top of page

Cerca


The Digital Iron Curtain: The Paradox of Reciprocity Between the U.S. FCC and Beijing’s New Technological Order
From the Hikvision sanctions to the Cybersecurity Label 2026: the end of technological neutrality The current international landscape is marked by an unprecedented convergence of national security and technology trade, with the United States and China adopting mirror-image strategies to fortify their digital ecosystems. What is emerging is what we might call the paradox of reciprocity: while Washington accuses Chinese companies of opacity and potential espionage, Beijing resp

Gabriele Iuvinale
8 magTempo di lettura: 4 min


The Digital Crime Axis: An Analysis of the Convergence Between Intelligence and Organized Crime in China and Russia
This analysis, based on the findings of the joint hearings of the Subcommittee on Border Security and Law Enforcement and the Subcommittee on Cybersecurity and Infrastructure Security—held on April 21 at the U.S. House of Representatives—outlines a hybrid threat that extends beyond U.S. borders to affect the entire Western security architecture. Chinese flag and a puzzle of the Russian flag. Photo: Getty Images The Architecture of Sino-Russian Money Laundering and Support fo

Gabriele Iuvinale
28 aprTempo di lettura: 3 min


Shadow Networks: The Evolution of Chinese TTPs and Operational Invisibility in the Gray Zone
This analysis examines the recent paradigm shift in cyber operations conducted by actors linked to the People’s Republic of China, with particular reference to the strategic use of large-scale covert networks composed of compromised devices. Evidence gathered by international security agencies, led by the UK’s National Cyber Security Centre and its global partners, paints a picture in which the distinction between civilian and military infrastructure is becoming increasingly

Gabriele Iuvinale
24 aprTempo di lettura: 5 min


The General Electric Case: When a Flaw in the Corporate System Fuels Beijing’s Arsenal
The Consent Agreement signed on April 14-17, 2026, between the U.S. Department of State and General Electric (GE) is not merely a $36 million penalty, but a testament to a strategic vulnerability that granted China access to invaluable technological secrets. For years, GE was unwittingly transformed into a reservoir of technical information for the People’s Republic of China (PRC) due to internal controls that authorities described as “systematically deficient.” Inspecting Je

Gabriele Iuvinale
23 aprTempo di lettura: 4 min


Tokyo and Washington’s crackdown on Chinese technology: moving toward a global security perimeter while Europe remains exposed
The Japanese government has officially announced a national strategy to completely phase out Chinese technologies from the IT systems of all local governments by the summer of 2027. This initiative, coordinated by the Digital Agency and the Ministry of Internal Affairs and Communications , aims to protect citizens’ sensitive data and the integrity of civil infrastructure from potential espionage or sabotage orchestrated by foreign actors through supply chain compromise. Gett

Gabriele Iuvinale
22 aprTempo di lettura: 3 min


Liminal Domain: China’s Strategy to Militarize Dark Web Intelligence and Close the Decade-Long Gap - Analysis
China’s presence in cyberspace is undergoing an unprecedented transformation, shifting from a fragmented defensive posture to a model of proactive, centralized surveillance. At the heart of this strategy lies the imperative need to dominate so-called “liminal power”—that is, the ability to act and monitor the digital gray zones where the distinction between civil, military, and criminal threats blurs. Beijing has identified its historical weakness in monitoring the Dark Web a

Gabriele Iuvinale
9 aprTempo di lettura: 4 min


The Acoustic Shadow of the Digital Silk Road: Transforming the Global Fiber-Optic Infrastructure into a Chinese Surveillance Network
The illusion of the invulnerability of fiber-optic communication systems has been officially shattered by groundbreaking research conducted by researchers at the Hong Kong Polytechnic University and the Chinese University of Hong Kong. The study, presented at the NDSS 2026 symposium, reveals how the global telecommunications infrastructure can be transformed into a widespread network of clandestine microphones through the exploitation of acoustic side channels. This threat

Gabriele Iuvinale
8 aprTempo di lettura: 7 min


Operation "Transparent Ocean": A Strategic Analysis of the Threat Posed by China’s Bionic Fish and the Role of Xiamen University
Abstract and Strategic Context This strategic technical report analyzes the transformation of the People’s Republic of China’s submarine warfare and intelligence capabilities through the use of biomimetic robotics. The analysis is based on a study conducted by Xiamen University titled “ Progress and Analysis of Research on High-Speed Underwater Bionic Robot Fish ” and on the context provided by technical documents from the Chinese Academy of Sciences regarding the “Transparen

Gabriele Iuvinale
2 aprTempo di lettura: 4 min


Computational Sovereignty: An Analysis of China’s Computing Capacity and Civil-Military Integration by 2026
China's military computing capabilities have developed rapidly over the past decade, and the country is committed to transforming computing power into combat power—a goal that, in the context of smart, information-based warfare, elevates this resource to one of the fundamental modern combat capabilities. GettyImages According to data from the March 2026 report by the China Academy of Information and Communications Technology (CAICT), Beijing has consolidated a total computin

Gabriele Iuvinale
17 marTempo di lettura: 3 min


The Silk Code: China Standards 2035 and the Battle for the Global Operating System
Standardization today represents the invisible architecture on which the global economy is based, because it defines the technical rules that allow different devices and systems to communicate with each other harmoniously. Those who succeed in imposing their standards effectively control global markets, as they force all other economic players to pay licensing fees and follow technological paths already mapped out by the first innovator. A recent study by the Chinese Academy

Gabriele Iuvinale
4 marTempo di lettura: 6 min


The Guarantor of Last Resort: Beijing's comprehensive strategy for Iran's survival
The publication of the report “ Tightening the Net: China's Infrastructure of Oppression in Iran ” by Article 19 has brought to light the decisive role of Chinese technology in the repression of the Iranian protests that broke out at the end of last year. In particular, the document describes how Beijing provided Tehran not only with the regulatory model, but also with the technical infrastructure necessary to impose an almost total information blackout, isolating the civilia

Gabriele Iuvinale
9 febTempo di lettura: 3 min


Quantum Technologies and National Security: State of the Art and Industrial Dynamics in the People's Republic of China
The development of quantum technologies now represents a fundamental pillar of global technological competition, where innovation capacity is inextricably linked to national security and digital sovereignty. The 2025 report by the China Academy of Information and Communications Technology (CAICT) highlights how quantum computing, encrypted communication, and precision sensing have become strategic drivers, leading over 30 countries to invest a total of more than $35 billion.

Gabriele Iuvinale
18 dic 2025Tempo di lettura: 3 min


China Establishes Digital Energy Fortress: Strategic Classification of National Data Introduced with Level 4 Protection for “Fundamental Data” that Impacts Political Security
In the global landscape where cybersecurity is inextricably linked with geopolitical stability, China's National Energy Administration (NEA) has responded firmly by promulgating the " Measures for Data Security Management in the Energy Sector (Trial) ". The energy sector is at the heart of a dual transition: on one hand, the escalation of cyber threats, and on the other, the acceleration towards the integration of advanced technologies like Artificial Intelligence (AI). This

Gabriele Iuvinale
12 dic 2025Tempo di lettura: 6 min


Russia and China: Convergence of Cyber Control. The Rise of Centralized Cyber Security Models (FSB and CCP) and the New Frontiers of Preventive Surveillance
Both China and Russia are significantly strengthening their respective cybersecurity regulatory frameworks. A comparative analysis of the amendments to China's Cybersecurity Law (CSL) (effective January 2026) and the new Russian FSB ordinances ( draft regulatory proposals currently under public consultation , slated to take effect in January 2026) reveals strong analogies in their strategies for cyberspace control. These reflect common geopolitical trends oriented toward c

Gabriele Iuvinale
24 nov 2025Tempo di lettura: 4 min


China, the End-Pipe-Cloud Dossier: Systemic Vulnerabilities, Critical Dependency, and the Geopolitical Imperative of Autonomy in National LAIN
The Low-Altitude Economy (LAE) is recognized as a strategic pillar in China, qualifying as a key representative of "new quality productive forces" and a vital engine for achieving the national goal of technological self-reliance and self-improvement . This rapid expansion, encompassing the movement of drones and eVTOL aircraft, relies on the critical infrastructure known as the Low-Altitude Aerial Intelligent Network (LAIN) . The China Industrial Internet Research Institute

Gabriele Iuvinale
22 nov 2025Tempo di lettura: 13 min


The Nationalization of Cyber Know-How: The Coercive Architecture Shaping China's “Strong Cyber Nation”
How DJBH, the “Three Harmonizations and Six Defenses” doctrine, and Digital Security ERP transform private companies into an operational arm of state cyber defense The cybersecurity landscape in China is defined by a national integration strategy that transcends the traditional separation between the private sector and the state defense apparatus. Far from being a mere commercial relationship, this synergy is the result of an explicit regulatory framework that inextricably li

Gabriele Iuvinale
20 nov 2025Tempo di lettura: 4 min


The global overtaking project: the Sinocentric doctrine of wireless technology, the crisis of standards, and the risk of digital slavery (Extrema Ratio Intelligence)
The competition between the People's Republic of China (PRC) and the West has now taken on the form of Liminal Warfare , a systemic conflict in which the future of the global order is at stake. Since Xi Jinping came to power in 2012, the Chinese leadership has translated its desire for power into an explicit geostrategic doctrine: global technological dominance , with the stated goal of surpassing the United States and establishing a new Sinocentric world order (the conc

Gabriele Iuvinale
12 nov 2025Tempo di lettura: 6 min


Italy, the Marghera Port Paradox: Green Chinese Cranes, Cyber Risk, and the Urgency of National Security - OSINT
Although the Chinese company has always denied the cyber threat, the arrival of ZPMC cranes reopens international alarm over the CCP's cyber “Trojan horse.” The current geopolitical and security scenario sees the maritime sector emerging as a crucial battleground for strategic competition, particularly with the People's Republic of China (PRC) and its state-owned enterprises. The imminent arrival of new Chinese-made yard cranes (E-RTGs) at the Vecon-PSA Venice terminal i

Gabriele Iuvinale
5 nov 2025Tempo di lettura: 7 min


The End of Stealth? China's AEW Airship Threat and the Necessary Dual-Track Response for the F-35
The End of Stealth? China's AEW Airship Threat and the Necessary Dual-Track Response for the F-35
Nicola Iuvinale
3 nov 2025Tempo di lettura: 5 min


Beidou: The Concrete Exemplification of “Xi Jinping Thought” — From Geospatial Dependence to Total Technological Autarky
The rise of the Beidou Satellite Navigation System (BDS) is not merely a chronicle of Chinese technological success, but the palpable manifestation of a strategic imperative for autarky imposed by the leadership of Xi Jinping . Starting from the necessity to eliminate a crippling technological vulnerability—reliance on GNSS (Global Navigation Satellite System) controlled by foreign powers—China has forged Beidou into an instrument of Information Sovereignty ( 信息主权 ) and,

Gabriele Iuvinale
29 ott 2025Tempo di lettura: 5 min
bottom of page