top of page

Cerca


The Digital Iron Curtain: The Paradox of Reciprocity Between the U.S. FCC and Beijing’s New Technological Order
From the Hikvision sanctions to the Cybersecurity Label 2026: the end of technological neutrality The current international landscape is marked by an unprecedented convergence of national security and technology trade, with the United States and China adopting mirror-image strategies to fortify their digital ecosystems. What is emerging is what we might call the paradox of reciprocity: while Washington accuses Chinese companies of opacity and potential espionage, Beijing resp

Gabriele Iuvinale
8 magTempo di lettura: 4 min


BEYOND THE EXCHANGE RATE: CURRENCY MANIPULATION AS A CORE OPERATIONAL AXIS OF CHINESE LIMINAL WARFARE
MONETARY SUBJUGATION: THE PEOPLE’S BANK OF CHINA AS A WEAPON OF XI JINPING’S GREY ZONE STRATEGY The geoeconomic landscape of early 2026 confirms that the People’s Republic of China (PRC) has succeeded in transforming its monetary policy from a macroeconomic tool into a fundamental pillar of “liminal warfare.” As detailed in the strategic report Europe Under Attack 2025, Beijing’s global strategy is based on occupying the “gray zone”: systematically operating below the thresho

Gabriele Iuvinale
7 magTempo di lettura: 4 min


THE INDUSTRIAL ANNIHILATION OF THE COSMOS: XI JINPING’S ASSEMBLY LINE AND THE WAR FOR ORBITAL MONOPOLY
THE INDUSTRIAL ANNIHILATION OF THE COSMOS: XI JINPING’S ASSEMBLY LINE AND THE WAR FOR ORBITAL MONOPOLY
Nicola Iuvinale
7 magTempo di lettura: 4 min


The New Great Game: Geopolitical Rivalry and Technological Warfare in China’s Deep-Sea Exploitation
China’s rise as a global maritime power is taking place against a backdrop of systemic competition among major powers, where technological dominance and access to deep-sea resources have become the cornerstones of national security and sustainable development. The picture emerging from recent analyses by the Chinese Academy of Sciences highlights an integrated strategy aimed at transforming industrial advantage into normative and geoeconomic hegemony, despite the persistence

Gabriele Iuvinale
6 magTempo di lettura: 4 min


The Great Reverse Engineering Lab: China's Hunt for U.S. Military Secrets in Iran and Ukraine
An analysis of the current military and intelligence landscape reveals that China is working to secure every scrap of Western technology that has emerged from the conflicts in Iran and Ukraine, with the aim of meticulously mapping the Pentagon’s vulnerabilities through rigorous technical intelligence (TECHINT) operations. Chinese flag on Iranian territory - GettyImages Beijing acts as a silent technological predator, exploiting the geographical and operational positions of it

Gabriele Iuvinale
29 aprTempo di lettura: 3 min


The Digital Crime Axis: An Analysis of the Convergence Between Intelligence and Organized Crime in China and Russia
This analysis, based on the findings of the joint hearings of the Subcommittee on Border Security and Law Enforcement and the Subcommittee on Cybersecurity and Infrastructure Security—held on April 21 at the U.S. House of Representatives—outlines a hybrid threat that extends beyond U.S. borders to affect the entire Western security architecture. Chinese flag and a puzzle of the Russian flag. Photo: Getty Images The Architecture of Sino-Russian Money Laundering and Support fo

Gabriele Iuvinale
28 aprTempo di lettura: 3 min


The Dragon’s Lab: Mastering China’s Strategic Playbook, Global Dealmaking, and the National Security Compliance Frontier
The global biotechnological landscape is undergoing a tectonic shift as China transitions from a manufacturing hub for generics into the world’s primary engine for therapeutic innovation. In the first quarter of 2026, licensing transactions for innovative drugs reached $60 billion, signaling an acceleration that challenges the historical leadership of the United States and Europe. This is no longer merely a commercial competition; it is what analysts define as the "New Great

Gabriele Iuvinale
27 aprTempo di lettura: 4 min


Shadow Networks: The Evolution of Chinese TTPs and Operational Invisibility in the Gray Zone
This analysis examines the recent paradigm shift in cyber operations conducted by actors linked to the People’s Republic of China, with particular reference to the strategic use of large-scale covert networks composed of compromised devices. Evidence gathered by international security agencies, led by the UK’s National Cyber Security Centre and its global partners, paints a picture in which the distinction between civilian and military infrastructure is becoming increasingly

Gabriele Iuvinale
24 aprTempo di lettura: 5 min


The General Electric Case: When a Flaw in the Corporate System Fuels Beijing’s Arsenal
The Consent Agreement signed on April 14-17, 2026, between the U.S. Department of State and General Electric (GE) is not merely a $36 million penalty, but a testament to a strategic vulnerability that granted China access to invaluable technological secrets. For years, GE was unwittingly transformed into a reservoir of technical information for the People’s Republic of China (PRC) due to internal controls that authorities described as “systematically deficient.” Inspecting Je

Gabriele Iuvinale
23 aprTempo di lettura: 4 min


Tokyo and Washington’s crackdown on Chinese technology: moving toward a global security perimeter while Europe remains exposed
The Japanese government has officially announced a national strategy to completely phase out Chinese technologies from the IT systems of all local governments by the summer of 2027. This initiative, coordinated by the Digital Agency and the Ministry of Internal Affairs and Communications , aims to protect citizens’ sensitive data and the integrity of civil infrastructure from potential espionage or sabotage orchestrated by foreign actors through supply chain compromise. Gett

Gabriele Iuvinale
22 aprTempo di lettura: 3 min


Liminal Domain: China’s Strategy to Militarize Dark Web Intelligence and Close the Decade-Long Gap - Analysis
China’s presence in cyberspace is undergoing an unprecedented transformation, shifting from a fragmented defensive posture to a model of proactive, centralized surveillance. At the heart of this strategy lies the imperative need to dominate so-called “liminal power”—that is, the ability to act and monitor the digital gray zones where the distinction between civil, military, and criminal threats blurs. Beijing has identified its historical weakness in monitoring the Dark Web a

Gabriele Iuvinale
9 aprTempo di lettura: 4 min


The Acoustic Shadow of the Digital Silk Road: Transforming the Global Fiber-Optic Infrastructure into a Chinese Surveillance Network
The illusion of the invulnerability of fiber-optic communication systems has been officially shattered by groundbreaking research conducted by researchers at the Hong Kong Polytechnic University and the Chinese University of Hong Kong. The study, presented at the NDSS 2026 symposium, reveals how the global telecommunications infrastructure can be transformed into a widespread network of clandestine microphones through the exploitation of acoustic side channels. This threat

Gabriele Iuvinale
8 aprTempo di lettura: 7 min


Operation "Transparent Ocean": A Strategic Analysis of the Threat Posed by China’s Bionic Fish and the Role of Xiamen University
Abstract and Strategic Context This strategic technical report analyzes the transformation of the People’s Republic of China’s submarine warfare and intelligence capabilities through the use of biomimetic robotics. The analysis is based on a study conducted by Xiamen University titled “ Progress and Analysis of Research on High-Speed Underwater Bionic Robot Fish ” and on the context provided by technical documents from the Chinese Academy of Sciences regarding the “Transparen

Gabriele Iuvinale
2 aprTempo di lettura: 4 min


Strategic Report: Synchrony and Silence: Toward a NATO Distributed Resilience Doctrine against PLA Intelligentized Warfare
Strategic Report: Synchrony and Silence: Toward a NATO Distributed Resilience Doctrine against PLA Intelligentized Warfare
Nicola Iuvinale
31 marTempo di lettura: 9 min


Beyond Stealth: How Chinese Military Research Aims to Neutralize Next-Generation Stealth Fighters
The evolution of China's air defense is shifting from upgrading individual hardware to creating an intelligent, predictive network architecture. As highlighted in a recent study by the PLA Air Force Engineering University, the goal is to overcome the limitations of current radars (such as those in operation in Iran), which often lose contact when a stealth aircraft changes attitude due to the dynamic and fluctuating nature of the radar cross-section (RCS). The new strategy i

Gabriele Iuvinale
30 marTempo di lettura: 2 min


The Russia-China Strategic Fracture and the Fight for Geopolitical Survival in the Indo-Pacific
The Russia-China Strategic Fracture and the Fight for Geopolitical Survival in the Indo-Pacific
Nicola Iuvinale
29 marTempo di lettura: 4 min


Technical-Strategic Report on the Risks Posed by the People's Republic of China's Maritime Intelligence Network and Seabed Activities
An analysis of a series of technical documents published by the Chinese Academy of Sciences in 2026 outlines China’s transformation into a global maritime power through mastery of cutting-edge technology. The cornerstone of this strategy is the intelligence system known as Precision Marine Environmental Assurance, a comprehensive end-to-end architecture that integrates observation, forecasting, enforcement, and assessment to ensure national security and the protection of ma

Gabriele Iuvinale
26 marTempo di lettura: 3 min


Computational Sovereignty: An Analysis of China’s Computing Capacity and Civil-Military Integration by 2026
China's military computing capabilities have developed rapidly over the past decade, and the country is committed to transforming computing power into combat power—a goal that, in the context of smart, information-based warfare, elevates this resource to one of the fundamental modern combat capabilities. GettyImages According to data from the March 2026 report by the China Academy of Information and Communications Technology (CAICT), Beijing has consolidated a total computin

Gabriele Iuvinale
17 marTempo di lettura: 3 min


ANALYSIS OF THE PARADIGM SHIFT IN IRANIAN DEFENSE. Assessment of Iranian Military Integration of the Chinese BeiDou-3 System (BDS) and Enhanced Integrated Air Defense Network (IADS) via Chinese Assets
ANALYSIS OF THE PARADIGM SHIFT IN IRANIAN DEFENSE. Assessment of Iranian Military Integration of the Chinese BeiDou-3 System (BDS) and Enhanced Integrated Air Defense Network (IADS) via Chinese Assets
Nicola Iuvinale
13 marTempo di lettura: 5 min


The Silk Code: China Standards 2035 and the Battle for the Global Operating System
Standardization today represents the invisible architecture on which the global economy is based, because it defines the technical rules that allow different devices and systems to communicate with each other harmoniously. Those who succeed in imposing their standards effectively control global markets, as they force all other economic players to pay licensing fees and follow technological paths already mapped out by the first innovator. A recent study by the Chinese Academy

Gabriele Iuvinale
4 marTempo di lettura: 6 min
bottom of page