A poster depicting various vessels in the Chinese People’s Liberation Army Navy (PLA(N)) and Maritime Law Enforcement (MLE) that was produced by the Office of Naval Intelligence and is current as of February 2015.
China’s Military Culture Field Guide is designed to provide deploying military personnel an overview of China’s military cultural terrain. In this field guide, China’s military cultural history has been synopsized to capture the more significant aspects of China’s military cultural environment, with emphasis on factors having the greatest potential to impact operations. The field guide presents background information to show China’s military mind-set through its history, values, and internal dynamics. It also contains practical sections on lifestyle, customs, and habits. For those seeking more extensive information, MCIA produces a series of cultural intelligence studies on China’s military that explores the dynamics of China’s military culture at a deeper level.
This handbook provides basic reference information on China, including its geography, history, government, military forces, and communications and transportation networks. This information is intended to familiarize military personnel with local customs and area knowledge to assist them during their assignment to China.
U.S.-China Economic and Security Review Commission Analysis of Chinese Investments in the U.S. Economy
Once hardly noticeable, Chinese investments in U.S. companies are now rising sharply. Cumulative Chinese investments in U.S. companies remain modest compared to those of other major countries. However, a combination of “push and pull” factors are moving China’s annual investment levels closer to levels consistent with China’s current economic stature.
The PLA’s sustained modernization effort over the past two decades has driven remarkable transformation within the force and put the creation of modern command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) infrastructure at the heart of the PLA’s strategic guidelines for long term development. This priority on C4ISR systems modernization, has in turn been a catalyst for the development of an integrated information warfare (IW) capability capable of defending military and civilian networks while seizing control of an adversary’s information systems during a conflict.
The People’s Republic of China is one of the global leaders in vaccine research and production, and an active participant in international PI initiatives, but despite steps to improve influenza surveillance and ministerial coordination, major challenges remain to Chinese PI response preparedness. Substantial global concern has emerged in recent years regarding China’s ability to effectively monitor, prevent, and contain infectious disease threats within its borders. Factors including potential Avian Influenza (AI) outbreaks in poultry, China’s immense size and population, a largely underdeveloped health care infrastructure, and a sizable poultry industry all contribute to make China a global PI hotspot and an important area of focus for the potential emergence of human influenza pandemics that threaten the rest of the world.
我国腐败分子向境外转移资产的 途径及监测方法研究 Confidential People’s Bank of China Report on Billions in Theft by Government Officials from June 2008.
Examples of weekly reports created by the Director of National Intelligence’s Open Source Center analyzing the organization’s continual monitoring of People’s Republic of China internet users’ discussions and online postings.
Authoritative PRC media reports of Chinese Premier Wen Jiabao’s live online appearances illustrate authorities’ expanding use of the Internet to set and control policy discourse in Chinese-language virtual space. They also suggest ongoing efforts to manage leaders’ images and portray them as accessible and soliciting online public opinion. While some apparent missteps suggest a cautious, evolving approach to interactive Internet media in relation to top leaders, reported leadership statements indicate sustained attention to the goal of incorporating new technologies into the propaganda system.
This report surveys 10 prominent PRC commentators on military affairs who appear to write blogs hosted on PRC and PRC-owned Hong Kong websites. All of these commentators appear to maintain an online presence using these blogs to promote their viewpoints. Commentators cover such topics as PRC military strategy, air defense, navy issues, army aviation, information technology, defense spending, foreign military developments, military-to-military relations, political education, military history, training, and exercises. These blogs appear on China’s authoritative government websites, popular PRC commercial portal sites, and independent Hong Kong news websites.
While the Google incident and Secretary Clinton’s speech spurred online discussion on the subject of “Internet freedom” in China, reaction differed on two observed popular sites. Public comments in response to Secretary Clinton’s speech on a popular news website subject to state censorship were consistent with official media reaction, emphasizing nationalistic resistance to alleged US “Internet hegemony.” In contrast, discussion on a popular social networking site noted the irony in China’s official response to Clinton’s speech, questioning Beijing’s claims to have an “open” Internet.
(U//FOUO) Open Source Center Chinese Media Use Google Incident to Press Claim for Internet ‘Sovereignty’
Following Secretary of State Clinton’s speech on Internet freedom and Google’s announcement that it may withdraw from China due to hacking and censorship, PRC media commentary on China’s Internet policy suggests an attempt to portray the Internet as sovereign territory and China’s policies as defending against US “Internet hegemony.” PRC authorities could use these claims to expand control over the Internet. Some commentary, however, portrayed the Google dispute as commercial rather than political, suggesting an attempt to downplay the incident. Recent PRC media reporting suggests an attempt to extend sovereignty into cyberspace.