Jump to content

Beijing Wants to Rewrite the Rules of the Internet


tao

Recommended Posts

Xi Jinping wants to wrest control of global cyber governance from the market economies of the west.

 

It’s never been a worse time to be a Chinese telecom company in America. This evening, the Senate is set to vote on whether to restore a ban on U.S. company sales to prominent Chinese telecom player ZTE, a penalty for its illegal shipments to Iran and North Korea. The bill also includes a measure that would ban U.S. government agencies from buying equipment and services made by ZTE and Huawei, one of its competitors, to tackle cyber threats to U.S. supply chains. Meanwhile, a revelation that Huawei was among the companies with whom Facebook had data-sharing agreements, which allowed device makers to access user data and that of their friends, sparked fears that the Chinese government now possesses a treasure trove of sensitive data on U.S. citizens.

 

ZTE and Huawei have become flashpoints in the Trump administration’s confrontation with Beijing over cybersecurity, investment, trade, and technological leadership. All this comes as the administration slapped tariffs on $50 billion in Chinese goods last Friday. But amid the hysteria surrounding these two companies, we may be missing a less obvious but potentially more impactful challenge: China’s ambitions to radically overhaul the internet.

In late April, just days after the Commerce Department announced the denial order against ZTE, Xi Jinping, the president of China, gave a major speech laying out his vision to turn his country into a “cyber superpower.” His speech, along with other statements and policies he has made since assuming power, outlines his government’s ambition not just for independence from foreign technology, but its mission to write the rules for global cyber governance—rules that look very different from those of market economies of the West. This alternative would include technical standards requiring foreign companies to build versions of their products compliant with Chinese standards, and pressure to comply with government surveillance policies. It would require data to be stored on servers in-country and restrict transfer of data outside China without government permission. It would also permit government agencies and critical infrastructure systems to source only from local suppliers.

 

China, in other words, appears to be floating the first competitive alternative to the open internet—a model that it is steadily proliferating around the world. As that model spreads, whether through Beijing’s own efforts or through the model’s inherent appeal for certain developing countries with more similarities to China than the West, we cannot take for granted that the internet will remain a place of free expression where open markets can flourish.

 

China has been open about its intentions to change how the world addresses development. As part of that vision, for over a decade, it has advocated for something its leaders call “cyberspace sovereignty” as a rebuke to established actors in internet governance like the United States, Europe, and Japan.

 

To advance this model, Xi created a powerful government body to centralize cyber policy. In addition to passing a major cybersecurity law, China has pushed through dozens of regulations and technical standards that, in conjunction, bolster the government’s control of and visibility into the entire internet ecosystem, from the infrastructure that undergirds the internet, to the flow of data, to the dissemination of information online, to the make-up of the software and hardware that form the basis of everything from e-commerce to industrial control systems. In a 2016 speech, Xi called for core internet technologies deemed critical to national and economic security to be “secure and controllable”—meaning that the government would have broad discretion, even without specific written regulations, to decide how it protects information networks, devices, and data.

 

China’s cyber governance plan appears to have three objectives. One is a legitimate desire to address substantial cybersecurity challenges, like defending against cyber attacks and keeping stolen personal data off the black market. A second is the impulse to support domestic industry, in order to wean the government off its dependence on foreign technology components for certain IT products deemed essential to economic and national security.

 

(In effect, these requirements exclude foreign participation, or make foreign participation only possible on Beijing’s terms.) The third goal is to expand Beijing’s power to surveil and control the dissemination of economic, social, and political information online.

 

To achieve these objectives, Beijing has instituted standards that force foreign companies to build China-only versions of their products, and to comply with government surveillance policies. Government security audits allow Beijing to open up these companies’ products and review their source code, putting their intellectual property at risk, which was documented comprehensively for the first time last March in a report by the Office of the United States Trade Representative. Article 37 of the cybersecurity law also increases government control over the sort of data that can be transferred out of the country, while unwritten rules reward companies that store data on local servers.

 

Many of these elements serve a dual purpose: supporting domestic industry while further closing off the internet. Freedom House ranks China as “the worst abuser of internet freedom,” noting that its government affiliates “employ hundreds of thousands or even millions of people to monitor, censor, and manipulate online content.” Such policies also effectively exclude foreign content, leaving Chinese providers with uncontested market openings.

 

But Beijing wants not only to prevent the United States from interfering with its domestic cyber policies: It also wants to set the tone for how the rest of the world governs the internet. To exert influence on its partners, it uses direct outreach to foreign governments, as well as massive investments in internet technologies through the Belt and Road Initiative, extensive military-to-military cooperation, and growing participation in international institutions.

 

In 2015, for instance, China selected Tanzania (China is Tanzania’s largest trade partner) as a pilot country for China–Africa capacity-building, giving Beijing substantial influence over Tanzania’s government. China used that influence to foster collaboration around cyberspace governance. Since 2015, Tanzania has passed a cyber-crime law and subsequent restrictions on internet content and blogging activity that parallel China’s content controls. Both have been informed by technical assistance from the Chinese government. At a roundtable in Dar es Salaam sponsored by Beijing, Edwin Ngonyani, Tanzania’s deputy minister for transport and communications, explained, “Our Chinese friends have managed to block such media in their country and replaced them with their homegrown sites that are safe, constructive, and popular.” Among other countries where China invests heavily, Nigeria has adopted measures requiring that consumer data be hosted in Nigeria, while Egypt has pending legislation that would mandate ride-sharing companies to store data in-country while also making it more accessible to authorities. Chinese partners like Ethiopia, Sudan, and Egypt engage in aggressive online content control.

 

Other countries, meanwhile, have adopted only parts of China’s law. Independent of Beijing, Russia has forged a model akin to China’s, embracing an intrusive government role in cyberspace including the most expansive data localization and surveillance regime in the world. Last week Vietnam adopted a cybersecurity law that mirrors China’s. India has imposed some indigenous technical standards, and is considering legislation to enact domestic-sourcing requirements for cybersecurity technologies.

 

China’s model appeals to these countries because it provides them with tools to take control of an open internet. Online platforms used for terrorism and political dissent threaten national stability. The Edward Snowden revelations and crippling cyber attacks like WannaCry and Mirai create a sense of vulnerability that China’s model promises to fix.   

 

The most alluring feature of the China model appears to be content control, as a broad range of China’s neighbors and partners engage in blocking, filtering, and manipulating internet content. Also alluring: its rules for storing data on servers in-country, which can help law enforcement and intelligence officials get access to user information.

 

The problem with China’s model is that it crashes headlong into the foundational principles of the internet in market-based democracies: online freedom, privacy, free international markets, and broad international cooperation. China’s model may also not even be effective in delivering on its promises. For example, government-imposed content-control measures have proven to be poor tools in fighting online extremism. Filtering or removing online content has been compared to a game of “whack-a-mole,” making it ineffective and cost-prohibitive. Such controls also suppress countervailing discourse from key anti-extremism influencers, which have proven to be effective in offering compelling alternative narratives and discrediting extremist ideas.

 

The implications for the strength and resilience of the global internet ecosystem are troubling. China’s control-driven model defies international openness, interoperability, and collaboration, the foundations of global internet governance and, ultimately, of the internet itself. The 21st Century will see a battle of whether it is the China model or the more inclusive, transparent, collaborative principles that underpinned the internet’s rise that come to dominate global cybersecurity governance.

 

< Here >

Link to comment
Share on other sites

  • Replies 7
  • Created
  • Last Reply
1 hour ago, Ballistic Gelatin said:

This has "disaster" written all over it.

Wants and does is two different things. With a trade war that's brewing and stocks plunging all across the world like they are right now its not even a reality  they can't even come  too and agreement over free trade much less agree to china's take on the internet.  People are worried about China  when actually it's Europe/EU that have been rewriting the rules of the internet for a while now and they are the ones who has the power to fine big tech billions of dollars and are voting on censoring the internet like YouTube and Google already does . If Big Tech can't get by  the EUs internet rules without paying billions in fines China don't have a chance of this happening .

 

The left winged liberals are more worried about the state of the internet and there fat paychecks than they are a nuclear war.  If a real war breaks out people will come to understand how silly they was by rioting  away worrying about big tech and silly things like the internet. The left wingers lost touch with reality long ago if war breaks out Google or Facebook  can't save you .

 

If China starts rewriting the internet then worry about it but not until , I'm tried of the media acting like they have ESP and a Crystal Ball . They should be worried stuff that's actully taking place  like the EU already is rewriting the internet. Stuff that not happen yet are not facts yet and if you come back a year latter and look it never happens the way the media reported it.

 

This is reality today

Quote

 currently a handful of companies are amassing all the power, benefiting a very small minority of workers (SV), collecting private information worldwide and providing that information to the US government. It is not even illegal, as Snowden thankfully revealed: US laws do not protect foreign nationals against eavesdropping.

China does what have to do to avoid this from it taking place in there internet space. Now Europe is fighting back because there tired of it and the world is headed toward a closed internet were sites just block other countries.. If you don't have billions of dollars to pay fines or for copyright filters you have no choice but to block the EU. Sites in the USA or doing this now just like China blocks the rest of the world.

Link to comment
Share on other sites

1 hour ago, steven36 said:

they can't even come  too and agreement over free trade

Trade was working okay it seems until a few weeks ago, e.g., Canada/US/Mexico.  What changed?  ;)

1 hour ago, steven36 said:

The left winged liberals are more worried about the state of the internet and there fat paychecks than they are a nuclear war.

  :(

1 hour ago, steven36 said:

the world is headed toward a closed internet were sites just block other countries.

 

1 hour ago, steven36 said:

I'm tired of the media acting like they have ESP and a Crystal Ball

Yes, media is acting like they have it.  But who has it?   ;)

1 hour ago, steven36 said:

 currently a handful of companies are amassing all the power

Yes. Closing this comment with in an agreeable tone.  :drunk:

Link to comment
Share on other sites

Many global investors relish the thought of this becoming a prelude to world war 3 which

will help reduce over populations and increase their hold on most global wealth...

 

Greed is a human disease which has never been cured...:huh:

Link to comment
Share on other sites

From my perspective as an Indian (Asian, not Red !), I don't think it matters whether it is the US/Europe snooping on us or the Chinese doing it !

Somebody is always there snooping on us, even our Govt does it through their Aadhar !

Link to comment
Share on other sites

Governments are not interested in internet freedom just as not intersted in real readio, tv and newspaper freedom. Grede of imposed rules are depending on the "democratic" status of respective countries and available technological capacities. China is serving as the best guideline to other countries for a more totalitarian control of internet, just like they want to control all communication lines

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...