New research from the Australian Strategic Policy Institute reveals a range of nations are increasingly willing to challenge China’s excessive claims in the South China Sea than they were previously.
The analysis, detailed in Pressure points—a world first online resource tracking the activity and behaviour of the People’s Liberation Army (PLA) in the South China Sea and beyond.
The website highlights almost a dozen recent incidents of unsafe military behaviour by China against countries including the United States, Australia, Canada, the Philippines, the Netherlands and others, and finds these unsafe incidents have ramped up in recent years, after first beginning in 2021.
The research also analyses the Chinese military’s use of air and maritime coercion to enforce Beijing’s excessive claims and advance China’s security and defence interests in the Indo-Pacific.
As outlined on the website, the PLA employs a variety of risky and dangerous tactics to try to deter others from operating in areas of the South China Sea and East China Sea, including through the release of flares, the use of lasers, sonar bursts and other dangerous manoeuvres.
Through a detailed examination of which countries do or don’t use their military forces to challenge China’s excessive claims, the research also finds that not all countries are regularly publicising the challenges they are engaged in.
While the US, Canada, France and the United Kingdom regularly publicise their challenges, Australia, Japan and New Zealand are among the countries that do not.
The project also provides governments, as well as regional and global militaries, with policy recommendations to help push back against China’s ambitions to reshape the regional order.
These focus on enhancing transparency through regular public statements to reinforce the importance of their military actions, building and strengthening networks between like-minded countries and demonstrating perseverance.
This new ASPI project fills an information gap regarding the PLA’s regional activity, and through greater data-driven transparency the project aims to deepen and inform public discourse on important defence and security issues.
It provides the public with a reliable and accurate account of the PLA’s regional activity by highlighting and analysing open-source data, military imagery and satellite footage and official statements. Future expansions of the work will occur in 2025-26.
https://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2025/03/31171731/Pressure-Points-banner.png11461651nathanhttp://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/10/16232551/ASPI-CMYK_SVG.svgnathan2025-03-27 06:00:002025-03-31 17:22:19Pressure points: China’s air and maritime coercion
Britons support an open and engaged foreign policy role for the United Kingdom. In light of the re-election of President Donald Trump, 40% believe Britain should continue to maintain its current active level of engagement in world affairs, and 23% believe it should play a larger role.
Just 16% of Britons support a less active United Kingdom on the world stage.
When asked what Britain’s response should be if the United States withdraws its financial and military support from Ukraine, 57% of Britons would endorse the UK either maintaining (35%) or increasing (22%) its contributions to Ukraine. One-fifth would prefer that the UK reduces its contributions to Ukraine.
UK–China relations
Just a quarter (26%) of Britons support the UK Government’s efforts to increase engagement with China in the pursuit of economic growth and stabilised diplomatic relations.
In comparison, 45% of Britons would either prefer to return to the more restricted level of engagement under the previous government (25%) or for the government to reduce its relations with Beijing even further (20%).
A large majority of Britons (69%) are concerned about the increasing degree of cooperation between Russia and China. Conservative and Labour voters share similarly high levels of concern, and Britons over 50 years of age are especially troubled about the trend of adversary alignment.
Defence and security
When asked whether the UK will need to spend more on defence to keep up with current and future global security challenges, a clear two-thirds (64%) of the British people agree. Twenty-nine per cent of Britons strongly agree that defence spending should increase. Just 12% disagree that the UK will need to spend more.
The majority of Britons believe that collaboration with allies on defence and security projects like AUKUS will help to make the UK safer (55%) and that partnerships like AUKUS focusing on developing cutting-edge technologies with Britain’s allies will help to make the UK more competitive towards countries like China (59%).
Britons are somewhat less persuaded that AUKUS will succeed as a deterrent against Chinese aggression in the Indo-Pacific, although the largest group of respondents (44%) agree that it will.
Brief survey methodology and notes
Survey design and analysis: Sophia Gaston
Field work: Opinium
Field work dates: 8–10 January 2025
Weighting: Weighted to be nationally and politically representative
Sample: 2,050 UK adults
The field work for this report was conducted by Opinium through an online survey platform, with a sample size of 2,050 UK adults aged 18 and over. This sample size is considered robust for public opinion research and aligns with industry standards. With 2,000 participants, the margin of error for reported figures is approximately ±2.3 percentage points at a 95% confidence level. Beyond this sample size, the reduction in the margin of error becomes minimal, making this size both statistically sufficient and practical for drawing meaningful conclusions with reliable representation of the UK adult population. For the full methodological statement, see Appendix 1 of this report.
Notes
Given the subject matter of this survey, objective and impartial contextual information was provided at the beginning of questions. There are some questions for which fairly substantial proportions of respondents were unsure of their answers. All ‘Don’t knows’ are reported.
The survey captured voters for all political parties, and non-voters; however, only the findings for the five largest parties are discussed in detail in this report, with the exception of one question (6C), in which it was necessary to examine the smaller parties as the source of a drag on the national picture. The five major parties discussed in this report are the Conservative Party, the Labour Party, the Liberal Democrats, Reform (formerly the Brexit Party and UKIP), and the Green Party.
This report also presents the survey results differentiated according to how respondents’ voted in the 2016 referendum on the UK’s membership of the European Union, their residency within the UK, their age, their socio-economic status, and whether they come from White British or non-White British backgrounds. The full methodological notes are found at the end of the report.
Some of the graphs present ‘NET’ results, which combine the two most positive and two most negative responses together – for example, ‘Significantly increase’ and ‘Somewhat increase’ – to provide a more accessible representation of the balance of public opinion. These are presented alongside the full breakdown of results for each question for full transparency.
Introduction
There’s no doubt that 2025 will be a consequential year in geopolitical terms, with the inauguration of President Donald Trump marking a step-change in the global role of the world’s largest economy and its primary military power. The full suite of implications for America’s allies is still emerging, and there will be opportunities for its partners to express their agency or demonstrate alignment. For a nation like the United Kingdom, whose security and strategic relationship with the United States is institutionally embedded, any pivotal shifts in American foreign policy bear profound ramifications for the UK’s international posture. The fact that such an evaluation of America’s international interests and relationships is taking place during a time in which several major conflicts – including one in Europe – continue to rage, only serves to heighten anxieties among policy-makers and citizens alike.
Public opinion on foreign policy remains an understudied and poorly understood research area in Britain, due to a long-held view that the public simply conferred responsibility for such complicated and sensitive matters to government. Certainly, many Britons don’t possess a sophisticated understanding of the intricacies of diplomatic and security policy. However, they do carry strong instincts, and, in an internationalised media age, are constantly consuming information from a range of sources and forming opinions that may diverge from government positions.
The compound effect of a turbulent decade on the international stage has made Britons more perceptive to feelings of insecurity about the state of the world, which can be transposed into their domestic outlook. At the same time, their belief in the efficacy of government to address international crises, or their support for the missions being pursued by government, isn’t guaranteed. This creates a challenging backdrop from which public consent can be sought for the kind of bold and decisive actions that may need to be considered as policy options in the coming months and years.
This study provides a snapshot of the views of British citizens at the moment at which President Donald Trump was inaugurated for a second time. It shows a nation which, overall, continues to subscribe to clear definitions of its friends and adversaries, carries a sense of responsibility to Ukraine, and greets the rise of a more assertive China with concern and scepticism. Underneath the national picture, however, the data reveals some concerning seeds of discord and divergence among certain demographic groups and political parties. The UK Government must build on the good foundations by speaking more frequently and directly to the British people about the rapidly evolving global landscape, and making the case for the values, interests, and relationships it pursues.
Sophia Gaston
March 2025
London
https://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2025/03/17104401/British-public-opinion-on-foreign-policy_-President-Trump-Ukraine-China-defence-banner.png656984markohttp://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/10/16232551/ASPI-CMYK_SVG.svgmarko2025-03-14 08:54:252025-03-26 09:51:59British public opinion on foreign policy: President Trump, Ukraine, China, Defence spending and AUKUS
This report looks at measures that governments in various parts of the world have taken to defend their economic ‘crown jewels’ and other critical knowledge-intensive industries from cyber threats. It should serve as inspiration for other governments, including from those economies studied in State-sponsored economic cyber-espionage for commercial purposes: Assessing the preparedness of emerging economies to defend against cyber-enabled IP theft. Despite accounting for the bulk of GDP growth, innovation and future employment, such intellectual property (IP)-intensive industries aren’t held to the same levels of protection and security scrutiny as government agencies or providers of critical infrastructure and critical information infrastructure (Figure 1).
Figure 1: Various layers of cybersecurity protection regimes
Source: Developed by the authors.
Since 2022, an increasing number of governments have introduced new policies, legislation, regulations and standards to deal with the threat to their economies from cyber-enabled IP theft. Most prominently, in October 2023, the heads of the major security and intelligence agencies of Australia, Canada, New Zealand, the UK and the US (also known as the ‘Five Eyes’) appeared together in public for the first time, in front of a Silicon Valley audience, and called out China as an ‘unprecedented threat’ to innovation across the world.1 That was followed up in October 2024 with a public campaign called ‘Secure Innovation’.
There is, however, variation in how governments frame their responses. Countries such as the UK and Australia take a national-security approach with policy instruments that seek to monitor the flow of knowledge and innovation to and from specific countries (primarily China). Other countries, such as Malaysia and Finland, take a due-diligence risk approach with a focus on awareness building and providing incentives to organisations to do their due-diligence checks before engaging with foreign entities. Countries such as Japan and Singapore, by contrast, take an economic-security approach in which they focus on engaging and empowering at-risk industries proactively.
This report is the third in a compendium of three. The first report, State-sponsored economic cyber-espionage for commercial purposes: tackling an invisible but persistent risk to prosperity, published in 2022, looked at the scale, scope and impact of state-sponsored cyber-espionage campaigns aimed at extracting trade secrets and sensitive business information. The second report, State-sponsored economic cyber-espionage for commercial purposes: Assessing the preparedness of emerging economies to respond to cyber-enabled IP theft, looks at the extent to which agreed norms effectively constrain states from conducting economic cyber-espionage and also examines the varying levels of vulnerability experienced by selected major emerging economies.
This third report complements those diagnoses by offering policymakers an action perspective based on good practices observed across the world. Various practices and examples have been selected, drawing from a multi-year capacity-building effort that included engagements in Southeast Asia, South Asia and Latin America and consultations with authorities in developed economies such as the US, Australia, Japan, Singapore and the Netherlands. Many of the practices covered in this report were presented at the Track 1 Dialogue on Good Governmental Practices that ASPI hosted during Singapore International Cyber Week 2023.
International guardrails
The issue of economic cyber-espionage2 is inherently international. It’s an issue caused by malicious or negligent behaviour of other states. Accordingly, international law and norms are as critical as domestic responses in countering the threat posed. This section offers a review of the most relevant international initiatives that touch on the governance of cyberspace and the protection of IP.
Through the UN First Committee process, states have introduced a set of voluntary and non-binding norms (Figure 2). That has included the following provisions:
States should not knowingly allow their territory to be used for internationally wrongful acts; that is, activities that constitute (serious) breaches of international obligations, inflict serious harm on another state or jeopardise international peace and security.
States should not conduct or support cyber activities that damage critical infrastructure or impair the operation of critical infrastructure that provides services to the public.
States should offer assistance upon request and respond to requests to mitigate ongoing cyber incidents if those incidents affect the functioning of critical infrastructure.
Figure 2: UN norms of responsible state behaviour in cyberspace
The G20 norm complements the work of the UN First Committee, providing that:
States should not engage in cyber-espionage activities for the purpose of providing domestic industry with illegitimately obtained commercially valuable information.
The extent to which states accept that economic cyber-espionage without commercial intent is an acceptable tool of statecraft remains a live debate. In 2017, the authors of the Tallin Manual 2.0 asserted that although ‘peacetime cyber espionage by States does not per se violate international law, the method by which it is carried out might do so’.3 Other states, however, such as the members of MERCOSUR (the trade bloc comprising Argentina, Brazil, Paraguay, Uruguay and Venezuela [currently suspended]) and China hold the view that ‘[n]o State shall engage in ICT-enabled espionage or damages against other States’.4 Austria recently (2024) added to this debate, arguing that ‘cyber espionage activities, including industrial cyber espionage against corporations, within a state’s territory may also violate that state’s sovereignty.’5
The Budapest Convention on Cybercrime and the new UN Cybercrime Convention don’t address the theft of IP or offer mechanisms to deal with state-sponsored cyber activities.6 Both frameworks merely offer mechanisms for the harmonisation of legal regimes to enable states to collaborate on investigations and prosecutions of cyber-related crimes.
The Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS), administered by the World Trade Organization (WTO), sets minimum standards for IP protection. Article 39 provides perpetual trade-secret protection, provided that the secret is not ‘generally known or readily accessible’ to the general public, has ‘commercial value because it is a secret’, and the owner has taken reasonable precautions to protect the secret.77 However, TRIPS doesn’t take into account any cyber-related threats to IP protection; nor does it provide dispute-settlement mechanisms to address state-sponsored or state-supported acts of theft.
Finally, there are international agreements that regulate certain technology transfers. For instance, the Wassenaar Arrangement—a voluntary export-control regime established to promote responsible transfers of conventional arms and dual-use technologies and goods—offers a list of technologies that are considered sensitive and ought to be subject of additional layers of review before being approved for export. While it doesn’t address cyber-enabled IP theft, it does regulate the trade in technologies that could facilitate such theft, such as intrusion software and surveillance tools.
However, despite the serious impact of IP theft, there’s a clear gap in current international law and norms that would otherwise offer national governments guardrails for introducing measures that would help states to prevent, deter, detect and recover from economic cyber-espionage. Therefore, the onus for protection presently lies on national governments taking ownership and responsibility within their own borders.
References
Zeba Siddiqui, ‘Five Eyes intelligence chiefs warn on China’s “theft” of intellectual property’, Reuters, 19 October 2023, online. ↩︎
‘Economic cyber-espionage’ is the unauthorised collection of commercially valuable assets, through compromises of digital systems and communication channels, by one state against another or by one state against a private entity. ‘Industrial or commercial cyber-espionage’ is the unauthorised collection of commercially valuable assets, through compromises of digital systems and communication channels, by one private entity against another private entity. ↩︎
Michael N Schmitt, Tallinn manual 2.0 on the international law applicable to cyber operations, 2nd edition, Cambridge University Press, 2017. ↩︎
On China, see “China’s views on the application of the principle of sovereignty in cyberspace,” United Nations, online; on Mercosur, see “Decision rejecting the acts of espionage conducted by the United States in the countries of the region,” United Nations, 22 July 2013, online. ↩︎
Przemysław Roguski, “Austria’s Progressive Stance on Cyber Operations and International Law,” Just Security, 25 June 2024, online. ↩︎
See, for instance, Brenda I Rowe, ‘Transnational state-sponsored cyber economic espionage: a legal quagmire’, Security Journal, 13 September 2019, 33:63–82. ↩︎
‘Article 39 of the Agreement on Trade-Related Aspects of Intellectual Property Rights’, World Trade Organization, online. ↩︎
https://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2025/03/03161955/State-sponsored-economic-cyber-espionage-for-commercial-purposes.png504885markohttp://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/10/16232551/ASPI-CMYK_SVG.svgmarko2025-02-19 16:40:492025-03-12 14:57:53State-sponsored economic cyber-espionage for commercial purposes: Governmental practices in protecting IP-intensive industries
Strategic competition is deepening existing tensions and mistrust between states and prompts nations to develop capabilities that they consider central to sovereign national power. Technological capabilities sit at the centre of this. It’s therefore not surprising that governments around the world are seeking technological advantage over their competitors and potential adversaries. In this context, safeguarding intellectual property (IP) has become necessary not just because it’s an essential asset for any modern economy—developed or emerging—but because it’s also increasingly underwriting national and regional security.
Today, middle-income countries1 ‘World Bank country and lending groups’, World Bank, 2024, online. that are seeking to progress in the global value chain are home to vibrant knowledge-intensive sectors. Some of the world’s largest science and technology clusters are located in São Paulo and Bengaluru, for example.2 Other exemplars include the biochemical industry in India, information and communication technology (ICT) firms in Malaysia and petroleum processors in Brazil. In fact, countries such as Brazil, India, Indonesia, Mexico and Vietnam have emerged as increasingly major producers of knowledge and innovation.3
Perhaps reflecting that changing reality, it’s middle-income countries that are confronted by increasing attempts to deprive them of their economic crown jewels. In our report State-sponsored economic cyber-espionage for commercial purposes: tackling an invisible but persistent risk to prosperity, ASPI estimated that the number of state-sponsored cyber incidents affecting private entities in Southeast Asia, South Asia, Latin America and the Middle East increased from 40% in 2014 to nearly 60% in 2020.4 To be clear: economic espionage isn’t new. But it’s the growing scale and intensification of economic cyber-espionage for commercial purposes—and as an integrated tool of statecraft—that is a cause for concern.
The promise of 2015
In September 2015, a bilateral summit between Chinese President Xi Jinping and then US President Barack Obama laid the foundation for an international norm against cyber-enabled theft of IP for commercial gain. The joint communique produced at the end of the summit highlighted that China and the US had reached an understanding not to ‘conduct or knowingly support cyber-enabled theft of IP, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors’. This—critically—recognised a distinction between hacking for commercial purposes and hacking for national-security purposes. Building on that apparent progress, the 2015 G20 Antalya leaders’ communique on ICT-enabled theft of IP established bounds for responsible state behaviour in cyberspace—what was described at the time as a landmark moment.
However, the promise of that seemingly historic moment has not been realised since. Rather than seeing this practice stop, cyber-enabled theft of IP quadrupled between 2015 and 2023. Higher barriers to market access across China, the US and Europe—the result of tit-for-tat behaviour seeking to bolster local technological capabilities, reduce dependence on high-risk vendors, achieve greater strategic autonomy and/or counter unfair advantage—have combined to incentivise irresponsible behaviour by malign states.
China’s and the US’s adherence was always going to be critical to the continued strength and legitimacy of any international norm against cyber-enabled economic espionage. However, bilateral relations between Beijing and Washington devolved in the period after 2015. During the first Trump administration, the US drew a clearer connection between economic and national security. That included explicitly calling out in 2020 China’s theft of American technology, IP and research as a threat to the safety, security and economy of the US. The Trump administration also established the China Initiative, which investigated and prosecuted perceived Chinese spies in American research and industry. While the Biden administration closed the China Initiative, it has continued efforts to protect American IP. That includes through the passing of the Protecting American Intellectual Property Act of 2022, which empowers the US President to sanction entities seen to benefit from or sponsor trade-secret theft.5
For its part, China may never have intended to uphold its commitment to the norm over the long term. China may have endorsed a commitment against economic cyber-espionage as a strategic move to accelerate domestic initiatives, such as rooting out corruption in the People’s Liberation Army and refining Chinese hacking methods to be more sophisticated and less conspicuous.6 Alternatively, the lack of a clearly articulated distinction between hacking for competitive advantage and hacking for national-security purposes under Obama and Xi’s agreement may have contributed to the current situation. In any case, the threat of economic cyber-espionage continues to spiral rapidly, increasingly affecting emerging economies as well.
Emerging economies in the Global South, including members of the G20, have been the most vulnerable to that backsliding. India, Vietnam and Brazil have become important and impactful IP-producers, but their means to protect that innovation have lagged—unfortunately creating an expanded attack surface without the commensurate resilience. Still coming to terms with the scope and nature of the threat, they and other similar governments have so far introduced higher-end requirements and support arrangements for their own systems, and for operators of critical infrastructure and critical information infrastructure. However, most other industries—even when they’re substantial contributors to national GDP, high-value IP holders and the enablers for economic advancement—have been left out.
Building capacity to defend against cyber-enabled theft of IP
This report is a first-ever analytical exercise that examines the vulnerability of emerging economies in the face of economic cyber-espionage. It’s a culmination of two years of research and stakeholder engagement across the Indo-Pacific and Latin America. The focus has been on investigating perspectives on the threat of economic cyber-espionage and the degree to which major emerging economies are prepared to respond. The first of the three reports in the compendium—published in late 2022—examined state practices of cyber-enabled theft of IP. It found that, since 2015, the number of reported cases of economic cyber-espionage had tripled. Further, it found that the scale and severity of incidents had grown proportionally with the use of cyber technology as a tool of statecraft for securing economic and strategic objectives.
This specific report is the second in the compendium of three. It considers Chinese and US perspectives in the first instance—recognising their criticality to the effectiveness of any international norm. It goes on to assess the level of vulnerability across Argentina, Brazil, Colombia, India, Indonesia, Malaysia, Mexico, Peru, the Philippines, Thailand and Vietnam. This is because it’s those economies in South Asia, Southeast Asia and Latin America that are experiencing some of the world’s most rapid knowledge and innovation production. Each country has been assessed and given a risk label indicating its vulnerability based on a diagnostic tool developed by ASPI.
The third of the three reports in the compendium goes beyond analysing the problem. Through a mapping of responses, it identifies and presents a capture of best practice. The purpose is to support vulnerable states in defending their economic ‘crown jewels’—that is, critical knowledge-intensive industries. It offers a capacity-building checklist intended to help policymakers make sense of the cyber-threat landscape and respond to protect private entities from economic cyber-espionage.
References
‘World Bank country and lending groups’, World Bank, 2024, online. ↩︎
‘Science and technology cluster ranking 2023’, World Intellectual Property Organization (WIPO), online. ↩︎
Gatra Priyandita, Bart Hogeveen, Ben Stevens, State-sponsored economic cyber-espionage for commercial purposes: tackling an invisible but persistent risk to prosperity, ASPI, Canberra, 2022, online. ↩︎
‘Protecting American Intellectual Property Act of 2022’, US Congress, online. ↩︎
Jack Goldsmith, ‘US attribution of China’s cyber-theft aids Xi’s centralization and anti-corruption efforts’, Lawfare, 21 June 2016, online. ↩︎
https://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2025/03/03152958/State-sponsored-economic-cyber-espionage-for-commercial-purposes-Banner.png370791markohttp://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/10/16232551/ASPI-CMYK_SVG.svgmarko2025-02-19 15:30:472025-03-12 14:52:29State-sponsored economic cyber-espionage for commercial purposes: Assessing the preparedness of emerging economies to defend against cyber-enabled IP theft
How might US policy in the Indo-Pacific change over the next four years? In anticipation of a new US administration and Congress in 2025, ASPI USA held an “alternative futures analysis” exercise in mid-October 2024 to explore the drivers of US policy and how they might evolve through to November 2028. The workshop involved seven Indo-Pacific experts, who discussed a range of factors that could determine US policy and assessed how key factors could drive different outcomes.
The participants determined that the two key drivers affecting the US role in the Indo-Pacific over the next four years that are simultaneously most uncertain and most determinative for US policy are:
Washington’s perception of China’s strength in the Indo-Pacific
the level of US attention to the region.
The former is a key determinant of Washington’s threat perception, and the latter is a key determinant of Washington’s capacity to sustainably engage in the region. The nexus of those drivers produced a skeleton of four potential scenarios:
Failing to walk and chew gum: Perceived high China power and a low level of US attention. In this scenario, Beijing continues to advance its interests across the region while Washington fails to prioritise imperatives in the Indo-Pacific amid ongoing conflicts in Europe, the Middle East, and elsewhere.
Follow US: Perceived high China power and a high level of US attention. In this scenario, the possibility of Chinese regional hegemony is growing, but the US adopts a focused, harder-edged security strategy and leads like-minded states to confront the challenge.
The Peaceful Pivot: Perceived low China power and a high level of US attention. In this “stars align” scenario, the perception of diminishing competition and conflict with China couples with the US implementing the decade-old promise of a pivot to Asia.
Leading from behind: Perceived low China power and a low level of US attention. China’s capacity to project power falters in this scenario, but the US—pulled into global events elsewhere and distracted by its own domestic politics—does not provide forceful leadership in the region and leans on allies and partners to carry the load.
https://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2025/03/07130103/The-future-of-US-Indo-Pacific-policy-Banner-1.png368908markohttp://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/10/16232551/ASPI-CMYK_SVG.svgmarko2025-02-07 13:17:422025-03-12 14:54:32The future of US Indo-Pacific policy
Australia faces an emerging national security threat from Brazilian transnational crime groups. Once a domestic concern, Brazilian organised crime has evolved into a powerful narco-insurgency with transnational reach, making Brazil the world’s second-largest player in the cocaine trade after Colombia.
While Brazilian organised crime previously posed little threat to Australia, this report, The Pacific cocaine corridor: A Brazilian cartel’s pipeline to Australia, examines how Brazil’s expanding role in global cocaine supply, rising criminal network sophistication, and growing demand in Australia’s lucrative cocaine market are increasing the presence of Brazilian organised crime on Australian shores.
The report highlights how Brazil’s Primeiro Comando da Capital (PCC) has become a major transnational criminal threat, exploiting weaknesses in political, legal, and economic systems. It explores Brazil’s geography and criminal networks with South American cocaine producers and examines the PCC’s global distribution networks, with a focus on how the Pacific is increasingly used to transport drugs destined for Australia. A recent case study demonstrates the prioritisation of the Australian market in these operations.
The report concludes with recommendations for strengthening police cooperation, enhancing financial surveillance, and proactively detecting and disrupting PCC activities. By addressing key enablers of the PCC’s resilience and closing gaps in international information exchange, a coordinated approach will not only mitigate the immediate threat but also bolster Australia’s long-term defences against transnational organised crime.
https://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2025/03/03120040/Hero-slide-Images2.png6001500markohttp://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/10/16232551/ASPI-CMYK_SVG.svgmarko2025-02-06 14:51:332025-03-26 10:54:36The Pacific cocaine corridor: A Brazilian cartel’s pipeline to Australia
This year marks a powerful milestone in Australia’s history: the 50th anniversary of Cyclone Tracy, a disaster that reshaped the nation’s approach to resilience and recovery. When the cyclone struck Darwin on Christmas Day in 1974, it killed 66 people, displaced thousands, and left the city in ruins. Yet, it also sparked an extraordinary national response that redefined how Australia prepares for and recovers from natural disasters. Darwin, once devastated, now stands as a modern, resilient city—built not just to recover, but to withstand the worst.
ASPI’s new report, released in honour of this anniversary, takes a deep dive into Cyclone Tracy’s lasting impact on Australia’s disaster management. It explores how the event prompted major shifts in urban planning, building codes, and national security frameworks. From the pivotal role of the Australian Defence Force in the immediate response to the Whitlam government’s establishment of the Darwin Reconstruction Authority, Tracy set a blueprint for modern disaster recovery. But the legacy goes beyond infrastructure. The report also highlights the resilience of First Nations communities and the growing role of the private sector in disaster preparedness—elements that continue to shape Australia’s response to climate risks.
As we face increasingly frequent and severe climate events, the anniversary of Cyclone Tracy serves as a sharp reminder: resilience is not just about bouncing back—it’s about building forward. The report argues that northern Australia must go beyond traditional recovery strategies, urging a renewed focus on proactive resilience measures that address not only infrastructure but governance, community involvement, and climate adaptation. Tracy’s lessons are not just historical—they are essential to ensuring Australia’s future readiness.
https://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2025/03/07133848/Cyclone-Tracy_-50-years-on_banner.png4501350markohttp://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/10/16232551/ASPI-CMYK_SVG.svgmarko2024-12-18 13:18:202025-03-11 14:49:12Cyclone Tracy: 50 years on
Cooperation between Australia and the Republic of Korea (hereafter South Korea or the ROK) in a range of critical technology areas has grown rapidly in recent years. Underpinned by the Australia – South Korea Memorandum of Understanding (MoU) on Cyber and Critical Technology Cooperation signed in 2021, collaboration is currently centred around emerging technologies, including next-generation telecommunications, artificial intelligence (AI) and quantum computing. Such technologies are deemed to be critical due to their potential to enhance or threaten societies, economies and national security. Most are dual- or multi-use and have applications in a wide range of sectors.1
Intensifying geostrategic competition is threatening stability and prosperity in the Indo-Pacific region. Particularly alarming is competition in the technological domain. ASPI’s Critical Technology Tracker, a large data-driven project that now covers 64 critical technologies and focuses on high-impact research, reveals a stunning shift in research ‘technology leadership’ over the past two decades. Where the United States (US) led in 60 of the 64 technologies in the five years between 2003 and 2007, the US’s lead has decreased to seven technologies in the most recent five years (2019–2023). Instead, China now leads in 57 of those technologies.
Within the Indo-Pacific region, some countries have responded to those shifts in technology leadership through the introduction of policies aimed at building ‘technological sovereignty’. The restriction of high-risk vendors from critical infrastructure, the creation of sovereign industrial bases and supply-chain diversification are examples of this approach. But a sovereign approach doesn’t mean protectionism. Rather, many countries, including Australia and South Korea, are collaborating with like-minded regional partners to further their respective national interests and support regional resilience through a series of minilateral frameworks.
The Australia – South Korea technological relationship already benefits from strong foundations, but it’s increasingly important that both partners turn promise into reality. It would be beneficial for Australia and South Korea to leverage their respective strengths and ensure that collaboration evolves in a strategic manner. Both countries are leaders in research and development (R&D) related to science and technology (S&T) and are actively involved in international partnerships for standards-setting relating to AI and other technologies. Furthermore, both countries possess complementary industry sectors, as demonstrated through Australia’s critical-minerals development and existing space-launch capabilities on one hand, and South Korea’s domestic capacity for advanced manufacturing on the other.
This report examines four stages common to technological life cycles — (1) R&D and innovation; (2) building blocks for manufacturing; (3) testing and application; and (4) standards and norms. For each, we examine a specific critical technology of interest. Those four life-cycle areas and respective technologies—spanning biotechnologies-related R&D, manufacturing electric-battery materials, satellite launches and AI standards-setting—were chosen as each is a technology of focus for both countries. Furthermore, collaboration through these specific technological stages enables Australia and South Korea to leverage their existing strengths in a complementary manner (see Figure 1). Supporting the analysis of these four stages of the technological life cycle and selected critical technologies is data from ASPI’s Critical Technology Tracker and the Composite Science and Technology Innovation Index (COSTII) jointly released by South Korea’s Ministry of Science and ICT (MSIT) and the Korea Institute of Science & Technology Evaluation and Planning (KISTEP).
Informed by that examination, this report identifies a set of recommendations for strengthening cooperation that is relevant for different stakeholders, including government and industry.
Policy recommendations
Biotechnologies
Australia and South Korea can enhance knowledge-sharing in biotechnologies-related R&D through people-to-people exchanges. Links should be formalised through an MoU between relevant institutions—such as Australia’s Commonwealth Scientific and Industrial Research Organisation (CSIRO) and the Korea Research Institute of Bioscience and Biotechnology. An MoU could be used to implement initiatives such as a virtual mentoring program and long-term in-person exchanges (preferably at least 12 months in duration). Such exchanges would support immersive in-country interaction, enabling the transfer of specialised R&D expertise. Australian researchers could share knowledge about advances in early-stage clinical trials processes, while South Korean researchers could contribute insights into synthetic biology and AI tools in drug-discovery clinical-trial methodologies. Financial support from Australia’s National Health and Medical Research Council could facilitate the exchanges.2 There remains a need to address visa constraints impeding the free flow of researchers between both countries. While this report focuses on R&D, we suggest that there’s equal value in considering cooperation in the manufacturing stages of the biotechnologies value chain.
Recommendation 1: Formalise links between Australia’s and South Korea’s key biotechnologies R&D institutions by facilitating long-term people-to-people exchanges aimed at transferring specialised expertise. This includes in areas such as clinical trials, synthetic biology and AI integration in biotechnologies.
Electric batteries
Australian companies should consider the production of battery materials, including lithium hydroxide and precursor cathode active materials (pCAM), through joint ventures with South Korean battery manufacturers. Such ventures would benefit from jointly funded and owned facilities geographically close to requisite critical minerals. Since spodumene is needed for lithium hydroxide and nickel, cobalt and manganese are required for pCAM, Western Australia provides the ideal location for those facilities. Furthermore, BHP’s recent suspension of its Western Australian nickel operations provides an ideal opportunity for a South Korean battery company to purchase those operations— securing nickel sulphate supplies necessary for pCAM manufacturing.3 There’s also the potential for South Korea to invest in cathode active manufacturing (CAM) manufacturing in Australia by taking advantage of the co-location of mining and pCAM operations.
The provision of loans with relatively low interest rates from South Korean Government–owned banks,4 as well as tax credits and energy incentives provided by the Australian Government, would assist in offsetting the relatively high operational costs (including for labour and materials) associated with establishing joint battery-material plants in Australia instead of South Korea.5 Environmental regulations will need careful consideration in assessing such proposals, such as those covering the disposal of by-products. In the case of sodium sulphate, that by-product can be used in fertilisers and even recycled for future use in battery-material manufacturing.6
Recommendation 2: Consider the establishment of facilities in Australia under joint venture arrangements between Australian and South Korean companies to enable expanded production of battery materials (including lithium hydroxide and pCAM).
Space and satellite technologies
Australia and South Korea should establish a government-to-government agreement that would facilitate the launch of South Korean satellites from northern and southern locations in Australia. This would be similar to the Australia–US Technologies Safeguard Agreement. The agreement would increase the ease with which companies from both countries can pursue joint launches by streamlining launch permit application processes, export controls, taxation requirements and environmental regulations. The agreement can establish a robust framework for joint operations and continued R&D in space and satellite technologies while ensuring that both countries protect associated sensitive technologies. Any such agreement should prioritise consultations with community stakeholders to further inclusive decision-making focused on addressing the social and environmental impacts of space launches.7 Engaging with Indigenous landowners to ensure the protection of cultural heritage, sacred sites and traditional land stewardship is particularly key.8
Recommendation 3: Establish a government-to-government agreement similar to the Australia–US Technologies Safeguard Agreement to bolster the ease with which Australian and South Korean companies can conduct joint satellite launches on Australian soil.
Artificial intelligence technologies
Closer collaboration between Standards Australia and the Korea Standards Association in establishing international AI standards will be beneficial. The established positive record of Australian and South Korean stakeholders in relation to international norms and standards relating to critical technologies, and comparative regional strengths, provide a means to ensure that international AI standards continue to evolve in a way that fosters interoperability, innovation, transparency, diversity and security-by-design. One recommended body through which Australian and South Korean stakeholders could coordinate their respective approaches is the international, industry-led multistakeholder joint subcommittee (SC) created by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) known as the ISO/IEC Joint Technical Committee 1 Subcommittee 42 on AI (ISO/IEC JTC 1/SC 42).
Recommendation 4: Coordinate the approach of Standards Australia and the Korea Standards Association in establishing international AI standards in international technology standards bodies, for example, through ISO/IEC JTC 1/SC 42.
J Wong Leung, S Robin, D Cave, ASPI’s two-decade Critical Technology Tracker, ASPI, Canberra, 28 August 2024, online. ↩︎
Austrade, ‘Australia: A go-to destination for clinical trials’. ↩︎
‘Western Australian Nickel to temporarily suspend operations’, BHP, 11 July 2024, online. ↩︎
Government-owned banks in South Korea are currently funding a similar joint venture in the form of the POSCO – Pilbara Minerals lithium hydroxide facility in South Korea. For more information, see A Orlando, ‘POSCO Pilbara Lithium Solution executes US$460 million loan agreement to help fund chemical facility in South Korea’, Mining.com.au, 27 February 2023, online. ↩︎
In particular, the high cost of a joint lithium hydroxide plant in Australia rather than South Korea was the primary reason for the joint POSCO – Pilbara Minerals plant to be built in Gwangyang, South Korea. For more information, see P Kerr, ‘Lithium processing is 40pc cheaper in South Korea, says POSCO’, Australian Financial Review, 22 May 2023, online. ↩︎
M Stevens, ‘Cathode manufacturing: solutions for sodium sulphate’, Worley, 29 May 2024, online. ↩︎
‘Koonibba Test Range launches large commercial rocket’, Asia–Pacific Defence Reporter (APDR), 6 May 2024, online; J Hamilton, A Costigan, ‘Koonibba looks to the future as a rocket launch site, but one elder is concerned about the impact on sacred sites’, ABC News, 11 May 2024, online. ↩︎
M Garrick, ‘Equatorial Launch Australia lodges plans for expansion to 300 hectares for Arnhem Space Centre’, ABC News, 8 November 2023, online. ↩︎
https://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/12/03130029/2024-12-05-15_40_13-Australia-and-South-Korea_-leveraging-the-strategic-potential-of-cooperation-in-banner-1-1.png210420nathanhttp://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/10/16232551/ASPI-CMYK_SVG.svgnathan2024-12-11 06:00:342025-03-13 09:11:50Australia and South Korea: Leveraging the strategic potential of cooperation in critical technologies
The rapid adoption of persuasive technologies—any digital system that shapes users’ attitudes and behaviours by exploiting physiological and cognitive reactions or vulnerabilities—will challenge national security in ways that are difficult to predict. Emerging persuasive technologies such as generative artificial intelligence (AI), ambient technologies and neurotechnology interact with the human mind and body in far more intimate and subconscious ways, and at far greater speed and efficiency, than previous technologies. This presents malign actors with the ability to sway opinions and actions without the conscious autonomy of users.
Regulation is struggling to keep pace. Over the past decade, the swift development and adoption of these technologies have outpaced responses by liberal democracies, highlighting the urgent need for more proactive approaches that prioritise privacy and user autonomy. That means protecting and enhancing the ability of users to make conscious and informed decisions about how they’re interacting with technology and for what purpose.
China’s commercial sector is already a global leader in developing and using persuasive technologies. The Chinese Communist Party (CCP) tightly controls China’s private sector and mandates that Chinese companies—especially technology companies—work towards China’s national-security interests. This presents a risk that the CCP could use persuasive technologies commercially developed in China to pursue illiberal and authoritarian ends, both domestically and abroad, through such means as online influence campaigns, targeted psychological operations, transnational repression, cyber operations and enhanced military capabilities.
ASPI has identified several prominent Chinese companies that already have their persuasive technologies at work for China’s propaganda, military and public-security agencies. They include:
Midu—a language intelligence technology company that provides generative AI tools used by Chinese Government and CCP bureaus to enhance the party-state’s control of public opinion. Those capabilities could also be used for foreign interference (see page 4).
Suishi—a pioneer in neurotechnology that’s developing an online emotion detection and evaluation system to interpret and respond to human emotions in real time. The company is an important partner of Tianjin University’s Haihe Lab (see page 16), which has been highly acclaimed for its research with national-security applications (see page 17).
Goertek—an electronics manufacturer that has achieved global prominence for smart wearables and virtual-reality (VR) devices. This company collaborates on military–civil integration projects with the CCP’s military and security organs and has developed a range of products with dual-use applications, such as drone-piloting training devices (see page 20).
ASPI has further identified case studies of Chinese technology companies, including Silicon Intelligence, OneSight and Mobvoi, that are leading in the development of persuasive technologies spanning generative AI, neurotechnologies and emerging ambient systems. We find that those companies have used such solutions in support of the CCP in diverse ways—including overt and attributable propaganda campaigns, disinformation campaigns targeting foreign audiences, and military–civil fusion projects.
Introduction
Persuasive technologies—or technologies with persuasive characteristics—are tools and systems designed to shape users’ decision-making, attitudes or behaviours by exploiting people’s physiological and cognitive reactions or vulnerabilities.1 Compared to technologies we presently use, persuasive technologies collect more data, analyse more deeply and generate more insights that are more intimately tailored to us as individuals.
With current consumer technologies, influence is achieved through content recommendations that reflect algorithms learning from the choices we consciously make (at least initially). At a certain point, a person’s capacity to choose then becomes constrained because of a restricted information environment that reflects and reinforces their opinions—the so-called echo-chamber effect. With persuasive technologies, influence is achieved through a more direct connection with intimate physiological and emotional reactions. That risks removing human choice from the process entirely and steering choices without an individual’s full awareness. Such technologies won’t just shape what we do: they have the potential to influence who we are.
Many countries and companies are working to harness the power of emerging technologies with persuasive characteristics, such as generative artificial intelligence (AI), wearable devices and brain–computer interfaces, but the People’s Republic of China (PRC) and its technology companies pose a unique challenge. The Chinese party-state combines a rapidly advancing tech industry with a political system and ideology that mandate companies to align with CCP objectives, driving the creation and use of persuasive technologies for political purposes (see ‘How the CCP is using persuasive technologies’, page 21). That synergy enables China to develop cutting-edge innovations while directing their application towards maintaining regime stability domestically, reshaping the international order, challenging democratic values and undermining global human-rights norms.
There’s already extensive research on how the CCP and its military are adopting technology in cognitive warfare to ‘win without fighting’—a strategy to acquire the means to shape adversaries’ psychological states and behaviours (see Appendix 2: Persuasive technologies in China’s ‘cognitive warfare’, page 29).2 Separately, academics have considered the manipulative methods of surveillance capitalism, especially on issues of addiction, child safety and privacy .3 However, there’s limited research on the intersection of those two topics; that is, attempts by the Chinese party-state to exploit commercially available emerging technologies to advance its political objectives. This report is one of the first to explore that intersection.
Chinese technology, advertising and public-relations companies have made substantial advances in harnessing such tools, from mobile push notifications and social-media algorithms to AI-generated content. Many of those companies have achieved global success. Access to the personal data of foreign users is at an all-time high, and Chinese companies are now a fixed staple on the world’s most downloaded mobile apps lists, unlike just five years ago.44 While many persuasive technologies have clear commercial purposes, their potential for political and national-security exploitation—both inside and outside China—is also profound.
This report seeks to break through the ‘Collingridge dilemma’, in which control and understanding of emerging technologies come too late to mitigate the consequences of those technologies.55 The report analyses generative AI, neurotechnologies and immersive technologies and focuses on key advances being made by PRC companies in particular. It examines the national-security implications of persuasive technologies designed and developed in China, and what that means for policymakers and regulators outside China as those technologies continue to roll out globally.
Persuasive-technology capabilities are evolving rapidly, and concepts of and approaches to regulation are struggling to keep pace. The national-security implications of technologies that are designed to drive users towards certain behaviours are becoming apparent. Democratic governments have acted slowly and reactively to those challenges over the past decade. There’s an urgent need for more fit-for-purpose, proactive and adaptive approaches to regulating persuasive technologies. Protecting user autonomy and privacy must sit at the core of those efforts. Looking forward, persuasive technologies are set to become even more sophisticated and pervasive, and the consequences of their use are increasingly difficult to detect. Accordingly, the policy recommendations set out here focus on preparing for and countering the potential malicious use of the next generation of those technologies.
First defined by Brian J Fogg in Persuasive technology: using computers to change what we think and do, Morgan Kaufmann, 2003. ↩︎
See, for example, Nathan Beauchamp-Mustafaga, Chinese next-generation psychological warfare, RAND Corporation, Santa Monica, 1 June 2023, online; Elsa B Kania, ‘Minds at war: China’s pursuit of military advantage through cognitive science and biotechnology’, PRISM, 2019, 8(3):82–101, online; Department of Defense, Annual report to Congress; Military and security developments involving the People’s Republic of China, US Government, 19 October 2023, online. ↩︎
Shoshana Zuboff, The Age of Surveillance Capitalism: the fight for a human future at the new frontier of power, Ingram Publisher Services, 2017. ↩︎
Examples of Chinese-owned apps that are among the most downloaded globally include Tiktok, CapCut (a ByteDance-owned video editor) and the e-commerce platforms Temu and Shein. See David Curry, ‘Most popular apps (2024)’, Business of Apps, 30 January 2024, online. ↩︎
Richard Worthington, ‘The social control of technology by David Collingridge’, American Political Science Review, 1982, 76(1):134–135; David Collingridge, The social control of technology, St Martin’s Press, New York, 1980. ↩︎
https://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2025/03/11125311/Persuasive-technologies-in-China_-implications-for-the-future-of-national-security-banner.png452794markohttp://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/10/16232551/ASPI-CMYK_SVG.svgmarko2024-11-26 12:42:392025-03-13 09:15:00Persuasive technologies in China: Implications for the future of national security
In an increasingly fracturing international system, set to undergo only further strain in the near future, critical minerals are a point of significant international contention. Critical minerals underlie competition across critical civil and defence sectors and promise economic opportunity throughout their supply chain. They are vital to the clean-energy transition with minerals needed for electric vehicle batteries, solar panels, and even wind turbines. Resolving the significant vulnerabilities across critical mineral supply chains is a significant economic and national security challenge.
This report—based on an exclusive, invitation-only discussion at the Darwin Dialogue 2024, a 1.5 Track discussion between the Australian, United States, Japanese and Republic of Korean Governments-makes 11 recommendations for government and industry to develop both the domestic and international critical minerals sector.
This report also assesses the developments in Australia’s critical mineral policy since the inaugural Darwin Dialogue in April 2023, including the flagship Future Made in Australia policy; policy options to unlock new sources of domestic and international capital for the Australian critical minerals sector, and, how to better promote high ESG compliance in the international critical minerals market.
Australia’s natural endowments of critical minerals promise significant economic opportunity. But seizing this opportunity is dependent on teamwork. The Australian Government must work effectively with domestic state and territory governments, as well as close minilateral partners, to resolve the threats facing the critical minerals sector and develop secure and resilient supply chains for ourselves and the international community.
https://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/11/20110804/Darwin-Dialogue-2024-Banner-e1732062137697.png389792markohttp://aspi.s3.ap-southeast-2.amazonaws.com/wp-content/uploads/2024/10/16232551/ASPI-CMYK_SVG.svgmarko2024-11-20 11:13:292025-03-11 14:50:41Darwin Dialogue 2024: Triumph from teamwork