Inspired: China Measures Citizens' Trustworthiness

Since the reports of Russian meddling in the 2016 US presidential election, European officials have been on the lookout for similar attacks. But Europeans aren’t the only ones paying attention. So, too, are China’s leaders, who are considering what they might learn from the Kremlin’s successes.

For President Xi Jinping, (pictured) maintaining domestic stability is a top priority, a point underscored by China’s annual budget for internal security. At well over US$100 billion, the official number is low. Like defence outlays, the real number is much higher, owing to hidden spending, including on research and development.

For example, China is exploring how artificial intelligence and big data can be used to monitor everything from social media to credit-card spending, and it plans to assign all citizens a social-reliability rating to weed out potential troublemakers.

The regime’s Orwellian strategy is focused squarely on social media and controlling not just what is said, but also how information flows into and around the country.

Moreover, the authorities are bringing technology companies into line with tough new laws and cybersecurity investigations. For Xi, the ease with which the Kremlin manipulated Facebook and Twitter demonstrates the need for a tighter grip on China’s own social media platforms.

The Chinese government is now requesting seats on the boards of companies of platforms such as WeChat and Weibo, and demanding access to their users’ personal data.

Chinese cyber spies are also studying Russia’s success. To be sure, Chinese hackers do not lack technical savvy. They have launched cyberattacks against US presidential campaigns, expatriate Tibetan movements and Uygur activists. They have burrowed into Western think tanks and universities that study China.

They have even hacked into Western news outlets that published embarrassing stories about Chinese leaders’ wealth. Still, the Chinese may have something to learn from Russia’s well-choreographed online army of trolls and bots.

Similarly, strategists at the People’s Liberation Army are likely poring over the Kremlin’s handiwork to inform their own cyberwar tactics.

Chinese strategic thinking about “political warfare” holds that an adversary’s political, social and economic institutions, particularly the media, should be targeted before a shooting war ever begins. To that end, Russia’s diffusion of bogus news and conspiracy theories through its state-funded media outlets RT and Sputnik could prove instructive.

In addition to expanding China’s cyber capabilities, Xi has also been developing China’s soft power through economic, social, cultural and media initiatives. And although he has not yet coupled these programmes with China’s clandestine forces to launch the kind of audacious attack that roiled the 2016 US presidential election, he clearly is establishing the means to do so.

Recently, it was revealed that China has been conducting wide-ranging influence operations in Australia, using official campus organisations to monitor Chinese college students, business associations to tout Chinese interests, and diplomats to police local Chinese-language media. Late last year, an Australian senator was forced to resign over his alleged ties to a Chinese billionaire.

China is also expanding its global media presence. Its official news agency, Xinhua, has more than 170 bureaus around the world and publishes in eight languages. China Central Television(CCTV) has more than 70 foreign bureaus and broadcasts to 171 countries in six languages. China Radio International is one of the world’s largest radio broadcasters, broadcasting in over 60 languages from 32 foreign bureaus to 90 radio stations worldwide.

None of these organisations have yet distinguished themselves as a go-to international news source. But they have become a significant source of information for people in underserved regions such as the Middle East and Africa, where they purvey China’s views and are building sympathetic audiences.

At the same time, China is purchasing “native advertising” in Australian, American and European newspapers. This allows China to place officially authored content about controversial issues, such as its militarised island-building in the South China Sea, next to those publications’ editorial offerings.

Xi is also playing the long game, by approving investments in movies and other forms of mass entertainment to influence how global popular culture treats all things Chinese. Despite the Chinese government’s recent clampdown on outbound capital flows, Chinese companies are still adding to their major stakes in Hollywood properties.

The Chinese conglomerate Dalian Wanda alone has some US$10 billion in entertainment assets in the United States, Europe and Australia. And other Chinese internet and financial giants such as Alibaba, Tencent and Hony Capital, as well as state-owned companies such as China Film Group, have invested tens of billions of dollars in US film ventures.

With these financial stakes, the Chinese government has leverage that goes beyond old-fashioned censorship. Hollywood studio bosses with an eye on China’s massive domestic market will be tempted to kowtow to the government’s “creative” requests when it comes to scripts, casting decisions and so forth.

At US$8.6 billion in 2017, Chinese box-office receipts are second only to North America’s. Yet China allows fewer than 40 foreign films into the country each year, inducing filmmakers to bend over backward to please the censors.

Of course, Hollywood executives aren’t the only Westerners helping Xi realise his agenda. Between Apple’s recent decision to relinquish its Chinese user data storage to a Chinese partner and Google’s announcement that it will site a new AI research centre in China, US technology giants are not just making deals to benefit their “stakeholders”. They are also handing Xi and his cyber operatives proprietary technologies and know-how, and even potential access to US targets.

This raises an obvious question: if Russia could roil a US presidential election without such intimate business relationships, what will China be able to do in the years ahead? To think that China’s only interest is making money, one Hollywood executive recently acknowledged, would be “very naive and dangerous” indeed.

Kent Harrington, a former senior CIA analyst and director of public affairs, served as national intelligence officer for East Asia and chief of station in Asia.

SCMP:

You Might Also Read:

China Intends To Be An AI Superpower:

China Wants To Use AI To Predict Civil Disorder:

 

 

« Girls Are Future Cybercrime Fighters
AI Cyber Attacks Will Be Almost Impossible For Humans to Stop »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Cambray Solutions

Cambray Solutions

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives.

National Crime Agency (NCA) - United Kingdom

National Crime Agency (NCA) - United Kingdom

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

CyberGRX

CyberGRX

The CyberGRX Exchange and our risk assessments-as-a-service help Enterprises and Third Parties cost-effectively identify, prioritize and mitigate risk.

Humming Heads

Humming Heads

Humming Heads offers a complete solution to fight the advanced threats that target a company's endpoints and servers.

Grayshift

Grayshift

Grayshift is the leading provider of mobile device digital forensics, specializing in lawful access and extraction.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Zyber 365 Group

Zyber 365 Group

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

CyberMaxx

CyberMaxx

At CyberMaxx, our approach to cybersecurity provides end-to-end coverage for our customers – we use offense to fuel defense.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.

Amiosec

Amiosec

Amiosec is a British cyber innovation business specialising in delivering simple-to-use solutions to the complex problems of the modern world.

Vivid Computing Solutions

Vivid Computing Solutions

At Vivid Computing Solutions we provide comprehensive solutions that keep your business running efficiently and securely.