Security Goals for China

Security Goals for China

After China’s Communist Party leadership met, they concluded that China is entering perilous times; therefore, at the forefront of President Xi Jinping’s agenda are national security priorities. This decision was ratified by the Politburo, a council of 25 senior officials.

The Politburo decision cites that “international developments are turbulent and volatile” as China goes through “profound economic and social changes.” Chinese leadership also recognized frequent, overlapping social conflicts as well as security challenges.

Xi’s “The China Dream” strategy outlines efforts to build up a national security apparatus, and he has an intense campaign to extinguish political dissent. Xi also believes that control of the Internet is the key to domestic order.

In lieu of recent military and security force corruption in China, Xi said, “There must be unwavering adnerence to the Chinese Communist Party’s absolute leadership of national security work. Strive to create high-quality, professional, national security forces.”

About the Author

Ginger Hill is Group Social Media Manager.

Featured

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.