Since the People’s Republic of China was created in 1949, one of its main objectives has been the reunification of all its territory. In recent years, China has focussed increasingly on the...Show moreSince the People’s Republic of China was created in 1949, one of its main objectives has been the reunification of all its territory. In recent years, China has focussed increasingly on the securitisation of the Hong Kong independence movement and Taiwanese independence to achieve this unification. This thesis conducts a comparative case study, using securitisation theory, where China’s security strategy on Hong Kong and Taiwan is compared. It analyses the influence of colonial periods over Hong Kong and Taiwan’s current domestic politics, focusing on the years 1841 to 1997. Furthermore, it studies China’s security approach to Hong Kong and Taiwan in the 21st century and how this approach has influenced local responses in Hong Kong and Taiwan. This research is conducted through a critical discourse analysis, focussing on policy documents and speeches by Chinese officials. It argues that the colonial history of Hong Kong and Taiwan, the perceived and legitimate legal authority of China, the successfulness of securitisation of the local independence movements, and the response of both citizens and local politics all influence China’s security strategy towards Hong Kong and Taiwan all influence China’s security strategy.Show less
The United States established the the United States Cyber Command (USCYBERCOM) in 2009 as a means of defending nation wide networks and infrastructure as well as to synchronise cyber operations...Show moreThe United States established the the United States Cyber Command (USCYBERCOM) in 2009 as a means of defending nation wide networks and infrastructure as well as to synchronise cyber operations across all US combatant commands. This thesis presents a framework analysis of USCYBERCOM and their implication with regards to cyber espionage. It was found that the US assumed a defensive cyber strategy due to increasing economic espionage (mainly theft of intellectual property) by its adversary China. The extent to which this defensive strategy proved to be effective against foreign cyber espionage remains vague. In the later years however, a new approach under the name ‘Defend Forward’ was established. By defending forward, the US aims to persistently engage in offensive cyber operations below the level of armed conflict, subsequently deterring enemies from conducting further cyber operations, including both cyber attacks and cyber espionage, against the US.Show less