Follow us on social

Shutterstock_1045912438

China’s Catch-22 and the fate of the world wide web

Authoritarian internet policies have led to the rise of a cyber Westphalia, creating a dilemma for the United States.

Analysis | Washington Politics

Having laid the first fiber optic cables across the seas, the United States cemented its role as the architect of the internet. In turn, data flowed where it was most efficiently crunched: through the United States, and its massive technology companies, vibrant customer base, cheap power, and land.

With Big Tech on our side, we could never lose. Or so we thought.

The People’s Republic of China’s vision of a closed internet — one defined and limited by the sovereign and its geographic borders — has increasingly been altering the paradigm. Under this model, the internet would no longer be worldwide. Instead, nations would create their own intranets, upsetting decades of U.S. diplomatic efforts to keep the internet worldwide. Unilateral moves like the Trump administration trying to ban Chinese social media platforms TikTok and WeChat gets us one step closer to a world of nationalized intranets.

For years, China has been using multilateral venues to sell digitizing countries on its mission to fragment the internet. Chinese officials have succeeded in Nigeria and Egypt, where leadership has enacted PRC-style internet policies. Iran’s National Information Network censors content that may create cultural, social, political, or security issues and Russia continues building its own Rusnet.

Ostensibly, internet sovereignty offers a solution for countries exploited by Big Tech. Certain types of data would be kept within borders by law, forcing companies to establish an economic presence within the country instead of extracting data free of charge.

But internet sovereignty makes digital progress harder, consistently producing a negative impact on countries’ GDP and skyrocketing cloud computing costs. Eschewing the security of distributed cloud networks, these policies create immense cybersecurity risks as entire countries’ worth of data are stored centrally in hacking jackpots.

Where the free internet democratized access to information, internet sovereignty would return the elites’ dominance. Autocratic, illiberal, or backsliding democratic regimes would gain an entire new playbook of control — shutting off internet access during contested elections, stifling dissent under the banner of disinformation, and creating new-age, realistic propaganda to blur fact from fiction.

And now, internet sovereignty’s greatest champion, the Chinese Communist Party, has created the perfect global security imperative for the rise of cyber Westphalia.

Indeed, PRC-based companies have no choice but to hand over collected data at the request of the CCP. The CCP has the strongest presence inside of tech companies. President Xi Jinping recently urged the tech industry “not [to] forget their original intentions” of national interest.

In peddling internet sovereignty and “win-win” partnerships, the CCP is merely cloaking its extractivism — its state-directed siphoning of countries’ data that results in profound technological dependencies. China’s widespread surveillance tech exports, which offer over 60 countries hi-tech repression for cheap, grant it default access to citizen-biometric data at scale. For populations without the luxuries of Google or Apple, PRC-based Transsion sells low-priced smartphones with a digital tax of data.

Every day, artificial intelligence — and the data that feeds it — becomes more of a priority for countries. The ease by which the PRC can siphon data may prompt more countries to erect digital borders.

Meanwhile, America’s response has missed the forest for the trees. The Clean Network initiative — an attempt to clear any Chinese influence from telecommunications networks, mobile apps, cloud storage and processing, and undersea cables — is strangely reflective of the internet sovereignty model.

To ban or not ban is not the question. The United States is already caught in China’s Catch-22: either we continue to prohibit China’s internet and technology products, promoting a fragmented internet, or we permit the unfettered siphoning of our data. 

Some say it’s too late — that a world wide web should be abandoned for an exclusive digital trade zone composed of those with democratic ideals. But this is a policy of no return. There would be two poles, China and the United States, forcing countries to choose between a censored or free internet. It is inevitable that some leaders will make the wrong choice for the wrong reasons and it’s not exactly a popular time for democracies.

Over the following decades, authoritarian countries would be driven deeper into the PRC bloc. Far greater economic and political inefficiencies would result, including siloed research and development and reduced international cooperation on pressing existential issues like climate change.

By 2030, this future may be inevitable. But for now, the Catch-22 remains a false choice. A coordinated, U.S.-led approach could save the internet. And it is worth trying.

The low-hanging fruit is investing in a coalition of democracies. This would help reframe the harmful rhetoric of a U.S.-China ‘tech cold war’ into an inclusive effort to secure democracy and human rights in the Information Age. Ideally, a composite of India, South Korea, Australia, and the Netherlands would be added to America’s G7 partners to create a Tech-11 alliance.

Legitimacy in global leadership could start with setting standards for internet companies’ data collection, government influence, and information security practices — a reason-based alternative to the overreliance on an app’s country of origin for risk assessments. The Tech-11 should facilitate investigations of the U.N.’s New Internet Protocol proposal for PRC-influence and departures from openness, transparency, and end-user control. The coalition could also form a powerful voting bloc in the World Trade Organization’s ongoing negotiations over cross-border data flows.

In coordinating integrated hardware and data export controls in line with the proposed recommendations, the Tech-11 would have teeth. Occupying 90 percent of the market share in semiconductors — the lynchpin for advanced-tech development — member states could leverage a unified front of restrictions over any country abusing human rights with technology.

An informal, network-based alliance would be the right venue. First, Tech-11 could synchronize investment screening policies to mitigate allies’ weak links in the globalized supply chains. Complying countries would gain fast-tracked exempted status under the U.S. Treasury’s Committee on Foreign Investment.

Second, it would boost American efforts to convince hesitant EU member-states towards taking the ‘first step’ in moving beyond the Wassenaar Arrangements, the slow-moving, consensus-based European authority for restricting dual-use exports.

Third, the Tech-11 could expand and forecast future foundational technologies. Countries at the forefront of key markets could drive ethical-use standards and export controls. External partnerships, like with Switzerland on quantum computing or Finland on telecommunications, could be organized to maximize collective R&D efforts. In turn, the world would receive consistent, visible guidance over what precisely the democratic alternative to China’s turnkey tech-packages will be.

America must also develop country-specific cyber-diplomatic efforts. For years now, Beijing has been offering upgrades to the digitizing world, embracing Mao’s strategies to surround the resistant cityscape by winning over the countryside (鄉村包圍城市). Given their immense global influence, countries like Brazil, Indonesia, Mexico, India, and Singapore are key to defining the internet’s future.

Congress should stop precluding the State Department from competing on these bilateral relationships, particularly with India, and establish the Bureau of Cyberspace Security and Emerging Technologies. Meanwhile, a joint U.S.-EU investment fund could rival competitive loans for western tech products, while the Department of Commerce could coordinate protections over cross-border data flows among the Tech-11 and others.

Diplomacy will need to be complex and respectful. It won’t be easy to navigate the varied models of data governance, including existing data policies that may favor PRC-based companies. We are behind on these multilateral efforts. But the longer we wait, the closer China will get to sidestepping our semiconductor leverage, and the more difficult effective partnerships will be.

Without allied efforts to preserve the free flow of data, each hawkish move the United States takes against the CCP — ban, blacklist, sanction, condemn — will only continue to erode the base that first gave the United States the most influence in the digital age.


Image: LN.Vector pattern via shutterstock.com
Analysis | Washington Politics
Trump Vance Rubio
Top image credit: President Donald Trump meets with Secretary of State Marco Rubio and Vice President JD Vance before a call with Russian President Vladimir Putin, Monday, August 18, 2025, in the Oval Office. (Official White House Photo by Daniel Torok)

The roots of Trump's wars on terror trace back to 9/11

Global Crises

The U.S. military recently launched a plainly illegal strike on a small civilian Venezuelan boat that President Trump claims was a successful hit on “narcoterrorists.” Vice President JD Vance responded to allegations that the strike was a war crime by saying, “I don’t give a shit what you call it,” insisting this was the “highest and best use of the military.”

This is only the latest troubling development in the Trump administration’s attempt to repurpose “War on Terror” mechanisms to use the military against cartels and to expedite his much vaunted mass deportation campaign, which he says is necessary because of an "invasion" at the border.

keep readingShow less
US Navy Arctic
Top photo credit: Cmdr. Raymond Miller, commanding officer of the Arleigh Burke-class guided-missile destroyer USS Bainbridge (DDG 96), looks out from the bridge wing as the ship operates with Royal Norwegian replenishment oiler HNoMS Maud (A-530) off the northern coast of Norway in the Norwegian Sea above the Arctic Circle, Aug. 27, 2025. (U.S. Navy photo by Mass Communication Specialist 3rd Class Cesar Licona)

The rising US-NATO-Russia security dilemma in the Arctic

North America

An ongoing Great Power tit-for-tat in which U.S./NATO and Russian warships and planes approach each other’s territories in the Arctic, suggests a sense of growing instability in the region.

This uptick in military activities risks the development of a security dilemma: one state or group of states increasing their security presence or capabilities creates insecurity in other states, prompting them to respond similarly.

keep readingShow less
President Trump with reporters
Top photo credit: President Donald Trump speaks with members of the media at Joint Base Andrews, Maryland on Sunday, September 7, 2025. (Official White House Photo by Daniel Torok)

Is Israel forcing Trump to be the capitulator in chief?

Middle East

President Donald Trump told reporters outside a Washington restaurant Tuesday evening that he is deeply displeased with Israel’s bombardment of Qatar, a close U.S. partner in the Persian Gulf that, at Washington’s request, has hosted Hamas’s political leadership since 2012.

“I am not thrilled about it. I am not thrilled about the whole situation,” Trump said, denying that Israel had given him advance notice. “I was very unhappy about it, very unhappy about every aspect of it,” he continued. “We’ve got to get the hostages back. But I was very unhappy with the way that went down.”

keep readingShow less

LATEST

QIOSK

Newsletter

Subscribe now to our weekly round-up and don't miss a beat with your favorite RS contributors and reporters, as well as staff analysis, opinion, and news promoting a positive, non-partisan vision of U.S. foreign policy.