Latest Articles about Cyber

The Cyberspace Force: A Bellwether for Conflict

Executive Summary: Cyber operations will be involved in the opening stages of any conflict that the People’s Republic of China (PRC) is involved in. This makes the Cyberspace Force an essential bellwether as to what conflicts Beijing anticipates and what conflicts it is tacitly preparing... MORE

Energy and AI Coordination in the ‘Eastern Data Western Computing’ Plan

Executive Summary: The “Eastern Data Western Computing” plan is a multiagency strategy that coordinates cloud computing data centers and energy infrastructure across the People’s Republic of China. These are increasingly relevant with the rise of artificial intelligence. This cloud infrastructure buildout likely will not rival that... MORE

Military Content Restrictions Could Indicate Trouble Ahead

Executive Summary: New measures to control online information related to the People's Liberation Army (PLA) could be an indicator of imminent military operations, further purges, or other military activity. The measures are drafted by 10 military and state bodies, indicating that Beijing places enormous importance... MORE

Russia Ramps Up Cybersecurity Systems

Executive Summary: Russia is strengthening its national cyber defense by requiring commercial organizations to connect to a unified cybersecurity system. This initiative builds on the “Sovereign Internet” law to centralize cybersecurity control and mitigate rising cyber threats. Russia’s cybersecurity sector is facing talent shortages due... MORE

AI Leadership Depends on What is Measured

Executive Summary: Chinese open-source Large Language Models (LLMs) perform better than Western ones, according to a recent report from an artificial intelligence evaluation organization SuperCLUE. Chinese LLMs also excel in cost-efficiency, scalability, and localized applications, with advancements in edge devices and use cases in the... MORE

PRC Adapts Meta’s Llama for Military and Security AI Applications

Executive Summary: Researchers in the People’s Republic of China (PRC) have optimized Meta’s Llama model for specialized military and security purposes. ChatBIT, an adapted Llama model, appears to be successful in demonstrations in which it was used in military contexts such as intelligence, situational analysis,... MORE

Beijing’s Latest Data Security Regulations Create Framework for Broad Domestic and Extraterritorial Supervision

Executive Summary: The State Council-approved “Network Data Security Management Regulations” impose stringent compliance requirements on data processors and platform service providers to safeguard personal information, important data, and cross-border data. The “Regulations” signal continued efforts by the People’s Republic of China (PRC) to assert control... MORE