1,535
Views
5
CrossRef citations to date
0
Altmetric
Part 2 – Private Force Today: a Global Perspective

China’s private security companies and the protection of Chinese economic interests abroad

ORCID Icon
Pages 173-195 | Received 01 May 2021, Accepted 07 Jun 2021, Published online: 18 Jun 2021
 

ABSTRACT

China’s private security companies (PSCs) have become increasingly active actors in meeting the growing demands of Chinese companies operating in high-risk foreign environments for protection and security of both their assets and employees. While growing rapidly in recent decades, Chinese PSCs are relatively new in providing overseas services, remain constrained by lack of well-trained and fully-equipped personnel, and operate under legal uncertainties. Nonetheless, they perform critically important functions in protecting and promoting Chinese security and economic interests abroad. This article provides a preliminary analysis of Chinese PSCs’ introduction to the overseas markets and assesses their performances against opportunities and challenges.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1. UNCTAD, World Investment Report 2017, 226–32; and World Investment Report 2020, 239.

2. Statista, “Annual FDI Outflow from China, 2010–2020”; and “Capital Stock of Chinese FDI 2009–2019.”

3. McKinsey Global Institute, China and the World, 3.

4. Chatzky and McBride, “China’s Massive Belt and Road Initiative.”

5. Morgan Stanley, “Inside China’s Plan to Create A Modern Silk Road”; and Wang, China Belt and Road Initiative (BRI) Investment Report 2020.

6. Wang, The Belt & Road Initiative, 36; and Zhang, “The Present Situation and Development Trend of the “OBOR” Strategic Initiative.”

7. Devonshire-Ellis, “84% of China’s BRI Investment.”

8. Parello-Plesner & Duchâtel, China’s Strong Arm.

9. Sun and Wu, “Belt and Road: Security and Risk Mitigation, 20.”

10. Yang, “Overcoming Difficulties in Protecting Overseas Interests.”

11. Arduino, “China’s Belt and Road Security.”

12. China Daily, “11 Chinese Workers Killed in N. Afghanistan”; and Spegele, Wonacott, and Bariyo, “China’s Workers Are Targeted as Its Overseas Reach Grows.”

13. Yau, “Chinese Private Security Moves into Central Asia.”

14. Beech, “As More Chinese Fall Victim to Terrorism, Beijing Fumbles for a Response.”

15. Brewster, “The Forces Needed to Protect the Belt and Road”; Nouwens, “China’s Use of Private Companies and Other Actors”; and Shakil, “Meet the Militants.”

16. Zhu, “A Bridge Too Far.”

17. Ministry of Commerce (PRC), Security Management Guideline.

18. Ministry of Public Security (PRC), Security Training Guideline.

19. Erickson and Strange, “China’s Blue Soft “; Cabestan, “China’s Military Base in Djibouti”; and Cho, “China’s Participation in UN Peacekeeping.”

20. Connolly, “Chinese Evacuations and Power Projection (Part 1).”

21. Duchâtel, Bräuner, and Zhou, Protecting China’s Overseas Interests.

22. Zerba, “China’s Libya Evacuation Operation.”

23. Tiezzi, ‘Chinese Nationals Evacuate Yemen on PLA Navy Frigate.’

24. Baum, “The Responsibility of Power”; and Zou and Jones, “China’s Response to Threats.”

25. Boni, “Protecting the Belt and Road Initiative”; and Shakil, “Separatists in Pakistan Target Chinese Developments.”

26. Heath, China’s Pursuit of Overseas Security.

27. Sørensen, “This Is Not Intervention”; and Ghiselli, Protecting China’s Interests Overseas.

28. Yau and Van Der Kley, “The Growth, Adaption and Limitations.”

29. Deng and Sun, “Reflections on Strengthening Construction.”

30. Singer, Corporate Warriors.

31. Avant, The Market for Force.

32. Noortmann and Koning, “The Normative Complexity of Private Security.”

33. Bures and Cusumano, “The Anti-Mercenary Norm.”

34. Cusumano, “Private and Military Security Companies’ Logos.”

35. Prem, “The Regulation of Private Military and Security Companies.”

36. Abrahamsen and Williams, ‘Security Beyond the State.’

37. Ghiselli, “Market Opportunities and Political Responsibilities.”

38. See note 16 above.

39. Trevaskes, “The Private/Public Security Nexus in China.”

40. For a comprehensive overview, see Arduino, China’s Private Army.

41. See note 16 above.

42. Tan, “Enhancing Chinese PSC Capabilities.”

43. Erickson and Collins, “Enter China’s Security Firms”; and Arduino, Security Privatization with Chinese Characteristics.

44. Sun and Wu, “Belt and Road: Security and Risk Mitigation.”

45. Legarda and Nouwens, Guardians of the Belt and Road.

46. Xie, “Chinese Security Companies in Great Demand.”

47. Xing, “Chinese Private Security Companies.”

48. Yau, “Chinese Private Security”; and Yau and Van Der Kley, “The Growth, Adaptation and Limitations.”

49. Sukhankin, “The Security Component of the BRI in Central Asia, Part Three.”

50. Arduino, The Footprint.

51. Laessing and Wee, “29 Chinese Kidnapped Workers Held in Sudan Released.”

52. Erickson and Collins, “Enter China’s Security Firms”; and Aneja, “The Rise of Chinese Private Security Firms.”

53. Spearing, “China’s Private Military and Security Companies.”

54. See note 42 above.

55. Olander, “Q&A: Growing Demand in Africa for China’s Private Security Contractors”; and Nantulya, “Chinese Security Contractors in Africa.”

56. See note 29 above.

57. Arduino, “China’s Private Security Companies.”

58. Yau, “Chinese Private Security.”

59. Han, “Chinese PSCs Should Be Allowed Armed Operations.”

60. Arduino, China’s Private Army.

61. Li, Lin, and Zhang, “Protection of Overseas Interests and Chinese Overseas Security Industry.”

62. Xiao, “Current International PSC Governance and the Protection of Overseas Chinese Interests.”

63. Legarda and Nouwens, Guardians of the Belt and Road; and Zhang, “Firearms-Control Legislation and Policy.”

64. See note 37 above.

65. Belt & Road News, “CPPCC Members.”

66. Layton, “Artificial Intelligence.”

67. Yu and Jiang, “Development Situation.”

68. Chan, “The Soft Power China Needs.”

69. Nantulya, “Chinese Security Contractors in Africa.”

70. See note 44 above.

71. Chan, “Why a Private US Military Firm Is of Value”; and Sputnik, “Blackwater Founder’s Firm to Building “Training Base” in Xinjiang.”

72. Chen, “How China’s Private Sector Helped the Government Fight Coronavirus.”

73. Yan, “Analysis of Private Military Security Company in the Perspective of International Law.”

74. “Statement of the Chinese Delegation.”

75. Information provided by the ICoCA website at: https://icoca.ch/private-security-companies/.

76. See note 36 above.

Additional information

Notes on contributors

Jingdong Yuan

Jingdong Yuan, PhD, is Associate Professor of International Security at the Department of Government and International Relations, University of Sydney, and Associate Senior Fellow at the Stockholm International Peace Research Institute. Dr. Yuan’s research focuses on Indo–Pacific security, Chinese foreign policy, Sino–Indian relations, and nuclear arms control and nonproliferation. He has recently published on cross-Strait relations, Chinese perspectives on multipolarity and regional order in response to the Indo-Pacific concept, and nuclear risk reduction in US-China strategic rivalry in the region. He is the co-author of Chinese Cruise Missiles: A Quiet Force-Multiplier (2014) and China and India: Cooperation or Conflict? (2003), and co-editor of Australia and China at 40 (2012) and Trump’s America and International Relations in the Indo-Pacific (2021). He is currently completing a book manuscript on China-South Asian relations.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 289.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.