As Ukraine leads the global fight for democracy, Taiwan, facing a potential war with China, should draw lessons from Ukraine’s cyberwarfare success.
Taiwan has been enhancing its arsenal with advanced weapons from the West in anticipation of a possible full-scale invasion.
However, Taipei should also consider Ukraine’s effective digital warfare, notably the “IT [information technology] Army,” a decentralized force instrumental in Kyiv’s cybercampaigns.
In February 2022, Russia’s invasion of Ukraine marked the onset of a significant cyberwar, where fears of a “digital Pearl Harbor” in Ukraine were unmet, thanks to robust cyberdefenses backed by Western public and private support. This led to the formation of the IT Army under the Ukrainian Ministry of Digital Transformation, a pre-emptive move Taiwan should replicate before facing threats.
The IT Army has played an important role in Ukraine’s cyberoffensives. These include leaking documents from Russia’s central bank, disrupting Internet services in territories occupied by Russia, incapacitating one of Moscow’s major Internet providers and targeting private corporations to hinder economic activities.
The primary tactic of the IT Army involves executing distributed denial of service (DDoS) attacks. This approach is simple yet effective — it involves coordinating a large number of computers to launch a concerted attack on a specific network or Web site. By flooding the target with an overwhelming volume of requests, the strategy aims to overload the system, ultimately causing it to crash.
At one point, these tactics, which disrupted 40 percent of the resources of Russian Internet providers, have not only caused direct damage, but also showcased the power of coordinated DDoS attacks. These attacks, simple yet effective, overload targeted networks, causing them to crash, a tactic that could be equally devastating against China.
Despite a decline in the visible size of the Ukrainian IT Army, its operations have escalated in impact, suggesting that effective cyberwarfare does not solely depend on numbers. The group’s efforts have reportedly inflicted economic losses on Russia estimated at US$1 billion to US$2 billion.
“Economic exhaustion plays a decisive role in the outcome of conflicts, and cyberoperations, including DDoS attacks and hacker interventions, are powerful tools in achieving this objective.” Ukrainian IT Army spokesperson Ted (a pseudonym) said.
This same tactic of economic exhaustion can equally be applied to China’s resources.
However, creating a volunteer IT Army poses challenges, including the need for legal structures to protect participants. Ukraine has been attempting to draft legislation to provide a more formal legal structure to the fairly informal IT Army. Taiwan too, should consider moving forward with similar legislation to build a legal structure. This legal framework would offer protections similar to those in armed combat, an approach Taiwan could also adopt to safeguard its cybervolunteers.
As Minister of Foreign Affairs Joseph Wu (吳釗燮) indicated, Taiwan is gearing up for potential conflict by 2027. If such a time frame is realistic, Taipei must immediately mobilize all available resources to prepare for this potential conflict, by which time an even more digitized world would make cyberwarfare a crucial battlefield.
China’s deep integration and reliance on technology would also make it more vulnerable to attacks from groups like an IT volunteer army. In fact, successful cyberoperations by Taiwan could have the potential to inflict substantial economic and operational losses on China, thereby limiting some of Beijing’s military power projection.
Taiwan should create a detailed plan for swiftly assembling its own digital defense force. Similarly, inspired by how Ukraine established secure communication channels to efficiently manage its cyberoperations, Taipei should also implement secure systems to coordinate its cyberarmy and precisely target vulnerabilities.
Taiwanese intelligence would also need to identify vulnerabilities, prepare botnets and establish gateways well in advance to penetrate China’s digital systems quickly. This preparatory work is essential to ensure that, in the event of a conflict, Taiwan can quickly and efficiently target critical Chinese infrastructure and systems.
However, not all preparations need to be technical. One limitation that the Ukrainian IT Army has faced is engaging with non-technical audiences. To scale the work of effective botnets and DDoS attacks, more people are needed to join the attacks.
However, the average civilian citizen does not consider themselves capable of conducting cyberattacks against the enemy. The reality is that anyone can follow simple instructions to download a tool and allow their computer’s processing power and Internet access to be added to the botnet and help flood an enemy’s networks to bring them down.
The Ukrainian IT Army has proved to be an effective fighting force against Russia in the cyber realm. As Taiwan prepares for a potential conflict with China, it must ensure maximum resistance by taking measures to ready itself not only for the physical battlefield, but also for digital warfare.
David Kirichenko is a freelance journalist and an associate research fellow at the Henry Jackson Society, a London-based think tank. He previously participated in the MOSAIC Taiwan program offered by the Ministry of Foreign Affairs.
The narrative surrounding Indian Prime Minister Narendra Modi’s attendance at last week’s Shanghai Cooperation Organization (SCO) summit — where he held hands with Russian President Vladimir Putin and chatted amiably with Chinese President Xi Jinping (習近平) — was widely framed as a signal of Modi distancing himself from the US and edging closer to regional autocrats. It was depicted as Modi reacting to the levying of high US tariffs, burying the hatchet over border disputes with China, and heralding less engagement with the Quadrilateral Security dialogue (Quad) composed of the US, India, Japan and Australia. With Modi in China for the
The Jamestown Foundation last week published an article exposing Beijing’s oil rigs and other potential dual-use platforms in waters near Pratas Island (Dongsha Island, 東沙島). China’s activities there resembled what they did in the East China Sea, inside the exclusive economic zones of Japan and South Korea, as well as with other South China Sea claimants. However, the most surprising element of the report was that the authors’ government contacts and Jamestown’s own evinced little awareness of China’s activities. That Beijing’s testing of Taiwanese (and its allies) situational awareness seemingly went unnoticed strongly suggests the need for more intelligence. Taiwan’s naval
A report by the US-based Jamestown Foundation on Tuesday last week warned that China is operating illegal oil drilling inside Taiwan’s exclusive economic zone (EEZ) off the Taiwan-controlled Pratas Island (Dongsha, 東沙群島), marking a sharp escalation in Beijing’s “gray zone” tactics. The report said that, starting in July, state-owned China National Offshore Oil Corp installed 12 permanent or semi-permanent oil rig structures and dozens of associated ships deep inside Taiwan’s EEZ about 48km from the restricted waters of Pratas Island in the northeast of the South China Sea, islands that are home to a Taiwanese garrison. The rigs not only typify
A large part of the discourse about Taiwan as a sovereign, independent nation has centered on conventions of international law and international agreements between outside powers — such as between the US, UK, Russia, the Republic of China (ROC) and Japan at the end of World War II, and between the US and the People’s Republic of China (PRC) since recognition of the PRC as the sole representative of China at the UN. Internationally, the narrative on the PRC and Taiwan has changed considerably since the days of the first term of former president Chen Shui-bian (陳水扁) of the Democratic