top of page

Cerca


Liminal Domain: China’s Strategy to Militarize Dark Web Intelligence and Close the Decade-Long Gap - Analysis
China’s presence in cyberspace is undergoing an unprecedented transformation, shifting from a fragmented defensive posture to a model of proactive, centralized surveillance. At the heart of this strategy lies the imperative need to dominate so-called “liminal power”—that is, the ability to act and monitor the digital gray zones where the distinction between civil, military, and criminal threats blurs. Beijing has identified its historical weakness in monitoring the Dark Web a

Gabriele Iuvinale
5 giorni faTempo di lettura: 4 min


The Acoustic Shadow of the Digital Silk Road: Transforming the Global Fiber-Optic Infrastructure into a Chinese Surveillance Network
The illusion of the invulnerability of fiber-optic communication systems has been officially shattered by groundbreaking research conducted by researchers at the Hong Kong Polytechnic University and the Chinese University of Hong Kong. The study, presented at the NDSS 2026 symposium, reveals how the global telecommunications infrastructure can be transformed into a widespread network of clandestine microphones through the exploitation of acoustic side channels. This threat

Gabriele Iuvinale
6 giorni faTempo di lettura: 7 min


Operation "Transparent Ocean": A Strategic Analysis of the Threat Posed by China’s Bionic Fish and the Role of Xiamen University
Abstract and Strategic Context This strategic technical report analyzes the transformation of the People’s Republic of China’s submarine warfare and intelligence capabilities through the use of biomimetic robotics. The analysis is based on a study conducted by Xiamen University titled “ Progress and Analysis of Research on High-Speed Underwater Bionic Robot Fish ” and on the context provided by technical documents from the Chinese Academy of Sciences regarding the “Transparen

Gabriele Iuvinale
2 aprTempo di lettura: 4 min


The Russia-China Strategic Fracture and the Fight for Geopolitical Survival in the Indo-Pacific
The Russia-China Strategic Fracture and the Fight for Geopolitical Survival in the Indo-Pacific
Nicola Iuvinale
29 marTempo di lettura: 4 min


Technical-Strategic Report on the Risks Posed by the People's Republic of China's Maritime Intelligence Network and Seabed Activities
An analysis of a series of technical documents published by the Chinese Academy of Sciences in 2026 outlines China’s transformation into a global maritime power through mastery of cutting-edge technology. The cornerstone of this strategy is the intelligence system known as Precision Marine Environmental Assurance, a comprehensive end-to-end architecture that integrates observation, forecasting, enforcement, and assessment to ensure national security and the protection of ma

Gabriele Iuvinale
26 marTempo di lettura: 3 min


Countering China's Malicious Influence in the New U.S. Bill
The bill presented on Wednesday March 18 2026 by Representatives Derek Tran and Don Bacon along with colleagues Marilyn Strickland and Pat Harrigan marks a significant step in defining a more coordinated national defense strategy regarding Beijing's global activities. The legislative text named the Combating Chinese Communist Party Influence Act begins with a first section dedicated exclusively to defining the short title while the substantive content is developed in the se

Gabriele Iuvinale
19 marTempo di lettura: 2 min


The Securitization of Commerce: Analyzing China’s Revised Foreign Trade Law of 2026
On March 1, the Foreign Trade Law of the People’s Republic of China , which was revised and approved in December 2025, entered into force. It marks a clear departure from the principles of liberalization in favor of a governance model strongly centered on national security. Although the stated objective is to strengthen intellectual property rights and adapt legal instruments to geopolitical tensions, the legislation institutionalizes a clear securitization of foreign trade.

Gabriele Iuvinale
18 marTempo di lettura: 2 min


Computational Sovereignty: An Analysis of China’s Computing Capacity and Civil-Military Integration by 2026
China's military computing capabilities have developed rapidly over the past decade, and the country is committed to transforming computing power into combat power—a goal that, in the context of smart, information-based warfare, elevates this resource to one of the fundamental modern combat capabilities. GettyImages According to data from the March 2026 report by the China Academy of Information and Communications Technology (CAICT), Beijing has consolidated a total computin

Gabriele Iuvinale
17 marTempo di lettura: 3 min


ANALYSIS OF THE PARADIGM SHIFT IN IRANIAN DEFENSE. Assessment of Iranian Military Integration of the Chinese BeiDou-3 System (BDS) and Enhanced Integrated Air Defense Network (IADS) via Chinese Assets
ANALYSIS OF THE PARADIGM SHIFT IN IRANIAN DEFENSE. Assessment of Iranian Military Integration of the Chinese BeiDou-3 System (BDS) and Enhanced Integrated Air Defense Network (IADS) via Chinese Assets
Nicola Iuvinale
13 marTempo di lettura: 5 min


The Silk Code: China Standards 2035 and the Battle for the Global Operating System
Standardization today represents the invisible architecture on which the global economy is based, because it defines the technical rules that allow different devices and systems to communicate with each other harmoniously. Those who succeed in imposing their standards effectively control global markets, as they force all other economic players to pay licensing fees and follow technological paths already mapped out by the first innovator. A recent study by the Chinese Academy

Gabriele Iuvinale
4 marTempo di lettura: 6 min


The end of Trump's unilateral tariff policy? Legal, political, and geoeconomic analysis of the Supreme Court's historic ruling on presidential powers
On February 20, the US Supreme Court issued its final ruling , definitively invalidating the comprehensive tariff system launched by the Trump administration. The Executive's strategy, centered on invoking a state of national emergency to justify the widespread imposition of tariffs, was deemed entirely unconstitutional. The scope of this decision transcends the mere repeal of an economic trade program, constituting rather an unprecedented institutional clash and a peremptory

Gabriele Iuvinale
20 febTempo di lettura: 4 min


China's new WTO document: multilateral illusion to conceal capital controls, statism, and predatory mercantilism
On February 17, China submitted a position paper to the World Trade Organization (WTO) outlining its stance on WTO reform “under the current circumstances.” However, analysis of this policy document, officially released on February 18, 2026, requires careful consideration of Beijing's real intentions. In the text, Chinese diplomacy stands as the defender of an open, inclusive, and non-discriminatory multilateral trading system. However, comparing these statements with the ext

Gabriele Iuvinale
19 febTempo di lettura: 3 min


THE FINANCIAL "CHOKEPOINT" – BEIJING’S TREASURY DUMP AND THE KINETIC PARALYSIS OF JAPAN
The Silent Siren of the Steppes and the Death of Liquid Neutrality The global financial landscape of 2026 has been redefined by a "secret war" that transcends geographical borders and traditional military doctrines. While Western attention remained fixed on the expansion of the Chinese nuclear triad or tactical maneuvers in the South China Sea, a far more surgical operation was being executed in the high-frequency trading halls and sovereign bond markets. Beijing’s strategic
Nicola Iuvinale
17 febTempo di lettura: 4 min


Brief analysis: Strategic Integration and Sino-Russian Naval Enhancement in the Arctic Quadrant (2025-2026)
The evolution of dynamics in the Arctic during 2025 marked the definitive end of the conception of the region as an area almost closed to bilateral cooperation, overcoming old prejudices that divergent interests would prevent deep interaction between Moscow and Beijing. Global geopolitical pressure pushed the Russian Federation and the People's Republic of China towards structural integration that transformed the area into one of the most dynamic and visible sectors of their

Gabriele Iuvinale
16 febTempo di lettura: 4 min


The United States vs. Chinese group Suirui case and the escalation on the technological front: a geo-economic and legal analysis
February 9, 2026 marks a potentially historic date for jurisprudence related to US national security and foreign investment. The US Department of Justice filed a civil lawsuit in the District Court for the District of Columbia against Suirui Group Co. Ltd ., its subsidiary Suirui International, and Jupiter Systems, Inc. The lawsuit , which is the first enforcement action ever brought in federal court under Section 721 of the Defense Production Act of 1950, seeks to enforce a

Gabriele Iuvinale
11 febTempo di lettura: 4 min


The Guarantor of Last Resort: Beijing's comprehensive strategy for Iran's survival
The publication of the report “ Tightening the Net: China's Infrastructure of Oppression in Iran ” by Article 19 has brought to light the decisive role of Chinese technology in the repression of the Iranian protests that broke out at the end of last year. In particular, the document describes how Beijing provided Tehran not only with the regulatory model, but also with the technical infrastructure necessary to impose an almost total information blackout, isolating the civilia

Gabriele Iuvinale
9 febTempo di lettura: 3 min


The Energy Siege: The US Stranglehold on Russia, Iran, and Venezuela, and China's Strategy of Evading Sanctions and Transforming Fossil Fuel Dependency into Green Supremacy
Energy is the lifeblood of China's rise, but it is also the most exposed front in its national security. In a global context defined by competition between major powers, the People's Republic of China faces a critical paradox: its industrial and military power depends on resources it does not control and trade routes controlled by its strategic adversaries. With its dependence on oil imports consistently exceeding 70%, Beijing is not only seeking to secure daily supplies, bu

Gabriele Iuvinale
30 genTempo di lettura: 3 min


5G and Connected Vehicles: the EU takes precautions against the risk of sabotage, but between billion-dollar costs and risk incentives, “gray areas” remain regarding energy and critical infrastructure
The European Union is currently facing a fundamental shift in its national security architecture. The proposal of January 20, 2026, for a new policy package centered on the recast of Regulation (EU) 2019/881, known as " The Cybersecurity Act 2 " (document COM(2026) 11 final), will mark the definitive transition from a logic of voluntary recommendations to a regime of "mandatory risk reduction" for supply chains originating from high-risk third countries. The following analy

Gabriele Iuvinale
21 genTempo di lettura: 4 min


The CCP's algorithm on global trade: strategic analysis of the new social credit system for business evaluation
The architecture of international trade is undergoing a profound regulatory transformation that sees China at the center of a new phase of administrative and geoeconomic rigor. On January 15, 2026, the General Administration of Customs in Beijing officially issued Order No. 282, entitled " Measures of the Customs of the People's Republic of China for the Administration of Enterprise Credit Registration and Filing. " This measure, which will formally enter into force on April

Gabriele Iuvinale
16 genTempo di lettura: 3 min


The Quantum Eclipse: China's Strategy for Multidomain Supremacy
The Pentagon's latest annual report on military developments in the People's Republic of China marks a point of no return in the Western perception of the Asian technological threat. We are no longer facing a race to catch up, but a deliberate attempt by Beijing to rewrite the rules of war and intelligence through quantum technology , considered one of the " key forces for industrial transformation " and national security. This effort, which sees China pouring significant re

Gabriele Iuvinale
15 genTempo di lettura: 3 min
bottom of page