top of page

Cerca


The Guarantor of Last Resort: Beijing's comprehensive strategy for Iran's survival
The publication of the report “ Tightening the Net: China's Infrastructure of Oppression in Iran ” by Article 19 has brought to light the decisive role of Chinese technology in the repression of the Iranian protests that broke out at the end of last year. In particular, the document describes how Beijing provided Tehran not only with the regulatory model, but also with the technical infrastructure necessary to impose an almost total information blackout, isolating the civilia

Gabriele Iuvinale
9 febTempo di lettura: 3 min


Quantum Technologies and National Security: State of the Art and Industrial Dynamics in the People's Republic of China
The development of quantum technologies now represents a fundamental pillar of global technological competition, where innovation capacity is inextricably linked to national security and digital sovereignty. The 2025 report by the China Academy of Information and Communications Technology (CAICT) highlights how quantum computing, encrypted communication, and precision sensing have become strategic drivers, leading over 30 countries to invest a total of more than $35 billion.

Gabriele Iuvinale
18 dic 2025Tempo di lettura: 3 min


China Establishes Digital Energy Fortress: Strategic Classification of National Data Introduced with Level 4 Protection for “Fundamental Data” that Impacts Political Security
In the global landscape where cybersecurity is inextricably linked with geopolitical stability, China's National Energy Administration (NEA) has responded firmly by promulgating the " Measures for Data Security Management in the Energy Sector (Trial) ". The energy sector is at the heart of a dual transition: on one hand, the escalation of cyber threats, and on the other, the acceleration towards the integration of advanced technologies like Artificial Intelligence (AI). This

Gabriele Iuvinale
12 dic 2025Tempo di lettura: 6 min


Russia and China: Convergence of Cyber Control. The Rise of Centralized Cyber Security Models (FSB and CCP) and the New Frontiers of Preventive Surveillance
Both China and Russia are significantly strengthening their respective cybersecurity regulatory frameworks. A comparative analysis of the amendments to China's Cybersecurity Law (CSL) (effective January 2026) and the new Russian FSB ordinances ( draft regulatory proposals currently under public consultation , slated to take effect in January 2026) reveals strong analogies in their strategies for cyberspace control. These reflect common geopolitical trends oriented toward c

Gabriele Iuvinale
24 nov 2025Tempo di lettura: 4 min


China, the End-Pipe-Cloud Dossier: Systemic Vulnerabilities, Critical Dependency, and the Geopolitical Imperative of Autonomy in National LAIN
The Low-Altitude Economy (LAE) is recognized as a strategic pillar in China, qualifying as a key representative of "new quality productive forces" and a vital engine for achieving the national goal of technological self-reliance and self-improvement . This rapid expansion, encompassing the movement of drones and eVTOL aircraft, relies on the critical infrastructure known as the Low-Altitude Aerial Intelligent Network (LAIN) . The China Industrial Internet Research Institute

Gabriele Iuvinale
22 nov 2025Tempo di lettura: 13 min


The Nationalization of Cyber Know-How: The Coercive Architecture Shaping China's “Strong Cyber Nation”
How DJBH, the “Three Harmonizations and Six Defenses” doctrine, and Digital Security ERP transform private companies into an operational arm of state cyber defense The cybersecurity landscape in China is defined by a national integration strategy that transcends the traditional separation between the private sector and the state defense apparatus. Far from being a mere commercial relationship, this synergy is the result of an explicit regulatory framework that inextricably li

Gabriele Iuvinale
20 nov 2025Tempo di lettura: 4 min


The global overtaking project: the Sinocentric doctrine of wireless technology, the crisis of standards, and the risk of digital slavery (Extrema Ratio Intelligence)
The competition between the People's Republic of China (PRC) and the West has now taken on the form of Liminal Warfare , a systemic conflict in which the future of the global order is at stake. Since Xi Jinping came to power in 2012, the Chinese leadership has translated its desire for power into an explicit geostrategic doctrine: global technological dominance , with the stated goal of surpassing the United States and establishing a new Sinocentric world order (the conc

Gabriele Iuvinale
12 nov 2025Tempo di lettura: 6 min


Italy, the Marghera Port Paradox: Green Chinese Cranes, Cyber Risk, and the Urgency of National Security - OSINT
Although the Chinese company has always denied the cyber threat, the arrival of ZPMC cranes reopens international alarm over the CCP's cyber “Trojan horse.” The current geopolitical and security scenario sees the maritime sector emerging as a crucial battleground for strategic competition, particularly with the People's Republic of China (PRC) and its state-owned enterprises. The imminent arrival of new Chinese-made yard cranes (E-RTGs) at the Vecon-PSA Venice terminal i

Gabriele Iuvinale
5 nov 2025Tempo di lettura: 7 min


The End of Stealth? China's AEW Airship Threat and the Necessary Dual-Track Response for the F-35
The End of Stealth? China's AEW Airship Threat and the Necessary Dual-Track Response for the F-35
Nicola Iuvinale
3 nov 2025Tempo di lettura: 5 min


Beidou: The Concrete Exemplification of “Xi Jinping Thought” — From Geospatial Dependence to Total Technological Autarky
The rise of the Beidou Satellite Navigation System (BDS) is not merely a chronicle of Chinese technological success, but the palpable manifestation of a strategic imperative for autarky imposed by the leadership of Xi Jinping . Starting from the necessity to eliminate a crippling technological vulnerability—reliance on GNSS (Global Navigation Satellite System) controlled by foreign powers—China has forged Beidou into an instrument of Information Sovereignty ( 信息主权 ) and,

Gabriele Iuvinale
29 ott 2025Tempo di lettura: 5 min


BEIJING, OCTOBER 28, 2025: THE NEXT FIVE YEARS WILL BE A REAL “WAR”
The Formulation of the 15th Five-Year Plan (2026-2030): The Inevitable Merger of Security and Development in Xi Jinping's Imperial Mandate The global geopolitical landscape has been unequivocally redefined by the outcomes of the Fourth Plenum of the 20th Central Committee of the Communist Party of China (CPC) , which concluded in Beijing in October 2025. The immediate context is marked by the public release today, October 28, 2025 , of the two documents that constitute the id

Gabriele Iuvinale
28 ott 2025Tempo di lettura: 7 min


National Security Rides on Robots: The Attack on GeekCon and China's Standardization Strategy for the Embodied AI Ecosystem
The advent of Embodied AI , with increasingly autonomous and integrated humanoid robots, marked a point of no return in global security. Cyber threats have moved beyond the realm of code to manifest as risks of physical harm and destruction. The news is dominated by the " GeekCon 2025 Fist ," the incident in which a hacker attack on a Chinese robot demonstrated how easily a machine can be compromised and turned into a weapon, even a "digital Trojan horse" capable of infecting

Gabriele Iuvinale
27 ott 2025Tempo di lettura: 7 min


The Anatomy of Modernization: A Financial and Strategic OSINT Analysis of China's Future Military Power
The Anatomy of Modernization: A Financial and Strategic OSINT Analysis of China's Future Military Power
Nicola Iuvinale
21 ott 2025Tempo di lettura: 5 min


Chinese AI Redefines Efficiency: DeepSeek Releases OCR That Digitizes 200,000 Pages/Day, but Washington Suspects Links to Surveillance and Military Apparatus
The announcement today, October 20, 2025 , by DeepSeek regarding the open-source release of its DeepSeek-OCR model—focused on two-dimensional optical compression—occurs within a geoeconomic scenario marked by fierce competition in artificial intelligence. However, the news of this technical innovation clashes with a much hotter chapter whose roots go back some time : the serious accusations leveled by Washington against DeepSeek, suspecting it of supporting Beijing’s mil

Gabriele Iuvinale
20 ott 2025Tempo di lettura: 4 min


Detailed Analysis of the State-Sponsored APT Attack on China's National Time Service Center (NTSC)
On October 19, the Chinese national security agencies recently disclosed a major cyberattack case, stating they obtained irrefutable evidence that the United States’ National Security Agency (NSA) launched a cyberattack and infiltrated China's National Time Service Center (NTSC) . The cyberattack was long-planned, progressive, and systematic. Starting in 2022, the U.S. exploited a vulnerability in the SMS service of a foreign-branded mobile phone to secretly attack and contr

Gabriele Iuvinale
19 ott 2025Tempo di lettura: 3 min


The Rise of Beidou: Strategic Analysis and NATO Countermeasures
The Rise of Beidou: Strategic Analysis and NATO Countermeasures
Nicola Iuvinale
13 ott 2025Tempo di lettura: 4 min


The Encrypted Heart of 6G: China's Satellite-Based Immune Defense Against Geopolitical Crisis and Quantum Computing
Abstract The global race toward sixth-generation ( 6G ) networks isn't just a competition for speed; it's a geopolitical conflict for...

Gabriele Iuvinale
12 ott 2025Tempo di lettura: 7 min


China 2025: The Cloud as a Tool for Digital Power and Sovereignty
By 2025, China has definitively elevated Cloud Computing (云计算, Yún Jìsuàn ) from a mere technology service to an infrastructure of...

Gabriele Iuvinale
11 ott 2025Tempo di lettura: 7 min


Intelligence Analysis: China's Doctrine of Integrated Dominance and the Breaking Point in Intelligent Warfare
The current strategy of the People's Republic of China (PRC) is defined as a "long-term, high-pressure strategic game" (長期高壓的戰略博弈) ,...

Gabriele Iuvinale
7 ott 2025Tempo di lettura: 5 min


China’s Dual Cyber Strategy: Autonomy, Offensive Projection, and the Race for Digital Sovereignty - Analysis
China's Strategic Duality—Technological Autonomy vs. Asymmetric Offense China's cybersecurity strategy has evolved into a complex,...

Gabriele Iuvinale
6 ott 2025Tempo di lettura: 7 min
bottom of page