False
Download Learnerz IAS app from the Play Store now! Download

$show=search/label/May%202022

 


China’s ‘Developmental’ Security Approach UPSC NOTE

 


Why are the Chinese authorities cracking down on U.S. based companies and domestic firms dealing with overseas clients?

  • The Chinese government made efforts to enforce stricter control and scrutiny over American consultancies and domestic firms involved in overseas activities.

    • Example : The Capvision Raid, Raid on Bain and Co, Raid on Mintz. 

  • The Chinese government has been delaying approval for mergers and acquisitions involving foreign entities, resulting in increased operational costs for foreign businesses.

45



  • The government’s actions are claimed by China as an aim :

    • To protect national security, 

    • Prevent the transfer of sensitive information. 

    • Maintain tighter regulation over foreign business operations in China.

  • The crackdown can be seen as a response to the U.S.-led efforts to tighten export controls, particularly regarding advanced computing chips and supercomputers.

46




  • The U.S. actions, implemented in October 2022, were aimed at restricting China's access to critical technologies.

  • In this context, the Chinese government's actions against American firms can be viewed as a form of retaliation or vengeance, aiming to counteract the constraints imposed on China's technological advancement.



  • By heckling American firms and restricting their access to the vast Chinese market, Beijing seeks to capitalise on the divergence that exists between the U.S. administration and the American business community over the former’s China policy.

  • This strategy aims to leverage the differing interests and perspectives to its advantage.

48



  • The Chinese authorities have their own motivations and objectives for cracking down on these firms.

  • These motivations could include:

    • Maintaining tighter control over national security and sensitive information.

    • Regulating the flow of intellectual property.

    • Enhancing domestic capabilities in various sectors.


How is China trying to balance development and security concerns?

  • Under President Xi Jinping, Chinese discourse on national security has repeatedly underlined that the idea of ‘development’ cannot be isolated from that of ‘security’.

  • Non-traditional security issues have acquired greater significance in its developmental narrative.

  • And among all the non-traditional security issues, cybersecurity and data/information security seem to concern Chinese authorities the most.

50



Counter-Espionage Law:

  • Aims to treat all “documents, data, materials, and items relating to national security and interests,” at par with state secrets, thus, broadening the scope of espionage.

  • It also expands the definition of espionage to include cyberattacks against state organs or critical information infrastructure.

  • The revised law also empowers authorities to seize data, electronic equipment, information on personal property, and even ban border crossing.

51



Position paper on Global Digital Governance:

  • China also unveiled in late May its position paper on Global Digital Governance.

  • That calls upon States to 

    • “Respect the sovereignty, jurisdiction and governance of data of other States,” and 

    • To “not obtain data located in other States through companies or individuals without other States’ permission.”

52



Comprehensive National Security concept:

  • Initially introduced in 2014.

  • It signifies that the idea of national security has become an integral part of every governance domain, including economic development, technology, and information exchange.

53



What is the view from India?

  • From India’s perspective, one cannot help but notice the outright contradiction that China’s discourse presents when it comes to its relationship with New Delhi. 

  • While Beijing insists on the need to hyphenate development with security, it calls on India to keep the border issue (security) at its proper place and not let it derail the overall relationship (economics and development) with China.

COMMENTS

Name

Amritsar,1,April 2024,301,Art & Culture,1,August 2023,251,Courses,7,Daily Current Affairs,48,December 2023,189,Disaster Management,2,Environment and Ecology,202,February 2024,228,Foundation Course,1,GDP,1,GEMS Club,1,GEMS Plus,1,Geography,210,Govt Schemes,2,GS 2,1,GS1,6,GS2,76,GS3,30,GST,1,History,11,Home,3,IAS Booklist,1,Important News,71,Indian Economy,185,Indian History,10,Indian Polity,215,International Organisation,12,International Relations,150,Invasive Plant,1,January 2024,240,July 2023,281,July 2024,317,June 2022,6,June 2023,268,June 2024,324,March 2024,238,May 2022,17,May 2024,330,Mentorship,2,November 2023,169,October 2023,203,Places in News,2,Science & Technology,152,Science and Technology,96,September 2023,205,UPSC CSE,111,
ltr
item
Learnerz IAS | Concept oriented UPSC Classes in Malayalam: China’s ‘Developmental’ Security Approach UPSC NOTE
China’s ‘Developmental’ Security Approach UPSC NOTE
Learnerz IAS | Concept oriented UPSC Classes in Malayalam
https://www.learnerz.in/2023/08/chinas-developmental-security-approach.html
https://www.learnerz.in/
https://www.learnerz.in/
https://www.learnerz.in/2023/08/chinas-developmental-security-approach.html
true
4761292069385420868
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content