top of page

Cerca


The HyperStrong-SMA Deal and the Battle of the Labs: The Inverter as a Firewall in the 2026 Technological Decoupling
The recent strategic cooperation agreement between Chinese energy storage giant HyperStrong and Germany’s SMA Solar Technology represents far more than a standard commercial deal between two market leaders. Analyzed through the lens of economic intelligence, this agreement reveals itself as a sophisticated maneuver in geo-economic warfare and stands as one of the most emblematic case studies of the ongoing energy transition. The case demonstrates that global competition betwe

Gabriele Iuvinale
3 giorni faTempo di lettura: 7 min


The Digital Iron Curtain: The Paradox of Reciprocity Between the U.S. FCC and Beijing’s New Technological Order
From the Hikvision sanctions to the Cybersecurity Label 2026: the end of technological neutrality The current international landscape is marked by an unprecedented convergence of national security and technology trade, with the United States and China adopting mirror-image strategies to fortify their digital ecosystems. What is emerging is what we might call the paradox of reciprocity: while Washington accuses Chinese companies of opacity and potential espionage, Beijing resp

Gabriele Iuvinale
8 magTempo di lettura: 4 min


Bio-Intelligence: Biobanks as the New Battleground for Technological Rivalry and Systemic Risks Between China and the West
The geopolitical landscape of 2026 is marked by the definitive transformation of genomic data and storage infrastructure—biobanks—from scientific resources into pillars of national security. China has led this radical shift with regulations that took effect on January 1, 2025, which supplement the PIPL (Personal Information Protection Law) and the Data Security Law. In this context, large-scale genomic data and biological samples stored in biobanks are classified as "Core Dat

Gabriele Iuvinale
1 magTempo di lettura: 5 min


Shadow Networks: The Evolution of Chinese TTPs and Operational Invisibility in the Gray Zone
This analysis examines the recent paradigm shift in cyber operations conducted by actors linked to the People’s Republic of China, with particular reference to the strategic use of large-scale covert networks composed of compromised devices. Evidence gathered by international security agencies, led by the UK’s National Cyber Security Centre and its global partners, paints a picture in which the distinction between civilian and military infrastructure is becoming increasingly

Gabriele Iuvinale
24 aprTempo di lettura: 5 min


Tokyo and Washington’s crackdown on Chinese technology: moving toward a global security perimeter while Europe remains exposed
The Japanese government has officially announced a national strategy to completely phase out Chinese technologies from the IT systems of all local governments by the summer of 2027. This initiative, coordinated by the Digital Agency and the Ministry of Internal Affairs and Communications , aims to protect citizens’ sensitive data and the integrity of civil infrastructure from potential espionage or sabotage orchestrated by foreign actors through supply chain compromise. Gett

Gabriele Iuvinale
22 aprTempo di lettura: 3 min


Liminal Domain: China’s Strategy to Militarize Dark Web Intelligence and Close the Decade-Long Gap - Analysis
China’s presence in cyberspace is undergoing an unprecedented transformation, shifting from a fragmented defensive posture to a model of proactive, centralized surveillance. At the heart of this strategy lies the imperative need to dominate so-called “liminal power”—that is, the ability to act and monitor the digital gray zones where the distinction between civil, military, and criminal threats blurs. Beijing has identified its historical weakness in monitoring the Dark Web a

Gabriele Iuvinale
9 aprTempo di lettura: 4 min


The Acoustic Shadow of the Digital Silk Road: Transforming the Global Fiber-Optic Infrastructure into a Chinese Surveillance Network
The illusion of the invulnerability of fiber-optic communication systems has been officially shattered by groundbreaking research conducted by researchers at the Hong Kong Polytechnic University and the Chinese University of Hong Kong. The study, presented at the NDSS 2026 symposium, reveals how the global telecommunications infrastructure can be transformed into a widespread network of clandestine microphones through the exploitation of acoustic side channels. This threat

Gabriele Iuvinale
8 aprTempo di lettura: 7 min


Operation "Transparent Ocean": A Strategic Analysis of the Threat Posed by China’s Bionic Fish and the Role of Xiamen University
Abstract and Strategic Context This strategic technical report analyzes the transformation of the People’s Republic of China’s submarine warfare and intelligence capabilities through the use of biomimetic robotics. The analysis is based on a study conducted by Xiamen University titled “ Progress and Analysis of Research on High-Speed Underwater Bionic Robot Fish ” and on the context provided by technical documents from the Chinese Academy of Sciences regarding the “Transparen

Gabriele Iuvinale
2 aprTempo di lettura: 4 min


Beyond Stealth: How Chinese Military Research Aims to Neutralize Next-Generation Stealth Fighters
The evolution of China's air defense is shifting from upgrading individual hardware to creating an intelligent, predictive network architecture. As highlighted in a recent study by the PLA Air Force Engineering University, the goal is to overcome the limitations of current radars (such as those in operation in Iran), which often lose contact when a stealth aircraft changes attitude due to the dynamic and fluctuating nature of the radar cross-section (RCS). The new strategy i

Gabriele Iuvinale
30 marTempo di lettura: 2 min


Technical-Strategic Report on the Risks Posed by the People's Republic of China's Maritime Intelligence Network and Seabed Activities
An analysis of a series of technical documents published by the Chinese Academy of Sciences in 2026 outlines China’s transformation into a global maritime power through mastery of cutting-edge technology. The cornerstone of this strategy is the intelligence system known as Precision Marine Environmental Assurance, a comprehensive end-to-end architecture that integrates observation, forecasting, enforcement, and assessment to ensure national security and the protection of ma

Gabriele Iuvinale
26 marTempo di lettura: 3 min


Computational Sovereignty: An Analysis of China’s Computing Capacity and Civil-Military Integration by 2026
China's military computing capabilities have developed rapidly over the past decade, and the country is committed to transforming computing power into combat power—a goal that, in the context of smart, information-based warfare, elevates this resource to one of the fundamental modern combat capabilities. GettyImages According to data from the March 2026 report by the China Academy of Information and Communications Technology (CAICT), Beijing has consolidated a total computin

Gabriele Iuvinale
17 marTempo di lettura: 3 min


ANALYSIS OF THE PARADIGM SHIFT IN IRANIAN DEFENSE. Assessment of Iranian Military Integration of the Chinese BeiDou-3 System (BDS) and Enhanced Integrated Air Defense Network (IADS) via Chinese Assets
ANALYSIS OF THE PARADIGM SHIFT IN IRANIAN DEFENSE. Assessment of Iranian Military Integration of the Chinese BeiDou-3 System (BDS) and Enhanced Integrated Air Defense Network (IADS) via Chinese Assets
Nicola Iuvinale
13 marTempo di lettura: 5 min


The Silk Code: China Standards 2035 and the Battle for the Global Operating System
Standardization today represents the invisible architecture on which the global economy is based, because it defines the technical rules that allow different devices and systems to communicate with each other harmoniously. Those who succeed in imposing their standards effectively control global markets, as they force all other economic players to pay licensing fees and follow technological paths already mapped out by the first innovator. A recent study by the Chinese Academy

Gabriele Iuvinale
4 marTempo di lettura: 6 min


The Quantum Eclipse: China's Strategy for Multidomain Supremacy
The Pentagon's latest annual report on military developments in the People's Republic of China marks a point of no return in the Western perception of the Asian technological threat. We are no longer facing a race to catch up, but a deliberate attempt by Beijing to rewrite the rules of war and intelligence through quantum technology , considered one of the " key forces for industrial transformation " and national security. This effort, which sees China pouring significant re

Gabriele Iuvinale
15 genTempo di lettura: 3 min


From supertankers to superchips: The new BIS rule and Washington's double geoeconomic squeeze on Beijing
The following strategic analysis integrates the latest regulatory developments from the US Bureau of Industry and Security (BIS), the geo-economic dynamics of the realist paradigm, and the infrastructural challenges of China's artificial intelligence (AI) and data center ecosystem. The final rule issued today by the Bureau of Industry and Security (BIS), scheduled for publication in the Federal Register on January 15, 2026, marks a fundamental turning point in American stra

Gabriele Iuvinale
14 genTempo di lettura: 4 min


The Biotech Flywheel: How China is Overtaking the West in the New Great Power Competition
On December 19, 2025, the National Security Commission on Emerging Biotechnology (NSCEB) published a definitive staff paper entitled "The Future of U.S.-China Biotechnology Competition," signaling a critical inflection point in the global struggle for technological primacy. This document, building upon a sobering April 2025 assessment, warns that the window for the United States to retain its leadership in biotechnology is closing far faster than previously anticipated. Whil

Gabriele Iuvinale
29 dic 2025Tempo di lettura: 4 min


Quantum Technologies and National Security: State of the Art and Industrial Dynamics in the People's Republic of China
The development of quantum technologies now represents a fundamental pillar of global technological competition, where innovation capacity is inextricably linked to national security and digital sovereignty. The 2025 report by the China Academy of Information and Communications Technology (CAICT) highlights how quantum computing, encrypted communication, and precision sensing have become strategic drivers, leading over 30 countries to invest a total of more than $35 billion.

Gabriele Iuvinale
18 dic 2025Tempo di lettura: 3 min


Communication, navigation, and space telemetry: China reveals its cards in the battle for cis-lunar space
Amid the sidereal silence enveloping the competition between great powers, a recent document has made waves within circles of scientific diplomacy and space intelligence. In the latest issue of the Journal of Deep Space Exploration —a prestigious publication of the Beijing Institute of Technology — a technical analysis entitled Reflections on the Development of the Queqiao Integrated Navigation and Telemetry System has appeared, which reads like a programmatic manifesto. S

Gabriele Iuvinale
15 dic 2025Tempo di lettura: 4 min


Strategic Asymmetry: The Failure of China's Commercial Space Ecosystem as a Symptom of Technological Power Fragility - Analysis
The Chinese commercial space sector is the hottest front in 21st-century geoeconomic, strategic, and military intelligence competition , currently defined by power asymmetry and the overwhelming operational dominance of the United States . Beijing's goal of becoming an " aerospace power " is hampered by a "mixed and urgent situation" where the US, via the operational monopoly of SpaceX , has already saturated critical space resources, particularly Low Earth Orbit (LEO) and s

Gabriele Iuvinale
25 nov 2025Tempo di lettura: 5 min


China, the End-Pipe-Cloud Dossier: Systemic Vulnerabilities, Critical Dependency, and the Geopolitical Imperative of Autonomy in National LAIN
The Low-Altitude Economy (LAE) is recognized as a strategic pillar in China, qualifying as a key representative of "new quality productive forces" and a vital engine for achieving the national goal of technological self-reliance and self-improvement . This rapid expansion, encompassing the movement of drones and eVTOL aircraft, relies on the critical infrastructure known as the Low-Altitude Aerial Intelligent Network (LAIN) . The China Industrial Internet Research Institute

Gabriele Iuvinale
22 nov 2025Tempo di lettura: 13 min
bottom of page