[Senate Prints 116-47]
[From the U.S. Government Publishing Office]





116th Congress  }                                             {   S. Prt.
                            COMMITTEE PRINT                     
2d Session      }                                             {   116-47
_______________________________________________________________________

                                     

 
        THE NEW BIG BROTHER--CHINA AND DIGITAL AUTHORITARIANISM

                               __________

                        A MINORITY STAFF REPORT

                      PREPARED FOR THE USE OF THE

                     COMMITTEE ON FOREIGN RELATIONS

                          UNITED STATES SENATE

                     One Hundred Sixteenth Congress

                             SECOND SESSION

                             July 21, 2020
                             

                                     
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]




         Printed for the use of the Committee on Foreign Relations
         
         
         
         
                    Available via World Wide Web:
                       http://www.govinfo.gov
                       
                       
                       
                       
                           ______                      


              U.S. GOVERNMENT PUBLISHING OFFICE 
 42-356  PDF           WASHINGTON : 2020                        
                       


                 COMMITTEE ON FOREIGN RELATIONS        

                JAMES E. RISCH, Idaho, Chairman        
MARCO RUBIO, Florida                 ROBERT MENENDEZ, New Jersey
RON JOHNSON, Wisconsin               BENJAMIN L. CARDIN, Maryland
CORY GARDNER, Colorado               JEANNE SHAHEEN, New Hampshire
MITT ROMNEY, Utah                    CHRISTOPHER A. COONS, Delaware
LINDSEY GRAHAM, South Carolina       TOM UDALL, New Mexico
JOHN BARRASSO, Wyoming               CHRISTOPHER MURPHY, Connecticut
ROB PORTMAN, Ohio                    TIM KAINE, Virginia
RAND PAUL, Kentucky                  EDWARD J. MARKEY, Massachusetts
TODD YOUNG, Indiana                  JEFF MERKLEY, Oregon
TED CRUZ, Texas                      CORY A. BOOKER, New Jersey
DAVID PERDUE, Georgia
                  Christopher M. Socha, Staff Director        
               Jessica Lewis, Democratic Staff Director        
                    John Dutton, Chief Clerk        

                              (ii)        




                            C O N T E N T S

                              ----------                              
                                                                   Page

Letter of Transmittal............................................     v

Preface on the Coronavirus.......................................    ix


Executive Summary................................................     1


Chapter 1: Building the Model for Digital Authoritarianism Inside 
  China..........................................................     5

    The Surveillance State: How China Tracks its Citizens........     6

    The Censorship Apparatus: Exploiting and Blocking Digital 
      Content....................................................    13

    The Legal System: China's Implementation of Authoritarian 
      Cyber Laws.................................................    16

    China's Investment in Technologies Predicated on 
      Authoritarian Principles...................................    19


Chapter 2: Exporting Digital Authoritarianism--China on the 
  Global Cyber Stage.............................................    23

    Exporting Technologies and Expanding Digital Authoritarianism    24

        Case Study: Venezuela....................................    29

        Case Study: Central Asia.................................    31

        Case Study: Ecuador......................................    31

        Case Study: Zimbabwe.....................................    33

    A Global Challenge...........................................    33


Chapter 3: Institutionalizing Digital Authoritarianism--China at 
  International Fora.............................................    37

    The United Nations...........................................    38

    World Trade Organization.....................................    40

    World Internet Conference....................................    41

    International Standards-Setting Bodies.......................    43


Chapter 4: Conclusions and Recommendations.......................    47

    Recommendations..............................................    49


 Annex 1: Understanding the Trump Cyberspace Policy..............    53

    National Security Policy Documents...........................    53

    Administration Efforts.......................................    55


Annex 2: The United States and 5G................................    61




                                 (iii)



                         Letter of Transmittal

                              ----------                              

                              United States Senate,
                            Committee on Foreign Relations,
                                     Washington, DC, July 21, 2020.




    Dear Colleagues: The growth and development of the digital 
domain worldwide has fundamentally changed how individuals, 
companies, and nations interact, work, and communicate--and 
with it the structure of global governance. Digitally-enabled 
technologies ranging from the Internet to mobile communications 
to emerging technologies, such as artificial intelligence, are 
accelerating the transmittal and receiving of information, 
enabling greater trade interactions and economic development, 
securing communications for our military and our allies, and 
aiding in the development of even newer, more capable 
technologies, amongst many other benefits. The United States 
has not only played a primary role in developing these new 
technologies, but it has worked to ensure the digital domain 
operates with openness, stability, reliability, 
interoperability, security, and respect for human rights.
    These principles are under threat from authoritarian 
regimes, however, which see the advent of new technologies in a 
far more sinister light: as a means of surveilling and 
controlling populations, stifling the free flow of information, 
ensuring the survival of their governments, and as tools for 
malign influence campaigns worldwide. While multiple 
authoritarian governments have begun to utilize the digital 
domain in this manner, the People's Republic of China is at the 
forefront of developing and expanding a new, different, and 
deeply troubling governance model for the digital domain: 
digital authoritarianism.
    The rise of this new and worrying model of digital 
authoritarianism holds the potential to fundamentally alter the 
character of the digital domain. The People's Republic of China 
is pressing forward--at times with astounding speed and focus--
to build and expand digital authoritarianism through economic, 
political, diplomatic, and coercive means at home and abroad. 
The Chinese Communist Party is fostering digital 
authoritarianism within China's borders by developing an 
intrusive, omnipresent surveillance state that uses emerging 
technologies to track individuals with greater efficiency and 
bolstering its censorship apparatus to ensure information 
considered detrimental to the regime does not reach its 
citizens.




                                  (v)

    The government is shaping a legal system to strengthen the 
Party's manipulation of the tools of digital authoritarianism 
and expending vast sums of money to prop up Chinese companies 
that develop products that enable its authoritarian governance 
model. On the international level, China is exporting digitally 
enabled products and the training and expertise to other 
countries in an attempt to sway other nations to adopt this 
alternative, authoritarian model for the digital domain. As we 
have seem time and time again, with examples ranging from 
Marriott's pull-down menu to the NBA to Zoom's suspension of 
U.S. host accounts, China is seeking to utilize its newfound 
clout to reshape the rules of the road in cyberspace away from 
a free, unfettered, and secure environment to one that 
facilitates the growth of authoritarianism.
    The United States, as the leader of the free world, must 
stand up for the principles and values that animate the 
international community and push back against the expansion of 
digital authoritarianism, using our economic prowess, unmatched 
innovative and scientific spirit, and ability to bring like-
minded countries together. If the United States fails to lead 
the international community in assuring that governance of the 
digital domain is consistent with principles and values that 
benefit all, then it will be China, not the international 
community at large, which will shape the future of the digital 
domain.
    Given the critical importance of this issue for the future 
of global governance--and the clear need for the United States 
to reassert leadership within this space--I directed Senate 
Foreign Relations Committee staffers Michael Schiffer and 
Daniel Ricchetti to conduct a comprehensive study of China's 
effort to build and expand its model for digital 
authoritarianism and lay out recommendations for the U.S. 
government to consider. The report uses primary document 
research, news and subject-matter analysis, and interviews from 
both former government officials and nongovernmental experts. I 
want to thank Doug Levinson, Laura Truitt, Nina Russell, 
Nadhika Ramachandran, Elizabeth Shneider, and the SFRC 
Democratic Staff for their work on this report. I would also 
like to thank Julie Smith, Amy Studdart, and Tommy Ross for 
reviewing this report and the Congressional Research Service 
for their contributions.\1\
---------------------------------------------------------------------------
    \1\ The conclusions of the report do not necessarily reflect the 
views of the Congressional Research Service.
---------------------------------------------------------------------------
    The report's comprehensive analysis of China's digital 
authoritarianism describes how the People's Republic of China 
is successfully developing and implementing its malign 
governance model internally and, increasingly, making inroads 
with other countries to also embrace its new digital doctrine. 
It further illustrates how the expansion of digital 
authoritarianism in China and abroad has drastic consequences 
for U.S. and allied security interests, the promotion of human 
rights, and the future stability of cyberspace. Consequently, 
the report calls for a series of both Congressional and 
Executive actions designed to counter China's efforts to expand 
its model of digital authoritarianism; to strengthen U.S. 
technological innovation; and, to reinvigorate our diplomatic 
endeavors around the globe on digital issues. I believe these 
recommendations are readily available for adoption and 
implementation by both Democrats and Republicans. Without 
bipartisan support and the full backing of the United States 
government, the American people will be far less secure in the 
digital domain in the years ahead, see a further breakdown of 
fundamental human rights, and witness the erosion of a free, 
stable, reliable, and secure digital domain while China's 
digital authoritarianism is allowed to flourish. American 
leadership on these issues has been sorely lacking the past 
three years. It is my sincere hope that this report will serve 
as a useful bipartisan rallying point for my colleagues in 
Congress so that we can work together to arrest the erosion of 
our position and to reassert American leadership and values on 
the world stage.
    Sincerely,


                                           Robert Menendez,
                                                    Ranking Member.

                       Preface on the Coronavirus

                              ----------                              

    When the Senate Foreign Relations Committee Democratic 
Staff was first tasked with drafting this report, a consensus 
was emerging that the January 2018 National Defense Strategy's 
depiction of the ``reemergence of long-term strategic 
competition'' against such great power rivals as Russia and 
China would indeed be the ``central challenge'' to U.S. 
interests and security for the balance of the twenty-first 
century.\2\ The Trump administration's characterization of the 
United States and China entering a ``new era of strategic 
competition'' received broad bipartisan support in the Senate 
as a largely accurate characterization--even if significant 
differences remained about how to structure U.S. national 
security policy accordingly.
---------------------------------------------------------------------------
    \2\ Secretary of Defense James Mattis, Summary of the 2018 National 
Defense Strategy of the United States of America: Sharpening the 
American Military's Competitive Edge, U.S. Department of Defense, Jan. 
2018, at 2.
---------------------------------------------------------------------------
    Moreover, the suites of new and emergent digital 
technologies that are remaking the face of the U.S. and the 
global economies--including 5G infrastructure, social media, 
block-chain, digital surveillance, and genomics and 
biotechnology--are all widely acknowledged as being on the 
cutting edge of this new competition and fundamental for U.S. 
national security in the twenty-first century. Concerns 
regarding these emergent technologies are embedded in questions 
about the different, and competing, governance models for their 
use and control. These differing governance models are shaped 
by the form and nature of democratic and authoritarian states, 
which are continually developing, innovating, and operating in 
the digital space. Areas of competition between democratic and 
authoritarian states therefore encompass concerns about secure 
supply chains, privacy, human rights, standards, and the rules 
of the road for how these technologies would be used by the 
international community, including sharp power practices for 
technologies that shape and negotiate culture, education, and 
the media and are situated at the intersection of diplomacy, 
influence, and technology.
    This report primarily examines how China's repressive 
government is creating a model of digital authoritarianism for 
the digital space and what it is doing to both strengthen the 
model in its own country and expand it internationally. 
However, the onset of the COVID-19 pandemic in December 2019 
has raised a new set of questions about the state and nature of 
security challenges facing the United States in the twenty-
first century, great power competition, and the diffusion and 
distribution of power in the international system. Moreover, 
the COVID-19 pandemic has stimulated




                           (ix)

additional questions about the governance of new and emergent 
digital technologies and the ways in which democratic and 
authoritarian states will seek to use them, for good or ill. 
Due to the fact that research, outside interviews, and the vast 
majority of the drafting of this report occurred before the 
outbreak of COVID-19, this report does not delve into how the 
novel coronavirus is shaping or may shape the future of the 
digital space as it pertains to digital authoritarianism. 
However, the connection between COVID-19 and digital 
authoritarianism is an important subject to examine in the 
future. This preface is intended to signal the significance of 
this topic and provide a brief roadmap for what issues may 
arise moving forward.
    One key issue regarding COVID-19 and the digital space is 
that several democratic states, including South Korea and 
Taiwan, have adopted privacy practices to combat COVID-19 that 
previously were regarded as overbearing, all in the service of 
public health and responsive governance.\3\ Meanwhile, China's 
extensive use of surveillance technologies, both to manage its 
own COVID-19 outbreak and to continue suppressing internal 
dissent and exerting control in Xinjiang and Tibet, has only 
served to exemplify the malign use of these tools in the hands 
of a government that is not answerable to its people. In many 
cases, the underlying technology and platforms used by 
different governments are the same or largely similar; it is 
governance models, political culture, transparency, norms of 
behavior, and the rule of law that separate the public good 
from political oppression. Questions regarding the use of these 
technologies have become only more serious, and the 
implications more clear, in the face of the pandemic.
---------------------------------------------------------------------------
    \3\ Anthony Kuhn, ``South Korea's Tracking Of COVID-19 Patients 
Raises Privacy Concerns,'' NPR, May 2, 2020; Milo Hsieh, ``Coronavirus: 
Under surveillance and confined at home in Taiwan,'' BBC, Mar. 24, 
2020.
---------------------------------------------------------------------------
    Furthermore, these questions are not confined to matters of 
domestic policy. As the COVID-19 pandemic has progressed, an 
intense competition for global influence has emerged, with 
China and Russia seeking to use their digital toolkits to 
exploit the debates over the public health challenges the 
pandemic has created in the United States, Europe, and 
elsewhere. The purpose of controlling such a narrative is to 
make democracy look less attractive than a ``capable'' 
authoritarian model and to use the pandemic to attack the 
fabric of the democratic system itself.
    As the COVID-19 pandemic has all too well illustrated, the 
brave new world of digital technological use and misuse is 
already upon us, and policymakers now need to move quickly to 
determine what sort of people--and what sort of governance--we 
will have in it.


                        Executive Summary

                           ----------                              

    In an era in which rising authoritarianism is working to 
undermine the fabric of democratic institutions globally, the 
Internet and connected technologies represent a continually 
evolving domain that will fundamentally shape the future of 
politics, economics, warfare, and culture. Cyberspace remains 
relatively undefined and open to new rulemaking, 
standardization, and development. The United States has been 
and remains the premier digital innovator on the globe, and as 
such the primary entity capable of shaping the future of the 
digital environment. However, China's rapid rise in key fields, 
investment in new digital technologies, efforts abroad, and 
attempts at dominating international rule-making bodies are 
positioning it to erode the United States' leadership on 
technological issues and reconfigure the standards of the 
domain away from free, democratic values.
    China has the largest number of Internet users on the 
planet, with more than 800 million Chinese citizens connected 
to some form of Internet.\4\ Chinese technology companies such 
as Huawei and ZTE are at the forefront of developing and 
implementing fifth-generation (5G) telecommunications 
infrastructure. Chinese patent publications have surged in 
emerging technology fields such as artificial intelligence 
(AI), machine learning, and deep learning.\5\ China's Belt and 
Road Initiative (BRI) contains an effort ``to create a `digital 
Silk Road' that will allow it to shape the future of the global 
Internet--and reinforce the Chinese Communist Party's 
leadership at home for decades to come.''\6\ These endeavors 
underline that China understands the importance of the digital 
domain to its domestic political stability and economic, 
political, and military rise, and wants to lead the globe in 
shaping the future of the digital world. It further 
demonstrates that China is executing a long-term plan to 
dominate the digital space.
---------------------------------------------------------------------------
    \4\ Francois Godement et al., ``The China Dream Goes Digital: 
Technology in the Age of Xi,'' European Council of Foreign Relations, 
Oct. 25, 2018; ``China has 854 mln internet users: report,'' Xinhua, 
Aug. 30, 2019.
    \5\ World Intellectual Property Organization, WIPO Technology 
Trends 2019: Artificial Intelligence (Geneva: World Intellectual 
Property Organization, 2019), at 32; Louise Lucas & Richard Waters, 
``China and US Compete to Dominate Big Data,'' Financial Times, May 1, 
2018.
    \6\ Stewart M. Patrick & Ashley Feng, ``Belt and Router: China Aims 
for Tighter Internet Controls with Digital Silk Road,'' The 
Internationalist (blog), Council of Foreign Relations, July 2, 2018, 
https://www.cfr.org/blog/belt-and-router-china-aims-tighter-internet-
controls-digital-silk-road; ``Vision and Actions on Jointly Building 
Silk Road Economic Belt and 21st-Century Maritime Silk Road,'' National 
Development and Reform Commission, Ministry of Foreign and Affairs and 
Ministry of Commerce of the People's Republic of China, with State 
Council Authorization, March 2015, https://bit.ly/33aU0vJ.
---------------------------------------------------------------------------
    While China's rise in the digital space is concerning to 
the United States in and of itself, an additional pressing 
issue facing not only the United States but the free world at 
large is how China is influencing and reshaping the Internet in 
its own political image. China's government structure can be 
defined as a repressive, authoritarian regime. In its 2020 
Freedom of the World ratings, Freedom House labeled China as 
``not free'' and described the regime as ``increasingly 
repressive in recent years.''\7\ Despite China's authoritarian 
style of governing, the country's rise as a major economic and 
political player in the international sphere is providing the 
communist regime with increased status among other nations. As 
journalist Richard McGregor notes, China is pushing ``the idea 
that authoritarian political systems are not only legitimate 
but can outperform Western democracies.''\8\ China's growing 
influence on the digital sphere is no different, as it enables 
China to promote an alternative model for the digital domain 
based on state control.
---------------------------------------------------------------------------
    \7\ ``Freedom of the World 2020: China,'' Freedom House, https://
freedomhouse.org/country/china/freedom-world/2020 (last visited May 20, 
2020).
    \8\ Richard McGregor, ``Xi Jinping's Ideological Ambitions,'' The 
Wall Street Journal, Mar. 2, 2018.
---------------------------------------------------------------------------
                              ----------                              


                              Definition:

  Digital Authoritarianism--The use of ICT products and 
        services to surveil, repress, and manipulate domestic 
        and foreign populations.\9\
---------------------------------------------------------------------------
    \9\ See, e.g., Alina Polyakova & Chris Meserole, ``Exporting 
Digital Authoritarianism: The Russian and Chinese Models,'' The 
Brookings Institution, Aug. 2019.
---------------------------------------------------------------------------
                              ----------                              



    This model stands in stark contrast to what the United 
States and its allies espouse: a free and open Internet that 
encourages the free flow of information and commerce in ways 
that advance innovation and market-driven economic growth. 
Increasingly, other foreign nations, including Ecuador, Serbia, 
Zimbabwe, Uzbekistan, Kyrgyzstan, and Pakistan have or are 
looking to acquire Chinese information and communications 
technologies (ICT) and integrate them into their national 
infrastructures, opening up potential opportunities for 
abuse.\10\ China's efforts to advance and proliferate its ICT 
hardware and systems, both in China and overseas, represent not 
only a desire to continually expand its economy, but also a 
push to establish, expand, internationalize, and 
institutionalize a model for digital governance that this 
report describes as ``digital authoritarianism.''\11\
---------------------------------------------------------------------------
    \10\ Paul Mozur et al., ``Made in China, Exported to the World: The 
Surveillance State,'' The New York Times, Apr. 24, 2019; Abdi Latif 
Dahir, ``China is exporting its digital surveillance methods to African 
countries,'' Quartz Africa, Nov. 1, 2018; Yau Tsz Yan, ``China taking 
Big Brother to Central Asia,'' Eurasianet, Sept. 6, 2019, https://
eurasianet.org/china-taking-big-brother-to-central-asia; ``Chinese 
facial recognition tech installed in nations vulnerable to abuse,'' CBS 
News, Oct. 16, 2019; Justin Sherman, ``U.S. Diplomacy Is a Necessary 
Part of Countering China's Digital Authoritarianism,'' Lawfare, Mar. 
17, 2020, https://www.lawfareblog.com/us-diplomacy-necessary-part-
countering-chinas-digital-authoritarianism.
    \11\ Alina Polyakova & Chris Meserole, ``Exporting Digital 
Authoritarianism: The Russian and Chinese Models,'' The Brookings 
Institution, Aug. 2019.
---------------------------------------------------------------------------
    China's rise as a key player in the digital domain that 
uses its influence to promote digital authoritarianism presents 
fundamental security, privacy, and human rights concerns for 
the United States and the international community at large. 
Most troubling, China is working to undermine our democratic 
institutions and values. Due to the fundamental risks 
associated with the rise of China's digital authoritarianism, 
the Senate Foreign Relations Committee (SFRC) Democratic Staff 
examined the subject for the past year in an effort to provide 
a holistic study of the threats posed to the United States, our 
allies, and the international community. As part of its 
analysis, SFRC Democratic Staff reviewed primary source 
materials including reports, studies, and official Chinese 
government releases, as well as news sources, and conducted 
interviews with former U.S. government officials and non-
governmental experts who work in the fields of human rights, 
technology, cybersecurity or China policy.
    The examination conducted by SFRC Democratic Staff offers 
concerning insights about how China is leveraging new 
technologies to assert increased control over its population 
and strengthening its ties with other nations around the globe. 
This report underscores, for example, how China's government 
employs facial recognition technology and big data analysis 
tools to identify, discriminate, incarcerate, and ``re-
educate'' Uyghurs living in Xinjiang, essentially creating a 
police state that flouts basic human rights and civil 
liberties. China is not just using these tools at home; it is 
also working to export its high-tech tools and authoritarian 
principles throughout the globe. While these examples are 
emblematic of the rise of China's digital authoritarianism, the 
fundamental takeaway of this report is that if left unchecked, 
China, not the U.S. and our allies, will write the rules of the 
digital domain, opening the doors for digital authoritarianism 
to govern the Internet and associated technologies.
    This report provides an incisive examination of the key 
aspects of China's digital authoritarianism, the insidious 
nature of its proliferation inside China, the damage it is 
causing around the globe, and proposed legislative solutions 
and other measures the United States could adopt.


    In Chapter 1, the report describes China's internal model 
for digital authoritarianism and how China implements digital 
authoritarianism domestically. The chapter is divided into four 
subsections, with each subsection highlighting a specific 
aspect of China's digital authoritarianism model. The first 
subsection deals with China's ``surveillance state,'' including 
how China utilizes artificial intelligence, facial recognition 
technologies, biometrics, surveillance cameras, and big data 
analytics to profile and categorize individuals quickly, track 
movements, predict activities, and preemptively take action 
against those considered a threat in both the real world and 
online. The second subsection looks into China's digital 
censorship apparatus and the tools that the Chinese government 
uses to control flows of data, such as the use of the ``Great 
Firewall'' to oversee information and block foreign technology 
platforms in China. The third subsection delves into China's 
legal system and how the government is implementing new laws 
that further strengthen the government apparatus that allows 
China's digital authoritarianism to flourish. Lastly, 
subsection four studies China's massive investments in 
companies that develop new technologies that are both 
predicated on and aid China's authoritarian principles.


    Chapter 2 examines how China is exporting its digital 
technologies around the globe as a means of increasing its 
influence in other nations and, more dangerously, expanding the 
technologies and methods used for digital authoritarianism. 
This chapter looks at (1) China's export of underlying digital 
infrastructure technologies and (2) China's global 
proliferation of systems and technologies that run on those 
digital infrastructure technologies, thus advancing China's 
model for social control. Additionally, the chapter provides 
case studies of countries around the globe to demonstrate how 
China is integrating its technologies into these countries and 
how said integration impacts each nation.


    Chapter 3 details China's efforts at strengthening its 
involvement and influence in intergovernmental fora. The 
chapter looks into how China is increasingly using fora such as 
the United Nations (UN), World Trade Organization (WTO), and 
other standards-setting bodies to push a Chinese-centric 
digital domain. China's involvement in these bodies is directly 
impacting the future rules of the road for cyberspace, and at a 
time when the United States seems to be receding from its 
traditional role as leader of the free world, China is filling 
the gap.


    Chapter 4 elucidates the report's conclusions and policy 
recommendations. The recommendations focus on government 
actions, especially by Congress, to address and counter China's 
rise as a technological power and its desire to proliferate its 
model of digital authoritarianism. This section recommends 
legislation that establishes a public-private consortium aimed 
at creating a United States 5G alternative to Chinese 
technologies, legislation which institutes a Digital Rights 
Promotion Fund to help organizations push back against China's 
use and weaponization of mass surveillance, and legislation 
that would found a cyber military service academy. The report 
calls for the President to lead a coalition of countries to 
counter China's digital authoritarianism and push for a free, 
stable, unfettered, and secure digital domain. These 
recommendations stem from the understanding that Congress has a 
special responsibility, as the constitutionally mandated 
lawmaking body of the United States, to develop and institute 
laws that protect against the rise and spread of China and 
digital authoritarianism. Such a role is especially important 
at a time when the executive branch has done little to combat 
digital authoritarianism, leaving the United States, our 
allies, our partners, and the global community at risk from the 
proliferation of digital authoritarianism.


    This report contains two annexes. Annex 1 discusses the 
Trump administration's various cyber efforts and how these 
efforts have been deficient in countering China's continued 
rise as both a global geopolitical player and technological 
rival. Annex 2 provides an explanation of the 5G battle 
occurring between the United States and China. This overview 
highlights how China is attempting to dominate the 5G space and 
the present gaps in U.S. policy regarding this critical issue.



Chapter 1: Building the Model for Digital Authoritarianism Inside China

                              ----------                              

    In his October 18, 2017 opening address to the 19th 
National Congress of the Chinese Communist Party (CCP, or the 
Party), General Secretary of the Communist Party of China and 
President of the People's Republic of China (PRC) Xi Jinping 
articulated a vision for restrictions in the digital domain. In 
the address, Xi stated:


        We will maintain the right tone in public communication 
        . . . We will provide more and better online content 
        and put in place a system for integrated internet 
        management to ensure a clean cyberspace. We will 
        implement the system of responsibility for ideological 
        work . . . distinguish between matters of political 
        principle, issues of understanding and thinking, and 
        academic viewpoints, but we must oppose and resist 
        various erroneous views with a clear stand.\12\
---------------------------------------------------------------------------
    \12\ Xi Jinping, General Secretary of the Chinese Communist Party 
(CCP) and President of the People's Republic of China (PRC), ``Secure a 
Decisive Victory in Building a Moderately Prosperous Society in All 
Respects and Strive for the Great Success of Socialism with Chinese 
Characteristics for a New Era,'' Speech Delivered at the 19th National 
Congress of the Communist Party of China, Oct. 28, 2017, http://
www.xinhuanet.com/english/download/Xi--Jinping's--report--at--19th--
CPC--National--Congress.pdf.


    Xi's statement shows the CCP's broad objective: bolstering 
development of the Internet while mitigating the threats the 
Internet poses to CCP rule. Xi placed particular emphasis on 
the intent to ensure the CCP's control of ideas in cyberspace 
by limiting access to information and ideas that run counter to 
the Party's ideology. The promotion and preservation of CCP 
control of China's own digital domain undergirds the CCP's 
entire digital authoritarianism model. For the CCP to continue 
moving towards its long-term objectives of becoming the 
dominant player in the cyber domain and expanding its influence 
abroad, it must first ensure that it has pacified Chinese 
citizens and purged dissent. In simple terms, China's digital 
authoritarianism starts at home.
    To accomplish this goal, the CCP has developed a unique 
model for digital authoritarianism implemented through a 
combination of technologies, regulations, and policies in four 
areas: (1) surveilling and tracking Chinese citizens, (2) 
exploiting and blocking data and content stored or transmitted 
on the digital domain, (3) implementing authoritarian cyber 
laws, and (4) directing massive investments in new technologies 
to secure the Party's future. The CCP uses these tools in 
concert with one another to shape the Chinese digital domain 
into a repressive, controlled space that stifles dissent, 
controls individual movement, curtails expression, flouts basic 
human rights for Chinese individuals, and helps enable and 
sustain the CCP's authoritarian rule.
The Surveillance State: How China Tracks its Citizens
    The CCP regime has long depended on its ability to track 
and surveil China's population to ensure its survival and 
promulgate its authoritarian rule. The Party has used various 
methods to surveil individuals living in China since the 
inception of the communist regime. Digital tools provide the 
CCP with a range of new options that greatly enhance its 
ability to monitor citizens, turning China into a surveillance 
state. Emerging technologies such as facial recognition, 
biometrics, and other cutting edge tools enable China to 
profile and categorize individuals quickly in massive 
quantities, track movements, and preemptively take action 
against those considered a threat in both the real world and 
online.\13\ The aforementioned technologies are combined with 
repressive regulations and burgeoning, omnipresent monitoring 
tools such as the Social Credit System currently being rolled 
out by the Chinese state.\14\ This combination of technologies, 
tools, and regulations creates a structure where practically 
all citizens are surveilled, and those considered problematic 
to the regime face massive civil and political repression, 
including ``mass arbitrary detention, forced political 
indoctrination, restrictions on movement, and religious 
oppression'' as seen in Xinjiang.\15\
---------------------------------------------------------------------------
    \13\ See, e.g., Paul Mozur, ``One Month, 500,000 Face Scans: How 
China is Using A.I. to Profile a Minority,'' The New York Times, Apr. 
14, 2019; Josh Chin & Clement Burge, ``Twelve Days in Xinjiang: How 
China's Surveillance State Overwhelms Daily Life,'' The Wall Street 
Journal, Dec. 19, 2017.
    \14\ 14 Christina Zhou and Bang Xiao, ``China's Social Credit 
System is pegged to be fully operational by 2020but what will it look 
like?,'' ABC News, Jan. 1, 2020; Hollie Russon Gilman & Daniel Benaim, 
``China's Aggressive Surveillance Technology Will Spread Beyond Its 
Borders,'' New America, Aug. 23, 2018, https://bit.ly/2ISFiSQ; Steve 
Mollman, ``China's new weapon of choice is your face,'' Quartz, Oct. 5, 
2019
    \15\ Maya Wang, China's Algorithms of Repression: Reverse 
Engineering a Xinjiang Police Mass Surveillance App, Human Rights 
Watch, at 1 (May 2019); Steve Mollman, ``China's new weapon of choice 
is your face,'' Quartz, Oct. 5, 2019; Hollie Russon Gilman & Daniel 
Benaim, ``China's Aggressive Surveillance Technology Will Spread Beyond 
Its Borders,'' New America, Aug. 23, 2018, https://bit.ly/2ISFiSQ.
---------------------------------------------------------------------------
    Facial recognition technology is a key tool used by the 
Party to monitor citizens. Chinese authorities combine 
traditional video surveillance with innovative big data 
analytics tools to allow the government to monitor its 1.4 
billion citizens.\16\ China is a world leader in the video 
surveillance industry. For example, two Chinese companies, the 
Hangzhou Hikvision Digital Technology Company (Hikvision) and 
the Zhejiang Dahua Technology Company (Dahua), together control 
one-third of the global market for video surveillance.\17\ 
Companies such as Hikvision and Dahua have aided the buildout 
of an extensive closed-circuit television (CCTV) infrastructure 
in China.\18\ China currently is deploying more than 200 
million cameras throughout the country, and an estimated 560 
million are expected to be installed by 2021.\19\ The cameras 
themselves are useful to Chinese authorities, but the 
integration of cameras with burgeoning artificial intelligence 
(AI) programs, which allows authorities to churn through 
massive amounts of data and identify individuals more rapidly, 
makes the system far more effective and repressive.\20\
---------------------------------------------------------------------------
    \16\ World Bank, ``China,'' https://data.worldbank.org/country/
china (last visited Apr. 28, 2020).
    \17\ Editorial, Konzept: 13 Tipping Points in 2018, Deutsche Bank 
Research (January 2018), at 34, https://bit.ly/2UI0QEf.
    \18\ Danielle Cave et al., ``Mapping more of China's tech giants: 
AI and surveillance,'' Australian Strategic Policy Institute, Nov. 28, 
2019, https://www.aspi.org.au/report/mapping-more-chinas-tech-giants; 
Chris Buckley & Paul Mozur, ``How China Uses High-Tech Surveillance to 
Subdue Minorities,'' The New York Times, May 22, 2019; Ben Dooley, 
``Chinese Firms Cash in on Xinjiang's Growing Police State,'' Agence 
France-Presse, June 27, 2018.
    \19\ Amanda Lentino, ``This Chinese Facial Recognition Start-Up Can 
Identify A Person in Seconds,'' CNBC, May 16, 2019; The Economist, 
``China: Facial Recognition and State Control,'' Oct. 24, 2018, https:/
/www.youtube.com/watch?v=lH2gMNrUuEY (last visited Apr. 28, 2020); 
Thomas Ricker, ``The US, like China, has about one surveillance camera 
for every four people, says report,'' The Verge, Dec. 9, 2019, https://
bit.ly/35LjjGv.
    \20\ Emily Feng, ``How China Is Using Facial Recognition 
Technology,'' NPR, Dec. 16, 2019.
---------------------------------------------------------------------------
    China is quickly emerging as a global leader in integrating 
artificial intelligence and facial biometric data to bolster 
surveillance capabilities. Chinese companies, ranging from 
older industry stalwarts such as Hikvision to newer startups 
like Yitu Technology (Yitu) and Megvii Technology Limited 
(Megvii), are using emerging technologies to analyze vast 
troves of images and information processed by cameras to 
strengthen facial recognition programs.\21\ These programs 
support the underlying capabilities used to develop the 
databases that China's government and public security officials 
draw on to identify and monitor individuals. The databases rely 
on machine learning, a process in which ``engineers feed data 
to artificial intelligence systems to train them to recognize 
patterns or traits.''\22\ The technology, however, is still 
imperfect. Accurate hits on recognizing individual faces depend 
on environmental factors, including lighting and the 
positioning of cameras.\23\
---------------------------------------------------------------------------
    \21\ Australian Strategic Policy Institute, ``Yitu,'' (last visited 
June 5, 2020), https://chinatechmap.aspi.org.au/#/company/yitu; 
Australian Strategic Policy Institute, ``Megvii,'' (last visited June 
5, 2020), https://chinatechmap.aspi.org.au/#/company/megvii; Danielle 
Cave et al., ``Mapping more of China's tech giants: AI and 
surveillance,'' Australian Strategic Policy Institute, Nov. 28, 2019, 
https://www.aspi.org.au/report/mapping-more-chinas-tech-giants.
    \22\ Paul Mozur, ``One Month, 500,000 Face Scans: How China is 
Using A.I. to Profile a Minority,'' The New York Times, Apr. 14, 2019.
    \23\ Id.
---------------------------------------------------------------------------
    Technical flaws have not dissuaded the Chinese government 
from vastly expanding the scope and use of artificial 
intelligence for policing and surveillance, and the 
technology's efficacy continues to improve. The Chinese 
government aims to have a video surveillance network that is 
``omnipresent, fully networked, always working and fully 
controllable'' by 2020.\24\ Chinese government investment in 
these technologies is also slated to continue growing, with one 
expert stating that China's police is preparing to ``spend an 
additional $30 billion in the coming years on techno-enabled 
snooping.''\25\ As China perfects these tools, it will acquire 
even more invasive capabilities for surveilling its people.
---------------------------------------------------------------------------
    \24\ Simon Denyer, ``China's Watchful Eye,'' The Washington Post, 
Jan. 7, 2018.
    \25\ Paul Mozur, ``Inside China's Dystopian Dreams: A.I., Shame and 
Lots of Cameras,'' The New York Times, July 8, 2018.
---------------------------------------------------------------------------
    The CCP further augments its surveillance system with other 
important techniques that amplify surveillance capabilities. 
Chinese officials throughout the country are collecting and 
collating biometric data, such as DNA samples, fingerprints, 
voice samples, and blood types.\26\ In a report on Xinjiang, 
Human Rights Watch (HRW) wrote that collecting this information 
``is part of the government's drive to form a `multi-modal' 
biometric portrait of individuals and to gather ever more data 
about its citizens.''\27\
---------------------------------------------------------------------------
    \26\ Sigal Samuel, ``China is installing a secret surveillance app 
on tourists' phones,'' Vox, July 3, 2019, https://bit.ly/3pJ2SCu; Sui-
Lee Wee, ``China Uses DNA to Track Its People, With the Help of 
American Expertise,'' The New York Times, Feb. 21, 2019; Maya Wang, 
China's Algorithms of Repression: Reverse Engineering a Xinjiang Police 
Mass Surveillance App, Human Rights Watch, at 15 (May 2019); Phoebe 
Zhang, ``China `world's worst' for invasive use of biometric data,'' 
South China Morning Post, Dec. 5, 2019, https://bit.ly/2IXEg7X.
    \27\ Maya Wang, China's Algorithms of Repression: Reverse 
Engineering a Xinjiang Police Mass Surveillance App, Human Rights 
Watch, at 15 (May 2019).
---------------------------------------------------------------------------
    The Chinese government has also extracted vast amounts of 
private data by using technologies to monitor activities and 
communications conducted over the Internet. For example, 
Chinese authorities force specific mobile applications on 
individuals in or entering Xinjiang.\28\ One of these apps, 
Fengcai, downloads ``all your text messages, contacts, call log 
history, calendar entries, and installed apps . . . this 
sensitive data is then sent, unencrypted, to a local 
server.''\29\ Chinese authorities employ Wi-Fi sniffers, which 
collect unique identifying information of networked devices, 
like laptops and smartphones, and can be used to read people's 
emails.\30\ Each of these new technologies and mechanisms, 
whether cutting-edge facial recognition software or a 
smartphone app, offers Chinese authorities useful information 
to help surveil the population. The consequences of China's 
accelerated development of technologies to strengthen the 
surveillance state are dire.
---------------------------------------------------------------------------
    \28\ Sigal Samuel, ``China is Installing a Secret Surveillance App 
on Tourists' Phones,'' Vox, July 3, 2019; Joseph Cox, ``China Is 
Forcing Tourists to Install Text-Stealing Malware at its Border,'' 
Vice, July 2, 2019, https://bit.ly/2ITTPOy.
    \29\ Sigal Samuel, ``China is Installing a Secret Surveillance App 
on Tourists' Phones,'' Vox, July 3, 2019.
    \30\ Charles Rollet, ``In China's Far West, Companies Cash in on 
Surveillance Program that Targets Muslims,'' Foreign Policy, June 13, 
2018; Human Rights Watch, ``Big Data Fuels Crackdown in Minority 
Region,'' February 26, 2018, https://bit.ly/2Krjy1f.
---------------------------------------------------------------------------
    China's authoritarian use of surveillance technology is 
particularly pervasive and intrusive in Xinjiang autonomous 
region in northwest China. Xinjiang is home to 25 million 
people, of which approximately eleven million are Muslim 
Uyghurs.\31\ In this region, China has deployed its 
surveillance apparatus on a massive scale in an effort to track 
the population living there.\32\ While this apparatus affects 
everyone in Xinjiang, it has disproportionately targeted 
Uyghurs and other Muslim minorities. Chinese officials believe 
Uyghurs hold ``extremist and separatist ideas.''\33\ China's 
targeting has led to extreme political and religious repression 
against these groups.\34\
---------------------------------------------------------------------------
    \31\ Michael Hardy, ``In Xinjiang, Tourism Erodes the Last Traces 
of Uyghur Culture,'' Wired, Apr. 4, 2020, https://www.wired.com/story/
xinjiang-uyghur-culture-tourism/; Bryan Wood & Brennan Butler, ``What 
is happening with the Uighurs in China,'' PBS News Hour, Oct. 4, 2019.
    \32\ Lindsay Maizland, ``China's Repression of Uighurs in 
Xinjiang,'' Council on Foreign Relations, updated June 30, 2020, 
https://www.cfr.org/backgrounder/chinas-repression-uighurs-xinjiang; 
U.S. Department of State, ``2018 Report on International Religious 
Freedom: China: Xinjiang,'' May 23, 2019, https://bit.ly/2KroAuF (last 
visited July 10, 2020); Sheena Chestnut Greitens et al., 
``Understanding China's `preventive repression' in Xinjiang,'' The 
Brookings Institution, Mar. 4, 2020.
    \33\ Lindsay Maizland, ``China's Repression of Uighurs in 
Xinjiang,'' Council on Foreign Relations, updated June 30, 2020, 
https://on.cfr.org/348zRak.
    \34\ Id.; U.S. Department of State, ``2018 Report on International 
Religious Freedom: China: Xinjiang,'' May 23, 2019, https://bit.ly/
2KroAuF (last visited July 10, 2020); Sheena Chestnut Greitens et al., 
``Understanding China's `preventive repression' in Xinjiang,'' The 
Brookings Institution, Mar. 4, 2020.
---------------------------------------------------------------------------
    Since 2014, China has promulgated an extensive surveillance 
ecosystem throughout Xinjiang as part of its ``Strike Hard 
Campaign against Violent Terrorism.''\35\ China has placed a 
large amount of surveillance equipment along streets and 
neighborhoods, including at checkpoints in major metropolitan 
zones. Chinese authorities use them primarily to monitor 
Uyghurs.\36\ By combining the cameras with facial recognition 
technology, Chinese authorities can increasingly track Uyghur 
activity down to the individual level.
---------------------------------------------------------------------------
    \35\ Charles Rollet, ``In China's Far West, Companies Cash in on 
Surveillance Program that Targets Muslims,'' Foreign Policy, June 13, 
2018; Jerome Doyon, ``Counter Extremism in Xinjiang: Understanding 
China's Community-Focused Counter-Terrorism Tactics,'' War on the 
Rocks, Jan. 14, 2019, https://bit.ly/2IXCPH0; Maya Wang et al., 
``Eradicating Ideological Viruses'': China's Campaign of Repression 
Against Xinjiang's Muslims, Human Rights Watch, at 4 (Sept. 2018).
    \36\ Chris Buckley et al., ``How China Turned a City into a 
Prison,'' The New York Times, Apr. 4, 2019; Ben Westcott, ``Chinese 
government loads surveillance app onto phones of visitors to Xinjiang: 
report,'' CNN, July 3, 2019.
---------------------------------------------------------------------------
    Omnipresent monitoring has essentially stifled Uyghur 
freedom of movement in the region and eliminated any semblance 
of personal privacy. Simple activities, such as an individual 
tracked by a camera traversing farther than 300 meters from 
designated safe areas (often designated as an individual's home 
or workplace) triggers an alert to police of the individual's 
movement.\37\ At key transit checkpoints, Chinese authorities 
use face scans to determine whether Uyghurs can travel by 
cross-referencing the photo taken at a checkpoint to internal 
databases.\38\
---------------------------------------------------------------------------
    \37\ Adile Ablet & Alim Seytoff, ``Authorities Testing Facial-
Recognition Systems in Uyghur Dominated Xinjiang Region,'' Radio Free 
Asia, Jan. 25, 2018.
    \38\ Darren Byler, ``I researched Uighur society in China for 8 
years and watched how technology opened new opportunities--then became 
a trap,'' The Conversation, Sept. 18, 2019, https://bit.ly/3nCySGo; 
Paul Mozur, ``One Month, 500,000 Face Scans: How China is Using A.I. to 
Profile a Minority,'' The New York Times, Apr. 14, 2019.
---------------------------------------------------------------------------
    Surveillance also negatively affects Uyghurs' ability to 
practice their faith freely. The Agence France-Presse found 
that, in 2018, Hikvision won a contract for its cameras to 
watch 967 mosques in Xinjiang's Moyu county alone, and that 
authorities use these cameras to ``ensure that imams stick to a 
`unified' government script.''\39\
---------------------------------------------------------------------------
    \39\ Ben Dooley, ``Chinese Firms Cash in on Xinjiang's Growing 
Police State,'' Agence France-Presse, June 27, 2018.
---------------------------------------------------------------------------
    In addition to video surveillance, Uyghurs must accept 
other repressive controls that impinge on their basic human 
rights in order to not run afoul of authorities. From 2016 to 
2017, Uyghurs were tricked into providing biometric data to 
authorities as part of a misleading government health program 
in Xinjiang labeled ``Physicals for All.''\40\ Tahir Imin, a 
Muslim who participated in the health check, underscored the 
repressive nature of the supposed health screenings, saying 
that authorities told him he did not have the right to ask 
about the test results after they drew his blood, scanned his 
face, recorded his voice, and took his fingerprints.\41\ The 
forced acquisition of Mr. Imin's physical and genetic data 
underlines China's desire to scoop new data from those living 
in Xinjiang and file it for future use.
---------------------------------------------------------------------------
    \40\ Sui-Lee Wee, ``China Uses DNA to Track Its People, With the 
Help of American Expertise,'' The New York Times, Feb. 21, 2019.
    \41\ Id.
---------------------------------------------------------------------------
    Chinese public security authorities also vigorously monitor 
telecommunications devices used by Uyghurs. Various news 
outlets report that the Chinese government mandates Uyghurs 
install an application on electronic devices that allows the 
government to surveil their online activities, a fundamental 
intrusion on online privacy.\42\ The application, called 
JingWang, is specifically ``built with no safeguards in place 
to protect the private, personally identifying information of 
its users'' and capable of scanning and sending information 
stored on a device to a remote server.\43\ While Chinese 
authorities state that the purpose of the application is to 
detect what authorities deem to be illegal terroristic or 
religious material, Sophie Richardson, the China Director of 
Human Rights Watch, rightly asserts that the application is 
simply a new technical mechanism for gathering vast quantities 
of data on people.\44\ The total effect of these systems is a 
repressive, authoritarian regime designed to deprive Uyghurs 
and other ethnic minorities of their rights, turning cities 
such as Urumqi and Kashgar into veritable prison cities.\45\
---------------------------------------------------------------------------
    \42\ Joseph Cox, ``Chinese Government Forces Residents To Install 
Surveillance App With Awful Security,'' Vice, Apr. 9, 2018, https://
bit.ly/3kN8ecb
    \43\ Id.
    \44\ Joseph Cox, ``Chinese Government Forces Residents To Install 
Surveillance App With Awful Security,'' Vice, Apr. 9, 2019, https://
www.vice.com/en--us/article/ne94dg/jingwang-app-no-encryption-china-
force-install-urumqi-xinjiang; Yi Shu Ng, ``China forces its Muslim 
minority to install spyware on their phones,'' Mashable, July 21, 2017, 
https://mashable.com/2017/07/21/china-spyware-xinjiang/#p2--q.Fw.DOqd.
    \45\ See Chris Buckley et al., ``How China Turned a City into a 
Prison,'' The New York Times, Apr. 4, 2019; Josh Chin & Clement Burge, 
``Twelve Days in Xinjiang: How China's Surveillance State Overwhelms 
Daily Life,'' The Wall Street Journal, Dec. 19, 2017.
---------------------------------------------------------------------------
    The various elements of the surveillance apparatus in 
Xinjiang on their own provide important data to Chinese 
authorities, but it is the centralization and rapid recall of 
the collected data that gives the authoritarian system 
increasing control and power. This ability exists thanks in 
large part to the digital nature of the surveillance system, in 
which masses of data about individuals in Xinjiang are 
collected into central databases and rendered quickly 
retrievable by authorities, allowing them to uncover supposedly 
concerning behavior or respond swiftly to a situation.
    China uses this digital process in Xinjiang, with police 
accessing information located on centralized servers from a 
mobile application.\46\ The Integrated Joint Operations 
Platform (IJOP) is a central system developed by a subsidiary 
of China Electronics Technology Group Corporation (CETC), a 
major state-owned defense technology company in China. It 
integrates information from different ``sources or machine 
sensors,'' such as video surveillance cameras or stolen 
Internet data, into ``a massive dataset of personal 
information, and of police behavior and movements in 
Xinjiang.''\47\
---------------------------------------------------------------------------
    \46\ Maya Wang, China's Algorithms of Repression: Reverse 
Engineering a Xinjiang Police Mass Surveillance App, Human Rights 
Watch, at 21 (May 2019); Human Rights Watch, ``How Mass Surveillance 
Works in Xinjiang, China,'' May 2, 2019, https://bit.ly/2IXsLxV (last 
visited July 10, 2020).
    \47\ Maya Wang, China's Algorithms of Repression: Reverse 
Engineering a Xinjiang Police Mass Surveillance App, Human Rights 
Watch, at 20 (May 2019).
---------------------------------------------------------------------------
    The centralized IJOP database syncs with the IJOP app, 
which authorities can access on a mobile device.\48\ IJOP 
subsequently analyzes the data, although it is important to 
note that the level in which big data analytics plays a role in 
dissecting the data is unknown, and uses them to identify and 
predict patterns of behavior and, when necessary, notify police 
of people whom the data system categorizes as requiring 
investigation or even detention.\49\ The IJOP app is the 
mechanism authorities use to communicate with the central 
information system and supplements the information going into 
the IJOP system, providing what Human Rights Watch (HRW) China 
Senior Researcher Maya Wang describes as ``three broad 
functions: [the app] collects data, reports on suspicious 
activities or circumstances, and prompts investigative 
missions.''\50\ The IJOP sends alerts to police or government 
authorities to investigate suspicious activity, and through the 
app, authorities can send new information back to the IJOP, 
providing even more data to the system.\51\ It is through this 
cyclical, data-driven process that authorities in Xinjiang can 
truly implement digital authoritarianism in the region, as the 
sheer amount of information collected by authorities and the 
ability to understand that information in detail offer the 
Chinese government ``the possibility of real-time, all-
encompassing surveillance'' that flouts basic human rights to 
privacy.\52\
---------------------------------------------------------------------------
    \48\ Human Rights Watch, ``How Mass Surveillance Works in Xinjiang, 
China,'' May 2, 2019, https://bit.ly/2IXsLxV (last visited July 10, 
2020).
    \49\ Maya Wang, China's Algorithms of Repression: Reverse 
Engineering a Xinjiang Police Mass Surveillance App, Human Rights 
Watch, at 1, 19, 21, 22, 29 (May 2019).
    \50\ Nazish Dholakia, Media Desk Officer, Human Rights Watch, 
Interview with Maya Wang, ``Interview: China's `Big Brother' App,'' 
Human Rights Watch, May 1, 2019, https://www.hrw.org/news/2019/05/01/
interview-chinas-big-brother-app.
    \51\ Nazish Dholakia & Maya Wang, ``Interview: China's `Big 
Brother' App--Unprecedented View into Mass Surveillance of Xinjiang's 
Muslims,'' Human Rights Watch, May 1, 2019, https://www.hrw.org/news/
2019/05/01/interview-chinas-big-brother-app.
    \52\ Nazish Dholakia & Maya Wang, ``Interview: China's `Big 
Brother' App--Unprecedented View into Mass Surveillance of Xinjiang's 
Muslims,'' Human Rights Watch, May 1, 2019, https://www.hrw.org/news/
2019/05/01/interview-chinas-big-brother-app; United Nations, UN 
Declaration of Human Rights, United Nations, 3rd Session, (Dec. 10, 
1948), https://www.ohchr.org/EN/UDHR/Documents/UDHR--Translations/
eng.pdf. Article 12 of the UN Declaration of Human Rights states that 
``No one shall be subjected to arbitrary interference with his privacy, 
family, home or correspondence, nor to attacks upon his honour and 
reputation. Everyone has the right to the protection of the law against 
such interference or attacks.'' Id.
---------------------------------------------------------------------------
    The surveillance system in Xinjiang has aided in the 
detention of possibly more than 2 million Uyghurs, ethnic 
Kazakhs, and members of other Muslim groups in Xinjiang, 
according to the U.S. State Department.\53\ Chinese officials 
have labeled these detention facilities as ``vocational skills 
training centers'' to ``deradicalize'' those suspected of 
extremism.\54\ However, these centers are little more than 
arbitrary prison camps designed for political indoctrination. 
Uyghurs and other ethnic minorities imprisoned in internment 
camps are subject to abuse, squalid and unsanitary living 
conditions, lack of sleep and food, and forced political 
indoctrination.\55\ In her account to CNN, Sayragul Sauytbay, a 
former employee at one of the detention facilities in Xinjiang 
who fled to Kazakhstan, recalls a CCP official telling her the 
primary objective of the detention system was to ``turn the 
best of them [Uyghurs and other minorities] into Hans, while 
repressing and destroying the bad.''\56\ Sauytbay further 
describes that she suspected numerous human rights abuses, 
including sexual violence against female inmates and injections 
for non-compliant individuals.\57\ Child separation due to 
forced detentions or exile is also a regular occurrence. 
Researcher Adrian Zenz highlights this separation process, 
writing that ``[a]ccounts of Xinjiang Turkic Muslims in exile, 
including former detainees and their relatives, indicated that 
children as young as 2 years, with both parents in either 
internment or exile, were put into state welfare institutions 
or kept full-time in educational boarding facilities.''\58\ 
These accounts underline how China's surveillance state in 
Xinjiang abets the CCP's overt attempts to forcefully 
assimilate its ethnic minority populations into complying with 
the authoritarian government model proffered by Beijing.
---------------------------------------------------------------------------
    \53\ U.S. Department of State, ``2018 Report on International 
Religious Freedom: China: Xinjiang,'' May 23, 2019. https://bit.ly/
2KroAuF (last visited July 10, 2020).
    \54\ Eva Dou, ``China Acknowledges Re-Education Centers for 
Uighurs,'' The Wall Street Journal, Oct. 10, 2018.
    \55\ Matt Rivers & Lily Lee, ``Former Xinjiang Teacher Claims 
Brainwashing and Abuse Inside Mass Detention Centers,'' CNN, May 9, 
2019.
    \56\ Id.
    \57\ Id.
    \58\ Adrian Zenz, ``Break Their Roots: Evidence for China's Parent-
Child Separation Campaign in Xinjiang,'' The Journal of Political Risk, 
Vol. 7, No. 7 (July 2019), https://bit.ly/39eorVV.
---------------------------------------------------------------------------
    While the authoritarian nature of the Chinese government's 
operations--especially against Uyghurs--in Xinjiang is alarming 
by itself, a second disturbing trend is the fact that China is 
supporting the development and use of technologies that conduct 
surveillance along racial and ethnic lines. Experts cited by 
The New York Times described China's usage of facial 
recognition to track Uyghurs as ``the first known example of a 
government intentionally using artificial intelligence for 
racial profiling.''\59\ China accomplishes racial 
classification by instructing facial recognition AI to 
categorize individuals based on social definitions of race or 
ethnicity.\60\ While Beijing argues that sorting individuals 
via race or ethnicity is necessary to combat terrorism or quell 
``ethnic violence'' in Xinjiang, China's use of emerging 
technologies and big data for racial profiling sets a 
terrifying precedent for how to effectively repress vulnerable 
populations and serves as a potential model for other 
authoritarians around the globe.\61\
---------------------------------------------------------------------------
    \59\ Paul Mozur, ``One Month, 500,000 Face Scans: How China is 
Using A.I. to Profile a Minority,'' The New York Times, Apr. 14, 2019.
    \60\ Id.
    \61\ Id.
---------------------------------------------------------------------------
    In Xinjiang, Chinese government and police authorities 
retain what amounts to near absolute control of the entire ICT 
domain, and, through that control, have been able to repress 
and subjugate Uyghurs and other ethnic minorities in the 
region. It is important to note that, while all of China 
experiences some form of surveillance due to the CCP's 
authoritarian principles, the severity of controls in Xinjiang 
are not yet fully present throughout the rest of China. 
However, Xinjiang is the proving ground for China's digital 
authoritarianism model, and it serves as a clear example of how 
the CCP plans to use the digital domain to maintain and 
strengthen its authoritarian hold over the entire country. This 
plan may start to come into focus as early as 2020, as the 
Chinese government begins to implement a unified Social Credit 
System that captures all 1.4 billion citizens.\62\
---------------------------------------------------------------------------
    \62\ Interview of Georgette Kerr, Vice President of Plurus 
Strategies, Aug. 16, 2019; World Bank, ``China'' https://
data.worldbank.org/country/china (last visited Apr. 28, 2020).
---------------------------------------------------------------------------
    China's Social Credit System is an intrusive tool used by 
all levels of the Chinese government to regulate corporate and 
citizen behavior. Various entities at the local or city level, 
such as police departments or health bureaus, gather swaths of 
behavioral information and data on individuals.\63\ This data, 
which can range from jaywalking to donating blood, is then 
submitted to local databases.\64\ Relevant information 
collected on individuals is also sent to the national level via 
the National Credit Information Sharing Platform (NCISP), in 
which the central government maintains a master database that 
other state agencies can access.\65\ With this information on 
hand and a whole-of-government approach, the Social Credit 
System allows China to more robustly manage individual behavior 
and punish those deemed problematic by placing them on 
blacklists or no-fly lists.\66\ Although presented in a more 
sanitized manner to entire Chinese populace, the Social Credit 
System opens up greater opportunities for the Chinese 
government to oppress all citizens in a manner similar to what 
the people in Xinjiang face, and the rapidity with which the 
government is moving forward in implementing these new 
authoritarian models of surveillance shows how important the 
issue is to the CCP.
---------------------------------------------------------------------------
    \63\ Kendra Schaefer & Ether Yin, Understanding China's Social 
Credit System, Trivium China, at 24 (Sept. 23, 2019), https://bit.ly/
334rADz.
    \64\ Id.
    \65\ Id.at 3, 24.
    \66\ Id.
---------------------------------------------------------------------------
The Censorship Apparatus: Exploiting and Blocking
   Digital Content
    China's burgeoning surveillance state offers CCP 
authorities the ability to observe and maintain social control 
over its citizens and represents a fundamental component of its 
digital authoritarianism model. A second, equally identifiable 
aspect of China's internal digital authoritarianism is the 
CCP's efforts at controlling flows of data. The CCP has spent 
decades building tools, mechanisms, and the infrastructure 
needed to cultivate a system for direct control of the content 
accessed by those in China. China's control over content has 
stunted political movements and silenced public criticism 
domestically by stifling access to a free Internet and 
tailoring CCP propaganda so that it efficiently targets the 
Chinese population.\67\
---------------------------------------------------------------------------
    \67\ See, e.g., Michael Anti, ``Behind the Great Firewall of 
China,'' TedGlobal2012 (video), TED, June 2012, https://bit.ly/332QNhY; 
Kenneth Roth, ``China's Global Threat to Human Rights,'' Human Rights 
Watch Global Report, 2020.
---------------------------------------------------------------------------
    One of the fundamental fears of China's leadership when 
Internet access first arose in China in the 1990s was the 
technology's potential to introduce uncontrolled sources of 
information that could undermine CCP control by providing 
Chinese citizens with greater access to uncensored information 
and easier, more rapid communication.\68\ To combat the 
possibility of the Internet operating as a democratizing force 
in China, China's Ministry of Public Security initiated the 
Golden Shield Project and debuted it in 2000.\69\ Also known as 
the Great Firewall, it is central to the CCP's censorship 
efforts and uses a set of Internet traffic screening tools to 
filter out websites and content deemed inappropriate for 
China's Internet.\70\ These tools span technical mechanisms, 
such as DNS poisoning, blocking the use of virtual private 
networks (VPN), and blocking IP addresses, to more human-based 
oversight, including monitors employed by the Ministry of 
Public Security.\71\ Since its inception, the Great Firewall in 
China has developed into a complex censorship apparatus, 
essentially creating an entirely separate version of the 
Internet.\72\
---------------------------------------------------------------------------
    \68\ See, e.g., Ping Punyakumpol, ``The Great Firewall of China: 
Background,'' Torfox (A Stanford Project), Stanford University, June 1, 
2011, https://cs.stanford.edu/people/eroberts/cs181/projects/2010-11/
FreedomOfInformationChina/the-great-firewall-of-china-background/
index.html; Nina Hachigian, ``China's Cyber-Strategy,'' Foreign Affairs 
(Mar./Apr. 2001).
    \69\ Ping Punyakumpol, ``The Great Firewall of China: Background,'' 
Torfox (A Stanford Project), Stanford University, June 1, 2011.
    \70\ Id.
    \71\ Oliver Farnan et al., ``Poisoning the Well--Exploring the 
Great Firewall's Poisoned DNS Responses,'' WPES '16: Proceedings of the 
2016 ACM on Workshop on Privacy in the Electronic Society, Oct. 2016, 
at 95, https://dl.acm.org/doi/pdf/10.1145/2994620.2994636; Cate Cadell, 
``Amid VPN crackdown, China eyes upgrades to Great Firewall,'' Reuters, 
July 20, 2017; Robert McMahon & Isabella Bennett, ``U.S. Internet 
Providers and the `Great Firewall of China,''' Council on Foreign 
Relations, Feb. 23, 2011; Marty Hu, ``The Great Firewall: a technical 
perspective,'' Torfox (A Stanford Project), Stanford University, May 
30, 2011, https://cs.stanford.edu/people/eroberts/cs181/projects/2010-
11/FreedomOfInformationChina/author/martyhu/index.html.
    \72\ See, e.g., ``China Media Bulletin: 2019 internet freedom 
trends, Shutterstock censorship, Huawei ``safe cities'' (No. 140),'' 
Freedom House, https://freedomhouse.org/report/china-media-bulletin/
2020/china-media-bulletin-2019-internet-freedom-trends-shutterstock 
(last visited July 10, 2020).
---------------------------------------------------------------------------
    More recently, Chinese companies have begun implementing 
emerging technologies, such as AI, to strengthen these 
censorship capabilities further through the automation of its 
monitoring and censorship processes.\73\ China has also 
developed a culture of self-censorship.\74\ The Chinese 
government requires Chinese firms to self-regulate content on 
their servers and platforms. For example, the New York Times 
noted in 2010 that major technology companies such as Baidu 
``employ throngs of so-called Web administrators to screen 
their search engines, chat rooms, blogs and other content for 
material that flouts propaganda directives.''\75\ A Chinese 
state media report said in 2013 that the government then 
employed approximately two million civilians who monitor social 
media and other Internet traffic to prevent social unrest and 
criticism of the government.\76\
---------------------------------------------------------------------------
    \73\ Yuan Yang, ``Artificial intelligence takes jobs from Chinese 
web censors,'' Financial Times, May 22, 2018.
    \74\ Ping Punyakumpol, ``The Great Firewall of China: Background,'' 
Torfox (A Stanford Project), Stanford University, June 1, 2011, https:/
/cs.stanford.edu/people/eroberts/cs181/projects/2010-11/
FreedomOfInformationChina/the-great-firewall-of-china-background/
index.html
    \75\ Michael Wines et al., ``China's Censors Tackle and Trip Over 
the Internet,'' The New York Times, Apr. 7, 2010.
    \76\ Katie Hunt & CY Xu, ``China `employs 2 million to police 
internet,''' CNN, Oct. 7, 2013; Google Translate: ``Internet public 
opinion analyst: It's note about deleting posts,'' Beijing News, Oct. 
3, 2013, http://epaper.bjnews.com.cn/html/2013-10/03/content--
469152.htm?div=-1.
---------------------------------------------------------------------------
    The consequences of China's government enforcing tight 
censorship include (1) a population that is unaware of, or 
unable to acquire, accurate information about its government's 
policies and actions; and (2) continued consolidation of CCP 
rule. The Great Firewall has blocked digital news media content 
created by major international outlets not approved by the 
CCP.\77\ According to Freedom House's analysis of Chinese 
censorship directives, China heavily censors news ranging from 
health and safety to ``taboo subjects'' such as the Cultural 
Revolution and Tiananmen Square.\78\ Freedom House states that 
censorship against international news outlets is so prevalent 
that:
---------------------------------------------------------------------------
    \77\ Gerry Shih, ``China adds Washington Post, Guardian to `Great 
Firewall' blacklist,'' The Washington Post, June 8, 2019.
    \78\ ``Freedom on the Net 2019: China,'' Freedom House, https://
freedomhouse.org/country/china/freedom-net/2019 (last visited May 15, 
2020); Sarah Cook, ``The News China Didn't Want Reported in 2017,'' The 
Diplomat, Jan. 27, 2018.


        Many international news outlets, especially those with 
        Chinese-language websites, are blocked. For example, 
        the New York Times, Reuters, and the Wall Street 
        Journal have been censored for years, while the 
        websites of the Washington Post and the Guardian were 
        newly blocked in June 2019, likely as part of the 
        government's efforts to tighten its grip on the flow of 
        information surrounding the 30th anniversary of the 
        Tiananmen Square crackdown.\79\
---------------------------------------------------------------------------
    \79\ ``Freedom on the Net 2019: China,'' Freedom House, https://
freedomhouse.org/country/china/freedom-net/2019 (last visited May 15, 
2020); Gerry Shih, ``China adds Washington Post, Guardian to `Great 
Firewall' blacklist,'' The Washington Post, June 8, 2019.


    This censorship has aided the CCP's efforts to ensure that 
those living in China only receive information approved by the 
Party, a fundamental aspect of maintaining its status in 
China's public domain.
    U.S. social media platforms such as Facebook, Instagram, 
Twitter, WhatsApp, Pinterest, and YouTube have also been 
blocked entirely from China's servers.\80\ While censorship of 
these platforms has had the intended effect of barring many of 
those living in China from accessing information that would be 
deemed offensive to the Party, this censorship has also 
generated a second critical outcome. Foreign technology 
platforms are restricted from operating in China, allowing 
Chinese platforms that offer similar services to thrive and 
expand into new markets.\81\ Thanks to this market 
inefficiency, China now retains some of the most valuable 
Internet companies in the world by market capitalization, 
including Alibaba, Tencent, and Baidu.\82\ These companies 
essentially provide the panoply of Internet services wanted in 
China. Alibaba offers e-commerce services, and Tencent delivers 
social media, entertainment, and gaming, negating the need for 
other platforms where information flows freely.\83\ The 
consequences of this are a Chinese population that is reliant 
on platforms that further cement the CCP's control of the 
digital domain.
---------------------------------------------------------------------------
    \80\ ``Freedom on the Net 2019: China,'' Freedom House, https://
freedomhouse.org/country/china/freedom-net/2019 (last accessed May 15, 
2020); Sherisse Pham, ``China adds Pinterest to list of banned sites,'' 
CNN, Mar. 17, 2017; GreatFire.Org, ``Censorship of Alexa Top 1000 
Domains in China,'' https://en.greatfire.org/search/alexa-top-1000-
domains (last visited June 26, 2020).
    \81\ See, e.g., Tim Wu, ``China's Online Censorship Stifles Trade, 
Too,'' The New York Times, Feb. 4, 2019.
    \82\ J. Clement, ``Market value of the largest internet companies 
worldwide 2019,'' Statista, June 3, 2020, https://www.statista.com/
statistics/277483/market-value-of-the-largest-internet-companies-
worldwide/; Tim Wu, ``China's Online Censorship Stifles Trade, Too,'' 
The New York Times, Feb. 4, 2019; Simon Denyer, ``China's Scary Lesson 
to the World: Censoring the Internet Works,'' The Washington Post, May 
23, 2016.
    \83\ Australian Strategic Policy Institute, ``Tencent,'' https://
chinatechmap.aspi.org.au/#/company/tencent (last visited June 5, 2020); 
Australian Strategic Policy Institute, ``Alibaba,'' https://
chinatechmap.aspi.org.au/#/company/alibaba (last visited June 5, 2020).
---------------------------------------------------------------------------
    China's censorship extends beyond simply separating China's 
Internet from outside information. China's censors are using 
offensive tools and aggressive tactics that reach far beyond 
scrubbing and blocking data to ensure robust censorship. 
Citizen Lab, an interdisciplinary laboratory based at the 
University of Toronto, asserts that the Chinese government used 
an attack tool, which they label the ``Great Cannon,'' to 
extend the reach of China's censorship.\84\ The Great Cannon, 
while co-located within the Great Firewall, is a ``separate 
offensive system'' that ``hijacks traffic to (or presumably 
from) individual IP addresses, and can arbitrarily replace 
unencrypted content as a man-in-the-middle.''\85\ China used 
the Great Cannon to conduct Distributed Denial of Service 
(DDoS) attacks on servers rented by GreatFire.org, an advocacy 
nonprofit that challenges China's Great Firewall, and GitHub 
pages run by GreatFire.org in 2015.\86\
---------------------------------------------------------------------------
    \84\ Bill Marczak et al., China's Great Cannon, The Citizen Lab, 
Munk School of Global Affairs and Public Policy, University of Toronto 
(Apr. 10, 2015), https://citizenlab.ca/2015/04/chinas-great-cannon/.
    \85\ Id.
    \86\ Id.
---------------------------------------------------------------------------
    China's use of an offensive cyber tool for censorship 
purposes is revelatory because it shows China taking action 
beyond its borders to ensure censorship within its borders. 
China is also cracking down on tools that ordinary Chinese 
citizens use to overcome the Great Firewall, such as virtual 
private networks.\87\ In January 2019, the Financial Times 
showed how China is cracking down on individual use of VPN 
tools. The Financial Times highlighted how a Chinese man, Zhu 
Yunfeng, received a significant fine for accessing foreign 
websites and using the VPN Lantern, as well as how another 
individual, Pan Xidian, received a jail sentence for VPN use 
and composing ``inappropriate'' Twitter posts.\88\ Providers of 
these tools are receiving even stiffer sentences, such as Wu 
Xiangyang, who in 2017 received a five and a half year jail 
sentence and 500,000 yuan fine (approximately $70,650) for 
selling software that circumvented China's Internet censorship 
controls.\89\ The result of these efforts is a censorship 
system that can rely on a variety of continually evolving tools 
to ensure that online and social media users can be targeted if 
they post comments that the government and Party deem 
politically sensitive. Everyday citizens consequently retain 
fewer avenues to acquire non-CCP approved information.
---------------------------------------------------------------------------
    \87\ Cisco, ``What Is a VPN? - Virtual Private Network,'' https://
www.cisco.com/c/en/us/products/security/vpn-endpoint-security-clients/
what-is-vpn.html (last visited June 7, 2019). A virtual private 
network, or VPN, is an encrypted connection over the Internet from a 
device to a network. The encrypted connection helps ensure that 
sensitive data is safely transmitted. It prevents unauthorized people 
from eavesdropping on the traffic and allows the user to conduct work 
remotely. Id.
    \88\ Yuan Yang, ``China Turns Up Heat on Individual Users of 
Foreign Websites,'' Financial Times, Jan. 7, 2019.
    \89\ Benjamin Haas, ``Man in China Sentenced to Five Years' Jail 
for Running VPN,'' The Guardian, Dec. 21, 2017.
---------------------------------------------------------------------------
The Legal System: China's Implementation
   of Authoritarian Cyber Laws
    In a position paper titled ``China's Digital Rise--
Challenges for Europe,'' authors Kristin Shi-Kupfer and Mareike 
Ohlberg of the Mercator Institute for China Studies note that, 
when developing new technologies, an unofficial Chinese 
government slogan is ``first develop, then regulate.''\90\ This 
unofficial slogan demonstrates that the government has 
prioritized the maturation of its emerging digital technologies 
and then, as they are integrated into society, regulates their 
use as needed. With China's continued rise in this domain, the 
Chinese government now is increasingly implementing stringent 
rules and regulations to ensure that the cyber domain remains 
compliant with Party strictures. The regulations China has 
implemented recently expand government control over cyberspace 
at the legal level, making its myriad authoritarian actions to 
quell dissent and promote Chinese propaganda seem lawful.
---------------------------------------------------------------------------
    \90\ Kristin Shi-Kupfer & Mareike Ohlberg, China's Digital Rise: 
Challenges for Europe, Mercator Institute for China Studies, Vol. 7, at 
9 (Apr. 2019), https://www.merics.org/sites/default/files/2019-04/
MPOC--No.7--ChinasDigitalRise--web--3.pdf.
---------------------------------------------------------------------------
    In November 2016, the 24th Session of the Standing 
Committee of the 12th National People's Congress passed the 
Cybersecurity Law of the People's Republic of China, 
fundamentally altering the cyber landscape in China.\91\ Coming 
into effect on June 1, 2017, and enforced by the Cyberspace 
Administration of China (CAC) and other related ministries, the 
law affords government entities broad authority to regulate and 
control the digital environment in China.\92\ In addition to 
the Cybersecurity Law, the Chinese government is layering 
various regulations on top of it to give the law both more 
clarity and teeth.\93\
---------------------------------------------------------------------------
    \91\ IT Advisory KPMG China, ``Overview of China's Cybersecurity 
Law,'' KPMG, Feb. 
2017, at 4, https://assets.kpmg/content/dam/kpmg/cn/pdf/en/2017/02/
overview-of-cybersecurity-law.pdf; Samuel Stolton, ``Chinese 
cybersecurity law is a `loaded weapon,' senior US official says,'' 
Euractiv, Feb. 27, 2019, https://www.euractiv.com/section/
cybersecurity/news/chinese-cybersecurity-law-is-a-loaded-weapon-senior-
us-official-says/.
    \92\ Interview of Georgette Kerr, Vice President of Plurus 
Strategies, Aug. 16, 2019; Samm Sacks, ``China's Cybersecurity Law 
Takes Effect: What to Expect,'' Lawfare, June 1, 2017, https://
www.lawfareblog.com/chinas-cybersecurity-law-takes-effect-what-expect.
    \93\ Samm Sacks, ``China's Cybersecurity Law Takes Effect: What to 
Expect,'' Lawfare, 
June 1, 2017, https://www.lawfareblog.com/chinas-cybersecurity-law-
takes-effect-what-expect; Samm Sacks et al., ``China's Cybersecurity 
Reviews for 'Critical' Systems Add Focus on Supply Chain, Foreign 
Control (Translation),'' New America, May 24, 2019, https://bit.ly/
2HkSaAT.
---------------------------------------------------------------------------
    While the Cybersecurity Law and relevant additional 
regulations put forth a variety of new stipulations on 
individuals and companies, there are a few provisions of the 
law and related regulations that are especially emblematic of 
China's effort at increasing social and political control of 
the digital domain. One of these is the repeated vague 
references in the Cybersecurity Law to national security needs, 
opening individuals and organizations to intrusive and 
potentially abusive reviews of cyber activity.\94\ According to 
Georgette Kerr, a cyber-expert at Plurus Strategies, ``the law 
and associated directives have compelled network operators to 
cooperate with law enforcement in addressing vaguely defined 
threats to national security [and] established intrusive 
national security reviews,'' seen in clauses such as Article 
28.\95\ Article 28 states that ``network operators shall 
provide technical support and assistance to public security 
organs and national security organs that are safeguarding 
national security and investigating criminal activities in 
accordance with the law.''\96\ The law in effect uses national 
security as a legal mechanism to assert its authoritarian 
control over data flows in China in new ways. The law 
additionally affords the government even more dystopian powers 
in special circumstances dictated by the State Council. Under 
Article 58 of the law, authorities can ``take temporary 
measures regarding network communications in a specially 
designated region, such as limiting such communications,'' 
further underscoring how the 2017 law fully empowers the 
Chinese government to control the digital domain anytime the 
government claims such control is necessary.\97\
---------------------------------------------------------------------------
    \94\ Interview of Georgette Kerr, Vice President of Plurus 
Strategies, Aug. 16, 2019.
    \95\ Id.
    \96\ Rogier Creemers et al., ``Translation: Cybersecurity Law of 
the People's Republic of China [Effective June 1, 2017],'' New America, 
June 29, 2019, https://bit.ly/3nFqKVO.
    \97\ Id.
---------------------------------------------------------------------------
    The implementation of the Cybersecurity Law also imposes 
serious controls and restrictions on foreign companies 
operating in China. Jack Wagner, an Asia analyst at PGI 
Intelligence writing in The Diplomat, notes that ``several of 
the provisions . . . have become a cause for concern among 
foreign companies.''\98\ For example, Wagner highlights data 
localization rules in the law, under which foreign companies 
would need to store data on Chinese servers.\99\ Due to data 
localization laws, firms would either need to ``invest in new 
data servers in China which would be subject to government 
spot-checks, or incur new costs to hire a local server 
provider, such as Huawei, Tencent, or Alibaba, which have spent 
billions in recent years establishing domestic data centers as 
part of Beijing's 12th Five-Year Plan (2011-2015).''\100\ 
Neither of these options are positive for companies looking to 
operate in China, as they open up sensitive information to 
intrusive snooping by Chinese authorities.
---------------------------------------------------------------------------
    \98\ Jack Wagner, ``China's Cybersecurity Law: What You Need to 
Know,'' The Diplomat, June 1, 2017.
    \99\ Id.
    \100\ Id.
---------------------------------------------------------------------------
    Another key issue stemming from China's burgeoning legal 
structures pertaining to the digital domain is the continued 
erosion of online anonymity. Samm Sacks and Paul Triolo, 
writing in Lawfare, describe how the CAC added four regulations 
in August and September of 2017 regarding online activity that 
effectively reduce online anonymity. These four regulations are 
1) the Internet Forum Service Management Regulation, 2) the 
Internet Threat Comments Service Management Regulation, 3) the 
Internet User Public Account Information Services Management 
Regulation, and 4) the Management Rules of Internet Group 
Information Services.\101\ The regulations disallow online 
anonymity by requiring ``foreground voluntary name, background 
real name.'' This requirement means that users can choose a 
screen name or appear anonymous, but their actual identity 
information will still be stored with the Ministry of Public 
Security.\102\ Sacks and Triolo note that, by reducing 
anonymity online, Chinese authorities receive more real data to 
add to their burgeoning databases on citizen behavior such as 
the Social Credit System, and by extension, further their 
oversight of the population.\103\ Similarly, in November 2018, 
the government implemented new regulations granting ``the 
Ministry of Public Security (MPS) broad powers over the 
computer networks of companies in China.''\104\ The rule, 
labeled ``Regulations on Internet Security Supervision and 
Inspection by Public Security Organs,'' provides MPS with new 
opportunities to conduct on site and remote site inspections of 
company computers, copy user information, have police backup 
during inspections to ensure company compliance, and monitor 
company adherence to censorship laws.\105\
---------------------------------------------------------------------------
    \101\ Samm Sacks & Paul Triolo, ``Shrinking Anonymity in Chinese 
Cyberspace,'' Lawfare, Sept. 25, 2017, https://www.lawfareblog.com/
shrinking-anonymity-chinese-cyberspace.
    \102\ Id.
    \103\ Id.
    \104\ Insikt Group, ``China's New Cybersecurity Measures Allow 
State Police to Remotely Access Company Systems,'' Recorded Future, 
Feb. 8, 2019, https://www.recordedfuture.com/china-cybersecurity-
measures/.
    \105\ Id.
---------------------------------------------------------------------------
    Although the Chinese government may be reacting to some 
valid cybersecurity concerns in building and growing the legal 
frameworks surrounding cyber activity, it is no accident that 
this framework simultaneously provides legitimacy to China's 
authoritarian actions in the digital domain. As seen above, the 
various laws and regulations implemented by the Chinese 
government provide censors, law enforcement, intelligence 
agencies, and other entities with legal cover to impinge on 
privacy rights and conduct undue searches and seizures of 
information contained or passed in cyberspace. The 
ramifications of the promulgation of China's digital laws 
include the establishment of an Internet governance framework 
that ensures, at the most fundamental level, CCP regime 
survival and operates as a direct contrast to the systems and 
laws promulgated by the U.S. and its allies.
China's Investment in Technologies Predicated
   on Authoritarian Principles
    China's growing promotion of digital authoritarianism has 
coincided with its rise as a technological leader. These 
technologies, as demonstrated above, make surveillance and 
censorship both easier and stronger than ever before for CCP 
authorities. As such, the rise of digital authoritarianism in 
China is facilitated by the continued development of new 
technologies consistent with authoritarian principles. 
Consequently, the CCP continues to emphasize investment and 
innovation in new technologies, which will further strengthen 
its ability to exercise authoritarian rule in China.\106\
---------------------------------------------------------------------------
    \106\ See, e.g., Sophia Yan, ``Chinese surveillance grows stronger 
with technology that can recognise people from how they walk,'' 
Telegraph, Nov. 6, 2018; Statement of William Carter, Deputy Director 
and Fellow, Technology Policy Program, Chinese Advances in Emerging 
Technologies and their Implications for U.S. National Security, Hearing 
before the U.S. House of Representatives Armed Services Committee, Jan. 
9, 2018, at 2, 6.
---------------------------------------------------------------------------
    China's focus on investing in cyber and digital 
technologies comes from the highest echelons of CCP leadership, 
who have advocated new technologies as critical to China's rise 
as a global power. The Made in China 2025 initiative was a 
state-led industrial policy intended ``to make China dominant 
in global high-tech manufacturing'' by using ``government 
subsidies, mobiliz[ing] state-owned enterprises, and pursu[ing] 
intellectual property acquisition to catch up with--and then 
surpass--Western technological prowess in advanced 
industries.''\107\ The policy prioritizes ten major sectors, of 
which one is new information technology.\108\ Made in China 
2025 operated as a ten-year plan driving China's industrial 
development, and its prioritization of the technologies within 
the digital domain accentuates the CCP's desire to strengthen 
Chinese-made ICT products and services. Additionally, China's 
Internet Plus policy, also unveiled in 2015, ``aims to 
capitalize on China's huge online consumer market by building 
up the country's domestic mobile Internet, cloud computing, 
massive amounts of data (big data), and the Internet of Things 
sectors.''\109\
---------------------------------------------------------------------------
    \107\ James McBride & Andrew Chatzky, ``Is `Made in China 2025' a 
Threat to Global Trade?'' Council on Foreign Relations, May 13, 2019. 
See also Emily Crawford, ``Made in China 2025: The Industrial Plan that 
China Doesn't Want Anyone Talking About,'' PBS, May 7, 2019.
    \108\ Press Release, State Council of the People's Republic of 
China, ``Made in China 2025,'' May 19, 2015, https://bit.ly/2Wa6hNf.
    \109\ Meia Nouwens & Helena Legarda, Emerging technology dominance: 
what China's pursuit of advanced dual-use technologies means for the 
future of Europe's economy and defence innovation, China Security 
Project at MERICS and The International Institute for Strategic 
Studies, at 5 (Dec. 2018); Press Release, State Council of the People's 
Republic of China, ``China unveils Internet Plus action plan to fuel 
growth,'' July 4, 2015, http://english.www.gov.cn/policies/latest--
releases/2015/07/04/content--281475140165588.htm.
---------------------------------------------------------------------------
    CCP leaders have also delivered statements further backing 
China's emphasis on developing its cyber capabilities. General 
Secretary Xi, in an October 9, 2016 Politburo meeting on cyber 
and IT issues, asserted that China ``must accelerate the 
advancement of domestic production, indigenous and controllable 
substitution plans, and the building of secure and controllable 
information technology systems.''\110\ Wang Huning, a member of 
the Standing Committee of the Politburo, relayed Xi's stance on 
information technology development in December 2017, saying 
``[CCP] General Secretary Xi Jinping emphasized the need to . . 
. deepen Internet and information technology, build a cyber 
superpower, and advance society through a digital China; and to 
advance Internet, big data, artificial intelligence, and data 
economy, etc.''\111\
---------------------------------------------------------------------------
    \110\ Michael Martina, ``Xi Says China Must Speed Up Plans for 
Domestic Network Technology,'' Reuters, Oct. 9, 2016. See also ``The 
Political Bureau of the Central Committee of the Communist Party of 
China Conducted the 36th Collective Study on the Implementation of the 
Cyber Power Strategy,'' Xinhua News Agency, Oct. 9, 2016, http://
www.gov.cn/xinwen/2016-10/09/content--5116444.htm (translated from 
Chinese).
    \111\ Graham Webster et al., ``Wang Huning's Speech at the 4th 
World Internet Conference in Wuzhen,'' New America, Dec. 13, 2017, 
https://www.newamerica.org/cybersecurity-initiative/digichina/blog/
wang-hunings-speech-4th-world-internet-conference-wuzhen/.
---------------------------------------------------------------------------
    In addition to highlighting China's desire to strengthen 
information technologies, CCP leaders' statements often denote 
the need for sanitizing cyberspace from what the Party believes 
to be toxic content. Chen Yixin, the Secretary-General of the 
CCP's Legal Affairs Commission, highlighted this priority in 
January 2019, stating that a ``small incident can form into a 
vortex of public opinion'' on the Internet.\112\ Zhuang 
Rongwen, Vice Minister of the Central Propaganda Department, 
and Director of the Central Cybersecurity and Informatization 
Office and State Internet Information Office, provided 
additional context to China's desire to control the digital 
domain in September 2018 with the assertion that:
---------------------------------------------------------------------------
    \112\ Chris Buckley, ``2019 Is a Sensitive Year for China. Xi is 
Nervous,'' The New York Times, Feb. 25, 2019.


        The Internet has become a main battlefield, main 
        battleground, and most forward position in propaganda 
        and public opinion work. To grasp leadership authority 
        in online ideological work, we must not only give full 
        rein to the main force role of Party members, cadres, 
        and mainstream media editors, pushing the main forces 
        onto the main battlefield; we must also give full rein 
        to the dominant role of the majority of Internet users, 
        and fight a people's war for the governance of the 
        online environment.\113\
---------------------------------------------------------------------------
    \113\ Rogier Creemers et al., ``Translation: China's New Top 
Internet Official Lays Out Agenda for Party Control Online,'' New 
America, Sept. 24, 2018, https://www.newamerica.org/cybersecurity-
initiative/digichina/blog/translation-chinas-new-top-internet-official-
lays-out-agenda-for-party-control-online/.


    To CCP leadership, the digital domain is a space that must 
be controlled by the Party. As such, development of new 
digitally enabled technologies must operate in line with Party 
principles. Without such control, CCP leaders fear these 
---------------------------------------------------------------------------
technologies could weaken the CCP's hold over its citizens.


    The CCP has implemented industrial policies with massive 
investments in technology and lucrative conditions for Chinese 
firms operating in digital fields. China's research and 
development spending grew by more than 17% each year from 2010 
to 2017 and in 2018 hit a record high of 2.19 percent of 
GDP.\114\
---------------------------------------------------------------------------
    \114\ ``China's spending on R&D rises to historic high,'' Xinhua 
News, Sept. 7, 2019, http://www.xinhuanet.com/english/2019-09/07/c--
138373248.htm; Niall McCarthy, ``China Is Closing The Gap With The U.S. 
In R&D Expenditure,'' Forbes, Jan. 20, 2020; Zhang Jun, ``Will China Be 
the Next Tech Powerhouse? Maybe with the Next 20 Years of Sustained 
Investment,'' South China Morning Post, Aug. 1, 2018, https://
www.scmp.com/comment/insight-opinion/united-states/article/2157728/
will-china-be-next-tech-powerhouse-maybe-next.
---------------------------------------------------------------------------
    These investments have only continued to accelerate. China 
has spent incredible amounts of resources bolstering startups 
working in the surveillance field. The New York Times reported 
that, in May 2018, ``the upstart A.I. company SenseTime raised 
$620 million, giving it a valuation of about $4.5 billion. Yitu 
raised $200 million [in June 2018]. Another rival, Megvii, 
raised $460 million from investors that included a state-backed 
fund created by China's top leadership.''\115\ The European 
Union Chamber of Commerce in China, in its ``China 
Manufacturing 2025'' report, tells a similar story of how China 
is boosting its domestic telecommunications industry. The 
report notes that:
---------------------------------------------------------------------------
    \115\ Paul Mozur, ``Inside China's Dystopian Dreams: A.I., Shame 
and Lots of Cameras,'' The New York Times, July 8, 2018.


        The Chinese Government has used a variety of policy 
        instruments to support the development of its domestic 
        telecommunications equipment industry. One of the most 
        prominent has been the use of catalogues of domestic 
        high-technology products, as well as an equivalent list 
        for exports. Firms whose products are included in these 
        catalogues receive benefits, such as preferential tax 
        rates and low-interest loans from state-owned 
        banks.\116\
---------------------------------------------------------------------------
    \116\ China Manufacturing 2025, European Union Chamber of Commerce 
in China, at 26 (2017), http://docs.dpaq.de/12007-european--chamber--
cm2025-en.pdf.


    China's firms have found that operating in zones that 
promulgate digital authoritarianism in China is an extremely 
profitable business. In Xinjiang, Hikvision received 
approximately $290 million for security related contracts, 
including a ``social prevention and control system'' and a 
program implementing facial-recognition surveillance in and 
around mosques.\117\ Combined with Dahua's own contracts in 
Xinjiang, Hikvision and Dahua have won ``at least $1.2 billion 
in government contracts for 11 separate, large-scale 
surveillance projects across Xinjiang.''\118\ The fact that 
Chinese firms are receiving such strong returns for working in 
fields that fundamentally promote authoritarian rule in China 
highlight Chinese leadership's willingness to invest in 
technologies that enable greater social and digital control.
---------------------------------------------------------------------------
    \117\ Ben Dooley, ``Chinese Firms Cash in on Xinjiang's Growing 
Police State,'' Agence France-Presse, June 27, 2018. See also Chris 
Buckley & Paul Mozur, ``How China Uses High-Tech Surveillance to Subdue 
Minorities,'' The New York Times, May 22, 2019.
    \118\ Charles Rollet, ``In China's Far West, Companies Cash in on 
Surveillance Program that Targets Muslims,'' Foreign Policy, June 13, 
2018.
---------------------------------------------------------------------------
    China's leadership firmly believes that the country is on a 
path towards becoming a global power capable of exerting 
influence practically anywhere, and that a core aspect of 
achieving this goal is dominance in the digital domain. For 
China's government, this dominance starts at home, and its 
current policies and investments underscore the CCP's focus on 
strengthening the domestic base for information technologies.



  Chapter 2: Exporting Digital Authoritarianism--China on the Global 
                              Cyber Stage

                              ----------                              

    China's leadership is increasingly confident that its 
governing model for the digital space represents the future of 
the domain and is doing its best to convince governments around 
the world that this is the case. Digital authoritarianism in 
China is enabling the CCP to impose considerable control over 
its population and the information accessible to those in the 
country, providing the regime with increased security from 
democratizing forces and further opportunities for economic and 
technological growth. As China continues to perfect the tools 
that comprise its model of digital authoritarianism, its 
leaders have become more aware of the geopolitical and economic 
benefits of exporting both the technologies and the methods of 
digital authoritarianism to perpetuate its model of extensive 
censorship and automated surveillance.\119\
---------------------------------------------------------------------------
    \119\ Adrian Shahbaz, Freedom of the Net 2018: The Rise of Digital 
Authoritarianism, Freedom House (Oct. 31, 2018), https://bit.ly/
2IYJkJE.
---------------------------------------------------------------------------
    Chinese leaders are using information and communications 
technology (ICT) and digital media to increase their power 
abroad as well as at home, including by building on the Belt 
and Road Initiative's (BRI) infrastructure, trade, training, 
and investment links between China and more than 60 other 
countries.\120\ At the first BRI forum in May 2017, Chinese 
President Xi Jinping announced that China would integrate big 
data into the multi-billion dollar BRI enterprise to create the 
``digital silk road of the 21st century.''\121\ China has also 
begun to install fiber optic networks across the globe, setting 
the stage to assert its presence in the ICT sector and 
facilitate the export of digital authoritarianism.\122\
---------------------------------------------------------------------------
    \120\ Andrew Chatzky & James McBride, ``China's Massive Belt and 
Road Initiative,'' Council on Foreign Relations, last updated Jan. 28, 
2020, https://www.cfr.org/backgrounder/chinas-massive-belt-and-road-
initiative; Adrian Shahbaz, Freedom of the Net 2018: The Rise of 
Digital Authoritarianism, Freedom House (Oct. 31, 2018), https://
freedomhouse.org/report/freedom-net/2018/rise-digital-authoritarianism.
    \121\ Xi Jinping, CCP General Secretary, Remarks at ``Work Together 
to Build the Silk Road Economic Belt and the 21st Century Maritime Silk 
Road,'' Beijing, May 14, 2017; Andrew Chatzky & James McBride, 
``China's Massive Belt and Road Initiative,'' Council on Foreign 
Relations, last updated Jan. 28, 2020, https://www.cfr.org/
backgrounder/chinas-massive-belt-and-road-initiative.
    \122\ Adrian Shahbaz, Freedom of the Net 2018: The Rise of Digital 
Authoritarianism, Freedom House (Oct. 31, 2018), https://bit.ly/
2IYJkJE; Susan Crawford, ``China Will Likely Corner the 5G Market--and 
the US Has No Plan,'' Wired, Feb. 20, 2019.
---------------------------------------------------------------------------
    When examining China's digital efforts abroad, a subtle yet 
important distinction between China's fundamentally economic 
activities and its more subversive and damaging endeavors that 
aid in the expansion of digital authoritarianism must be made. 
While China's attempts to gain a larger market in the digital 
domain and to outcompete the United States in certain 
technological spaces represent a significant concern for U.S. 
economic interests, those efforts within a free international 
market do not necessarily represent a national security 
concern. What does raise critical national security concerns is 
when China's digital efforts erode democratic values and enable 
the rise of digital authoritarianism around the world. At best, 
China is selling digital technology that has remarkable 
capacity for surveillance and control to authoritarian or 
authoritarian-leaning countries with no second thought for the 
consequences. At worst, China is pairing its economic 
investment with aggressive outreach and training on Internet 
governance and domestic regulations to further inculcate 
authoritarian values and methods of social control.
Exporting Technologies and Expanding Digital
   Authoritarianism
    The Digital Silk Road announcement only formalized efforts 
already underway by China to expand into foreign markets. For 
example, in 2015, China's third-largest telecom company, China 
Telecom Group (CTG), announced the creation of its Africa and 
Middle East headquarters, having already expanded its network 
capabilities in the UAE, South Africa, Kenya, Egypt, and 
Nigeria.\123\ It planned to continue growing its network 
through deals with local companies such as the Wananchi Group, 
East Africa's leading telecommunications operator.\124\
---------------------------------------------------------------------------
    \123\ Rudradeep Biswas, ``Global: China Telecom Global Expands 
Footprint in Africa and Middle East,'' Telecom Talk, June 9, 2015, 
https://telecomtalk.info/global-china-telecom-global-expands-in-africa-
and-middle-east/137520/.
    \124\ Id.; ``CTG Signs Deal with Wananchi Group for Major Fiber 
Infrastructure Construction Project,'' China Telecom Group, Mar. 18, 
2015, https://www.chinatelecomglobal.com/data/file/2016/
20160509171658535.pdf.
---------------------------------------------------------------------------
    The CTG announcement marks just one of the steps China and 
Chinese businesses have taken to extend into the developing 
world, efforts met with increasing success. Not only has China 
been willing to go into smaller, under-served markets, Chinese 
companies have been able to offer more cost-effective equipment 
than Western companies, as well as financial support that comes 
directly from the Chinese government.\125\ According to Mark 
Natkin, founder and managing director of the Beijing-based 
consultancy Marbridge, Chinese telecom vendors ``identified 
opportunities in developing nations'' where they could 
``leverage their price advantage to develop relationships that 
vendors from rich countries [couldn't] be bothered with.''\126\ 
He goes on to describe China's approach as a long-term strategy 
based on building the core network and banking on the 
likelihood that doing so gives its companies a foothold to win 
follow-on contracts for upgrades and expansions.\127\
---------------------------------------------------------------------------
    \125\ Executive Research Associates, China in Africa: A Strategic 
Overview, at 51 (Oct. 2009), https://www.ide.go.jp/library/English/
Data/Africa--file/Manualreport/pdf/china--all.pdf
    \126\ Marbridge Consulting, ``Management,'' https://
www.marbridgeconsulting.com/management.html (last visited June 1, 
2020); Executive Research Associates, China in Africa: A Strategic 
Overview, at 50 (Oct. 2009).
    \127\ Executive Research Associates, China in Africa: A Strategic 
Overview, at 50 (Oct. 2009).
---------------------------------------------------------------------------
    Huawei, the subject of many headlines during the past few 
years, is a prime example. In 1996, the Chinese government gave 
Huawei the status of ``national champion'' and ensured it would 
have easy access to financing and high levels of government 
subsidies--$222 million in government grants in 2018.\128\ 
Government support has enabled Huawei to offer prices for its 
network equipment that are below other companies' prices, 
allowing Huawei to quickly gain market advantage. In the 
Netherlands, for example, Huawei undercut its competitor, the 
Swedish firm Ericsson, by underbidding for a contract to 
provide network equipment for the Dutch national 5G network by 
60 percent.\129\ Two industry officials who spoke to The 
Washington Post on the condition of anonymity held that 
Huawei's price was so low that, absent the subsidies the 
company had been provided, Huawei would have been unable to 
even produce the necessary network parts.\130\ Some countries 
also receive low-interest loans from Chinese state-owned banks 
to use Huawei equipment.\131\
---------------------------------------------------------------------------
    \128\ Lindsay Maizland & Andrew Chatzky, ``Huawei: China's 
Controversial Tech Giant,'' Council on Foreign Relations, June 12, 
2019; Ellen Nakashima, ``U.S. pushes hard for a ban on Huawei in 
Europe, but the firm's 5G prices are nearly irresistible,'' The 
Washington Post, May 29, 2019; Jeffrey Melnik, ``China's `National 
Champions' Alibaba, Tencent, and Huawei,'' Education About Asia, Vol. 
24, Fall 2019, https://www.asianstudies.org/wp-content/uploads/chinas-
national-champions-alibaba-tencent-and-huawei.pdf.
    \129\ Lindsay Maizland & Andrew Chatzky, ``Huawei: China's 
Controversial Tech Giant,'' Council on Foreign Relations, June 12, 
2019; Ellen Nakashima, ``U.S. pushes hard for a ban on Huawei in 
Europe, but the firm's 5G prices are nearly irresistible,'' The 
Washington Post, May 29, 2019.
    \130\ Ellen Nakashima, ``U.S. pushes hard for a ban on Huawei in 
Europe, but the firm's 5G prices are nearly irresistible,'' The 
Washington Post, May 29, 2019.
    \131\ Lindsay Maizland & Andrew Chatzky, ``Huawei: China's 
Controversial Tech Giant,'' Council on Foreign Relations, June 12, 
2019.
---------------------------------------------------------------------------
    The result has been near-complete dominance in some 
regions. For example, in Africa Huawei has built about 70 
percent of the 4G networks, and in cases such as Zambia, it is 
developing the country's entire telecommunications 
infrastructure.\132\ More broadly, Chinese technology now 
serves as the ``backbone of network infrastructure'' in several 
African countries, and Chinese firms like Huawei, ZTE, and 
China Telecom are the major players in erecting the 
infrastructure needed for next generation technologies across 
the African continent.\133\ In Kenya alone, Huawei has built 
more than 3,500 mobile base stations (the antennas that receive 
and transmit radio frequencies which make mobile communications 
possible) and installed 4,000 kilometers of fiber optic 
cable.\134\
---------------------------------------------------------------------------
    \132\ Amy Mackinnon, ``For Africa, Chinese-Built Internet Is Better 
Than No Internet at All,'' Foreign Policy, Mar. 19, 2019; Wesley Rahn, 
``Will China's 5G `Digital Silk Road' Lead to an Authoritarian Future 
for the Internet?,'' DW, Apr. 26, 2019.
    \133\ Chiponda Chimbelu, ``Investing in Africa's tech 
infrastructure. Has China won already?,'' DW, May 3, 2019.
    \134\ Huawei, Huawei Kenya Sustainability Report 2018, (2018), at 
8, https://www.huawei.com/minisite/explore-kenya/pdf/huawei--kenya--
csd--report--v2.pdf; ``Huawei Kenya launches first Sustainability 
Report Highlighting Efforts to Expand Broadband Nationwide and 
Solutions to Drive Kenya's Digital Transformation,'' Huawei, Sept. 7, 
2019, https://www.huawei.com/ke/press-events/news/ke/2019/huawei-kenya-
launches-first-sustainability-report; Ericsson, ``Base stations and 
networks,'' https://www.ericsson.com/en/about-us/sustainability-and-
corporate-responsibility/responsible-business/radio-waves-and-health/
base-stations-and-networks (last visited June 30, 2020). As a note, 
there are different numbers provided regarding the number of mobile 
base stations built by Huawei from these two citations. The 2018 report 
states that the number of stations built is 3,500, while the press 
release gives the number 3,5000. This report assumes that the number 
3,5000 is a typographical error and uses the number of 3,500.
---------------------------------------------------------------------------
    Today, Huawei operates in more than 170 countries and is 
the second-largest smartphone seller in the world, just behind 
Samsung, but ahead of Apple.\135\ Robert Atkinson, President of 
the Information Technology and Innovation Foundation (ITIF), a 
U.S. think tank, states that Huawei's research and development 
investments surpass any other company worldwide.\136\ Beyond 
consumer electronics, Huawei offers telecommunications 
equipment and cloud services.\137\ Furthermore, Huawei owns 
more patents for 5G infrastructure than any of its 
competitors.\138\
---------------------------------------------------------------------------
    \135\ Huawei, ``About Huawei,'' https://www.huawei.com/us/about-
huawei (last visited June 1, 2020); Jusy Hong, ``Global smartphone 
shipments fall for seventh consecutive quarter in Q2, even with limited 
impact from US Huawei ban,'' Informa, Aug. 5, 2019, https://
technology.informa.com/616273/global-smartphone-shipments-fall-for-
seventh-consecutive-quarter-in-q2-even-with-limited-impact-from-us-
huawei-ban; Counterpoint, ``Global Smartphone Market Share: By 
Quarter,'' https://www.counterpointresearch.com/global-smartphone-
share/ (last visited June 30, 2020).
    \136\ Wesley Rahn, ``Will China's 5G `Digital Silk Road' Lead to an 
Authoritarian Future for the Internet?,'' DW, Apr. 26, 2019; 
Information Technology & Innovation Foundation, ``Robert D. Atkinson,'' 
https://itif.org/person/robert-d-atkinson (last visited June 1, 2020).
    \137\ Lindsay Maizland & Andrew Chatzky, ``Huawei: China's 
Controversial Tech Giant,'' Council on Foreign Relations, June 12, 
2019; Huawei, ``About Huawei Cloud,'' https://www.huaweicloud.com/en-
us/about/about--us.html (last visited June 30, 2020).
    \138\ Lindsay Maizland & Andrew Chatzky, ``Huawei: China's 
Controversial Tech Giant,'' Council on Foreign Relations, June 12, 
2019; Who is leading the 5G patent race, IPlytics, at 4 and 5 (Nov. 
2019), https://www.iplytics.com/wp-content/uploads/2019/01/Who-Leads-
the-5G-Patent-Race--2019.pdf.
---------------------------------------------------------------------------
    Huawei's investments in research and development have 
positioned it to build the next-generation 5G infrastructure in 
Africa, Asia, and Latin America. Alarmingly, even governments 
close to the United States are weighing whether to integrate 
Huawei technologies into their infrastructure despite security 
concerns. For example, the ruling party of Germany in early 
2020 backed a position paper that pushed for more stringent 
regulation of foreign technologies in its 5G networks but did 
not ban the use of Huawei components.\139\ Furthermore, 
Germany's three primary telecommunications firms, while 
deciding to remove Huawei from its core networks, will continue 
to utilize Huawei technologies on peripheral radio access 
networks.\140\ Brazil, another U.S. partner, faces an upcoming 
decision on whether Huawei should be further involved in 
Brazil's infrastructure as Brazil prepares to auction spectrum 
for 5G in late 2020.\141\ In July 2019, Brazil's Vice President 
Hamilton Mourao told reporters that the country would not 
restrict Huawei on 5G, extending a decade-long 
relationship.\142\ In an example of that relationship, Huawei 
supports an Internet of Things laboratory in Sao Paulo state 
and is looking to build a smartphone assembly plant.\143\ While 
security concerns have been raised by Eduardo Bolsonaro, a 
lawmaker and son of Brazil's president, it remains to be seen 
how Brazil manages Huawei's involvement in its domestic 5G 
moving forward, especially in light of Foreign Minister Ernesto 
Araujo reportedly arguing for a Huawei 5G ban to President 
Bolsonaro.\144\ Meanwhile, Mexico and Argentina plan to start 
Latin America's first 5G networks in 2020 and are considering 
allowing Huawei participation.\145\
---------------------------------------------------------------------------
    \139\ Andreas Rinke, ``Merkel's conservatives stop short of Huawei 
5G ban in Germany,'' Reuters, Feb. 11, 2020.
    \140\ Douglas Busvine & Thomas Seythal, ``Telefonica Deutschland 
picks Ericsson for 5G core network,'' Reuters, June 2, 2020.
    \141\ Anthony Boadle, ``Huawei role in Brazil 5G up to national 
security chief: regulator,'' Reuters, Feb. 18, 2020.
    \142\ ``Defying US, Brazil Allows Huawei to Move Forward with 5G 
Network,'' Al Jazeera, July 15, 2019.
    \143\ Oliver Stuenkel, ``Huawei Heads South: The Battle over 5G 
Comes to Latin America,'' Foreign Affairs, May 10, 2019.
    \144\ Anthony Boadle, ``Huawei role in Brazil 5G up to national 
security chief: regulator,'' Reuters, Feb. 18, 2020; Eduardo Baptista, 
``China-Brazil trade on track, but Huawei tension may be threat to 
relations,'' South China Morning Post, June 21, 2020, https://
www.scmp.com/news/china/article/3089903/china-brazil-trade-track-
huawei-tension-may-be-threat-relations.
    \145\ Oliver Stuenkel, ``Huawei Heads South: The Battle over 5G 
Comes to Latin America,'' Foreign Affairs, May 10, 2019; Andres 
Schipani et al., ``Latin America resists US pressure to exclude 
Huawei,'' Financial Times, June 9, 2019.
---------------------------------------------------------------------------
    Huawei's 5G push continues to see success in other 
countries, especially ones in China's Belt and Road Initiative, 
highlighting the company's ability to dominate the 5G space by 
providing networks for prices estimated to be 30 percent less 
than its competitors.\146\ For example:
---------------------------------------------------------------------------
    \146\ Lindsay Maizland & Andrew Chatzky, ``Huawei: China's 
Controversial Tech Giant,'' Council on Foreign Relations, June 12, 
2019.


   Malaysia is not barring Huawei from spectrum bids relating 
        to its 5G rollout, saying that security decisions will 
        be made by its ``own safety standards'';\147\
---------------------------------------------------------------------------
    \147\ Joseph Sipalan & Krishna N. Das, ``Malaysia to choose 5G 
partners based on own security standards,'' Reuters, Feb. 17, 2020.

   In Thailand, Huawei offered to build a tech training center 
        in Bangkok as a means of enticing Thailand to allow 
        Huawei to build its 5G network;\148\
---------------------------------------------------------------------------
    \148\ Apornrath Phoonphongphiphat, ``Huawei sweetens 5G offer in 
Thailand with tech training center,'' Nikkei Asian Review, November 18, 
2019, https://asia.nikkei.com/Spotlight/5G-networks/Huawei-sweetens-5G-
offer-in-Thailand-with-tech-training-center; Takashi Kawakami, ``China 
closes in on 70% of world's 5G subscribers,'' Nikkei Asian Review, May 
12, 2020, https://asia.nikkei.com/Spotlight/5G-networks/China-closes-
in-on-70-of-world-s-5G-subscribers.

   In Italy, Huawei offered to provide cloud computing 
        services that would link Italian hospitals both with 
        each other and with hospitals in Wuhan in response to 
        the COVID-19 pandemic;\149\
---------------------------------------------------------------------------
    \149\ Theresa Fallon, ``China, Italy, and Coronavirus: Geopolitics 
and Propaganda,'' The Diplomat, Mar. 20, 2020.

   Unnamed sources reported in March 2020 that as part of its 
        5G rollout, France's cybersecurity agency, ANSSI, will 
        allow Huawei equipment to be used for non-core elements 
        of France's network;\150\
---------------------------------------------------------------------------
    \150\ Mathieu Rosemain & Gwenaelle Barzic, ``Exclusive: France to 
allow some Huawei gear in its 5G network--sources,'' Reuters, Mar. 12, 
2020.

   Russia is building out its 5G network with Huawei's 
        help;\151\
---------------------------------------------------------------------------
    \151\ Zak Doffman, ``Huawei Just Launched 5G In Russia With Putin's 
Support: 'Hello Splinternet','' Forbes, Sept. 1, 2019.

   The Washington Post reported that Huawei is building out 
        North Korea's wireless network.\152\ Huawei stated that 
        it does not have a business presence in North Korea, 
        but did not dispute the reporting done by The 
        Washington Post;\153\
---------------------------------------------------------------------------
    \152\ Ellen Nakashima et al., ``Leaked documents reveal Huawei's 
secret operations to build North Korea's wireless network,'' The 
Washington Post, July 22, 2019; Emily Stewart, ``A New Reason to Worry 
About Huawei: It's Been Building North Korea's Wireless Networks,'' 
Vox, July 22, 2019, https://www.vox.com/recode/2019/7/22/20704196/
huawei-north-korea-washington-post-sanctions-panda.
    \153\ Ellen Nakashima et al., ``Leaked documents reveal Huawei's 
secret operations to build North Korea's wireless network,'' The 
Washington Post, July 22, 2019.

   Even some small U.S. rural telecom companies have used 
        Huawei equipment.\154\
---------------------------------------------------------------------------
    \154\ Jeanne Whalen, ``Huawei helped bring Internet to small-town 
America. Now its equipment has to go,'' The Washington Post, Oct. 10, 
2019.


    By building out so much of the digital infrastructure in 
the developing world, China could end up dominating a large 
portion of the global communications market, positioning it to 
potentially pressure other governments or conduct 
espionage.\155\ Indeed, multiple governments that purchase or 
rely on Chinese technologies also enact tough restraints on 
free speech or engage in illiberal activities, such as spying 
on political opponents, and there have been suspicious data 
transfers from Chinese-built IT systems.\156\ For example, in 
2017, technicians working at the African Union headquarters in 
Addis Ababa, Ethiopia, discovered that servers in the building, 
built by a Chinese company with Chinese funding, had for years 
been transmitting massive quantities of data to China, making 
even the most sensitive material vulnerable to Chinese 
exploitation.\157\ Despite these incidents and diplomatic 
warnings, however, many countries--both developing and 
developed--calculate that access to low-cost, good-quality data 
networks and hardware outweighs the potential risks.
---------------------------------------------------------------------------
    \155\ See, e.g., Zak Doffman, ``CIA Claims It Has Proof Huawei Has 
Been Funded By China's Military and Intelligence,'' Forbes, Apr. 20, 
2019; Isobel Asher Hamilton, ``Researchers Studied 25,000 Leaked Huawei 
Resumes and Found Troubling Links to the Government and Spies,'' 
Business Insider, July 8, 2019, https://www.businessinsider.com/huawei-
study-finds-connections-between-staff-and-chinese-intelligence-2019-7.
    \156\ Steven Feldstein, ``When it Comes to Digital 
Authoritarianism, China is a Challenge--But Not the Only Challenge,'' 
War on the Rocks, Feb. 12, 2020, https://warontherocks.com/2020/02/
when-it-comes-to-digital-authoritarianism-china-is-a-challenge-but-not-
the-only-challenge/; Josh Chin, ``The Internet, Divided Between the 
U.S. and China, Has Become a Battleground,'' The Wall Street Journal, 
Feb. 9, 2019.
    \157\ Joan Tilouine & Ghalia Kadiri, ``A Addis-Abeba, le siege de 
l'Union africaine espionne par Pekin,'' Le Monde, Jan. 26, 2018, 
https://www.lemonde.fr/afrique/article/2018/01/26/a-addis-abeba-le-
siege-de-l-union-africaine-espionne-par-les-chinois--5247521--
3212.html; Mailyn Fidler, ``African Union Bugged by China: Cyber 
Espionage as Evidence of Strategic Shifts,'' Council on Foreign 
Relations, Mar. 7, 2018.
---------------------------------------------------------------------------
    As noted above, China's export and infrastructure efforts 
around the globe represent an economic concern for the United 
States. However, China's export of digital technology in and of 
itself is not the key issue, as it is only the groundwork upon 
which digital authoritarianism can flourish. What really 
advances this censorship and surveillance system is China 
providing countries with social control systems that run on 
exported digital technologies, including relevant training and 
expertise.
    In its report, Freedom on the Net 2018, Freedom House 
highlights how, during 2018, the Chinese government hosted 
media officials from dozens of countries for seminars on its 
system of censorship and surveillance.\158\ Outside experts 
have little visibility into the details of these trainings, but 
governments who participate frequently return home to pass 
cybersecurity laws very similar to those in China.\159\ 
Furthermore, Chinese companies have supplied many governments--
at least some of which have poor human rights records or a 
tendency towards autocracy--with advanced facial recognition 
technology and data analytics tools that can be easily 
exploited by repressive governments and intelligence 
services.\160\ For example:
---------------------------------------------------------------------------
    \158\ Adrian Shahbaz, Freedom on the Net 2018: The Rise of Digital 
Authoritarianism, Freedom House (Oct. 31, 2018), https://bit.ly/
2IYJkJE.
    \159\ Id.. Vietnam, Uganda, and Tanzania all introduced 
cybersecurity laws resembling China's following such seminars. Id. See 
Also Abdi Latif Dahir, ``China is Exporting its Digital Surveillance 
Methods to African Countries,'' Quartz Africa, Nov. 1, 2018; Josh Chin, 
``The Internet, Divided Between the U.S. and China, Has Become a 
Battleground,'' The Wall Street Journal, Feb. 9, 2019.
    \160\ Daniel Benaim and Hollie Russon Gilman, ``China's Aggressive 
Surveillance Technology Will Spread Beyond Its Borders,'' Slate, Aug. 
9, 2018.


   The Chinese startup CloudWalk is partnering with the 
        Zimbabwean government on a mass facial recognition 
        program in Zimbabwe;\161\
---------------------------------------------------------------------------
    \161\ Shan Jie, ``China exports facial ID technology to Zimbabwe,'' 
Global Times, Apr. 12, 2018, http://www.globaltimes.cn/content/
1097747.shtml; Abdi Latif Dahir, ``China is Exporting its Digital 
Surveillance Methods to African Countries,'' Quartz Africa, Nov. 1, 
2018.

   Huawei is advising Kenya on its information and 
        communication technology (ICT) Master Plan and Vision 
        2030;\162\
---------------------------------------------------------------------------
    \162\ Abdi Latif Dahir, ``China is Exporting its Digital 
Surveillance Methods to African Countries,'' Quartz Africa, Nov. 1, 
2018; Huawei, ``Kenya,'' https://www.huawei.com/us/about-huawei/
sustainability/win-win-development/social-contribution/seeds-for-the-
future/kenya (last visited June 7, 2020).

   In Mauritius, Huawei is installing 4,000 cameras;\163\
---------------------------------------------------------------------------
    \163\ Sheridan Prasso, ``China's Digital Silk Road is Looking More 
Like an Iron Curtain, Bloomberg, Jan. 10, 2019.

   Zambia is spending $1 billion on Chinese-made 
        telecommunications, broadcasting, and surveillance 
        technology;\164\
---------------------------------------------------------------------------
    \164\ Id.

   Chinese start-up Yitu bid for a contract for facial 
        recognition cameras in Singapore and opened its first 
        international office in Singapore in January 2019.\165\
---------------------------------------------------------------------------
    \165\ Anna Gross et al., ``Chinese tech groups shaping UN facial 
recognition standards,'' Financial Times, Dec. 1, 2019; Amanda Lentino, 
``This Chinese facial recognition start-up can identify a person in 
seconds,'' CNBC, May 16, 2019.


    These examples highlight a few Chinese efforts to expand 
digital authoritarianism. To more fully show how China's 
approach of economic advancement and authoritarian outreach is 
extending digital authoritarianism to new countries, this 
report delves into four case studies that underscore China's 
efforts to not only provide technologies to other nations, but 
also to work with these countries to perfect methods of social 
control that imitate China's own patterns of digital 
---------------------------------------------------------------------------
authoritarianism.

                              ----------                              


                         Case Study: Venezuela

    The regime of disputed Venezuelan president Nicolas Maduro 
takes full advantage of Chinese hardware and services in its 
effort to control Venezuelan citizens. Venezuela has Internet 
and mobile networking equipment, intelligent monitoring 
systems, and facial recognition technology developed and 
installed by Chinese companies, and regime officials have 
traveled to China to participate in seminars on information 
management.\166\ The regime uses these technologies to censor 
and control its critics by blocking social media platforms and 
political content, using pro-regime commentators to manipulate 
online discussions, stifling content critical of Maduro, 
increasing surveillance of citizens, tracking and detaining 
government critics, and accessing the data of human rights 
organizations.\167\
---------------------------------------------------------------------------
    \166\ Angus Berwick, ``How ZTE Helps Venezuela Create China-Style 
Social Control,'' Reuters Investigates, Nov. 14, 2018; Paul Mozur et 
al., ``Made in China, Exported to the World: The Surveillance State,'' 
The New York Times, Apr. 24, 2019.
    \167\ ``Venezuela / Protests: UN and IACHR Rapporteurs condemn 
censorship, arrests and attacks on journalists,'' UN Human Rights--
Office of the High Commissioner, Apr. 26, 2017, https://www.ohchr.org/
en/NewsEvents/Pages/DisplayNews.aspx?NewsID=21535&LangID=E; Angus 
Berwick, ``How ZTE Helps Venezuela Create China-Style Social Control,'' 
Reuters Investigates, Nov. 14, 2018; ``Freedom on the Net 2019: 
Venezuela,'' Freedom House, https://freedomhouse.org/country/venezuela/
freedom-net/2019 (last visited July 10, 2020); Moises Rendon & Arianna 
Kohan, ``The Internet: Venezuela's Lifeline,'' Center for Strategic and 
International Studies, Dec. 4, 2019.
---------------------------------------------------------------------------
    ZTE helped the regime create Venezuela's Carnet de la 
Patria (Fatherland Card). Critics have labeled the card as a 
new option for the Maduro regime to exert increased social 
control over its population (such as determining who receives 
subsidized food or health services), especially against those 
the regime considers political opponents.\168\ The initial idea 
began more than a decade ago as a standardized ID for voting or 
opening a bank account.\169\ However, as Venezuela's economic 
and political crisis deepened, the regime used it to track 
Comites Locales de Abastecimiento y Produccion (Local 
Committees for Supply and Production, or CLAP) boxes, the 
subsidized food packages the government began distributing in 
2016.\170\ ZTE in 2017 also received an undisclosed portion of 
$70 million to build out a centralized database and mobile 
payment system for the card in an effort to bolster ``national 
security.''\171\ By late 2018, a team of ZTE employees was 
embedded in a special unit of Venezuela's state 
telecommunications company that oversees the management of the 
database.\172\ According to employees of the entity that 
manages the card system, the database stores birthdays, family 
information, employment and income, property owned, medical 
history, state benefits received, presence on social media, 
political party membership, and voting records.\173\ To 
encourage people to sign up for the card, the Maduro regime has 
granted ``cash prizes to cardholders for performing civic 
duties, like rallying voters.''\174\ However, the regime also 
made it mandatory for anyone wanting to receive public benefits 
such as medicine, subsidized fuel, and pensions.\175\ Once the 
card became the way to sign up for much-needed services, its 
adoption was generally assured, and the Maduro regime claims 
that over half of the population retains a Fatherland 
Card.\176\
---------------------------------------------------------------------------
    \168\ Laura Vidal, ``Venezuelans fear 'Fatherland Card' may be a 
new form of social control,'' The World, Dec. 28, 2018, https://
www.pri.org/stories/2018-12-28/venezuelans-fear-fatherland-card-may-be-
new-form-social-control.
    \169\ Angus Berwick, ``How ZTE Helps Venezuela Create China-Style 
Social Control,'' Reuters Investigates, Nov. 14, 2018.
    \170\ Jim Wyss & Cody Weddle, ``Venezuela's Maduro aims to turn 
empty stomachs into full ballot boxes,'' Miami Herald, May 16, 2018. 
See also Press Release, U.S. Department of Treasury, ``Treasury 
Disrupts Corruption Network Stealing From Venezuela's Food Distribution 
Program, CLAP,'' July 25, 2019.
    \171\ Angus Berwick, ``How ZTE Helps Venezuela Create China-Style 
Social Control,'' Reuters Investigates, Nov. 14, 2018.
    \172\ Id.
    \173\ Id.
    \174\ Id.
    \175\ Id.
    \176\ Id.; Jim Wyss & Cody Weddle, ``Venezuela's Maduro aims to 
turn empty stomachs into full ballot boxes,'' Miami Herald, May 16, 
2018.
---------------------------------------------------------------------------
    Using information gathered through enrollment and card 
transactions, the regime is creating and growing a database 
that could be a powerful tool for identifying, harassing, and 
silencing Maudro's critics. Current and former employees of 
Cantv, Venezuela's state telephone and Internet provider, told 
Reuters that the card still only records if a person voted--not 
how they voted--but there is evidence that government agencies 
are tracking whether government employees are voting.\177\ ZTE 
is also supporting the Maduro regime by taking on projects that 
government-owned enterprises can no longer manage. As of 2015, 
ZTE was helping build six emergency response centers monitoring 
Venezuela's major cities, and since 2016 it has been working to 
centralize the government's video surveillance.\178\
---------------------------------------------------------------------------
    \177\ Angus Berwick, ``How ZTE Helps Venezuela Create China-Style 
Social Control,'' Reuters Investigates, Nov. 14, 2018.
    \178\ Id.

                              ----------                              


                        Case Study: Central Asia

    In April 2019, the Uzbek government signed a $1 billion 
deal with Huawei to expand surveillance operations in the 
country.\179\ At the time, the capital city of Tashkent had 883 
cameras that authorities used to record and analyze movements 
while automatically reporting road violations such as 
speeding.\180\ Under the new agreement, Huawei will upgrade the 
cameras to ``digitally manage political affairs.''\181\ 
Similarly, Huawei aided the implementation of Tajikistan's 
``safe city'' project in Dushanbe in 2013, providing $22 
million (primarily a $20.91 million loan) for the installation 
of cameras along roads and overseeing monuments and parks.\182\ 
China also owns TK mobile, one of the five telecommunications 
providers in Tajikistan, and Huawei is the main technology 
supplier for Kyrgyzstan's top telecommunication providers.\183\ 
Although the Kyrgyz government withdrew from Huawei's $60 
million ``safe cities'' project in March 2018, it later chose a 
Russian company, Vega, to implement the first phase of a 
similar traffic monitoring system in November 2018.\184\
---------------------------------------------------------------------------
    \179\ ``Huawei and CITIC Guoan invest over US$1 billion to develop 
Uzbekistan's digital infrastructure,'' Xiangshi Xinwen Wang (Detailed 
News) via Silu Xin Guancha (Silk Road New Observer), Apr. 26, 2019, 
http://web.siluxgc.com/UZ/20190426/16656.html (translated from 
Chinese); Yau Tsz Yan, ``Smart Cities or Surveillance? Huawei in 
Central Asia,'' The Diplomat, Aug. 7, 2019.
    \180\ Yau Tsz Yan, ``Smart Cities or Surveillance? Huawei in 
Central Asia,'' The Diplomat, Aug. 7, 2019.
    \181\ Id.
    \182\ Id.; Liu Ruowei, ``Millions of Roads, Safety First: The 
Central Asian `Safe City' project is here!,'' Silu Xin Guangcha (Silk 
Road New Observer) on WeChat, Feb. 13, 2019, https://mp.weixin.qq.com/
s/z3l--UHX40W8OIJi61HaomA (translated from Chinese).
    \183\ Yau Tsz Yan, ``Smart Cities or Surveillance? Huawei in 
Central Asia,'' The Diplomat, Aug. 7, 2019; ``Announcement on providing 
guarantee for holding subsidiaries,'' ZTE Corporation, May 11, 2019, 
https://bit.ly/3a7lbMb.
    \184\ Yau Tsz Yan, ``Smart Cities or Surveillance? Huawei in 
Central Asia,'' The Diplomat, Aug. 7, 2019; ``The Kyrgyz government 
suddenly announced the termination of the ``smart city'' project, 
China's Huawei has not yet responded,'' Kabar, Mar. 18, 2015, http://
cn.kabar.kg/news/2-8/ (translated from Chinese); ``Vega successfully 
completes first round of Safe City program in Bishkek,'' Vega, May 20, 
2019, https://www.vega.su/press-room/?ELEMENT--ID=2216 (translated from 
Russian).

                              ----------                              


                          Case Study: Ecuador

    The Ecuador example illustrates how, even if democratic 
institutions prevail, vestiges of China's influence persist. 
Former Ecuadorian President Rafael Correa, the autocratic 
leftist and ally of former Venezuelan President Hugo Chavez, 
left office in 2017 but the surveillance system he installed 
remains in use.\185\ Correa learned of China's surveillance 
technology after Ecuadorian officials visiting Beijing for the 
2008 Olympics received a tour of Beijing's surveillance 
system.\186\ Three years later, the Ecuadorian government began 
installing a system of high-powered cameras throughout the 
country for the stated purpose of reducing crime.\187\ This 
system sends images to 16 monitoring centers that employ more 
than 3,000 people.\188\ China guaranteed state funding and 
loans for the project, and in return, Ecuador committed to 
exporting ``large portions of its oil reserves'' to China, 
underscoring another key point: China's utilization of 
predatory lending and technological knowledge to receive other 
benefits.\189\
---------------------------------------------------------------------------
    \185\ ``Ecuador 'rejects unlimited election terms', blocking Correa 
return,'' BBC, Feb. 5, 2018.
    \186\ Paul Mozur et al., ``Made in China, Exported to the World: 
The Surveillance State,'' The New York Times, Apr. 24, 2019.
    \187\ Id.
    \188\ Id.
    \189\ Id.; Clifford Krauss & Keith Bradsher, ``China's Global 
Ambitions, Cash and Strings Attached,'' The New York Times, July 24, 
2015.
---------------------------------------------------------------------------
    Two Chinese companies, Huawei and China National 
Electronics Import & Export Corporation (CEIEC), primarily 
built Ecuador's surveillance system.\190\ In addition to 
recording events, the monitoring system offers Ecuadorian 
authorities the ability to track phones and, according to the 
New York Times, may be equipped with facial-recognition 
capabilities in the future.\191\ As part of the process of 
fully integrating these technologies into Ecuador's 
infrastructure, China engaged in a training operation in which 
Ecuadorian officials visited China and Chinese engineers 
educated Ecuadorian engineers on how to manage the system.\192\ 
The Ecuador project created a toehold in the region: Ecuador's 
decision to install the equipment prompted the Venezuelan and 
Bolivian governments to follow suit, and soon after, Venezuela 
installed a larger version that aimed to include 30,000 
cameras.\193\
---------------------------------------------------------------------------
    \190\ Paul Mozur et al., ``Made in China, Exported to the World: 
The Surveillance State,'' The New York Times, Apr. 24, 2019.
    \191\ Id.
    \192\ Id.
    \193\ Id.; ``Venezuela will replicate the Ecuadorian model of the 
Integrated Security System Ecu-911,'' National Service for Risk and 
Emergency Management of Ecuador, Dec. 25, 2013, https://
www.gestionderiesgos.gob.ec/venezuela-replicara-modelo-ecuatoriano-del-
sistema-integrado-de-seguridad-ecu-911/.
---------------------------------------------------------------------------
    Although Correa's successor, President Lenin Moreno, has 
worked to reverse many of Correa's autocratic policies, the 
surveillance system is still operational and holds the 
potential for abuse. When New York Times reporters had the 
opportunity to see in person the 800-camera operation in Quito, 
there were only 30 police officers available to check camera 
footage, and anecdotal reports suggest crimes continue to take 
place in plain view of cameras.\194\ Moreover, the recordings 
are also available to Ecuador's domestic intelligence agency, 
the National Intelligence Secretariat (SENAIN), which has a 
history of harassing and tracking political opponents.\195\ 
Indeed, given the small number of police available to monitor 
crime-prone locations, the system is probably better suited to 
spying on individuals than fending off criminality.
---------------------------------------------------------------------------
    \194\ Paul Mozur et al., ``Made in China, Exported to the World: 
The Surveillance State,'' The New York Times, Apr. 24, 2019.
    \195\ Id.

                              ----------                              


                          Case Study: Zimbabwe

    China is also leveraging the deployment of surveillance 
technology overseas to improve its products' functionality. 
Studies have shown that facial recognition systems developed in 
Western nations tend to perform better on Caucasian faces and 
those developed in East Asian nations tend to perform better on 
their respective populations.\196\ While Western technology 
companies are grappling with how to teach machines about race, 
their Chinese counterparts are using their customer base in 
Africa to help develop advanced capabilities that differentiate 
by race.\197\ For example, in March 2018, the Zimbabwean 
government agreed to a partnership to develop facial 
recognition programs in the country with CloudWalk Technology, 
a startup located in Guangzhou.\198\ Additionally, Zimbabwe 
entered into a Memorandum of Understanding with Hikvision in 
which the Chinese company would donate facial recognition 
cameras and software for use at border posts, airports, and 
state entry points in Zimbabwe.\199\ Partnerships such as these 
provide Chinese companies with the opportunity to develop and 
refine their databases with different ethnicities and 
demographics, in Zimbabwe's case a majority-Black population, 
while enticing the country with technological 
modernization.\200\ A key consequence of such partnerships, 
according to Quartz reporter Lynsey Chutel, is Chinese 
companies ``getting ahead of US and European developers'' on 
facial recognition.\201\
---------------------------------------------------------------------------
    \196\ P. Jonathon Phillips et al., An Other-Race Effect for Face 
Recognition Algorithms, Association for Computing Machinery (Feb. 
2011), https://dl.acm.org/doi/10.1145/1870076.1870082; Steve Lohr, 
``Facial Recognition is Accurate, if You're a White Guy,'' The New York 
Times, Feb. 9, 2018; Clare Garvie & Jonathan Frankle, ``Facial-
Recognition Software Might Have a Racial Bias Problem,'' The Atlantic, 
Apr. 7, 2016.
    \197\ Lynsey Chutel, ``China is Exporting Facial Recognition 
Software to Africa, Expanding its Vast Database,'' Quartz Africa, May 
25, 2018.
    \198\ Id.; Zhang Hongpei, ``Chinese Facial ID Tech to Land in 
Africa,'' Global Times, May 17, 2018, http://www.globaltimes.cn/
content/1102797.shtml; Shan Jie, ``China exports facial ID technology 
to Zimbabwe,'' Global Times, April 12, 2018, http://www.globaltimes.cn/
content/1097747.shtml.
    \199\ Farai Mudzingwa, ``Government Acknowledges Facial Recognition 
System In The Works,'' TechZim, June 13, 2018, https://
www.techzim.co.zw/2018/06/government-acknowledges-facial-recognition-
system-in-the-works/.
    \200\ Lynsey Chutel, ``China is Exporting Facial Recognition 
Software to Africa, Expanding its Vast Database,'' Quartz Africa, May 
25, 2018.
    \201\ Id.
---------------------------------------------------------------------------

A Global Challenge

    The situations described above are key examples of how 
China is using economic and, more importantly, geopolitical and 
outreach tools to stimulate the growth of digital 
authoritarianism in new markets and nations. Although most 
China tech-watchers agree that the use of Chinese surveillance 
and censorship systems around the world is growing, they differ 
on how many are in use, and, given the proliferation of 
Chinese-built telecommunications equipment, how widely their 
use may ultimately reach. According to Steven Feldstein, former 
Deputy Assistant Secretary of State at the Bureau for 
Democracy, Human Rights, and Labor, ``Huawei alone is 
responsible for providing AI [artificial intelligence] 
surveillance technology to at least fifty countries 
worldwide.''\202\ When Huawei's efforts are combined with 
Hikvision, Dahua, and ZTE's efforts, Chinese companies supply 
AI surveillance technology in sixty-three countries, thirty-six 
of which are part of BRI.\203\ Experts are still trying to 
assess the long-term consequences of China's technological 
expansion; Feldstein also notes that China is exporting AI-
equipped surveillance technology to governments ranging from 
closed authoritarian systems to flawed democracies.\204\ In an 
article on the proliferation of Chinese-made surveillance 
systems, Foreign Policy cites a Huawei study, which has been 
removed from the company's website, in which ``the company 
boasted that it had already deployed its `Safe City' system in 
230 cities around the world, for more than 90 national or 
regional governments.''\205\
---------------------------------------------------------------------------
    \202\ Steven Feldstein, ``The Global Expansion of AI 
Surveillance,'' Carnegie Endowment for International Peace, Sept. 17, 
2019.
    \203\ Id.
    \204\ Id.; Steven Feldstein, ``China is Exporting AI Surveillance 
Technology to Countries Around the World,'' Newsweek, Apr. 23, 2019.
    \205\ Bojan Stojkovski, ``Big Brother Comes to Belgrade,'' Foreign 
Policy, June 18, 2019.
---------------------------------------------------------------------------
    Due to China's efforts at proliferating the technologies 
and methodologies of digital authoritarianism, the United 
States finds itself in an intensifying battle over the global 
ICT sector. China's export of ICT infrastructure, its ability 
to deliver lower-priced, reliable access to telecommunications 
network technology, and its competitive edge in 5G combine to 
mount a strong challenge to the U.S. to become the biggest 
provider of 5G services to the world. Not only do these efforts 
provide China with a competitive edge both commercially and, in 
a potential conflict, militarily, they also offer even greater 
leverage to push client countries to adopt the Chinese approach 
to the Internet and the regulation of speech. Consequently, the 
United States must proactively defend a free, democratic model 
for the digital domain and Internet governance and push back 
against China's malign activities abroad.
    However, it is not enough for the United States to take a 
purely defensive posture against China's digital 
authoritarianism. It is critical that the United States 
government stimulate technological innovation in the United 
States by increasing government research and development 
funding, adopting a more extensive industrial policy, 
developing and attracting superior talent to the United States' 
technology sector, strengthening bilateral and multilateral 
technology initiatives with like-minded allies and partners, 
and ensuring a competitive advantage for domestic companies in 
overseas markets. By doing so, the United States and its allies 
can open up more opportunities to create and deploy emerging 
technologies that can outcompete Chinese products and services 
and thereby undercut its ability to export digital 
authoritarianism. If the United States does not develop and 
implement an all-encompassing strategy for combatting China and 
its cyber efforts, the United States will cede the global cyber 
domain to our Pacific adversary and open up a future in which 
digital authoritarianism becomes the global norm, leaving the 
United States and its allies vulnerable and placing countless 
more individuals under the thumb of digital authoritarianism.



   Chapter 3: Institutionalizing Digital Authoritarianism--China at 
                           International Fora

                              ----------                              

    In addition to using heavily-subsidized technology to 
purchase political influence in countries around the world, 
China continues to use diplomacy and various international 
domains to further its authoritarian goals. Its objective: to 
set the rules and norms around the governance of digital 
technologies. From the United Nations (UN) to the World Trade 
Organization (WTO), China has used its political and economic 
muscle to shape the international standards surrounding the 
digital domain in favor of a more authoritarian view of the 
world.
    Since General Secretary Xi came into power in 2012, the 
cyber realm has become an increasingly important strategic 
domain.\206\ Adam Segal of the Council on Foreign Relations 
wrote that, since then, the CCP's goals have been threefold: 
``limit the threat that the Internet and the flow of 
information may pose to domestic stability and regime 
legitimacy; shape cyberspace to extend Beijing's political, 
military, and economic influence; and counter US advantages in 
cyberspace while increasing China's room to maneuver.''\207\
---------------------------------------------------------------------------
    \206\ See, e.g., James A. Lewis & Simon Hansen, China's 
Cyberpower--International and domestic priorities, Australian Strategic 
Policy Institute, at 1 (Nov. 2014), https://bit.ly/2UTtZMQ.
    \207\ Adam Segal ``Chinese Cyber Diplomacy in a New Era of 
Uncertainty,'' Hoover Institution, June 2017, https://hvr.co/374oSiA.
---------------------------------------------------------------------------
    According to a report prepared for the United States-China 
Economic and Security Review Commission in 2018, China uses:


        [A] comprehensive techno-nationalist strategy that 
        coordinates Chinese efforts to gain leading roles in 
        international standards organizations while also using 
        state funding to allow Chinese companies to undersell 
        their competitors in developed economies and win 
        infrastructure contracts in developing markets, 
        ensuring that its indigenously-developed technologies 
        and standards become widely adopted with or without 
        international recognition.\208\
---------------------------------------------------------------------------
    \208\ John Chen et al., China's Internet of Things, Research Report 
Prepared on Behalf of the U.S.-China Economic and Security Review 
Commission, by SOS International (SOSi), at 69 (Oct. 2018).


    Above all else, China is heavily focused on ensuring its 
digital sovereignty, as indicated by its presence as the second 
``principle'' (following ``peace'' as the first) in their 2017 
International Strategy of Cooperation on Cyberspace.\209\ In 
the strategy, the Cyberspace Administration of China (CAC) and 
the Ministry of Foreign Affairs argues for digital sovereignty 
and states that ``[n]o country should pursue cyber 
hegemony.''\210\ It appears, as evidenced by its efforts in a 
number of different international forums, that China's idea of 
not pursuing ``cyber hegemony'' applies to every country other 
than China.
---------------------------------------------------------------------------
    \209\ Ministry of Foreign Affairs of the People's Republic of 
China, ``International Strategy of Cooperation on Cyberspace--March 
2017,'' Mar. 1, 2017, https://www.fmprc.gov.cn/mfa--eng/wjb--663304/
zzjg--663340/jks--665232/kjlc--665236/qtwt--665250/t1442390.shtml.
    \210\ Id.
---------------------------------------------------------------------------
                              ----------                              


                              Definition:

  Digital Sovereignty--At the Opening Ceremony of the 
        International Workshop on Information and Cyber 
        Security in June 2014, Vice Foreign Minister Li Baodang 
        stated that sovereignty in cyberspace, which this 
        report refers to as digital sovereignty, comprises the 
        following factors: ``states['] own jurisdiction over 
        the ICT infrastructure and activities within their 
        territories; national governments are entitled to 
        making public policies for the Internet based on their 
        national conditions; no country shall use the Internet 
        to interfere in other countries' internal affairs or 
        undermine other countries' interests.''\211\
---------------------------------------------------------------------------
    \211\ Press Release, Vice Foreign Minister Li Baodong, ``Address by 
Vice Foreign Minister Li Baodong at the Opening Ceremony of the 
International Workshop on Information and Cyber Security,'' June 5, 
2014, https://www.fmprc.gov.cn/mfa--eng/wjbxw/t1162458.shtml.
---------------------------------------------------------------------------
                              ----------                              


The United Nations
    At the United Nations, China has played a counterproductive 
role in efforts to build consensus on a free and fair future of 
cyberspace. China's behavior echoes its consistent undermining 
of UN efforts that could highlight its own poor human rights 
record.\212\
---------------------------------------------------------------------------
    \212\ See, e.g., Lindsay Maizland, ``Is China Undermining Human 
Rights at the United Nations?'' Council on Foreign Relations, July 9, 
2019.
---------------------------------------------------------------------------
    In 2011, China--along with Russia, Tajikistan, and 
Uzbekistan--submitted a draft resolution on an international 
code of conduct for information security to the 2011 United 
Nations General Assembly.\213\ The resolution, which was later 
enhanced and resubmitted in 2015 by a slightly larger group of 
Shanghai Cooperation Organization (SCO) member countries, 
emphasizes the sovereignty and stability of individual states 
within the digital space to the extent that it raises 
significant human rights concerns, detailed below.\214\ The 
resolution explicitly says it aims to ``push forward the 
international debate on international norms on information 
security, and help forge an early consensus on this 
issue.''\215\ In other words, the resolution is China's attempt 
to make itself the leader on these norms.
---------------------------------------------------------------------------
    \213\ Letter Dated 12 September 2011 from the Permanent 
Representatives of China, the Russian Federation, Tajikistan, and 
Uzbekistan to the United Nations Addressed to the Secretary-General 
(93), U.N. General Assembly, 66th Session, Sept. 14, 2011, https://
undocs.org/A/66/359.
    \214\ Letter Dated 9 January 2015 from the Permanent 
Representatives of China, Kazakhstan, Kyrgyzstan, the Russian 
Federation, Tajikistan, and Uzbekistan to the United Nations Addressed 
to the Secretary-General (91), U.N. General Assembly, 69th Session, 
Jan. 13, 2015, https://undocs.org/A/69/723; see, e.g., Sarah McKune, 
``An Analysis of the International Code of Conduct for Information 
Security,'' The Citizen Lab, Munk School of Global Affairs and Public 
Policy, University of Toronto, Sept. 28, 2015, https://citizenlab.ca/
2015/09/international-code-of-conduct/.
    \215\ Id.
---------------------------------------------------------------------------
    Both the 2011 and 2015 versions of the draft resolution 
commit the signatories to ``curbing the dissemination of 
information that incites terrorism, secessionism or extremism 
or that undermines other countries' political, economic, and 
social stability, as well as their spiritual and cultural 
environment.''\216\ According to Milton Mueller of the Internet 
Governance Project at the Georgia Institute of Technology 
School of Public Policy, this section would:
---------------------------------------------------------------------------
    \216\ Letter Dated 12 September 2011 from the Permanent 
Representatives of China, the Russian Federation, Tajikistan, and 
Uzbekistan to the United Nations Addressed to the Secretary-General 
(93), U.N. General Assembly, 66th Session, Sept. 14, 2011, https://
undocs.org/A/66/359. See also Letter Dated 9 January 2015 from the 
Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian 
Federation, Tajikistan, and Uzbekistan to the United Nations Addressed 
to the Secretary-General (91), U.N. General Assembly, 69th Session, 
Jan. 13, 2015, https://undocs.org/A/69/723.


        [G]ive any state the right to censor or block 
        international communications for almost any reason. 
        Such as . . . Facebook mobilizations against dictators, 
        dissident blogs, etc. ``Undermining the spiritual and 
        cultural environment'' in particular could be used to 
        filter out any views a government didn't like, and 
        could even be used for trade protectionism in cultural 
        industries.\217\
---------------------------------------------------------------------------
    \217\ Milton Mueller, ``Russia & China propose UN General Assembly 
Resolution on `information security,' '' Internet Governance Project--
Georgia Tech University, Sept. 20, 2011, https://
www.internetgovernance.org/2011/09/20/russia-china-propose-un-general-
assembly-resolution-on-information-security/.


    The significant revisions between the 2011 Code of Conduct 
and the 2015 Code of Conduct involve several references to a 
report by the 2012 UN Group of Governmental Experts (GGE), 
Developments in the Field of Information and Telecommunications 
in the Context of International Security.\218\ The GGEs, which 
fall under the United Nations Office for Disarmament Affairs 
and consist of selected member states, have initiated six 
separate working groups since 2004 to ``examine[] existing and 
potential threats in the cyber-sphere and possible cooperative 
measures to address them,'' with each group's work intended to 
build upon the last.\219\
---------------------------------------------------------------------------
    \218\ See Letter Dated 12 September 2011 from the Permanent 
Representatives of China, the Russian Federation, Tajikistan, and 
Uzbekistan to the United Nations Addressed to the Secretary-General 
(93), U.N. General Assembly, 66th Session,] Sept. 14, 2011, https://
undocs.org/A/66/359; Letter Dated 9 January 2015 from the Permanent 
Representatives of China, Kazakhstan, Kyrgyzstan, the Russian 
Federation, Tajikistan, and Uzbekistan to the United Nations Addressed 
to the Secretary-General (91), U.N. General Assembly, 69th Session, 
Jan. 13, 2015, https://undocs.org/A/69/723; U.N. General Assembly, 
Group of Governmental Experts on Developments in the Field of 
Information and Telecommunications in the Context of International 
Security--Note by the Secretary-General, 68th Session, Agenda item 94 
(June. 24, 2013), https://undocs.org/A/68/98.
    \219\ United Nations, ``Developments in the Field of Information 
and Telecommunications in the Context of International Security--
December 2018,'' https://www.un.org/disarmament/ict-security/ (last 
visited July 15, 2020). See also United Nations Office for Disarmament 
Affairs (UNODA), ``Fact Sheet: Developments In the Field of Information 
and Telecommunications in the Context of International Security,'' Jul. 
2019, https://unoda-web.s3.amazonaws.com/wp-content/uploads/2019/07/
Information-Security-Fact-Sheet-July-2019.pdf.
---------------------------------------------------------------------------
    The GGEs have been viewed as the best tool to achieve 
success--albeit incremental--at the UN on democratic digital 
standards.\220\ However, contrary to that view, the report by 
the GGE established in 2012 was favorably referenced by the 
China-led SCO's Code of Conduct resolution several times in 
2015.\221\ According to Sarah McKune, Senior Legal Advisor at 
the Citizen Lab, SCO states looked favorably on that GGE's 
report because of the ``recognition of sovereignty and 
territoriality in the digital space.''\222\ The SCO's newfound 
appreciation for the 2012-13 GGE in their resolution may have 
led to the increased disputes in a later GGE--the 2016-2017 
GGE--that collapsed discussions and prevented the Group from 
issuing a consensus report at its conclusion.\223\ Following 
the 2016-17 GGE dissipation, the United States led a resolution 
to authorize the creation of a new 2019-21 GGE, which continues 
to meet periodically and is expected to conclude in May 
2021.\224\
---------------------------------------------------------------------------
    \220\ See, e.g., John Sullivan, Deputy Secretary of State, Remarks 
at the ``Second Ministerial Meeting on Advancing Responsible State 
Behavior in Cyberspace,'' New York, New York, Sept. 23, 2019.
    \221\ ``Letter Dated 9 January 2015 from the Permanent 
Representatives of China, Kazakhstan, Kyrgyzstan, the Russian 
Federation, Tajikistan, and Uzbekistan to the United Nations Addressed 
to the Secretary-General (91)'' U.N. General Assembly, 69th Session, 
Jan. 13, 2015, https://undocs.org/A/69/723; See, e,g,. Sarah McKune, 
``An Analysis of the International Code of Conduct for Information 
Security,'' The Citizen Lab, Munk School of Global Affairs and Public 
Policy, University of Toronto, Sept. 28, 2015, https://citizenlab.ca/
2015/09/international-code-of-conduct/.
    \222\ Sarah McKune, ``An Analysis of the International Code of 
Conduct for Information Security,'' The Citizen Lab, Munk School of 
Global Affairs and Public Policy, University of Toronto, Sept. 28, 
2015, https://citizenlab.ca/2015/09/international-code-of-conduct/.
    \223\ Elaine Korzak, ``UN GGE on Cybersecurity: The End of an 
Era?,'' The Diplomat, July 21, 2017.
    \224\ United Nations, ``Group of Government Experts,'' Dec. 2018, 
https://www.un.org/disarmament/group-of-governmental-experts/; Alex 
Grigsby, ``The United Nations Doubles Its Workload on Cyber Norms, and 
Not Everyone Is Pleased,'' Council on Foreign Relations, Nov. 15, 2018.
---------------------------------------------------------------------------
    In addition to the GGEs, China may find another short-term 
mechanism to push its agenda of digital authoritarianism in the 
Open-Ended Working Group (OEWG). In December 2018, the UN 
General Assembly adopted the formation of the Internet-focused 
OEWG that Russia proposed.\225\ The OEWG was supposedly 
convened ``with a view to making the United Nations negotiation 
process on security in the use of information and 
communications technologies more democratic, inclusive and 
transparent.''\226\ To some, the establishment of the OEWG 
could be an avenue whereby China, Russia, and their SCO allies 
can challenge the progress made by the GGEs and attempt to 
influence the United Nations in favor of their more 
authoritarian digital policies.\227\
---------------------------------------------------------------------------
    \225\ Alex Grigsby, ``The United Nations Doubles Its Workload on 
Cyber Norms, and Not Everyone Is Pleased,'' Council on Foreign 
Relations, Nov. 15, 2018; Elaine Korzak, ``What's Ahead in the Cyber 
Norms Debate?,'' Lawfare, Mar. 16, 2020, https://www.lawfareblog.com/
whats-ahead-cyber-norms-debate.
    \226\ U.N. General Assembly, Resolution Adopted by the General 
Assembly on 5 December 2018 (96), 73rd Session, Agenda item 96 (Dec. 
11, 2018), https://www.un.org/en/ga/search/view--doc.asp?symbol=A/RES/
73/27.
    \227\ Emilio Iasiello, ``OEWG or GGE--Which Has the Best Shot of 
Succeeding?'' Technative, Dec. 5, 2019, https://www.technative.io/oewg-
or-gge-which-has-the-best-shot-of-succeeding/.
---------------------------------------------------------------------------
World Trade Organization
    In addition to leveraging its global influence to shape 
international cyberspace guidelines at the UN, China also seeks 
to use its influence to subvert World Trade Organization 
regulations and norms on digital commerce. In contrast to the 
United States' focus on addressing digital trade issues, China 
appears unwilling to come to an agreement at the WTO over what 
digital trade agreements should look like, intending to halt 
decisions that, if enacted, could encroach on its domestic 
digital governance.\228\ China prefers that data flows and data 
storage be subjects for exploratory discussions, rather than 
commitments.\229\ Further, as Nigel Cory at the Information 
Technology and Innovation Foundation argued, ``China's approach 
to digital trade is largely focused on applying existing WTO 
rules (which are increasingly irrelevant) and a few narrow, 
non-binding technical provisions.''\230\
---------------------------------------------------------------------------
    \228\ See, e.g., Nigel Cory, Why China Should be Disqualified from 
Participating in WTO Negotiations on Digital Trade Rules, Information 
Technology and Innovation Foundation (Mar. 2019), https://itif.org/
publications/2019/05/09/why-china-should-be-disqualified-participating-
wto-negotiations-digital.
    \229\ Congressional Research Service, Internet Regimes and WTO E-
Commerce Negotiations, at 35, Jan. 28, 2020.
    \230\ Nigel Cory, Why China Should be Disqualified from 
Participating in WTO Negotiations on Digital Trade Rules, Information 
Technology and Innovation Foundation (Mar. 2019), https://itif.org/
publications/2019/05/09/why-china-should-be-disqualified-participating-
wto-negotiations-digital.
---------------------------------------------------------------------------
    Most existing rules related to digital trade have not been 
updated since the United Nations Commission on International 
Trade Law (UNCITRAL) Model Law on Electronic Commerce in 1996, 
almost 25 years ago.\231\ The Chinese government employs the 
current, broad rules to its advantage. One example of this is 
China's heavy emphasis on data localization, which governments 
can use to increase control of, and capture more value from, 
data produced within national borders.\232\
---------------------------------------------------------------------------
    \231\ Id.; United Nations Commission on International Trade Law, 
UNCITRAL Model Law on Electronic Commerce (1996) with additional 
article 5 bis as adopted in 1998, https://uncitral.un.org/en/texts/
ecommerce/modellaw/electronic--commerce (last visited June 15, 2020).
    \232\ See, e.g., ``Data Governance Part One: Emerging Data 
Governance Practices,'' Foreign Policy, May 13, 2020.
---------------------------------------------------------------------------
    The effects of China's protectionism on global trade are 
concerning because, as Daniel Castro and Alan McQuinn at the 
Information Technology and Innovation Foundation wrote in 2015, 
data protectionism like what is practiced by China threatens:


        [N]ot just the productivity, innovation, and 
        competiveness of tech companies, but all companies with 
        an international presence. In today's global economy, 
        it is common for businesses to process data from 
        customers, suppliers, and employees outside the 
        company's home country. Data protectionism makes such 
        data processing much more difficult, if not 
        impossible.\233\
---------------------------------------------------------------------------
    \233\ Daniel Castro & Alan McQuinn, Cross-Border Data Flows Enable 
Growth in All Industries, Information Technology & Innovation 
Foundation, at 9 (Feb. 2015), http://www2.itif.org/2015-cross-border-
data-flows.pdf. See also Matthieu Pelissie du Rausas et al., ``Internet 
matters: The Net's sweeping impact on growth, jobs, and prosperity,'' 
McKinsey and Company, May 2011, http://www.mckinsey.com/insights/high--
tech--telecoms--internet/internet--matters.

World Internet Conference
    Eager to establish its technical prowess on the world 
stage, China decided to launch its own global digital 
technology conference in 2014, which was hosted by the 
Cyberspace Administration of China.\234\ Titled the ``World 
Internet Conference,'' its goal was to ``help build a 
cyberspace community with a consensual shared destiny and an 
ethic of respecting differences.''\235\
---------------------------------------------------------------------------
    \234\ World Internet Conference, ``2014 WIC Overview,'' Nov. 12, 
2015, http://www.wuzhenwic.org/2015-11/12/c--46284.htm.
    \235\ Id.
---------------------------------------------------------------------------
    One of the Chinese government's goals in this first 
conference was to have attendees sign the ``Wuzhen 
Declaration,'' a nine-point document that echoed several 
official Chinese government goals, which they hoped would 
become the consensus of the attendees.\236\ However, events did 
not go according to plan. As reported by the Wall Street 
Journal, the draft:
---------------------------------------------------------------------------
    \236\ Catherine Shu, ``China Tried To Get World Internet Conference 
Attendees To Ratify This Ridiculous Draft Declaration,'' TechCrunch, 
Nov. 21, 2014, https://techcrunch.com/2014/11/20/
worldinternetconference-declaration/;World Internet Conference, ``Draft 
Wuzhen Declaration,'' Nov. 21 2014, https://www.scribd.com/document/
247566581/World-Internet-Conference-Draft-Declaration.


        [W]as slipped around the midnight hour Friday under the 
        hotel room doors of attendees. It appeared to largely 
        reflect a singular view: the watchful language used by 
        Chinese President Xi Jinping. Chinese officials had 
        argued at the two-day meeting of Chinese officials and 
        local and foreign Internet executives that Beijing 
        should have sovereignty over the Internet in China and 
        must keep it under tight control.\237\
---------------------------------------------------------------------------
    \237\ James T. Arredy, ``China Delivers Midnight Internet 
Declaration Offline,'' The Wall Street Journal, Nov. 21, 2014.


    The plan to push an agreement through at the last minute 
was not successful, and the Wall Street Journal reported that 
at the end of the conference, the Wuzhen Declaration ``was left 
unmentioned in the final speeches.''\238\
---------------------------------------------------------------------------
    \238\ Id.
---------------------------------------------------------------------------
    The next year, President Xi attended the second World 
Internet Conference in person.\239\ There, Xi used his opening 
remarks to lament the failures of the current system of 
Internet governance and argue that the world should ``respect 
the right of individual countries to independently choose their 
own path of cyber development, model of cyber regulation and 
Internet public policies, and participate in international 
cyberspace governance on an equal footing.''\240\
---------------------------------------------------------------------------
    \239\ Adam Segal, ``China's Internet Conference: Xi Jinping's 
Message to Washington,'' Council on Foreign Relations, Dec. 16, 2015.
    \240\ Xi Jinping, President of the People's Republic of China, 
Remarks at the ``Opening Ceremony of the Second World Internet 
Conference,'' Wuzhen, China, Dec. 16, 2015, https://www.fmprc.gov.cn/
mfa--eng/wjdt--665385/zyjh--665391/t1327570.shtml; See also Adam Segal, 
``Chinese Cyber Diplomacy in a New Era of Uncertainty,'' Hoover 
Institution, June 2017, at 9, https://www.hoover.org/sites/default/
files/research/docs/segal--chinese--cyber--diplomacy.pdf.
---------------------------------------------------------------------------
    The participation of international technology companies at 
the World Internet Conference has also been a key aspect of 
China's efforts within this fora, although companies' 
involvement in the conference has been controversial. According 
to the World Internet Conference's official website, 
``prominent Internet figures from nearly 100 countries'' have 
attended the conferences, including representatives from 
technology companies.\241\ Such participation drew criticism 
from Roseann Rife, the East Asia Research Director at Amnesty 
International, who has long called for technology companies to 
reject China's Internet rules, stating that ``Chinese 
authorities are trying to rewrite the rules of the internet so 
censorship and surveillance become the norm everywhere.''\242\
---------------------------------------------------------------------------
    \241\ World Internet Conference, ``World Internet Conference 
Overview of WIC,'' Nov. 10, 2015, http://www.wuzhenwic.org/2015-11/10/
c--46113.htm (last visited July 10, 2020). See also Adam Segal, 
``Chinese Cyber Diplomacy in a New Era of Uncertainty,'' Hoover 
Institution, June 2017, at 10, https://hvr.co/374oSiA.
    \242\ Amnesty International, Asia and the Pacific, Internet and 
Social Media, ``Tech Companies Must Reject China's Repressive Internet 
Rules,'' Dec. 15, 2015, https://www.amnesty.org/en/latest/news/2015/12/
tech-companies-must-reject-china-repressive-internet-rules/ (last 
visited July 10, 2020).
---------------------------------------------------------------------------
    Fortunately for the defenders of a free and open Internet, 
China has not achieved its goals through the World Internet 
Conference. According to Adam Segal, ``[d]espite a significant 
investment of time, money, and political capital, the reach and 
influence of the World Internet Conference remain limited to 
China's friends. Most of the heads of government that have 
attended are from small states or the SCO.''\243\
---------------------------------------------------------------------------
    \243\ Adam Segal, ``Chinese Cyber Diplomacy in a New Era of 
Uncertainty,'' Hoover Institution, June 2017, at 1, https://
www.hoover.org/sites/default/files/research/docs/segal--chinese--
cyber--diplomacy.pdf. SCO referenced in the quote is the Shanghai 
Cooperation Organization.
---------------------------------------------------------------------------
    But China does not appear deterred. The 7th World Internet 
Conference, tentatively scheduled for the fourth quarter of 
2020, is titled the ``Light of Internet'' Expo.\244\ The press 
release announcing the conference says it is ``expected to be a 
grand event for showcasing the latest technologies, products 
and applications around the world.''\245\
---------------------------------------------------------------------------
    \244\ World Internet Conference, ``Fore-Notice on The Light of 
Internet Expo in the 7th World Internet Conference,'' Apr. 08 2020, 
http://www.wuzhenwic.org/2020-04/08/c--469136.htm.
    \245\ Id.
---------------------------------------------------------------------------
International Standards-Setting Bodies
    Another realm that China seeks to influence, along with the 
major multilateral institutions, is global ICT standards-
setting bodies. Global ICT rules of the road are set by several 
organizations, one of which is the 3rd Generation Partnership 
Project (3GPP), a private sector partnership composed of seven 
telecommunications standards development organizations.\246\ 
3GPP examines the range of technologies that make up mobile 
telecommunications, including radio access, core networks, 
cellular technologies, and services.\247\ According to the 
U.S.-China Commission, ``[t]he number of Chinese 
representatives serving in chair or vice chair leadership 
positions [in the 3GPP] rose from 9 of the 53 available 
positions in December 2012 to 11 of the 58 available positions 
in December 2017.''\248\ Due to this prominence in the 
organization's leadership, China has the capacity to influence 
the 3GPP to its advantage.\249\
---------------------------------------------------------------------------
    \246\ 3GPP, ``About 3GPP,'' https://www.3gpp.org/about-3gpp (last 
visited July 6, 2020).
    \247\ Id.
    \248\ U.S.-China Economic and Security Review Commission, 2018 
Annual Report to Congress, at 455 (Nov. 2018).
    \249\ Id.
---------------------------------------------------------------------------
    Another entity heavily influenced by the Chinese is the 
International Telecommunications Union (ITU). According to its 
website, ITU ``help[s] shape the future ICT policy and 
regulatory environment, global standards, and best practices to 
help spread access to ICT services.''\250\ Since 2014, the 
Secretary-General of the ITU has been Houlin Zhao, a former 
delegate at the Designing Institute of the Ministry of Posts 
and Telecommunications of China.\251\ In addition to a former 
Chinese official being at the head of the ITU, Chinese firms 
and government research institutes held the largest number of 
chair and vice chair positions in the ITU's 5G-related 
standards-setting bodies, with eight of the 39 available 
leadership positions as of September 2018.\252\ According to 
Michael O'Rielly of the U.S. Federal Communications Commission, 
the Chinese ``have loaded up the voting to try to get their 
particular candidates on board, and their particular 
standards.''\253\
---------------------------------------------------------------------------
    \250\ International Telecommunication Union, ``About International 
Telecommunication Union (ITU),'' Feb. 19, 2020, https://www.itu.int/en/
about/Pages/default.aspx.
    \251\ International Telecommunications Union, ``Biography--Houlin 
Zhao,'' (last visited July 6, 2020), https://www.itu.int/en/osg/Pages/
biography-zhao.aspx.
    \252\ U.S.-China Economic and Security Review Commission, 2018 
Annual Report to Congress, at 454 (Nov. 2018).
    \253\ Todd Shields & Alyza Sebenius, ``Huawei's Clout Is So Strong 
It's Helping Shape Global 5G Rules,'' Bloomberg, Feb. 1, 2019.
---------------------------------------------------------------------------
    Furthermore, it appears that as the head of the ITU, 
Secretary-General Zhao has used his position to strengthen 
China's digital influence around the world. The ITU-China 
agreement on aiding countries with communications networks 
resulted in ITU-China specific projects such as research and 
training centers for ICT in Afghanistan, a Trans-Eurasian 
Information Superhighway, and research and construction 
projects in Africa.\254\ Secretary-General Zhao told China 
Daily that it is ``highly likely'' that he would sign another 
deal with the Export-Import Bank of China, and that working 
with China is critical for the ITU.\255\ Finally, he added that 
China's Belt and Road is the perfect platform ``to deliver 
services and help with ICT development around the globe by 
cooperating with China through the Initiative.''\256\
---------------------------------------------------------------------------
    \254\ Kong Wenzheng, ``ITU Vows to Join Hands with China,'' China 
Daily, May 24, 2019, www.chinadaily.com.cn/a/201904/24/
WS5cbfbb1aa3104842260b7f2f.html.
    \255\ Id.
    \256\ Id.
---------------------------------------------------------------------------
    Zhao Yonghong, Director-General of the Department of 
International Cooperation in the Ministry of Industry and 
Information Technology of the People's Republic of China, 
offered additional context on China's role in the ITU in 
September 2018. Zhao stated that the ITU should focus on 
``[s]trengthen[ing] the leading role of ITU in ICT technical 
standardization and further enhanc[ing] its influence in the 
field of global standardization of emerging ICT 
technologies.''\257\ In fact, in 2012, China--along with other 
authoritarian regimes, like Russia and Saudi Arabia--introduced 
a proposal at the World Conference on International 
Telecommunications making ITU jurisdiction over the Internet 
more powerful.\258\ Given China's leadership at the ITU, this 
proposal could strengthen China's control of the Internet.
---------------------------------------------------------------------------
    \257\ ``Top Contributors: Why China Supports ITU,'' ITU News, Sept. 
20 2018, news.itu.int/top-contributors-why-china-supports-itu/.
    \258\ Chris Welch, ``Russia, China, and Other Nations Draft 
Proposal to Give ITU Greater Influence Over the Internet,'' The Verge, 
Dec. 9 2012; Adi Robertson, ``New World Order: is the UN about to take 
control of the internet?,'' The Verge, Nov. 29, 2012.
---------------------------------------------------------------------------
    China's strategy of using multilateral institutions to its 
advantage appears to have paid off at the ITU. Evidence of this 
success includes not only Zhao's support of Huawei, which in 
2019 he defended against the United States' 5G security 
concerns by calling them driven by politics rather than 
evidence, but also China's ushering in of the proposed ``New 
Internet Protocol'' (New IP).\259\ Some nations, including the 
United Kingdom, Sweden, and the United States, have raised 
concerns that China's New IP plan, if enacted, would fracture 
the global Internet and give state-run Internet Service 
Providers too much control.\260\ The Financial Times reports 
that Huawei and other co-developers of New IP plan to promote 
the proposal at an ITU telecommunication conference in India in 
November 2020.\261\ Zhao, as the head of the ITU, could 
influence whether the New IP is ratified.
---------------------------------------------------------------------------
    \259\ Tom Miles, ``Huawei Allegations Driven by Politics Not 
Evidence: U.N. Telecoms Chief,'' Reuters, Apr. 5 2019; Anna Gross & 
Madhumita Murgia, ``China and Huawei Propose Reinvention of the 
Internet,'' Financial Times, Mar. 27 2020.
    \260\ Anna Gross & Madhumita Murgia, ``China and Huawei Propose 
Reinvention of the Internet,'' Financial Times, Mar. 27 2020.
    \261\ Id.
---------------------------------------------------------------------------
    However, there does appear to be some hope for democracies 
in the global battleground over control of international 
standards-setting bodies. In March 2020, the World Intellectual 
Property Organization--the United Nations organization created 
to lead the development of a balanced and effective 
international IP system--announced that Daren Tang, a Singapore 
national, won the nomination to become the new Director 
General.\262\ Tang, who had the backing of the United States, 
was congratulated upon his election by Secretary Pompeo, who 
described him as ``an effective advocate for protecting 
intellectual property [and] a vocal proponent of transparency 
and institutional integrity.''\263\
---------------------------------------------------------------------------
    \262\ Nick Cummings-Bruce, ``U.S.-Backed Candidate for Global Tech 
Post Beats China's Nominee,'' The New York Times, Mar. 4, 2020. See 
also The World Intellectual Property Organization, ``What Is WIPO?'' 
www.wipo.int/about-wipo/en/ (Last Visited May 21, 2020).
    \263\ Press Statement, U.S. Secretary of State Michael R. Pompeo, 
``Election of Daren Tang of Singapore as Director General of the World 
Intellectual Property Organization,'' Mar. 4 2020; Nick Cummings-Bruce, 
``U.S.-Backed Candidate for Global Tech Post Beats China's Nominee,'' 
The New York Times, Mar. 4, 2020.
---------------------------------------------------------------------------
    The contest between Tang and his main opponent, the China-
backed candidate Wang Binying, was a battle in the global 
digital arena between the United States and China.\264\ In this 
case, and in what many hope will be an indication of future 
outcomes in the global competition between freedom and 
surveillance, the ideals of transparency and international 
cooperation won the day.
---------------------------------------------------------------------------
    \264\ Nick Cumming-Bruce, ``U.S.-Backed Candidate for Global Tech 
Post Beats China's Nominee,'' The New York Times, Mar. 4. 2020.



               Chapter 4: Conclusions and Recommendations

                              ----------                              

    China's new model of digital authoritarianism, its 
international efforts to assert economic dominance in the 
digital domain, and its promotion of the adoption of a Chinese-
inspired model of digital governance abroad, show its desire to 
alter and control the future of the digital domain. As 
described in Chapter 1, China is altering and controlling the 
digital domain domestically. It has developed and employed 
emerging technologies and techniques, ranging from blocking 
online content to utilizing facial recognition technologies 
that strengthen its surveillance systems, in order to suppress 
populations, individuals, and entities not aligned with the 
Chinese Communist Party (CCP).
    While the CCP's use of the digital domain to maintain 
social control is problematic for those suffering in China, 
China's growing digital influence on the global stage creates a 
broader problem for the international community as China 
proliferates its technologies at a rapid rate around the globe, 
and in countries that span the spectrum of governance. As shown 
in Chapter 2, even countries that are staunch U.S. allies and 
stand for similar democratic and human rights values are 
entertaining the integration of Chinese technologies into their 
own digital infrastructures, such as 5G telecommunications, due 
to low costs, lack of viable alternatives, uncertainty about 
the future direction of the United States, and China's robust 
economic and diplomatic efforts.\265\ As demonstrated in 
Chapter 3, China is leveraging its newfound influence to shape 
the rules of the road for the digital domain in ways that cater 
to digital authoritarianism and is antithetical to the United 
States' vision of how the Internet and cyber-enabled 
technologies should be used.
---------------------------------------------------------------------------
    \265\ Heather Stewart & Dan Sabbagh, ``UK Huawei Decision Appears 
to Avert Row with US,'' The Guardian, Jan. 28, 2020.
---------------------------------------------------------------------------
    Indeed, three and a half years into the Trump 
administration, the United States is now on the precipice of 
losing the future of the cyber domain to China. If China 
continues to perfect the tools of digital authoritarianism and 
is able to effectively implement them both domestically and 
abroad, then China, not the United States and its allies, will 
shape the digital environment in which most of the world 
operates. Additionally, if the United States continues to cede 
its traditional role of diplomatic and technological 
leadership, the global growth of China's digital 
authoritarianism model presents a sinister future for the 
digital domain. At the grand strategic scale, if digital 
authoritarianism flourishes, China's importance on both the 
digital and global stages will continue to grow, allowing China 
to surpass the United States in the digital space and 
empowering China to create the future rules for digital 
governance.\266\
---------------------------------------------------------------------------
    \266\ See, e.g., John Chen et al., China's Internet of Things, 
Research Report Prepared on Behalf of the U.S.-China Economic and 
Security Review Commission, by SOS International (SOSi), at 69 (Oct. 
2018).
---------------------------------------------------------------------------
    The spread of digital authoritarianism may also affect the 
United States' relationships with other countries as they 
determine how to balance their relationships with China, 
especially in the face of growing pressure to mirror China's 
authoritarian behavior in the digital domain. Furthermore, the 
basic human rights of individuals around the world, including 
U.S. citizens, could be negatively affected by a cyber domain 
that is reliant on Chinese technologies and values. As seen in 
places such as Xinjiang, personal privacy and civil liberties 
are threatened by China's digital authoritarianism model.\267\ 
The global proliferation of China's digital authoritarianism 
model, if unchecked, will see even more individuals fall under 
the control of authoritarians who use these technologies and 
techniques.
---------------------------------------------------------------------------
    \267\ See, e.g., Lindsay Maizland, ``China's Repression of Uighurs 
in Xinjiang,'' Council on Foreign Relations, updated June 30, 2020, 
https://www.cfr.org/backgrounder/chinas-repression-uighurs-xinjiang; 
U.S. Department of State, 2018 Report on International Religious 
Freedom: China: Xinjiang, May 23, 2019, available at https://
www.state.gov/reports/2018-report-on-international-religious-freedom/
china-includes-tibet-xinjiang-hong-kong-and-macau/xinjiang/.
---------------------------------------------------------------------------
    Despite China's various gains within the digital domain, 
such as its emerging technical capabilities and growing 
economic strength, there is still significant opportunity for 
the United States to adopt a genuinely competitive strategy and 
approach to China, to remain the global leader on cyberspace 
governance, and to reassert its leadership in areas where the 
technological gap between the United States and China has 
shrunk or disappeared. Accomplishing these goals will mark an 
important step in competing with China's digital 
authoritarianism, as opposed to merely denouncing it. Achieving 
the goal of securing a free digital domain and mitigating the 
threat of digital authoritarianism, however, will require a 
whole-of-government approach that leverages all aspects of the 
U.S. government, the private sector, and, critically, genuine 
partnerships with our partners and allies on the world stage. 
The Administration's current policy, which is detailed in Annex 
1 of this report, is insufficient to combat China's digital 
authoritarianism, and its alienation of allies has further 
stunted the United States' ability to influence other countries 
away from China's digital authoritarianism model.
=======================================================================


                            Recommendations

    This report offers the following recommendations for more 
effective U.S. action to counter China's digital 
authoritarianism.


  Develop and Deploy Alternatives to Chinese 5G Technology with 
        U.S. Allies: The United States lags behind China in 
        developing and deploying cutting-edge 5G technologies, 
        both domestically and abroad.\268\ To provide an 
        alternative, the U.S. should:
---------------------------------------------------------------------------
    \268\ Stu Woo, ``In the Race to Dominate 5G, China Sprints Ahead,'' 
The Wall Street Journal, Sept. 7, 2019.

   Establish a Federally Funded Research and Development 
        Center (FFRDC) on 5G: Congress should pass legislation 
        to establish an FFRDC that will examine how the United 
        States can surpass China in the 5G development space. 
        The FFRDC should examine U.S. technological strengths 
        and weaknesses, as well as areas for immediate 
        telecommunications development to provide an 
---------------------------------------------------------------------------
        alternative to Chinese platforms and technologies.

   Create an Industry Consortium on 5G: Congress should create 
        a consortium comprised of leading U.S. 
        telecommunications and technology companies that would 
        be mandated to create the American 5G 
        telecommunications alternative, exploring both cost-
        effective hardware and software solutions.

   Invest in Radio Access Network (RAN) Technologies: Congress 
        should provide new appropriations for RAN 
        technologies.\269\
---------------------------------------------------------------------------
    \269\ ``What are Radio Access Networks and 5G RAN?,'' Verizon, Feb. 
2, 2020, https://www.verizon.com/about/our-company/5g/5g-radio-access-
networks (last visited July 10, 2020). According to Verizon, ``[c]ell 
phones use radio waves to communicate by converting your voice and data 
into digital signals to send through as radio waves. In order for your 
cell phone to connect to a network or the internet, it connects first 
through a radio access network (RAN). Radio access networks utilize 
radio transceivers to connect you to the cloud. Most base stations (aka 
transceivers) are primarily connected via fiber backhaul to the mobile 
core network.'' Id.

   Establish a 5G Policy Coordinator within the White House: 
        The President should establish the position of a 5G 
        Policy Coordinator tasked with coordinating the U.S. 
---------------------------------------------------------------------------
        government's domestic and international 5G strategy.

  Limit the Spread of Malign Chinese Surveillance Technologies 
        and Digital Authori-tarianism: China is a leading 
        developer and exporter of surveillance technologies, 
        and continues to integrate new technologies that 
        provide increasingly intrusive surveillance 
        capabilities that can be misused by China or other 
        state actors.

   Establish a Digital Rights Promotion Fund: Congress should 
        establish and authorize a Digital Rights Promotion 
        Fund, which will provide grants and investments 
        directly to entities that support the promotion of a 
        free, secure, stable, and open digital domain and fight 
        against the authoritarian use of information and 
        communications technologies. The fund will provide 
        these groups, especially those existing in countries 
        experiencing undue surveillance or other forms of 
        digital authoritarianism, the resources needed to 
        better push back against the spread of digital 
        authoritarianism. Groups able to receive money would 
        include:

     Local activist organizations  promoting a free 
            digital domain and working to counter oppressive 
            surveillance regimes in countries where digital 
            authoritarianism is apparent or on the rise.
     Nonprofit organizations  that advocate for the 
            adoption of international governance standards for 
            the digital domain based on openness, transparency, 
            and the rule of law, including the protection of 
            human rights.

     Think tanks and other institutional bodies  
            that provide scholarship and policy recommendations 
            for best paths forward to protect against the rise 
            of authoritarian surveillance.

   Establish an International Digital Infrastructure 
        Corporation:  Congress should establish an independent, 
        non-profit corporation with a clear and specific 
        mandate to provide foreign countries with low-interest 
        loans, grants, and other financing opportunities to 
        purchase and implement U.S.-made digital 
        infrastructure.

   Authorize the Open Technology Fund:  Congress should fully 
        authorize funds for the Open Technology Fund by passing 
        S. 3820, the Open Technology Fund Authorization Act 
        sponsored by Senators Robert Menendez, Marsha 
        Blackburn, Ron Wyden, and Rick Scott.

  Strengthen the U.S. Digital Workforce:  In order to compete 
        and lead the digital space in the future, the United 
        States will need an adaptable, innovative, and capable 
        cyber workforce.

   Establish a Cyber Service Academy:  Through legislative 
        action, Congress should establish a new federal service 
        academy similar to our other military service 
        academies, with the specific aim of developing the 
        future of our technology force. In addition to 
        providing students a four year undergraduate education, 
        the academy shall prepare students to become future 
        military leaders in key digital and emerging technology 
        fields, including robotics, artificial intelligence 
        (AI), and cybersecurity.

   Boost funding for STEM programs:  Congress should 
        significantly increase federal spending on STEM 
        programs, including Department of Defense (DoD) funding 
        in the National Defense Education program, funding for 
        the National Science Foundation, and funding for the 
        Minority Science and Engineering Improvement program 
        within the Department of Education.

  Reinvigorate U.S. Diplomatic Leadership and Alliances, and 
        Take a More Robust Role on the International Stage:  
        China has made a concerted effort to change norms and 
        practices to strengthen its position in various 
        international fora regarding the digital domain.\270\ 
        China has additionally pushed economic development 
        relating to technology in critical regions throughout 
        the world.\271\
---------------------------------------------------------------------------
    \270\ John Chen et al., China's Internet of Things, Research Report 
Prepared on Behalf of the U.S.-China Economic and Security Review 
Commission, by SOS International (SOSi), at 69 (Oct. 2018).
    \271\ Id.

   Build a Coalition of Likeminded Allies on Critical 
        Technology Issues:  The President should lead an 
        international effort, in coordination with our allies 
        and partners, to counter Chinese efforts to develop and 
        proliferate digital domain products, technologies, and 
        services that are not predicated on free, democratic 
---------------------------------------------------------------------------
        values.

   Establish Mutual Cyber Defense Agreements:  The United 
        States should approach likeminded nations to develop 
        and establish mutual cyber defense and cooperation 
        agreements that ensure national critical 
        infrastructure, secure communications, trade 
        relationships, and civil liberties are protected 
        against cyber-attacks.
   Reassert U.S. Leadership in International Fora:  The 
        President should establish a strategy for ensuring the 
        United States holds chairmanships, serves as a leading 
        voice, and operates as a key player in international 
        fora such as the International Telecommunications Union 
        or UN Group of Governmental Experts.

   Establish and Empower New Cyber Leadership within the State 
        Department:  Congress should pass the Cyber Diplomacy 
        Act of 2019, or similar legislation, that establishes a 
        new office or bureau of cyber issues at the State 
        Department, which shall report to the Under Secretary 
        for Political Affairs.


=======================================================================




                   Annex 1: Understanding the Trump 
                           Cyberspace Policy

                              ----------                              

    The United States is at a crossroads in regards to 
countering the implementation and growth of digital 
authoritarianism led by the regime in China. China's efforts to 
bring about the rise of digital authoritarianism hold the 
potential to fundamentally alter the landscape of information 
and communications technologies, as well as the legal and 
institutional underpinnings of these digital technologies, in 
ways that are incongruent with U.S. values and detrimental to 
U.S. and allied economic and security interests. Issues ranging 
from Chinese domination of the global information 
infrastructure and taking advantage of communications 
vulnerabilities, to using new technologies to assault basic 
human rights, to inhibiting U.S. economic and business 
opportunities abroad because of unreliable and exposed digital 
networks are all on the table if digital authoritarianism 
continues to proliferate unfettered.
    It is imperative for the United States to perform its role 
as the leading force in developing, sustaining, and 
promulgating a global digital order based on openness, 
transparency, and the rule of law, including the protection of 
human rights. If the United States and other democratic 
countries are unable or unwilling to work to reverse the 
concerning trend of China's rising digital authoritarianism, we 
will cede the future of the global digital order to China and 
other authoritarian regimes. This annex examines President 
Trump and his Administration's efforts and policies, as well as 
recent Congressional actions, regarding cyberspace and whether 
these actions effectively curb China's digital 
authoritarianism.
National Security Policy Documents
    In September 2018, the Trump administration released its 
National Cyber Strategy (NCS). As a foundational policy 
document for the Administration, the NCS sets the stage for how 
the United States views the current climate within the cyber 
domain and how, broadly, they tackle issues that arise. The 
Trump administration frames the cyber domain as one where the 
United States is ``in a continuous competition against 
strategic adversaries, rogue states, and terrorist and criminal 
networks.''\272\ Such a characterization builds upon the 
labeling in the Trump administration's National Security 
Strategy (NSS), which describes China's exploitation of data 
and its alleged attempts to spread features of its 
authoritarian system, including corruption and the use of 
surveillance technology.\273\
---------------------------------------------------------------------------
    \272\ President Donald J. Trump, National Cyber Strategy of the 
United States of America, The White House, Sept. 2018, at 2.
    \273\ Congressional Research Service, Research Conducted for 
Committee Staff, Sept. 30, 2019.
---------------------------------------------------------------------------
    By framing China and the cyber domain this way, the Trump 
administration fits the issues contained in cyberspace within 
one of the principal characteristics of its national security 
strategy: that the United States is in a great-power 
competition with key adversaries. The NCS proceeds to 
specifically label China as one of the entities that is 
challenging the United States within the cyber domain.\274\ 
While the document falls short of directly identifying the 
Chinese Communist Party's use of digital authoritarianism as a 
national security threat, the NCS articulates a need to defend 
against authoritarian states utilizing security or terrorism 
concerns to erode a free and secure Internet.\275\
---------------------------------------------------------------------------
    \274\ President Donald J. Trump, National Cyber Strategy of the 
United States of America, The White House, Sept. 2018, at 2.
    \275\ Id., at 24.
---------------------------------------------------------------------------
    The NCS breaks U.S. cyber strategy into four pillars. These 
pillars are:


 1. Protect the American People, the Homeland, and the American 
        Way of Life--involving issues such as protecting U.S. 
        networks, critical infrastructure, and data, combatting 
        crime, and pushing government innovation;

 2. Promote American Prosperity--including promoting America's 
        advantage in the digital economy, maintaining U.S. 
        leadership on cyber issues, and strengthening the U.S. 
        workforce;

 3. Preserve Peace through Strength--featuring deterring malign 
        cyber activities and enhancing norms of state behavior;

 4. Advance American Influence--containing extending a free and 
        interoperable Internet globally and building 
        international cyber capacity.\276\
---------------------------------------------------------------------------
    \276\ President Donald J. Trump, National Cyber Strategy of the 
United States of America, The White House, Sept. 2018, at 6, 8, 10, 14, 
16, 17, 20, 21, 24, 25, and 26; Congressional Research Service, 
Research Conducted for Committee Staff, Sept. 30, 2019.


    From these four platforms flow priority actions meant to 
target certain issues, ranging from building a proposed cyber 
deterrence initiative, to ``promot[ing] and maintain[ing] 
markets for United States ingenuity worldwide,'' to maintaining 
United States leadership in emerging technologies.\277\ Due to 
China's continued growth within the cyber domain, many of these 
priority actions in effect target digital authoritarianism in 
some way. For example, the NCS outlines a need to broadly 
engage global partners, international organizations, and civil 
society to protect Internet freedom and improve international 
cyber capacity.\278\ Critical to this effort is the need for 
the U.S. to reinforce the openness, interoperability, and 
reliability of the Internet.\279\ The plan calls for investment 
in the communications infrastructure and cybersecurity 
capacities of partner states to not only enhance the Cyber 
Deterrence Initiative, but also to ensure their Internet 
capabilities align with U.S. interests and standards of 
Internet freedom.\280\
---------------------------------------------------------------------------
    \277\ President Donald J. Trump, National Cyber Strategy of the 
United States of America, The White House, Sept. 2018, at 15, 21, 25.
    \278\ Id., at 25 and 26. According the National Cyber Strategy, 
cyber capacity building involves ``the United States build[ing] 
strategic partnerships that promote cybersecurity best practices 
through a common vision of an open, interoperable, reliable, and secure 
Internet that encourages investment and opens new economic markets. In 
addition, capacity building allows for additional opportunities to 
share cyber threat information, enabling the United States Government 
and our partners to better defend domestic critical infrastructure and 
global supply chains, as well as focus whole-of government cyber 
engagements.'' Id.
    \279\ Id., at 24.
    \280\ Id., at 21 and 26. Espoused in the Administration's 2018 
National Cyber Strategy, the Cyber Deterrence Initiative is an effort 
``to build such a coalition and develop tailored strategies to ensure 
adversaries understand the consequences of their malicious cyber 
behavior.'' To achieve this goal, ``the United States will work with 
like-minded states to coordinate and support each other's responses to 
significant malicious cyber incidents, including through intelligence 
sharing, buttressing of attribution claims, public statements of 
support for responsive actions taken, and joint imposition of 
consequences against malign actors.'' Id. at 21.
---------------------------------------------------------------------------
    There are other mechanisms espoused in the NCS that could 
play a role in combatting China's digital authoritarianism that 
are not explicitly linked to the topic. One such example is how 
a primary objective of ``promoting American prosperity'' in the 
NCS is to ``preserve U.S. influence in the technological 
ecosystem and the development of cyberspace as an open engine 
of economic growth, innovation, and efficiency.''\281\ The 
purpose of this objective is to ``foster a vibrant and 
resilient digital economy'' through prioritizing innovation and 
maintaining U.S. leadership in emerging technologies.\282\
---------------------------------------------------------------------------
    \281\ Id., at 14.
    \282\ Id., at 14-15; Congressional Research Service, Research 
Conducted for Committee Staff, Sept. 30, 2019.
---------------------------------------------------------------------------
    Another key issue put forth by the NCS to help the United 
States better compete in the digital marketplace and fight back 
against digital authoritarianism is strengthening its 
leadership on innovation and developing emerging 
technologies.\283\ One of the primary aspects for driving U.S. 
technological development leadership is to promote the free 
flow of data across borders that push against authoritarian 
governments' attempts to localize data under the guise of 
national security, and, along that vein, the NCS asserts that 
the Administration will promote ``open, industry driven 
standards, innovative products, and approaches that permit 
global innovation and the free flow of data while meeting the 
legitimate security needs of the U.S.''\284\ Additionally, the 
NCS aims to ensure the United States counters behavior that 
acts against U.S. interests, saying in its third pillar that 
the administration would use ``all appropriate tools of 
national power to expose and counter the flood of online malign 
influence and information campaigns and non-state propaganda 
and disinformation.''\285\
---------------------------------------------------------------------------
    \283\ Congressional Research Service, Research Conducted for 
Committee Staff, Sept. 30, 2019.
    \284\ Id.; President Donald J. Trump, National Cyber Strategy of 
the United States of America, The White House, Sept. 2018, at 14.
    \285\ Congressional Research Service, Research Conducted for 
Committee Staff, Sept. 30, 2019; President Donald J. Trump, National 
Cyber Strategy of the United States of America, The White House, Sept. 
2018, at 21.
---------------------------------------------------------------------------
Administration Efforts
    China continues to rapidly expand its digital 
authoritarianism model and make gains on the United States in 
becoming the dominant player on a range of critical 
technologies, placing U.S. leadership on cyber issues at risk. 
In response to the gains in Chinese technological development, 
the Trump administration has turned to punitive measures, using 
sanctions as a weapon against China. As China's technology 
sector begins to achieve global significance, several of its 
players have found themselves on the front lines of the U.S.-
China trade war and atop U.S. sanctions lists.\286\  Most 
notably, one of China's largest companies, Huawei, has been the 
target of U.S. sanctions and restrictions as the U.S. seeks to 
pre-empt potential cyber threats.\287\ The Trump administration 
has referred to Huawei as a national security threat, cited the 
telecommunications giant's close ties to the Chinese 
government, its repeated intellectual property theft, and its 
violations of U.S. sanctions on Iran as reasons for Huawei to 
be excluded from U.S. markets, and encouraged others to take 
similar steps.\288\
---------------------------------------------------------------------------
    \286\ Kiran Stacey et al., ``US blacklists 28 Chinese entities in 
trade war escalation,'' Financial Times, October 8, 2019; Ana Swanson, 
``U.S. Delivers Another Blow to Huawei With New Tech Restrictions,'' 
The New York Times, May 15, 2020.
    \287\ Ana Swanson, ``U.S. Delivers Another Blow to Huawei With New 
Tech Restrictions,'' The New York Times, May 15, 2020; Associated 
Press, ``US Adds New Sanction on Chinese Tech Giant Huawei,'' US News 
and World Report, May 16, 2020.
    \288\ Ana Swanson, ``U.S. Delivers Another Blow to Huawei With New 
Tech Restrictions,'' The New York Times, May 15, 2020; David Goldman, 
``What Did Huawei do to Land in Such Hot Water with the US?'' CNN, May 
20, 2019; Federal Communications Commission, ``FCC Bars Use of 
Universal Service Funding for Equipment and Services Posing National 
Security Risks,'' Nov. 22, 2019; Protecting Against National Security 
Threats to the Communications Supply Chain Through FCC Programs; Huawei 
Designation; ZTE Designation, 85 Fed. Reg. 27610, Jan. 3, 2020; Dan 
Strumpf & Patricia Kowsmann, ``U.S. Prosecutors Probe Huawei on New 
Allegations of Technology Theft,'' The Wall Street Journal, Aug. 29, 
2019; Julian E. Barnes and Adam Satariano, ``U.S. Campaign to Ban 
Huawei Overseas Stumbles as Allies Resist,'' The New York Times, Mar. 
17, 2019.
---------------------------------------------------------------------------
    Although U.S. suspicions of Huawei can be traced as far 
back as 2012, recent actions are supposedly meant to 
demonstrate a more aggressive U.S. posture towards the company 
and the Chinese technology sector as a whole.\289\ In May 2018, 
the Pentagon banned the sale of Huawei and ZTE phones on U.S. 
military bases.\290\ Later that year, Huawei's CFO (and 
daughter of its founder), Meng Wanzhou, was arrested in Canada 
at the United States' request for allegedly violating U.S. 
sanctions on Iran.\291\ On May 15, 2019, President Trump issued 
Executive Order 13873 on Securing the Information and 
Communications Technology and Services Supply Chain, which 
declared:
---------------------------------------------------------------------------
    \289\ Sean Keane, ``Huawei ban timeline: Uber rival hits AppGallery 
store as it moves towards self-sufficiency,'' CNET, June 25, 2020; Pam 
Benson, ``Congressional report: U.S. should 'view with suspicion' two 
Chinese companies,'' CNN, Oct. 8, 2012.
    \290\ Sean Keane, ``Huawei ban timeline: Uber rival hits AppGallery 
store as it moves towards self-sufficiency,'' CNET, June 25, 2020; 
Katie Collins, ``Pentagon bans sale of Huawei, ZTE phones on US 
military bases,'' CNET, May 2, 2018.
    \291\ Press Release, U.S. Department of Justice, ``Chinese 
Telecommunications Conglomerate Huawei and Huawei CFO Wanzhou Meng 
Charged with Financial Fraud,'' January 28, 2019; Dan Bilefsky, 
``Extradition Hearings Begin for Meng Wanzhou, Huawei Officer Held in 
Canada,'' The New York Times, Jan. 20, 2020.


        The threat of foreign adversaries to U.S. ICT 
        technologies--through creating and exploiting 
        vulnerabilities in technology and services, and ``the 
        unrestricted acquisition or use in the United States of 
        information and communications technology or services, 
        designed, developed, manufactured, or supplied by 
        persons owned by, controlled by, or subject to the 
        jurisdiction or direction of foreign adversaries''--
        constitutes an ``unusual and extraordinary threat to 
        the national security, foreign policy, and economy of 
        the United States.''\292\
---------------------------------------------------------------------------
    \292\ Congressional Research Service, Research Conducted for 
Committee Staff, Sept. 30, 2019; President Donald J. Trump, Executive 
Order on Securing the Information and Communications Technology and 
Services Supply Chain, The White House, May 15, 2018; U.S. Department 
of Commerce--Securing the Information and Communications Technology and 
Services Supply Chain, 84 Fed. Reg. 65316, Nov. 27, 2019.


    Following the Executive Order issuance, the United States 
in May 2019 placed Huawei and 68 of its affiliates on the 
Bureau of Industry and Security's Entity List via authorities 
in the Export Control Reform Act of 2018's Export 
Administration Regulations, and subsequently in August added 46 
additional entities, in an effort to restrict their access to 
U.S. markets.\293\ In May 2020, the administration unveiled new 
rules requiring foreign semiconductor makers to obtain a U.S. 
license to ship Huawei-designed semiconductors produced using 
U.S. technology to Huawei.\294\ More broadly, the United States 
has sought to mount pressure on allies and partners such as 
Germany and the UK to restrict Huawei equipment in their 5G 
infrastructure plans due to security concerns.\295\ These 
efforts, however, have produced mixed results at best, and may 
well have been counterproductive, at least in the short-term, 
as seen in Chapter 2 of this report.
---------------------------------------------------------------------------
    \293\ Addition of Certain Entities to the Entity List and Revision 
of Entries on the Entity List, 84 Fed. Reg. 43493, Aug. 21, 2019; 
Addition of Entities to the Entity List, 84 Fed. Reg. 22961, May 21, 
2019.
    \294\ Frank Bajak, ``US adds new sanction on Chinese tech giant 
Huawei,'' Associated Press, May 16, 2020.
    \295\ Julian E. Barnes & Adam Satariano, ``U.S. Campaign to Ban 
Huawei Overseas Stumbles as Allies Resist,'' The New York Times, March 
17, 2019.
---------------------------------------------------------------------------
    Unfortunately, contradictory U.S. policy implementation has 
hampered the impact of punitive measures to change China's 
behavior. This contradiction can be seen in the Commerce 
Department's provision of temporary licenses to Huawei despite 
the administration's stated need and previous actions for 
increasing scrutiny of Huawei transactions.\296\ The Commerce 
Department unveiled that the:
---------------------------------------------------------------------------
    \296\ Congressional Research Service, Research Conducted for 
Committee Staff, Sept. 30, 2019; Addition of Entities to the Entity 
List, 84 Fed. Reg. 22961, May 21, 2019.


        Bureau of Industry and Security (BIS) issued a 90-day 
        Temporary General License to allow for the completion 
        by August 19th of contracts entered into before May 
        16th. On August 15th, BIS issued an additional General 
        License to allow for some engagement with Huawei and 
        its affiliates to continue.\297\
---------------------------------------------------------------------------
    \297\ Congressional Research Service, Research Conducted for 
Committee Staff, Sept. 30, 2019; Temporary General License: Extension 
of Validity, Clarifications to Authorized Transactions, and Changes to 
Certification Statement Requirements, 84 Fed. Reg. 43487, August 21, 
2019; Addition of Certain Entities to the Entity List and Revision of 
Entries on the Entity List, 84 Fed. Reg. 43493, Aug. 21, 2019.


    While a variety of factors enter into how BIS decides 
whether a company should receive certain export or transfer 
waivers, the provision of multiple waivers to Huawei and other 
entities fundamentally conflicts with the Administration's 
stated desire to mitigate the risks associated with increased 
proliferation of Huawei technologies. Consequently, episodes 
such as this one highlight how the Administration's policy and 
actions are not in sync, damaging the United States' ability to 
push back on essential levers of China's digital 
authoritarianism system.
    For its part, Huawei has loudly decried U.S. actions taken 
against the company, through both legal challenges and public 
statements. For example, the company filed a suit against the 
FCC for a ruling in November 2019 blocking the use of federal 
funds to purchase Huawei products, saying ``it fails to offer 
Huawei required due process protections.''\298\ The company has 
questioned the United States' motives for targeting Huawei, 
asserting that the United States ``is leveraging its own 
technological strengths to crush companies outside its own 
borders. This will only serve to undermine the trust 
international companies place in US technology and supply 
chains.''\299\ Huawei has even accused the U.S. of illegal 
behavior such as hacking its systems and threatening its 
employees.\300\
---------------------------------------------------------------------------
    \298\ Norman Pearlstine et al., ``The War Against Huawei,'' Los 
Angeles Times, Dec. 19, 2019; Colin Lecher, ``The FCC votes to block 
Huawei from billions in federal aid,'' The Verge, Nov. 22, 2019.
    \299\ Eileen Yu, ``Huawei rebukes US attempts to stymie foreign 
competition with chip rule,'' ZDNet, May 18, 2020.
    \300\ Dan Strumpf & Chuin-Wei Yap, ``Huawei Accuses the U.S. of 
Cyberattacks and Staff Threats,'' The Wall Street Journal, Sept. 3, 
2019.
---------------------------------------------------------------------------
    In response to the growing threats posed by digital 
authoritarianism, the federal government has taken steps 
towards improving U.S. cybersecurity capabilities. In 2018, 
President Trump signed the Cybersecurity and Infrastructure 
Security Agency Act into law, establishing the Cybersecurity 
and Infrastructure Security Agency (CISA) within the Department 
of Homeland Security (DHS).\301\ CISA's mission is to ``lead 
the National effort to understand and manage cyber and physical 
risk to our critical infrastructure.\302\ The agency's 
formation is a step toward securing U.S. domestic cyber 
infrastructure; however, as an agency within DHS, its mandate 
does not extend into the international realm, and therefore is 
unlikely to be able to play a role in pushing back against 
China's spread of digital authoritarianism around the globe.
---------------------------------------------------------------------------
    \301\ Cybersecurity and Infrastructure Security Agency, ``About 
CISA,'' https://www.cisa.gov/about-cisa (last visited May 10, 2020).
    \302\ Id.
---------------------------------------------------------------------------
    The State Department, which oversees international 
diplomatic efforts regarding the cyber domain, does not 
currently have the structure needed to effectively tackle 
China's growing influence in the digital sphere. In 2018, the 
State Department released proposals to establish a Bureau of 
Cyberspace Security and Emerging Technologies (CSET), which 
would consolidate and strengthen U.S. diplomatic efforts to 
secure cyberspace and digitally enabled technologies, reduce 
risks of cyber conflict, and boost America's cyber 
competitiveness.\303\ In the proposal, the Bureau would operate 
under the office of the Under Secretary for Arms Control and 
International Security Affairs.\304\ However, the rollout was 
stalled in Congress due to negotiations over the bureau's 
placement and a lack of clarity over its mandate.
---------------------------------------------------------------------------
    \303\ Sean Lyngaas, ``State Department Proposes New $20.8 million 
Cybersecurity Bureau,'' Cyberscoop, June 5, 2019, https://
www.cyberscoop.com/state-department-proposes-new-20-8-million-
cybersecurity-bureau/.
    \304\ U.S. Department of State, Congressional Budget Justification 
Appendix 1: Department of State Diplomatic Engagement, Fiscal Year 
2021.
---------------------------------------------------------------------------
    One alternative to CSET--the Cyber Diplomacy Act of 2019--
was introduced in Congress by Representatives McCaul (R-TX-10) 
and Engel (D-NY-16) in January 2019.\305\ The Cyber Diplomacy 
Act would create an Office of International Cyberspace Policy 
(OICP), operating under the State Department's Under Secretary 
of Political Affairs. In addition to advising the State 
Department on cyberspace policy, the office would engage in 
diplomatic efforts to reinforce international cybersecurity, 
promote Internet access and freedom, and counter international 
cyber threats. The bill directly calls out China for promoting 
international norms of Internet behavior that restrict critical 
freedoms. In addition, the bill requires the OICP to produce 
annual country reports on human rights practices relating to 
the Internet, particularly emphasizing online censorship and 
political repression.\306\
---------------------------------------------------------------------------
    \305\ Cyber Diplomacy Act of 2019, H.R. 739 (116th Congress, 
introduced Jan. 24, 2019).
    \306\ Id.



                   Annex 2: The United States and 5G

                              ----------                              

    One of the most prominent and pressing issues facing the 
United States regarding the future of the digital domain is the 
development and deployment of 5G telecommunications 
technologies. 5G technologies, following on fourth generation 
(4G) and LTE technologies, provide a number of improvements to 
the capabilities of previous generations, including increased 
data transfer rates in a fixed period of time, also known as 
bandwidth, and enhanced connectivity capabilities, such as 
ultra-low latency (the delay between when data is sent from one 
device on a network and received by another).\307\ 5G 
technologies are deployed in new ways compared to their 
predecessors: while previous generations used large cell towers 
to transmit signals, 5G can also use small cells (radio access 
points) that are about the size of a picnic cooler or mini 
fridge, creating greater cellular density and faster 
deployment.\308\ 5G networks are also critical to enabling the 
proliferation of the Internet of Things (IoT) devices.\309\ 
Such enhanced capabilities will not only reshape cellular 
communications and facilitate the development of emerging 
technologies, but will also fundamentally alter how industries 
and societies that rely on connectivity to data sources 
operate.\310\
---------------------------------------------------------------------------
    \307\ Qualcomm, ``Everything You Need to Know about 5G,'' https://
www.qualcomm.com/invention/5g/what-is-5g (last visited May 13, 2020); 
Congressional Research Service, Fifth Generation (5G) 
Telecommunications Technologies: Issues for Congress, Jan. 30, 2019, at 
1.
    \308\ ``What is Small Cell Technology?,'' Verizon, Aug. 8, 2018, 
https://www.verizon.com/about/our-company/5g/what-small-cell-technology 
(last visited May 14, 2020); ``Why 5G Can't Succeed Without a Small 
Cell Revolution,'' PwC, https://www.pwc.com/us/en/industry/tmt/assets/
5g-small-cell-revolution.pdf (last visited May 13, 2020).
    \309\ Murali Venkatesh, ``How 5G Networking Will Unleash the Full 
Potential of IoT,'' Oracle, Feb. 4, 2019, https://blogs.oracle.com/iot/
how-5g-networking-will-unleash-the-full-potential-of-iot.
    \310\ Dan Patterson & Anisha Nandi, ``5G explained: How it works, 
who it will impact, and when we'll have it,'' CBS News, Feb. 21, 2019; 
PwC, ``Why 5G Can't Succeed Without a Small Cell Revolution,'' https://
www.pwc.com/us/en/industry/tmt/assets/5g-small-cell-revolution.pdf 
(last visited May 13, 2020).
---------------------------------------------------------------------------
    While the spread of 5G technologies will provide many 
positive impacts for society and industry, China is pursuing 
avenues to manipulate the capabilities endowed by these new 
technologies. As noted earlier in the report, China has made 
significant inroads in the development and deployment of 5G. 
China's efforts, as a number of former military leaders 
elucidate in an April 3, 2019, letter, present ``grave 
concerns'' to the United States, our allies, and our 
partners.\311\ The letter states that a widely adopted Chinese-
developed 5G network ``provide[s] near-persistent data transfer 
back to China,'' would mean U.S. reliance on Chinese 
technologies for critical military communications, and will 
``advance a pernicious high-tech authoritarianism.''\312\ These 
comments underscore that a 5G infrastructure built on Chinese 
technologies will promote digital authoritarianism around the 
globe, and consequently, why the United States must pursue 
mechanisms to mitigate China's influence in this digital 
sphere.
---------------------------------------------------------------------------
    \311\ Letter from Adm. James Stavridis et al., ``Statement by 
Former U.S. Military Leaders,'' Apr. 3, 2019, https://
www.lawfareblog.com/document-former-military-and-intelligence-
officials-letter-5g-risks.
    \312\ Id.
---------------------------------------------------------------------------
    As 5G technology moves closer to global deployment, the 
U.S. has some technological disadvantages that have both 
commercial and security implications. The development of 5G 
networks will boost the rate of implementation for new and 
transformative technologies ranging from autonomous vehicles to 
smart cities to virtual reality.\313\ There is much to gain 
from leading the pack in the global telecommunications race--
and much to lose by lagging behind.\314\ Although Europe 
dominated the development and implementation of 2G 
technologies, and Japan led on the deployment and adoption of 
3G technologies, beginning in about 2016 the United States 
pulled ahead and led on the development and adoption of 
4G.\315\ Through a first-mover advantage provided by its 
innovation and implementation of 4G and LTE, and complemented 
by its competitive mobile device technologies, the United 
States was able to shape the global 4G ecosystem.\316\ U.S. 
companies took advantage of the enhanced capabilities of the 
new network, developing devices, apps, and services that would 
dominate global markets.\317\ This success led to a 70% growth 
of the U.S. telecommunications industry between 2011 and 2014, 
increasing industry jobs by 80% and boosting GDP.\318\
---------------------------------------------------------------------------
    \313\ Randal Kenworthy, ``The 5G and IoT Revolution is Coming: 
Here's What to Expect,'' Forbes Technology Council, Nov. 18, 2019.
    \314\ Statement of Peter Harrell, Center for a New American 
Security, 5G: National Security Concerns, Intellectual Property Issues, 
and the Impact on Competition and Innovation, Hearing before the United 
States Senate Committee on the Judiciary, May 14, 2019, at 2, https://
s3.amazonaws.com/files.cnas.org/documents/Harrell-Judiciary-Testimony-
May-14-2019.pdf?mtime=20190515171307.
    \315\ Recon Analytics, How America's Leading Position in 4G 
Propelled the Economy, at 6 (Apr. 16, 2018), https://api.ctia.org/wp-
content/uploads/2018/04/Recon-Analytics--How-Americas-4G-Leadership-
Propelled-US-Economy--2018.pdf.
    \316\ Milo Medin & Gilman Louie, The 5G Ecosystem: Risks and 
Opportunities for DoD, Defense Innovation Board, at 6 (Apr. 2019).
    \317\ Statement of Peter Harrell, Center for a New American 
Security, 5G: National Security Concerns, Intellectual Property Issues, 
and the Impact on Competition and Innovation, Hearing before the United 
States Senate Committee on the Judiciary, May 14, 2019, at 2, https://
s3.amazonaws.com/files.cnas.org/documents/Harrell-Judiciary-Testimony-
May-14-2019.pdf?mtime=20190515171307.
    \318\ Milo Medin & Gilman Louie, The 5G Ecosystem: Risks and 
Opportunities for DoD, Defense Innovation Board, at 7 (Apr. 2019); 
Recon Analytics, How America's Leading Position in 4G Propelled the 
Economy, at 6 (Apr. 16, 2018).
---------------------------------------------------------------------------
    Yet whatever advantages the U.S. had in the innovation 
deployment of 4G and LTE networks are beginning to narrow in 
the new age of wireless development. A 2019 report by the 
Defense Innovation Board suggests that, due to several critical 
shortcomings in U.S. 5G development, it is unlikely the US will 
win the race to 5G.\319\ A critical differentiator between 4G 
and 5G technologies is that 5G will leverage various segments 
of the electromagnetic spectrum: from the low to mid-band 
spectrum, or ``sub-6'', to the high-band spectrum, or 
``mmWave.''\320\ As the spectrum bands are the fundamental 
layers upon which the entire 5G network and infrastructure is 
built, the decision to develop technologies based on lower or 
higher frequencies is one of the most critical near-term 
choices for policy-makers and involves different levels of 
costs and investments.\321\ For example, mmWave technologies 
are capable of faster and more secure data transmission, but 
require far greater infrastructure and monetary investments to 
set up, while the sub-6 band can cover broader areas with less 
risk of interruption and is able to ``leverage existing 4G 
infrastructure.''\322\ Currently, the advantages of the sub-6 
band, especially on costs and broad coverage, make it the most 
likely near-term outcome for propagating a 5G ecosystem.\323\ 
However, in the United States, portions of the sub-6 bands are 
owned by the government, somewhat limiting civilian and 
commercial use of that spectrum.\324\
---------------------------------------------------------------------------
    \319\ Milo Medin & Gilman Louie, The 5G Ecosystem: Risks and 
Opportunities for DoD, Defense Innovation Board, at 7 (Apr. 2019).
    \320\ Id. at 8-11.
    \321\ Dave Andersen, ``5G FAQ series: What's the difference between 
mmWave and sub-6 GHz spectrum?,'' RootMetrics by IHS Markit, Oct. 28, 
2019, https://rootmetrics.com/en-GB/content/5g-faq-series-whats-the-
difference-between-mmwave-and-sub-6-ghz-spectrum; Gabriel Brown, White 
Paper: Exploring the Potential of mmWave for 5G Mobile Access, Heavy 
Reading, at 3, 8, 10 (June 2016), https://www.qualcomm.com/media/
documents/files/heavy-reading-whitepaper-exploring-the-potential-of-
mmwave-for-5g-mobile-access.pdf.
    \322\ Milo Medin & Gilman Louie, The 5G Ecosystem: Risks and 
Opportunities for DoD, Defense Innovation Board, at 8, 10 (Apr. 2019).
    \323\ Id., at 10; Dave Andersen, ``5G FAQ series: What's the 
difference between mmWave and sub-6 GHz spectrum?,'' RootMetrics by IHS 
Markit, Oct. 28, 2019, https://rootmetrics.com/en-GB/content/5g-faq-
series-whats-the-difference-between-mmwave-and-sub-6-ghz-spectrum
    \324\ Milo Medin & Gilman Louie, The 5G Ecosystem: Risks and 
Opportunities for DoD, Defense Innovation Board, at 10 (Apr. 2019). It 
is important to note that while the government holds large portions of 
the sub-6GHz spectrum, there have been certain initiatives aimed at 
freeing up some of this spectrum, such as S. 19, the MOBILE Now Act 
introduced by Senators John Thune (R-ND) and Bill Nelson (D-FL) during 
the 115th Congress in 2018. Id.
---------------------------------------------------------------------------
    The limits on spectrum have posed a number of problems to 
US near-term competitiveness in the 5G global ecosystem, not 
least of which is that Chinese companies have managed to 
outpace the U.S. in development and export of its 5G 
infrastructure. China has pursued infrastructure buildout based 
on the sub-6 spectrum band, and with its head start in the 
global deployment of its 5G infrastructure, has been able to 
attract a growing share of the global market with its promises 
of a high quality and low cost network.\325\ Given the current 
higher costs and lower density of the mmWave spectrum range, 
many global players--including key U.S. allies and partners--
have chosen to follow China's lead.\326\ The consequences of 
China leading the buildout of the global 5G ecosystem are 
severe, and could include creating overseas security risks for 
Department of Defense operations and eroding competitive supply 
chains for the United States.\327\ It is critically important 
to note, however, that the United States could find a future 
advantage by leading on mmWave technologies, since 1) this band 
is the spectrum where ultra-fast innovations may arise and 2) a 
fully actualized 5G network will see devices seamlessly utilize 
and transition between both the sub-6 and mmWave bands.\328\
---------------------------------------------------------------------------
    \325\ Id., at 12, 21; Press Release, U.S. Department of Justice, 
``Attorney General William P. Barr Delivers the Keynote Address at the 
Department of Justice's China Initiative Conference,'' February 6, 
2020.
    \326\ Milo Medin & Gilman Louie, The 5G Ecosystem: Risks and 
Opportunities for DoD, Defense Innovation Board, at 15 (Apr. 2019).
    \327\ Id. at 4.
    \328\ Monica Alleven, ``SK Telecom, Ericsson demonstrate 5G 
connected BMW at 28 GHz,'' Fierce Wireless, Nov. 15, 2016, https://
www.fiercewireless.com/tech/sk-telecom-ericsson-demonstrate-5g-
connected-bmw-at-28-ghz; Bevin Fletcher, ``New Samsung 5G phones can 
tap both sub-6 GHz and millimeter wave spectrum,'' Fierce Wireless, 
Feb. 12, 2020, https://www.fiercewireless.com/devices/new-samsung-5g-
phones-can-tap-both-sub-6-ghz-and-millimeter-wave-spectrum.
---------------------------------------------------------------------------
    Another reason the United States finds itself in greater 
competition with China on 5G deployment is that China has spent 
more on 5G development, implementing 198,000 5G-operable base 
stations domestically, with 500,000 more planned, and rapidly 
deploying 5G equipment and infrastructure around the 
world.\329\ In Europe in particular, Huawei and ZTE have 
partnered with many countries to build their 5G networks 
despite US protests over security concerns, and Chinese-built 
network infrastructure continues to spread across the 
continent.\330\ Within Congress and the Administration there is 
a bipartisan understanding of the threats posed by Chinese 
firms building the base layers of radio equipment and other 
telecommunications infrastructure upon which 5G operates. 
Unfortunately, there is a major gap in the United States 
government between rhetorical complaints about Chinese efforts 
to dominate the 5G domain and actual, tangible steps to counter 
China's government and industry on the issue.
---------------------------------------------------------------------------
    \329\ Jason Murdock, ``China Planning 500,000 New 5G Base Stations 
as State Officials Say Construction Has 'Entered the Fast Lane','' 
Newsweek, Feb. 24, 2020; Milo Medin & Gilman Louie, The 5G Ecosystem: 
Risks and Opportunities for DoD, Defense Innovation Board, at 13 (Apr. 
2019).
    \330\ Milo Medin & Gilman Louie, The 5G Ecosystem: Risks and 
Opportunities for DoD, Defense Innovation Board, at 13 (Apr. 2019).
---------------------------------------------------------------------------
    Finally, the United States currently does not have a 
domestic 5G supplier for the equipment that makes up the Radio 
Access Network (RAN) for 5G.\331\ Instead, countries seeking 
viable alternatives to Chinese 5G RAN infrastructure rely on 
companies such as Swedish company Ericsson, South Korea-based 
Samsung, or Finnish firm Nokia to build out core components of 
their layer of the 5G infrastructure.\332\ While these 
companies do provide alternatives to Huawei, Chinese government 
subsidies to Huawei allow the company to sell products at far 
lower prices and offer low-cost financing, undercutting the 
competitiveness of other firms.\333\ This combination of a lack 
of a U.S. domestic 5G alternative and China's monetary 
subsidies is leading to a 5G environment that lacks stable, 
secure U.S. infrastructure and products, and is increasingly 
problematic for U.S. security. To maintain U.S. security, it is 
therefore imperative that the United States find, develop, and 
pursue policies that open up pathways for United States 
industry to become a leading player in all facets of the 5G 
domain in the future.
---------------------------------------------------------------------------
    \331\ Tom Wheeler, ``5G in Five (not so) Easy Pieces,'' The 
Brookings Institution, July 9, 2019; ``What are Radio Access Networks 
and 5G RAN?,'' Verizon, Feb. 2, 2020, https://www.verizon.com/about/
our-company/5g/5g-radio-access-networks (last accessed July 10, 2020).
    \332\ Tom Wheeler, ``5G in Five (not so) Easy Pieces,'' The 
Brookings Institution, July 9, 2019.
    \333\ Id.