart著,董旭英、黃怡娟譯,次級資料研究方法(台北:弘智文化,2000年)。
  31. Gibson, William著,李家沂譯,神經喚術士(台北:開元書印,2012年)。
  32. Goodell, Jeff著,但唐謨譯,網路獵殺─全球首號通緝駭客落網紀實(台北:遠流,1997年)。
  33. Hennie Boeije著,張可婷譯,質性研究分析方法(新北市:韋伯文化國際出版公司,2013年)。
  34. Joseph S. Nye著,李靜宜譯,權力大未來 :軍事力、經濟力、網路力、巧實力的全球主導(台北:天下遠見,2011年),
  35. Larry K. Wentz, Charles L. Barry, Stuart H. Starr著,李健、嚴美譯,網絡戰:美軍稱霸全球的第五戰場(香港:新點出版社,2010年)。
  36. 毛澤東,中國革命戰爭的戰略問題,(華北:新華書店,1947年)。
  37. 王宏林,孫子兵法,(香港:中華書局,2012年)。
  38. 克勞塞維茨,戰爭論,(南京市:譯林出版社,2010年)。
  39. 祝基瀅,政治傳播學(臺北市:三民,1983年)。
  40. 彭懷恩,政治傳播:理論與實踐(台北:風雲論壇,2007年)。
  41. 鈕先鍾,西方戰略思想史(台北:麥田,1995年)。
  42. 鈕先鍾,現代戰略思潮(台北:黎明文化,1989年)。
  43. 蔡清田編,社會科學研究方法(台北:五南圖書出版,2013年)。
  44. 蔣百里、劉邦驥合著,孫子淺說(香港:中和出版有限公司,2013年)。
  45. 賴榮偉,國際關係及國際組織(台北︰保成,2010年)。
  46. (三)期刊
  47. 高一中譯,「網權在21世紀聯合作戰的角色」,國防譯粹,第42卷第2期(2015年2月),頁14-27。
  48. 章昌文,「論網權發展」,國防譯粹,第42卷第2期(2015年2月),頁4-13。
  49. (四)學位論文
  50. 吳竹君,「資訊時代與外交」。政治大學外交研究所碩士論文,2000年6月。
  51. 林文茂,「資訊化情報網安全基礎之研究」,國防大學資訊研究所碩士論文,2004年6月。
  52. 湯君年,「網路恐怖主義對國際網路安全之影響」,國防大學政治研究所碩士論文,2012年6月。
  53. (五)其他
  54. 「天主教徒的增長速度較全球人口還要快」,網址:https://www.youtube.com/watch?v=3knIIghYICs。最後瀏覽日期:2015年2月16日。
  55. 「臉書全球大當機 稱疏失非駭客攻擊」,中央社,網址:http://www.cna.com.tw/news/firstnews/201501275009-1.aspx。最後瀏覽日期:2015年4月4日。
  56. 36氪,「Yahoo 證實美國政府威脅加入稜鏡計畫,不參與就每天罰 25 萬美元」,網址:http://www.techbang.com/posts/19994-yahoo-officials-confirmed-united-states-government-threatened-to-join-the-prism-program-does-not-participate-in-daily-fined-250000-dollars?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+techbang+%28T客邦+最新文章%29。最後瀏覽日期:2015年4月1日。
  57. Sugizo,「台灣人愛用 Facebook,臉書每天上線人數突破 1000 萬人」,網址:http://www.techbang.com/posts/14523-taiwan-people-love-facebook-punch-share-photos-use-the-number-exceeded-10-million。最後瀏覽日期:2015年3月2日。
  58. tandee,「台菲漁船事件,網友人肉DDoS攻擊菲政府網頁,發動鍵盤開戰」,網址:http://www.techbang.com/posts/13265-philippine-fishing-boat-incident-netizens-human-flesh-ddos-attack-government-web-page。最後瀏覽日期:2015年3月30日。
  59. 大紀元,「納粹戈培爾是怎樣管制新聞媒體的?」,網址:http://www.epochtimes.com/b5/13/10/2/n3977476.htm【網文】納粹戈培爾是怎樣管制新聞媒體的-.html。最後瀏覽日期:2015年2月25日。
  60. 全國法規資料庫,「中華民國憲法」,http://law.moj.gov.tw/LawClass/LawSingle.aspx?Pcode=A0000001&FLNO=4。最後瀏覽日期:2015年1月4日。
  61. 余至浩,「臉書全球大當機是自己出包,臉書:軟體設定出錯!」,網址:http://www.ithome.com.tw/news/88796。最後瀏覽日期:2015年4月4日。
  62. 李世珍,「艾倫主持光明燈護體 策動史上最大咖自拍」,蘋果日報,2014年3月4日,版S04。
  63. 李明賢、仇佩芬,「宣傳經濟推升被當詐騙廣告」,中國時報,2012年10月18日,版a04。
  64. 林寶慶,「反戰 美國大兵看不到 電視、新聞及電影都經過篩選 平均十九、廿歲的水兵們 不少是為免費上大學及獲取經驗而入伍」,聯合報,2003年3月4日,版7。
  65. 武婧雅,「法國小學從九月起將電腦編程課程列入選修課」,中國網,網址:http://big5.china.com.cn/gate/big5/news.china.com.cn/world/2014-07/15/content_32952579.htm。最後瀏覽日期:2015年3月22日。
  66. 曹國維「把屍體堆上去 畫面才算完整 報紙批歸批 依然鉅細靡遺 BBC派出兩百記者 退役將領趕場論戰」,聯合報,2003年3月4日,版4。
  67. 曹逸雯,「不敵網友反彈聲浪 智慧局封鎖境外侵權網站政策大轉彎」,NOW news,網址:https://tw.news.yahoo.com/不敵網友反彈聲浪-智慧局封鎖境外侵權網站政策大轉彎-111139690.html。最後瀏覽日期:2015年4月2日。
  68. 陳宜誠,吳添聰,「立法不准國人瀏覽境外侵權網站是否違憲?」,北美智權報,網址:http://www.naipo.com/Portals/1/web_tw/Knowledge_Center/Laws/TW-22.htm。最後瀏覽日期:2015年4月2日。
  69. 陳柏誠,「Google風波延燒 中美網戰 一觸即發」,自由時報,2010年1月26日,版a01。
  70. 陳曉莉,「資安業者分析毀滅性網路攻擊惡意程式:Sony Pictures內部網路早就被摸透!」,網址:http://www.ithome.com.tw/news/92853。最後瀏覽日期:2015年4月4日。
  71. 華夏經緯網,「透視二戰英國宣傳戰 曾被納粹德國宣傳天才稱讚」,網址:http://big5.huaxia.com/js/gc/2008/00799042.html。最後瀏覽日期:2015年2月25日。
  72. 華爾街日報,「維基解密網站美國域名服務被暫停」,網址:http://cn.wsj.com/big5/20101203/bus184244.asp。最後瀏覽日期:2015年4月4日。
  73. 黃智勤,「Google施密特:世界變有趣網路將消失 變成無所不在」,聯合報,第版aa02。
  74. 戴雅真,「國安範圍擴及網路 立院4/2審查」,中央社,網址:http://www.cna.com.tw/news/aipl/201503280294-1.aspx。最後瀏覽日期:2015年4月2日。
  75. 臉書掛點前 中國3波數位「導彈」襲美,蘋果日報,網址:http://www.appledaily.com.tw/realtimenews/article/new/20140619/419474/。最後瀏覽日期:2015年4月4日。
  76. 趨勢科技,「2014 新聞回顧」,網址:http://www.trendmicro.tw/tw/about-us/newsroom/releases/articles/20141226081155.html。最後瀏覽日期:2015年3月30日。
  77. 蘋果日報,「糗宣導片太腦殘網友圍剿政院被YouTube下架」,蘋果日報,2012年10月18日,版a01。
  78. 二、外文部份
  79. (一)政府文件(Official Documents)
  80. Barack Obama, “Remarks by the President on Securing Our Nation’s Cyber Infrastructure”, May 29, 2009, Accessed March 19, 2015, https://www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure/.
  81. Càmara de Diputados de Chile, Càmara Aprueba Modificaciones del Senado a Proyecto que Protege Derechos de Usuarios de Internet, July 13, 2010, Accessed April 4, 2015, http://www.camara.cl/prensa/noticias_detalle.aspx?prmid=38191.
  82. DOD, The DOD Cyber Strategy, April 17, 2015, Accessed May 6, 2015, http://www.defense.gov/home/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf.
  83. DOD, The Guidelines for U.S.-Japan Defense Cooperation, April 27, 2015, Accessed May 1, 2015, http://www.defense.gov/pubs/20150427_--_GUIDELINES_FOR_US-JAPAN_DEFENSE_COOPERATION_FINAL&CLEAN.pdf.
  84. England and Wales High Court (Administrative Court), “McKinnon v USA & Anor [2007] EWHC 762 (Admin),” April 03, 2007, Accessed March 26, 2015, http://www.bailii.org/ew/cases/EWHC/Admin/2007/762.html.
  85. Facebook, Inc., Form S-1REGISTRATION STATEMENT, February 1, 2012, Accessed March 23, 2015, http://battellemedia.com/wp-content/uploads/2012/02/Facebook-S-1.pdf.P69.
  86. FBI, Internet Crime Complaint Center (IC3), 2013, Accessed March 29, 2015, http://www.ic3.gov/media/annualreport/2013_IC3Report.pdf.
  87. FBI, SHAILESHKUMAR P. JAIN, Accessed April 4, 2015, http://www.fbi.gov/wanted/cyber/shaileshkumar-p.-jain/view.
  88. FBI, Update on Sony Investigation, December 19, 2014, Accessed April 4, 2015, http://www.fbi.gov/news/pressrel/press-releases/update-on-sony-investigation.
  89. Homeland Security, What Is Critical Infrastructure, November 1, 2013, Accessed March 28, 2015, http://www.dhs.gov/what-critical-infrastructure.
  90. INTERPO, Jain, Shaileshkumar, Accessed April 4, 2015, http://www.interpol.int/notice/search/wanted/2014-54671.
  91. Lamar Smith, H.R.3261 - Stop Online Piracy Act, October 26, Accessed April 1, 2015, https://www.congress.gov/bill/112th-congress/house-bill/3261.
  92. Law Lords Department, “House of Lords - Mckinnon V Government of The United States of America and Another,” July 30, 2008, Accessed March 25, 2015, http://www.publications.parliament.uk/pa/ld200708/ldjudgmt/jd080730/mckinn-1.htm.
  93. Leon E. Panetta, “The history of cyber attacks - a timeline,” Accessed March 19, 2015, http://www.nato.int/docu/review/2013/cyber/timeline/EN/index.htm.
  94. Remove United States District Attorney Carmen Ortiz from office for overreach in the case of Aaron Swartz, January 12, 2013, Accessed April 4, 2015, https://petitions.whitehouse.gov/petition/remove-united-states-district-attorney-carmen-ortiz-office-overreach-case-aaron-swartz.
  95. U.S.-CHINA ECONOMIC and SECURITY REVIEW COMMISSION, “2007 Annual Report to Congress”, November 15, 2007, Accessed March 19, 2015, http://origin.www.uscc.gov/sites/default/files/annual_reports/2007-Report-to-Congress.pdf.
  96. Vint Cerf, U.S. Senate Committee on Commerce, Science, and Transportation's hearing on network neutrality, February 7, 2006, Accessed April 4, 2015, http://www.commerce.senate.gov/pdf/cerf-020706.pdf.
  97. (二)書籍(Books)
  98. Clarke, Richard A., Knake, Robert K., Cyber War (New York: HarperCollins, 2010).
  99. Department of Defense, Dictionary of Military and Associated Terms (Joint chiefs of staff, 2014).
  100. Gibson, William, Neuromancer (New York: Ace Books, 1984).
  101. Jones, Andy, Kovacich, Gerald L., Luzwick, Perry G. (eds), Global Information Warfare (New York: Auerbach, 2002).
  102. Molander, Roger C., Riddile, Andrew S., Wilson, Peter A. (eds.), Strategic Information Warfare:A New Face of War (Santa Monica: RAND, 1996).
  103. Nye, Joseph S., The Future of Power (New York: Public Affairs, 2011).
  104. Nye, Joseph S., The Future of Power (New York: PublicAffairs, 2011).
  105. Rosenzweig, Paul, Cyber Warfare (California: Praeger, 2013).
  106. Simons, Janet A., Irwin, Donald B., Drinnien, Beverly A., Psychology - The Search for Understanding (New York: West Publishing Company, 1987).
  107. Siroli, Gian Piero, Cyberwar, Netwar and the Revolution in Military Affairs (New York: Palgrave Macmillan, First Edition, 2006).
  108. Thompson B., John, The media and modernity: a social theory of the media (Cambridge: Policy Press, 1995).
  109. Waltz , Kenneth N., Man the State and War (New York: Columbia University Press, 1986).
  110. Wiener, Norbert, Cybernetics: or Control and communication in the animal and the machine (New York: M.I.T. Press, 1961).
  111. Yannakogeorgos, Panayoyis A. and Lowther, Adam B., Conflict and Cooperation in Cyberspace (New York: Taylor & Francis, 2014).
  112. (三)期刊(Journal Articles)
  113. Bonner III, E. Lincoln, “Cyber Power in 21st Century Joint Warfare”, Joint Force Quarterly, Issue 74, 3rd Quarter 2014, pp. 102-9.
  114. Joseph S. Nye, “The Future of American Power-Dominance and Decline in Perspective,” Foreign Affairs (November/December 2010). http://www.foreignaffairs.com/articles/66796/joseph-s-nye-jr/the-future-of-american-power.
  115. Lynn III, William J., “Defending a New Domain: The Pentagon's Cyberstrategy,” Foreign Affairs, Sept/Oct. 2010.
  116. Postel, Jon, Reynolds, Joyce K., “World Wide Web and Internet Numbering and Naming”, The Froehlich/Kent Encyclopedia of Telecommunications Vol.1, 1990, pp. 223-236.
  117. Soares, Marcelo, “Wikileaked cable says 2009 Brazilian blackout wasn’t hackers, either”, Wired, December 6, 2010, Accessed March 19, 2015, http://www.wired.com/2010/12/brazil-blackout/.
  118. The Economist, "Cyberwar: War in the Fifth Domain," The Economist, July 1, 2010, Accessed April 21, 2015, http://www.economist.com/node/16481504?story_id=16481504&source=features_box1.
  119. (四)論文(Dissertations/Theses)
  120. Morgan, Iwan, “The American Economy and America’s Global Power,” Accessed March 29, http://www.lse.ac.uk/IDEAS/publications/reports/pdf/SR009/morgan.pdf.
  121. (五)其他(Other)
  122. “Senate House Approves Changes To Project That Protects Rights Of Internet Users,” July, 2010, Accessed April 25, 2015, http://www.camara.cl/prensa/noticias_detalle.aspx?prmid=38191.
  123. AFP, “WEF 2015: Internet will 'disappear', Google boss Eric Schmidt tells Davos,” January 23, 2015, Accessed May 29, 2015, http://economictimes.indiatimes.com/articleshow/45991616.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst.
  124. Albanesius, Chloe, SOPA: Is Congress Pushing Web Censorship, November 16, 2011, Accessed April 2, 2015, http://www.pcmag.com/article2/0,2817,2396518,00.asp?obref=obinsite.
  125. Albanesius, Chloe, Will Online Piracy Bill Combat 'Rogue' Web Sites or Cripple the Internet, November 1, 2011, Accessed April 2, 2015, http://www.pcmag.com/article2/0,2817,2395653,00.asp#fbid=6r9KNM2HX7x.
  126. Aleteuk, Tom Cruise Scientology Video, January 17, 2008, Accessed March 30, 2015, https://www.youtube.com/watch?v=UFBZ_uAbxS0.
  127. Alexander, William, Barnaby Jack Could Hack Your Pacemaker and Make Your Heart Explode, June 25, 2013, Accessed April 25, 2015, http://www.vice.com/en_ca/read/i-worked-out-how-to-remotely-weaponise-a-pacemaker.
  128. AP, Holder says WikiLeaks under criminal investigation, November 29, 2010, Accessed April 3, 2015, http://www.foxnews.com/us/2010/11/29/holder-says-wikileaks-criminal-investigation/.
  129. Arthur, Charles, LulzSec: what they did, who they were and how they were caught, May 16, 2013, Accessed March 27, 2015, http://www.theguardian.com/technology/2013/may/16/lulzsec-hacking-fbi-jail.
  130. Aziz, Abdel, Mujahadeen Explosives Handbook, February, 1996, Accessed March 26, 2015, http://www.riskintel.com/wp-content/uploads/downloads/2011/06/Mujahideen-Explosive-Book.pdf.
  131. Aziz, Abdel, Mujahadeen Poisons Handbook, February 7, 1996, Accessed March 26, 2015, http://cnqzu.com/library/Guerrilla%20Warfare/Poison%20Handbook-ACADEMIC%20USE%20ONLY.pdf.
  132. BBC, The Interview: A guide to the cyber attack on Hollywood, December 29, 2014, Accessed April 4, 2015, http://www.bbc.com/news/entertainment-arts-30512032.
  133. BBC, Wandsworth Prison escapee Neil Moore faked bail email, March 27, 2015, Accessed April 3, 2015, http://www.bbc.com/news/uk-england-london-32095189.
  134. Bilton, Nick, Internet Activist Charged in M.I.T. Data Theft, July 19, 2011, Accessed April 4, 2015, http://bits.blogs.nytimes.com/2011/07/19/reddit-co-founder-charged-with-data-theft/.
  135. Boyd, Clark, Profile: Gary McKinnon, BBC News, July 30, 2008, Accessed March 26, 2015, http://news.bbc.co.uk/2/hi/technology/4715612.stm.
  136. Bracy, Catherine, Why good hackers make good citizens, Sep 2013, Accessed April 6, 2015, http://www.ted.com/talks/catherine_bracy_why_good_hackers_make_good_citizens.
  137. BuzzFeed Video, “Things Everybody Does But Doesn't Talk About,” February 13, 2015, Accessd March 6, 2015, https://www.facebook.com/video.php?v=1631492713658271.
  138. Calderone, Michael, Washington Post Began PRISM Story Three Weeks Ago, Heard Guardian's 'Footsteps', June 7, 2013, Accessed March 31, 2015,
  139. http://www.huffingtonpost.com/2013/06/07/washington-post-prism-guardian_n_3402883.html.
  140. Center for Constitutional Rights, CCR Statement on Arrest of WikiLeaks Founder Julian Assange, December 7, 2010, Accessed April 3, 2015, http://ccrjustice.org/newsroom/press-releases/ccr-statement-arrest-of-wikileaks-founder-julian-assange.
  141. Chalabi, Mona, Syrian Electronic Army's war on the web: interactive timeline , January 2, 2014, Accessed March 29, 2015, http://www.theguardian.com/world/interactive/2013/sep/03/syrian-electronic-army-war-web-timeline.
  142. Cisco , Cisco Security Reports, 2014, Accessed March 30, 2015, http://www.cisco.com/c/en/us/products/security/annual_security_report.html.
  143. Cisco, “Visual Networking Index: Forecast and Methodology, 2013–2018,” June 10, 2014, Accessed January 6, 2015, http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation-network/white_paper_c11-481360.html?CAMPAIGN=VNI+2014&COUNTRY_SITE=us&POSITION=PR&REFERRING_SITE=Press+release&CREATIVE=PR+to+VNI+WP.
  144. Code.org, “President Obama asks America to learn computer science”, December 8, 2013, Accessed March 22, 2015, https://www.youtube.com/watch?v=6XvmhE1J9PY.
  145. Curtis, Lyndal, Gillard refines verdict on Assange, December 7, 2010, Accessed April 26, 2015, http://www.abc.net.au/worldtoday/content/2010/s3086783.htm.
  146. Dillet, Romain, Facebook Is Down For Many, August 1, 2014, Accessed April 4, 2015, http://techcrunch.com/2014/08/01/facebook-is-down-for-many-2/?utm_campaign=fb&ncid=fb.
  147. Elazari, Keren, “Hackers: the Internet's immune system”, March, 2014, Accessed March 22, 2015, http://www.ted.com/talks/keren_elazari_hackers_the_internet_s_immune_system.
  148. Fleming Jr., Mike, Sony Hacker Paralysis Reaches Day Two – Update, November 25, 2014, Accessed April 4, 2015, http://deadline.com/2014/11/sony-computers-hacked-skull-message-1201295288/.
  149. GamerGraphy, Facebook being massive DDOS attack by China showed on Norse Attack Timeline, June 19, 2014, Accessed April 4, 2015, https://www.youtube.com/watch?v=efmJsENgG-o.
  150. Glenny, Misha, Hire the hackers, July 2011, Accessed April 2, 2015, http://www.ted.com/talks/misha_glenny_hire_the_hackers#t-557041.
  151. Guy-Philippe Goldstein, “How cyberattacks threaten real-world peace,” January 2010, Accessed March 19, 2015 http://www.ted.com/talks/guy_philippe_goldstein_how_cyberattacks_threaten_real_world_peace.
  152. Goodin, Dan, “Dear Asus router user: You’ve been pwned, thanks to easily exploited flaw,” February 18, 2014, Accessed March 23, 2015, http://arstechnica.com/security/2014/02/dear-asus-router-user-youve-been-pwned-thanks-to-easily-exploited-flaw/.
  153. Google online security, Cleaning up after password dumps, September 10, 2014, Accessed March 30, 2015, http://googleonlinesecurity.blogspot.tw/2014/09/cleaning-up-after-password-dumps.html.
  154. Greenberg, Andy, Researcher's Hack Can Make ATMs Spew Money, July 20, 2010, Accessed March 25, 2015, http://www.forbes.com/sites/firewall/2010/07/28/researchers-hack-can-make-atms-spew-money/.
  155. Greenwald, Glenn, Ewen MacAskill, NSA Prism program taps in to user data of Apple, Google and others, October 6, 2014(Last modified), Accessed March 31, 2015, http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.
  156. Hauben, Ronda, The Birth and Development of the ARPANET, December 5, 2006, Accessed May 29, 2014, http://www.columbia.edu/~rh120/ch106.x08.
  157. Hayes, Chris, Aaron Swartz, your brillian mind, righteous heart will be missed, January 13, 2013, Accessed April 4, 2015, http://www.nbcnews.com/video/up/50448209#50448209.
  158. Hern, Alex, Facebook unavailable during longest outage in four years, June 19, 2014, Accessed April 4, 2015, http://www.theguardian.com/technology/2014/jun/19/facebook-unavailable-longest-outage-four-years.
  159. Higgins, Parker, What's On the Blacklist? Three Sites That SOPA Could Put at Risk, November 15, 2011, Accessed April 2, 2015, https://www.eff.org/deeplinks/2011/11/whats-blacklist-three-sites-sopa-could-put-risk.
  160. hqanon, Who We Really Are and How to Become Anonymous, June 6, 2014, Accessed April 4, 2015, http://anonhq.com/anonymous-who-we-really-are-and-how-to-become-anonymous/.
  161. Hypponen, Mikko, “Three Types of Online Attack,” November 2011, Accessed April 6, 2015, https://embed-ssl.ted.com/talks/mikko_hypponen_three_types_of_online_attack.html.
  162. Hypponen, Mikko, Fighting viruses, defending the net, July 2011, Accessed April 6, 2015, http://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net.
  163. IndiaPost, Feds seize $15m from fugitive Jain’s Swiss bank account, June 24, 2011, Accessed April 5, 2015, http://www.indiapost.com/feds-seize-15m-from-fugitive-jains-swiss-bank-account/.
  164. International Conference of American States , “Convention on the Rights and Duties of States,” Accessed April 25, 2015, http://www.cfr.org/sovereignty/montevideo-convention-rights-duties-states/p15897.
  165. Investopedia, Fire Sale, Accessed March 28, 2015, http://www.investopedia.com/terms/f/firesale.asp.
  166. Jacob Von Appelbaum, Nikolaus Blome, Hubert Gude, Ralf Neukirch, René Pfister, Laura Poitras, Marcel Rosenbach, Jörg Schindler, Gregor Peter Schmitz, Holger Stark, Der unheimliche Freund, Oktober 28, 2013, S. 20, Ausg. 44.
  167. Jeremy Hsu, “U.S. Cyber Command Now Fully Online, and Seeking a Few Good Geeks”, October 6, 2009, Accessd April 25, 2015, http://www.popsci.com/military-aviation-amp-space/article/2009-10/us-cyber-command-now-online-and-seeking-few-good-geeks.
  168. JiboStore's channel, “What most schools don't teach,” February 27, 2013, Accessed March 22, 2015, https://www.youtube.com/watch?v=Q0z-C8Ke2FQ.
  169. John Markoff, David E. Sanger, Thom Shanker, In Digital Combat, U.S. Finds No Easy Deterrent, New York Times, January 26, 2010, Pg. A1.
  170. JSTOR, JSTOR Statement: Misuse Incident and Criminal Case, Accessed April 4, 2015, http://about.jstor.org/news/jstor-statement-misuse-incident-and-criminal-case.
  171. Kakutani, Michiko, “The Attack Coming From Bytes, Not Bombs,” April 26, 2010, Pg. C1.
  172. Lauder, Simon, Law experts say WikiLeaks in the clear, December 7, 2010, Accessed April 3, 2015, http://www.abc.net.au/worldtoday/content/2010/s3086781.htm.
  173. Leigh, David, James Ball, Ian Cobain, Jason Burke, April 24, 2011, Accessed April 3, 2015, http://www.theguardian.com/world/2011/apr/25/guantanamo-files-lift-lid-prison.
  174. MacAskill, Ewen, Nick Davies, Nick Hopkins, Julian Borger, James Ball, GCHQ intercepted foreign politicians' communications at G20 summits, June 17, 2013, Accessed March 31, 2015, http://www.theguardian.com/uk/2013/jun/16/gchq-intercepted-communications-g20-summits.
  175. Malashenko, Alexei, Stephen R. Bowers, Valeria Ciobanu, Encyclopedia of Jihad, 2001, Accessed March 19, 2015, http://digitalcommons.liberty.edu/cgi/viewcontent.cgi?article=1023&context=gov_fac_pubs.
  176. Markoff , John, “Old Trick Threatens the Newest Weapons”, The New York Times, October 27, 2009, Pg. D1.
  177. Markoff, John, Sanger, David E., Shanker, Thom, “In Digital Combat, U.S. Finds No Easy Deterrent,” New York Times, January 26, 2010, Pg. A1.
  178. Matthews, Christopher, How Does One Fake Tweet Cause a Stock Market Crash, April 24, 2013, Accessed March 19, 2015, http://business.time.com/2013/04/24/how-does-one-fake-tweet-cause-a-stock-market-crash/.
  179. McGreal, Chris, WikiLeaks to release video of deadly US Afghan attack, June 16, 2010, Accessed April 2, 2015, http://www.theguardian.com/media/2010/jun/16/wikileaks-us-military-afghanistan-garani.
  180. Morris, Adam, Julian Assange: The Internet threatens civilization, May 1, 2013, Accessed March 27, 2015, http://www.salon.com/2013/04/30/tk_5_partner_15/.
  181. Mungin, Lateef, “Iran claims released footage is from downed U.S. drone,” CNN, Febuary 7, 2013, Accessed April 26, 2015,
  182. http://edition.cnn.com/2013/02/07/world/meast/iran-drone-video/.
  183. Nores, IPViking Live, accessed April 4, 2015, http://map.ipviking.com/.
  184. Ohlheiser, Abby, Academics Remember Reddit Co-Founder With #PDFTribute, January 14, 2013, Accessed April 4, 2015, http://www.slate.com/blogs/the_slatest/2013/01/14/aaron_swartz_death_pdftribute_hashtag_aggregates_copyrighted_articles_released.html.
  185. Paganini, Pierluigi, “Asus router users still vulnerale to remote hacking,” February 19, 2014, Accessed March 23, 2015, http://securityaffairs.co/wordpress/22365/hacking/asus-router-users-still-vulnerale-remote-hacking.html.
  186. Palfrey, John, SOPA and our 2010 Circumvention Study, December 22, 2011, Accessed April 2, 2015, http://jpalfrey.andover.edu/2011/12/22/sopa-and-our-2010-circumvention-study/.
  187. Paniagua, Maria Rocio, Bringing Down The Mexican Tech Mafia: How Hackers Stopped A $9.3 Million Fraud, April 14, 2013, Sccessed April 6, 2015, http://techcrunch.com/2013/04/14/bringing-down-the-mexican-mafia-how-mexican-hackers-stopped-a-93-million-fraud/.
  188. Peterson, Scott, “Exclusive: Iran hijacked US drone, says Iranian engineer (Video),” The Christian Science Monitor, December 15, 2011, Accessed March 13, 2015, http://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer-Video.
  189. PlayStation.Blog, Kazuo Hirai's Letter to the U.S. House of Representatives , May 3, 2011, Accessed April 4, 2015, https://www.flickr.com/photos/playstationblog/sets/72157626521862165/.
  190. Poole, Christopher, The case for anonymity online, February 2010, Accessed March 30, 2015, http://www.ted.com/talks/christopher_m00t_poole_the_case_for_anonymity_online#t-90828.
  191. Remove United States District Attorney Carmen Ortiz from office for overreach in the case of Aaron Swartz, January 12, 2013, Accessed April 4, 2015, https://petitions.whitehouse.gov/petition/remove-united-states-district-attorney-carmen-ortiz-office-overreach-case-aaron-swartz.
  192. Richford, Rhonda, “MIPTV: Ellen DeGeneres' Oscar Selfie Worth as Much as $1 Billion,” The Hollywood Reporter, April 8, 2014, Accessed April 4, 2015, http://www.hollywoodreporter.com/news/miptv-ellen-degeneres-oscar-selfie-694562.
  193. Rogers, Marc, Why the Sony hack is unlikely to be the work of North Korea, December 18, 2014, Accessed April 4, 2015, http://marcrogers.org/2014/12/18/why-the-sony-hack-is-unlikely-to-be-the-work-of-north-korea/.
  194. RT, Obama’s Twitter, Facebook hacked by Syrian Electronic Army, October 28, 2013, Accessed March 29, 2015, http://rt.com/news/obama-twitter-facebook-hacked-876/.
  195. Russell, Jon, Taiwan proposes China-style block on overseas Internet services that infringe copyright, May 23, 2013, Accessed April 2, 2015, http://thenextweb.com/asia/2013/05/28/taiwan-proposes-china-style-block-on-overseas-internet-services-that-infringe-copyright/.
  196. Savagedec, Charlie, U.S. Weighs Prosecution of WikiLeaks Founder, but Legal Scholars Warn of Steep Hurdles, Dec 1, 2010, Pg. A18.
  197. Schwartz, John, An Effort to Upgrade a Court Archive System to Free and Easy, February 12, 2009, Pg. A16.
  198. SIPRI, “The SIPRI Military Expenditure Database,” Accessed March 13, 2015, http://milexdata.sipri.org/.
  199. Sohn, David, House Copyright Bill Casts Dangerously Broad Net, October 27, 2011, Accessed April 2, 2015, https://cdt.org/blog/house-copyright-bill-casts-dangerously-broad-net/.
  200. The Colbert Report, Exclusive-Julian Assange Extended Interview, April 4, 2010, Accessed April 2, 2015, http://thecolbertreport.cc.com/videos/5mdm7i/exclusive---julian-assange-extended-interview.
  201. The Economist, Aaron Swartz, January 19, 2013, Accessed April 4, 2015, http://www.economist.com/news/obituary/21569674-aaron-swartz-computer-programmer-and-activist-committed-suicide-january-11th-aged-26-aaron.
  202. Tiezzi, Shannon, VPNs: The China-US Proxy War, January 29, 2015, Accessed May 22, 2015, http://thediplomat.com/2015/01/vpns-the-china-us-proxy-war/.
  203. Tsukayama, Hayley, Anonymous hacks MIT sites to post Aaron Swartz tribute, call to arms, January 14, 2013, Accessed April 4, 2015, http://www.washingtonpost.com/business/technology/anonymous-hacks-mit-sites-to-post-aaron-swartz-tribute-call-to-arms/2013/01/14/ff6f706c-5e44-11e2-9940-6fc488f3fecd_print.html.
  204. tvskit, Гмайл - меняй пароль, September 9, 2014, Accessed March 30, 2015, https://forum.bits.media/index.php?/topic/9426-gmail-meniai-parol/.
  205. Unknown Author, The Terrorist's Handbook, Accessed March 26, 2015, http://www.dvc.org.uk/cygnet/tthb.pdf.
  206. WorldNow and KFDA, Accused cat abusers will face charges Tuesday, February 18, 2009, Accessed March 30, 2015, http://www.newschannel10.com/story/9858240/accused-cat-abusers-will-face-charges-tuesday.
  207. Wright, Mic, Your gas meter: The new frontline in cyberwar, January 31, 2011, Accessed March 29, http://www.wired.co.uk/magazine/archive/2011/03/start/the-new-front-line-in-cyberwar.
  208. Wyler, Grace, AP Twitter Hacked, Claims Barack Obama Injured In White House Explosions, April 23, 2013, Accessed March 19, 2015, http://www.businessinsider.com/ap-hacked-obama-injured-white-house-explosions-2013-4.
Times Cited
  1. 萬耀鈞(2018)。中共資訊戰作為之研析-以中共網軍為例。淡江大學國際事務與戰略研究所碩士在職專班學位論文。2018。1-77。