« Previous |
1 - 10 of 34
|
Next »
Number of results to display per page
Search Results
2. China Maritime Report No. 36: China's T-AGOS: The Dongjian Class Ocean Surveillance Ship
- Author:
- Devin Thorne
- Publication Date:
- 03-2024
- Content Type:
- Special Report
- Institution:
- China Maritime Studies Institute, U.S. Naval War College
- Abstract:
- Since 2017, the People’s Liberation Army Navy (PLAN) has commissioned a new class of ocean surveillance vessel into its order of battle: the Type 927. Similar in design and function to the U.S. Navy’s Victorious and Impeccable class T-AGOS ships, the Type 927 was introduced to help remedy the PLAN’s longstanding weakness in anti-submarine warfare. The PLAN has likely built six Type 927 ships to date, most based for easy access to the South China Sea. In peacetime, these ships use their towed array sonar to collect acoustic data on foreign submarines and track their movements within and beyond the first island chain. In wartime, Type 927 vessels could contribute to PLAN anti-submarine warfare operations in support of a range of different maritime campaigns. However, their lack of self-defense capabilities would make them extremely vulnerable to attack.
- Topic:
- Defense Policy, Navy, Maritime, Surveillance, Submarines, and People's Liberation Army (PLA)
- Political Geography:
- China and Asia
3. State Goals, Private Tools: Digital Sovereignty and Surveillance Along the Belt and Road
- Author:
- Che Chang, Lian Huang, and Athena Tong
- Publication Date:
- 12-2024
- Content Type:
- Journal Article
- Journal:
- China Brief
- Institution:
- The Jamestown Foundation
- Abstract:
- Beijing promotes digital sovereignty in its engagements with other countries but with the caveat that it can maintain access to partner countries’ digital systems. Leaked documents from cyber contracting firm iS00N indicate a focus on One Belt One Road partner countries, targeting critical systems, including telecoms, government ministries, and financial institutions. A new paradigm of using nominally private firms allows Beijing to put distance between its inclusive rhetoric of “win-win cooperation” while companies hack partner countries’ infrastructure at the direction of its security services.
- Topic:
- Cybersecurity, Surveillance, Belt and Road Initiative (BRI), and Digital Sovereignty
- Political Geography:
- China and Asia
4. China’s smart cities and the future of geopolitics
- Author:
- Valentin Weber
- Publication Date:
- 05-2023
- Content Type:
- Working Paper
- Institution:
- LSE IDEAS
- Abstract:
- In this latest Strategic Update, Valentin Weber explores Chinese scientific research and industry application of smart cities, with ‘city brains’. The geostrategic implications for these complex Chinese smart city construction projects outside of China – particularly surrounding surveillance and artificial intelligence – and a potential future ‘world digital brain’ must be considered by policymakers, even if we are far away from an eventual bifurcation of the global internet.
- Topic:
- Science and Technology, Geopolitics, Surveillance, Artificial Intelligence, and Smart Cities
- Political Geography:
- China and Asia
5. Connecting the Pieces: China’s Bricolage Surveillance System
- Author:
- Kevin D. Haggerty
- Publication Date:
- 09-2023
- Content Type:
- Journal Article
- Journal:
- Brown Journal of World Affairs
- Institution:
- Brown Journal of World Affairs
- Abstract:
- Over the last decade, China’s ruling Communist Party has been molding a style of governance built on advanced surveillance capabilities. In some respects, this development is not novel. Modern states have long used surveillance to identify geopolitical risks, fight crime, deliver services, and conduct wars, among other objectives.2 As such, surveillance is normatively neutral; it encompasses practices that run the gamut from appealing to appalling. However, recent developments in China fall on the shocking end of this continuum, signaling an unsettling qualitative and quantitative transformation in state-conducted surveillance. Those interested in the dynamics of governance, the contemporary international order, and the emergence of techno-totalitarianism should pay close attention. China’s surveillance measures restrict millions of peoples’ liberties and are crucial in facilitating the unfolding genocide of the Uyghur people. Furthermore, Chinese officials are globally exporting both these surveillance technologies and the repressive governmental ambitions that shape their use.3 State surveillance involves using familiar tools, such as CCTV cameras and spies, and a tremendous assortment of other devices and systems designed to make populations, processes, and places legible.4 China distinguishes itself not only by the sheer volume of its monitoring devices, but also by optimizing and integrating its computing capabilities into a system unparalleled in scope and efficiency. Since assuming the Presidency in 2012, Xi Jinping has increasingly embraced surveillance, positioning information technology as a centerpiece of China’s pursuit of national stability and enhanced geopolitical standing. Such monitoring serves diverse purposes, but a central concern of the Communist Party is to maintain “social stability.” This catch-all euphemism empowers the authorities to identify and “correct” an eclectic and extraordinarily inclusive assortment of activities through not only more surveillance, but also surveil- lance-augmented forms of shaming, intimidation, re-education, violence, and disappearance. This essay focuses on factors that have contributed to the expansion of totalitarian surveillance in China and offers a framework for interpreting these developments beyond the usual fixation on novel technological tools. While the term “totalitarian” is often used loosely as a simple condemnation, it is apt here given the scope and form of social control currently being pursued by PRC authorities. Monitoring in China has become integral to censorship, propaganda, and unvarnished repression—all tactics that advance and protect the Communist Party’s idiosyncratic vision of social stability. As a result, the Chinese state’s desire for domestic order now entails inspecting everyday life at a granular level that was previously inconceivable.
- Topic:
- Governance, Surveillance, Totalitarianism, Censorship, and Information Technology
- Political Geography:
- China and Asia
6. China’s Digital Silk Road in Indonesia: Progress and implications
- Author:
- Zulfikar Rakhmat
- Publication Date:
- 07-2022
- Content Type:
- Working Paper
- Institution:
- LSE IDEAS
- Abstract:
- This Strategic Update discusses the progress of China’s Digital Silk Road in Indonesia, a major destination, in both its hard and soft aspects, as well as the potential impact of its implementation. Chinese companies are offering a response to Indonesia’s needs, but concerns exist, especially surrounding security and surveillance, that Indonesia’s increasing reliance on China could also further erode its democracy.
- Topic:
- Security, Foreign Policy, Economy, Surveillance, and Belt and Road Initiative (BRI)
- Political Geography:
- China, Indonesia, Asia, and Indo-Pacific
7. China’s surveillance ecosystem and the global spread of its tools
- Author:
- Bulelani Jili
- Publication Date:
- 10-2022
- Content Type:
- Policy Brief
- Institution:
- Atlantic Council
- Abstract:
- This paper seeks to offer insights into how China’s domestic surveillance market and cyber capability ecosystem operate, especially given the limited number of systematic studies that have analyzed its industry objectives. For the Chinese government, investment in surveillance technologies advances both its ambitions of becoming a global technology leader as well as its means of domestic social control. These developments also foster further collaboration between state security actors and private tech firms. Accordingly, the tech firms that support state cyber capabilities range from small cyber research start-ups to leading global tech enterprises. The state promotes surveillance technology and practices abroad through diplomatic exchanges, law enforcement cooperation, and training programs. These efforts encourage the dissemination of surveillance devices, but also support the government’s goals concerning international norm-making in multilateral and regional institutions. The proliferation of Chinese surveillance technology and cyber tools and the associated linkages between both state and private Chinese entities with those in other states, especially in the Global South, is a valuable component of Chinese state efforts to expand and strengthen their political and economic influence worldwide. Although individual governments purchasing Chinese digital tools have their local ambitions in mind, Beijing’s export and promotion of domestic surveillance technologies shape the adoption of these tools in the Global South. As such, investigating how Chinese actors leverage demand factors for their own aims, does not undercut the ability of other countries to detect and determine outcomes. Rather it demonstrates an interplay between Chinese state strategy and local political environments. This paper specifically focuses on key features in China’s surveillance ecosystem, while the companion to this report will focus on the key ‘pull factors’ from African countries and their significance for US interests.
- Topic:
- Science and Technology, Cybersecurity, Surveillance, and Public-Private Partnership
- Political Geography:
- China, Asia, and Global Focus
8. Prospects for the Launch of the Digital Yuan
- Author:
- Oskar Szydłowski
- Publication Date:
- 02-2022
- Content Type:
- Special Report
- Institution:
- The Polish Institute of International Affairs
- Abstract:
- Among the digital currency projects developed by major economies, the Chinese digital yuan (e-CNY) is the most advanced. After pilot projects in selected Chinese regions, the biggest test was to be at the Winter Olympics in Beijing. The spread of the digital yuan will enable the Chinese Communist Party (CCP) to expand its digital authoritarianism through increased surveillance of citizens’ finances. It may also increase the Chinese currency’s share of international transactions in the region. The success of the e-CNY should accelerate the ECB’s work on a privacy-preserving digital euro.
- Topic:
- Authoritarianism, Surveillance, Digital Currency, and Yuan
- Political Geography:
- China, Europe, and Asia
9. Chinese Surveillance Devices: Coming to a Neighborhood Near You
- Author:
- Jayson Browder, Valerie Shen, and Mike Sexton
- Publication Date:
- 06-2022
- Content Type:
- Commentary and Analysis
- Institution:
- Third Way
- Abstract:
- The Chinese government conducts cyber espionage against the US on an unprecedented scale. Senior US intelligence officials have warned the “Internet of Things” is a US counterintelligence and cybersecurity vulnerability. Tens of billions of connected physical devices from Chinese-made webcams to “smart” appliances could be exploited at scale by the Chinese intelligence services. In 2016, the malware “Mirai” was able to weaponize more than half a million devices in a Denial-of-Service attack causing a massive East Coast Internet outage. Unaddressed, these threats will only increase as China exports surveillance devices around the world.
- Topic:
- Science and Technology, Cybersecurity, Surveillance, and Innovation
- Political Geography:
- China and Asia
10. Tracking the Digital Component of the BRI in Central Asia, Part One: Exporting “Safe Cities” to Uzbekistan
- Author:
- Sergey Sukhankin
- Publication Date:
- 02-2021
- Content Type:
- Policy Brief
- Institution:
- The Jamestown Foundation
- Abstract:
- Following the 2013 announcement of the Belt and Road Initiative (BRI) at a speech given by People’s Republic of China President Xi Jinping during visit to Kazakhstan, Central Asia has been a key regional priority and an indispensable element for the success of the BRI as a whole (PRC Ministry of Foreign Affairs, September 7, 2013). Over the years, the BRI—nebulously defined from the start—has come to be associated with a variety of policy and investment programs. A previous series of articles has covered security-related developments associated with the BRI aimed at maintaining stability and protecting economic investments across the region (China Brief July 15; October 19; August 12).China has also begun to expand its export of digital infrastructure and surveillance technology under the umbrella of the BRI. The digitalization strategy—ostensibly aimed at promoting the international integration of technology with infrastructure and finance as well as spreading digital innovation abroad—is often referred to as the Digital Silk Road (DSR, 数字丝绸之路, shuzi sichou zhi lu). The high-level emphasis on promoting the DSR has only grown under the COVID-19 pandemic (CGTN, June 10, 2020). Across Central Asia, the DSR has been primarily represented by efforts to export China’s Smart/Safe City programs, which allow governments to collect, store, process and analyze vast amounts of personal information. The promotion of the so-called “informatization” of society (信息化, xinxi hua) and data commodification are yet more driving forces behind China’s DSR ambitions in Central Asia.
- Topic:
- Science and Technology, Surveillance, Belt and Road Initiative (BRI), and Digital Policy
- Political Geography:
- China, Central Asia, Asia, and Uzbekistan
- « Previous
- Next »
- 1
- 2
- 3
- 4