Inspired: China Measures Citizens' Trustworthiness

Since the reports of Russian meddling in the 2016 US presidential election, European officials have been on the lookout for similar attacks. But Europeans aren’t the only ones paying attention. So, too, are China’s leaders, who are considering what they might learn from the Kremlin’s successes.

For President Xi Jinping, (pictured) maintaining domestic stability is a top priority, a point underscored by China’s annual budget for internal security. At well over US$100 billion, the official number is low. Like defence outlays, the real number is much higher, owing to hidden spending, including on research and development.

For example, China is exploring how artificial intelligence and big data can be used to monitor everything from social media to credit-card spending, and it plans to assign all citizens a social-reliability rating to weed out potential troublemakers.

The regime’s Orwellian strategy is focused squarely on social media and controlling not just what is said, but also how information flows into and around the country.

Moreover, the authorities are bringing technology companies into line with tough new laws and cybersecurity investigations. For Xi, the ease with which the Kremlin manipulated Facebook and Twitter demonstrates the need for a tighter grip on China’s own social media platforms.

The Chinese government is now requesting seats on the boards of companies of platforms such as WeChat and Weibo, and demanding access to their users’ personal data.

Chinese cyber spies are also studying Russia’s success. To be sure, Chinese hackers do not lack technical savvy. They have launched cyberattacks against US presidential campaigns, expatriate Tibetan movements and Uygur activists. They have burrowed into Western think tanks and universities that study China.

They have even hacked into Western news outlets that published embarrassing stories about Chinese leaders’ wealth. Still, the Chinese may have something to learn from Russia’s well-choreographed online army of trolls and bots.

Similarly, strategists at the People’s Liberation Army are likely poring over the Kremlin’s handiwork to inform their own cyberwar tactics.

Chinese strategic thinking about “political warfare” holds that an adversary’s political, social and economic institutions, particularly the media, should be targeted before a shooting war ever begins. To that end, Russia’s diffusion of bogus news and conspiracy theories through its state-funded media outlets RT and Sputnik could prove instructive.

In addition to expanding China’s cyber capabilities, Xi has also been developing China’s soft power through economic, social, cultural and media initiatives. And although he has not yet coupled these programmes with China’s clandestine forces to launch the kind of audacious attack that roiled the 2016 US presidential election, he clearly is establishing the means to do so.

Recently, it was revealed that China has been conducting wide-ranging influence operations in Australia, using official campus organisations to monitor Chinese college students, business associations to tout Chinese interests, and diplomats to police local Chinese-language media. Late last year, an Australian senator was forced to resign over his alleged ties to a Chinese billionaire.

China is also expanding its global media presence. Its official news agency, Xinhua, has more than 170 bureaus around the world and publishes in eight languages. China Central Television(CCTV) has more than 70 foreign bureaus and broadcasts to 171 countries in six languages. China Radio International is one of the world’s largest radio broadcasters, broadcasting in over 60 languages from 32 foreign bureaus to 90 radio stations worldwide.

None of these organisations have yet distinguished themselves as a go-to international news source. But they have become a significant source of information for people in underserved regions such as the Middle East and Africa, where they purvey China’s views and are building sympathetic audiences.

At the same time, China is purchasing “native advertising” in Australian, American and European newspapers. This allows China to place officially authored content about controversial issues, such as its militarised island-building in the South China Sea, next to those publications’ editorial offerings.

Xi is also playing the long game, by approving investments in movies and other forms of mass entertainment to influence how global popular culture treats all things Chinese. Despite the Chinese government’s recent clampdown on outbound capital flows, Chinese companies are still adding to their major stakes in Hollywood properties.

The Chinese conglomerate Dalian Wanda alone has some US$10 billion in entertainment assets in the United States, Europe and Australia. And other Chinese internet and financial giants such as Alibaba, Tencent and Hony Capital, as well as state-owned companies such as China Film Group, have invested tens of billions of dollars in US film ventures.

With these financial stakes, the Chinese government has leverage that goes beyond old-fashioned censorship. Hollywood studio bosses with an eye on China’s massive domestic market will be tempted to kowtow to the government’s “creative” requests when it comes to scripts, casting decisions and so forth.

At US$8.6 billion in 2017, Chinese box-office receipts are second only to North America’s. Yet China allows fewer than 40 foreign films into the country each year, inducing filmmakers to bend over backward to please the censors.

Of course, Hollywood executives aren’t the only Westerners helping Xi realise his agenda. Between Apple’s recent decision to relinquish its Chinese user data storage to a Chinese partner and Google’s announcement that it will site a new AI research centre in China, US technology giants are not just making deals to benefit their “stakeholders”. They are also handing Xi and his cyber operatives proprietary technologies and know-how, and even potential access to US targets.

This raises an obvious question: if Russia could roil a US presidential election without such intimate business relationships, what will China be able to do in the years ahead? To think that China’s only interest is making money, one Hollywood executive recently acknowledged, would be “very naive and dangerous” indeed.

Kent Harrington, a former senior CIA analyst and director of public affairs, served as national intelligence officer for East Asia and chief of station in Asia.

SCMP:

You Might Also Read:

China Intends To Be An AI Superpower:

China Wants To Use AI To Predict Civil Disorder:

 

 

« Girls Are Future Cybercrime Fighters
AI Cyber Attacks Will Be Almost Impossible For Humans to Stop »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

Iceberg

Iceberg

Iceberg has been established to provide companies with cyber security experts who will protect businesses from the unseen threat of cyber crime.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

Get Safe Online

Get Safe Online

Get Safe Online is a leading source of unbiased, factual and easy-to-understand information on online safety.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.