China Is Among the World Leaders in ‘Secret’ Military Spending, Report Says

Chinese guards in Tiananmen Square.

Flickr image via Peter Mackey

AA Font size + Print

Chinese guards in Tiananmen Square.

And 'additional, off-the-books spending' could be as high as 50% of China’s official defense expenditure.

China is responsible for 30% of the world’s secretive defense spending, reports Transparency International (TI), a Berlin-based anti-corruption NGO. Secretive spending, defined by TI as “military expenditure where no meaningful details are released either to the public or parliament,” is leading to corruption at home and mistrust in the Asia-Pacific region that could destabilize the area, the organization says.

“No information is available on acquisition planning, and only broad details are disclosed on actual and planned purchases,” TI wrote about China’s defense spending in its Asia-Pacific Government Defense Anti-Corruption Index, adding: “The Chinese public would gain more knowledge about their nation’s defense capabilities through reading foreign press reporting.”

Furthermore, “additional, off-the-books spending” could be as high as 50% of China’s official defense expenditure—or $65 billion, based on China’s declared defense budget last year (paywall)—making it extremely difficult to form an accurate assessment of what China’s military is spending its money on.

TI’s ranking of defense establishments, by least to most corruptible.(Transparency International)

China is one of 11 countries in Asia that TI says has a “high,” “very high,” or “critical” risk of corruption in its ranking of defense “establishments.” Myanmar and Cambodia score the worst.

China’s military expenditure now accounts for 12% of the world’s total, according to the TI report.

As China’s GDP has grown, so has its spending on weapons and military, though it is far outpaced by the US. The below data is from the Stockholm International Peace Research Institute, which has to rely on its own estimates to parse China’s actual military spending:

Meanwhile, China’s military budget as a share of its GDP remains remarkably flat from year to year:

Part of the reason China’s defense spending is so muddy is that the People’s Liberation Army has long been able to generate impressive side revenues by establishing corporations or by commercializing the vast amounts of land entrusted to it.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.