Economics

Digital Policy

  • Digital Policy
    Renewing America Series: The U.S. Digital Divide
    Play
    As the United States continues to transition to a knowledge economy, entire regions are being left behind due to the automation of jobs, lack of computers and high-speed internet, and the impossibility for many employees to work from home. Panelists discuss the digital divide, why it poses a problem to U.S. economic strength and competitiveness, and possible solutions for bridging the digital gap.  With its Renewing America initiative, CFR is evaluating nine critical domestic issues that shape the ability of the United States to navigate a demanding, competitive, and dangerous world.
  • China
    Academic Webinar: Cyberspace and U.S.-China Relations
    Play
    Adam Segal, Ira A. Lipman chair in emerging technologies and national security and director of the Digital and Cyberspace Policy Program at CFR, leads a conversation on cyberspace and U.S.-China relations. FASKIANOS: Welcome to the first session of the Winter/Spring 2022 CFR Academic Webinar Series. I’m Irina Faskianos, vice president of the National Program and Outreach here at CFR. Today’s discussion is on the record, and the video and transcript will be available on our website, CFR.org/academic. As always, CFR takes no institutional positions on matters of policy. We are delighted to have Adam Segal with us to discuss cyberspace and U.S.-China relations. Adam Segal is CFR’s Ira A. Lipman chair in emerging technologies and national security and director of the Council’s Digital and Cyberspace Policy program. Previously, he served as an arms control analyst for the China Project at the Union of Concerned Scientists. He has been a visiting scholar at Stanford University’s Hoover Institution, MIT’s Center for International Studies, the Shanghai Academy of Social Sciences, and Tsinghua University in Beijing. And he’s taught courses at Vassar College and Columbia University. Dr. Segal currently writes for the CFR blog, Net Politics—you should all sign up for those alerts, if you haven’t already. And he is the author several books, including his latest, The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age. So, Adam, thanks very much for being with us. We can begin with a very broad brush at cyberspace, the role cyberspace plays in U.S.-China relations, and have you make a few comments on the salient points. And then we’ll open it up to the group for questions. SEGAL: Great. Irina, thanks very much. And thanks, everyone, for joining us this afternoon. I’m looking forward to the questions and the discussion. So broadly, I’m going to argue that the U.S. and China have the most far-reaching competition in cyberspace of any countries. And that competition goes all the way from the chip level to the rules of the road. So global governance all the way down the to the chips that we have in all of our phones. Coincidentally, and nicely timed, last week the Washington Post did a survey of their network of cyber experts about who was the greater threat to the United States, China or Russia. And it was actually almost exactly evenly split—forty to thirty-nine. But I, not surprisingly, fell into the China school. And my thinking is caught very nicely by a quote from Rob Joyce, who’s a director at the National Security Agency, that Russia is like a hurricane while China is like climate change. So Russia causes sudden, kind of unpredictable damage. But China represents a long-term strategic threat. When we think about cyberspace, I think it’s good to think about why it matters to both sides. And on the Chinese side, I think there are four primary concerns. The first is domestic stability, right? So China is worried that the outside internet will influence domestic stability and regime legitimacy. And so that’s why it’s built an incredibly sophisticated system for controlling information inside of China that relies both on technology, and intermediate liability, and other types of regulation. China is worried about technological dependence on other players, in particular the U.S., for semiconductors, network equipment, and other technologies. And they see cybersecurity as a way of reducing that technology. China has legitimate cybersecurity concerns like every other country. They’re worried about attacks on their networks. And the Snowden revelations from the—Edward Snowden, the former NSA contractor—show that the U.S. has significant cyber capabilities, and it has attacked and exploited vulnerabilities inside of China. And while the Chinese might have used to think that they were less vulnerable to cyberattacks given the shape of the Chinese network in the past, I think that probably changed around 2014-2015, especially as the Chinese economy has become increasingly dependent on ecommerce and digital technology. It’s now—GDP is about a third dependent on digital technology. So they’re worried about the same types of attacks the United States is worried about. And then, fourth and finally, China does not want the United States to be able to kind of define the rules of the road globally on cyber, create containing alliances around digital or cyber issues, and wants to constrain the ability of the U.S. to freely maneuver in cyberspace. Those are China’s views. The U.S. has stated that it’s working for a free, open, global, and interoperable internet, or an interoperable cyberspace. But when it looks at China, it has a number of specific concerns. The first is Chinese cyber operations, in particular Chinese espionage, and in particular from that Chinese industrial espionage, right? So the Chinese are known for being the most prolific operators, stealing intellectual property. But they’re also hacking into political networks, going after think tanks, hacking activists—Uighur activists, Tibetan activists, Taiwanese independence activists. We know they’re entering into networks to prepare the battlefield, right, so to map critical infrastructure in case there is a kinetic conflict with the United States—perhaps in the South China Sea or over the Taiwan Strait—and they want to be able to deter the U.S., or perhaps cause destructive attacks on the U.S. homeland, or U.S. bases in South Korea, or Japan. The U.S. is also extremely concerned about the global expansion of Chinese tech firms and Chinese platforms, for the collection of data, right? The U.S. exploited the globalization of U.S. tech firms. Again, that was something that we learned from the Snowden documents, that the U.S. both had legal and extralegal measures to be able to get data from users all around the world because of their knowledge of and relationship to U.S. tech firms. And there’s no reason to believe that the Chinese will not do the same. Now, we hear a lot about, you know, Huawei and the national intelligence law in China that seems to require Chinese companies to turnover data. But it would be very hard to believe that the Chinese would not want to do the same thing that the U.S. has done, which is exploit these tech platforms. And then finally, there is increasingly a framing of this debate as one over values or ideology, right? That democracies use cybertechnologies or digital technologies in a different way than China does. China’s promoting digital authoritarianism, that has to do about control of information as well as surveillance. And the U.S. has really pushed back and said, you know, democracies have to describe how we’re going to use these technologies. Now, the competition has played itself out both domestically and internationally. The Chinese have been incredibly active domestically. Xi Jinping declared that cybersecurity was national security. He took control of a small leadership group that became a separate commission. The Cyberspace Administration of China was established and given lots of powers on regulating cybersecurity. We had a creation of three important laws—the cybersecurity law, the data security law, and the private—personal information protection law. We see China pushing very hard on specific technologies they think are going to be important for this competition, especially AI and quantum. And we see China pushing diplomatically, partly through the idea of what’s called cyber-sovereignty. So not the idea that internet is free and open and should be somewhat free from government regulation, but instead that cyberspace, like every other space, is going to be regulated, and that states should be free to do it as they see fit, as fits their own political and social characteristics, and they should not be criticized by other states. They promoted this view through U.N. organizations in particular. And they’ve been working with the Russians to have a kind of treaty on information and communication technologies that would include not only cybersecurity, but their concerns about content and the free flow of information. The U.S. right now is essentially continuing a policy that was started under the Trump administration. So part of that is to try and stop the flow of technology to Chinese firms, and in particular to handicap and damage Huawei, the Chinese telecom supplier, to put pressure on friends to not use Huawei. But the most important thing it did was put Huawei on an entity list, which cut it off from semiconductors, most importantly from Taiwan Semiconductor, which has really hurt the Huawei of products. The U.S. tried to come to an agreement about—with China about what types of espionage are considered legitimate. And not surprisingly, the U.S. said there was good hacking and back hacking. And the good hacking is the type of hacking that the U.S. tends to do, and the bad hacking is the type of hacking that the Chinese tend to do. So, basically the argument was, well, all states were going to conduct political and military espionage, but industrial espionage should be beyond the pale. Or if you put it—you can think of it as the way President Obama put it, you can hack into my iPhone to get secrets about what I’m discussing with my Cabinet, but you can’t hack into Apple to get the secrets about how iPhones are made to give to Huawei. There was an agreement formed in 2015, where both sides said they weren’t going to engage in industrial espionage—cyber industrial espionage. For about a year and a half, that agreement seemed to hold. And then it—and then it fell apart. The Chinese are engaged in that activity again. And as a result, the U.S. has once again started indicting Chinese hackers, trying to create—enforce that norm through indictments and naming and shaming. The U.S. probably also—although I have no evidence of it—has engaged in disrupting Chinese hackers. So we know under the Trump administrationm Cyber Command moved to a more forward-leaning posture, called defending forward or persistent engagement. We’ve heard about some of those operations against Russian or Iranian actors. John Bolton, before he left the NSC, suggested they were getting used against Chinese cyberhackers as well. So what comes next? And it’s often hard, if not impossible, to end cyber talks on a positive note, but I will try. So I think from a U.S. perspective, clearly the kind of tech pressure, not only of Huawei but on a broader range of companies, is going to continue. The Biden administration has shown no signal that it is going to roll any of that back. And it’s actually expanded it, to more companies working on quantum and other technologies. The Biden administration has worked much more actively than the Trump administration on building alliances around cybersecurity. So in particular, the tech and trade competition group with the Europeans and the quad, with Australia, India, and Japan all have discussions on cybersecurity norms. So how do you actually start imposing them? Now, where you would hope that the U.S. and China would start talking to each other, again, is where I hope the Biden administration can eventually get to. So there were some very brief discussions in the Obama administration. The Trump administration had one round of talks, but that were not particularly useful. The Chinese were very unwilling to bring people from the People’s Liberation Army to actually kind of talk about operations, and generally were in denial about that they had any cyber forces. But you want both sides really to start talking more about where the threshold for the use of force might be in a cyberattack, right? So if you think about—most of what we’ve seen, as I said, is spying. And so that is kind of the—is below the threshold for use of force or an armed attack, the thing that generally triggers kinetic escalation. But there’s no general understanding of where that threshold might be. And in particular, during a crisis, let’s stay, in the street or in the South China Sea, you want to have some kind of clarity about where that line might be. Now, I don’t think we’re ever going to get a very clear picture, because both sides are going to want to be able to kind of skate as close to it as possible, but we would certainly want to have a conversation with the Chinese about how we might signal that. Can we have hotlines to discuss those kind of thresholds? Also, we want to make sure that both sides aren’t targeting each other’s nuclear command and control systems, right, with cyberattacks, because that would make any crisis even worse. There’s some debate about whether the Chinese command and control systems are integrated with civilian systems. So things that the U.S. might go after could then perhaps spillover into the Chinese nuclear system, which would be very risky. So you want to have some talks about that. And then finally, you probably want to talk—because the Chinese open-source writing seems to suggest that they are not as concerned about escalation in cyber as we are. There’s been a lot of debate in the U.S. about if escalation is a risk in cyber. But the Chinese don’t actually seem to think it’s much of a risk. And so it would be very useful to have some discussions on that point as well. I’ll stop there, Irina, and looking forward to the questions. FASKIANOS: Thank you, Adam. That was great analysis and overview and specifics. So we’re going to go first to Babak Salimitari, an undergrad student at the University of California, Irvine. So please be sure to unmute yourself. Q: I did. Can you guys hear me? SEGAL: Yeah. Q: Thank you for doing this. I had a question on the Beijing Olympics that are coming up. Recently the told the athletes to use, like, burner phones because the health apps are for spying, or they’ve got, like, security concerns. What specific concerns do they have regarding those apps, and what do they do? SEGAL: So I think the concerns are both specific and broad. I think there was a concern that one of the apps that all of the athletes had to download had significant security vulnerabilities. So I think that was a study done by Citizens Lab at the University of Toronto. And it basically said, look, this is a very unsafe app and, as you said, allowed access to health data and other private information, and anyone could probably fairly easily hack that. So, you know, if you’re an athlete or anyone else, you don’t want that private information being exposed to or handled by others. Then there’s, I think, the broader concern is that probably anybody who connects to a network in China, that’s going to be unsafe. And so, you know, because everyone is using wi-fi in the Chinese Olympics, and those systems are going to be monitored, those—your data is not going to be safe. You know, I’m not all that concerned for most athletes. You know, there’s probably not a lot of reason why Chinese intelligence or police are interested in them. But there are probably athletes who are concerned, for example, about Xinjiang and the treatment of the Uighurs, or, you know, maybe Tibetan activists or other things, and maybe have somewhere in the back of their minds some idea about making statements or making statements when they get back to the U.S. or safer places. And for those people, definitely I would be worried about the risk of surveillance and perhaps using that data for other types of harassment. FASKIANOS: I’m going to take the written question from Denis Simon, who received two upvotes. And Denis is senior advisor to the president for China affairs and professor of China business and technology. When you say “they” with respect to Chinese cyber activity, who is “they”? To what extent are there rogue groups and ultranationalists as well as criminals involved? SEGAL: Yes, Denis, will send me a nasty email if I don’t mention that Denis was my professor. We’re not going to go how many years ago, but when I was at Fletcher. So, and Denis was one of the first people I took—was the first person I took a class on Chinese technology. So, you know, and then I ended up here. So I think, “they.” So it depends what type of attacks we’re talking about. On the espionage side, cyber espionage side, what we’ve generally seen is that a lot of that was moved from the PLA to the Ministry of State Security. The most recent indictments include some actors that seem to be criminal or at least front organizations. So some technology organizations. We do know that there are, you know, individual hackers in China who will contract their services out. There were in the ’90s a lot of nationalist hacktivist groups, but those have pretty much dissipated except inside of China. So we do see a lot of nationalist trolls and others going after people inside of China, journalists and others, for offending China or other types of violations. So “they” is kind of a whole range of actors depending upon the types of attack we’re talking about. FASKIANOS: Thank you. So our next question we’re going to take from Terron Adlam, who is an undergraduate student at the University of Delaware. And if you can unmute yourself. Q: Can you hear me now? FASKIANOS: Yes. Q: Hi. Good evening. Yes. So I was wondering, do you think there will be a time were we have net neutrality? Like, we have a peace agreement amongst every nation? Because I feel like, honestly, if Russia, U.S., Mexico, any other country out there that have a problem with each other, this would be, like, there’s rules of war. You don’t biohazard attack another country. Do you think—(audio break)—or otherwise? SEGAL: So I think it’s very hard to imagine a world where there’s no cyber activity. So there are discussions about can you limit the types of conflict in cyberspace, though the U.N. primarily. And they have started to define some of the rules of the road that are very similar to other international law applying to armed conflict. So the U.S.’ position is essentially that international law applies in cyberspace, and things like the International Humanitarian Law apply in cyberspace. And you can have things like, you know, neutrality, and proportionality, and distinction. But they’re hard to think about in cyber, but we can—that’s what we should be doing. The Chinese and Russians have often argued we need a different type of treaty, that cyber is different. But given how valuable it seems, at least on the espionage side so far, I don’t think it’s very likely we’ll ever get an agreement where we have no activity in cyberspace. We might get something that says, you know, certain types of targets should be off limits. You shouldn’t go after a hospital, or you shouldn’t go after, you know, health data, things like that. But not a, you know, world peace kind of treaty. FASKIANOS: Thank you. So I’m going to take the next question from David Woodside at Fordham University. Three upvotes. What role does North Korea play in U.S.-China cyber discussions? Can you China act outside of cybersecurity agreements through its North Korean ally? SEGAL: Yeah. I think, you know, like many things with North Korea, the Chinese probably have a great deal of visibility. They have a few levers that they really don’t like using, but not a huge number. So, in particular, if you remember when North Korea hacked Sony and because of the—you know, the movie from Seth Rogan and Franco about the North Korean leader—those hackers seemed to be located in northern China, in Shenyang. So there was some sense that the Chinese probably could have, you know, controlled that. Since then, we have seen a migration of North Korean operators out of kind of north China. They now operate out of India, and Malaysia, and some other places. Also, Russia helped build another cable to North Korea, so the North Koreans are not as dependent on China. I think it’s very unlikely that the Chinese would kind of use North Korean proxies. I think the trust is very low of North Korean operators that they would, you know, have China’s interest in mind or that they might not overstep, that they would bring a great deal of kind of blowback to China there. So there’s been very little kind of—I would say kind of looking the other way earlier in much of North Korea’s actions. These days, I think probably less. FASKIANOS: Thank you. I’m going to take the next question from Joan Kaufman at Harvard University. And if you can unmute yourself. Q: Yes. Thank you very much. I’m also with the Schwarzman Scholars program, the academic director. And I wanted to ask a follow up on your point about internet sovereignty. And, you know, the larger global governance bodies and mechanisms for, you know, internet governance and, you know, China’s role therein. I know China’s taken a much more muscular stance on, you know, the sovereignty issue, and justification for firewalls. So there’s a lot—there are a lot of countries that are sort of in the me too, you know, movement behind that, who do want to restrict the internet. So I just—could you give us a little update on what’s the status of that, versus, like, the Net Mundial people, who call for the total openness of the internet. And where is China in that space? How much influence does it have? And is it really—do you think the rules of the road are going to change in any significant way as a result of that? SEGAL: Yeah. So, you know, I think in some ways actually China has been less vocal about the phrase “cyber sovereignty.” The Wuzhen Internet Conference, which is kind of—China developed as a separate platform for promoting its ideas—you don’t see the phrase used as much, although the Chinese are still interjecting it, as we mentioned, in lots of kind of U.N. documents and other ideas. I think partly they don’t—they don’t promote as much because they don’t have to, because the idea of cyber sovereignty is now pretty widely accepted. And I don’t think it’s because of Chinese actions. I think it’s because there is widespread distrust and dissatisfaction with the internet that, you know, spans all types of regime types, right? Just look at any country, including the United States. We’re having a debate about how free and open the internet should be, what role firms should play in content moderation, should the government be allowed to take things down? You know, we’ve seen lots of countries passing fake news or online content moderation laws. There’s a lot of concern about data localization that countries are doing because of purported economic or law enforcement reasons. So I don’t think the Chinese really have to push cyber sovereignty that much because it is very attractive to lots of countries for specific reasons. Now, there is still, I think, a lot of engagement China has with other countries around what we would call cyber sovereignty, because China—countries know that, you know, China both has the experience with it, and will help pay for it. So certainly around the Belt and Road Initiative and other developing economies we do see, you know, the Chinese doing training of people on media management, or online management. There was this story just last week about, you know, Cambodia’s internet looking more like the Chinese internet. We know Vietnam copied part of their cybersecurity law from the Chinese law. A story maybe two years ago about Huawei helping in Zambia and Zimbabwe, if I remember correctly, in surveilling opposition members. So I think China, you know, still remains a big force around it. I think the idea still is cyber sovereignty. I just don’t think we see the phrase anymore. And I think there’s lots of demand pulls. Not China pushing it on other countries, I think lots of countries have decided, yeah, of course we’re going to regulate the internet. FASKIANOS: Thank you. Next question, from Ken Mayers, senior adjunct professor of history and political science at St. Francis College. Following up on Denis Simon’s question, to what extent to Chinese state actors and U.S. state actors share concerns about asymmetric threats to cybersecurity? Is there common ground for discussion? And I’m going to—actually, I’ll stop there, because— SEGAL: All right. So I’m going to interpret asymmetric threats meaning kind of cyber threats from other actors, meaning kind of nonstate or terrorist actors, or criminal actors. So I think there could be a shared interest. It’s very hard to operationalize. Probably about six or seven years ago I wrote a piece with a Chinese scholar that said, yes, of course we have a shared interest in preventing the proliferation of these weapons to terrorist actors and nonstate actors. But then it was very hard to figure out how you would share that information without exposing yourself to other types of attacks, or perhaps empowering your potential adversary. On cyber—for example, on ransomware, you would actually expect there could be some shared interest, since the Chinese have been victims of a fair number of Russian ransomware attacks. But given the close relationship between Putin and Xi these days, it’s hard to imagine that the U.S. and China are going to gang up on Russia on ransomware. So, again, I think there could be, it’s just very hard to operationalize. FASKIANOS: Great. Thank you. So just to follow on from Skyler Duggan, who is an undergraduate at the University of Waterloo. Likewise, to these questions, how do we differentiate individual criminal groups from the state? And how can we be sure this isn’t China just trying to abdicate—or, one party, he doesn’t specify, trying to abdicate the responsibility? SEGAL: Yeah, I think—because there’s—one of the challenges faced by the U.S. and other liberal democracies is that we tend to primarily keep a fairly tight legal control over the cyber operations. They tend to be, you know, intelligence operations or military operations. So Title 10 or Title 50. There’s kind of a whole set of legal norms around it. The U.S. does not rely on proxy actors. And other, you know, liberal democracies tend to don’t. And U.S. adversaries in this space tend to do so. We know Iran does. We know Russia does. We know China does, although less than the others. Now according to this discussion group that I mentioned before at the U.N., the group of—what’s called the group of government experts, one of the norms that all the actors agreed upon was the norm of state responsibility, which is a common one in international law, that you are responsible for whatever happens in your territory. So using proxies should not, you know, be able to give you an out. You shouldn’t be able to say, well, it’s happening from our territory, we just—you know, we don’t know who they are and we can’t control them. But, you know, in operation that norm is being fairly widely ignored. Now, the other problem, of course, is the—is how do you actually decide who the actor is, the attribution problem, right? So here, you know, a lot of people are basically saying, well, we have to rely on the U.S. or the U.K. or others to say, well, you know, we say it’s these actors, and how do we know—how do we know for sure? Now, attribution is not as hard as we once thought it was going to be. When I first, you know, started doing the research for the book that Irina mentioned, attribution was considered, you know, a pretty big challenge. But now, you know, there’s a fairly high expectation that the U.S. will be able to eventually identify who’s behind an attack. Now, it may take some time. And we may not be able to completely identify who ordered the attack, which is, you know, as you mentioned, the problem with the proxies. But it’s not—it’s also not completely reliant on digital clearances. It’s not just the code or the language of the keyboard. All those things can be manipulated, don’t necessarily give you proof. Lots of time the U.S. is pulling in other intelligence—like, human intelligence, signals intelligence, other types of gathering. So, you know, part of it is how much do we believe the attribution, and then how much of it is—you know, what can you do with it afterwards? And, you know, I don’t think the proxy problem is going to go away. FASKIANOS: Great. So I’m going next to Tim Hofmockel’s question. It’s gotten seven upvotes. He’s a graduate student at Georgetown University. To flip Denis Simon’s question: Who should the “we” be? To what extent should the U.S. intelligence community and the Department of Defense cooperate on offensive cyber operations? And how would we signal our intentions in a crisis given the overlap in authorities between the intelligence community and DOD? SEGAL: Yeah. I mean, so right now NSA and Cyber Command are dual hatted, meaning that one person is in charge of both of them, General Nakasone. So to some extent that could theoretically help deconflict between kind of intelligence gathering, offensive operations, and kind of signaling to the Chinese. But it’s unclear. It’s very—signaling in cyber so far seems to be kind of developing and unknown. That seems to be one of the big theories between the U.S. taking these more kinds of operations and, in fact, kind of bringing the fight to the Chinese is a very kind of sociological understanding of deterrence is that over time both sides will kind of understand where those red lines are by engaging and seeing where they’re acting. You know, others have talked about could you create some kind of watermark on the actual attack or vulnerability, so that the—you know, you might discover some type of malware in your system and there’d be like a little, you know, NFT, maybe, of sorts, that says, you know, the U.S. government was here. We’re warning you not to do this thing. You know, a lot of these have, you know, kind of technical problems. But the question of signaling I think is really hard, and that’s part of the reason why, you know, I think these discussions are so important, that at least we have a sense that we’re talking about the same types of things, and the same general set of tools. But I think probably through cyber signaling is going to be really hard. It’s going to be mostly other types of signaling. FASKIANOS: Next question from Maryalice Mazzara. She’s the director of educational programs at the State University of New York’s Office of Global Affairs. How can people who are working with China and have a very positive relationship with China balance the issues of cybersecurity with the work we are doing? Are there some positive approaches we can take with our Chinese colleagues in addressing these concerns? SEGAL: Good question, Ali. How are you? So I guess it’s very—so I do think there are forward-looking things that we can talk about. You know, several of the questions have asked, are there shared interests here? And I do think there are shared interests. You know, you we mentioned the proliferation one. We mentioned the nonstate actors. You know, there is a lot of language in the most recent statement from the Chinese government about—you know, that the internet should be democratic and open. I don’t think they mean it in the same way that we do, but we can, I think, certainly use that language to have discussions about it and hope push to those sides. But I think it is hard because it is—you know, partly because government choices, right? The U.S. government chooses to attribute lots of attacks to China and be very public about it. Chinese for the most part don’t attribute attacks, and don’t—they talk about the U.S. as being the biggest threat in cyberspace, and call the U.S. The Matrix and the most, you know, damaging force in cyberspace. But for the most part, don’t call out specific actors. So they kind of view it—the Chinese side is often in a kind of defensive crouch, basically saying, you know, who are you to judge us, and you guys are hypocrites, and everything else. So I think there are lots of reasons that make it hard. I think probably the way to do it is to try to look forward to these shared interests and this idea that we all benefitted immensely from a global internet. We now have different views of how open that internet should be. But I think we still want to maintain—the most remarkable thing about it is that we can, you know, still communicate with people around the world, we can still learn from people around the world, we can still draw information, most information, from around the world. And we want to, you know, keep that, which is a—which is—you know, not to use a Chinese phrase—but is a win-win for everybody. FASKIANOS: Great. I see a raised hand from Austin Oaks. And I can’t get my roster up fast enough, so, Austin, if you can unmute and identify yourself. Q: So I’m Austin Oaks. And I come from the University of Wisconsin at Whitewater. And I used to live in Guangdong province in China. And I used to go visit Hong Kong and Macau, more Hong Kong, very often. And Hong Kong has this very free internet, which China doesn’t particularly like. Macau tends to be more submissive to Beijing rather than Hong Kong does. But Chinese government has kind of started to put in people in the Hong Kong government to kind of sway the government into Beijing’s orbit more. So then how—so what is China doing in the cyberspace world for both of its separate administrative regions? Because one is a lot easier to control than the other. SEGAL: Yeah. So I think the idea of Hong Kong’s internet being independent and free is—it’s pretty much ending, right? So the national security law covers Hong Kong and allows the government to increasingly censor and filter and arrest people for what they are posting. We saw pressure on U.S. companies to handover data of some users. A lot of the U.S. companies say they’re going to move their headquarters or personnel out of Hong Kong because of those concerns. So, you know, it certainly is more open than the mainland is, but I think long-term trends are clearly pretty negative for Hong Kong. I expect Macau is the same direction, but as you mentioned, you know, the politics of Macau is just so much different from Hong Kong that it’s less of a concern for the Chinese. FASKIANOS: Thank you. I’m going to take the next written question from Robert Harrison, a law student at Washburn University School of Law. My understanding is that there have been significant thefts of American small and medium-size business intellectual property by Chinese-based actors. This theft/transfer of knowledge may reduce the competitive edge from the original property holder. Are there any current efforts to curb IP thefts? Any ongoing analysis of the Belt and Road Initiative to evaluate the use of IP acquired by theft? SEGAL: Yeah. So, you know, as I mentioned, the U.S. tried to reach this agreement with China on the IP theft challenge. China held to it for about a year, and then essentially kind of went back to it. It’s been very hard to quantify the actual impact of what the theft has been. You know, there are numbers thrown around, a certain percent of GDP, or 250 billion (dollars) a year. There is what’s called the IP Commission, which is run out of the National Bureau of Asia Research that has been updating its report. But it’s very hard because, you know, a lot of the knowledge and data that’s stolen is tacit knowledge. Or, you know, is actual blueprints or IP, but they don’t have the tactic knowledge. So you can have the blueprints, but it’s then hard to turn from that to an actual product. And it’s hard in the civilian space to kind of track lots of products that seem stolen from U.S. products, as opposed to—on the military side you can look at, oh, here’s the Chinese stealth jet. It looks a lot like the U.S. stealth jet. Now, this could be physics. It could be intellectual property theft. But it’s harder on the commercial side to kind of put a number on it and see what the impact is. Although clearly, it’s had an impact. We do know that Chinese operators, you know, go after other targets other than the U.S., right? So they certainly go—are active in Europe. We’ve seen them in Southeast Asia. Most of that is probably political espionage, not as much industrial espionage. Although, there has been—has been some. I don’t know of any specific cases where we can point to anything along the Belt and Road Initiative that, you know, seems in and of itself the outcome of IP theft. FASKIANOS: I’m going to take a written question from Caroline Wagner, who is the Milton and Roslyn Wolf chair in international affairs at Ohio State University. Chinese actors seem to have incredibly pervasive links to track online discussions critical of China. Are these mostly bots, or are there human actors behind them? SEGAL: So I’m going to interpret that to me for the net outside of China. So, yes. I think what we’re learning is there’s several things going on. Part of it is bots. So they have, you know, a number of bots that are triggered by certain phrases. Some of it is human, but increasingly probably a lot of it is machine learning. So there was a story maybe last month in the Post, if I remember it correctly, about, you know, Chinese analytical software data companies offering their services to local Ministry of State Security to basically kind of scrape and monitor U.S. platforms. And that is primarily going to be done through, you know, machine learning, and maybe a little human operations as well. FASKIANOS: Thank you. And this is a bit of a follow-on, and then I’ll go to more. William Weeks, who is an undergraduate at Arizona State University asks: What role does unsupervised machine learning play in China’s cyberspace strategy? SEGAL: Yeah, it’s a good question. I don’t have a lot of details. You know, like everybody else there, they are going to start using it on defense. It is a big push on what’s called military-civil fusion. You know, we know that they are trying to pull in from the private sector on AI, both for the defense and the offense side. But right now, all I can give you is kind of general speculation about how actors think about offense and defense with ML and AI. Not a lot of specifics from the Chinese here. FASKIANOS: Thank you. OK, Morton Holbrook, who’s at Kentucky Wesleyan College. Q: Yes. Following up on your comment about Hong Kong, about U.S. companies reconsidering their presence due to internet controls, what about U.S. companies in China and Beijing and Shanghai? Do you see a similar trend there regarding internet controls, or regarding IPR theft? SEGAL: I think, you know, almost all firms that have been in China, this has been a constant issue for them. So it’s not particularly new. I think almost all of them have, you know, made decisions both about how to protect their intellectual property theft—intellectual property from theft, and how to maintain connections to the outside, to make them harder. You know, VPNs were fairly widely used. Now they’re more tightly regulated. We know that the Chinese actually can attack VPNs. So it think, you know, those issues have been constant irritants. I think, you know, COVID and the lack of travel, the worry about getting kind of caught up in nationalist backlashes online to, you know, Xinjiang issues or if you refer to Taiwan incorrectly, those are probably higher concerns right now than these kind of more constant concerns about cyber and IP. FASKIANOS: Thank you. Anson Wang, who’s an undergraduate at the University of Waterloo. We have three upvotes. Is China considered the major threat to the U.S. hegemony because China is actively trying to replace the U.S. as the new global hegemon? Or simply because China is on a trajectory to get there, without or without their active intention in involving other countries’ internal politics, the same way that the U.S. does? SEGAL: Yeah. So I think this is a—you know, a larger question about what China wants in the world. And do we—you know, we do we think it has a plan or ideology of replacing the U.S.? And does it want—or, would it be happen even with regional dominance? Does it just want to block U.S. interest and others? It’s a big debate. You know, lots of people have contrasting views on where they think China is coming. I’ll just use the cyber example. And I think here, you know, the Chinese started with wanting to block the U.S., and prevent the U.S. from criticizing China, and protect itself. I don’t think it had any desire to reshape the global internet. But I think that’s changed. I think under Xi Jinping they really want to change the definitions of what people think the state should do in this space. I think they want to change the shape of the internet. I don’t think they want to spread their model to every country, but if you want to build their model they’re certainly welcome to help you. And they don’t mind pushing, perhaps highlighting, in some cases exploiting the weaknesses they see in the U.S. as well. FASKIANOS: OK. Thank you. I’m going to go to Helen You, who’s a student at NYU. It appears that governments are reluctant to restrict their cyber capabilities because they fundamentally do not want to limit their own freedom to launch cyberattacks. As a result, countries fail to follow voluntary norms on what is permissible in cyberspace. To what extent are industry standards influencing international cybersecurity norms? And what incentives would need to be in place to move these conversations forward? SEGAL: Yeah, that’s a great point. I mean, I think that’s one of the reasons why we haven’t seen a lot of progress, is because states don’t have a lot of reason to stop doing it. The costs are low, and the benefits seem to be high. Now, I understand your question in two separate ways. One, there is a kind of private attempt to push these norms, and basically arguing that states are going too slow. Part of that was promoted by Microsoft, the company, right? So it promoted the idea of what they were calling the Digital Geneva Convention, and then they have been involved in what’s now known as the Paris Accords that define some of these rules, that the U.S. just signed onto, and some other states have signed onto. But again, the norms are pretty vague, and haven’t seemed to have that much effect. There’s a thing called the cybersecurity—Global Cybersecurity Stability Commission that the Dutch government helped fund but was mainly through think tanks and academics. It also has a list of norms. So there is a kind of norm entrepreneurship going on. And those ideas are slowly kind of bubbling out there. But you need to see changes in the state to get there. That’s when we know that norms matter. And that we really haven’t seen. On the—there is a lot of work, of course, going on, on the standards of cybersecurity, and what companies should do, how they should be defined. And that happens both domestically and internationally. And of course, the companies are very involved in that. And, you know, that is much further, right? Because that has to do about regulation inside of markets, although there’s still, you know, a fair amount of difference between the U.S. and EU and other close economies about how those standards should be defined, who should do the defining, how they should be implemented. FASKIANOS: Thank you. I’m going to take group two questions from Dr. Mursel Dogrul of the Turkish National Defense University. In a most recent article we focused on the blockchain literature expansion of superpowers. In terms of publications and citations, China clearly outperformed the United States and Russia. Do you believe the technological advancement will have an impact on the cybersecurity race? And the Michael Trevett—I don’t have an affiliation—wanted you to speak a little bit more about the cyber triangle with Russia. How are China and Russia coordinating and cooperating? SEGAL: Yeah. So the first question, you know, clearly, as I have briefly mentioned in my opening comments, that the Chinese are pushing very hard on the technologies they think are going to be critical to the—to the future competition in this space—blockchain, quantum, AI. The Chinese have made a lot of advances on quantum communication and quantum key distribution. Probably behind the U.S. on quantum computing, but it’s hard to say for sure. And blockchain is a space the Chinese have developed some usages and are rolling some test cases out on the security side and the internet platforming side. On the China-Russia question, so closer cooperation. Most of it has been around cyber sovereignty, and the ideas of kind of global governance of cyberspace. The Chinese were, you know, pretty helpful at the beginning stages, when Russia started using more technological means to censoring and controlling the Russian internet. So helping kind of build some of the—or, export some of the technologies used in the China great firewall, that the Russians could help develop. Russia is pretty much all-in with Huawei on 5G. And so a lot of cooperation there. Although, the Russians are also worried about, you know, Chinese espionage from Russian technology and other secrets. They did sign a nonaggression cyber pact between the two, but both sides continue to hack each other and steal each other’s secrets. And have not seen any evidence of cooperation on the operations side, on intelligence. with them doing more and more military exercises together, I would suspect we would perhaps start seeing some suggestion that they were coordinating on the military side in cyber. But the last time I looked, I didn’t really see any—I did not see any analysis of that. FASKIANOS: Thank you. Next question from Jeffrey Rosensweig, who is the director of the program for business and public policy at Emory University. Q: Adam, I wonder if you could fit India in here anywhere you would like to? Because it think it’ll be the other great economy of the future. SEGAL: Yeah. So India’s a—you know, a really interesting actor in this space, right? So, you know, India basically think that it has two major cyber threats—Pakistan, and China being the other. China, you know, was reportedly behind some of the blackouts in Mumbai after the border clash. I am somewhat skeptical about reporting, but it’s certainly a possibility, and there’s no reason to doubt the Chinese have been mapping critical infrastructure there. India pushed back on TikTok and ByteDance. You know, also concerns about data control and other things. There is a long history of kind of going back and forth on Huawei. The intelligence agency has not really wanted to use, but others wanting to help, you know, bridge the digital divide and build out pretty quickly. India right now is talking about its own type of 5G. But from a U.S. perspective, you know, I think the most important thing—and this is often how India comes up—is that, you know, we want India to be an amplifier, promoter of a lot of these norms on cyber governance, because it is a, you know, developing, multiethnic, multiparty democracy. And so we want it just not to be the U.S.’ voice. Now, India’s a pretty complicated, difficult messenger for those things these days, right? India leads the world in internet shutdowns, and we’ve seen a lot of harassment of opposition leaders and other people who are opposed to Modi. So it’s not going to be easy. But I think the U.S. for a long time has hoped that we could forge a greater understanding on the cyber side with India. FASKIANOS: Great. I’m going to take the next question from Michael O’Hara, who is a professor at the U.S. Naval War College. And I’m going to shorten it. He asks about China’s fourteenth five-year plan, from 2021 to 2025. It includes a section titled “Accelerate digitalization-based development and construct a digital China.” Do you see their five-year plan as a useful way for thinking about Chinese future in cyberspace? SEGAL: Yes. So we’re on the same page, the digital plan came out two or three weeks ago. It was just translated. Yeah, I mean, the plan is useful. Like, all Chinese plans are useful in the sense that it certainly gives us clear thinking about the direction that China wants to go, and the importance it puts on a topic. You know, the implementation and bureaucratic obstacles and all those other things are going to play a role. But as I mentioned, I think, you know, the Chinese economy is becoming increasingly digitalized. And in particular, they want to digitize, you know, more and more of the manufacturing sector and transportation, mining, other sectors that are traditionally not, you know, thought of as being digital, but the Chinese really want to move into that space. Now, from a cybersecurity perspective, that, you know, raises a whole range of new vulnerabilities and security issues. And so I think that’s going to be very high on their thinking. And just today I tweeted a story that they held a meeting on thinking about cybersecurity in the metaverse. So, you know, they’re looking forward, and cybersecurity is going to be a very high concern of people. FASKIANOS: Well, we couldn’t have the Naval Academy without the U.S. Air Force Academy. So, Chris Miller, you wrote your question, but you’ve also raised your hand. So I’m going to ask to have you articulate it yourself. Q: Well, actually, I changed questions, Irina. Adam, thank you. FASKIANOS: Oh, OK. (Laughs.) But still, the Air Force Academy. Q: So two quick questions. I’ll combine them. One is: I’m curious how you see the new cyber director—national cyber director’s role changing this dynamic, if it at all, or changing the parts of it on our side of the Pacific that we care about. And second of all, curious how you see China viewing the Taiwanese infrastructure that they probably desire, whether or not they eventually take it by force or by persuasion. SEGAL: Yeah. So I don’t think the NCD changes the dynamic very much. You know, I think there’s lots of—you know, everyone is watching to see how the NCD and the National Security Council, and CISA, the Cybersecurity Infrastructure and Security Agency, work out the responsibilities among the three of them, which will have an impact, you know, of making us more secure. And, you know, Chris Inglis, the head of the NCD has given lots of talks about how they’re going to manage and work together. And I think we’re beginning to see some signs of that. But I think that’s probably the most direct impact it’ll have on the dynamic. Your second question, you know, I think primarily is about, you know, Taiwan Semiconductor. And, you know, do the Chinese eventually decide, well, chips are so important, and the U.S. is working so hard to cut us off, that, you know, for all the other reasons that we might want to see Taiwan, you know, that one is going to get moved up? You know, I think it’s a possibility. I think it’s a very low possibility. I do think we don’t know what the red lines are on the tech war, right? You know, there’s been talk about cutting off SMIC, the Shanghai manufacturer of integrated circuits, are also a very important company to the Chinese. Would that push the Chinese to do more aggressive or assertive things in this space? You know, what is it that we do in that space that eventually pulls them out? But I think it’s very hard—(audio break)—that they could capture TSMC in a shape that would be useful. Am I breaking up? FASKIANOS: Just a little bit, but it was fine. We have you now. SEGAL: Yeah. That you could capture TSMC in a shape that would be useful, right? I mean, there was that piece, I think, that was written by an Army person, maybe in Parameters, that, you know, the U.S. and Taiwan’s plan should be basically just to—you know, to sabotage TSMC in case there’s any invasion, and make that clear that that’s what it’s going to do. But even without that risk, you’re still dealing—you know, any damage and then, flight of people outside of Taiwan, because the Taiwanese engineers are really important. So it would be very high risk, I think, that they could capture it and then use it. FASKIANOS: Thank you. Well, I am sorry that we couldn’t get to all the questions, but this has been a great conversation. Adam Segal, thank you very much for being with us. You know, you’re such a great resource. I’m going to task you after this, there was a question from Andrew Moore at the University of Kansas about other resources and books that you would suggest to learn more about China and cybersecurity. So I’m going to get—come to you after this for a few suggestions, which we will send out to the group along with the link to this video and the transcript. So, Andrew, we will get back to you and share with everybody else. And so, again, you can follow Dr. Segal on Twitter at @adschina. Is that correct, Adam? SEGAL: That’s right. FASKIANOS: OK. And also sign up for—to receive blog alerts for Net Politics you can go to CFR.org for that. Our next webinar will be on Wednesday, February 9, at 1:00 p.m. Eastern Time. And we’re excited to have Patrick Dennis Duddy, director of the Center for Latin American and Caribbean Studies at Duke, to talk about democracy in Latin America. So thank you for being with us. You can follow us on Twitter at @CFR_Academic. Visit CFR.org, foreignaffairs.com and ThinkGlobalHealth.org for new research and analysis on other global issues. And again, Adam, thank you very much for being with us. We appreciate it. SEGAL: My pleasure. FASKIANOS: Take care. FASKIANOS: Welcome to the first session of the Winter/Spring 2022 CFR Academic Webinar Series. I’m Irina Faskianos, vice president of the National Program and Outreach here at CFR. Today’s discussion is on the record, and the video and transcript will be available on our website, CFR.org/academic. As always, CFR takes no institutional positions on matters of policy. We are delighted to have Adam Segal with us to discuss cyberspace and U.S.-China relations. Adam Segal is CFR’s Ira A. Lipman chair in emerging technologies and national security and director of the Council’s Digital and Cyberspace Policy program. Previously, he served as an arms control analyst for the China Project at the Union of Concerned Scientists. He has been a visiting scholar at Stanford University’s Hoover Institution, MIT’s Center for International Studies, the Shanghai Academy of Social Sciences, and Tsinghua University in Beijing. And he’s taught courses at Vassar College and Columbia University. Dr. Segal currently writes for the CFR blog, Net Politics—you should all sign up for those alerts, if you haven’t already. And he is the author several books, including his latest, The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age. So, Adam, thanks very much for being with us. We can begin with a very broad brush at cyberspace, the role cyberspace plays in U.S.-China relations, and have you make a few comments on the salient points. And then we’ll open it up to the group for questions. SEGAL: Great. Irina, thanks very much. And thanks, everyone, for joining us this afternoon. I’m looking forward to the questions and the discussion. So broadly, I’m going to argue that the U.S. and China have the most far-reaching competition in cyberspace of any countries. And that competition goes all the way from the chip level to the rules of the road. So global governance all the way down the to the chips that we have in all of our phones. Coincidentally, and nicely timed, last week the Washington Post did a survey of their network of cyber experts about who was the greater threat to the United States, China or Russia. And it was actually almost exactly evenly split—forty to thirty-nine. But I, not surprisingly, fell into the China school. And my thinking is caught very nicely by a quote from Rob Joyce, who’s a director at the National Security Agency, that Russia is like a hurricane while China is like climate change. So Russia causes sudden, kind of unpredictable damage. But China represents a long-term strategic threat. When we think about cyberspace, I think it’s good to think about why it matters to both sides. And on the Chinese side, I think there are four primary concerns. The first is domestic stability, right? So China is worried that the outside internet will influence domestic stability and regime legitimacy. And so that’s why it’s built an incredibly sophisticated system for controlling information inside of China that relies both on technology, and intermediate liability, and other types of regulation. China is worried about technological dependence on other players, in particular the U.S., for semiconductors, network equipment, and other technologies. And they see cybersecurity as a way of reducing that technology. China has legitimate cybersecurity concerns like every other country. They’re worried about attacks on their networks. And the Snowden revelations from the—Edward Snowden, the former NSA contractor—show that the U.S. has significant cyber capabilities, and it has attacked and exploited vulnerabilities inside of China. And while the Chinese might have used to think that they were less vulnerable to cyberattacks given the shape of the Chinese network in the past, I think that probably changed around 2014-2015, especially as the Chinese economy has become increasingly dependent on ecommerce and digital technology. It’s now—GDP is about a third dependent on digital technology. So they’re worried about the same types of attacks the United States is worried about. And then, fourth and finally, China does not want the United States to be able to kind of define the rules of the road globally on cyber, create containing alliances around digital or cyber issues, and wants to constrain the ability of the U.S. to freely maneuver in cyberspace. Those are China’s views. The U.S. has stated that it’s working for a free, open, global, and interoperable internet, or an interoperable cyberspace. But when it looks at China, it has a number of specific concerns. The first is Chinese cyber operations, in particular Chinese espionage, and in particular from that Chinese industrial espionage, right? So the Chinese are known for being the most prolific operators, stealing intellectual property. But they’re also hacking into political networks, going after think tanks, hacking activists—Uighur activists, Tibetan activists, Taiwanese independence activists. We know they’re entering into networks to prepare the battlefield, right, so to map critical infrastructure in case there is a kinetic conflict with the United States—perhaps in the South China Sea or over the Taiwan Strait—and they want to be able to deter the U.S., or perhaps cause destructive attacks on the U.S. homeland, or U.S. bases in South Korea, or Japan. The U.S. is also extremely concerned about the global expansion of Chinese tech firms and Chinese platforms, for the collection of data, right? The U.S. exploited the globalization of U.S. tech firms. Again, that was something that we learned from the Snowden documents, that the U.S. both had legal and extralegal measures to be able to get data from users all around the world because of their knowledge of and relationship to U.S. tech firms. And there’s no reason to believe that the Chinese will not do the same. Now, we hear a lot about, you know, Huawei and the national intelligence law in China that seems to require Chinese companies to turnover data. But it would be very hard to believe that the Chinese would not want to do the same thing that the U.S. has done, which is exploit these tech platforms. And then finally, there is increasingly a framing of this debate as one over values or ideology, right? That democracies use cybertechnologies or digital technologies in a different way than China does. China’s promoting digital authoritarianism, that has to do about control of information as well as surveillance. And the U.S. has really pushed back and said, you know, democracies have to describe how we’re going to use these technologies. Now, the competition has played itself out both domestically and internationally. The Chinese have been incredibly active domestically. Xi Jinping declared that cybersecurity was national security. He took control of a small leadership group that became a separate commission. The Cyberspace Administration of China was established and given lots of powers on regulating cybersecurity. We had a creation of three important laws—the cybersecurity law, the data security law, and the private—personal information protection law. We see China pushing very hard on specific technologies they think are going to be important for this competition, especially AI and quantum. And we see China pushing diplomatically, partly through the idea of what’s called cyber-sovereignty. So not the idea that internet is free and open and should be somewhat free from government regulation, but instead that cyberspace, like every other space, is going to be regulated, and that states should be free to do it as they see fit, as fits their own political and social characteristics, and they should not be criticized by other states. They promoted this view through U.N. organizations in particular. And they’ve been working with the Russians to have a kind of treaty on information and communication technologies that would include not only cybersecurity, but their concerns about content and the free flow of information. The U.S. right now is essentially continuing a policy that was started under the Trump administration. So part of that is to try and stop the flow of technology to Chinese firms, and in particular to handicap and damage Huawei, the Chinese telecom supplier, to put pressure on friends to not use Huawei. But the most important thing it did was put Huawei on an entity list, which cut it off from semiconductors, most importantly from Taiwan Semiconductor, which has really hurt the Huawei of products. The U.S. tried to come to an agreement about—with China about what types of espionage are considered legitimate. And not surprisingly, the U.S. said there was good hacking and back hacking. And the good hacking is the type of hacking that the U.S. tends to do, and the bad hacking is the type of hacking that the Chinese tend to do. So, basically the argument was, well, all states were going to conduct political and military espionage, but industrial espionage should be beyond the pale. Or if you put it—you can think of it as the way President Obama put it, you can hack into my iPhone to get secrets about what I’m discussing with my Cabinet, but you can’t hack into Apple to get the secrets about how iPhones are made to give to Huawei. There was an agreement formed in 2015, where both sides said they weren’t going to engage in industrial espionage—cyber industrial espionage. For about a year and a half, that agreement seemed to hold. And then it—and then it fell apart. The Chinese are engaged in that activity again. And as a result, the U.S. has once again started indicting Chinese hackers, trying to create—enforce that norm through indictments and naming and shaming. The U.S. probably also—although I have no evidence of it—has engaged in disrupting Chinese hackers. So we know under the Trump administrationm Cyber Command moved to a more forward-leaning posture, called defending forward or persistent engagement. We’ve heard about some of those operations against Russian or Iranian actors. John Bolton, before he left the NSC, suggested they were getting used against Chinese cyberhackers as well. So what comes next? And it’s often hard, if not impossible, to end cyber talks on a positive note, but I will try. So I think from a U.S. perspective, clearly the kind of tech pressure, not only of Huawei but on a broader range of companies, is going to continue. The Biden administration has shown no signal that it is going to roll any of that back. And it’s actually expanded it, to more companies working on quantum and other technologies. The Biden administration has worked much more actively than the Trump administration on building alliances around cybersecurity. So in particular, the tech and trade competition group with the Europeans and the quad, with Australia, India, and Japan all have discussions on cybersecurity norms. So how do you actually start imposing them? Now, where you would hope that the U.S. and China would start talking to each other, again, is where I hope the Biden administration can eventually get to. So there were some very brief discussions in the Obama administration. The Trump administration had one round of talks, but that were not particularly useful. The Chinese were very unwilling to bring people from the People’s Liberation Army to actually kind of talk about operations, and generally were in denial about that they had any cyber forces. But you want both sides really to start talking more about where the threshold for the use of force might be in a cyberattack, right? So if you think about—most of what we’ve seen, as I said, is spying. And so that is kind of the—is below the threshold for use of force or an armed attack, the thing that generally triggers kinetic escalation. But there’s no general understanding of where that threshold might be. And in particular, during a crisis, let’s stay, in the street or in the South China Sea, you want to have some kind of clarity about where that line might be. Now, I don’t think we’re ever going to get a very clear picture, because both sides are going to want to be able to kind of skate as close to it as possible, but we would certainly want to have a conversation with the Chinese about how we might signal that. Can we have hotlines to discuss those kind of thresholds? Also, we want to make sure that both sides aren’t targeting each other’s nuclear command and control systems, right, with cyberattacks, because that would make any crisis even worse. There’s some debate about whether the Chinese command and control systems are integrated with civilian systems. So things that the U.S. might go after could then perhaps spillover into the Chinese nuclear system, which would be very risky. So you want to have some talks about that. And then finally, you probably want to talk—because the Chinese open-source writing seems to suggest that they are not as concerned about escalation in cyber as we are. There’s been a lot of debate in the U.S. about if escalation is a risk in cyber. But the Chinese don’t actually seem to think it’s much of a risk. And so it would be very useful to have some discussions on that point as well. I’ll stop there, Irina, and looking forward to the questions. FASKIANOS: Thank you, Adam. That was great analysis and overview and specifics. So we’re going to go first to Babak Salimitari, an undergrad student at the University of California, Irvine. So please be sure to unmute yourself. Q: I did. Can you guys hear me? SEGAL: Yeah. Q: Thank you for doing this. I had a question on the Beijing Olympics that are coming up. Recently the told the athletes to use, like, burner phones because the health apps are for spying, or they’ve got, like, security concerns. What specific concerns do they have regarding those apps, and what do they do? SEGAL: So I think the concerns are both specific and broad. I think there was a concern that one of the apps that all of the athletes had to download had significant security vulnerabilities. So I think that was a study done by Citizens Lab at the University of Toronto. And it basically said, look, this is a very unsafe app and, as you said, allowed access to health data and other private information, and anyone could probably fairly easily hack that. So, you know, if you’re an athlete or anyone else, you don’t want that private information being exposed to or handled by others. Then there’s, I think, the broader concern is that probably anybody who connects to a network in China, that’s going to be unsafe. And so, you know, because everyone is using wi-fi in the Chinese Olympics, and those systems are going to be monitored, those—your data is not going to be safe. You know, I’m not all that concerned for most athletes. You know, there’s probably not a lot of reason why Chinese intelligence or police are interested in them. But there are probably athletes who are concerned, for example, about Xinjiang and the treatment of the Uighurs, or, you know, maybe Tibetan activists or other things, and maybe have somewhere in the back of their minds some idea about making statements or making statements when they get back to the U.S. or safer places. And for those people, definitely I would be worried about the risk of surveillance and perhaps using that data for other types of harassment. FASKIANOS: I’m going to take the written question from Denis Simon, who received two upvotes. And Denis is senior advisor to the president for China affairs and professor of China business and technology. When you say “they” with respect to Chinese cyber activity, who is “they”? To what extent are there rogue groups and ultranationalists as well as criminals involved? SEGAL: Yes, Denis, will send me a nasty email if I don’t mention that Denis was my professor. We’re not going to go how many years ago, but when I was at Fletcher. So, and Denis was one of the first people I took—was the first person I took a class on Chinese technology. So, you know, and then I ended up here. So I think, “they.” So it depends what type of attacks we’re talking about. On the espionage side, cyber espionage side, what we’ve generally seen is that a lot of that was moved from the PLA to the Ministry of State Security. The most recent indictments include some actors that seem to be criminal or at least front organizations. So some technology organizations. We do know that there are, you know, individual hackers in China who will contract their services out. There were in the ’90s a lot of nationalist hacktivist groups, but those have pretty much dissipated except inside of China. So we do see a lot of nationalist trolls and others going after people inside of China, journalists and others, for offending China or other types of violations. So “they” is kind of a whole range of actors depending upon the types of attack we’re talking about. FASKIANOS: Thank you. So our next question we’re going to take from Terron Adlam, who is an undergraduate student at the University of Delaware. And if you can unmute yourself. Q: Can you hear me now? FASKIANOS: Yes. Q: Hi. Good evening. Yes. So I was wondering, do you think there will be a time were we have net neutrality? Like, we have a peace agreement amongst every nation? Because I feel like, honestly, if Russia, U.S., Mexico, any other country out there that have a problem with each other, this would be, like, there’s rules of war. You don’t biohazard attack another country. Do you think—(audio break)—or otherwise? SEGAL: So I think it’s very hard to imagine a world where there’s no cyber activity. So there are discussions about can you limit the types of conflict in cyberspace, though the U.N. primarily. And they have started to define some of the rules of the road that are very similar to other international law applying to armed conflict. So the U.S.’ position is essentially that international law applies in cyberspace, and things like the International Humanitarian Law apply in cyberspace. And you can have things like, you know, neutrality, and proportionality, and distinction. But they’re hard to think about in cyber, but we can—that’s what we should be doing. The Chinese and Russians have often argued we need a different type of treaty, that cyber is different. But given how valuable it seems, at least on the espionage side so far, I don’t think it’s very likely we’ll ever get an agreement where we have no activity in cyberspace. We might get something that says, you know, certain types of targets should be off limits. You shouldn’t go after a hospital, or you shouldn’t go after, you know, health data, things like that. But not a, you know, world peace kind of treaty. FASKIANOS: Thank you. So I’m going to take the next question from David Woodside at Fordham University. Three upvotes. What role does North Korea play in U.S.-China cyber discussions? Can you China act outside of cybersecurity agreements through its North Korean ally? SEGAL: Yeah. I think, you know, like many things with North Korea, the Chinese probably have a great deal of visibility. They have a few levers that they really don’t like using, but not a huge number. So, in particular, if you remember when North Korea hacked Sony and because of the—you know, the movie from Seth Rogan and Franco about the North Korean leader—those hackers seemed to be located in northern China, in Shenyang. So there was some sense that the Chinese probably could have, you know, controlled that. Since then, we have seen a migration of North Korean operators out of kind of north China. They now operate out of India, and Malaysia, and some other places. Also, Russia helped build another cable to North Korea, so the North Koreans are not as dependent on China. I think it’s very unlikely that the Chinese would kind of use North Korean proxies. I think the trust is very low of North Korean operators that they would, you know, have China’s interest in mind or that they might not overstep, that they would bring a great deal of kind of blowback to China there. So there’s been very little kind of—I would say kind of looking the other way earlier in much of North Korea’s actions. These days, I think probably less. FASKIANOS: Thank you. I’m going to take the next question from Joan Kaufman at Harvard University. And if you can unmute yourself. Q: Yes. Thank you very much. I’m also with the Schwarzman Scholars program, the academic director. And I wanted to ask a follow up on your point about internet sovereignty. And, you know, the larger global governance bodies and mechanisms for, you know, internet governance and, you know, China’s role therein. I know China’s taken a much more muscular stance on, you know, the sovereignty issue, and justification for firewalls. So there’s a lot—there are a lot of countries that are sort of in the me too, you know, movement behind that, who do want to restrict the internet. So I just—could you give us a little update on what’s the status of that, versus, like, the Net Mundial people, who call for the total openness of the internet. And where is China in that space? How much influence does it have? And is it really—do you think the rules of the road are going to change in any significant way as a result of that? SEGAL: Yeah. So, you know, I think in some ways actually China has been less vocal about the phrase “cyber sovereignty.” The Wuzhen Internet Conference, which is kind of—China developed as a separate platform for promoting its ideas—you don’t see the phrase used as much, although the Chinese are still interjecting it, as we mentioned, in lots of kind of U.N. documents and other ideas. I think partly they don’t—they don’t promote as much because they don’t have to, because the idea of cyber sovereignty is now pretty widely accepted. And I don’t think it’s because of Chinese actions. I think it’s because there is widespread distrust and dissatisfaction with the internet that, you know, spans all types of regime types, right? Just look at any country, including the United States. We’re having a debate about how free and open the internet should be, what role firms should play in content moderation, should the government be allowed to take things down? You know, we’ve seen lots of countries passing fake news or online content moderation laws. There’s a lot of concern about data localization that countries are doing because of purported economic or law enforcement reasons. So I don’t think the Chinese really have to push cyber sovereignty that much because it is very attractive to lots of countries for specific reasons. Now, there is still, I think, a lot of engagement China has with other countries around what we would call cyber sovereignty, because China—countries know that, you know, China both has the experience with it, and will help pay for it. So certainly around the Belt and Road Initiative and other developing economies we do see, you know, the Chinese doing training of people on media management, or online management. There was this story just last week about, you know, Cambodia’s internet looking more like the Chinese internet. We know Vietnam copied part of their cybersecurity law from the Chinese law. A story maybe two years ago about Huawei helping in Zambia and Zimbabwe, if I remember correctly, in surveilling opposition members. So I think China, you know, still remains a big force around it. I think the idea still is cyber sovereignty. I just don’t think we see the phrase anymore. And I think there’s lots of demand pulls. Not China pushing it on other countries, I think lots of countries have decided, yeah, of course we’re going to regulate the internet. FASKIANOS: Thank you. Next question, from Ken Mayers, senior adjunct professor of history and political science at St. Francis College. Following up on Denis Simon’s question, to what extent to Chinese state actors and U.S. state actors share concerns about asymmetric threats to cybersecurity? Is there common ground for discussion? And I’m going to—actually, I’ll stop there, because— SEGAL: All right. So I’m going to interpret asymmetric threats meaning kind of cyber threats from other actors, meaning kind of nonstate or terrorist actors, or criminal actors. So I think there could be a shared interest. It’s very hard to operationalize. Probably about six or seven years ago I wrote a piece with a Chinese scholar that said, yes, of course we have a shared interest in preventing the proliferation of these weapons to terrorist actors and nonstate actors. But then it was very hard to figure out how you would share that information without exposing yourself to other types of attacks, or perhaps empowering your potential adversary. On cyber—for example, on ransomware, you would actually expect there could be some shared interest, since the Chinese have been victims of a fair number of Russian ransomware attacks. But given the close relationship between Putin and Xi these days, it’s hard to imagine that the U.S. and China are going to gang up on Russia on ransomware. So, again, I think there could be, it’s just very hard to operationalize. FASKIANOS: Great. Thank you. So just to follow on from Skyler Duggan, who is an undergraduate at the University of Waterloo. Likewise, to these questions, how do we differentiate individual criminal groups from the state? And how can we be sure this isn’t China just trying to abdicate—or, one party, he doesn’t specify, trying to abdicate the responsibility? SEGAL: Yeah, I think—because there’s—one of the challenges faced by the U.S. and other liberal democracies is that we tend to primarily keep a fairly tight legal control over the cyber operations. They tend to be, you know, intelligence operations or military operations. So Title 10 or Title 50. There’s kind of a whole set of legal norms around it. The U.S. does not rely on proxy actors. And other, you know, liberal democracies tend to don’t. And U.S. adversaries in this space tend to do so. We know Iran does. We know Russia does. We know China does, although less than the others. Now according to this discussion group that I mentioned before at the U.N., the group of—what’s called the group of government experts, one of the norms that all the actors agreed upon was the norm of state responsibility, which is a common one in international law, that you are responsible for whatever happens in your territory. So using proxies should not, you know, be able to give you an out. You shouldn’t be able to say, well, it’s happening from our territory, we just—you know, we don’t know who they are and we can’t control them. But, you know, in operation that norm is being fairly widely ignored. Now, the other problem, of course, is the—is how do you actually decide who the actor is, the attribution problem, right? So here, you know, a lot of people are basically saying, well, we have to rely on the U.S. or the U.K. or others to say, well, you know, we say it’s these actors, and how do we know—how do we know for sure? Now, attribution is not as hard as we once thought it was going to be. When I first, you know, started doing the research for the book that Irina mentioned, attribution was considered, you know, a pretty big challenge. But now, you know, there’s a fairly high expectation that the U.S. will be able to eventually identify who’s behind an attack. Now, it may take some time. And we may not be able to completely identify who ordered the attack, which is, you know, as you mentioned, the problem with the proxies. But it’s not—it’s also not completely reliant on digital clearances. It’s not just the code or the language of the keyboard. All those things can be manipulated, don’t necessarily give you proof. Lots of time the U.S. is pulling in other intelligence—like, human intelligence, signals intelligence, other types of gathering. So, you know, part of it is how much do we believe the attribution, and then how much of it is—you know, what can you do with it afterwards? And, you know, I don’t think the proxy problem is going to go away. FASKIANOS: Great. So I’m going next to Tim Hofmockel’s question. It’s gotten seven upvotes. He’s a graduate student at Georgetown University. To flip Denis Simon’s question: Who should the “we” be? To what extent should the U.S. intelligence community and the Department of Defense cooperate on offensive cyber operations? And how would we signal our intentions in a crisis given the overlap in authorities between the intelligence community and DOD? SEGAL: Yeah. I mean, so right now NSA and Cyber Command are dual hatted, meaning that one person is in charge of both of them, General Nakasone. So to some extent that could theoretically help deconflict between kind of intelligence gathering, offensive operations, and kind of signaling to the Chinese. But it’s unclear. It’s very—signaling in cyber so far seems to be kind of developing and unknown. That seems to be one of the big theories between the U.S. taking these more kinds of operations and, in fact, kind of bringing the fight to the Chinese is a very kind of sociological understanding of deterrence is that over time both sides will kind of understand where those red lines are by engaging and seeing where they’re acting. You know, others have talked about could you create some kind of watermark on the actual attack or vulnerability, so that the—you know, you might discover some type of malware in your system and there’d be like a little, you know, NFT, maybe, of sorts, that says, you know, the U.S. government was here. We’re warning you not to do this thing. You know, a lot of these have, you know, kind of technical problems. But the question of signaling I think is really hard, and that’s part of the reason why, you know, I think these discussions are so important, that at least we have a sense that we’re talking about the same types of things, and the same general set of tools. But I think probably through cyber signaling is going to be really hard. It’s going to be mostly other types of signaling. FASKIANOS: Next question from Maryalice Mazzara. She’s the director of educational programs at the State University of New York’s Office of Global Affairs. How can people who are working with China and have a very positive relationship with China balance the issues of cybersecurity with the work we are doing? Are there some positive approaches we can take with our Chinese colleagues in addressing these concerns? SEGAL: Good question, Ali. How are you? So I guess it’s very—so I do think there are forward-looking things that we can talk about. You know, several of the questions have asked, are there shared interests here? And I do think there are shared interests. You know, you we mentioned the proliferation one. We mentioned the nonstate actors. You know, there is a lot of language in the most recent statement from the Chinese government about—you know, that the internet should be democratic and open. I don’t think they mean it in the same way that we do, but we can, I think, certainly use that language to have discussions about it and hope push to those sides. But I think it is hard because it is—you know, partly because government choices, right? The U.S. government chooses to attribute lots of attacks to China and be very public about it. Chinese for the most part don’t attribute attacks, and don’t—they talk about the U.S. as being the biggest threat in cyberspace, and call the U.S. The Matrix and the most, you know, damaging force in cyberspace. But for the most part, don’t call out specific actors. So they kind of view it—the Chinese side is often in a kind of defensive crouch, basically saying, you know, who are you to judge us, and you guys are hypocrites, and everything else. So I think there are lots of reasons that make it hard. I think probably the way to do it is to try to look forward to these shared interests and this idea that we all benefitted immensely from a global internet. We now have different views of how open that internet should be. But I think we still want to maintain—the most remarkable thing about it is that we can, you know, still communicate with people around the world, we can still learn from people around the world, we can still draw information, most information, from around the world. And we want to, you know, keep that, which is a—which is—you know, not to use a Chinese phrase—but is a win-win for everybody. FASKIANOS: Great. I see a raised hand from Austin Oaks. And I can’t get my roster up fast enough, so, Austin, if you can unmute and identify yourself. Q: So I’m Austin Oaks. And I come from the University of Wisconsin at Whitewater. And I used to live in Guangdong province in China. And I used to go visit Hong Kong and Macau, more Hong Kong, very often. And Hong Kong has this very free internet, which China doesn’t particularly like. Macau tends to be more submissive to Beijing rather than Hong Kong does. But Chinese government has kind of started to put in people in the Hong Kong government to kind of sway the government into Beijing’s orbit more. So then how—so what is China doing in the cyberspace world for both of its separate administrative regions? Because one is a lot easier to control than the other. SEGAL: Yeah. So I think the idea of Hong Kong’s internet being independent and free is—it’s pretty much ending, right? So the national security law covers Hong Kong and allows the government to increasingly censor and filter and arrest people for what they are posting. We saw pressure on U.S. companies to handover data of some users. A lot of the U.S. companies say they’re going to move their headquarters or personnel out of Hong Kong because of those concerns. So, you know, it certainly is more open than the mainland is, but I think long-term trends are clearly pretty negative for Hong Kong. I expect Macau is the same direction, but as you mentioned, you know, the politics of Macau is just so much different from Hong Kong that it’s less of a concern for the Chinese. FASKIANOS: Thank you. I’m going to take the next written question from Robert Harrison, a law student at Washburn University School of Law. My understanding is that there have been significant thefts of American small and medium-size business intellectual property by Chinese-based actors. This theft/transfer of knowledge may reduce the competitive edge from the original property holder. Are there any current efforts to curb IP thefts? Any ongoing analysis of the Belt and Road Initiative to evaluate the use of IP acquired by theft? SEGAL: Yeah. So, you know, as I mentioned, the U.S. tried to reach this agreement with China on the IP theft challenge. China held to it for about a year, and then essentially kind of went back to it. It’s been very hard to quantify the actual impact of what the theft has been. You know, there are numbers thrown around, a certain percent of GDP, or 250 billion (dollars) a year. There is what’s called the IP Commission, which is run out of the National Bureau of Asia Research that has been updating its report. But it’s very hard because, you know, a lot of the knowledge and data that’s stolen is tacit knowledge. Or, you know, is actual blueprints or IP, but they don’t have the tactic knowledge. So you can have the blueprints, but it’s then hard to turn from that to an actual product. And it’s hard in the civilian space to kind of track lots of products that seem stolen from U.S. products, as opposed to—on the military side you can look at, oh, here’s the Chinese stealth jet. It looks a lot like the U.S. stealth jet. Now, this could be physics. It could be intellectual property theft. But it’s harder on the commercial side to kind of put a number on it and see what the impact is. Although clearly, it’s had an impact. We do know that Chinese operators, you know, go after other targets other than the U.S., right? So they certainly go—are active in Europe. We’ve seen them in Southeast Asia. Most of that is probably political espionage, not as much industrial espionage. Although, there has been—has been some. I don’t know of any specific cases where we can point to anything along the Belt and Road Initiative that, you know, seems in and of itself the outcome of IP theft. FASKIANOS: I’m going to take a written question from Caroline Wagner, who is the Milton and Roslyn Wolf chair in international affairs at Ohio State University. Chinese actors seem to have incredibly pervasive links to track online discussions critical of China. Are these mostly bots, or are there human actors behind them? SEGAL: So I’m going to interpret that to me for the net outside of China. So, yes. I think what we’re learning is there’s several things going on. Part of it is bots. So they have, you know, a number of bots that are triggered by certain phrases. Some of it is human, but increasingly probably a lot of it is machine learning. So there was a story maybe last month in the Post, if I remember it correctly, about, you know, Chinese analytical software data companies offering their services to local Ministry of State Security to basically kind of scrape and monitor U.S. platforms. And that is primarily going to be done through, you know, machine learning, and maybe a little human operations as well. FASKIANOS: Thank you. And this is a bit of a follow-on, and then I’ll go to more. William Weeks, who is an undergraduate at Arizona State University asks: What role does unsupervised machine learning play in China’s cyberspace strategy? SEGAL: Yeah, it’s a good question. I don’t have a lot of details. You know, like everybody else there, they are going to start using it on defense. It is a big push on what’s called military-civil fusion. You know, we know that they are trying to pull in from the private sector on AI, both for the defense and the offense side. But right now, all I can give you is kind of general speculation about how actors think about offense and defense with ML and AI. Not a lot of specifics from the Chinese here. FASKIANOS: Thank you. OK, Morton Holbrook, who’s at Kentucky Wesleyan College. Q: Yes. Following up on your comment about Hong Kong, about U.S. companies reconsidering their presence due to internet controls, what about U.S. companies in China and Beijing and Shanghai? Do you see a similar trend there regarding internet controls, or regarding IPR theft? SEGAL: I think, you know, almost all firms that have been in China, this has been a constant issue for them. So it’s not particularly new. I think almost all of them have, you know, made decisions both about how to protect their intellectual property theft—intellectual property from theft, and how to maintain connections to the outside, to make them harder. You know, VPNs were fairly widely used. Now they’re more tightly regulated. We know that the Chinese actually can attack VPNs. So it think, you know, those issues have been constant irritants. I think, you know, COVID and the lack of travel, the worry about getting kind of caught up in nationalist backlashes online to, you know, Xinjiang issues or if you refer to Taiwan incorrectly, those are probably higher concerns right now than these kind of more constant concerns about cyber and IP. FASKIANOS: Thank you. Anson Wang, who’s an undergraduate at the University of Waterloo. We have three upvotes. Is China considered the major threat to the U.S. hegemony because China is actively trying to replace the U.S. as the new global hegemon? Or simply because China is on a trajectory to get there, without or without their active intention in involving other countries’ internal politics, the same way that the U.S. does? SEGAL: Yeah. So I think this is a—you know, a larger question about what China wants in the world. And do we—you know, we do we think it has a plan or ideology of replacing the U.S.? And does it want—or, would it be happen even with regional dominance? Does it just want to block U.S. interest and others? It’s a big debate. You know, lots of people have contrasting views on where they think China is coming. I’ll just use the cyber example. And I think here, you know, the Chinese started with wanting to block the U.S., and prevent the U.S. from criticizing China, and protect itself. I don’t think it had any desire to reshape the global internet. But I think that’s changed. I think under Xi Jinping they really want to change the definitions of what people think the state should do in this space. I think they want to change the shape of the internet. I don’t think they want to spread their model to every country, but if you want to build their model they’re certainly welcome to help you. And they don’t mind pushing, perhaps highlighting, in some cases exploiting the weaknesses they see in the U.S. as well. FASKIANOS: OK. Thank you. I’m going to go to Helen You, who’s a student at NYU. It appears that governments are reluctant to restrict their cyber capabilities because they fundamentally do not want to limit their own freedom to launch cyberattacks. As a result, countries fail to follow voluntary norms on what is permissible in cyberspace. To what extent are industry standards influencing international cybersecurity norms? And what incentives would need to be in place to move these conversations forward? SEGAL: Yeah, that’s a great point. I mean, I think that’s one of the reasons why we haven’t seen a lot of progress, is because states don’t have a lot of reason to stop doing it. The costs are low, and the benefits seem to be high. Now, I understand your question in two separate ways. One, there is a kind of private attempt to push these norms, and basically arguing that states are going too slow. Part of that was promoted by Microsoft, the company, right? So it promoted the idea of what they were calling the Digital Geneva Convention, and then they have been involved in what’s now known as the Paris Accords that define some of these rules, that the U.S. just signed onto, and some other states have signed onto. But again, the norms are pretty vague, and haven’t seemed to have that much effect. There’s a thing called the cybersecurity—Global Cybersecurity Stability Commission that the Dutch government helped fund but was mainly through think tanks and academics. It also has a list of norms. So there is a kind of norm entrepreneurship going on. And those ideas are slowly kind of bubbling out there. But you need to see changes in the state to get there. That’s when we know that norms matter. And that we really haven’t seen. On the—there is a lot of work, of course, going on, on the standards of cybersecurity, and what companies should do, how they should be defined. And that happens both domestically and internationally. And of course, the companies are very involved in that. And, you know, that is much further, right? Because that has to do about regulation inside of markets, although there’s still, you know, a fair amount of difference between the U.S. and EU and other close economies about how those standards should be defined, who should do the defining, how they should be implemented. FASKIANOS: Thank you. I’m going to take group two questions from Dr. Mursel Dogrul of the Turkish National Defense University. In a most recent article we focused on the blockchain literature expansion of superpowers. In terms of publications and citations, China clearly outperformed the United States and Russia. Do you believe the technological advancement will have an impact on the cybersecurity race? And the Michael Trevett—I don’t have an affiliation—wanted you to speak a little bit more about the cyber triangle with Russia. How are China and Russia coordinating and cooperating? SEGAL: Yeah. So the first question, you know, clearly, as I have briefly mentioned in my opening comments, that the Chinese are pushing very hard on the technologies they think are going to be critical to the—to the future competition in this space—blockchain, quantum, AI. The Chinese have made a lot of advances on quantum communication and quantum key distribution. Probably behind the U.S. on quantum computing, but it’s hard to say for sure. And blockchain is a space the Chinese have developed some usages and are rolling some test cases out on the security side and the internet platforming side. On the China-Russia question, so closer cooperation. Most of it has been around cyber sovereignty, and the ideas of kind of global governance of cyberspace. The Chinese were, you know, pretty helpful at the beginning stages, when Russia started using more technological means to censoring and controlling the Russian internet. So helping kind of build some of the—or, export some of the technologies used in the China great firewall, that the Russians could help develop. Russia is pretty much all-in with Huawei on 5G. And so a lot of cooperation there. Although, the Russians are also worried about, you know, Chinese espionage from Russian technology and other secrets. They did sign a nonaggression cyber pact between the two, but both sides continue to hack each other and steal each other’s secrets. And have not seen any evidence of cooperation on the operations side, on intelligence. with them doing more and more military exercises together, I would suspect we would perhaps start seeing some suggestion that they were coordinating on the military side in cyber. But the last time I looked, I didn’t really see any—I did not see any analysis of that. FASKIANOS: Thank you. Next question from Jeffrey Rosensweig, who is the director of the program for business and public policy at Emory University. Q: Adam, I wonder if you could fit India in here anywhere you would like to? Because it think it’ll be the other great economy of the future. SEGAL: Yeah. So India’s a—you know, a really interesting actor in this space, right? So, you know, India basically think that it has two major cyber threats—Pakistan, and China being the other. China, you know, was reportedly behind some of the blackouts in Mumbai after the border clash. I am somewhat skeptical about reporting, but it’s certainly a possibility, and there’s no reason to doubt the Chinese have been mapping critical infrastructure there. India pushed back on TikTok and ByteDance. You know, also concerns about data control and other things. There is a long history of kind of going back and forth on Huawei. The intelligence agency has not really wanted to use, but others wanting to help, you know, bridge the digital divide and build out pretty quickly. India right now is talking about its own type of 5G. But from a U.S. perspective, you know, I think the most important thing—and this is often how India comes up—is that, you know, we want India to be an amplifier, promoter of a lot of these norms on cyber governance, because it is a, you know, developing, multiethnic, multiparty democracy. And so we want it just not to be the U.S.’ voice. Now, India’s a pretty complicated, difficult messenger for those things these days, right? India leads the world in internet shutdowns, and we’ve seen a lot of harassment of opposition leaders and other people who are opposed to Modi. So it’s not going to be easy. But I think the U.S. for a long time has hoped that we could forge a greater understanding on the cyber side with India. FASKIANOS: Great. I’m going to take the next question from Michael O’Hara, who is a professor at the U.S. Naval War College. And I’m going to shorten it. He asks about China’s fourteenth five-year plan, from 2021 to 2025. It includes a section titled “Accelerate digitalization-based development and construct a digital China.” Do you see their five-year plan as a useful way for thinking about Chinese future in cyberspace? SEGAL: Yes. So we’re on the same page, the digital plan came out two or three weeks ago. It was just translated. Yeah, I mean, the plan is useful. Like, all Chinese plans are useful in the sense that it certainly gives us clear thinking about the direction that China wants to go, and the importance it puts on a topic. You know, the implementation and bureaucratic obstacles and all those other things are going to play a role. But as I mentioned, I think, you know, the Chinese economy is becoming increasingly digitalized. And in particular, they want to digitize, you know, more and more of the manufacturing sector and transportation, mining, other sectors that are traditionally not, you know, thought of as being digital, but the Chinese really want to move into that space. Now, from a cybersecurity perspective, that, you know, raises a whole range of new vulnerabilities and security issues. And so I think that’s going to be very high on their thinking. And just today I tweeted a story that they held a meeting on thinking about cybersecurity in the metaverse. So, you know, they’re looking forward, and cybersecurity is going to be a very high concern of people. FASKIANOS: Well, we couldn’t have the Naval Academy without the U.S. Air Force Academy. So, Chris Miller, you wrote your question, but you’ve also raised your hand. So I’m going to ask to have you articulate it yourself. Q: Well, actually, I changed questions, Irina. Adam, thank you. FASKIANOS: Oh, OK. (Laughs.) But still, the Air Force Academy. Q: So two quick questions. I’ll combine them. One is: I’m curious how you see the new cyber director—national cyber director’s role changing this dynamic, if it at all, or changing the parts of it on our side of the Pacific that we care about. And second of all, curious how you see China viewing the Taiwanese infrastructure that they probably desire, whether or not they eventually take it by force or by persuasion. SEGAL: Yeah. So I don’t think the NCD changes the dynamic very much. You know, I think there’s lots of—you know, everyone is watching to see how the NCD and the National Security Council, and CISA, the Cybersecurity Infrastructure and Security Agency, work out the responsibilities among the three of them, which will have an impact, you know, of making us more secure. And, you know, Chris Inglis, the head of the NCD has given lots of talks about how they’re going to manage and work together. And I think we’re beginning to see some signs of that. But I think that’s probably the most direct impact it’ll have on the dynamic. Your second question, you know, I think primarily is about, you know, Taiwan Semiconductor. And, you know, do the Chinese eventually decide, well, chips are so important, and the U.S. is working so hard to cut us off, that, you know, for all the other reasons that we might want to see Taiwan, you know, that one is going to get moved up? You know, I think it’s a possibility. I think it’s a very low possibility. I do think we don’t know what the red lines are on the tech war, right? You know, there’s been talk about cutting off SMIC, the Shanghai manufacturer of integrated circuits, are also a very important company to the Chinese. Would that push the Chinese to do more aggressive or assertive things in this space? You know, what is it that we do in that space that eventually pulls them out? But I think it’s very hard—(audio break)—that they could capture TSMC in a shape that would be useful. Am I breaking up? FASKIANOS: Just a little bit, but it was fine. We have you now. SEGAL: Yeah. That you could capture TSMC in a shape that would be useful, right? I mean, there was that piece, I think, that was written by an Army person, maybe in Parameters, that, you know, the U.S. and Taiwan’s plan should be basically just to—you know, to sabotage TSMC in case there’s any invasion, and make that clear that that’s what it’s going to do. But even without that risk, you’re still dealing—you know, any damage and then, flight of people outside of Taiwan, because the Taiwanese engineers are really important. So it would be very high risk, I think, that they could capture it and then use it. FASKIANOS: Thank you. Well, I am sorry that we couldn’t get to all the questions, but this has been a great conversation. Adam Segal, thank you very much for being with us. You know, you’re such a great resource. I’m going to task you after this, there was a question from Andrew Moore at the University of Kansas about other resources and books that you would suggest to learn more about China and cybersecurity. So I’m going to get—come to you after this for a few suggestions, which we will send out to the group along with the link to this video and the transcript. So, Andrew, we will get back to you and share with everybody else. And so, again, you can follow Dr. Segal on Twitter at @adschina. Is that correct, Adam? SEGAL: That’s right. FASKIANOS: OK. And also sign up for—to receive blog alerts for Net Politics you can go to CFR.org for that. Our next webinar will be on Wednesday, February 9, at 1:00 p.m. Eastern Time. And we’re excited to have Patrick Dennis Duddy, director of the Center for Latin American and Caribbean Studies at Duke, to talk about democracy in Latin America. So thank you for being with us. You can follow us on Twitter at @CFR_Academic. Visit CFR.org, foreignaffairs.com and ThinkGlobalHealth.org for new research and analysis on other global issues. And again, Adam, thank you very much for being with us. We appreciate it. SEGAL: My pleasure. FASKIANOS: Take care.
  • Monetary Policy
    Digitizing the Dollar: The Future of Central Bank Digital Currencies
    Play
    Panelists discuss the future of central bank digital currencies (CBDCs), including their implications for traditional banking and financial sectors, concerns over privacy and public acceptance, and the likelihood of major economies adopting their own CBDC.  EISEN: Thank you so much and welcome, everybody. I am thrilled to be here with you today—Council on Foreign Relations Young Professionals Briefing on central bank digital currencies, which is such a hot issue, and one that is near and dear to my heart, coming—(laughs)—with a little bit of a forex background. I am Sara Eisen. I co-anchor Closing Bell on CNBC every day three to five p.m., which has been especially eventful lately in the final hour of trade. And more importantly, I’m pleased to introduce our distinguished panel of experts on this topic for you. Alana Ackerson is here. She’s the CEO of HQ, which is a subsidiary of Digital Currency Group, and they are focused on the world’s preeminent investors and companies related to crypto, decentralized finance, blockchain, and everything that goes with that. Sean Creehan is from the San Francisco Federal Reserve. He leads the fintech team for financial health and inclusion there. And Marion Laboure—hope I pronounced it right, Marion—is a senior economist at Deutsche Bank in London and also a lecturer at Harvard University, has worked extensively with central banks and governments around these issues and others. So welcome to all of you. Thanks for joining the conversation. I want to dive right in because we got so lucky on this conversation in getting a news peg. We got the long, highly anticipated—long-awaited, highly anticipated report from the Federal Reserve last week on the topic of central bank digital currencies. And Sean, I’m not sure whether we learned anything as far as commitment from the Fed towards a digital dollar, but there was a lot of good stuff in there as far as what they’re exploring. How would you summarize it? Set the table for us. CREEHAN: Sure. And thank you, Sara. Good to see you again. And thank you to CFR for having us today. I’ve been a term member of the Council on Foreign Relations for the last two-plus years, so it’s nice to be speaking to the broader audience. As Sara said, I’m based at the San Francisco Fed. I lead our program on financial health, inclusion, and technology, and previously worked as a(n) Asia-focused economist, including covering a lot of fintech developments in Asia. So this is right within my wheelhouse. But yes, as you said, it’s good timing. I was—I was grateful that that report came out before this event. I was—I was hoping it would. It makes my job today a lot easier. But yeah, I’d encourage you all to check that out. It’s called Money and Payments: The U.S. Dollar in the Age of Digital Transformation. It came out last Thursday. As you said, Sara, a lot of people have been waiting for this for—since last fall. I guess, you know, the question’s about is this a commitment. I think right off the bat, you know, there’s language in there that says that the broader U.S. government—the executive branch and Congress—would hopefully have some support in such an endeavor to issue a digital dollar, if we might call it that, ideally in the form of a specific authorizing law. So that language actually is in the paper. So there is a nod here to the broader public stakeholders. I think the paper is really interesting. I mean, for people that have been following CBDC—like Alana, Marion, and yourself—for a while, like you said, a lot of this is fairly known, but I think it’s a good distillation of the key issues. And so it’s acknowledging a variety of those questions, design choices that would confront the United States if we did decide to issue a digital dollar, and then welcoming comment from a lot of other stakeholders in the private sector, amongst think tanks. Really, I mean, it’s not an exaggeration to say that everyone in the world would be impacted by this. Everyone is impacted by the dollar. It is the preeminent currency around the world. So truly looking for public comment from all of these different stakeholders. You know, I can get into more on how it would work maybe a in bit after everyone else has had a chance to introduce themselves. EISEN: Sure. Well, and I was curious, Alana, your perspective on this because I was wondering if you thought we needed a central bank digital dollar coming from your world, where we have bitcoin and so many other cryptocurrencies, which are like—you know, they sort of function that way, although you can’t really buy stuff with them. Do you think central banks need to have their own digital currencies? ACKERSON: Thank you, Sara. You can’t buy anything with them just yet, but I think we’re seeing some interesting work being done around sats and ways to have more adoption. But you know, I—first, it’s a really exciting year. I think there are about sixty-four central banks that are exploring a CBDC right now. There’s so much activity. And I think that that is, obviously, phenomenal confirmation for the technology behind, you know, what’s being done more broadly in blockchain and in different digital assets. But you ask the right question, which is: Is the right path forward for, you know, the Fed to pursue a digital dollar? And I think that there are good arguments to be made for why they don’t have to do it themselves. You know, I don’t think that a Fed-driven currency changes things like the inflationary aspect, you know, of currency or the government’s ability to print money at a faster pace. It doesn’t solve for some of the problems that other digital tokens are designed to do. And so, you know, what I would say is it’s worth, you know, the Fed exploring supporting, you know, public blockchain and really looking at stablecoins, which are currently quite prolific, right, because a CBDC would take years to be rolled out. You know, and a stablecoin is a fantastic way to settle in and out of currencies right now, whether it’s bitcoin or USD. And so I think from a policymaking perspective, you know, the Fed can have a role in auditing whether the reserves are there, right? And in some cases, as with Tether, there should be concerns. But with a stablecoin like USDC, CircleCoin, you know, the backing is much more stronger and you can send money cheaply, almost instantaneously, right? So wire transfers become—you know, are expensive and take several days to settle, so using a stablecoin can make financial transactions much more convenient as well as being able to earn higher yields, right? So I think that there are multiple paths to explore right now, and a coin like USDC is essentially a programmable dollar, right, that unlocks a whole world of applications within financial services. EISEN: I’m excited because I think we’re going to get disagreement on this point. Marion, why do central banks need to issue their own digital currencies if we have things already out there like stablecoins? LABOURE: Yeah, no, that’s a good question. And thank you very much for having me. I’m very glad to be here. Yes, as Sean and Alana mentioned, this is becoming a big issue. And in my personal point of view, it’s no longer whether or not it’s going to be issued, but when. We have almost 90 percent of central banks which are working on a CBDC and there are several reasons for that, to answer your question, Sara. I mean, first, it provide a cash alternative. So, as we have seen during the pandemic, cash as a mean of payment has been declining, and it’s a good way to provide a cash alternative. It’s also good for financial inclusion. As we know, we have 1.7 billion inhabitants on Earth which are financially excluded, without a bank account, and half of them have a smartphone. So it could be a nice way for people to be able to save and invest money. There are also some competing—competition with other private currencies and CBDC. It can be also a good way to modernize payments, and I’m thinking especially here cross-border payment improvement. It could be much more efficient and cheaper. It can so link payment to identity, contrary to cash. We know that cash is also used for illicit activity and money laundering, and if we are able to link payment it can be a nice way to trace and avoid illicit activity. So it’s not necessarily what we have to know, and there are a lot of questions about anonymous transactions versus being able to link every payment and to trace every transaction. But maybe we’ll come back to that. And it’s also a nice way to enhance international currency status—and it was mentioned, by the way, in the Fed paper—especially given that China is about to release its CBDC for the Olympics Games. EISEN: No, so, Sean, you’ve looked into the China central bank digital currency experiment. They’ve launched it. They’re about to try to put it into a more sort of prominent international place with the Beijing Olympics. How is that going? And should the U.S. feel threatened by that? CREEHAN: Thanks for the question, Sara. And I should add, as I—as I start to kind of answer with my personal comments, that they reflect my own personal opinion, not necessarily those of the San Francisco Fed or the Federal Reserve System. Yeah. So great question. And getting to that comment from— EISEN: Way to protect yourself. CREEHAN: (Laughs.) Getting to that comment from Alana about competition from stablecoins or elsewhere, I would kind of set some context here, which is the Chinese have been working on this for a while but they did really start to announce more progress after Facebook announced libra. So if we really think about all these different actors at play here, I would agree I think it’s good to have a lot of innovation in the space from a variety of different parties. You know, I agree with a lot of what Marion just said in terms of the importance of central banks being involved in all of this. As far as how it’s going in China, I think the way I would describe it is it’s a—it’s a pretty substantial pilot. It’s an experiment, right? So the latest data that we’ve seen as of October of last year, maybe about 10 billion U.S. dollars’ worth of transactions have taken place using CBDC over these pilots. To put that into context, the number of non-cash—or the value of non-cash digital payments in China in 2020 was over $600 trillion. So we’re talking about 0.0001 percent, maybe. So it’s definitely a pilot. So I would say as far as we can tell it’s going well. I think we’re probably—the world is going to learn a lot about important design choices, the technology here. Some of it is, of course, proprietary. In my view, other central banks that might be interested in issuing their own CBDC will be able to learn and respond from China’s work here. I mean, I think there’s some extent to which this was a—sort of interpreted as a Sputnik moment, right? China announces this CBDC and everyone says, oh gosh, you know, what’s the U.S. going to do? The dollar is going to be disintermediated. I think one point I would make there—and this is particularly relevant for this CFR audience—is until China were to liberalize its capital account and really open up its financial sector in the way that the U.S. financial sector is opened up, that puts a limit on the utility of a yuan, whether it’s a paper yuan, whether it’s—whether it’s transferred using an existing payment rail—digital payment rail, or whether it’s using a CBDC. So I think that’s really important context as we watch the evolution of China’s own CBDC, is, you know, what’s going on with their—with their capital account and with their financial system liberalization, because I think that’s a really important prerequisite for any currency becoming anything close to the dollar. EISEN: There’s also safety questions, right, Alana, with some of these—China’s, with the cryptos, with all of them—which is if they’re going to replace cash and be a real means for payment and savings for people, how do we make sure that they are safe and privacy protected? ACKERSON: Right, and that goes both ways, right? I mean, Sean mentioned design decisions being made. And with any new piece of technology, any new process, right, there’s intention embedded in that as we create. And you know, one of the things to always wonder is about, is the moves that China’s making, you know, are they enabling, you know, the Chinese government to have more surveillance and more control over capital movements, right? Whereas, you know, I think in the U.S. you would see a lot of support for a public blockchain that isn’t controlled by any single entity but, rather, supported, you know, by minors all over the world. And that, you know, I think would be far more effective in accomplishing the objective of distributing capital to American citizens broadly, particularly in the last couple of years as we’ve seen challenges around that on the back of various shocks and events. And so, you know, I think that oversight is always an important design question, right? You’d want something that is publicly auditable, right? We need that transparency. And you want to not have concern over surveillance when it comes to privacy sort of in both directions. So the main questions, I think, for us are about, you know, can you audit; what is behind, you know, the token; and you know, what type of surveillance is embedded; in order for there to be broader adoption and trust. EISEN: Marion, how do you think about it? Do you think about it as a competitive race for these central banks, or how do you think about the Fed’s role and timing of launching a digital dollar—and Europe, for that matter, as the second most widely held reserve currency? LABOURE: Yeah, no, that’s a good point. And I think, yes, there is a competition. And to go back on Sean’s point on China, I mean, China started very early, in 2014, and they started for two different reason: for financial inclusion and as a cash alternative. So they started very early, and I would say that three factors played to accelerate the effort and speed up the process. First, there was the trade war with the U.S. Second, as Sean mentioned, the Facebook announcement of libra, or diem, and cryptocurrency stablecoin. And the third reason is probably the pandemic as well, which accelerated the effort. And yes, there is kind of competition between all the other regions in the world. China is clearly leading the race. We have a few countries which have already launched their CBDC, but they are definitely smaller. And China could propel CBDC into the mainstream—into the mainstream for four different reasons, I would say. The first reasons that plays for China, it’s probably government intervention. The government heavily supports infrastructure and sponsors infrastructure in China. A second sector that plays for China is demographics, the benefit from younger demographics, which is much more tech-savvy. Cultural differences, as well. China started paying via phone early 2000s, while we just started in the U.S. And the fourth reason is probably because in the U.S. and Europe we are heavily relying on cards, so we have, like, big leagues payment, I would say, while China basically transitioned directly from cash to smartphone payment. And cash is not very efficient to use, while in Europe or in the U.S. we are relying on cash payment and it’s very easy to take your card, take on that less, while it’s less efficient to pay cash. So the transition was more natural for China from cash to smartphone payment than it is in Europe or in the U.S., where we are used to pay with our credit or debit card. And your third point, Sara, was for Europe. For Europe, so the ECB did—the European Central Bank did big consolidation projects. They have decided to move in a two-year exploration phase. Christine Lagarde, the governor, was pretty vocal, and I think a lot of research has been done and is—the ECB’s clearly working on the—(inaudible)—the ECB. And we might, if it’s successful, have a CBDC probably in ’25-’26, I would say. But nothing has been decided and it’s still unsure at this stage. EISEN: It sounds like you guys all—I mean, it sounds like you all agree that this is where this—this is where it’s moving. And it sounds like you’re all kind of proponents of the idea of central bank digital currencies, although, Alana, I think you feel that stablecoins are a good alternative. What about the drawbacks? I mean, I get the point that they’re—the pros, there are a number of them. And financial inclusion is right at the top of the list. It’s what a lot of you focus on. But I’m curious about, for instance, what would happen to the commercial banking system, to the financial system, Sean, you know, if people weren’t—if they didn’t have those deposits then to make loans. If everyone just had their digital wallets from their Fed issued currencies. Like, what would happen to banking in America? CREEHAN: Great point. And this is one that’s actually covered in the white paper. And the term that we use as central bankers and, more broadly, in the financial system is intermediation—the importance of intermediation. And so the Fed actually uses this language in the white paper, the idea of intermediated CBDC. And the point there is exactly what you’re saying, to consider the impact on relatively low-cost deposit funding, or banks. So, yes, if you imagined a world where there was an unlimited CBDC wallet that someone could hold an unlimited amount in, and there’s interest bearing on it, that would change the decision for an ordinary household of whether to store that money with that bank or with another provider, or is that even held at the Fed? So I think what you’ll find when you read that white paper and other similar issuances by kind of international regulators, and for international settlements or other central banks, is really carefully considering the aspect of banks. Whether it’s a token-based—what we would call a token-based CBDC, or an account based. So an account-based CBDC would be held through some sort of supervised institution. Again, it’s possible, though, that it could be—it could not be a bank. It could be some sort of—some other sort of financial intermediary. And that would raise all sorts of questions about how do you assure the security of that—of that holding with that entity. But, yeah, so I’d say that’s clearly an issue. All sorts of issues around security and prevention of criminal activities in the financial system. I think that’s one—another area that you see heavily in focus. The Chinese are also grappling with this issue. So how do you create some sort of privacy? I mean, putting aside whether or not we trust what the Chinese government may be saying about privacy and the use of CBDC, how do you—can you create anonymity in the use of CBDC to mimic cash, because that is an important driver, the use of cash around the world, let’s not kid ourselves, even here in the United States. Some people may use cash because they get—the merchant takes cash because it costs them less to take it, and so the price might be lower for that consumer. But some people may be using cash because they don’t want the government to know that they’re doing something. Maybe they’re trying to avoid taxes. I mean, that’s not—that’s not legal, but it happens. And so let’s be real about that driver for cash. But so—but so thinking about government’s desire to kind of keep track of all of this financing activity while providing privacy perhaps for lower-level transactions. We’re seeing discussion of whether low-value transactions could be private using a CBDC, whereas higher-value transactions wouldn’t be. So those are other issues beyond the funding that you mentioned, but I think there is a lot there that we have to be thinking about. EISEN: Yeah. I mean, these are issues, Alana, that the crypto world has been grappling with for a long time, right? Issues of privacy, issues of illicit activities, money laundering, criminal, terrorist financing, what ultimately it’s going to mean for the banks. (Laughs.) Like, these are issues that you guys talk about all the time, right? ACKERSON: You know, and so much progress has been made, you know? And Sean hit on tax compliance, right, which is, you know, one expression of how the technology has used so quickly that, you know, sort of regulation of that technology is racing to keep up. And we’re learning new things every day. You know, I’m really encouraged by all of the infrastructure work being done on the back of the momentum you’re seeing into the digital assets base in just the last, you know, year or two. You know, it still is a fraction of what you see in traditional financial services, right? So I think maybe as of kind of mid-year last year, more than a billion a day was being sent via U.S. DC. And so when you think about the amount of transactions that would need to occur to displace sort of global financial services, it’s massive, right? And there needs to be a lot of infrastructure built up around that to be able to scale. But overall, I’d say the fact that digital currencies are now part of the—you know, sort of the public vernacular, right? That the Fed is publishing reports like the one that just came out, we’re having this conversation about whether or not the Fed should be involved in creating, you know, any type of digital infrastructure, is really a vote of confidence for the overall sector. EISEN: But what is it going to mean, ultimately, Alana, for a bitcoin, which right now—you know, it’s why we’re talking about a Federal Reserve-backed digital currency, because bitcoin has just halved in value in the last, I don’t know, few months—basically since November. And it’s been extremely volatile. Not necessarily on digital currencies, but the change in monetary policy. So I’m just curious what a further move into this space, the digital currency space from central banks, is going to mean for the assets that you invest in and that you cover. ACKERSON: Yeah. I mean, I can’t imagine it’s anything other than a very stabilizing force. You know, one of the things that we forget is—you know, particularly when faced with short-term panic selling, as we’re seeing now—is for much of the world bitcoin equals, as we said on this, access to capital, right? Access to capital that wouldn’t otherwise exist. The introduction of a stable financial mechanism that otherwise wouldn’t exist. You know, in the U.S. when we hear crypto, we think of speculative investing. But when you go to other, you know, regions, it is really the only lifeline to a livelihood and to be able to safely transact any stored value, right? And it’s important to keep that in mind as we watch this industry mature. EISEN: And there is the monetary policy question, Marion, which Alana brought up earlier. How does monetary policy conduct itself in an age of central bank digital currencies? Or even just increasing interest and investment in cryptocurrencies, and all of these other decentralized finance? Is that a threat to the way that monetary policy is done? LABOURE: I will say it’s a threat. And the thing is, it really depends on the design of the CBDC. We don’t yet know if a CBDC will be treated as cash, so basically non-interest-bearing, or if the central bank will decide to apply a negative interest rate, positive interest rate. So it really depends on the design. And, obviously, it depends as well how it is done in terms of wallet. For example, the European Central Bank is talking about a cap, stating that in your CBDC wallet you could get only 3,000 euros, in order to not destabilize the commercial banks. And it also depends, as Sean mentioned earlier, the setup and the disintermediation it’s going to cause. So, for example, you have, like, three different setup. The first setup is the one that we currently have. So, for example, consumers are holding their bank account at the commercial bank, and the commercial bank is liaising with the central bank. The second setup that you could have, it’s basically consumers holding directly their bank account at the central banks. And in this case, we don’t need commercial banks any longer. And the third setup that you can get—and this is the one which is the most plausible and the one adopted by the PBOC, the central bank in China—it’s where, basically, consumers hold their bank account at the central bank, but the relationship is intermediated by the commercial bank. And this is this kind of model that we are very likely to get in most countries. And one of the reason is probably, as Alana and Sean mentioned, it’s—the commercial bank is handing the QIC (ph) and all these kind of regulatory process, and it will add more responsibilities onto central banks. EISEN: What do you think, Sean, as far as monetary policy relationship in a world of central bank digital currencies? CREEHAN: Yeah. I think Marion nailed it there, really whether or not the design is to—the choice is to have interest-bearing or not, I think is a key characteristic. I also agree that there’s a lot of consideration going on beyond just EU on putting a cap on the amount that someone could hold in the wallet. And that would make a big difference in terms of the transition of monetary policy as well, in terms of bank funding. But, yeah, I would say, you know, of course I’m not a monetary policymaker. There’s a lot of complex factors here. But I think, again, keeping the banks involved in—or some other kind of supervised institution involved in the intermediation of CBDC is something that’s, I would guess, likely, but definitely unknown. But, you know, getting back to your overall question of, like, are we all leaning towards this is something that’s useful, the way I look at this, there are a lot of different ways to conduct noncash payments. I think one question is, do we—with CBDC, are we looking to make something more like cash-plus? You know, what are the features of cash that we like, and how do we improve upon them? You know, for me personally, if I want a savings—if I want a decent savings yield, there’s other products out there in the existing financial system that offer that fairly securely. I can get a sense of the risk profile, if it’s a money market savings account, if I want to get up—take more risk in terms of equities. Those options are there in the financial system, particularly in this country. So what are we really trying to solve for? And, you know, you mentioned inclusion. I think that’s a really big one. You mentioned before the concerns about privacy. I would broaden that to something more—something more akin to data rights in general. So, yeah, privacy is one of our data rights, but what are other potential data rights? To what extent do we have ownership or a right to use our financial transaction data to get access to other financial services? And so that’s one thing that I’m very excited about and bullish about in general, not just with something like a CBDC, but with other sorts of non-cash—or, yes, non-cash payment rails, to the extent that we can now more easily track our activity and use it to gain access to a loan, or something like that. And let’s also acknowledge that FedNow is out there. You know, people want it to happen more quickly than it is, but it is coming. That’s for sure. And so there are other existing Fed efforts to provide close to real-time payments and to solve for cross-border problems. There’s lots of things going on there. And so to the extent that you can give a consumer, or a corporate, or a small business access to Fed-backed digital payment rail in FedNow, that may solve a lot of these challenges as well. So, again, coming back to do we want cash-plus? What are we really looking for here? So lots of questions. EISEN: Good questions. Yeah, I mean, because, like, we all have credit cards, right? We have things like Venmo. We have—I mean, we don’t use cash that much anymore, to Marion’s earlier point. So what—so how would this—what would this be? Would I have an app on Square where I can have my digital Fed-backed dollars? Like, how would it work, Sean? CREEHAN: Yeah, I think—I think that’s right. Again, there’s a lot of design choices. I think another interesting question is could it work offline? And I think, particularly from the perspective of financial inclusion, or really just utility in general, you’d want something that could work if you’re buying a hotdog on a subway platform where there’s no cellphone connection, right? Then there’s security concerns. How do you prevent double spending of one CBDC? But, yeah, I think the idea is generally we would imagine it would be working on a smartphone. And you’re right, today, particularly in the United States—I think Marion alluded to this one reason why this may be not as widely adopting quickly as it is in other countries is because we don’t have—we already have these existing tools that work well, whereas in China they didn’t have them. But I’d say another angle to think about—and this is—when you think of financial inclusion, you often think of unbanked consumers. But we also have small businesses out there that pay a fairly hefty interchange fee to use the existing payment card networks, right? So they’re accepting a payment card, and it could be as high as 3 percent. All of us on this call probably use a rewards credit card. We’re playing that credit card game, trying to get rewards back. And that comes from a place of privilege, but that costs money to the small businesses. And if you think about that reward you’re getting back, that’s a rebate on your use of a digital payment system. Can we lower that cost? That would be something that would be another feature of all of this. So, sorry, I went a little bit farther than how would this actually work, but I think it’s—it would work on your phone. EISEN: No, that’s very interesting. No, but I think it gets, Alana, to this point about what problem are we trying to solve for here when it comes to CBDCs? ACKERSON: Yeah. When we talk about, you know, what the future of finance should look like, I think we all are excited about the promise of financial transactions being faster, cheaper, more transparent, inherently less risky for everyone. And that has implications for everything from, you know, running payroll to, you know, being able to have more transparent and stable donations to nonprofits, to cheaper payments, right, you know, as Sean was saying. And so there’s—you know, the implications are far-reaching. And it makes, you know, this conversation all the more exciting. LABOURE: Yeah, I’d like just to jump on Sean and Alana’s point about the end of cash. Yes, I mean, cash has been declining, and especially since the pandemic. I mean, the pandemic has probably accelerated the end of cash or the decline of cash by three and five years. Just to give you one number, in the U.K. currently, we estimate, and Square estimates that 40 percent of businesses are cashless. So definitely we see the decline of cash as a means of payment, but it doesn’t mean that it’s the end of cash. It’s not the end of cash because cash has a stored value. It’s clearly there. And just to give you one number, so we conducted a big survey. We have interviewed 3,600 people for a Deutsche Bank survey. And we have over 60 percent of people—and it’s true for the U.S., but for Europe and for China as well—who believe that cash will always be there. And when we look at cash in circulation—it’s true for the U.S., it’s true for the eurozone, it’s true for Japan—cash in circulation has been multiplied by two over the past twenty years. So we need to distinguish cash as a store of value, as a safe haven, which has been clearly on the increasing side, with cash as a means of payment. And to answer your last question, Sara, that will CBDC replace cash? I would say not yet, for two reasons. The first one, it’s because, again, we have 1.7 billion unbanked people relying purely on cash, which are unbanked. So half of them have a smartphone, so a CBDC could help, but half of them don’t have a smartphone. So we still need cash for the unbanked people. And the second reason, which is probably more realistic as well, it’s CBDC—there are a couple of countries—(inaudible)—for example the Bahamas, Eastern Caribbean, Nigeria, very soon in China and Jamacia, but we are still far from there in the U.S. and in Europe. EISEN: What is the timeframe here? What are you looking at? How long is this going to take, Sean, to get a U.S. digital dollar? Is this, like, in the next year or in the next twenty years? CREEHAN: That question, I think, goes well beyond my paygrade. (Laughter.) EISEN: As spokesperson for the Federal Reserve. CREEHAN: (Laughs.) Well, I think a lot of the technology exists. You know, you see the Boston Fed has an ongoing collaboration with MIT. They’re doing a lot of interesting work there. So I think a lot of this comes down to what’s said in the paper, which is, is there direction and support from the broader U.S. government? It’s there in the paper, it’s asking for Congress and the executive branch. So I think that’s a broader question. Again, probably beyond all of our expertise, and, you know, where that—where the politics and policy environment goes around this. But certainly, I think, to the extent that this is viewed through the lens that a lot of people in the Council on Foreign Relations tend to view the world, which is international competition, maintaining the strength of the dollar. But that pressure point is not going away. And the pressure from stablecoins and crypto is not going away, despite that decline in the market that you mentioned earlier, Sarah. So I wouldn’t want to predict a timeframe. But I think where there’s a will it could probably go more quickly than you think. But, again, let’s talk about China. Again, I said 0.001 percent is that pilot. Out of the total of 2020 now cash payments. And that’s after working on this, as Marion said, since 2014. So it’s not going to happen overnight. And it’s also an interesting question. Like, let’s acknowledge and be grateful for cash as it exists today. I live in Oakland, California, where we’re in earthquake country. And it’s encouraged that I have a certain amount of cash in my emergency go-bag because if power’s out I can’t use my bitcoin. I don’t know, maybe I could use my CBDC with a QR code. I don’t know how that might work. But, you know, cash is still going to be—have to play a valuable role. You talk to Fed cash folks all the time, they’ll point to examples like Puerto Rico, where there’s a natural disaster and they all just kind of bring a lot of cash into that market because it’s just necessary for the economy to keep functioning, for society to keep functioning. And I have trouble seeing that going away in our lifetimes. You know, in a Star Trek future 300 years from now, I don’t know, maybe electricity just comes through our kinetic energy, and the sun is shining down on our phone, and we don’t have to worry about power outages. But until that point, I think cash is at least going to be some share of a wallet. EISEN: While we’re on the predictions portion, Alana, what do you think is going to play out here in the next year or two, from your vantage point? ACKERSON: I think certain stablecoin rails have a significant head start and can add real value now. I think in general, you know, in the private sector we’ve seen the ability to move at a really good clip ahead of a government institution in building out broader technology infrastructure systems. And so obviously, you know, I am always a huge proponent of significant partnerships in that area. And so what I would predict is very real traction on the sort of public blockchain infrastructure side of things, because I think that’s where we’re going to see the best outcomes. EISEN: And what about you, Marion? What should we watch in the next year or two? Before we open it up, because I think we’re getting some good audience questions. LABOURE: Yeah, so just to follow up on what Alana mentioned, I would say two, probably, indicators to watch in 2022, especially when it comes to cryptocurrencies. The first one is inflation, who could play on the downside role. I mean, if central banks raise rates, bonds are becoming safer to invest with their yield. And on the positive side for cryptocurrency, I would say regulation. Regulation is clearly coming. It’s coming in the U.S. It’s coming in Europe as well. And if we have regulation, my personal point of view—again, I should have mentioned that, as Sean, I work in research, so my view is a personal view. It doesn’t represent Deutsche Bank view. But we should expect to see a robust framework next year in most advanced economies. And if we have a robust framework, I would expect more corporates, more people to invest in it, to accept it, to buy it, to sell it. And if we have more people, we have, like, adoption rates increasing, and we should have higher liquidity and more price stability. Because one of the issue of bitcoin, I think Sean mentioned that, is price stability. It’s not very stable. It happened quite frequently that bitcoin dropped or increased by 10 percent in a day, basically, sometimes. And one of the reason for that, it’s probably that it’s a niche market. So even if the market cap is very high, the volatility is high because the average bitcoin exchange is very small. EISEN: Yeah. Well, I do want to get to some questions from our audience. Alexis, I think we’ve got a few. Go for it. OPERATOR: (Gives queuing instructions.) We will take the first question from Shirin Mohammadi, who asks: Are blockchain-based CBDCs as environmentally destructive as cryptocurrencies? EISEN: Good question. Anybody want to take it? ACKERSON: So I’ll—yeah, I’ll jump right in, because I think, you know, perspective is important. When you think about bitcoin’s electricity consumption, and we read headlines where it seems like it’s a lot, if you compare it to what the traditional financial system uses, it pales in comparison, right? I think the entire bitcoin ecosystem probably uses less than half the energy of our traditional banking system, and all of its infrastructure. So it’s important just to kind of have context of the work that’s being done. That being said, as with all industries, it’s important to be thoughtful. And it is—it is an energy-intensive part of the ecosystem. And so, you know, the Crypto Climate Accord is doing some good work in advocating for alternative sources of energy. You see a lot of leaders in this space. Foundry, another DCG subsidiary, which is one of the top mining pools in the world, you know, has been doing quite a bit of work here as well. So I think it’s—I think that we’re seeing some real progress, but it’s important to contextualize the headline numbers. CREEHAN: So I’m not a technologist, so I can’t fully explain the kind of computing power necessary versus a bitcoin. I think generally my understanding would be because it—most of what we’re imagining is not a trust-less network, it’s trusted intermediaries that would be involved, it would just be a very different set of requirements. But just on the—on the context setting for bitcoin and others, I mean, it may be true that it’s roughly have of the energy expenditure of the banking system, but it’s nowhere close to even half of the social utility of the banking system, just in terms of what the global banking and financial system actually does for billions of people—you know, putting aside how everyone feels around bitcoin. It just—I don’t think it’s a really—I don’t think it’s comparable in that sense. And to the extent that the world has a finite amount of greener energy or computing power generally, there’s a lot of other challenges that need to be solved. And so I think there’s a—there are real claims on that energy as well. And so that’s something that I think is definitely important as we consider the tradeoffs in the use of a crypto versus a CBDC. But, yeah, on the environmental impact, I think generally because it would mostly be on a trusted network, it would just be a different requirement in terms of the computing power and the energy used. LABOURE: Yeah. And just to follow up on what Alana and Sean mentioned, to be on the positive side, there are some possible solutions for decarbonizing crypto. And just to sit of a couple of them, I mean, first, we can transition to renewable energy sources. And this is what El Salvador is trying to do. So it’s not easy, but it’s what they are trying to do in short term, add energy from volcanoes. There are also some ways to impose taxes to incentivize carbon-free crypto mining. Like, for example—(inaudible). One possible way to do that is probably to switch from proof of work to proof of stake for the course. So, as we are currently seeing for Ethereum, given that it’s supposed to create transition by mid this year, we can also verify transaction of the blockchain, for example, with the right network. I mean, it’s what El Salvador is doing. And one—I mean, another way to do that is probably also to pre-mine the tokens. We can issue (mine order ?) tokens, so no more energy is required to mine a new token. And it’s what, for example, XRP is doing. EISEN: Great. Alexis, did you have more questions for us? OPERATOR: We will take our next question from Andrew Abrudescu, who asks: What would CBDCs mean for existing cryptocurrencies, such as bitcoin and Ethereum? EISEN: Alana, you think it would be good, right, for everybody? ACKERSON: CBDC currencies? You know, I think it come back to the question of surveillance, trust, how it’s being structured and setup, which would lead to how much adoption we would see. You know, I think depending on execution, some CBDC currencies would have little impact on bitcoin, how prolific bitcoin is in a particular use case or region of the world. So it’s very much about execution. LABOURE: Yeah. Just to follow up on what—on what Alana said, I think there is similar things. I don’t think there is much impact on that. I would tend to see it as it depends how successful it’s going to be. As long as Ethereum/bitcoin had a very low market cap, innovation was considered as good by governments. Given that now the market cap is very high, close to 0.73 (on this day ?), regulators, central banks, governments are clearly monitoring it. If it’s becoming extremely big, I mean, at some point I think it could compete. And I wouldn’t be surprised if they are harshly regulated or even banned, as is the case in China for example. CREEHAN: I would just add I think it, again, comes back to what we think bitcoin, and Ethereum, and other crypto are used for. So to the extent you believe that bitcoin might be digital gold and a kind of an alternative asset as part of a broader allocation in a portfolio, then to the—it might be eating away from gold share, but I don’t think it necessarily is impacted by the rise of CBDCs that are meant to be used in the economy for transactions and other sorts of value in a savings account. So the extent that that’s the vision for bitcoin, maybe not as much of an impact. But to the extent that you’re thinking that bitcoin is going to be used in small-dollar—or, small-bitcoin transactions, then that’s a totally different conversation. EISEN: Alana, is bitcoin going to be used in transactions eventually? ACKERSON: Yeah. So I think I, in passing, mentioned this idea of sats becoming more popularized. And so, you know, for those who— EISEN: What is that? ACKERSON: Yeah. For those who aren’t as familiar, so sats or satoshis, are a fraction of the bitcoin. One of the biggest challenges in using bitcoin as a substitute for fiat right now is you can’t really transact in a bitcoin to buy a cup of coffee, right? So holding for some of the things that Sean talked about in terms of structural challenges around always having Wi-Fi or internet, and, you know, that’s a whole ‘nother discussion, you really need to be able to have smaller increments of payment, right? Much like we use pennies to the dollar. And so if one bitcoin equals 100 million satoshis, you can begin to transact in sats for regular commerce, right? Buying a sandwich for lunch. So I think we have to see more innovation in how we think about using bitcoin and other digital, you know, assets for, you know, sort of more regular payments. EISEN: Alexis, do you have more questions for us? OPERATOR: We will take our next question as a written question. Is there a role at all for international organizations, like the World Bank or IMF, in helping countries develop policies or facilitate cross-border policies surrounding digital currencies? EISEN: Good one. I was going to ask that too. The IMF is gearing up for this, for whatever it’s worth. They say that more than 100 of their members have plans for digital currencies. Do you think there’s a role there, anyone? CREEHAN: Marion might have thoughts as well. I think so. The Bank for International Settlements is also facilitating dialogue amongst major central banks. So I think there’s certainly, to the extent that there already is existing multilaterals that provide technical assistance to countries that are trying to develop their financial systems in a variety of ways, this is just one other topic that will be part of that. There’s so much attention paid to financial inclusion in developing countries. It’s only been reinforced by the pandemic, where we’ve seen that those countries with more functioning digital infrastructure were just better able to respond to provide, you know, basic stimulus and relief to ordinary citizens. There’s all sorts of potential gains to improving your digital infrastructure as a developing country, digital financial infrastructure. So I think a lot of multilaterals like the World Bank and IMF will be—will be really interested in this topic. LABOURE: Yeah. I think exactly the same that Sean mentioned. Yes, the World Bank is looking at this topic on the financial inclusion side. The IMF—International Monetary Fund—is also looking at that, at this topic, currently more on the stability/monetary policy side. And the Bank of International Settlement is clearly looking at this topic very deeply, actually. The G-20 is also looking at this topic. And more probably to—they are trying to set up international groups, bodies to work on that on that topic to foster cooperation/collaboration between central banks with the best practice. EISEN: OK. I think we have a few more to get to. OPERATOR: We will take our next question from Tope Odunsanya with Houlihan Lokey. To utilize existing stablecoins instead of CBDCs what obstacles are top of mind as we think about distributing tokens from existing holders into the wider economy? EISEN: Alana, you’re the proponents of stablecoins, I think. ACKERSON: You know, I think access to more secure infrastructure is always going to be sort of what will democratize the use of various digital assets. And that’s true for any new technique that’s being introduced. So distribution to the wider economy, I think it’s education, it’s continuing to build up infrastructure around storage and exchanges. But I don’t have thoughts beyond that. EISEN: Anybody else want to take up stablecoin? CREEHAN: I think generally, to summarize it, I would say just issues of trust as a consumer. So, you know, worrying about the issuer. Are there reserves, some sort of stable security held against that stable coin? In my mind, I kind of think of this as similar to, like, a money market mutual fund. There’s been a lot of reform and different regulatory approaches since the 2008 crisis, and then more recently in the pandemic, a lot of different activity there. For those that are interested, the president’s working group did issue a paper on this late last year. So I would advise checking it out. But, yeah, just—I think the barrier is probably not technical. It’s just the issues of trust, which gets into some of the broader topics we’ve already been covering. EISEN: Yeah. Good. Alexis, one more? OPERATOR: We will take our next question from Will Barnes. How far do you expect that wholesale CBDCs could replace conventional financial market infrastructure for applications such as settling securities trades or making cross-border interbank payments? EISEN: That’s a good one. Marion, I mean, this is a big part of why some people see the need for CBDCs, especially the cross-border issue. But what about the rest of the financial markets and the system? LABOURE: Yeah, no, that’s a good question. And actually, we mostly talked about retail CBDC, but wholesale CBDC, it’s a big topic. Just to set up the context, I think from the latest statistics released by the Bank of International Settlement(s) we have definitely more central banks working on retail than wholesale. But this is a big topic. This is something which is actually advancing. For example, the Banque de France is actively working on this. They have issued the first digitalized bonds last year. So this is clearly something which is—which is under scrutiny. The European Investment Bank also has issued a bond as well. So, yes, it’s something which is definitely looked at, and which is advancing rapidly. ACKERSON: Marion mentioned the Bank for International Settlements. And, you know, as an umbrella group for central banks, it’s interesting to watch what its focus is. And you see it going all-out on CBDCs this year. Tons of research initiatives across central bank digital currencies and DeFi applications, you know, it’s lined up for 2022. So I think we’re going to see an incredible amount of activity there. EISEN: I think we have time for one more question. OPERATOR: We will take our next question as a written question. How do we get the average citizen to understand this kind of technology? And do they actually need to understand it in order to use it? EISEN: That’s a good one. CREEHAN: Yeah, it’s a good question. Sorry, go ahead, Alana. ACKERSON: What I was going to say—you know, I think that, you know, sort of financial literacy is always an incredibly important area for us to focus on as a, you know, sort of broader community. It’s important for everyone to understand, you know, how they can get access to capital, how they can get access to means for saving and transacting, to be able to engage in any number of economic activities. I think, you know, the onus is somewhat on, you know, sort of the key innovators in this space to continue to be very transparent about what’s being developed, how it can be accessed, the choices being made—coming back to intentions that I talked about earlier. Everything from sort of how various sort of protocols are securing, you know, their infrastructure, to who strategic partners are. So the more transparency, the more financial, you know, literacy resources, the better. And I do think, you know, if you are going to use a piece of technology, there is a responsibility to understand it and to engage with it responsibly, always. CREEHAN: So— LABOURE: Yeah, no, I’m going to—sorry, Sean. CREEHAN: Go ahead. Go ahead. LABOURE: Yeah, I’m going to echo what Alana just mentioned. And I think financial literacy is key, especially when we see the low level of financial literacy in OECD countries. And I think education has a big role to play here. I’m going to push for it, given that, I mean, part of my job is to teach finance. But we really need to democratize finance, to make it accessible for everyone. And I think there is also a push for the financial sector, financial industry there, to make sure when they are expressing themselves and they are writing about finance, it’s feasible to understand for everyone because, I mean, when you take a mortgage these days it’s not easy to understand the numbers. It’s not easy—the language is not easy to understand. And I think we need to push for that. And Christine Lagarde actually is probably making sure that the ECB is moving towards that direction, making ordinary things which are online accessible for everyone much more understandable, and we need to go into that direction. And I also think that we need probably more data, better data, more transparent data than what we have currently, in order to have—to make sure we really understand. And especially for cryptocurrencies, there is a lack of data. When we talk about energy, you have, I mean, many surveys, many papers on energy in terms of cryptocurrencies, but they are not very comparable in terms of what they are doing and collecting. And we need to have a much more clearer, better, and transparent data. CREEHAN: So very quickly, just to piggyback, definitely agree. Financial literacy is important. I would say it’s probably more important for more sophisticated financial services. I think a payment tool should be pretty easy for a citizen to understand. And if it’s not, then maybe there’s some issues there. But I think you should be able to trust it. It should be safe and secure, fast, low-cost. So to the extent that that’s the kind of features that these alternative competing—competing alternatives are offering, then hopefully there’s just a lot of great options for people. And as long as they’re asking those basic questions, like does it meet this minimum standard, then it’s good to go. EISEN: And final one from me, just to wrap it up, what if Congress doesn’t understand it? But what if, Sean, they don’t pass it? Does that threaten the U.S. dollar’s role as the international reserve currency, if everybody else is moving in this direction? CREEHAN: I think something like FedNow, I think other rails can continue to run a lot of these features that we’re looking for. So I don’t think that’s the case, but certainly, you know, to the extent we want to pursue CBDC, it would be helpful to have everyone aligned, from a public-sector perspective. EISEN: Marion, did you have a thought on that? LABOURE: Yeah. No, I fully agree with what Sean mentioned. And basically, that was also China’s—(inaudible)—because the bill that the U.S. issued I think it was two years ago, a year-and-a-half ago, did mention the digital wallet, but we didn’t pursue it. EISEN: Well, I think we’re out of time. That wraps it up. Thank you guys all for all the great audience questions and participation. A special thanks to Alana, Marion, and Sean for the excellent commentary, and for having me here today, on a very timely conversation, which we will pick up, and seems like will only get more exciting. Thank you guys all for joining us today. And thanks to CFR. CREEHAN: Thank you, Sara. LABOURE: Thank you. ACKERSON: Thank you. Bye-bye. (END)