China switched on the largest commercial 5G network to date on October 31, 2019. Thats when Chinas three state-owned wireless carriers, China Mobile, China Unicorn, and China Telecom, unveiled 5G subscription packages. The wireless carriers noted that they would be charging customers for speed rather than data useand peak speed would cost around $45 a month. Beijing has promised that the next-generation network will unleash a technological revolution. The announcement is a message to the United States and the world that Chinas push toward 5G global dominance will not be slowed by U.S. opposition.
Chinas investment in next-generation technologies, including information communications technology (ICT), artificial intelligence, big data analytics, cloud computing, and blockchain among others has become a high priority under President Xi Jinping. A series of government directives, white papers, initiatives, and planning strategies have pushed Chinese tech firms toward the right technologies. This ambition to turn China into a global technological and cyber power is openly geopolitical in nature as the 2016 Outline of the National Strategy for Innovation-Driven Development shows: disruptive technologies are constantly emerging, continually reshaping the worlds competitive landscape, and changing the balance of power among states.
Beijings rapidly-expanding digital and telecoms infrastructure projectsall part of the Digital Silk Roadacross the Eurasian landmass will have real-world effects on the people who live within such systems, impacting systems of governance and state power over data. As Chinese tech firms export these complex ecosystems of technologies, norms, and standards in the Smart City and Smart Port programs, the United States and its allies will have to monitor how they impact recipient nations.
For while the normative impact of these technologies is of concern, it is their wider structural potential on the global order that is the most alarming.If one considers the constituent components of the Western orderfinance, banking, technological dominance, influence over market and trade rulesit is clear that Beijing is offering alternatives at every level, constructing a vast new order that suits its own preferences. Despite the disparate nature of Chinas activities, collectively they form the basis for future hegemony. In this article, we focus on three areas in which the PRC is using technology to advance its aims: values and governance, markets and trade, and shipping.
Values and Governance
As aforementioned, Smart Cities, built on the data-rich bedrock of 5G networks, integrate disparate information from different sources to create a centralized data-exchange platform critical to day-to-day operations of administrative, industrial, environmental, energy, and security systems. The premise is that a better-integrated and effectively-operated city boosts economic activity, and promotes sustainable growth into the future, a promising technology for many municipalities in South Asia where population growth is creating fast-growing new cities. However, China will export values and norms as it trains future users of its equipment, using research networks like the National Engineering Laboratory (NEL) for Big Data Application on Social Security Risks Sensing, Prevention and Control. A 2018 Freedom House report noted how China offers training packages to foreign officials on how to handle big data on public opinion management and new media development. ZTE has helped Venezuela surveil and control its population through a smart ID card system. Linked to Chinas satellite system, the cards store location data, financial information, banking transactions, healthcare, and even voting records. The government uses the cards to control access to public benefits. Some states are shaping their cyber laws to mimic those of China with Vietnam, Egypt, Tanzania, and Uganda, producing laws, not unlike the 2016 China Internet Security Law, which requires the collection and verification of users identities.
There is a very real danger that as the chief architect and administrator of these digital networks and Smart Cities, Beijing will have access to reams of data in recipient nations, either through intelligence-sharing pacts or through direct server accessanother requirement of the 2016 Internet Security Law. Access to this dataand the ability to harvest it using big data analyticswould give Beijing leverage in the form of kompromat, using sensitive information to influence key foreign leaders on issues critical to Chinese interests.
Markets and Trade
The proliferation of Chinese mobile payment appssuch as Alipay, Baidu Wallet, and WeChat Paywill increase the amount of financial data going through Chinese hands as all such transactions must pass through a Peoples Bank of China clearinghouse, Wanglian. This enables not only Chinese tech companiesbut also its state bankto know foreign financial transactions in real-time. Aside from the expansion of mobile Chinese electronic payments systems, Chinese-built ICT networks and systems across the Digital Silk Road push recipient nations to favor both Chinas currency and its companies. In addition to currency swap agreements with many BRI partners, China has made clear its intent to de-entrench the world economy from the dominance of the dollar. The Cross-Border Inter-Bank Payments System is thought by some to be a challenge to the U.S.-led Society for Worldwide Interbank Financial Telecommunication.
As Chinese fintech grows, Chinese firms will benefit from valuable consumer information, similar to how Amazon employs real-time search aggregation to gain insights into consumer trends and wants. Chinese companies can use artificial intelligence to assess real-time market needs on a global scale. Privileged companies can bring desired products to the market ahead of domestic or U.S. companies. Moreover, Chinese companies understand the exact capacities and needs of the host countries, giving them a distinct competitive advantage over both Western and local firms in product design and production. This advantage is likely to be particularly acute in areas that China believes to be strategically important, such as in autonomous vehicles, artificial intelligence, and the Internet of Things.
SLOC Transportation Pillar
One of the oldest pillars of hegemonic power has been controlling thesea lanes and the trade that takes place upon them. Eighty percent of global trade is transported by sea and nearly two-thirds of sea trade passes through Chinese-owned ports. As of 2019, Chinese State-owned enterprises like COSCO and China Merchants own forty-two major ports in thirty-four countries across the Eurasian and African coastlines. Here, Chinas Digital Silk Road and its Maritime Silk Road come together in the form of Smart Ports. Centralizing data and increasing automation will create efficiencies and automation in loading, thus increasing capacity.
In one network, the Big Data Risk Monitoring Platform at Nannings Customs Office tracks cross-border trade with twenty-six ports across Southeast Asia. This platform allows China to track the real-time status of goods, destinations, and relationships around the world. While shipping manifests do track the movement of goods, never before have ports had the capability to comprehensively map real-time global supply chains. This information allows for an unofficial sanction system that targets the goods of nations (or even individuals) that the PRC wishes to influence. Indeed, China has already done this in a low-tech way when it restricted Philippine banana exports from entering Asian markets between 2016 and 2018 over bilateral tensions related to the South China Sea.
The world is rapidly changing and there are signs that Chinas ambitions with the Belt and Road Initiativeand all its digital componentsare part of the sticky power of a new hegemony. Chinese leaders recognize that new disruptive technologies are harbingers of change for people-to-people contacts and can also change how states trade, police, and run their municipalities. Beijings promotion of its tech firms across the Eurasian landmass allows for the future exploitation of international data for political effectallowing Chinese leaders to set rules, create norms and standards, and to control trade and political activity. We are entering an age of competition and it is not only between nations but between ideologies and the states that host them.
Dr. John Hemmings is an associate professor at the Security Studies College of the Daniel K. Inouye Asia Pacific Center for Security Studies, a US Department of Defense regional center as well as a senior associate fellow at the Henry Jackson Society, a London-based think tank. He writes in his own personal capacity.
Patrick Cha is an intern at the Daniel K. Inouye Asia Pacific Center for Security Studies. He is a 2019 graduate of the Woodrow Wilson School of Public and International Affairs at Princeton University.
- Is COVID-19 Making the Internet Sick? - Government Technology - May 27th, 2020
- Thanks to Physics, This Chocolate Is Iridescentand Safe to Eat - Smithsonian.com - May 27th, 2020
- $100 million in bounties paid by HackerOne to ethical hackers - BleepingComputer - May 27th, 2020
- Types of Encryption: 5 Encryption Algorithms & How to Choose the Right One - Security Boulevard - May 27th, 2020
- Asian consumers worried about securing their data - BusinessWorld Online - May 27th, 2020
- Move online to survive businesss new mantra - BizNews - May 27th, 2020
- China Demands Us Withdraw Sanctions on Tech Suppliers - Manufacturing Business Technology - May 27th, 2020
- DDoS Protection Market Overview, Regional And Restraint Analysis By 2020 2026 - 3rd Watch News - May 27th, 2020
- Galaxy S20 security is already old hat as Samsung launches new safety silicon - The Register - May 27th, 2020
- Amid the COVID-19 crisis and the looming economic recession, the Electronic Bill Presentment and Payment (EBPP) market worldwide will grow by a... - May 27th, 2020
- Global Internet of Things (IoT) Security Market Research Studies Competitive Strategies, Regional Analysis Forecast 2025 - WaterCloud News - May 27th, 2020
- When COVID-19 and Economic Fallout Put Millions of Kids in Unsafe Places, Communities in Schools Went in After Them. - The 74 - May 27th, 2020
- DNS over HTTPS: How to activate it on Windows 10 Build 19628 - WinCentral - May 27th, 2020
- The lack of women in cybersecurity leaves the online world at greater risk - The Conversation US - May 17th, 2020
- COVID-19 Impact and Recovery Analysis | Internet of Things (IoT) Security Market 2020-2024 | Increasing Incidence of Cyberattacks to Boost Growth |... - May 17th, 2020
- Break On Through To The Other Side - Seeking Alpha - May 17th, 2020
- Post-COVID 19: The Virtual World And Digital Participation And Its Challenges In Ghana - Modern Ghana - May 17th, 2020
- Embracing Remote Learning and Working after COVID-19 as our New Reality - THISDAY Newspapers - May 17th, 2020
- The lack of women in cybersecurity leaves the online world at greater risk - Kiowa County Press - May 16th, 2020
- Internet security Market Research Report 2020 By Size, Share, Trends, Analysis and Forecast to 2026 - Cole of Duty - May 16th, 2020
- The best antivirus protection of 2020 for Windows 10 - CNET UK - May 16th, 2020
- Bill Proposes to Incentivize Cybersecurity Innovations With Cash Prizes - Nextgov - May 16th, 2020
- The Confessions of Marcus Hutchins, the Hacker Who Saved the Internet - WIRED - May 16th, 2020
- Spains DGT Warns Of A New Scam Circulating Which Tricks Users Into Giving Their Data - Euro Weekly News - May 16th, 2020
- What is the Internet of Things? - Fox Business - May 16th, 2020
- Air Force aims to make secure mobile identity management the norm - FCW.com - May 16th, 2020
- Internet Security Market Analysis, Size, Regional Outlook, Competitive Strategies and Forecasts to 2027 - Cole of Duty - May 9th, 2020
- (2020-2026) Internet Security Audit Market to Witness Robust Expansion throughout the Forecast Period - Cole of Duty - May 9th, 2020
- OODAcast A Conversation With Lou Manousos, CEO of RiskIQ - OODA Loop - May 9th, 2020
- COVID-19 Crisis To Help Akamai Replicate $300 Million+ Revenue Growth From The Past 2 Years? - Forbes - May 9th, 2020
- Global Internet Security Market is Segmented by Applications, Technology, Product Type And Service and Region - TechnoVally - May 9th, 2020
- Google Releases May 2020 Android Security Patch; Fixes Bug That Allowed Remote Code Execution - Mashable India - May 9th, 2020
- Gregory Boehm | The Harvard Press | News | Obituaries - Harvard Press - May 9th, 2020
- Wifi/ Internet/ IoT Testing and Security Solutions Market 2020 by Company, Regions, Type and Application, Forecast to 2024 - Cole of Duty - May 9th, 2020
- More Salt in their wounds: DigiCert hit as hackers wriggle through (patched) holes in buggy config tool - The Register - May 9th, 2020
- Zoom's Rise, Reign and Era of Reform at the Top of the Teleconferencing Throne - BroadbandBreakfast.com - May 9th, 2020
- The Pleasures and Pitfalls of Motherhood on Instagram - ELLE.com - May 9th, 2020
- Global IT Security Spending in Government Market Expected to reach highest CAGR by 2025: Check Point Software Technologies, Cisco Systems, Fortinet,... - May 9th, 2020
- Millions of Android users need to update, or risk having attackers take over their phone - Express - May 9th, 2020
- Deal of the Month: 50% off Integos Mac Internet Security X9 bundle - 9to5Mac - April 20th, 2020
- COVID-19 impact: Internet Security Firewall Market: Promising Growth Outlook with a Steady CAGR of X% 2020-2026 Cole Reports - Cole of Duty - April 20th, 2020
- Russia And China Hijack Your Internet Traffic: Heres What You Do - Forbes - April 20th, 2020
- Internet security Market 2020 Break Down by Top Companies, Applications, Challenges, Opportunities and Forecast 2026 Cole Reports - Cole of Duty - April 20th, 2020
- Investor Paul Meeks overhauls tech strategy due to coronavirus risks, turns negative on two widely held stocks - CNBC - April 20th, 2020
- Authentic8's Front Line of Defense Tool Aims to Safeguard Government Agencies from Cyberthreats - WashingtonExec - April 20th, 2020
- Blockchain: The Most Awaited Ally For The Security Of The Internet Of Things - CoinCodex - April 20th, 2020
- The internet's battle against bots is heating up - The Hustle - April 20th, 2020
- Bot creates millions of fake eyeballs to rip off smart-TV advertisers - Naked Security - April 20th, 2020
- Where to buy Kaspersky Internet Security? - RecentlyHeard.com - April 17th, 2020
- Citing coronavirus disruptions, PhishCloud offers year of free service to prevent phishing scams - GeekWire - April 17th, 2020
- The Global Software Defined Perimeter Market size is expected to reach $10.7 billion by 2025, rising at a market growth of 23.7% CAGR during the... - April 17th, 2020
- Women are essential helpers during crises but they need access to the internet | TheHill - The Hill - April 17th, 2020
- How To Browse The Internet Privately on Your Phone (Our #1 Tips) - Know Your Mobile - April 17th, 2020
- Faster Internet and protection against cyberattacks: UPC Business offers customers free additional services during the coronavirus crisis -... - April 17th, 2020
- Teaching your kids to surf the internet safely - The Star Online - April 17th, 2020
- No, the Internet Is Not Good Again - The Atlantic - April 17th, 2020
- Cyberattacks on endpoints will rise by up to 40 per cent unless we act quickly - Techerati - April 17th, 2020
- RBR's CyberPatriots Continue their Winning Ways - The Two River Times - April 17th, 2020
- The Weaponization of Dogs on the Internet - Lawfare - April 17th, 2020
- Investment opportunities in the internet sector - Times of Malta - April 17th, 2020
- Matt Hancock has no answers for anything but he does have a six-point plan and a very small badge - The Independent - April 17th, 2020
- Best internet security suites of 2020: anti-virus and anti-malware cyber security - TechRadar - April 17th, 2020
- The security conundrum of 5G network slicing - Urgent Communications - April 13th, 2020
- How to Make Sure that Antivirus is on your Endpoints - Security Boulevard - April 13th, 2020
- Why you can't trust your vote to the internet - CyberScoop - April 13th, 2020
- IoT security, neglected infrastructure, and a crisis of trust deemed major threats for 2022 - TechRepublic - April 13th, 2020
- Aspects of cybersecurity not to overlook when working from home - Big Think - April 13th, 2020
- The Rise of the Secure Internet Gateway - Communal News - April 13th, 2020
- The University and its students must be more considerate of essential USC staff - Daily Trojan Online - April 13th, 2020
- Foreign Operatives Allegedly Using Zoom To Spy On Americans - Brinkwire - April 13th, 2020
- Top Ways to Guard Against Work-from-Home Phishing Threats - Infosecurity Magazine - April 13th, 2020
- Get 2 years of Webroot internet security and antivirus for $50 at Amazon - BGR - April 12th, 2020
- Internet Security Software Market Growth Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 - Germany English News - April 12th, 2020
- Foreign Spies Are Targeting Americans on Zoom and Other Video Chat Platforms, U.S. Intel Officials Say - TIME - April 12th, 2020
- iOS users beware: Myth of Apple security invulnerability is just that - The Star Online - April 12th, 2020
- Experts: Internet voting isn't ready in the face of coronavirus pandemic - CyberScoop - April 12th, 2020
- Slack in the security spotlight lessons for collaboration servers - Naked Security - April 12th, 2020
- Google removes Android VPN with critical vulnerability from Play Store - Naked Security - April 12th, 2020
- Is there a way to find this file that's being used by another processor? - Windows 10 Support - BleepingComputer - April 12th, 2020
- Global Internet of Things (IoT) Security Industry 2020 Market Research With Size, Growth, Manufacturers, Segments And 2026 Forecasts Research -... - April 12th, 2020