Third Way National Security Team Launches US-China Advisory Board Search

Third Way National Security Team Launches US-China Advisory Board Search

US China Advisory Search Header

Recruiting for the Initiative’s Advisory Board

To help ensure the Digital World Order Initiative’s work will be as bipartisan, relevant, and actionable as possible, we are seeking to stand up an Advisory Board. This board would help the initiative explore and develop partnerships, collaborators, and funding opportunities for the program to identify, stop, and punish China’s creeping digital authoritarianism. It would leverage contacts in the private sector, academia, and foundations to help guide solutions tailored for legislation in collaboration with organizational partners and members of Congress. This board would mirror the successes and model of Third Way’s Cyber Enforcement Initiative Advisory Board.

Each Board Advisor must be available for a minimum of three hours a month for the 1-year Advisory Board appointment. Each Advisor will be required to:

  • Provide individual advising as needed on securing strategic partnerships, funding and projects
  • Be prepared for all advisory board meetings on the US-China Digital World Order program. As such, each Advisor must participate in four 60-minute quarterly board meetings
  • Review and be familiar with all materials and content including program materials, presentations, outlines, videos, website links, etc., provided by the Third Way National Security Team

Application to Join the Advisory Board

More About the Digital World Order Initiative: What is at Stake

On June 21st, Third Way’s national security team launched the US-China Digital World Order Initiative. A bipartisan initiative which underscores that a new and decisive divide pits America’s approach of “digital democracy” against China’s approach of “digital autocracy"—and the US needs to catch up. Members of the private sector, civil society, and government were in attendance, and the event followed up Third Way’s introductory memo for the Digital World Order Initiative.

China is executing a detailed plan to become the world’s digital superpower. The US is not. As part of the state-driven “China Standards 2035” Project, the Chinese state intends to change the global digital order by redrawing technological norms and standards to outcompete the United States and dominate the free world with its authoritarian model for exportation.1 The outcome of this US-China competition will define the 21st century and have massive implications on US economic, geopolitical, and military strength.

China’s model will enable an information dark age across autocratic nations where whole societies live in a completely distorted version of the world. Current trends point to a stark divide between democratic countries with freedom of speech and press, and authoritarian states with sophisticated disinformation and censorship regimes. Through technologies like the Great Firewall, 1.4 billion people in China alone have already been systematically shunted into state-controlled narratives for understanding the world.2 China is perfecting its technology-enhanced authoritarianism for export, and dictators like Vladimir Putin are signing up to better hide horrific truths from their citizens.3

As reported in NextGov, : “I think creating more inclusive and democratic processes that bring in emerging countries who will have incredible innovation over the coming decades and be the users and deployers of so much of this emerging technology is also really important,” Berry said, noting a 60-nation declaration the White House led in April on the future of the internet. 

China’s digital police state uses mass surveillance technologies and big data to restrain basic freedoms and liberties. Chinese state officials can track its citizens through voice recognizing-social media monitoring, artificial intelligence and facial recognition-enhanced security cameras, and Internet-enhanced neighbor snitching.4 This surveillance data is compiled into social credit scores and advanced algorithms to curtail the freedoms of dissidents and “deviants”—including blocking travel for civil rights lawyers, detaining ethnic and religious minority Uyghurs for praying, and punishing journalists for “spreading rumors.”5

The Chinese government also conducts operations to serve their economic and geopolitical interests by spreading and strengthening Chinese technological authoritarianism.

  • Exporting telecommunications equipment: China made a billion-dollar market for establishing global digital infrastructure, while also using that same infrastructure to stifle overseas dissent and give similar tools of repression to their allies.6
  • Stealing American intellectual property: China has been able to supercharge their own tech economy and claim the Chinese state spurs innovation.7
  • Banning cryptocurrency and promoting the digital yuan: China has dismissed decentralized economic power, and instead doubled down on their efforts to make yuan-transactions yet another means of global surveillance, as well as empower the yuan to be a global currency rivaling the US dollar in influence.8
  • Hacking into foreign governments: China degrades the security of democracies through extensive cyberespionage operations. The collected data is used for further political and intelligence operations which target enemies of the Chinese government.9

The US government is recognizing the national security threat of China’s technological aspirations and cyber operations. In March 2021, the FCC recognized the risks of China’s digital control and designated several Chinese telecommunications firms, including Huawei, as national security threats to US government vendors and are restricted from conducting business with.10The annual Office of the Director of National Intelligence’s threat assessment noted, “China presents the broadest, most active, and persistent cyber espionage threat to U.S. Government and private sector networks” and the Chinese government “will work to undercut U.S. influence, drive wedges between Washington and its partners, and foster some norms that favor its authoritarian system.”11

China’s military buildup strategy also relies on gaining and maintaining the upper-hand in the digital global order. In addition to a traditional military arms race, Xi Jinping has recognized the importance of integrating digital superiority in China’s armed forces. Xi has called for a highly “informatized” military capable of dominating all networks, and to establish next-generation “intelligentized” warfare capabilities using advanced technologies like AI and quantum computing.12

Application to Join the Advisory Board

Topics
  • US-China Digital World Order7

Endnotes

  1. Central Committee of the Communist Party of China and the State Council. “National Standardization Development Outline" 10 Oct. 2021, http://www.gov.cn/zhengce/2021-10/10/content_5641727.htm.  Accessed May 25, 2022; Gargeyas, Arjun. “China’s ‘Standards 2035’ Project Could Result in a Technological Cold War.” The Diplomat, 18 September 2021, https://thediplomat.com/2021/09/chinas-standards-2035-project-could-result-in-a-technological-cold-war/. Accessed May 25, 2022; Sheehan, Matt; Blumenthal, Marjory; Nelson, Michael. “Three Takeaways From China’s New Standards Strategy.” The Carnegie Endowment for International Peace, 28 Oct. 2021, https://carnegieendowment.org/2021/10/28/three-takeaways-from-china-s-new-standards-strategy-pub-85678. Accessed May 25, 2022.

  2. Wang, Yaqui. “In China, the ‘Great Firewall’ Is Changing a Generation.”  Human Rights Watch, 1 Sep. 2020, https://www.hrw.org/news/2020/09/01/china-great-firewall-changing-generation. Accessed May 25, 2022; Yuan, Li. “China’s Information Dark Age Could Be Russia’s Future.” New York Times, 18 March 2022, https://www.nytimes.com/2022/03/18/business/chinas-russia-information.html. Accessed May 25, 2022.

  3. Yuan, Li. “China’s Information Dark Age Could Be Russia’s Future.” New York Times, 18 Mar. 2022, https://www.nytimes.com/2022/03/18/business/chinas-russia-information.html. Accessed May 25, 2022.

  4. Hvistendahl, Mara. “How a Chinese AI Giant Made Chatting—and Surveillance—Easy.” Wired, 18 May 2020, https://www.wired.com/story/iflytek-china-ai-giant-voice-chatting-surveillance/. May 25, 2022; Anderson, Ross. “THE PANOPTICON IS ALREADY HERE.” The Atlantic, September 2020, https://www.theatlantic.com/magazine/archive/2020/09/china-ai-surveillance/614197/. Accessed May 25, 2022; Page, Jeremy. “In Sign of Resistance, Chinese Balk at Using Apps to Snitch on Neighbors.” Wall Street Journal, 29 Dec. 2017, https://www.wsj.com/articles/in-sign-of-resistance-chinese-balk-at-using-apps-to-snitch-on-neighbors-1514566110. Accessed May 25, 2022.

  5. “How China Tracks Everyone.” Youtube, Vice Newshttps://www.youtube.com/watch?v=CLo3e1Pak-Y&t=360s. Accessed May 25, 2022; Reilly, Jessica; Lyu, Muyao; Robertson, Megan. “China’s Social Credit System: Speculation vs. Reality.” The Diplomat, 30 Mar. 2021, https://thediplomat.com/2021/03/chinas-social-credit-system-speculation-vs-reality/. Accessed May 25, 2022; Buckley, Chris; Wang, Vivian; Bradsher, Keith. “Living by the Code: In China, Covid-Era Controls May Outlast the Virus.” New York Times, 30 Jan. 2022, https://www.nytimes.com/2022/01/30/world/asia/covid-restrictions-china-lockdown.htmlhttps://www.rfa.org/english/news/uyghur/eid-prayers-07302021163133.html. Accessed May 25, 2022; Yuan, Li. “A Generation Grows Up in China Without Google, Facebook or Twitter.”  New York Times, 6 Aug. 2018, https://www.nytimes.com/2018/08/06/technology/china-generation-blocked-internet.html. Accessed May 25, 2022; Brzeski, Patrick. “‘Friends’ Re-Released in China, But LGBTQ Storylines Get Censored.” The Hollywood Reporter, 14 February 2022, https://www.hollywoodreporter.com/tv/tv-news/friends-rereleased-china-lgbtq-storylines-censored-1235093754/. Accessed May 25, 2022.

  6. Anderson, Ross. “THE PANOPTICON IS ALREADY HERE.” The Atlantic, Sep. 2020, https://www.theatlantic.com/magazine/archive/2020/09/china-ai-surveillance/614197/. Accessed May 25, 2022; Mozur, Paul; Kessel, Jonah; Chan, Melissa. “Made in China, Exported to the World: The Surveillance State.”  New York Times, 24 April 2019, https://www.nytimes.com/2019/04/24/technology/ecuador-surveillance-cameras-police-government.html. May 25, 2022; Mozur, Paul; Xiao, Muyi. “A Digital Manhunt: How Chinese Police Track Critics on Twitter and Facebook.” New York Times, 31 Dec. 2021, https://www.nytimes.com/2021/12/31/technology/china-internet-police-twitter.html. Accessed May 25, 2022.

  7. Department of Justice, Federal Bureau of Investigation. “Responding Effectively to the Chinese Economic Espionage Threat.” 6 February 2020, https://www.fbi.gov/news/speeches/responding-effectively-to-the-chinese-economic-espionage-threat. Accessed May 25, 2022; “China still steals commercial secrets for its own firms’ profit.” The Economist, 11 November 2021, https://www.economist.com/china/2021/11/11/china-still-steals-commercial-secrets-for-its-own-firms-profit. Accessed May 25, 2022; Allison, Graham; Klyman, Kevin; Barbesino, Karina; Yen, Hugo. “The Great Tech Rivalry: China vs the U.S.” Belfer Center for Science and International Affairs, Harvard Kennedy School, Dec. 2021, https://www.belfercenter.org/sites/default/files/GreatTechRivalry_ChinavsUS_211207.pdf. Accessed May 25, 2022; Xinhua. “China Focus: China spurs digital economy as new driver of growth.“ Xinhua, 25 May 2022, http://www.xinhuanet.com/english/2021-08/04/c_1310107393.htm. Accessed May 25, 2022.

  8. Fanusie, Yaya, and Emily Jin. “China’s Digital Currency.” Center for New American Security, Jan. 2021, https://s3.us-east-1.amazonaws.com/files.cnas.org/documents/CNAS-Report-Chinas-Digital-Currency-Jan-2021-final.pdf?mtime=20210125173901&focal=none. Accessed May 25, 2022; Ho, Fong Tak. “China's Cryptocurrency Ban Comes as Government Rolls Out Digital Yuan.” Radio Free Asia, 28 Sep. 2021, https://www.rfa.org/english/news/china/ban-09282021111710.html. Accessed May 25, 2022.

  9. “China's Microsoft Hack May Have Had A Bigger Purpose Than Just Spying.” NPR, All Things Considered, 26 Aug. 2021, https://www.npr.org/2021/08/26/1013501080/chinas-microsoft-hack-may-have-had-a-bigger-purpose-than-just-spying. Accessed May 25, 2022.

  10. Shepardson, David, and Reuters. “Five Chinese companies pose threat to U.S. national security -FCC.” Reuters, 12 Mar. 2021, https://www.reuters.com/world/us/five-chinese-companies-pose-threat-us-national-security-fcc-2021-03-12/. Accessed May 25, 2022.

  11. Office of the Director of National Intelligence. “Annual Threat Assessment of the US Intelligence Community.” Feb. 2022, https://www.dni.gov/files/ODNI/documents/assessments/ATA-2022-Unclassified-Report.pdf. Accessed May 25, 2022.

  12. Department of Defense. “Military and Security Developments Involving the People’s Republic of China.” 3 Nov. 2021, https://media.defense.gov/2021/Nov/03/2002885874/-1/-1/0/2021-CMPR-FINAL.PDF. Accessed May 25, 2022.

Subscribe

Get updates whenever new content is added. We’ll never share your email with anyone.