SlideShare a Scribd company logo
Charles Mok | Cyber Policy Center, Stanford University | April 3, 2023 | Rikkyo University, Japan
Digital Authoritarianism,
Asian Techno-Geopolitics and
Technology Fragmentation
Chinese Digital Authoritarianism
Repressive Practices
• Through technology, operation and laws
• Beyond “GFW” (Great FireWall of China)
• From Censorship (passive) to Total Control (active)
• Fear; Friction; Flooding
• Misinformation strategy
• Starting with total control on infrastructure and backbone
Smart City to Massive Surveillance
• Informatization of city management — transportation, public safety,
healthcare, environmental protection….
• Utilizing technologies: IoT, 5G, AI, Big Data, Cloud computing….
• China’s SkyNet project: surveillance camera network with facial recognition
and AI
• BBC reporter John Sudworth (Guiyang, Guizhou Provincel 2017): “caught in 7
minutes”
• Massive deployment in Xinjiang and everywhere
Social Credit
• State Council document: “Guidelines of Social Credit System Construction (2014-2020)”:
• The system aims at standardizing assessment for businesses, organizations and individuals,
measuring
fi
nancial, social and political worthiness
• Rather than a single score to limit social activities of movements of individuals, it still focuses
more on business or marketplace behaviors
• The system is still fragmente now, not fully digitized and decisions are largely made by
humans rather than AI
• However, the system is still a
fl
exible tool for rapid and strict enforcement when “necessary”
• Do not under-estimate the acceptance by the average Chinese public — social harmony,
crime prevention, in a “low trust society”
Rule by Law
Under the CAC
• Cybersecurity Law (CSL) of 2017, amended/clari
fi
ed in 2021
• Amalgamation of previous Internet censorship laws and unifying control
• Data sovereignty requirements, and state security agencies can seize data
• Critical information infrastructure” subject to national security review over data security, procurement and cross-
border data
fl
ow, etc.
• Should not “invite subversion of national sovereignty, overturn the socialist system, incite separatism, break
national unity, advocate terrorism or extremism. advocate ethnic hatred and discrimination, disseminate violent,
obscene or sexual information, create or disseminate false information to disrupt economic or social order.”
• Other recent major laws: Data Security Law (DSL), Personal Information Protection Law (PIPL).
• Long-arm jurisdiction
• Tech crackdown
Exporting Repression
Digital Silk Road
• “Masterplan by Beijing to deploy its “techno-authoritarian model” to Belt and Road
countries (since 2015)
• Dual-use technologies: military and industrial/civilian usages
• Next-generation national
fi
rewall — active surveillance and data analytics
• Thailand (failed attempt in 2015); Cambodia ongoing e
ff
ort (since 2020)
• State
fi
nancing for many African and Asian nations to pay for equipments and projects
from Huawei, ZTE, etc.
• WSJ (2019): Uganda and Zambia’s governments intercepted encrypted communications
and social media messages and used cell locations to track political opponents.
China’s Global Data Grab
• 5G and infrastructure providers: Huawei, ZTE, etc.
• US-led sanctions
• Surveillance cameras and facial recognition: Hikvison etc.
• Strong pushbacks from western countries (UK, Australia, etc.)
• Consumer products and services
• Mobile phones by Huawei, Xiaomi, etc.
• AliPay, WeChatPay
• Didi Chuxing
• TikTok
• WeChat
Technology Standards
The tech and the process
• Targeted e
ff
orts to achieve growing global in
fl
uence
• Unlimited cooperation between China and Russia
• Huawei as proxy agent to advance China’s proposed standards, such as
“New IP” or “IPv6+”, promoting the idea of strong regulatory binding between
IP address and a user
• Attempts to change the global technical standards decision process:
• From multistakeholderism of IETF, IEEE, IAB, IRTF, W3C to state-led ITU
• 2022 Election of ITU’s Secretary General: USA vs Russia
But it’s not just China…
All over Asia
• Misinformation and election interference
• Illegal content especially CSAM (child sexual abuse materials)
• Cybersecurity and ransomware
• Every government wants to be able to remove content they don’t like
• India: IT Regulations
• Singapore: Protection from Online Falsehoods and Manipulation Act (POFMA) and foreign interference law
• Cambodia: National Internet Gateway, etc.
• Philippines: SIM card registration law
• Vietnam, Myanmar, etc.: Cybersecurity law
What about Hong Kong?
• NSL (2020)
• Personal Data (Privacy) Law amendments — anti-doxxing
• SIM card registration (from March 2023)
• Crowdfunding regulations consultation
• Misinformation law
• Cybersecurity law
• Article 23 legislation and NSL
Western democracies want more control too
• Problematic legislations in the west:
• UK’s Online Safety Bill, US’s EARN-IT Act, etc.
• Also Australia, Canada, EU, etc.
• Threats against end-to-end encryption
• Fixation on war on Big Tech: misguided?
• Losing the moral high ground over autocratic governments
Undersea cables meet geopolitics
Focus on South China Sea
The Internet will be fragmented
One world, one Internet no more
• Cyber sovereignty — beginning with data fragmentation
• Data residency laws everywhere
• Infrastructure fragmentation — from undersea cables to space satellites
• Semiconductor supply chain fragmentation
• App/web fragmentation — from GFW to TikTok — both sides now
• AI fragmentation
• Tech standards fragmentation
• Regulatory fragmentation
• Misinformation law, cybersecurity law, real-name registration law (e.g. SIM card rules) — call them by any names
• Both autocracies and democracies
Values fragmentation
Declaration for the Future of the Internet ~ US Summit for Democracy
Values fragmentation
World Internet Conference — China and friends
• Extension of the Digital Silk
Road
• “Internationalization” of
Internet and “cyberspace”
governance
Where do we go from here?
• Internet freedom cannot be taken for granted anywhere anymore
• It’s complicated — no simple solution
• Two battlegrounds, two strategies?
• Autocracies
• Democracies
• How can we strengthen multi-stakeholder participation?
• Empowering civil society and civil defenders
Charles Mok
Visiting Scholar, Global Digital Policy
Incubator, Cyber Policy Center, Stanford
University
Trustee, Internet Society
Director, Tech for Good Asia

More Related Content

Similar to Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation

全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
Charles Mok
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two Systems
Charles Mok
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
Charles Mok
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Oxford Martin Centre, OII, and Computer Science at the University of Oxford
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
Charles Mok
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
Wendy Qi
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
Prof. Neeta Awasthy
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
Chris Marsden
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
Robbie Mitchell
 
Alan Shark
Alan SharkAlan Shark
Alan Shark
globalforum11
 
Technica Distributed Ledger Primer
Technica Distributed Ledger PrimerTechnica Distributed Ledger Primer
Technica Distributed Ledger Primer
Bill Groah
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
Gerry Elman
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open Internet
Cybera Inc.
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
Adam Thierer
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
Lisa Abe-Oldenburg, B.Comm., JD.
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
 
GTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network SocietyGTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network Society
Greater_Tygerberg_Partnership
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 

Similar to Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation (20)

全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Wikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two SystemsWikimania 2013 keynote: One Internet Two Systems
Wikimania 2013 keynote: One Internet Two Systems
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...Network Neutrality: The Origins, Politics and Implications of New Rules for a...
Network Neutrality: The Origins, Politics and Implications of New Rules for a...
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Alan Shark
Alan SharkAlan Shark
Alan Shark
 
Technica Distributed Ledger Primer
Technica Distributed Ledger PrimerTechnica Distributed Ledger Primer
Technica Distributed Ledger Primer
 
Privacy & Security for the Internet of Things
Privacy & Security for the Internet of ThingsPrivacy & Security for the Internet of Things
Privacy & Security for the Internet of Things
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
Net Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open InternetNet Neutrality is Dead, Long Live the Open Internet
Net Neutrality is Dead, Long Live the Open Internet
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014Internet of Things TCLG Oct 23 2014
Internet of Things TCLG Oct 23 2014
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
GTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network SocietyGTP Presentation: Development Drivers in the Network Society
GTP Presentation: Development Drivers in the Network Society
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 

More from Charles Mok

ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
Charles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Charles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
Charles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
Charles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Charles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Charles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
Charles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
Charles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
Charles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
Charles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
Charles Mok
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
Charles Mok
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Charles Mok
 
香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?
Charles Mok
 
Driving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and InnovationDriving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and Innovation
Charles Mok
 

More from Charles Mok (20)

ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 
香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?香港科技罪行法例改革:何去何從?
香港科技罪行法例改革:何去何從?
 
Driving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and InnovationDriving Hong Kong Forward in the Age of 5G and Innovation
Driving Hong Kong Forward in the Age of 5G and Innovation
 

Recently uploaded

find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
Larry Smarr
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 

Recently uploaded (20)

find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 

Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation

  • 1. Charles Mok | Cyber Policy Center, Stanford University | April 3, 2023 | Rikkyo University, Japan Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
  • 2. Chinese Digital Authoritarianism Repressive Practices • Through technology, operation and laws • Beyond “GFW” (Great FireWall of China) • From Censorship (passive) to Total Control (active) • Fear; Friction; Flooding • Misinformation strategy • Starting with total control on infrastructure and backbone
  • 3. Smart City to Massive Surveillance • Informatization of city management — transportation, public safety, healthcare, environmental protection…. • Utilizing technologies: IoT, 5G, AI, Big Data, Cloud computing…. • China’s SkyNet project: surveillance camera network with facial recognition and AI • BBC reporter John Sudworth (Guiyang, Guizhou Provincel 2017): “caught in 7 minutes” • Massive deployment in Xinjiang and everywhere
  • 4. Social Credit • State Council document: “Guidelines of Social Credit System Construction (2014-2020)”: • The system aims at standardizing assessment for businesses, organizations and individuals, measuring fi nancial, social and political worthiness • Rather than a single score to limit social activities of movements of individuals, it still focuses more on business or marketplace behaviors • The system is still fragmente now, not fully digitized and decisions are largely made by humans rather than AI • However, the system is still a fl exible tool for rapid and strict enforcement when “necessary” • Do not under-estimate the acceptance by the average Chinese public — social harmony, crime prevention, in a “low trust society”
  • 5. Rule by Law Under the CAC • Cybersecurity Law (CSL) of 2017, amended/clari fi ed in 2021 • Amalgamation of previous Internet censorship laws and unifying control • Data sovereignty requirements, and state security agencies can seize data • Critical information infrastructure” subject to national security review over data security, procurement and cross- border data fl ow, etc. • Should not “invite subversion of national sovereignty, overturn the socialist system, incite separatism, break national unity, advocate terrorism or extremism. advocate ethnic hatred and discrimination, disseminate violent, obscene or sexual information, create or disseminate false information to disrupt economic or social order.” • Other recent major laws: Data Security Law (DSL), Personal Information Protection Law (PIPL). • Long-arm jurisdiction • Tech crackdown
  • 6. Exporting Repression Digital Silk Road • “Masterplan by Beijing to deploy its “techno-authoritarian model” to Belt and Road countries (since 2015) • Dual-use technologies: military and industrial/civilian usages • Next-generation national fi rewall — active surveillance and data analytics • Thailand (failed attempt in 2015); Cambodia ongoing e ff ort (since 2020) • State fi nancing for many African and Asian nations to pay for equipments and projects from Huawei, ZTE, etc. • WSJ (2019): Uganda and Zambia’s governments intercepted encrypted communications and social media messages and used cell locations to track political opponents.
  • 7. China’s Global Data Grab • 5G and infrastructure providers: Huawei, ZTE, etc. • US-led sanctions • Surveillance cameras and facial recognition: Hikvison etc. • Strong pushbacks from western countries (UK, Australia, etc.) • Consumer products and services • Mobile phones by Huawei, Xiaomi, etc. • AliPay, WeChatPay • Didi Chuxing • TikTok • WeChat
  • 8. Technology Standards The tech and the process • Targeted e ff orts to achieve growing global in fl uence • Unlimited cooperation between China and Russia • Huawei as proxy agent to advance China’s proposed standards, such as “New IP” or “IPv6+”, promoting the idea of strong regulatory binding between IP address and a user • Attempts to change the global technical standards decision process: • From multistakeholderism of IETF, IEEE, IAB, IRTF, W3C to state-led ITU • 2022 Election of ITU’s Secretary General: USA vs Russia
  • 9. But it’s not just China… All over Asia • Misinformation and election interference • Illegal content especially CSAM (child sexual abuse materials) • Cybersecurity and ransomware • Every government wants to be able to remove content they don’t like • India: IT Regulations • Singapore: Protection from Online Falsehoods and Manipulation Act (POFMA) and foreign interference law • Cambodia: National Internet Gateway, etc. • Philippines: SIM card registration law • Vietnam, Myanmar, etc.: Cybersecurity law
  • 10. What about Hong Kong? • NSL (2020) • Personal Data (Privacy) Law amendments — anti-doxxing • SIM card registration (from March 2023) • Crowdfunding regulations consultation • Misinformation law • Cybersecurity law • Article 23 legislation and NSL
  • 11. Western democracies want more control too • Problematic legislations in the west: • UK’s Online Safety Bill, US’s EARN-IT Act, etc. • Also Australia, Canada, EU, etc. • Threats against end-to-end encryption • Fixation on war on Big Tech: misguided? • Losing the moral high ground over autocratic governments
  • 12. Undersea cables meet geopolitics Focus on South China Sea
  • 13. The Internet will be fragmented One world, one Internet no more • Cyber sovereignty — beginning with data fragmentation • Data residency laws everywhere • Infrastructure fragmentation — from undersea cables to space satellites • Semiconductor supply chain fragmentation • App/web fragmentation — from GFW to TikTok — both sides now • AI fragmentation • Tech standards fragmentation • Regulatory fragmentation • Misinformation law, cybersecurity law, real-name registration law (e.g. SIM card rules) — call them by any names • Both autocracies and democracies
  • 14. Values fragmentation Declaration for the Future of the Internet ~ US Summit for Democracy
  • 15. Values fragmentation World Internet Conference — China and friends • Extension of the Digital Silk Road • “Internationalization” of Internet and “cyberspace” governance
  • 16. Where do we go from here? • Internet freedom cannot be taken for granted anywhere anymore • It’s complicated — no simple solution • Two battlegrounds, two strategies? • Autocracies • Democracies • How can we strengthen multi-stakeholder participation? • Empowering civil society and civil defenders
  • 17. Charles Mok Visiting Scholar, Global Digital Policy Incubator, Cyber Policy Center, Stanford University Trustee, Internet Society Director, Tech for Good Asia