top of page

Cerca


Beidou: The Concrete Exemplification of “Xi Jinping Thought” — From Geospatial Dependence to Total Technological Autarky
The rise of the Beidou Satellite Navigation System (BDS) is not merely a chronicle of Chinese technological success, but the palpable manifestation of a strategic imperative for autarky imposed by the leadership of Xi Jinping . Starting from the necessity to eliminate a crippling technological vulnerability—reliance on GNSS (Global Navigation Satellite System) controlled by foreign powers—China has forged Beidou into an instrument of Information Sovereignty ( 信息主权 ) and,

Gabriele Iuvinale
29 ott 2025Tempo di lettura: 5 min


Cyber-Totalitarianism or Necessary Evolution? Analysis of the 2025 Amendments to China's Cybersecurity Law between CCP Leadership and Mega-Sanctions
On October 28, the 18th session of the Standing Committee of the 14th National People's Congress voted to approve the decision to amend the Cybersecurity Law , which will come into effect on January 1, 2026 . This regulatory revision comes amid growing global technological and ideological competition. Digital sovereignty has become a crucial battleground, with major powers vying to assert control over cyberspace and data flows. The People's Republic of China (PRC) , unde

Gabriele Iuvinale
28 ott 2025Tempo di lettura: 8 min


The Future of Warfare: Ideology, Technology, and Domain. Strategic Comparison (PLA ESW vs. US MDO): From Dialectical Materialism to the Conquest of the Electromagnetic Spectrum
The Future of Warfare: Ideology, Technology, and Domain. Strategic Comparison (PLA ESW vs. US MDO): From Dialectical Materialism to the Conquest of the Electromagnetic Spectrum
Nicola Iuvinale
28 ott 2025Tempo di lettura: 4 min


BEIJING, OCTOBER 28, 2025: THE NEXT FIVE YEARS WILL BE A REAL “WAR”
The Formulation of the 15th Five-Year Plan (2026-2030): The Inevitable Merger of Security and Development in Xi Jinping's Imperial Mandate The global geopolitical landscape has been unequivocally redefined by the outcomes of the Fourth Plenum of the 20th Central Committee of the Communist Party of China (CPC) , which concluded in Beijing in October 2025. The immediate context is marked by the public release today, October 28, 2025 , of the two documents that constitute the id

Gabriele Iuvinale
28 ott 2025Tempo di lettura: 7 min


China's Strategic Reorganization: From Passive Response to Proactive Shaping of Technological Governance in the Era of Great Competition
The world has entered a phase of profound and structural strategic competition between great powers , where confrontation is no longer limited to the traditional economic or military spheres but is increasingly fought on the ground of technological supremacy and institutional shaping . This new scenario, often described as "targeted decoupling" or "institutional warfare," has triggered a radical transformation in the landscape of global Science and Technology (S&T) governance

Gabriele Iuvinale
27 ott 2025Tempo di lettura: 6 min


The Shadow of Ukraine: Beijing Militarizes the Academia for "Total War"
Extrema Ratio: The PRC's National Defense Education Reform (2022-2024)
The Mandate of Qiushi
Nicola Iuvinale
27 ott 2025Tempo di lettura: 2 min


National Security Rides on Robots: The Attack on GeekCon and China's Standardization Strategy for the Embodied AI Ecosystem
The advent of Embodied AI , with increasingly autonomous and integrated humanoid robots, marked a point of no return in global security. Cyber threats have moved beyond the realm of code to manifest as risks of physical harm and destruction. The news is dominated by the " GeekCon 2025 Fist ," the incident in which a hacker attack on a Chinese robot demonstrated how easily a machine can be compromised and turned into a weapon, even a "digital Trojan horse" capable of infecting

Gabriele Iuvinale
27 ott 2025Tempo di lettura: 7 min


Asymmetric weapons: from pharmacies to foundries, China is reshaping global power by eliminating the last American veto
China is implementing a systematic and programmatic strategy to build geoeconomic power levers, transforming global dependence into a tool for coercion while simultaneously ensuring self-sufficiency in its critical areas. This holistic strategy, where control over supply chains is a crucial weapon, aims to shape a new world order. Beijing has meticulously gained control over vital supply chains—dominating the markets for strategic sectors like Rare Earth Metals (REM) , Active

Gabriele Iuvinale
25 ott 2025Tempo di lettura: 5 min


The New Imperial Mandate: China's Inexorable Drive to Global Domination - Extrema Ratio's analysis of the fifteenth five-year plan
The Fourth Plenary Session of the 20th Central Committee of the Communist Party of China (CPC) , held in Beijing from October 20 to 23, 2025, approved the guidelines for the 15th Five-Year Plan (2026-2030) . This document does not represent a rupture, but the continuity and strategic intensification of policies initiated with the Fourteenth Five-Year Plan (2021-2025) and the long-term vision of Xi Jinping. China is preparing for a "long twilight struggle" against the West,

Gabriele Iuvinale
23 ott 2025Tempo di lettura: 11 min


From Geopolitics to Chips: China's Mission for Technological Self-Sufficiency in the 15th Five-Year Plan
How US Restrictions Catalyzed Huawei and the CCP's Circumvention Strategy Chinese chip manufacturers are implementing a strategy of ingenious innovation to circumvent American restrictions . In fact, the "microchip war," triggered by US restrictions starting in 2018, did not block the Chinese semiconductor industry but catalyzed its strategic response: innovation by circumvention . This approach is now officially enshrined as a national mission in the Communique of the Fourt

Gabriele Iuvinale
23 ott 2025Tempo di lettura: 10 min


THE STRATEGY OF DENIAL AT A CROSSROADS: Chinese Barges and the Urgency for US Action in Taiwan
THE STRATEGY OF DENIAL AT A CROSSROADS: Chinese Barges and the Urgency for US Action in Taiwan
Nicola Iuvinale
22 ott 2025Tempo di lettura: 4 min


Atomic gyroscope: does China already have a quantum advantage in autonomous military navigation?
The Atomic Interference Gyroscope (AIG) , based on the use of ultra-cold atoms and the matter-wave Sagnac effect, represents the quantum leap in high-precision inertial navigation technology. Promising a potential accuracy billions of times greater than the best optical sensors (FOG, RLG), the AIG is set to redefine the concept of autonomous Positioning, Navigation, and Timing (PNT) in environments where satellite signals (GNSS) are denied. This analysis explores the global

Gabriele Iuvinale
22 ott 2025Tempo di lettura: 8 min


From GPS Spoofing to Stealth Authentication: China's Technological Response to the Vulnerability of UAV Systems
OSINT analysis of a vast body of research from key Chinese institutions reveals a coordinated and highly focused national strategy to dominate the next generation of stealthy and resilient drone warfare . The program focuses on the goal of making UAVs (Unmanned Aerial Vehicles) virtually undetectable and immune to any form of electronic or cyber attack. The most advanced engineering solutions are based on Deep Reinforcement Learning (DRL) and its multi-agent algorithms (suc

Gabriele Iuvinale
21 ott 2025Tempo di lettura: 7 min


The Anatomy of Modernization: A Financial and Strategic OSINT Analysis of China's Future Military Power
The Anatomy of Modernization: A Financial and Strategic OSINT Analysis of China's Future Military Power
Nicola Iuvinale
21 ott 2025Tempo di lettura: 5 min


Beijing's Stealth Architecture: Multi-Domain Analysis and Generational Leap
According to the latest privileged information acquired through in-depth industry analysis and targeted consultation of recent open sources (OSINT), the current state of China's low observability (stealth) program represents the most serious and complex challenge to traditional concepts of electronic warfare and aerial maneuverability. The Beijing program is not limited to developing individual stealth components, but is building a dynamic and cohesive warfare architecture wh

Gabriele Iuvinale
20 ott 2025Tempo di lettura: 5 min


Financial Cold War: China Dumps US Debt and Hoards Gold for Protection
Financial Cold War: China Dumps US Debt and Hoards Gold for Protection
Nicola Iuvinale
20 ott 2025Tempo di lettura: 4 min


Chinese AI Redefines Efficiency: DeepSeek Releases OCR That Digitizes 200,000 Pages/Day, but Washington Suspects Links to Surveillance and Military Apparatus
The announcement today, October 20, 2025 , by DeepSeek regarding the open-source release of its DeepSeek-OCR model—focused on two-dimensional optical compression—occurs within a geoeconomic scenario marked by fierce competition in artificial intelligence. However, the news of this technical innovation clashes with a much hotter chapter whose roots go back some time : the serious accusations leveled by Washington against DeepSeek, suspecting it of supporting Beijing’s mil

Gabriele Iuvinale
20 ott 2025Tempo di lettura: 4 min


Self-sufficiency or Protectionism? The Impact of China's New Public Procurement Policy on Global Trade
The recent publication by the Chinese State Council of the Notice on the Implementation of National Product Standards and Related Policies in Government Procurement ( 国办发〔2025〕34号 ), effective from January 1, 2026 , represents yet another measure favoring domestic companies and imposing significant limitations on foreign enterprises, thereby distorting the principles of the free market. GettyImages The 20% Price Advantage: The New Non-Tariff Barrier The core provision of t

Gabriele Iuvinale
20 ott 2025Tempo di lettura: 3 min


Detailed Analysis of the State-Sponsored APT Attack on China's National Time Service Center (NTSC)
On October 19, the Chinese national security agencies recently disclosed a major cyberattack case, stating they obtained irrefutable evidence that the United States’ National Security Agency (NSA) launched a cyberattack and infiltrated China's National Time Service Center (NTSC) . The cyberattack was long-planned, progressive, and systematic. Starting in 2022, the U.S. exploited a vulnerability in the SMS service of a foreign-branded mobile phone to secretly attack and contr

Gabriele Iuvinale
19 ott 2025Tempo di lettura: 3 min


Self-Sufficiency and Security: Analysis of China's Smart Computing Development Strategy and Its Technological Limitations
The current phase of global scientific and industrial transformation positions Smart Computing ( Zhìsuàn , 智算) as the fundamental productive force and a critical element of China's national security . The explosion in computing demand, particularly driven by generative artificial intelligence, has made technological self-reliance and strength a top priority. As President Xi Jinping stated , "A nation thrives through scientific advancement; a country grows strong with tech

Gabriele Iuvinale
17 ott 2025Tempo di lettura: 5 min
bottom of page