Inspired: China Measures Citizens' Trustworthiness

Since the reports of Russian meddling in the 2016 US presidential election, European officials have been on the lookout for similar attacks. But Europeans aren’t the only ones paying attention. So, too, are China’s leaders, who are considering what they might learn from the Kremlin’s successes.

For President Xi Jinping, (pictured) maintaining domestic stability is a top priority, a point underscored by China’s annual budget for internal security. At well over US$100 billion, the official number is low. Like defence outlays, the real number is much higher, owing to hidden spending, including on research and development.

For example, China is exploring how artificial intelligence and big data can be used to monitor everything from social media to credit-card spending, and it plans to assign all citizens a social-reliability rating to weed out potential troublemakers.

The regime’s Orwellian strategy is focused squarely on social media and controlling not just what is said, but also how information flows into and around the country.

Moreover, the authorities are bringing technology companies into line with tough new laws and cybersecurity investigations. For Xi, the ease with which the Kremlin manipulated Facebook and Twitter demonstrates the need for a tighter grip on China’s own social media platforms.

The Chinese government is now requesting seats on the boards of companies of platforms such as WeChat and Weibo, and demanding access to their users’ personal data.

Chinese cyber spies are also studying Russia’s success. To be sure, Chinese hackers do not lack technical savvy. They have launched cyberattacks against US presidential campaigns, expatriate Tibetan movements and Uygur activists. They have burrowed into Western think tanks and universities that study China.

They have even hacked into Western news outlets that published embarrassing stories about Chinese leaders’ wealth. Still, the Chinese may have something to learn from Russia’s well-choreographed online army of trolls and bots.

Similarly, strategists at the People’s Liberation Army are likely poring over the Kremlin’s handiwork to inform their own cyberwar tactics.

Chinese strategic thinking about “political warfare” holds that an adversary’s political, social and economic institutions, particularly the media, should be targeted before a shooting war ever begins. To that end, Russia’s diffusion of bogus news and conspiracy theories through its state-funded media outlets RT and Sputnik could prove instructive.

In addition to expanding China’s cyber capabilities, Xi has also been developing China’s soft power through economic, social, cultural and media initiatives. And although he has not yet coupled these programmes with China’s clandestine forces to launch the kind of audacious attack that roiled the 2016 US presidential election, he clearly is establishing the means to do so.

Recently, it was revealed that China has been conducting wide-ranging influence operations in Australia, using official campus organisations to monitor Chinese college students, business associations to tout Chinese interests, and diplomats to police local Chinese-language media. Late last year, an Australian senator was forced to resign over his alleged ties to a Chinese billionaire.

China is also expanding its global media presence. Its official news agency, Xinhua, has more than 170 bureaus around the world and publishes in eight languages. China Central Television(CCTV) has more than 70 foreign bureaus and broadcasts to 171 countries in six languages. China Radio International is one of the world’s largest radio broadcasters, broadcasting in over 60 languages from 32 foreign bureaus to 90 radio stations worldwide.

None of these organisations have yet distinguished themselves as a go-to international news source. But they have become a significant source of information for people in underserved regions such as the Middle East and Africa, where they purvey China’s views and are building sympathetic audiences.

At the same time, China is purchasing “native advertising” in Australian, American and European newspapers. This allows China to place officially authored content about controversial issues, such as its militarised island-building in the South China Sea, next to those publications’ editorial offerings.

Xi is also playing the long game, by approving investments in movies and other forms of mass entertainment to influence how global popular culture treats all things Chinese. Despite the Chinese government’s recent clampdown on outbound capital flows, Chinese companies are still adding to their major stakes in Hollywood properties.

The Chinese conglomerate Dalian Wanda alone has some US$10 billion in entertainment assets in the United States, Europe and Australia. And other Chinese internet and financial giants such as Alibaba, Tencent and Hony Capital, as well as state-owned companies such as China Film Group, have invested tens of billions of dollars in US film ventures.

With these financial stakes, the Chinese government has leverage that goes beyond old-fashioned censorship. Hollywood studio bosses with an eye on China’s massive domestic market will be tempted to kowtow to the government’s “creative” requests when it comes to scripts, casting decisions and so forth.

At US$8.6 billion in 2017, Chinese box-office receipts are second only to North America’s. Yet China allows fewer than 40 foreign films into the country each year, inducing filmmakers to bend over backward to please the censors.

Of course, Hollywood executives aren’t the only Westerners helping Xi realise his agenda. Between Apple’s recent decision to relinquish its Chinese user data storage to a Chinese partner and Google’s announcement that it will site a new AI research centre in China, US technology giants are not just making deals to benefit their “stakeholders”. They are also handing Xi and his cyber operatives proprietary technologies and know-how, and even potential access to US targets.

This raises an obvious question: if Russia could roil a US presidential election without such intimate business relationships, what will China be able to do in the years ahead? To think that China’s only interest is making money, one Hollywood executive recently acknowledged, would be “very naive and dangerous” indeed.

Kent Harrington, a former senior CIA analyst and director of public affairs, served as national intelligence officer for East Asia and chief of station in Asia.

SCMP:

You Might Also Read:

China Intends To Be An AI Superpower:

China Wants To Use AI To Predict Civil Disorder:

 

 

« Girls Are Future Cybercrime Fighters
AI Cyber Attacks Will Be Almost Impossible For Humans to Stop »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Dtex Systems

Dtex Systems

Dtex combines endpoint visibility, targeted analytics, and analyst expertise to provide user threat detection.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

EU Joint Research Centre

EU Joint Research Centre

JRC is the European Commission's science and knowledge service which employs scientists to carry out research in order to provide independent scientific advice and support to EU policy.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

Global Accelerator Network (GAN)

Global Accelerator Network (GAN)

Global Accelerator Network are a highly curated community of independent Accelerators, Partners and Investors.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

SAP National Security Services (NS2)

SAP National Security Services (NS2)

SAP NS2 are dedicated to delivering the best of SAP innovation, from cloud to predictive analytics; machine learning to data fusion.

WebOrion

WebOrion

WebOrion is an All-in-One Web Security & Performance Suite. Fortify, accelerate and monitor your website today.

Def-Logix

Def-Logix

Def-Logix was founded in 2008 to help solve cyber threats being experienced by government agencies of the United States.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

Zenzero

Zenzero

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.