top of page

Cerca


Italy, the Marghera Port Paradox: Green Chinese Cranes, Cyber Risk, and the Urgency of National Security - OSINT
Although the Chinese company has always denied the cyber threat, the arrival of ZPMC cranes reopens international alarm over the CCP's cyber “Trojan horse.” The current geopolitical and security scenario sees the maritime sector emerging as a crucial battleground for strategic competition, particularly with the People's Republic of China (PRC) and its state-owned enterprises. The imminent arrival of new Chinese-made yard cranes (E-RTGs) at the Vecon-PSA Venice terminal i

Gabriele Iuvinale
7 giorni faTempo di lettura: 7 min


The End of Stealth? China's AEW Airship Threat and the Necessary Dual-Track Response for the F-35
The End of Stealth? China's AEW Airship Threat and the Necessary Dual-Track Response for the F-35
Nicola Iuvinale
3 novTempo di lettura: 5 min


Beidou: The Concrete Exemplification of “Xi Jinping Thought” — From Geospatial Dependence to Total Technological Autarky
The rise of the Beidou Satellite Navigation System (BDS) is not merely a chronicle of Chinese technological success, but the palpable manifestation of a strategic imperative for autarky imposed by the leadership of Xi Jinping . Starting from the necessity to eliminate a crippling technological vulnerability—reliance on GNSS (Global Navigation Satellite System) controlled by foreign powers—China has forged Beidou into an instrument of Information Sovereignty ( 信息主权 ) and,

Gabriele Iuvinale
29 ottTempo di lettura: 5 min


BEIJING, OCTOBER 28, 2025: THE NEXT FIVE YEARS WILL BE A REAL “WAR”
The Formulation of the 15th Five-Year Plan (2026-2030): The Inevitable Merger of Security and Development in Xi Jinping's Imperial Mandate The global geopolitical landscape has been unequivocally redefined by the outcomes of the Fourth Plenum of the 20th Central Committee of the Communist Party of China (CPC) , which concluded in Beijing in October 2025. The immediate context is marked by the public release today, October 28, 2025 , of the two documents that constitute the id

Gabriele Iuvinale
28 ottTempo di lettura: 7 min


National Security Rides on Robots: The Attack on GeekCon and China's Standardization Strategy for the Embodied AI Ecosystem
The advent of Embodied AI , with increasingly autonomous and integrated humanoid robots, marked a point of no return in global security. Cyber threats have moved beyond the realm of code to manifest as risks of physical harm and destruction. The news is dominated by the " GeekCon 2025 Fist ," the incident in which a hacker attack on a Chinese robot demonstrated how easily a machine can be compromised and turned into a weapon, even a "digital Trojan horse" capable of infecting

Gabriele Iuvinale
27 ottTempo di lettura: 7 min


The Anatomy of Modernization: A Financial and Strategic OSINT Analysis of China's Future Military Power
The Anatomy of Modernization: A Financial and Strategic OSINT Analysis of China's Future Military Power
Nicola Iuvinale
21 ottTempo di lettura: 5 min


Chinese AI Redefines Efficiency: DeepSeek Releases OCR That Digitizes 200,000 Pages/Day, but Washington Suspects Links to Surveillance and Military Apparatus
The announcement today, October 20, 2025 , by DeepSeek regarding the open-source release of its DeepSeek-OCR model—focused on two-dimensional optical compression—occurs within a geoeconomic scenario marked by fierce competition in artificial intelligence. However, the news of this technical innovation clashes with a much hotter chapter whose roots go back some time : the serious accusations leveled by Washington against DeepSeek, suspecting it of supporting Beijing’s mil

Gabriele Iuvinale
20 ottTempo di lettura: 4 min


Detailed Analysis of the State-Sponsored APT Attack on China's National Time Service Center (NTSC)
On October 19, the Chinese national security agencies recently disclosed a major cyberattack case, stating they obtained irrefutable evidence that the United States’ National Security Agency (NSA) launched a cyberattack and infiltrated China's National Time Service Center (NTSC) . The cyberattack was long-planned, progressive, and systematic. Starting in 2022, the U.S. exploited a vulnerability in the SMS service of a foreign-branded mobile phone to secretly attack and contr

Gabriele Iuvinale
19 ottTempo di lettura: 3 min


The Rise of Beidou: Strategic Analysis and NATO Countermeasures
The Rise of Beidou: Strategic Analysis and NATO Countermeasures
Nicola Iuvinale
13 ottTempo di lettura: 4 min


The Encrypted Heart of 6G: China's Satellite-Based Immune Defense Against Geopolitical Crisis and Quantum Computing
Abstract The global race toward sixth-generation ( 6G ) networks isn't just a competition for speed; it's a geopolitical conflict for...

Gabriele Iuvinale
12 ottTempo di lettura: 7 min


China 2025: The Cloud as a Tool for Digital Power and Sovereignty
By 2025, China has definitively elevated Cloud Computing (云计算, Yún Jìsuàn ) from a mere technology service to an infrastructure of...

Gabriele Iuvinale
11 ottTempo di lettura: 7 min


Intelligence Analysis: China's Doctrine of Integrated Dominance and the Breaking Point in Intelligent Warfare
The current strategy of the People's Republic of China (PRC) is defined as a "long-term, high-pressure strategic game" (長期高壓的戰略博弈) ,...

Gabriele Iuvinale
7 ottTempo di lettura: 5 min


China’s Dual Cyber Strategy: Autonomy, Offensive Projection, and the Race for Digital Sovereignty - Analysis
China's Strategic Duality—Technological Autonomy vs. Asymmetric Offense China's cybersecurity strategy has evolved into a complex,...

Gabriele Iuvinale
6 ottTempo di lettura: 7 min


Strategic Analysis: China's Doctrine on APP Security and Implications for Cyber Intelligence
The 2025 CAICT Report ( "Guidelines for Risk Classification and Grading of Mobile Internet Applications (APP) (2025) ") is not merely a...

Gabriele Iuvinale
3 ottTempo di lettura: 3 min


Chinese Digital Sovereignty: Beijing's Dual Truth Between GAI Domination and Operational Vulnerabilities - Analysis
From Staticity to the Fifth Line: The Doctrine of Active Defense and Architectural Risks Abstract This analysis decodes the cybersecurity...

Gabriele Iuvinale
26 setTempo di lettura: 7 min


Chinese Drone Experts Deploy to Russia, Deepening Collaboration on Military UAVs for Ukraine War. China's Dual Role: Fuelling Russia's War while Powering EU's High-Tech Imports
Chinese Drone Experts Deploy to Russia, Deepening Collaboration on Military UAVs for Ukraine War. China's Dual Role: Fuelling Russia's War while Powering EU's High-Tech Imports
Nicola Iuvinale
25 setTempo di lettura: 4 min


Geopolitics of Cryptography: The Impact of New Regulations in China and Russia on Critical Infrastructure and Global Security
China and Russia are introducing stringent regulations on the use of cryptography to protect their critical infrastructure, an action...

Gabriele Iuvinale
23 setTempo di lettura: 4 min


China's cybersecurity strategy: between national protection and speech control
Beijing's new strategy between cyber defense and repression of dissent Recent moves by the Cyberspace Administration of China (CAC)...

Gabriele Iuvinale
22 setTempo di lettura: 3 min


How the TikTok deal betrays US national security, ensuring the triumph of China's strategy
The framework agreement between the United States and China on TikTok is not a diplomatic solution, but a blatant and humiliating...

Gabriele Iuvinale
21 setTempo di lettura: 4 min


The geopolitics of semiconductors: Chinese analysis reveals Beijing's next moves between collaboration and security risks
A recent study from the prestigious Chinese Academy of Sciences offers a rare look into China’s strategy for strengthening its...

Gabriele Iuvinale
19 setTempo di lettura: 3 min
bottom of page