Via the journal
First Monday:
Abstract
The passage of China’s national cybersecurity law in June 2017
has been interpreted as an unprecedented impediment to the operation of
foreign firms in the country, with its new requirements for data
localization, network operators’ cooperation with law enforcement
officials, and online content restrictions, among others. Although the
law’s scope is indeed broader than that of any previous regulation, the
process through which it was drafted and eventually approved bears
similarities to three previous cases from the past two decades of
Chinese information technology policy-making. In comparing these four
cases, we argue that economic concerns have consistently overshadowed
claims of national security considerations throughout laws directed at
foreign enterprises.
Contents
Introduction
Case 1: State Encryption Management Commission (1999)
Case 2: WAPI as a domestic technical standard (2004)
Case 3: Green Dam-Youth Escort (2009)
Case 4: China’s cybersecurity law (2014–present)
Assessment and conclusion
Introduction
In late 2014, the Chinese government proposed a controversial law
with the stated aim to rid China’s banking sector of foreign information
technology by the year 2020. The Ministry of Industry and Information
Technology (MIIT) and the China Banking Regulatory Commission (CBRC)
argued that it was a national security threat for China’s banking sector
— defined as critical infrastructure — to use technology imported from
the United States, particularly in light of former National Security
Agency (NSA) contractor Edward Snowden’s revelations about the NSA’s
surveillance operations. In practice, the proposed law would require
foreign suppliers to reveal the source code of their software to Chinese
law enforcement in order to demonstrate that the technology was not
being used to spy on Chinese banks [1].
Predictably, this law prompted a major backlash from large technology
firms and U.S. government officials who claimed that it was
anti-competitive and a bald attempt to steal intellectual property. In
the spring of 2015, the same Chinese agencies that had defended the
proposed law announced that it would be ‘suspended’ in order to
incorporate comments and suggestions from Chinese banks. The suspension
was described broadly in the West as a victory for the global technology
suppliers and a step back by the Chinese government.
This series of events, however, is not sui generis. Versions
of this story have been repeated, in slightly different forms, at least
three times in the last 18 years. This paper ties these four cases
together. We argue that they represent a pattern of policy behavior that
in turn reveals important insights about long-term strategies for
achieving Chinese domestic technology goals. In light of the passage of a
national cybersecurity law that overshadowed the banking sector
proposal in 2017, these cases can illuminate deep-seated objectives of
Chinese policy-makers that have persisted up to the present.
The basic pattern of behavior is similar in each of four cases we
investigate, and the stories roughly follow a common narrative. First,
the Chinese government proposes the adoption of a sweeping and somewhat
vague piece of legislation in the name of national security, which would
restrain foreign technology companies’ access to Chinese markets and
place intellectual property at risk of theft. This prompts forceful
negative responses, first from the companies, then from U.S. and other
Western government trade representatives, and finally at times from the
most senior government officials as well. This dynamic is Act 1 of the
story.
In ‘Act 2’, the Chinese government then suspends or postpones the
implementation of the law, but keeps it on the books. Western media
labels this (temporary) capitulation a victory for trade and
competition, and government pressure subsides.
But in at least three of the four cases, modified versions of the
proposed law are later passed and partially implemented, as the issue
fades from the spotlight and other conflicting interests come to the
fore. That is ‘Act 3’. At the end of the story, techno-nationalist
policies have not moved as far forward as was feared in Act 1. But they
have moved forward in a way that has cumulated over time to shape the
competitive environment — gradually, but with real impact.
We recount in this paper four specific cases that occurred roughly
five years apart over the last two decades. Up to now these cases have
been treated individually (including legal briefs on the encryption
case, analyses of the political economy of technological
standardization, and evaluations of the rollout and failure of a
nationwide Web content-filtering program). We place them together to
draw out their similarities, with one goal being simply to demonstrate a
pattern of behavior.
Our second goal is to assess that behavior pattern for strategic
coherence. Put simply, we want to know what this observed pattern can
tell us about a Chinese techno-nationalist strategy — if one exists. To
guide the argument, we offer four candidate hypotheses that could
account for the observed pattern, and we assess the evidence in each
case against those hypotheses.
The four hypotheses are these:
H1: Each case is in fact sui generis and the commonalities are coincidental. There is no underlying pattern or strategy at work;
H2: The seemingly vague laws represent the jumbled output of
bureaucratic politics and a struggle among competing agencies for
power, not a coherent ‘state’ strategy per se;
H3: The proposed laws represent the evolution of what is
first and foremost a national security strategy, narrowly defined, that
is aimed at reducing the vulnerability of Chinese military, government,
and commercial information systems to foreign technology intrusions and
cybersecurity threats;
H4: The laws represent the evolution of an economic
development strategy that is aimed at advancing the competitiveness of
the Chinese domestic IT sector. |
Foreshadowing our conclusion, we find that the evidence supports
Hypothesis 4 most strongly, with increasing support for Hypothesis 3 as a
sub-goal in recent years. Put simply, the cases together suggest a
techno-nationalist economic competitiveness agenda that also supports
national security interests in a secondary role. Contrary to the
justifications provided for the most recent iterations of this strategy,
the NSA espionage revelations were more of a catalyst for plans China
already had under way than they were a groundbreaking prompt to reshape
Chinese information technology and cybersecurity laws. When these two
rationalizations are combined, which is increasingly the case at
present, we anticipate that they will continue to generate overambitious
policies that the top leadership is privately willing to suspend, scale
back, or loosely enforce.
In the U.S.-China Economic and Security Review’s 2016 report to
Congress, the authors warned that “the Chinese government’s sustained
commitment to technonationalism is a growing challenge for U.S. and
foreign firms seeking to enter China’s market or compete with its
state-supported firms abroad” (U.S.-China Economic and Security Review
Commission, 2016). The Chinese government is unlikely to abandon the
notion that ‘indigenous innovation’ is the preferred approach to
competitiveness in the information technology sector and to foreign
cybersecurity threats at the same time. Yet these cases demonstrate that
the state has been willing to downsize its boldest initiatives, with an
eye toward making incremental gains over the longer term. The recent
passage of a nationwide cybersecurity law that will further monitor and
restrict the behavior of foreign technology firms in China makes it
critical to understand the possibilities for compromise with Chinese
authorities in the long term.
Case 1: State Encryption Management Commission (1999)
In the 1990s and early 2000s, China heavily relied upon foreign
technology firms that supplied its markets with personal computers,
including such giants as Microsoft, IBM, and Intel. From those years
leading up to the present, an evolving long-term goal of the Chinese
Communist Party (CCP) has been for domestic companies to develop the
technological capabilities to build a robust information technology
sector that will obviate the need for imported devices. One noteworthy
early step in this direction that bears remarkable similarity to current
debates over revealing source code in banking technology occurred in
1999, when information technology regulations and the institutions that
oversaw them were still nascent.
By the end of the twentieth century the CCP was aware of foreign
governments’ abilities to build “backdoors”, or hidden channels used to
clandestinely access devices and networks, into technology sold to
China. Thus they turned their attention to encrypted communications.
Encryption is the process through which digital communication can be
protected such that only parties on the sending and receiving ends have
access to the information being transmitted. Understandably, protecting
encryption falls under the purview of national security in general, yet
the approach the Chinese government used to propose an encryption law
instead gained notoriety for threatening foreign technology companies’
intellectual property rights. At a time when the CCP hastened to create a
regulatory environment to address new advances in information
technology, the possibilities of overdrawing boundaries and
miscalculating what the state could feasibly accomplish were manifold.
What makes the encryption case compelling this many years after the fact
is how it established a precedent for similar incidents that followed,
each of which featured elements of economic protectionism amidst claims
of defending national security....
...
MUCH MORE