Tag Archive for: China Tech

Mapping China’s Tech Giants: Supply chains & the global data collection ecosystem

his report accompanies the re-launch of our Mapping China’s Technology Giants project.

This report is available for download in English and Arabic.

Other Reports that are part of this project include:

What’s the problem?

Most of the 27 companies tracked by our Mapping China’s Technology Giants project are heavily involved in the collection and processing of vast quantities of personal and organisational data — everything from personal social media accounts, to smart cities data, to biomedical data.1 Their business operations—and associated international collaborations — depend on the flow of vast amounts of data, often governed by the data privacy laws of multiple jurisdictions. Currently, however, existing global policy debates and subsequent policy responses concerning security in the digital supply chain miss the bigger picture because they typically prioritise the potential for disruption or malicious alterations of the supply chain. Yet, as we have defined it in this report, digital supply-chain risk starts at the design level (Figure 1).

For the People’s Republic of China (PRC), the designer is the Chinese party-state, through expectations and agenda-setting in laws and policy documents and actions such as the mobilisation of state resources to achieve objectives such as the setting of technology standards. It’s through those standards, policies and laws that the party-state is refining its capacity to exert control over companies’ activities to ensure that it can derive strategic value and benefit from the companies’ global operations. That includes leveraging data collection taking place through those companies’ everyday global business activities, which ASPI’s International Cyber Policy Centre (ICPC) described in the Engineering global consent report.2 Technology isn’t agnostic—who sets the standards and therefore the direction of the technology matters just as much as who manufactures the product. This will have major implications for the effectiveness of data protection laws and notions of digital supply-chain security.

What’s the solution?

This report recommends that governments, businesses and other organisations take a more multidisciplinary approach to due diligence. That approach needs to take into account the core strategic thinking that underlies the ways the Chinese party-state uses technology. It must also take into account the breadth of what’s considered to be ‘state security’ in China and the ramifications of the PRC’s cyber- and data-focused laws and regulations.

All governments should improve their regulatory frameworks for data security and privacy protection.

Doing so will put them in better ethical and legal positions to take meaningful long-term policy actions on a whole suite of issues. However, those efforts in isolation won’t solve all of the unique challenges posed by the Chinese party-state or other geopolitical challenges described in this report.

A more holistic approach, which would help to ensure that data is better protected, also requires a better definition of digital supply-chain risk and a reframing of global policy debates on these issues. There needs to be a greater understanding of how supply-chain risks manifest, including the intentional introduction of access and more subtle monitoring and information collection by malicious actors. Specific actions for managing potential data insecurity and privacy breaches in supply chains should include improving risk-based approaches to the regulation of data transfers.

Figure 1: Compromise of the digital supply chain without a malicious intrusion or alteration

Source: ASPI authors’ illustration.

1. The PRC’s data ecosystem

The PRC’s global data collection ecosystem was outlined in the ASPI ICPC policy report Engineering global consent: the Chinese Communist Party’s data-driven power expansion.3 In that report, we described ways the Chinese party-state directly and indirectly leveraged PRC-headquartered commercial enterprises to access troves of data that those enterprises’ products help generate.

That report was based on how the Chinese party-state articulated its objectives on data use and state security and a case study of the propaganda department–linked company Global Tone Communication Technology Co. Ltd (which we expand on in the ‘Downstream data access’ section of this report).

As part of the Mapping China’s Technology Giants project, we have identified the need to further define the PRC’s ‘global data ecosystem’ concept. In this section, we focus on the nature of interactions between political agenda-setting, active shaping of international technical standards, technical capabilities, and data as a strategic resource. This directly affects companies’ business activities, both domestic and global (Figure 2).

Figure 2: The PRC’s data ecosystem

Source: ASPI authors’ illustration.

The PRC’s data ecosystem begins with technical capability. That includes China’s advanced cyber offensive skills, but also extends to its companies’ normal business operations anywhere in the world providing access, collection, data processing or any combination of the three to the party-state.

The party-state’s ability to obtain large amounts of personal information and intellectual property through its state-sponsored cyber operations has been widely reported in detail, including in indictments by the US Department of Justice.4 However, the PRC’s policies and legislation— purposefully shaped by the Chinese Communist Party (CCP)—mean that the party-state’s ability to access data is extended even further than the normal operations of PRC-based companies with a global presence. It’s also consequential that those globally influential PRC-based technology companies occupy every layer of the ‘technology stack’.

In Table 1, we illustrate the ‘technology stack’ by using the ISO standard Open Systems Interconnection model as a reference (because it’s used for networking and data exchange but can also be illustrative of the technology industry ecosystem).5 We then charted it against the relevant companies in the Mapping China’s Technology Giants project and their US counterparts, which for several decades have had a dominant presence in every layer.

Table 1: Technology business ecosystem, referencing a simplified Open Systems Interconnection model

Source: ASPI authors’ illustration.

Technology companies everywhere are primarily driven by commercial interests. The difference between the US and China is that in China the way the state conceives of the usefulness of data goes beyond traditional intelligence collection. For the Chinese party-state, data and the information derived from it contribute to everything. Domestically, that ranges from solving policy problems to information control and state coercion. Globally, it ranges from expanding the PRC’s role in the global economy to understanding how to shape and control its global operating environment. In the next two sections, we elaborate on how the Chinese party-state’s laws, policies and actions, which apply to PRC-based technology companies, create an ecosystem that provides it with access to the data that those companies can obtain.

1.1 Who sets the standards matters

Technology isn’t values-agnostic. It takes on the values of its creator. Therefore, who sets the standards, and consequently the direction of the technology, matters. We know, for instance, that artificial intelligence has a history of racial and socio-economic bias built in from the design stage, reflective of the inherent biases of the designers and the choice of data used to train the algorithms.6

Technologies must be designed to be ‘values-neutral’7 to avoid those problems, but that aspiration might not ever be realistic.8

Liberal democracies don’t agree on what ‘values’ mean in this context. The European Union, for example, is increasingly prioritising indigenous technology development not just because of strategic competitors such as the PRC but also because of the US. That requires navigating often complex relationships with US-based technology giants such as Google, Apple and Facebook.9

Part of protecting values in any liberal democracy is about preventing the creep of illiberalism from sources both domestic and foreign. It’s also about introducing regulations and standards that protect the norms and freedoms underpinning democratic values. When it comes to Europe and the digital economy, much of that effort is currently targeted towards holding US technology companies accountable.10

The Chinese party-state is creating mechanisms and power structures through which it can ensure its ultimate and maximum access to datasets both domestically and globally. This is apparent through its agenda-setting (articulated in party and policy documents), its expectation-setting (signalled through new laws) and communications from the CCP (such as speeches and state media reporting). Part of the CCP’s effort takes place through the PRC’s attempts to set standards that guide the design of technologies. For example, PRC facial recognition systems are required to be designed to recognise ‘Uyghur faces’.11 Another example is big data platforms and systems designed to categorise individuals based on a politicised version of whom the CCP deems suspicious or potentially threatening (such as petitioners, Tibetans, Uyghurs or Falun Gong practitioners).12 Within the PRC, technologies are already being researched and developed to meet the needs of the party-state (see section ‘Data regulations: setting the standards’). When those technologies are exported, such design features can’t be erased by the technology’s end-user, whether it’s a global company or a foreign government.

1.2 Harnessing the strategic value of data

The Chinese party-state has deliberately formulated a strategy to harness the strategic value of data and the power of information to grow the power of the CCP over society. In 2013, Xi Jinping was quoted as saying, ‘big data is the “free” resource of the industrial society. Whoever has a hold of the data has the initiative.’13

In 2016, China’s 13th Five-Year Plan pushed for the creation of a ‘big data security management system’ alongside efforts to improve cyberspace governance by building an international consensus around the PRC’s ideas on cyberspace security.14 The 14th Five-Year Plan, unveiled in 2021, continues the party-state’s multifaceted priorities for the development and use of big data for economic and social governance and calls for building new data infrastructure and improving the rules governing data collection, storage and use.15

In addition to economic development, the party-state often describes big data technologies as contributing to ‘social management’ (also called ‘social governance’).16 Social management covers a broad and overlapping list of agenda items, from creating capabilities to improve public service administration to strengthening ‘public security’. Ultimately, social management refers to the party-state’s management of itself as well as of society. This process relies on shaping, managing and controlling its operating environment through capabilities that enhance service provision and the capacity for risk management.17

New and emerging digital technologies are valued because they’re viewed as a resource that can improve everyday governance capacity and facilitate problem-solving. In simplifying government service provision, the implementation of those technologies can in future facilitate communication across the PRC’s sprawling government apparatus.18 Digital and data-driven technologies obviously have multiple uses. For example, they can help streamline urban and social welfare services. In other respects, those same services can feed into the party-state’s totalitarian model of governance and the way it identifies and responds to what it believes are emerging threats.

This use of data occurs in ways that provide both convenience and control. Routine services are intertwined with surveillance and coercive tools in ways that are often not legally possible in liberal democratic societies—or, when they do occur, can be genuinely challenged by the public, media and civil society. That distinction doesn’t simply apply to the ways different PRC Government departments use similar technologies (such as ways the public security bureaus use technologies versus the ways industrial work safety offices use them).

One example is Human Rights Watch’s findings on Xinjiang’s Integrated Joint Operations Platform, which is used to centrally collect data on individual behaviours and flag ‘those deemed potentially threatening’. One metric used to identify threats is energy usage from smart electricity meters: abnormally high energy use could indicate ‘illegal’ activity, but such meters in their normal use would also improve the accuracy of meter readings.19 Another example is building datasets for use in the PRC’s ‘national defence mobilisation system’ (a crisis response platform) using data sourced from a variety of government cloud networks, from smart cities to tourism-related cloud networks (Figure 3).20

Figure 3: The concept of defence mobilisation and smart cities data integration and processing

Source: ASPI authors’ illustration.

Despite the benefits it can derive, the CCP also sees sources of harm emerging from technology and its use, and it realises that technology isn’t an all-encompassing solution to its problems. Xi Jinping has described science and technology as a double-edged sword: ‘On one hand, it can benefit society and the people. On the other hand, it can also be used by some people to damage the public interest and the interests of the people.’21 Such risks could include companies or officials having the ability to exercise too much power with the aid of technology.22 They could also include the use of technology by the CCP’s political opponents to organise against the party-state, from either inside or outside the PRC.23

1.3 A global outlook

The PRC’s plans to harness the strategic value of data and the power of information to grow state power are also globally oriented. The party-state sees its reliance on technologies originating in the West (especially the US) as a threat to state security, for fear of how foreign powers might exploit that reliance, especially in a crisis.24 That fear helps drive the development of the PRC’s indigenous technology capabilities.25 Its capability effort includes planning on big data development to build an ‘industry ecosystem’ with ‘globally oriented key enterprises and innovative small- and medium-sized enterprises with distinctive features’.26 It also includes a plan to export PRC-originated technology standards, envisioned through the China Standards 2035 project.27 Economic benefits and objectives are included in each plan, but through them the CCP also sets specific political ambitions.

As part of its global vision (see Figure 4), the Chinese party-state ensures that it’s a part of the market-driven expansion and success of its global technology giants. Under Xi Jinping, the government has increasingly demonstrated the extraterritoriality inherent in PRC state security concepts and law. Moreover, the fact that companies have the right to do business in China at the party-state’s discretion has become abundantly clear. The ability to harness the benefits of data would help to achieve the CCP’s global vision because, through the processing and application of that data, the party can improve the sophistication of its efforts to shape, manage and control its global operating environment.

Figure 4: Explainer: The Chinese party-state’s vision for the PRC in the world

Sources: ASPI authors’ illustration. See endnote for detailed citations.28

2. The PRC’s developing data security framework

PRC legislation related to state security29 provides reasons for foreign governments to be concerned about the exposure of any PRC-based commercial enterprise to the political demands of the party-state.30 Recent state security laws, such as the 2017 Intelligence Law, haven’t changed the longstanding de facto practice of state power in the PRC, but have further codified expectations in China that every citizen is responsible for state security.31 Assessments of those risks have helped address what should be the obvious political and legal risks of doing business with PRC-based technology companies.

Some analysts have attempted to downplay the significance of such laws by claiming that the law is never black and white in the PRC and by describing compliance with PRC law as ‘a negotiation’.32 The latitude of officials to enforce the law and corporations’ efforts to maintain their freedom of action leave open grey areas, but that claim, in the context in which it’s being made, is false. Law may be a negotiation in the PRC, as it is elsewhere, but the party-state decides whether there’s a negotiation at all, and where that negotiation ends. 

Critically, the party-state itself isn’t bound by the law when it’s challenged or when its interests are threatened. A recent illustration of this is Alibaba and its founder, Jack Ma, who briefly ‘disappeared’ at the end of 2020 following his public criticism of PRC regulators’ attitude towards big business, accusing them of having a ‘pawnshop’ mentality that stifled innovation.33 In April 2021, it was announced that Alibaba would be fined US$2.8 billion after a probe determined that it had abused its market position for years.34 Nobody in the PRC is too big or too powerful to be subject to the party-state’s demands.35

PRC-based technology companies themselves have acknowledged their exposure to legal risks emanating from the PRC. It’s standard practice for global companies to acknowledge in their privacy policies that user data may be transferred and governed by laws outside of their own jurisdiction.

According to most privacy policies for websites and products of the 27 companies in our Mapping China’s Technology Giants project, users who live outside the PRC may have their data transferred to and processed and stored in a country that isn’t where they reside or have ordered services from, including the PRC, where all of the companies have business. When the data is transferred it will be governed by the law in that country’s jurisdiction, not only the law in the place where the data originated (Figure 5).36

Figure 5: New Mapping China’s Technology Giants product—‘Thematic snapshots’

Source: Mapping China’s Technology Giants project website, online.

Most of the 27 companies state that they’re committed to protecting personal information, but acknowledge that they may be required to disclose personal data to meet law enforcement or state security requirements. The definition of what meets the threshold of being a national security or criminal case can be highly politicised in the PRC, and the process of definition isn’t similar to those that occur in a liberal democracy.

The political system of the PRC creates this risk. Law in the PRC is first and foremost political and a governing tool that enforces political power. It’s meant to be wielded by the party-state and to uphold and expand the power of the state. Its implementation is reliant on the CCP’s leadership and is used to strengthen the party’s governing capacity, but the law isn’t above the party-state even if it’s used to manage its members.37 Nonetheless, the law is more than a blunt weapon of state power. It’s important to think through the implications of the fact that the law also functions as a tool to set and communicate the state’s expectations of its apparatuses, its entities and individuals. New developments related to data collection, storage and transfer make these issues more apparent.

The Chinese party-state is currently deliberating on a draft Data Security Law (DSL) and draft Personal Information Protection Law (PIPL).38 In April 2021, second draft versions were issued publicly (see the appendix to this report for translations of the articles of the draft laws that we focus on in this section). Both are expected to become law in 2021. The third and probably final version of the draft DSL is expected to be deliberated at a National People’s Congress Standing Committee meeting on 7–10 June 2021.39

These laws don’t exist in a vacuum. They should be read along with a suite of other relevant state security legislation, including, for example, the State Security Law (2015) and the Cybersecurity Law (2016).

2.1 Data regulations: limiting individuals and organisations while empowering the state

The draft DSL and draft PIPL should be read together. The main distinction is that the draft DSL lays out the responsibilities of the state in creating a data security system and in guaranteeing data security, whereas the draft PIPL defines the boundaries and personal information protection requirements for individuals and entities.40

What makes the framework unique, compared to any other country’s laws regulating data security, is that data security is unambiguously part of the party-state’s security strategy and is first about protecting the CCP’s monopoly hold on power (Figure 6). The draft DSL says that the effort to guarantee data security must adhere to the party-state’s ‘comprehensive state security outlook’.41

The draft establishes the state as the leader of the data security system, stating that the ‘central state security leading mechanism’ is ‘responsible for decision making and overall coordination on data security work, and researching, drafting and guiding the implementation of national data security strategies and relevant major guidelines and policies.’42

Figure 6: Explainer: The PRC’s state security concept

Figure 6 (continued): Explainer: The PRC’s state security concept

Sources: ASPI authors’ Illustration. See endnote for detailed citations.43

The law says not only that a party entity is in charge, but also that any significant policies will originate there. The term ‘central state security leading mechanism’ in legal documents is synonymous with the Central State Security Commission, which is a CCP body led by Xi Jinping.44 Therefore, the activity of other state regulatory departments and public and state security organs responsible for implementing data security efforts would flow from the decision-making and strategy that the Central State Security Commission is tasked with overseeing and implementing.45

The draft DSL also applies to data-handling activities taking place ‘outside the territory of the PRC’, if those activities are seen to ‘harm the state security, the public interest, or the lawful rights and interests of citizens’ and organisations of the PRC, they are to be pursued for legal responsibility ‘in accordance with law.’ Existing law and practice illustrate the global application of such concepts.

Hong Kong’s new National Security Law, passed in 2020, criminalises ‘separatism’, ‘subversion’, ‘terrorism’ and ‘collusion’ in addition to support for any of those activities by anyone, no matter where in the world they’re located.46

The draft PIPL, meanwhile, is intended to regulate the power of individuals and entities who handle the personal data of PRC citizens both inside and outside the country. It establishes a more robust system for protecting individuals’ data privacy from individuals and companies.47 It applies to activities outside the PRC involving the handling of personal information of natural persons within the territory of the PRC when those outside actors are providing products or services to persons within the PRC, analysing and assessing the conduct of natural persons within PRC or ‘other situations provided for by law or administrative regulations’. Just like the draft DSL, it leaves open the potential that the law can be used as intended: to protect the CCP’s power wherever necessary. Laws such as the Intelligence Law illustrate specific cases in which other legislation might be used to justify this reach, and a law such as the Hong Kong National Security Law illustrates the fact that political opponents of the party-state might also be targeted in vague ‘other situations’.48

The draft PIPL also superficially applies to the state. For example, it says that any retrieval of personal information requires following ‘legally prescribed duties’ and must be done ‘in accordance with the authority and procedures provided by laws’.49 Yet, Article 19 establishes that: [W]hen personal information handlers handle personal information, where there are circumstances that laws and administrative regulations provide shall be kept confidential or need not be announced, it is acceptable not to notify the individual.

On the basis of that logic, any case in which the 2017 Intelligence Law applies could be excluded from the PIPL’s protections. Article 7 of the Intelligence Law says that: [A]ny organisation and citizen shall in accordance with the law, support, provide assistance, and cooperate in national intelligence work, and guard the secrecy of any intelligence work they are aware of.50

The important takeaway is that digital technology can be applied in ways that expand the aforementioned capabilities of the party-state, but governance of its use can be managed in ways that restrict officials’ discretion in applying it. This doesn’t mean, however, that these regulations limit the party-state’s influence. In reality, the regulations enhance their ultimate influence over digital technologies and the flow of data.

2.2 Data regulations: setting the standards

Both draft laws contain directives on how the party-state expects data security and data privacy regimes to develop. They establish that, in the PRC, data shall be collected, stored and processed in a manner that’s consistent with the party-state’s paramount security concepts and objectives. Especially given the party-state security concept guiding data security, it’s notable that Xi Jinping has called for strengthening ‘the Party’s leadership over standardisation work’ and has described standardisation as the ‘commanding heights’ of international economic and technological competition.51

Beyond establishing which institutions are in charge and who is responsible for data security, the draft DSL also establishes expectations about how the PRC’s standardisation system is to function that are specific to data security. The draft DSL says that State Council administrative departments and other relevant State Council departments are responsible for organising ‘the formulation and appropriate revision of standards related to technology and products for the development and use of data and to data security.’52 The most relevant body under the State Council is the Standardisation Administration of China (SAC), which is an agency under the State Administration for Market Regulation. According to the revised 2017 Standardisation Law,53 the SAC is required to oversee standards initiation and implementation. At the practical level, technical committees develop standards, which are then accredited by the SAC.54

The technical committees working on the standards consist of stakeholders that are mostly government entities, government-linked research institutes and commercial enterprises. Many standards they develop are mandatory requirements, which companies must also meet to successfully bid for a project domestically. A March 2021 report by IPVM pointed to documents such as ‘GA/T1400.3—2017’ on ‘public security video image information application systems’ developed by the Science and Technology Information Technology Bureau of the Ministry of Public Security in coordination with several companies included in the Mapping China’s Technology Giants project, including Uniview, Hikvision and Dahua.55

As the standards develop domestically, they’ll also be projected globally, not just through market activity but also as the PRC seeks to participate and shape international technology standards. The SAC is also responsible for representing the PRC at international standards-setting bodies.56 Both the draft PIPL and the draft DSL have provisions stating that the state is required to participate in setting international rules and technology standards for data security and personal information protection.57

The expansiveness of that expectation-setting creates normalised pathways for the PRC to exploit data-sharing downstream in ways that can undermine the security of other countries, as we describe in the next section.

3. Rethinking digital supply-chain vulnerability

Not all methods used to acquire data need to be intrusive, subversive, covert or even illegal—they can be part of normal business data exchanges. Figure 1 illustrates how a digital supply chain can be compromised without a malicious intrusion or alteration. The data-sharing relationships that bring commercial advantages are also the same ones that could compromise an organisation.

Thinking about risk solely in terms of potential disruption ignores the ways in which supply-chain risk can emerge from normal processes, in which no disruption is required.

The vulnerability of supply chains was made apparent by the Covid-19 pandemic, which made supply-chain resilience even more important. As we become more digitally interconnected, the breadth of what’s considered a risk to the supply chain has grown to include risks to the digital supply chain—the electronic products we rely on and the data that flows through them.

Discussions about digital supply-chain security typically prioritise the potential for disruption or malicious alterations of the supply chain. Examples include cyberattacks, altered components inserted into the supply chain and limited access to critical supplies such as semiconductors. That kind of risk from well-resourced state and non-state actors is already well understood by governments thinking about supply-chain security.58 As we noted in the section on ‘The PRC’s data ecosystem’, the PRC’s sophisticated offensive cyber capability and its ability to obtain data through those methods are also well known. But a digital supply chain threat doesn’t necessarily require malicious alterations or cyber intrusions into a network.

The SolarWinds supply-chain attack of 2020 is one example of a supply-chain cyberattack perpetrated through the malicious insertion of software. In that case, threat actors, probably of Russian origin,59 compromised the software update service for the SolarWinds Orion platform to facilitate the distribution of malicious code to Orion customers.60

Another cybersecurity risk in the supply chain that’s hidden in plain sight comes from ‘white labelling’ of original equipment manufacturer (OEM) products.61 That was the case with US-headquartered Honeywell, which came under scrutiny in 2018 for selling Dahua cameras under its own brand, as Dahua was banned in the US under the National Defense Authorization Act.62 A simple example of risk for customers in this situation is that they may be monitoring cybersecurity vulnerabilities for Honeywell products, not knowing that in fact they should also be monitoring vulnerabilities for the underlying Dahua product.

Other areas of discussion include vendor trustworthiness. The 5G vendor debate within Australia a few years ago brought to light the importance of the ownership and control of network infrastructure.63 More broadly, it made organisations consider the risk of the vendors whose equipment their organisations’ data would be passing through and the obligations that those vendors have to their ‘home’ governments.64 Australia’s lead cybersecurity agency, the Australian Cyber Security Centre, in its guidance to organisations on identifying digital supply-chain risks, addresses this need to take into consideration foreign control, influence and interference.65

While these discussions are likely to lead to important policy responses that address some digital supply-chain vulnerabilities, they don’t capture the full scope of risk that currently exists. In the SolarWinds and Honeywell examples above, those charged with ensuring cybersecurity usually look for changes to normal activity as an indicator of a problem or threat. In cases where the risk lies within standard data exchange processes, therefore, it could be easily missed. 

3.1 Downstream data access: the GTCOM case study

The ASPI ICPC policy brief Engineering global consent focused on Global Tone Communication Technology Co. Ltd (GTCOM), which is a subsidiary of a state-owned enterprise directly controlled by the Central Propaganda Department of the CCP that collects bulk data globally in support of the party-state’s propaganda and state security objectives.66 The data ecosystem emerging from GTCOM’s commercial partnerships includes some of the PRC’s largest and most important technology companies. For GTCOM, strategic cooperation with globally recognisable PRC-based companies—notably Huawei and Alibaba Cloud—provides assistance in two key areas in the form of:

  • the opportunity to conduct bulk data collection by providing translation services to both companies, which have deeper market penetration
  • the development of or access to capabilities that support its bulk data collection.

As Figure 7 shows, GTCOM has commercial partnership agreements that provide it with access to bulk data from other PRC-based technology companies.

Data transfers can occur through processes built directly into the ecosystem. A technology company such as GTCOM provides an important case study in how the data ecosystem could reach far beyond the PRC’s data regulatory regime.

Figure 7: GTCOM and the global data collection ecosystem concept

Sources: ASPI authors’ illustration.

3.2 Processing power

The party-state prioritises data collection domestically and globally. As we’ve described above, it’s building an ecosystem that enables access to any bulk data collected through commercial enterprises.

It further recognises that technology will eventually catch up to its ideas for processing and generating specific outputs. Being able to collect data is useful, but it’s the ability to access and aggregate data for analysis and derive useful insights from it that’s powerful.

The business model of internet giants such as Facebook, Google, ByteDance and Tencent heavily relies on data and the use of artificial intelligence. They collect large volumes and many varieties of data from users of their service platforms. For example, they may collect such things as user platform preferences, platform behaviours (such as how long it took an individual user to click from one page to another), how long the user stayed on a page, what products they put into their shopping cart and who their friends are, as well as real-world information such as the running routes of the user and the user’s home location. The data is aggregated to generate profiles of individual users for marketing and advertising purposes, and also to improve the platform. That in turn leads to greater user engagement and provides additional opportunities to collect more data. Data brokers perform a similar aggregation and analysis task, but they usually use data that they’ve mined freely from the internet or purchased from other sources.

The concern isn’t necessarily that data is being collected, but rather the ability to infer sensitive details about individuals from the aggregation of seemingly innocuous bits of data from a variety of sources.

A single geolocation coordinate out of context isn’t meaningful, but, using location data from a single mobile device collected over time, it’s possible to identify an individual in a household and their pattern of life. All that’s needed is to identify their three primary locations—home, work and one other regularly used location.

That kind of data can be used to target individuals, such as by identifying and tracking the movements of the US President,67 and can identify sensitive military locations en masse,68 but it can also be used to create convenience. Google Search results provide popular times, wait times and visit durations for all users searching for a local business by using ‘aggregated and anonymised data from users who have opted in to Google Location History’.69

The use of big data analytics to monitor operations in smart cities can bring greater efficiency benefits to operations, facilitate data sharing and assist with decision-making and situational awareness overall. However, that same data, in the hands of adversaries, could give them macro-scale insights that would otherwise be difficult to obtain. If those systems are under the control of adversaries, the concern isn’t just about others having access to the data but also about adversaries’ ability to control or modify the data. As a consequence, the information used to create convenience, improve efficiency and enhance situational awareness is the same information that can be used by an adversary. The ability of some PRC-based technology companies to process big data is sufficiently large.

According to reporting in Foreign Policy, they’ve been used by the party-state to carry out intelligence tasks. According to ‘current and former officials’ cited in the report, this has included the acquisition of datasets from large data breaches, such as the 2014 cyber intrusion into the US Office of Personnel Management.70 It’s big data analysis like this that the US Central Intelligence Agency believes enabled the exposure of its undercover officers in Africa and Europe.71 The question that requires further research and analysis is why those PRC-based companies were chosen. For instance, were they chosen not just for their processing ability but also because, by ingesting the datasets and combining the data with their own holdings, they could enrich the information that could be derived from the data?

Commercial businesses aren’t the only entities carrying out large-scale data processing in the PRC.

The party-state is also doing it at the national level. The People’s Bank of China has included a ‘Big Data Analytics Centre’ as part of the design of the PRC’s ‘Digital Currency / Electronic Payments’ system. The bank’s officials have said that the data collected through the system will be used to improve macroeconomic policy. The bank will ‘analyse how money is being used, transacted, and stored; support tracking and surveillance using both static and real-time data; provide data and analysis inputs for monetary policy; and flag financial fraud’.72

Goals associated with harnessing the strategic power of data are a natural extension of long-enshrined goals in authoritative party-state documents and embedded in detailed economic policies and plans to ensure progress toward those goals.73 However, the party-state’s development of theory and policy is an iterative process and has always involved a degree of experimentation to ensure progress without too many unintended consequences.74 Control or the preservation of the CCP’s power isn’t a goal unto itself, but rather a prerequisite for achieving those ambitions. The collection, storage and processing of big data will play an increasingly key role in those efforts in future.

4. Recommendations

Adequately evaluating the risks associated with doing business with PRC-based technology companies, or companies that rely on their technologies in their supply chains, requires an understanding of the Chinese party-state’s articulation of its own intentions. It also requires an understanding of the implications of policy and legal documents that signal what steps will be taken to realise intended outcomes, as well as, of course, analysis of the party-state’s actual behaviour (domestic and global).

We recommend as follows.

1. Invest resources to better understand the PRC’s and the CCP’s articulation of their own intentions in order to set the tone for a more informed public debate that will generate targeted responses to the identified problems.

Incorrect assumptions are often made about the party-state’s intent. In addition, what’s being articulated and signalled through PRC policy and legal documents is too often ignored or not placed into the context in which it’s being articulated or signalled (such as being placed in an appropriate political context) or being described (for example, in the light of the CCP’s view that data security is a problem of state security, as the party-state defines ‘state security’).

2. Recalibrate data security policy and privacy frameworks to account for the Chinese state’s use of data to reinforce its political monopoly.

Companies and governments too often assume that other governments’ data and privacy regulations share the same goals as their own. That isn’t true when it comes to the Chinese party-state and PRC-based companies, even if common vocabularies are used or if some policy drivers are similar. In the PRC, unlike in liberal democracies, data security and privacy concepts (including draft legislation) reinforce the party-state’s monopoly power. Companies and governments need to recognise this risk and calibrate their policies to account for it.

3. Collaborate with like-minded countries to develop systems for improving risk-based approaches to improving the regulation of data transfers.

Organisations must assess the value of their data, as well as the value of that data to any potential party in their supply chain that may have access to it or that might be granted access. In an age in which information warfare and disinformation campaigns occur across social media platforms and are among the greatest threats to social cohesion, data that’s about public sentiment is as strategically valuable as data about more traditional military targets. Risk needs to be understood in a way that keeps up with the current threat landscape, in which otherwise innocuous data can be aggregated to carry meaning that can undermine a society or individuals.

4. Take a multidisciplinary approach to due diligence.

Governments, businesses and other organisations need to develop frameworks for conducting supply-chain reviews that take into account country-specific policy drivers. Developing such a framework shouldn’t be limited to just assessing a vendor’s risk of exposure to political risk. It should also include detailed analysis of the downstream actors who have access to the vendor’s data (and must include analysis of things such as the broader data ecosystem they’re a part of and the obligations those vendors have to their own governments). Taking this more holistic approach to due diligence will better ensure that data can be protected in an effective way.

Appendix: The draft Data Security Law and draft Personal Information Protection Law

Please download the PDF to access the appendix.


Acknowledgements

Thank you to Danielle Cave and Cheryl Yu for all of their work on this project. We would like to also thank our external peer reviewers Lindsay Gorman, Kara Frederick and Chris Crowley. We’re also grateful for the valuable comments and assistance provided by Peter Mattis, Tom Uren, Michael Shoebridge and Fergus Hanson.

This research report forms part of Mapping China’s Technology Giants, which is a multi-year project mapping and analysing the overseas expansion of key Chinese technology companies. The project seeks to:

  • analyse the global expansion of a key sample of China’s tech giants by mapping their major points of overseas presence
  • provide the public with analysis of the governance structures and party-state politics in which these companies have emerged, and are deeply entwined.

The Mapping China’s Technology Giants project is produced by researchers at ASPI’s International Cyber Policy Centre. The relaunch of this project, and associated research, was funded with a US$270,000 grant from the US State Department

What is ASPI?

The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI’s sources of funding are identified in our annual report, online at www.aspi.org.au and in the acknowledgements section of individual publications. ASPI remains independent in the content of the research and in all editorial judgements.

ASPI International Cyber Policy Centre

ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber, emerging and critical technologies, issues related to information and foreign interference and focuses on the impact these issues have on broader strategic policy. The centre has a growing mixture of expertise and skills with teams of researchers who concentrate on policy, technical analysis, information operations and disinformation, critical and emerging technologies, cyber capacity building, satellite analysis, surveillance and China-related issues.

The ICPC informs public debate in the Indo-Pacific region and supports public policy development by producing original, empirical, data-driven research. The ICPC enriches regional debates by collaborating with research institutes from around the world and by bringing leading global experts to Australia, including through fellowships. To develop capability in Australia and across the Indo-Pacific region, the ICPC has a capacity building team that conducts workshops, training programs and large-scale exercises for the public and private sectors.

We would like to thank all of those who support and contribute to the ICPC with their time, intellect and passion for the topics we work on. 

If you would like to support the work of the centre please contact: icpc@aspi.org.au

Important disclaimer

This publication is designed to provide accurate and authoritative information in relation to the subject matter covered. It is provided with the understanding that the publisher is not engaged in rendering any form of professional or other advice or services. No person should rely on the contents of this publication without first obtaining advice from a qualified professional.

© The Australian Strategic Policy Institute Limited 2021

This publication is subject to copyright. Except as permitted under the Copyright Act 1968, no part of it may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Enquiries should be addressed to the publishers. Notwithstanding the above, educational institutions (including schools, independent colleges, universities and TAFEs) are granted permission to make copies of copyrighted works strictly for educational purposes without explicit permission from ASPI and free of charge.

First published June 2021.
ISSN 2209-9689 (online),
ISSN 2209-9670 (print).

Cover image: ASPI ICPC, Nathan Attrill

Funding Statement: Funding for this report was provided by the US State Department.

  1. Mapping China’s Tech Giants, online. ↩︎
  2. Samantha Hoffman, Engineering global consent: the Chinese Communist Party’s data-driven power expansion, ASPI, Canberra, 14 October 2019, online. ↩︎
  3. Hoffman, Engineering global consent: the Chinese Communist Party’s data-driven power expansion. ↩︎

Mapping China’s Tech Giants: Reining in China’s technology giants

This report accompanies the re-launch of our Mapping China’s Technology Giants project.

This report is available for download in English and Arabic.

Other Reports that are part of this project include:

1. Introduction

Since the launch of ASPI ICPC’s Mapping China’s Technology Giants project in April 2019, the Chinese technology companies we canvassed have gone through a tumultuous period. While most were buoyed by the global Covid-19 pandemic, which stimulated demand for technology services around the world, many were buffeted by an unprecedented onslaught of sanctions from abroad, before being engulfed in a regulatory storm at home.

The environment in which the Chinese tech companies are operating has changed radically, as the pandemic sensitised multiple governments, multilateral groups and companies to their own critical supply-chain vulnerabilities. The lessons about national resilience learned from the pandemic are now being applied in many sectors, including the technology sector, where a trend towards decoupling China and the West was already well underway. As the geopolitical rivalry between the US and China has heightened, both sides increasingly see any reliance on the other for strategic commodities, such as rare-earth minerals and semiconductors, as dangerous vulnerabilities.

Supply-chain vulnerability has ignited work in Europe, North America and other regions to reduce dependence on China. Telecommunications companies such as Huawei and ZTE that are deemed ‘high risk’ by multiple countries are increasingly finding themselves locked out of developed markets. Amid the trade war between the US and China, which began in 2018, the Trump administration unleashed a relentless series of actions targeting Chinese companies in an effort to slow their advance. That onslaught has further convinced China’s leadership to redouble its efforts to dominate the commanding heights of technology as a source of strategic and economic power.

Among the measures meted out by the Trump administration were limits on investment by Chinese technology companies,1 blocks on the operations of Huawei and other Chinese telecom companies in the US,2 pressure on other countries to block Huawei’s operations,3 new export control regulations,4 tariffs on products benefiting from Beijing’s ‘Made in China 2025’ program5 and an attempt to ban ByteDance’s TikTok and Tencent’s WeChat apps.6 The effects of the actions have been uneven—dealing a major blow to Huawei, for example, while barely touching the major Chinese internet firms’ businesses.

For China’s leadership, the twin crises of the Covid-19 pandemic and the growing China–US strategic and technological competition highlighted the country’s need to achieve its long-held goal of ‘technological self-reliance’.7 The US’s ability to cut off China’s technology companies’ access to semiconductors, in particular, is seen by leaders from Xi Jinping down as an unacceptable ‘choke point’ holding back China’s progress.8 The 14th Five-Year Plan, unveiled in March 2021, reflected the Chinese Communist Party’s (CCP) sense of urgency. For the first time, it described technological innovation as a matter of national security, not just economic development.9

The now 27 Chinese technology firms that we cover on our Mapping China’s Technology Giants project (‘our map’) span sectors including biotechnologysurveillanceartificial intelligence (AI), e-commerce, finance, entertainment and telecommunications. All of them are set to play a key role in the coming years as Beijing ramps up major investments in strategic technologies such as 5G telecommunications, quantum computing and AI. Both state-owned and private businesses are being mobilised in a ‘whole country’ approach to reduce reliance on foreign technologies and seek breakthroughs in strategic science and technology projects.10 Beijing’s new goal is to increase R&D investment by 7% each year.11 Already, several of the companies featured on our map, including SenseTime, Huawei, ZTE, MegviiYITUCloudWalkBaiduAlibaba, Tencent and China’s three major telecommunications companies, have been recruited into a US$2 trillion ‘new infrastructure’ plan.12

Pushback on China’s technology giants didn’t just come from Washington, however; it also came from the CCP. Chinese regulators used the Covid-19 pandemic as an opportunity to tighten supervision over the companies, which had grown into behemoths with relatively light regulatory oversight in the past decade.13 The escalating geopolitical tensions with the US and the ensuing US–China trade war contributed to a government campaign to rein in Alibaba’s fintech affiliate Ant Group, as the Chinese state sought to head off risks in the banking system amid concerns that the stand-off with Washington could precipitate a financial crisis.14 Those concerns culminated in the abrupt cancellation of the company’s initial public offering (IPO), which was set to be the world’s largest ever, just two days before its launch in Shanghai and Hong Kong in late 2020.15

Since then, the CCP’s efforts to tighten state control over China’s internet companies have widened. In April 2021, Chinese e-commerce leader Alibaba Group was hit with a record US$2.81 billion antimonopoly fine, equivalent to around 4% of its 2019 domestic sales.16 A string of high-level resignations has followed as the government continues to seek to weaken the central authority of all the leaders of the major tech companies.17 China’s regulators, tasked with ‘tackling monopolies’ and ‘preventing disordered capital expansion’, have set their sights on a fundamental restructuring of the country’s biggest tech companies to ensure that they remain focused on technological innovation and align themselves even more closely with the strategic goals of the CCP.18

2. Covid-19

The Covid-19 pandemic has had a profound effect on the world economy. The International Monetary Fund estimates the global economy shrank by 4.4% in 2020, compared to a contraction of 0.1% in 2009 during the global financial crisis.19 China was no outlier in the first quarter of 2020, when its economy shrank by 6.8% in the first such contraction in at least 40 years.20 Yet, amid the turmoil, technology giants—particularly in the US and China—provided a rare bright spot as they seized the opportunity to expand aggressively.

As reliance on digital products grew during the pandemic, demand for US and Chinese technology giants’ products and services surged. The combined revenue of the largest US tech companies—Apple, Microsoft, Amazon, Google-parent Alphabet and Facebook—grew by a fifth to US$1.1 trillion, while their combined market capitalisation grew by half during 2020 to US$8 trillion.21 As of May 2021, the 27 companies we cover on our map had a combined market capitalisation of more than US$2.2 trillion, ranking them, in estimated nominal GDP terms, as equivalent to the world’s eighth largest economy, after France.22 Only three of the companies on our map—Huawei, Megvii23 and CloudWalk— experienced slowing year-on-year revenue growth.

Some of China’s internet companies, including Tencent, Alibaba, ByteDance, Huawei and biotechnology company BGI, attempted to turn the crisis into a public relations opportunity by providing financial or material assistance to countries struggling to control the Covid-19 pandemic (Figure 1). To take one example: Tencent’s Covid-19 donations from its US$100 million Covid-19 fund included medical equipment to sporting teams such as Football Club Barcelona24 and the New England Patriots25, cities such as Nashville (US)26, countries such as Ethiopia27, hospitals in Los Angeles (US)28 and Karachi (Pakistan)29, and the World Health Organization’s Covid-19 Solidarity Response Fund.30

Figure 1: China’s technology giants’ overseas donations

The Mapping China’s Technology Giants project currently counts a total of more than 130 donations by all tracked companies combined. Over eighty of those donations are Covid-19 monetary and medical donations from ByteDance, Tencent and Alibaba.

Tencent’s largesse was possible due to its oversized success. Supercharged by the pandemic, the company was able to exploit falling valuations to scoop up Norwegian game developer Funcom, take a stake in German developer Yager and make multiple investments in fintech start-ups, mainly in Europe and the US. The company currently sits on a portfolio worth roughly a quarter of a trillion dollars.31

As Chinese consumers ensconced themselves at home, Tencent’s music and video service subscriber numbers swelled to 43 million and 112 million, respectively, growing by 50% and 26% from June 2019 to 2020.32 WeChat, the company’s ubiquitous social media app, ballooned to over 1.2 billion users in the first quarter of 2020, up by more than 8% from 2019, as Tencent worked in collaboration with the Chinese Government’s National Development and Reform Commission to create the WeChat Health Code app used to verify people’s exposure to Covid-19.33 Tencent’s profit for the whole of 2020 stood at US$25.1 billion (Ұ159.8 billion), a year-on-year increase of 71%.34 At the time of writing, Tencent’s market capitalisation is around US$800 billion, making it China’s most valuable company.

Despite 13 companies on our map having been added to the US Government’s Entity List (see box below) and facing challenges while operating during the pandemic, many continued to report strong growth throughout 2020.

The Entity List

The US Department of Commerce’s Entity List was created in 1997 to address risks related to the proliferation of weapons of mass destruction. The US Government has since expanded its basis for adding entities to the list to include countering Chinese military activity, countering spying and addressing human rights concerns.35 Companies placed on the Entity List are banned from buying parts and components from US companies without government approval.

BGI, for example, saw its profits surge as Covid-19 spread around the world, despite the addition of two of its subsidiaries to the Entity List in July 2020. As of August 2020, BGI had already sold 35 million Covid-19 rapid-testing kits to 180 countries and built 58 labs in 18 countries (Figure 2).36 Due to its rapidly expanding global presence, the company experienced a net profit surge of 653% during 2020, and the value of its shares climbed by 87%.37 BGI’s operating income in the North American market even increased by 556.23%, making up 9.91% of the company’s total operating income in 2020.38 By March 2021, BGI’s market capitalisation on the Shanghai stock exchange had jumped to US$7.9 billion (Ұ50.83 billion), up from its March 2020 market capitalisation of US$5.26 billion (Ұ33.86 billion).39

Figure 2: BGI’s overseas presence

The Mapping China’s Technology Giants project currently counts more than 100 points of presence for BGI overseas, including commercial partnerships, Covid-19-related donations, investments, joint ventures, memorandums of understanding, overseas offices, research partnerships and subsidiaries.

WuXi AppTech Group is another biotech company that experienced growth during Covid-19, increasing its market capitalisation by 130%.40 Since the beginning of the pandemic, WuXi has been involved in the research and production of antibody treatments for Covid-19, and in January 2021 announced its plans to begin producing vaccine components for British–Swedish pharmaceutical company AstraZeneca at WuXi’s manufacturing facility in Germany.41

Three of our mapped internet companies were responsible for donating notable sums of money globally in the fight to combat Covid-19. ByteDance, Tencent and Alibaba ranked in the world’s top Covid-19 corporate financial donors, donating close to US$436 million, US$173 million and US$144 million, respectively.42 Those sums fall behind donations from only two leading US technology companies: Google and Cisco donated US$1.3 billion and US$226 million, respectively.43

The three Chinese companies also experienced significant growth in 2020:

  • ByteDance’s revenue more than doubled despite the challenges that its subsidiary TikTok faced, including a ban from the Indian market and attempts by the Trump administration to force TikTok’s sale to an American owner.44
  • Similarly, Alibaba has been referred to as ‘one of China’s biggest corporate winners of the coronavirus crisis’, as the company’s online traffic skyrocketed in 2020 and the Chinese Government increased its reliance on Alibaba’s cloud services in response to the pandemic.45
  • Ant Group, which is an affiliate of Alibaba, was essential in China’s initial Covid-19 response. Early in the pandemic, the company assisted the Chinese Government in developing and implementing the Alipay Health Code to facilitate contact tracing.46 Ant’s small-business lending platforms accumulated a US$300 billion credit balance, and its wealth management platform facilitated US$590 billion worth of investments.47

Similarly, HikvisionUniviewSenseTime,48 iFlytek (Figure 3),49DJIMeiya Pico50 and Ping An Technology51—a collection of surveillance, AI and technology companies—grew by developing technology used in response to Covid-19. Many of those technologies include temperature-screening products and contact-tracing systems. SenseTime claimed it has improved its facial-recognition algorithm to identify individuals wearing masks using just the person’s visible facial features.52

Figure 3: iFlytek’s Covid-19 impact

Source: This is an extract from one of our ‘Thematic snapshots’ on the Mapping China’s Technology Giants project website (under ‘Analysis’), online.

Surveillance company Hikvision’s revenue initially fell in the first quarter of 2020, but rebounded in the second quarter due to the company’s overseas revenue growth from its ‘fever cameras’.53 Uniview followed a similar pattern, first experiencing a sales and profit slowdown in the first half of 2020 and then recovering by the end of the year due to strong overseas growth in temperature-screening products, according to our map (Figure 4).54

Figure 4: Overseas expansion by Hikvision, Dahua and Uniview during the Covid-19 pandemic

The Mapping China’s Technology Giants project depicts the overseas expansion of Hikvision, Dahua and Uniview as overseas demand for their temperature-screening products increased during the Covid-19 pandemic. The map contains 65 data points of overseas presence relating to Covid-19 for the three companies, including donations, commercial partnerships and surveillance equipment.

Drones manufactured by technology company DJI proved useful in helping counter the spread of Covid-19. The company sold drones to countries, including France, Norway, Italy, the Philippines, Spain and Indonesia, and 22 states in the US to disinfect public areas and to patrol streets.55

Although China’s economic growth slowed to 2.3% by the end of 2020, its economy emerged as the only major economy expected to have grown in 2020 as a result of the pandemic.56 China’s digital economy, in particular, was positively affected by Covid-19, expanding by 9.7% from 2019.57 While China’s economic recovery had a head start, the International Monetary Fund expects the global economy to recover and grow by 6.1% in 2021, estimating 5.1% growth for advanced economies and 6.7% growth for developing economies.58

Despite external pressures amid tense US–China relations, Covid-19 provided the technology giants on our map with an opportunity to expand both domestically and overseas. High-profile donations of personal protective equipment from the tech giants helped to burnish their brands as well as deflect criticism of the Chinese state’s cover-up of the Covid-19 outbreak in its early days. China’s tech giants may have received a short-term boost from the pandemic, but over the longer term their prospects are less certain as many countries begin to address their dependence on China in critical sectors.59 As those countries make changes to reduce their reliance on China, the overseas growth that Chinese tech companies have experienced may slow.

3. US-China tech tensions

As factories in China were shut down and exports from the country ceased in China’s early response to the Covid-19 outbreak, the pandemic triggered countries and companies to move away from their supply-chain reliance on China. Before the pandemic, the US Entity List played a role in the Trump administration’s push to decouple the US economy from China. Cooperating with blacklisted companies on the Entity List raised fears among Western businesses about the data security and privacy risks associated with continued collaboration.60 As those concerns and Entity List designations began affecting business between US and Chinese companies, the ramifications of the listings spread globally, influencing the actions of other countries against some of the technology giants on our map.

The impacts of the US Entity List and ensuing global actions against the Chinese technology companies that we observed have varied drastically, significantly slowing Huawei’s overseas growth and overall expansion, while sparing major internet companies, including ByteDance, Tencent and Alibaba.61 The Entity List designation of telecommunications companies Huawei and ZTE prompted other countries, such as the members of the Five Eyes group and the EU, to implement policies aimed at limiting and in some cases excluding those companies from their 5G infrastructure. Although Covid-19 provided several surveillance and AI companies with an opportunity to neutralise such effects, many countries are still responding to security concerns associated with China’s tech giants, and the impacts of further global actions can be expected to shift in severity in coming years.

In the five years since the US first blacklisted ZTE in 2016—in a move that threatened the corporate viability of the Chinese telecommunications company62—Washington has widened its net to include a range of other Chinese companies, including 16 of the 27 featured on our map. As of April 2021, more than 400 Chinese companies, organisations and affiliates had been placed on the Entity List.63

In addition to placing various Chinese companies on the Entity List, the Trump administration also prohibited US companies and citizens from investing in the securities of dozens of companies included in the Pentagon’s list of ‘communist Chinese military companies’ operating in the US (the CCMC List),64 including seven of the technology companies featured on our map: China Electronics Technology Group (CETC)China MobileChina TelecomChina Unicom, Hikvision, Huawei and Inspur.65 The Trump administration also proposed new rules that sought to eject Chinese firms from US stock exchanges for failure to comply with US auditing standards (Figure 5).

Figure 5: Timeline of US listings and other measures affecting Chinese tech companies

Note: For more information and sources, refer to Appendix 1.

3.1 The ZTE case

In March 2016, the US Department of Commerce added ZTE to the Entity List after it found that the company had schemed to hide its re-exports of US-origin items to Iran and North Korea, both of which were under US sanctions.66 The restrictions prevented suppliers from providing ZTE with US equipment, threatening the company’s supply chain.

While the ban brought the company to the brink of collapse, Washington extended a series of lifelines to ZTE, allowing it to maintain ties to its US suppliers before it agreed to pay US$892 million in a plea deal in March 2017.67 In April 2018, the US announced a seven-year ban on American firms selling parts and software to the company after it was found to be shipping US goods to Iran in violation of its agreement.68

The ban had an immediate effect on ZTE, bringing the company’s production to a grinding halt. It announced in April 2018 that it was ceasing ‘major operating activities’.69 The following month, US President Donald Trump threw an unexpected lifeline to the company, tweeting that there would be ‘too many jobs in China lost’ due to the US Government’s actions against ZTE.70

ZTE went on to report revenue growth hitting a five-year high during 2020. The company’s operating revenue reached almost US$16 billion (Ұ101.45 billion), indicating a year-on-year increase of 11.8%.71 Its net profit experienced a year-on-year increase of 17.3%, totalling US$672 million (Ұ4.26 billion).72 While sales had declined in the US and Europe, the company was able to achieve sufficient growth in Asian markets and domestically, where it made over two-thirds of its revenue.

In August 2018, Washington reached for another tool. The annual Defense Authorization Bill barred government agencies from procuring equipment from five Chinese companies, including ZTE.73 The Bill covered any substantial or essential technology component of any system used by US Government agencies, and especially mentioned technology used to track or view user data. As a result of the Bill, all agencies that were already using equipment provided by the Chinese companies were directed to allocate specific funding to replacing it.74 When the Bill was enacted, it also targeted other Chinese companies, including Huawei and Hikvision.75

3.2 Huawei’s global struggles

Similarly to its competitor, ZTE, Huawei continues to experience turbulence due to its addition to the US’s Entity List. The company was first blacklisted on 16 May 2019 by the US Commerce Department’s Bureau of Industry and Security, together with 66 of its non-US affiliates.76 The bureau later added several other affiliated entities in August 201977 and August 2020.78

In addition to using the Entity List, the Trump administration blocked global chip supplies to Huawei in May 2020, further impeding the global expansion of the company’s business.79 As the crackdown on the company continued, Huawei was designated as a national security threat, together with ZTE, by the US Federal Communications Commission on 30 June 2020, which effectively barred them from receiving federal broadband subsidies to expand broadband access across the US.80 Finally, in November 2020, Huawei and 30 other Chinese companies were included in an executive order that designated them as being backed by China’s People’s Liberation Army.81

As the US has taken action against Huawei, it has also actively encouraged and publicly pressured other countries to adopt similar policies.82 But many countries have taken their own, and often different pathways, to arrive at their decisions on 5G over the last few years. And some, like Australia, made their decisions long before the United States.

The Five Eyes countries have responded with some of the toughest policies against Huawei. In 2018, Australia became the first country to exclude ‘high-risk vendors’ from its 5G networks.83 New Zealand similarly rejected Huawei’s first bid in the country in 2018 due to national security concerns.84 The UK most recently banned mobile providers from purchasing new Huawei 5G equipment and announced that providers must remove all Huawei 5G equipment from their networks by 2027.85 Although Canada hasn’t formally blocked Huawei, the country has delayed its decision long enough to effectively force its telecom companies to exclude Huawei equipment from their 5G networks.86

According to the Dell’Oro Group, countries representing more than 60% of the world’s cellular-equipment market are now considering or have already acted to restrict Huawei.87 The EU and several of its members have taken similar actions to block or limit Huawei’s presence in their 5G network deployments . In January 2020, the EU recommended that its members limit ‘high-risk 5G vendors’, including Huawei, stopping just short of recommending an outright ban of the company.88 Swedish regulators banned wireless carriers from using Huawei’s 5G equipment, citing national security concerns. In response, however, Huawei challenged the decision in Swedish courts and has since threatened to exclude Ericsson from participating in China’s 5G growth.89

Romania and Poland both enacted policies aimed at blocking Huawei from their 5G networks, although the policies didn’t explicitly ban Huawei.90 Huawei sent a letter to the EU competition chief, in which the company argued that Poland’s and Romania’s proposed 5G security rules were ‘predicated on several violations of EU law’.91 In its letter, Huawei also cited the involvement of the US in those actions against the company, referencing ‘joint declarations’ and ‘memoranda of understanding’— aimed at pushing out 5G suppliers subject to foreign interference—that the US signed with several European countries, including Romania, Poland, Estonia, Latvia, the Czech Republic, Slovenia, Slovakia, Cyprus, Bulgaria, North Macedonia and Kosovo.92

In 2020, as a result of global actions against it, Huawei reported its slowest annual revenue increase in a decade.93 Specifically, Huawei’s revenue increased year-on-year by 3.8%, totalling US$136.7 billion,94 which was a drastic decline from its 19% revenue growth during 2019 (Table 1).95 Although the company still managed to grow overall, China was the only region where it experienced positive revenue growth.96 The company’s carrier business, which is responsible for building its telecom networks, grew by only 0.2%.97 That stall was largely due to the decision of several Western countries to exclude Huawei’s 5G equipment from their networks.98

Table 1: Huawei’s 2020 business revenue, by region

Source: Huawei Investment & Holding Co. Ltd, 2020 annual report, 2021, online.

While Huawei’s decline in growth was most pronounced in North and South America in 2020, Europe, the Middle East and Africa collectively showed the next greatest decline, followed by the Asia–Pacific. This resulted in the company’s decision to pivot its priority industries to focus on developing software. In an internal memo made public in May 2021, Huawei founder Ren Zhengfei wrote that Huawei should strive to ‘lead the world’ in software as the company seeks growth beyond its hardware operations.99

Although Huawei’s deputy chairman, Eric Xu Zhijun, said in an interview that the company’s goal for 2021 is ‘to survive’, experts such as Dan Wang, an analyst with Gavekal, have speculated that Huawei may pivot to new businesses, such as self-driving and electric-vehicle technologies.100 Already, Huawei reportedly has plans to invest US$1 billion into researching self-driving and electric vehicles and is reportedly in talks to acquire a domestic automaker’s electric vehicle unit.101 Through investing in businesses that are less reliant on advanced chips and through strengthening its software business, Huawei is searching for new revenue sources.102

US sanctions have particularly affected Huawei’s access to international technologies, such as advanced chips, that are essential for the company’s products. When the US Government barred Huawei from purchasing semiconductors produced using US software or technology without a special licence, the move crippled Huawei’s smartphone business and resulted in the sale of its Honor budget smartphone brand.103 US sanctions also required Google to revoke Huawei’s Android licence, leaving the company without access to Google apps and services that have been critical for the functioning of Huawei’s smartphones.104

In response to losing its Android licence, Huawei created a ‘forked’ version of Android to serve as its own operating system, Harmony OS, which is likely to face challenges as it seeks to attract developers and create apps.105 If it’s successful, however, Harmony OS would provide Huawei with complete control over an operating system with potential implementation in smartphones internationally, enabling Huawei to control the information environment—including which apps are banned—outside of China’s borders.106

Despite losing access to several markets globally, Huawei has signed new 5G and cloud-computing agreements with countries in Africa, the Middle East and Southeast Asia (Figure 6). Access to those markets will be critical for Huawei’s future as the US and the EU move to confront their supply-chain dependence on China.107

Figure 6: Huawei’s 5G and cloud-related overseas presence

Note: The Mapping China’s Technology Giants project website contains 200 data points of overseas presence relating to 5G and cloud technologies for Huawei.

3.3 Sanctions for all

Similarly to Huawei, state-controlled surveillance technology company Hikvision was added to the US’s Entity List in October 2019.108 Along with Hikvision, six other technology giants on our map were added at that time, including surveillance company Dahua, AI companies iFlytek, Megvii, SenseTime, and YITU, and digital forensics and security company Meiya Pico.109

Although Hikvision’s growth was boosted by Covid-19, a March 2020 disclosure detailed the negative impacts of sanctions on the company’s overseas market and income. The disclosure stated that, as a result of its Entity List designation, Hikvision had increased its R&D costs significantly to allow for expanding upstream technology, changing materials and adjusting product designs.110 Additionally, Hikvision has been restricted in other countries, such as India, where the company is prohibited from bidding on government projects.111 The company also faces scrutiny in Australia, where, as recently as January 2021, the South Australian health department removed all cameras made by Hikvision from public hospitals and nursing homes.112

Predicting its addition to the Entity List in 2019, Hikvision stockpiled essential components in preparation, which proved helpful in mitigating the immediate impacts.113 As the global chip shortage continues to affect the technology industry, however, Hikvision’s president has indicated future uncertainties for the company if the situation persists.114

Among the companies we tracked, BGI Group—a key supplier of Covid-19 testing technology—experienced the greatest growth despite being blacklisted by the US. In July 2020, the US Department of Commerce placed two of BGI’s subsidiaries (Xinjiang Silk Road BGI and Beijing Liuhe BGI) on the Entity List.115 However, due to the company’s key role in providing Covid-19 testing equipment, BGI reported a surge in its net profit and share price during 2020.

Other Chinese tech companies on our map that were affected by US sanctions include DJI and Nuctech. The US Department of Defense first issued a ban on the purchase and use of DJI’s commercial drones on 23 May 2018 and later added the company to the export blacklist in December 2020.116 Although DJI continued to expand during 2020, it faced challenges in maintaining its large presence overseas, reportedly having to make sweeping cuts to its global sales and marketing teams.117 Despite its Entity List designation, DJI maintains control of more than 70% of the global drone market, and North America remains its largest market.118

China’s major telecommunications companies—China Telecom, China Unicom and China Mobile—have been targeted by Washington in several capacities (Figure 7). Most recently, in January 2021, the three companies were added to the Pentagon’s CCMC List, which triggered a series of delistings and relistings of the companies by the New York Stock Exchange, eventually resulting in the final delisting of all three.119 The companies were also among 31 Chinese companies included in a November 2020 executive order that designated them as being backed by the People’s Liberation Army.120 Before those designations, the US Federal Communications Commission had already begun taking action against China Telecom and China Unicom in April 2020.121 Despite being added to the lists, all three telecom companies experienced growth during 2020 as they expanded their 5G operations—especially in China.

Figure 7: Chinese telcos’ overseas presence

Note: The Mapping China’s Technology Giants project counts more than 480 points of overseas presence for China’s three major telecommunications operators (China Mobile, China Telecom and China Unicom) combined.

Apart from those tech giants, several major Chinese technology companies on our map have been largely spared US economic countermeasures, specifically Alibaba, Ant Group, Baidu, ByteDance and Tencent. There were, however, disparate attempts by the Trump administration to take action against those companies, which all eventually failed during Trump’s term of office.

In January 2021, for instance, the US Department of State and Department of Defense pushed to add Alibaba, Tencent and Baidu to the CCMC List, which would have banned US investors from holding stock in the three companies.122 Previously, in August 2020, Trump issued two executive orders prohibiting any American company or person from conducting transactions with ByteDance, which is TikTok’s parent company, and Tencent’s WeChat.123 The bans were halted a month later by a US federal judge, citing First Amendment rights.124 In October 2020, the US State Department proposed adding Ant Group to the Entity List, which was seen as a move to discourage US investors from taking part in Ant’s upcoming IPO in Shanghai and Hong Kong. The bid was later put on hold by the Trump administration.125 Any impacts of attempted bans on those companies were neutralised as demand for digital products skyrocketed during the Covid-19 pandemic.

Although the attempts to take action against Alibaba, Ant Group, Baidu, ByteDance and Tencent were unsuccessful, they attracted global attention to the data privacy and security risks associated with using products and applications developed by the Chinese technology giants. Following US attempts, India permanently banned 59 Chinese apps from its domestic market in January 2021, while Germany’s intelligence agencies warned consumers that personal data provided to Chinese technology companies could end up in the possession of the Chinese Government.126 As the US and other countries continue targeting China’s tech giants through various regulatory measures, they’re being pushed to address their reliance on China just as China is seeking to reduce its dependence on the US for critical technologies, particularly semiconductors.

4. Localising supply chains: from a ‘choke point’ to ‘dual circulation’

From the perspective of Beijing’s policymakers, 2020 was a year in which, as Vice Foreign Minister Le Yucheng put it, China experienced a ‘plot reversal’ and ‘turned a crisis into an opportunity’.127 ‘Rather than being a “Chernobyl moment”’ for China, the pandemic became a ‘highlight moment for socialism with Chinese characteristics’, Le told a think-tank forum in December 2020. The triumphalist note came as China’s ability to contain the spread of Covid-19 before other major economies allowed it to rebound faster and end 2020 on a high note as the only major economy to report positive growth, achieving an economic expansion of 2.3%.128

Despite their upbeat tone, China’s leaders also recognised that the combination of the Covid-19 pandemic and the US–China trade war had exposed the country’s fragility in technological innovation. In a speech to scientists in September 2020, Xi Jinping stressed the need for China to ensure secure and stable supply chains and to pursue indigenous innovation: ‘We must give full play to the significant advantages of our country’s socialist system that concentrate power on large undertakings, and successfully fight tough battles for the key core technologies,’ he instructed.129

While the Chinese state’s goal of achieving self-reliance in technology has been a longstanding policy, the combination of the Covid-19 pandemic and the ever-tightening technology blockade imposed by the White House put the issue front and centre for the Chinese leadership. In December 2020, China’s Central Economic Working Conference announced that science and technology work would be the top priority in 2021. The 14th Five-Year Plan, unveiled in March 2021, described technological innovation as a matter of national security, not just economic development, for the first time.130

4.1 Mobilising the tech industry

China’s technology companies are set to play a key role in addressing that fragility as they’re mobilised in what Beijing’s top policy official, Jiang Jinquan, calls a ‘whole country approach’ to reduce reliance on foreign technologies.131 That effort would seek breakthroughs in ‘strategic and fundamental key science and technology projects’ so that the country can overcome ‘choke points’ in its technological progression, Jiang said in his interpretation of an as yet unpublished keynote speech made by Xi to China’s provincial-level leaders in early January 2021. As part of the plan, the country will establish ‘national teams’ to strengthen scientific research and innovation, according to Jiang. The private sector will be encouraged to invest in R&D, and the state will reward companies through ‘state purchase of research results’.

Several of the companies featured on our map, including SenseTime, Huawei, ZTE, Megvii, YITU, CloudWalk, Baidu, Alibaba, Tencent and China’s three major telcos, have already been recruited in a US$2 trillion new infrastructure campaign that the Chinese state introduced in the early days of the pandemic to boost the economy and cushion the impact of the global slowdown. The campaign targets high-tech sectors such as 5G infrastructure, AI, big data centres, the industrial internet, ultra-high-voltage high-speed intercity rail and electric vehicle charging infrastructure.132 The plan is largely a continuation of the Made in China 2025 campaign that was launched in 2015, with some minor cosmetic changes.

Made in China 2025 targeted investments in 10 strategic industries now largely dominated by the US, including aerospace, semiconductors, information technology, robotics, green energy, electric vehicles, agricultural machinery, pharmaceuticals and advanced materials. The campaign attracted sustained criticism from the Trump administration for its attempt to capture market share from China’s foreign technology rivals. The new infrastructure campaign dropped any reference to that plan as well as any explicit requirements that core technology must be sourced domestically. The campaign is funded mainly by the private sector and local governments instead of the national government.133

China’s three national telecom carriers (China Unicom, China Telecom and China Mobile) collectively promised in March 2020 to invest around US$34 billion (Ұ220 billion) to build 5G base stations in China. Tencent said that it would invest US$77 billion (Ұ500 billion) over the following five years in new infrastructure technologies, such as cloud computing, and cybersecurity. Alibaba also pledged US$30 billion (Ұ200 billion) in new infrastructure investments over three years.

4.2 All about the chips

Over the long term, the success of the new infrastructure campaign hinges on China’s access to the world’s most advanced semiconductor chips, which are the basic building blocks for emerging technologies such as 5G, AI and autonomous vehicles, in which Beijing hopes to lead the world. China’s reliance on a globalised value chain to source semiconductor chips is seen by Chinese leaders from Xi Jinping down as a key obstacle to the country’s technological ambitions.

The Trump administration’s assault on China’s ability to source semiconductor chips resulted in a flurry of panic buying. Imports of semiconductors jumped by 33.6% to US$155.6 billion in the first three months of 2021—an increase of 77.6% from 2019.134 Beijing’s attempts at achieving self-sufficiency in semiconductors have been beset by setbacks, and large subsidies for semiconductor projects have failed to produce successes. China’s self-sufficiency ratio for semiconductors is expected to be only 19.4% in 2025.135

In an effort to achieve self-sufficiency, public and private entities in China have facilitated the organisation of several technology-focused alliances. In 2016, Huawei, ZTE, Inspur and the Ministry of Industry and Information Technology were among 27 entities that established China’s High End Chip Alliance, which aims to promote the production of, research into and collaborative innovation on chip technology.136 The National Integrated Circuit Standardisation Technical Committee was later proposed by the China Electronics Standardisation Institute in 2021. Huawei, Tencent and Alibaba are among 90 Chinese tech companies that joined the committee in an effort to strengthen the domestic semiconductor supply chain.137

Huawei’s addition to the US’s Entity List further spurred its efforts to create a domestic supply chain but it also served as a warning to other Chinese tech companies featured on our map, such as ByteDance, Baidu, Alibaba and SenseTime, that now view reliance on US technology as a vulnerability that must be eliminated. ByteDance is exploring the feasibility of developing its own AI chips.138 Baidu has completed one round of financing for its Kunlun AI chip unit and is considering commercialising its chip design capabilities.139 Alibaba has also unveiled an AI chip for its cloud-computing products.140 After being added to the Entity List in 2019, SenseTime began developing its own AI chips.141 Meanwhile, Huawei is reportedly constructing a dedicated chip plant in Shanghai that won’t use American technology.142

4.3 Dual circulation

The Covid-19 pandemic and the growing China–US strategic and technological competition also prompted a major rethink in economic policy for the CCP. A new strategy began to take shape in a series of key speeches and party documents as China emerged from its Covid-19 economic slump in early 2020. In April 2020, in a seminal speech on China’s economic development that was kept under wraps for six months, Xi Jinping said that the impact of the pandemic had exposed hidden risks in China’s industrial and supply chains and that the country ‘must strive to have at least one alternative source for key products and supply channels, to create a necessary industrial backup system’.143

Referred to as a need to speed up China’s ‘dual circulation’ growth model, the new economic strategybecame the focus of the 14th Five-Year Plan adopted on 11 March 2021, which charts a course for China’s economy from 2021 to 2025.144 It envisages a future in which Beijing steadily weans itself off high-end imports from industrialised nations while using the ‘powerful gravitational field’ of its economy to make other nations heavily reliant on China for high-tech supplies and as a market for raw materials. As Xi said in his April 2020 speech:

We must sustain and enhance our superiority across the entire production chain … and we must tighten international production chains’ dependence on China, forming a powerful countermeasure and deterrent capability against foreigners who would artificially cut off supply [to China].

By pursuing a strategy of ‘dual circulation’, Beijing hopes to build fully domestic supply chains while binding foreign companies to the Chinese market even more strongly. Over the long term, the aim is for a stronger China able to withstand economic coercion, but also for China to be in a stronger position to inflict coercion on other countries. The CCP’s use of economic coercion against countries such as Australia and companies such as Swedish retailer H&M foreshadow how the Chinese state is likely to use its enhanced power if its ‘dual circulation’ strategy is successful.

5. Reining in the tech giants: tougher regulation at home

China’s regulatory agencies have treated the country’s tech giants with a light touch for most of the companies’ history, favouring their pursuit of technological dominance and economic prosperity over the need for regulating their growing monopoly power.

In October 2020, the scales tipped in the opposite direction after Jack Ma, the co-founder of Alibaba and its fintech affiliate, Ant Group, made a public speech in Shanghai in which he levelled a scathing critique of financial regulators and implicitly rejected Xi Jinping’s signature campaign to combat financial risks.145 The speech reportedly infuriated the leadership in Beijing and prompted Xi to personally call off Ant Group’s impending US$34 billion IPO and order regulators to investigate risks posed by Ma’s business.146

Regulators cited the systemic financial risks posed by Ant Group as the reason for the company to reorganise itself as a financial institution, subject to oversight by the country’s central bank, the People’s Bank of China. Escalating geopolitical tensions with the US and the ensuing US–China trade war contributed to the regulator’s efforts to rein in Ant Group, as Beijing sought to head off risks in the banking system amid concerns that the stand-off with Washington could precipitate a financial crisis.

Ma’s speech served as a tipping point for agencies, such as China’s antitrust authority, the State Administration for Market Regulation (SAMR), that have now become much more assertive with their agenda to draw clear lines between tech companies and financial services companies—lines that Jack Ma was intending to further blur. As Ma removed himself from public view, the campaign widened out to other companies in late April 2020, when the People’s Bank of China and four other regulatory agencies told 13 firms, including Tencent and ByteDance, that their apps should no longer provide financial services beyond payments.147

Ma’s speech may have been a catalyst for some regulatory agencies, but the groundwork for action had been put in place much earlier. In January 2020, the SAMR proposed the first major revisions to the country’s 2008 antimonopoly law in over a decade, including provisions for large internet platforms.148 The regulatory push has been spearheaded by Vice Premier Liu He, who is Xi Jinping’s top economic adviser.149 The principles underlying the campaign—‘tackling monopolies’ and ‘preventing disordered capital expansion’—emerged during several high-level government meetings, including the Fifth Plenary Session of the 19th CCP Central Committee in October 2020 and the Central Economic Working Conference at the end of the year.150

Beijing’s effort to tame the outsized power of China’s internet companies has continued to widen. A week after Ant Group’s IPO was scuttled, the SAMR published draft rules to curb monopolistic behaviour in the country’s tech sector, immediately wiping US$280 billion from the market capitalisation of the internet giants Tencent, Xiaomi, Meituan and JD.com.151 In April 2021, Alibaba Group was hit with a record US$2.81 billion antimonopoly fine, which was equivalent to around 4% of the group’s 2019 revenue. An investigation into Tencent is currently underway, and some reports suggest that it, too, may be hit with a fine of at least US$1.54 billion (Ұ10 billion).152

The SAMR went on to summon 34 technology companies and warn them to ‘heed the warning’ provided by Alibaba’s case. The companies, which included Baidu, Tencent and ByteDance, were given one month to undergo ‘complete rectification’ to ensure that they weren’t in breach of anti-monopoly laws. In a statement, the monopolies regulator stressed that the companies must ensure that they’re not doing anything that ‘harms the interests of operators and consumers’ and that they should give ‘priority to national interests’.153 Between December 2020 and April 2021, the regulator fined 11 companies, including Tencent, Baidu, Alibaba and ByteDance, for failing to disclose past acquisitions and investments.154 As the government continues to clamp down on this sector, investors have grown nervous, leading to a plunge in the combined market capitalisation of 10 leading technology companies by over US$800 billion from its peak in February 2021.155

Beijing’s campaign, which is set to continue throughout 2021, comes at the same time as efforts in the West to rein in companies such as Facebook and Google have gained momentum. The efforts share some similar worries: regulators in the US, Europe and China all cite concerns that the technology giants have built market power that stifles competition, misuses consumer data and violates consumer rights. But, for China’s regulators, the need to discipline their country’s tech companies goes beyond those concerns to a broader sense that the companies’ interests aren’t sufficiently lined up with the CCP’s industrial policy or its goal of achieving technological self-sufficiency.

An editorial in the People’s Daily in December 2020 urged the country’s internet giants to focus on innovation instead of the ‘community group-buying’ market.156 ‘Internet giants with access to big data and advanced computing should have a greater responsibility, greater pursuits, and a greater role in scientific and technological innovation,’ the CCP mouthpiece wrote. The CCP has now moved on from merely chiding the tech companies to enforcing their adherence to its strategic goals. In January 2021, the head of the SAMR emphasised that one of his priorities for 2021 was to ‘promote the coordination of industrial policy and competition policy’.157

6. Conclusion

The Covid-19 pandemic may have been a short-term boon to many of China’s technology giants, but, for the CCP, the pandemic and the US–China trade war were a stark reminder of the country’s fragility in technological innovation. While the Chinese state’s goal of achieving self-reliance in technology has been a longstanding policy, the combination of the Covid-19 pandemic and the ever-tightening technology blockade imposed by the White House elevated the issue to a higher level of importance than ever before.

The onslaught of sanctions and other related measures from the US helped to further align the interests of China’s tech giants with the CCP’s goal of achieving technological self-sufficiency. A newly launched rectification campaign in the technology sector is designed to ensure that this alignment continues. The campaign, which looks set to continue throughout 2021 and beyond, is already bearing fruit as major internet companies warn investors that they’re preparing to funnel capital into areas that the Chinese state has identified as priorities, such as cloud computing, autonomous vehicles and AI.158

Already, a string of high-level resignations have taken place in various Chinese technology companies, including Ant Group, Pinduoduo and ByteDance, as the government seeks to weaken the central authority of all the leaders of the major technology companies.159 The Chinese state is embarking on a fundamental restructuring of the technology industry and the private sector more broadly so that, as CCP guidelines released in September 2020 put it, ‘ideological guidance’ is strengthened to ‘create a core group of private sector leaders who can be relied upon during critical times’.160

The Chinese state is more determined than ever to rein in China’s technology giants and push them, and the country, towards technological self-sufficiency.

Appendix 1: Timeline of US entity listings and other measures

For Appendix table, please download the full report.


Acknowledgements

Thank you to Danielle Cave and Cheryl Yu for all of their work on this project. We would like to also thank our external peer reviewers Lindsay Gorman, Kara Frederick and Chris Crowley. We’re also grateful for the valuable comments and assistance provided by Peter Mattis, Tom Uren, Michael Shoebridge and Fergus Hanson.

This research report forms part of Mapping China’s Technology Giants, which is a multi-year project mapping and analysing the overseas expansion of key Chinese technology companies. The project seeks to:

  • analyse the global expansion of a key sample of China’s tech giants by mapping their major points of overseas presence
  • provide the public with analysis of the governance structures and party-state politics in which these companies have emerged, and are deeply entwined.

The Mapping China’s Technology Giants project is produced by researchers at ASPI’s International Cyber Policy Centre. The relaunch of this project, and associated research, was funded with a US$270,000 grant from the US State Department

What is ASPI?

The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI’s sources of funding are identified in our annual report, online at www.aspi.org.au and in the acknowledgements section of individual publications. ASPI remains independent in the content of the research and in all editorial judgements.

ASPI International Cyber Policy Centre

ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber, emerging and critical technologies, issues related to information and foreign interference and focuses on the impact these issues have on broader strategic policy. The centre has a growing mixture of expertise and skills with teams of researchers who concentrate on policy, technical analysis, information operations and disinformation, critical and emerging technologies, cyber capacity building, satellite analysis, surveillance and China-related issues.

The ICPC informs public debate in the Indo-Pacific region and supports public policy development by producing original, empirical, data-driven research. The ICPC enriches regional debates by collaborating with research institutes from around the world and by bringing leading global experts to Australia, including through fellowships. To develop capability in Australia and across the Indo-Pacific region, the ICPC has a capacity building team that conducts workshops, training programs and large-scale exercises for the public and private sectors.

We would like to thank all of those who support and contribute to the ICPC with their time, intellect and passion for the topics we work on. 

If you would like to support the work of the centre please contact: icpc@aspi.org.au

Important disclaimer

This publication is designed to provide accurate and authoritative information in relation to the subject matter covered. It is provided with the understanding that the publisher is not engaged in rendering any form of professional or other advice or services. No person should rely on the contents of this publication without first obtaining advice from a qualified professional.

© The Australian Strategic Policy Institute Limited 2021

This publication is subject to copyright. Except as permitted under the Copyright Act 1968, no part of it may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Enquiries should be addressed to the publishers. Notwithstanding the above, educational institutions (including schools, independent colleges, universities and TAFEs) are granted permission to make copies of copyrighted works strictly for educational purposes without explicit permission from ASPI and free of charge.

First published June 2021.
ISSN 2209-9689 (online),
ISSN 2209-9670 (print).

Cover image: ASPI ICPC, Nathan Attrill

Funding Statement: Funding for this report was provided by the US State Department.

  1. Humeyra Pamuk, Alexandra Alper, Idrees Ali, ‘Trump bans US investments in companies linked to Chinese military’, Reuters, 12 November 2020, online. ↩︎
  2. ‘FCC designates Huawei and ZTE as national security threats’, news release, US Federal Communications Commission, 30 June 2020, online. ↩︎
  3. David E Sanger, Julian E Barnes, Raymond Zhong, Marc Santora, ‘In 5G race with China, US pushes allies to fight Huawei’, New York Times, 26 January 2019, online. ↩︎
  4. Jeanne Whalen, Ellen Nakashima, ‘US bans technology exports to Chinese semiconductor and drone companies, calling them security threats’, Washington Post, 18 December 2020, online. ↩︎
  5. James McBride, Andrew Chatzky, Is ‘Made in China 2025’ a threat to global trade?, Council on Foreign Relations, 13 May 2019, online. ↩︎
  6. Adam Segal, ‘Seizing core technologies: China responds to US technology competition’, China Leadership Monitor, 1 June 2019, online. ↩︎
  7. Nigel Inkster, Xi steers China towards economic and technological self-reliance, International Institute for Strategic Studies, 11 November 2020, online. ↩︎
  8. ‘习近平:在科学家座谈会上的讲话’ [Xi Jinping: Speech at the Symposium of Scientists], Xinhua, 11 September 2020, online.. ↩︎
  9. ‘中华人民共和国国民经济和社会发展第十四个五年规划和2035年远景目标纲要’ [The 14th Five-Year Plan for National Economic and Social Development of the People’s Republic of China and the outline of the long-term goals for 2035], Xinhua, 12 March 2021, online. ↩︎
  10. ‘江金权:把握构建国内大循环的着力点 ——学习习近平总书记在省部级专题研讨班上重要讲话精神的体会’ [Grasp the focus of constructing the domestic circulation—Learning the spirit of General Secretary Xi Jinping’s important speech at provincial and ministerial seminars], Study Times, 25 January 2021, online. ↩︎
  11. ‘China ramps up tech commitment in 5-year plan, eyes 7% boost in R&D spend’, Reuters, 5 March 2021, online. ↩︎
  12. Liza Lin, ‘China’s trillion-dollar campaign fuels a tech race with the US’, Wall Street Journal, 11 June 2020, online. ↩︎
  13. Rui Ma, ‘Old Extra Buzz post from Dec. 2020: Internet platforms: antitrust regulations are here’, Tech Buzz China, 11 December 2020, online. ↩︎
  14. ‘Playing by the rules’, Week in China, 16 April 2021, online. ↩︎
  15. Jing Yang, Serena Ng, ‘Ant’s record IPO suspended in Shanghai and Hong Kong stock exchanges’, Wall Street Journal, 3 November 2020, online. ↩︎
  16. Raymond Zhong, ‘China fines Alibaba $2.8 billion in landmark antitrust case’, New York Times, 9 April 2021, online. ↩︎
  17. Yuan Yang, Ryan McMorrow, Miles Kruppa, ‘ByteDance staff and investors shocked as founder steps back’, Financial Times, 22 May 2021, online. ↩︎
  18. ‘Xi focus: Xi chairs leadership meeting on economic work for 2021’, Xinhua, 11 December 2020, online. ↩︎

The flipside of China’s central bank digital currency

What’s the problem?

China’s central bank digital currency, known as ‘DC/EP’ (Digital Currency / Electronic Payment), is rapidly progressing and, if successful, would have major international implications that have not yet been widely considered by policymakers.

DC/EP would have ramifications for governments, investors, and companies, including China’s own tech champions.

It has the potential to create the world’s largest centralised repository of financial transactions data and, while it may address some financial governance challenges, such as money laundering, it would also create unprecedented opportunities for surveillance. The initial impact of a successful DC/EP project will be primarily domestic, but little thought has been given to the longer term and global implications. DC/EP could be exported overseas via the digital wallets of Chinese tourists, students and businesspeople.

Over time, it is not far-fetched to speculate that the Chinese party-state will incentivise or even mandate that foreigners also use DC/EP for certain categories of cross-border RMB transactions as a condition of accessing the Chinese marketplace.

DC/EP intersects with China’s ambitions to shape global technological and financial standards, for example, through the promotion of RMB internationalisation and fintech standards-setting along sites of the Belt and Road Initiative (BRI). In the long term, therefore, a successful DC/EP could greatly expand the party-state’s ability to monitor and shape economic behaviour well beyond the borders of the People’s Republic of China (PRC).

What’s the solution?

To date, policymakers in the democratic world have taken a whack-a-mole approach to the security challenges presented by Chinese technologies, if they have taken action at all.

Those actions—such as those pertaining to Huawei and 5G over several years and TikTok and WeChat more recently—have been taken long after the relevant brands and technologies have entered the global marketplace and established dominant positions, and they don’t solve root problems.

The potential for DC/EP to be successful enough to have a disruptive impact on the global economic system might be far into the future, but it’s important to consider what impact DC/EP could have on the global economy. Liberal democracies should act now to deepen analysis, develop standards and coordinate approaches to the risks inherent in DC/EP, including unconstrained data collection and the creation of powerful new tools for social control and economic coercion. By acting now to build a baseline analysis of the DC/EP project, decision-makers have an opportunity to anticipate challenges and build a consistent and coherent policy framework for managing them.

Early efforts to establish and coordinate norms, rules and standards will reduce any subsequent need to resort to blunt and arbitrary measures that are economically, socially and diplomatically disruptive. Governments should also act to address existing vulnerabilities that DC/EP could exploit, for instance by introducing stricter laws on data privacy, by regulating the way that any entity can collect and use individuals’ data and by improving due diligence aimed at mitigating data security risks.

Executive summary

Globally, there’s increasing interest in the development of central bank digital currencies, driven by a wide range of policy motivations. A survey published by the Bank for International Settlements in January 2020 found that, out of 66 central banks, 80% were engaged in the research, experimentation or development of a central bank digital currency.1

The PRC is a significant actor in this space, not least because it’s years ahead of the world in research into the development of its central bank digital currency known as ‘digital currency / electronic payment’ or simply ‘DC/EP’ (see Figure 1). China’s market-Leninist approach to innovation, personal data and industry policy makes it possible to conceive that over a billion Chinese consumers could be transacting in DC/EP before a central bank digital currency becomes mainstream in any other country.

At the technocratic level, DC/EP is designed to ensure visibility and traceability of transactions and establish greater control over China’s financial system and capital accounts while displacing anonymising cryptocurrency alternatives that can’t be readily controlled. Recent reporting has also indicated that the People’s Bank of China (PBoC) aims for DC/EP to erode the dominance of Alipay and WeChat Pay in the digital payments space, levelling the playing field between the technology duopoly and commercial banks.

At the leadership level, DC/EP is being driven by the financial ‘risk management’ and ‘supervision’ imperatives of Chinese Communist Party (CCP) General Secretary Xi Jinping. DC/EP will offer no true anonymity, as the PBoC will have both complete visibility over the use of the currency, and the ability to confirm or deny any transaction. There are also no express limits on the information-access powers of the party-state’s political security or law enforcement agencies, such as the Central Commission for Discipline Inspection (CCDI), which has a keen interest in the technology. While DC/EP could enable more effective financial supervision and risk management that any government might seek to embed in a central bank digital currency, the PRC’s authoritarian system embeds political objectives within economic governance and otherwise reasonable objectives. Terms such as ‘anti-terrorist financing’, for instance, take on a different definition in the PRC that is directed at the CCP’s political opponents.

DC/EP is being developed and implemented domestically first, but could allow China to shape global standards for emerging financial technologies. It also creates opportunities for the PRC to bypass the US-led financial system, which it perceives as a threat to its security interests, potentially disrupting existing systems of global financial governance. Through DC/EP, Beijing could over time move away from the SWIFT system and bypass international sanctions.

The purpose of this policy brief is to improve baseline understanding of DC/EP’s structural mechanics and place the project in its political and bureaucratic context. The aim is to catalyse and contribute to an informed conversation about what the rollout of DC/EP may mean for China and for the world.

This policy brief is organised as follows: Section 1 is a general overview of digital currencies; Section 2 focuses on the policy drivers behind DC/EP; Section 3 examines DC/EP’s architecture based on patents in order to assess the surveillance capabilities it would embed; Section 4 describes the institutional ecosystem behind DC/EP; Section 5 looks at how DC/EP would affect domestic digital payment systems Alipay and WeChat pay; and Section 6 looks at the implications DC/EP could have for global financial governance.

Figure 1: What is DC/EP?

Source: Created by ASPI

1. Two sides of the digital-coin: freedom and control

Elise Thomas

A fundamental question at the heart of all digital currencies is one of control, but the ways in which the dynamics of control and power play out differ between different types of digital currencies.

There is a difference between private digital tokens (for example, cryptocurrencies) and central bank digital currencies (such as DC/EP). A primary goal behind many cryptocurrencies (such as bitcoin, a decentralised, anonymised blockchain-based digital token) is to evade the controls of any single actor, and in particular the control of governments.2 In this sense, the technology behind cryptocurrencies was devised as a challenge to the power of states over the finances of individuals. For a centralised, state-controlled digital currency, however, the inverse may be true. A centrally controlled digital currency could enable a level of financial surveillance, economic power and societal control that was previously impossible. Such tools present tantalising opportunities for authoritarian states, financial institutions and corporations in the absence of effective controls.

While many digital currency projects have been announced by both state and non-state actors, none has managed to attain a level of widespread adoption or to operate at scale as a medium of exchange.3

In Venezuela, the aggressive support of the Maduro government hasn’t been enough to make the nation’s ‘petro’ currency a success.4 Even the Facebook-backed Libra project—with its potential to leverage Facebook’s 2.6 billion users—has changed course towards integrating fiat currency payments into its existing platforms.5

Despite the failure to date of any digital currency to achieve mass adoption or widespread use as a medium of exchange, many central banks around the world have demonstrated an interest in the concept of developing their own digital currency. Beyond the PRC, central banks in Canada, Sweden, the Bahamas, Japan and many other countries are at different stages of research on and development of central bank digital currencies.6 They provide a range of policy justifications. The Bank of Canada, for instance, has said its research is contingency planning, and the bank doesn’t currently plan to launch a central bank digital currency. It has said that, alongside a potential decline in the use of bank notes, a key reason to potentially launch a central bank digital currency is the widespread use of alternative digital currencies, probably by private-sector entities that could ‘undermine competition in the economy as a whole because the company might use its dominant market position in one industry to control payments and competition in other industries’.7

Existing digital currencies have provoked mixed regulatory responses from states and financial institutions, and those responses have focused largely on the risks arising from cryptocurrencies (see Figure 2). There’s a tendency to approach them as speculative assets or securities, rather than as actual currencies.

Figure 2: Global regulatory framework for cryptocurrencies

Source: Created by the Law Library of Congress based on information provided in the report, Regulation of cryptocurrency around the world, online.

The goal of decentralised cryptocurrencies is to disperse power across the network and away from any one actor. Central bank digital currencies are fundamentally different. They are, as the Bank for International Settlements defines it, ‘a central bank liability, denominated in an existing unit of account, which serves both as a medium of exchange and a store of value’.8 DC/EP, for example, is a form of legal tender that’s issued and backed by a liability of the PBoC. It introduces the digital renminbi, an encrypted string that holds details about that individual bill and additional fields for currency security and tracking.

In a world increasingly driven by access to data, that granular detail about how money moves through the economy, through specific companies and industries, and through the personal accounts of individuals presents both a promise and a threat. The promise is a vastly greater understanding of how the economy operates and the ability to respond where needed for the benefit of all. The threat is the ability to consolidate power in the hands of authorities, to enable persecution and surveillance and to reshape society as the authorities want it to be. Centralised digital currencies have the potential to turn financial surveillance into a powerful tool that could be wielded by authoritarian states inside, and potentially even outside, their own borders.

2. Drivers of the PRC’s digital currency project

John Garnaut and Dr Matthew Johnson

At the leadership level, the DC/EP project has been driven by the financial ‘risk management’ and ‘supervision’ imperatives of CCP General Secretary Xi Jinping. At the technocratic level, it’s designed to ensure the visibility of all financial flows and establish greater control over China’s financial system and capital accounts while displacing anonymising cryptocurrency alternatives that can’t be readily controlled. Statements from the CCP and financial insiders indicate that a key driver of DC/EP is the party’s need for a financial architecture which exists outside the SWIFT network 9 and other US-dominated alternatives. The imperative of operating beyond the reach of US monitoring and law enforcement has come to the fore in recent months, as the US targets financial sanctions against CCP officials and entities in response to human rights and national security concerns. ‘We must make preparations to break free from dollar hegemony and gradually realise the decoupling of the RMB from the dollar,’ said Zhou Li, a former deputy minister of the International Liaison Department, in a June 2020 article.10

What problems would DC/EP solve?

PBoC official statements and documents give no clear answer to the basic question: What is the policy problem that China’s digital currency project is trying to solve? Nobody is claiming a consumer experience that’s superior to the already impressive convenience accessible through Alipay and WeChat Pay. The answer, however, becomes clear in statements emanating from higher up in the CCP organisation chart, where CCP leaders and Politburo-level organs describe a need to use technology to enhance the party-state’s visibility and control over the entire financial system. DC/EP is conceived as a supervision mechanism for preserving ‘stability’ and enhancing state control.

DC/EP fits within a vision of ‘economic work’ that Xi Jinping has developed over the past five years, which puts surveillance and supervision at the core. At the Central Economic Work Conference in December 2015, he said:

It is necessary to strengthen omni-directional supervision, standardise all types of financing behaviour, seize the opportunity to launch special programs for financial risks regulation … strengthen risk monitoring and early warning, properly handle cases of risk, and resolutely adhere to the bottom line that systemic and regional financial risk will not occur.11

Xi’s position that ‘financial risk should not occur’ is consistent with the party’s state security strategy, which prioritises pre-empting risk before it can emerge. This is embedded in the party’s state security work through the concept of ‘financial security’ (金融安全).12 Financial security means stability on the party’s terms. It calls for reforming the financial system by establishing supervision and control mechanisms, total financial governance, and strengthening China’s financial power.

At the Politburo’s collective study meeting of 23 February 2019, which focused specifically on preventing financial risks, Xi’s was quoted as stating:

It is necessary to do well in comprehensive financial industry statistics, complete an information system that reflects risk fluctuation in a timely manner, perfect information release management regulations, and complete a credit punishment mechanism. It is necessary to ‘control people, watch money, and secure the system firewall’ … Modern technological means and payment settlement mechanisms should be used to dynamically monitor online, offline, international, and domestic capital flows in a timely manner, so that all capital flows are placed within the scope of supervision of financial regulatory institutions.13

Xi’s guidance for using technology to connect finance and security has cascaded down to the fintech planning and implementation level. At every step, internally focused discussion of DC/EP has focused on supervision and centralised management. During a 30 December 2019 meeting of the PBoC Financial Technology Committee, PBoC deputy governor Fan Yifei reiterated the importance of supervising fintech innovation, ‘optimising’ the mobile payment ecosystem and ‘actively promoting data governance and accelerating the construction of a “digital central bank”’.14 At a PBoC work meeting held on 5 January 2020, participants including Governor Yi Gang and PBoC Party Committee secretary Guo Shuqing spoke of party-building at all levels of the financial system, building a ‘big supervision mechanism’, and strengthening financial statistics monitoring and analysis with specific reference to fintech and digital currency.15

Macroeconomic policy

As well as improving the scrutiny, and visibility, of international capital flows, and reducing the costs of printing and maintaining the circulation of cash, PBoC officials say the data collected through DC/EP will be used to improve macroeconomic policymaking. According to Yao Qian, who founded the Digital Currency Research Lab at the PBoC:16

Within this [digital currency] technology system, the central bank has the highest decision making and operational jurisdiction… big data analysis comes in during the process of currency issuance, monitoring, and control. Under conditions of data being appropriately stripped of identifying details, the central bank can use big data to carry out in-depth analysis of digital currency issuance, circulation and storage; understand the laws of monetary operation; and provide data support for intervention needs such as monetary policy, macro-prudential supervision, and financial stability analysis.17

Yao says the data used to inform macroeconomic policymaking will be anonymised. However, he also says the data will be used for law enforcement.18

Political discipline

The CCP’s top political organ for imposing political discipline internally, the CCP’s CCDI, is increasingly prominently involved in both the promotion and policy direction of DC/EP. The CCDI has recently promoted DC/EP’s potential to ‘solve’ the problem of terrorist financing and combat financial crimes such as bribery and embezzlement.19 However, the purpose of the CCDI is to impose party discipline through channels that exist above and outside the formal legal apparatus. The CCDI has served as Xi’s primary organisational weapon in his ongoing campaign to combat corruption, enforce ideological unity and purge the party of potential rivals.20 The involvement of the CCDI serves as a strong indicator of how the party intends to exploit the vast troves of data that DC/EP will make available to it.

Competing with the US financial-led global financial system

The party’s six-year program to develop a sovereign digital currency has been driven in part by a desire to propose currency alternatives to the US dollar (see Section 6). Recently, however, it’s been spurred by the competition from US digital currencies. China’s finance and banking officials have repeatedly expressed concern at the prospect of a supranational stablecoin, which they perceive as being tied to the US dollar. They equate US digital currencies with US dollar hegemony and say that it reinforces the need to decouple the renminbi from the US-dollar-led global financial system.21 An article by the PBoC’s China Banknote Printing and Minting Corp. Blockchain Technology Research Institute,22 published in the CCP Central Party School journal Study Times in August 2019, described DC/EP as a response to US-based digital currency Libra’s imminent “major and far-reaching effect on the global pattern of international monetary development”, and called for accelerating China’s development of digital currency and a digital currency supervision system.23 Similarly, Wang Zhongmin, former deputy chair of the China Social Security Fund Council and a former long-serving CCDI official, has said DC/EP’s progress is being benchmarked against that US effort.24 Li Lihui, former Bank of China president and head of the Blockchain Research Group of the China Internet Finance Association, has also indicated that China’s banking sector views US currencies as a danger to China’s currency and an extension of US global financial leadership and democratic values.25 

Competing globally

China has a clear ambition to shape global technological and financial standards. With a new industrial policy (China Standards 2035) on the horizon, DC/EP and its related technologies are likely to be an important component in China’s push to establish a comprehensive alternative to the dollar system. The liberalisation of China’s current account is not required for export of the DC/EP technology stack to other countries. China’s ability to develop new financial technology that embeds authoritarian norms of control and surveillance may affect global standards and financial infrastructure well before the internationalisation of the renminbi is achieved.

3. DC/EP and surveillance

Dr Samantha Hoffman

DC/EP is being built to meet China’s specific needs, as defined by the party-state. In order to understand the CCP’s needs and their potential implications, it’s necessary to examine the tracking of money flow that is inherent in the DC/EP system, in conjunction with the supervision objectives those capabilities support. DC/EP’s surveillance and data collection potential doesn’t create fundamentally new forms of political or financial control but will enhance existing monitoring and surveillance capabilities.

Centralised control and visibility

DC/EP transactions are fully traceable. Yao Qian (the PBoC’s primary patent author on DC/EP) described DC/EP as having an ‘anonymous front end, real-name backend’.26 There’s an element of anonymity through a characteristic of DC/EP called ‘controlled anonymity’, but true anonymity doesn’t exist, as currency registration and traceability are built into DC/EP’s transaction process. That process, augmented by data mining and big-data analysis, provides the PBoC with the ability to have complete oversight over the use of the currency. That functionality is provided through DC/EP’s ‘three centres’ (Figure 3).

Figure 3: DC/EP’s data centres

Source: Created by ASPI

The term ‘controlled anonymity’ within the operation of DC/EP means that the PBoC has complete supervision over the digital currency but has afforded users some anonymity for their transactions and protection of their personal information from other third parties, besides PBoC. DC/EP has been designed such that, even if commercial banks and merchants were to collude, users’ purchase history couldn’t be determined by them or any other third party, except, crucially, the currency issuer.27

PBoC Deputy Governor Fan Yifei has explained that full anonymity won’t be implemented through DC/EP in order to discourage crimes such as tax evasion, terrorism financing and money laundering.28

All central banks would need to ensure that their digital currency meets anti-money-laundering and countering terrorism financing rules. Central bank digital currencies would allow for better digital records and traces, but it’s been suggested in a report by the Bank of International Settlements that such gains may be minimal because illicit activity is less likely to be conducted over a formal monetary system that’s fully traceable.29

DC/EP is designed so it can be used without the need for a bank account, but digital wallets have a grading system such that wallets that are loosely bound to a real-name account have transaction size limits. A user can attain the lowest grade of digital wallet—with the transaction limits—by registering their wallets with a mobile number only (of course, phone numbers are required to be registered to an individual’s real name in the PRC). Users can access higher grade digital wallets by linking to an ID or bank card. Through the Agricultural Bank of China, for instance, users are encouraged to upgrade their digital wallets to a ‘Level 2 digital wallet’ by registering with their name and national ID details (Figure 4).30 If a user registers in person at a counter, there are no restrictions on their digital wallet.31

Figure 4: Leaked Agriculture Bank of China DC/EP mobile application

Agricultural Bank of China’s test DC/EP mobile app provides the function to scan code to pay, transfer money, receive payment and touch phones to pay. The digital currency section allows the user to exchange digital currency, view transaction summaries, manage the digital wallet exchange and link an account to the digital currency wallet.

Source: ‘China’s central bank digital currency wallet is revealed’, Ledger Insights, online.

The integration of DC/EP into third-party applications doesn’t make users’ transactions on those applications more private, but the underlying digital currency system is designed to provide privacy from third parties (except, of course, the central bank). That being said, practicalities when implementing any payment system mean that in practice there’s little anonymity for the individual from any app, because the app will already know the user, and when transacting will need the user to identify the recipient of the funds and the transaction amount. Therefore, the implementation of DC/EP into mobile applications, such as DiDi Chuxing, BiliBili and Meituan Dianping, that are in partnership negotiations with PBoC32 doesn’t change the amount of information those apps, and by extension their linked platforms, are able to collect on the user.

Using DC/EP to enhance the party-state’s control

The PBoC’s creation of a massive repository of financial transaction data could improve both the efficiency and visibility required for the PBoC and CCDI to effectively supervise and police financial transactions. DC/EP’s political-discipline-linked policy drivers—anti-money-laundering, anti-terrorist financing and anti-tax evasion—are linked to the party-state’s ‘social governance’ process (also called ‘social management’). Social governance describes how the CCP leadership attempts to shape, manage and control all of society, including the party’s own members, through a process of co-option and coercion.33 DC/EP helps solve legitimate problems, but that problem solving also acts as a tool for enhancing control. For instance, a local PBoC official described ‘anti-money laundering’ as an ‘important means to prevent and defuse financial risks and consolidate social governance.’34 Similarly, an article by Deputy Governor of the PBoC Liu Guoqiang published in the People’s Daily said:

In recent years, the scope of anti-money laundering work has become increasingly diverse and has expanded to many areas such as anti-terrorist financing, anti-tax evasion and anti-corruption. Anti-money-laundering work has strengthening modern social governance as its goal, through guiding and requiring anti-money-laundering agencies to effectively carry out customer identification, discovering and monitoring large-value transactions and suspicious transactions, timely capturing abnormal capital flows, and enhancing the standardisation and transparency of economic and financial transactions to weave a ‘security net’ for the whole society to protect normal economic and financial activities from infringement …35

More specifically, the connection of DC/EP’s policy drivers to social management is indicative of how DC/EP would ultimately serve the party’s needs in practice. Through the PRC’s global Operation Skynet, which seeks to ‘track down fugitives suspected of economic crimes and confiscate their ill-gotten assets’, the PBoC cooperates directly with the Ministry of Public Security because of the role of the PBoC as an anti-money-laundering authority.36 Genuinely corrupt officials are certainly caught up in the campaign, but the accusation of corruption is the result of a political decision linked to power politics. Likewise, the crime of ‘terrorist financing’ is defined by the Chinese party-state’s version of ‘terrorism’, and it’s been directly linked to the PRC’s campaign against the Uyghurs in Xinjiang. For instance, in July 2020, Australian media reported on a Uyghur woman who has been arrested on charges of financing terrorism for sending money to her parents in Australia, who used it to purchase a house.37 DC/EP doesn’t create a process that didn’t already exist, but the technical ability to aggregate bulk user data in one place has the future potential to automate identification and analysis processes that at present are only partially automated; for example, to help trace money transfers through different entities at different levels.

Nor does DC/EP create objectives that didn’t already exist. Rather, its digital nature and centralised supervision facilitate the aggregation and bulk analysis of user and financial data, to more easily meet those objectives.

Future extraterritorial implications?

Under Xi Jinping, the concept of social management has expanded to specifically include ‘international social management’.38 Something to consider is the fact that Hong Kong’s new state security law criminalises separatism, subversion, terrorism, and collusion in and support for any of those activities by anyone in the world no matter where they are located.39 This means that journalists, human rights advocacy groups, researchers or anyone else accused of undermining the party-state and advocating for Hong Kong democracy could be accused of those four types of crime. By extension, anyone financing those individuals or entities (such as funding a research group) could potentially be linked to the accusations. If DC/EP is successfully rolled out and adopted, then the world would have to be prepared to contend with a PRC in possession of information that would also allow it to enforce its definitions of the activities that it’s monitoring (anti-corruption and anti-terrorism, for instance) globally, thus potentially allowing it to implement PRC standards and definitions of illegality beyond its borders with greater effectiveness.

4. The party-state ecosystem behind DC/EP

Dr Matthew Johnson

At the China Fintech Development Forum on 20 June 2020, Wang Zhongmin, the former deputy director of the China Social Security Fund Board (China’s national pension fund) and a former member of the CCP’s CCDI, announced that the back-end architecture for China’s central bank digital currency was basically complete.40 After six years of planning, investment and R&D, progress towards a cashless society had finally reached the testing stage (Figure 5, next page). The fact that this key announcement was made by a former member of the party’s political discipline inspection body, rather than a current or former official of the PBoC, demonstrates that the bureaucratic structure behind DC/EP’s development goes well beyond the central bank.

The speed with which DC/EP is being developed is partly a result of the enormous institutional power behind it. As well as the PBoC and the CCDI, the project is being shaped by a cluster of powerful regulatory and supervisory institutions that serve as the fulcrum for CCP efforts to maintain leverage over every element of the financial and economic systems.

Beyond the supervisory institutions, many of China’s biggest companies are also being called in to support. They include:

  • Bank of China, China Construction Bank, Agricultural Bank of China, Industrial and Commercial Bank of China, China Postal Bank and China CITIC Bank
  • China Mobile, China Telecom, China Unicom, and China UnionPay
  • Alibaba Group affiliate Ant Group (Alipay), Tencent (WeChat Pay), Huawei Technologies and JD.com.

Figure 5: DC/EP development timeline

Source: Garnaut Global, September 2020.

PBoC leadership and innovation

The DC/EP project has been driven by the PBoC since its inception. Former PBoC Governor Zhou Xiaochuan established a digital currency research group in 2014. In March 2018, Zhou announced that the project had received approval from the State Council and now had a name—Digital Currency Electronic Payment.41

Through DC/EP, the PBoC has been swiftly transformed into a hub of party-state fintech innovation.

It has established its own technology units, such as the Digital Currency Research Institute, and harnessed a constellation of commercial enterprises and government agencies to drive investment in blockchain and fintech.42 More than 80 patents related to DC/EP have been filed with the Chinese Patent Office by research institutes connected to the PBoC.43 The standards created by these new technologies are likely to shape future development pathways for China’s cashless monetary system.

Information concerning local DC/EP pilots has been scarce, imprecise and occasionally misleading, but the overall trend it describes suggests that progress towards buildout of the user ‘front end’ is real.

Since April 2020, banks and government institutions have launched pilot distribution experiments and showcased prototype ‘digital wallets’ (apps that store payment details). The private sector has been particularly critical to building DC/EP’s scale; PBoC partners Alibaba Group and Tencent provide networks and raw data-processing power that no other state-controlled system can match (see Section 5).44

Powerful guidance

Outwardly shaped and managed by the PBoC, China’s DC/EP project is also guided by the top echelons of the CCP leadership. The PBoC itself isn’t independent but is one of several interconnected institutions, the function of which is, collectively, to prevent systemic risk through total control over China’s financial economy.45 The Financial Stability and Development Commission, chaired by Xi Jinping’s trusted economic adviser Liu He, sits at the apex of this financial regulatory cluster. The CCDI, the party’s extrajudicial discipline enforcer, encircles both, ensuring that regulatory officials adhere politically to Xi’s authority.46

Managing corruption: the Central Commission for Discipline Inspection

The CCDI sits several bureaucratic rungs above the PBoC and hasn’t featured in mainstream or industry reporting on DC/EP. Analysis of party texts and structures, however, indicates that the CCDI is emerging as one of the key patrons and potential customers of the DC/EP project. An ‘authoritative explainer’ on DC/EP, aired by national news broadcaster CCTV in June 2020, even explained that the CCDI would use digital currency as a ‘booster in managing corruption’.47

CCDI organisations are embedded directly within the PBoC itself, which is significant because it illustrates the party’s growing control over the central bank as well as other systemically important financial institutions.48 The CCDI is one of the party’s four core departments. It’s answerable directly to the Politburo Standing Committee through its Secretary, Zhao Leji, who’s the sixth-ranked leader in the Party (Figure 6). Three of Zhao’s deputies sit in the Central Committee. Compared to the CCDI, the PBoC is politically a relatively junior organisation. Its Governor, Yi Gang, isn’t counted among the 205 members of the Central Committee.49

Figure 6: DC/EP’s political and commercial ecosystem

Source: Garnaut Global, June 2020.

Coordinating security: the Financial Stability and Development Committee

In July 2017, Xi Jinping moved to integrate financial system regulation with the Party’s political, security, and legal organs by creating a new super agency called the Financial Stability and Development Committee (FSDC).50 Xi tapped Vice Premier Liu He to chair the committee, with Premier Li Keqiang as his deputy.51 The FSDC now serves as China’s main financial regulatory body.52

It also serves as the institutional flywheel that connects the finance system to key security organs.

 According to state-controlled economic news media, the FSDC has special ‘planning and coordination’ arrangements with the party-state’s core security bodies, including the CCDI, the Propaganda Department, the Office of the Commission for Internet Security and Informatisation, the Ministry of Public Security, the Ministry of Justice and the Supreme People’s Court.53 The FSDC also oversees local financial coordination and regulation through local branches of the Banking and Insurance Regulatory Commission, the Securities Regulatory Commission and the Foreign Exchange Bureau.54 The Office of the FSDC is located within the PBoC and is directed by PBoC Governor Yi Gang, illustrating the ‘deputy’ function that the PBoC plays in implementing FSDC policy.55
 

5. The role of WeChat Pay and Alipay in DC/EP

Fergus Ryan and Alexandra Pascoe

China’s mobile payments industry has seen explosive growth over the past decade as the country’s two most widely used mobile payment services, Alipay and WeChat Pay, have garnered more than 890 million users.56 The two platforms have driven a shift away from cash in the country’s economy— an effort that DC/EP is expected to continue and complete.

In 2016, China’s mobile payments hit US$5.5 trillion, or roughly 50 times the size of America’s $112 billion market, according to consulting firm iResearch.57 The following year, that figure more than doubled: transactions made on the two third-party payment institutions (TPPIs) totalled more than US$17 trillion.58 Using QR codes and digital wallets, the companies enabled consumers to jump directly from cash to mobile payments. That saw users leapfrog the nascent and cumbersome debit and credit card systems established by the commercial banking sector. Collectively, the two TPPIs hold more than 90% of the market. Alipay has over 50% market share, and WeChat Pay almost 40%.59 Ninety per cent of people in China’s biggest cities use those payment platforms as their primary payment method; each platform boasts more than 600 million monthly active users.60

Beijing’s policy towards the TPPIs was marked by early optimism about the ability of the companies to break down the control of the banking system by the Big Four state-owned commercial banks.

The aim was to increase competition and innovation in the financial sector and drive economic activity by opening up additional sources of lending for Chinese small and medium-sized enterprises.

The disruption and innovation brought about by Alibaba and Tencent were actively encouraged and coupled with favourable government policies and protection from international competition.

However, Alipay’s and WeChat Pay’s rapid growth and increasing level of dominance have caused the overt encouragement of the fintech sector and regulatory permissiveness to increasingly shift to ambivalence and moves to enhance oversight over the payment systems.

In 2010, the PBoC enacted regulations that meant that foreign-funded third-party operators would need State Council approval to operate in the Chinese market, and under different rules from those governing domestic operators. That ruling prompted Alibaba founder Jack Ma, in a highly controversial decision, to secretly spin off the online payment service Alipay from Alibaba Group, which foreign operators Yahoo and Softbank have significant stakes in, to a private firm he controlled.61

In a text-message exchange with Hu Shuli, the editor of business magazine Caixin, Ma sought to explain his decision to spin off the company without the go-ahead from Yahoo and Softbank by saying the decision involved ‘more than just commercial interests’ and that there were national security implications to Alipay’s ownership structure. ‘The market economy tells us to steer clear of politics.

But if I ruin Alipay, I may face prison in addition to bankruptcy,’ Ma texted Hu.62 The spun-off firm was later renamed Ant Financial and now operates Alipay.

Like its rival, Tencent, Alibaba and Ant Financial both have CCP committees as part of their governance structures.63 The CCP has a direct line into both companies, but policymakers are increasingly concerned about the inordinate power of the duopoly. There are also concerns over the speed with which their third-party payment ecosystems have taken over systemically important functions of the country’s economy.

Driven by concerns over the growing size of money market funds facilitated by Alipay and WeChat Pay (Yu’e bao 余额宝 and Lingqiantong 零钱通), as part of its ‘deleveraging campaign’ in 2017,64 the PBoC expanded its regulatory oversight of the TPPIs, ordering the firms to move funds out of commercial banks and into PBoC accounts. In 2019, that process was completed when the central bank took over all deposits of platforms such as Alipay and WeChat Pay.65 This has helped to address risks associated with shadow banking, while also moving valuable user transaction data into the hands of the PBoC.

Most recently, it was reported that the State Council is considering whether to launch an antitrust investigation into Alipay and WeChat Pay. The PBoC recommended the probe earlier this year, given the platforms’ dominance and attempts to foster greater competition in the payments space by assisting smaller companies to enter the market.66

Co-opting Alipay and WeChat Pay

DC/EP will be made available through a two-tier system. The central bank plans to issue DC/EP to both commercial banks and TPPIs, and then the banks and TPPIs would distribute it to consumers. In this case, the current financial structure doesn’t change with DC/EP, only the mechanism through which commercial banks and TPPIs get their money.

The PBoC could have dealt a serious blow to Alipay and WeChat Pay by excluding them from the second tier of the structure. However, given the user base of the two payment platforms, that would severely limit the take-up and use of the digital currency. The PBoC appears to be bringing Alipay and WeChat Pay into the DC/EP structure on its own terms, allowing it to continue its quest to rein in the dominance of the firms while also using their user base and technology.

Patent applications from both Alibaba and Tencent appear to indicate the role that these platforms will play in the issuance of DC/EP. Between 21 February and 17 March 2020, Alibaba filed five patents on ‘digital currency delivery and transaction account functions, supervision and handling of illegal accounts, digital currency wallets, [and] support for anonymous transactions’.67 On 24 April, it was also reported that Tencent had filed a patent related to the transaction of digital assets, although the report didn’t directly refer to the PBoC’s digital currency, as appeared in Alipay’s patents.68

That being said, how exactly the PBoC and TPPIs will cooperate remains unclear. How those institutions distribute DC/EP will be the subject of a ‘horse race’ between the commercial banks and the TPPIs, the eventual frontrunner of which will ‘take the whole market’, the head of the PBoC Digital Currency Research Institute, Mu Changchun, told an audience in Hong Kong in 2019.69 That echoed comments made in 2018 by PBoC Deputy Governor Fan Yifei, who wrote that the central bank could leverage market forces to optimise related systems through close cooperation with commercial banks and other organisations, without imposing any prescriptive technology path in advance. This would facilitate resource integration, synergistic collaborations and innovation, as well.70

Mu Changchun has trumpeted DC/EP as having a superior legal and security status to WeChat Pay and Alipay due to its state backing.71 He has said that, should Alipay or WeChat Pay go bankrupt, there’s currently no way to assure the money held in those digital wallets. However, if the wallets held PBoC-backed digital currency, those funds could be guaranteed by the central bank.

The alleged superior security of DC/EP is perhaps more a rhetorical point from Mu, rather than reflecting any real possibility of Ant Financial or Tencent going bust. Furthermore, regulation changes requiring Alipay and WeChat Pay deposits to be moved into PBoC accounts mean that the PBoC has already clawed back a fair degree of oversight and control over funds held by those platforms.

Mu’s statements, along with references to how DC/EP will allow for anonymous transactions, taking user transaction data out of the hands of ‘private’ firms and into the hands of the central bank, appear to be aimed at sowing distrust in the non-state platforms and motivating trust in the PBoC’s digital currency in an attempt to drive take-up.

Recent reporting citing sources ‘familiar with the thinking’ of the PBoC states that DC/EP is aimed at eroding the dominance of Alipay and WeChat Pay in the digital payments space and providing a more level playing field between the two payment giants and the commercial banks.72 While DC/EP certainly presents an opportunity for greater competition—with commercial banks advancing their own user-facing offerings of digital wallets and QR codes—the current market share of Alipay and WeChat Pay means that it’s unlikely that the commercial banks will be able to quickly gain a stronger foothold in the payments space. It’s true that the PBoC has tried to rein in the dominance of Alipay and WeChat Pay, but it’s likely that the two platforms will play some role in DC/EP’s success.

According to PBoC statements, the transaction processing requirement for DC/EP is an average of 300,000 transactions per second (tps).73 While Tencent’s fintech division processes an average of 1 billion transactions per day, on Singles Day in 2019, Alibaba reportedly demonstrated its ability to process 544,000 tps.74 It’s unclear how closely Alibaba is working with the PBoC on DC/EP and, although it could be called on for assistance if asked, the PBoC would be building its own back-end architecture, meaning that it couldn’t simply replicate Alibaba’s system. Despite that, the raw data-processing power of Alibaba, and to a lesser degree of Tencent, is unmatched by any state-controlled system. Without an ability to at least match Alibaba’s capabilities in this area, widespread voluntary take-up of DC/EP will be difficult to achieve.

Future adoption

Given the ubiquity of Alipay and WeChat Pay in China, implementing digital wallets via the commercial banks alone would not readily result in the wide-scale adoption and use of DC/EP that the PBoC hopes for.

There’s speculation that the PBoC will provide incentives to drive take-up in the use of digital currency, for instance by providing salaries and travel subsidies in the digital currency, or not charging merchants a fee to accept DC/EP. Those incentives could be coupled with further measures to limit the dominance of Alipay and WeChat Pay and to boost the competitiveness of the commercial banks.

But, since most people in China’s biggest cities use either WeChat Pay or Alipay as their main payment method, the PBoC needs the user base of those platforms to achieve scale. The way in which the payment platforms are integrated into Chinese people’s daily lives means that Alipay and WeChat users are unlikely to quickly switch to a different wallet that, from a user’s perspective, barely differs from what they already use.75 As indicated by patent applications, the two payment platforms appear to have scoped out a role within the DC/EP system in order to maintain their user base and position in the payments space.

Further, Alipay and WeChat Pay are working hard to stay ahead of a QR-code-based DC/EP, exploring the development of payments systems based on facial-recognition technology.76

Thus, DC/EP can’t be read simply as an attempt to wind back the dominance of Alipay and WeChat Pay. 

Beijing is likely to be working to strike a balance between using the technology and user base of the platforms while encouraging greater involvement from other players in the payments space.

6. DC/EP’s potential internationalisation and the global economy

The Chinese Government has stated that one driver behind its attempts to internationalise the renminbi is to create a substantial rival to the US dollar. From Beijing’s perspective, a US-led global economy is a potential threat to the Chinese party-state’s stability, because the US could leverage economic tools that could act as a catalyst for disrupting Chinese economic and social stability.77

Recent developments in Hong Kong illustrate why the party-state takes that threat seriously. In reaction to the Hong Kong State Security Law enacted on 1 July, the US and EU have both threatened sanctions on foreign financial institutions that knowingly do business with Chinese officials involved in stifling the protests.78 If taken to extremes, such sanctions could damage the Chinese economy and stifle development. Of course, Beijing has also suggested that any ‘rash’ US sanctions ultimately could damage US companies as well, including via possible Chinese retaliation.79

If DC/EP supports the PRC’s efforts to gain a stronger foothold in the international economic system, it could also help the PRC disrupt the existing system of global economic governance, which among other things could reduce the impact of international sanctions.

Renminbi internationalisation?

Since the 2009 global financial crisis, the internationalisation of the renminbi has been a significant PBoC objective. China’s 13th Five-Year Plan (2016–2020) clearly outlined the ambition, stating that China ‘will take systematic steps to realize RMB capital account convertibility, making the RMB more convertible and freely usable, so as to steadily promote RMB’.80 Its efforts to achieve that goal to date have included signing bilateral currency swap agreements,81 agreeing to add the currency to the International Monetary Fund’s Special Drawing Rights basket of currencies82 and investing heavily in renminbi-based regional projects.83

The nature of the Chinese economy and political system, however, undermines those objectives. Most internationalised currencies are associated with relatively open economies. In maintaining a ‘closed’ capital account84 and tight controls on the economy, Beijing inhibits its own internationalisation attempts. The renminbi doesn’t compete seriously on the international stage, even compared to its regional competitors, such as the Japanese yen. SWIFT’s June 2020 RMB Tracker statistics list the renminbi as the sixth most active currency for global payments by value, following the dollar, euro, pound, yen, and Swiss franc.

That being said, DC/EP could allow China to further define the global standards for emerging financial technologies, giving Beijing space to shape international standards (particularly as opposed to rival stablecoins). As a result, DC/EP may serve as a model for digitising a fiat currency—which would create a new form of power for Beijing. As a new technology, DC/EP’s incorporation into Chinese apps and cross-border trade might not have major implications initially, but could enable the PRC to push other countries’ financial technology out of developing markets.

Through DC/EP, payments would be settled as soon as possession of the digital currency changes, as opposed to the current system, which relies on intermediaries. Most current transaction methods are technically reversible for a period of time, depending on the speed and communication of the banks involved. This change would have significant implications for internationalisation via Chinese regional initiatives, particularly the BRI. If Beijing moves BRI payments to DC/EP, it could create DC/EP-based automated payments across more than 60 countries.85 Requiring DC/EP in payments doesn’t necessarily translate to those countries choosing to hold DC/EP or transact in it in any meaningful way, but it would provide an incentive for them to increase renminbi transactions where they might otherwise be reluctant. In any case, this process would be likely to take years. Even the integration of DC/EP into China’s financial activities wouldn’t necessarily lead to other countries choosing to either keep or spend DC/EP on their own.

An alternative to SWIFT?

If DC/EP succeeds, it could help reduce the PRC’s reliance on the SWIFT system. SWIFT is viewed as a secure financial messaging service that plays a vital role in connecting the international banking system.

Although the system itself has some flaws,86 it’s the mechanism by which financial institutions are able to communicate with each other, sending and receiving information about transactions in order to complete transfers and settlements. SWIFT acts as an intermediary for most global bank transactions, and the US has a capability to access those transactions for national security concerns.

For example, in 2006, the US Department of the Treasury went through SWIFT’s database to identify transactions tied to al-Qaeda, instructing SWIFT to block terror-related transactions.87 If SWIFT declines to be involved in a transaction, the transfer won’t go through. Naturally, this perceived level of oversight and control is concerning to many other global actors, especially those under sanctions.

Global reliance on SWIFT is one of the most crucial pieces of the financial system, and its impact is one that China doesn’t underestimate. In 2019, Huang Qifan, Deputy Director of the China Center for International Economic Exchange, stated that SWIFT is ‘gradually becoming [a] financial instrument for the United States to exercise global hegemony and exercise long-arm jurisdiction,’ citing examples of the US using the SWIFT database to blacklist and freeze transactions from Iranian banks over terrorism financing allegations, as well as the US’s 2014 threats to exclude Russia from the system altogether.88

The threats alone had an intensely negative impact on the Russian economy and depreciated the rouble.89

According to PBoC official Li Wei, through the BRI, China seeks to establish a ‘financial standard exchange cooperation and build a “hard mechanism” of … financial infrastructure cooperation’.90

To date, Beijing’s attempts to create an alternative to SWIFT have resulted in the introduction of the Cross-Border Inter-Bank Payments System (CIPS) in 2015. In 2018, CIPS handled approximately US$3.7 trillion.91 SWIFT, meanwhile, facilitated the transfer of US$40 trillion in 2018 and US$77 trillion in 2019.92

Bypassing sanctions?

The creation of an effective alternative to SWIFT would create an opportunity for Beijing to bypass international sanctions. In fact, CIPS has already been used by countries exposed to US sanctions, such as Turkey and Russia, to avoid SWIFT.93 If foreign businesses are able to bypass US banks and US currency, then the impact of US sanctions would be significantly reduced. While CIPS aids efforts to bypass US banks and currency, DC/EP could be implemented as a key part of the settlement system or as an alternative transaction method functioning in parallel to CIPS. It’s worth noting, however, that CIPS can carry any currency, while DC/EP will be limited to the renminbi.

DC/EP offers the opportunity to move away from the SWIFT system, as it appears DC/EP would have the same messaging capabilities that SWIFT and CIPS provide, but it would remove the need for intermediaries. DC/EP, therefore, could serve as a new messaging system that allows sanctions evasion, as an article published in Chinese state media argued:

[a] sovereign digital currency provides a functional alternative to the dollar settlement system and blunts the impact of any sanctions or threats of exclusion both at a country and company level. It may also facilitate integration into globally traded currency markets with a reduced risk of politically inspired disruption.94

Other state actors, such as North Korea, may also be attracted to the option to use DC/EP to evade sanctions. North Korea is widely understood as a proficient and successful cyber actor with an interest in cryptocurrencies and blockchain.95 Given Pyongyang’s interest in cryptocurrencies and increased holdings in various coins, any possibility of China allowing transactions between cryptocurrencies, such as bitcoin or Monero, and DC/EP could prove to be extremely beneficial to North Korea, and any other sanctioned actors. The most difficult part of sanctions evasion using cryptocurrency is the exfiltration point into fiat (or other digital) currency—DC/EP could offer a solution to that problem.

While, initially, given Beijing’s oversight, engaging with DC/EP might not be the ideal way past SWIFT, tightened sanctions and limited options could lead various sanctioned countries to view Beijing as their best path forward.

7. Recommendations

DC/EP’s rollout is likely to have notable ramifications for governments, investors and companies, including China’s own tech champions. More analysis is needed before prescriptive policy solutions can be developed for the political and financial oversight challenges DC/EP could create. At the same time, it’s important to act in anticipation of key shifts in global financial regulation and advances in financial technology, so that governments don’t end up trying to reverse course when it’s too late to deal with the systemic risks DC/EP could create.

We suggest the following:

  1. If DC/EP achieves global take-up, the political features it embeds won’t be possible to effectively mitigate or regulate. Therefore, governments must be prepared to mitigate the political risks by investing in research into and the development of credible alternatives to DC/EP for all key highly traded currencies.
  2. Decision-makers in liberal democracies must develop a clear strategy for detecting flaws in and improving the existing system for global financial governance and work to improve international coordination among each other to achieve those strategic outcomes.
  3. Liberal democracies should establish domestic laws on data privacy and protection. They should regulate the ways that any entity can collect and use individuals’ data, improve oversight and improve due diligence aimed at mitigating data security risks.

Acknowledgements

The authors would like to thank several anonymous peer reviewers, as well as Michael Shoebridge, Fergus Hanson, Danielle Cave, James Aitken, Bill Bishop, Stephen Joske and Greg Walton for their helpful feedback.

This independent research was partly supported by a US$50,000 grant from Facebook, Inc. Additional research costs were covered from ICPC’s mixed revenue base. The work of ASPI ICPC would not be possible without the support of our partners and sponsors across governments, industry and civil society.

What is ASPI?

The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI’s sources of funding are identified in our Annual Report, online at www.aspi.org.au and in the acknowledgements section of individual publications. ASPI remains independent in the content of the research and in all editorial judgements.

ASPI International Cyber Policy Centre

ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber, emerging and critical technologies, issues related to information and foreign interference and focuses on the impact these issues have on broader strategic policy. The centre has a growing mixture of expertise and skills with teams of researchers who concentrate on policy, technical analysis, information operations and disinformation, critical and emerging technologies, cyber capacity building, satellite analysis, surveillance and China-related issues.

The ICPC informs public debate in the Indo-Pacific region and supports public policy development by producing original, empirical, data-driven research. The ICPC enriches regional debates by collaborating with research institutes from around the world and by bringing leading global experts to Australia, including through fellowships. To develop capability in Australia and across the Indo-Pacific region, the ICPC has a capacity building team that conducts workshops, training programs and large-scale exercises for the public and private sectors.

We would like to thank all of those who support and contribute to the ICPC with their time, intellect and passion for the topics we work on.

If you would like to support the work of the centre please contact: icpc@aspi.org.au

Important disclaimer

This publication is designed to provide accurate and authoritative information in relation to the subject matter covered. It is provided with the understanding that the publisher is not engaged in rendering any form of professional or other advice or services. No person should rely on the contents of this publication without first obtaining advice from a qualified professional.

© The Australian Strategic Policy Institute Limited 2020

This publication is subject to copyright. Except as permitted under the Copyright Act 1968, no part of it may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Enquiries should be addressed to the publishers. Notwithstanding the above, educational institutions (including schools, independent colleges, universities and TAFEs) are granted permission to make copies of copyrighted works strictly for educational purposes without explicit permission from ASPI and free of charge.

First published October 2020.

ISSN 2209-9689 (online), ISSN 2209-9670 (print)

.

Funding statement: Funding for this report was partly provided by Facebook Inc.

  1. Codruta Boar, Henry Holden, Amber Wadsworth, ‘Impending arrival—a sequel to the survey on central bank digital currency’, Bank for International Settlements, January 2020, online; see also Raphael Auer, Giulio Cornelli, Jon Frost, ‘Rise of the central bank digital currencies: drivers, approaches and technologies’, Bank for International Settlements, August 2020, online. ↩︎

TikTok and WeChat

Curating and controlling global information flows

What’s the Problem?

While most major international social media networks remain banned from the Chinese market in the People’s Republic of China (PRC), Chinese social media companies are expanding overseas and building up large global audiences. Some of those networks—including WeChat and TikTok—pose challenges, including to freedom of expression, that governments around the world are struggling to deal with.

The Chinese ‘super-app’ WeChat, which is indispensable in China, has approximately 1.2 billion monthly active users1 worldwide, including 100 million installations outside of China.2 The app has become the long arm of the Chinese regime, extending the PRC’s techno-authoritarian reach into the lives of its citizens and non-citizens in the diaspora.3 WeChat users outside of China are increasingly finding themselves trapped in a mobile extension of the Great Firewall of China through which they’re subjected to surveillance, censorship and propaganda. This report also shows how Covid-19 has ushered in an expanded effort to covertly censor and control the public diplomacy communications of foreign governments on WeChat.

Newcomer TikTok, through its unparalleled growth in both Asian and Western markets, has a vastly larger and broader global audience of nearly 700 million as of July 2020.4 This report finds that TikTok engages in censorship on a range of political and social topics, while also demoting and suppressing content. Case studies in this report show how discussions related to LGBTQ+ issues, Xinjiang and protests currently occurring in the US, for example, are being affected by censorship and the curation and control of information. Leaked content moderation documents have previously revealed that TikTok has instructed “its moderators to censor videos that mention Tiananmen Square, Tibetan independence, or the banned religious group Falun Gong,” among other censorship rules.5

Both Tencent and ByteDance, the companies that own and operate WeChat and TikTok, respectively, are subject to China’s security, intelligence, counter-espionage and cybersecurity laws. Internal Chinese Communist Party (CCP) committees at both companies are in place to ensure that the party’s political goals are pursued alongside the companies’ commercial goals. ByteDance CEO Zhang Yiming has stated on the record that he will ensure his products serve to promote the CCP’s propaganda agenda.6

While most major international social media platforms have traditionally taken a cautious and public approach to content moderation, TikTok is the first globally popular social media network to take a heavy-handed approach to content moderation. Possessing and deploying the capability to covertly control information flows, across geographical regions, topics and languages, positions TikTok as a powerful political actor with a global reach.

What’s the solution?

The global expansion of Chinese social media networks continues to pose unique challenges to policymakers around the world. Thus far governments have tended to hold most major international social media networks and Chinese social media networks to different standards. It’s imperative that states move to a policy position where all social media and internet companies are being held to the same set of standards, regardless of their country of origin or ownership.

This report recommends (on page 50) that governments implement transparent user data privacy and user data protection frameworks that apply to all social media networks. If companies refuse to comply with such frameworks, they shouldn’t be allowed to operate. Independent audits of social media algorithms should be conducted. Social media companies should be transparent about the guidelines that human moderators use and what impact their decisions have on their algorithms. Governments should require that all social media platforms investigate and disclose information operations being conducted on their platforms by state and non-state actors. Disclosures should include publicly releasing datasets linked to those information campaigns.

Finally, all of these recommended actions would benefit from multilateral collaboration that includes participation from governments, the private sector and civil society actors. For example, independent audits of algorithms could be shared by multiple governments that are seeking the same outcomes of accountability and transparency; governments, social media companies and research institutes could share data on information operations; all stakeholders could share lessons learned on data frameworks.

Download the report

Download our full report here.


Acknowledgements

We would like to thank Danielle Cave and Fergus Hanson for their work on this project. We would also like to thank Michael Shoebridge, Dr Samantha Hoffman, Jordan Schneider, Elliott Zaagman and Greg Walton for their feedback on this report as well as Ed Moore for his invaluable help and advice. We would also like to thank anonymous technically-focused peer reviewers.

This project began in 2019 and in early 2020 ASPI was awarded a research grant from the US State Department for US$250k, which was used towards this report. The work of ICPC would not be possible without the financial support of our partners and sponsors across governments, industry and civil society.

What is ASPI?

The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI’s sources of funding are identified in our Annual Report, online at www.aspi.org.au and in the acknowledgements section of individual publications. ASPI remains independent in the content of the research and in all editorial judgements.

ASPI International Cyber Policy Centre

ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber, emerging and critical technologies, issues related to information and foreign interference and focuses on the impact these issues have on broader strategic policy. The centre has a growing mixture of expertise and skills with teams of researchers who concentrate on policy, technical analysis, information operations and disinformation, critical and emerging technologies, cyber capacity building, satellite analysis, surveillance and China-related issues.

The ICPC informs public debate in the Indo-Pacific region and supports public policy development by producing original, empirical, data-driven research. The ICPC enriches regional debates by collaborating with research institutes from around the world and by bringing leading global experts to Australia, including through fellowships. To develop capability in Australia and across the Indo-Pacific region, the ICPC has a capacity building team that conducts workshops, training programs and large-scale exercises for the public and private sectors.

We would like to thank all of those who support and contribute to the ICPC with their time, intellect and passion for the topics we work on. If you would like to support the work of the centre please contact: icpc@aspi.org.au

Important disclaimer

This publication is designed to provide accurate and authoritative information in relation to the subject matter covered. It is provided with the understanding that the publisher is not engaged in rendering any form of professional or other advice or services. No person should rely on the contents of this publication without first obtaining advice from a qualified professional.

© The Australian Strategic Policy Institute Limited 2020

This publication is subject to copyright. Except as permitted under the Copyright Act 1968, no part of it may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Enquiries should be addressed to the publishers. Notwithstanding the above, educational institutions (including schools, independent colleges, universities and TAFEs) are granted permission to make copies of copyrighted works strictly for educational purposes without explicit permission from ASPI and free of charge.

First published September 2020.

ISSN 2209-9689 (online), ISSN 2209-9670 (print)

Funding for this report was provided by the US State Department.

Hunting the phoenix

The Chinese Communist Party’s global search for technology and talent

NOTE: 

In Policy Brief Report No. 35 ‘Hunting the Phoenix’ by Alex Joske and published by the Australian Strategic Policy Institute, reference was made to Professor Wenlong Cheng, Professor and Director of Research, Chemical Engineering at Monash University. The author and the Australian Strategic Policy Institute accept Professor Cheng’s indication that he did not accept nor derive any benefit from the Thousand Talents Plan, or been involved in or contributed to China’s defence development. Further, the author and the Australian Strategic Policy Institute did not intend to imply that Professor Cheng had engaged in any discreditable conduct and if any reader understood the publication in that way, any such suggestion is withdrawn. The author and the Australian Strategic Policy Institute apologise to Professor Cheng for any hurt caused to him.

What’s the problem?

The Chinese Communist Party (CCP) uses talent-recruitment programs to gain technology from abroad through illegal or non-transparent means. According to official statistics, China’s talent-recruitment programs drew in almost 60,000 overseas professionals between 2008 and 2016. These efforts lack transparency; are widely associated with misconduct, intellectual property theft or espionage; contribute to the People’s Liberation Army’s modernisation; and facilitate human rights abuses.

They form a core part of the CCP’s efforts to build its own power by leveraging foreign technology and expertise. Over the long term, China’s recruitment of overseas talent could shift the balance of power between it and countries such as the US. Talent recruitment isn’t inherently problematic, but the scale, organisation and level of misconduct associated with CCP talent-recruitment programs sets them apart from efforts by other countries. These concerns underline the need for governments to do more to recognise and respond to CCP talent-recruitment activities.

The mechanisms of CCP talent recruitment are poorly understood. They’re much broader than the Thousand Talents Plan—the best known among more than 200 CCP talent-recruitment programs. Domestically, they involve creating favourable conditions for overseas scientists, regardless of ethnicity, to work in China.1 Those efforts are sometimes described by official sources as ‘building nests to attract phoenixes’.2

This report focuses on overseas talent-recruitment operations—how the CCP goes abroad to hunt or lure phoenixes. It studies, for the first time, 600 ‘overseas talent-recruitment stations’ that recruit and gather information on scientists. Overseas organisations, often linked to the CCP’s united front system and overlapping with its political influence efforts, are paid to run most of the stations.3
 

What’s the solution?

Responses to CCP talent-recruitment programs should increase awareness and the transparency of the programs.

Governments should coordinate with like-minded partners, study CCP talent-recruitment activity, increase transparency on external funding in universities and establish research integrity offices that monitor such activities. They should introduce greater funding to support the retention of talent and technology.

Security agencies should investigate illegal behaviour tied to foreign talent-recruitment activity.

Funding agencies should require grant recipients to fully disclose any participation in foreign talent-recruitment programs, investigate potential grant fraud and ensure compliance with funding agreements.

Research institutions should audit the extent of staff participation in foreign talent-recruitment programs. They should act on cases of misconduct, including undeclared external commitments, grant fraud and violations of intellectual property policies. They should examine and update policies as necessary. University staff should be briefed on foreign talent-recruitment programs and disclosure requirements.
 

Introduction

The party and the state respect the choices of those studying abroad. If you choose to return to China to work, we will open our arms to warmly welcome you. If you stay abroad, we will support you serving the country through various means.

—Xi Jinping, 2013 speech at the 100th anniversary of the founding of the Western Returned Scholars Association, which is run by the United Front Work Department.4

The CCP views technological development as fundamental to its ambitions. Its goal isn’t to achieve parity with other countries, but dominance and primacy. In 2018, General Secretary Xi Jinping urged the country’s scientists and engineers to ‘actively seize the commanding heights of technological competition and future development’.5 The Made in China 2025 industrial plan drew attention to the party’s long-held aspiration for self-sufficiency and indigenous innovation in core industries, in contrast to the more open and collaborative approach to science practised by democratic nations.6

The CCP treats talent recruitment as a form of technology transfer.7 Its efforts to influence and attract professionals are active globally and cover all developed nations. The Chinese Government claims that its talent-recruitment programs recruited as many as 60,000 overseas scientists and entrepreneurs between 2008 and 2016.8 The Chinese Government runs more than 200 talent-recruitment programs, of which the Thousand Talents Plan is only one (see Appendix 1).

The US is the main country targeted by these efforts and has been described by Chinese state media as ‘the largest “treasure trove” of technological talent’.9 In addition to the US, it’s likely that more than a thousand individuals have been recruited from each of the UK, Germany, Singapore, Canada, Japan, France and Australia since 2008.10

Future ASPI International Cyber Policy Centre research will detail Chinese Government talent- recruitment efforts in Australia. Past reports have identified a handful of Australian participants in China’s talent-recruitment programs, including senior and well-funded scientists, and around a dozen CCP-linked organisations promoting talent-recruitment work and technology transfer to China.11 However, the scale of those activities is far greater than has been appreciated in Australia.

China’s prodigious recruitment of overseas scientists will be key to its ambition to dominate future technologies and modernise its military. Participants in talent-recruitment programs also appear to be disproportionately represented among overseas scientists collaborating with the Chinese military. Many recruits work on dual-use technologies at Chinese institutions that are closely linked to the People’s Liberation Army.

These activities often exploit the high-trust and open scientific communities of developed countries. In 2015, Xi Jinping told a gathering of overseas Chinese scholars that the party would ‘support you serving the country through various means’.12 As detailed in Bill Hannas, James Mulvenon and Anna Puglisi’s 2013 book Chinese industrial espionage, those ‘various means’ have often included theft, espionage, fraud and dishonesty.13 The CCP hasn’t attempted to limit those behaviours. In fact, cases of misconduct associated with talent programs have ballooned in recent years. The secrecy of the programs has only been increasing.

The CCPs’ talent-recruitment efforts cover a spectrum of activity, from legal and overt activity to illegal and covert work (Figure 1). Like other countries, China often recruits scientists through fair means and standard recruitment practices. It gains technology and expertise from abroad through accepted channels such as research collaboration, joint laboratories and overseas training. However, overt forms of exchange may disguise misconduct and illegal activity. Collaboration and joint laboratories can be used to hide undeclared conflicts of commitment, and recruitment programs can encourage misconduct. Participants in talent-recruitment programs may also be obliged to influence engagement between their home institution and China. The Chinese Government appears to have rewarded some scientists caught stealing technology through talent-recruitment programs. In some cases, Chinese intelligence officers may have been involved in talent recruitment. Illustrating the covert side of talent recruitment, this report discusses cases of espionage or misconduct associated with talent recruitment and how the Chinese military benefits from it (Appendix 2).

Figure 1: The spectrum of the CCP’s technology transfer efforts

Talent-recruitment work has been emphasised by China’s central government since the 1980s and has greatly expanded during the past two decades.14 In 2003, the CCP established central bodies to oversee talent development, including the Central Coordinating Group on Talent Work ( 中 央 人才工作协调小组), which is administered by the Central Committee’s Organisation Department and includes representation from roughly two dozen agencies.15  In 2008, the party established the national Overseas High-level Talent Recruitment Work Group (海外高层次人才引进工作小组) to oversee the Thousand Talents Plan (see box).16 Local governments around China also regularly hold recruitment events at which overseas scientists are signed up to talent-recruitment schemes and funding initiatives.17 This demonstrates how talent-recruitment efforts are a high priority for the CCP, transcending any particular bureaucracy and carried out from the centre down to county governments.

The Overseas High-level Talent Recruitment Work Group

The Overseas High-level Talent Recruitment Work Group was established in 2008 to oversee the implementation of the Thousand Talents Plan. It’s administered by the Central Committee’s Organisation Department, which plays a coordinating role in talent recruitment work carried out by government and party agencies. Its members include the Ministry of Human Resources and Social Security, the Ministry of Education, the Ministry of Science and Technology, the People’s Bank of China, the State-owned Assets Supervision and Administration Commission, the Chinese Academy of Sciences, the United Front Work Department (UFWD) of the Central Committee of the CCP, the National Development and Reform Commission, the Ministry of Industry and Information Technology, the Ministry of Public Security, the Ministry of Finance, the Overseas Chinese Affairs Office (now part of the UFWD), the Chinese Academy of Engineering, the National Natural Science Foundation, the State Administration of Foreign Experts Affairs (now part of the Ministry of Science and Technology), the Communist Youth League of China and the China Association for Science and Technology.18

To illustrate the international reach of CCP talent recruitment, the ASPI International Cyber Policy Centre (ICPC) has created an original database of 600 overseas talent-recruitment stations. The operation of the stations is contracted out to organisations or individuals who are paid to recruit overseas scientists. They might not have a clear physical presence or might be co-located with the organisations contracted to run them (see box). This is a growing part of the CCP’s talent-recruitment infrastructure—providing on-the-ground support to the CCP’s efforts to identify and recruit experts from abroad—but it has never been analysed in detail before.

Features of overseas talent-recruitment stations

  • Overseas organisations or individuals contracted by the CCP to carry out talent-recruitment work
  • Often run by overseas united front groups
  • Tasked to collect information on and recruit overseas scientists
  • Promote scientific collaboration and exchanges with China
  • Organise trips by overseas scientists to China
  • Present across the developed world
  • May receive instructions to target individuals with access to particular technologies
  • Paid up to A$30,000 annually, plus bonus payments for each successful recruitment

The database was compiled using open-source online information from Chinese-language websites. Those sources included Chinese Government websites or media pages announcing the establishment of overseas recruitment stations and websites affiliated with overseas organisations running recruitment stations. We carried out keyword searches using various Chinese terms for talent-recruitment stations to identify their presence across the globe. An interactive version of the map of stations is in the online version of this report (Figure 2).

Figure 2: Overseas recruitment stations and their links back to China

Please click the map for the interactive database. Hover over data points for details on each recruitment station. Please note: stations are geo-located to City level (not street-level). 

Using examples and case studies of stations from around the world, this report also reveals the role of the united front system in talent-recruitment work. The united front system is a network of CCP-backed agencies and organisations working to expand the party’s United Front—a coalition of groups and individuals working towards the party’s goals. Many of those agencies and organisations run overseas recruitment stations. As detailed in the ASPI report The party speaks for you: foreign interference and the Chinese Communist Party, the system is widely known for its involvement in political influence work, but its contributions to technology transfer have attracted little attention.

Why China’s talent-recruitment programs raise concerns

China’s talent-recruitment programs are unlike efforts by Western governments to attract scientific talent. As two scholars involved in advising the CCP on talent recruitment wrote in 2013, ‘The Chinese government has been the most assertive government in the world in introducing policies targeted at triggering a reverse brain drain.’19 The flow of talent from China is still largely in the direction of the US.20 However, research from the Center for Security and Emerging Technology found that the proportion of Chinese STEM PhD graduates of US universities intending to stay in the US has declined over the past two decades.21 In May 2020, the US Government announced new restrictions on visas for scientists linked to the Chinese military.22

The widespread misconduct associated with CCP talent-recruitment programs sets them apart from efforts by other nations. For example, an investigation by the Texas A&M University system found more than 100 staff linked to China’s talent programs, but only five disclosed it despite employees being required to do so.23 That level of misconduct hasn’t been reported in other countries’ talent-recruitment efforts. The absence of any serious attempt by the Chinese Government or its universities to discourage theft as part of its recruitment programs amounts to a tacit endorsement of the programs’ use to facilitate espionage, misconduct and non-transparent technology transfers.

The extent of misconduct by selectees suggests that this is enabled or encouraged by agencies overseeing the programs. Agencies at the centre of China’s talent recruitment efforts have themselves been directly involved in illegal activity. For example, an official from China’s State Administration of Foreign Experts Affairs was involved in stealing US missile technology through the recruitment of a US scientist (see Noshir Gowadia case in Appendix 2).24

Talent recruitment programs have been used to incentivise and reward economic espionage. For example, in 2013, Zhao Huajun (赵华军), was imprisoned in the US after stealing vials of a cancer research compound, which he allegedly used to apply for sponsorship there.25 A month after Zhao was released from prison, he was recruited by the Zhejiang Chinese Medicine University through the Qianjiang Scholars (钱江学者) program.26 In another case, a Coca-Cola scientist allegedly conspired with a Chinese company to secure talent-recruitment program funding on the basis of stolen trade secrets.27

Talent-recruitment programs are also tied to research commercialisation. Applicants to the Thousand Talents Plan have the option to join as ‘entrepreneurs’ rather than as scientists, supporting companies they have established in China.28 The Thousand Talents Plan is supported by the Thousand Talents Plan Venture Capital Center (千人计划创投中心), which runs competitions to pair participants with start-up funding.29

Commercial activity by talent-recruitment program participants isn’t always disclosed, which often breaches university policies on intellectual property and commercialisation. One recruit from an Australian university set up a laboratory and an artificial intelligence (AI) company in China that later received funding linked to the Thousand Talents Plan Venture Capital Center, but reportedly didn’t disclose that to his Australian university, against existing university policies. The company later supplied surveillance technology to authorities in Xinjiang.30

US investigations of participants in talent-recruitment programs have led to an increase in the programs’ secrecy, rather than reforms to make them more transparent and accountable. In September 2018, the Chinese Government began removing references to the Thousand Talents Plan from the internet and ordering organisations to use more covert methods of recruitment.31 A leaked directive told those carrying out recruitment work for the plan to not use email when inviting potential recruits to China for interviews, and instead make contact by phone or fax under the guise of inviting them to a conference (Figure 3). ‘Written notices should not contain the words “Thousand Talents Plan”’, the document states. In 2018, the official website of the Thousand Talents Plan removed all news articles about the program, before going offline in 2020.32

Figure 3: A leaked notice from September 2018 ordering organisations to use more covert methods of recruiting Thousand Talents Plan participants

Highlighted text: ‘In order to further improve work guaranteeing the safety of overseas talent, work units should not use emails, and instead use phone or fax, when carrying out the interview process. [Candidates] should be notified under the name of inviting them to return to China to participate in an academic conference or forum. Written notices should not include the words “Thousand Talents Plan”.’

Source: ‘被美國盯上 傳中國引進人才不再提千人計畫’ [Targeted by the US, it’s rumoured that China will no longer mention the 1,000 Talent Plan], CNA.com, 5 October 2018, online.

CCP technology-transfer efforts are often flexible and encourage individuals to find ways to serve from overseas. Participants in the Thousand Talents Plan, for example, have the option to enter a ‘short-term’ version of the program that requires them to spend only two months in China each year.33 Some selectees establish joint laboratories between their home institutions and their Chinese employers, which could be a way to disguise conflicts of commitment where they have agreed to spend time working for both institutions.34 ‘This enables them to maintain multiple appointments at once, which may not be fully disclosed. This may mean that they’re effectively using time, resources and facilities paid for by their home institutions to benefit Chinese institutions.

Without residing in China, scientists can support collaboration with Chinese institutions, receive visiting Chinese scholars and students and align their research with China’s priorities. Steven X Ding (丁先春), a professor at the University of Duisburg in Germany who has also been affiliated with Tianjin University, was quoted describing this mentality when he worked as vice president of the University of Applied Science Lausitz:35

I manage scientific research at the university, which has more than 100 projects supervised by me—this is a ‘group advantage’. I can serve as a bridge between China and Germany for technological exchange … and I can make greater contributions than if I returned to China on my own. Foreign countries aren’t just advanced in their technologies, but also their management is more outstanding. Being in Germany I can introduce advanced technologies to China, assist communication, exchange and cooperation, and play a role as a window and a bridge [between China and Germany].36

The CCP’s talent-recruitment activities are also notable for their strategic implications. The deepening of ‘military–civil fusion’ (a CCP policy of leveraging the civilian sector to maximise military power) means that China’s research institutes and universities are increasingly involved in classified defence research, including the development of nuclear weapons.37 Chinese companies and universities are also working directly with public security agencies to support the oppression and surveillance of minorities through their development and production of surveillance technologies.38  Participants in talent-recruitment programs also appear to be disproportionately represented among overseas scientists collaborating with the Chinese military.39 Recruitment work by the People’s Liberation Army and state-owned defence conglomerates is described later in this report.

These structures behind talent-recruitment activity and their links to national initiatives show how it’s backed by the party’s leaders and high-level agencies and has clear objectives. This contradicts the theory that China employs a ‘thousand grains of sand’ approach to intelligence gathering or economic espionage, relying on uncoordinated waves of amateur ethnic-Chinese collectors to hoover up technology.40 Indeed, what may be one of the most egregious charges of misconduct related to a talent-recruitment program involves Harvard Professor Charles Lieber, a nanotechnologist with no Chinese heritage, who was arrested in 2020 for allegedly failing to disclose a US$50,000 monthly salary he received from a Chinese university as part of the Thousand Talents Plan.41 As shown by the case of Zheng Xiaoqing, who allegedly stole jet turbine technology from GE Aviation while joining the Thousand Talents Plan as part of a Jiangsu State Security Department operation, talent recruitment can at times involve professional intelligence officers (see Appendix 2).

In 2012, Peter Mattis, an expert on CCP intelligence activity, wrote that ‘The “grains of sand” concept focuses analytic attention on the [counter-intelligence] risk individuals pose rather than on government intelligence services.’42 In the case of talent-recruitment programs, interpreting them through the lens of a ‘grains of sand’ model would place greater emphasis on individuals involved in the programs while neglecting the mechanisms of talent recruitment activity used by the CCP. Talent-recruitment efforts are carried out with heavy involvement from the united front system and dedicated agencies such as the Ministry of Science and Technology’s State Administration of Foreign Experts Affairs.43

It isn’t an ethnic program with individual actors at its core—it’s a CCP program leveraging incentives as well as organised recruitment activity—yet it’s often framed by the party as serving the country’s ethno-nationalist rejuvenation.44

Recognising these features of CCP technology-transfer activity—such as its central and strategic guidance, implementation across various levels of the Chinese Government, high-rate of misconduct and reliance on overseas recruitment mechanisms—should be fundamental to any responses to the activity.45 Poorly executed, and sometimes misguided, attempts at investigating and prosecuting suspected cases of industrial espionage have helped build an image of both the problem and enforcement actions as being driven by racial factors rather than state direction.46

Talent-recruitment stations

Chinese Government and Party agencies from the national to the district level have established hundreds of ‘overseas talent recruitment workstations’ in countries with high-quality talent, cutting-edge industries and advanced technology.47 The stations are established in alignment with central guidance on talent-recruitment work and also adapt to the needs of the various Chinese Government organs establishing them. They’re run by overseas organisations, such as community associations, and are a key part of the CCP’s little-understood talent-recruitment infrastructure.

The stations work on behalf of the Chinese Government to spot and pursue talent abroad. Their importance is reflected in the fact that research for this report has uncovered 600 stations spread across technologically advanced countries (Figure 4).48 The increasingly covert nature of talent recruitment efforts means on-the-ground measures such as talent-recruitment stations should become more important.

The highest number of stations (146) was found in the United States. However, Germany, Australia, the United Kingdom, Canada, Japan, France and Singapore also each had many stations. This underscores the global reach of China’s talent-recruitment efforts and the high level of recruitment activity in those countries.

Figure 4: The top 10 countries hosting identified talent-recruitment stations

The stations often don’t have dedicated offices or staff. Instead, they’re contracted to local professional, community, student and business organisations, such as the Federation of Chinese Professionals in Europe.49 Such organisations already have established links inside Chinese communities and receive payments in return for spotting and recruiting talent, promoting research collaboration and hosting official delegations from China. The organisations are often linked to the CCP’s united front system and may be involved in mobilising their members to serve the party’s goals—whether cultural, political or technological. In at least two cases, talent-recruitment stations have been linked to alleged economic espionage.

Talent-recruitment stations have been established since at least 2006, and the number has grown substantially since 2015.50 The recent expansion may be related to policies associated with the 13th Five-Year Plan (2016–2020) that advocated strengthening talent-recruitment work ‘centred on important national needs’.51 Of the 600 stations identified in this report, more than 115 were established in 2018 alone (Figure 5).52

Figure 5: Talent recruitment stations established each year, 2008 to 2018

Note: Only stations with verified establishment dates are included.

Politics and talent recruitment intersecting in Canada

In July 2016, the Fujian Provincial Overseas Chinese Affairs Office, part of the united front system, sent representatives, including its director (pictured first from left in Figure 6), around the world to establish talent-recruitment stations.53 Four were established in Canada. John McCallum, a Canadian politician who resigned as ambassador to China in 2019 after urging the government to release Huawei CFO Meng Wanzhou, was pictured (second from right) at the opening of a station run by the Min Business Association of Canada (加拿大闽商总会).54 The association’s chairman, Wei Chengyi (魏成义, first from right), is a member of several organisations run by the UFWD in China and has been accused of running a lobbying group for the Chinese Consulate in Toronto.55

Figure 6: The opening ceremony

Source: ‘Fujian Overseas Chinese Affairs Office’s first batch of four overseas talent recruitment sites landed in Canada’, fjsen.com, 21 July 2016, online.

We obtained several talent-recruitment station contracts, contract templates and regulations that shine a light on the stations’ operations (Figure 7). They reveal that organisations hosting stations are paid an operating fee, receive bonuses for every individual they recruit and are often required to recruit a minimum number of people each year. Those organisations are also collecting data on foreign scientists and research projects. They organise talent-recruitment events, host and arrange visiting Chinese Government delegations and prepare trips to China for prospective recruits.56

Figure 7: A talent recruitment contract signed between the Human Resources and Social Security Bureau of Qingrong District in Chengdu and a Sino-German talent-exchange association

Source: ‘About this overseas talent workstation’, German-Chinese Senior Talent Exchange and Economic and Trade Cooperation Promotion Association, 12 July 2017, online.

Organisations running recruitment stations can receive as much as ¥200,000 (A$40,000) for each individual they recruit. In addition, they’re paid as much as ¥150,000 (A$30,000) a year for general operating costs.57

CCP talent-recruitment agencies gather large amounts of data on overseas scientists, and overseas talent-recruitment stations may be involved in this information-gathering work. Domestically, the Thousand Talents Think Tank (千人智库), which is affiliated with the UFWD, claims to hold data on 12 million overseas scientists, including 2.2 million ethnic Chinese scientists and engineers.58 In 2017, a Chinese think tank produced a database of 6.5 million scientists around the world, including 440,000 AI scientists, as a ‘treasure map’ for China’s development of AI technology and a resource for talent recruitment.59 Abroad, recruitment stations set up by Tianjin City are instructed to ‘grasp information on over 100 high-level talents and an equivalent amount of innovation projects’.60 Qingdao City’s overseas stations are required to collect and annually update data on at least 50 individuals at the level of ‘associate professor, researcher or company manager’ or higher.61 The Zhuhai City Association for Science and Technology tasks its overseas stations with ‘collecting information on overseas science and technology talents, technologies and projects through various channels’.62

Information about overseas technologies and scientists is used for targeted recruitment work that reflects the technological needs of Chinese institutions. For example, Shandong University’s overseas recruitment stations recommend experts ‘on the basis of the university’s needs for development, gradually building a talent database and recommending high-level talents or teams to the university in targeted way’.63 The Guangzhou Development Zone ‘fully takes advantage of talent databases held by their overseas talent workstations … attracting talents to the zone for innovation and entrepreneurship through exchange events and talks’.64

However, the 600 stations identified in this report are probably only a portion of the total number of stations established by the CCP. The real number may be several hundred greater. For example, we identified 90 stations established by the Jiangsu Provincial Government or local governments in the province, yet in 2017 the province’s Overseas Chinese Affairs Office—only one of many agencies in the province establishing overseas recruitment stations—stated that it had already established 121 stations.65

One hundred and seventy-one identified stations were established by united front agencies such as overseas Chinese affairs offices. For many other stations, it’s unclear which part of the bureaucracy established them, so the real number of stations established by the united front system is probably much greater. Similarly, the Qingdao UFWD describes how the city’s Organisation Department produced regulations on overseas talent-recruitment stations and the UFWD advised on their implementation and encouraged united front system agencies to carry them out.66 Universities, party organisation departments, state human resources and social affairs bureaus, state-backed scientific associations and foreign experts affairs bureaus also establish overseas-recruitment stations. None of them is an intelligence agency, but the networks and collection requirements of stations mean they could benefit China’s intelligence agencies.

Overseas talent-recruitment stations are typically run by local organisations, which are contracted to operate them for a period of several years. The local groups include hometown associations, business associations, professional organisations, alumni associations, technology-transfer and education companies and Chinese students and scholars associations (CSSAs) (see box). Local host organisations have often been established with support from, or built close relationships with, agencies such as China’s State Administration for Foreign Experts Affairs and the UFWD.67 Overseas operations of Chinese companies reportedly also host talent-recruitment stations.68 In one case, a station was reportedly established in the University College Dublin Confucius Institute.69

Chinese students and scholars associations involved in running talent recruitment stations

  • US: Greater New York Fujian Students and Scholars Association, University of Washington CSSA, North American Chinese Student Association, UC Davis CSSA
  • Australia: Victoria CSSA, Western Australia CSSA, New South Wales CSSA
  • UK: United Kingdom CSSA
  • Switzerland: Geneva CSSA
  • Italy: Chinese Students and Scholars Union in Italy
  • Czech Republic: Czech CSSA
  • Ireland: CSSA Ireland
  • Hungary: All-Hungary CSSA

Provincial, municipal and district governments are responsible for most talent recruitment, yet their activities are rarely discussed. Qingdao city alone claims that it recruited 1,500 people through its recruitment stations between 2009 and 2014.70 Out of 600 recruitment stations identified in this research, only 20 were established by national organisations, such as the UFWD’s Western Returned Scholars Association (WRSA) and Overseas Chinese Affairs Office.

Similarly, over 80% of talent-recruitment programs are run at the subnational level and may attract as many as seven times as many scientists as the national programs. Between 2008 and 2016, China’s Ministry of Human Resources and Social Security determined that roughly 53,900 scholars had been recruited from abroad by local governments. More than 7,000 scholars were recruited through the Thousand Talents Plan and Hundred Talents Plan (another national talent-recruitment program) over the same period.71

Case study: Zhejiang’s recruitment work in the United Kingdom

A 2018 CCP report on Zhejiang Province’s overseas talent-recruitment work mentioned that it had established 31 overseas recruitment stations. According to the report, Brunel University Professor Zhao Hua (赵华) from the UK is one of the scientists recruited through their efforts.72 Zhao is an expert in internal combustion engines who was recruited to Zhejiang Painier Technology (浙江 派尼尔科技公司), which produces ‘military and civilian-use high-powered outboard engines’.73

The partnership between Zhao and Zhejiang Painier Technology was formed with the help of a talent-recruitment station and reportedly attracted Ұ300 million (A$60 million) in investment.74 The Zhejiang UK Association (英国浙江联谊会) runs as many as four talent-recruitment stations and has recruited more than 100 experts for Zhejiang Province or cities in the province.75 They include a station for Jinhua, the city where Zhejiang Painier Technology is based, so it could have been the organisation that recruited Professor Zhao.76

The Zhejiang UK Association’s founding president is Lady Bates (or Li Xuelin, 李雪琳), the wife of Lord Bates, Minister of State for International Development from 2016 until January 2019.77 Accompanied by her husband, Lady Bates represented the association at the establishment of a recruitment station for Zhejiang Province’s Jinhua city in 2013 (Figure 8).78 She was a non-voting delegate to the peak meeting place of the CCP-led United Front—the Chinese People’s Political Consultative Conference (CPPCC)—and is a member of the UFWD-run China Overseas Friendship Association.79

Figure 8: Lord (first row, second from right) and Lady Bates (first row, centre)

Source: ‘英国浙江联谊会再次携手浙江——与金华市政府签署设立金华英国工作站协议’ [British Zhejiang Friendship Association joins hands with Zhejiang again—Signed an agreement with Jinhua Municipal Government for the establishment of Jinhua UK Workstation], ZJUKA, no date, online.

Counsellor Li Hui (李辉), a senior united front official from the Chinese Embassy in London, praised the association at the station’s founding.80 In particular, he noted Lady Bates’s use of her personal connections to arrange for the signing ceremony to be held in the Palace of Westminster.81

Talent-recruitment stations help arrange visits by Chinese delegations. For example, the Australian alumni association of Northwestern Polytechnical University (NWPU) became a recruitment station for the university and Xi’an City, where the university is located, in 2018.82 It arranged meetings between NWPU representatives and leading Australian-Chinese scientists and helped the university sign partnerships with them. Within a month, it claimed to have introduced five professors from universities in Melbourne to NWPU, although it’s unclear how many of them were eventually recruited by the university.83 NWPU specialises in aviation, space and naval technology as one of China’s ‘Seven Sons of National Defence’—the country’s leading defence universities.84 It’s been implicated in an effort to illegally export equipment for antisubmarine warfare from the US.85

Overseas talent-recruitment organisations also run competitions and recruitment events for the Chinese Government. For example, in 2017, the UFWD’s WRSA held competitions around the world, including in Paris, Sydney, London and San Francisco, in which scientists pitched projects in the hope of receiving funding from and appointments in China. The events were held with the help of 29 European, Singaporean, Japanese, Australian and North American united front groups for scientists.86 Organisations including the University of Technology Sydney CSSA and the Federation of Chinese Scholars in Australia (全澳华人专家学者联合会)—a peak body for Chinese-Australian professional associations that was set up under the Chinese Embassy’s guidance—have partnered with the Chinese Government to hold recruitment competitions tied to the Thousand Talents Plan.87 As described below, CSSAs have run recruitment events for Chinese military institutions and state-owned defence companies.

Talent recruitment in Japan

The All-Japan Federation of Overseas Chinese Professionals (中国留日同学会) is the leading united front group for ethnic Chinese scientists and engineers in Japan. It describes itself as having been established in 1998 under the direction of the UFWD and the UFWD’s WRSA, which is a dedicated body used by the department to interact with and influence scholars with overseas connections.88

Every president of the federation has also served as a council member of the WRSA or the China Overseas Friendship Association, which is another UFWD-run body.89 It runs at least eight talent-recruitment stations—organising talent-recruitment events in Japan and bringing scientists to talent-recruitment expos in China—and reportedly recruited 30 scientists for Fujian Province alone.90 Despite its involvement in the CCP’s technology-transfer efforts, it has partnered with the Japan Science and Technology Agency to run events.91 Former prime minister Hatoyama Yukio (鸠山由纪夫) attended the opening of a WRSA overseas liaison workstation run by the group—the first established by the WRSA (Figure 9).92

Figure 9: Former Japanese prime minister Hatoyama Yukio at the opening of a WRSA workstation

While raw numbers of recruited scientists are occasionally published, specific examples of scientists recruited by individual stations are difficult to find. In 2018, Weihai, a city in Shandong Province, released the names of 25 scientists recruited through stations in Japan and Eastern Europe.93 Among the recruits were medical researchers and AI specialists, including a Ukrainian scientist specialising in unmanned aerial vehicles who was recruited by Harbin Institute of Technology—one of China’s leading defence research universities.94

Case study: The Changzhou UFWD’s overseas network

The UFWD of Changzhou, a city between Shanghai and Nanjing, has established talent-recruitment stations around the world. The UFWD set up the stations alongside its establishment of hometown associations for ethnic Chinese in foreign countries. This illustrates the united front system’s integration of technology-transfer efforts and political and community influence work.

In October 2014, a delegation led by the Changzhou UFWD head Zhang Yue (张跃) travelled to Birmingham to oversee the founding of the UK Changzhou Association (英国常州联谊会). Zhang and the president of the UK Promotion of China Re-unification Society (全英华人华侨中国统一促进会) were appointed as the association’s honorary presidents.95 A united front official posted to the PRC Embassy in London also attended the event.96

The association immediately became an overseas talent-recruitment station for Changzhou and a branch of the Changzhou Overseas Friendship Association, which is headed by a leader of the Changzhou UFWD.97 According to a CCP media outlet, the association ‘is a window for external propaganda for Changzhou and a platform for talent recruitment’ (Figure 10).98

Figure 10: A plaque awarded by the Changzhou City Talent Work Leading Small Group Office to its ‘UK talent recruitment and knowledge introduction workstation’ in 2014

Three days later, the Changzhou UFWD delegation appeared in Paris for the founding of the France Changzhou Association (法国常州联谊会). Again, the Changzhou UFWD head was made honorary president and the association became a talent-recruitment station and a branch of the Changzhou Overseas Friendship Association. CCP media described it as ‘the second overseas work platform established by Changzhou’ under the leadership of Changzhou’s Overseas Chinese Federation, which is a united front agency.99

As detailed in a report published by the province’s overseas Chinese federation, these activities were part of the Changzhou united front system’s strategy of ‘actively guiding the construction of foreign overseas Chinese associations’.100 By 2018, when the report was published, the city had established associations in Australia, Canada, Singapore, the US and Hong Kong and was in the middle of establishing one in Macau. The founding of the Australian association was attended by a senior Changzhou UFWD official, Victorian Legislative Assembly member Hong Lim and Australian Chinese-language media mogul Tommy Jiang (姜兆庆).101

Economic espionage

The following two case studies demonstrate how talent-recruitment stations and their hosting organisations have been implicated in economic espionage and are often closely linked to the CCP’s united front system.

Case study: Cao Guangzhi

In March 2019, Tesla sued its former employee Cao Guangzhi (曹光植, Figure 11), alleging that he stole source code for its Autopilot features before taking it to a rival start-up, China’s Xiaopeng Motors.102

In July, he admitted to uploading the source code to his iCloud account but denies stealing any information.103 Tesla calls Autopilot the ‘crown jewel’ of its intellectual property portfolio and claims to have spent hundreds of millions of dollars over five years to develop it.104 Additional research on the subject of this ongoing legal case shows a pattern of cooperation between Cao and the CCP’s united front system on talent-recruitment work dating back to nearly a decade before the lawsuit.

Figure 11: Cao Guangzhi (far left) with other co-founders of the Association of Wenzhou PhDs USA

Source: ‘全美温州博士协会 “藏龙卧虎”,有古根海姆奖得主、苹果谷歌工程师···’ [The ‘Hidden Dragon and Crouching Tiger’ of the Wenzhou Doctors Association of the US; there are Guggenheim Award winners, Apple Google engineers…], WZRB, 14 April 2017, online.

When Cao submitted his doctoral thesis to Purdue University in 2009, he and three friends established the Association of Wenzhou PhDs USA (全美温州博士协会).105 All four hail from Wenzhou, a city south of Shanghai known for the hundreds of renowned mathematicians who were born there.106 From its inception, the association has worked closely with the PRC Government. A report from Wenzhou’s local newspaper claims that the Wenzhou Science and Technology Bureau, Overseas Chinese Affairs Office and Overseas Chinese Federation gave the group a list of US-based PhD students and graduates from the town, whom they then recruited as members.107 The head of the Wenzhou UFWD praised the association during a 2010 trip to America as ‘the first of its kind and highly significant’.108

The Association of Wenzhou PhDs USA carries out talent recruitment on behalf of the CCP. The year after its establishment, it signed an agreement with the UFWD of a county in Wenzhou to run a talent-recruitment station that gathers information on overseas scientists and carries out recruitment work.109 That year, it also arranged for 13 of its members to visit Wenzhou for meetings with talent-recruitment officials from organisations such as the local foreign experts affairs bureau 110 and with representatives of local companies. Several of the members also brought their research with them, presenting technologies such as a multispectral imaging tool.111

Within a few years of its founding, the association had built up a small but elite group of more than 100 members. By 2017, its members reportedly included Lin Jianhai (林建海), the Wenzhou-born secretary of the International Monetary Fund; engineers from Google, Apple, Amazon, Motorola and IBM; scholars at Harvard and Yale; and six US government employees.112 At least one of its members became a Zhejiang Province Thousand Talents Plan scholar through the group’s recommendation.113 It also helped Wenzhou University recruit a materials scientist from the US Government’s Argonne National Laboratory.114

Case study: Yang Chunlai

The case of Yang Chunlai (杨春来) offers a window into the overlap of the united front system and economic espionage. Yang was a computer programmer at CME Group, which manages derivatives and futures exchanges such as the Chicago Mercantile Exchange. Employed at CME Group since 2000, he was arrested by the Federal Bureau of Investigation (FBI) in July 2011.115 In 2015, he pleaded guilty to trade secrets theft for stealing CME Group source code in a scheme to set up a futures exchange company in China. He was sentenced to four years’ probation.116

Before his arrest, Yang played a central role in a united front group that promotes talent recruitment by, and technology transfer to, China: the Association of Chinese-American Scientists and Engineers (ACSE, 旅美中国科学家工程师专业人士协会). From 2005 to 2007 he was the group’s president, and then its chairman to 2009.117

ACSE is one of several hundred groups for ethnic Chinese professionals that are closely linked to the CCP.118 ACSE and its leaders frequently met with PRC officials, particularly those from united front agencies such as the Overseas Chinese Affairs Office (OCAO),119 the CPPCC and the All-Chinese Federation of Returned Overseas Chinese. At one event, the future director of the OCAO, Xu Yousheng (许又声), told ACSE:

There are many ways to serve the nation; you don’t have to return to China and start an enterprise. You can also return to China to teach or introduce advanced foreign technology and experience—this is a very good way to serve China.120

Yang was appointed to the OCAO’s expert advisory committee in 2008.121 In 2010, he also spoke about ACSE’s close relationship with the UFWD-run WRSA.122

Further illustrating these linkages, Yang visited Beijing for a ‘young overseas Chinese leaders’ training course run by the OCAO in May 2006. Speaking to the People’s Daily during the course, Yang said, ‘It’s not that those who stay abroad don’t love China; it’s the opposite. The longer one stays in foreign lands, the greater one’s understanding of the depth of homesickness.’123 Yang also spoke of the sensitivity of source code used by companies, work on which doesn’t get outsourced. However, he hinted at his eventual theft of code by saying: ‘Of course, even with things the way they are, everyone is still looking for suitable entrepreneurial opportunities to return to China’.124

In 2009, an ‘entrepreneurial opportunity’ may have presented itself when ACSE hosted a talent-recruitment event by a delegation from the city of Zhangjiagang (张家港).125 At the event, which Yang attended (Figure 12), ACSE signed a cooperation agreement with Zhangjiagang to ‘jointly build a Sino-US exchange platform and contribute to the development of the homeland’—potentially indicating the establishment of a talent-recruitment station or a similar arrangement.126

Figure 12: Yang Chunlai (rear, second from right) at the signing ceremony for ACSE’s partnership with Zhangjiagang

Yang later wrote a letter to the OCAO proposing the establishment of an electronic trading company led by him in Zhangjiagang and asking for the office’s support.127 In mid-2010, he emailed CME Group trade secrets to officials in Zhangjiagang and started setting up a company in China. By December, he began surreptitiously downloading source code from CME Group onto a removable hard drive.128 

Yang’s relationship with the OCAO probably facilitated and encouraged his attempt to steal trade secrets in order to establish a Chinese company that, according to his plea deal, would have become ‘a transfer station to China for advanced technologies companies around the world’.129

Yang’s activities appeared to go beyond promoting technology transfer; there are indications that he was also involved in political influence work. This reflects the united front system’s involvement in both technology transfer and political interference. At a 2007 OCAO-organised conference in Beijing, Yang said that he had been encouraged by CPPCC Vice Chairman and Zhi Gong Party Chairman Luo Haocai to actively participate in politics, which he described as ‘a whip telling overseas Chinese to integrate into mainstream society’. He added, ‘I estimate that [ACSE] can influence 500 votes’ in the 2008 US presidential election.130 Yang also befriended politicians, including one senator, who wrote a letter to the judge testifying to Yang’s good character.131 In his OCAO conference speech, he highlighted the appointment of Elaine Chao as US Secretary of Labor and her attendance at ACSE events.132

Talent recruitment and the Chinese military

Talent recruitment is also being directly carried out by the Chinese military. For example, the National University of Defense Technology (NUDT, the People’s Liberation Army’s premier science and technology university) has recruited at least four professors from abroad, including one University of New South Wales supercomputer expert, using the Thousand Talents Plan.133

Outside of formal talent-recruitment programs, NUDT has given guest professorships to numerous overseas scientists, For instance, Gao Wei (高唯), an expert in materials science at New Zealand’s University of Auckland, was awarded a distinguished guest professorship at NUDT in May 2014.134

Gao is closely involved in CCP talent-recruitment efforts. In 2016, he joined Chengdu University as a selectee of the Sichuan Provincial Thousand Talents Plan.135 Just a month before joining NUDT, he signed a partnership with the State Administration of Foreign Experts Affairs as president of the New Zealand Chinese Scientists Association (新西兰华人科学家协会).136 In 2018, the association agreed to run a talent-recruitment station for an industrial park in Shenzhen.137 He has reportedly served as a member of the overseas expert advisory committee to the united front system’s OCAO.138 In 2017, at one of the OCAO’s events, Gao expressed his desire to commercialise his research in China and said that ‘even though our bodies are overseas, we really wish to make our own contributions to [China’s] development’.139

The military’s recruitment of scientists is supported by the same network of overseas recruitment stations and CCP-linked organisations that are active in talent-recruitment work more generally.

Chinese military recruitment delegations have travelled around the world and worked with local united front groups to hold recruitment sessions. In 2014, the New South Wales Chinese Students and Scholars Association (NSW-CSSA, 新南威尔士州中国学生学者联谊会) held an overseas talent-recruitment event for NUDT and several military-linked civilian universities.140 The NSW-CSSA is a peak body for CSSAs and holds its annual general meetings in the Chinese Consulate in the presence of Chinese diplomats.141 In 2013, NUDT held a recruitment session in Zürich organised by the Chinese Association of Science and Technology in Switzerland (瑞士中国学人科技协会).142 A similar event was held in Madrid in 2016.143

The Chinese Academy of Engineering Physics (CAEP), which runs the military’s nuclear weapons program, is particularly active in recruiting overseas experts. By 2014, CAEP had recruited 57 scientists through the Thousand Talents Plan.144 It runs the Center for High Pressure Science and Technology Advanced Research in Beijing in part as a platform for recruiting overseas talent. The institute doesn’t mention its affiliation with CAEP on its English-language website, yet it’s run by a Taiwanese-American scientist who joined CAEP through the Thousand Talents Plan.145 So many scientists from the US’s Los Alamos National Laboratory (a nuclear weapons research facility) have been recruited to Chinese institutions that they’re reportedly known as the ‘Los Alamos club’.146

CAEP also holds overseas recruitment events. At a 2018 event in the UK, a CAEP representative noted the organisation’s intention to gain technology through talent recruitment, saying ‘our academy hopes that overseas students will bring some advanced technologies back, and join us to carry out research projects.’147

Chinese state-owned defence conglomerates are engaged in the same activities. China Electronics Technology Group Corporation (CETC), which specialises in developing military electronics, has been building its presence in Austria, where it opened the company’s European headquarters in 2016 and runs a joint laboratory with Graz University of Technology.148 As part of its expansion, it held a meeting of the European Overseas High-level Talent Association (欧洲海外高层次人才联谊会) in 2017 that was attended by dozens of scientists from across Europe. Later that year, CETC reportedly held similar meetings and recruitment sessions in Silicon Valley and Boston.149 In 2013, the head of CETC’s 38th Research Institute, which specialises in military-use electronics such as radar systems, visited Australia and met with a local united front group for scientists.150 Several members of the group from the University of Technology Sydney attended the meeting, and two years later the university signed a controversial $10 million partnership with CETC on technologies such as AI and big data.151

The Chinese Government’s primary manufacturer of ballistic missiles and satellites, China Aerospace Science and Technology Corporation, has held recruitment sessions in the US and UK through the help of local CSSAs.152

In addition to traditional defence institutions (military institutes and defence companies), China’s civilian universities are increasingly involved in defence research and have also recruited large numbers of overseas scientists. ASPI ICPC’s China Defence Universities Tracker has catalogued and analysed the implementation of military–civil fusion in the university sector.153 The policy of military–civil fusion has led to the establishment of more than 160 defence laboratories in Chinese universities, and such defence links are particularly common among leading Chinese universities that attract the greatest share of talent-recruitment program participants.154 Many recruits end up working in defence laboratories or on defence projects.155

Recommendations

The CCP’s use of talent-recruitment activity as a conduit for non-transparent technology transfer presents a substantial challenge to governments and research institutions. Many of those activities fly under the radar of traditional counterintelligence work, yet they can develop into espionage, interference and illegal or unethical behaviour.

While this phenomenon may still be poorly understood by many governments and universities, it can often be addressed by better enforcement of existing regulations. Much of the misconduct associated with talent-recruitment programs breaches existing laws, contracts and institutional policies. The fact that it nonetheless occurs at high levels points to a failure of compliance and enforcement mechanisms across research institutions and relevant government agencies. Governments and research institutions should therefore emphasise the need to build an understanding of CCP talent-recruitment work. They must also ensure that they enforce existing policies, while updating them as necessary. This report recommends the introduction of new policies to promote transparency and accountability and help manage conflicts of interest.

For governments

We recommend that governments around the world pursue the following measures:

  1. Task appropriate agencies to carry out a study of the extent and mechanisms of CCP talent-recruitment work, including any related misconduct, in their country.
  2. Ensure that law enforcement and security agencies are resourced and encouraged to investigate and act on related cases of theft, fraud and espionage.
  3. Explicitly prohibit government employees from joining foreign talent-recruitment programs.
  4. Introduce clear disclosure requirements for foreign funding and appointments of recipients of government-funded grants and assessors of grant applications.
  5. Ensure that funding agencies have effective mechanisms and resources to investigate compliance with grant agreements.
  6. Ensure that recipients of government research funding are required to disclose relevant staff participation in foreign talent-recruitment programs.
  7. Establish a public online database of all external funding received by public universities and their employees and require universities to submit and update data.
  8. Establish a national research integrity office that oversees publicly funded research institutions, produces reports for the government and public on research integrity issues, manages the public database of external funding in universities, and carries out investigations into research integrity.
  9. Brief universities and other research institutions about CCP talent-recruitment programs and any relevant government policies.
  10. Develop recommendations for universities and other research institutions to tackle talent-recruitment activity. This can draw on the Guidelines to counter foreign interference in the Australian university sector developed by a joint government and university sector taskforce on foreign interference.156
  11. Create an annual meeting of education, science and industry ministers from like-minded countries to deepen research collaboration within alliances, beyond existing military and intelligence research partnerships, and coordinate on issues such as technology and research security.
  12. Increase funding for the university sector and priority research areas, such as artificial intelligence, quantum science and energy storage, perhaps as part of the cooperation proposed above.
  13. Develop national strategies to commercialise research and build talent.

For research institutions

We recommend that research institutions such as universities pursue the following measures:

  1. Carry out a comprehensive and independent audit of participation in CCP talent-recruitment programs by staff.
  2. Ensure that there’s sufficient resourcing to implement and ensure compliance with policies on conflicts of interest, commercialisation, integrity and intellectual property.
  3. Fully investigate cases of fraud, misconduct or nondisclosure. These investigations should determine why existing systems failed to prevent misconduct and then discuss the findings with relevant government agencies.
  4. In conjunction with the government, brief staff on relevant policies on and precautions against CCP talent-recruitment programs.
  5. Strengthen existing staff travel databases to automatically flag conflicts with grant commitments and contracts.
  6. Update policies on intellectual property, commercialisation, research integrity, conflicts of interest and external appointments where necessary.

Participants in CCP talent-recruitment programs should be required to submit their contracts with the foreign institution (both English and Chinese versions) and fully disclose any remuneration.

Appendix

Two appendices accompany this report:

  • Appendix 1: Selected Chinese government talent-recruitment programs
  • Appendix 2: Cases and alleged cases of espionage, fraud and misconduct

Readers are encouraged to download the report to access the appendices.


Acknowledgements

I would like to thank Jichang Lulu, Lin Li, Elsa Kania, John Garnaut, Danielle Cave, Fergus Hanson, Michael Shoebridge and Peter Jennings for their support and feedback on this report. Lin Li helped compile the database of talent-recruitment stations. Alexandra Pascoe provided substantial help in researching and writing the case summaries in Appendix 2. Audrey Fritz and Emily Weinstein contributed valuable research on talent-recruitment programs. I would also like to thank anonymous peer reviewers who provided useful feedback on drafts of the report. The US Department of State provided ASPI with US$145.6k in funding, which was used towards this report.

What is ASPI?

The Australian Strategic Policy Institute was formed in 2001 as an independent, non-partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI’s sources of funding are identified in our Annual Report, online at www.aspi.org.au and in the acknowledgements section of individual publications. ASPI remains independent in the content of the research and in all editorial judgements.

ASPI International Cyber Policy Centre

ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy. The ICPC informs public debate and supports sound public policy by producing original empirical research, bringing together researchers with diverse expertise, often working together in teams. To develop capability in Australia and our region, the ICPC has a capacity building team that conducts workshops, training programs and large-scale exercises both in Australia and overseas for both the public and private sectors. The ICPC enriches the national debate on cyber and strategic policy by running an international visits program that brings leading experts to Australia.

Important disclaimer

This publication is designed to provide accurate and authoritative information in relation to the subject matter covered. It is provided with the understanding that the publisher is not engaged in rendering any form of professional or other advice or services. No person should rely on the contents of this publication without first obtaining advice from a qualified professional.

© The Australian Strategic Policy Institute Limited 2020

This publication is subject to copyright. Except as permitted under the Copyright Act 1968, no part of it may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Enquiries should be addressed to the publishers. Notwithstanding the above, educational institutions (including schools, independent colleges, universities and TAFEs) are granted permission to make copies of copyrighted works strictly for educational purposes without explicit permission from ASPI and free of charge.

First published August 2020. ISSN 2209-9689 (online)
ISSN 2209-9670 (print)

  1. Those conditions include lucrative wages, the creation of tailored venture capital firms and dedicated technology parks. For an influential and detailed study of the domestic infrastructure of PRC technology-transfer efforts, as well as much of its overseas activities through the State Administration of Foreign Experts Affairs, in particular, see Bill Hannas, James Mulvenon, Anna Puglisi, Chinese industrial espionage: technology acquisition and military modernisation, Routledge, London and New York, 2013. ↩︎
  2. See, for example, ‘致公党江苏省委首届“引凤工程”成果丰硕’ [Zhigong Party Jiangsu Committee’s first ‘Attracting Phoenixes Project’ has bountiful results], Jiangsu Committee of the Zhigong Party, 2 January 2011, online; Tang Jingli [唐景莉], ‘筑巢引凤聚才智 国际协同谋创新’ [Building nests to attract phoenixes and gather talents and knowledge, international collaboration for innovation], Ministry of Education, 5 April 2012, online; ‘“筑巢引凤”聚人才 浙江举行 “人才强企”推介会’ [Building nests to attract phoenixes and gather talents, Zhejiang holds the ‘strong talent enterprises’ promotional event], Zhejiang Online, 18 July 2019, online. ↩︎
  3. See Alex Joske, The party speaks for you: foreign interference and the Chinese Communist Party’s united front system, ASPI, Canberra, June 2020, online. ↩︎
  4. Xi Jinping [习近平], ‘习 近平:在欧 美同学会成立100周年庆祝大会上的讲话’ [Xi Jinping: Speech at the celebration of the 100th anniversary of the founding of the Western Returned Scholars Association], Chinese Communist Party News, 21 October 2013, online. ↩︎
  5. ‘习近平:瞄准世界科技前沿引领科技发展方向抢占先机迎难而上建设世界科技强国’ [Xi Jinping: Set sights on the cutting-edge of world science and technology and guide the direction of technological development; seize this strategic opportunity and meet the challenge of building a strong country in terms of science and technology], Xinhua, 28 May 2018, online. ↩︎
  6. Elsa Kania, ‘Made in China 2025, explained’, The Diplomat, 2 February 2019, online; PRC State Council, ‘中国制造2025’ [Made in China 2025], www.gov.cn, 8 May 2015, online; China’s National Medium-Long Term Science and Technology Development Plan (2006–2020) highlighted the goal of indigenous innovation: online . ↩︎
  7. China’s 2017 State Council Plan on Building a National Technology Transfer System describes talent recruitment as a form of technology transfer. See State Council, ‘国家技术转移体系建设方案’ [Plan on Building a National Technology Transfer System], www.gov.cn, 15 September 2017, online. ↩︎
  8. ‘我国留学回国人员已达265.11万人’ [The number of Chinese returning from studying abroad has reached 2,651,100], Economic Daily, 12 April 2017, online. ↩︎
  9. ‘中国驻外使领馆:万流归海引人才 不遗余力架桥梁’ [PRC overseas mission: amid the flow of tens of thousands of talents returning to China, we do not spare energy in building bridges], www.gov.cn, 4 June 2014, online. ↩︎
  10. These estimates are based on the conservative assumption that 60,000 individuals have been recruited from abroad through CCP talent-recruitment programs since 2008. Data on 3,500 participants in the Thousand Talents Plan was used to estimate the proportion recruited from each country. ↩︎
  11. Clive Hamilton, Alex Joske, ‘United Front activities in Australia’, Parliamentary Joint Committee on Intelligence and Security, 2018, online; Ben Packham, ‘Security experts warn of military threat from Chinese marine project’, The Australian, 10 February 2020, online; Alex Joske, ‘The company with Aussie roots that’s helping build China’s surveillance state’, The Strategist, 26 August 2019, online; Ben Packham, ‘Professor, Chinese generals co-authored defence research’, The Australian, 31 July 2019, online; Geoff Wade, Twitter, 25 February 2020, online. ↩︎
  12. Xi Jinping [习近平], ‘习近平:在欧美同学会成立100周年庆祝大会上的讲话’ [Xi Jinping: Speech at the celebration of the 100th anniversary of the founding of the Western Returned Scholars Association]. ↩︎
  13. Hannas et al., Chinese industrial espionage: technology acquisition and military modernization. ↩︎
  14. ‘中央引进国外智力领导小组始末’ [The beginning and end of the Central Leading Small Group for Introducing Foreign Expertise], Baicheng County Party Building Online, 30 September 2019, online. ↩︎
  15. ‘中国人才工作的新进展’ [New progress in China’s talent work], China Online, 28 June 2005, online. ↩︎
  16. ‘中共中央办公厅转发《中央人才工作协调小组关于实施海外高层次人才引进计划的意见》的通知’ [Notice on the CCP General Office circulating ‘Recommendations of the Central Talent Work Coordination Small Group on implementing the overseas high-level talent recruitment plan’], China Talent Online, 20 June 2012, online. ↩︎
  17. ‘2003年全国人才工作会议以来我国人才发展纪实’ [Recording the country’s talent development since the 2003 National Talent Work Conference], People’s Daily. Many of these events, such as Liaoning Province’s China Overseas Scholar Innovation Summit (中国海外学子创业周) and Guangzhou’s Convention on Exchange of Overseas Talents and Guangzhou, were first held before 2003. ‘2018中国海外人才交流大会开幕’ [2018 Convention on Exchange of Overseas Talents], Western Returned Scholars Association (WRSA), 24 December 2018, online ; ‘海外学子创业周凸显品牌效应’ [The Overseas Scholar Entrepreneurship Week has a clear brand effect], Sina, 26 May 2010, online. ↩︎

Clean pipes: Should ISPs provide a more secure internet?

Introduction

One of the largest online challenges facing Australia is to provide effective cybersecurity to the majority of internet users who don’t have the skills or resources to defend themselves.

This paper explores the concept of ‘Clean Pipes’, which is the idea that internet service providers (ISPs) could provide security services to their customers to deliver a level of default security.

The Australian Government looks to be implementing a version of Clean Pipes: on 30 June 2020 the Prime Minister announced a funding commitment to ‘prevent malicious cyber activity from ever reaching millions of Australians across the country by blocking known malicious websites and computer viruses at speed’.1

This paper examines arguments for Clean Pipes and possible implementation roadblocks.

Background

Australia’s 2016 Cyber Security Strategy recognised the opportunities and risks that come with cyberspace and committed to ‘enabling growth, innovation and prosperity for all Australians through strong cyber security’.2

Despite that strategy, however, the online security environment has continued to deteriorate.

There have already been several significant and newsworthy attacks3 so far this year:

  • Toll Group was affected by ransomware in both February and May.4
  • BlueScope Steel’s operations were affected by ransomware in May.5
  • MyBudget, a money management company, had outages caused by ransomware in May.6
  • Lion Australia, a beverage giant, was crippled by ransomware in June.7

However, most attacks aren’t publicly reported, so these incidents are undoubtedly just the tip of the iceberg.

A 2018 estimate that included broader direct costs calculated the potential loss to the Australian economy at $29 billion per year.8

During the Covid-19 crisis, there’s also been significant domestic and international concern about the vulnerability of critical infrastructure such as hospitals and the health sector to cyberattacks. Interpol warned that cybercriminals were targeting critical healthcare institutions with ransomware, and the Cyber Peace Institute issued a call for all governments to ‘work together now to stop cyberattacks on the healthcare sector’.9

This also rose to the highest levels of international diplomacy—the Department of Foreign Affairs and the Australian Cyber Security Centre (ACSC) issued a joint statement on ‘unacceptable malicious cyber activity’, and US Secretary of State Mike Pompeo warned of consequences for malicious cyber activity affecting hospitals and healthcare systems.10

This high-level diplomatic concern emphasises not only that cybersecurity is critically important, but that our current approaches to protecting Australia have failed to adequately protect all of our critical infrastructure.

The Problem

Providing resilient cybersecurity isn’t an inherently intractable task—for those who have the necessary skills and resources.

Individual organisations can and do make significant improvements in their cybersecurity posture when they’re motivated to prioritise security and invest the resources required, but when cybersecurity is viewed as an economy-wide challenge, there are significant sectors of the economy that do not, and probably never will, have the ability to successfully defend themselves.

Unfortunately, the motivation, capability and resources to provide robust cybersecurity are not aligned within the Australian internet ecosystem. Currently, too few businesses in Australia are motivated and capable of providing for their own security.

These are businesses that understand the risk to their operations that arise from failing to address security. Their business model demands that this risk be addressed, and, accordingly, they’ll pay to mitigate it. Some parts of the Australian business community could provide for their own cybersecurity but don’t give the task sufficient priority. Government should employ strategies that encourage them to invest in their own security. However, the bulk of Australian people and businesses fall into a third category: they would like to defend themselves online but don’t have the expertise or the resources to do so.

Large parts of the Australian economy and community can’t protect themselves online because they don’t have the skills or resources to do so.

Criminals, meanwhile, are agnostic about their targets and will attack whoever it is profitable to attack. As weaknesses in security in one area of the economy get shored up, other avenues are explored. If the top end of town is too tough, criminals will ransack those with relatively poor security—individuals and small and medium-sized enterprises.

They also take a ‘belt and braces’ approach to extracting money from their victims. In the May 2020 Toll Group ransomware attack, for example, the criminals first attempted to extract money with ‘traditional’ ransomware—encrypting IT systems to disrupt operations. When Toll refused to pay the ransom, the criminals changed to the exact opposite tactic and threatened to publicly release corporate data unless they were paid.11

Given that malicious actors seek out weakness and vulnerability wherever it exists in the economy, and that some parts of the economy will never have the sophistication and ability to protect themselves, we need to develop initiatives that provide ‘default security’ and bring resources and skills to those who don’t have them—who are generally small and medium-sized enterprises and consumers.

There are already initiatives that bring default security to groups that don’t have the skills or resources to protect themselves. 

They occur at different ‘layers’ of the architecture of the internet: at the hardware level, in operating systems, in some of the services that underpin the operation of the internet, and in the software applications that people use to access the internet (see Table 1).

Table 1: Current default security protections occur at different layers

At the most fundamental level, chip manufacturers have invested in the development of more secure computing architectures.12

Building upon those hardware improvements, operating system manufacturers have also baked default security into their products. This includes features such as automatic updates that make it easier to patch vulnerabilities, built-in anti-malware features such as Windows Defender and architectural features that make it more difficult for hackers to seize control, such as address space layout randomisation and data execution prevention.13

At the internet services layer, a number of Domain Name System (DNS; the system that converts human-readable internet addresses into internet protocol addresses) providers also include default security protection: Quad9, OpenDNS,14 Comodo Secure DNS15 and CleanBrowsing,16 among others. For example, Quad9 states in its FAQ that it ‘uses threat intelligence from a variety of public and private sources and blocks access to those malicious domains when your system attempts to contact them’.17

Google’s Safebrowsing18 and Microsoft’s SmartScreen,19 for example, are web-scanning, anti-phishing and anti-malware systems built into their respective browsers and operating systems to prevent users from visiting potentially dangerous web pages. As users browse the web, the pages they visit are compared to a list of ‘known-bad sites’ that have been confirmed to be hosting phishing or malware. If a user tries to visit one of those sites, instead of taking them directly there the user is shown a warning. These protections are imperfect, as the user can ignore the warning and click through to the site, and criminals and hackers are constantly trying new techniques to evade them, but they have very broad reach. Safebrowsing is used in Google’s Chrome, Mozilla’s Firefox and Apple’s Safari browsers, and together with SmartScreen in Microsoft Edge these systems protect billions of users by default. Google’s Transparency report statistics show that the SmartBrowsing system issued in the order of 5–10 million warnings per week so far this year up to late May 2020.20

These security improvements have occurred at different ‘layers’ of the internet—in browsers, in operating systems and in the underlying plumbing of the internet. They are also ‘high-leverage’ initiatives, in that these investments can improve security for millions to billions of internet users.

There have been improvements in default security in some aspects of online security over the past two decades, but there’s still a very long tail of vulnerability that we must cope with for the foreseeable future. Additionally, other developments threaten to undermine those improvements. The proliferation of the ‘internet of things’ (IoT)—internet-connected but poorly secured and increasingly ubiquitous consumer devices—threatens to introduce a large vector of insecurity that could drastically affect overall cybersecurity.21

Given the success of previous default-security initiatives, what other initiatives could have a widespread positive impact on the cybersecurity of millions of users?

Clean Pipes

One proposal that could help provide advanced capabilities to internet users is that ISPs be required or encouraged to perform ‘due diligence’ to protect their users from malicious traffic. This concept has been called ‘Clean Pipes’, drawing an analogy to water utilities providing clean drinking water.

Clean Pipes could involve ISPs using a variety of technologies to provide default security to their clients. At the conceptual level, this would involve:

  1. positively identifying threats, which could be, for example
    • internet locations that host malware or phishing
    • malware command and control
    • bogus traffic that can be used in attacks that try to overwhelm a service
    • ‘spoofed’ traffic that claims to originate from somewhere it doesn’t
  2. having some capability to proactively protect from different threats, such as
    • blocking and warning users who are attempting to navigate to dangerous locations, such as ones that host malware or phishing
    • removing bogus or spoofed traffic
  3. being able to adjust this blacklist dynamically and alter it through customer feedback if a location is inadvertently blacklisted.

These kinds of capabilities are already deployed around the world, in corporate networks, by British Telecom22 and recently by Telstra.

The Advantages

The key advantage of Clean Pipes is that it brings advanced scalable protection to an ISP’s entire customer base, which is particularly important to that majority of customers who don’t have the skills and resources to provide for their own security.

It’s also highly leveraged—although in a well-organised protection system the entire workforce involved in identifying malicious internet sites may be thousands of people, the knowledge they generate can be used to provide protection to potentially millions of ISP customers.

There are other advantages. ISPs also have a unique position in the network and are able to see all of the internet protocols that are being used, not just the very few that are used in web browsing. This means that ISPs can see different indicators of malicious behaviour than can, say, operating systems manufacturers, browser manufacturers, DNS providers, or even the anti-malware systems that work on individual computers. Each of these different vantage points into the internet has a different view and can be used to detect or even interrupt different kinds of activity. Browser-based protection, for example, can warn users of malicious websites but can do nothing to stop malware command and control once a computer is compromised.

Not only do ISPs get different views, they also get to act on those other protocols, blocking or redirecting them if need be. This is already standard practice where ISPs need to protect their networks from activity that could degrade or disrupt the network23 or where there’s already an established mechanism to block illegal content.24 ISPs could protect users from threats that can’t be tackled by the other default security providers previously mentioned.

There’s no legal impediment to ISPs providing some level of protection to their customers (excepting techniques that would be privacy-invading). Telstra has already implemented some customer protection under a Cleaner Pipes initiative and has blocked the ‘command and control communications of botnets and malware and [stopped] the downloading of remote access trojans, backdoors and banking trojans’.25 These initiatives can be written into terms-of-service contracts, although perhaps an ideal position would be to provide users with the ability to opt out if they don’t want default protection. For example, Google Safebrowsing and Microsoft SmartScreen both provide warnings that users are still able to navigate past.

ISPs already operate security operations centres and have security teams to protect their own networks’ integrity, so there are already skills and expertise resident within their organisations, although skill levels can vary significantly between ISPs. Providing default security to customers may require additional investment in resources, but it requires that an existing capability be grown rather than a new one created from scratch.

Additionally, ISP-level protections could be particularly useful in mitigating the risk from poorly secured IoT devices. Those devices can’t take advantage of some of the other default security advances that have taken place over recent years, such as improvements in browsers or operating systems, but they still communicate over the internet and do so in relatively standard ways, such that anomalous behaviour can be detected and at least some malicious behaviour blocked. That is, ISPs providing Clean Pipes could help mitigate one of our potential looming security threats.

Although ISPs providing default security protection has many benefits and could significantly reduce the damage caused by malicious traffic, it isn’t a panacea for all the ills of the internet. As with protections built into operating systems and browsers, malware, phishing and other threats will break through and cause harm to internet users.

ISP-level concerns and blockers

In Australia, ISPs, other than Telstra, don’t provide extensive default security protections to their customers. There are several reasons for this that fall into four categories:

  1. costs and ISP security expectations
  2. capability to detect and act
  3. understanding harms
  4. reputational risk.

Costs and security expectations

Possibly the underlying reason that most ISPs don’t invest significantly in Clean Pipes is that enhanced security costs more money and neither customers nor ISPs expect that an ISP should provide increased levels of default security.

Related to this, ISPs don’t believe that their customers value a more secure service, so there’s no potential profit available to justify a business case to provide these security services; therefore, no resources are allocated.

Additionally, there’s been no legal or regulatory obligation that has pushed ISPs to provide enhanced default security services.

Capability to detect and act

All ISPs have some level of security capability, which they need to protect their own networks. However, providing increased levels of default security to customers requires more extensive and more advanced capability to both detect malign behaviour and to act on it.

All ISP security operations must prioritise self-protection and they might not have additional capacity to detect malicious activity that doesn’t directly threaten their own operations. Without a clear view of malicious activity that affects their customers (or even third parties), ISPs are unable to act on it.

Any individual ISP would be able to identify some threats on its network, but a collaboration with multiple partners provides a more comprehensive and effective picture of both the threats and effective mitigations. Holistically understanding threats requires collaboration with multiple partners in the security ecosystem, including providers of threat intelligence, other industry verticals and competitor ISPs. Each organisation provides a different slice of the view so that the overall picture is far more complete than any individual organisation can develop on its own.

This industry collaboration would require two separate forms of trust:

  • Competitors would have to trust that companies within the same industry would not seek to gain competitive advantage through security collaboration. This is relatively straightforward within the information security community, as competitive advantage is seen to lie outside security, and effective security is generally perceived as a precondition for competition rather than as a basis for it.26
  • Companies need to trust the technical competence of collaborators. This is currently based on reputation and past performance, and there’s no formal process for technical trust to be built or certified.

The two forms of trust affect both the ability and willingness to share reliable information and to act effectively on information received. Discussions with stakeholders have indicated that significant skill and capacity differences exist between the security operations within different ISPs, and that those differences may make it difficult to engage in effective widespread information sharing across Australian ISPs.

Beyond merely detecting malicious activity, ISPs also need to have the ability to act on it. Acting on malicious behaviour requires additional financial investment beyond detecting it, so, even if ISPs see damaging activity, they may have decided that the costs of implementing default security for customers are simply too high. At the ISP level, most customers don’t pay extra for security services, so investment in providing improved security might not be seen as an economically viable return on investment.

Understanding harms

Beyond merely detecting malicious activity is understanding the harm that it causes. What malicious activity that ISPs see on their networks causes the most harm to customers? For activity that damages their own networks, that harm is easy for ISPs to understand, but quantifying damage caused to customers is very difficult.

Understanding the harms to customers could be improved by information sharing about the costs of cybercrime from government mechanisms such as ReportCyber, from NGOs such as IDCARE,27 or even from other industry verticals that collate information about the most damaging cybercrimes affecting their customer bases.

Some ISPs, particularly smaller ones, might not be able to detect malicious activity and don’t understand the harms it causes their customers. In such cases, ignorance is bliss—once an ISP sees malicious activity and understands that it causes harm to its customers, it faces its own version of the ‘trolley problem’. Do they intervene to protect their customers from dangerous activity on the internet, even though that may come at some financial cost?

Reputational risk

ISPs could also be concerned about the reputational risks involved in attempting to provide default security.

A key reputational concern is that ISPs may inadvertently block legitimate traffic. Although terms and conditions can mitigate legal concerns, ISPs still have to strike a balance between providing enhanced security and the risk that false positives will affect service quality. Importantly, there are harms to customers that occur when ISPs accidentally block non-malicious traffic and when ISPs allow customers to be harmed by malicious traffic. An ideal balance would minimise both harms while preserving online freedom, but this balance is inconsistently applied across different ISPs and is therefore probably suboptimal.

ISPs may also be concerned about the perception that default security requires them to compromise customer privacy. Certainly, government internet initiatives have focused on law enforcement and intelligence requirements, and Australia’s metadata retention laws28 and the Assistance and Access Act 201829 have been controversial.30 Telstra’s recent announcement regarding Cleaner Pipes, however, hasn’t so far been the subject of any significant level of controversy about privacy. In any case, whether through lack of obligation, understanding, capability or a business case, there’s no broad-based, ISP-led effort to provide default security to Australian internet users.

Government challenges

The challenges facing government mirror those facing ISPs.

The Australian Government hasn’t tried to lead a broader effort to provide default security to Australian internet users through a Clean Pipes initiative involving ISPs. In some sense, it hasn’t accepted that leading this kind of initiative is its job. In the absence of an industry consensus that ISPs should be providing some level of default security, the absence of government leadership or direction probably means that this status quo will continue.

A significant concern may be the controversies over privacy, censorship and surveillance that have accompanied previous internet initiatives, such as an internet filter proposed in 201231 and the previously mentioned metadata retention legislation and Access and Assistance Act. Those former initiatives have been focused on supporting law enforcement or preventing access to harmful content, rather than on providing secure internet access to consumers.

Concerns about privacy, censorship and surveillance could be mitigated by government initiatives having:

  1. a clear focus on threat filtering, with a clear and explicit goal of protecting internet users
  2. government leadership that doesn’t necessarily include government implementation
  3. actions focusing exclusively on cybersecurity threats rather than falling into mission creep and including other online harms (such as child exploitation) that are being tackled through other avenues (such as the e-Safety Commissioner)32
  4. transparency about how default security provisions are enacted and what they achieve
  5. a default system with an opt-out for those who don’t want to participate.

The cost of cybercrime isn’t well understood, and that makes it difficult to appropriately allocate resources. One of the most quoted estimates for cybercrime (a Microsoft-commissioned report from Frost and Sullivan) estimated in 2018 that cybercrime could cost Australia $29 billion per year,33 whereas a 2019 ACSC report estimated $328 million in annual losses.34

The ACSC report was based mostly on incidents self-reported to the ReportCyber platform and so is likely to be an underestimate of the cost, but the 100-fold difference between the estimated and measured values shows that the level of uncertainty is high. More comprehensive data would be helpful, and a granular understanding of the cyber threats that are causing the most harm would provide an economic justification for security investments that would be required to mitigate that harm.

Conclusion

This paper has documented some of the arguments for Clean Pipes initiatives in which ISPs deploy their security capabilities to provide default cybersecurity for their customers, and the potential difficulties in implementing such initiatives.

Large portions of the Australian economy and community aren’t capable of effectively providing for their own cybersecurity, and there are significant opportunities for wide-ranging and effective improvements in the security environment for all internet users.

Those approaches would be additional to other broad-based security improvements that have occurred in recent years and could go some way to mitigating the threat from the proliferation of poorly secured IoT devices.

Road Map

Currently, these opportunities aren’t being taken up because the Australian Government has yet to set a clear policy direction and because industry doesn’t see this as a business obligation. Recently announced government funding, including over $35 million to develop a ‘new cyber threat-sharing platform’ and over $12 million towards ‘strategic mitigations and active disruption options’ is an opportunity to change this status quo.35

The Australian Government should:

  • clearly articulate its position on ISPs providing default security services in its 2020 Cyber Security Strategy (Home Affairs)
  • raise the baseline of ISP security operational expertise by facilitating technical workshops (funding is available to support technical tools, but skilled cybersecurity personnel are also needed to both provide validated information and to make effective use of threat information) (ACSC)
  • investigate providing incentives to ISPs to implement improved default security (this could include technical training to improve capacity, funding for new capabilities, or even regulation or legislation to encourage adoption) (Home Affairs)
  • convene closed-door consultations with ISPs to discuss how the government could support and encourage the delivery of default security to customers (Home Affairs)
  • require transparency reports in which ISPs report on their efforts to provide safe and secure networks (Australian Communications and Media Authority)
  • more comprehensively quantify the cost of cybercrime in Australia through surveys and by engaging directly with Australian industry (Home Affairs).

ISPs should:

  • work with government to centralise and expand upon existing industry-wide efforts in collaboration, intelligence sharing and coordinated action. 

Australian industry, beyond ISPs, should:

  • increase the sharing of technical indicators of compromises that are affecting its customers (a government-supported centralised clearing house for information would support this)
  • measure the cost of cybercrime and share information, within intelligence-sharing bodies, about the most damaging cybercrime techniques
  • factor in consideration of the cost and risk of failing to manage security issues in supplying their services.

Acknowledgements

ASPI’s International Cyber Policy Center receives funding from a variety of sources including sponsorship, research and project support from across governments, industry and civil society. There is no sole funding source for this paper.

What is ASPI?

The Australian Strategic Policy Institute was formed in 2001 as an independent, non-partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI’s sources of funding are identified in our Annual Report and in the acknowledgements section of individual publications. ASPI remains independent in the content of the research and in all editorial judgements

ASPI International Cyber Policy Centre

ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy. The ICPC informs public debate and supports sound public policy by producing original empirical research, bringing together researchers with diverse expertise, often working together in teams. To develop capability in Australia and our region, the ICPC has a capacity building team that conducts workshops, training programs and large-scale exercises both in Australia and overseas for both the public and private sectors. The ICPC enriches the national debate on cyber and strategic policy by running an international visits program that brings leading experts to Australia.

Important disclaimer

This publication is designed to provide accurate and authoritative information in relation to the subject matter covered. It is provided with the understanding that the publisher is not engaged in rendering any form of professional or other advice or services. No person should rely on the contents of this publication without first obtaining advice from a qualified professional.

© The Australian Strategic Policy Institute Limited 2020

This publication is subject to copyright. Except as permitted under the Copyright Act 1968, no part of it may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Enquiries should be addressed to the publishers. Notwithstanding the above, educational institutions (including schools, independent colleges, universities and TAFEs) are granted permission to make copies of copyrighted works strictly for educational purposes without explicit permission from ASPI and free of charge.

First published July 2020.
ISSN 2209-9689 (online),
ISSN 2209-9670 (print)

Funding Statement

There is no sole funding source for this paper.

  1. Scott Morrison, ‘Nation’s largest ever investment in cyber security’, media release, 30 June 2020, online. ↩︎
  2. Department of Home Affairs (DHA), Australia’s Cyber Security Strategy, Australian Government, May 2016, online. ↩︎
  3. The underlying cause of these attacks is not public, so it isn’t possible to say whether ISPs providing Clean Pipes would have prevented them. ↩︎
  4. Ry Crozier, ‘Toll Group “returns to normal” after Mailto ransomware attack’, iTnews, 18 March 2020, online; Ry Crozier, ‘Toll Group suffers second ransomware attack this year’, iTnews, 5 May 2020, online. ↩︎
  5. Ry Crozier, ‘BlueScope confirms a “cyber incident” is disrupting its operations’, iTnews, 15 May 2020, online. ↩︎
  6. Bension Siebert, Shuba Krishnan, ‘MyBudget blames hack for outage affecting thousands of customers’, ABC News, 15 May 2020, online. ↩︎
  7. Ben Grubb, ‘Drinks giant Lion hit by cyber attack as hackers target corporate Australia’, Sydney Morning Herald, 9 June 2020, online. ↩︎
  8. Swetha Das, ‘Direct costs associated with cybersecurity incidents costs Australian businesses $29 billion per annum’, Microsoft News Centre Australia, 26 June 2018, online. ↩︎
  9. Interpol, ‘Cybercriminals targeting critical healthcare institutions with ransomware’, news release, 4 April 2020, online; ‘CyberPeace Institute—call for government’, CyberPeace Institute, 26 May 2020, online. ↩︎
  10. Michael Pompeo, ‘The United States concerned by threat of cyber attack against the Czech Republic’s healthcare sector’, press statement, US Department of State, 17 April 2020, online; Department of Foreign Affairs and Trade, Australian Cyber Security Centre (ACSC), ‘Unacceptable malicious cyber activity’, news release, Australian Government, 20 May 2020, online. ↩︎
  11. Toll Group, ‘Toll IT systems update’, 29 May 2020, online. ↩︎
  12. For example, investment in trusted platform modules, Apple’s Secure Enclave in iOS devices. ↩︎
  13. Microsoft, ‘The most secure Windows ever’, no date, online. ↩︎
  14. OpenDNS, ‘Why users love OpenDNS’, 2020, online. ↩︎
  15. Comodo Cybersecurity, ‘Secure internet gateway’, 2020, online. ↩︎
  16. CleanBrowsing, ‘Browse the web without surprises’, no date, online. ↩︎
  17. Interestingly, when customers use these optional DNS services their ISP loses visibility and can no longer detect malware and assist them; ‘FAQ: DNS need to know info’, Quad 9, 2019, online. ↩︎
  18. Google, ‘Google safe browsing’, 2019, online. ↩︎
  19. Microsoft, ‘Microsoft Defender SmartScreen’, 27 November 2019, online. ↩︎
  20. Google, ‘Google safe browsing’, 2019, online. ↩︎
  21. Eliza Chapman, Tom Uren, The Internet of Insecure Things, ASPI, Canberra, 19 March 2018, online. ↩︎
  22. Dave Harcourt, ‘BT’s proactive protection: supporting the NCSC to make our customers safer’, National Cyber Security Centre, UK Government, 25 October 2018, online. ↩︎
  23. Such as, for example distributed denial of service (DDoS) attacks that attempt to overwhelm networks or websites. ↩︎
  24. For example, Interpol’s ‘Worst of’ provides a list of domains carrying child abuse material; Interpol, ‘Blocking and categorizing content’, 2020, online. ↩︎
  25. Andrew Penn, ‘Safer online and the new normal’, Telstra Exchange, 6 May 2020, online. ↩︎
  26. Even within the cybersecurity industry competitors collaborate, and the Cyber Threat Alliance serves as a model for competitors sharing information about threats. There are also many effective information-sharing initiatives overseas and in Australia (for example, see ‘Member ISACs’, National Council of Information Sharing and Analysis Centers, 2020, online). ↩︎
  27. ‘National identity and cyber support’, IDCARE, 2020, online; ACSC, ‘ReportCyber’, Australian Signals Directorate, Australian Government, 2020, online. ↩︎
  28. DHA, ‘Data retention’, Australian Government, March 2020, online. ↩︎
  29. DHA, ‘The Assistance and Access Act 2018’, Australian Government, September 2019, online. ↩︎
  30. For example, see Elise Scott, ‘Senate passes controversial metadata laws’, Sydney Morning Herald, 27 March 2015, online; Damien Manuel, ‘Think your metadata is only visible to national security agencies? Think again’, The Conversation, 5 August 2019, online; Stilgherrian, ‘Home Affairs report reveals deeper problems with Australia’s encryption laws’, ZDNet, 29 January 2020, online. ↩︎
  31. Ry Crozier, ‘Conroy abandons mandatory ISP filtering’, iTnews, 8 November 2012, online. ↩︎
  32. There are already mechanisms to block objectionable material, such as the Sharing of Abhorrent and Violent Material Act 2019, and those mechanisms should remain separate from security provisions. See Attorney-General’s Department, ‘Abhorrent violent material’, Australian Government, no date, online. ↩︎
  33. Frost and Sullivan, Understanding the Cybersecurity Threat Landscape in Asia Pacific: Securing the Modern Enterprise in a Digital World, 2018. ↩︎
  34. ACSC, Cybercrime in Australia—July to September 2019, Australian Signals Directorate, Australian Government, 2019, online. ↩︎
  35. Morrison, ‘Nation’s largest ever investment in cyber security’. ↩︎

Mapping more of China’s tech giants: AI and surveillance

This second report accompanies the Mapping China’s Technology Giants website.

Several report are now available on this topic;

Executive summary

ASPI’s International Cyber Policy Centre has updated the public database that maps the global expansion of key Chinese technology companies. This update adds a further 11 companies and organisations: iFlytek, Megvii, ByteDance (which owns TikTok), SenseTime, YITU, CloudWalk, DJI, Meiya Pico, Dahua, Uniview and BeiDou.

Our public database now maps 23 companies and organisations and is visualised through our interactive website, Mapping China’s Technology Giants. The website seeks to give policymakers, academics, journalists, government officials and other interested readers a more holistic picture of the increasingly global reach of China’s tech giants. The response to phase 1 of this project—it quickly became one of ASPI’s most read products—suggests that the current lack of transparency about some of these companies’ operations and governance arrangements has created a gap this database is helping to fill.

This update adds companies working mainly in the artificial intelligence (AI) and surveillance tech sectors. SenseTime, for example, is one of the world’s most valuable AI start-ups. iFlytek is a partially state-owned speech recognition company. Meiya Pico is a digital forensics and security company that created media headlines in 2019 because of its monitoring mobile app MFSocket.1 In addition, we’ve added DJI, which specialises in drone technologies, and BeiDou, which isn’t a company but the Chinese Government’s satellite navigation system.

We also added ByteDance—an internet technology company perhaps best known internationally for its video app, TikTok, which is popular with teenagers around the world. TikTok is also attracting public and media scrutiny in the US over national security implications, the use of US citizens’ data and allegations of censorship, including shadow banning (the down-ranking of particular topics via the app’s algorithm so users don’t see certain topics in their feed).

Company overviews now include a summary of their activities in Xinjiang.2 For some companies, including ByteDance and Huawei, we are including evidence of their work in Xinjiang that has not being reported publicly before. For most of these companies, the surveillance technologies and techniques being rolled out abroad—often funded by loans from the Export–Import Bank of China (China Eximbank)3—have long been used on Chinese citizens, and especially on the Uyghur and other minority populations in Xinjiang, where an estimated 1.5 million people are being arbitrarily held in detention centres.4 Some of these companies have actively and repeatedly obscured their work in Xinjiang, including in hearings with foreign parliamentary committees. This project now includes evidence and analysis of those activities in order to foster greater transparency about their engagement in human rights abuses or ethically questionable activities in the same way Western firms are held to account by Western media and civil society actors, as they should be.

In this report, we include a number of case studies in which we delve deeper into parts of the dataset. This includes case studies on TikTok as a vector for censorship and surveillance, BeiDou’s satellite and space race and CloudWalk’s various AI, biometric data and facial recognition partnerships with the Zimbabwean Government. We also include a case study on Meiya Pico’s work with China’s Public Security Ministry on Belt and Road Initiative (BRI) aid projects in Southeast Asia and Central Asia.

Those projects include the construction of digital forensics labs and cyber capacity training, including for police forces across Asia.

We have also investigated the role that foreign investment plays in the global expansion of some of these companies, particularly in China’s surveillance and public security sector.
 

The updated database

Our public database now maps out 23 companies and organisations. On the Mapping China’s Technology Giants website you’ll find a dataset that geo-codes and analyses major points of overseas presence, including 5G relationships; ‘smart cities’ and ‘public security’ solutions; surveillance relationships; research and university partnerships; submarine cables; terrestrial cables; significant telecommunications and ICT projects; and foreign investment. The website does not map out products and services, such as equipment sales.

Previously, in April 2019, we mapped companies working across the internet, telecommunications and biotech sectors, including Huawei, Tencent, Alibaba, Baidu, Hikvision, China Electronics Technology Group (CETC), ZTE, China Mobile, China Telecom, China Unicom, Wuxi AppTec Group and BGI. This dataset has also been updated, and new data points have been added for those companies, including on 5G relationships, smart cities, R&D labs and data centres.

At the time of release this updated research project now maps and tracks: 

  • 26,000+ data points that have helped to geo-locate 2,500+ points of overseas presence for the 23 companies
  • 447 university and research partnerships, including 195+ Huawei Seeds for the Future university partnerships
  • 115 smart city or public security solution projects, most of which are in Europe, South America and Africa
  • 88 5G relationships in 45 countries
  • 295 surveillance relationships in 96 countries
  • 145 R&D labs, the greatest concentration of which is in Europe
  • 63 undersea cables, 20 leased cables and 49 terrestrial cables
  • 208 data centres and 342 telecommunications and ICT projects spread across the world.

Other updates have also been made to the website, often in response to valuable feedback from policymakers, researchers and journalists. Updates have been made to the following:

  • The landing ‘splash page’5
  • How to use this tool6
  • Glossary.7

Terrestrial cables have now been added and can be searched through the filter bar (via ‘Overseas presence’)

The original report that accompanied the launch of the project was translated into Mandarin in August 2019.

In addition to this dataset, each company has its own web page, which includes an overview of the company and a summary of its activities with the Chinese party-state. The overviews now include a summary of each company’s activities in Xinjiang. This research was added for a number of reasons.

First, we needed to compile the information in one place for journalists, civil society groups and governments. Second, these companies aren’t held to account by China’s media and civil society groups, and it’s clear that many have obscured their activities in Xinjiang. Some have even provided incorrect information in response to direct questions from foreign governments. For example, a Huawei executive told the UK House of Commons Science and Technology Committee on 10 June 2019 that Huawei’s activities in Xinjiang occurred only via ‘third parties:’8

Chair Sir Norman Lamb: But do you have products and services in Xinjiang Province in terms of some sort of contractual relationship with the provincial government?

Huawei Executive: Our contracts are with the third parties. It is not something we do directly.

That’s not correct. Huawei works directly with the Chinese Government’s Public Security Bureau in Xinjiang on a range of projects. Evidence for this—and similar—work can now be found via each company’s dedicated Mapping China’s Technology Giants web page and is also analysed below.

Methodology

ASPI’s International Cyber Policy Centre began this research project due to a lack of publicly available quantitative and qualitative data, especially in English, on the overseas activities of these key technology companies. Some of the companies disclose little in the way of policies that affect data, security, privacy, freedom of expression and censorship. What information is available is spread across a wide range of sources and hasn’t been compiled in one location. In-depth analysis of the available sources also requires Chinese-language capabilities and an understanding of other issues, such as the relationships the companies have with the state and how Chinese state financing structures work.

For example, some of the companies, especially Huawei, conduct a lot of their work in developing countries through China Eximbank loans. Importantly, the use of internet and other archiving services is vital, as Chinese web pages are often moved, altered or deleted.

This research relied on open-source data collection that took place primarily in English and Chinese. Data sources included company websites, corporate information, tenders, media reporting, databases and other public sources.

The following companies—which work across the telecommunications, technology, internet, surveillance, AI and biotech sectors—are now present on the Mapping China’s Technology Giants website (new additions are bold):

  • Alibaba
  • Baidu
  • BeiDou
  • BGI
  • ByteDance
  • China Electronics Technology Group (CETC)
  • China Mobile
  • China Telecom
  • China Unicom
  • CloudWalk
  • Dahua
  • DJI
  • Hikvision (a subsidiary of CETC)
  • Huawei
  • iFlytek
  • Megvii
  • Meiya Pico
  • SenseTime
  • Tencent
  • Uniview
  • WuXi AppTec Group
  • YITU
  • ZTE.

The size and complexity of these companies, and the speed at which they’re expanding, mean that this dataset will inevitably be incomplete. For that reason, we encourage researchers, journalists, experts and members of the public to continue to contribute and submit data via the online platform in order to help make the dataset more complete over time.

For tips on how to get the most out of the map, navigate to ‘How to use this tool’ on the website. When you’re first presented with the map, all data points are displayed. Click the coloured icons and cables for more information. To navigate to the list of companies, click ‘View companies’ in the left blue panel.

There’s a filter bar at the bottom of the screen. Click the items to select. To reset your search selection, click ‘Reset’ in the filter bar.

The yellow triangle icons on the map are data points of particular interest in which we invested additional research resources.
 

These companies differ in their size, scope and global presence

They may not be household names in the West, but the market size of many of the Chinese companies outlined in this report is larger than many of their more well-known counterparts outside China. iFlytek, a voice recognition tech company established in 1999, isn’t yet a household name outside China but has 70% of the Chinese voice recognition market and a market capitalisation of Ұ63 billion (US$9.2 billion). Newcomer ByteDance, an internet technology company with a focus on machine-learning-enabled content platforms, was established only in 2012 but is already valued at around US$78 billion, making it the world’s most valuable start-up.

Many of the companies outlined in this report have skyrocketed in value by capitalising on China’s surge in security spending in Xinjiang and elsewhere as a large, sprawling surveillance apparatus is constructed. Some have been, in effect, conscripted into spearheading the development of AI in the country—a goal of particular strategic importance to the party-state.

Other companies we examine in this report, such as Dahua Technology, Megvii and Uniview, aren’t well known but have significant global footprints. Dahua, for example, is one of the world’s largest security camera manufacturers. Between them Hikvision9 and Dahua supply around one-third of the global market for security cameras and related goods, such as digital video recorders.10

All Chinese tech companies have deep ties to the Chinese state security apparatus, but, perhaps more than the others, the companies in this report occupy a space in which the lines between the commercial imperatives of private companies (and some state-backed companies) and the strategic imperatives of the party-state are blurred.

Several of the companies we examine—including iFlytek, SenseTime, Megvii and Yitu—have been designated as official ‘AI Champions’ by the party-state, alongside Huawei, Hikvision and the ‘BATs’ (Baidu,11 Alibaba12 and Tencent;13) which were featured in our previous report. These ‘champions’, having been identified as possessing “core technologies”, have been selected to spearhead AI development in the country, with the aim of overtaking the US in AI by 2030.14

Gregory C Allen, writing for the Center for a New American Security, cited SenseTime executives as saying the title:

… gave the companies privileged positions for national technical standards-setting and also was intended to give the companies confidence that they would not be threatened with competition from state-owned enterprises.15

Speaking in December 2018, SenseTime co-founder Xu Bing alluded to the uniqueness of this privileged position:

We are very lucky to be a private company working at a technology that will be critical for the next two decades. Historically, governments would dominate nuclear, rocket, and comparable technologies and not trust private companies.16

Historically, the party-state drew on the power of a few state-owned enterprises to help it achieve its strategic goals. But in order to become a world leader in AI by 2025—an express aim of the Chinese Communist Party (CCP)— the People’s Republic of China (PRC) has demonstrated its ability to move away from those cumbersome organisations in favour of smaller, more agile companies not wholly owned by the state. This has proven to be a highly successful—and mutually beneficial—model.

Chinese AI and surveillance companies benefit from a highly favourable regulatory environment in which concerns over the potential use of invasive systems of surveillance to erode civil liberties are largely and substantively ignored by design, although they’re sometimes discussed in the Chinese media.17

Companies that we examine in this report, such as YITU, CloudWalk, iFlytek and SenseTime, have access to enormous customer databases that are generating huge amounts of proprietary data—the essential ingredient for improving AI and machine-learning algorithms.

AI giant SenseTime has access to a database of more than 2 billion images, at least some of which, SenseTime CEO Xu Li told Quartz,18 come from various government agencies, giving the company a distinct advantage over its foreign competitors.

The global expansion of these companies—from research partnerships with foreign universities through to the development of operational ‘smart city’ or ‘public security’ projects—raises important questions about the geostrategic, political and human rights implications of their work.

Users of the website will now find more than 26,000 datapoints that have helped to geo-locate 2,500+ points of overseas presence for the 23 companies and organisations. But it’s important to note that the presence of the companies’ products in overseas markets is far larger than the map can indicate.

Many of the companies’ relationships are business to business, and their products are integrated as part of other companies’ solutions. For example, iFlytek’s speech recognition software is used in the voice assistant in Huawei smartphones, and YITU provides its facial recognition and traffic monitoring software to Huawei’s smart cities solutions. So, while Huawei’s smart city solutions are mapped, the companies that provide certain technologies and component parts for smart cities can’t always be captured.

This illustrates a complex problem associated with data and privacy protection in ‘internet of things’ devices that is tackled in Dr Samantha Hoffman’s ASPI report Engineering global consent: the Chinese Communist Party’s data-driven power expansion.19 Companies can claim that they don’t misuse the data that their products collect, but those claims don’t always take into account how component-part manufacturers whose technologies are integrated into smart cities and public security services, for example, collect and use citizens’ data.

TikTok as a vector for censorship and surveillance

Unlike China’s first generation of social media tech giants, which stumbled in their international expansion,20 second-generation start-ups such as ByteDance are proving to be much more sure-footed. TikTok, a short-video app, is the company’s most successful foreign export, having grown a global audience of more than 700 million in just a few years.21 ByteDance achieved that meteoric growth, ironically enough, by ploughing US$1 billion into ads on the social platforms of its Western rivals Facebook, Facebook-owned Instagram and Snapchat.22

The app has managed to maintain its ‘stickiness’ for users—mostly teens—by virtue of the AI-powered advanced algorithm undergirding it. The remarkable success of the app enabled ByteDance to become the world’s most valuable start-up in October 2018 after it secured a US$3 billion investment round that gave it a jaw-dropping valuation of US$75 billion.23

TikTok has already attracted the ire of regulators around the world, including in Indonesia, India, the UK and the US, where the company made a $US5.7 million settlement with the Federal Trade Commission for violating the Children’s Online Privacy Protection Act.

But beyond the expected regulatory missteps of a fast-growing social media platform, ByteDance is uniquely susceptible to other problems that come with its closeness to the censorship and surveillance apparatus of the CCP-led state. Beijing has demonstrated a propensity for controlling and shaping overseas Chinese-language media. The meteoric growth of TikTok now puts the CCP in a position where it can attempt to do the same on a largely non-Chinese speaking platform—with the help of an advanced AI-powered algorithm.

In September 2019, The Guardian revealed clear evidence of how ByteDance has been advancing Chinese foreign policy aims abroad through the app via censorship. The newspaper reported on leaked guidelines from TikTok laying out the company’s approach to content moderation.

The documents showed that TikTok moderators were instructed to ‘censor videos that mention Tiananmen Square, Tibetan independence, or the banned religious group Falun Gong.’24

Unlike Western social media platforms, which have traditionally taken a conservative approach to content moderation and tended to favour as much free speech as possible, TikTok has been heavy-handed, projecting Beijing’s political neuroses onto the politics of other countries. In the guidelines, as described by The Guardian, the app banned ‘criticism/attack towards policies, social rules of any country, such as constitutional monarchy, monarchy, parliamentary system, separation of powers, socialism system, etc.’ Many historical events in foreign countries were also swept up in the scope of the guidelines. In addition to a ban on mentioning the Tiananmen Square massacre in 1989, the May 1998 riots in Indonesia and the genocide in Cambodia were also deemed verboten.

TikTok has even barred criticism of Turkish President Recep Tayyip Erdogan, as well as depictions of ‘non-Islamic gods’ and images of alcohol consumption and same-sex relationships—neither of which is in fact illegal in Turkey. Also prohibited is criticism of a list of ‘foreign leaders or sensitive figures’, including the past and present leaders of North Korea, US President Donald Trump, former South Korean President Park Geun-hye and Russian President Vladimir Putin. 

Despite this heavy-handed approach, a number of bad actors have been able to use the app to promote their agendas. On 23 October 2019, the Wall Street Journal reported that Islamic State has been using the app to share propaganda videos and has even uploaded clips of beheadings of prisoners.25 Motherboard also uncovered violent white supremacy and Nazism on the app in late 2018.26

ByteDance confirmed The Guardian’s report and the authenticity of the leaked content-moderation guidelines but said the guidelines were outdated and that it had updated its moderation policies.

Unconvinced, senior US lawmakers went on to request an investigation into TikTok on national security grounds.

In late October 2019, US Senator Marco Rubio appealed to Treasury Secretary Steven Mnuchin to launch an investigation by the Committee on Foreign Investment in the US into TikTok’s acquisition of US video-sharing platform Musical.ly,27 citing reports of censorship on the app, including a 15 September Washington Post article that provided evidence of TikTok’s censorship of reports on the Hong Kong protests.28

ByteDance said that the Chinese Government doesn’t order it to censor content on TikTok: ‘To be clear: we do not remove videos based on the presence of Hong Kong protest content,’ said a ByteDance spokesman cited by the New York Times.29 But a former content moderator for TikTok also told the Times that ‘managers in the United States had instructed moderators to hide videos that included any political messages or themes, not just those related to China’.

Speaking on the condition of anonymity, the former content moderator said that the policy was to, in the newspaper’s words, ‘allow such political posts to remain on users’ profile pages but to prevent them from being shared more widely in TikTok’s main video feed’—a practice known as ‘shadow banning’.

The concerns of other US Congress members extend from the app’s use of censorship to curate and shape information flows and export CCP media narratives to data privacy and the potential for the app to be used as a tool of surveillance in the service of the Chinese party-state. On 24 October, senators Chuck Schumer and Tom Cotton penned a letter asking Acting Director of National Intelligence Joseph Maguire to determine whether TikTok’s data collection practices pose a national security risk.30

David Carroll, an associate professor of media design at Parsons School of Design, discovered that TikTok’s privacy policy in late 2018 indicated that user data could be shared ‘with any member or affiliate of [its] group’ in China. TikTok confirmed to him that ‘data from TikTok users who joined the service before February 2019 may have been processed in China.’31

In November, regulators took action. Reuters reported that the US Government had launched a national security review of ByteDance’s US$1 billion acquisition of Musical.ly.32

Meiya Pico: from mobile data extraction to the Belt and Road’s ‘safety’ and security corridor

Inside China and at its borders, people are being asked to hand over their phones for police inspections. Within minutes, police can connect, extract and analyse phone and personal user data on the phone. In online chatter on Chinese platforms about the matter, people mostly express their fears of police discovering applications for ‘jumping the Great Firewall’, but police can extract more than just a list of installed applications. They can extract and access call and message logs; contact lists and calendars; location information; audio, video and documents; and application data.

In June 2019, Asia Society ChinaFile editor Muyi Xiao noticed multiple online reports on Chinese social media sites of Beijing and Shanghai police spot-checking people’s phones and installing a mobile app called ‘MFSocket’.33 She investigated further and found similar reports from Guangdong and Xinjiang from as early as 2016. One citizen reported that their employer had asked them and other colleagues to report to a police station, where, after they had their ID cards inspected and their photos and fingerprints taken, MFSocket was installed on their phones. In this particular case, the citizen had Google’s suite of apps installed (Google is available only outside China), and he was questioned about that.34 It isn’t clear whether these users were under suspicion for criminal activity, but one affected individual was reportedly going to the police station to update their ID, and another was riding their scooter and was stopped by police.35 Muyi Xiao’s investigations led her to the app’s developer—Meiya Pico, a prominent player in China’s digital forensics sector.

The MFSocket phone app is the client application for Meiya Pico’s mobile phone forensics suite.36

Once a person’s mobile phone is connected to the forensics terminal, the MFSocket app is pushed to the phone. When it’s installed, the operator is able to extract phone and personal user data from the phone, including contacts, messages, calendar events, call record data, location information, video, audio, a list of apps, system logs37 and almost 100 software applications.38

The functionality of MFSocket is neither unique nor suspicious; nor is it unusual for a digital forensics company to sell such software. What is of concern is the seemingly arbitrary nature of its use by police in China. It’s also not the only mobile data extraction app used in China. The Fengcai or BXAQ app,39 also known as ‘MobileHunter’,40 for example, has been installed onto the phones of foreign journalists crossing from Kyrgyzstan into Xinjiang. Similarly to MFSocket, it collects personal and phone data.41

Beyond China’s borders, Meiya Pico has provided training to Interpol42 and sells its forensics and mobile hacking equipment to the Russian military.43 Through financial support provided by China’s Ministry of Public Security, Meiya Pico also has a unique role in BRI projects. A report on Chinese information controls by the Open Technology Fund suggests that this could be part of a ‘safety corridor’ between China and Europe,44 linking safety and security products and services with foreign aid projects.45

Since 2013, Meiya Pico has been working with the Ministry of Public Security on BRI-focused foreign aid projects,46 constructing digital forensics laboratories in Central Asia and Southeast Asia,47 including in Vietnam48 and Sri Lanka.49 Meiya Pico claims to have provided, under the instruction of the ministry,50 more than 50 training courses to police forces in 30 countries51 as part of the BRI (Figure 1).52 For these projects, Meiya Pico reportedly sends professional and technical personnel to each location to conduct in-depth technical communication and exchanges.53 Chinese state media have reported that these projects enhance a country’s ability to fight cybercrime through technical and equipment assistance and support.54

Figure 1: Meiya Pico and BRI projects

Source: Meiya Pico, Belt and Road.

CloudWalk and data colonialism in Zimbabwe

The draconian techno-surveillance system that China is perfecting in Xinjiang and steadily expanding to the rest of the country is increasingly seen as an alternative model by non-democratic regimes around the world. In the first Mapping China’s tech giants report, we examined how Chinese technology companies are closely entwined with the CCP’s support for Zimbabwe’s authoritarian regime. From the country’s telco infrastructure through to social media and cybercrime laws, the PRC’s influence is pervasive.

In March 2018, the Zimbabwean Government took this approach to a new level when it signed an agreement with CloudWalk Technology to build a national facial recognition database and monitoring system as part of China’s BRI program of international infrastructure deals.55 The agreement was reached between a ‘special adviser to Zimbabwe’s Presidential Office’, the Minister of Science and Technology in Nansha district of Guangzhou and CloudWalk executives, according to a Science Daily (科技日报) report.56 Under the deal, Zimbabwe will send biometric data on millions of its citizens to China to assist in the development of facial recognition algorithms that work with different ethnicities and will therefore expand the export market for China’s product—an arrangement that had no input from ordinary Zimbabwean citizens. In exchange, Zimbabwe’s authoritarian government will get access to CloudWalk’s technology and the opportunity to copy China’s digitally enabled authoritarian system.

Former Zimbabwean Ambassador to China Christopher Mutsvangwa told The Herald, a Zimbabwean newspaper, that CloudWalk had donated facial recognition terminals to the country and that the terminals are already being installed at every border post and point of entry around the southern African nation: ‘China has proved to be our all-weather friend and this time around, we have approached them to spearhead our AI revolution in Zimbabwe.’ 57

The arrangement is paradigmatic of a new form of colonialism called ‘data colonialism’, in which raw information is harvested from developing countries for the commercial and strategic benefit of richer, more powerful nations that hold AI supremacy.58 Writing in the New York Times, Kai-Fu Lee, the former Google China head and doyen of China’s AI industry, outlined how these kinds of colonial arrangements are set to ‘reshape today’s geopolitical alliances’:59

[I]f most countries will not be able to tax ultra-profitable AI companies to subsidize their workers, what options will they have? I foresee only one: Unless they wish to plunge their people into poverty, they will be forced to negotiate with whichever country supplies most of their AI software—China or the United States—to essentially become that country’s economic dependent, taking in welfare subsidies in exchange for letting the ‘parent’ nation’s AI companies continue to profit from the dependent country’s users. Such economic arrangements would reshape today’s geopolitical alliances.

The CloudWalk–Zimbabwe deal, Science Daily notes, is a first for the Chinese AI industry in Africa  and serves a clear geostrategic aim: ‘[It] will enable China’s artificial intelligence technology to serve the economic development of countries along the “belt and road initiative” route.

The arrangement will not only help bring the Zimbabwean regime’s authoritarian practices further into the digital age, but will also enable the PRC—through state-backed and other nominally private companies—to export those means for other countries to use to surveil, repress and manipulate their populations.

Facial recognition technology is notoriously bad at detecting people with dark skin, making the data that the Zimbabwean Government is trading with CloudWalk highly prized.60 By improving its facial recognition systems for people with dark skin, CloudWalk is effectively opening up whole new markets around the world for its technology, while Zimbabwe perceives CloudWalk as ‘donating’ its technology to the country.

In exchange for the private biometric details of the Zimbabwean citizenry, CloudWalk’s technology will be deployed in the country’s financial industry, airports, bus stations, railway stations and, as the Science Daily puts it, ‘any other locations requiring face recognition to effectively maintain public security’.

According to The Herald, Zimbabwe signed another agreement with CloudWalk in April 2019, under which the Chinese firm will provide facial recognition for smart financial service networks, as well as intelligent security applications at airports and railway and bus stations. The new deal, according to the paper, was reached during a visit to China by Zimbabwean President Mnangagwa and forms part of China’s BRI in Africa.61

‘The Zimbabwean Government did not come to Guangzhou purely for AI or facial recognition technologies; rather it had a comprehensive package plan for such areas as infrastructure, technology and biology,’ CloudWalk CEO Yao Zhiqiang said at the time, according to the paper. 

BeiDou: China’s satellite and space race

Unlike other entities featured in this report, the BeiDou Navigation Satellite System (BeiDou) isn’t a company; rather, it’s a centrally controlled satellite constellation and associated service that provides positioning, navigation and timing information. It also presents itself as a completely functional and improved alternative to the US-controlled Global Positioning System (GPS).

The development of BeiDou began after the Third Taiwan Strait Crisis of 1996, when missile tests by the Chinese military were ineffective due to suspected US-directed disruption of the GPS. After that failure, the ‘Chinese military decided, no matter how much it would cost, [that China] had to build its own independent satellite navigation system.’62

The first generation of the system consisted of three satellites that provided rudimentary positioning services to users in China. However, in 2013, China reached its first agreements to export the service to other countries. Since then, BeiDou has upped the tempo of its global expansion and engagement.

For increased accuracy, positional satellites such as the BeiDou constellations need to precisely determine their orbital position. At this fine scale, satellite orbits aren’t regular across the globe, and modelling them within the millisecond relies on a global network of reference stations and onboard atomic clocks. The reference stations share data containing information on how long signals take to reach the receiver from the satellite, and then precise orbital determination can be more accurately modelled by trilaterating (similar to triangulating – using distances rather than angles) those signals (Figure 2). A wide geographical spread of reference stations allows the orbit to be precisely determined over a larger area.63 By having stations or receivers overseas, including in Australia, for example, BeiDou is able to more precisely determine post-processing adjustments over Australia, and thereby provide more precise positional data to an end user.

Figure 2: An infographic explaining how base stations can improve GNSS positional accuracy

Source: An introduction to GNSS, Hexagon.

In 2013, BeiDou signed an agreement with Brunei to supply the country with the technology for military and civilian use at a heavily subsidised price.64 Following Chinese Premier Li Keqiang’s 2013 visit to Islamabad, Pakistan became the first country in the world to sign an official cooperation agreement with the BeiDou Navigation Satellite System in both the military and civilian sectors.

Pakistan was granted access to the system’s post-processed data service, which provides far more precise location services and accompanying encryption services.65 These additional features allow for more precise guidance for missiles, ships and aircraft.66 In recent years agreements have also been reached with other countries including the United States and Russia to establish interoperability between different GNSS satellite constellations.

In the run-up to the 3rd generation of BeiDou’s satellite constellation, the service began to more aggressively pursue internationalisation. Agreements with countries in South and Southeast Asia were signed, providing access to BeiDou services and allowing BeiDou to construct permanent reference stations across the region and increase its positional accuracy outside China’s borders. In 2014, it was announced that China was planning to construct 220 reference stations in Thailand and a network of 1,000 across Southeast Asia.67 These newer stations improve the precise post-processing accuracy of the satellite signals, which in turn increases the precision of signals received by end users.68

In 2014, China Satellite Navigation System Management Office and Geoscience Australia established a similar agreement, but on a smaller scale. They met in Beijing with representatives of Wuhan University. The two sides reportedly agreed to establish a formal cooperation mechanism.69

Wuhan University was to provide Geoscience Australia with three continuously operating reference stations equipped with satellite signal receivers constructed by China Electronic Technology Group (CETC). CETC is one of China’s largest state-owned defence companies and was covered in the original dataset of Mapping China’s Technology Giants.70 By using CETC-constructed receivers, GA was provided access to additional signals that were unavailable to commercial off-the-shelf receivers. GA manages the communications of these sites, and also receives access to the global Wuhan University’s network of overseas tracking data.71

BeiDou’s presence in Australia has previously attracted academic and media scrutiny. Professor Anne-Marie Brady has been critical of Australia’s engagement with BeiDou because of its role in guiding China’s military technologies:72

Australia is playing a small part in helping China to get a GPS system as effective as the US system. China is aiming to have a better one than the US has by 2020, and so is Russia. They need ground stations to coordinate their satellites and they need them in the Pacific. Their first ground station in the Pacific region was built in Perth.

The three BeiDou ground facilities in Australia are at Yarragadee Station (Western Australia; the first one built), Mount Stromlo (Australian Capital Territory) and Katherine (Northern Territory) and are operated by Geoscience Australia. They were built in 2016 and have been operating for over three years.73 No data is sent directly from these (or any) receivers back to the BeiDou satellites, and detailed positional and signal data is provided publicly. These data streams are widely used by industry and civilian end-users.

The stations are a small part of Australia’s GNSS network, which then publicly provides precise positional and signal data. But it’s worth noting that Wuhan University has close links to the People’s Liberation Army (PLA) and has been previously accused by the US and Taiwanese Governments of carrying out cyberattacks.74

Foreign investment

The detention of an estimated 1.5 million members of ethnic minority groups,75 chiefly Uyghur, in so-called re-education camps in China’s far western region of Xinjiang is a human rights violation on a massive scale.76 For Chinese security companies, however, it is a win.

Many of the AI and surveillance companies added to our Mapping China’s Technology Giants project have capitalised on China’s surge in security spending, particularly in Xinjiang, in recent years.

Spending on security-related construction in Xinjiang tripled in 2017, according to an analysis of government expenditure by Adrian Zenz for the Jamestown Foundation.77

For Chinese security, AI and surveillance companies, Xinjiang has become, as Charles Rollet put it in Foreign Policy, ‘both a lucrative market and a laboratory to test the latest gadgetry’.78 The projects there, he notes, ‘include not only security cameras but also video analytics hubs, intelligent monitoring systems, big data centres, police checkpoints, and even drones.’

But China’s burgeoning surveillance state isn’t limited to Xinjiang. The Ministry of Public Security has ploughed billions of dollars into two government plans, called Skynet project (天网工程)79 and Sharp Eyes project (雪亮工程),80 that aim to comprehensively surveil China’s 1.4 billion people by 2020 through a video camera network using facial recognition technology.

China will add 400 million security cameras through 2020, according to Morgan Stanley, making investing in companies such as Hikvision and Dahua—which have received government contracts totalling more than US$1 billion81—extremely enticing for investors seeking high returns. Crucially, the gold rush hasn’t been limited to Chinese firms and investors.

Foreign investors, either passively or actively, are also profiting from China’s domestic security and surveillance spending binge. Investment funds controlling around US$1.9 trillion that measure their performance against MSCI’s benchmark Emerging Markets Index funnel capital into companies such as Hikvision82, Dahua83 and iFlytek,84 which have profited from the development of Xinjiang detention camps.

The market valuation of SenseTime, one of a few companies handpicked by the party-state to lead the way in China’s AI development, soared in 2018 on the back of increased government funding for its national facial recognition surveillance system.

Those massive government contracts have helped SenseTime attract top venture capital and private equity firms as well as strategic investors around the world, including Japanese tech conglomerate Softbank Group’s Saudi-backed Vision Fund. US venture fund IDG Capital supplied ‘tens of millions of dollars’ in initial funding to the company in August 2014.85

Other major shareholders include e-commerce giant Alibaba Group Holding Ltd, London-based Fidelity International (a subsidiary of Boston-based Fidelity Investments), Singaporean state investment firm Temasek Holdings, US private equity firms Silver Lake Partners and Tiger Global Management, and the venture capital arm of US telco Qualcomm.

More than 17 US universities and public pension plans have put money into vehicles run by some of these venture capital funds, according to an Australian Financial Review report citing historical PitchBook data.86

SenseTime rival, Megvii Technology, has also benefited from foreign investment, including from a Macquarie Group fund that sunk $US30 million ($44 million) into the facial recognition start-up.87

Macquarie declined to comment when questioned about the investment by the Australian Financial Review. Other firms such as Goldman Sachs Group Inc, have stated they’re reviewing their involvement in Megvii’s planned initial public offering after the U.S. government placed it on the US Entity List for alleged complicity in Beijing’s human rights abuses in China.88

Two of America’s biggest public pension funds—the California State Teachers’ Retirement System and the New York State Teachers’ Retirement System—own stakes in Hikvision, as the Financial Times reported in March 2019.89 Since at least 2018, Meiya Pico shares have been included in the FTSE  Russell Global Equity Index.90

Even if these companies aren’t listed on foreign bourses or are receiving money from foreign venture capital funds, they might still be getting investments from companies such as the BATs—Baidu, Alibaba and Tencent—that are traded on US stock exchanges.91

But, more often than not, the investments are made directly and wittingly by active funds that are seeking to maximise profits off the back of the boom in surveillance technologies used across China. To put it plainly, Western capital markets have funded mass detentions and an increasingly sophisticated repressive apparatus in China.

Some funds that have done their human rights and national security due diligence have started to divest themselves of some of these companies. At least seven US equity funds have divested from Hikvision, for instance.92 But many have not.

‘A lot of investors talk about ethical investing but when it comes to Hikvision and Xinjiang they are happy to fill their boots,’ one fund manager who sold out of Hikvision told the Financial Times in March 2019. ‘It is pretty hypocritical.’93
 

All roads lead to Xinjiang

In November 2019, internal Communist Party documents—obtained by the International Consortium of Investigative Journalists (ICIJ)—provided documentary evidence of how authorities in Xinjiang are using data and artificial intelligence to pioneer a new form of social control.94 The documents showed how authorities are using a data management system called the Integrated Joint Operation Platform (IJOP)—previously reported on by Human Rights Watch—to predictively identify those suspected of harbouring extremist views and criminal intent.95 Among the documents, a bulletin published on 25 June 2017, reveals how the IJOP system detected about 24,412 “suspicious” people in southern Xinjiang during one particular week. Of those people, 15,683 were sent to “education and training” — a euphemism for detention camps—and 706 were “criminally detained”.96

A month before this leak, in October 2019, the US Government added many of the AI and surveillance companies in this dataset—including Dahua Technology, iFlytek, Megvii Technology, SenseTime, Xiamen Meiya Pico Information Co. Ltd, Yitu Technologies and Hikvision97—to the US Entity List because of their roles in human rights violations in Xinjiang.98

However, Chinese tech companies’ activities in Xinjiang go beyond surveillance and extend to areas like propaganda and other coercive measures.

For example, we have found that TikTok’s parent company ByteDance—which is not on the US entity list for human rights violations in Xinjiang—collaborates with public security bureaus across China, including in Xinjiang where it plays an active role in disseminating the party-state’s propaganda on Xinjiang.

Xinjiang Internet Police reportedly “arrived” on Douyin—a ByteDance and video-sharing app—and built a “new public security and Internet social governance model” in 2018.99 In April 2019, the Ministry of Public Security’s Press and Publicity Bureau signed a strategic cooperation agreement with ByteDance to promote the “influence and credibility” of police departments nationwide.100 Under the agreement, all levels and divisions of police units from the Ministry of Public Security to county-level traffic police would have their own Douyin account to disseminate propaganda. The agreement also reportedly says ByteDance would increase its offline cooperation with the police department, however it is unclear what this offline cooperation is.

Tech companies have been piling into Xinjiang since the early 2010s. Huawei has been working for the Karamay Police Department on cloud computing projects since 2011,101 despite its debunked claims to work only with third parties.102 ZTE held its first Smart Cities Forum in Urumqi in 2013,103 and its ‘safe city’ solution has been largely used in surveilance and policing.104 In 2010, iFlytek set up a subsidiary in Xinjiang and a laboratory to develop speech recognition technology,105 especially in minority languages—technologies that are now used by the Xinjiang Government to track and identify minority populations.106

A surveillance industry boom was born out of the central government’s 2015 policy to prioritise ‘stability’ in Xinjiang107 and the national implementation of the Sharp Eyes surveillance project from 2015 to 2020.108 As of late 2017, 1,013 local security companies were working in Xinjiang;109 that figure excludes some of the largest companies operating in the region, such as Dahua and Hikvision, which had already won multimillion-dollar bids to build systems to surveil streets and mosques.110

Also in 2017, even with the central government halting some of the popular ‘PPP’ projects (public– private partnerships that channel private money into public infrastructure projects) that were debt hazards111 and tech companies becoming more cautious about investing in those projects, Xinjiang was an exception for about a year. Tech companies continued to hunt for opportunities in Xinjiang because funding for surveillance-related PPP projects in Xinjiang comes directly from defence and counterterrorism expenditure.112 However, in 2018, the debt crackdown eventually reached Xinjiang and a number of PPP projects there were also suspended. 113

A significant policy that encourages technology companies to profit from the situation in Xinjiang is the renewed ‘Xinjiang Aid’ scheme (援疆政策). Dating from the 1980s, these policies channel funds from other provincial governments to Xinjiang. Since the mass detentions in 2017 this scheme has encouraged companies in other provinces to open subsidiaries or factories in Xinjiang—factories that former detainees are forced to work in.114

A company can contribute to the Xinjiang Aid program, and the broader situation in the region, in many different ways. In 2014, for example, Alibaba began to provide cloud computing technologies for the Xinjiang Government in areas of policing and counterterrorism.115 In 2018, as part of Zhejiang Province’s Xinjiang Aid efforts, Alibaba was set to open large numbers of e-commerce service stations in Xinjiang, selling clothes and electronics.116 There’s no direct evidence that suggests Alibaba sells products sourced from forced labour. But clothing companies that have recently opened up factories in Xinjiang, because of favourable polices and an abundance of local labour—which can include forced labour117—have relied on Alibaba’s platforms to sell clothes to China, North America, Europe and the Middle East.118

Most of ByteDance’s activities in Xinjiang fall under the “Xinjiang Aid” initiative and the company’s cooperation with Xinjiang authorities is focused on Hotan, a part of Xinjiang that has been the target of some of the most severe repression. The area is referred to by the party-state as the most “backward and resistant”.119 According to satellite imagery analysis conducted by ASPI, there are approximately a dozen suspected detention facilities in the outskirts of Hotan.120 The city has seen an aggressive campaign of cemetery, mosque and traditional housing demolition since November 2018, which continues today.

In November 2019, Beijing Radio and Television Bureau announced its “Xinjiang Aid” measures in Hotan, to “propagate and showcase Hotan’s new image”—after more than two years of mass detention and close surveillance of ethnic minorities had taken place there. These measures include guiding and helping local Xinjiang authorities and media outlets to use ByteDance’s news aggregation app for Jinri Toutiao (Today’s Headlines) and video-sharing app Douyin to gain traction online.121 A Tianjin Daily article reported this April that after listening to talks by representatives from ByteDance’s Jinri Toutiao division, Hotan Propaganda Bureau official Zhou Nengwen (周能文) said he was excited to use the Douyin platform to promote Hotan’s products and image.122

Technology companies actively support state projects, even when those projects have nothing to do with tech. Also under the Xinjiang Aid umbrella, telecom companies such as China Unicom send their ‘most politically reliable’ employees to Xinjiang123 and deploy fanghuiju (访惠聚) units to villages in Xinjiang. ‘Fanghuiju’ is a government initiative that sends cadres from government agencies, state-owned enterprises and public institutions to regularly visit and surveil people.124

The China Unicom fanghuiju units were reportedly tasked with changing the villages, including villagers’ thoughts that are religious or go against CCP doctrines.125 Adding some of China’s more well-known technology and surveillance companies to the US Entity List was largely symbolic—after Huawei, Dahua and Hikvision were blacklisted in the US, Uniview’s president told reporters that, at a time when ‘leading Chinese technology companies are facing tough scrutiny overseas’, companies such as Uniview had the opportunity to grow and pursue their overseas strategies.126

Unfortunately, it’s extremely difficult for international authorities to sanction the circa 1,000 homegrown local Xinjiang security companies. However, as companies such as Huawei seek to expand overseas, foreign governments can play a more active role in rejecting those that participate in the Chinese Government’s repressive Xinjiang policies.

For example, the timeline of Huawei’s Xinjiang activities should be taken into consideration during debates about Huawei and 5G technologies. Huawei’s work in Xinjiang is extensive and includes working directly with the Chinese Government’s public security bureaus in the region. The announcement of one Huawei public security project in Xinjiang—made in 2018 through a government website in Urumqi127—quoted a Huawei director as saying, ‘Together with the Public Security Bureau, Huawei will unlock a new era of smart policing and help build a safer, smarter society.’128 In fact, some of Huawei’s promoted ‘success cases’ are Public Security Bureau projects in Xinjiang, such as the Modular Data Center for the Public Security Bureau of Aksu Prefecture in Xinjiang.129 Huawei also provides police in Xinjiang with technical support to help ‘meet the digitization requirements of the public security industry’.130

In May 2019, Huawei signed a strategic agreement with the state-owned media group Xinjiang Broadcasting and Television Network Co. Ltd at Huawei’s headquarters in Shenzhen. The agreement, which aims at maintaining social stability and creating positive public opinion, covered areas including internet infrastructure, smart cities and 5G.131

In 2018, when the Xinjiang Public Security Department and Huawei signed the agreement to establish an ‘intelligent security industry’ innovation lab in Urumqi. Fan Lixin, a Public Security Department official, said at the signing ceremony that Huawei had been supplying reliable technical support for the department.132 In 2016, Xinjiang’s provincial government signed a partnership agreement with Huawei.133 The two sides agreed to jointly develop cloud computing and big-data industries in Xinjiang. As mentioned above, Huawei began to work in cloud computing in Karamay (a Huawei cloud-computing ‘model city’ in Xinjiang)134 as early as 2011 in several sectors, including public security video surveillance.

In 2014, Huawei participated in an anti-terrorism BRI-themed conference in Urumqi as ‘an important participant of’ a program called ‘Safe Xinjiang’—code for a police surveillance system. Huawei was said to have built the police surveillance systems in Karamay and Kashgar prefectures and was praised by the head of Xinjiang provincial police department for its contributions in the Safe Xinjiang program.

Huawei was reportedly able to process and analyse footage quickly and conduct precise searches in the footage databases (for example, of the colour of cars or people and the direction of their movements) to help solve criminal cases.135

Since mass detentions began in Xinjiang over two years ago, state-affiliated technology companies such as those covered in this report have greatly expanded their remit and become a central part of the surveillance state in Xinjiang. Xinjiang’s crackdown on religious and ethnic minorities has been completed across the region. It has used and continues to use several different mechanisms of coercive control, such as arbitrary detention, coerced labour practices136 and at-home forced political indoctrination. Technology companies are intrinsically linked with many of those efforts, as the state’s crackdown offers ample opportunities for incentivised expansion and profitability.137
 

Conclusion

The aim of this report is to promote a more informed debate about the growth of China’s tech giants and to highlight areas where their expansion raises political, geostrategic, ethical and human rights concerns.

The Chinese tech companies in this report enjoy a highly favourable regulatory environment and are unencumbered by privacy and human rights concerns. Many are engaged in deeply unethical behaviour in Xinjiang, where their work directly supports and enables mass human rights abuses.

The CCP’s own policies and official statements make it clear that it perceives the expansion of Chinese technology companies as a crucial component of its wider project of ideological and geopolitical expansion, and that they are not purely commercial actors.138 The PRC’s suite of intelligence and security laws which can compel individuals and entities to participate in intelligence work139, and the CCP committees embedded within the tech companies (Chinese media has reported Huawei has more than 300 for example140) highlight the inextricable links between industry and the Chinese party-state.

These close ties make it difficult for them to be politically neutral actors. For western governments and corporations, developing risk mitigation strategies is essential, particularly when it comes to critical technology areas.

Some of these companies lead the world in cutting-edge technology development, particularly in the AI and surveillance sectors. But this technology development is focused on servicing authoritarian needs, and as these companies go global (an expansion often funded by PRC loans and aid) this technology is going global as well. This alone should give Western policymakers pause.

Increasing technological competition has the potential to deliver many benefits across the spectrum, but the benefits will not always accrue without good policy. If the West is going to continue to support the global expansion of these companies, it should, at a minimum, better understand the spectrum of policy risks and hold these companies to the same levels of accountability and transparency as it does its own corporations.


Acknowledgements

Thank you to Dr Samantha Hoffman and Nathan Ruser for their research contributions to this report and to the broader Mapping China’s Technology Giants project. Thank you to Fergus Hanson, Michael Shoebridge and anonymous peer reviewers for their valuable feedback on report drafts. And thank you to Cheryl Yu and Ed Moore for their research and data collection efforts.

What is ASPI?

The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally.

ASPI International Cyber Policy Centre

ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy. The ICPC informs public debate and supports sound public policy by producing original empirical research, bringing together researchers with diverse expertise, often working together in teams. To develop capability in Australia and our region, the ICPC has a capacity building team that conducts workshops, training programs and large-scale exercises both in Australia and overseas for both the public and private sectors. The ICPC enriches the national debate on cyber and strategic policy by running an
international visits program that brings leading experts to Australia.

Important disclaimer

This publication is designed to provide accurate and authoritative information in relation to the subject matter covered. It is provided with the understanding that the publisher is not engaged in rendering any form of professional or other advice or services. No person should rely on the contents of this publication without first obtaining advice from a qualified professional.

© The Australian Strategic Policy Institute Limited 2019

This publication is subject to copyright. Except as permitted under the Copyright Act 1968, no part of it may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Enquiries should be addressed to the publishers. Notwithstanding the above, educational institutions (including schools, independent colleges, universities and TAFEs) are granted permission to make copies of copyrighted works strictly for educational purposes without explicit permission from ASPI and free of charge.

  1. ‘Chinese police use app to spy on citizens’ smartphones’, Financial Times, 3 July 2019, online. ↩︎
  2. Mapping China’s Tech Giants, ‘Explore a company’, online. ↩︎
  3. China Eximbank is wholly owned by the Chinese Government. More detail can be found in Danielle Cave, Samantha Hoffman, Alex Joske, Mapping China’s technology giants, ASPI, Canberra, 2019, 10, online. ↩︎
  4. Lucas Niewenhuis, ‘1.5 million Muslims are in China’s camps—scholar’, SupChina, 13 March 2019, online. ↩︎
  5. Mapping China’s Tech Giants, ‘Welcome to Mapping China’s Tech Giants’, online. ↩︎
  6. Mapping China’s Tech Giants, ‘How to use this tool’, online. ↩︎
  7. Mapping China’s Tech Giants, ‘Glossary’, online. ↩︎
  8. Science and Technology Committee, ‘Oral evidence: UK telecommunications infrastructure’, HC 2200, House of Commons, 10 June 2019, online. ↩︎

The China Defence Universities Tracker

Exploring the military and security links of China’s universities.

This report accompanies the China Defence Universities Tracker website.

What’s the problem?

The Chinese Communist Party (CCP) is building links between China’s civilian universities, military and security agencies. Those efforts, carried out under a policy of leveraging the civilian sector to maximise military power (known as ‘military–civil fusion’), have accelerated in the past decade.

Research for the China Defence Universities Tracker has determined that greater numbers of Chinese universities are engaged in defence research, training defence scientists, collaborating with the military and cooperating with defence industry conglomerates and are involved in classified research.1

At least 15 civilian universities have been implicated in cyberattacks, illegal exports or espionage.

China’s defence industry conglomerates are supervising agencies of nine universities and have sent thousands of their employees to train abroad.

This raises questions for governments, universities and companies that collaborate with partners in the People’s Republic of China (PRC). There’s a growing risk that collaboration with PRC universities can be leveraged by the People’s Liberation Army (PLA) or security agencies for surveillance, human rights abuses or military purposes.

Universities and governments remain unable to effectively manage risks that come with growing collaboration with PRC entities. There’s little accessible information on the military and security links of PRC universities. This knowledge gap limits the effectiveness of risk-management efforts.

What’s the solution?

Efforts to manage the risks of engaging with PRC universities should involve close collaboration between governments and universities. Both share a concern for protecting national interests, ensuring the integrity of research, preventing engagement from being exploited by rival militaries or for human rights abuses, and increasing the transparency of research collaboration.

The Australian Government should establish a national research integrity office and refine and enforce foreign interference and export controls legislation. It should use the China Defence Universities Tracker to improve the screening of visa applicants and inform decisions to award research funding.

Universities should be proactive in their efforts to concretely improve how research collaboration is managed.

The China Defence Universities Tracker is a tool to help universities and researchers understand institutions in China and avoid harmful collaborations.

Universities can use the recently published Guidelines to counter foreign interference in the Australian university sector to help review their management of collaboration.2 They should introduce clauses into agreements with PRC entities to terminate those agreements in the case of specific ethical concerns or indications of research going towards a military end use.

Universities could demonstrate their commitment to these initiatives by establishing independent research integrity offices that promote transparency and evaluate compliance with ethics, values and security interests, serving as administratively distinct bodies that avoid influence from internal university politics.

Introduction

Military–civil fusion is the CCP’s policy of maximising linkages between the military and the civilian sector to build China’s economic and military strength.3 The policy was promoted by President Hu Jintao in 2007 but has been elevated to a national strategy by President Xi Jinping, who personally oversees the Central Commission for the Development of Military–Civil Fusion (中央军民融合发展委员会).4 It has its roots in efforts dating back to the PRC’s founding, including policies such as military–civil integration and ‘nestling the military in the civil’.5

Many countries seek to leverage private industry and universities to advance their militaries. However, as scholar Lorand Laskai writes, ‘civil–military fusion is more far-reaching and ambitious in scale than the US equivalent, reflecting a large push to fuse the defense and commercial economies.’6

Military–civil fusion in China’s university sector has spurred efforts to increase academe’s integration with defence and security. In 2017, the Party Secretary of Beijing Institute of Technology, a leading university for defence research, wrote that universities should ‘stand at the front line of military–civil fusion’.7

‘National defence technology research requires the participation of universities’, according to the Chinese government agency overseeing efforts to safeguard classified information at universities. The agency describes universities as one of three parts of the national defence science and technology innovation system. Alongside defence conglomerates, which are responsible for large-scale projects and the commercialisation of defence equipment, and defence research organisations, which are institutes run by defence conglomerates or the military that are responsible for breaking through research bottlenecks and developing key components, universities undertake research at the frontier of defence technology.8

Military–civil fusion is tied to the government’s Double First-Class University Plan (世界一流大学和一 流学科建设 or 双一流) to build 98 of China’s best universities into world-class institutions by 2050.9

A 2018 policy document about the plan states that universities should integrate into ‘the military–civil fusion system’ and ‘advance the two-way transfer and transformation of military and civilian technological achievements’.10 The importance of international collaboration and foreign talent to the Double First-Class University Plan means that military–civil fusion, the improvement of China’s universities and research collaboration are becoming inextricable.11

While military–civil fusion doesn’t mean that barriers between the military and other parts of PRC society have vanished, it’s breaking down those barriers in many universities. At least 68 universities are officially described as parts of the defence system or are supervised by China’s defence industry agency, the State Administration of Science, Technology and Industry for National Defense (SASTIND, 国家国防科技工业局).

At the same time, universities around the world are expanding their collaboration with PRC partners. Much of that collaboration is mutually beneficial, but it’s clear that many institutions have not effectively managed risks to human rights, security and research integrity. While universities already have systems in place to manage these issues, they should be revisited and strengthened.

Recent cases have demonstrated gaps in universities’ management of research collaboration. For example, the ASPI International Cyber Policy Centre’s 2018 report Picking flowers, making honey: the Chinese military’s collaboration with foreign universities highlighted concerns about the high level of international research collaboration involving the PLA.12 Between 2007 and 2017, the PLA sent more than 2,500 of its scientists to train and work in overseas universities. Some of those scientists used civilian cover or other forms of deception to travel abroad. All of them were sent out to gain skills and knowledge of value to the Chinese military; all of them are believed to be party members who returned to China when instructed.

This report uses the ASPI International Cyber Policy Centre’s China Defence Universities Tracker to explain how many of the concerns raised by collaboration with the PLA increasingly apply to defence-linked Chinese universities, security organisations and industry conglomerates. The wedding of the military and the civilian in China’s universities has important consequences for policymakers and overseas universities engaged with partners in China.

To help universities, companies and policymakers navigate engagement with research institutions in China, the China Defence Universities Tracker is a database that sorts institutions into categories of very high, high, medium or low risk:

  • 92 institutions in the database have been placed in the ‘very high risk’ category
    • 52 People’s Liberation Army institutions
    • 8 security or intelligence-agency institutions
    • 20 civilian universities
    • China’s 12 leading defence industry conglomerates.
  • 23 institutions—all civilian universities—have been placed in the ‘high risk’ category.
  • 44 institutions—all civilian universities—have been placed in the ‘medium’ or ‘low’ risk categories.

The database is designed to capture the risk that relationships with these entities could be leveraged for military or security purposes, including in ways that contribute to human rights abuses and are against Australia’s interests. It provides overviews of their defence and security links and records any known involvement in espionage or cyberattacks, inclusion on end-user lists that restrict exports to them, and several measures of their involvement in defence research. While this project has uncovered large amounts of previously inaccessible information on PRC universities and research institutions, continued due diligence and research are required.

Research for the tracker was undertaken over the course of 2019. It focused on identifying key indicators of defence and security links at each university and developing reliable methods for evaluating those links. Institutions were included in the project for their military links, security links or known connection to human rights abuses or espionage. This research primarily used online Chinese-language resources from universities or Chinese Government agencies. We have attempted to archive all online sources using the Wayback Machine or archive.today.

China’s civilian defence universities

Many of China’s universities originated as military institutions but have since been developed into civilian universities that are increasingly competitive in global research rankings. However, developments over the past decade highlight the military and security links of more than 60 universities in particular.

The Seven Sons of National Defence

The ‘Seven Sons of National Defence’ (国防七子) are a group of leading universities with deep roots in the military and defence industry. They’re all subordinate to the Ministry of Industry and Information Technology (工业和信息化部), which oversees China’s defence industry through its subordinate agency, SASTIND.

The depth of the Seven Sons’ integration with the military suggests that it would be more accurate to describe them as defence universities than as civilian universities. In fact, they call themselves ‘defence science, technology and industry work units’ or parts of the ‘defence system’.13

Each year, more than 10,000 graduates from the Seven Sons join the defence research sector—just under 30% of their employed graduates. PhD graduates from these universities are particularly sought after, and as many as half of them go into the defence sector (Figure 1).14 State-owned defence conglomerates specialising in aircraft, missiles, warships, armaments and military electronics are among their top employers, alongside high-tech companies such as Huawei and ZTE.15

Figure 1: The percentage of employed 2017 or 2018 graduates of the Seven Sons working in the defence system

Note: Figures for Northwestern Polytechnical University and Harbin Engineering University are for 2017. The remaining figures are for 2018. Source: university graduate employment quality reports (毕业生就业质量年度报告).

The Seven Sons stand at the forefront of defence research in China. Hundreds of their scientists sit on PLA expert advisory committees and assist or even serve in major military projects, such as fighter jet or aircraft carrier programs.16 They dominate the ranks of defence research prize and defence technology patent recipients.17 One Chinese study of military–civil fusion in the university sector estimated that more than half the academics at the Seven Sons have been involved in defence projects.18 All seven have been accredited at the institutional level to participate in research into and the production of top-secret weapons and defence equipment.

They’re also among China’s best-funded universities. In 2016, the Seven Sons spent a total of ¥13.79 billion (A$2.88 billion) on research. In 2018, four of them ranked among China’s top five universities for funding per research staff member.19

Approximately half of their research spending goes towards defence research. Harbin Institute of Technology spent ¥1.973 billion (A$400 million), or 52% of its total research budget, on defence research in 2018.20 Beihang University spends roughly 60% of its research budget on defence research.21

Harbin Institute of Technology’s defence research spending alone is comparable to the Australian Department of Defence’s. The Australian Government’s most recent defence science and technology budget was just under A$469 million. Under current plans, that figure is estimated to decrease to A$418 million by 2023.22

Like the Seven Sons of National Defence, the ‘Seven Sons of the Arms Industry’ (兵工七子) are a group of Chinese universities previously subordinate to the Ministry of Ordnance Industry (兵器工业部), which was dissolved in 1986.23 Two of them—Beijing Institute of Technology and Nanjing University of Science and Technology—are also among the Seven Sons of National Defence (see box). All of them are still involved in researching and developing weapons.

Universities with national defence characteristics

Recent developments have pushed military–civil fusion far beyond the Seven Sons.24 Research for the China Defence Universities Tracker has identified 101 agreements signed between defence industry agency SASTIND (or its predecessor, COSTIND) and other agencies since 1999 to ‘jointly construct’ (共建) 61 universities subordinate to those agencies (see appendix).25 These agreements encompass leading national universities, such as Tsinghua University and Peking University, as well as provincial universities with strong foundations for defence research.

The Tracker also identifies similar agreements that show how defence industry conglomerates, such as China’s leading ballistic missile manufacturer, supervise nine universities.26 SASTIND’s joint-construction agreements have become far more common in recent years.

Fifty-seven of the 101 agreements were signed in the past five years. In 2016 alone at least 38 agreements were finalised (Figure 2).

Figure 2: SASTIND agreements on the ‘joint construction’ of universities (red bars denote agreements signed by SASTIND’s predecessor, COSTIND)

Through the agreements, SASTIND seeks to build institutions into ‘universities with national defence characteristics’ by expanding their involvement in training and research on defence technology and deepening their cooperation with defence companies.27 Specifically, it works to support the establishment of defence research laboratories, to fund defence-related research areas and to facilitate participation in military projects.28 This has led to the establishment of large numbers of defence laboratories and ‘disciplines with national defence characteristics’ (国防特色学科) in civilian universities, mostly in the past decade. More than 150 universities have received security credentials that allow them to participate in classified weapons and defence equipment projects.29

According to a university supervised by SASTIND, the agency aims to support five to eight defence disciplines and establish one or two defence labs in each university it supervises by 2020 (the end of the 13th Five-Year Plan).30 This hasn’t yet come to fruition and is unlikely to be fully achieved. Nonetheless, it may be the largest push to integrate universities into the defence research system since the beginning of China’s reform and opening, covering as many as 53 universities.31

Developing talent for China’s defence industry is an important objective of military-civil fusion in universities. In 2007, the Chinese government established the National Defence Science and Technology Scholarship to encourage high-achieving university students to join the defence sector.32

Every year, the scholarship is given to 2,000 ‘national defence technology students’ who are each sponsored by defence conglomerates or China’s nuclear weapons program to study in designated fields.33 After graduating, they are required to work for their sponsor for five years.34

Defence laboratories

The China Defence Universities Tracker has identified more than 160 defence-focused laboratories in civilian universities. It primarily catalogues three types of defence laboratories:

  • national defence science and technology key laboratories (国防科技重点实验室)
  • national defence key discipline laboratories (国防重点学科实验室)
  • Ministry of Education national defence key laboratories (教育部国防重点实验室).

By 2009, the Chinese Government had established 74 national defence science and technology key laboratories, all of which are jointly supervised by the PLA and SASTIND.35 The China Defence Universities Tracker has identified 39 in civilian universities; others are found in defence conglomerates and PLA units.

National defence science and technology key laboratories are the best funded and most prestigious kind of defence laboratory, holding the same status as state key laboratories. For example, Northwestern Polytechnical University’s national defence science and technology key laboratory for unmanned aerial vehicles has received over ¥420 million (A$87 million) in funding since its establishment in 2001.36

Thirty-six national defence key discipline labs, which are lower in status than national defence science and technology key labs and were first established around 2007, have also been identified.37

Ministry of Education defence laboratories are a previously unstudied kind of defence laboratory. Fifty-three of them have been identified at 32 universities. According to Shandong University, which hosts three of the labs, they are:

… approved by the Ministry of Education and entrusted to universities for their establishment in order to expand indigenous science and technology innovation for national defence, cultivate and concentrate high-level national defence science and technology talent, and engage in academic exchange and cooperation on national defence science and technology.38

One of these labs has been accused of carrying out cyberattacks for the PLA (see ‘Espionage’).

Many of these defence labs obscure their defence links in official translations of their names. National defence science and technology key laboratories often simply call themselves ‘national key laboratories’. For example, the National Key Laboratory of Science and Technology on Micro/Nano Fabrication jointly run by Shanghai Jiao Tong University and Peking University was established by the PLA in 1996.39 National defence key discipline laboratories are often known as ‘fundamental science’ laboratories. Ministry of Education defence labs are almost always referred to as ‘Ministry of Education Laboratory (B-category)’ (教育部重点实验室(B类)) or simply as Ministry of Education labs.

Designated defence research areas SASTIND approves ‘disciplines with national defence characteristics’, such as armament technology and materials science, at universities it supervises after an application process. They’re referred to in the China Defence University Tracker as ‘designated defence research areas’. The tracker identifies more than 400 designated defence research areas in universities. Since 2015, at least 280 of these were approved at 53 universities.40

Defence disciplines reflect each university’s specialities for defence research and serve as stepping stones for the establishment of prestigious defence laboratories. Shenyang Ligong University, one of the ‘Seven Sons of the Arms Industry’ supervised by SASTIND, stated that its defence disciplines are ‘a precursor and foundation for the university to apply to establish national defence key discipline laboratories’.41

It’s difficult to find detailed information on the operation of defence disciplines. However, one university wrote in 2018 that it expected to receive approximately ¥7 million (A$1.4 million) on average to develop each discipline.42 If that figure is representative, it indicates a doubling of the funding allocated to each discipline in comparison to a decade ago.43

Security credentials

‘Security credentials’ refers to the ‘weapons and equipment research and production unit secrecy credentials’ (武器装备科研生产单位保密资格) that are awarded to universities and companies at the institutional level. Security credentials are divided into three tiers: first class, second class and third class—roughly equivalent to top secret, secret and confidential clearances, respectively.44

The issuing of security credentials is overseen by National Administration of State Secrets Protection, the Central Military Commission’s Equipment Development Department and SASTIND, or their local equivalents.45

Security credentials allow their holders to participate in different levels of classified defence- and security-related projects. Universities with security credentials are required to meet certain standards in their protection and management of classified research and personnel.46 The credentials indicate a university’s involvement in defence projects, as well as the sensitivity of that work.

A top-secret security credentials plaque awarded to the Beijing Institute of Technology.

Source: Beijing Institute of Technology, ‘Our university passes the secrecy credentials examination and certification’, 24 April 2006, online.

As of November 2017, more than 150 universities had received security credentials.47 The tracker has identified eight universities with top-secret security credentials.

Military units don’t appear to be subject to this security credentials system but use it to scrutinise those they work with. For example, many procurement notices from the PLA require organisations submitting tenders to hold security credentials.48
 

Case study: The University of Electronic Science and Technology of China

The military links of the Seven Sons of National Defence are more widely recognised than those of an institution such as the University of Electronic Science and Technology of China (UESTC) in Chengdu.

However, UESTC has more in common with the Seven Sons than a typical Chinese university. UESTC’s defence links date back to its earliest days. In 1961, six years after its founding, it was recognised by the CCP Central Committee as one of China’s ‘seven defence industry academies’.49

Since 2000, it’s been the subject of three agreements between defence industry agency SASTIND and the Ministry of Education designed to expand its role in the defence sector.50

In 2006, defence electronics conglomerate China Electronics Technology Group Corporation (CETC) also became one of the university’s supervising agencies.51 As part of its agreement to supervise the university, CETC stated that it would work with the Ministry of Education to support UESTC’s management and reforms, involvement in major research projects, establishment of laboratories and exchanges of personnel. CETC, which is expanding its overseas presence at the same time as its technologies enable human rights abuses in Xinjiang, remains one of the primary employers of UESTC graduates.52

UESTC hosts at least seven laboratories dedicated to defence research and has 10 designated defence research areas related to electronics; signal processing and anti-jamming technology; optics; and radar-absorbing materials.53 In 2017, 16.4% of its graduates who gained employment were working in the defence sector.54 Approximately 30% of its research spending in 2015 went towards defence research.55

UESTC also has links to China’s nuclear weapons program. In 2012, it was added to the US Government’s Entity List, restricting the export of US-made technology to it, as an alias of China’s nuclear weapons facility, the Chinese Academy of Engineering Physics. This indicates that UESTC had acted as a proxy for China’s nuclear weapons program.56 Its High Power Radiation Key Laboratory is jointly run with the Chinese Academy of Engineering Physics.57

The university has also been implicated in the rollout of surveillance technology in Xinjiang, where an estimated 1.5 million ethnic Uygurs and other minorities have disappeared into concentration camps. The dean of its School of Computer Science and Engineering runs a company that supplies video surveillance systems to authorities in Xinjiang.58

UESTC’s international partnerships have deepened despite its links to the military, nuclear weapons and potential human rights abuses. Its collaborations naturally align with its specialisations, which are also its main areas of defence research. For example, in 2016, with the University of Glasgow, it established a joint college in China that offers degrees in electronics.59 UESTC also runs the Joint Fibre Optics Research Centre for Engineering with the University of New South Wales in Australia.60

Espionage

China’s National Intelligence Law requires entities and individuals to cooperate with intelligence operations. However, that doesn’t mean that all PRC entities are equally likely to engage in espionage or related forms of misconduct. Military–civil fusion hasn’t meant that all universities are equally integrated into the military’s efforts. When analysing cases of espionage and illegal export involving Chinese universities, it becomes clear that institutions with strong military and security links are disproportionately implicated in theft and espionage. This can be helpful in establishing a risk-based approach to collaboration with PRC entities.

The China Defence Universities Tracker has identified at least 15 civilian universities that have been linked to espionage, have been implicated in export controls violations or have been identified by the US Government as aliases for China’s nuclear weapons program. Four of the Seven Sons of National Defence have been implicated in espionage or export controls violations. Harbin Engineering University alone has been linked to five cases, including the theft of missile technology from Russia.61

One of the Seven Sons has been accused of collaborating with the Ministry of State Security to steal jet engine technology. In 2018, US authorities arrested an officer from the Jiangsu State Security Bureau, Xu Yanjun, who allegedly sought to steal engine technology from GE Aviation. The US Department of Justice’s indictment of Xu describes how an executive at Nanjing University of Aeronautics and Astronautics (NUAA) helped Xu identify and cultivate overseas targets.

Intelligence officer and part-time NUAA student Xu Yanjun after his arrest.

Source: Gordon Corera, ‘Looking for China’s spies’, BBC News, no date, BBC.

According to the indictment, the NUAA co-conspirator reached out to a GE Aviation engineer, inviting him to give a lecture at the university’s College of Energy and Power Engineering.62 The NUAA official then introduced the engineer to Xu, who used an alias and claimed to be from the Jiangsu Association of Science and Technology. Xu began cultivating the engineer and asked him to share proprietary information about fan blades for jet engines. NUAA has confirmed that Xu was also a part-time postgraduate student at NUAA.63

The establishment of defence laboratories fosters close relationships between researchers and the military that can be used to facilitate and incentivise espionage. For example, Wuhan University’s Ministry of Education Key Laboratory of Aerospace Information Security and Trusted Computing has been accused of carrying out cyberattacks on behalf of the PLA.64 The laboratory is one of the Ministry of Education’s ‘B-category’ laboratories that focuses on defence research and doesn’t appear on Wuhan University’s main list of labs on its website.65 One Taiwanese report, citing unnamed intelligence officials, claimed that an office in Wuhan University is in fact a bureau of the PLA’s signals intelligence agency.66

The same Wuhan University lab has collaborated with and even sent a visiting scholar to an Australian university. A professor alleged to be the lab’s liaison with the PLA has co-authored research with a University of Wollongong cryptographer.67 One of the lab’s associate professors visited the University of Wollongong in 2010, participating in an Australian Research Council project.68

Public and state security links

As the NUAA espionage case shows, some Chinese universities work closely with the Ministry of State Security (MSS), which is China’s civilian intelligence and political security agency. The ministry was established in 1983 by merging units responsible for foreign intelligence, economic espionage, counterintelligence, political security and influence work.69 It has since grown into a well-resourced agency believed to be a prolific perpetrator of cyberattacks and intelligence operations against companies, governments and universities for political influence and economic espionage.70

The MSS operates at least two universities: the University of International Relations71 in Beijing and Jiangnan Social University72 in Suzhou. These universities train intelligence officers and carry out research to support the MSS’s work. The University of International Relations has exchange agreements with universities in Denmark, the United States, France and Japan.73

The MSS also leverages civilian universities for training, research, technical advice and possibly direct participation in cyber espionage. For example, a big-data scientist at Hunan University, which hosts the PLA’s Tianhe-1 supercomputer, serves as a ‘Ministry of State Security specially-appointed expert’.74 A professor at Tianjin University has been awarded a ‘Ministry of State Security Technology Progress Prize’.75 A professor at Southeast University has been awarded two projects under the MSS’s 115 Plan, which is a research funding program.76 Cybersecurity firm ThreatConnect identified links between Southeast University and a hack of Anthem, one of the US’s largest healthcare companies.77

The same attack was separately linked to the MSS by another cybersecurity firm.78 The MSS recruits hackers from top universities such as Harbin Institute of Technology, Beijing University of Posts and Telecommunications and Zhejiang University.79

The Ministry of Public Security (MPS), China’s police agency, is also building links with civilian universities. The China Defence Universities Tracker includes entries on several universities that operate joint laboratories with the MPS. Those laboratories carry out computer science and artificial intelligence research to assist the MPS’s policing capabilities. The ministry’s pivotal role in the abuse of ethnic minorities, religious groups and political dissidents makes it nearly impossible to separate legitimate and illegitimate uses of that research.

The overseas expansion of China’s nuclear weapons program and defence industry

Employees of military aircraft manufacturer AVIC graduate from Cranfield University in 2013.

Source: Zhang Xinguo, ‘Cooperation progress between AVIC & UK universities’, Aviation Industry Corporation of China, 5 May 2016, online.

China’s nuclear weapons program and defence industry have expanded their presence in foreign universities. State-owned defence industry conglomerates have established joint research and training programs in Austria, Australia, the UK, France, Germany and Switzerland. Scientists from China’s nuclear weapons program have been identified in universities across developed countries.

Defence industry

At least four of China’s 12 state-owned defence industry conglomerates (defence state-owned enterprises, or defence SOEs) have a substantial presence in overseas universities. Their work covers military electronics, aviation technology and missiles. These companies seek to increase their access to world-class training, expertise and technology through exchanges and joint laboratories with foreign universities (Table 1). Many of the collaborations involve organisations that are subject to export restrictions by the US Government, raising concerns about the effect they may have on military technology and human rights violations in China.

Table 1: Defence SOE joint laboratories or major investments in foreign universities

AECC = Aero Engine Corporation of China; AVIC = Aviation Industry Corporation of China; BIAM = Beijing Institute for Aeronautical Materials; CALT = China Academy of Launch Vehicle Technology; CETC = China Electronics Technology Group Corporation; COMAC = Commercial Aircraft Corporation of China.

a: Victorian Department of Premier and Cabinet, ‘New hi-tech deal great for Victorian jobs’, media release, 24 October 2019, online.
b: Monash University, ‘Monash University and Commercial Aircraft Corporation of China sign MOU to accelerate aircraft development’, media release, 16 May 2017, online.
c: University of Technology Sydney, ‘New joint IET research centre with CETC’, media release, 26 April 2017, online.
d: University of Manchester, ‘Partnership with the Aero Engine Corporation of China’, media release, no date, online; BIAM – Manchester UTC, About us, no date, online.
e: BIAM – Manchester UTC, Research, no date, online.
f: University of Manchester Aerospace Research Institute, Sino-British Joint Laboratory on Advanced Control Systems Technology, no date, online.
g: China Academy of Launch Vehicle Technology (CALT), Sino-British Advanced Control System Technology Joint Laboratory, 14 May 2016, online (in Chinese).
h: University of Manchester Aerospace Research Institute, Our research, no date, online.
i: CALT, The Rocket Institute has built 4 overseas R&D institutions, 13 May 2016, online.
j: The University of Birmingham is listed as the coordinator of the EMUSIC project. See EMUSIC, Participants, no date, online.
k: EMUSIC, Efficient Manufacturing for Aerospace Components Using Additive Manufacturing, Net Shape HIP and Investment Casting (EMUSIC), no date, online.
l: EMUSIC, EMUSIC mid-term report shows progress being made on improving manufacturing efficiency, 16 January 2018, online.
m: BIAM is a consortium member of EMUSIC. BIAM representatives are listed as project coordinators with members of the University of Birmingham, which is the university that leads the EMUSIC program. See EMUSIC, Contact us, no date, online; EMUSIC, Participants, online; European Commission, ‘Efficient Manufacturing for Aerospace Components using Additive Manufacturing, Net Shape HIP and Investment Casting’, Cordis, no date, online; EMUSIC, ‘Efficient Manufacturing for Aerospace Components Using Additive Manufacturing, Net Shape HIP and Investment Casting’, TRIMIS, no date, online; ‘Efficient Manufacturing for Aerospace Components Using Additive Manufacturing, Net Shape HIP and Investment Casting’, Cimne.com, no date, online.
n: EMUSIC, Efficient Manufacturing for Aerospace Components Using Additive Manufacturing, Net Shape HIP and Investment Casting (EMUSIC).
o: Department of European Affairs, ‘Zhongao Electronic Technology Innovation Center was established in Graz’, news release, Ministry of Commerce, PRC Government, 4 December 2015, online (in Chinese).
p: Das Land Steiermark, ‘Chinese IT giant is becoming a global player from Graz’, news release, 2 November 2016, online (in German).
q: European Sustainable Energy Innovation Alliance, ‘Cooperation with CETC on the internet of things and new energies’, news release, 21 October 2014, online.
r: CALT, Sino-British Joint Laboratory of Advanced Structures and Manufacturing Technology, 14 May 2016, online (in Chinese); University of Exeter, ‘Annual review 2015’, Issue, 5, online.
s: ‘Versarien PLC: Term sheet with Beijing Institute of Graphene Tech’, Financial Times, 15 April 2019, online.
t: University of Manchester, Partnership with the Aero Engine Corporation of China, no date, online.
u: CALT, The Rocket Institute has built 4 overseas R&D institutions; CALVT, Artificial assisted heart overseas research and development institutions, 14 May 2016, online (in Chinese).
v: CALT, The Rocket Institute has built 4 overseas R&D institutions.
w: CALT, Artificial assisted heart overseas research and development institutions.
x: CALT, The Rocket Institute has built 4 overseas R&D institutions; CALVT, Artificial assisted heart overseas research and development institutions.
y: Imperial College London, AVIC Centre for Structural Design and Manufacture, no date, online.
z: University of Strathclyde, Space Mechatronic Systems Technology (SMeSTech) Laboratory, no date, online.
aa: University of Nottingham, ‘Chinese aerospace business funds £3m University Innovation Centre’, media release, August 2012, online.
bb: University of Nottingham, Composites Research Group, no date, online.
cc: The centre was administered by AVIC before the creation of AECC in August 2016 and was called the ‘AVIC Centre for Materials Characterisation, Processing and Modelling’. A formal change of name took place on 12 July 2017. See Imperial College London, AVIC Centre, no date, online; Imperial College London, BIAM – Imperial Centre for Materials Characterisation, Processing and Modelling, Visit of BIAM delegation (31 October 2018), online; Imperial College London, BIAM – Imperial Centre for Materials Characterisation, Processing and Modelling, Events, no date, online.
dd: Imperial College London, BIAM – Imperial Centre for Materials Characterisation, Processing and Modelling, Visit of BIAM delegation (31 October 2018), online.
ee: The centre was administered by AVIC before the creation of AECC in August 2016 and was called the ‘AVIC Centre for Materials Characterisation, Processing and Modelling’. A formal change of name took place on 12 July 2017. See Imperial  College London, AVIC Centre, no date, online; Imperial College London, BIAM – Imperial Centre for Materials Characterisation, Processing and Modelling, Visit of BIAM delegation, 31 October 2018, online; Imperial College London, BIAM – Imperial Centre for Materials Characterisation, Processing and Modelling, Events, no date, online.
ff: Imperial College London, BIAM – Imperial Centre for Materials Characterisation, Processing and Modelling, no date, online.
gg: Imperial College London, BIAM – Imperial Centre for Materials Characterisation, Processing and Modelling, Projects, no date, online.

Missile technology

The China Aerospace Science and Technology Corporation (CASC) and China Aerospace Science and Industry Corporation (CASIC) are the Chinese military’s leading suppliers of missiles, carrier rockets and satellites.80 The conglomerates claim to send dozens of scientists abroad every year to train in countries that include Australia, France, Italy, Japan, Russia, Ukraine, the UK and the US.81

CASC has a significant overseas presence through its subsidiary China Academy of Launch Vehicle Technology (CALT), which develops space launch vehicles and intercontinental ballistic missiles.82 CALVT operates six joint labs in Europe and the UK that do research in areas such as additive manufacturing, aerospace materials and control systems.83

CALT scientists sent to work in its overseas labs are often involved in research on subjects such as hypersonic vehicles, missiles and heat-resistant aerospace materials.84 For example, Wang Huixia, who visited a CALVT joint lab at the University of Manchester in 2018,85 has published on missile flight simulation and missile countermeasures.86

CALT has a record of funding civilian technology with dual-use applications for missile systems. In 2013, it set up an ‘artificial assisted heart overseas research and development institution’ in collaboration with Germany’s RWTH Aachen University and Switzerland’s Northwestern University of Applied Sciences.87 State-owned news agency Xinhua noted in an article on CALT that the technology in artificial hearts is very similar to that in missile control systems.88

Aviation technology

The Aero Engine Corporation of China (AECC) and the Aviation Industry Corporation of China (AVIC) are the primary suppliers of aviation technology to the PLA. AECC develops aircraft engines, while AVIC enjoys a monopoly in the supply of military aircraft to the PLA.89

Both AECC and AVIC have expanded their relationships with foreign universities by establishing joint laboratories, training programs and partnerships in Europe.90

AECC was established to develop China’s own aircraft engine supply chain.91 China’s military aircraft have long depended on other nations’ jet turbine technology, so the CCP hopes to build indigenous capabilities in this area, which may be advanced by its joint labs. An AECC subsidiary, the Beijing Institute for Aeronautical Materials (BIAM), operates three joint laboratories in the UK—two at the University of Manchester and a third at Imperial College London.92 All three labs study aerospace applications of materials such as graphene.93

AVIC has established two joint labs with the UK’s Imperial College London and the University of Nottingham.94 Its lab at Imperial College London focuses on topics related to aircraft design and manufacturing, such as ultralight aviation components and metal forming techniques.95 The lab is headed by a participant in the Chinese Government’s Thousand Talents Plan (a controversial scheme to recruit scientists from abroad), who explained that the university’s collaboration with Chinese companies can help them become ‘technology leaders’.96

The Commercial Aircraft Corporation of China (COMAC), which is described as a defence industry conglomerate by the Chinese Government’s Ministry of Industry and Information Technology, has also expanded its ties with foreign universities.97 Monash University entered into a memorandum of understanding with COMAC in 2017, agreeing to host COMAC researchers and conduct collaborative research on aerospace materials.98 Through this partnership, the university supplied components for COMAC’s flagship aircraft, the C919, which many China analysts believe could be converted into a military surveillance aircraft.99

China’s defence aviation companies are also building ties in Europe and Australia through research collaboration and training programs. More than 700 AVIC engineers and managers have been sent to train at British, Dutch and French universities in the past 10 years.100 By 2020, the conglomerate plans to send a total of 1,200 of its researchers to study at institutions including Cranfield University, the University of Nottingham and the Institut Aéronautique et Spatial in France.101 In 2016, the Australian Research Council awarded A$400,000 to a joint project by the University of Adelaide and AECC on ‘superior rubber-based materials’.102

Military electronics

China Electronics Technology Group Corporation (CETC) is China’s leading manufacturer of military electronics such as radars and drone swarms. The conglomerate is a leading supplier of integrated surveillance systems, facial recognition cameras and mobile applications that have been linked to human rights abuses in Xinjiang.103 Hikvision, a major manufacturer of security cameras, is part of CETC’s stable of subsidiaries.

Since 2014, CETC has expanded its relationships with foreign universities, establishing joint laboratories in Europe and Australia. Its partnership and joint laboratory with Graz University of Technology in Austria, covering electronic information technology, laid the foundations for the establishment of its European headquarters in Graz.104

CETC’s relationship with the University of Technology Sydney (UTS) has attracted significant media scrutiny.105 The two began discussing a formal partnership in 2014 and agreed to establish a joint centre on information and electronics technologies by 2017.106 The centre was originally poised to receive up to A$20 million in funding from CETC over five years. Aside from its research on artificial intelligence, quantum information and big data, the centre was also set up as a training centre for CETC staff.

The partnership is still ongoing after a review in 2019, but UTS reportedly abandoned three of its joint projects with CETC after Australia’s Department of Defence raised concerns.107 Commentators have also drawn attention to the potential for UTS’s collaboration with CETC on ‘public security video analysis’ to contribute to human rights abuses in Xinjiang.108

Nuclear weapons program

The Chinese Academy of Engineering Physics (CAEP) is responsible for research into and the development and manufacturing of China’s nuclear weapons.109 It’s also involved in developing lasers, directed-energy weapons and conventional weapons.110

CAEP is expanding its international presence in order to attract leading talent to assist China’s development of nuclear weapons. Since 2000, CAEP researchers have published more than 1,500 papers with foreign co-authors.

In 2012, CAEP established the Center for High Pressure Science and Technology Advanced Research (HPSTAR) to better leverage foreign talent.111 The Beijing-based centre claims that it’s ‘committed to science without borders’ and uses English as its official language but doesn’t mention on its English-language website that it’s affiliated with CAEP. HPSTAR is run by a Taiwanese-American scientist who was recruited in 2012 through the Chinese Government’s Thousand Talents Plan—a scientific talent recruitment program that CAEP has used to hire at least 57 scientists from abroad.112

CAEP also sends large numbers of its employees to study abroad. In 2015, one of the academy’s officials claimed that hundreds of young CAEP researchers are sent to study abroad every year, which has ‘had clear results for building up young talents’.113

For example, Zhou Tingting, a researcher at CAEP’s Institute of Applied Physics and Computational Mathematics, recently worked as a visiting scholar at Caltech University’s Materials and Process Simulation Center in the US. The institute specialises in design and simulation computation for nuclear warheads and has been involved in at least two espionage cases. It’s been included on the US Government’s Entity List since 1997.114 While at Caltech, Zhou published research on polymer-bonded explosives that was funded by the US Office of Naval Research. Polymer-bonded explosives are used to detonate the cores of nuclear warheads.115

Zhou’s background also illustrates how China’s civilian universities serve as feeder schools for the nuclear weapons program. Before joining CAEP, Zhou studied at Beijing Institute of Technology—one of the Seven Sons of National Defence. As a student, she also visited the same Caltech centre to carry out research on explosives. Her supervisor at the Beijing Institute of Technology was an adviser to the PLA and the government on warheads and hypersonic vehicles.116

Figure 3: China’s twelve Defence Industry Conglomerates

Areas for further research

While the China Defence Universities Tracker includes entries for roughly 160 universities, companies and research institutes, it’s far from comprehensive. We intend to update and expand the tracker when that’s possible. In particular, there’s room for further research on the Chinese Academy of Sciences and its dozens of subordinate research institutes. Twelve of China’s defence conglomerates are included in the database, but their hundreds if not thousands of subsidiaries haven’t been publicly catalogued.

Nor have private companies and other major suppliers of equipment to the military and security apparatus been included in this project. Further research on the role of universities in supporting state surveillance and on companies that develop surveillance technology used in human rights abuses would be valuable.

Engaging with research partners in China

Better managing engagement with research partners in China will help ensure that collaborations align with Australia’s values and interests. A deeper understanding of PRC universities and the CCP will strengthen this engagement. Engagement should be built on robust risk management efforts, rather than on efforts to, on the one hand, cut out or, on the other hand, uncritically embrace interactions with PRC entities. Effective risk management won’t prevent collaboration between Australian universities and China. It won’t affect the vast majority of Chinese students studying in Australia.

Due diligence on research collaboration or visiting scholars and students should primarily take into account:

  • the nature of the engagement, such as the potential uses of a technology
  • the nature of the foreign partner.

University researchers are generally well placed to understand the nature of a technology and different ways a technology could be applied. This, in part, has led to a disproportionate focus on whether or not technologies have military or security applications; that is, whether they’re ‘dual-use’ technologies.

However, it appears that universities have insufficient expertise, resources and processes for understanding foreign research partners. Universities and researchers won’t be able to effectively scrutinise research collaborations without building better understanding of research partners. They should avoid collaborations with Chinese institutions on technologies that are also defence research areas for those institutions or could contribute to human rights abuses. Furthermore, some technology specialists aren’t used to considering ethics, values and security as a standard procedure when carrying out their research. The argument that research that leads to published papers is not of concern doesn’t consider the range of ways in which research, training and expertise can be misused by foreign partners.

Universities should set the bar higher than compliance with the law. As important civil society institutions, they should embody liberal values, especially in their interactions with overseas partners. As recipients of large amounts of public funding, they have an obligation to avoid recklessly harming human rights or national security, such as by training scientists from nuclear weapons programs or working with suppliers of surveillance technology used in Xinjiang. Universities should approach research collaboration as a way to promote ethical compliance, integrity and academic freedom rather than allowing collaborations to compromise their commitment to those values.

Recommendations for universities

1. Assess the situation.

  • Revisit existing collaborations, commissioning independent due diligence of concerning ones.
  • Review existing mechanisms for supervising collaborations and partnerships.
  • Apply particular scrutiny to engagement with high risk entities identified in the China Defence Universities Tracker.

2. Build capacity.

  • Establish an independent research integrity office:
    • The office should report directly to the vice chancellor.
    • It should be resourced to carry out due diligence and compliance work and be able to do country-specific research.
    • It should write annual reviews of research integrity in the university.
    • It should serve as an interface between security agencies and the university.
  • University research integrity offices or relevant staff members should form a working group across the university sector to share information and discuss threats.
  • Dedicate greater resources to due diligence and compliance work, including linguistic and country-specific capabilities.

3. Build a culture of proactive awareness of risks.

  • Hold briefings that are open to all staff on China, research collaboration and security by the government, university due diligence staff and scholars.
  • Encourage researchers to consider unwanted outcomes of research collaborations, such as contributions to human rights abuses.
  • Encourage researchers to consult the China Defence Universities Tracker when they’re considering collaboration or applications from visiting scholars and students.

4. Develop better systems for managing engagement with China.

  • Create general guidelines for informal and formal collaboration with PRC entities.
  • In all agreements with PRC entities, introduce clauses on ethics, academic freedom and security with provisions to immediately terminate partnerships if they’re breached.
  • Establish a travel database for staff that’s accessible to university executives and research contract, due diligence and research integrity staff.
  • Refine the approval process for collaborations with foreign entities:
    • Collaborations should consider risks to the national interest, national security, intellectual property, reputation and human rights.
    • The China Defence Universities Tracker should be used to inform decisions. Universities should avoid collaborating with Chinese institutions on technologies that are also defence research areas for those institutions.
  • Develop a policy on collaboration with foreign militaries, security agencies and defence companies
  • Use the China Defence Universities Tracker to improve the vetting of visiting scholars and students.
    • Visitors from the PLA, defence conglomerates or other high risk entities should be subject to greater scrutiny in light of their defence and security links.

5. Ensure the implementation of supervisory systems.

  • Enforce contracts and policies on conflicts of interest and external employment.
  • Introduce annual reviews of engagement with China and the management of research collaborations.
  • Introduce annual reviews of research integrity across the university.

Recommendations for the Australian Government

1. Increase and refine the allocation of government research funding, strengthening the government’s ability to encourage universities to better manage research collaboration.

  • In general, the government should seek to ensure that its research funding is being used in ways that align with Australia’s values, needs and national interests.
  • Federal funding agencies such as the Australian Research Council and the Defence Science and Technology Group should use the China Defence Universities Tracker to help investigate and consider the foreign military or security links of current and future funding recipients.
  • Federal funding agencies should ensure disclosure of conflicts of interest by grant application assessors.
  • Federal funding agencies should ensure that its policies on conflicts of interest and external employment are being followed by grant recipients.

2. Issue clear and public guidance to universities on specific areas of research with important security, economic or human rights implications that should be protected from unsupervised technology transfer.

  • The University Foreign Interference Taskforce could serve as a platform to begin developing this guidance in consultation with university representatives.

3. Reform the Defence Trade Controls Act 2012, developing solutions to the Act’s failure to control technology transfer to foreign nationals and foreign military personnel in Australia.
 

4. The Australian Federal Police and Department of Defence should enforce the Weapons of Mass Destruction (Prevention of Proliferation) Act 1995, which restricts the provision of services to assist weapons of mass destruction programs.

5. The Department of Home Affairs should incorporate the China Defence Universities Tracker into its screening of visa applicants.

  • PLA officers, PRC defence conglomerate employees and members of PRC security agencies should by default not be given visas if they intend to study dual-use technology in Australia.
  • The military and security links of university researchers, particularly those from universities whose government links have been identified in the China Defence Universities Tracker, should be scrutinised.

6. Establish a national research integrity office.

  • Its remit should cover universities, the Commonwealth Scientific and Industrial Research Organisation, medical research institutes and any other recipients of government research funding
  • It should be mandated to produce public reports evaluating efforts to ensure research integrity across the higher education sector
  • It should be empowered to carry out investigations into research integrity
  • It should produce annual reports on research integrity across Australia
  • It should report to the Education Minister
  • It should conduct outreach to universities and researchers and consult them on the development of research integrity guidelines

7. Encourage the establishment of independent research integrity offices in universities.

  • The government should introduce a start-up funding program for universities seeking to establish independent research integrity offices.

8. Create an annual meeting of education ministers from Five Eyes countries to deepen research collaboration within the alliance and coordinate on research security.

9. Work with Five Eyes partners to establish a joint centre on managing sensitive technologies.

  • It should be resourced to monitor and assess the full course of China’s technology transfer activity, tracking China’s technology priorities and efforts to exploit resources in Five Eyes countries in service of those priorities.
  • It should identify where research on sensitive technologies is being carried out within Five Eyes countries and coordinate both innovation and security efforts.

10. The National Intelligence Community should increase resourcing for efforts to study China’s technology priorities and technology transfer efforts.

Appendix: Universities supervised by SASTIND

  • Anhui University
  • Beijing University of Chemical Technology
  • Central South University
  • Changchun University of Science and Technology
  • Chongqing University
  • Dalian University of Technology
  • East China University of Technology
  • Fuzhou University
  • Guilin University of Electronic Technology
  • Hangzhou Dianzi University
  • Harbin University of Science and Technology
  • Hebei University
  • Hebei University of Science and Technology
  • Hefei University of Technology
  • Heilongjiang Institute of Technology
  • Heilongjiang University
  • Henan University of Science and Technology
  • Huazhong University of Science and Technology
  • Hunan University
  • Hunan University of Science and Technology
  • Jiangsu University of Science and Technology
  • Jilin University
  • Kunming University of Science and Technology
  • Lanzhou University
  • Lanzhou University of Technology
  • Nanchang Hangkong University
  • Nanjing Tech University
  • Nanjing University
  • North China Institute of Aerospace Engineering
  • North China University of Science and Technology
  • North University of China
  • Peking University
  • Shandong University
  • Shandong University of Technology
  • Shanghai Jiaotong University
  • Shanghai University
  • Shenyang Aerospace University
  • Shenyang Ligong University
  • Shijiazhuang Tiedao University
  • Sichuan University
  • Soochow University
  • South China University of Technology
  • Southeast University
  • Southwest University of Science and Technology
  • Sun Yat-Sen University
  • Tianjin Polytechnic University
  • Tianjin University
  • Tsinghua University
  • University of Electronic Science and Technology of China
  • University of Science and Technology Beijing
  • University of Shanghai for Science and Technology
  • University of South China
  • Wuhan Institute of Technology
  • Wuhan University
  • Xi’an Jiaotong University
  • Xi’an Technological University
  • Xiamen University
  • Xiangtan University
  • Xidian University
  • Yanshan University
  • Zhejiang University

Acknowledgements

The author would like to thank Charlie Lyons Jones for his contributions. He would like to thank Fergus Hanson, Michael Shoebridge, Danielle Cave, Audrey Fritz, John Garnaut, Luca Biason and Jichang Lulu for their insights. He would also like to thank the analysts who helped build the China Defence Universities Tracker: Elsa Kania, Audrey Fritz, Charlie Lyons Jones, Samantha Hoffman and others.

What is ASPI?

The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally.

ASPI International Cyber Policy Centre

ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy. The ICPC informs public debate and supports sound public policy by producing original empirical research, bringing together researchers with diverse expertise, often working together in teams.

To develop capability in Australia and our region, the ICPC has a capacity building team that conducts workshops, training programs and large-scale exercises both in Australia and overseas for both the public and private sectors. The ICPC enriches the national debate on cyber and strategic policy by running an international visits program that brings leading experts to Australia.

The work of ICPC would be impossible without the financial support of our partners and sponsors across government, industry and civil society. ASPI is grateful to the US State Department for providing funding for this research project.

Important disclaimer

This publication is designed to provide accurate and authoritative information in relation to the subject matter covered. It is provided with the understanding that the publisher is not engaged in rendering any form of professional or other advice or services. No person should rely on the contents of this publication without first obtaining advice from a qualified professional.

© The Australian Strategic Policy Institute Limited 2019

This publication is subject to copyright. Except as permitted under the Copyright Act 1968, no part of it may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Enquiries should be addressed to the publishers. Notwithstanding the above, educational institutions (including schools, independent colleges, universities and TAFEs) are granted permission to make copies of copyrighted works strictly for educational purposes without explicit permission from ASPI and free of charge.

  1. The China Defence Universities Tracker was developed by a team of analysts at ASPI’s International Cyber Policy Centre including Alex Joske, Charlie Lyons Jones, Dr Samantha Hoffman, Elsa Kania and Audrey Fritz. ↩︎
  2. University Foreign Interference Taskforce, Guidelines to counter foreign interference in the Australian university sector, Department of Education, Australian Government, November 2019, online. ↩︎
  3. Jun-min ronghe 军民融合 is officially translated as ‘civil–military fusion’ and sometimes as ‘civil–military integration’ or ‘military–civil integration’. However, ‘military–civil fusion’ preserves the original structure of the Chinese phrase, and ‘military–civil integration’ should be more accurately used as a translation of an earlier Chinese Government effort, jun-min jiehe 军民结合. See also Elsa Kania, Battlefield singularity: artificial intelligence, military revolution, and China’s future military power, Center for a New American Security, November 2017, endnote 9, online; Audrey Fritz, China’s evolving conception of civil–military collaboration, Center for Strategic and International Studies, 2 August 2019, online. ↩︎
  4. ‘军民融合发展委成立 军工板块再迎重磅利好’ [Military–civil fusion development commission established; the military–industrial bloc again welcomes great benefits], Xinhua, 23 January 2017, online. ↩︎
  5. ‘我国军民融合产业发展概况’ [The status of my country’s military–civil fusion industry development], China High Tech, 15 April 2019, online. ↩︎
  6. Lorand Laskai, Civil–military fusion: the missing link between China’s technological and military rise, Council on Foreign Relations, January 29, 2018, online. ↩︎
  7. 赵长禄 [Zhao Changlu], ‘大学应站在军民融合的前线’ [Universities should stand at the front line of military–civil fusion], The People’s Daily, 18 March 2017, online. ↩︎
  8. ‘做好军民融合背景下的高校保密工作’ [Doing university secrecy work in the context of military–civil fusion], National Administration of State Secrets Protection, 27 February 2018, online. ↩︎
  9. ‘2018中国双一流大学排行榜,87所跻身全国百强’ [2018 list of China’s double first‑class universities, 87 universities in the top 100 nationally], The People’s Daily, 27 December 2017, online. ↩︎
  10. ‘教育部 财政部 国家发展改革委印发 《关于高等学校加快’双一流’建设的 指导意见》的通知’ [Notice on the Ministry of Education, Ministry of Finance, National Development and Reform Commission releasing ‘Directions and thoughts on hastening the double first‑class development of higher education institutions], chsi.com, 27 August 2018, online. ↩︎
  11. Audrey Fritz, ‘University involvement in military–civilian fusion: the driving force behind achieving the Chinese Dream’, senior thesis submitted to the University of Chicago, 17 April 2019. ↩︎
  12. Alex Joske, Picking flowers, making honey: the Chinese military’s collaboration with foreign universities, ASPI, Canberra, October 2018, online. ↩︎

Engineering global consent: The Chinese Communist Party’s data-driven power expansion

The Chinese party-state engages in data collection on a massive scale as a means of generating information to enhance state security—and, crucially, the political security of the Chinese Communist Party (CCP)—across multiple domains. The party-state intends to shape, manage and control its global operating environment so that public sentiment is favourable to its own interests. The party’s interests are prioritised over simply the Chinese state’s interests or simply the Chinese people’s interests. The effort requires continuous expansion of the party’s power overseas because, according to its own articulation of its threat perceptions, external risks to its power are just as likely—if not more likely—to emerge from outside the People’s Republic of China’s (PRC) borders as from within.

This report explains how the party-state’s tech-enhanced authoritarianism is expanding globally. The effort doesn’t always involve distinctly coercive and overtly invasive technology, such as surveillance cameras. In fact, it often relies on technologies that provide useful services. Those services are designed to bring efficiency to everyday governance and convenience to everyday life. The problem is that it’s not only the customer deploying these technologies—notably those associated with ‘smart cities’, such as ‘internet of things’ (IoT) devices—that derives benefit from their use. Whoever has the opportunity to access the data a product generates and collects can derive value from the data. How the data is processed, and then used, depends on the intent of the actor processing it.

Mapping China’s Tech Giants

This report accompanies the Mapping China’s Tech Giants website.

This is our first report on the topic – updated reports are also available; 

Executive summary

Chinese technology companies are becoming increasingly important and dynamic actors on the world stage. They’re making important contributions in a range of areas, from cutting-edge research to connectivity for developing countries, but their growing influence also brings a range of strategic considerations. The close relationship between these companies and the Chinese Communist Party (CCP) raises concerns about whether they may be being used to further the CCP’s strategic and geopolitical interests.

The CCP has made no secret about its intentions to export its vision for the global internet. Officials from the Cyber Administration of China have written about the need to develop controls so that ‘the party’s ideas always become the strongest voice in cyberspace.’1 This includes enhancing the ‘global influence of internet companies like Alibaba, Tencent, Baidu [and] Huawei’ and striving ‘to push China’s proposition of internet governance toward becoming an international consensus’.

Given the explicitly stated goals of the CCP, and given that China’s internet and technology companies have been reported to have the highest proportion of internal CCP party committees within the business sector,2 it’s clear these companies are not purely commercial actors.

ASPI’s International Cyber Policy Centre has created a public database to map the global expansion of 12 key Chinese technology companies. The aim is to promote a more informed debate about the growth of China’s tech giants and to highlight areas where this expansion is leading to political and geostrategic dilemmas. It’s a tool for journalists, researchers, policymakers and others to use to understand the enormous scale and complexity of China’s tech companies’ global reach.

The dataset is inevitably incomplete, and we invite interested users to help make it more comprehensive by submitting new data through the online platform.

Our research maps and tracks:

  • 17,000+ data points that have helped to geo-locate 1700+ points of overseas presence for these 12 companies;
  • 404 University and research partnerships including 195+ Huawei Seeds for the Future university partnerships;
  • 75 ‘Smart City’ or ‘Public Security Solution’ projects, most of which are in Europe, South America and Africa;
  • 52 5G initiatives, across 34 countries;
  • 119 R&D labs, the greatest concentration of which are in Europe;
  • 56 undersea cables, 31 leased cable and 17 terrestrial cables;
  • 202 data centres and 305 telecommunications & ICT projects spread across the world.

Introduction

China’s technology, internet and telecommunications companies are among the world’s largest and most innovative. They’re highly competitive, and many are leaders in research and development.

They’ve played a central role in bringing the benefits of modern technology to hundreds of millions of people, particularly in the developing world.

As a function of their increasingly global scale and scope, China’s tech giants can exert increasing levels of influence over industries and governments around the world. The close relationship between Chinese companies and the Chinese Communist Party (CCP) means that the expansion of China’s tech giants is about more than commerce.

A key research question includes: What are the geostrategic, political and human rights implications of this expansion? By mapping the global expansion of 12 of China’s largest and most influential technology companies, across a range of sectors, this project contributes new data and analysis to help answer such questions.

All Chinese companies are subject to China’s increasingly stringent security, intelligence, counter-espionage and cybersecurity laws.3 That includes, for example, requirements in the CCP constitution4 for any enterprise with three or more full party members to host internal party committees, a clause in the Company Law5 that requires companies to provide for party activity to take place, and a requirement in the National Intelligence Law to cooperate in and conceal involvement in intelligence work.6

Several of the companies included in this research are also directly complicit in human rights abuses in China, including the reported detention of up to 1.5 million Uyghur Muslims in Xinjiang.7 From communications monitoring to facial recognition that enables precise and pervasive surveillance, advanced technology – from these and other companies – is crucial to the increasingly inescapable surveillance net that the CCP has created for some Chinese citizens.

Every year since 2015, China has ranked last in the annual Freedom on the Net Index.8 The CCP has made no secret of its desire to export its concepts of internet and information ‘sovereignty’,9 as well as cyber censorship,10 around the world.11 Consistent with that directive, this research shows that Chinese companies are playing a role in aiding surveillance and providing sophisticated public security technologies and expertise to authoritarian regimes and developing countries that face challenges to their political stability, governance and rule of law.

In conducting this research, ASPI’s International Cyber Policy Centre (ICPC) has used open-source information in English and Chinese to track the international operations and investments of12 major Chinese technology companies: Huawei, ZTE, Tencent, Baidu, China Electronics Technology Group Corporation (CETC), Alibaba, China Mobile, China Telecom, China Unicom, Wuxi, Hikvision and BGI.

This research has been compiled in an online database that ICPC is making freely accessible to the public. While it contains more than 1,700 projects and more than 17,000 data points, it’s not exhaustive. We welcome and encourage members of the public to help us make this dataset more complete by submitting data via the website.

The database

Throughout 2018, ICPC received frequent questions from media and stakeholders about the international activities of Chinese technology companies; for example, about Huawei’s operations in particular regions or how widespread the use of Baidu or WeChat is outside of China.

These were always difficult questions to answer, as there’s a lack of publicly available quantitative and qualitative data, and some of these companies disclose little in the way of policies that affect data, security, privacy, freedom of expression and censorship. What information is available is spread across a wide range of sources and hasn’t been compiled. In-depth analysis of the available sources also requires Chinese-language capabilities, an understanding of Chinese state financing structures, and the use of internet archiving services as web pages are moved, altered or even deleted.

A further impediment to transparency is that Chinese media are under increasing control from the CCP and publish few investigative reports, which severely limits the available pool of media sources. The global expansion and influence of US internet companies, particularly Facebook, for example, has rightly received substantial attention and scrutiny over the past few years. Much of that scrutiny has come from, and will continue to come from, independent media, academia and civil society.

However, the same scrutiny is often lacking when it comes to Chinese tech and social media companies. The sheer capacity of China’s giant tech companies, their reach and influence, and the unique party-state environment that shapes, limits and drives their global behaviour set them apart from other large technology companies expanding around the world.

This project seeks to:

  1. Analyse the global expansion of a key sample of China’s tech giants by mapping their major points of overseas presence.
  2. Provide the public with an analysis of the governance structures and party-state politics from which those companies have emerged and with which they’re deeply entwined.

The data and map is available here: https://chinatechmap.aspi.org.au/

Methodology

To fill this research gap, ICPC sought to create an interactive global database to provide policymakers, academics, journalists, government officials and other interested readers with a more holistic picture of the increasingly global reach of China’s tech giants.

A complete mapping of all Chinese technology companies globally would be impossible within the confines of our research. ICPC has therefore selected 12 companies from across China’s telecommunications, technology, internet and biotech sectors:

  • Alibaba
  • Baidu
  • BGI
  • China Electronics Technology Group (CETC)
  • China Mobile
  • China Telecom
  • China Unicom
  • Hikvision (a subsidiary of CETC)
  • Huawei
  • Tencent
  • Wuxi
  • ZTE

This dataset will continue to be updated during 2019. This research relied on open-source information in English and Chinese. This has included company websites, corporate information, tenders, media reporting, databases and other public sources.

The size and complexity of these companies, and the speed at which they’re expanding, means this dataset will inevitably be incomplete. For that reason, we encourage researchers, journalists, experts and members of the public to contribute and submit data via the online platform in order to help make the dataset more complete over time.

China’s tech firms & the CCP

The CCP’s influence and reach into private companies has increased sharply over the past decade.

In 2006, 178,000 party committees had been established in private firms.12 By 2016, that number had increased sevenfold to approximately 1.3 million.13 Today, whether the companies, their leadership, and their employees like it or not, the CCP is present in private and public enterprise. Often the activity of party committees and party-building activity is linked to the CCP’s version of the concept of ‘corporate social responsibility’14—a concept that the party has explicitly politicised. For instance, in the publishing industry, corporate social responsibility includes political responsibility15 and protecting state security.16 Internet and technology companies are believed to have the highest proportion of CCP party committees in the private sector.17

This expanding influence and reach also extends to foreign companies. For example, by the end of 2016, the CCP’s Organisation Department claimed that 70% of China’s 100,000 foreign enterprises possessed party organisations.18 Expanding the party’s reach and role inside private enterprises appears to have been a priority since party chief Jiang Zemin’s ‘Three Represents’ policy, which opened party membership to businesspeople, became CCP doctrine in 2002.

All the companies mapped as a part of this project have party committees, party branches and party secretaries. For example, Alibaba has around 200 party branches;19 in 2017 it was reported that Tencent had 89 party branches;20 and Huawei has more than 300.21

Sometimes, the relevance and significance of the CCP’s presence within technology companies is dismissed or trivialised as merely equivalent to the presence of government relations or human resources departments in Western corporations. However, the CCP’s expectations of these committees is clear.22 The CCP’s constitution states that a party organisation ‘shall be formed in any enterprise … and any other primary-level work unit where there are three or more full party members’.23 Article 32 outlines their responsibilities, which include encouraging everyone in the company to ‘consciously resist unacceptable practices and resolutely fight against all violations of party discipline or state law’. Article 33 states that party committees inside state-owned enterprises are expected to ‘play a leadership role, set the right direction, keep in mind the big picture, ensure the implementation of party policies and principles, and discuss and decide on major issues of their enterprise in accordance with regulations’.24

The establishment and expansion of party committees in private enterprises appears to be one of the ways in which Beijing is trying to reduce financial risks and exercise control over the economy. Because entities ‘cannot be without the party’s voice’ and ‘must safeguard the state-owned assets and interests from damage’,25 the party committees are expected to weigh in on major decisions and policies, including the appointment and dismissal of important cadres, major project investment decisions and large-scale capital expenditures.26 

Although this guidance is longstanding practice in state-owned enterprises, it also appears to be taking root in private enterprises. Conducting a review of corporate disclosures in 2017, the Nikkei Asian Review identified 288 companies listed in China that ‘changed their articles of association to ensure management policy that reflects the party’s will’.27 In 2018, 26 publicly listed Chinese banks revised their articles of association to support party committees and the establishment of subordinate discipline inspection committees. Many of the revised articles reportedly include language requiring party consultation before major decisions are made.28

This control mechanism is explicit in the party’s vetting of business leaders. For example, although he’s not a party member, Baidu CEO Robin Li is a member of the Chinese People’s Political Consultative Conference, the country’s primary ‘united front’ body.29 The party conducts a comprehensive assessment of any of the business executives brought into official advisory bodies managed by the United Front Work Department, the Chinese People’s Political Consultative Conference and the National People’s Congress. Two of the four criteria – which relates to a business person’s political inclinations – include, their ‘ideological status and political performance’, as well as their fulfillment of social responsibilities. And second, their personal compliance with laws and regulations.30

Enabling & exporting digital authoritarianism

The crown jewel of Chinese foreign policy under Xi Jinping is the Belt and Road Initiative (BRI), which is to be a vast global network of infrastructure intended to enable the flow of trade, people and ideas between China and the rest of the world.31 Technology, under the banner of the Digital Silk Road, is a key component of this project.

China’s ambitions to influence the international development of technological norms and standards are openly acknowledged.32 The CCP recognises the threat posed by an open internet to its grip on power—and, conversely, the opportunities that dominance over global cyberspace could offer by extending that control.33

In a 2017 article published in one of the most important CCP journals, officials from the Cyber Administration of China (the top Chinese internet regulator) wrote about the need to develop controls so that ‘the party’s ideas always become the strongest voice in cyberspace.’34 This includes enhancing the ‘global influence of internet companies like Alibaba, Tencent, Baidu [and] Huawei’ and striving ‘to push China’s proposition of internet governance toward becoming an international consensus’.

Officials from the Cyberspace Administration of China have written that ‘cyberspace has become a new field of competition for global governance, and we must comprehensively strengthen international exchanges and cooperation in cyberspace, to push China’s proposition of Internet governance toward becoming an international consensus.’35 China’s technology companies are specifically referenced as a part of this effort: ‘The global influence of Internet companies like Alibaba, Tencent, Baidu, Huawei and others is on the rise.’36

Western technology firms have attracted heated criticism for making compromises in order to engage in the Chinese market, which often involves constraining free speech or potentially abetting human rights abuses.37 This attention is warranted and should continue. However, strangely, global consumers have so far been less critical of the Chinese firms that have developed and deployed sophisticated technologies that now underpin the CCP’s ability to control and suppress segments of China’s population38 and which can be exported to enable similar control of other populations.

The ‘China model’ of digitally enabled authoritarianism is spreading well beyond China’s borders. Increasingly, the use of technology for repression, censorship, internet shutdowns and the targeting of bloggers, journalists and human rights activists are becoming standard practices for non-democratic regimes around the world. 

In its 2018 Freedom on the net report, Freedom House singled out China as the worst abuser of human rights on the internet. The report also found that the Chinese Government is actively seeking to export its moral and ethical norms, expertise and repressive capabilities to other nations. In addition to the Chinese Government’s efforts, Freedom House specifically called out the role of the Chinese tech sector in facilitating the spread of digital repression. It found that Chinese companies:

have supplied telecommunications hardware, advanced facial-recognition technology, and data analytics tools to a variety of governments with poor human rights records, which could benefit Chinese intelligence services as well as repressive local authorities. Digital authoritarianism is being promoted as a way for governments to control their citizens through technology, inverting the concept of the internet as an engine of human liberation.39

Reporters Without Borders has also sounded the alarm over the involvement of Chinese technology companies in repressing free speech and undermining journalism. As part of an extensive report on the Chinese Government’s attempts to reshape the world’s media in its own image, it concluded that:

From consumer software apps to surveillance systems for governments, the products that China’s hi-tech companies try to export provide the regime with significant censorship and surveillance tools … In May 2018, the companies were enlisted into the China Federation of Internet Societies (CFIS), which is openly designed to promote the Chinese Communist Party’s presence within them. Chinese hi-tech has provided the regime with an exceptional influence and control tool, which it is now trying to extend beyond China’s borders.40

Pushing back against both the practices of digital authoritarianism and the norms and values that underpin such practices requires a clear-eyed understanding of the way they’re being spread. For example, a study of the BRI has found that the ways in which some BRI projects, including digital projects, are structured create serious concerns about the erosion of sovereignty for host nations, such as when a recipient government doesn’t have full control of the operations, management, digital infrastructure or data being generated through those projects.41

Sovereign governments are, of course, ultimately responsible for their actions. For some, particularly Western governments, this includes being transparent and accountable in their use of technology for surveillance and information control. And, if they aren’t, the media, civil society and the public have avenues to hold them to account. However, companies also have responsibilities in this space, which is why many sensitive and dual-use technologies are subject to export controls. The need for companies to be held accountable for how new technologies are used is particularly acute in developing countries, where the state may be less able or less willing to do so because of challenges arising from governance, legislative and regulatory capacity, transparency and corruption.

The following case studies have been selected as illustrations of the ways in which Chinese technology companies, often with funding from the Chinese Government, are aiding authoritarian regimes, undermining human rights and exerting political influence in regions around the world.

Surveillance cities: Huawei’s ‘smart cities’ projects

An important and understudied part of the global expansion of Chinese tech companies involves the proliferation of sophisticated surveillance technologies and ‘public security solutions’.42 Huawei is particularly dominant in this space, including in developing countries where advanced surveillance technologies are being introduced for the first time.

Through this research and as of April 2019, we have mapped 75 Smart City-Public Security projects, most of which involve Huawei.43 Those projects—which are often euphemistically referred to as ‘safe city’ projects—include the provision of surveillance cameras, command and control centres, facial and licence plate recognition technologies, data labs, intelligence fusion capabilities and portable rapid deployment systems for use in emergencies.

The growth of Huawei’s ‘public security solution’ projects has been rapid. For example, the company’s ‘Hisilicon’ chips reportedly make up 60% of chips used in the global security industry.44 In 2017, Huawei listed 40 countries where its smart-city technologies had been introduced;45 in 2018, that reach had reportedly more than doubled to 90 countries (including 230 cities). Because of a lack of detail or possible differences in definition, this project currently covers 43 countries.46

This research has found that, in many developing countries, exponential growth is being driven by loans provided by China Exim Bank (which is wholly owned by the Chinese Government).47 The loans, which must be paid back by recipients,48 are provided to foreign governments, and it’s been reported in academia and the media that the contractors used must be Chinese companies.49 In many of the examples examined, Huawei was awarded the primary contract; in some cases, the contract was managed by a Chinese state-owned enterprise and Huawei played a ‘sub-awardee’ role as a provider of surveillance equipment and services.50

Smart-city technologies can impart substantial benefits to states using them. For example, in Singapore, increased access to digital services and the use of technology that exploits the ‘internet of things’ (for traffic control, health care and video surveillance) has led to increased citizen mobility and productivity gains.51

However, in many cases, Huawei’s safe-city solutions focus on the introduction of new public security capabilities, including in countries such as Ecuador, Pakistan, the Philippines, Venezuela, Bolivia and Serbia. Many of those countries rank poorly, some very poorly, on measures of governance and stability, including the World Bank’s governance indicators of political stability, the absence of violence, the control of corruption and the rule of law.52

Of course, the introduction of new public security technologies may have made cities ‘safer’ from a crime prevention perspective, but, unsurprisingly, in some countries it’s created a range of political and capacity problems, including alleged corruption; missing money and opaque deals;53 operational and ongoing maintenance problems;54 and alleged national security concerns.55

Censorship and suppression: aiding authoritarianism in Zimbabwe

The example set by the Chinese state is increasingly being looked to by non-democratic regimes—and even some democratic governments—as proof that a free and open internet is neither necessary nor desirable for development. ‘If China could become a world power without a free Internet, why do African countries need a free internet?’ one unnamed African leader reportedly asked interviewers from the Department of Media Studies at the University of Witwatersrand.56 

The business dealings of Chinese technology companies in Zimbabwe, for example, are closely entwined with the CCP’s support for the country’s authoritarian regime. China is Zimbabwe’s largest source of foreign investment, partly as a result of sanctions imposed by Western countries over human rights violations by the regime. Zimbabwean President Emmerson Mnangagwa’s first visit outside of Africa after his election was to China, where he thanked President Xi Jinping and China for supporting Zimbabwe against Western sanctions and called for even deeper economic and technical cooperation between the two nations.57

Chinese companies play a central role in Zimbabwe’s telecommunications sector. Huawei has won numerous multimillion-dollar contracts with state-owned cellular network NetOne, some of which have been the subject of corruption allegations.58 Several of Huawei’s Zimbabwe projects have been financed through Chinese Government loans.59

ZTE also has a significant footprint in the country (and has also been the subject of corruption allegations).60 This has included a $500 million loan, in partnership with China Development Bank, to Zimbabwe’s largest telco, Econet, in 2015.61 ZTE has previously provided equipment, including radio base stations, for Econet’s 3G network.62 Zimbabwean telecommunications providers currently owe millions of dollars to Huawei and ZTE, as well as Ericsson, which reportedly led to network disruptions in March 2019.63

The CCP and Chinese companies haven’t just helped to cushion Zimbabwe’s leaders against the impact of sanctions. They’re also providing both a model and means for the regime’s authoritarian practices to be brought forward into the digital age, both online and offline.

The Zimbabwean Government has been considering draconian new laws to restrict social media since at least 2016, when the official regulator issued an ominous warning to internet users against ‘generating, passing on or sharing such abusive and subversive materials’.64 In the same year, a law was passed to allow authorities to seize devices in order to prevent people using social media.65

In early 2019, the government blocked social media and imposed internet shutdowns in response to protests against fuel price increases. Information Minister Energy Mutodi stated that ‘social media was used by criminals to organize themselves … this is why the government had to … block [the] internet,’ as he announced plans for forthcoming cybercrime laws to criminalise the use of social media to spread ‘falsehoods’.66

The government has openly been looking to China as a model for controlling social media,67 including by creating a cybersecurity ministry, which a spokesperson described as ‘like a trap used to catch rats’.68

Parts of this ‘trap’ reportedly come from China. In 2018, it was reported that China, alongside Russia and Iran, had been helping Zimbabwe to set up a facility to house a ‘sophisticated surveillance system’ sold to the government by ‘one of the largest telecommunications companies’ in China.69 Given the description and context, it seems plausible that this company may be Huawei or ZTE.

‘We have our means of seeing things these days, we just see things through our system. So no one can hide from us, in this country,’ said former Intelligence Minister Didymus Mutasa.70 

The government is increasingly looking to expand its surveillance from the online space into the real world. It’s signed multiple agreements with Chinese companies for physical surveillance systems, including a highly controversial planned national facial recognition system with Chinese company CloudWalk.71

It’s also interested in developing its own indigenous facial recognition technology, and is working with CETC subsidiary Hikvision to do it.72 Hikvision is already supplying surveillance cameras for police and traffic control systems.73 In 2018, Zimbabwean authorities signed a memorandum of understanding with the company to implement a ‘smart city’ program in Mutare. This included the donation of facial recognition terminals equipped with deep-learning artificial intelligence (AI) systems.

In a media statement, the government stated: 

The software is meant to be integrated with the facial recognition hardware which will be made locally by local developers in line with the government’s drive to grow the local ICT sector making Zimbabwe to be the number one country in Africa to spearhead the facial recognition surveillance and AI system nationwide in Zimbabwe.74

National ID programs: Venezuela’s ‘Fatherland Card’

Chinese tech companies are involved in national identity programs around the world. One of the most concerning examples is playing out amid the political and humanitarian crisis in Venezuela. A Reuters investigation in 2018 uncovered the central role played by ZTE in inspiring and implementing the Maduro regime’s ‘Fatherland Card’ program.75 The Fatherland Card (Carnet de la Patria) records the holder’s personal data, such as their birthday, family information, employment, income, property owned, medical history, state benefits received, presence on social media, membership of a political party and history of voting.

Although the card is technically voluntary, without it Venezuelans can be denied access to government-subsidised food, medication or gasoline.76 In the midst of Venezuela’s political crisis, registering for a ‘voluntary’ card is no choice at all for many. In fact, people in Caracas are queuing for hours to get hold of one, despite the risks of handing over personal data to the increasingly unstable and repressive Maduro regime.77

According to Reuters, ZTE was contracted by the government to build the underlying database and accompanying mobile payment system. A team of ZTE employees was embedded with Cantv, the Venezuelan state telecommunications company that manages the database, to help secure and monitor the system. ZTE has also helped to build a centralised government video surveillance system.

There are concerns that the card program is being used as a tool to interfere in the democratic process. During the 2018 elections, observers reported kiosks being set up near or even inside voting centres, where voters were encouraged to scan their cards to register for a ‘fatherland prize’.78 Those who did so later received text messages thanking them for voting for Maduro (although they never did get the promised prize).

Authorities claim that the cards record whether a person voted, but not whom they voted for. However, an organiser interviewed by Reuters claimed to have been instructed by government managers to tell voters that their votes could be tracked. Regardless of the truth of the matter, even the rumours that the government may be watching who votes for it—or, perhaps more pertinently, against it—could be expected to influence the way people vote.

In the context of the current crisis, this technologically enabled population control takes on an even sharper edge. Cyberspace has emerged as a key battleground in the struggle between the Maduro regime and the Venezuelan opposition led by Juan Guaidó.

In addition to selective social media blocks79 and total internet shutdowns,80 there’s also evidence of more insidious attacks. For example, a website set up by the opposition to coordinate humanitarian aid delivery was subject to a DNS hijacking attack, including the theft of the personal data of potentially thousands of pro-opposition volunteers.81

Cantv, Venezuela’s government-run telecommunications company, is reportedly ‘dependent on agreements with ZTE and Huawei to supply equipment and staff and … Cantv sends its employees to China to receive training.’82 These deals are financed through the Venezuela China Joint Fund. China is known as something of an international leader in DNS blocking and manipulation, and the Chinese Government is strongly supporting the Maduro regime, including by targeting social media users in China who post or share content critical of Maduro.83

Shaping politics and policy in Belarus

In some parts of the world, Chinese technology companies are helping shape the politics and policy of new technologies through the development of high-level relationships with national governments. This is particularly concerning in the case of non-democratic countries.

Often referred to as ‘Europe’s last dictatorship’, Belarus has been under the control of authoritarian strongman Aleksandr Lukashenko since 1994.84 In recent years, ties with China have come to play an increasingly significant role not only in Belarus’s delicate diplomatic relations with its powerful neighbours, but also in its very indelicate domestic policies of violent repression. This has included the use of digital technologies for mass surveillance and the targeted persecution of activists, journalists and political opponents.85

Huawei has been supplying video surveillance and analysis systems to the Lukashenko regime since 2011 and border monitoring equipment since at least 2014.86 Also in 2014, Huawei’s local subsidiary, Bel Huawei Technologies, launched two research labs for ‘intellectual remote surveillance systems’. Through the labs, Huawei provides ‘laboratory-based training … for the specialists of Promsvyaz, Beltelekom, HSCC and other organisations’.87

Over the past several years, collaboration between the Belarusian Government and Chinese technology companies has expanded rapidly, in line with Belarus’s engagement with the BRI and with deepening diplomatic and economic ties between Lukashenko’s regime and the CCP.88

In March 2019, Belarus unveiled a draft information security law. ‘It is purely our own product. We didn’t borrow it from anyone,’ State Secretary of the Security Council Stanislav Zas told Belarusian state media.89

A day later, China’s ambassador to Belarus spoke to the same outlet about how ‘Belarusian and Chinese companies [have] managed to establish intensive cooperation in the area of cyber and information security’, and about the desire of both countries to ‘expand cooperation in the sphere of cybersecurity’.90

‘Both countries have good practice in this field. We are going to even deeper cooperate [sic] and share experience,’ the Chinese ambassador said. 

Huawei has played an especially prominent role in this process at multiple levels. It has continued and expanded the training it provides to Belarusians, including sending students to study in China and signing an agreement with the Belarusian State Academy of Communications for a joint training centre.91

Huawei is also exerting political and policy influence. In May 2018, the company released its National ICT priorities for the Republic of Belarus.92 The proposal includes recommendations for ‘public safety’ technologies, such as video surveillance and drones, and a citizen status identification system.

‘Belarus has not yet widely deployed integrated police systems, and thus can refer to the solution adopted in Shenzhen,’ the document notes. This is likely to be a reference to the facial recognition program implemented by Shenzhen police to ‘crack down on jaywalking’.93

During a meeting with the chairman of Huawei’s board, Guo Ping, for the launch of the plan, then Belarusian Prime Minister Andrei Kobyakov expressed his hope that: the accumulated experience and prospects of cooperation will play an important role in the development of information and communication technologies in Belarus and in making friendship between our countries stronger. The Belarusian government counts on further effective interaction and professional cooperation.94

Controlling information flows—WeChat and the future of social messaging

Launched in 2011, WeChat quickly became China’s dominant social network but has largely struggled to build up a significant user base overseas. Still, of the social media super-app’s 1.08 billion monthly active users,95 an estimated 100–200 million are outside China.96

Southeast Asia provides the most fertile ground for WeChat outside of China: the app has 20 million users in Malaysia; 17% of the population of Thailand use it;97 and it’s the second most popular messaging app in Bhutan and Mongolia.98

The potential for WeChat to substantially grow its user base overseas remains, particularly as it hits a wall in user growth in China99 and overseas expansion becomes more of an imperative. To the extent that it’s being used outside of mainland China, WeChat poses significant risks as a channel for the dissemination of propaganda and as a tool of influence among the Chinese diaspora.

WeChat is increasingly used by politicians in liberal democracies to communicate with their ethnic Chinese voters, which necessarily means that communication is subject to CCP censorship by default.100

In one instance, in September 2017 Canadian parliamentarian Jenny Kwan posted a WeChat message of support for Hong Kong’s Umbrella Movement – a series of pro-democracy protests that took place in 2014 – only to have it censored by WeChat.101

In 2018, Canadian police received complaints about alleged vote buying taking place on WeChat.102 A group called the Canada Wenzhou Friendship Society was reportedly using the app to offer voters a $20 ‘transportation fee’ if they went to the polls and encouraging them to vote for specific candidates.

Because WeChat is one of the main conduits for Chinese-language news, censorship controls help Beijing to ensure that news sources using the app for distribution report only news that serves the CCP’s strategic objectives.103

WeChat is not only a significant influence and censorship tool for the CCP, but also has the potential to facilitate surveillance. An Amnesty International study ranking global instant messaging apps on how well they use encryption to protect online privacy gave WeChat a score of 0 out of 100.104 Content that passes through WeChat’s servers in China is accessible to the Chinese authorities by law.105

Enabling human rights abuses in China: Uyghurs in Xinjiang

Many of the repressive techniques and technologies that Chinese companies are implementing abroad have for a long time been used on Chinese citizens. In particular, the regions of Tibet and Xinjiang are often at the bleeding edge of China’s technological innovation.

The complicity of China’s tech giants in perpetrating or enabling human rights abuses—including the detention of an estimated 1.5 million Chinese citizens106 and foreign citizens107—foreshadows the values, expertise and capabilities that these companies are taking with them out into global markets. 

From the phones in people’s pockets to the tracking of 2.5 million people using facial recognition technology108 to the ‘re-education’ detention centres,109 Chinese technology companies—including several of the companies in our dataset—are deeply implicated in the ongoing surveillance, repression and persecution of Uyghurs and other Muslim ethnic minority communities in Xinjiang.

Many of the companies covered in this report collaborate with foreign universities on the same kinds of technologies they’re using to support surveillance and human rights abuses in China. For example, CETC—which has research partnerships with the University of Technology Sydney,110 the University of Manchester111 and the Graz Technical University in Austria112—and its subsidiary Hikvision are deeply implicated in the crackdown on Uyghurs in Xinjiang. CETC has been providing police in Xinjiang with a centralised policing system that draws in data from a vast array of sources, such as facial recognition cameras and databases of personal information. The data is used to support a ‘predictive policing’ program, which according to Human Rights Watch is being used as a pretext to arbitrarily detain innocent people.113 CETC has also reportedly implemented a facial recognition project that alerts authorities when villagers from Muslim-dominated regions move outside of prescribed areas, effectively confining them to their homes and workplaces.114

Huawei provides the Xinjiang Public Security Bureau with technical support and training.115 At the same time, it has funded more than 1,200 university research projects and built close ties to many of the world’s top research institutions.116 The company’s work with Xinjiang’s public security apparatus also includes providing a modular data centre for the Public Security Bureau of Aksu Prefecture in Xinjiang and a public security cloud solution in Karamay. In early 2018, the company launched an ‘intelligent security’ innovation lab in collaboration with the Public Security Bureau in Urumqi.117

According to reporting, Huawei is providing Xinjiang’s police with technical expertise, support and digital services to ensure ‘Xinjiang’s social stability and long-term security’. 

Hikvision took on hundreds of millions of dollars worth of security-related contracts in Xinjiang in 2017 alone, including a ‘social prevention and control system’ and a program implementing facial-recognition surveillance on mosques.118 Under the contract, the company is providing 35,000 cameras to monitor streets, schools and 967 mosques, including video conferencing systems that are being used to ‘ensure that imams stick to a “unified” government script’.119 

Most concerningly of all, Hikvision is also providing equipment and services directly to re-education camps. It has won contracts with at least two counties (Moyu120 and Pishan121) to provide panoramic cameras and surveillance systems within camps.

Future strategic implications

The degree to which nations and communities around the world are coming to rely on Chinese technology companies for critical services and infrastructure, from laying cables to governing their cities, has significant strategic implications both now and for many years into the future:

  • Undermining democracy: Perhaps the greatest long-term strategic concern is the role of Chinese technology companies – and technology companies from other countries that aid or engage in similar behaviour – in enabling authoritarianism in the digital age, from supplying surveillance technologies to automating mass censorship and the targeting of political dissidents, journalists, human rights advocates and marginalised minorities. The most challenging issue is the continued export around the world of the model of vicious, ubiquitous surveillance and repression being refined now in Xinjiang.
  • Espionage and intellectual property theft: The espionage risks associated with Chinese companies are clearly laid out in Chinese law, and the Chinese state has a well-established track record of stealing intellectual property.122 This risk is only likely to increase as ‘smart’ technology becomes ever more pervasive in private and public spaces. From city-wide surveillance to the phones in the pockets of political leaders (or, in a few years, the microphones in their TVs and refrigerators), governments, the private sector and civil society alike need to seriously consider how to better protect their information from malicious cyber actors.
  • Developing technologies: Chinese companies are leading the field in research and development into a range of innovative, and strategically sensitive, emerging technologies. Their global expansion provides them with key resources, such as huge and diverse datasets and access to the world’s best research institutions and universities.123 Fair competition between leading international companies to develop these crucial technologies is only to be expected, and Chinese tech companies have made enormous positive contributions to the sum total of human knowledge and innovation. However, the strategic, political and ideological goals of the CCP—which has directed and funded much of this research—can’t be ignored. From AI to quantum computing to biotechnology, the nations that dominate those technologies will exercise significant influence over how the technologies develop, such as by shaping the ethical norms and values that are built into AI systems, or how the field of human genetic modification progresses. Dominance in these fields will give nations a major strategic edge in everything from economic competition to military conflict.
  • Military competition: In cases of military competition with China, the Chinese Government would of course seek to leverage, to its own advantage, its influence over Chinese companies providing equipment and services to its enemies. This should be a serious strategic consideration for nations when they choose whether to allow Chinese companies to be involved in the build-out of critical infrastructure such as 5G networks, especially given the CCP’s increasing assertiveness and coercion globally.

This issue is particularly acute for countries already experiencing tensions over China’s territorial claims in regions such as the South China Sea. For example, in 2016, after a ruling by a UN-backed tribunal dismissed Chinese claims, suspected Chinese hackers attacked announcement and communications systems in two of Vietnam’s major airports, including a ‘display of profanity and offensive messages in English against Vietnam and the Philippines’.124 A simultaneous hack on a Vietnamese airline led to the loss of more than 400,000 passengers’ data. Vietnam’s Information and Communications Minister said that the government was ‘reviewing Chinese technology and devices’ in the wake of the attack.125 Cybersecurity firm FireEye says that it’s observed persistent targeting of both government and corporate targets in Vietnam that’s suspected to be linked to the South China Sea dispute.126

5G infrastructure build outs should be an area of particular concern. An article in the China National Defence Report in March 2019127 discusses the military applications for China of 5G in the move to ‘intelligentised’ warfare. ‘[A]s military activities accelerate towards extending into the domain of intelligentization, air combat platforms, precision-guided munitions, etc. will be transformed from ‘accurate’ to ‘intelligentized.’ 5G-based AI technology will definitely have important implications for these domains,’ write the authors, who appear to be researchers affiliated with Xidian University and the PLA’s Army Command Academy.

Conclusion

Chinese companies have unquestionably made important and valuable contributions to the technology industry globally, from contributing to cutting edge research and pushing the boundaries of developing technologies, to enabling access to affordable, good quality devices and services for people around the world. They are not going anywhere, and they are going to continue to play a vital role in the ways in which governments, companies and citizens around the world connect with one another.

At the same time, however, it is important to recognise that the activities of these companies are not purely commercial, and in some circumstances risk mitigation is needed. The CCP’s own policies and official statements make it clear that it perceives the expansion of Chinese technology companies as a crucial component of its wider project of ideological and geopolitical expansion. The CCP committees embedded within the tech companies and the close ties (whether through direct ownership, legal obligations or financing agreements including loans and lucrative contracts) between the companies and the Chinese government make it difficult for them to be politically neutral actors, as much as some of the companies might prefer this. There is also a legitimate question about whether global consumers should demand greater scrutiny of Chinese technology firms that facilitate human rights abuses in China and elsewhere.

Governments around the world are struggling with the political and security implications of working with Chinese corporations, particularly in areas such as critical infrastructure, for example in 5G, and in collaborative research partnerships that might involve sensitive or dual-use technologies. Part of this struggle is due to a lack of in-depth understanding of the unique party-state environment that shapes, limits and drives the global behaviour of Chinese companies. This research project aims to help plug that gap so that policymakers, industry and civil society can make more informed decisions when engaging China’s tech giants.


What is ASPI?

The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally.


ASPI International Cyber Policy Centre

The ASPI International Cyber Policy Centre’s mission is to shape debate, policy and understanding on cyber issues, informed by original research and close consultation with government, business and civil society.


It seeks to improve debate, policy and understanding on cyber issues by:

  1. conducting applied, original empirical research
  2. linking government, business and civil society
  3. leading debates and influencing policy in Australia and the Asia–Pacific.

The work of ICPC would be impossible without the financial support of our partners and sponsors across government, industry and civil society. ASPI is grateful to the US State Department for providing funding for this research project.

Important disclaimer

This publication is designed to provide accurate and authoritative information in relation to the subject matter covered. It is provided with the understanding that the publisher is not engaged in rendering any form of professional or other advice or services. No person should rely on the contents of this publication without first obtaining advice from a qualified professional person.


© The Australian Strategic Policy Institute Limited 2019

This publication is subject to copyright. Except as permitted under the Copyright Act 1968, no part of it may in any form or by any means (electronic, mechanical, microcopying, photocopying, recording or otherwise) be reproduced, stored in a retrieval system or transmitted without prior written permission. Enquiries should be addressed to the publishers. Notwithstanding the above, educational institutions (including schools, independent colleges, universities and TAFEs) are granted permission to make copies of copyrighted works strictly for educational purposes without explicit permission from ASPI and free of charge.

  1. Sarah Cook, ‘China’s cyber superpower strategy: implementation, internet freedom implications, and US responses’, written testimony to House Committee on Oversight and Government Reform, Freedom House, 28 September 2018; Kania et al., ‘China’s strategic thinking on building power in cyberspace: a top party journal’s timely explanation translated’, online. ↩︎
  2. , online. ↩︎
  3. Samantha Hoffman, Elsa Kania, ‘Huawei and the ambiguity of China’s intelligence and counter-espionage laws’, The Strategist, 13 September 2018, online. ↩︎
  4. Constitution of the Communist Party of China, revised and adopted on 24 October 2017, online. ↩︎
  5. People’s Republic of China Company Law, online. ↩︎
  6. Hoffman & Kania, ‘Huawei and the ambiguity of China’s intelligence and counter-espionage laws’. ↩︎
  7. Chris Buckley, Amy Qin, ‘Muslim detention camps are like “boarding schools,” Chinese official says’, New York Times, 12 March 2019, online; Fergus Ryan, Danielle Cave, Nathan Ruser, Mapping Xinjiang’s ‘re-education’ camps, ASPI, Canberra, 1 November 2018, online. ↩︎
  8. ‘China: not free: 88/100’, Freedom on the net 2018, Freedom House, Washington DC, 2018, online. ↩︎
  9. Jun Mai, ‘Xi Jinping renews “cyber sovereignty” call at China’s top meeting of internet minds’, South China Morning Post, 3 December 2017, online. ↩︎
  10. Josh Rogin, ‘White House calls China’s threats to airlines “Orwellian nonsense”’, Washington Post, 5 May 2018, online. ↩︎
  11. Samantha Hoffman, Social credit: technology-enhanced authoritarian control with global consequences, ASPI, Canberra, 28 June 2018, online. ↩︎
  12. Wu Jiao, ‘Party membership up in private firms’, China Daily, 17 July 2007, online. ↩︎

Tag Archive for: China Tech

Mapping China’s Technology Giants: Covid-19, supply chains and strategic competition

Mapping China’s Technology Giants is a multi-year project by ASPI’s International Cyber Policy Centre that maps the overseas expansion of key Chinese technology companies. The project, first published in April 2019, is now being re-launched in June 2021 with new research reports, a new website and an enormous amount of new and updated content.

This data-driven online project – and the accompanying research products – fill a research and policy gap by building understanding about the global trajectory and impact of China’s largest companies working across the Internet, telecommunications, AI, surveillance, e-commerce, finance, biotechnology, big data, cloud computing, smart city and social media sectors.

Two new research reports accompany the re-launch

Mapping China’s Technology Giants: Supply Chains and the Global Data Ecosystem Most of the 27 companies tracked by our Mapping China’s Technology Giants project are heavily involved in the collection and processing of vast quantities of personal and organisational data. Their global business operations depend on the flow of vast amounts of data, often governed by the data privacy laws of multiple jurisdictions. The Chinese party-state is ensuring that it can derive strategic value and benefit from these companies’ global operations. We assess interactions between the People’s Republic of China’s political agenda-setting, efforts to shape international technical standards, technical capabilities, and use of data as a strategic resource. We argue this ‘Data Ecosystem’ will have major implications for the effectiveness of data protection laws and notions of digital supply-chain security.

Reining in China’s Technology Giants Since the launch of ASPI ICPC’s Mapping China’s Technology Giants project in April 2019, the Chinese technology companies we canvassed have gone through a tumultuous period. While most were buoyed by the global Covid-19 pandemic, which stimulated demand for technology services around the world, many were buffeted by an unprecedented onslaught of sanctions from abroad, before being engulfed in a regulatory storm at home. This report describes the effects of the Covid-19 pandemic, the growing China–US strategic and technological competition, and a changing Chinese domestic regulatory environment on the 27 Chinese Technology Giants we cover on our map.

New content and data

  • We’ve added four new companies to the project: Ant GroupInspurPing An Technology and Nuctech. The dataset now includes 27 companies.
  • Our Map includes over 1,400 new entries, totalling over 3,900 global entries. These are populated with up to 15 categories of data, totalling 38,000+ data points. Existing entries were updated to reflect new changes.
  • Our map tracks more than 130 donations80 of these are Covid-19 monetary and medical donations from ByteDance, Tencent and Alibaba.
  • Biotechnology company BGI saw profits surge in 2020 as Covid-19 spread around the world. Our map now contains 100 datapoints of presence for BGI including commercial partnerships, Covid-19 related donations, investments, joint ventures, MoU agreements, overseas offices, research partnerships and subsidiaries.
  • We have tracked the expansion of Hikvision, Dahua and Uniview as overseas demand for their temperature screening products increased during Covid-19. The map contains 65 data points of overseas presence relating to Covid-19 for these three companies, including donations, commercial partnerships, and surveillance equipment.
  • Our ‘Company Briefs’ include new ‘Privacy Policies’ and ‘Covid-19 Impact’ sections. We’ve also updated each existing overview, and of particular note are updates to the ‘Activities in Xinjiang’ and ‘Party-state Activities’ sections.
  • We’re introducing a new product: ‘Thematic Snapshots’. These combine company overview content across the four thematic areas named above. They are designed to serve as a user-friendly guide for the journalists, researchers, and policy makers who use our website. 

A new & better website 

Visitors can now explore our data in two ways, using either the Map or Data Listing pages. These display the same results in different formats depending on a users’ preference.

Click the ‘show Our Highlights Only’ to see the map entries ASPI staff have flagged as data points of particular interest. For these entries, we have undertaken additional analysis or recommend further investigation.

For more about this multi-year project visit the About page of the China Tech Map website.

The Team

The Mapping China’s Technology Giants research project is a huge team effort, comprising;

Top US China specialist Peter Mattis announced as ASPI distinguished fellow

The Australian Strategic Policy Institute (ASPI) is pleased to announce Peter Mattis – Research Fellow in China Studies at the Victims of Communism Memorial Foundation – as a distinguished ASPI fellow for 2019.

Peter will be spending the next month at ASPI working with the Institute’s different China specialists on a range of research projects.

Peter will also be a keynote speaker at ASPI’s inaugural China masterclass being held on 15 April in Canberra (almost sold out) and 17 April in Melbourne (tickets still available).

Executive Director Peter Jennings says: “ASPI is delighted to attract someone of Peter’s analytical calibre to spend a full month at our institute. Peter has made an enormous contribution to building the world’s knowledge of how the Chinese Communist Party, the People’s Liberation Army (PLA) and China’s intelligence systems operate – both at home and around the world. Peter’s work spans across a broad range of topics, from better understanding PLA activity in cyberspace, to Chinese party-state influence operations, espionage and military modernisation. ASPI is looking forward to hosting Peter so that he can continue some of this important work over the next month”

Peter was formerly a Fellow in the China Program at The Jamestown Foundation where he edited China Brief and was an international affairs analyst for the US Government. He received his M.A. in Security Studies from the Georgetown University School of Foreign Service and earned his B.A. in Political Science and Asian Studies from the University of Washington in Seattle. He also previously worked as a Research Associate at the National Bureau of Asian Research in its Strategic Asia and Northeast Asian Studies programs.

Peter is in Australia from now until 18 April. For media enquiries please contact reneejones@aspi.org.au / 0400 424 323