China’s Cyber Warfare against Taiwan
Taiwan, officially known as the Republic of China (ROC), is a self-governing democracy situated across the Taiwan Strait from the People’s Republic of China (PRC) (“Taiwan: Political and Security Issues,” 2023). Taiwan stood as an exemplar during the global “third wave” of democratization in the 1980s and 1990s, successfully transitioning from an authoritarian regime to a representative electoral system in a gradual and peaceful manner (Diamond, Reference Diamond2009; Myers & Chao, Reference Myers and Chao2003). At the heart of Taiwan’s democratic system lies its electoral process, through which 23 million citizens exercise their right to vote in the selection of presidents, Congress members, and local government officials (Fell, Reference Fell2018). As described by Freedom House, “Taiwan’s vibrant and competitive democratic system has allowed for regular peaceful transfers of power since 2000, and protections for civil liberties are generally robust” (Freedom House, n.d.).
However, the ongoing efforts by the PRC to exert influence over policymaking, media outlets, and the foundational pillars of democracy pose persistent challenges to Taiwan’s democratic system (Freedom House, n.d.). The PRC’s Anti-Secession Law, enacted in 2005, stipulates that non-peaceful means may be employed to protect China’s sovereignty and territorial integrity in the event of Taiwan’s secession or when peaceful unification options are deemed exhausted (Mainland Affairs Council, Republic of China (Taiwan), 2005). In line with this stance, at the Chinese Communist Party (CCP)’s 20th Party Congress in October 2022, the party’s leader, Xi Jinping, emphasized the necessity of unification with Taiwan for the rejuvenation of the Chinese nation and reiterated that the CCP would not renounce the use of force if deemed necessary (Ministry of Foreign Affairs of the People’s Republic of China, 2022). Beyond these official pronouncements, Taiwan has also come under increasing digital assault. In the early months of 2023, it emerged as the most targeted country in terms of cyberattacks, experiencing an average of over 15,000 attacks per second (Fortinet, Reference Fortinet2023). These orchestrated interventions, strategically implemented by China, are intended to systematically undermine civilians’ trust in Taiwan’s democratic processes.
The Chinese Cyber Warfare
China’s cyber warfare against Taiwan is conducted in a systematic and methodical manner. Influenced by the Gulf War, the PRC began establishing digitized forces and researching novel aspects of cyber warfare (劉 & 張, Reference Jiawei and Jiayuan2021, p. 122). In November 1999, the concept of a “cyber army” (网军) was first mentioned in the Liberation Army Daily, becoming a new branch alongside the Army, Navy, Air Force, and Second Artillery Corps (劉 & 張, Reference Jiawei and Jiayuan2021). The People’s Liberation Army (PLA) began the task of establishing “information warriors”(信息战士), with the goal of identifying talent within the information industry across various regions (林, Reference Yingyou2016, p. 59). In 2002, Major General Dai Qingmin, who served as the Director of the Fourth Department (Electronic Countermeasures and Radar) of the General Staff Department of the PLA, revealed in an internal report that the PLA had consolidated ten major patterns of “information warfare”(信息战), with a specific focus on “integrated network-electronic warfare”(网电一体战). This refers to the use of electronic warfare, computer network operations, dynamic targeting, and other methods to disrupt the enemy’s battlefield network information systems that support combat operations and force projection. The PLA believed that achieving electromagnetic superiority during the initial stages of a battle was paramount to ensuring victory on the battlefield (林, Reference Yingyou2016).
The overarching strategy employed by the Chinese cyber army involves the utilization of advanced persistent threats (APTs), which leverages the intricacies of human nature and employs sophisticated “social engineering” tactics (林, Reference Yingyou2013, pp. 102–103). These orchestrated and meticulously planned espionage activities distinguish themselves from conventional cybersecurity attacks. In pursuit of their objectives, attackers navigate through various stages of attack, employing diverse tactics to evade detection. These stages include the establishment of initial footholds, internal network scanning, and lateral movement between systems within the network, all aimed at reaching the ultimate target system. Upon carrying out their malicious activities on the target system, attackers reach a decision point. They may opt to remain within the network, continuing their harmful actions on other systems, or they may choose to exit the system after eliminating any traces, depending on the directives of their funding source. These multistage attacks typically initiate with the infiltration of one of the network’s systems. Subsequently, privilege escalation techniques are executed as needed to reach the ultimate target system, gain access to sensitive systems, and transmit status updates or information back to the attackers’ command and control center (Alshamrani et al., Reference Alshamrani, Myneni, Chowdhary and Huang2019, p. 2). APTs demonstrate the meticulous planning, organization, and coordination among cyber army units (曾, Reference Yuzhen2020, p. 22). They exhibit characteristics of organized crime, often with the backing of adversarial governments, and are particularly adept at concealing their tracks (曾, Reference Yuzhen2020).
Taiwan’s Regulatory Response and Its Limitations
Although Taiwan boasts one of the most liberated online environments in Asia, the proliferation of cyberattacks has prompted the nation to embrace a top-down approach to shaping its cybersecurity policy. The Cybersecurity Management Act (資通安全管理法) serves as the primary legislation for cybersecurity. This is part of the strategy of “cybersecurity-as-national-security strategy” (資安即國安) (國家資通安全辦公室, 2021). The law, passed in 2018, applies to government agencies and specific nongovernmental entities, including critical infrastructure providers, state-owned enterprises, and government-funded foundations (資通安全管理法,全國法規資料庫, 2022). The requirements for government agencies are modeled after the Federal Information Security Management Act of 2004 (FISMA). Moreover, specific nongovernmental entities must develop and implement cybersecurity maintenance plans in accordance with their respective cybersecurity responsibility levels and establish incident reporting and response mechanisms. These guidelines should include references to and recommendations for the relevant requirements under the International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001 international information security management standard. The broad application of this provision to nongovernmental entities has drawn criticism from scholars and certain members of Congress for its perceived lack of specificity (劉 & 徐, Reference Jingyi and Xu2018, pp. 122–125; “「資通安全管理法」何去何從?,” 2018, p. 158).
To counteract the APTs from China, significant legislative advancements have been made. First, the National Security Act (國家安全法) was updated to include “cyberspace” as the “fifth domain” of national security protection (國家安全法,全國法規資料庫, 2022; 國家安全法異動條文及理由, 立法院法律系統, 2019). This amendment reflects the reality that national security threats have transcended physical boundaries, with organized cyber criminals posing significant risks by targeting and compromising national critical information infrastructure through internet connections. However, the legal definition of cyberspace remains ambiguous, lacking clarity and precision (蔡, 2019, p. 37).
Second, in 2022, the National Communications Commission (NCC) proposed a draft act called the Digital Intermediary Service Act (數位中介服務法) to combat disinformation. The draft legislation included provisions establishing liability for internet intermediaries, modeled after the Digital Service Act. It also includes provisions for an “access restriction order,” inspired by Section 125 of the United Kingdom’s “Draft Online Safety Bill” from 2022 (“數位中介服務法草案總說明,” n.d.). However, the law faced extensive criticisms for infringing on freedom of expression and allegations of unconstitutionality (陳, Reference Chengliang2023). In response, the NCC announced its decision to refer the entire draft back to the internal digital convergence working group for thorough deliberation and examination of the contentious issues. (Shan, Reference Shan2022)
Third, in consideration of data breaches involving nongovernmental organizations, the Administrative Yuan passed an amendment to the Personal Data Protection Act (個人資料保護法) (新聞傳播處, 2023). The proposed legislation establishes an autonomous entity dedicated to data protection and significantly raises the penalty (up to NT$10 million) for private enterprises that fail to ensure the security of personal data. According to the National Development Council (國家發展委員會), this is part of the key strategies outlined in the “New Generation Anti-Fraud Strategy Action Plan” by the Executive Yuan, which focuses on strengthening the cybersecurity obligations of all stakeholders involved under the “Prevention of Fraud” initiative (新聞傳播處, 2023).
Taiwan remains committed to upholding a free and open internet. However, the prevalence of cyberattacks from China has led to the adoption of a top-down approach, involving increased government intervention and the establishment of national boundaries within the internet sphere. Taiwan faces a critical challenge: safeguarding its democratic institutions while navigating the pressures of cyber warfare. This situation reflects broader discussions about the normative behavior of governments and private parties online. This research will explore the underlying norms and metaphors shaping internet governance over time, gaining valuable insights to address the complex challenges of the digital age.
Norm Developments of the Internet
Norms and Metaphors
The internet was conceived in the late 1960s as a groundbreaking project by the U.S. Department of Defense (Leiner et al., Reference Leiner, Cerf, Clark, Kahn, Kleinrock and Lynch1997). Designed to interconnect research institutions and universities, it emerged as a sophisticated network for communication and resource sharing. Since its inception, the internet has undergone remarkable transformations, becoming the ubiquitous global network that defines our modern era. One of the internet’s most important features is its ability to construct virtual reality, which has sparked a wide range of perspectives (Kerr, Reference Kerr2003, p. 357). Building on these perspectives, scholars have increasingly emphasized the idea of a “norm” in the digital context, focusing on how it is defined and established within the internet.
According to political scientist Martha Finnemore and Kathryn Sikkink, a norm is “a standard of appropriate behavior for actors with a given identity” (Finnemore & Sikkink, Reference Finnemore and Sikkink1998, p. 891). The discourse surrounding norms in the digital realm is commonly referred to as “cyber norm,” with its primary focus on defining the expected conduct of governments in relation to global security and the stability of the internet (Finnemore & Hollis, Reference Finnemore and Hollis2016). A norm life cycle consists of three stages: norm emergence, norm cascade, and norm internalization. Norm emergence may potentially result in a norm cascade, once the tipping point has been reached, which is then followed by the norm’s internalization. The fundamental mechanism of the initial stage, norm emergence, entails the persuasive efforts of norm entrepreneurs who strive to sway a critical mass of states toward the adoption of novel norms. This process relies on the art of persuasion and the strategic influence wielded by these entrepreneurial actors to foster the acceptance and endorsement of emerging norms (Finnemore & Sikkink, Reference Finnemore and Sikkink1998, p. 897). In short, the development of norms is linked to the active engagement of norm entrepreneurs.
At its core, the development of norms in internet governance revolves around the metaphors promoted by norm entrepreneurs. These metaphors not only present legitimate regulatory functions and drive policy changes but also possess remarkable cognitive power, as they help us conceptualize complex ideas or phenomena (Frischmann, Reference Frischmann2007; Hunter, Reference Hunter2003). They serve as bridges between the technical complexities of the internet’s infrastructure and the sociopolitical dynamics that shape its governance. Moreover, metaphors encapsulate specific visions of the internet, rendering the abstract realities of the digital world more tangible and relatable.
In the subsequent sections, I will analyze the two influential norm entrepreneurs in the digital realm – the United States and China – to glean perspectives on the evolution of behavioral norms and their significant contributions to this process. I will specifically explore how these norm entrepreneurs have used two distinct metaphors to shape internet policies. This analysis could offer valuable insights into the governance of international relations, where the interplay of law and politics influences the actions of states and other relevant entities (Finnemore & Sikkink, Reference Finnemore and Sikkink1998, p. 916).
The United States and Cyberspace
The US’ norm development was influenced by the “cyberspace” metaphor, popularized by William Gibson, a science fiction novelist, to describe a new place created by worldwide networks (Hunter, Reference Hunter2003, p. 441; Lemley, Reference Lemley2003, p. 524). According to traditional cyberlibertarianism, cyberspace is its own entity and therefore not subject to territorial regulation (Barlow, Reference Barlow1996). This vision depicted a free and open place where “land could be taken, explorers could roam, and communities could form with their own rules” (Hunter, Reference Hunter2003, pp. 442–443). Notably, David Johnson and David Post argued in a 1996 article that cyberspace should be left to develop its own self-regulatory structure, as there was no longer an obvious method to connect an electronic transaction communication to a particular nation-state jurisdiction (Johnson & Post, Reference Johnson and Post1996, p. 1367). Among the various proposals on self-governance, some theorists believe that online transactions should be governed by norms similar to those in the Lex Mercatoria – a set of norms that governed merchant transactions in medieval times (Hardy, Reference Hardy1994, pp. 1015–1025; Hunter, Reference Hunter2003, p. 448; Perritt, Jr., Reference Perritt1997, p. 461–463; Reidenberg, Reference Reidenberg1998, p. 553).
While the internet has never been as independent or sovereign as early idealists believed, the “cyberspace” metaphor strongly influenced the US legal academic discourse, judicial pronouncements, and legislative enactments (Hunter, Reference Hunter2003, pp. 446–447). The concept of cyberspace as an unrestricted virtual realm is deeply rooted in the American philosophy of free speech (Bradford, Reference Bradford2023, pp. 33–68; Lessig, Reference Lessig2000, p. 6). It embodies the conviction that individuals possess the liberty to articulate their thoughts without censorship or unwarranted intervention, akin to the safeguards enshrined in the First Amendment of the U.S. Constitution (Bradford, Reference Bradford2023, p. 41). Most significantly, the cyberspace metaphor resulted in favoring a bottom-up rather than top-down approach to internet governance. This philosophy contributes to an evolving legal landscape in the United States shaping how online activities are governed and influencing the protection of user data and online security. For instance, the United States lacks a comprehensive cybersecurity law. Meanwhile, US legal discourse on cyber policy has been closely monitoring the density of regulations over the cyber world, with the goal of keeping it free and open (Lessig, Reference Lessig1996, p. 869; Mueller, Reference Mueller2020, p. 779).
The metaphor of “cyberspace” has significantly shaped the trajectory of the US international norm development in cybersecurity, particularly by emphasizing constraints on government actions in the digital domain. Since 2005, the United States has actively engaged in the United Nations (UN) Group of Governmental Experts (GGE), prioritizing the development of responsible state behavior to prevent interstate conflict and limit the use of cyberattacks during cyber conflicts (Lotrionte, Reference Lotrionte2013, p. 75; Mueller, Reference Mueller2020, pp. 786–787). The GGE’s efforts fostered constructive progress that culminated in the formation of a 2013 working group whose participants reached a consensus that the principles of the UN Charter principles, as well as international law, apply to the digital domain.
In 2015, the GGE released a report that acknowledged eleven voluntary norms – a significant milestone in advancing both the understanding of relevant international laws applicable to information and communications technologies (ICTs) and the imperative of safeguarding critical infrastructure (United Nations General Assembly, 2015). These principles were reaffirmed in the 2021 report by the UN Open-Ended Working Group (OEWG), an initiative originally seen as the GGE’s counterpart and sponsored by Russia (Broeders, Reference Broeders2021, p. 278; United Nations General Assembly, 2021).
Overall, the United States has promoted its norms through the “cyberspace” metaphor, emphasizing minimal government intervention in the digital realm and prioritizing voluntary measures to protect free speech. This approach has influenced US cybersecurity policies abroad and has been effectively championed in international forums such as the UN GGE, where similar norms appear in the UN OEWG, the Paris Call, and the Global Commission (“The 9 Principles,” n.d.; The Hague Centre for Strategic Studies, n.d.).
China and Internet Sovereignty
China views the internet as an extension of its territorial sovereignty, shaping its metaphorical perspective on how the internet should be governed (Bradford, Reference Bradford2023, p. 70). This notion was first introduced in the Chinese State Council Information Office’s 2010 publication, The internet in China (Wang, Reference Wang2020, p. 397). The “internet sovereignty of China” in this context refers to the assertion that the internet within Chinese territory falls under Chinese jurisdiction – a significant statement to partitioning the internet along national boundaries. The Chinese government has spearheaded legitimation and adoption of “internet sovereignty” through its 2017 Chinese Cybersecurity Law, representing the nation’s intent to assert control over the internet within its jurisdiction (Creemers, Webster, & Triolo, Reference Creemers, Webster and Triolo2018). Central to this framework are measures such as “public opinion guidance” and requirements for data localization by foreign companies (McKune & Ahmed, Reference McKune and Ahmed2018, p. 3835; E. Wu, Reference Wu2021, p. 1).
Acting as a norm entrepreneur, China has promoted internet content control norms in regional and international institutions under the principle of internet sovereignty. The Shanghai Cooperation Organization (SCO), jointly led by China and Russia, exemplifies this successful multilateral adoption of digital authoritarian norms and practices (McKune & Ahmed, Reference McKune and Ahmed2018, p. 3841). Formed in 2001, the SCO consisted of China, Russia, Kazakhstan, Kyrgyzstan, Tajikistan, and Uzbekistan. Over time, the organization has developed a robust normative framework and gained international prominence. In 2009, SCO member states adopted the Yekaterinburg Agreement, which established core principles for “international information security” and paved the way for proposing an “International Code of Conduct for Information Security” to the UN in 2011 and 2015 (Ministry of Foreign Affairs of the People’s Republic of China, 2011). This Code of Conduct emphasizes sovereignty, territorial integrity, and political independence, urging UN members to refrain from using ICTs to interfere in the internal affairs of other states or undermine their political, economic, and social stability (McKune & Ahmed, Reference McKune and Ahmed2018, p. 3841). Meanwhile, President Xi Jinping underscored the importance of “respect for cyber sovereignty” at the second World Internet Conference (WIC) held in Wuzhen in December 2015 (McKune & Ahmed, Reference McKune and Ahmed2018, p. 3845).
The concept of “sovereignty” has gained traction, resonating not only in authoritarian regimes but also in liberal democracies such as those in Europe (C.-H. Wu, Reference Wu2021, p. 659). The European Union (EU) has begun using the terms “technological sovereignty” and “digital sovereignty,” driven by the aim of enhancing its competitiveness in the digital realm and ensuring economic independence (Burwel & Propp, Reference Burwel and Propp2020, p. 1; European Commission, 2019, p. 3; von der Leyen, Reference von der Leyen2020). This concept encompasses preserving strategic autonomy and safeguarding security interests, as highlighted by the European Commission (European Commission, 2019, p. 3). The Digital Silk Road (DSR) extends the opportunity to propagate similar ideologies to African nations, potentially importing principles of “internet sovereignty.” One noteworthy policy proposition is “data localization,” which rests on government control, self-determined economic advancement, and societal structuring. This idea holds substantial appeal worldwide, extending well beyond nondemocratic governments (Erie & Streinz, Reference Erie and Streinz2021). The internet appears to be moving toward greater balkanization, marked by the creation of national boundaries that restrict the flow of information within specific jurisdictions (Lemley, Reference Lemley2021, p. 1399).
In general, China’s norm development in the cybersecurity realm has advanced significantly, with one notable achievement being the increased awareness among nations of their sovereignty in the digital sphere. As a result, there has been a growing inclination to implement regulations and policies that exercise state control over the internet. By consistently using the term “sovereignty,” President Xi has emphasized the importance of upholding the principle of internet sovereignty, highlighting the need for nations to assert their authority over their respective digital domains and establish governance mechanisms aligned with their national interests.
Taiwan’s Metaphorical Choice: The Internet as Commons
The main implications of the two norm developments, each driven by a distinct metaphor, center on differing cybersecurity strategies. The US conception of “cyberspace” emphasizes voluntary measures, whereas China treats the internet as an extension of its national territory and favors regulatory controls. However, both perspectives face significant challenges. Under the “cyberspace” metaphor, the notion of a free and open internet, while aligned with the original vision of the internet, leaves democratic institutions vulnerable to attacks. As a result, the National Cybersecurity Strategy, published by the White House in March 2023, calls for coherent regulations in critical sectors, signaling a shift toward a model more akin to China’s (The White House, 2023). Meanwhile, the “internet sovereignty” metaphor – by endorsing stringent regulatory measures – risks creating a “splinternet,” characterized by regulatory conflicts and the potential for authoritarian regimes to curtail online freedoms (Lemley, Reference Lemley2021, pp. 1418–1421).
An alternative path for developing internet norms can be fostered by adopting the metaphor of the internet as “commons.” This approach is not without theoretical foundations – scholars and politicians have long used the term “commons” to characterize the internet, with some referencing concepts such as the “global commons,” “semi-commons,” “pseudo commons” or commons within the economic context (111th Congress, 2010; Benkler, Reference Benkler2003; Chertoff, Reference Chertoff2014; Frischmann, Reference Frischmann2013; Hess, Reference Hess1996; Hess & Ostrom, Reference Hess and Ostrom2003; Lessig, Reference Lessig2001; Mueller, Reference Mueller2020; Shackelford, Reference Shackelford2013, Reference Burwel and Propp2020; Shiffman & Gupta, Reference Shiffman and Gupta2013). Embracing the “commons” metaphor to depict the internet offers two primary advantages.
First, the metaphor of the “commons” aptly captures the shared nature of the internet (Hess, Reference Hess1996). The term “commons” generally refers to a resource shared by a group of people subject to social dilemmas (Hess & Ostrom, Reference Hess and Ostrom2007, pp. 3–4). One specific type of shared resource system, known as a “common-pool resource,” combines the subtractability characteristic of private goods with the difficulty of exclusion typically associated with public goods (Ostrom, Reference Ostrom2010, pp. 644–645). Forests, fisheries, and irrigation systems are prominent examples of common-pool resources worldwide (Ostrom, Reference Ostrom2010, p. 645).
Given the internet’s intricacies, the levels of subtractability and exclusivity vary depending on the aspect of the resource system under examination. The exclusion of internet resources is highly fragmented and piecemeal. When many users access the internet simultaneously, congestion can arise, highlighting the issue of subtractability (Hess, Reference Hess1996). However, the attribute of difficulty of exclusion and high subtractability do not fully encompass the diverse resources of the internet. Accordingly, this research focuses on the notion of the “commons” to capture the internet’s shared nature and highlights three shared resources:
The cable commons: The internet relies on a vast physical infrastructure, with a network of high-performance submarine cables carrying 99 percent of global traffic between countries and continents (Takeshita et al., Reference Takeshita, Sato, Inada, de Gabory and Nakamura2019, p. 36). This infrastructure can be referred to as the cables commons, comprising more than 552 submarine cables that span the ocean floor and linking to over 1,300 distinct coastal landing stations (McDaniel & Zhong, Reference McDaniel and Zhong2022; TeleGeography, n.d.). Ownership of submarine cables is heavily concentrated in the private sector, with about 99 percent privately owned by prominent telecom carriers, content delivery providers, and investor groups (Burnett, Reference Burnett2021). While network operators have traditionally been the primary investors, content providers such as Google, Amazon, Microsoft, and Meta have also expanded their investments to ensure seamless interconnection between their data centers (Wall & Morcos, Reference Wall and Morcos2021). Excluding others from using the same submarine cables can be challenging, given their shared nature. Congestion may occur due to high demand, technical issues, underinvestment, or geopolitical factors.
The communications commons: The internet’s most significant accomplishment is its standardized means of communication, enabled by a set of globally accepted protocols. The communications commons refers to the shared, interoperable, and equitable nature of internet communication. This commons is primarily maintained by several organizations, including the Internet Engineering Task Force (IETF), Internet Corporation for Assigned Names and Numbers (ICANN), and Institute of Electrical and Electronics Engineers (IEEE). A foundational conceptual framework for coordinating the development of interconnection standards is the Open Systems Interconnection (OSI) model, developed by the ISO. This model consists of seven abstraction layers, including physical, data link, network, transport, session, presentation, and application layers (ISO, 1994). Each layer represents a specific aspect of the communication process in a computing system. These standards are designed to be open and universal, enabling anyone, anywhere, to build software or hardware that connects to the internet. Because of these open standards and the interoperable nature of the internet, excluding others can be difficult. However, congestion may occur due to network architecture, peak usage, heavy users, or distributed denial of service (DDoS) attacks.
The content commons: The “content commons” refers to the collective body of information and speech that flows across the internet, shaping the virtual world. It encompasses content created by both users and organizations such as governments, corporations, and academic institutions. Much of this commons is hosted on platforms controlled by large US and Chinese corporations – ranging from social networking to search engine services and e-commerce (CompaniesMarketCap, 2023). Within these platforms, diverse social groups establish various sub-commons, each with unique functions, thereby fostering distinct communities. Sharing content on the web remains relatively easy due to low costs, wide reach, and the prevalence of social media platforms. However, congestion can occur because of information overload, the tendency to prioritize quantity over quality, and the lack of effective content discoverability.
Second, Ostrom’s scholarly inquiry into the governance of commons offers profound insights that can significantly enhance internet governance, particularly regarding cybersecurity strategies. Ostrom’s main contribution to the commons theory lies in her formulation of eight institutional design principles, which are strongly tied to the effectiveness of institutions in managing common-pool resources. These principles were the successful commons management systems she identified among the cases examined in Governing the Commons (Ostrom, Reference Ostrom2015). The eighth design principle, which addresses larger and more complex systems of common-pool resources, specifies that various governance activities associated with robust institutions should be organized across multiple layers of nested enterprises. In subsequent work, Ostrom and others have sometimes used the term “polycentric” interchangeably with, or in reference to, the “nested” requirement of the eighth design principle – though polycentricity implies more than nestedness (Carlisle & Gruby, Reference Carlisle and Gruby2017, p. 930).
While there is no unified definition of “polycentric governance,” at the heart of nearly every discussion is the notion of multiple centers of decision-making, where none of them has ultimate authority for making collective decisions (Stephan, Marshall, & McGinnis, Reference Stephan, Marshall, McGinnis, Thiel, Garrick and Blomquist2019, p. 31). This mirrors the structure of the internet, wherein the decision-making centers encompass national authorities, international organizations, private companies, and individuals. Recognizing this, when governance systems are structured in a polycentric manner – from the smallest to the largest scales – they become capable of addressing collective action problems across multiple levels (Ostrom, Reference Ostrom, Brousseau, Dedeurwaerdere, Jouvet and Willinger2012, p. 107). This arrangement inherently fosters the development of norms among participants through a variety of mechanisms, all interconnected and mutually reinforcing. It emphasizes the potential for effective cooperation, conflict resolution, fruitful competition, and shared learning (Bruns, Reference Bruns, Thiel, Garrick and Blomquist2019, p. 237). As a result, polycentricity highlights the organic and self-organizing nature of internet governance – where multiple centers of decision-making interact and collaborate – and stands in contrast to a purely market- or state-centric approach (Stephan, Marshall, & McGinnis, Reference Stephan, Marshall, McGinnis, Thiel, Garrick and Blomquist2019).
The Taiwan–China conflict illustrates the clash between two different internet metaphors. The US concept of “cyberspace” encourages minimal regulatory intervention and is less effective in mitigating cyberattacks, whereas China’s “sovereignty” perspective prioritizes stricter regulations and enhanced security, often at the expense of freedom of expression. Embracing the metaphor of the “internet as a commons” offers Taiwan valuable insights for formulating its cybersecurity strategy. It directs the attention toward identifying shared resources and decision-making centers within the internet. This metaphor serves as a critical tool for interpreting, shaping, and navigating the intricate landscape of policies and protocols that underpin Taiwan’s cybersecurity frameworks. It also promotes meaningful dialogue among diverse stakeholders – policymakers, technologists, academics, civil society, and businesses – that often transcends disciplinary and cultural boundaries. By adopting this approach, Taiwan gains a strategic advantage without veering toward an overly idealized “cyberspace” metaphor or fully embracing “internet sovereignty.” Individuals can safeguard and coordinate the management of shared resources without relying on centralized rulemaking, thereby enhancing security and fostering norm development (Shiffman & Gupta, Reference Shiffman and Gupta2013, p. 100).
Defending Taiwan’s Democracy in the Internet Commons under Polycentric Governance
Tragedy of the Internet Commons
V. Ostrom, Tiebout, and Robert Warren (Reference Ostrom, Tiebout and Warren1961) introduced the concept of polycentricity in their endeavor to ascertain the nature of activities undertaken by numerous public and private agencies involved in the provision and production of public services within metropolitan areas (Carlisle & Gruby, Reference Carlisle and Gruby2017, p. 928). V. Ostrom’s idea of polycentricity goes beyond specific domains and encompasses various aspects of societal organization, including economic markets, legal systems, scientific disciplines, and multicultural societies. In the realm of politics, federalism stands as a key example of polycentricity (Stephan, Marshall, & McGinnis, Reference Stephan, Marshall, McGinnis, Thiel, Garrick and Blomquist2019, p. 24). As mentioned earlier, Elinor Ostrom adopted the term in her work on governing the commons, making it a central pillar of the Bloomington School of Political Economy (Carlisle & Gruby, Reference Carlisle and Gruby2017, p. 930).
The main purpose of Ostrom’s polycentric governance is to mitigate the risk of the “tragedy of the commons” (Hardin, Reference Hardin1968). In valuable open-access resources, the absence of an effective governance regime – either by involved parties themselves or external authorities – may lead to suboptimal outcomes. As internet usage increases, it introduces more threat vectors and provides malicious actors with an expanded range of networks to target, creating a scenario akin to the “tragedy of the commons.” While the broader China–Taiwan conflict resembles a vibrant threat system, the emergence of APTs and activities such as undersea cable disruptions, DDoS attacks, and disinformation campaigns within the internet context are analogous to overexploitation of resources across different internet commons. These developments present a collective action problem that falls within the realm of classic social dilemmas (Shackelford, Reference Shackelford2013, p. 1293).
Tragedy of the Cable Commons
The tragedy of the “cable commons” refers to intentional interference with submarine cables and their use as tools for intelligence gathering. Despite their pivotal role in the digital economy, submarine cables remain surprisingly vulnerable, and the regulations governing their security are antiquated (McDaniel & Zhong, Reference McDaniel and Zhong2022). The governance of the cable commons occupies a gray area, which some phrase as “the orphans of international law” (Beckman, Reference Beckman, Burnett, Beckman and Davenport2014, p. 281). Relevant conventions, including the 1884 Convention for the Protection of Submarine Telegraph Cables, the 1958 Convention on the Continental Shelf, and the 1982 United Nations Convention on the Law of the Sea (UNCLOS), only provide a limited degree of peacetime protection for submarine cables. Their applicability during times of conflict, however, remains contested (McDaniel & Zhong, Reference McDaniel and Zhong2022).
Intentional interference can originate from state or non-state actors, serving various objectives. These may include disrupting military or government communications in the early stages of a conflict, cutting off internet access for a targeted population, sabotaging economic competitors, or causing economic disruptions for geopolitical reasons (Davenport, Reference Davenport2015; Wall & Morcos, Reference Wall and Morcos2021). Taiwan is connected by fifteen submarine cables (McDaniel & Zhong, Reference McDaniel and Zhong2022). This network – protected by advanced encryption – has landing points in Toucheng, Taiwan; Baler, Philippines; and El Segundo, California, yet it poses a significant vulnerability to the nation’s cybersecurity. For instance, in February 2023, two submarine cables connecting Taiwan and Matsu were severed, disrupting internet access for residents in Matsu Island. In an invasion scenario, beyond physically cutting these cables, China could deploy submarines or unmanned underwater vehicles (UUVs) to locate and sever cables, launch cyberattacks that result in data disruption, and use devices that generate electromagnetic pulses (EMPs) to damage cables or their connected infrastructure (陳, Reference Chengliang2023).
It is also possible to tap cables to intercept and steal data for espionage. Edward Snowden revealed that the United States and the United Kingdom have been directly intercepting the internet backbone (Davenport, Reference Davenport2015). Moreover, the need for cable tapping in espionage may become redundant when a state owns the infrastructure. One important feature of the DSR involves Chinese technology firms partnering with non-Chinese counterparts to construct undersea cables (Erie & Streinz, Reference Erie and Streinz2021). China’s ongoing efforts to assert control over various islands in the South China Sea further exacerbate the issue, allowing it to lay its own network cables away from international scrutiny. With ambitions to expand 5G networks – led by Huawei – the Chinese government stands to exert even greater influence over the flow of information entering and exiting the country (Martin, Reference Martin2019).
Tragedy of the Communications Commons
Cyberattacks predominantly take place within the “communications commons” and take various forms. Their primary goal is to disrupt the shared internet communication. A common type is the DDoS attack, which involves flooding the network’s communications channels. In one method, an attacker sends a continuous stream of packets to a target, depleting critical resources and rendering the system inaccessible to legitimate clients. Another tactic uses a few maliciously crafted packets to disrupt an application or a protocol on the victim’s machine, causing it to freeze or require a reboot. Such attacks are feasible because internet security is highly interdependent and internet resources are finite (Mirkovic & Reiher, Reference Mirkovic and Reiher2004, p. 40). Other cyberattacks include malware, phishing, ransomware, spoofing, and eavesdropping (Fortinet, n.d.). One major consequence of cyberattacks is a data breach, in which unauthorized entities gain access to sensitive or confidential information (Kosinski, Reference Kosinski2024).
Taiwan experiences persistent daily DDoS attacks from China. For instance, in 2018, the computer systems of Taiwanese government departments were subjected to frequent cyberattacks and vulnerability probing, exceeding 10 million incidents per month – more than half of which originated from Chinese information warfare units. In 2022, following a visit to Taiwan by U.S. House Speaker Nancy Pelosi, Taiwan’s Ministry of National Defense reported a DDoS attack that took down its network for about two hours (Miller, Reference Miller2022). Hackers have also targeted the websites of the Presidential Office, Ministry of Foreign Affairs, and Ministry of National Defense.
Additionally, Taiwan has experienced numerous significant data breaches, affecting both government agencies and private sectors across various industries (李, Reference Jiaqi2023). Reports indicate that personal data from key intelligence systems, including the National Security Bureau and Military Intelligence Bureau, have been compromised and traded in overseas markets (李, Reference Jiaqi2023). Also, domestic and international cybersecurity agencies have repeatedly found Trojan programs in devices produced by well-known Chinese smartphone brands. These programs covertly transmit users’ personal information, captured photos, and network communications to specific addresses, enabling surveillance of smartphone users and creating a “cybersecurity black hole” (國防部政治作戰局, 2017).
Tragedy of the Content Commons
The tragedy of the content commons refers to the disruption of a shared content ecosystem. It can arise from “information warfare,” a strategy that involves controlling information to gain a competitive advantage. This strategy encompasses both offensive and defensive operations. Strategy, in this context, refers to the process of planning to achieve national objectives and goals, while operations serve as the bridge between strategic objectives and specific tactics, techniques, and procedures. This linkage is facilitated through information operations (IO). Categories of information used in IO include propaganda, misinformation, and disinformation. Notably, the Russian government has been accused of employing bots to spread disinformation and sow discord in various contexts, including the 2016 US presidential election (Theohary, Reference Theohary2018).
Beijing’s information warfare targeting Taiwan has been focused on promoting the PRC’s model of governance and fostering polarization, aiming to undermine confidence in Taiwan’s democratic process (Faust, Reference Faust2023). Doublethink Lab, a Taiwanese organization researching the impact of digital authoritarianism, has identified several methods used by Chinese actors. These include social media influencers amplifying disinformation from CCP-backed content farms and operations involving collaboration with actors who often recruit Taiwanese agents to carry out influence campaigns originating from the mainland (Lee et al., Reference Lee, Tseng, Kao, Wu and Shen2020, pp. 22–39).
The task of preserving the content commons through regulations has been arduous due to the inherent risk of “collateral censorship” associated with any form of speech regulation (Balkin, Reference Balkin1999, p. 2298). When the state holds one private party, “A,” liable for the speech of another private party, “B,” A has an incentive to avoid any potential liability by restricting even fully protected speech. This dynamic often leaves the content commons largely unregulated, especially in democratic states. Meanwhile, authoritarian regimes have enacted laws to censor online speech, ostensibly in the interest of national security. These measures include dictating the permissible forms of speech on websites, exemplified by the 2017 Chinese Cybersecurity Law (Creemers, Webster, & Triolo, Reference Creemers, Webster and Triolo2018). In summary, striking a delicate balance between protecting free speech and upholding national security remains a significant challenge.
Taiwan’s Polycentric Governance in the Internet Commons
Within the internet commons, global problems involve a diverse array of actors, extending beyond governments to include corporate entities that serve as agents for complex publics and exhibit significantly intricate behavior (McGinnis & Ostrom, Reference McGinnis and Ostrom1992). As mentioned, nearly every discussion of polycentric governance revolves around the concept of multiple “decision-making centers” (Stephan, Marshall, & McGinnis, Reference Stephan, Marshall, McGinnis, Thiel, Garrick and Blomquist2019, p. 31). This concept highlights the distributed nature of governance, where power and decision-making are dispersed across various institutions. Jurisdictions of authority may overlap, with many centers of decision-making operating formally independent of each other (Ostrom, Tiebout, & Warren, Reference Ostrom, Tiebout and Warren1961). The goal of polycentric governance is to facilitate the use of local knowledge and build mutual trust (Cole, Reference Cole2015). Local communities possess the skills, local knowledge, and capacity to overcome many challenges, making it essential to resolve problems as close to these communities as possible. This approach effectively addresses the challenges posed to traditional models of democracy centered on the nation-state (Scholte, Reference Scholte and Kohl2017, p. 167). Polycentricity challenges the belief that either the state or markets alone hold the solution to addressing complex challenges (Shackelford, Reference Shackelford2013, p. 1333). Instead, it creates an effective mechanism for cooperation, coordination, conflict resolution, and the utilization of local knowledge.
Taiwan’s Role as a Public Entrepreneur in the Cable Commons
To effectively address collective action problems, it is critical to foster entrepreneurship and innovation across local, regional, national, and international domains. Taiwan, as a decision-making center, has the potential to act as a public entrepreneur in the cable commons, calling for policy changes on maintaining the cable commons among governments, cable operators, and cable owners. As explained by Elinor Ostrom, “Entrepreneurship is a particular form of leadership focused primarily on problem solving and putting heterogeneous processes together in complementary and effective ways, rather than simply making public speeches and being charismatic” (Ostrom, Reference Ostrom, Brousseau, Dedeurwaerdere, Jouvet and Willinger2012, p. 107). Entrepreneurship can be further understood as “acts performed by actors who seek to punch above their weight,” distinguishing them from those who merely perform their duties and act appropriately (Boasson, Reference Boasson, Jordan, Huitema, van Asselt and Forster2018, p. 119). In relation to the concept of “norm entrepreneurs,” as discussed in international relations theory, both norm and public entrepreneurs serve as agents of change. While the former concentrates on shaping norms and values, the latter seeks to drive policy change.
The governance of the cable commons, as mentioned, is a gray zone that poses significant concerns due to its vulnerability to disruption and penetration. Taiwan’s role as a public entrepreneur in this domain should focus on promoting best practices, including diversification, cable installation, operation and maintenance, information sharing among allies and contingency planning, and the development of a variety of regulatory regimes and international legal frameworks (European Agency for Cybersecurity, 2023). This role is particularly important given the ongoing competition between China and the United States over control of undersea cables.
Specifically, regional and international cooperation on information sharing should be established as a mechanism for interorganizational, intersectoral, and intergovernmental exchanges of data deemed relevant by the sharers for resolving collective action problems (Housen-Couriel, Reference Housen-Couriel, Shackelford, Douzet and Ankersen2022). Taiwan and its allies can formulate joint patrols or task forces with regional partners to share intelligence and coordinate countermeasures. The goal is to strengthen infrastructure by investing in cable armoring, deep burial, and decoy cables, while collaborating with international organizations to establish accountability systems (陳, Reference Chengliang2023).
The Industry’s Role of Fostering a Security Culture in the Communications Commons
In the communications commons, each company within the industry serves as a decision-making center to maintain internet communication by fostering a cybersecurity culture. The concept of cybersecurity culture can be understood as a set of rules regarding best cybersecurity practices expressed through either formal regulations or informal social norms and values. It refers to the norms spanning industries, individuals, governments that promote best cybersecurity practices, given that human error is one of the biggest security threats. Under polycentric governance, companies, as local communities, inherently harbor a wealth of valuable skills, indigenous knowledge, and capacity to surmount multifarious challenges, serving as a decision-making center. Therefore, it is essential to address problems at the community level, recognizing the potential for localized solutions.
The industry can cultivate a cybersecurity culture in two ways: by nurturing it within individual companies and by collectively developing a cybersecurity framework. Fundamentally, security cultures should be rooted in and aligned with the broader organizational culture (Nasir et al., Reference Nasir, Arshah, Ab Hamid and Fahmy2019; Uchendu et al., Reference Uchendu, Nurse, Bada and Furnell2021). Studies have shown that critical factors in fostering security culture include top management support, clear policies and procedures, and information security awareness and training. Specifically, without management support, cybersecurity initiatives may not appear significant to employees when weighed against their daily responsibilities (Uchendu et al., Reference Uchendu, Nurse, Bada and Furnell2021). It is critical to establish a community and an environment of trust to effectively implement and sustain a cybersecurity culture (Batteau, Reference Batteau2011). As mentioned, adversaries utilize APTs to execute precise and covert cyberattacks on organizations, often remaining concealed within enterprise networks for extended periods, sometimes months or even years (Mahmoud, Mannan, & Youssef, Reference Mahmoud, Mannan and Youssef2023). Research indicates that people are often the weakest point in the cybersecurity chain. Internal users may either intentionally disclose sensitive information to external entities or inadvertently provide valuable information to adversaries with sophisticated expertise and significant resources. Fostering a strong security culture becomes a crucial step in raising awareness to reduce the likelihood of APTs (Alshamrani et al., Reference Alshamrani, Myneni, Chowdhary and Huang2019, p. 1873). The ultimate goal is to build a “solid and effective human firewall” (Marotta & Pearlson, Reference Marotta and Pearlson2019, p. 9).
Furthermore, the Taiwanese industry and government can coordinate to establish a cybersecurity framework. Ideally, industry groups most familiar with best practices should be allowed to craft local rules, which can then be augmented and enforced (Shackelford, Reference Shackelford2013, p. 1353). Such a framework can be voluntary, at least in the beginning. One example is the cybersecurity framework developed by the National Institute of Standards and Technology (NIST). In response to Executive Order 13636, NIST employed a year-long process involving active dialogue with multiple stakeholders, establishing a bottom-up approach to cybersecurity (Peng, Reference Peng2018, p. 451; Shackelford et al., Reference Shackelford, Proia, Martell and Craig2015). A voluntary cybersecurity framework for Taiwan should also be created through an inclusive and transparent process, involving stakeholders from the private sector, civil society, and government. This would complement the Taiwanese government’s top-down approach. Different frameworks may address different risks, such as those related to cybersecurity, privacy, and artificial intelligence (AI). By promoting collaboration and drawing on best practices from both the public and private sectors, such an initiative would foster a culture of proactive and voluntary cyber defense measures.
The Community’s Role in Content Moderation in the Content Commons
In the content commons, online communities – including fact-checking initiatives – play a key role in maintaining the shared content ecosystem. Individuals within each community can collaborate to create a network for verifying and disseminating accurate information. The Taiwanese online community, in particular, ought to foster a strong sense of collective responsibility for content moderation, empowering individuals to actively shape and maintain a healthy online environment. Their goal is to counter information warfare at the local level. This approach should center on two key elements: first, fostering both cooperation and competition between professional and crowdsourced fact-checking initiatives and, second, implementing a multilevel governance framework.
First, professional and crowdsourced fact-checking initiatives can be perceived as decision-making centers within the context of polycentric governance. The proliferation of professional fact-checking outlets around the globe has experienced a remarkable growth, increasing from just eleven sites in 2008 to 424 in 2022 (Stencel, Ryan, & Luther, Reference Stencel, Ryan and Luther2023). Taiwan, in particular, boasts a robust environment for fact-checking centers, with organizations such as MyGoPen and Taiwan FactCheck Center. At the same time, Cofacts, a crowdsourced fact-checking center, focuses on local and daily matters, helping to mitigate the effects of everyday misinformation. Research indicates that Cofacts plays a complementary role alongside professional fact-checkers. It leverages the global, cross-language perspectives offered by professional fact-checking organizations while offering faster responses to fact-checking needs (Saeed et al., Reference Saeed, Traub, Nicolas, Demartini and Papotti2022). The overlapping jurisdictions between these two types of fact-checking initiatives are integral to the dynamic of polycentric governance, which guarantees competition and cooperation among themselves (Stephan, Marshall, & McGinnis, Reference Stephan, Marshall, McGinnis, Thiel, Garrick and Blomquist2019, p. 33).
A key aspect of a polycentric system is the concept of “nested enterprises,” where governance activities are organized in multiple layers of related governance regimes. Large tech companies and local administrators can be perceived as part of a nested ecosystem. Given that one of the central challenges within the content commons is the centralization of platforms, an approach to decentralizing platform power involves introducing intermediary layers of local administration. Research suggests several design implications for local administrators – platforms should support them in experimenting with community guidelines, sanctioning criteria, and automation settings; allowing for cross-cutting membership so users can participate in multiple communities; fostering healthy competition; holding decision-makers accountable for poor performance; and providing mechanisms for conflict resolution (Jhaver, Frey, & Zhang, Reference Jhaver, Frey and Zhang2021). This approach could be particularly impactful for local administrators on popular social media platforms in Taiwan, such as Facebook.com, Line.me, Instagram.com, ptt.cc, and dcard.tw. The goal is to involve volunteers of subcommittees in Taiwan to actively enforce platform moderation policies and help establish local community norms.
Conclusion
In conclusion, the development of internet governance has been driven by two distinct metaphors – the “cyberspace” metaphor and the “sovereignty” metaphor. The United States holds significant influence in promoting responsible state behaviors in the UN rooted in the “cyberspace” metaphor. This approach reflects the belief that voluntary measures provide greater flexibility and adaptability to address the multifaceted challenges of cyberspace. In contrast, China has made notable advancements in raising global awareness about the notion of “sovereignty.” This progress has contributed to a growing trend of nations adopting regulations and policies that emphasize state authority and control over the internet.
By embracing the metaphor of the internet as “commons,” the focus of internet governance can be directed toward governing various shared resources, including the “cable commons,” the “communications commons” and the “content commons.” This approach allows Taiwan to navigate the delicate balance between national and private control of the internet to protect its democratic system. Grounded in compelling evidence, Ostrom’s research on commons highlights that individuals from all walks of life possess the ability to voluntarily organize and establish rules to protect shared resources.
Polycentric governance offers a pathway to address the various challenges posed by cyberattacks. This approach acknowledges the benefits and constraints of multilevel regulation, underscores the importance of self-organization, and recognizes the vital role of internet governance from the local level. Taiwan’s efforts to defend its democracy in the digital realm extend beyond its borders, offering a blueprint for other nations navigating similar threats. Ultimately, Taiwan’s success in this endeavor will not only strengthen its own democratic system but also contribute to a more resilient, inclusive, and cooperative global digital ecosystem.