Christopher A. McNally, Professor of Political Economy, Chaminade University
Sep 19, 2025
The U.S. and China are locked in a new “Battle for the Commanding Heights,” centered not on ideology but on control of critical technologies such as chips, AI, and robotics. While the United States retains major advantages, China’s hybrid model of state guidance and private entrepreneurship gives it powerful momentum, and America risks losing its edge if it underinvests or misreads the competition.
Fu Ying, Founding Chair of Center for International Security and Strategy, Tsinghua University; China's former Vice Minister of Foreign Affairs
Sep 12, 2025
Maintaining peace and stability in Asia and adjacent regions — fostering friendly and cooperative relations — is essential for China’s own security and prosperity. The focus must be on peace, development and building a community with a shared future.
Xiao Qian, Deputy Director, Center for International Security and Strategy at Tsinghua University
Sep 09, 2025
America’s AI Action Plan reveals the close ideological alignment of the Trump administration with the “tech right,” such as permissionless innovation, anti-woke AI and pro-capital innovation culture.
Eric Harwit, Professor, University of Hawaii Asian Studies Program
Aug 15, 2025
China’s industrial policy, including its “Delete America” initiative and major state investments, has secured dominance in legacy chips and reduced reliance on U.S. technology. While still dependent on American AI chips, Chinese firms like Huawei are quickly developing competitive alternatives, threatening U.S. chipmakers.
Wang Dong, Professor and Executive Director, Institute for Global Cooperation and Understanding, Peking University
Zhang Xueyu, Research Assistant, Center for International Security and Strategy at Tsinghua University
Aug 07, 2025
The country is steering artificial intelligence toward a more balanced, secure and inclusive development path. In doing so, it is contributing to a global development trajectory that is more intelligent, equitable and sustainable.
Han Liqun, Researcher, China Institutes of Contemporary International Relations
Aug 01, 2025
In the high-tech center of the world, technology and capital are moving from merely lobbying Washington to reshaping it, a trend that poses ongoing challenges to the structure of political power in the United States.
Leonardo Dinic, Advisor to the CroAsia Institute
Aug 01, 2025
In July 2025, the U.S. and China released national AI strategies with global aims: the U.S. ties AI exports to political alignment, while China promotes open cooperation with fewer conditions. These contrasting approaches reflect broader political differences and may give China an edge in global AI influence.
Stephen Roach, Senior Fellow, Yale University
Jul 28, 2025
While no one has waved an official checkered flag in the Sino-American race for AI supremacy, the markets are betting that the United States will prevail. The chipmaker Nvidia recently became the world’s first $4 trillion company (and its CEO, Jensen Huang, has acquired global rock-star status). Microsoft, the biggest investor in OpenAI’s for-profit entity, is not far behind, with a valuation of $3.7 trillion.
Zhang Monan, Deputy Director of Institute of American and European Studies, CCIEE
Jul 09, 2025
By equating artificial intelligence data flows with national security risks, the United States has effectively designated China as a presumptive problem. This has not only soured the atmosphere for bilateral AI cooperation but also promises to cast a long shadow over global AI collaboration.
Sheng Zhonghua, Researcher and Postdoctoral Fellow, Centre on Contemporary China and the World, The University of Hong Kong
Jul 04, 2025
Data security governance has become a global priority amid rising competition over data resources, with the U.S., EU, and China adopting distinct models: the U.S. favors a market-driven, security-conscious approach with public-private cooperation; the EU relies on strict regulatory frameworks like the GDPR; and China enforces centralized, party-led oversight. Despite their differences, all three aim to strengthen data security within their respective systems.