FreshRSS

🔒
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

EU and Japan Look To Partner On AI and Chips

By: BeauHD
The European Union (EU) is seeking closer cooperation with Japan in areas such as artificial intelligence to reduce reliance on China. CNBC reports: EU Commissioner Thierry Breton is meeting with the Japanese government on Monday, and artificial intelligence will be "very high" on his agenda, he said in a video posted on Twitter on Sunday. "I will engage with [the] Japanese government ... on how we can organize our digital space, including AI based on our shared value," Breton said. Breton also said there will be an EU-Japan Digital Partnership council, to discuss areas including quantum and high-performance computing. The EU held a similar council with South Korea last week, in which the two sides agreed to cooperate on technologies such as AI and cybersecurity. Partnerships with key Asian countries with strong technology sectors come as the EU looks to "de-risk" from China -- a different approach from that of the U.S., which has sought to decouple its economy from Beijing. Part of that EU strategy involves deepening the relationship with allied countries around technology. Breton told Reuters on Monday that the bloc and Japan will cooperate in the area of semiconductors. Japan is a key country in the semiconductor supply chain, and Tokyo has been looking to strengthen its domestic industry. Last week, a fund backed by the Japanese government proposed to buy domestic chipmaking firm JSR for around 903.9 billion yen ($6.3 billion). The EU has also been looking to strengthen its own semiconductor industry across the bloc.

Read more of this story at Slashdot.

China Restricts Export of Chipmaking Metals In Clash With US

By: BeauHD
An anonymous reader quotes a report from Bloomberg: China imposed restrictions on exporting two metals that are crucial to parts of the semiconductor, telecommunications and electric-vehicle industries in an escalation of the country's tit-for-tat trade war on technology with the US and Europe. Gallium and germanium, along with their chemical compounds, will be subject to export controls meant to protect Chinese national security starting Aug. 1, China's Ministry of Commerce said in a statement Monday. Exporters for the two metals will need to apply for licenses from the commerce ministry if they want to start or continue to ship them out of the country, and will be required to report details of the overseas buyers and their applications, it said. Impact on the tech industry "depends on the stockpile of equipment on hand," said Roger Entner, an analyst with Recon Analytics LLC. "It's more of a muscle flexing for the next year or so. If it drags on, prices will go up." China is the dominant global producer of both metals that have applications for electric vehicle makers, the defense industry and displays. Gallium and germanium play a role in producing a number of compound semiconductors, which combine multiple elements to improve transmission speed and efficiency. China accounts for about 94% of the world's gallium production, according to the UK Critical Minerals Intelligence Centre. Still, the metals aren't particularly rare or difficult to find, though China's kept them cheap and they can be relatively high-cost to extract. Both metals are byproducts from processing other commodities such as coal and bauxite, the base for aluminum production. With restricted supply, higher prices could draw out production from elsewhere. "When they stop suppressing the price, it suddenly becomes more viable to extract these metals in the West, then China again has an own-goal," said Christopher Ecclestone, principle at Hallgarten & Co. "For a short while they get a higher price, but then China's market dominance gets lost -- the same thing has happened before in other things like antimony, tungsten and rare earths."

Read more of this story at Slashdot.

Becoming a Socialite: How Virtual “Fakeness” Produces Material Realities among Urban Chinese Gay Men

Real, Unreal, and Whatever Else In-between

On Chinese gay dating apps, “fake profiles” are a constant concern: photos might have been altered or biometrics might have been fabricated. Offline, the person might barely resemble their profile. The lived experiences of Chinese gay men, however, show us that the fake is not always antithetical to the real. The fake, under certain circumstances, could enact material realities of its own. Gay socialites (同志名媛, tongzhi mingyuan) in urban China’s gay community are cases in point.

One aspect of my research among gay socialites focuses on the in-between zone of “real” and “unreal,” and how exactly the transformation from unreal to real can be achieved in a specific socio-technological context—contemporary urban China—in the digital age. I argue that we need to go beyond a binary of “real” and “unreal” to understand a social world where human actors are using digital technologies to create intermediate zones that are neither squarely real nor completely unreal, with the purpose of fulfilling their desires. These blurry, intermediate zones are liminal (Turner 1969), existing in the form of fantasies, constructed personas and lifestyles, and intoxicated states. It is through concrete human actions, and sometimes their unintended consequences, that liminal realities become full realities.

Fourteen years ago, in Coming of Age in Second Life, Tom Boellstorff (2008) argued that virtual worlds are in and of themselves cultural worlds distinct from the physical world, and that it is not only possible but suitable to study the culture of a virtual world with ethnography. Contesting the “false opposition” that fails to recognize that “the myriad ways that the online is real” and mistakenly assumes that “everything physical is real” (Boellstorff 2016, 387), Boellstorff states that “[c]hallenging the derealization of the digital is of pressing importance” (2016, 397). There have been consistent efforts in anthropology and related social sciences that echo or take up Boellstorff’s intervention. Anthropologists caution that design features and affordances of apps are deeply shaped by socio-cultural contexts, and that these new technologies bring about not only new possibilities, but also new risks and hierarchies in users’ lived realities (Batiste 2013; McGuire 2016; Edelman 2016). They pose a collective challenge to the misconception that the virtual and the actual are separated (McGuire 2016; Hu 2015). These pioneer studies have, from various perspectives and with meticulously constructed ethnographic details, highlighted the fact that the virtual and the actual are not only increasingly integrated, but on many occasions the virtual is real in every sense of the word.

Speaking more broadly, Lisa Messeri (2021) cogently points out that what she calls the “anthropologies of the unreal” have continuously expanded what counts as real in anthropological worldview by demonstrating how the seemingly “unreal,” such as illusions, dreams, digital technologies, intoxicated states of mind, and so on, are real or made real in specific socio-technological contexts (Boellstorff 2008; Mittermaier 2010; Messeri 2021; Zigon 2019; Pearce 2009).

In this case study, I use the term “liminal realities” to better conceptualize these in-between realities that were neither absolutely real nor undeniably fake. I draw on Victor Turner’s concept of liminality (1969) to highlight not only the transitional nature of these realities but also their uncertainty, malleability, and fluidity. Indeed, a gay socialite in China is not born; he is made.

The lives of the Chinese gay men I met during fieldwork provide a fruitful lens to understand the in-betweenness of life as a liminality between “real” and “unreal,” when boundaries, or thresholds, are not always clear or absolute. In this blog post, I will show how my interlocutors—mostly rural-to-urban migrant gay men—use digital technologies to create “fake” personas; that is, personas whose lifestyle, socio-economic status, and overall social status were different from their offline ones. In these urban Chinese men’s cases, however, “fake” is not the opposite of “real.” It was precisely through meticulously constructed “fakeness” that these men accumulate attention from China’s gay community, build a large fan base, and increase their social status. Eventually, this “fakeness” materialized and turned into tangible economic gains and social recognition. In other words, the fake became something undeniably real.

“Fake” Profiles, Classification, and Platform Economy

A “gay socialite” was one of the multiple identity categories created by urban Chinese gay men that placed gay men into an always changing hierarchical system according to their upbringing, education, class status, sexual practices, and more. My interlocutors described a gay socialite as someone who was young, good-looking, muscular, financially well-off, and fashionable. Most importantly, however, being a gay socialite was about enacting a particular lifestyle. Indeed, without a Louis Vuitton bag, or comparable luxury brand-name products, a good-looking, muscular, young gay man was considered a “wild chick” (乡下野鸡, xiang xia ye ji) ridiculed for their assumed rural, financially tight, and unsophisticated “nature” (本性, ben xing) despite their good looks. In contrast, hard labor was considered a foreign concept to gay socialites. A socialite must not work yet still have the financial means to travel around the world, stay in luxury hotels, and post their experiences on social media for fans to admire and/or evaluate.

An image of a high-rise hotel room taken from the bed with a man's legs visible. The city skyline can be seen out the windows.

Image 1: A well-known gay socialite posting on social media an image from a luxurious high-rise hotel room. The caption reads: “This is what a vacation is supposed to look like.” (Image screenshot by the author)

A window-side table with an omelette, fruit, and coffee served on top. The water and city skyline are visible in the window.

Image 2: On a different day, the same socialite posted a picture of a fancy breakfast at a luxurious hotel in Hangzhou, China. The caption reads: “A beautiful day begins with two Americanos.” (Image screenshot by the author)

During my fieldwork, however, I found out that most gay socialites actually came from humble backgrounds and that their financial position was not exactly as their social media posts suggested. Their luxurious lifestyle was, in fact, performed. It was common for gay socialites to rent a hotel room together. They took turns taking individual photos in each corner of the room and planned to post their pictures on social media at different times. During my fieldwork, I also learned that these gay men often borrowed brand-name products from others—from either individual people or companies specializing in brand-name rentals—to enhance their upscale persona on social media.

What’s the point, one might ask? Many socialites are looking for “gold masters” to look after them. In the gay lexicon, a “gold master” (金主, jin zhu) referred to a wealthy and usually older gay man who took care of younger and less monied gay men. However, in this gay social hierarchy, gold masters were not just looking to take care of any physically appealing gay men. Due to the equally intense hierarchical thinking among gold masters, and a social environment that measured a person’s social worth partly through the identity of their intimate partners, gold masters were looking for “worthy” (配得上,pei de shang) gay men—a position well fit by gay socialites. If a gold master ended up with a “nobody” (谁也不是, shei ye bu shi, translated literally as “who is nobody”) the reputation or social worth of the gold master would deteriorate as well. After all, the number of wealthy people in China grew to such an extent that some felt the pressure to differentiate themselves even further, pursuing a form of distinction from the so-called “vulgar new rich” (暴发户, bao fa hu, translated literally as “people who got rich as quickly as an explosion”) (Osburg 2020). During my fieldwork, gold masters and gay socialites were common couples. While the former gained face by having an attractive intimate partner, the latter eventually lived a material life that used to exist only in the virtual sphere.

There was more than one way the “fakeness” on social media could turn into material and financial realities. Not every gay socialite could find a gold master. Some took advantage of China’s vast “sunken market,” referring to the vast number of consumers who purchased cheaper products with their more meager incomes. Numbering in the billions, these individuals form the biggest market with the strongest potential one could hope for. By creating a fake persona, gay socialites accumulated a large number of followers from this market, many of whom could never keep a socialite like a gold master could or afford the socialite’s lifestyle for themselves. This is beside the point, however: most fans knew that the social media gay socialite life was often staged. Rather, these virtually mediated personas and lifestyles served not as truthful representation of another person’s reality, but snapshots of the fantasy of a good life, of an otherwise, of an alternative of a life (hopefully) yet to come. The power of fantasy was strong, leading to loyal fanfare, who would click the link and purchase whatever their idols recommend to them.

Brian, for example, was one of the most well-known gay socialites in China. Brian started his entrepreneurship and accumulated his fortune by selling affordable protein power on his social media accounts back in 2010s. When I returned to China for my dissertation fieldwork in 2019, Brian already owned a couple companies, multiple properties in China and Thailand, and was a major sponsor for one of Asia’s biggest dance parties in Bangkok. Even though Brian is still ridiculed by other gays for his highly photoshopped, “fake” pictures on social media, it would be hard to deny that the real and tangible changes in his life originated from purposefully constructed fakeness.

Conclusion

Indeed, the persona and lifestyle put on social media by these socialites might be “fake.” But “fakeness” is not always the opposite of realness. Mediated by virtuality, fakeness—understood in this context as a form of purposefully constructed liminal reality with the intention to craft a better life—is generative, productive, and performative; it brings new realities into existence. For Chinese gay socialites, many of whom migrated from rural China or lower-tier cities to the metropolis such as Shanghai, virtually mediated fakeness was their attempt—sometimes a very convenient and efficient one—to “make it” in China’s urban centers. In their cases, the fake, instead of standing in sharp opposition to the real, stood right beside the real. Here, the differences between the fake and the real were not quite ontological but temporal and conditional. The fake, in this sense, bears the potential to transition and transform into tangible and material realities that are no longer constrained in the virtual world. The fake, then, can be seen as a specific kind of real—the liminal real.


References

Batiste, Dominique Pierre. 2013. “‘0 Feet Away’: The Queer Cartography of French Gay Men’s Geo-Social Media Use.” Anthropological Journal of European Cultures 22 (2): 111–32.Boellstorff, Tom. 2008. Coming of Age in Second Life: An Anthropologist Explores the Virtually Human. Princeton and Oxford: Princeton University Press.———. 2016. “For Whom the Ontology Turns: Theorizing the Digital Real.” Current Anthropology 57 (4): 387–407.Edelman, Elijah Adiv. 2016. “‘This Is Where You Fall off My Map’: Trans-Spectrum Spatialities in Washington, DC, Safety, and the Refusal to Submit to Somatic Erasure.” Journal of Homosexuality 63 (3): 394–404.Horst, Heather A. 2013. “The Infrastructures of Mobile Media: Towards a Future Reseach Agenda.” Mobile Media and Communication 1 (1): 147–52.Hu, Tung-Hui. 2015. A Prehistory of the Cloud. Cambridge, Massachusetts: MIT Press.Ito, Mizuko. 2010. “Mobilizing the Imagination in Everyday Play: The Case of Japanese Media Mixes.” In Mashup Cultures, edited by S. Sonvilla-Weiss, 79–97. New York: Springer.McGuire, M. L. 2016. “The Problem of Technological Integration and Geosocial Cruising in Seoul.” New Media & Society, 1–15.Messeri, Lisa. 2021. “Realities of Illusion: Tracing an Anthropology of the Unreal from Torres Strait to Virtual Reality.” Journal of the Royal Anthropological Institute 27 (2): 340–59.Mittermaier, Amira. 2010. Dreams That Matter: Egyptian Landscapes of the Imagination. Berkeley: University of California Press.Nibbs, Faith. 2016. “Hmong Women on the Web: Transforming Power through Social Networking.” In Claiming Place: On the Agency of Hmong Women, edited by Chia Youyee Vang, Faith Nibbs, and Ma Vang, 169–94. Minneapolis: University of Minnesota Press.Okabe, Daisuke, and Mizuko Ito. 2006. “Everyday Contexts of Camera Phone Use: Steps toward Techno-Social Ethnographic Frameworks.” In Mobile Communication in Everyday Life: Ethnographic Views, Observations and Reflections, edited by Joachim R. Hoflich and Maren Hartmann, 79–102. Berlin: Frank and Timme.Osburg, John. 2020. “Consuming Belief: Luxury, Authenticity, and Chinese Patronage of Tibetan Buddhism in Contemporary China.” HAU: Journal of Ethnographic Theory 10 (1): 69–84. https://doi.org/10.1086/708547.Pearce, Celia. 2009. Communities of Play Emergent Cultures in Multiplayer Games and Virtual Worlds. Cambridge, MA: MIT Press.Turner, Victor. 1969. The Ritual Process: Structure and Anti-Structure. Chicago: Aldine Publishing Company.Wallis, Cara. 2011. “Mobile Phones without Guarantees: The Promises of Technology and the Contingencies of Culture.” New Media & Society 13 (3): 471–85.———. 2013. Technomobility in China: Young Migrant Women and Mobile Phones. New York and London: New York University Press.Zigon, Jarrett. 2019. A War on People: Drug Users Politics and A New Ethics of Community. Berkeley: University of California Press.

How to Disrupt Feedback Loops of War in Beijing and Washington

The professional bureaucracies of both the US and Chinese national security states encourage mistrust, jingoistic attitudes, pessimistic assumptions, and hawkish policies. This is a growing source of war risk, and the only near-term fix is a security dilemma sensibility.

Let me explain.

The Security Dilemma Sensibility

Some time ago, Kenneth Booth and Nicholas Wheeler wrote of a “security dilemma sensibility” that policymakers could (and should) cultivate in order to better manage the interactive processes that can lead to crisis and war, even between two actors who have only defensive intentions.

They described a security dilemma sensibility as:

an actor’s intention and capacity to perceive the motives behind, and to show responsiveness towards, the potential complexity of the military intentions of others…the ability to understand the role that fear might play in their attitudes and behaviour, including, crucially, the role that one’s own actions may play in provoking that fear.

I first came across their book while finishing my PhD, which I did on the side while working in Obama’s Pentagon. Like (hopefully) everyone who studies international relations, I’d learned about the security dilemma as an undergrad. It made sense that non-aggressive countries could inadvertently make themselves less secure by taking measures that would be misperceived by others as threatening, leading to counter-measures also perceived as threatening. 

But a security dilemma sensibility really resonated with me as a practical extension of the original concept. And so I found myself trying to bring this sensibility to bear over and again—on the “Korea desk” in the midst of two North Korean attacks on South Korea; among a small group of policy nerds trying to make the “pivot to Asia” real; as a one-time defense strategist contemplating “emerging technologies”; and as a public critic warning about the ways the Trump-Kim nuclear crisis of 2017 could (and nearly did) go sideways. 

My role in these things was inarguably negligible; with the exception of the North Korean nuclear crisis, none of the policy paths taken reflect my counsel. Nevertheless, the security dilemma sensibility strongly colored how I made sense of these wide-ranging problem sets. 

The Feedback Loop Problem

I was reminded of all this while reading a piece in Foreign Affairs by Tong Zhao, whose research on China-related strategic questions is among the most insightful in the business. In the essay, Zhao argues:

The dynamics among China’s political leadership, its policy elite, and the broader public have generated an internal feedback loop that is not entirely within Xi’s comprehension or control. This could result in China’s being fully mobilized for war even without Xi deciding to attack Taiwan.

Recognizing the presence of policy feedback loops is important—they describe how we can imagine security dilemmas escalating into conflict spirals. And it’s not surprising that feedback loops would be present in a rivalry that is intensifying right in front of us.

The valence of a relationship constrains available policy choices and how those choices are perceived, making rivalries self-reinforcing and stubbornly path dependent.

In China, as in the United States, the opinion-makers are virtually all hawks. Everyone is outbidding everyone else. Above all, nobody wants to be seen as “weak” or naïve about the enemy. And all the while, the national security states of both sides are doing everything that politicians allow to optimize themselves for war.

Fueling this is ethnonationalism—in Washington as in Beijing. Reactionary politicians feed implicitly racialized nationalist policies to publics whom they refuse to feed political democracy or economic security. As Yuen Yuen Ang saw in 2022:

The only people who are winning [Sino-US competition] are the ardent radicals, the extremists, and the autocrats on both sides.  It’s so easy to be nationalists…You just need to scream and say extreme things and get people roused.

Neither Chinese nor US officials exercise sufficient control of the violent forces they’re manipulating for political, strategic, and personal gain.

Proximate and Underlying Causes of War

We can’t afford to overlook the root sources of Sino-US confrontation, which include a nightmarish melange of exceptionalist nationalism on both sides, shifting patterns of capital accumulation under the previous economic order, and an unwillingness by either side to take a relational view of the other.

But being clear-eyed about the root causes of security problems doesn’t buy you out of taking seriously potential proximate causes of war, like feedback loops.

Now, I worry about whether China and the United States actually have defensive intentions. Xi Jinping’s jingoism has infected China’s governing regime, and the People’s Liberation Army is definitely taking seriously Xi’s priority to “be ready by 2027 to invade Taiwan.” And while it’s impolitic to point it out in Washington, there is good reason to think that the United States could be a revisionist actor too.

But even though it can be difficult to know whether to code states as having defensive or aggressive intentions, it is not hard to find policy elites within states who are unquestionably aggressive or unquestionably defensive.

The trouble is that even individuals harboring non-aggressive, security-seeking motivations are trapped in systems whose pressures and incentives are much bigger than them.

This is true at the nuclear level. We can reasonably say neither country has the desire to launch a first strike, yet the nature of today’s technologies and Sino-US nuclear postures have locked the two countries in a structural security dilemma. As recent research shows:

The shift in the conventional balance of force in the region and the U.S. development of lower-yield nuclear weapons has led to greater fears in China of U.S. limited nuclear use in a conflict. Chinese strategists increasingly believe that U.S. nonnuclear strategic capabilities threaten China’s nuclear forces.

This is also why feedback loops are an important phenomenon to grasp. The point of Zhao’s warning is that we ought to be trying to “understand how certain efforts to deter Beijing can inadvertently exacerbate the security challenge.” It’s a matter of urgency that US policy thinks through how to disrupt—rather than blissfully ignore—feedback loop dynamics within the Chinese system.

How? By cultivating a security dilemma sensibility.

Our policies need to do more than give us psychological comfort and optimize for a war that nobody can win. They need to self-consciously prioritize preventing war.

So for every new basing access agreement we announce, for every new tariff or economic restriction we unveil, for every new military exercise or arms sale we conduct, we must ask: How does this make us more secure? How does this feed into China’s distorted view of our intentions?

Similarly, when China makes moves we don’t like, we must ask: To what extent are they responding to what we are doing?

I know that many a policy wonk worships at the altar of Thomas Schelling and therefore tends to view life as an endless series of rational games where you as an individual are just constantly trying to get the best of everyone.

But that’s exhausting and unsustainable, and probably self-defeating. It impedes adopting a security dilemma sensibility. And ironically, even Schelling stressed the importance of reassurance and the idea that adversaries needed to believe not just your threats but that they can get on peaceably if they don’t challenge your resolve.

This is cross-posted at Security in Context’s blog, as well as Van’s newsletter.

Standing on the shoulders of Chinese (Scientific) Giants – Evidence for a citation discount for Chinese Researchers

By: Taster
Chinese researchers are increasingly leading scientific research, yet their contributions are not fully recognized, notably by US researchers. Shumin Qiu, Claudia Steinwender and Pierre Azoulay discuss the reasons why articles written by Chinese academics receive significantly fewer citations from US researchers than those written by non-Chinese researchers. Following China’s unprecedented rise as exporter of goods, … Continued

Implications of the Saudi-Iran Deal for Yemen

Guest post by Marta Furlan

In 2014, the Houthis, a Zaydi Shia armed group from the Sa’ada region of northern Yemen, aligned with former President Ali Abdullah Saleh, who had been removed following the Arab Spring uprisings. Together, they defeated the government led by President Abd Rabbuh Mansur Hadi, and established control over the Yemeni capital of Sana’a and the entirety of northern Yemen.

At that time, Iran began to progressively increase its support for the Houthis, seeing partnership with the group as an opportunity to advance its revisionist agenda in the region and establish its influence in the southern Red Sea, an area of immense strategic significance. Threatened by aggressive Iranian expansionism at its doorstep, in March 2015, Saudi Arabia entered the war alongside Hadi. As Iran sided with the Houthis and Saudi Arabia sided with Hadi, Yemen became the battlefield of both a domestic competition for power between different local factions and a regional competition for influence between Teheran and Riyadh.

The complexity that characterizes the Yemeni conflict is not unique. In the modern Middle East, countries such as Syria, Iraq, and Libya also experienced civil wars that developed into multi-layered conflicts involving local, regional, and international actors. In Syria, for instance, the confrontation initially involved the Assad regime, the secular opposition, a plethora of jihadist groups, and the Syrian Kurds. It grew, however, into a competition between Iran, Saudi Arabia, and Turkey over the regional status quo and a competition between the United States and Russia over influence in the Middle East. Despite the civil war scholarship suggesting that one-sided victories become harder with the passing of time, the Syrian conflict ended de facto with the one-sided victory of Bashar al-Assad, supported by Russia and Iran.

As far as Yemen is concerned, the conflict is still ongoing. A major development, however, occurred two weeks ago when Iran and Saudi Arabia agreed to restore diplomatic ties and reopen embassies within two months, seven years after they severed relations. Following the signing of the agreement, which was brokered by China, questions emerged as to whether the deal might have positive implications for the war in Yemen.

Prospects aren’t promising. The conflict in Yemen is at its heart a civil war between Yemeni factions, which is driven by social and political tensions that emerged in Yemen following the country’s unification in May 1990. On the background of those tensions, the inception of the current conflict can truly be traced back to the early 2000s, when six rounds of confrontation saw the government and the Houthi movement fight each other in Sa’ada. Rather than being a simple binary confrontation between the Houthis and the Saudi-backed government, the war in Yemen is a complex mosaic of multiple armed factions fighting against and, at times, alongside each other. Within the anti-Houthi camp, there is a significant degree of military and political fragmentation, with different militias harboring different interests and visions. Some of those include the Southern Transitional Council (STC); al-Islah; the National Resistance Forces led by Tareq Saleh; and the National Shield Force formed by Saudi Arabia.

A reconciliation between Iran and Saudi Arabia will not address the deep-rooted and long-harbored hostility between the Houthis and their opponents, nor will it address the tensions and differences that dominate the anti-Houthi camp. At the very best, the Saudi-Iranian détente will facilitate the bilateral talks that have been ongoing between Saudi Arabia and the Houthis. Those talks were initiated last October, when a six-month-long ceasefire expired, yet no side (Houthis, Saudi Arabia, the government) was willing to return to the battlefront amidst war fatigue. However, the Presidential Leadership Council (PLC, Yemen’s de facto government) has been excluded from the Houthi-Saudi negotiation table. Its exclusion inevitably makes any Houthi-Saudi deal that might be reached in the future with Iranian support hardly consequential for the country’s peace and stability.

Will Yemen see a one-sided victory, similar to what happened in Syria? That’s unlikely. The Houthis and the government-aligned forces reached a mutually damaging stalemate in Marib that left them all weaker. Under these circumstances, academic research suggests that the warring parties could either take steps toward a negotiated settlement or persist indefinitely in a costly, stalled conflict.

The regional dimension of the war might gradually be moving toward a negotiated settlement between the Houthis and Iran, on one hand, and Saudi Arabia, on the other. Pummelled by years of fighting, the Houthis and Saudi Arabia seem to view bilateral negotiations favorably. But the domestic dimensions of the war continue to evade any negotiated settlement between Houthis and the PLC and between different PLC-affiliated militias. As the civil war literature suggests, the trajectory of the conflict will depend on how those parties assess what they can gain or lose from fighting versus negotiating. As the Houthis appear once again determined to resort to force, prospects for peace do not look particularly encouraging.

Marta Furlan is a research and policy consultant at Auswärtiges Amt (Federal Foreign Office) in Germany.

Huawei Claims To Have Built Its Own 14nm Chip Design Suite

By: BeauHD
Huawei has reportedly completed work on electronic design automation (EDA) tools for laying out and making chips down to 14nm process nodes. The Register reports: Chinese media said the platform is one of 78 being developed by the telecoms equipment giant to replace American and European chip design toolkits that have become subject to export controls by the US and others. Huawei's EDA platform was reportedly revealed by rotating Chairman Xu Zhijun during a meeting in February, and later confirmed by media in China. [...] Huawei's focus on EDA software for 14nm and larger chips reflects the current state of China's semiconductor industry. State-backed foundry operator SMIC currently possesses the ability to produce 14nm chips at scale, although there have been some reports the company has had success developing a 7nm process node. Today, the EDA market is largely controlled by three companies: California-based Synopsys and Cadence, as well as Germany's Siemens. According to the industry watchers at TrendForce, these three companies account for roughly 75 percent of the EDA market. And this poses a problem for Chinese chipmakers and foundries, which have steadily found themselves cut off from these tools. Synopsys and Cadence's EDA tech is already subject to several of these export controls, which were stiffened by the US Commerce Department last summer to include state-of-the-art gate-all-around (GAA) transistors. This January, the White House also reportedly stopped issuing export licenses to companies supplying the likes of Huawei. This is particularly troublesome for Huawei, foundry operator SMIC, and memory vendor YMTC to name a few on the US Entity List, a roster of companies Uncle Sam would prefer you not to do business with. It leaves them unable to access recent and latest technologies, at the very least. So the development of a homegrown EDA platform for 14nm chips serves as insurance in case broader access to Western production platforms is cut off entirely.

Read more of this story at Slashdot.

The Daring Ruse That Exposed China's Campaign To Steal American Secrets

The New York Times magazine tells the story of an innocuous-seeming message on LinkedIn in 2017 from Qu Hui, the deputy director of the China-based Provincial Association for International Science and Technology Development. Federal agents eventually obtained search warrants for two Gmail addresses the official was using, and "In what would prove to be a lucky break, the investigators found that each email address was the Apple ID used for an iPhone, linked to an iCloud account where data from the phones was periodically backed up. The agents were later able to obtain search warrants for the two iCloud accounts [that] opened a treasure trove." This included confirmation of what they had suspected all along: that Qu worked for Chinese intelligence. His real name was Xu Yanjun. He had worked at the Ministry of State Security since 2003, earning six promotions to become a deputy division director of the Sixth Bureau in the Jiangsu Province M.S.S. Like so many of us, he had taken pictures of important documents using his iPhone — his national ID card, pay stubs, his health insurance card, an application for vacation — which is how they ended up in his iCloud account. There, investigators also found an audio recording of a 2016 conversation with a professor at N.U.A.A. in which Xu had talked about his job in intelligence and the risks associated with traveling. "The leadership asks you to get the materials of the U.S. F-22 fighter aircraft," he told the professor. "You can't get it by sitting at home." The discovery of evidence of Xu's identity in an iCloud account makes for a kind of delicious reversal. The ubiquitous use of iPhones around the world — a result of America's technological prowess — was helping to fight back against a rival nation's efforts to steal technology. Qu scheduled a meeting in Brussels with one American target — where he was arrested and extradited to America, becoming the first-ever Chinese intelligence official convicted on U.S. soil on charges of economic espionage. The prosecution contended that Xu had been systematically going after intellectual property at aerospace companies in the United States and Europe through cyberespionage and the use of human sources. It's not often that prosecutors find a one-stop shop for much of their evidence, but that's what Xu's iCloud account was — a repository of the spy's personal and professional life. That's because often Xu used his iPhone calendar as a diary, documenting not just the day's events but also his thoughts and feelings.... The messages in Xu's iCloud account enabled investigators to make another damning discovery. Xu had helped coordinate a cyberespionage campaign that targeted several aviation technology companies.... At the end of the trial, Xu was convicted of conspiring and attempting to commit economic espionage and theft of trade secrets.... According to Timothy Mangan, who led the prosecution, the evidence laid out during Xu's trial goes far beyond merely proving his guilt — it uncovers the systematic nature of China's vast economic espionage. The revelation of Xu's activities lifts the veil on how pervasive China's economic espionage is, according to the F.B.I. agent. If just one provincial officer can do what he did, the agent suggests, you can imagine how big the country's overall operations must be. The article notes that the Chinese government "also offers financial incentives to help Chinese expats start their own businesses in China using trade secrets stolen from their American employers." It also cites a 2019 report from a congressional committee's security review that found "myriad ways in which Chinese companies, often backed by their government, help transfer strategic know-how from the United States to China." The maneuvers range from seemingly benign (acquiring American firms with access to key intellectual property) to notoriously coercive (compelling American companies to form joint ventures with Chinese firms and share trade secrets with them in return for access to the Chinese market) to outright theft. Cyberattacks have become an increasingly common tactic because they can't always be linked directly to the Chinese government. Over the past few years, however, federal agents and cybersecurity experts in the U.S. have identified the digital footprints left along the trails of these attacks — malware and I.P. addresses among them — and traced this evidence back to specific groups of hackers with proven ties to the Chinese government. One 2020 indictment blamed five "computer hackers" in China for breaching more than 100 organizations. Thanks to Slashdot reader schwit1 for sharing the article.

Read more of this story at Slashdot.

TikTok Whistleblower Tells Congress Data Protections Don't Stop Chinese Access

By: BeauHD
An anonymous reader quotes a report from Gizmodo: A former TikTok employee turned whistleblower has reportedly met with multiple U.S. senators expressing concerns TikTok's plan to secure U.S. user data won't go far enough to stop possible Chinese espionage. The whistleblower told The Washington Post in an interview that the company's policy plan, dubbed Project Texas, doesn't go far enough and that properly ensuring U.S. data is secured from Chinese employees requires nothing short of a "complete re-engineering" of the way the app works. Those allegations come just days after another whistleblower raised concerns regarding TikTok's U.S. user controls. Combined, the comments could fan the flames for what looks like growing bipartisan support for a full-on nationwide TikTok ban. The former TikTok employee turned whistleblower told the Post he worked at the company for around six months ending in early 2022 as a risk manager and head of a unit in TikTok's Safety Operations team. Part of that job, he claims, put him in charge of knowing which employees had access to certain tools and user data. He claims he was fired after speaking up about his data privacy concerns. Though he left TikTok prior to its finalization of the so-called Project Texas policy, he maintains he saw enough evidence to suggest the guardrails put in place to placate U.S. regulators fearful of Chinese employees viewing U.S. user data were insufficient. The whistleblower has reportedly already met with staffers from Iowa Sen. Chuck Grassley and Virginia Sen. Mark Warner's offices. Specifically, the whistleblower shared a snippet of code with the Post which they say shows TikTok's code connecting with Toutiao, a Chinese news app also run by TikTok's parent company, ByteDance. The whistleblower alleges that connection could let Chinese employees intercept and potentially view U.S. user data. Gizmodo could not independently confirm those claims. The whistleblower, meanwhile reportedly did not advocate for an outright nationwide ban. Instead, he said the problems could be solved but would require further steps than what is included in the Project Texas proposal. Another alleged whistleblower came forward just days before the Post interview, alleging TikTok's access controls on U.S. data were "superficial" at best. "TikTok and ByteDance employees, he alleged, possess the ability to 'switch between Chinese and U.S. data with nothing more than the click of a button,'" reports Gizmodo. The whistleblower alleged in a letter sent to ByteDance by Republican Missouri Rep. Josh Hawley: "I have seen first-hand China-based engineers flipping over to non-China datasets and creating scheduled tasks to backup, aggregate, and analyze data. TikTok and ByteDance are functionally the same company."

Read more of this story at Slashdot.

Counterrevolutions Are Much More Successful at Toppling Unarmed Revolutions. Here’s Why.

Guest post by Killian Clarke

Counterrevolutions have historically received much less attention than revolutions, but the last decade has shown that counterrevolutions remain a powerful—and insidious—force in the world.

In 2013, Egypt’s revolutionary experiment was cut short by a popular counterrevolutionary coup, which elevated General Abdel Fattah el-Sisi to the presidency. In neighboring Sudan, a democratic revolution that had swept aside incumbent autocrat Omar al-Bashir in 2019 was similarly rolled back by a military counterrevolution in October 2021. Only three months later, soldiers in Burkina Faso ousted the civilian president Roch Marc Christian Kaboré, who had been elected following the 2014 Burkinabè uprising.

These counterrevolutions all have something in common: they all occurred in the aftermath of unarmed revolutions, in which masses of ordinary citizens used largely nonviolent tactics like protests, marches, and strikes to force a dictator from power. These similarities, it turns out, are telling.

In a recent article, I show that counterrevolutionary restorations—the return of the old regime following a successful revolution—are much more likely following unarmed revolutions than those involving armed guerilla war. Indeed, the vast majority of successful counterrevolutions in the 20th and 21st centuries have occurred following democratic uprisings like Egypt’s, Sudan’s, and Burkina Faso’s.

Why are these unarmed revolutions so vulnerable? After all, violent armed revolutions are usually deeply threatening to old regime interests, giving counterrevolutionaries plenty of motivation to try to claw back power. There are at least two possible explanations.

The first is that, even though counterrevolutionaries may be desperate to return, violent revolutions usually destroy their capacity to do so. They grind down their armies through prolonged guerilla war, whereas unarmed revolutions leave these armies largely unscathed. In the three cases above, there was minimal security reform following the ousting of the incumbent, forcing civilian revolutionaries to rule in the shadow of a powerful old regime military establishment.

A second explanation focuses on the coercive resources available to revolutionaries. During revolutions waged through insurgency or guerilla war, challengers build up powerful revolutionary armies, like Fidel Castro’s Rebel Army in Cuba or Mao’s Red Army in China. When these revolutionaries seize power, their armies serve as strong bulwarks against counterrevolutionary attacks. The Bay of Pigs invasion in Cuba is a good example: even though that campaign had the backing of the CIA, it quickly ran aground in the face of Castro’s well-fortified revolutionary defenses. In contrast, unarmed revolutionaries rarely build up these types of coercive organizations, leaving them with little means to fend off counterrevolutions.

After looking at the data, I found that the second explanation has more weight than the first one. I break counterrevolution down into two parts— whether a counterrevolution is launched, and then whether it succeeds—and find that armed revolutions significantly lower the likelihood of counterrevolutionary success, but not counterrevolutionary challenges. In other words, reactionaries are just as likely to attempt a restoration following both armed and unarmed revolutions. But they are far less likely to succeed against the armed revolutions, whose loyal cadres can be reliably called up to defend the revolution’s gains.

Unarmed revolutions are increasing around the world, especially in regions like Latin America, Eastern Europe, the Middle East, and sub-Saharan Africa. At the same time, violent revolutions are declining in frequency, particularly those involving long, grueling campaigns that seek transformational impacts on state and society, what some call social revolutions. In one sense, these should be welcome trends, since unarmed revolutions result in far less destruction and have a record of producing more liberal orders. But given their susceptibility to reversal, should we be concerned that we are actually at the threshold of a new era of counterrevolution?

There are certainly reasons for worry. Counterrevolutions are rare events (by my count, there have only been about 25 since 1900), and the fact that there have been so many in recent years does not augur well. Counterrevolutionaries’ prospects have also been bolstered by changes in the international system, with rising powers like Russia, Saudi Arabia, and the United Arab Emirates acting as enthusiastic champions of counterrevolution, particularly against democratic revolutions in their near-abroads. Today’s unarmed revolutions, already facing uphill battles in establishing their rule, with fractious coalitions and a lack of coercive resources, must now also contend with counterrevolutionary forces drawing support from a muscular set of foreign allies.

But though they may struggle to consolidate their gains, unarmed revolutions have a record of establishing more open and democratic regimes than armed ones do. Violent revolutions too often simply replace one form of tyranny with another. The question, then, is how to bolster these fledgling revolutionary democracies and help them to fend off the shadowy forces of counterrevolution.

International support can be crucial. Strong backing from the international community can deter counterrevolutionaries and help new regimes fend off threats. Ultimately, though, much comes down to the actions of revolutionaries themselves—and whether they can keep their coalitions rallied behind the revolutionary cause. Where they can, they are typically able to defeat even powerful counterrevolutions, by relying on the very same tactics of people power and mass protest that brought them success during the revolution itself.

Killian Clarke is an assistant professor at Georgetown University.

China and Open Access

An interview with Mark Robertson about the CAST/STM report on open access and China.

The post China and Open Access appeared first on The Scholarly Kitchen.

The Best Propaganda is True

David Pierson at The New York Times:

While many in the world see the Chinese spy balloon as a sign of Beijing’s growing aggressiveness, China has sought to cast the controversy as a symptom of the United States’ irrevocable decline.

Why else would a great power be spooked by a flimsy inflatable craft, China has argued, if not for a raft of internal problems like an intensely divided society and intractable partisan strife driving President Biden to act tough on Beijing?

This gets at why “the balloon incident” genuinely scares me; it suggests that the United States is doomed to the ratchet effects of domestic outbidding over who can be “tougher” on China.

That’s a recipe for threat inflation, poor policy decisions, and (even more) toxic domestic politics.

China's Balloon Was Capable of Spying on Communications, US Says

By: msmash
The alleged Chinese spy balloon that flew over the US was capable of collecting communications signals and was part of a broader People's Liberation Army intelligence-gathering effort that spanned more than 40 countries, a State Department official said Thursday. From a report: High-resolution imagery provided by U-2 spy planes that flew past the balloon revealed an array of surveillance equipment that was inconsistent with Beijing's claim that it was a weather device blown off course, the official said in a statement provided on condition of anonymity. The statement, released before State and Defense Department officials appeared before Congress in open hearings and closed briefings on Thursday, marks the fullest accounting yet for the Biden administration's insistence over the course of a week-long drama that the balloon was meant to spy on the US. Defense Secretary Lloyd Austin said in an interview with CBS News that the Pentagon acted to limit what the balloon could learn about US nuclear capabilities.

Read more of this story at Slashdot.

Trapped by Empire

The government of Guam has appointed a Commission on Decolonization, but U.S. control means that all of the island’s options, including the status quo, have substantial downsides.

India To Block Over 230 Betting and Loan Apps, Many With China Ties

By: msmash
India is moving to block 232 apps, some with links to China, that offer betting and loan services in the South Asian market to prevent misuse of the citizens' data, the state-owned public broadcaster said Sunday. TechCrunch: The Ministry of Electronics and Information Technology is in the process to enforce an emergency order to ban 138 betting and gambling apps and another 94 that provided unauthorized loan services in the interest of protecting the country's integrity, the broadcaster said. The ministry's move was prompted at the direction of the Ministry of Home Affairs, Prasar Bharti added. The apps sought to mislead customers into taking big debts without realizing the terms and there were concerns that they could be used as tools for espionage and propaganda.

Read more of this story at Slashdot.

Apple Cuts iPhone 14 Pro Prices in China by Up to $118 in Rare Sales Push

Apple has cut the price of its latest high-end iPhones in China in an apparent attempt to offset dwindling demand in the country (via Bloomberg).


Apple merchant JD.com, China's second-largest e-commerce platform, is among the retailers that have taken 800 yuan ($118) off iPhone 14 Pro and Pro Max models in the last few days. State carrier China Mobile has also slashed its prices for the phones.

Retailers in Shenzhen have also offered price cuts ranging from 600 to 800 yuan for the higher-end devices in the iPhone 14 series. Meanwhile, Apple's own local website continues to offer the devices at regular prices.

The discounts came around the end of the Lunar New Year season, when retailers typically expect an increase in footfall before schools reopen. Inventory for the ‌iPhone 14 Pro‌ models at some stores has reportedly sold out already.

As Bloomberg notes, the roughly 7% to 9% discounts on the ‌iPhone 14 Pro‌ range mirrored offers on lower-end models, which are typically the first to get cut, suggesting Apple is responding to weak demand in the world's largest smartphone market.

Apple on Thursday released its financial results for the quarter ending in December, reporting a roughly 5% decline in revenue compared to the year-ago quarter. Apple cited a "challenging environment" that included iPhone supply issues due to COVID lockdowns in China, which hampered its ability to ship devices to customers.

During his investors call, CEO Tim Cook pointed to a rebound in the China economy now that COVID restrictions have been relaxed, but suggested Apple's performance for the current quarter would mirror that of the December period, suggesting another 5% revenue decline year-on-year. ‌iPhone‌ revenue is expected to accelerate in the March quarter.

China's smartphone market finished 2022 with an annual shipment of 287 million units, a year-on-year decrease of 14% and the first time since 2013 that the country's market shipment has fallen below 300 million units, according to a report by Canalys. Apple reached an all-time-high market share of 18% for the year, despite growth for the fourth quarter dropping by 24% due to supply issues, said the report.
This article, "Apple Cuts iPhone 14 Pro Prices in China by Up to $118 in Rare Sales Push" first appeared on MacRumors.com

Discuss this article in our forums

Apple Pulls 'Damus' From Its App Store in China

9to5Mac is reporting that Apple pulled the Damus app from its App Store in China on Thursday, "with the developers being informed that the Nostr app 'includes content that is illegal in China.'" Apple rejected the app multiple times, applying the app review guidelines that would apply to a social networking service. In reality, all Damus does is provide access to Nostr feeds, so it would be more accurate to consider it akin to a web browser, with the developers having no control over, or responsibility for, the content of those feeds. Damus finally made it into the App Store this week. Apple has now pulled Damus from the App Store in China. Damus developer William Casarin posted a screengrab of the notice, which claimed it included illegal content.... The app doesn't contain any content at all. It would be like banning Safari because it can be used to access the websites of terrorist organizations.

Read more of this story at Slashdot.

❌