top of page

Cerca


The Great Legal Wall: China’s Strategic Consolidation of National Security over Global Supply Chains and Technology Markets
Stone Lion at Tiananmen Gate of Heavenly Peace entrance to Imperial City Beijing, People's Republic of China (PRC)

Gabriele Iuvinale
26 aprTempo di lettura: 4 min


"3 BODY PROBLEM" IS REALITY: THE DECAPITATION OF GLOBAL SCIENTISM
In the Netflix cult series "3 Body Problem", an invisible alien force drives Earth's most brilliant physicists to suicide for one single purpose: to halt human scientific progress. In 2026, reality is overtaking the script. As reported by the Berliner Zeitung investigation and recent FBI inquiries, we are witnessing a systematic chain of deaths and disappearances striking "strategic human capital" between the United States and China. We are facing the geopolitical version of
Nicola Iuvinale
24 aprTempo di lettura: 3 min


The Chinese Role in the New Iranian Military Order
In recent years, the global security landscape has been upended by the formation of a consolidated front featuring China, Russia, and Iran. These nations are collaborating systematically to challenge United States hegemony and the stability of liberal democracies. While Teheran proudly claims "total self-sufficiency" for its arsenal, technical evidence and new geopolitical balances indicate that Iranian missile development is now the beating heart of an unprecedented triparti
Nicola Iuvinale
24 aprTempo di lettura: 3 min


Shadow Networks: The Evolution of Chinese TTPs and Operational Invisibility in the Gray Zone
This analysis examines the recent paradigm shift in cyber operations conducted by actors linked to the People’s Republic of China, with particular reference to the strategic use of large-scale covert networks composed of compromised devices. Evidence gathered by international security agencies, led by the UK’s National Cyber Security Centre and its global partners, paints a picture in which the distinction between civilian and military infrastructure is becoming increasingly

Gabriele Iuvinale
24 aprTempo di lettura: 5 min


The General Electric Case: When a Flaw in the Corporate System Fuels Beijing’s Arsenal
The Consent Agreement signed on April 14-17, 2026, between the U.S. Department of State and General Electric (GE) is not merely a $36 million penalty, but a testament to a strategic vulnerability that granted China access to invaluable technological secrets. For years, GE was unwittingly transformed into a reservoir of technical information for the People’s Republic of China (PRC) due to internal controls that authorities described as “systematically deficient.” Inspecting Je

Gabriele Iuvinale
23 aprTempo di lettura: 4 min


Is Indonesia Closing the "Southern Gate"? Strategic Shifts and the End of Neutrality
The South China Sea (SCS) has long been a chessboard of incremental gains and "salami-slicing" tactics. However, the equilibrium is currently facing a seismic shift. If the SCS represents a grand strategy, Indonesia has historically been the "stable rock" guarding the southern entrance. But as of April 2024, that rock appears to be weathering. Reports from Jakarta suggest a move that could alter the regional balance forever: the possibility of granting "permanent permission"
Nicola Iuvinale
23 aprTempo di lettura: 3 min


Europe's “Soft Underbelly”: Why Sánchez's Spain Has Become a Gateway for Chinese Influence
In the new world order, the concept of economic freedom has been profoundly redefined: a truly free market cannot exist without a secure economy. The United States and China have already internalized this dogma, moving toward a paradigm where national security is the fundamental prerequisite for any commercial move. While Washington protects its economic freedom through "de-risking" and the Inflation Reduction Act, and Beijing utilizes massive subsidies to dominate global val

Gabriele Iuvinale
23 aprTempo di lettura: 5 min


Tokyo and Washington’s crackdown on Chinese technology: moving toward a global security perimeter while Europe remains exposed
The Japanese government has officially announced a national strategy to completely phase out Chinese technologies from the IT systems of all local governments by the summer of 2027. This initiative, coordinated by the Digital Agency and the Ministry of Internal Affairs and Communications , aims to protect citizens’ sensitive data and the integrity of civil infrastructure from potential espionage or sabotage orchestrated by foreign actors through supply chain compromise. Gett

Gabriele Iuvinale
22 aprTempo di lettura: 3 min


The Dragon’s Proxy War: The Touska Incident and the Middle Eastern Inferno
The seizure of the Iranian container ship Touska by U.S. armed forces in the Gulf of Oman is far more than a mere maritime policing operation. It serves as yet another piece of evidence showing how China, despite formally flaunting a foreign policy of "non-interference," systematically operates through proxy wars to wear down Western dominance. The Iranian Proxy and "Belligerent Mercantilism" Despite the denials issued by spokesperson Guo Jiakun, the facts paint a different p
Nicola Iuvinale
22 aprTempo di lettura: 2 min


Reverse Engineering: Iran’s Technological "Bazaar" for China and Russia
Iran has officially transformed its territory into an open-air laboratory for dismantling U.S. military supremacy. The transfer of intercepted U.S. missile fragments to specialized reverse-engineering firms is not merely a defensive act, but the launch of a strategic commercial operation. Ibrahim Zolfagari, of the Iranian Armed Forces Central Command, confirmed this: the objective is to decode the secrets of American guidance and propulsion systems. The Reverse Engineering Tr
Nicola Iuvinale
21 aprTempo di lettura: 2 min


Liminal Domain: China’s Strategy to Militarize Dark Web Intelligence and Close the Decade-Long Gap - Analysis
China’s presence in cyberspace is undergoing an unprecedented transformation, shifting from a fragmented defensive posture to a model of proactive, centralized surveillance. At the heart of this strategy lies the imperative need to dominate so-called “liminal power”—that is, the ability to act and monitor the digital gray zones where the distinction between civil, military, and criminal threats blurs. Beijing has identified its historical weakness in monitoring the Dark Web a

Gabriele Iuvinale
9 aprTempo di lettura: 4 min


The Acoustic Shadow of the Digital Silk Road: Transforming the Global Fiber-Optic Infrastructure into a Chinese Surveillance Network
The illusion of the invulnerability of fiber-optic communication systems has been officially shattered by groundbreaking research conducted by researchers at the Hong Kong Polytechnic University and the Chinese University of Hong Kong. The study, presented at the NDSS 2026 symposium, reveals how the global telecommunications infrastructure can be transformed into a widespread network of clandestine microphones through the exploitation of acoustic side channels. This threat

Gabriele Iuvinale
8 aprTempo di lettura: 7 min
Technical Report: Strategic Strategies and Objectives of the 15th Five-Year Plan for the Strengthening of the Chinese Armed Forces
PREFACE The 2027 Horizon: The Dragon’s Silent Metamorphosis While Western public attention is often mesmerized by vessel counts or ballistic missile ranges, a far deeper transformation is reshaping the balance of power in the Pacific and beyond. The 15th Five-Year Plan (2026-2030) is not merely an economic programming document; it is the architectural blueprint for a new form of martial sovereignty. In this report, Extrema Ratio analyzes the definitive convergence between c
Nicola Iuvinale
7 aprTempo di lettura: 4 min


Operation "Transparent Ocean": A Strategic Analysis of the Threat Posed by China’s Bionic Fish and the Role of Xiamen University
Abstract and Strategic Context This strategic technical report analyzes the transformation of the People’s Republic of China’s submarine warfare and intelligence capabilities through the use of biomimetic robotics. The analysis is based on a study conducted by Xiamen University titled “ Progress and Analysis of Research on High-Speed Underwater Bionic Robot Fish ” and on the context provided by technical documents from the Chinese Academy of Sciences regarding the “Transparen

Gabriele Iuvinale
2 aprTempo di lettura: 4 min


Strategic Report: Synchrony and Silence: Toward a NATO Distributed Resilience Doctrine against PLA Intelligentized Warfare
Strategic Report: Synchrony and Silence: Toward a NATO Distributed Resilience Doctrine against PLA Intelligentized Warfare
Nicola Iuvinale
31 marTempo di lettura: 9 min


Beyond Stealth: How Chinese Military Research Aims to Neutralize Next-Generation Stealth Fighters
The evolution of China's air defense is shifting from upgrading individual hardware to creating an intelligent, predictive network architecture. As highlighted in a recent study by the PLA Air Force Engineering University, the goal is to overcome the limitations of current radars (such as those in operation in Iran), which often lose contact when a stealth aircraft changes attitude due to the dynamic and fluctuating nature of the radar cross-section (RCS). The new strategy i

Gabriele Iuvinale
30 marTempo di lettura: 2 min


The Russia-China Strategic Fracture and the Fight for Geopolitical Survival in the Indo-Pacific
The Russia-China Strategic Fracture and the Fight for Geopolitical Survival in the Indo-Pacific
Nicola Iuvinale
29 marTempo di lettura: 4 min


Technical-Strategic Report on the Risks Posed by the People's Republic of China's Maritime Intelligence Network and Seabed Activities
An analysis of a series of technical documents published by the Chinese Academy of Sciences in 2026 outlines China’s transformation into a global maritime power through mastery of cutting-edge technology. The cornerstone of this strategy is the intelligence system known as Precision Marine Environmental Assurance, a comprehensive end-to-end architecture that integrates observation, forecasting, enforcement, and assessment to ensure national security and the protection of ma

Gabriele Iuvinale
26 marTempo di lettura: 3 min


Countering China's Malicious Influence in the New U.S. Bill
The bill presented on Wednesday March 18 2026 by Representatives Derek Tran and Don Bacon along with colleagues Marilyn Strickland and Pat Harrigan marks a significant step in defining a more coordinated national defense strategy regarding Beijing's global activities. The legislative text named the Combating Chinese Communist Party Influence Act begins with a first section dedicated exclusively to defining the short title while the substantive content is developed in the se

Gabriele Iuvinale
19 marTempo di lettura: 2 min


The Securitization of Commerce: Analyzing China’s Revised Foreign Trade Law of 2026
On March 1, the Foreign Trade Law of the People’s Republic of China , which was revised and approved in December 2025, entered into force. It marks a clear departure from the principles of liberalization in favor of a governance model strongly centered on national security. Although the stated objective is to strengthen intellectual property rights and adapt legal instruments to geopolitical tensions, the legislation institutionalizes a clear securitization of foreign trade.

Gabriele Iuvinale
18 marTempo di lettura: 2 min
bottom of page