Home / Blogs

China Using Cybertechnologies to Expand Their Political Cloud

A few months ago, I mentioned that China’s social code would also be expanded to companies who want to deal with China.

I have come across information that shows that China is indeed serious about this.

China’s cyberspace regulator has proposed requiring companies pursuing share listings in Hong Kong to apply for cybersecurity inspections if they handle data that concerns national security.

Large internet platforms planning to set up headquarters, operating or research centers abroad will have to submit a report to regulators.

The Cyberspace Administration of China has called for public comment on internet platforms formulating privacy policies or amending rules that could significantly affect user rights and interests.

Companies with more than 100 million daily active users would need to have changes reviewed by regulators and obtain government approval.

While totalitarian regimes such as the one in China can rather swiftly implement such measures, the democratic countries are at a disadvantage here, and China is more than happy to use that weakness in the West.

Here, companies are increasingly dependent on revenues they get from their business dealings with China and are therefore more likely to give in to China’s bullying and will adhere to increasingly more intrusive measures. This is only weakening the position of the democratic countries more and at the same time strengthening the economic position of China.

Cyberwar is far cheaper than any other military conflict, so it is highly unlikely that there will not be a nuclear war. Instead, wars have already started in cyberspace.

Via my American contacts, I also came across the following worrying bit of information.

We had a discussion on the report: The looming global “phase transition” in how humans employ technologies and data to work, govern, and co-exist

During that discussion, the following comment was made:

“Threats have been made to companies in Asia that if they employ Australians, they are no longer allowed to export to China.”

I was rather alarmed as I had not heard such an acquisition yet.

I followed it up and received the following details:

“At the moment, it’s only been non-attribution info from two different American investment managers that manage mergers and acquisitions and other transactions with China. It could be they’re only seeing it for prospective mergers and acquisitions clients?”

During that discussion, the comment was made from the American side that there most certainly is a cyber war raging between Australia and China.

Let’s hope that the renewed diplomatic relations between China and the USA will temper the geopolitical heat between China and the West.

By Paul Budde, Managing Director of Paul Budde Communication

Paul is also a contributor of the Paul Budde Communication blog located here.

Visit Page

Filed Under


Comment Title:

  Notify me of follow-up comments

We encourage you to post comments and engage in discussions that advance this post through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can report it using the link at the end of each comment. Views expressed in the comments do not represent those of CircleID. For more information on our comment policy, see Codes of Conduct.

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Co-designer of the TCP/IP Protocols & the Architecture of the Internet



IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix


Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign


Sponsored byDNIB.com