{"id":2273,"date":"2025-06-16T06:00:59","date_gmt":"2025-06-16T09:00:59","guid":{"rendered":"https:\/\/wp.ufpel.edu.br\/labgrima\/?p=2273"},"modified":"2025-06-15T11:23:01","modified_gmt":"2025-06-15T14:23:01","slug":"soberania-hacker-a-nova-guerra-fria-digital-no-estreito-de-taiwan-por-victoria-c-a-augusto","status":"publish","type":"post","link":"https:\/\/wp.ufpel.edu.br\/labgrima\/2025\/06\/16\/soberania-hacker-a-nova-guerra-fria-digital-no-estreito-de-taiwan-por-victoria-c-a-augusto\/","title":{"rendered":"\u201cSoberania Hacker\u201d: a Nova Guerra Fria Digital no Estreito de Taiwan por Vict\u00f3ria C. A. Augusto"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A Se\u00e7\u00e3o Distrital de Tianhe do Departamento Municipal de Seguran\u00e7a P\u00fablica de Guangzhou emitiu um aviso de recompensa para a captura de 20 indiv\u00edduos acusados de conduzir ciberataques contra alvos na Rep\u00fablica Popular da China (RPC), sendo esses indiv\u00edduos supostamente financiados por atores vinculados \u00e0 administra\u00e7\u00e3o de Taiwan (Xinhua, 2025).<\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\"> N\u00e3o obstante, esta medida exemplifica a aplica\u00e7\u00e3o assertiva da \u201cjurisdi\u00e7\u00e3o cibern\u00e9tica extraterritorial\u201d pela China, um instituto jur\u00eddico emergente que projeta o conceito tradicional de soberania estatal para o dom\u00ednio virtual, transcorrendo as fronteiras f\u00edsicas convencionais e visando afirmar controle absoluto sobre fluxos informacionais que afetam seus interesses (Global Times, 2025).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">O aparato normativo que sustenta essa atua\u00e7\u00e3o \u00e9 composto principalmente pela Lei de Ciberseguran\u00e7a da China (2017) e a Lei de Seguran\u00e7a de Dados (2021), que conferem ao Estado amplo poder para regulamentar, monitorar e sancionar condutas no ambiente digital, incluindo atividades de atores estrangeiros que afetem interesses chineses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> A extens\u00e3o extraterritorial desses dispositivos legais se funda no princ\u00edpio da soberania digital (network sovereignty), conceito incorporado no discurso oficial do governo chin\u00eas como parte de sua agenda de seguran\u00e7a nacional e controle do ciberespa\u00e7o (National People\u2019s Congress, 2017; Xinhua, 2024). Esta prerrogativa autoriza Pequim a criminalizar condutas virtuais independentemente da localiza\u00e7\u00e3o f\u00edsica dos agentes, desde que essas atividades interfiram em sua seguran\u00e7a, infraestrutura cr\u00edtica ou ordem p\u00fablica.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Em conson\u00e2ncia, o desenvolvimento das for\u00e7as cibern\u00e9ticas do Ex\u00e9rcito Popular de Liberta\u00e7\u00e3o (PLA), especialmente com a cria\u00e7\u00e3o da PLA Cyberspace Force e da Information Support Force, reitera a dimens\u00e3o militarizada desta pol\u00edtica. O PLA agora possui unidades dedicadas ao comando e controle do dom\u00ednio informacional, com atribui\u00e7\u00f5es que incluem a\u00e7\u00f5es ofensivas como intrus\u00e3o, coleta de intelig\u00eancia, ataques a infraestrutura cr\u00edtica estrangeira, bem como defesa cibern\u00e9tica das redes chinesas (Ministry of National Defense of the PRC, 2024).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Al\u00e9m disso, a China continental divulgou um relat\u00f3rio de investiga\u00e7\u00e3o afirmando que o &#8220;Ex\u00e9rcito de Tecnologia da Informa\u00e7\u00e3o e Comunica\u00e7\u00e3o&#8221; \u00e9 o &#8220;quarto ramo militar&#8221; criado com o apoio das For\u00e7as Armadas dos EUA ap\u00f3s a ascens\u00e3o de Tsai Ing-wen ao poder.\u00a0 Taiwan nega responsabilidade, enquanto a China intensifica o uso da jurisdi\u00e7\u00e3o cibern\u00e9tica extraterritorial para legitimar a\u00e7\u00f5es coercitivas. A aus\u00eancia de controle jurisdicional direto sobre Taiwan obriga Pequim a priorizar meios n\u00e3o convencionais, como ataques cibern\u00e9ticos ofensivos e press\u00e3o diplom\u00e1tica.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Diante desse contexto,observa-se que a China vem orientando sua estrat\u00e9gia de seguran\u00e7a para a amplia\u00e7\u00e3o das capacidades ofensivas cibern\u00e9ticas focadas na neutraliza\u00e7\u00e3o de sistemas de comando, controle e comunica\u00e7\u00e3o (C3) das for\u00e7as armadas taiwanesas e de seus aliados. Espera-se ainda que a integra\u00e7\u00e3o de opera\u00e7\u00f5es cibern\u00e9ticas ofensivas com exerc\u00edcios militares convencionais \u2014 especialmente manobras navais e a\u00e9reas no Estreito de Taiwan \u2014 para estabelecer um ambiente coercitivo de baixa intensidade que dificulte a interven\u00e7\u00e3o externa, sobretudo dos EUA. Esse cen\u00e1rio eleva a probabilidade de incidentes cibern\u00e9ticos escalados e confrontos h\u00edbridos, aumentando o risco de transi\u00e7\u00e3o para um conflito armado mais amplo na regi\u00e3o do Indo-Pac\u00edfico.<\/span><\/p>\n<p><b>Refer\u00eancias<\/b><\/p>\n<p><span style=\"font-weight: 400;\">BASTILLEPOST. \u5ee3\u5dde\u516c\u5b89\u5c40\u61f8\u8cde\u901a\u7ddd\u53f0\u7063\u300c\u8cc7\u901a\u96fb\u8ecd\u300d20\u4eba \u6d89\u975e\u6cd5\u7db2\u7d61\u653b\u64ca\u7b49\u9055\u6cd5\u72af\u7f6a. Bastillepost, Hong Kong, 5 jun. 2025. Dispon\u00edvel em: <\/span><a href=\"https:\/\/www.bastillepost.com\/hongkong\/article\/14985293-%E5%BB%A3%E5%B7%9E%E5%85%AC%E5%AE%89%E5%B1%80%E6%87%B8%E8%B3%9E%E9%80%9A%E7%B7%9D%E5%8F%B0%E7%81%A3%E3%80%8C%E8%B3%87%E9%80%9A%E9%9B%BB%E8%BB%8D%E3%80%8D-20%E4%BA%BA-%E6%B6%89%E9%9D%9E%E6%B3%95%E7%B6%B2%E7%B5%A1%E6%94%BB%E6%93%8A%E7%AD%89%E9%81%95%E6%B3%95%E7%8A%AF%E7%BD%AA\"><span style=\"font-weight: 400;\">https:\/\/www.bastillepost.com\/hongkong\/article\/14985293-\u5ee3\u5dde\u516c\u5b89\u5c40\u61f8\u8cde\u901a\u7ddd\u53f0\u7063\u300c\u8cc7\u901a\u96fb\u8ecd\u300d-20\u4eba-\u6d89\u975e\u6cd5\u7db2\u7d61\u653b\u64ca\u7b49\u9055\u6cd5\u72af\u7f6a<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">TAIWAN AFFAIRS OFFICE OF THE STATE COUNCIL. Public security authorities publicly list Taiwan\u2019s \u201cinformation and communications army\u201d major suspects. Taiwan Affairs Office of the State Council of the People\u2019s Republic of China, 5 jun. 2025. Dispon\u00edvel em: <\/span><a href=\"http:\/\/www.gwytb.gov.cn\/bmst\/202506\/t20250605_12704843.htm\"><span style=\"font-weight: 400;\">http:\/\/www.gwytb.gov.cn\/bmst\/202506\/t20250605_12704843.htm<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">GLOBAL TIMES. \u516c\u5b89\u901a\u62a520\u540d\u53f0\u6e7e\u300c\u8d44\u901a\u7535\u519b\u300d\u7b49\u6d89\u7f51\u72af\u7f6a\u5acc\u7591\u4eba\uff0c\u5e76\u60ac\u8d4f\u7f09\u62ff. Global Times, 5 jun. 2025. Dispon\u00edvel em: <\/span><a href=\"https:\/\/www.globaltimes.cn\/page\/202506\/1335452.shtml\"><span style=\"font-weight: 400;\">https:\/\/www.globaltimes.cn\/page\/202506\/1335452.shtml<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CHINA. Cybersecurity Law of the People&#8217;s Republic of China (\u4e2d\u534e\u4eba\u6c11\u5171\u548c\u56fd\u7f51\u7edc\u5b89\u5168\u6cd5). Promulgada em 7 de novembro de 2016, em vigor desde 1\u00ba de junho de 2017. Dispon\u00edvel em: <\/span><a href=\"https:\/\/www.chinalawtranslate.com\/en\/2016-cybersecurity-law\/\"><span style=\"font-weight: 400;\">https:\/\/www.chinalawtranslate.com\/en\/2016-cybersecurity-law\/<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CHINA. Data Security Law of the People&#8217;s Republic of China (\u4e2d\u534e\u4eba\u6c11\u5171\u548c\u56fd\u6570\u636e\u5b89\u5168\u6cd5). Aprovada em 10 de junho de 2021, em vigor desde 1\u00ba de setembro de 2021. Dispon\u00edvel em: <\/span><a href=\"https:\/\/www.chinalawtranslate.com\/en\/datasecuritylaw\/\"><span style=\"font-weight: 400;\">https:\/\/www.chinalawtranslate.com\/en\/datasecuritylaw\/<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">MINIST\u00c9RIO DA SEGURAN\u00c7A P\u00daBLICA DA CHINA. \u516c\u5b89\u673a\u5173\u4f9d\u6cd5\u516c\u5f00\u901a\u7f09\u53f0\u6e7e\u201c\u8d44\u901a\u7535\u519b\u201d\u91cd\u8981\u72af\u7f6a\u5acc\u7591\u4eba. Minist\u00e9rio da Seguran\u00e7a P\u00fablica da Rep\u00fablica Popular da China, 5 jun. 2025. Dispon\u00edvel em: <\/span><a href=\"https:\/\/www.mps.gov.cn\/n2253534\/n2253535\/c4144306\/content.html\"><span style=\"font-weight: 400;\">https:\/\/www.mps.gov.cn\/n2253534\/n2253535\/c4144306\/content.html<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">THOMPSON, Neil. China and Taiwan Trade Cybersecurity Accusations. The Diplomat, 12 jun. 2025. Dispon\u00edvel em: <\/span><a href=\"https:\/\/thediplomat.com\/2025\/06\/china-and-taiwan-trade-cybersecurity-accusations\/\"><span style=\"font-weight: 400;\">https:\/\/thediplomat.com\/2025\/06\/china-and-taiwan-trade-cybersecurity-accusations\/<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DIGITAL WATCH OBSERVATORY. China accuses Taiwan of cyber attacks and offers a bounty. Geneva Internet Platform \u2013 Digital Watch, 5 jun. 2025. Dispon\u00edvel em: <\/span><a href=\"https:\/\/dig.watch\/updates\/china-accuses-taiwan-of-cyber-attacks-and-offers-a-bounty\"><span style=\"font-weight: 400;\">https:\/\/dig.watch\/updates\/china-accuses-taiwan-of-cyber-attacks-and-offers-a-bounty<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">REUTERS. Taiwan cyber unit says it will not be intimidated by China bounty offer. Reuters, 12 jun. 2025. Dispon\u00edvel em: <\/span><a href=\"https:\/\/www.reuters.com\/sustainability\/boards-policy-regulation\/taiwan-cyber-unit-says-it-will-not-be-intimidated-by-china-bounty-offer-2025-06-12\/\"><span style=\"font-weight: 400;\">https:\/\/www.reuters.com\/sustainability\/boards-policy-regulation\/taiwan-cyber-unit-says-it-will-not-be-intimidated-by-china-bounty-offer-2025-06-12\/<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vict\u00f3ria Camargo de Aquino Augusto \u00e9 pesquisadora no LabGRIMA.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Se\u00e7\u00e3o Distrital de Tianhe do Departamento Municipal de Seguran\u00e7a P\u00fablica de Guangzhou emitiu um aviso de recompensa para a captura de 20 indiv\u00edduos acusados de conduzir ciberataques contra alvos na Rep\u00fablica Popular da China (RPC), sendo esses indiv\u00edduos supostamente financiados por atores vinculados \u00e0 administra\u00e7\u00e3o de Taiwan (Xinhua, 2025).<\/p><p><a class=\"more-link btn\" href=\"https:\/\/wp.ufpel.edu.br\/labgrima\/2025\/06\/16\/soberania-hacker-a-nova-guerra-fria-digital-no-estreito-de-taiwan-por-victoria-c-a-augusto\/\">Continue lendo<\/a><\/p>\n","protected":false},"author":636,"featured_media":1190,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75,21,28,1],"tags":[5,108,4,142],"class_list":["post-2273","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expert-opinions","category-labgrima-expert","category-news","category-noticias","tag-china","tag-ciberseguranca","tag-geopolitica","tag-taiwan","nodate","item-wrap"],"jetpack_featured_media_url":"https:\/\/wp.ufpel.edu.br\/labgrima\/files\/2022\/11\/tim-kabel-FCrYdP8gohg-unsplash.jpg","_links":{"self":[{"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/posts\/2273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/comments?post=2273"}],"version-history":[{"count":1,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/posts\/2273\/revisions"}],"predecessor-version":[{"id":2275,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/posts\/2273\/revisions\/2275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/media\/1190"}],"wp:attachment":[{"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/media?parent=2273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/categories?post=2273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.ufpel.edu.br\/labgrima\/wp-json\/wp\/v2\/tags?post=2273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}