Politics in the De-politicised: TikTok as a Source of China’s Soft Power

Journal of Political Risk, Vol. 9, No. 11, November 2021

By Zuza Nazaruk

TikTok logo. Public domain, via Wikimedia Commons.

Last year’s “TikTok war” revealed unprecedented hostility of the US government towards the Chinese tech newcomer. The seemingly innocuous software was developed by ByteDance, a Chinese unicorn companyTikTok is a sister app of Douyin, created for the Chinese market. Both apps allow users to share and watch short videos. In July 2020, then-President Donald Trump accused TikTok of a series of breaches, the most serious of which was sharing user data with the Chinese Communist Party (CCP) (Levine, 2020). Yet, some experts, including Adam Segal from the Council of Foreign Relations, considered the near-ban a smokescreen to hinder the growth of the most globally successful Chinese app to date (Campbell, 2020). In 2020, TikTok was the most downloaded app globally, with 89 million new users just in the US (Geyser, 2021). To date, 23% of Americans use or have watched TikTok, with an average American user having spent 14.3 hours monthly on the app in 2020 (Tankovska, 2021).

Continue reading

Emerging Market Index: An Interview with Life + Liberty’s Perth Tolle

Journal of Political Risk, Vol.9, No. 11, November 2021

Perth Tolle, the founder of Life + Liberty Indexes and the creator of the Freedom 100 EM Index.

This JPR interview with Perth Tolle, founder of Life + Liberty Indexes and creator of the Freedom 100 EM Index, was conducted via email between 14 September 2021 and the 25 November 2021. 

Corr: Can you please explain what your ETF is for those who have no financial experience?

Tolle: An ETF, or exchange traded fund, is a tradable basket of securities, similar to a mutual fund. But unlike mutual funds, ETFs trade on exchanges, and are known for their transparency, tax efficiency, and lower cost.

Most ETFs track an index. And most indexes are market capitalization weighted – where the biggest companies,  and countries, by their market capitalization, get the biggest allocations in the index.

There are three main categories of country classifications for global stocks – developed markets (DM), emerging markets (EM) and frontier markets (FM). Continue reading

Solving South Africa’s Youth Unemployment Problem: Expand Small Business in the Education Sector

Journal of Political Risk, Vol. 9, No. 10, October 2021

By Stephanie Wild

South Africans and supporters gather outside the South African High Commission in London to support students and protest against police violence. Rachel Megawhat.

The problem of youth unemployment has grown in South Africa for years, but now with the global economy having taken an all-time dip, it has emerged even further at the forefront of South Africans’ minds. Policy geared to expand small business creation in the education sector would be a two-for-one win that keeps on giving.

The crux of the problem

According to Stats SA (2021), in the first quarter of 2021, the official unemployment rate was reported as an astonishingly-high 32.6%. While the number of employed and unemployed South Africans remained rather unchanged from the last quarter of 2020, the number of discouraged work-seekers increased by nearly 7% (Stats SA, 2021). This means that the problem has not necessarily worsened between 2020 and this year. However, it persists and reveals a failure to both ameliorate the problem, and a failure to boost morale that results from the problem. Continue reading

Is The Persecution Of Falun Gong In China Tantamount To Genocide?

Journal of Political Risk, Vol. 9, No. 9, September 2021

By Helen Hintjens, Ph.D.
International Institute of Social Studies in The Hague

Destruction of Falun Gong books during the 1999 China crackdown. Wikimedia/ClearWisdom

“Genocide is a crime for which there has to be proof of a particular hostile state of mind in an individual or in a government body towards a group that qualifies under the Genocide Convention’s or the ICC Statute’s limited set of groups against whom genocide can be committed”.[1]

Since at least 2000, at the behest of Jiang Zemin, President of the PRC from 1993 to 2003, Falun Gong have been labelled a ‘heretical (or deviated) religion’, and its members systematically persecuted through a covert ‘6-10 Office’ group of Chinese government security officers.

In April 2019, the China Organ Harvesting Research Centre issued a report, investigating allegations dating to 2006 that Falun Gong, imprisoned in China on grounds of following an unauthorized religion, were systematically having their organs harvested for use in Chinese medical institutions.  The report concluded that: “the Chinese regime has attempted to systematically annihilate Falun Gong” through such means.[2] Already in 2004, a court case against the Chinese leadership was heard in a Dutch court. The charges were genocide of followers of Falun Gong.[3] The grisly subject-matter of organ harvesting is part and parcel of wider genocide claims, claims that are hardly news any more. The question in this opinion article is not whether Falun Gong members’ organs are being harvested in PRC; of that there is little doubt. The question is rather, is this an example of a state-committed crime of genocide. Continue reading

Third Party Monitors in CFIUS National Security Mitigation Agreements — How to Do it Right

Journal of Political Risk, Vol. 9, No. 7, July 2021

By Randall Cook, Alan Levesque,  and Waqas Shahid

  1. Overview

Figure 1. Source: CFIUS Annual Reports to Congress; Ankura Analysis

This paper describes the role, value proposition, and optimal approach of the independent Third Party Monitor (“TPM”) in National Security Agreements (“NSAs”) between transaction parties and the Committee on Foreign Investment in the United States (“CFIUS”).[1] When effectively scoped and executed, TPMs provide tailored, adaptive mitigation oversight capabilities that are a critical enabler for the dual imperatives of protecting U.S. national security interests and ensuring that U.S. enterprise and innovation continue to have access to the fuel of global capital. The TPMs persistent presence, programmatic monitoring, and deployment of industry-specific technical expertise, among other capabilities, uniquely facilitate verified, real-time, and efficient operationalization of NSA requirements; CFIUS assurance that foreign investment risks to U.S. national security are effectively and proactively mitigated; and transaction parties’ ability to operate a business that is both successful and NSA-compliant. An effective TPM approach is necessarily collaborative and adaptive, enabling a trust-based environment where all NSA stakeholder goals can be achieved through iterative, practical interaction and improvement. Continue reading