top of page

Cerca


Asymmetric weapons: from pharmacies to foundries, China is reshaping global power by eliminating the last American veto
China is implementing a systematic and programmatic strategy to build geoeconomic power levers, transforming global dependence into a tool for coercion while simultaneously ensuring self-sufficiency in its critical areas. This holistic strategy, where control over supply chains is a crucial weapon, aims to shape a new world order. Beijing has meticulously gained control over vital supply chains—dominating the markets for strategic sectors like Rare Earth Metals (REM) , Active

Gabriele Iuvinale
25 ottTempo di lettura: 5 min


The New Imperial Mandate: China's Inexorable Drive to Global Domination - Extrema Ratio's analysis of the fifteenth five-year plan
The Fourth Plenary Session of the 20th Central Committee of the Communist Party of China (CPC) , held in Beijing from October 20 to 23, 2025, approved the guidelines for the 15th Five-Year Plan (2026-2030) . This document does not represent a rupture, but the continuity and strategic intensification of policies initiated with the Fourteenth Five-Year Plan (2021-2025) and the long-term vision of Xi Jinping. China is preparing for a "long twilight struggle" against the West,

Gabriele Iuvinale
23 ottTempo di lettura: 11 min


From Geopolitics to Chips: China's Mission for Technological Self-Sufficiency in the 15th Five-Year Plan
How US Restrictions Catalyzed Huawei and the CCP's Circumvention Strategy Chinese chip manufacturers are implementing a strategy of ingenious innovation to circumvent American restrictions . In fact, the "microchip war," triggered by US restrictions starting in 2018, did not block the Chinese semiconductor industry but catalyzed its strategic response: innovation by circumvention . This approach is now officially enshrined as a national mission in the Communique of the Fourt

Gabriele Iuvinale
23 ottTempo di lettura: 10 min


THE STRATEGY OF DENIAL AT A CROSSROADS: Chinese Barges and the Urgency for US Action in Taiwan
THE STRATEGY OF DENIAL AT A CROSSROADS: Chinese Barges and the Urgency for US Action in Taiwan
Nicola Iuvinale
22 ottTempo di lettura: 4 min


The Anatomy of Modernization: A Financial and Strategic OSINT Analysis of China's Future Military Power
The Anatomy of Modernization: A Financial and Strategic OSINT Analysis of China's Future Military Power
Nicola Iuvinale
21 ottTempo di lettura: 5 min


Financial Cold War: China Dumps US Debt and Hoards Gold for Protection
Financial Cold War: China Dumps US Debt and Hoards Gold for Protection
Nicola Iuvinale
20 ottTempo di lettura: 4 min


Chinese AI Redefines Efficiency: DeepSeek Releases OCR That Digitizes 200,000 Pages/Day, but Washington Suspects Links to Surveillance and Military Apparatus
The announcement today, October 20, 2025 , by DeepSeek regarding the open-source release of its DeepSeek-OCR model—focused on two-dimensional optical compression—occurs within a geoeconomic scenario marked by fierce competition in artificial intelligence. However, the news of this technical innovation clashes with a much hotter chapter whose roots go back some time : the serious accusations leveled by Washington against DeepSeek, suspecting it of supporting Beijing’s mil

Gabriele Iuvinale
20 ottTempo di lettura: 4 min


Self-sufficiency or Protectionism? The Impact of China's New Public Procurement Policy on Global Trade
The recent publication by the Chinese State Council of the Notice on the Implementation of National Product Standards and Related Policies in Government Procurement ( 国办发〔2025〕34号 ), effective from January 1, 2026 , represents yet another measure favoring domestic companies and imposing significant limitations on foreign enterprises, thereby distorting the principles of the free market. GettyImages The 20% Price Advantage: The New Non-Tariff Barrier The core provision of t

Gabriele Iuvinale
20 ottTempo di lettura: 3 min


Detailed Analysis of the State-Sponsored APT Attack on China's National Time Service Center (NTSC)
On October 19, the Chinese national security agencies recently disclosed a major cyberattack case, stating they obtained irrefutable evidence that the United States’ National Security Agency (NSA) launched a cyberattack and infiltrated China's National Time Service Center (NTSC) . The cyberattack was long-planned, progressive, and systematic. Starting in 2022, the U.S. exploited a vulnerability in the SMS service of a foreign-branded mobile phone to secretly attack and contr

Gabriele Iuvinale
19 ottTempo di lettura: 3 min


Self-Sufficiency and Security: Analysis of China's Smart Computing Development Strategy and Its Technological Limitations
The current phase of global scientific and industrial transformation positions Smart Computing ( Zhìsuàn , 智算) as the fundamental productive force and a critical element of China's national security . The explosion in computing demand, particularly driven by generative artificial intelligence, has made technological self-reliance and strength a top priority. As President Xi Jinping stated , "A nation thrives through scientific advancement; a country grows strong with tech

Gabriele Iuvinale
17 ottTempo di lettura: 5 min


Strategic Finance and Chinese Digital Sovereignty: The REITs/AI Architecture between Geopolitics, CMF, and Legal Risks for Global Investors - Analysis
The recent report by the Chinese Academy of Information and Communications Technology (CAICT) on innovative financing for computing centers, focused on technical capital markets (Private Equity, ABS, REITs), it is a fundamental strategic declaration aimed at securing AI supremacy and digital sovereignty for China. The accelerated adoption of complex financial instruments, such as the first Public Data Center REITs (e.g., Southern GDS Data Center REIT, 508060.SH ), repr

Gabriele Iuvinale
16 ottTempo di lettura: 6 min


Intelligence Report: China's Leap in High-Precision Analog Computing (40 nm RRAM) – Architectural Evasion and Dual-Use Superiority in 6G and Electronic Warfare
I. Executive Summary: The Analog Breakthrough and Sanctions Evasion The innovation presented by the team led by Dr. Sun Zhong , affiliated with the Peking University Artificial Intelligence Research Institute , marks a fundamental turning point in computer architecture. The team successfully developed a scalable, high-precision analog matrix processing chip based on Resistive Random-Access Memory (RRAM), resolving the century-old "precision bottleneck" that had limited analog

Gabriele Iuvinale
14 ottTempo di lettura: 10 min


Increase in maritime transport tariffs: China responds to the United States with a special port tax - “If it's a fight, we'll fight to the end; if it's a negotiation, our door remains open.”
The escalation of restrictive measures in the maritime sector between the People's Republic of China and the United States of America is a clear indicator of growing global geopolitical and commercial tensions. The recent decision by Beijing to impose a Special Port Fee on US vessels, effective from October 14, 2025, is not an isolated move, but a direct and calibrated countermeasure to the tariffs and restrictions that Washington had previously imposed against the Chinese

Gabriele Iuvinale
14 ottTempo di lettura: 5 min


From Data to Dominance: The Economics of Chinese Computing Power and Its Global Implications
Abstract This in-depth strategic and competitive intelligence analysis examines China's Computing Power Economy (EPC, 算力经济, Suànlì Jīngjì ) , a core component of the nation's "New Quality Productive Forces" strategy . Leveraging data from the CAICT (2025) , the paper quantifies the EPC's massive infrastructure, including 10.431 million standard racks and 748 EFLOPS of intelligent computing power (Zhìsuàn) . It details the macro-level GDP spillover effect (0.0426% GDP growth

Gabriele Iuvinale
13 ottTempo di lettura: 9 min


The Rise of Beidou: Strategic Analysis and NATO Countermeasures
The Rise of Beidou: Strategic Analysis and NATO Countermeasures
Nicola Iuvinale
13 ottTempo di lettura: 4 min


The Encrypted Heart of 6G: China's Satellite-Based Immune Defense Against Geopolitical Crisis and Quantum Computing
Abstract The global race toward sixth-generation ( 6G ) networks isn't just a competition for speed; it's a geopolitical conflict for...

Gabriele Iuvinale
12 ottTempo di lettura: 7 min


China 2025: The Cloud as a Tool for Digital Power and Sovereignty
By 2025, China has definitively elevated Cloud Computing (云计算, Yún Jìsuàn ) from a mere technology service to an infrastructure of...

Gabriele Iuvinale
11 ottTempo di lettura: 7 min


From Shadow to Supremacy: China's Rise in Integrated Air-Space Domination — An OSINT Analysis of the 6G Roadmap and Strategic Resilience
Abstract This paper presents a strategic analysis of the People's Republic of China's comprehensive effort to achieve Information...

Gabriele Iuvinale
10 ottTempo di lettura: 6 min


OSINT: China Unveils the 'Stealth Factory' J-35. Calculated Production Rate Exposes New Naval Threat
OSINT: China Unveils the 'Stealth Factory' J-35. Calculated Production Rate Exposes New Naval Threat
Nicola Iuvinale
9 ottTempo di lettura: 4 min


The War of Satellites and Code: How Chinese ATK Software Conquers Space — Analysis of Chinese Digital Dominance and US Strategic Failure
For decades, the US software STK (System Tool Kit) (developed by AGI, now Ansys) has been the sole and indispensable digital...

Gabriele Iuvinale
9 ottTempo di lettura: 7 min
bottom of page