Inspired: China Measures Citizens' Trustworthiness

Since the reports of Russian meddling in the 2016 US presidential election, European officials have been on the lookout for similar attacks. But Europeans aren’t the only ones paying attention. So, too, are China’s leaders, who are considering what they might learn from the Kremlin’s successes.

For President Xi Jinping, (pictured) maintaining domestic stability is a top priority, a point underscored by China’s annual budget for internal security. At well over US$100 billion, the official number is low. Like defence outlays, the real number is much higher, owing to hidden spending, including on research and development.

For example, China is exploring how artificial intelligence and big data can be used to monitor everything from social media to credit-card spending, and it plans to assign all citizens a social-reliability rating to weed out potential troublemakers.

The regime’s Orwellian strategy is focused squarely on social media and controlling not just what is said, but also how information flows into and around the country.

Moreover, the authorities are bringing technology companies into line with tough new laws and cybersecurity investigations. For Xi, the ease with which the Kremlin manipulated Facebook and Twitter demonstrates the need for a tighter grip on China’s own social media platforms.

The Chinese government is now requesting seats on the boards of companies of platforms such as WeChat and Weibo, and demanding access to their users’ personal data.

Chinese cyber spies are also studying Russia’s success. To be sure, Chinese hackers do not lack technical savvy. They have launched cyberattacks against US presidential campaigns, expatriate Tibetan movements and Uygur activists. They have burrowed into Western think tanks and universities that study China.

They have even hacked into Western news outlets that published embarrassing stories about Chinese leaders’ wealth. Still, the Chinese may have something to learn from Russia’s well-choreographed online army of trolls and bots.

Similarly, strategists at the People’s Liberation Army are likely poring over the Kremlin’s handiwork to inform their own cyberwar tactics.

Chinese strategic thinking about “political warfare” holds that an adversary’s political, social and economic institutions, particularly the media, should be targeted before a shooting war ever begins. To that end, Russia’s diffusion of bogus news and conspiracy theories through its state-funded media outlets RT and Sputnik could prove instructive.

In addition to expanding China’s cyber capabilities, Xi has also been developing China’s soft power through economic, social, cultural and media initiatives. And although he has not yet coupled these programmes with China’s clandestine forces to launch the kind of audacious attack that roiled the 2016 US presidential election, he clearly is establishing the means to do so.

Recently, it was revealed that China has been conducting wide-ranging influence operations in Australia, using official campus organisations to monitor Chinese college students, business associations to tout Chinese interests, and diplomats to police local Chinese-language media. Late last year, an Australian senator was forced to resign over his alleged ties to a Chinese billionaire.

China is also expanding its global media presence. Its official news agency, Xinhua, has more than 170 bureaus around the world and publishes in eight languages. China Central Television(CCTV) has more than 70 foreign bureaus and broadcasts to 171 countries in six languages. China Radio International is one of the world’s largest radio broadcasters, broadcasting in over 60 languages from 32 foreign bureaus to 90 radio stations worldwide.

None of these organisations have yet distinguished themselves as a go-to international news source. But they have become a significant source of information for people in underserved regions such as the Middle East and Africa, where they purvey China’s views and are building sympathetic audiences.

At the same time, China is purchasing “native advertising” in Australian, American and European newspapers. This allows China to place officially authored content about controversial issues, such as its militarised island-building in the South China Sea, next to those publications’ editorial offerings.

Xi is also playing the long game, by approving investments in movies and other forms of mass entertainment to influence how global popular culture treats all things Chinese. Despite the Chinese government’s recent clampdown on outbound capital flows, Chinese companies are still adding to their major stakes in Hollywood properties.

The Chinese conglomerate Dalian Wanda alone has some US$10 billion in entertainment assets in the United States, Europe and Australia. And other Chinese internet and financial giants such as Alibaba, Tencent and Hony Capital, as well as state-owned companies such as China Film Group, have invested tens of billions of dollars in US film ventures.

With these financial stakes, the Chinese government has leverage that goes beyond old-fashioned censorship. Hollywood studio bosses with an eye on China’s massive domestic market will be tempted to kowtow to the government’s “creative” requests when it comes to scripts, casting decisions and so forth.

At US$8.6 billion in 2017, Chinese box-office receipts are second only to North America’s. Yet China allows fewer than 40 foreign films into the country each year, inducing filmmakers to bend over backward to please the censors.

Of course, Hollywood executives aren’t the only Westerners helping Xi realise his agenda. Between Apple’s recent decision to relinquish its Chinese user data storage to a Chinese partner and Google’s announcement that it will site a new AI research centre in China, US technology giants are not just making deals to benefit their “stakeholders”. They are also handing Xi and his cyber operatives proprietary technologies and know-how, and even potential access to US targets.

This raises an obvious question: if Russia could roil a US presidential election without such intimate business relationships, what will China be able to do in the years ahead? To think that China’s only interest is making money, one Hollywood executive recently acknowledged, would be “very naive and dangerous” indeed.

Kent Harrington, a former senior CIA analyst and director of public affairs, served as national intelligence officer for East Asia and chief of station in Asia.

SCMP:

You Might Also Read:

China Intends To Be An AI Superpower:

China Wants To Use AI To Predict Civil Disorder:

 

 

« Girls Are Future Cybercrime Fighters
AI Cyber Attacks Will Be Almost Impossible For Humans to Stop »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

Fujitsu

Fujitsu

Fujitsu is the leading Japanese global information and communication technology company, offering a full range of products, solutions and services including Managed IT Services and Cyber Security.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Corvus Insurance

Corvus Insurance

Corvus' mission is to create a safer, more productive world through technology-enabled commercial insurance.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

Industrial Internet Consortium (IIC)

Industrial Internet Consortium (IIC)

The Industrial Internet Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

Kratikal

Kratikal

Kratikal provides a complete suite of manual and automated security testing services.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.