Revisiting How China is Winning the Battle for Digital Sovereignty Using Your Data
Mar 23, 2023
auto_awesome
Guest Aynne Kokas explains China's effectiveness in collecting and trafficking citizen data, giving them a geopolitical advantage. The podcast also discusses the need for stronger privacy laws in the US, China's expansion of cyber sovereignty, the growth of Chinese smart city infrastructure, and China's role in establishing global technology standards.
China's proactive stance in establishing digital sovereignty involves expanding control over critical information infrastructure and strict control over data related to Chinese nationals and firms, potentially granting access to US data.
Addressing data trafficking requires consensus among like-minded countries, active participation in data governance frameworks, advocacy to lawmakers, and cautiousness in personal data sharing.
Deep dives
Data Trafficking and Exploitation: Understanding the Challenges
Data trafficking refers to the movement of data without individuals' consent, often in exploitative ways. Platforms and apps gather user data, shaping their power and financial benefit. China is at the forefront of establishing digital sovereignty, encompassing data and digital infrastructure to expand national power globally. China's proactive stance involves expanding control over critical information infrastructure and establishing cyber sovereignty. China's expansive vision includes strict control over data related to Chinese nationals and firms, potentially granting access to US data. Gaming is one area where data trafficking occurs, with Tencent, a Chinese firm, heavily invested in US gaming platforms like Fortnite, gathering various user data. China's efforts in data trafficking extend to health and bio data, where limited US data protection exists. Concerns arise about individual surveillance, economic competitiveness, national security, and potential bio-weapon development. Precision agriculture, smart city infrastructure, and global partnerships further manifest China's approach to data sovereignty. Addressing these challenges requires consensus among like-minded countries, active participation in data governance frameworks, advocacy to lawmakers, and cautiousness in personal data sharing.
The Role of China in Expanding Digital Sovereignty
China views digital spaces and user data as foundational to establishing and expanding national power globally. China's proactive approach to cyber sovereignty encompasses data, digital infrastructure, and control over critical information infrastructure. China expands its definition of cyber sovereignty, making it inclusive of Chinese firms and any data touching Chinese nationals. China's acquisitional approach to data sovereignty is demonstrated through storage requirements and national security data audits, potentially granting Chinese access to US data and users. China actively spreads its approach globally through partnerships and investments linked to the Belt and Road Initiative and the digital silk road. By actively participating in global trade agreements and establishing consensus with allies, the US can effectively address China's expanding approach to data sovereignty.
Implications of Data Trafficking: Concerns and Risks
Data trafficking poses significant risks and concerns at various levels. Surveillance of individuals raises privacy concerns, as sensitive strategic information accessibility may destabilize national governments. Economic competitiveness becomes a pressing issue, particularly regarding technology merging, where the Chinese model enables growth and innovation. National security risks arise from the potential dual-use technologies developed through vast data gathering, capable of influencing future conflicts. Misinformation and disinformation campaigns using data can further exacerbate concerns. Specific examples such as health and bio data reveal vulnerabilities in data protection. Precision agriculture, gaming, and smart city infrastructure highlight overlooked domains where data trafficking occurs. Understanding the risks and implications of data trafficking is crucial in addressing these challenges.
Addressing Data Trafficking: Steps Towards Solutions
Addressing data trafficking necessitates collaboration and action at multiple levels. Consensus between like-minded countries is vital in establishing regulatory frameworks and data governance standards. Active participation in global trade agreements and initiatives such as CPTPP can aid in the development of comprehensive data protection policies. Advocacy to lawmakers is crucial in raising awareness and generating collective response towards data sovereignty challenges. At the individual level, cautiousness in personal data sharing and responsible use of digital devices is advised. Monitoring and adjusting privacy settings, limiting data access, and evaluating the necessity of devices can contribute to individual data protection efforts. Nevertheless, collective efforts involving governments, industries, and individuals are necessary to effectively tackle the challenges posed by data trafficking and exploitation.
Today, TikTok CEO Shou Chew testified before Congress in light of the Biden administration’s threat to ban the social media app over concerns that it poses a threat to national security. On Deep Dish, we’re revisiting our conversation with author Aynne Kokas who explains why China has been so effective at collecting and “trafficking” the data of citizens, and how this data could give them a geopolitical advantage. Plus, we hear from data privacy attorneys on the state of regulation protecting user data.
[This episode originally aired: December 15, 2022]