Papers by Kenddrick Chan
Kenddrick Chan reviews this geopolitical thriller that envisions how great power conflict will pl... more Kenddrick Chan reviews this geopolitical thriller that envisions how great power conflict will play out in the digital era of the near future
The role of information technology in today’s society has made digital infrastructure a critical ... more The role of information technology in today’s society has made digital infrastructure a critical aspect of geopolitics. Although the private sector has traditionally led such developments, there is increasing evidence that countries are now slowly getting involved. This paper argues that as part of its Digital Silk Road (DSR) initiative, the People’s Republic of China (“China”) is incentivizing private actors, such as Chinese telecommunications firm Huawei, to build digital infrastructure abroad, so as to generate security externalities for China. This is evidenced by our case study involving Huawei’s involvement in Nigeria in the realm of digital infrastructure development, the formulation of digital strategies, and associated standards
Submission to 2021-2025 UN Open-Ended Working Group (OEWG) on security of and in the use of infor... more Submission to 2021-2025 UN Open-Ended Working Group (OEWG) on security of and in the use of information and communications technologies
LSE IDEAS, London School of Economics and Political Science, 2021
The fifth generation of cellular networks (5G) will provide societies with much faster connection... more The fifth generation of cellular networks (5G) will provide societies with much faster connection speeds than existing 3G/4G networks. 5G is also expected to enable new forms of interconnectivity such as machine-to machine communication, which can then power the Internet of Things (IoT), or the transformation of numerous industries, amongst others. Although the infrastructure of networks has traditionally been divided into the “core” and “RAN” (or edge) components, this distinction is increasingly blurred in 5G networks with the amalgamation of the core’s functions into the RAN. The amount of supporting infrastructure required for the rollout of 5G networks will also drastically increase. Additionally, given the economic and connectivity benefits that 5G can also offer, numerous countries are keen to become early adopters and implementors of 5G technology and networks. All of these concerns have led to a range of policy considerations that decision-makers must properly account for. Taking place against the backdrop of great power competition, such policy considerations extend beyond widely-known concerns of infrastructure integrity and network resilience to include questions revolving around global standards-setting influence and gaining strategic advantage.
LSE IDEAS, London School of Economics and Political Science, Jun 1, 2021
Analysis-New Approaches 2nd edition (Routledge 2017) and co-editor of New Directions in Africa-Ch... more Analysis-New Approaches 2nd edition (Routledge 2017) and co-editor of New Directions in Africa-China Studies (Routledge 2019) and China and Africa-building peace and security cooperation on the continent (Palgrave 2017). Kenddrick Chan is an Associate at LSE IDEAS and Project Coordinator of the Digital IR project. His research focuses on the intersection of technology and international relations. He is also an editor at the Studies in Ethnicity and Nationalism journal and a Young Leader with the Pacific Forum.
LSE IDEAS - Working Paper, 2021
The role of information technology in today’s society has made digital infrastructure a critical ... more The role of information technology in today’s society has made digital infrastructure a critical aspect of geopolitics. Although the private sector has traditionally led such developments, there is increasing evidence that countries are now slowly getting involved. This paper argues that as part of its Digital Silk Road (DSR) initiative, the People’s Republic of China (“China”) is incentivizing private actors, such as Chinese telecommunications firm Huawei, to build digital infrastructure abroad, so as to generate security externalities for China. This is evidenced by our case study involving Huawei’s involvement in Nigeria in the realm of digital infrastructure development, the formulation of digital strategies, and associated standards.
LSE IDEAS - Strategic Update, 2021
The COVID-19 outbreak has proved to be a critical turning point for China. Facing increasing glob... more The COVID-19 outbreak has proved to be a critical turning point for China. Facing increasing global criticism over claims that it intentionally misled the world by covering up the true extent of the coronavirus, China has now sought to actively pushback against such criticism. This pushback, termed ‘Wolf Warrior’ diplomacy, has been noted for its propensity to call-out and aggressively hit back against perceived criticism against China. Twitter, the widely used microblogging service, is the platform where this new brand of Chinese diplomacy is most prominent. Data gleamed from the official Twitter accounts of various Chinese embassies and spokespersons reveal that official Chinese Twitter activity has gone into overdrive as a result of the COVID-19 pandemic, indicating China’s desire to influence and shape the debate via its new diplomatic strategy.
LSE IDEAS - Subject Primer, 2021
The fifth generation of cellular networks (5G) will provide societies with much faster connection... more The fifth generation of cellular networks (5G) will provide societies with much faster connection speeds than existing 3G/4G networks. 5G is also expected to enable new forms of interconnectivity such as machine-to machine communication, which can then power the Internet of Things (IoT), or the transformation of numerous industries, amongst others.
Although the infrastructure of networks has traditionally been divided into the “core” and “RAN” (or edge) components, this distinction is increasingly blurred in 5G networks with the amalgamation of the core’s functions into the RAN. The amount of supporting infrastructure required for the rollout of 5G networks will also drastically increase. Additionally, given the economic and connectivity benefits that 5G can also offer, numerous countries are keen to become early adopters and implementors of 5G technology and networks.
All of these concerns have led to a range of policy considerations that decision-makers must properly account for. Taking place against the backdrop of great power competition, such policy considerations extend beyond widely-known concerns of infrastructure integrity and network resilience to include questions revolving around global standards-setting influence and gaining strategic advantage.
Book Reviews by Kenddrick Chan
LSE IDEAS - Book Review
In their recently released book 2034: A Novel of the Next World War, Elliot Ackerman and James St... more In their recently released book 2034: A Novel of the Next World War, Elliot Ackerman and James Stavridis sketch out in detail what great power military conflict in the near-future will look like. Yet beyond being a mere Tom Clancy-style thriller, the book sends a cautionary message to its readers: in today’s digital age, there is a pressing need to find a way to avoid sleepwalking into war.
Conference Presentations by Kenddrick Chan
United Nations Open-Ended Working Group (UN OEWG) on security of and in the use of ICT, 2021-2025, 2022
Submission to 2021-2025 UN Open-Ended Working Group (OEWG) on security of and in the use of infor... more Submission to 2021-2025 UN Open-Ended Working Group (OEWG) on security of and in the use of information and communications technologies.
This paper discusses technical attribution and options to make it more transparent and accessible and how the international community might make incremental improvements regarding the technical attribution process to ensure the stability and security of cyberspace.
Uploads
Papers by Kenddrick Chan
Although the infrastructure of networks has traditionally been divided into the “core” and “RAN” (or edge) components, this distinction is increasingly blurred in 5G networks with the amalgamation of the core’s functions into the RAN. The amount of supporting infrastructure required for the rollout of 5G networks will also drastically increase. Additionally, given the economic and connectivity benefits that 5G can also offer, numerous countries are keen to become early adopters and implementors of 5G technology and networks.
All of these concerns have led to a range of policy considerations that decision-makers must properly account for. Taking place against the backdrop of great power competition, such policy considerations extend beyond widely-known concerns of infrastructure integrity and network resilience to include questions revolving around global standards-setting influence and gaining strategic advantage.
Book Reviews by Kenddrick Chan
Conference Presentations by Kenddrick Chan
This paper discusses technical attribution and options to make it more transparent and accessible and how the international community might make incremental improvements regarding the technical attribution process to ensure the stability and security of cyberspace.
Although the infrastructure of networks has traditionally been divided into the “core” and “RAN” (or edge) components, this distinction is increasingly blurred in 5G networks with the amalgamation of the core’s functions into the RAN. The amount of supporting infrastructure required for the rollout of 5G networks will also drastically increase. Additionally, given the economic and connectivity benefits that 5G can also offer, numerous countries are keen to become early adopters and implementors of 5G technology and networks.
All of these concerns have led to a range of policy considerations that decision-makers must properly account for. Taking place against the backdrop of great power competition, such policy considerations extend beyond widely-known concerns of infrastructure integrity and network resilience to include questions revolving around global standards-setting influence and gaining strategic advantage.
This paper discusses technical attribution and options to make it more transparent and accessible and how the international community might make incremental improvements regarding the technical attribution process to ensure the stability and security of cyberspace.