Latest Articles about Information Technology and Telecommunications
The Shapeshifting Evolution of Chinese Technology Acquisition
Executive Summary: Smuggling, a critical tool of the Chinese Communist Party (CCP) to acquire technology to enhance its defense industrial base, is reemerging in the wake of the US Government’s technology controls. Diversion—falsifying the end-user—is another common tactic that the Party has successfully used to... MORE
Winter is Coming: Beijing Tightens Public Security
Executive Summary: A new campaign, “Operation Winter,” has been announced to mobilize public security officials in the wake of deadly attacks across the People’s Republic of China. The operation seeks to mobilize extra human resources and integrated technology to enhance the party-state’s apparatus of “preventive... MORE
Russia Ramps Up Internet Censorship
Executive Summary: Russia is heavily investing in domestic technologies like deep packet inspection and VPN-blocking algorithms to block 96 percent of civilian virtual private network (VPN) traffic by 2030, advancing its “Sovereign Internet” initiative for stricter internet control. The government is developing a centralized platform... MORE
PRC Unveils New Space Plan
Executive Summary: The first national-level long-term plan for space science development from the People’s Republic of China (PRC) sets the goal of becoming a global leader by 2050, by which point it aims to lead in revolutionary scientific breakthroughs, deep space missions, and by becoming... MORE
HarmonyOS NEXT: Beijing’s Bid for Operating System Independence
Executive Summary: Huawei has launched HarmonyOS NEXT, the first fully self-developed mobile operating system in the People’s Republic of China’s (PRC) that is independent of Android and Linux/Unix kernels. HarmonyOS has seen substantial domestic adoption, surpassing iOS to become the PRC’s second-largest operating system with... MORE
Beijing’s Latest Data Security Regulations Create Framework for Broad Domestic and Extraterritorial Supervision
Executive Summary: The State Council-approved “Network Data Security Management Regulations” impose stringent compliance requirements on data processors and platform service providers to safeguard personal information, important data, and cross-border data. The “Regulations” signal continued efforts by the People’s Republic of China (PRC) to assert control... MORE
Diplomacy with Chinese Characteristics: PRC Consulate Gray Zone ‘Pop-up’ Events in New York and Beyond
Executive Summary The Consulates General of the People’s Republic of China (PRC) in New York, San Francisco, and Chicago have been conducting gray zone “pop-up” consular service events across the United States under the initiative “Bringing Consular Services into the Community,” often at non-diplomatic facilities.... MORE
PRC Launches First Algorithm Registration Center, Strengthening AI and Data Regulation
Executive Summary: The Beijing Algorithm Registration Center—also known as the Model Share Center—has opened as the PRC’s first physical algorithm registration center, marking a significant step in regulating AI development. The center is co-established by the local government, Zhongguancun Development Group, and Huawei through the... MORE
Beijing’s Supervision Law Overhaul: Proposed Amendments Push Extraterritorial Anti-Corruption Enforcement
Executive Summary: The People’s Republic of China’s (PRC) proposed amendments to the Supervision Law aim to strengthen the National Supervision Commission’s (NSC) authority, particularly its ability to conduct extraterritorial anti-corruption enforcement. The amendments align with Xi Jinping’s “foreign-related rule-by-law (涉外法治)” concept, extending PRC legal and... MORE
Beijing Strengthens Data Security with New Regulations, Expanding Control Over Domestic and Cross-Border Data
Executive Summary: New Network Data Security Management Regulations approved by the People’s Republic of China (PRC) State Council will serve as a national-level framework to clarify and enhance the implementation of existing laws, including the Cybersecurity Law (CSL), Data Security Law (DSL), and Personal Information... MORE