Skip to main content

From Shadow to Hype

  • Chapter
  • First Online:
China's Private Army

Abstract

The Belt and Road Initiative (BRI) evolving roadmap is filled by flashpoints. As China is becoming the leading world economy there is an increasing call for active participation in stabilization process and security involvement. Free riding from the US security umbrella is over. One answer is the involvement of private security providers. Since the 1990s the re-emergence of private security companies (PSCs) and the private security and military industry has been facilitated by the restructuring of the peace dividends brought by the end of the Cold War. One of the several problems related to PSCs began with the lack of an unambiguous and mutually agreed definition of what a private security firm really is. The Chinese Mainland private security market is starting now to move from an informal and fragmented setting to a more mature sector.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 69.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The International Code of Conduct Association under the omen of the Swiss government established in the 2010, a regulatory framework as part of the Montreux in order to standardize the PMSCs.

  2. 2.

    http://icoca.ch/sites/all/themes/icoca/assets/icoc_chinese3.pdf

  3. 3.

    Beijing Yindun Security Services Co. Ltd., Huawei International Security Services Co. Ltd. and Hua Xin Zhong An Security Services (Beijing).

  4. 4.

    http://icoca.ch/

  5. 5.

    The central government plans budget for 2015 public security amounts to 154.2 billion yuan ($24.6 billion) according to a Finance Ministry report distributed Thursday before the start of the annual session of the National People’s Congress.

  6. 6.

    Regulation on the Administration of Security and Guarding Services, adopted in 2009 via State Council Order No. 564, Article 1. English translation http://www.lawinfochina.com/display.aspx?lib=law&id=7779

  7. 7.

    Ibid. Article 8.

  8. 8.

    Ibid. Article 45.

  9. 9.

    Regulation on the Administration of Use of Guns by Full-time Guards and Escorts Decree adopted in 2002 via No. 356 of the State Council of the People’s Republic of China, English translation http://www.lawinfochina.com/Display.aspx?lib=law&Cgid=40814

  10. 10.

    Australian Department of Foreign Affairs and Trade archives: http://foreignminister.gov.au/releases/2009/fa-s090709.html

  11. 11.

    American Security Company

    founded in 1997 as Blackwater USA, providing security services ranging from training to private military, was renamed Xe Services in 2009 and has been sold and rebranded as Academi in 2011. Subsequently, Academi has been acquired by Constellis Holding also owner of a similar PMC, Triple Canopy.

  12. 12.

    In the year 2007 in Baghdad, 17 Iraqi civilians are shot dead by Blackwater’s contractors covering an armoured convoy. At the end of 2014, the US Federal district court convicted four of the contractors for murder, manslaughter and weapons charges.

  13. 13.

    ‘Baptized in its modern form after the 1991 Gulf War, the hybrid threat construct is a sophisticated amalgam of unrestricted threat activities that have resisted codification and generated a labyrinth of contradictory explanation. The hybrid concept bypasses the cognitive boundaries of traditional threat characterization and the application of organized collective violence’ (Major Brian P. Fleming , U.S. Army 2011).

  14. 14.

    Rupert Smith ‘The Utility of Force . The Art of War in the Modern World’ 2006 Penguin.

  15. 15.

    Interview with Chinese Contractors Association Beijing in November 2015 (disambiguation: the term ‘contractor’ in this association is related to the contractors involved in infrastructure projects and related subcontracting and not exclusively to security contractors).

  16. 16.

    The Chinese army during the 1920s was remarkably well armed and equipped. Bruce Elleman ‘Modern Chinese Warfare, 1795–1989’ Warfare and History Routledge 2001.

  17. 17.

    ‘… from about 500,000 in 1916 to 700,000 a year later. By 1922, when the major war began there were 1.2 million men under arms … in the 1925 this figure had risen to 1.4 million. As the fighting between Nationalists and the Northern Warlords began in earnest in 1926 this figure has risen to 1.6 million and it reached more than 2 million by the end of those campaigns.’ Philip Jowett ‘Chinese Warlord Armies 1911–1930’ (2010) Osprey Publishing.

  18. 18.

    Ibid.

  19. 19.

    Department of Defense United States of America, Annual Report to Congress ‘Military and Security Developments Involving the People’s Republic of China 2016’ April 26, 2016.

  20. 20.

    Ibid.

  21. 21.

    Article 47 of Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I).

  22. 22.

    International Committee of the Red Cross (ICRC). Rule 108. https://ihldatabases.icrc.org/customary-ihl/eng/docs/v1_rul_rule108

  23. 23.

    International Convention against the Recruitment, Use, Financing and Training of Mercenaries art. 1, December 4, 1989, 2163 U.N.T.S. 75; also UN Secretary General Ban Ki-moon’s address to urgently review its use of mercenaries to carry out security and peacekeeping work ahead of the 2013 General Assembly. ‘UN Unions believe this practice is damaging the UN and putting staff at increasing risk, and taking place against the worrying backdrop of an attack on staff employment rights by UN management.’ http://staffcoordinatingcouncil.org/attachments/article/191/UN%20report%20working%20group%20mercenaries.pdf

  24. 24.

    ‘They also seemed to have captured the attention of the wider Chinese populace; one blog post reposted in a Global Times article called by name for the Snow Leopards to be sent to Sudan to rescue a group of 29 kidnapped Chinese.’ https://jamestown.org/program/assessing-chinas-response-options-to-kidnappings-abroad/#sthash.vYSZ3knS.dpuf, see also Global Time ‘Trained and untamed: China’s elite Snow Leopard Commandos’ April 8, 2015. http://www.globaltimes.cn/content/915758.shtml

  25. 25.

    Summary of Chinese PSCs’ CV personnel provided by a Chinese recruiter specialized in providing former Chinese army officers to the Chinese PSCs (Shanghai, December 2016).

  26. 26.

    http://watson.brown.edu/costsofwar/

  27. 27.

    ‘The United States has entered an era of perpetual war. The U.S. military has been at war for 15 straight years with no end in sight, and President Obama will soon have the dubious distinction of being the only American president to have been at war for all eight years of a two-term presidency. The traditional logic of American wars—that the United States would mobilize, fight, win, and end its wars through overwhelming force of arms—no longer seems to apply. Today’s wars can be characterized more as conflicts in the grey zone, ambiguous battles with less-defined shapes and even less-clear outcomes. This increasingly blurred line between peace and war is posing a range of new challenges for the U.S. military, for elected officials, and for the nation as a whole.’ David W. Barno and Nora Bensahel ‘Fighting and winning in the “gray zone”’ May 19, 2015. http://warontherocks.com/2015/05/fighting-and-winning-in-the-gray-zone/

  28. 28.

    ‘The bravoes/bravi were mercenaries engaged by local lords in Italy during the sixteenth and seventeenth century, they use to display flamboyant dress and aggressive behaviours.’ Shanghai, informal discussion with senior European diplomat previously posted in Afghanistan (November 2016).

  29. 29.

    St Petersburg Send Contractors to Syria (November 15, 2013). http://www.interpretermag.com/st-petersburg-sends-contractors-to-syria/

References

  • Abrahamsen, R. 2010. Security Beyond the State: Private Security in International Politics. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Amey, S.H. 2004. The Politics of Contracting. Project On Government Oversight (POGO), June 29. http://www.pogo.org/our-work/reports/2004/gc-rd-20040629.html. Accessed 2015.

  • Andress, C. 2007. Contractor Combatants: Tales of an Imbedded Capitalism. Nashville, TN: Thomas Nelson Publishing.

    Google Scholar 

  • Andrew Ericson, G.C. 2012. Enter China’s Security Firms Chinese Private Security Companies Are Seeing an Opportunity as the U.S. Withdraws Troops from Iraq and Afghanistan. But plenty of Complications Await them. The Diplomat, February 21. http://thediplomat.com/2012/02/ente. Accessed 2015.

  • Avant, D.D. 2005. The Market for Force: The Consequences of Privatizing Security, Cambridge University Press. Cambridge.

    Google Scholar 

  • Boot, M. 2014. More Small Wars. Counterinsurgency Is Here to Stay. Foreign Affairs, Number 6 November/December.

    Google Scholar 

  • Chan, A.B. 2010. Arming the Chinese: The Western Armaments Trade in Warlord China, 1920–28. Vancouver: UBC Press.

    Google Scholar 

  • China Daily. 2004. Eleven Chinese Workers Killed in Afghan Attack. China Daily, June 10. http://www.chinadaily.com.cn/english/doc/2004-06/10/content_338324.htm. Accessed 2016.

  • Elleman, B. 2001. Modern Chinese Warfare, 1795–1989. New York: Routledge.

    Google Scholar 

  • Fairbank, J.K., K.-C. Liu, and D.C. Twitchett. 1980. Late Ch’ing, 1800–1911. Volume 11, Part 2 of The Cambridge History of China Series. Cambridge: Cambridge University Press.

    Google Scholar 

  • Forbes. 2015. Russia to Retaliate if Bank’s Given SWIFT Kick. Forbes, January 27. http://www.forbes.com/sites/kenrapoza/2015/01/27/russia-to-retaliate-if-banks-given-swift-kick/#5350dfa576df. Accessed 2016.

  • Gray, C.H. 1997. Postmodern War. London: Routledge.

    Google Scholar 

  • Gray, C.S. 2009. Chapter 10: Small Wars and Other Savage Violence. Oxford: Oxford University Press.

    Google Scholar 

  • GSA. 2008. Division A: Department of Defense Authorizations. Public Law No: 110–181, January 28. http://www.gsa.gov/portal/mediaId/184487/fileName/National_Defense_Authorization_Act_2008.action. Accessed 2017.

  • Hart, B.H. 1932. The British Way in Warfare. London: Faber.

    Google Scholar 

  • Jowett, P. 2013. China’s Wars: Rousing the Dragon 1894–1949. Oxford: Osprey Publishing.

    Google Scholar 

  • Liu, H. 2010. Leashing the Corporate Dogs of War: The Legal Implications of the Modern Private Military Company. Journal of Conflict & Security Law 15: 167–168.

    Article  Google Scholar 

  • Molly Dunigan, U.P. 2015. The Markets for Force. Privatization of Security Across World Regions. Philadelphia, PA: University of Pennsylvania Press.

    Google Scholar 

  • NATO. 2016. On Deterrence: … After the Fall of the Berlin Wall, a Long Period of Denial of Deterrence Followed. The Alliance Dramatically Downsized Its Forces (Conventional and Nuclear) and Persistently Reduced Defence Spending. NATO Review Magazine. http://www.nato.int/docu/review/2016/Also-in-2016/nato-deterrence-defence-alliance/EN/index.htm?utm_source=twitter&utm_medium=smc

  • Ortiz, C. 2007. The Private Military Company: An Entity at the Center of Overlapping Spheres of Commercial Activity and Responsibility. In Private Military and Security Companies. Chances, Problems, Pitfalls and Prospect, ed. Thomas Jäger and Gerhard Kümmel. Leiben: VS Verlag.

    Google Scholar 

  • Parello-Plesner, J., and M. Duchâtel. 2015. China’s Strong Arm: Protecting Citizens and Assets Abroad. London: Routledge.

    Google Scholar 

  • Pelton, R.Y. 2006. Licensed to Kill, Hired Guns in the War on Terror. New York: Crown.

    Google Scholar 

  • Powell, R.L. 2015. Rise of the Chinese Military Power. Princeton, NJ: Princeton University Press.

    Google Scholar 

  • Prado, J.L. 2016. The Privatisation of War: Mercenaries, Private Militaries and Security Companies (PMSC). Global Research, 9 April 2016 and U.N. Working Group on Mercenaries and Global Research.

    Google Scholar 

  • PTT. 2016. Phoenix International Think Tank. 检索来源: Haiwai anquan guangli baogao (Overseas Security Management Report). http://pit.ifeng.com/event/special/haiwaianquanguanlibaogao/

  • PWC. 2016. Global State of Information Security Survey. PwC Global, October. https://www.pwc.com/sg/en/risk-assurance/assets/gsiss/global-state-of-information-security-survey-2017-sg.pdf

  • Scheimer, M. 2009. Separating Private Military Companies from Illegal Mercenaries in International Law: Proposing an International Convention for Legitimate Military and Security Support the Reflects Customary International Law. American University International Law Review 24 (6): 3.

    Google Scholar 

  • Security & Technology Protection. 2016. Bao An Yu Jishu, July.

    Google Scholar 

  • Shanghai Daily. 2016. Collaboration in Policy-making Urged for the Belt and Road’ Initiative. Shanghai Daily, November 18. Accessed 2016.

    Google Scholar 

  • Singer, P.W. 2003. Corporate Warriors: The Rise of the Private Military Industry. Ithaca: Cornell University press.

    Google Scholar 

  • Smith, R. 2006. The Utility of Force. The Art of War in the Modern World. London: Penguin.

    Google Scholar 

  • Strachan, H. 2013. The Direction of War. Contemporary Strategy in Historical Perspective. New York: Cambridge University Press.

    Book  Google Scholar 

  • ‘The Chinese Army During the 1920s were Remarkably Well Armed and Equipped’ Bruce Elleman ‘Modern Chinese Warfare, 1795–1989’. 2001. Warfare and History Routledge.

    Google Scholar 

  • UNTS. 1989. International Convention Against the Recruitment, Use, Financing and Training of Mercenaries Art. 1. U.N.T.S. Art. 1, December 4.

    Google Scholar 

  • Xenophon. 1998. Xenophon ‘Anabasi’. Trans. by C.L. Brownson in Loeb Xenofon Classical Library Vol. III. Harvard University Press.

    Google Scholar 

  • Xie Wenting ‘Chinese Security Companies in Great Demand as Overseas Investment Surges’ June 23, 2. h. 2016. Chinese Security Companies in Great Demand as Overseas Investment Surges. Global Times, June 23. http://www.globaltimes.cn/content/990161.shtml. Accessed 2016.

  • Xin, L. 2015. Private Security Companies Struggle to go Abroad Due to Legal Restrictions. Global Times, December 23. http://www.globaltimes.cn/content/960208.shtml. Accessed 2016.

  • Xin Hua. 2015. Chinese President Strongly Condemns Mali Hotel Attack. Xin Hua Net, November 21. http://news.xinhuanet.com/english/2015-11/21/c_134840105.htm. Accessed 2016.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Arduino, A. (2018). From Shadow to Hype. In: China's Private Army. Palgrave Pivot, Singapore. https://doi.org/10.1007/978-981-10-7215-4_2

Download citation

Publish with us

Policies and ethics