Inspired: China Measures Citizens' Trustworthiness

Since the reports of Russian meddling in the 2016 US presidential election, European officials have been on the lookout for similar attacks. But Europeans aren’t the only ones paying attention. So, too, are China’s leaders, who are considering what they might learn from the Kremlin’s successes.

For President Xi Jinping, (pictured) maintaining domestic stability is a top priority, a point underscored by China’s annual budget for internal security. At well over US$100 billion, the official number is low. Like defence outlays, the real number is much higher, owing to hidden spending, including on research and development.

For example, China is exploring how artificial intelligence and big data can be used to monitor everything from social media to credit-card spending, and it plans to assign all citizens a social-reliability rating to weed out potential troublemakers.

The regime’s Orwellian strategy is focused squarely on social media and controlling not just what is said, but also how information flows into and around the country.

Moreover, the authorities are bringing technology companies into line with tough new laws and cybersecurity investigations. For Xi, the ease with which the Kremlin manipulated Facebook and Twitter demonstrates the need for a tighter grip on China’s own social media platforms.

The Chinese government is now requesting seats on the boards of companies of platforms such as WeChat and Weibo, and demanding access to their users’ personal data.

Chinese cyber spies are also studying Russia’s success. To be sure, Chinese hackers do not lack technical savvy. They have launched cyberattacks against US presidential campaigns, expatriate Tibetan movements and Uygur activists. They have burrowed into Western think tanks and universities that study China.

They have even hacked into Western news outlets that published embarrassing stories about Chinese leaders’ wealth. Still, the Chinese may have something to learn from Russia’s well-choreographed online army of trolls and bots.

Similarly, strategists at the People’s Liberation Army are likely poring over the Kremlin’s handiwork to inform their own cyberwar tactics.

Chinese strategic thinking about “political warfare” holds that an adversary’s political, social and economic institutions, particularly the media, should be targeted before a shooting war ever begins. To that end, Russia’s diffusion of bogus news and conspiracy theories through its state-funded media outlets RT and Sputnik could prove instructive.

In addition to expanding China’s cyber capabilities, Xi has also been developing China’s soft power through economic, social, cultural and media initiatives. And although he has not yet coupled these programmes with China’s clandestine forces to launch the kind of audacious attack that roiled the 2016 US presidential election, he clearly is establishing the means to do so.

Recently, it was revealed that China has been conducting wide-ranging influence operations in Australia, using official campus organisations to monitor Chinese college students, business associations to tout Chinese interests, and diplomats to police local Chinese-language media. Late last year, an Australian senator was forced to resign over his alleged ties to a Chinese billionaire.

China is also expanding its global media presence. Its official news agency, Xinhua, has more than 170 bureaus around the world and publishes in eight languages. China Central Television(CCTV) has more than 70 foreign bureaus and broadcasts to 171 countries in six languages. China Radio International is one of the world’s largest radio broadcasters, broadcasting in over 60 languages from 32 foreign bureaus to 90 radio stations worldwide.

None of these organisations have yet distinguished themselves as a go-to international news source. But they have become a significant source of information for people in underserved regions such as the Middle East and Africa, where they purvey China’s views and are building sympathetic audiences.

At the same time, China is purchasing “native advertising” in Australian, American and European newspapers. This allows China to place officially authored content about controversial issues, such as its militarised island-building in the South China Sea, next to those publications’ editorial offerings.

Xi is also playing the long game, by approving investments in movies and other forms of mass entertainment to influence how global popular culture treats all things Chinese. Despite the Chinese government’s recent clampdown on outbound capital flows, Chinese companies are still adding to their major stakes in Hollywood properties.

The Chinese conglomerate Dalian Wanda alone has some US$10 billion in entertainment assets in the United States, Europe and Australia. And other Chinese internet and financial giants such as Alibaba, Tencent and Hony Capital, as well as state-owned companies such as China Film Group, have invested tens of billions of dollars in US film ventures.

With these financial stakes, the Chinese government has leverage that goes beyond old-fashioned censorship. Hollywood studio bosses with an eye on China’s massive domestic market will be tempted to kowtow to the government’s “creative” requests when it comes to scripts, casting decisions and so forth.

At US$8.6 billion in 2017, Chinese box-office receipts are second only to North America’s. Yet China allows fewer than 40 foreign films into the country each year, inducing filmmakers to bend over backward to please the censors.

Of course, Hollywood executives aren’t the only Westerners helping Xi realise his agenda. Between Apple’s recent decision to relinquish its Chinese user data storage to a Chinese partner and Google’s announcement that it will site a new AI research centre in China, US technology giants are not just making deals to benefit their “stakeholders”. They are also handing Xi and his cyber operatives proprietary technologies and know-how, and even potential access to US targets.

This raises an obvious question: if Russia could roil a US presidential election without such intimate business relationships, what will China be able to do in the years ahead? To think that China’s only interest is making money, one Hollywood executive recently acknowledged, would be “very naive and dangerous” indeed.

Kent Harrington, a former senior CIA analyst and director of public affairs, served as national intelligence officer for East Asia and chief of station in Asia.

SCMP:

You Might Also Read:

China Intends To Be An AI Superpower:

China Wants To Use AI To Predict Civil Disorder:

 

 

« Girls Are Future Cybercrime Fighters
AI Cyber Attacks Will Be Almost Impossible For Humans to Stop »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

CybelAngel

CybelAngel

CybelAngel is a leading digital risk protection platform that detects and resolves external threats before these wreak havoc.

ESTsoft

ESTsoft

ESTsoft Securedisk is an enterprise-wide file security solution that stores and manages all data in a central file server.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

SilverSky

SilverSky

SilverSky offers a comprehensive suite of products and services that deliver unprecedented simplicity and expertise for compliance and cybersecurity programs.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

NARIS

NARIS

NARIS is the leading provider of an integrated Governance, Risk and Compliance platform called NARIS GRC.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.