Digital Policy - Atlantic Council https://www.atlanticcouncil.org/issue/digital-policy/ Shaping the global future together Fri, 30 Jan 2026 17:49:29 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://www.atlanticcouncil.org/wp-content/uploads/2019/09/favicon-150x150.png Digital Policy - Atlantic Council https://www.atlanticcouncil.org/issue/digital-policy/ 32 32 How India’s AI talent playbook can provide a blueprint for aspiring AI powers https://www.atlanticcouncil.org/blogs/geotech-cues/how-indias-ai-talent-playbook-can-provide-a-blueprint-for-aspiring-ai-powers/ Fri, 30 Jan 2026 17:49:25 +0000 https://www.atlanticcouncil.org/?p=902564 As host of the AI Impact Summit, India has the opportunity to build a framework that can help enable emerging economies tap the benefits of AI adoption.

The post How India’s AI talent playbook can provide a blueprint for aspiring AI powers appeared first on Atlantic Council.

]]>
In February, New Delhi will host the AI Impact Summit, a gathering of policymakers, industry leaders, and researchers, with the tagline “People, Planet, Progress.” This summit arrives at a turning point, as the center of gravity on artificial intelligence (AI) adoption shifts toward emerging economies, home to three-quarters of the world’s population. With the summit, India, already a leader in AI skill penetration, is positioning itself as a “shaper” rather than a mere “adopter” of these technologies.

But the success of the New Delhi summit will depend on how effectively it moves beyond rhetoric to address the realities of AI adoption, including the need for workforce development. To this end, on January 23, the Atlantic Council hosted an official pre-summit event in partnership with the Indian embassy in Washington, DC. The event opened with remarks by Ajay Kumar, minister (commerce) at the Indian embassy in Washington, DC, as well as Tess DeBlanc-Knowles, senior director of the Atlantic Council’s Technology Programs. This was followed by a panel discussion with Martijn Rasser, vice president for technology leadership at the Special Competitive Studies Project; Nicole Isaac, vice president for global public policy at Cisco; and Peter Lovelock, chief consultancy and innovation officer at Access Partnership. Below are some of the key takeaways from that discussion, as well as several of the panelists’ recommendations for how to approach these issues heading into the AI Impact Summit. The discussion underscored that while the potential for AI-driven growth is immense, the hurdles, ranging from a global talent shortage to fragmented labor data, require more than just market forces to overcome.

The global AI talent gap

The current global AI talent landscape can be viewed as a pyramid, according to Rasser. At the apex, he said, sits a cohort of around ten thousand elite PhD-level researchers and machine learning engineers. While the United States and China currently dominate this top layer of researchers, the real opportunity for emerging powers lies at the applied level. India possesses significant depth in its service sector, but the true challenge is building institutional readiness, ensuring that organizations can effectively channel available talent into high-value applications.

The most underappreciated deficit is not in raw coding but in AI-adjacent skills. There is a pressing need for product managers and domain experts who can bridge the gap between technical tools and organizational needs. For emerging economies, said Lovelock, the goal should not be to replicate Silicon Valley’s research labs, but to build an ecosystem where AI is “burned into” industrial applications such as supply chain management and export-import calculations.

AI infrastructure as workforce policy

“At its core, AI is designed, built, and deployed by humans,” noted Knowles. Indeed, a persistent theme for the global majority is that connectivity cannot be separated from workforce policy. Without reliable digital access, Isaac noted, billions remain excluded from the transformative benefits of AI. Security is another foundational layer; as AI environments become more complex, training in cybersecurity and digital resilience becomes essential to protect vulnerable populations from bad actors.

Trisha Ray, Martijn Rasser, Nicole Isaac, and Peter Lovelock at the Atlantic Council’s public panel, “Road to Impact Summit 2026: India’s AI talent playbook,” hosted on January 23, 2026.

Kumar, the Indian embassy official, laid out India’s strategy for a comprehensive five-layer “AI stack,” including sovereign models, semiconductors, and data centers. By providing compute power to educational institutions at a fraction of the global market rate, he argued, the government aims to democratize access across smaller cities. However, the widening digital divide remains a threat. If certain segments of the population are left behind, the resulting “have and have-not” divide could persist for generations, he said.

The other data problem

We cannot manage what we cannot measure. Policymakers, said Lovelock, are currently operating with “static” data that looks in the rearview mirror. Traditional labor statistics, often based on outdated surveys, are ill-suited for a fast-moving technology. Furthermore, labor data is often fragmented across various ministries, making it difficult to understand where the actual skill gaps lie.

Standard adoption metrics are increasingly irrelevant because individual AI use is highly varied. Instead of tracking who is using the technology, said Lovelock, governments need a “diffusion framework” that measures the actual impact of AI use on the economy. Only then can they make the strategic bets required for a long-term return on investment.

Four pillars for the summit’s AI talent agenda

Following from the panelists’ insights, the AI Impact Summit can deliver a scalable and inclusive AI talent framework by coalescing the global community around four primary actions:

  • Modernize education through personalized AI tools. Rather than sticking to the “one-to-many” broadcast model of traditional schooling, curricula should be reformed to put AI tools directly in the hands of students. This shift allows for personalized learning and ensures that students learn by doing, preparing them for a rapidly changing job market.
  • Create an AI Diffusion Index to measure actual adoption. Policymakers should move away from static adoption statistics and toward real-time data signals that measure how AI is being embedded into industrial and public services. This requires supplementing government surveys with nontraditional data sources to better align educational output with actual labor market demand.
  • Treat connectivity and security as foundational workforce issues. Investment in fiber and satellite infrastructure must be paired with training in digital resilience and cybersecurity. This ensures that the benefits of AI are shared broadly and that new users are protected from the heightened risks of an AI-ready environment.
  • Position government as the “first user” of new technologies. The public sector should take the lead in adopting AI for the delivery of public services in agriculture, healthcare, and education. By demonstrating the usefulness and accessibility of these tools within government, the state can send a powerful signal to the broader population and help accelerate national adoption.

The success of the AI Impact Summit will be measured not just by the declarations its participants make, but by the structural cooperation that survives past February. The summit offers a rare opportunity to pool global resources to solve the AI workforce crisis, replacing anecdotal evidence of AI adoption with rigorous data and flexible approaches to meet shifting workforce needs. At the summit, New Delhi has the opportunity to transform a week of dialogue into a sustained, collaborative framework that can help enable emerging economies to tap the benefits of AI adoption.


Trisha Ray is an associate director and resident fellow at the Atlantic Council’s GeoTech Center.

Further reading

The GeoTech Center champions positive paths forward that societies can pursue to ensure new technologies and data empower people, prosperity, and peace.

The post How India’s AI talent playbook can provide a blueprint for aspiring AI powers appeared first on Atlantic Council.

]]>
Eight ways AI will shape geopolitics in 2026 https://www.atlanticcouncil.org/dispatches/eight-ways-ai-will-shape-geopolitics-in-2026/ Thu, 15 Jan 2026 23:35:20 +0000 https://www.atlanticcouncil.org/?p=899346 Experts from the Atlantic Council Technology Programs share their perspectives on what to expect from AI around the globe in the year ahead.

The post Eight ways AI will shape geopolitics in 2026 appeared first on Atlantic Council.

]]>
The events of 2025 made clear that the question is no longer whether artificial intelligence (AI) will reshape the global order, but how quickly—and at what cost.

Throughout the year, technological breakthroughs from both the United States and China ratcheted up the competition for AI dominance between the superpowers. Countries and companies raced to build vast data centers and energy infrastructure to support AI development and use. The scramble for cutting-edge chips pushed Nvidia’s valuation past five trillion dollars—the first company to reach that milestone—even as concerns mounted over circular financing and the question of how much the AI boom is founded on hype versus reality. Meanwhile, policymakers grappled with the balance between safety, security, and innovation and how to manage possible labor disruptions on the horizon.

As 2026 begins, rapid AI integration threatens to inject even more unpredictability into an already fragmented global order. Below, experts from the Atlantic Council Technology Programs share their perspectives on what to expect from AI around the globe in the year ahead.

Click to jump to an expert prediction: 

Emerson Brooking: AI poisoning goes mainstream

Tess deBlanc-Knowles: The US pushes AI tech exports to counter China

Konstantinos Komaitis: AI governance turns global

Ryan Pan: The US-China AI race intensifies in a multipolar world

Esteban Ponce de León: AI challenges human judgment

Trisha Ray: Countries go all in on ‘sovereign AI’

Mark Scott: The battle of the AI stacks escalates

Kenton Thibaut: China doubles down on AI-powered influence operations


AI poisoning goes mainstream

Russia’s Pravda network of websites has published millions of articles targeting more than eighty countries. These sites launder and amplify content from Russian state media, seeking to legitimize Russian military aggression while casting doubt on Western support for Ukraine. Most of these articles will never be viewed by a human. Instead, they seem intended to target the web crawlers that scour the internet for training data to feed to insatiable AI models.

And the strategy is working. Last year, the Atlantic Council’s Digital Forensic Research Lab (DFRLab) and CheckFirst demonstrated how mass-produced Pravda articles were cited in Wikipedia, X Community Notes, and responses from major chatbots. Parallel research by Anthropic and the United Kingdom’s AI Safety Institute has shown how trace amounts of faulty data can effectively “poison” even very large models. People increasingly turn to AI systems to understand current events. If an AI model’s knowledge has been altered by sources intended to deceive, then the users’ will be, too.

In 2026, the issue of AI poisoning will break into the mainstream. Because of a roughly two-year lag in AI training data (many AI models are still waiting for the results of the 2024 US presidential election, for instance), these AI-targeted propaganda campaigns are about to start manifesting more often. And because one cannot reliably audit what’s inside a deployed AI model, the result will be a staggering research and policy challenge.

Digital policy experts, including the DFRLab, have spent a decade learning to identify, explain, and expose online disinformation where people can see it. This is online disinformation where they can’t.

Emerson Brooking is the director of strategy and a resident senior fellow with the Atlantic Council’s Digital Forensic Research Lab.


The US pushes AI tech exports to counter China

In 2026, the United States will double down on exporting the US tech stack as the cornerstone of its international AI strategy. In December 2025, US President Donald Trump set the tone with his decision to allow Nvidia to export its advanced H200 chips to China, a clear endorsement of the view that the United States wins when the world builds and deploys AI using US technology.

Published days before the Nvidia decision, the Trump administration’s National Security Strategy makes this explicit: “We want to ensure that US technology and US standards—particularly in AI, biotech, and quantum computing—drive the world forward.” This framing echoes the AI Action Plan the administration released in July 2025, which stated that the “United States must meet global demand for AI by exporting its full AI technology stack,” warning that a failure to do so would be an “unforced error.”

In 2026, expect to see the United States sign more AI-focused partnerships like those forged with Saudi Arabia and the United Arab Emirates in 2025, alongside efforts to counter China’s growing influence in emerging markets. But as the United States makes this push, China holds some key advantages. Its lead in open-source AI models and focus on applied AI could prove to be the winning formula for capturing global market share with free models and deployment-ready technologies.

Tess deBlanc-Knowles is the senior director of Atlantic Council Technology Programs.


AI governance turns global

In 2026, AI governance enters its first truly global phase with the United Nations–backed Global Dialogue on AI Governance and Independent International Scientific Panel on AI. For the first time, nearly all states have a forum to debate AI’s risks, norms, and coordination mechanisms, signaling that AI has crossed into the realm of shared global concern.

Yet this ambition unfolds amid acute geopolitical tension: The European Union pushes a rights- and risk-based regulatory model, while the United States favors voluntary standards to preserve innovation and security flexibility. For its part, China promotes inclusive cooperation while defending state control over data and AI deployment. Smaller and developing states gain a voice but remain structurally dependent on the major powers that control the bulk of AI talent, capital, and computing power.

The result is a fragile, uneven global framework. States converge on scientific assessments, transparency norms, and voluntary principles, but they avoid binding limits on high-risk AI uses such as autonomous weapons, mass surveillance, or information manipulation. Coordination emerges, but the core strategic competition remains unresolved, producing a governance architecture that manages risks at the margins while leaving rival models largely intact.

By the end of 2026, the Global Dialogue will likely have made AI governance global in form but geopolitical in substance—a first test of whether international cooperation can meaningfully shape the future of AI or merely coexist alongside competing national strategies. This juncture offers states an opportunity to demonstrate leadership by strengthening institutional capabilities and collaborative mechanisms, fostering a global AI governance framework that is more coherent, equitable, and universally engaged.

Konstantinos Komaitis is a resident senior fellow with the Atlantic Council’s Democracy + Tech Initiative.


The US-China AI race intensifies in a multipolar world

The year ahead will see an even fiercer competition over AI dominance between the world’s two largest powers—the United States and China—while middle powers gradually close the gap in the race. China’s DeepSeek started off this year with a research paper on a new AI training method to efficiently scale foundational models and reduce costs. This publication comes almost exactly a year after the headline-making paper it released in January 2025, which was followed by the launch of DeekSeek-R1. The timing of this year’s new publication signals that the company will launch new models and continue shaping the world’s AI industry this year.

In 2026, expect China to double down on its open-source AI strategy to influence the world’s AI infrastructure. (Several major US tech companies are already using Chinese large language models in their applications.) The United States and China may also engage in further trade retaliation in the AI supply chains in light of recent developments in Venezuela, from which Chinese companies had gained access to rare earth minerals crucial to developing the AI stack. The Trump administration’s recent claims regarding Colombia, from which China also sources rare earth elements, could make Latin America the next technology battleground between the two powers.

But what about powers beyond the United States and China? In 2026, look for Europe to increase its AI defense investments even more than it did in 2025. Middle powers, notably India, will see their AI capability greatly improved this year, as US tech giants have recently pledged billions in investments in India’s AI capabilities. 

The AI race in 2026 will still be defined by a multipolar order. Nevertheless, the United States and China will continue to yield the greatest influence.

Ryan Pan is a program assistant with the Atlantic Council’s GeoTech Center.


AI challenges human judgment

In 2026, human–AI interaction will likely challenge human judgment and identity more deeply than in any year to date. This is not only because AI models are demonstrating increasingly complex capabilities, but also because AI-generated content can be so emotionally charged in today’s polarized information environment.

Online sources and social media have shown how polarization can be deliberately targeted, and the use of AI to generate fabricated or distorted content adds a new layer to how social and political events are interpreted. AI content is reshaping the dynamics of both manipulation and what could be described as a “misinformation game,” in which techniques such as the deployment of AI slop and the memeification of events are used to mock adversaries and amplify key propaganda narratives. For example, in June 2025, amid the Israel-Iran escalation, AI became the new face of propaganda. This included graphic and sensational AI-generated fake content, such as fabricated missile strikes, military hardware, religious and national symbols, and memes. But it also included more sophisticated fabrications of CCTV footage that became increasingly difficult to debunk.

In the first days of 2026, as the Trump administration captured Venezuelan strongman Nicolás Maduro, the use of AI to generate media content increased drastically. While much of this content was humorous or satirical in nature, it nonetheless illustrates emerging usage patterns, as playful AI-generated media can still shape perceptions of power and blur the line between satire, manipulation, and propaganda. Whether fabricated content aims to provoke humor or confusion, human judgment will face new challenges in the year ahead.

This challenge to human judgment and identity extends beyond misinformation. In 2026, the AI landscape may begin to show early signs of benchmark saturation, in which models converge at near-maximum scores on established capability tests, collapsing the measurable differences between them. This matters for the information environment because the same logic applies: If distinguishing real from fabricated content becomes difficult, then so too does distinguishing what humans uniquely contribute from what AI can replicate. The implications extend to professional identity and how to understand individual value and competence.

Esteban Ponce de León is a resident fellow with the Digital Forensic Research Lab.


Countries go all in on ‘sovereign AI’

There are unprecedented amounts of capital flowing in to meet the anticipated demand for AI. Last year, for instance, kicked off with Trump’s announcement of Stargate, with the aim of investing $500 billion in AI infrastructure over five years. The principle driving this trend is straightforward: Countries think they must control AI before it controls them. Consequently, there was a wave of sovereign AI announcements in 2024 and 2025.

That momentum will only grow in 2026, starting with the launch of India’s sovereign large language model at the AI Impact Summit in February. Nations are seeking sovereign AI to strengthen their domestic economies, protect national security, mitigate geopolitical shocks, and reflect national values. However, there’s a catch: Not every country can, or should, try to build every part of the AI stack on its own. Trying to recreate from scratch everything from data centers to models is expensive, redundant, and impractical. Nations will need to choose what to build, what to buy, and where partnerships make more sense than going solo.

Trisha Ray is an associate director and resident fellow with the GeoTech Center.


The battle of the AI stacks escalates

As AI becomes more central to countries’ economic prospects, national policymakers will likely seek to impose greater control over critical digital infrastructure. This infrastructure includes compute power, cloud storage, microchips, and regulation, and it is central to how emerging AI technology will develop in 2026. For the world’s largest digital powers—the United States, the European Union, and China—the push to control this infrastructure will likely evolve into a battle of the “AI stacks”—increasingly opposing approaches to how such core digital AI-enabling infrastructure functions at home and abroad.

The White House’s AI Action Plan, published in July 2025, made it the stated policy of the federal government to export the US stack to third-party countries, including via potential funding support from the US Department of Commerce for other governments to purchase offerings from the likes of Microsoft, OpenAI, and Nvidia. The European Commission has earmarked billions of euros for so-called AI gigafactories, or high-performance computing infrastructure, from Estonia to Spain, while national leaders also vocally called for a “Euro stack.” The Chinese Communist Party is urging local firms to forgo Western AI know-how and rely instead on domestic alternatives from companies such as Alibaba or Huawei.

The rest of the world will have to navigate these increasingly rivalrous approaches to AI infrastructure at a time when all countries seek greater control of so-called digital public infrastructure—that is, the underlying hardware and, increasingly, software needed to power complex AI systems. How these different AI stacks interact with each other will be critical to how the technology develops over the next twelve months.

Mark Scott is a senior resident fellow with the Atlantic Council’s Democracy + Tech Initiative.


China doubles down on AI-powered influence operations

In 2026, the People’s Republic of China’s (PRC’s) AI-enabled disinformation efforts are likely to intensify in scale, persistence, and technical sophistication, particularly those targeting Taiwan. PRC actors are already using AI-generated audio, video, and text, distributed through networks of fake accounts and contracted private firms, to conduct “cognitive warfare” campaigns aimed at shaping political perceptions and voter behavior. These campaigns prioritize volume, localization, and algorithmic exploitation, and they are increasingly designed to be continuous rather than episodic. As AI-generated content is blended with human-curated messaging and commercial infrastructure, PRC-linked operations will become harder to detect and attribute, reflecting a shift toward more deniable, adaptive, and professionalized influence operations.

At the same time, Beijing is expected to pair these activities with defensive diplomatic messaging that rejects allegations of PRC-linked disinformation or cyber operations and reframes such claims as politically motivated attacks. This pattern reinforces a broader hybrid strategy in which AI-enabled influence operations, cyber activity, and diplomatic signaling are tightly integrated. In 2026, PRC disinformation campaigns are likely to focus less on overt propaganda and more on shaping narratives around crises and cyber incidents, contesting blame, eroding trust in attribution, and influencing strategic decision-making outcomes.

Kenton Thibaut is a senior resident fellow with the Democracy + Tech Initiative. 

The post Eight ways AI will shape geopolitics in 2026 appeared first on Atlantic Council.

]]>
A three-billion-person challenge: The rising global market for financial leaders https://www.atlanticcouncil.org/in-depth-research-reports/report/a-three-billion-person-challenge-the-rising-global-market-for-financial-leaders/ Wed, 14 Jan 2026 14:30:00 +0000 https://www.atlanticcouncil.org/?p=897244 Financial-sector policymakers and financial service providers are facing both a real challenge and unique opportunity to drive economic inclusion for about three billion people and spur growth toward the Sustainable Development Goals (SDGs).

The post A three-billion-person challenge: The rising global market for financial leaders appeared first on Atlantic Council.

]]>

Executive summary

Financial-sector policymakers and financial service providers are facing both a real challenge and unique opportunity to drive economic inclusion for about three billion people and spur growth toward the Sustainable Development Goals (SDGs).

The good news from the World Bank’s Global Findex Database 2025 is that 79 percent of adults globally and 75 percent in low- and middle-income economies (LMIEs) now have a financial account of some kind. Mobile phones are even more ubiquitous, with 86 percent of adults globally and 84 percent in LMIEs having one, which in most contexts can be used to access financial services. This means about four out of every five people have the potential to save safely and borrow prudently to meet their financial needs and the potential to pay and be paid digitally. This is good news for the individuals, their families, and for these economies because, as the IMF has found,
financial inclusion serves as a catalyst for both economic participation and inclusive growth.

However, the majority of adults in LMIEs that have a financial account do not yet fully engage with the formal financial sector. Only 40 percent of adults in LMIEs (on average) saved formally and only 24 percent of adults in LMIEs (on average) borrowed from a formal financial service provider in the last year and even they do not necessarily have the type of credit they need.1 There are, therefore, about three billion people who could actively engage in the formal financial sector, and they present both a challenge for financial sector leaders and an opportunity for accelerating inclusive growth.

The main reasons adults in LMIEs do not use formal digital financial services are affordability, lack of trust in service providers, and lack of products to meet their needs. Rapid advances in digital public infrastructure (DPI) and artificial intelligence (AI) have the potential to directly tackle these challenges. Together they can reduce costs, increase trust, and tailor products for individuals, thereby improving lives and driving growth:

  • DPI has been endorsed by the Group of Twenty since India’s presidency in 2023.2 Ninety-seven countries now have DPI-like digital payments; sixty-four countries have digital IDs, and 103 have data exchange—together reducing costs and increasing trust.3
  • AI, by cheaply analyzing massive data sets, is turbocharging cost reduction and product tailoring, which translates into greater affordability and access for people on lower incomes.4

Yet, there are potentially problematic aspects to these exciting innovations. DPI has the potential for loss of data privacy (if privacy by design is not embedded), for rent extraction (if not an open-source platform), and for government surveillance (if DPI safeguards are not central).5 AI has the potential to turbocharge fraud, scams, and identity theft and compromise trust.6

Therefore, government financial-sector regulators and policymakers have urgent and important decisions to make about how to enact and enforce responsible guardrails in the financial ecosystem. These guardrails are essential so new customers have affordable, appropriate products, can trust their money and data are safe, and have effective recourse mechanisms if problems occur. National coordination at the highest level is essential, regional approaches including policy harmonization can be cost-effective, and urgency is imperative. Financial-service leaders also have key decisions to make about how to design affordable and responsible financial products that build trust, enable resilience, and foster financial well-being and economic growth. There is now a unique opportunity for financial-sector leaders to unleash economic potential for three billion people and accelerate inclusive growth.

Read the full report

About the author

Ruth Goodwin-Groen is a nonresident senior fellow with the Atlantic Council’s GeoEconomics Center. Goodwin-Groen brings thirty years of strategic and technical leadership in financial-sector development and financial inclusion in emerging markets to her current consulting practice, Goodwin-Groen Consulting. Her focus is on responsible digital financial inclusion and equality in financial services for women.

Goodwin-Groen is best known as the founding managing director of the United Nations-hosted Better Than Cash Alliance, which created a global movement from cash to responsible digital payments to achieve the Sustainable Development Goals. Alliance members and partners include over 113 governments, 229 companies, and most of the UN—accounting for over 90 percent of global gross domestic product.

Goodwin-Groen has a PhD in financial-sector development from the University of Bath, an MBA with distinction from Harvard Business School, and a Bachelor of Science with Honors from the University of Western Australia.

Acknowledgements

The author extends special thanks to those providing expert input on this paper: Isabelle Carboni, Expert Consultant; Eric Duflos, CGAP; Nicole Goldin, United Nations University-Centre for Policy Research & Atlantic Council; Leora Klapper, World Bank; David Porteous, Integral: Governance solutions; and Camilo Tellez-Merchan, Gates Foundation. She also deeply appreciates the input of Atlantic Council colleagues Josh Lipsky, Sophia Busch, and Juliet Lancey as well as those who contributed to the findings and recommendations of this report through their participation in two roundtable discussions at the Atlantic Council in April and October of 2025. See the Appendix for a list of the participants. This report was made possible in part by a grant from Tala.

Related content

Explore the program

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

1    Klapper et al., The Global Findex Database 2025, xxxiii, 152, 154, 218.
3    “The Digital Public Infrastructure Map,” DPI Mapping Project, https://dpimap.org/.
4    Sophie Sirtaine, “AI’s Promise: A New Era for Financial Inclusion,” CGAP Leadership Essay Series blog, CGAP, April 4, 2025, https://www.cgap.org/blog/ais-promise-new-era-for-financial-inclusion.
5    Zoran Jordanoski, “Safeguarding Digital Public Infrastructure: A Global Imperative for Sustainable Development,” United Nations
University Operating Unit on Policy-Driven Electronic Governance, July 9, 2025, https://unu.edu/egov/article/safeguarding-digital-public-infrastructure-global-imperative-sustainable-development.
6    Eric Duflos, “AI and Responsible Finance: A Double-Edged Sword,” AI and the Future of Financial Inclusion blog series, CGAP,
April 29, 2025, https://www.cgap.org/blog/ai-and-responsible-finance-double-edged-sword.

The post A three-billion-person challenge: The rising global market for financial leaders appeared first on Atlantic Council.

]]>
Digital sovereignty: Europe’s declaration of independence? https://www.atlanticcouncil.org/in-depth-research-reports/report/digital-sovereignty-europes-declaration-of-independence/ Wed, 14 Jan 2026 14:27:11 +0000 https://www.atlanticcouncil.org/?p=896219 In Brussels, "digital sovereignty" may be the new "strategic autonomy": a push for Europe to go its own way and depend less on the United States. As US tech companies and EU regulators clash, catch up on a policy debate with consequences playing out online and in the halls of power.

The post Digital sovereignty: Europe’s declaration of independence? appeared first on Atlantic Council.

]]>

Bottom lines up front

  • In 2025, the Trump administration’s open hostility to the EU and close connections with tech CEOs brought long-simmering transatlantic tensions over how to regulate Big Tech to a boil. 
  • The effect so far has been to accelerate the EU’s quest to break its dependence on Silicon Valley and China.
  • Washington’s combative posture toward EU tech regulation sets the stage for more conflict that could imperil the $1.5-trillion trading relationship.

Table of contents

Introduction

Over the past several years, the concept of digital sovereignty has become ever more central to European notions of competitiveness and economic resilience. Formerly a niche idea within the digital policy community, it has now gone mainstream with major European leaders, from European Commission President Ursula von der Leyen to former head of the European Central Bank Mario Draghi, calling for the European Union to achieve digital sovereignty.1 It has also become integral to European debates about technological sovereignty and strategic autonomy, and even to trade policy. And as digital sovereignty has become more prominent in European discussions, it has shifted from being a vague aspiration to a concept that EU policymakers increasingly seek to put into operation—raising the possibility of future EU restrictions on procurement from companies outside Europe, as well as other regulatory measures.

Yet, despite its growing centrality in European digital debates, digital sovereignty still does not have a clear definition.2 At times, it seems to have been encompassed by the broader term of tech sovereignty, which reflects the EU’s desire to boost its industrial capabilities—not only in the digital space, but also in renewables and other green and future technologies. European policymakers also regularly refer to data sovereignty and cloud sovereignty, which can be seen as focused on particular aspects of digital sovereignty.

What all these definitions share, however, is the notion that Europe and its economy should be less dependent on others and more capable of protecting its own interests, including its interests in the digital sphere. That leads to the key unresolved questions at the heart of digital sovereignty. Does sovereignty require an economic approach that is exclusively European or, at minimum, favors European companies? Is ownership or effective control over key companies important, or is a risk-based system more appropriate? Is it desirable to limit sovereign requirements to certain sectors of the economy? Can Europe achieve a measure of sovereignty as part of a common enterprise among international partners? And if the partnership model is acceptable, who are the partners?

The transatlantic relationship is, in turn, entangled with Europe’s internal debate about digital sovereignty. Until recently, this has been an evenly divided contest, with some European experts calling for Europe to strategically decouple from the dominance of US companies, while others—including most member-state governments—have noted the lack of local alternatives and hesitated to discriminate against US and other non-EU companies.

But the Trump administration’s initial open hostility to the EU and continuing general unpredictability have caused even the most transatlantic of EU leaders to question the reliability of the United States. The July 2025 US-EU trade deal provided some temporary clarity and predictability in transatlantic commercial relations, although digital issues were addressed in only limited ways. President Donald Trump’s Truth Social post a few weeks later, threatening additional tariffs on countries with “Digital Taxes, Digital Services Legislation, and Digital Markets regulations [that] are all designed to harm, or discriminate against American Technology,” was immediately criticized by the European Commission, France, Germany, and others as a violation of Europe’s sovereignty.3 Nevertheless, during a November 2025 visit to Brussels, Commerce Secretary Howard Lutnick directly linked the removal of EU digital regulation with a potential US-EU agreement on steel and aluminum tariffs.4

Given Trump’s close connections with leading tech executives, the US administration’s combative posture toward European tech regulation is likely to continue being a point of transatlantic friction. Whether a continued focus by the Trump administration on Europe’s digital rules will create an even stronger push in Europe for an exclusive form of digital sovereignty is not yet evident. What is clear is that without some guidelines, such as those offered in the conclusions to this report, the European Union and United States might find that their differences regarding digital sovereignty and digital rules make creating and maintaining an open transatlantic digital marketplace much more challenging.

Defining the terms of the debate

One reason why digital sovereignty has become an increasingly inflammatory label across the Atlantic is that the lack of a clear definition allows everyone to define it in ways that support their own arguments. Its rise has also coincided with the European embrace of strategic autonomy in foreign and security policy—a notion that has predictably ruffled some US feathers, especially in the defense community. Further confusion has developed as similar terms (i.e., tech sovereignty, cloud sovereignty) have emerged in related areas. To introduce some clarity into this discussion, it can be useful to categorize these different notions.

  • Strategic autonomy: First arising in the context of foreign and security policy, strategic autonomy refers primarily to Europe developing defense and foreign policy capabilities that would allow the EU to play a more independent geopolitical role. Aside from a few defense funding efforts, the idea has not yet inspired major legislative initiatives. To indicate that partnership and autonomy were not contradictory, the EU later adopted the related idea of open strategic autonomy in trade policy. More recently, the EU has begun to embrace the concept of regulatory autonomy—the idea that “the Union’s values, interests, and regulatory autonomy underpin EU action, including in the digital sphere.”5 In these notions, autonomy is a more ambiguous and flexible concept than sovereignty, which implies a legal order backed by legislative initiatives.
  • Technological sovereignty: While the first European Commission headed by von der Leyen focused largely on legislation related to the online world, the importance of technologies—and Europe’s reliance on Chinese and US technologies—had come to the fore by the end of that mandate. This was not only about the digital world, but crucially about the European Green Deal. While the commission argued that carbon reduction would be key to the future EU economy, it became woefully clear that Europe remained dependent on others for many essential technologies: solar panels, wind turbines, semiconductors, electric vehicle batteries, etc.

    Thus, in the second von der Leyen commission, the position of executive vice president for tech sovereignty, security, and democracy was created to oversee the development of EU capabilities to support the digital agenda. Others in the commission, including Executive Vice Presidents Teresa Ribera and Stéphane Séjourné, were tasked with strengthening EU technological capabilities across the Green Deal and industrial strategy generally. In June 2025, a key European Parliament committee defined tech sovereignty as “the ability to build capacity, resilience and security by reducing strategic dependencies, preventing reliance on foreign actors and single service providers, and safeguarding critical technologies and infrastructure.”6 Unlike strategic autonomy, however, tech sovereignty underlies significant legislative initiatives, from the Net Zero Industry Act and the Critical Raw Materials Act to the Public Procurement Directives. It also entails a strong focus on industrial policy, including state aid, competition policy, and other means of boosting key tech-related industries.
  • Digital sovereignty: While often used interchangeably with tech sovereignty, digital sovereignty focuses primarily on the online world. Legislation such as the General Data Protection Regulation (GDPR), Digital Services Act (DSA), Digital Markets Act (DMA), and Artificial Intelligence Act (AIA) have sought to establish a comprehensive system of governance for the online world, especially by regulating corporate behavior vis-à-vis individual or business users. With the exception of semiconductors and the EU Chips Act, much less attention has been paid to the technologies that enable the online world. However, recent proposals for a Eurostack—a European capacity to provide all elements of digital infrastructure, from cables to cloud—are indications of growing European concern about both governance and technologies.7
  • Data sovereignty: This subset of digital sovereignty—one of the earliest variants—initially focused primarily on protection of personal data under the GDPR. However, with the Data Act and other initiatives, increased attention is now paid to the re-use of industrial data that are either sensitive or commercially valuable, and to safeguarding the capacity of EU businesses and governments to exploit data generated in Europe.
  • Cloud sovereignty: The proliferation of data requires enhanced storage capabilities and increased focus on cloud storage and the security of data stored in the cloud. An increasingly sharp debate has centered on whether Europeans’ data should be stored exclusively within the EU, or whether they can be stored outside the EU by non-EU providers considered trustworthy and secure. This discussion has accelerated with the growth of artificial intelligence (AI) and its enormous requirements for cloud services and data centers. Cloud sovereignty also poses questions about how Europeans’ data can be accessed by foreign law enforcement and intelligence agencies.
  • Sovereignty over speech: Users of online services today confront a wide array of illegal or undesirable content, from child sexual abuse material to advertisements for illegal products to political disinformation. EU efforts to regulate platforms’ responsibility for illegal content and systemic risks have recently sparked criticism from the Trump administration, which regards aspects of these efforts as violations of free speech.8 Who has the right to determine allowable speech available online in a jurisdiction other than where it was produced?
  • Cybersecurity: Given the ever-growing number of cyberattacks, both in Europe and globally, the protection of the online world has become a growing element in digital sovereignty. In the past, cybersecurity had not been central to the debate about digital sovereignty, but since the Russian full-scale invasion of Ukraine in 2022 there has been a rapidly growing understanding that resilience against such attacks is an essential part of sovereignty. Europe in particular has faced numerous attacks from Russia and related online actors. The EU effort to establish standards for cybersecurity has already led to US-EU tensions, but there will likely be even more attention paid to cyber-proofing as the EU operationalizes its concept of sovereignty.

An increasingly sharp debate has centered on whether Europeans’ data should be stored exclusively within the EU.

As part of the growing effort to operationalize digital sovereignty, both EU institutions and member states have initiated efforts to elaborate the meaning of this elusive concept. The European Council, in formal conclusions to its October 23 meeting, declared, “It is crucial to advance Europe’s digital transformation, reinforce its sovereignty, and strengthen its own open digital ecosystem,” adding that “this requires reinforced international partnerships and close collaboration with trusted partner countries.”9

On November 18, 2025, the French and German governments convened a Summit on European Digital Sovereignty. The summit identified several areas for building digital sovereignty, including AI, data, and public infrastructure, and launched a joint task force on European digital sovereignty to report in 2026.10 Its final declaration underscored the EU member states’ “shared ambition to strengthen Europe’s digital sovereignty in an open manner as a cornerstone of our economic resilience, social prosperity, competitiveness and security.”11

The European Commission, for its part, issued a Cloud Sovereignty Framework in September 2025 that identifies eight types of sovereignty-related objectives to be considered in the government procurement context. In a stab at precision, the framework encourages contracting authorities to assign each objective a sovereignty effective assurance level (SEAL). The results of that assessment should provide a mathematically derived sovereignty score.12 But as EU discussions on this topic progress, there are still key differences among the member states about the choice between strict autonomy or international partnerships, and whether the model should be based on exclusive EU control or on risk management.

European officials at the Summit on European Digital Sovereignty in Berlin, November 18, 2025. REUTERS/Nadja Wohlleben.
The EU’S Cloud Security Framework, published in October 2025, lays out eight “sovereignty objectives” for procurement authorities to score as they decide what cloud services and products to buy. Source: Cloud Security Framework, European Commission.

Europe’s missing Silicon Valley

While many non-European observers would say that the EU’s regulatory power already gives it significant influence domestically and externally, the EU’s sovereignty in the European digital arena is vulnerable at best. Despite its role as a regulatory superpower, Europe finds itself reliant on non-EU companies for many essential elements of the digital world. A European Parliament report estimates that “the EU relies on non-EU countries for over 80% of digital products, services, infrastructure, and intellectual property.”13 This perception of dependency is at the heart of the EU push for digital sovereignty.

The EU has failed to develop a tech sector with either the vibrancy of Silicon Valley or the growing capabilities of China’s industry. In particular, Europe has not seen the emergence of world-leading new companies based on digital technologies. Indeed, while the US industry has created six companies with a market capitalization of €1 trillion or more, the EU has created none.14 In 2021, three US cloud companies supplied 65 percent of the EU cloud market, while EU-headquartered companies had less than 16 percent.15 As a consequence, European consumers and businesses must rely on non-EU companies—mostly US and some Chinese enterprises—for basic digital services. Initially, this largely applied to software, social media, search engines, and a wide array of shopping services. More recently, the importance of cloud, encryption, and AI, along with the prospective emergence of super-fast quantum computing, has made Europeans realize that this dependence on others has significant and potentially long-lasting effects on their own industries and economies, including those far beyond the tech sector. 

Despite its role as a regulatory superpower, Europe finds itself reliant on non-EU companies for many essential elements of the digital world.

Of course, a few European companies are exceptions to these trends. Nokia and Ericsson were already leaders in the cables and fiber optics that are key to connectivity. They became even stronger in the market as concerns rose about the security of Chinese components. The Dutch company ASML has been a leader in the machines required to make the semiconductors that guide and manage so much of the digital world. SAP is the world’s largest vendor of enterprise resource planning software. But these European companies are not in the same league as their US equivalents in terms of market capitalization. For example, ASML has a market capitalization of $376 billion, while Nvidia is at $4.3 trillion and Microsoft is at $3.8 trillion.16

One consequence of Europe’s struggle in the digital marketplace has been the emergence of an EU-wide debate on competitiveness, as represented most prominently by the reports by former Italian Prime Minister Enrico Letta and former head of the European Central Bank Mario Draghi.17 Draghi specifically underlined the importance of Europe’s failure to develop an innovative tech sector by noting the increasing productivity gap between the EU and the United States, with European labor productivity falling to 80 percent of US productivity. He concluded that this was mainly due to “Europe’s failure to capitalise on the first digital revolution led by the internet—both in terms of generating new tech companies and diffusing digital tech into the economy.”18

The competitiveness debate has also sought to identify the causes of Europe’s lack of digital champions. Europe has a vibrant startup community, as demonstrated by the growing role of venture capital.19 But many of these innovative enterprises end up moving to the United States or elsewhere, while others fail to commercialize entirely. The most popular rationale for this failure to scale—cited by US and European analysts, including Draghi—is overregulation.20 Other suggested reasons include a chronic lack of indigenous capital, overly strict bankruptcy laws, and a culture that fears failure.21 Whatever the reason, Europe’s inability to provide the resources and capabilities for its innovative companies to become continental champions, let alone world leaders, means it must rely on companies from elsewhere.

US Ambassador to the EU Andrew Puzder discusses disparities between major companies founded in the United States and the EU at the 2025 Transatlantic Forum on GeoEconomics, in Brussels, on September 30, 2025. Nicolas Lobet, PRYZM photography.
European Commission President Ursula von der Leyen holds former head of the European Central Bank Mario Draghi’s report on EU competitiveness at a September 2024 press conference in Brussels. Draghi’s report concluded that Europe failed to capitalize on the emergence of the internet to increase productivity. REUTERS/Yves Herman.

This was already the case in 2018, when the GDPR—the first major piece of EU digital legislation—came into force. During the next five years of von der Leyen’s first term as commission president, the EU passed several other pieces of digital legislation, most notably the DSA, DMA, and AIA. These measures made progress in harmonizing diverse member-state laws, both existing and anticipated. But while EU leaders saw this body of legislation as protecting their citizens from the excesses of data collection and illegal social media content, many outside the EU, especially in the US tech community, viewed these laws as overly burdensome at best and discriminatory at worst. Some EU policymakers, such as Member of the European Parliament (MEP) Andreas Schwab, early on were open about their desire to counter the dominance of US firms.22 Others, however, saw Europe as offering a positive alternative to the lightly regulated environment tech companies faced elsewhere. EU rules inevitably had the most impact on US companies, which provided the overwhelming majority of digital services in the EU market. Chinese companies also came to feel the impact of EU regulations as their market share grew over time, especially in shopping and social media.

Throughout this period of intense legislative activity, there were clear voices calling for greater digital sovereignty in Europe. The body of legislation passed in the first von der Leyen commission can certainly be viewed as an effort to place limits on the US companies that dominate Europe’s digital space—and as a way for Europe to regain some control, or sovereignty, over that market. But as competitiveness emerged as a top EU priority in 2023, the discussion about digital sovereignty became part of a much broader discussion about innovation and economic security.

Geopolitics and the rise of tech sovereignty

The earliest indication of a geopolitical element to EU digital sovereignty came during the first Trump administration, when the United States protested the use of Huawei components in European digital networks. Reluctantly at first, Europeans came to understand the risk of a Chinese capability to disrupt those networks and developed the EU Toolbox for 5G Security, a list of best practices released in January 2020. The toolbox identified states and state-backed actors as the most serious threats. It also set out criteria for identifying trusted versus untrusted vendors, including closeness to a foreign government, lack of democratic accountability in that government, lack of a data protection agreement with the EU, and ability of the third country to exercise pressure on the EU.23

The toolbox was the first real effort to identify foreign companies and governments that might threaten Europe’s digital sovereignty and those that might not. There was clearly a focus on China and Chinese companies, as demonstrated by the criteria for vendors. But it should be noted that the toolbox is primarily voluntary guidance developed by the member states for themselves, with progress tracked by regular EU Commission reporting.

In 2019, the EU identified China as both an economic competitor and a “systemic rival,” but initially with little consequence, especially in terms of economic relations.24 Over the next few years, the EU would increasingly focus on China and the dangers posed by its investments in the European economy, especially in critical European infrastructure. By March 2023, when von der Leyen called for de-risking Europe from China,25 commission officials had identified a number of EU dependencies on China—including in critical raw materials, solar panels, and batteries—that had the power to disrupt European industry.26 In June 2023, the commission reported that it considered Huawei and ZTE “materially higher risks” than other fifth-generation (5G) suppliers.27

The EU also initiated a few measures to address those vulnerabilities: heightened screening of inward foreign investment, primarily at the member-state level; enactment of the European Chips Act, providing funding for advanced semiconductor manufacturing in Europe; adoption of the Critical Raw Materials Act, which established goals for EU production of key materials; and passage of the Net Zero Industry Act, which sought to build EU manufacturing capacity in clean technologies such as solar, batteries, and hydrogen. While these measures were not aimed only at China, concerns about that country’s ambitious global plans were a main motivation. Moreover, they had the effect of broadening the initially limited discussion of digital sovereignty beyond the realm of digital governance to include both digital and green technologies, resulting in a broader focus on technological sovereignty.

This European debate regarding the geopolitical dimensions of sovereignty—both digital and tech—intensified significantly following the Russian invasion of Ukraine in February 2022. Along with a focus on territorial security, as seen in the increased defense spending of most EU member states, the EU realized that it needed to address other vulnerabilities. Most urgently, the invasion led to a swift and drastic shift in Europe’s energy supply, as Russia went from providing 45 percent of Europe’s oil and gas in 2021 to 19 percent in 2024.28 But the digital arena was also vulnerable: Russian cyberattacks and apparent sabotage against undersea cables demonstrated the dangers facing Europe’s digital infrastructure, while Russian-origin disinformation flooded European social media.

Perhaps the most important consequence of the Russian invasion, however, was the realization that Europe was vulnerable and that preserving its sovereignty—digital and otherwise—would require concrete actions. Many of the green technology initiatives mentioned above were still in the legislative process when the invasion began but moved to enactment by mid-2023 as the commission’s term began to close and as Europeans became even more conscious of those vulnerabilities. Competitiveness, resilience, and sovereignty became linked together in the concept of economic security as the EU sought to reduce its external dependencies, especially on Russia and China.

By the end of 2024, the tech sovereignty impulse in Europe had become a key policy priority, as demonstrated by the appointment of Henna Virkkunen to the new position of European Commission executive vice president for tech sovereignty, security, and democracy. But before the second von der Leyen commission could get its program under way—or make progress in implementing the Draghi report—Trump’s reelection as US president pushed the impulse toward European digital sovereignty into hyperdrive.

Trump actions spur renewed calls for greater independence

European suspicions about US intentions and capabilities in the digital world have existed since 2013, when Edward Snowden revealed the extent of US National Security Agency interception of Europeans’ communications. Nevertheless, the United States and EU enjoyed relatively open trade in digital services. The advent of the second Trump administration, however, has energized the transatlantic debate over digital sovereignty. While Trump’s focus during the 2024 campaign was on the EU’s trade in goods surplus with the United States, once back in office he frequently criticized the EU’s digital regulations as a whole, despite the US surplus in services trade driven by the success of US tech companies.

Only a month after Trump’s January 2025 inauguration, the White House issued a memorandum on “Defending American Companies and Innovators from Overseas Extortion and Unfair Fines and Penalties,” calling for tariffs and other responses in cases “where a foreign government, through its tax or regulatory structure, imposes a fine, penalty, tax, or other burden that is discriminatory, disproportionate, or designed to transfer significant funds or intellectual property.”29 The memo specifically highlighted “regulations imposed on United States companies by foreign governments that could inhibit the growth or intended operation of United States companies.”30 It also called for the US trade representative to determine whether to renew Section 301 investigations of several digital service taxes (DSTs), including those adopted in France, Austria, Italy, and Spain. The fact sheet accompanying the memo made clear that the target was the European Union and specifically “regulations that dictate how American companies interact with consumers in the European Union, like the Digital Markets Act and the Digital Services Act, will face scrutiny from the Administration.”31

Such an aggressive approach brought the issue of digital sovereignty to the fore, as it seemed to disregard the EU’s right to regulate its own market. As the United States and EU pursued a trade agreement, there were conflicting reports as to whether the DSA and DMA (as well as other EU regulations) were on the negotiating table.32 In the end, the joint statement published on August 21, 2025, did not mention either regulation or the DSTs adopted by several EU member states.

But the joint statement was hardly the last word. On August 25, Trump posted on Truth Social: “As the President of the United States, I will stand up to Countries that attack our incredible American Tech Companies. Digital Taxes, Digital Services Legislation, and Digital Markets Regulations are all designed to harm, or discriminate against, American Technology.”33 Meanwhile von der Leyen, in her September 2025 State of the Union speech, defended the trade deal but also stated: “Whether on environmental or digital regulation, we set our own standards. We set our own regulations. Europe will always decide for itself.”34

The Trump administration has continued criticizing EU digital regulation. For example, on December 16, US Trade Representative Jamieson Greer posted on X (formerly Twitter) that the EU had “persisted in a continuing course of discriminatory and harassing lawsuits, taxes, fines, and directives against U.S. service providers,” and suggested that the United States would retaliate.35 It would be relatively easy for the administration to renew the Section 301 investigations of DSTs. The US government might also look for a mechanism to counter the impact of the DSA and DMA, especially if US companies are fined significantly under those laws. On April 23, 2025, the European Commission fined Apple and Meta €500 million and €200 million, respectively, for noncompliance with the DMA.36 In September, Google was fined €2.95 billion for “distorting competition in the advertising technology industry,” although this case was pursued under the European Commission’s long-time competition authorities rather than under the DMA.37

The commission is also investigating X as well as Meta’s Facebook and Instagram for alleged violations of the DSA, along with separate probes of the Chinese firms AliExpress, Temu, and Tiktok, and several European-based online pornography platforms. On December 5, 2025, the Commission fined X €120 million under the DSA for issues related to its blue checkmarks and advertising repository.38 Beyond these specific cases, the growing criticism of Europe from the US executive branch and parts of Congress, which claim it is censoring “free speech,” is an indication that an influential segment of the Republican Party in the United States will continue to push for action against European efforts to moderate digital content. The EU has been a key target, as has the United Kingdom with its Online Safety Act.

US Commerce Secretary Howard Lutnick and US Trade Representative Jamieson Greer speak after a meeting with the EU Trade Ministers Council in Brussels on November 24, 2025. Lutnick suggested that the EU “reconsider” some digital regulations if the bloc wanted the United States to reduce tariffs on EU steel and aluminum. REUTERS/Piroschka van de Wouw.

At the same time, the European Commission has embarked on a process of simplifying some regulations as part of an effort to make the EU economy more competitive. A digital omnibus—a legislative package designed to amend several regulations across a sector simultaneously—was presented on November 19, 2025.39 As with other commission proposals for simplifying regulations, the digital omnibus focuses on reducing requirements for small and medium-sized enterprises (SMEs), along with streamlining reporting in cases of cybersecurity incidents. It also proposes delaying implementation of AIA requirements for high-risk systems until relevant guidance has been issued and calls for “targeted amendments” to the GDPR to boost innovation, including that related to AI training.40 While simplification is likely to reduce the regulatory burden on tech companies in Europe—including large US companies—it has not yet addressed issues related to digital sovereignty.

Apart from potential revisions to existing legislation, the commission plans to move forward on two tracks. First, the second von der Leyen commission anticipates deploying more financial resources to support research on emerging technologies such as AI and quantum. Early in 2025, von der Leyen announced InvestAI, an initiative to raise €200 billion in investment capital.41 The EU also plans, through the 2025 EU Startup and ScaleUp Strategy, to support startups in their search for the funding that will allow them to grow.42 While these funds should be viewed with some caution—it is unclear whether sufficient private funds will join this public-private effort—they demonstrate the EU’s commitment to building its own capabilities.

Second, the commission has made clear that it will continue to pursue new rules governing activities and companies in the digital arena. The Financial Data Access (FiDA) regulation, now in the final stage of negotiations, is intended to allow greater sharing of financial data among financial institutions in order to develop new digital financial products for consumers. European legacy banks have launched an effort to exclude those companies designated as gatekeepers under the Digital Markets Act from participation in FiDA; this effort will primarily affect US tech companies.43

The EU Cloud and AI Development Act (CADA) will attempt to address the EU’s shortcomings in cloud and AI capacity by encouraging the permitting of new data centers and other infrastructure, and by providing greater computational capacity and resources to startups, especially those focused on AI. But it is also expected to establish EU-wide eligibility requirements for cloud service providers, along with harmonized procurement processes, in ways that could restrict participation by non-EU companies. It is not clear yet whether CADA will address concerns through risk-based assurance models or ownership restrictions. It has reportedly been delayed until the first quarter of 2026 as the commission considers the concept of European effective control as a way of supporting EU digital sovereignty.44

The Digital Fairness Act, expected to be introduced in mid-2026, will be the EU’s flagship legislation for business-to-consumer relations and will address protection of minors online, transparent online pricing, the abuses of manipulative and addictive design, and marketing by influencers—all of which are likely to be of significant interest to US platforms. Other initiatives expected to be launched in the next eighteen months include the ICT Supply Chain Toolbox, the Quantum Europe Strategy, and the Digital Networks Act. Finally, the European Data Union Strategy, released on November 19 along with the digital omnibus, establishes the ambition of “safeguarding the EU’s data sovereignty through a strategic international data policy.”45 It aims to do this by “making fair conditions for data access and cross-border transfer . . . protecting sensitive EU non-personal data . . . and deepening cooperation with trusted partners.”46 While a strategy is not a legislative document, we can expect that it will help guide EU policy on international data flows.

The European Parliament is also active in the digital sovereignty debate. MEP Axel Voss, one of the parliament’s leaders on these issues, wrote in an October 2025 post on LinkedIn: “We need immediate decisions to regain a digitally competitive and sovereign EU. Eurostack, deregulation, venture capital, chips, energy, access to quality data and a flourishing environment for Start Ups and creators are crucial for our sovereignty.47 He proposes a number of measures, from digital special economic zones to using only EU programs within EU institutions to integrating “buy and deploy European tech” in public procurement.48

These initiatives will undoubtedly continue to have an impact on the transatlantic relationship, as they will affect the major actors in the market, most of them American. Even with the best of intentions—and no ambition to exclude those companies—EU adoption and implementation of such rules will likely raise questions about the openness of its future market and the participation of non-EU firms.

The next section explores how the United States and EU have wrestled with the competing pressures of sovereignty and open markets, as presented by a set of key issues relating to government access to data.

Snowden’s relevations and the ‘kill switch

More than a decade has passed since the Snowden revelations, but the topic continues to shadow transatlantic digital relations. Many in Europe hailed Snowden as a hero for revealing Europe’s vulnerability to US signals intelligence, and the European Parliament invited him to appear and speak at a plenary meeting. The Obama administration, which charged Snowden under the Espionage Act, objected vehemently to the invitation and, in the end, Snowden addressed the parliament only by video link.49 Now, however, US domestic sentiment regarding Snowden’s actions has begun to shift, at least in Republican circles, as several of Trump’s advisers have called for him to be pardoned.50

Snowden’s disclosures started a chain of legal proceedings in Europe that generated substantial uncertainty among companies about the legality of their indispensable transfers of personal data to the United States. The Court of Justice of the European Union (CJEU) twice invalidated EU-US international transfer arrangements, judging them insufficient to protect Europeans’ fundamental rights. In 2015, the court struck down the EU-US Safe Harbor Framework, and a successor arrangement, the Privacy Shield, met the same fate in 2020.51 Meta, the object of the litigation both times, took the issue seriously enough that it publicly conceded to US securities regulators that it might need to withdraw Facebook and Instagram from Europe if it could not legally transfer data to the United States.52

A third arrangement, the EU-US Data Privacy Framework (DPF), concluded in 2023, put significant additional safeguards in place for Europeans’ personal data when they are transferred to the United States. It has stabilized the situation, at least for the time being. On September 3, 2025, the EU General Court rejected a challenge to the DPF brought by Philippe Latombe, a French parliamentarian.53 The case tested the sufficiency of US legal reforms made to overcome the CJEU’s 2020 judgment on the Privacy Shield. The court rejected claims that a redress mechanism created by the agreement lacked independence within the US legal system. It also validated the sufficiency of US safeguards relating to the collection of bulk data for intelligence purposes. Latombe has appealed the General Court verdict to the Court of Justice, however, so a definitive verdict on the fate of DPF has yet to be issued.54

The European privacy advocacy organization None of Your Business (NOYB)—headed by well-known Austrian privacy activist Max Schrems, who brought the 2015 and 2020 CJEU cases—reacted with disbelief to the Latombe ruling. Schrems drew attention to Trump administration actions against the independence of the US Privacy and Civil Liberties Oversight Board (PCLOB) and the Federal Trade Commission (FTC). He also said that he is mulling bringing a second challenge to the DPF in EU courts.55

US cloud service providers, including Amazon Web Services and Microsoft, have responded to European unease over data transfers to the United States by introducing service features that allow enterprise customers to store certain types of data exclusively on servers located on the continent.56 Offering to localize data in this fashion can reassure European customers concerned about the long arm of US government’s potential access to their data.

However, the Trump administration exacerbated European anxiety over data flows to and from the United States by briefly cutting off Ukraine from US intelligence sharing in early 2025.57 The specter of a US government kill switch—in the form of an order to US cloud providers to stop commercial data transfers to Europe—has spurred further efforts by US cloud providers to reassure their European customers. Brad Smith, Microsoft’s vice chair and president, went so far as to issue a public statement in April that, “In the unlikely event we are ever ordered by any government anywhere in the world to suspend or cease cloud operations in Europe, we are committing that Microsoft will promptly and vigorously contest such a measure using all legal avenues available, including by pursuing litigation in court.”58

In the unlikely event we are ever ordered by any government anywhere in the world to suspend or cease cloud operations in Europe, we are committing that Microsoft will promptly and vigorously contest such a measure using all legal avenues available, including by pursuing litigation in court.

Brad Smith, “Microsoft Announces New European Digital Commitments,” Microsoft, April 30, 2025, https://blogs.microsoft.com/on-the-issues/2025/04/30/european-digital-commitments.

In response, some European companies have spied a business opportunity. For example, the German company Ecosia and its French counterpart Qwant announced their intention to build a European web index called European Search Perspective (ESP) to compete with Google’s search engine.59 Ecosia’s chief executive officer (CEO) cited concern about the political winds blowing in the United States: “With the US election turning out as it has, I think there is an increased fear that the future US president will do things that we as Europeans don’t like very much . . . We, as a European community, just need to make sure that nobody can blackmail us.” He also emphasized Europe’s current dependence on Google’s services: “If the US turned off access to search results tomorrow, we would have to go back to phone books.”60

The European dream of regaining data sovereignty by generating companies that can compete with the US cloud giants has a long history of failure. Our 2022 report chronicled the ambitious Franco-German effort to develop GAIA-X, a federated data and cloud ecosystem.61 In the years since, the vision of an interoperable network of trusted European cloud providers has had limited success. Its major output is a series of standards, specifications, and labels for European cloud providers, rather than a transformation of the commercial landscape.62

Draghi’s 2024 report on the single market effectively conceded defeat in this area of endeavor. “It is too late for the EU to . . . develop systematic challengers to the major US cloud providers,” Draghi wrote.63 Nonetheless, European anxiety over the possibility, however small, that dominant US platform services could withdraw from the continent, be blocked from serving it by the US government, or be a mechanism for channeling EU data to the US government, will continue to power a push for European sovereign alternatives.

A second continuing impetus is an awareness in Europe—thanks to Snowden—that the dominance of US digital services in Europe offers US intelligence agencies a strategic advantage. The Biden administration even boasted of this during the 2023 congressional debate to reauthorize Section 702 of the Foreign Intelligence Surveillance Act (FISA), a principal authority for collecting intelligence information on non-Americans. The pervasiveness of US digital service providers worldwide, the administration noted, allows US intelligence agencies to “leverage this national advantage to collect foreign intelligence information . . . in order to protect America from its adversaries.”64

US intelligence collection in Europe is not the only challenge to data sovereignty that the EU sees emanating from the United States. Another is the Clarifying Lawful Overseas Use of Data Act (CLOUD Act), a 2018 US law. This statute confirmed that US law enforcement can unilaterally order cloud service providers with a presence in the United States to turn over personal data they host on servers in Europe and other foreign locations for criminal investigations and prosecutions. Although several EU countries, including Belgium, give their law enforcement authorities similar extraterritorial criminal evidentiary powers, this part of the CLOUD Act is seen in Europe as singularly intrusive. When EU legislators call for companies to be immune to foreign law, they are often referring to the CLOUD Act.

However, the CLOUD Act also contains a conciliatory dimension. Part II of the act authorizes the US Department of Justice to negotiate binding international agreements under which criminal investigators and prosecutors can obtain foreign-located electronic evidence directly from providers. Because CLOUD Act agreements are consensual, they do not violate a foreign state’s judicial sovereignty by commanding that a legal measure be taken on its territory. Instead, they remove legal obstacles that companies otherwise face in voluntarily assisting foreign law enforcement. This new type of international agreement can substantially reduce reliance on mutual legal assistance treaties (MLATs), which can be too slow and cumbersome for obtaining e-evidence in fast-moving investigations.

The United States has concluded CLOUD Act agreements with the United Kingdom (UK) and Australia, and negotiations are under way with Canada, all of which are members of the Five Eyes intelligence collective.65 The UK agreement, the first to be concluded, has had a positive effect for that country’s law enforcement agencies.66 According to the US Department of Justice, UK agencies have already made more than twenty thousand direct requests to companies holding electronic evidence in the United States, including many for real-time interception of communications.67 The results “provided UK Law Enforcement and Intelligence Agencies with critical data to tackle the most serious crimes facing UK citizens including terrorism; child sexual exploitation; drug trafficking; and organised crime,” a UK government minister said in late 2023.68

Prosecutors from EU member states have looked across the channel jealously as their UK counterparts have made use of this powerful new investigative tool. In 2019, the EU authorized negotiation of an e-evidence agreement with the United States.69 Talks began in earnest after the EU finalized its controversial counterpart to the CLOUD Act, the 2023 E-Evidence Regulation.70 Progress has been slow and painstaking. In June 2024, senior EU and US home affairs and justice officials issued an optimistic joint statement welcoming “further progress” in the negotiations and looking “forward to advancing and completing” them.71

Source: US Department of Justice

The Trump administration has paused EU-US negotiations without explanation. It might have concluded that CLOUD Act agreements operate overwhelmingly to the advantage of foreign partners—the inevitable consequence of most relevant data being housed on servers located in the United States. As the Trump administration has demonstrated in trade negotiations with foreign countries, it is singularly focused on agreements that it can present as bringing more benefits for the United States. However, such a narrow focus overlooks other benefits of CLOUD Act agreements—sparing cloud providers conflicts of law, deterring data localization measures, and reducing the burden on the mutual legal assistance process.

The EU-US Data Privacy Framework and an e-evidence agreement would neutralize much of the political tension that has prevailed in these realms for more than a decade.

In mid-2025, the UK government added an element of controversy to the use of CLOUD agreements by allegedly serving a request to Apple that it globally disable security features on its products.72 If the UK successfully required Apple to remove security from a product (for example, by building in a backdoor to data that would otherwise be end-to-end encrypted), it could then use the CLOUD Act agreement to request the now-vulnerable data directly from the company. Apple challenged the request in a UK administrative court proceeding and issued a public statement warning customers about the measure’s impact.73 In addition, the White House and Congress sharply criticized the reported UK measure.74 In August, the UK government withdrew its demand for access to Apple US customers’ encrypted data, effectively conceding to the US objection.75 It recently confirmed that the order had been reissued to apply only to UK users.76 The US government could well demand that any EU e-evidence agreement include a similar commitment safeguarding US persons’ data from surveillance by member states’ authorities.

A US-EU e-evidence agreement would be an important advance in calming Europe’s sovereign sensitivities about how US law enforcement authorities collect foreign-located evidence, just as the Data Privacy Framework has at least temporarily allayed Europe’s concerns about US national security agencies’ collection practices. Taken together, the two agreements would neutralize much of the political tension that has prevailed in these realms for more than a decade.

The US u-turn on data flows

After decades of the United States propounding unrestricted international commercial data flows—and bemoaning Europe’s privacy impediments to them—the Biden administration made a dramatic course correction in late 2023.77 Through parallel legislation (the Protecting Americans from Foreign Adversary Controlled Applications Act) and executive action, it imposed controls on certain categories of data exports to China, Russia, and other “foreign adversaries” citing national security reasons.78 Subsequently, the Department of Justice issued a final rule and guidance to companies on compliance and enforcement.79 Both the legislation and regulatory actions were spurred by reports that data brokers were collecting publicly available bulk data on US persons and selling them to foreign governments, which could enable them to—among other things—track the location of US military personnel.80

In addition to enacting domestic measures to limit certain international commercial data flows, the United States reversed course internationally. In the fall of 2023, the Office of the US Trade Representative withdrew its proposal to include in the Joint Statement Initiative on Electronic Commerce (JSI)—a World Trade Organization negotiation—a guarantee of the free flow of data across borders.81 The final text of the JSI, announced in July 2024, not only lacks such an obligation but allows parties essentially unlimited scope to restrict data flows for data protection reasons, precisely as the EU had sought.82 Even with these changes, the United States declined to join the JSI because it regarded the agreement’s national security exception as insufficiently flexible, a move that some European Commission officials found puzzling.83

In contrast to the United States—and despite its long history of controlling data exports through the GDPR—the EU has moved slowly to evaluate the risks of data transfers to authoritarian states such as China and Russia. In 2021, the European Data Protection Board commissioned an outside report from academics that confirmed both countries’ governments have access to individuals’ personal information without commensurate rule-of-law protections, but it took no further action.84 Even Russia’s full-scale invasion of Ukraine has not served to entirely staunch the flow of European data to Russia. The Finnish and Dutch data protection authorities investigated data transfers by Yango, a subsidiary of the Russian search engine Yandex, but have not yet imposed restrictions.85

The data dynamics are a microcosm of Europe’s larger dilemma with China—deep commercial dependency, but also a recognition that a degree of sovereign control is needed.

The past year, however, has seen a gradual shift in European regulators’ thinking regarding data transfers to China. In May 2025, the Irish Data Protection Commission (DPC) fined TikTok €530 million after discovering it was transferring data to China without requisite data protection safeguards.86 In July, the DPC broadened its TikTok inquiry into whether the Chinese government could access such data when they are stored in China.87 The Finnish data protection authority began a separate investigation into possible Chinese government access to health data that a Finnish university had shared with a Chinese genetic analysis company.88

Even Schrems, who has long challenged European data transfers to the United States, has turned his attention to China. Early in 2025, he filed complaints with European data protection authorities against six major Chinese consumer companies, including Shein, Temu, and WeChat, alleging government access to Europeans’ personal data by an “authoritarian surveillance state.89

Recent moves by European data protection authorities to question whether China’s government has impermissible access to Europeans’ personal information mirror the rise in geopolitical tensions between Brussels and Beijing. Ireland’s inquiry into TikTok data transfers, for example, can be read as asserting European data sovereignty against a geopolitical rival. The data dynamics are, in effect, a microcosm of Europe’s larger dilemma with China—deep commercial dependency, but also a recognition that a degree of sovereign control is needed.

A single European data market

Brussels has recently expanded its laws promoting the secondary use of data for commercial, research, and government purposes, in hopes that these innovative legal measures will give homegrown companies a much-needed advantage in competing with data-rich foreign tech giants. However, the transfer of such data to non-EU companies has raised concerns about potentially protectionist restrictions. The Data Governance Act, the Data Act, and the European Health Data Space regulation—all enacted during the first von der Leyen commission—seek to stimulate a market for the secondary use of European data for commercial purposes.90 These measures are based on the recognition that data collected by—and locked within—governmental or commercial organizations can have societal and economic benefits if made available for reuse by other entities.

The 2022 Data Governance Act grew out of a post-pandemic recognition of the potential for reuse of government-held data. It facilitates reuse by the private sector, for both commercial and non-commercial purposes, of government-held data (G2B), including data originally collected by public health, environmental, and transport authorities. Then Commissioner Thierry Breton hailed it as a step toward “an open yet sovereign European Single Market for data.”91

The Data Governance Act was followed a year later by the even more ambitious Data Act, which concentrated on expanding business-to-business sharing of non-personal data, such as the industrial data generated by connected devices. The Data Act sought to ease legal issues that arise with reuse by third parties, such as intellectual property protection and trade secret rules. Both laws insisted upon additional safeguards for transferring data to companies in third countries, such as the United States, where that data could become subject to governmental access. The European Commission further envisaged a series of sector-specific European data spaces, each requiring separate legislation.92 They would cover sectors—from agriculture to energy to transportation—that generate large amounts of industrial data ripe for reuse. The European Health Data Space regulation is the first of this series to be enacted.

At the start of the current commission mandate, von der Leyen’s mission letter to Virkkunen instructed her to deepen focus on the reuse of data. She was asked to “present a European Data Union Strategy drawing on existing data rules to ensure a simplified, clear and coherent legal framework for businesses and administrations to share data seamlessly and at scale, while respecting high privacy and security standards.”93 The commission duly launched a public consultation process, articulating as its aim “expanding the availability and use of data to support AI development.”94 Published on November 19, 2025, the Data Union Strategy seeks to safeguard the EU’s data sovereignty by ensuring fair conditions for cross border flows of non-personal data; “linking EU data ecosystems with those of like-minded partners;” and “boosting the EU voice in global data governance.”95 This is intended to build a comprehensive legal regime for secondary data access that will enable European industry to catch up with the US tech giants that already enjoy access to vast pools of proprietary data.

EU content moderation and free speech

One of the EU’s proudest recent legislative accomplishments is the 2023 Digital Services Act, a sprawling and complex framework regulating online platforms’ accountability for illegal content, including illegal hate speech.96 It imposes the most onerous requirements on very large online platforms, half of which are US companies. The Trump administration and the Republican-led Congress have sharply criticized the DSA, viewing it as a tool for the suppression of right-wing populist political speech.97 On the contrary, the EU views certain DSA provisions, such as transparency tools and safeguards against arbitrary content moderation, as intended to protect free speech.

Trump singled out the DSA for criticism in the February 2025 official memorandum on preventing the “Unfair Exploitation of American Innovation,” while the Republican chair of the Federal Communications Commission called it “incompatible with both our free speech tradition in America and the commitments that these technology companies have made to a diversity of opinions.”98 The US State Department began a diplomatic campaign, alleging, “In Europe, thousands are being convicted for the crime of criticizing their own governments.”99 A leaked August 2025 cable to European posts directed US diplomats to advocate for a narrowing of the DSA’s definition of illegal content, among other ambitions. The European Commission firmly pushed back, describing the censorship allegations as “completely unfounded” and insisting that its digital legislation “will not be changed.”100

The Republican majority on the House of Representatives Judiciary Committee also weighed in with a strongly worded staff report describing the DSA as an “anti-speech, Big Brother law.”101

The report identified a handful of examples of how the act could function to restrict speech extraterritorially. For example, in an August 2024 letter, then Commissioner Breton warned Elon Musk’s X platform that the effects of a campaign interview it hosted with Trump could spill over into the EU and spur commission retaliatory measures under the DSA.102 The committee also cited a request to X by the French national police that the platform remove a post originating from a US-based account suggesting France’s immigration and citizenship policies were to blame for a 2023 terrorist attack a Syrian refugee committed in that country.103

Reform UK party leader Nigel Farage before a House Judiciary Committee hearing entitled “Europe’s threats to American speech and innovation” in Washington, DC, September 3, 2025. REUTERS/Nathan Howard.

The chairman of the US FTC launched a further salvo in August, warning US companies that their very compliance with the EU’s DSA, or with the UK’s similar Online Services Act or its surveillance authorities, could constitute a violation of the FTC Act, which prohibits unfair or deceptive commercial acts or practices. FTC Chairman Andrew N. Ferguson suggested, “It might be an unfair practice to subject American consumers to censorship by a foreign power by applying foreign legal requirements, demands, or expected demands to consumers outside of that foreign jurisdiction.”104

This transatlantic dispute over the DSA and similar content moderation laws reflects differing US and European historical traditions on speech regulation.105 The US Supreme Court has identified only speech creating a “clear and present danger” of inciting violence or other illegal conduct as suitable for restriction. Many European judiciaries, informed by their countries’ twentieth century histories of hate speech, take a more cautious view. For example, Germany bans speech glorifying or denying the Holocaust, while Denmark makes it illegal to burn the Quran. The DSA is the EU’s attempt to ensure that platforms remove content deemed illegal, both offline and online, but the act’s lack of definitions leaves a door open to abuse.

On December 23, 2025, the Trump administration raised the stakes in its free speech campaign against European content moderation laws. Secretary of State Marco Rubio issued determinations under the Immigration and Nationality Act barring from entry into the United States five Europeans associated with content moderation.106 The headliner was Thierry Breton, an architect of the DSA; the others hail from European non-governmental organizations that track hate speech and disinformation on the internet. The European Commission quickly issued a statement that it “strongly condemns” the US actions, reiterating its “sovereign right to regulate economic activity in line with our democratic values.”107 As the Trump administration continues its ideological campaign against the DSA, the transatlantic dispute over free speech seems bound to escalate.

Cybersecurity and cloud services

In 2022, the European Union Agency for Cybersecurity (ENISA) began an effort to harmonize member-state cybersecurity requirements for government data processing contracts. The European Commission averred that cloud services were a “strategic dependency” on a handful of large providers headquartered in the United States.108 Several EU member states, led by France, argued for including sovereignty requirements in the envisaged EU Cybersecurity Scheme (EUCS).

A leaked 2023 ENISA draft proposed that the EU impose sovereignty requirements similar to those in France’s domestic security certification and labeling program, SecNumCloud, for contracts involving the most sensitive government data. SecNumCloud has an announced goal that, in order to obtain a trust certificate, cloud service providers must be “immune to any extra-EU regulation.”109 ENISA proposed incorporating this requirement into EU law as well, adding restrictions on foreign ownership and insisting on localization of cloud services operations and data within the EU.

EU member states divided over whether to adopt such cybersecurity requirements, which could have the effect of disqualifying large foreign cloud service providers from sensitive government data processing contracts. In addition, some European companies, especially in the financial sector, argued that the foreign providers offered greater cybersecurity as well as a superior technical product.110 The Office of the US Trade Representative formally questioned whether the potential EUCS restrictions were consistent with the EU’s obligations under the World Trade Organization’s Government Procurement Agreement (GPA).111

In 2024, the Belgian EU presidency put forward a compromise proposal that discarded the foreign ownership restrictions in favor of data labeling and localization requirements.112 French authorities and technology companies expressed dismay at the prospect of EU-level cybersecurity certification rules weaker than France’s own.113 ENISA has yet to issue the final implementing measure, and this debate could well reemerge in the context of the anticipated CADA.

Looking ahead: Transatlantic tension will persist

The European debate over digital sovereignty—now firmly linked to the wider debate over technological sovereignty—is likely to be a continuing point of tension in the US-EU relationship. For many years, this has been a rhetorical exercise with few real consequences for non-EU firms, especially US companies. But the shift in geopolitics and the increasing drive to support EU industries to build a more competitive economy have led many European policymakers to conclude that now is the time to act. Moreover, the geopolitics are not just about Russia’s aggression or China’s export domination. They are also about the shifts and inconsistencies in US policy that have made many in Europe believe that it must now begin to fend for itself, in terms of both defense and the economy. 

As a result, the debate over digital sovereignty has moved from a discussion of whether there should be limits on non-EU companies to a discussion of how many restrictions there will be, and of what type and in what sectors of the economy. That discussion is likely to be pursued through several key legislative initiatives planned for late 2025 and 2026. CADA is already expected to identify requirements—including sovereign requirements—for cloud services.

The geopolitics are not just about Russia’s aggression or China’s export domination. They are also about the shifts and inconsistencies in US policy that have made many in Europe believe that it must now begin to fend for itself.

Perhaps most relevant, the public procurement directives are already under internal review, with a proposal for revision expected from the commission in 2026.114 Because much of the debate is about who can sell which products and services to whom (including to governments), procurement policy will be a key instrument in imposing sovereign requirements. EU and member-state procurement rules currently privilege price as the key selection criteria but, in the Net Zero Industry Act and other new measures, other considerations have been introduced into the procurement calculation.

As the EU pursues these initiatives, it will face a dilemma: To what degree does sovereignty require autarky? Or does the EU require partnerships, despite the risk of dependencies, because of the current lack of key capabilities? Some in Europe have argued that the right way forward is to develop end-to-end EU capabilities in the form of a Eurostack.115 From fiber-optic networks and computing hardware to software development and cybersecurity capabilities, all would be provided by EU companies.116 Others have pointed to the difficulties with this, asking whether the lack of EU-owned capabilities in cloud, AI, search, and other key functions would doom such an effort to be inferior and thus push Europe farther behind in the race to innovate essential digital technologies for the future. They also fear that European companies will not be able to compete internationally if they are cushioned by sovereign requirements.117 Some see no contradiction between sovereignty and being open to non-EU firms; indeed, they see access to the most innovative global companies as essential, especially given Europe’s competitiveness challenge.118 For others, the key element is timing. The EU tech sector currently lags in innovation but, with proper support and time, it should be fully capable of growing world-leading firms and technologies.119 Indeed, the EU’s International Digital Strategy emphasizes the importance of partners in boosting EU competitiveness and innovation, and the EU’s ambitions in global governance for data can hardly be accomplished without cooperative partners.120

But in all these versions of digital sovereignty, as well as in the larger arena of tech sovereignty, there is a central question: who owns the companies involved, and does it matter if they are not EU firms as long as they abide by EU laws and regulations? The recent negotiations over an EU-wide cloud certification system stalled on exactly this point (see the above discussion of EUCS). The Toolbox for 5G Cybersecurity put forward the concept of a “high-risk supplier” to warn against non-EU companies that were insufficiently independent of their home governments. While this was aimed at Chinese companies—especially Huawei—concerns have more recently focused on the United States and its companies.

The EU’s concerns are not only about the dominant position of US platforms in the European digital market, but also the potential actions of the US government—especially the Trump administration. The administration’s inconsistency on Ukraine, highlighted by its threats in July 2025 to cease sending weapons and other military supplies to Ukraine (reversed shortly after), alarmed many in Europe.121 Reports that the Trump administration threatened to block Ukraine’s access to the vital communications network Starlink during negotiations over critical minerals also raised European concerns.122 While these instances were primarily about defense, not the digital arena, they have created a heightened sense of insecurity in Europe. Coupled with the experience of the trade negotiations, they put into question the reliability of the United States as a partner in any undertaking.

In this environment, the EU will need to make choices about how best to ensure it has sufficient sovereignty over its digital market. Will the answer be found in more restrictions on non-EU companies, or with a more open arrangement that also boosts European economic growth and competitiveness?

Seven recommendations for Brussels and Washington

Given the economic stakes involved for both parties, the EU should engage the United States as it moves forward, and should keep the following guidelines in mind.

Competitiveness is key to innovation and economic success.

Throughout the coming debates over sovereign requirements, the EU must balance the need for security and for its own industrial and digital capabilities with the efficiencies and productivity required for a globally competitive economy. Settling for a more expensive and less capable product or service because it is European owned is not the way to grow the economy. There are times when it is necessary, but these instances should be rare and well considered, not routine.123

Heated rhetoric on either side does not help the economy.

As the EU moves forward with legislation, both Washington and Brussels should seek to lower the temperature. While some US executive orders and statements from top officials have seemed to decry any EU regulation that impedes US companies, the reality is that Europe has the right to regulate as it sees fit in its own market, as does the United States. At the same time, European threats of broad sovereign restrictions do not encourage needed investment. It should not be forgotten that the US-EU trade and investment relationship is the largest such partnership in the world, worth around $1.5 trillion in goods and services trade in 2024, and with mutual investment worth several times that.124 As both parties establish regulatory or investment requirements intended to boost domestic capabilities and add resilience to their economies, there will inevitably be tensions and misunderstandings. Creating barriers to trade and investment is sometimes necessary in limited circumstances, but careful consultations can ameliorate their impact.

A proposal that the trusted circle of cybersecurity providers be based on NATO membership might be appropriate.

As the discussion of data policy demonstrates, the transatlantic economy is not just about products and services, but also the data generated by them. Sharing those data—and being able to use them to generate revenues—is key to success in the digital economy. Of course, those transferring and using data must comply with local laws, including the GDPR. But the US and EU regulatory regimes collide at times, offering inconsistent or even conflicting requirements. Negotiated arrangements, such as the US-EU Data Privacy Framework, can overcome those differences and provide a stable context for business. A US–EU agreement on law enforcement access to data likewise could provide the protections and access both parties need. Similarly, an agreement that facilitates transfers of non-personal data might be useful in response to the Data Act and Data Union Strategy. Now is the time to make sure the United States and EU are developing compatible regimes.

Ringfencing can be a valuable strategy, as can trusted vendors.

Not all suppliers and customers are equal. Arrangements among allies and partners can lessen risks while preserving as much of the open, prosperous economy as possible, even in sensitive sectors. It makes no sense for Europeans to focus more on the transfer of data to the United States than to Russia or China. Using criteria such as those in the EU Toolbox for 5G Cybersecurity to identify foreign companies that can partner in key sectors will provide clarity and ease transactions. Similarly, a proposal floated in the EUCS negotiations that the trusted circle of cybersecurity providers be based on NATO membership might be appropriate. The Group of Seven (G7) could also offer a starting point for developing a set of compatible, interacting regulatory regimes in the digital economy, as it has done to some degree through its discussion of data free flow with trust and the AI principles and code of conduct.125

Certain sectors of the economy are more sensitive than others.

Digital sovereignty requirements should not be imposed on broad swaths of the economy. There are two main reasons for such requirements: national security and creating an indigenous capability in those areas where national economic resiliency is required. Policymakers should carefully identify the areas of the economy where these two reasons apply. Cybersecurity for essential government operations and protecting critical infrastructure are good examples. Management of more prosaic, but still sensitive government data—including where they are stored and who has access—might not need such stringent requirements. Because digital elements—data, cloud, software, and increasingly AI—exist across the economy, it might be more helpful to think about specific functions and make a risk-based assessment of the consequences of failure. Sovereign requirements should be limited to those areas in which a failure or breach will have consequences across society and the economy.

The type of sovereign requirement can vary with the economic sector and even particular conditions.

Among European policymakers, the sovereign requirements currently under discussion can be divided into two types: those that require a supplier to adhere to specific rules and those that involve restrictions relating to the ownership of the company supplying a particular service or product. The first might involve data localization or restricting access to data or use of a particular technology, such as AI. The second, which has been applied in the French SecNumCloud, is far more restrictive and affects the ability of any US-based company to provide the service in question. In some cases, an ownership restriction might exclude companies with the best capabilities from providing the service, and could even expose those using the service to more risk. Thus, ownership restrictions are unlikely to be worthwhile except in rare cases. In the United States, these exist in areas of defense contracting, in which companies dealing with US classified material must set up a US company with US governance and employees. But most government digital contracts, both in the United States and in Europe, are not defense related and would not require such far-reaching ownership rules.

Instead, for those functions in which a breach or disruption would cause significant harm, creating a category of trusted vendors might be appropriate. This could apply to sensitive government functions, as well as to critical infrastructure provided by private-sector enterprises. A system based on trusted vendors could balance the desire to boost local providers while also securing access to top-quality services from non-EU companies. The EU might consider whether there are lessons to be learned from the US government’s FedRAMP system, which certifies companies (including non-US companies) to provide cloud services to different government customers. Companies need to meet criteria that become more restrictive and complex through the three levels of certification (low, moderate, and high).126 While FedRAMP applies across most of the US government, individual agencies have the ability to impose their own requirements, allowing national security and intelligence agencies to impose further restrictions on those involved in classified functions. Despite these exceptions, FedRAMP’s graduated approach—matching certification level to sensitivity of the data—is much more tailored than some European proposals in matching certification requirements to the risk level of the cloud service required.127

Sovereign requirements should be implemented in a consistent manner, including at the member-state level.

One of the persistent challenges of EU policy is ensuring that implementation is the same throughout the union. Both the Draghi and Letta reports cited differences in member-state requirements for businesses (or implementation of those requirements) as a key factor slowing EU competitiveness. The US trade representative has cited as trade barriers numerous instances of different requirements among EU member states, meaning that companies must follow multiple sets of rules even within the single market.128 The European Commission recognized this problem when it decided that, under the DSA, very large online platforms (VLOPs) should be regulated at the EU level, not by member-state authorities. As the EU develops sovereign requirements in the digital sphere, it should be alert to efforts by member states to toughen criteria in ways that add unwarranted restrictions.

While the EU certainly has the right to decide on its own digital sovereignty requirements, those measures will undoubtedly affect access of non-EU companies to the market as well as the capabilities that are accessible to the EU and its member states. There will be costs for the EU, especially as it tries to build a more competitive economy. For that reason, any restrictions should be focused on those circumstances in which risks are high and security is necessary. This exercise should not be about denying access to non-EU companies, but instead about building a secure digital environment and resilient European capabilities. The EU should engage with its partners—not only the United States, but also Japan, South Korea, the UK, and others—to ensure that the fewest possible frictions arise. This will be a test for the transatlantic relationship, but one that can lead to greater cooperation rather than continued angst. 

About the authors

Acknowledgements

The authors would like to thank James Batchik, Emma Nix, and Jack Muldoon for their tireless support on the report’s editing, research, and data visualization.

Related content

Explore the program

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    See, for example: “Von der Leyen Puts Digital Sovereignty at the Heart of EU’s 2025 Agenda,” Council of European Informatics Societies, September 16, 2025, https://cepis.org/von-der-leyen-puts-digital-sovereignty-at-the-heart-of-eus-2025-agenda/.
2    See the earlier work of the authors: Frances G. Burwell and Kenneth Propp, “The European Union and the Search for Digital Sovereignty: Building ‘Fortress Europe’ or Preparing for a New World?”Atlantic Council, June 2020, https://www.atlanticcouncil.org/wp-content/uploads/2020/06/The-European-Union-and-the-Search-for-Digital-Sovereignty-Building-Fortress-Europe-or-Preparing-for-a-New-World.pdf; Frances Burwell and Kenneth Propp, “Digital Sovereignty in Practice: The EU’s Push to Shape the New Global Economy,” Atlantic Council, November 2, 2022, https://www.atlanticcouncil.org/in-depth-research-reports/report/digital-sovereignty-in-practice-the-eus-push-to-shape-the-new-global-economy/.
3    Donald J. Trump, Truth Social post, August 25, 2025, https://truthsocial.com/@realDonaldTrump/posts/115092243259973570; Elena Giordano, “EU Resists Trump: Tech Regulation Is Our ‘Sovereign Right,” Politico,August 26, 2025, https://www.politico.eu/article/eu-resists-trump-tech-regulation-is-our-sovereign-right/.
4    “Lutnick Talks EU Tech Rules, Nvidia H200 Chips, SCOTUS Tariff,” Bloomberg, November 24, 2025, https://www.bloomberg.com/news/videos/2025-11-24/lutnick-talks-eu-tech-rules-nvidia-h200-chips-tariffs-video.
5    “European Council Meeting (23 October 2025) Conclusions,” European Council, October 23, 2025, https://www.consilium.europa.eu/media/d2nhnqso/20251023-european-council-conclusions-en.pdf.
6    Sarah Knafo, “Report on European Technological Sovereignty and Digital Infrastructure,” European Parliament, Committee on Industry, Research and Energy, June 11, 2025, https://www.europarl.europa.eu/doceo/document/A-10-2025-0107_EN.html.
7    Cristina Caffarra, et al., “Deploying the Eurostack: What’s Needed Now,” Eurostack Initiative, May 19, 2025, https://eurostack.eu/wp-content/uploads/2025/08/eurostack-white-paper-final-19-05-25-3.pdf.
8    Kenneth Propp, “Talking Past Each Other: Why the US-EU Dispute over ‘Free Speech’ Is Set to Escalate,” Atlantic Council, August 15, 2025, https://www.atlanticcouncil.org/blogs/new-atlanticist/us-eu-dispute-over-free-speech-is-set-to-escalate/.
9    “European Council Meeting (23 October 2025) Conclusions.”
10    “Summit on European Digital Sovereignty Delivers Landmark Commitments for a More Competitive and Sovereign Europe,” Élysée, November 18, 2025, https://www.elysee.fr/en/emmanuel-macron/2025/11/18/summit-on-european-digital-sovereignty-delivers-landmark-commitments-for-a-more-competitive-and-sovereign-europe.
11    “Declaration for European Digital Sovereignty,” Council of the European Union, December 5, 2025, https://data.consilium.europa.eu/doc/document/ST-15781-2025-INIT/en/pdf.
13    Knafo, “Report on European Technological Sovereignty and Digital Infrastructure.”
14    Mario Draghi, “The Future of European Competitiveness,” European Commission, September 9, 2024, https://commission.europa.eu/topics/eu-competitiveness/draghi-report_en.
15    Ibid.
16    “Largest Tech Companies by Market Cap,” CompaniesMarketCap, last visited September 27, 2025, https://companiesmarketcap.com/tech/largest-tech-companies-by-market-cap/.
17    Enrico Letta, “Much More than a Market,” European Council, April 2024, https://www.consilium.europa.eu/media/ny3j24sm/much-more-than-a-market-report-by-enrico-letta.pdf.
18    Draghi, “The Future of European Competitiveness.
19    Ivan Levingston, “European Start-up Valuations Boom on Investor Frenzy,” Financial Times, September 5, 2025, https://www.ft.com/content/5cd37cea-87e7-4648-b85b-f77091dd4558.
20    Draghi, “The Future of European Competitiveness.
21    Ramsha Jahangir, “What’s Behind Europe’s Push to ‘Simplify’ Tech Regulation?” Tech Policy Press, April 24, 2025, https://www.techpolicy.press/whats-behind-europes-push-to-simplify-tech-regulation/.
22    Javier Espinosa, “EU Should Focus on Top 5 Tech Companies, Says Leading MEP,” Financial Times, May 31, 2021, https://www.ft.com/content/49f3d7f2-30d5-4336-87ad-eea0ee0ecc7b.
23    “Cybersecurity of 5G Networks: EU Toolbox of Risk Mitigation Measures,” European Commission, January 23, 2020, https://digital-strategy.ec.europa.eu/en/library/cybersecurity-5g-networks-eu-toolbox-risk-mitigating-measures.
24    “EU–China—A Strategic Outlook,” European Commission and European External Action Service, March 12, 2019, https://commission.europa.eu/system/files/2019-03/communication-eu-china-a-strategic-outlook.pdf.
25    “Speech by President von der Leyen on EU-China Relations to the Mercator Institute for China Studies and the European Policy Centre,” European Commission,March 29, 2023, https://ec.europa.eu/commission/presscorner/detail/en/speech_23_2063.
26    “Strategic Dependencies and Capacities,” European Commission, May 5, 2021, https://commission.europa.eu/system/files/2021-05/swd-strategic-dependencies-capacities_en.pdf.
27    “Commission Announces Next Steps on Cybersecurity of 5G Networks in Complement to Latest Progress Report by Member States,” European Commission, press release, June 14, 2023, https://ec.europa.eu/commission/presscorner/detail/en/ip_23_3309.
28    “Roadmap Towards Ending Russian Energy Imports,” European Commission, May 12, 2025, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52025DC0440R(01).
29    “Defending American Companies and Innovators from Overseas Extortion and Unfair Fines and Penalties,” White House, February 21, 2025, https://www.whitehouse.gov/presidential-actions/2025/02/defending-american-companies-and-innovators-from-overseas-extortion-and-unfair-fines-and-penalties/.
30    Ibid.
31    “Fact Sheet: President Donald J. Trump Issues Directive to Prevent the Unfair Exploitation of American Innovation,” White House,February 21, 2025, https://www.whitehouse.gov/fact-sheets/2025/02/fact-sheet-president-donald-j-trump-issues-directive-to-prevent-the-unfair-exploitation-of-american-innovation.
32    Alice Hancock, Paola Tamma, and James Politi, “EU Push to Protect Digital Rules Holds Up Trade Statement with US,” Financial Times, August 17, 2025. https://www.ft.com/content/3f67b6ca-7259-4612-8e51-12b497128552.
33    Truth Social, August 25, 2025.
34    “2025 State of the Union Address by President von der Leyen,” European Commission, September 9, 2025, https://ec.europa.eu/commission/presscorner/detail/ov/SPEECH_25_2053.
35    U.S. Trade Representative, X post, December 16, 2025, https://x.com/USTradeRep/status/2000990028835508258.
36    “Commission Finds Apple and Meta in Breach of the Digital Markets Act,” European Commission, press release, April 23, 2025, https://digital-strategy.ec.europa.eu/en/news/commission-finds-apple-and-meta-breach-digital-markets-act.
37    “Commission Fines Google €2.95 Billion over Abusive Practices in Online Advertising Technology,” European Commission, press release, September 4, 2025, https://ec.europa.eu/commission/presscorner/detail/en/ip_25_1992.
38    “Commission fines X €120 million under the Digital Services Act,” European Commission, press release, December 5, 2025, https://digital-strategy.ec.europa.eu/en/news/commission-fines-x-eu120-million-under-digital-services-act.
39    Mark MacCarthy and Kenneth Propp, “The European Union Changes Course on Digital Legislation,” Lawfare, December 15, 2025, https://www.lawfaremedia.org/article/the-european-union-changes-course-on-digital-legislation.
40    “Simpler EU Digital Rules and New Digital Wallets to Save Billions for Businesses and Boost Innovation,” European Commission, press release, November 19, 2025, https://ec.europa.eu/commission/presscorner/detail/en/ip_25_2718.
41    “EU Launches InvestAI Initiative to Mobilise €200 Billion of Investment in Artificial Intelligence,” European Commission, press release, February 10, 2025, https://ec.europa.eu/commission/presscorner/detail/en/ip_25_467.
42    “Commission Launches Ambitious Strategy to Make Europe a Startup and Scaleup Powerhouse,” European Commission, press release, May 27, 2025, https://ec.europa.eu/commission/presscorner/detail/en/ip_25_1350.
43    Barbara Moens and Paola Tamma, “EU to Block Big Tech from New Financial Sharing Data System,” Financial Times, September 21, 2025, https://www.ft.com/content/6596876f-c831-482c-878c-78c1499ef543.
44    Luca Bertuzzi, “‘Effective control’ concept for cloud sovereignty eyed by EU Commission,” MLex, September 4, 2025, https://www.mlex.com/mlex/articles/2384011/-effective-control-concept-for-cloud-sovereignty-eyed-by-eu-commission?trk=public_post_comment-text.
45    “European Data Union Strategy,” European Commission,November 19, 2025, 18–20, https://digital-strategy.ec.europa.eu/en/policies/data-union.
46    Ibid.
47    Axel Voss, “Regaining Europe’s Digital Sovereignty: Ten Immediate Actions for 2025,”EPP Group at the European Parliament, October 7, 2025, https://www.axel-voss-europa.de/wp-content/uploads/2025/10/AVoss-10-Steps-Digital-Sovereignty.pdf.
48    Ibid.
49    Peter Finn and Sari Horwitz, “US Charges Snowden with Espionage,” Washington Post, June 21, 2013, https://www.washingtonpost.com/world/national-security/us-charges-snowden-with-espionage/2013/06/21/507497d8-dab1-11e2-a016-92547bf094cc_story.html; Dave Keating, “European Parliament to Hear Snowden testimony,” Politico, January 9, 2014, https://www.politico.eu/article/european-parliament-to-hear-snowden-testimony/.
50    Michael Scherer, “Trump Advisers Renew Push for Pardon of Edward Snowden,” Washington Post, December 4, 2024, https://www.washingtonpost.com/politics/2024/12/04/trump-pardon-edward-snowden-gaetz/.
51    Schrems v. Data Protection Commissioner, CASE C-362/14 (Court of Justice of the EU 2015), https://curia.europa.eu/juris/document/document.jsf?text=&docid=169195&pageIndex=0&doclang=en&mode=lst&dir=&occ=first&part=1&cid=2522200; Data Protection Commissioner v. Facebook Ireland & Schrems, CASE C-311/18 (Court of Justice of the EU 2020), https://curia.europa.eu/juris/document/document.jsf?text=&docid=228677&pageIndex=0&doclang=EN&mode=lst&dir=&occ=first&part=1&cid=4010715.
52    “Meta Platforms, Inc. Annual Report Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1933 for the Fiscal Year Ended on December 31, 2022,” US Securities and Exchange Commission, 2022, https://www.sec.gov/Archives/edgar/data/1326801/000132680123000013/meta-20221231.htm.
53    “Data Protection: The General Court Dismisses an Action for Annulment of the New Framework for the Transfer of Personal Data between the European Union and the United States,” Court of Justice of the European Union, press release, September 3, 2025, https://curia.europa.eu/jcms/upload/docs/application/pdf/2025-09/cp250106en.pdf.
54    Claudie Moreau and Théophane Hartmann, “Latombe to Appeal EU-US Data Transfer Court Challenge,” Euractiv, October 29, 2025, https://www.euractiv.com/news/exclusive-latombe-to-appeal-eu-us-data-transfer-court-challenge/.
55    “EU-US Data Transfers: First Reaction on ‘Latombe’ Case,” Noyb, September 3, 2025, https://noyb.eu/en/eu-us-data-transfers-first-reaction-latombe-case.
56    Matt Garman and Max Peterson, “AWS Digital Sovereignty Pledge: Announcing a New, Independent Sovereign Cloud in Europe,” AWS Security Blog, October 24, 2023, https://aws.amazon.com/blogs/security/aws-digital-sovereignty-pledge-announcing-a-new-independent-sovereign-cloud-in-europe/; Julie Brill and Erin Chapple, “Microsoft Announces the Phased Rollout of the EU Data Boundary for the Microsoft Cloud Begins January 1, 2023,” Microsoft EU Policy Blog, December 15, 2022, https://blogs.microsoft.com/eupolicy/2022/12/15/eu-data-boundary-cloud-rollout/.
57    Emily Benson, Max Bergmann, and Federico Steinberg, “The Transatlantic Tech Clash: Will Europe ‘De-Risk’ from the United States?” Center for Strategic and International Studies, May 2, 2025, https://www.csis.org/analysis/transatlantic-tech-clash-will-europe-de-risk-united-states.
58    Brad Smith, “Microsoft Announces New European Digital Commitments,” Microsoft, April 30, 2025, https://blogs.microsoft.com/on-the-issues/2025/04/30/european-digital-commitments.
59    Alex Matthews, “Can Europe Build Itself a Rival to Google?” Deutsche Welle, December 9, 2024, https://www.dw.com/en/european-search-engines-ecosia-and-qwant-to-challenge-google/a-70898027.
60    Ibid.
61    Burwell and Propp, “Digital Sovereignty in Practice.”
62    Mathieu Pollet, “Anatomy of a Franco-German Tech Misfire,” Politico, November 17, 2025, https://www.politico.eu/article/anatomy-franco-german-tech-misfire-american-dependence/.
63    Draghi, “The Future of European Competitiveness,” 34.
64    “President’s Intelligence Advisory Board (PIAB) and Intelligence Oversight Board (IOB) Review of FISA Section 702 and Recommendations for Reauthorization,” White House, July 2023, 3, https://int.nyt.com/data/documenttools/presidents-intelligence-advisory-board-and-intelligence-oversight-board-review-of-fisa-section-702-and-recommendations-for-reauthorization/4d2d3218303fc702/full.pdf.
65    “Landmark U.S.-UK Data Access Agreement Enters into Force,” US Department of Justice, press release, October 3, 2022, https://www.justice.gov/archives/opa/pr/landmark-us-uk-data-access-agreement-enters-force; “United States and Australia Enter CLOUD Act Agreement to Facilitate Investigations of Serious Crime,” US Department of Justice, press release, December 15, 2021, https://www.justice.gov/archives/opa/pr/united-states-and-australia-enter-cloud-act-agreement-facilitate-investigations-serious-crime; “United States and Canada Welcome Negotiations of a CLOUD Act Agreement,” US Department of Justice, press release, March 22, 2022, https://www.justice.gov/archives/opa/pr/united-states-and-canada-welcome-negotiations-cloud-act-agreement.
66    Robert Deedman and Kenneth Propp, “The U.K.-US Data Access Agreement,” Lawfare, June 20, 2025, https://www.lawfaremedia.org/article/the-u.k.-u.s.-data-access-agreement.
67    “Report Concerning the Attorney General’s Renewed Determination that the United Kingdom of Great Britain and Northern Ireland, and the Agreement between the Government of the United States of America and the Government of the United Kingdom of Great Britain and Northern Ireland on Access to Electronic Data for the Purpose of Countering Serious Crime, Satisfy the Requirements of 18 USC. § 2523(B),” US Department of Justice, November 2024, https://www.documentcloud.org/documents/25551978-doj-report-to-congress-on-us-uk-cloud-act-agreement/.
68    Tom Tugendhat, “UK-US Data Access Agreement: First Year of Use,” UK Parliament, December 19, 2023, https://questions-statements.parliament.uk/written-statements/detail/2023-12-19/hcws152?source=email.
69    “Recommendation for a Council Decision Authorizing the Opening of Negotiations in View of an Agreement between the European Union and the United States of America on Cross-Border Access to Electronic Evidence for Judicial Cooperation in Criminal Matters,” European Commission, February 5, 2019, https://eur-lex.europa.eu/resource.html?uri=cellar:b1826bff-2939-11e9-8d04-01aa75ed71a1.0001.02/DOC_1&format=PDF.
70    “Council Adopts EU Laws on Better Access to Electronic Evidence,” Council of the European Union, press release, June 27, 2023, https://www.consilium.europa.eu/en/press/press-releases/2023/06/27/council-adopts-eu-laws-on-better-access-to-electronic-evidence/.
71    “Joint Press Release Following the EU-US Ministerial on Justice and Home Affairs, 21 June 2024 (Brussels),” US Department of Homeland Security, June 28, 2024, https://www.dhs.gov/archive/news/2024/06/28/joint-press-release-following-eu-us-ministerial-justice-and-home-affairs-21-june.
72    Richard Salgado and Kenneth Propp, “Patching the U.K.’s Zero-Day Security Exploit With the US-U.K. CLOUD Act Agreement,” Lawfare, July 31, 2025, https://www.lawfaremedia.org/article/patching-the-u.k.-s-zero-day-security-exploit-with-the-u.s.-u.k.-cloud-act-agreement.
73    Zoe Kleinman, “UK Demands Access to Apple Users’ Encrypted Data,” BBC, February 7, 2025, https://www.bbc.com/news/articles/c20g288yldko; “Apple Can No Longer Offer Advanced Data Protection the United Kingdom to New Users,” Apple, September 23, 2025, https://support.apple.com/en-gb/122234.
74    Deedman and Propp, “The U.K.-US Data Access Agreement.”
75    Annabelle Timsit and Joseph Menn, “U.K. Drops ‘Back Door’ Demand for Apple User Data, US Intel Chief Says,” Washington Post, August 19, 2025, https://www.washingtonpost.com/technology/2025/08/19/uk-apple-backdoor-data-privacy-gabbard.
77    Kenneth Propp, “Transatlantic Digital Trade Protections: From TTIP to ‘Policy Suicide?’” Lawfare, February 16, 2024, https://www.lawfaremedia.org/article/transatlantic-digital-trade-protections-from-ttip-to-policy-suicide.
78    “Protecting Americans from Foreign Adversary Controlled Applications Act,” in emergency supplemental appropriations, Pub. L. No. 118–50, 118th Cong. (2024), https://www.congress.gov/bill/118th-congress/house-bill/7520/text; “Executive Order on Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern,” White House, February 28, 2024, https://bidenwhitehouse.archives.gov/briefing-room/presidential-actions/2024/02/28/executive-order-on-preventing-access-to-americans-bulk-sensitive-personal-data-and-united-states-government-related-data-by-countries-of-concern/.
79    “Fact Sheet: Justice Department Issues Final Rule to Address Urgent National Security Risks Posed by Access to USU.S. Sensitive Personal and Government-Related Data from Countries of Concern and Covered Persons,” US Department of Justice, December 27, 2024, https://www.justice.gov/archives/opa/media/1382526/dl; “Data Security Program: Compliance Guide,” US Department of Justice, April 11, 2025, https://www.justice.gov/opa/media/1396356/dl.
80    Justin Sherman, et al., “Data Brokers and the Sale of Data on US Military Personnel: Risks to Privacy, Safety, and National Security,” Duke Sanford Tech Policy Program, November 2023, https://techpolicy.sanford.duke.edu/data-brokers-and-the-sale-of-data-on-us-military-personnel/.
81    Propp, “Transatlantic Digital Trade Protections.”
82    “Joint Statement Initiative on Electronic Commerce,” World Trade Organization, July 26, 2024, https://docs.wto.org/dol2fe/Pages/SS/directdoc.aspx?filename=q:/INF/ECOM/87.pdf&Open=True.
83    Kenneth Propp, “Who’s a National Security Risk? The Changing Transatlantic Geopolitics of Data Transfers,” Atlantic Council, May 29, 2024, https://www.atlanticcouncil.org/wp-content/uploads/2024/05/Whos-a-National-Security-Risk-The-Changing-Transatlantic-Geopolitics-of-Data-Transfers_Final.pdf.
84    Government Access to Data in Third Countries: Final Report,” Milieu Consulting, November 2021, https://www.edpb.europa.eu/system/files/2022-01/legalstudy_on_government_access_0.pdf.
85    “The Data Protection Ombudsman’s Decision Does Not Address the Legality of Data Transfers to Russia—the Matter Remains under Investigation,” Office of the Data Protection Ombudsman, September 27, 2023, https://tietosuoja.fi/en/-/the-data-protection-ombudsman-s-decision-does-not-address-the-legality-of-data-transfers-to-russia-the-matter-remains-under-investigation#:~:text=The%20Office%20of%20the%20Data%20Protection%20Ombudsman%27s%20decision,Protection%.
86    “Irish Data Protection Commission Fines TikTok €530 Million and Orders Corrective Measures Following Inquiry into Transfers of EEA User Data to China,” Data Protection Commission of Ireland, May 2, 2025, https://www.dataprotection.ie/en/news-media/latest-news/irish-data-protection-commission-fines-tiktok-eu530-million-and-orders-corrective-measures-following.
87    “DPC Announces Inquiry into TikTok Technology Limited’s Transfers of EEA Users’ Personal Data to Servers Located in China,” Data Protection Commission of Ireland, July 10, 2025, https://www.dataprotection.ie/en/news-media/press-releases/dpc-announces-inquiry-tiktok-technology-limiteds-transfers-eea-users-personal-data-servers-located.
88    Kristof Van Quathem and Anna Sophia Oberschelp de Meneses, “Finnish Supervisory Authority Investigates Health Data Transfers to China,” Covington, March 19, 2025, https://www.insideprivacy.com/cross-border-transfers/finnish-supervisory-authority-investigates-health-data-transfers-to-china/.
89    “TikTok, AliExpress, SHEIN & Co Surrender Europeans’ Data to Authoritarian China,” Noyb, January 16, 2025, https://noyb.eu/en/tiktok-aliexpress-shein-co-surrender-europeans-data-authoritarian-china.
90    “Regulation (EU) 2022/868 of the European Parliament and of the Council of 30 May 2022 on European Data Governance and Amending Regulation (EU) 2018/1724 (Data Governance Act),” Official Journal of the European Union, May 30, 2022, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022R0868; “Regulation (EU) 2023/2854 of the European Parliament and of the Council of 13 December 2023 on Harmonised Rules on Fair Access to and Use of Data and Amending Regulation (EU) 2017/2394 and Directive (EU) 2020/1828 (Data Act),” Official Journal of the European Union, December 13, 2023, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L_202302854; “Regulation (EU) 2025/327 of the European Parliament and of the Council of 11 February 2025 on the European Health Data Space and Amending Directive 2011/24/EU and Regulation (EU) 2024/2847,” Official Journal of the European Union, February 11, 2025, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L_202500327.
91    “Commission Proposes Measures to Boost Data Sharing and Support European Data Spaces,” European Commission, press release, November 24, 2020, https://ec.europa.eu/commission/presscorner/detail/en/ip_20_2102.
92    “Common European Data Spaces,” European Commission, October 27, 2025, https://digital-strategy.ec.europa.eu/en/policies/data-spaces.
93    “Mission Letter: Henna Virkkunen, Executive Vice-President-Designate for Tech Sovereignty, Security and Democracy,” European Commission, September 17, 2024, https://commission.europa.eu/document/download/3b537594-9264-4249-a912-5b102b7b49a3_en?filename=Mission%20letter%20-%20VIRKKUNEN.pdf.
94    “Public Consultation on the Use of Data to Develop the Future of AI: The European Data Union Strategy,” European Data, June 25, 2025, https://data.europa.eu/en/news-events/news/public-consultation-use-data-develop-future-ai-european-data-union-strategy.
95    “Communication from the Commission to the European Parliament and the Council: Data Union Strategy: Unlocking Data for AI,” European Commission, November 19, 2025. https://digital-strategy.ec.europa.eu/en/policies/data-union.
96    “Regulation (EU) 2022/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market for Digital Services and Amending Directive 2000/31/EC (Digital Services Act),” Official Journal of the European Union, October 27, 2022, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022R2065.
97    Jeanna Smialek and Adam Satariano, “Something Else for Europe and the US to Disagree About: ‘Free Speech,’” New York Times, April 4, 2025, https://www.nytimes.com/2025/04/04/world/europe/european-union-free-speech-x-facebook-elon-musk.html.
98    “Fact Sheet: President Donald J. Trump Issues Directive to Prevent the Unfair Exploitation of American Innovation”; Supantha Mukherjee, “US FCC Chair Says EU Digital Services Act Is Threat to Free Speech,” Reuters, March 3, 2025, https://www.reuters.com/technology/eu-content-law-incompatible-with-us-free-speech-tradition-says-fccs-carr-2025-03-03/.
99    Department of State (@StateDept), “In Europe, thousands are being convicted for the crime of criticizing their own governments. This Orwellian message won’t fool the United States. Censorship is not freedom,” X post, July 22, 2025, https://x.com/statedept/status/1947755665520304253.
100    Humeyra Pamuk, “Rubio Orders US Diplomats to Launch Lobbying Blitz against Europe’s Tech Law,” Reuters, August 7, 2025, https://www.reuters.com/sustainability/society-equity/rubio-orders-us-diplomats-launch-lobbying-blitz-against-europes-tech-law-2025-08-07.
101    “The Foreign Censorship Threat: How the European Union’s Digital Services Act Compels Global Censorship and Infringes on American Free Speech,” Committee on the Judiciary of the US House of Representatives, July 25, 2025, https://judiciary.house.gov/sites/evo-subsites/republicans-judiciary.house.gov/files/2025-07/DSA_Report%26Appendix%2807.25.25%29.pdf.
102    Mark Scott, “EU Takes Shot at Musk over Trump Interview—and Misses,” Politico, August 13, 2024, https://www.politico.eu/article/eu-elon-musk-donald-trump-interview-thierry-breton-letter-social-media/.
103    “The Foreign Censorship Threat.”
104    “Model Letter sent to Tech Companies from Chairman Andrew N. Ferguson,” US Federal Trade Commission, August 21, 2025, https://www.ftc.gov/system/files/ftc_gov/pdf/ftc-unfair-security-letter-ferguson.pdf.
105    Propp, “Talking Past Each Other.”
106    “Announcement of Actions to Combat the Global Censorship-Industrial Complex,” US Department of State, press release, December 23, 2025, https://www.state.gov/releases/office-of-the-spokesperson/2025/12/announcement-of-actions-to-combat-the-global-censorship-industrial-complex/.
107    “Statement by the European Commission on the U.S. Decision to impose travel restrictions on certain EU individuals,” European Commission, press release, December 23, 2025,  https://ec.europa.eu/commission/presscorner/detail/en/statement_25_3160.
108    “EU Strategic Dependencies and Capacities: Second Stage of In-Depth Reviews,” European Commission, February 22, 2022, https://www.wec-italia.org/wp-content/uploads/2022/02/STRATEGIC-DEPENDENCIES-2022.pdf.
109    “Doctrine ‘Cloud au Centre’ sur l’Usage de l’Informatique en Nuage au Sein de l’État,” Government of the Republic of France, July 5, 2021, https://www.transformation.gouv.fr/files/presse/Circulaire-n6282-SG-5072021-doctrineuutilisation-informatique-en-nuage-Etat.pdf.
110    Laura Kabelka, “Sovereignty Requirements Remain in Cloud Certification Scheme Despite Backlash,” Euractiv, July 16, 2022, https://www.euractiv.com/news/sovereignty-requirements-remain-in-cloud-certification-scheme-despite-backlash.
111    “2024 National Trade Estimate Report on Foreign Trade Barriers,” Office of the US Trade Representative, March 2024, https://ustr.gov/sites/default/files/2024%20NTE%20Report_1.pdf.
112    Floris Hulshoff Pol, “EU Drops Sovereignty Rules for US Cloud Providers,” Techzine, April 4, 2024, https://www.techzine.eu/news/privacy-compliance/118401/eu-drops-sovereignty-rules-for-u-s-cloud-providers/.
113    Reynald Fléchaux, “EUCS, la Certification Cloud Européenne qui Menace de Désarmer SecNumCloud,” CIO, September 12, 2024, https://www.cio-online.com/actualites/lire-eucs-la-certification-cloud-europeenne-qui-menace-de-desarmer-secnumcloud-15856.html.
114    Francesco Nicoli, “Mapping the Road Ahead for EU Public Procurement Reform,” Bruegel, March 21, 2025, https://www.bruegel.org/first-glance/mapping-road-ahead-eu-public-procurement-reform.
115    Théophane Hartmann, “European Industry Big Win: Germany, France Both Support Sovereign EU-Based Tech Infrastructure,” Euractiv, April 10, 2025, https://www.euractiv.com/news/european-industry-big-win-germany-france-both-support-sovereign-eu-based-tech-infrastructure/.
116    Michal Kobosko, “A European Recipe for Tech Sovereignty,” Parliament, July 30, 2025, https://www.theparliamentmagazine.eu/news/article/oped-a-european-recipe-for-tech-sovereignty.
117    For a detailed discussion of the challenges facing Eurostack and the more exclusionary version of EU digital sovereignty, see: Zach Meyers, Can the EU Reconcile Digital Sovereignty and Economic Competitiveness? Centre on Regulation in Europe, September 2025, https://cerre.eu/wp-content/uploads/2025/09/CERRE_Issue-Paper_EU-Competitiveness_Can-the-EU-reconcile-digital-sovereignty-and-economic-competitiveness.pdf.
118    “Clearing the Cloud,” Implement Consulting Group in collaboration with Google,November 2025, https://cms.implementconsultinggroup.com/media/uploads/articles/2025/European-digital-sovereignty/2025-Clearing-the-cloud.pdf.
119    See, for example: “Open Letter: European Industry Calls for Strong Commitment to Sovereign Digital Infrastructure, Euro-Stack, March 14, 2025, https://euro-stackletter.eu/wp-content/uploads/2025/03/EuroStack_Initiative_Letter_14-March-.pdf. The letter, signed by numerous European companies, argues for increased support to European industry to build a Eurostack, while not restricting access by non-EU companies.
120    “Joint Communication on an International Digital Strategy for the EU,”European Commission and EU High Representative for Foreign and Security Policy, June 5, 2025, https://digital-strategy.ec.europa.eu/en/library/joint-communication-international-digital-strategy-eu.
121    Amy Mackinnon, Jamie Dettmer, and Paul McLeary, “Europe Scrambles to Aid Ukraine after US Intelligence Cutoff,” Politico, March 8, 2025, https://www.politico.com/news/2025/03/08/europe-scrambles-to-aid-ukraine-after-us-intelligence-cutoff-00219678.
122    Andrea Shalal and Joey Roulette, “US Could Cut Ukraine’s Access to Starlink Internet Services over Minerals, Say Sources,” Reuters, February 22, 2025, https://www.reuters.com/business/us-could-cut-ukraines-access-starlink-internet-services-over-minerals-say-2025-02-22/.
123    For a discussion of the relationship between digital sovereignty and competitiveness, see: Christian Klein, “The Boss of SAP on Europe’s Botched Approach to Digital Sovereignty: It’s Time to Prioritise Code over Concrete,” Economist, August 25, 2025, https://www.economist.com/by-invitation/2025/08/25/the-boss-of-sap-on-europes-botched-approach-to-digital-sovereignty
124    “European Union,” Office of the United States Trade Representative, last visited December 11, 2025, https://ustr.gov/countries-regions/europe-middle-east/europe/european-union.
125    “G7 Roadmap for Cooperation on Data Free Flow with Trust,” Group of Seven, 2021, https://assets.publishing.service.gov.uk/media/609cf5e18fa8f56a3c162a43/Annex_2__Roadmap_for_cooperation_on_Data_Free_Flow_with_Trust.pdf;“G7 Leaders’ Statement on the Hiroshima AI Process,” Group of Seven,October 30, 2023, https://digital-strategy.ec.europa.eu/en/library/g7-leaders-statement-hiroshima-ai-process.
126    For details on the FedRAMP program, see: “FedRAMP Provides a Standardized, Reusable Approach to Security Assessment and Authorization for Cloud Service Offerings,” FedRAMP, last visited December 11, 2025, https://www.fedramp.gov.
127    For a discussion of the differences between FedRAMP and EUCS, see: Kenneth Propp, “Oceans Apart: The EU and US Cybersecurity Certification Standards for Cloud Services,” Cross Border Data Forum, June 27, 2023, https://www.crossborderdataforum.org/wp-content/uploads/2023/07/Oceans-Apart-The-EU-and-US-Cybersecurity-Certification-Standards-for-Cloud-Services.pdf.
128    “2025 National Trade Estimate Report on Foreign Trade Barriers,” Office of the US Trade Representative, 2025, https://ustr.gov/sites/default/files/files/Press/Reports/2025NTE.pdf.

The post Digital sovereignty: Europe’s declaration of independence? appeared first on Atlantic Council.

]]>
Transatlantic cooperation on protecting minors online https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/transatlantic-cooperation-on-protecting-minors-online/ Wed, 14 Jan 2026 05:00:00 +0000 https://www.atlanticcouncil.org/?p=897128 There is widespread agreement among US and EU officials on the need to protect children online. US-EU dialogue on areas of commonality could facilitate a more efficient rollout of services and technologies to protect users.

The post Transatlantic cooperation on protecting minors online appeared first on Atlantic Council.

]]>

Bottom lines up front

  • While US and EU policies differ in their approaches to the regulation of the internet, recent policy roundtables made clear that there is agreement on the need to protect children online.
  • Areas of commonality include the use of primary legislation, an emphasis on platform design rather than censoring content, and the need to balance protection of children with other fundamental rights.
  • Further dialogue between the United States and the EU on these questions could help facilitate faster and more efficient rollout of services and technologies to protect users.

Executive summary

While US and European Union (EU) policies differ in their approaches to online safety and the regulation of the internet, there is agreement about the need to protect children online. That is one high-level takeaway from a recent round of US-EU dialogue hosted by the Centre on Regulation in Europe (CERRE) and the Atlantic Council.

Such dialogue helps to identify common policy approaches for the protection of minors and common approaches to enforcing rules. Ultimately, it can also help facilitate faster and more efficient rollout of technologies to protect users. Dialogue will also help global platforms develop services to comply with rules and expectations on both sides of the Atlantic.

At the recent roundtable hosted by CERRE and the Atlantic Council, the synergies and differences in regulatory approaches and philosophies on both sides of the Atlantic centred on four themes. For each theme, some common threads seemed ripe for further discussion and cooperation.

  • New legislation and approaches to enforcement: In terms of the overall governance landscape, legislation has a key role to play in Europe and in the United States, where long-standing federal rules have been supported by an increasing number of state laws.The bulk of legislation in the EU—such as the Digital Services Act (DSA)—is adopted at the EU level, while some member states are adopting supplementary rules. In the United States, most legislation is now being adopted at the state level. Public enforcement by regulators plays a big role in the EU and the United Kingdom (UK). In the United States, state attorneys general are taking action to enforce rules, with powers similar to those of regulators in Europe. More alignment and cooperation on enforcement would be beneficial. Private enforcement through courts is also possible but, while this is already widespread in the United States, it is just emerging in Europe.
  • The harms from which children should be protected: On both sides of the Atlantic, there is a large degree of alignment on the harms from which children need to be protected. A strong commonality is that rules in Europe and the US both require compliance by design to avoid particularly harmful conduct, such as unwanted contact by unknown adults. Other common design elements include data minimization, which is a central component of the European Commission’s guidelines on protecting minors under Article 28 of the DSA and in the UK Office of Communication’s (Ofcom) age-appropriate design code and guidance under the Online Safety Act (OSA).
  • Balancing rights: To balance the protection of fundamental rights (in particular, privacy and freedom of expression) against the need to protect children, there is widespread agreement that everyone—not just children—deserves protections online. The EU, UK, and United States are all cautious about dictating which content is acceptable online and are instead converging on approaches that require platforms to use processes and systems to ensure safety by design. Ensuring the protection of fundamental rights is a common concern and, ultimately, a matter of balance, including at the enforcement level.
  • Age verification: Current debates about banning access to social media and about age verification are critical in Europe and in the United States, both in general and in relation to certain types of platforms (particularly those that host pornographic content). There is no agreement on a single type of technology that should be used, but there are prototypes and guidance on the high-level principles that the technologies should reflect. There are similar discussions on both sides of the Atlantic about how to attribute responsibility for age assurance across the supply chain—i.e., where in the supply chain age verification should take place—and how the division of responsibilities between players in supply chains could work in practice.

Introduction

The EU has put in place important legal building blocks to protect children online. These include the DSA and the European Commission’s guidelines on Article 28 of the DSA, which require providers of platforms accessible to minors to “put in place appropriate and proportionate measures to ensure a high level of privacy, safety, and security of minors.”1 They also include the Audiovisual Media Services Directive (AVMSD), which contains rules to safeguard minors’ personal data and to protect children online, and the General Data Protection Regulation (GDPR), which provides rules on collection and processing of minors’ data. Other proposals yet to be finalized include the pending Digital Fairness Act (DFA) proposal and the Regulation on Child Sexual Abuse Material (CSAM).2 Member states retain certain powers to enact national laws to protect minors online.3

In the United States, the protection of minors online is an important consideration at both the federal and state levels. At the federal level, the Kids Online Safety Act (KOSA) proposal, the Children’s Online Privacy Protection Act (COPPA) and the COPPA 2.0 proposal all seek to address certain aspects of children’s safety online (in particular, privacy, advertising, and CSAM).4 At the state level, California’s Age-Appropriate Design Code (CAADCA) has been challenged in court on First Amendment grounds.5 Other states, including Nebraska and Vermont, have recently adopted similar codes that they hope will withstand First Amendment scrutiny.6 Utah has also recently enacted a law to protect content-creating minors from financial exploitation and privacy violations.7

News headlines focus on apparent differences between US and European policies, which are spiraling into growing transatlantic tension. However, there is a large degree of alignment on the need to protect children online while also safeguarding fundamental rights such as privacy and freedom of expression.

The overall governance landscape

The European and US approaches are fairly aligned on some governance aspects of regulating child protection online. Since the adoption of its rules for video sharing platforms in 2018, the EU has embraced a legislative path to protect minors online.8 This legislative framework was strengthened in 2022 with the adoption of the DSA. Both the video sharing platform rules and the DSA are largely principle based and rely on a form of collaboration with the industry,placing the onus on the platforms themselves to decide what constitutes an appropriate and proportionate level of protection for minors. The UK has also adopted a legislative path with the OSA and the detailed guidance produced by Ofcom.9 Like the DSA, the OSA adopts a risk-based approach, with the larger and riskier platforms subject to stricter measures. The UK regulator, Ofcom, has supplemented the legislation with detailed guidance.

The European Commission recently adopted guidelines to help online platforms understand and comply with their obligations under Article 28 of the DSA, including setting out a list of recommendations for platforms, but these are nonbinding. Safety by design is at the heart of the guidelines. The EU’s legislative approach focuses on ensuring platforms put in place systems and processes, while steering away from regulating the type of content that should be outlawed.

So far, the EU’s legislative framework has not led to a full harmonization of approaches to protect minors, and some member states have adopted more restrictive approaches. For example, France, Germany, Ireland, and Italy have adopted supplementary legislation to protect minors from harmful content such as online pornography.10

In the United States, the federal government has adopted legislation such as the COPPA to tackle some problematic areas such as the need to protect minors’ personal data.11 Despite heightened partisanship in Congress, leaders of both the Republican and Democratic Parties have expressed interest in supporting additional bipartisan legislation to protect children online.12 Although there is less appetite for federal legislation with binding obligations on platforms in terms of platform liability, there is appetite at the state level to embrace the legislative path, and safety by design is the cornerstone of many of these initiatives.13 That being said, the Kids Online Safety Act (a federal initiative) received the support of sixty co-sponsors at the federal level, which shows that this is an area with some bipartisan support. The EU and the United States are also converging on some important aspects: more obligations are placed on larger platforms; there is an emphasis on protection and safety by design; and there is no “one size fits all” solution.

There is broad consensus among experts that, irrespective of geopolitical tensions, there has never been so much space for alignment at the policy level between different jurisdictions—and between Europe and the United States in particular. This is partly because Europe (with the DSA at the EU level and the OSA in the UK) takes a systemic risk approach and does not focus on moderating individual pieces of content. That places responsibility on the platforms to have processes and systems in place to design safe spaces at the outset.

There are also similarities in public and private enforcement of norms. In the EU and the UK, regulators play an important role in making sure that industry complies with the DSA, the AVMSD, and the OSA. In the United States, even if new federal laws are adopted, the creation of a dedicated federal regulator to publicly enforce the legislation is unlikely, though existing agencies such as the US Federal Trade Commission already have a remit over some of these issues. At the state level, attorneys general are empowered to enforce COPPA via civil actions despite it being a federal law. State attorneys general have many enforcement tools at their disposal, including the power to undertake industry-wide investigations. These are broadly in line with the enforcement powers of national competent authorities and the European Commission under the DSA (and Ofcom under the OSA). On both sides of the Atlantic, private enforcement through courts is also set to play an important role, though, to date, it has been more common in the United States than in either the EU or UK.

Harms against which children should be protected

In the EU, the harms against which children should be protected are potentially very wide and are not specifically defined in the DSA, which refers only to protecting minors’ “privacy, safety and security.”14 Furthermore, member states are free to set their own rules provided they are in the line with EU legislation.

Some harms are outlawed at the EU level, such as the sharing of child sexual abuse material, dark patterns (i.e., deceptive techniques used by online platforms to manipulate users’ behavior), the processing of minors’ personal data without the consent of parents, and the sending of targeted advertising to children based on profiling.15 US policy initiatives at the state and federal levels also identify these harms as targets for regulation. The dissemination of child sexual abuse material, for example, is already a criminal offense.

A strong focus of legislation to protect minors on both sides of the Atlantic is to make sure that children cannot be contacted on platforms by unknown adults. At the state level (Vermont in particular) lawmakers frame these as safety bills to avoid framing them as content regulation, which could bring challenges on First Amendment grounds. These design architecture elements, such as default settings that prevent children being findable, are also central in the European Commission’s guidelines on Article 28 of the DSA in the UK Information Commissioner’s Office’s age-appropriate design code and in Ofcom guidance under the OSA.16

Data minimization (meaning only a minimum amount of data can be gathered and processed) is seen as critical to mitigating harms in general, because there is a strong correlation between collecting vast amounts of data about children’s behavior online and using the data to target minors with harmful content. Also, data minimization could lead to stronger protection for all users. While enforcing data minimization principles is a challenge, it can be done. In the UK, for example, Ofcom is required to work closely with the data protection authority. Operational coherence and cooperation between regulators are crucial in this area.

Balancing fundamental rights

The debate about balancing the need to protect children against the protection of certain fundamental rights (especially privacy, freedom of expression, and the rights of the child) is critical in the United States and in Europe. Initiatives in Europe and the United States tend to focus on tools and processes to protect minors, but steer away from regulating content on the platforms. Despite this, there is mounting debate regarding whether laws are creating a form of censorship or unlawfully constraining free speech, limiting users’ choices, or infringing on the rights of children. The question is wider than the need to protect children online, in the sense that some content can be inherently dangerous for some individuals whereas that same content might not be harmful for another person (minor or adult). This need to protect users from harmful (but legal) content is the most difficult to reconcile with the need to protect freedom of speech and the need for data minimization.

In the United States, the question is being argued in court. Some federal courts have ruled that laws requiring age verification are unconstitutional because they undermine the US Constitution’s First Amendment and threaten privacy rights.17 Age verification laws are being challenged by NetChoice (a coalition of tech companies) and by free speech coalitions. The Supreme Court recently ruled that the age verification law in Texas does not violate the First Amendment because it only requires proof of age to access content that is obscene to minors; it does not directly regulate adults’ speech.18 In both the EU and the United States, a considerable amount of policy work and research is being conducted on how to balance safety and privacy, especially in the context of age assurance requirements.19

At the EU level, the debate about balancing rights was not prominent while the DSA and the AVMSD were being adopted, probably because the rules were principles based and did not mention bans or age verification per se. Furthermore, the DSA contains safeguards to protect fundamental rights, such as giving users’ the right to challenge content moderation decisions (such as removals of posts, demotions of content, and account suspensions). The central article on the protection of minors in the DSA (Article 28) assumes that there cannot be safety for minors unless other rights, such as privacy, are protected as well.

Now that the DSA is being enforced, the protection of minors has become an enforcement priority for the European Commission, and some member states are calling for bans on children accessing social media platforms, some political parties are questioning the legislation and the push for age verification solutions on free speech grounds. This debate is particularly intense in the context of the regulation on the fight against CSAM, which the European Parliament and the Council of the EU are amending in an attempt to reduce the impacts of CSAM detection mechanisms on privacy, particularly in the context of end-to-end encryption.

The ultimate goal should be to protect everyone online, not just minors. This would avoid the need to put in place age assurance and age verification.

The debates on getting the balance right on the need to protect minors online and the need to protect some fundamental rights are crystallizing on age verification and on proposals for an outright ban on access to social media for children.

To date, there is no outright ban at the EU level on children accessing social media. Commission President Ursula von der Leyen had pledged to examine the questionwith the help of a panel of experts originally scheduled to be set up before the end of 2025.20 Some member states are also discussing the option of a social media ban for children.21 There is a strong call in the commission’s recently adopted guidelines under the DSA for certain platforms (such as adult content platforms) to prevent children from accessing them. Also, the Danish presidency of the EU and ministers from twenty-five member states recently adopted the Jutland Declaration, which welcomed “assessments” of a digital majority age.22 This assessment could help to determine the age at which minors should be allowed access to social media and other digital services—“giving them more time to enjoy life without an invasive online presence.”23 This question is also high on the agenda in the United States, with some states requiring social media to ban minors from accessing them (or requiring parental consent for a minor to have an account).24

On age verification, there is no mandatory technology at the EU level, but the EU guidelines on the protection of minors adopted under the DSA set out principles that age verification technology used by online platforms should meet.25 In particular, the systems should be based on the “double anonymity” principle. According to this principle, the platform knows the age of users without identifying them, whereas an external site—which carries out the age verification by issuing a token—does not know which site the user will visit. The EU is also about to launch an EU mini-wallet as a temporary solution, pending the adoption of national solutions.26 Some member states have also set requirements on age verification that are enforced by national regulators.

In the UK, the OSA has just entered into force, and the biggest and most popular adult platforms such as Pornhub must now deploy age checks for users based in the UK. Other platforms—including Bluesky, Discord, Reddit, and X—have also announced that they will deploy age assurance in the UK as a result of the act. This has led to a surge in virtual private network (VPN) downloads, which shows the importance of global alignment where possible.

In the United States, as noted above, state legislation imposing age verification is subject to frequent court challenges.27 As in Europe, there is little agreement among the states on the methods and tools to use when verifying the age of online users. Also, like in Europe, states seem to recognize that age assurance alone is not the solution.

On both sides of the Atlantic, the debates are similar in practice, including debates regarding how to attribute responsibility for age assurance across the supply chain (i.e., at what level age verification should take place, whether at the app store layer or by individual applications or websites). Questions about where verification happens raise additional questions about the extent to which other players in the chain can rely on this, or whether relying on a single point of verification could undermine safety by discouraging applications and websites from making their own assessments.

About the author

Michèle Ledger is a researcher at the Research Centre in Information, Law and Society (CRIDS) of the University of Namur where she also lectures on the regulatory aspects of online platforms at the postmaster degree course. She has been working for more than twenty years at Cullen International and leads the company’s Media regulatory intelligence service.

This issue brief benefits from the insights of discussants at an online roundtable on EU-US regulatory co-operation hosted jointly by CERRE and the Atlantic Council. However, the contents of this brief are attributable only to the author.

About CERRE

Providing high-quality studies and dissemination activities, the Centre on Regulation in Europe (CERRE) is a not-for-profit think tank. It promotes robust and consistent regulation in Europe’s network, digital industry, and service sectors. CERRE’s members are regulatory authorities and companies operating in these sectors, as well as universities.

CERRE’s added value is based on

  • its original, multidisciplinary, and cross-sector approach covering a variety of markets (e.g., energy, mobility, sustainability, technology, media, and telecommunications);
  • the widely acknowledged academic credentials and policy experience of its research team and associated staff members;
  • its scientific independence and impartiality; and
  • the direct relevance and timeliness of its contributions to the policy and regulatory development process impacting network industry players and the markets for their goods and services.

CERRE’s activities include contributions to the development of norms, standards, and policy recommendations related to the regulation of service providers, to the specification of market rules, and to improvements in the management of infrastructure in a changing political, economic, technological, and social environment. CERRE’s work also aims to clarify the respective roles of market operators, governments, and regulatory authorities, as well as contribute to the enhancement of those organizations’ expertise in addressing regulatory issues of relevance to their activities.

About the Atlantic Council

The Atlantic Council promotes constructive leadership and engagement in international affairs based on the Atlantic community’s central role in meeting global challenges. The council provides an essential forum for navigating the dramatic economic and political changes defining the twenty-first century by informing and galvanizing its uniquely influential network of global leaders. The Atlantic Council—through the papers it publishes, the ideas it generates, the future leaders it develops, and the communities it builds—shapes policy choices and strategies to create a more free, secure, and prosperous world.

The Atlantic Council’s Europe Center conducts research and uses real-time analysis to inform the actions and strategies of key transatlantic decision-makers in the face of great-power competition and a geopolitical rewiring of Europe. The center convenes US and European leaders to promote dialogue and make the case for the US-EU partnership as a key asset for the United States and Europe alike. The center’s Transatlantic Digital Marketplace Initiative seeks to foster greater US-EU understanding and collaboration on digital policy matters and makes recommendations for building cooperation and ameliorating differences in this fast-growing area of the transatlantic economy.

Related content

Explore the program

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    “Regulation (EU) 2022/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market for Digital Services and Amending Directive 2000/31/EC,” European Union, October 19, 2022, https://eur-lex.europa.eu/eli/reg/2022/2065/oj; “Communication from the Commission—Guidelines on Measures to Ensure a High Level of Privacy, Safety and Security for Minors Online, Pursuant to Article 28(4) of Regulation (EU) 2022/2065,” European Union, 2025, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:C_202505519.
2    “Proposal for a Regulation of the European Parliament and of the Council Laying Down Rules to Prevent and Combat Child Sexual Abuse,” European Union, May 11, 2022, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:52022PC0209; “Digital Fairness Act,” European Commission, last visited December 22, 2025, https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/14622-Digital-Fairness-Act_en.
3    Miriam Buiten, Michèle Ledger, and Christoph Busch, “DSA Implementation Forum: Protection of Minors,” Centre on Regulation in Europe, March 25, 2025, https://cerre.eu/publications/dsa-implementation-forum-protection-of-minors/.
4    A new version of the KOSA has been introduced in Congress with changes in an attempt to clarify that KOSA does not censor, limit, or remove content from the internet. “Blumenthal, Blackburn, Thune & Schumer Introduce the Kids Online Safety Act,” Office of Senator Richard Blumenthal, press release, May 14, 2025, https://www.blumenthal.senate.gov/newsroom/press/release/blumenthal-blackburn-thune-and-schumer-introduce-the-kids-online-safety-act; “Children’s Online Privacy Protection Rule,” Federal Trade Commission, April 22, 2025, https://www.federalregister.gov/documents/2025/04/22/2025-05904/childrens-online-privacy-protection-rule; “S.1418—Children and Teens’ Online Privacy Protection Act,” US Congress, July 27, 2023, https://www.congress.gov/bill/118th-congress/senate-bill/1418/text.
5    “AB-2273: The California Age-Appropriate Design Code Act,” California Legislative Information, November 18, 2022, https://leginfo.legislature.ca.gov/faces/billCompareClient.xhtml?bill_id=202120220AB2273&showamends=false; “NetChoice v. Rob Bonta, Attorney General of the State of California, D.C. No. 5:22-cv-08861- BLF,” US Court of Appeals for the Ninth Circuit, August 16, 2024, https://cdn.ca9.uscourts.gov/datastore/opinions/2024/08/16/23-2969.pdf.
6    For a comparison between both initiatives see: Bailey Sanchez, “Vermont and Nebraska: Diverging Experiments in State Age-Appropriate Design Codes,” Future of Privacy Forum, June 4, 2025, https://fpf.org/blog/vermont-and-nebraska-diverging-experiments-in-state-age-appropriate-design-codes.
7    “Child Actor Regulation,” State of Utah, 2025, https://le.utah.gov/Session/2025/bills/enrolled/HB0322.pdf.
8    “Directive (EU) 2018/1808 of the European Parliament and of the Council of 14 November 2018 Amending Directive 2010/13/EU on the Coordination of Certain Provisions Laid Down by Law, Regulation or Administrative Action in Member States Concerning the Provision of Audiovisual Media Services (Audiovisual Media Services Directive) in View of Changing Market Realities,” Article 28b, https://eur-lex.europa.eu/eli/dir/2018/1808/oj/eng.
9    “Online Safety Regulatory Documents and Guidance,” Ofcom, last updated December 15, 2025, https://www.ofcom.org.uk/online-safety/online-safety-regulatory-documents.
10    Michèle Ledger, “Protection of Minors: Age Assurance,” Centre on Regulation in Europe, March 2025, https://cerre.eu/wp-content/uploads/2025/03/CERRE-DSA-Forum-Age-Assurance.pdf.
11    “Part 312—Children’s Online Privacy Protection Rule (COPPA Rule),” Code of Federal Regulations, last updated April 22, 2025, https://www.ecfr.gov/current/title-16/chapter-I/subchapter-C/part-312.
12    “Chairmen Guthrie and Bilirakis Announce Legislative Hearing on Protecting Children and Teens Online,” Office of Energy and Commerce Chairman Brett Guthrie, press release, November 25, 2025, https://energycommerce.house.gov/posts/chairmen-guthrie-and-bilirakis-announce-legislative-hearing-on-protections-for-children-and-teens-online.
13    “Public Interest Privacy Center Releases Updated State Law Maps,” Public Interest Privacy Center, press release, May 29, 2025, https://publicinterestprivacy.org/state-law-maps.
14    “Article 71 Commitments—the Digital Services Act,” European Union, last visited January 3, 2025, https://www.eu-digital-services-act.com/Digital_Services_Act_Article_71.html.
15    The European Commission defines dark patterns as unfair commercial practices deployed through the structure, design, or functionalities of digital interfaces or system architecture that can influence consumers to take decisions they would not have taken otherwise. “Questions and Answers on the Digital Fairness Fitness Check,” European Commission, October 2, 2024, https://ec.europa.eu/commission/presscorner/detail/fi/qanda_24_4909.
16    “Age Appropriate Design: A Code of Practice for Online Services,” Information Commissioner’s Office, last visited December 22, 2025, https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/childrens-information/childrens-code-guidance-and-resources/age-appropriate-design-a-code-of-practice-for-online-services/.
17    Ibid.
18    Texas Legislature, Relating to the publication or distribution of sexual material harmful to minors on an Internet website; providing a civil penalty, HB 1181, Passed June 12, 2023, https://capitol.texas.gov/billlookup/History.aspx?LegSess=88R&Bill=HB1181; “Free Speech Coalition, Inc., et al. v. Paxton, Attorney General of Texas,” US Supreme Court, June 17, 2025, https://www.supremecourt.gov/opinions/24pdf/23-1122_3e04.pdf.
19    Stephen Balkam and Andrew Zack, “Balancing Safety and Privacy: A Proportionate Age Assurance Approach,” Family Online Safety Institute, October 10, 2025, https://fosi.org/policy/balancing-safety-and-privacy-a-proportionate-age-assurance-approach/.
20    “2025 State of the Union Address by President von der Leyen,” European Commission, September 9, 2025, https://ec.europa.eu/commission/presscorner/detail/ov/SPEECH_25_2053.
21    In particular, these states include Denmark, Greece, France, Spain, Italy, Ireland, and Poland.
22    “The Jutland Declaration: Shaping a Safe Online World for Minors,” Danish Presidency, Council of the European Union, October 10, 2025, https://www.digmin.dk/Media/638956829775203140/DIGMIN_The%20Jutland%20Declaration%20Shaping%20a%20Safe%20Online%20World%20for%20Minors%20101025.pdf.
23    Ibid., 2.
24    These states include Arkansas, Florida, Georgia, Ohio, and Utah.
25    These principles concern accuracy, reliability, robustness, privacy and data protection safeguards, and non-discrimination.
26    “Communication from the Commission.”
27    “Age Assurance & Age Verification Laws in the United States,” Centre for Information Policy Leadership, September 2024, https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_age_assurance_in_the_us_sept24.pdf.

The post Transatlantic cooperation on protecting minors online appeared first on Atlantic Council.

]]>
Engaging generative artificial intelligence in African development https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/engaging-generative-artificial-intelligence-in-african-development/ Thu, 18 Dec 2025 20:03:45 +0000 https://www.atlanticcouncil.org/?p=893977 From classrooms to farming communities, generative artificial intelligence holds great potential for Africa. The question is whether its promise of abundance will reach everyone—or only those already well-connected.

The post Engaging generative artificial intelligence in African development appeared first on Atlantic Council.

]]>

Executive summary

From classrooms to farming communities, generative artificial intelligence (gen AI) holds great potential for Africa. The key question is whether its promise of abundance will reach everyone—or only those already well-connected.

The technology should be regulated with both its strengths and weaknesses in mind, and approached with a healthy dose of skepticism toward corporate advocates; but ignoring the obvious value and use of gen AI makes little sense. Those concerned with development in Africa must engage with the technology and consider its potential for reducing poverty and strengthening education, alongside other priorities such as digitizing and preserving languages.

Gen AI poses real risks and requires guardrails, especially for young people. Yet disengagement carries risks of its own: if gen AI is not actively shaped and governed, the very youths and communities it could benefit—or harm without proper controls—risk being left behind. Not engaging with gen AI would be not only harmful but also patronizing. More conversation is needed between those inventing and implementing gen AI models and those who work in development assistance, including actors involved in shaping and advancing the UN Sustainable Development Goals (SDGs). Two of these SDGs—ending poverty and providing quality education—closely mirror gen AI’s promise, or boast, of future “abundance” and human or even superhuman intelligence. The SDG and gen AI camps must explore what each can realistically offer the other.

View the full issue brief

Related content

In partnership with

Explore the program

The Africa Center works to promote dynamic geopolitical partnerships with African states and to redirect US and European policy priorities toward strengthening security and bolstering economic growth and prosperity on the continent.

The post Engaging generative artificial intelligence in African development appeared first on Atlantic Council.

]]>
Improving transatlantic cooperation on digital competition https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/improving-transatlantic-cooperation-on-digital-competition/ Thu, 04 Dec 2025 14:00:00 +0000 https://www.atlanticcouncil.org/?p=888039 Greater dialogue between US and EU regulators would reveal similar priorities on digital competition, mergers, and antitrust issues, and could lead to greater alignment on key digital competition issues.

The post Improving transatlantic cooperation on digital competition appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Despite US officials’ stated opposition to the EU’s Digital Markets Act, the United States and the European Union have similar priorities on digital competition.
  • Dialogue between US and EU regulators could identify consistent approaches to mergers and antitrust issues, making it easier for companies to adopt similar business models on both sides of the Atlantic.
  • Public communications linking antitrust actions to consumer welfare, competitiveness, and economic growth can help competition enforcers withstand political pressure.

Executive summary

President Donald Trump’s policies are substantially reshaping prospects for transatlantic cooperation across a range of policy areas. In digital competition, the picture is complex. The Trump administration opposes Europe’s competition regulation, but both the European Commission and US federal and state competition enforcers have similar priorities when it comes to competition in digital markets.

US-European Union (EU) dialogue could help make interventions to promote digital competition more effective. It could boost consistency (helping firms adopt the same remedies across both sides of the Atlantic) and help regulators share knowledge and best practices. Beyond technical alignment, EU and US authorities can coordinate on narratives and messaging, ensuring that regulatory measures are perceived as fair and mitigating the risk of digital competition policy fueling foreign policy disputes.

At a recent roundtable hosted by the Centre on Regulation in Europe (CERRE) and the Atlantic Council, we identified the following recommendations for competition enforcers on digital antitrust.

  • The European Commission and national competition authorities should continue to cooperate with US federal agencies and strengthen their cooperation with US state attorneys general, given their important role in US digital antitrust cases.
  • To effectively learn from each other’s experience with remedies, and to enhance mutual learning and correct remedies when needed, competition agencies in both the EU and the United States should have a robust, evidence-based assessment about how their remedies have performed.
  • The European Commission needs to improve its communication strategy when pursuing antitrust cases. Antitrust enforcement must be closely linked to consumer welfare, competitiveness, and economic growth. Enhancing its legitimacy can help ensure European competition enforcers withstand any political pressure.
  • Europe needs to better highlight how open and competitive markets foster innovation. Tools to open competition are therefore important ways to support US and European global technological leadership.

In relation to merger policy, competition authorities on both sides of the Atlantic are evolving to better tackle the role of innovation in digital markets. Recommendations include the following.

  • EU and US authorities should develop consistent guidelines setting out how they will assess a merger’s impacts on innovation capabilities (such as chips and computing power, skills, data, and risky and patient capital) and incentives to innovate. Pro-innovation merger control should promote the new innovators and not protect the old ones.
  • The Directorate-General for Competition (DG-Comp) should aim to learn from the US merger guidelines and US authorities’ recent practices to inform the EU’s current exercise of revising its own guidelines.
  • As with antitrust remedies, competition authorities in both the EU and the United States must be honest and clear about how their merger remedies have performed, so that different authorities can become better by learning from each other’s successes and mistakes.

Introduction

Trump’s policies have challenged the transatlantic relationship and are reshaping prospects for transatlantic cooperation. On digital competition, the picture is particularly complex. The president and some of his appointees to the Federal Trade Commission (FTC) and the Department of Justice (DOJ) Antitrust Division oppose Europe’s competition regulation, the Digital Markets Act (DMA)—and the president recently threatened to investigate the EU’s nearly €3 billion fine imposed on Google as an unfair trade barrier under Section 301 of the Trade Act of 1974. Despite this, when it comes to ex post digital antitrust cases, US federal and state competition enforcers and the European Commission have similar priorities. More broadly, competition authorities on both sides of the Atlantic are grappling with how to adopt consistent, principled, and predictable approaches in digital markets. This can better take innovation, investment, and firms’ capabilities into consideration during competitive analysis, and a consistent approach is key for global corporations.

US-EU dialogue could help improve the efficiency and effectiveness of interventions to promote digital competition. It could do the following.

  • Facilitate mutually consistent approaches to common regulatory challenges, reducing burdens on regulators and making it easier for global firms to adopt the same business models across both sides of the Atlantic.
  • Even where consistency is not possible, help regulators by sharing knowledge and best practices, or even help authorities to divide and conquer in areas such as ex post antitrust cases in which authorities on both sides of the Atlantic are pursuing similar goals.
  • Mitigate the risks of foreign policy disputes as digital competition interventions increasingly have cross-border impacts, and as the Trump administration bristles at foreign governments enforcing competition law and pro-competitive regulation against US champions.

But how can this mutually beneficial cooperation be maintained? In 2021, the EU and United States established a Joint Technology Competition Policy Dialogue, supplementing established agreements between the European and US competition agencies, and there is still dialogue between antitrust enforcers. However, given the growing perception of a difference in values between the EU and the United States, and tensions on a range of topics from trade to defense, prospects for cooperation risk becoming narrower in the future.

Cooperation on digital antitrust

European and US authorities have a significant degree of alignment on ex post antitrust enforcement in the digital sector. In digital markets, large firms have often argued that highly innovative digital markets had natural “winner take all” characteristics, but there is nevertheless competition for the market. These firms argue they are subjected to significant competitive pressure from those who might displace them with disruptive innovation and, therefore, have strong incentives to keep innovating. This implies a marginal role for competition agencies. In practice, however, many digital markets have seen little displacement of incumbents in recent years. Effective antitrust remedies not only enforce competition law but also create space for innovation, enabling new entrants and disruptive technologies to challenge incumbents and thrive. While, until recently, innovation in some markets appeared to have slowed, there is an open question about how much artificial intelligence (AI) could disrupt the architecture of digital ecosystems—and whether that implies antitrust authorities should step back or play a role in keeping this possibility open.

In the meantime, competition authorities in the EU and United States have become more assertive. On the US side, the FTC and DOJ are pursuing cases against tech firms brought under previous administrations, despite the Republican Party’s traditional light-touch approach to antitrust. The FTC and DOJ’s approach is fueled by a view that conservative antitrust must not allow “private tyranny,” just as it is opposed to government tyranny.1 In particular, FTC Chairman Andrew Ferguson has applauded that “this administration . . . is rediscovering the wisdom of taking competition enforcement seriously.”2

In Europe, although there have been few new antitrust cases under the new European Commission, a number of ongoing cases are being pursued against the same firms, on similar timeframes and in relation to similar conduct. These cases have been supplemented by enforcement action under the DMA. Some of these cases might have different underlying motivations—with US authorities more concerned with the potential role of large technology firms in stifling plurality of voices online, and the EU more concerned with ensuring market contestability. But they nevertheless illustrate authorities’ common challenges, particularly how to design remedies for highly complex and fast-moving digital markets.

EU and US competition policies increasingly interact. For example, in a case brought by the US DOJ and some states against Google regarding its conduct in the search market, the DOJ sought an extensive list of potential remedies, including data-sharing rules that looked similar to obligations in the EU’s DMA. In September 2025, the district court decided to apply a narrower data-sharing remedy. A similar question about alignment of remedies will arise in the EU and US cases concerning Google’s digital advertising technologies.

However, challenges remain in coordinating antitrust actions on both sides of the Atlantic.

A first challenge is ensuring that the tenets of antitrust analysis remain synchronized. Protecting disruptive innovation in digital markets, for example, might require identifying robust theories of harm closer to market realities and moving away from reliance on static market definitions. However, the US legal system—in which the FTC and DOJ must convince a judge of their case—makes EU-US alignment difficult. Even if EU and US competition authorities agree on a common approach to a particular case, judges might take a different approach. In particular, competition cases in the United States go before generalist US judges, some of whom might be relatively conservative about government intervention. For example, European competition agencies are exploring how large firms can stymie disruptors by preventing their access to inputs to innovate or impacting their access to customers. They have used these concerns to rework the essential facilities doctrine and the tests for when discrimination is anticompetitive (with EU courts often sympathetic to their approaches, as in the Google Shopping and Android Auto cases).3 However, there is limited evidence that US courts are as willing to see principles evolve.

A second challenge is remedy design. Ex post antitrust remedies can have global impacts—for example, by raising costs of operating different business models in different countries, or by requiring structural changes to large firms or technical changes that cannot be implemented at a regional level. Conversely, for firms that can benefit from remedies, a consistent approach to remedy design in the EU and United States could lower costs and allow innovative firms to scale faster. Securing consistent approaches to remedies between the EU, the United States, and third countries such as the United Kingdom could therefore have widespread benefits. There is acceptance that past remedies in tech antitrust cases have sometimes not been very effective, and that innovation seems to have played more of a role than antitrust remedies in promoting competition in digital markets. Both sides seem to be learning from these past experiences, but they have adopted different lessons. The EU has sought to front-end tougher remedies in the DMA while, in the US Google Search case, the judge adopted a narrower set of remedies and instead put more faith in possibilities for AI to disrupt online search markets. Both European and US authorities can benefit from robust and transparent evaluations of past remedies, learning from successes and failures to design more effective interventions in the future.

Thirdly, the EU and United States also take different approaches to the merits of ex ante digital competition regulation. Europe’s DMA has few influential friends among the current US administration. Trump has implied he sees the law as an attack on “the growth or intended operation of United States companies,” and FTC Chair Andrew Ferguson has described the DMA as a “tax on American companies” and one which is “overly rigid,” despite most of the beneficiaries of the DMA being US firms.4 The EU’s objectives with the DMA were to foster a competitive and fair digital market, creating opportunities for challenger firms from both Europe and the United States, and supporting the West’s global technological leadership. From a European perspective, there is no appetite to rescind or water down the DMA; Commissioner Teresa Ribera has signaled the European Commission would take a “brave” approach to enforcement and has fined Apple and Meta for noncompliance.5 However, there is a widespread perception that the commission is tailoring its enforcement approach to reflect the current environment. For example, the Apple and Meta fines came only after the commission missed its own self-imposed deadlines, seemingly to avoid torpedoing EU-US trade talks.6

There is also a question of how European and US regulatory authorities can best cooperate and coordinate in practice, given the different timeframes and processes of their respective cases and concerns in the United States about Europe taking the lead on antitrust matters. Ferguson, for example, has argued, “If we think that Americans are suffering from anticompetitive conduct at home, we should address it here at home . . . I don’t want the Europeans doing it for us.”7 The EU and United States have a positive comity agreement, which allows one party affected by anticompetitive behavior originating in the other party to request that said party address the conduct. But this agreement has never been used in practice. Under the Trump presidency, the European Commission has shown a desire to allow the United States to take the lead. For example, in the Google AdTech case, the European Commission has found that Google breached competition law. However, the US federal court also considered remedies in its case regarding the same conduct. The commission has therefore delayed a final decision on remedies, stating that it wanted to “ensure that Google puts in place an effective remedy on both sides of the Atlantic . . . It is in everyone’s interest to achieve a joint outcome, including for Google itself, and for citizens worldwide.”8 While in principle such an approach might lead to harmonization, and would provide the EU with political cover, it poses the risk of delaying the imposition of remedies or encouraging the EU to accept remedies that might prove ineffective in the European context.

The broader political backdrop remains challenging. Trump has challenged the independence of numerous public authorities, including the FTC—and there is a risk of the president seeking to change the direction of US digital antitrust policy in the future. On the European side, while the EU secured a trade deal with the United States without needing to change its digital antitrust or digital regulation, the European Commission’s enforcement of the DMA and competition law—both procedurally and substantively—already appears to have been influenced by fears of triggering retaliation by the United States. It is difficult to see how the EU can adopt a rigorous and independent approach while remaining dependent on the United States for its security.

These challenges suggest several lessons for competition enforcers.

  • The European Commission and national competition authorities should continue cooperating with the US federal agencies and strengthen their cooperation with US state attorneys general, given their important role in US digital antitrust cases.
  • To effectively learn from each other’s experience with remedies, and to enhance mutual learning and correct remedies when needed, competition agencies in both the EU and the United States should have a robust evidence-based assessment of how their remedies have performed.
  • The European Commission needs to improve its communication strategy when pursuing antitrust cases. Antitrust enforcement must be closely linked to consumer welfare, competitiveness, and economic growth. Enhancing its legitimacy can help ensure European competition enforcers withstand any political pressure.
  • Europe needs to better highlight how open and competitive markets foster innovation instead of protection of national champions. Tools to open competition are therefore important ways to support US and European global technological leadership.

Merger policy and innovation

The discussion on antitrust enforcement naturally leads to questions about how merger policy can also protect innovation and competition in digital markets. Both EU and US approaches to competition policy are evolving to better tackle the role of innovation in digital markets. In particular, there is growing unease that competition authorities need to improve how they approach the impacts of a merger on innovation.

Reflecting these concerns, the United States updated its merger guidelines in 2023 after a two-year process. Merger guidelines are traditionally intended to describe the FTC and DOJ practices to the public, businesses, and courts—such as setting out important questions to which the agencies seek answers during the review process, including what type of evidence they are looking for and how that evidence is typically analyzed. However, the updated guidelines have been perceived by some as a more political document and a statement of the agencies’ intent to toughen merger policy, with more mergers likely to be presumed anticompetitive and the introduction of novel theories of harm. These guidelines remain in place for now, despite changes of leadership at the DOJ and FTC.9

The European Commission is still in the process of updating its merger guidelines, a process that it aims to finalize in 2027. Recently, both Mario Draghi and Commission President Ursula von den Leyen have pushed for the process to speed up. Much of the debate has centered on the importance of scale. Draghi’s report on European competitiveness—often interpreted as reigniting discussion about the merits of allowing EU firms to merge to create more innovative “European champions”—also proposed an innovation defense to allow mergers that would otherwise be prohibited. While some consider the report to be misunderstood, Draghi’s subsequent speeches have contributed to the perception that he is arguing for a loosening of merger policy. However, the extent to which new guidelines will (or can) represent a significant evolution in approach is unclear.

  • First, in Europe, different stakeholders have vastly different objectives when they argue that innovation (and other factors such as resilience) should play a bigger role in merger review. For enforcers, taking innovation into account might imply being able to intervene in more mergers; it is difficult to argue that EU merger policy has been too lax given that only a tiny proportion of mergers have ever been prohibited. For other stakeholders, the objective of giving innovation a stronger role in merger policy is to allow more deals. It is unclear how the guidelines can promote European champions while preventing foreign competitors from engaging in similar large-scale mergers.
  • Second, the recommendations in Draghi’s report are modest. His report has been understood to propose relaxing EU competition law constraints on mergers of major industrial companies. In fact, he acknowledges that a dominant firm would still be precluded from making use of the innovation defense, which would make it inapplicable in almost all cases in which a merger is blocked today. It would also be accompanied by strict safeguards and investment commitments by the merging parties. If Draghi’s proposal is adopted, there might not be much difference from today’s efficiency defense, which has never changed the outcome of a merger review process in Europe (though that might be, in part, because so few mergers are challenged in the first place or because the efficiency defenses have not been clearly articulated or sufficiently convincing). Therefore, there is a significant gap between some of the political rhetoric surrounding the review and the technical reality.
  • Third, the EU’s existing merger guidelines have already been superseded by changes in the commission’s practices, so the urgency of a new set of guidelines can be overstated. In reality, the guidelines should not be a statement of intent but, rather, a description of current practices and approaches. This means they might not fundamentally change case-specific analysis.
  • Fourth, it is difficult to see how changes in merger review alone will significantly alter the EU’s innovation trajectory. In the absence of further development of the single market, and greater availability of venture capital, highly innovative European firms will remain more likely to move to the United States or be acquired by foreign companies rather than remain European.

This might mean that—despite the call for a fundamental change in approach in Europe—the EU and the United States will stay relatively aligned.

One area in which divergence remains a risk is adopting predictable approaches to assessing the impact of a merger on capabilities and incentives to innovate, particularly in relation to disruptive innovation. Competition authorities have pursued theories of harm based on how a merger might impact innovation, even in the absence of immediate impacts on price or quality in particular markets. For example, innovation and innovative capabilities (or access to assets considered essential for innovations) featured heavily in cases such as Dow-DuPont, Amazon-iRobot, Facebook-Giphy (in the UK), and Google-FitBit. However, these cases have often (but not exclusively) focused on sustaining innovation rather than disruptive innovation. Where competition authorities have taken disruptive innovation into account (such as the UK authority in Facebook-Giphy) or examined markets for research and development (as the US and EU authorities did in the Illumina/Grail merger) they were highly criticized for making the results of merger reviews unpredictable.

Authorities will need to make decisions when the evolution of markets is not fully certain. An insistence on only acting when the anticompetitive outcome is undeniable will, on the whole, lead to less competition. On one hand, this suggests authorities should be humble. Sources of disruptive innovation are hard to identify beforehand, which suggests some firms might have more vulnerable positions than static markers of market power might imply. On the other hand, if authorities take the need to protect possibilities for disruptive innovation seriously, this might help illuminate previously under-identified types of anticompetitive effects, such as mergers that stymie potentially disruptive firms even if they appear to be in an unconnected market. This might require defining markets for innovation or focusing more on firms’ capabilities, their management practices, and their strategies in merger review.10 While the outcomes might not always be predictable, EU and US authorities could work together to try to ensure more transatlantic consistency when identifying the impact of a merger on innovation and incentives to innovate. This could increase certainty about the process and framework that competition authorities will adopt.

A second area of potential conflict is whether competition authorities should seek to promote certain types of innovation over others. In line with the Trump administration’s broader deregulatory approach, US competition authorities appear to be taking an agnostic and free-market approach to this question. In contrast, European authorities have emphasized how merger control can contribute to innovation in the area of sustainability and protect incentives for green innovation.11 This includes reflecting customer and government preferences for sustainable products when defining markets. For example, when the European Commission prohibited the Hyundai-Daewoo merger in 2022, it took into account the parties’ incentives to invest in lower-emission liquefied natural gas (LNG) vessels.

A third area of divergence risk relates to politicization of the merger process in both the EU and United States. More than ever, there is a perceived risk of US merger policy and practice being influenced by industry lobbying and top-down political influence. The lack of an institutionally independent competition regulator at the EU means this also remains a risk in Europe. Industry capture could happen at the level of guidelines—where there is a risk of helping today’s largest European companies rather than promoting the growth of disruptive and innovative firms—or on a case-by-case basis. There have been previous merger cases in which the formal technical analysis did not align well with the final decision reached. In this respect, updating the EU’s merger guidelines—by reducing the European Commission’s room for maneuver in response to political pressure—could provide significant cover for taking difficult decisions.

Lessons for merger review authorities include the following.

  • EU and US authorities should develop consistent guidelines setting out how they will assess the impacts of a merger on innovation capabilities (such as chips and computing power, skills, data, and risky and patient capital) and incentives to innovate. A pro-innovation merger control should promote the new innovators and not protect the old ones.
  • DG-Comp should aim to identify and adopt positive aspects of the revised US merger guidelines and US authorities’ recent practices to inform the EU’s current exercise of revising its own guidelines. For example, adopting the US approach by combining horizontal guidelines (which signal how a competition authority examines mergers between direct competitors) and vertical guidelines (which signal the approach to mergers between players at different points in the supply chain) would prove useful to ensure the European Commission thinks holistically about the impact of mergers on innovation, including in digital ecosystems in which horizontal and vertical concerns can be closely related. On the other hand, the EU guidelines still need to follow and reflect DG-COMP’s practices and should avoid becoming politically charged or signaling major changes to the EU approach.

As with antitrust remedies, competition authorities in both the EU and the United States must be honest and clear about how their merger remedies have performed, so different authorities can become better by learning from each other’s successes and mistakes. This will be especially important if there is increasing use of long-term investment commitments as a merger remedy (as in the UK with the Vodafone-O2 merger, and as recommended by Draghi). Such an approach can help ensure authorities across the Atlantic can work with each other. DG-COMP’s previous retrospective studies on remedies are an excellent starting point.

About the author

Zach Meyers is the director of research at the Centre on Regulation in Europe (CERRE). Previously the assistant director of the Centre on European Reform, Meyers has a recognized expertise in economic regulation and network industries such as telecoms, energy, payments, financial services and airports. In addition to advising in the private sector, with more than ten years’ experience as a competition and regulatory lawyer, he has consulted to governments, regulators, and multilateral institutions on competition reforms in regulated sectors.

This issue brief benefits from the insights of discussants at an online roundtable on EU-US regulatory co-operation hosted jointly by CERRE and the Atlantic Council. However, the contents of this brief are attributable only to the author.

About CERRE

Providing high-quality studies and dissemination activities, the Centre on Regulation in Europe (CERRE) is a not-for-profit think tank. It promotes robust and consistent regulation in Europe’s network, digital industry, and service sectors. CERRE’s members are regulatory authorities and companies operating in these sectors, as well as universities.

CERRE’s added value is based on

  • its original, multidisciplinary, and cross-sector approach covering a variety of markets (e.g., energy, mobility, sustainability, technology, media, and telecommunications);
  • the widely acknowledged academic credentials and policy experience of its research team and associated staff members;
  • its scientific independence and impartiality; and
  • the direct relevance and timeliness of its contributions to the policy and regulatory development process impacting network industry players and the markets for their goods and services.

CERRE’s activities include contributions to the development of norms, standards, and policy recommendations related to the regulation of service providers, to the specification of market rules, and to improvements in the management of infrastructure in a changing political, economic, technological, and social environment. CERRE’s work also aims to clarify the respective roles of market operators, governments, and regulatory authorities, as well as contribute to the enhancement of those organizations’ expertise in addressing regulatory issues of relevance to their activities.

About the Atlantic Council

The Atlantic Council promotes constructive leadership and engagement in international affairs based on the Atlantic community’s central role in meeting global challenges. The council provides an essential forum for navigating the dramatic economic and political changes defining the twenty-first century by informing and galvanizing its uniquely influential network of global leaders. The Atlantic Council—through the papers it publishes, the ideas it generates, the future leaders it develops, and the communities it builds—shapes policy choices and strategies to create a more free, secure, and prosperous world.

The Atlantic Council’s Europe Center conducts research and uses real-time analysis to inform the actions and strategies of key transatlantic decision-makers in the face of great-power competition and a geopolitical rewiring of Europe. The center convenes US and European leaders to promote dialogue and make the case for the US-EU partnership as a key asset for the United States and Europe alike. The center’s Transatlantic Digital Marketplace Initiative seeks to foster greater US-EU understanding and collaboration on digital policy matters and makes recommendations for building cooperation and ameliorating differences in this fast-growing area of the transatlantic economy.

Related content

Explore the program

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    “Assistant Attorney General Gail Slater Delivers First Antitrust Address at University of Notre Dame Law School,” US Department of Justice, April 28, 2025, https://www.justice.gov/opa/speech/assistant-attorney-general-gail-slater-delivers-first-antitrust-address-university-notre.
2    Andrew N Ferguson, “Competition in the 21st Century: Heeding the Rallying Cry for Deregulation,” US Federal Trade Commission, May 7, 2025, https://www.ftc.gov/system/files/ftc_gov/pdf/chairman-ferguson-2025-icn-remarks.pdf.
3    “Judgment of the Court (Grand Chamber ) of 25 February 2025: Alphabet Inc. and Others v Autorità Garante della Concorrenza e del Mercato,” European Union, February 25, 2025, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:62023CJ0233.
4    “Defending American Companies and Innovators From Overseas Extortion and Unfair Fines and Penalties,” White House, February 21, 2025, https://www.whitehouse.gov/presidential-actions/2025/02/defending-american-companies-and-innovators-from-overseas-extortion-and-unfair-fines-and-penalties/.
5    Francesca Micheletti, “Trump’s Antitrust Agency Chief Blasts EU Digital Rules as ‘Taxes on American Firms,’” Politico, April 2, 2025, https://www.politico.eu/article/trumps-antitrust-agency-chief-blasts-eu-digital-rules-as-taxes-on-american-firms/.
6    Francesca Micheletti and Jacob Parry, “Big Tech Fines Just Got Political, Whether the Commission Likes It or Not,” Politico, April 14, 2025, https://www.politico.eu/article/big-tech-fines-digital-markets-act-political-european-commission-meta-apple-donald-trump-tariffs/.
7    Micheletti, “Trump’s Antitrust Agency Chief Blasts EU Digital Rules as ‘Taxes on American Firms.’”
8    “Statement by Executive Vice-President Ribera on the Adoption of the Google Adtech Decision,” European Commission, September 4, 2025, https://ec.europa.eu/commission/presscorner/detail/en/statement_25_2034.
9    “Chairman Ferguson Memo re Merger Guidelines,” US Federal Trade Commission, February 18, 2025, https://www.ftc.gov/legal-library/browse/cases-proceedings/public-statements/chairman-ferguson-memo-re-merger-guidelines.
10    Giulio Federico, Fiona Scott Morton, and Carl Shapiro, “Antitrust and Innovation: Welcoming and Protecting Disruption,” Innovation Policy and the Economy (2019), https://www.journals.uchicago.edu/doi/full/10.1086/705642?af=R; David J. Teece, Dynamic Capabilities and Strategic Management: Organizing for Innovation and Growth (Oxford, UK: Oxford University Press, 2009).
11    Catherine Ellwanger, et al., “EU Green Mergers & Acquisitions Deals—How Merger Control Contributes to a Sustainable Future,” Competition Merger Brief, September 2023, https://competition-policy.ec.europa.eu/system/files/2023-09/kdal23002enn_mergers_brief_2023_2.pdf.

The post Improving transatlantic cooperation on digital competition appeared first on Atlantic Council.

]]>
Authoritarian reach and democratic response: A tactical framework to counter and prevent transnational repression https://www.atlanticcouncil.org/in-depth-research-reports/report/authoritarian-reach-and-democratic-response-a-tactical-framework-to-counter-and-prevent-transnational-repression/ Mon, 27 Oct 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=882895 When foreign governments conduct surveillance, intimidation, or enforcement actions—including through the exercise of extraterritorial police power by authoritarian regimes inside the nations they target—they undermine state sovereignty and threaten to erode public trust in institutions, representing a significant national security threat.  

The post Authoritarian reach and democratic response: A tactical framework to counter and prevent transnational repression appeared first on Atlantic Council.

]]>

Bottom lines up front

  • Foreign interference (FI) and transnational repression (TNR) represent a fundamental challenge to the international rules-based order by employing tactics that exist below the threshold of armed conflict while violating national sovereignty.
  • Beyond national borders, authoritarian states have targeted policymakers, elected officials, researchers, journalists, activists, and diaspora communities worldwide to advance their political objectives.
  • These TNR tactics encompass cross-domain operations, including surveillance, cyberattacks, disinformation, legal and judicial harassment, and physical and psychological assault.

Transnational represssion (TNR) represents a growing threat to democratic societies worldwide, as authoritarian regimes extend their repression beyond borders, utilizing covert and overt influence operations to advance their political objectives. Over the past decade, the term “transnational repression” has been used to describe the actions of states that seek to control populations living outside their borders. University of Notre Dame Professor Dana M. Moss coined the term to refer to “the repression of diasporas by home-country regimes,” which aims to “punish, deter, undermine, and silence activism in the diaspora,” thereby preventing these populations from completely exiting authoritarian control. 

State, state-affiliated, and non-state actors employ a range of coercive strategies to silence critics, alienate opposition, and control diaspora communities via intimidation. TNR manifests into a sophisticated blend of operations, including surveillance, cyberattacks, disinformation campaigns, legal and judicial harassment (sometimes called lawfare), and even physical and psychological assault. As these operations often exist in legal gray zones, they exploit vulnerabilities within liberal democracies, challenging the international rules-based order below the threshold of major pushback from the international community. Despite growing efforts and attention toward the issue, democracies have struggled to counter these extraterritorial repression tactics effectively.  

When foreign governments conduct surveillance, intimidation, or enforcement actions—including through the exercise of extraterritorial police power by authoritarian regimes inside the nations they target—they undermine state sovereignty and threaten to erode public trust in institutions, representing a significant national security threat.  

A strategic framework on transnational repression is urgently needed to confront this rapidly evolving global threat. While the body of research and policy responses has been slowly developing over recent years, these actions remain largely fragmented, reactive, and uncoordinated. What is lacking is a unifying, practical framework that consolidates these efforts and provides a comprehensive, proactive approach to understanding, disrupting, preventing, and countering transnational repression.  

As resources to support activists, journalists, and diaspora communities targeted by TNR come under increasing strain— exacerbated by the growing absence of sustained US leadership and funding in this domain—the need for a common strategic framework is more urgent than ever. In this context, a unified framework to guide Western democratic allies will foster greater coherence and coordination, while also supporting the accelerated development, implementation, and effectiveness of policies and countermeasures. By providing a shared foundation for identifying threats, protecting vulnerable communities, and confronting the foreign regimes that engage in TNR, such a framework would strengthen collective democratic resilience at a time when it is most critically needed. Ultimately, the goal is to establish a global, whole-of-society approach that fosters collective responses across like-minded democracies.  

Rather than reinventing an entirely new architecture, the objective of this framework is to extend and enhance the utility of existing frameworks by tailoring their components to the specific dynamics of global TNR. This includes integrating elements that account for current policy gaps, diaspora vulnerability mapping, coordinated policy responses, and civil society resilience.  

By understanding the objectives and TTPs of transnational repression, this project aims to propose actionable countermeasures to disrupt, deter, and prevent future TNR operations at various stages through a comprehensive framework. 

Read the full report

About the authors

Marcus Kolga is a journalist, human rights activist, and a Canadian analyst of foreign disinformation and influence operations. Kolga founded DisinfoWatch.org in 2020 to monitor and analyze foreign disinformation targeting Canada. He is a senior fellow at the Macdonald-Laurier Institute Center for Advancing Canada’s Interests Abroad, The CDA Institute, and the Raoul Wallenberg Center for Human Rights.
 
Sze-Fung Lee is an independent researcher specializing in Chinese hybrid warfare, including Foreign Information Manipulation and Interference (FIMI), Grand Strategy, Gray Zone Tactics, and Cognitive Warfare. Zir research also focuses on Indo-Pacific security policy, challenges posed by emerging technologies, and the politics of Hong Kong. 
 
Iria Puyosa is a senior research fellow at the Atlantic Council’s Democracy+Tech Initiative. She specializes in the complex interplay between technology and political dynamics. For over a decade, Puyosa has investigated information operations that undermine democratic institutions and fuel political instability. Her work uncovers the multifaceted threats of digital authoritarianism and contributes to a deeper understanding of the challenges facing democracies in the digital age.

Kenton Thibaut is a senior resident China fellow at the Atlantic Council’s Digital Forensic Research Lab (DFRLab), where she leads China programming for the Democracy + Tech Initiative, and a resident senior fellow at the Atlantic Council’s Indo-Pacific Security Initiative (IPSI) at the Scowcroft Center for Strategy and Security.

Lisandra Novo is the senior law & tech advisor for the Strategic Litigation Project at the Atlantic Council. The Strategic Litigation Project works on prevention and accountability efforts for atrocity crimes, human-rights violations, terrorism, and corruption offenses around the world. 

Related content

Explore the programs

The Atlantic Council Technology Programs comprises five existing efforts—the Digital Forensic Research Lab (DFRLab), the GeoTech Center, the Cyber Statecraft Initiative, the Democracy + Tech Initiative, and the Capacity Building Initiative. These operations work together to address the geopolitical implications of technology and provide policymakers and global stakeholders necessary research, insights, and convenings to address challenges around global technology and ensure its responsible advancement.

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

The Democracy + Tech Initiative creates policy practices that align global stakeholders toward tech and governance that reinforces, rather than undermines, open societies. It builds on the DFRLab’s established track record and leadership in the open-source field, empowering global communities to promote transparency and accountability online and around the world.

The post Authoritarian reach and democratic response: A tactical framework to counter and prevent transnational repression appeared first on Atlantic Council.

]]>
For aging populations to benefit from advances in healthcare technology, countries must promote digital health literacy https://www.atlanticcouncil.org/blogs/geotech-cues/for-aging-populations-to-benefit-from-advances-in-healthcare-technology-countries-must-promote-digital-health-literacy/ Tue, 21 Oct 2025 18:58:26 +0000 https://www.atlanticcouncil.org/?p=882301 As world leaders gather for the World Social Summit in Doha, empowering older adults with digital and AI literacy emerges as a critical priority for advancing social inclusion, health equity, and global digital transformation.

The post For aging populations to benefit from advances in healthcare technology, countries must promote digital health literacy appeared first on Atlantic Council.

]]>
In November, leaders will gather for the Second World Summit for Social Development (World Social Summit) in Doha, Qatar. This forum provides an opportunity for governments, development officials, and healthcare leaders across the world to determine how to deploy artificial intelligence (AI) and digital technologies to promote societal inclusion and personal health and wellbeing.

Unfortunately, when it comes to human talent, AI or digital adoption action plans—be they national or multilateral—tend to focus on reskilling for younger populations. The importance of digital reskilling for older populations to empower their productivity, health, and social welfare should be a strategic priority, as well. Attention to this population segment is increasingly paramount considering that people aged sixty-five and older compose the fastest-growing demographic group in the world, especially in low-and-middle-income countries.

It is encouraging that the World Social Summit’s Doha Political Declaration, which will be officially adopted at the Summit, acknowledges the importance of digital and social inclusion encompassing older populations. But policymakers should also incorporate adequate training and trust frameworks for reskilling aging populations into their infrastructure development goals. Countries are making considerable investments to ramp up their digital infrastructure. If these efforts are not paired with a reskilling capacity, leaders risk excluding a growing older adult population from full societal and economic participation. How effectively the summit addresses this issue will help determine countries’ preparedness for major forthcoming technological and demographic shifts.

Digital literacy for older populations: A super-determinant of social development

For older adult populations to benefit from new applications of AI and digital technologies in healthcare, digital and AI literacy is essential. Research indicates that AI healthcare tools could potentially improve the detection and diagnosis of chronic diseases and help medical professionals make swifter clinical decisions.

While global life expectancy has increased over the decades, individual healthspan (or the number of years lived disease-free) has lagged behind life expectancy, with a gap of 9.6 years. A major driver of this gap is the pervasiveness of noncommunicable diseases (NCDs), including Alzheimer’s, dementia, cancer, and heart disease, which are most prevalent in populations older than fifty. The capacity of an individual to use technologies to manage their own health, referred to as digital health literacy, is characterized as a super-determinant of health. Digital health literacy may play a role in extending both life expectancy and healthspan related to NCDs management, particularly among older populations.

The triple barrier: Challenges to digital health adoption

Policymakers must grapple with three interlocking barriers that make it difficult to engage older populations with digital tools: insufficient infrastructure, low trust, and inadequate design.

Globally, the digital divide remains stark. In developed economies, 90 percent of people have internet access, while only 27 percent of those living in developing economies do. This gap is exacerbated for aging populations ages sixty and over, who are disproportionately offline compared to their more connected younger counterparts. Digital health literacy is a prerequisite for a population to benefit from AI-driven healthcare. The absence of this literacy can cause severe complications, including delayed diagnoses, poor adherence to treatment plans, and patient absenteeism.

Another barrier to the adoption of digital health services is trust. Older adults often view digital healthcare with skepticism, fearing data breaches, unclear terms of use, or inadequate quality control. In the United States, 60 percent of patients that consider using a health app decide not to over privacy concerns. Overcoming this lack of trust requires transparent communication, the reinforcement of safety protocols, and endorsements from trusted authorities.

Even with digital connectivity and training, digital health tools will not be widely adopted if they are poorly designed. User experience research shows that technical jargon, cognitive overload, impersonal interfaces, and mismatched engagement methods reduce uptake. By contrast, personalization—such as tailoring messages to a patient’s context and communication preferences—has been shown to significantly increase adherence to preventive behaviors.

Lessons from national initiatives to increase digital health literacy

Here are four approaches policymakers and civil society actors at the World Social Summit can look to when implementing the commitments to digital inclusion outlined in the Doha Political Declaration:

  • Promote the rollout of national digital health literacy programs for older adults. Such programs can help older adult populations access the benefits of digital health tools. India’s Understanding of Lifelong Learning for All in Society, a government-sponsored literacy program for citizens aged fifteen and above who missed the opportunity to attend school, is one example of such an initiative. Through virtual modules and volunteer support, citizens are trained in general skills, including digital and health literacy. This program could serve as a useful model for the creation of more targeted literacy programs focused on providing older adults with digital health literacy skills they may not be able to learn elsewhere.
  • Encourage local governments to tie digital skills training to digital infrastructure investments. This approach can help make the most of technology deployment by combining it with community-based engagement projects. With a bottom-up approach, in Kebbi State, Nigeria, the Medicaid Cancer Foundation-Patience Access to Cancer Care, began increasing awareness about the importance of early detection and prevention of cancer with community leaders and a peer-to-peer outreach model. Once this network of trust was established, the program was able to effectively strengthen patient management through the digitalization of follow-up care and the establishment of a State Cancer Registry to systematically track cases.
  • Promote national programs that train community leaders to be digital skills educators. Trusted community leaders can help overcome negative perceptions of digital health tools. In the United Kingdom, the National Health Service’s BP@Home program trained community health workers to empower patients with home blood pressure management. BP@Home has reached over 220,000 participants since 2020. Using a step-by-step approach with phone calls, leaflets, and a dedicated app, this model ensures that patients, especially older adults, not only have the technology but also the skills and confidence to manage their blood pressure.
  • Incorporate user perspectives in the elaboration of AI skilling policies. Building trust in AI technologies demands multisector collaboration with older adults as the end users. A transdisciplinary trust framework can help bridge these perspectives, linking scientific insights on ethics and reliability with the experiences and concerns of older populations. By embedding trust-building into digital health strategies, such frameworks can ensure that AI tools are not only technically sound but socially legitimate, culturally sensitive, and aligned with the values of their users. This approach is especially vital in lower- and middle-income countries, where skepticism, lower digital literacy rates, and infrastructural gaps intersect most acutely.

***

Policymakers at the World Social Summit should commit to skilling aging populations—from infrastructure investment to user design, from trust-building to training—to achieve sustainable and resilient social protection systems. The action plans of today will shape the health equity landscape of tomorrow. If leaders fail to act, the digital and health divides will grow. If they act decisively, advances in AI and digital health technologies could become powerful equalizers in global health for decades to come.


Vijeth Iyengar is a nonresident senior fellow at the Atlantic Council’s GeoTech Center. The views reflected in the article are the author’s views and do not necessarily reflect the views of his employer.

Zainab Shinkafi-Bagudu is a senior advisor at the Federal Ministry of Health Nigeria and president-elect of the Union for International Cancer Control.

Héctor Pourtalé is a global public health consultant and former executive director of Movement Health Foundation.

Frank Krueger is a professor at the School of Systems Biology, George Mason University and honorary professor at the University of Mannheim.

Further reading

The GeoTech Center champions positive paths forward that societies can pursue to ensure new technologies and data empower people, prosperity, and peace.

The post For aging populations to benefit from advances in healthcare technology, countries must promote digital health literacy appeared first on Atlantic Council.

]]>
What drives the divide in transatlantic AI strategy? https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/what-drives-the-divide-in-transatlantic-ai-strategy/ Mon, 29 Sep 2025 04:00:00 +0000 https://www.atlanticcouncil.org/?p=876649 The US and EU share AI ambitions but diverge on regulation, risking a fractured Western front. Nowhere is this tension sharper than in financial services, where details matter most.

The post What drives the divide in transatlantic AI strategy? appeared first on Atlantic Council.

]]>
As both the United States and European Union unveiled their respective AI strategies this summer, a paradox emerges: despite sharing broadly similar objectives—boosting domestic AI capabilities, maintaining technological leadership, and managing AI risks—the two allies find themselves increasingly at odds over how to achieve these goals. The divergence reflects fundamental differences in regulatory philosophy, economic structure, and geopolitical positioning — all of which threaten to fragment what should be a unified Western approach to AI governance at a critical moment of competition with China.

The Donald Trump administration’s “Winning the Race: America’s AI Action Plan” outlines a vision of AI as a decisive frontier of global economic and security competition. The first pillar advocates for a deregulated, private-sector-led environment by reducing regulations, promoting open-source AI models, and fast-tracking AI deployment in industries such as healthcare, while tackling some questions about workforce transition. The second pillar addresses energy capacity by upgrading the electric grid, restoring domestic semiconductor manufacturing, building secure data centers, and establishing cybersecurity measures including incident response capabilities. The third pillar on international diplomacy and security, seeks to counter Beijing’s growing influence in international governance bodies and export the full stack of US AI to allies and partners. The plan also identifies financial services as both an opportunity and a vulnerability. AI is viewed as a driver of financial innovation and efficiency, but also as a channel for risks including misinformation, cyber fraud, and systemic instability.

The European Commission’s AI Continent Action Plan was unveiled in April 2025, and is part of a long series of reports and regulations undertaken by the EU to bolster its competitiveness in AI. It lays out a five-pronged plan to scale up computation models through new AI factories, innovation hubs, and pooled resources, improve access to and availability of high-quality data, accelerate application of AI through public services and industrial activities, enable the Draghi report’s ambition to “exceed the US in education” when it comes to training and retaining skilled talent, and further fortify the European single market for AI.

Both the approaches aim to buttress domestic adoption and application of AI—often through nudges from the state when it comes to exploring applications in public services, and encouragement for many kinds of commercial activities. China has come to a similar conclusion, with its continual emphasis on using local government action plans to diffuse AI into public service provisions, and all kinds of industrial activities through its “AI Plus” initiative. There are few references to China in the EU’s latest AI document, while Washington’s approach has both implicit and explicit connotations of a largely two-way race between itself and Beijing.

Approaches from the United States and the EU are both likely to face issues regarding capital and financing of these action plans. While US private-sector investments in AI are many-fold those in the EU and China, the scale and focus of spending make a big difference. In the United States, the Trump administration has put AI contracts front and center in its broader deregulation approach—recent quarters have seen dozens of venture capital rounds above $100 million, and large megadeals (one of about $40 billion in the first quarter of 2025 alone aside) are becoming more common. Major players like Microsoft have committed to $80 billion this year for AI-capable data centers, and overall US tech capital expenditure for AI and infrastructure is being projected in the hundreds of billions over the next few years.

Meanwhile, across the EU, fiscal rules constrain deficit and debt levels: member states are required to keep deficits below 3 percent of gross domestic product (GDP) (though some exceed this threshold) and debt below 60 percent. The EU’s budget amounts to about 1 percent of GDP, and key instruments such as the Recovery and Resilience Facility are set to expire in 2026—leaving a gap in large-scale funding. The EU is currently negotiating its next seven-year budget (2028–2034), which is expected to place strong emphasis on large-scale investments, including a proposed Competitiveness Fund. In China, while growth targets remain and fiscal policy is being kept “flexible,” debt burdens, weak investment returns in sectors such as property and manufacturing, and slowing external demand limit what Beijing can unilaterally spend without risking macroeconomic instability.

These differences mean that even when headline figures like “$500 billion investments” are floated, much of that tends to flow into private capital for infrastructure, cloud and chip production, startup rounds, and acquisitions. They are not distributed evenly or necessarily aimed at building strategic domestic capabilities. Europe and China risk being unable to match the pace of US capital expenditure, not only because of absolute capital constraints but because of institutional, regulatory, and macro-fiscal drags.

Challenges to US-EU alignment on AI

These structural spending imbalances are compounded by inconsistent US policy decisions that leave European partners scrambling to adapt. For example, Joe Biden administration’s AI diffusion rule in January 2025 left many countries in Europe with restrictions on importing advanced chips from the United States, and led to a call for maintaining a “secure transatlantic supply chain on AI technology and super computers, for the benefit of our companies and citizens on both sides of the Atlantic.” The Trump administration repealed this rule and, in its place, the EU committed to purchasing $40 billion of US-made chips as a part of its trade agreement with the United States.

This interaction lays bare the two tensions complicating the US-EU alignment on AI strategies. The first concerns the strategies’ time horizons and the enabling actions undertaken by each jurisdiction. The EU’s approach has been solidified with years of iterative public discussion amid the market transformation from AI—starting with the Draghi report, the AI Act and even Ursula von der Leyen’s European Commission presidency campaign. In contrast, the US AI strategy has seemed reactive and temperamental—shifting focuses between administrations on important issues such as risk and safety, open-source models, and export controls. Recent partnerships with the Gulf states and lifting of controls on NVIDIA’s H20 chips sale to China have also demonstrated a deal-making approach to AI, which is often at odds with the stated US strategy.

The EU has embraced binding rules such as the AI Act, in line with its broader tradition of digital regulation. By contrast, US administrations have favored light-touch, voluntary frameworks, and sectoral oversight rather than comprehensive law. This reflects a bipartisan reluctance to over-regulate the industry. This divergence in regulatory culture means that even when Washington and Brussels agree on broad goals, they often diverge on the instruments used to achieve them,

The second tension in the US and EU strategies concerns the EU’s own complicated motivations in the context of its present economic interdependence on the United States and China. This reliance is visible across the entire AI input stack. At the software level, European firms overwhelmingly depend on US-developed foundational models, cloud platforms, and AI tools provided by companies such as Microsoft, Google, and OpenAI, reflecting the absence of a globally competitive European alternative. In 2025, the United States produced about forty large foundation models, China around fifteen, and the EU only about three. At the infrastructure and cloud level, the “big three” US cloud hyperscalers are estimated to power about 70 percent of European digital services. At the hardware level, the EU remains structurally reliant on advanced semiconductors designed in the United States and fabricated in Asia, with Europe’s domestic semiconductor sector making up less than 10 percent of global production. Supply chains for critical minerals and legacy chips further reinforce exposure to Chinese producers, which control a significant share of upstream inputs and mid-tier manufacturing. Chinese companies dominate the refining of critical minerals such as rare earths and graphite, essential for chipmaking and AI datacenter equipment. They are also leading suppliers of mid-range GPUs, networking hardware, and AI server components, which European firms may increasingly source to diversify away from US vendors. Chinese technology companies, including Baidu and Alibaba, are also emerging players in foundation model training and deployment, reinforcing Europe’s reliance on external providers. These dependencies complicate the EU’s sovereignty ambitions and its ability to balance relations with the United States.

Recognizing these vulnerabilities, the EU launched initiatives to expand domestic capacity, raising about €20 billion to build “AI gigafactories.” These factories would be capable of hosting large-scale compute infrastructure, with the aim of catching up to the US and China. While these projects signal a commitment to reduce dependency, they remain long-term efforts. Even as Europe invests in its own infrastructure, there is still high exposure to non-EU supply chains for the critical inputs into AI. The European Central Bank noted that about half of Euro area manufacturers sourcing critical inputs from China report being exposed to supply chain risk.

These two tensions—uncertainty in US policy actions and the gap between the EU’s ambitions of sovereignty and its reliance on US and China for critical inputs—will continue to play out over the next few years.

The financial services sector and AI action plans

For financial services in particular, AI adoption is accelerating—banks now flag AI as core to transformation. JPMorgan reports hundreds of production use cases across fraud, marketing, and risk in its shareholder communications, while Bank of America’s “Erica” virtual assistant has logged more than 2 billion client interactions—evidence that AI is reshaping front-, middle-, and back-office processes from customer service to underwriting to treasury operations. This brings opportunities including cost and error reduction, real-time risk sensing, and new AI-enabled products like cash flow intelligence for corporate treasurers.

But financial services also represent one of the highest-risk sectors for AI adoption, given the direct societal impact of errors or bias in lending, risk modeling, or compliance monitoring. The AI Index 2025 shows that measurable gains remain modest, with most firms reporting less than 10-percent cost savings or revenue growth below 10 percent. AI adoption for financial services also lags in key areas. Many institutions remain in pilot phases, data quality and legacy infrastructure limit deployment, and regulatory uncertainty combined with talent shortages slows uptake in high-risk applications such as credit scoring and underwriting. Regulatory divergence sharpens these trade-offs: The United States leans on voluntary risk-management tooling (the National Institute of Standards and Technology – Artificial Intelligence Risk Management Framework) that gives firms latitude to innovate, whereas the EU’s binding AI Act and sectoral guidance from the European Securities and Markets Authority impose high-risk classifications and board-level accountability for AI in investment services—raising documentation, testing, and oversight burdens for cross-border finance.

Ultimately, the private sector and business in both jurisdictions need to adapt to these tensions and, in some cases, even begin to view them as productive in their journey of AI adoption and diffusion across various functions. What the AI action plans have done is provide a broad framework of AI strategy. But for financial services companies and the broader commercial sector, the devil is in the details and will require closing the transatlantic gap in the regulatory approach to AI. This seems more difficult than it would have a year ago.

About the authors

Ananya Kumar is the deputy director, Future of Money, at the GeoEconomics Center.

Alisha Chhangani is an assistant director at the GeoEconomics Center

Related content

Explore the program

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post What drives the divide in transatlantic AI strategy? appeared first on Atlantic Council.

]]>
Global perspectives on AI and digital trust ahead of the Swiss e-ID referendum https://www.atlanticcouncil.org/blogs/geotech-cues/global-perspectives-on-ai-and-digital-trust-ahead-of-the-swiss-e-id-referendum/ Wed, 24 Sep 2025 18:19:43 +0000 https://www.atlanticcouncil.org/?p=876552 Both artificial intelligence and digital identity systems are increasingly shaping the future of how governments approach inclusion, equity, security, and interoperability in the digital age.

The post Global perspectives on AI and digital trust ahead of the Swiss e-ID referendum appeared first on Atlantic Council.

]]>

On September 28, Switzerland will vote in a national referendum on the introduction of a state-recognized electronic proof of identification, or e-ID. This referendum could fundamentally transform how Swiss residents access government services and engage with private sector platforms in an increasingly digital world. The new draft solution comes after the rejection of the e-ID Act in a March 2021 referendum, largely due to the control the Act would have given to the private sector. Under the proposed legislation, the federal government will be responsible for both issuing e-ID cards and operating the necessary technical systems, an approach designed to maximize privacy and data security.

Switzerland’s evolving approach to digital identity reflects a broader, global conversation about the intersection of technology, governance, and trust.

Earlier this summer, Switzerland was already at the center of global digital policy conversations. From July 8-10, Geneva hosted the AI for Good Global Summit, the United Nations’ flagship platform for leveraging artificial intelligence (AI) to address global challenges, organized by the International Telecommunications Union. The summit convened a diverse group of policymakers, researchers, industry leaders, and civil society to promote the development of AI standards, foster innovation, and maintaining robust safeguards for equity and inclusion.

While thousands gathered in Geneva, the Atlantic Council’s GeoTech Center hosted a more focused convening in Lausanne called “Bridging AI & digital policy: Global perspectives for a trustworthy future.” Held on July 10 at the Swiss security-printing company SICPA’s unlimitrust campus, the event brought together experts from government, industry, and academia for a half-day of dynamic discussions on AI and digital trust.

Shaping AI and digital trust

As technologies such as AI and digital identity systems shape the future of governance, security, and social services, ensuring their trustworthy development and equitable deployment is critical, particularly as nations weigh major policy decisions such as Switzerland’s upcoming e-ID vote. While much technological innovation is led by the Global North, the global majority, the world’s largest and most diverse population, holds the key to unlocking inclusive, ethical, and impactful digital solutions. This half-day event explored regulatory frameworks, innovations, and challenges for these technologies across both developed and emerging economies.

Philippe Amon, chairman and chief executive officer of SICPA and member of the Atlantic Council’s International Advisory Board, opened the event by highlighting the importance of AI today, stating that “AI is like oxygen.” His words set the tone for an afternoon of engaging and impactful dialogue on how AI and digital policy are reshaping trust, innovation, and global cooperation.

The first panel, “Swiss partnerships on AI: Innovating for a trusted future” was moderated by Graham Brookie, vice president of technology and strategy programs at the Atlantic Council. The panel examined how Switzerland is advancing digital trust and secure AI development. The panelists emphasized the importance of regional and global partnerships to advance the trusted, secure development and deployment of AI. They explored practical steps and the need for robust regulatory standards, sharing examples of Swiss initiatives and international partnerships that are driving innovation while remaining secure and trustworthy. One example included panelist Leila Delarive’s software development company, hoopit.ai, which was co-founded by Swiss and American partners with a shared focus on making knowledge more trusted, more secure, and more human. Speakers agreed that innovation must be tied to real-world outcomes, with one panelist, Jean-Christophe Makuch, head of digital research and innovation at SICPA, noting, “The question is not what are you doing, it’s what problem are you solving?”

In my capacity as an assistant director at the Atlantic Council’s GeoTech Center, I moderated the second panel, “Global digital ID landscape.” This panel examined current trends, barriers to adoption, and opportunities for a more inclusive and interoperable digital ID ecosystem, drawing from the GeoTech Center’s July report, “Exploring the global digital ID landscape.” Panelists discussed issues including public trust and interoperability challenges to gaps in digital access across emerging economies. The conversation also highlighted Switzerland’s upcoming referendum on the national e-ID, underscoring how the vote could establish a model for trust, privacy, and usability in digital identity systems. A major theme of the dialogue centered around usability of digital ID systems. Anantha Ayer, CEO of SwissSign said, “Why do we need a digital identity? I think if we answer that question and people see that, the adoption rate will go up.”

The final panel, “AI in the Global South,” was moderated by acting senior director and senior fellow at the Atlantic Council’s GeoTech Center, Raul Brens Jr.. The panelists discussed regional advancements, challenges, and opportunities for AI-driven development in emerging economies. Panelists highlighted the use of AI as a tool to enhance efficiency and emphasized the need for government and public-private collaboration. The panelists underscored that implementing AI in emerging economies will require capacity-building, robust data governance, and inclusive digital access. Kira Intrator, a principal at Civic Strategy Group, underscored the need for increased investment in AI development across the Global South, asking: “With the potential of AI, how can funders and donors think really creatively and really commit to making a difference?”

Reflections ahead of Switzerland’s e-ID vote

As the September 28 referendum approaches, the insights shared in Lausanne are increasingly important to consider. The conversations emphasized how both artificial intelligence and digital identity systems are increasingly shaping the future of how governments approach inclusion, equity, security, and interoperability in the digital age. From lessons learned in the Global South to evolving frameworks across Europe, it’s clear that collaboration between governments, industry, and civil society will be crucial to advancing these technologies effectively. Public trust is also at the forefront of shaping inclusive policies, and it will be essential to enhance transparency across the development and implementation processes. The future of AI and digital identity systems will be defined not just by how these technologies are used, but how securely and inclusively they are deployed.


Coley Felt is an assistant director at the Atlantic Council’s GeoTech Center.

Further reading

The GeoTech Center champions positive paths forward that societies can pursue to ensure new technologies and data empower people, prosperity, and peace.

The post Global perspectives on AI and digital trust ahead of the Swiss e-ID referendum appeared first on Atlantic Council.

]]>
Trustworthy digital identities can set the standards for secure benefits provision in the US https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/trustworthy-digital-identities-can-set-the-standards-for-secure-benefits-provision-in-the-us/ Fri, 12 Sep 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=871371 The proliferation of online services necessitates verifiable digital IDs globally. While they can improve convenience and reduce fraud in benefits provision, they raise privacy concerns and surveillance risks. This paper examines US digital identity challenges, analyzes EU and Japan implementations, and provides policy recommendations for responsible digital ID development in the US.

The post Trustworthy digital identities can set the standards for secure benefits provision in the US appeared first on Atlantic Council.

]]>

Table of contents

Introduction

The proliferation of public and private services online has necessitated the creation of verifiable and usable digital IDs globally. These electronic, reusable, and portable representations of identity can not only improve convenience for those accessing services but also reduce cost, waste, and fraud, especially when applied in the provision of benefits by federal and state authorities. Importantly, if designed with intention, they can improve access and enhance the inclusion of those with limited or no access to traditional and analog identities. Digital IDs also can be imbued with technological capabilities that both reduce the burdens on government providers and citizens and the privacy harms, especially to personal data, and enhance the security of our data ecosystem.

Digital identity is often fraught with controversy however due to implications for the privacy of individuals, both in the United States and elsewhere. It can spur new risks of state surveillance and cyberattacks, and lead to the exclusion of social groups. These harms are indeed serious and require clear governance standards for the responsible deployment of digital identity, strong provisions to protect consumer rights, and mechanisms to redress violations.

To that end, our paper is divided into three sections. In part 1, we begin with the stakeholders responsible for identity use and credentialing in the United States, followed by an overview of the landscape of benefits provision and its pain points, leading to an overarching assessment of the United States and its use of digital ID in benefits provision currently. In part 2, we look at Japan and the European Union (EU), which are slightly ahead in both their deployment of digital identities and governance frameworks that aim to ultimately impact global standards for digital identity. Given the lessons for the rollout of digital identity in Japan, the EU, and our initial US assessment, in part 3, we provide four key policy recommendations for the responsible development of digital identities for benefits provision in the United States.

Part 1: Identity in the United States

Citizens in the United States usually have multiple identity documents, issued by both state and federal authorities for various purposes such as access to public services, tax identification, and travel. In 2005, Congress passed the REAL ID Act, requiring state-issued identity cards like driver’s licenses to adhere to a similar format and convey the same information.1 Under this act, the Department of Homeland Security (DHS) was given federal authority to implement and enforce REAL IDs. In recent years, the DHS Transportation Security Administration (TSA), in partnership with states, has also introduced mobile driver’s licenses, which are verifiable at limited airports throughout the country.2 Other forms of verifiable credentials, such as ID.me, can link multiple federal and state agencies, such as the Internal Revenue Service (IRS) and the Social Security Administration (SSA), with private companies (such as those that provide health insurance) through one form of identity. In parallel, Login.gov is an another secure single sign on service developed by the General Services Administration (GSA) that allow users to access multiple government services using a single account.

Further analysis of seventy-two unique programs and services delivered by thirty-five High Impact Service Providers (HISPs) show a multitude of additional login options that are being used. Most notably, thirty programs and services require an applicant to call or email the agency as the only option available to access benefits. These findings highlight how there are still outstanding challenges to adopting digital identity and the increased citizen burden associated with navigating a fragmented landscape of technology options.

US benefits provision and improper payments

Benefits to individuals are the largest federal expenditure for the US government. By category, they amounted to the following in 2024: Social Security ($1,454 billion), Medicare ($1,031 billion), Medicaid/Children’s Health Insurance Program/Other Medical Care ($810 billion), Veterans benefits ($319 billion); and other benefits ($634 billion) (for Temporary Assistance for Needy Families, or TANF; Supplementary Security Income, or SSI; housing assistance; child tax credit, etc.)3 The SSA administers Social Security and SSI as well as Medicare enrollment.4 The Centers for Medicare and Medicaid Services (under the Department of Health and Human Services) oversees Medicare and Medicaid reimbursements. HHS also distributes TANF block grants.5 The US Department of Agriculture (USDA) funds the Supplemental Nutrition Assistance Plan (SNAP) and free/reduced lunch; the Department of Housing and Urban Development (HUD) provides funding for housing assistance; and the Department of Labor is responsible for unemployment insurance (UI), workforce development programs, and employment-related benefits.

In 2022, one in three Americans were enrolled in at least one public assistance program. Social Security and Medicare each cover 20 percent of Americans, and Medicare is the largest benefits program by enrollment,6 followed by SNAP (11.7 percent), and free and reduced lunch (8.8 percent).7 Beneficiaries of Medicare, Social Security, and the Department of Veterans Affairs benefits program interface directly with the federal government in benefits disbursal and access, but other forms of public benefits are mostly administered at the state level. All agencies are required to utilize direct deposits to transmit federal funds. However, there is some limited use of checks across benefits disbursal. Payment Processing Centers calculate benefits and process payments, but actual disbursal is conducted by Treasury payment systems.8

In July 2024, the Office of the Inspector General of the Social Security Administration released a report citing $71.8 billion in improper payments between Fiscal Year 2015 and FY 2022. This figure is less than 1 percent of all the benefits payments made by the SSA.9 More broadly, a study by the Government Accountability Office (GAO) estimated losses of $162 billion in improper payments across sixty-eight programs in 2024.10 This has come down from pandemic-period highs of $281 billion.11 Of the $162 billion in 2024, $85 billion were improper payments in Medicare and Medicaid.12 While this reflects self-reported improper payments, the GAO also estimates that the government loses between $233 billion to $521 billion annually to fraud and improper payments.13 While recommendations from the GAO have primarily included enhancing existing reporting, data sharing, and analytics to prevent fraud and improper payments, we explore the status of digital identities in benefits provision in the United States below; later in the paper, we explore  lessons learned in other jurisdictions.

Box 1: How the US government verifies digital identities

The National Institute of Standards and Technology developed the Identity Assurance Level (IAL) framework as part of its Digital Identity Guidelines to establish standardized requirements for verifying digital identities across federal agencies. IAL2, the intermediate level in this three-tier system, requires either remote or in-person identity proofing using evidence such as a state-issued photo ID, Social Security number verification, and additional authentication factors like phone numbers.

At its core, IAL2 ensures that there is sufficient evidence to support the existence of a claimed identity and to confirm that the “applicant” is its true owner. To achieve this, identity providers collect three types of data from the applicant: first, personal information (such as name, date of birth, and address); second, identity evidence (such as a photo ID); and third, a biometric factor (such as a fingerprint or live photo). The provider then validates that this information is consistent, authenticates the identity evidence, and verifies that the applicant is correctly associated with the claimed identity.

This standard was developed in response to the growing need for consistent and secure identity verification as government services moved online—particularly in the wake of high-profile data breaches and fraud incidents that exposed the vulnerabilities of ad hoc verification systems. The previous version of this guidance, NIST Special Publication 800-63-3, was withdrawn on August 1, 2025. The new and current guidance, SP 800-63-4serves as a critical benchmark for digital identity credibility in the United States, serving as the minimum standard for accessing sensitive government benefits and services. However, as this paper highlights, significant implementation challenges persist. For instance, the IRS has declined to adopt Login.gov due to concerns about IAL2 noncompliance, and twelve of twenty-one federal agencies have expressed similar concerns about the platform’s ability to meet these standards.

Sources: NIST, Digital Identity Guidelines, Special Publication 800‑63‑3, NIST, March 2, 2020, Withdrawn August 1, 2025, https://csrc.nist.gov/pubs/sp/800/63/3/upd2/final; ID.me Marketing Team, “What Is NIST IAL2 Identity Verification?,” ID.me Network, February 19, 2021, https://network.id.me/article/what-is-nist-ial2-identity-verification/; “Identity Verification,” in A Playbook for Improving Unemployment Insurance Delivery, New America, accessed July 24, 2025, https://improveunemployment.com/identity_verification/; and Treasury Inspector General for Tax Administration (TIGTA), Key Events of the IRS’s Planning Efforts to Implement Login.gov for Identity Verification, Report No. 20232S070fr, TIGTA, October 27, 2023, https://www.tigta.gov/sites/default/files/reports/2023-10/20232S070fr.pdf.

Using digital IDs for benefits in the United States

Login.gov (under the General Services Administration’s purview) is a government provided ID-verification service that allows approval of credentials across websites from various partner federal agencies. As of September  2024 (i.e., the end of FY 2024), Login.gov reported seventy-two million active users and 3.3 million identity-verified accounts at the Identity Assurance Level (two of three), or IAL2-level.14 Login.gov is used by over fifty agencies, most notably the VA and SSA. Enabling verification methods on a Login.gov account requires state-issued ID, a Social Security number (SSN), and a phone number. ID.me is a market-provided ID-verification service that is also used across various federal agencies in a similar capacity. In April 2025, ID.me had 145 million users, including seventy million IAL2‑verified individuals.15NIST provides the IAL as a guiding framework of digital identities in the United States. Both Login.gov and ID.me are considered to meet criteria for IAL2. The SSA accepts both Login.gov and ID.me as credentials for creating mySocial Security account. Through mySocial Security account, individuals can apply for benefits and manage their payments. While funded federally, Medicaid, TANF, SNAP, and housing assistance (among others) are administered at the state level and thus verification processes can differ substantially. ID.me’s single sign-on (SSO) service is used by Arizona as means of accessing a beneficiary’s AHCCCS (Arizona’s Medicaid provider) account. Similarly, various states allow the use of the ID.me-provided SSO to access unemployment insurance. This was a result of a boom in applicants during the COVID-19 pandemic. Use of the SSO service outside of housing benefits is very limited at the state level. Several states, such as Illinois, Colorado, and California, have centralized benefits under a common web portal.

Login.gov was widely implemented as a response to a 2017 federal mandate requiring agencies to implement an SSO platform for accessing an agency’s websites.16 While it has been widely adopted by federal agencies, there have been complaints and concerns about the service. While the IRS allows taxpayers to use ID.me to access services, it has not implemented Login.gov for services, citing Login.gov failure in meeting the IAL2 standard.17 The IRS uses the service at the IAL1 level, but recent data breaches continue to raise questions about the service’s security and reliability.

In a GAO investigation, nine of twenty-one participating agencies cited issues with Login.gov’s lack of fraud controls and visibility into authentications.18 Another twelve reported concerns over IAL2 noncompliance. The current director of GSA’s Technology Transformation Services has previously thrown his support behind Login.gov and hopes to “accelerate Login’s roadmap.”19

The above sections on the benefits provision, related fraud, waste, and abuse and the rollout of digitization lead to the following overarching assessment of the US model:

  • The federal government is an important player in the identity issuance, credentialing, verification, and data-management system. However, it does so in partnership with private players, and both sectors face similar vulnerabilities and risks, especially related to personal data transfer, storage, and use.
  • The identity landscape in the United States is highly fragmented across individual holders, issuers, and those that accept verifiable credentials. Multiple standards, both technological and regulatory, exist across states, agencies, and private issuers and verifiers of identities.
  • A related lack of interoperability and the failure to recognize that individuals often interact with different layers of the identity ecosystem lead them to be the least able to bear and use their own identity.
  • The costs of transition from analog to digital forms of identity are large but surmountable. They often do not include the frictions and delays associated with adoption by identity users and providers.
  • Improper payments are the biggest challenge for benefits service providers in the United States. Therefore, ID improvements in the provision of benefits need to be designed with the purpose of reducing improper payments and substantively impacting waste, fraud, and abuse.
  • The refinement of technology, including blockchain and privacy-enhancing technology (PET), presents new opportunities to create IDs that can be used across various functions and be linked to multiple verifiers. On the other hand, use of technology can also heighten the risk environment for identity holders and issuers and should be an important consideration when developing digital IDs.

The next section of this paper puts these assessments in context with the developments in the EU and Japan on digital identity.

Box 2: PETs vary in degrees of complexity, privacy protection

New forms of payments need to balance privacy concerns with both anti-money laundering and combating the financing of terrorism (AML/CFT) protocols and transaction efficiency in order to become a successful technology. Due to this, discussions of what to do with the data collected from digital ID processes can benefit significantly from an evaluation of privacy-enhancing technologies (PETs). Zero-knowledge proofs (ZKPs) are a computationally lightweight method of confirming that a transaction is valid and compliant with regulations without revealing any specific information about the content of the transaction using a mathematical proof (e.g., it is true that the user paid the full amount, but the amount is unspecified). Differential privacy (DP) is a method of obscuring individual activities by inserting noise into a dataset that includes information about the individual that still produces valid macro-level information. Multiparty computation (MPC) allows providers to jointly process personal information without a single party having complete information about an individual. DP and MPC are logistically complex methods, while all three promise a different extent of privacy.

Sources: “Zero-Knowledge Proof,” National Institute of Standards and Technology Computer Security Resource Center, https://csrc.nist.gov/projects/pec/zkproof. National Institute of Standards and Technology, “Guidelines for Evaluating Differential Privacy Guarantees,” NIST Special Publication 800-226, March 2025, https://csrc.nist.gov/pubs/sp/800/226/final.
“Multi-Party Computation (MPC) and Threshold Schemes,” National Institute of Standards and Technology Computer Security Resource Center, https://csrc.nist.gov/Projects/pec/threshold.

Part 2: Existing digital IDs in Japan and the EU

Japan launched its digital identity platform, the My Number Card (MINC), in 2016. The MINC features an integrated circuit chip that stores personal information and simplifies interactions with government and financial institutions, supporting services like social insurance applications, tax filings, job assistance, and bank-account setup. Since its launch, around a hundred million cards have been issued. The Digital Agency, established in 2021, also oversees the implementation and regulation of digital transformation initiatives, including digital ID systems.20 The cards themselves are issued by the Japan Agency for Local Authority Information Systems (which is jointly organized at the municipal and prefecture level).21

The European Digital Identity (EUDI) Wallet is a digital ID solution designed to enable EU citizens, residents, and businesses to securely identify themselves and verify personal information both online and offline. It builds on the foundation of the eIDAS (Electronic Identification, Authentication, and Trust Services) regulation.22 Developed by the European Commission, its main functions are cross-border recognition and harmonization. The European Commission is investing in four large-scale pilot projects to test and develop the wallet’s functionality.23 These pilots involve approximately 360 entities, including private companies and public authorities from twenty-six member states and Norway, Iceland, and Ukraine.24

Digital ID governance and implementation framework

Digital ID creation in both the EU and Japan follows a layer-based framework that consists of a highly centralized governance and implementation effort led by the federal authorities within the respective jurisdictions. The first layer is ID issuance by a government agency. The second layer is ID creation, governance, and implementation and comprises trust and verification intermediaries, such as providers of the personal ID, qualified electronic attestation of attributes, electronic seals, and other authentic sources. The third layer is entirely implementation based, consisting of “relying” on ID-accepting institutions, which are the private and public institutions that enable ID use. The fourth layer is made up of software and hardware. The final layer is made up of participants: In both cases below, these are individuals or small and medium enterprises holding digital IDs.

Outside this layer-based framework are the European Commission or Japan’s Digital Agency, respectively, along with supervisory and regulatory authorities, and various schemes for the governance of the trust layer.

Standards creation and gaps

EU’s eID framework is part of a larger packet of regulatory standard-setting action on data sovereignty and privacy. Japan is similarly aligned with its G7 presidency action plan for the free flow of data with trust and wider push for digitalization of services. Regulatory actions have emphasized privacy protection, data management and flow decisions, and ID harmonization/mobility/interoperability. Generally, across both jurisdictions, there is an emphasis on governance and assessment frameworks over technical standards on verification, privacy, and cybersecurity.

Additionally, the EU and Japan have established an MoU with each other for collaboration in exploring use cases and mutual recognition.25

Identity theft-based benefits

Across the EU, identity-theft-specific benefits fraud statistics are limited, but individual member states have published figures that provide useful context. In Finland, the Social Insurance Institution (Kela) reported 1,104 suspected benefit fraud cases in 2024 totaling €7.15 million—about 0.43% of all benefits paid, down from 0.45% in 2023 and 0.79% in 2020.26 While these figures cover all detected benefit fraud rather than identity-theft cases alone, Kela attributes part of the reduction to stronger digital verification, such as the national Incomes Register, which enables real-time income checks. Estonia, often cited as Europe’s digital identity pioneer, maintains low fraud rates through integrated verification across multiple government services. Although EU-wide identity-theft-specific data is not available, evidence from countries further along in the digital identity pathway, like Finland and Estonia, suggests that robust, integrated systems can help drive overall fraud down. The upcoming European Digital Identity (EUDI) wallet, set for implementation by 2026, could further standardize and strengthen verification measures across member states.

In Japan, fraudulent public assistance cases—including all forms from undeclared income to misrepresentation—account for less than 0.5% of total payouts.27 No public data isolates identity-theft-driven cases, and Japan’s reporting on fraud statistics is generally limited. While the My Number digital identity system is fully deployed, there is no evidence to confirm a measurable decline in identity-theft-specific benefits fraud.28 Digital identity systems can contribute to benefits fraud reduction, but effectiveness depends heavily on implementation quality, system integration, and supportive legal frameworks.

Use and expansion

The EU is still in the pilot phase. Meanwhile, 75 percent of the Japanese population (93.08 million citizens as of September 2024), has a My Number ID card.29 This uptake is in line with the growth of other digital services provided by the Japan Agency and with growth in favorable attitudes toward digitalization in Japan. This agency conducts annual assessments and evaluations of the system, and communicates expansion plans along with new use cases (e.g., entertainment, most recently) and community management.

Policy goals

Both jurisdictions are attempting two tiers of policy goals. On the ID user and holder level, the policy goals are associated with reducing administrative burden and time, enabling efficiency and reducing cost. The second tier of goals has to do with national digitalization priorities, built on actions to realize economic benefits from better use and management of private data and public services. In addition to this, the EU has a goal of ID harmonization and portability across its member states, in line with its long-term policy goal of integration.  

Putting these learnings from the EU and Japan in context with the overarching assessments in Part 1 of the paper, the next section provides policy oriented recommendations for the development of digital IDs for benefits provision in the United States.

Part 3: Policy recommendations for the United States

Given the lessons from the rollout of digital identity in the EU and Japan (Part 2), and with the context of the current use of digital identities in benefits provision in the United States (Part 1), we conclude this paper with appropriate policy recommendations to responsibly prompt the next generation of digital IDs in the United States. These recommendations, calibrated with appropriate regulations to protect the personal data of US citizens and residents, can effectively resolve existing friction in the use of digital identities in the United States, and enable the creation of an innovative ecosystem of financial products, ultimately positively impacting the financial health of the public sector, corporations, and individuals.

Policy goal 1: Incentivize private sector in the identity governance and implementation framework by creating a technology sandbox

There is an important aspect of incentivization in digital identity that drives its uptake among users and holders and broader deployment across a range of functions. Jurisdictions like the EU, Japan, and emerging markets like India, have each given a central role in this to the public sector, making access to public services the main incentive to drive ID use. The US private-sector-driven innovation model and strong foundations of individual privacy offer an alternative governance model, which can now be provided through the maturation of privacy-enhancing technologies. A governance framework should build on strong foundations for privacy, data management, as well as reciprocity and portability in digital ID for holders. Importantly, we recommend the creation of a public-private sandbox that can incentivize private-sector participants to test out new technologies and create models that address existing gaps and new risks in the cyber domain. The purpose of this sandbox should be to inform future technological and governance standards needs, reduce pain points of improper payments, and maximize digital ID deployment in the United States.

Policy goal 2: Create innovative, federated technological models that combine benefits delivery and digital identity

What is clear in our assessment of the EU and Japan is their global standards-setting ambition, largely seen in governance frameworks. Moreover, through regulatory actions they have been able to mandate interoperability requirements and have embraced verifiable credentials based digital identity technologies to address coordination challenges. To help further the state of the art, the United States has an opportunity to develop models for a federated technology stack for benefits delivery that integrates digital identity and novel payment solutions for use by the government and the private sector alike . This requires investment in research and development, especially incorporating new technologies for decentralization in pilot projects. Emerging regulatory clarity in digital assets can also inform these pilot projects and explore the feasibility of using self-hosted wallets and payment stablecoins.

Policy goal 3: Minimize ID based threat vectors in benefits disbursement

Part 1 of this paper puts into perspective the role of improper payments in benefits disbursal in the US, as well as the highly fragmented verification process used by US agencies and their private sector partners. This enables scaling of phishing attacks and other scams, with innovation by fraudsters outpacing security in our public infrastructure and private sector services. Quantifying the problem is difficult due to a lack of transparency about fraud attack data, which undermines public trust in both government and private sector services. Put in context with the lessons from the EU area digital ID roll-outs, we see a clear need for robust and integrated system of verifications, used across agencies, for a variety of end purposes. These should be aimed at reducing the duplication of efforts, beginning at the verification stage, as well as the costs associated with detection. Furthermore, law enforcement agencies and public benefit service providers should engage periodically to assess the continuously evolving threat landscape and create information sharing strategies that can help provide early indicators to inform mitigation options.

About the author

Ananya Kumar is the deputy director, Future of Money, at the GeoEconomics Center.

The author would like to thank Sanith Wijesinghe and Alisha Chhangani for their research and support on this paper. 

This work was supported by the MITRE Independent Research & Development Program

Related content

Explore the program

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

1    Transportation Security Administration, “About REAL ID,” May 2025, https://www.tsa.gov/real-id/about-real-id.
2    Transportation Security Administration, “REAL ID Mobile Driver’s Licenses (mDLs),” May 2025, https://www.tsa.gov/real-id/real-id-mobile-drivers-license-mdls.
3    Peterson Institute, “Chart Pack: Social Programs,” August 2025, https://www.pgpf.org/article/chart-pack-social-programs/.
4    USAFacts, “How Many People Receive Government Assistance?,” September 2024, https://usafacts.org/articles/how-many-people-receive-government-assistance/.
5    USAFacts, “How Many People?”
6    U.S. Census Bureau. “Social Safety Net Benefits.” Census.gov, 2024. https://www.census.gov/library/visualizations/interactive/social-safety-net-benefits.html.
7    U.S. Census Bureau. “Social Safety Net Benefits.” Census.gov, 2024. https://www.census.gov/library/visualizations/interactive/social-safety-net-benefits.html.
8    Jacob Leibenluft, “‘DOGE” Access to Treasury Payment Systems Raises Serious Risks,” Center on Budget and Policy Priorities, February 2025, https://www.cbpp.org/research/federal-budget/doge-access-to-treasury-payment-systems-raises-serious-risks.
9    Office of the Inspector General, “Preventing, Detecting, and Recovering Improper Payments,” Social Security Administration, July 2024, https://oig.ssa.gov/assets/uploads/072401.pdf.
10    Government Accountability Office (GAO), “Improper Payments: Information on Agencies’ Fiscal Year 2024 Estimates, March 2025, https://www.gao.gov/products/gao-25-107753#:~:text=For%20fiscal%20year%202024%2C%2016,concentrated%20in%20five%20program%20areas.
11    GAO, “Improper Payments.”
12    GAO, “Improper Payments.”
13    GAO, Fraud Risk Management: 2018-2022 Data Show Federal Government Loses an Estimated $233 Billion to $521 Billion Annually to Fraud, Based on Various Risk Environments, Report to Congressional Committees, April 2024, https://www.gao.gov/assets/gao-24-105833.pdf.
14    General Services Administration (GSA), “Increase Adoption of Login.gov: FY 2024 Q4 Progress Update,” Agency Priority Goal Report, GSA, September 30, 2024, https://assets.performance.gov/APG/files/FY2024/Q4/FY2024_Q4_GSA_Progress_Increase_Adoption_of_Login.gov.pdf.
15    ID.me, “Over 70 Million Americans Keep Themselves Safe by Verifying Their Identity Through ID.me as AI Fraud Accelerates,” ID.me Press Release, April 8, 2025, https://network.id.me/press-releases/over-70-million-americans-keep-themselves-safe-by-verifying-their-identity-through-id-me-as-ai-fraud-accelerates/.
16    Federal Cybersecurity Requirements, 6 U.S.C. § 1523, https://uscode.house.gov/view.xhtml?req=6+USC+1523:+Federal+cybersecurity+requirements.
17    US Treasury Inspector General for Tax Administration, “Key Events of the IRS’s Planning Efforts to Implement Login.gov for Taxpayer Identity Verification,” September 2023, https://www.tigta.gov/sites/default/files/reports/2023-10/20232S070f
18    GAO, “GSA Needs to Address NIST Guidance, Technical Issues, and Lessons Learned,” October 2024, https://files.gao.gov/reports/GAO-25-106640/index.html.
19    Natalie Alms, “Login.gov Is Key to Administration Anti-fraud Efforts, GSA Official Says,” NextGov/FCW (a unit of GovExec platform), March 2025, https://www.nextgov.com/digital-government/2025/03/logingov-key-administration-anti-fraud-efforts-gsa-official-says/403470/.
20    “Digital Agency,” Government of Japan, Digital Agency, September 2021, https://www.digital.go.jp/en.
21    “Individual Number Card (My Number Card),” Japan Agency for Local Authority Information Systems, March 2025, https://www.kojinbango-card.go.jp/en/.
22    “eIDAS Regulation,” Directorate-General for Communications Networks, Content and Technology, European Commission, May 2025, https://digital-strategy.ec.europa.eu/en/policies/eidas-regulation.
23    “EU Digital Identity Wallet Pilot Implementation,” Directorate-General for Communications Networks, Content and Technology, European Commission, February 2025, https://digital-strategy.ec.europa.eu/en/policies/eudi-wallet-implementation.
24    “EU Digital Identity Wallet Pilot Implementation.”
25    “Memorandum of Cooperation on Digital Identities and Trust Services to Implement Data Free Flow with Trust between the European Commission on behalf of the European Union and the Digital Agency of Japan,” Digital Agency, Government of Japan, April 2024, https://www.digital.go.jp/assets/contents/node/information/field_ref_resources/eea22370-19d8-4a1a-ae92-89e28476f9a1/7cda2879/20240501_news_moc_original_01.pdf.
26    Kela, Social Insurance Institution of Finland. “Annual Report on Benefit Fraud Cases 2024.” https://www.kela.fi/documents/d/guest/annual-report-on-benefit-fraud-cases-2024.
27    Nippon.com. “Financial Losses from Specialized Fraud Rise to ¥44 Billion in 2023.” March 28, 2024. https://www.nippon.com/en/japan-data/h01935/.
28    Ministry of Health, Labour and Welfare. “Main Fiscal Year 2023 Employment and Social Welfare System Changes.” April 2023. https://www.mhlw.go.jp/stf/seisakunitsuite/bunya/0000198659_00015.html.
29    “Results from the Perspective of Data: Progress of Digital Utilization in Society,” Digital Agency, Government of Japan, September 2024, https://www.digital.go.jp/en/policies/report-202309-202408/progress.

The post Trustworthy digital identities can set the standards for secure benefits provision in the US appeared first on Atlantic Council.

]]>
IMEC must be more than a trade route. Digital integration should be a priority. https://www.atlanticcouncil.org/blogs/new-atlanticist/imec-must-be-more-than-a-trade-route-digital-integration-should-be-a-priority/ Tue, 26 Aug 2025 17:39:06 +0000 https://www.atlanticcouncil.org/?p=869481 The India-UAE virtual trade corridor should be the starting point for an expanded digital trade ecosystem among India-Middle East-Europe Economic Corridor partner countries.

The post IMEC must be more than a trade route. Digital integration should be a priority. appeared first on Atlantic Council.

]]>
Many in the shipping industry remain wary of the Red Sea. Houthi attacks on commercial vessels and the fallout from the Israeli-Palestinian conflict continue to disrupt maritime trade routes in the area. These disruptions impact supply chains by forcing shipping companies to reroute trade to longer and more expensive routes, adding both time and cost.

Nearly two years ago, the India–Middle East–Europe Economic Corridor (IMEC) emerged as a potential alternative to the existing volatile sea routes. When it was announced, IMEC offered partner countries, including the United States, the promise of a more secure and reliable trade route across the Arabian Peninsula. But the route itself is not IMEC’s only selling point. Additionally, participating countries stand to benefit from more streamlined, efficient, and transparent trade processes—deepening economic engagement and connectivity across regions.

The plans for IMEC envision it running from India and the United Arab Emirates (UAE) through Saudi Arabia, Jordan, and Israel, eventually reaching Europe. While political tensions have delayed progress on the Jordan-Israel segment of the transportation corridor, other components of the corridor continue to move forward, especially when it comes to economic cooperation between India and the Gulf states. This includes various port upgrade initiatives in India and the announcement of the India–UAE Virtual Trade Corridor (VTC) in September 2024.

With bilateral trade between India and the UAE reaching $100 billion in 2024–25 following the signing of the Comprehensive Economic Partnership Agreement (CEPA) in 2022, the VTC represents a timely and strategic boost to this growing economic partnership. This VTC is based on the Master Application for International Trade and Regulatory Interface, known as MAITRI. This platform seeks to integrate multiple digital systems and enable the seamless exchange of documents and trade-related information among regulatory stakeholders through a unified interface.

The India–UAE VTC, through the MAITRI platform, should be a starting point for building a seamless regional digital trade ecosystem across the IMEC countries. By enabling real-time data exchange, aligning customs procedures, and reducing paperwork, MAITRI and similar digital platforms can enhance trade efficiency along the corridor. Expanding this model across IMEC partner countries would help lay the foundation for a digitally integrated trade network that complements the physical trade corridor.

IMEC’s proposed sea-and-rail route is intended to link India and Europe through the Arabian Peninsula.

Linking MAITRI to IMEC

In the current global trading ecosystem, digital connectivity infrastructure has become as critical as physical connectivity infrastructure. There are many important aspects to track in cross-border trade, including duty assessments and payments managed by customs authorities, regulatory certificates, testing reports, and real-time cargo tracking and notifications by shipping lines. The India–UAE VTC through the MAITRI platform helps address these needs bilaterally. Extending MAITRI across IMEC could unlock far greater efficiencies by integrating partner countries into a unified digital trade interface.

A similar approach has worked farther east. The Association of Southeast Asian Nations (ASEAN) Single Window, ASW for short, stands as the benchmark for the digitalization of cross-border paperless trade within a regional bloc. Since its full operational launch in 2018, the ASW has made significant progress, with over 800,000 ATIGA e-Form D exchanges occurring in 2020 alone, demonstrating the scalability of digital trade solutions. The ATIGA e-Form D is an electronic document used in ASEAN trade, allowing for the exchange of data among member states. According to recent research, comprehensive digital trade facilitation measures can reduce costs by over 8 percent within ASEAN. This substantial benefit highlights why expanding the MAITRI VTC along the IMEC corridor should be a strategic priority.

The road ahead   

The operationalization of the India–UAE VTC has been smooth, largely due to the CEPA between the two countries. CEPA has eliminated duties on most traded product categories and streamlined regulatory compliance and documentation requirements, enabling a more efficient implementation of the digital corridor. But extending the VTC to the broader IMEC region presents several challenges.

The system will need to accommodate the diverse combinations of bilateral and regional trade agreements of which the IMEC countries are a part. Saudi Arabia and the UAE, for example, are members of the Gulf Cooperation Council, which means they have standardized economic policies and customs regulations while other IMEC countries may not follow the same trade protocols. Additionally, the multimodal nature of the IMEC corridor—encompassing rail, road, and maritime transportation—adds further complexity. Each participating country follows distinct customs procedures, regulatory processes, and documentation requirements, contributing to a fragmented and less harmonized regional trade ecosystem.

To enable the extension of a MAITRI-based VTC across multiple IMEC countries, policymakers should take the following five steps.

  1. Establish a Joint Working Group on Digital Integration. IMEC partners should establish such a group to focus on extending MAITRI to the remaining IMEC countries. This group could be co-chaired by India’s Ministry of Ports, Shipping, and Waterways and the UAE’s Ministry of Economy, with relevant ministries from other IMEC countries as core members. The working group would be responsible for developing a roadmap for the phased implementation of the MAITRI platform across the corridor. Key stakeholders from the private and public sectors could contribute valuable technical expertise to this initiative.
  2. Launch a comprehensive trade process mapping. The key elements of this exercise should include identifying stakeholders involved in trade processes within each country; outlining benefits and concessions available under bilateral and regional trade agreements; cataloging existing digital systems used by stakeholders (such as Port Community Systems or customs platforms); and understanding differences in trade process nomenclatures and terminologies. Ultimately, achieving a harmonized trade ecosystem across IMEC countries will be critical for the successful implementation of a unified digital trade platform like MAITRI. The secretariat of the IMEC envoy in each country, whenever designated, could lead this initiative to better coordinate among domestic as well as cross-country stakeholders.
  3. Create a technology interoperability plan. This should include the use of common Application Programming Interfaces, harmonized data fields for cargo information, and standardized data formats aligned with international trade standards. The partners’ respective ministries of information technology, together with customs authorities, could lead this initiative, in coordination with the ministries of ports and railways in each IMEC country.
  4. Operationalize mutual recognition agreements (MRAs). This would ensure the cross-border validity of critical documents, such as testing certificates, rules of origin, and health certificates. India and the UAE have already operationalized bilateral MRAs for digital certificates under the CEPA framework, setting a precedent for broader regional adoption. Customs authorities and the ministries of commerce in each country should serve as the coordinating agencies for MRA implementation.
  5. Hold technical and capacity-building workshops. India and the UAE should jointly organize these workshops to familiarize IMEC partner countries with the technical and regulatory frameworks of the VTC and the MAITRI platform. These efforts will support the training of key stakeholders—including customs authorities, regulatory and testing agencies, port operators, and industry associations—across the IMEC region, laying the groundwork for effective implementation of the VTC.

As global trade corridors evolve to redefine cargo movement routes, robust digital infrastructure will be instrumental to ensuring connectivity. It will play an important role in consolidating new trade routes and encouraging the global trade community to adopt emerging corridors, such as IMEC. A digitally integrated IMEC will enable seamless cargo movement with faster clearances, strengthening economic partnerships among participating nations—particularly US partners such as Israel, the Gulf states, Europe, and India.

Given the deep economic linkages between the United States and IMEC countries, this integration will advance US trade and strategic interests by creating transparent and predictable supply chains, reducing shipping delays, and lowering shipping costs and time for US exporters and importers in Asia and the Middle East. Moreover, strengthened economic ties among partners in volatile regions could reduce the risks of disruption to US manufacturing supply chains. That relies on the digital world just as much as the physical.


Afaq Hussain is a nonresident senior fellow at the N7 Initiative within the Atlantic Council’s Middle East Programs. He is also co-founder and director of the Bureau of Research on Industry and Economic Fundamentals (BRIEF), New Delhi.

The post IMEC must be more than a trade route. Digital integration should be a priority. appeared first on Atlantic Council.

]]>
CBDC Tracker cited by VISA on the status of CBDC development across the world https://www.atlanticcouncil.org/insight-impact/in-the-news/cbdc-tracker-cited-by-visa-on-the-status-of-cbdc-development-across-the-world/ Mon, 18 Aug 2025 20:53:02 +0000 https://www.atlanticcouncil.org/?p=867642 Read the full report here

The post CBDC Tracker cited by VISA on the status of CBDC development across the world appeared first on Atlantic Council.

]]>
Read the full report here

The post CBDC Tracker cited by VISA on the status of CBDC development across the world appeared first on Atlantic Council.

]]>
How the Chip Security Act could usher in an era of ‘trusted trade’ with US partners https://www.atlanticcouncil.org/blogs/geotech-cues/how-the-chip-security-act-could-usher-in-an-era-of-trusted-trade-with-us-partners/ Mon, 18 Aug 2025 17:06:07 +0000 https://www.atlanticcouncil.org/?p=868035 If implemented effectively, a bipartisan bill could help counter the illicit transshipment and diversion of artificial intelligence chips to US adversaries.

The post How the Chip Security Act could usher in an era of ‘trusted trade’ with US partners appeared first on Atlantic Council.

]]>
As the global race for artificial intelligence (AI) supremacy accelerates, the world’s reliance on one foundational technology—advanced semiconductors—has exposed an increasingly dangerous vulnerability. AI chips, particularly high-performance graphics processing units (GPUs) designed in the United States, are powering breakthroughs in national security, scientific research, and economic growth. These chips are inherently dual-use, meaning that governments and companies can use them to support both civilian and military applications. But these chips are also being diverted at scale into the hands of US adversaries, including China, despite export controls designed to prevent precisely that outcome. It is time to implement a “trusted trade” program to address this growing threat.

The Chip Security Act (CSA), a bipartisan bill introduced in May as H.R.3447 in the House of Representatives and S.1705 in the Senate, seeks to do just that. The CSA would provide a low-burden, high-impact policy solution to a problem that current enforcement tools have failed to solve: the illicit transshipment and diversion of AI chips to adversarial nations. In doing so, the CSA would also support the objectives of the White House’s AI Action Plan and the broader commercial goals of growing US full-stack AI market share overseas while simultaneously securing the semiconductor supply chain.

A growing and persistent threat

AI chips are the cornerstone of economic and military power in the twenty-first century. From autonomous weapons and cyber defense platforms to next-generation surveillance systems, these chips power the technological edge of modern warfare. China is actively working to erode this advantage by circumventing US export controls through elaborate smuggling networks. In 2024 alone, an estimated 140,000 high-performance GPUs—billions of dollars’ worth—were smuggled into China. And the problem is only getting worse—in May, 50 percent of the GPUs shipped to Malaysia were ultimately transshipped to China.

Current enforcement tools have clearly proven inadequate, largely due to the antiquated nature of the export control enforcement regime. The US Department of Commerce’s Bureau of Industry and Security (BIS), the federal agency responsible for enforcing chip export controls, remains under-resourced and lacks the cutting-edge tools required to counter China’s transshipment and illicit evasion networks. The BIS’s limited in-region capacity—there is only a single export-control officer assigned to cover all of Southeast Asia—stands in stark contrast to the billion-dollar smuggling operations it seeks to monitor and disrupt.

Why the Chip Security Act is different

The CSA doesn’t attempt to surge BIS personnel to Southeast Asia or rebuild the export control system from the ground up. Instead, it would introduce a surgical fix: location verification for chips exported abroad. If a chip shows up outside its authorized destination, the exporter would be required to notify the BIS. This automation would enable global, scalable export control enforcement—helping to augment and partially replace archaic Cold War-era end-use inspection systems that have historically inspected less than 1 percent of goods for end-use violations.

It is important to recognize that location data alone cannot fully determine end use. This is especially the case for dual-use goods such as advanced chips, where the true strategic risk lies in the computational and analytical capabilities they enable. Therefore, location information must also be paired with complementary intelligence and continuous monitoring. Other critical factors to determine the potential for harmful end use include corporate ownership, the composition of senior leadership, operational behavior, known diversion patterns, and the strength of cloud access controls at the data centers in question. These additional factors are especially vital to ensure that chips approved for export to third countries such as Malaysia do not ultimately end up in data centers owned by adversarial entities operating within those jurisdictions.

Crucially, though, the CSA is not overly prescriptive on how to achieve these objectives. For example, the CSA avoids mandating a specific location verification technology. Instead, it allows for industry-led implementation using already available methods, such as firmware-based geolocation checks or Delay-Based Location Verification systems. These tools offer privacy-preserving and nonintrusive methods to confirm a chip’s location without monitoring user activity or enabling surveillance. It’s an approach that balances security with commercial viability—and it’s deployable today.

Learning from past failures

The CSA builds on the hard lessons of previous legislative and regulatory efforts. Export controls under the Export Control Reform Act and the CHIPS and Science Act have failed to address transshipment and empower the BIS with the resources and technology needed to enforce its global mission. Moreover, past proposals to hardwire chips with geofencing capabilities or mandate “kill switches” faced strong industry resistance due to concerns over cost, reliability, and the potential effect on international sales. These ideas either stalled or were watered down beyond usefulness. In contrast, the CSA reflects feedback from both national security experts and chipmakers, emphasizing modularity, cost-effectiveness, and scalability.

Expanding US and Western AI dominance through trusted trade

The misuse of advanced chips is not just a US concern—it poses a global threat. When semiconductors are diverted to unauthorized end users, they can fuel authoritarian control, destabilize markets, and erode allied innovation ecosystems. Recognizing this, key US allies such as Japan and the Netherlands have taken steps to restrict high-end semiconductor and equipment exports to China. Yet enforcement across jurisdictions remains porous due to a lack of verifiable, end-to-end visibility. The CSA methodology can address this gap in the allied export control system by enabling continuous, software-based location verification and lifecycle tracking—empowering companies to demonstrate responsible export behavior without sacrificing speed, scale, or profitability.

The CSA provides an alternative to the false binary often facing policymakers: either impose broad restrictions that hinder legitimate commerce or tolerate unchecked smuggling that threatens national security. Instead, the CSA would deliver precision enforcement, targeting violators without penalizing compliant firms. By embedding continuous supply chain visibility into the post-export phase, it would equip both industry and regulators to detect and address illicit diversions before they escalate. This would strengthen US leadership in AI and semiconductor innovation while giving allies a replicable model.

The CSA’s technology-neutral compliance framework opens the door to future coordination under multilateral tech alliances—ensuring chips produced across democratic nations are not funneled into hostile hands. The United States and its allies could help realize this vision by offering technical assistance to help partners and transshipment-prone countries establish robust export control and supply chain surveillance systems. Such capacity-building would close enforcement gaps and ensure harmonization across allied secure trade frameworks. These measures would help lay the groundwork for a coalition of democracies to secure critical technologies and expand Western AI dominance without stifling innovation.

A better path forward

The CSA has steadily gained bipartisan traction, signaling rare alignment in Congress on a forward-looking export control strategy. But like most major policy shifts, it still faces predictable obstacles on the path to implementation. For the CSA to be effectively implemented, Congress and the executive branch should ensure that the BIS has the additional resources, staff, and technologies needed to monitor and implement the trusted trade program. Once location verification systems are deployed, for example, the BIS will be required to continuously monitor the millions of data points the system collects from chips around the world each day. Dedicated staff will be needed to respond to suspicious activities and engage with industry and foreign governments when questions arise.

In addition to the CSA, US supply chain security could be further strengthened if the executive branch requires the BIS to monitor which foreign companies access the cloud and compute capabilities associated with geotagged chips through screening and end-use checks. This policy would buttress the CSA and enable the BIS to finally field a cost-effective, scalable export control enforcement regime for AI that is not cumbersome for industry.

On the business side, industry groups remain wary of potential regulatory overreach in the law’s implementation phase. A public-private partnership with a trusted third party (meaning BIS, a semiconductor company, and a third party that would serve as a “monitor”) could help resolve conflicts and build mutual trust between industry and the government. Public pressure is growing on US companies to cut ties with China, and this type of trusted trade monitorship under the auspices of a public-private program would be a welcome step toward an economic policy and national security consensus.

A call to action

The global contest for AI leadership is not just a race for innovation—it’s a race for control over the infrastructure that will shape economies, militaries, and governance systems worldwide. If passed and implemented effectively, the CSA would strengthen the United States’ position in that contest by enabling US companies to scale exports of advanced chips without losing visibility or control over where those chips end up. Rather than ceding ground to Chinese firms through uncontrolled diversion and black-market transshipment, the CSA would equip US industry to lead. Passing this bill would send a clear signal that the United States is committed to winning the global AI competition not just by building the most advanced technology—but also by ensuring that technology is deployed on terms that reflect US interests and values.


Kit Conklin is a nonresident senior fellow at the Atlantic Council’s GeoTech Center and the senior vice president for risk and compliance at Exiger.

The views expressed are solely those of the author and do not necessarily reflect the views of the Atlantic Council or Exiger.

Further reading

The GeoTech Center champions positive paths forward that societies can pursue to ensure new technologies and data empower people, prosperity, and peace.

The post How the Chip Security Act could usher in an era of ‘trusted trade’ with US partners appeared first on Atlantic Council.

]]>
Digital democracy is the key to staging wartime elections in Ukraine https://www.atlanticcouncil.org/blogs/ukrainealert/digital-democracy-is-the-key-to-staging-wartime-elections-in-ukraine/ Tue, 05 Aug 2025 21:14:19 +0000 https://www.atlanticcouncil.org/?p=865657 With no end in sight to Russia's invasion, Ukraine cannot afford to postpone all elections indefinitely. With this in mind, it is time to start the process of digitalizing Ukraine’s democracy, writes Brian Mefford.

The post Digital democracy is the key to staging wartime elections in Ukraine appeared first on Atlantic Council.

]]>
Ukrainians underlined the strength of their democratic instincts in late July by taking to the streets and protesting new legislation that aimed to curtail the independence of the country’s anti-corruption institutions. The protesters made their point and achieved a significant victory, with Ukrainian President Volodymyr Zelenskyy reversing course just days after backing the controversial changes.

Ukrainians have a long record of rising up against non-democratic moves in times of need. This latest example mirrored much larger and equally successful protest movements in recent decades such as the 2004 Orange Revolution and the 2014 Revolution of Dignity. The Ukrainian public are well aware that their hard-won democratic freedoms cannot be taken for granted.

The Ukrainian authorities would be wise to treat the recent protests as a serious indication of mounting public dissatisfaction with the current government. While Ukrainians have rallied behind Zelenskyy as the country’s wartime leader, this should not be confused with blanket approval for all his policies. Indeed, more protests cannot be ruled out. Next time, public anger might not be as easily appeased.

In any healthy democracy, elections are always the best pressure valve for public discontent. However, due to wartime security concerns, logistical obstacles, and martial law restrictions, elections are not currently possible in Ukraine. In 2024, the country postponed scheduled presidential and parliamentary ballots. More recently, Ukraine’s Central Election Commission confirmed that local elections would not go ahead later this year.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

The reasons for the lack of elections are clear and mandated by Ukraine’s Constitution. In fact, a consensus has crystallized that any public calls for wartime elections in Ukraine could help legitimize Russian efforts to portray the country as a dictatorship. However, there is no escaping the fact that the absence of elections hurts Ukraine’s credibility as an emerging democracy. This risks undermining international support for Ukraine and could potentially lead to a reduction in military aid.

While it has often been pointed out that Britain postponed all elections throughout World War II, many Americans have noted that the United States was able to hold both congressional and presidential elections during the nineteenth century American Civil War. Indeed, Abraham Lincoln’s main opponent was one of his own generals.

Ukrainian safety concerns amid the largest European invasion since World War II are obviously valid. At the same time, holding local votes in parts of Ukraine situated far from the front lines such as Uzhgorod, Lviv, and Chernivtsi could theoretically be possible with the necessary security measures in place.

With millions of voters currently living as refugees outside Ukraine and others displaced or serving in the military, voter turnout would almost certainly be significantly below the average for Ukrainian elections. This is regrettable but should not be decisive. After all, any free and fair election would help revive domestic and international confidence in Ukraine’s democratic credentials.

Of course, even local elections could not be safely staged in cities closer to the front lines like Kharkiv, Zaporizhzhia, and Kherson. The solution to this problem may lie in Ukraine’s sophisticated tech sector and the widespread adoption of digital tools throughout Ukrainian society.

Since 2022, Ukraine has earned an international reputation for battlefield innovation and now is recognized as a world leader in drone warfare. If this same spirit is applied to the country’s democracy, it could be possible to hold local or national elections while avoiding the risks associated with large groups of people gathering for campaign rallies and at polling stations.

Following his election as Ukraine’s sixth president in 2019, Volodymyr Zelenskyy established the Ministry of Digital Transformation and identified digitalization as one of his strategic priorities for Ukrainian society. The Ukrainian government then launched the Diia app as a key e-governance tool that makes it possible for Ukrainians to hold a wide range of official documents in digital format. By late 2024, the Diia app had over 21 million users, representing a majority of the Ukrainian electorate.

It is worth exploring whether the Diia app could serve as the basis for secure digital voting. If Diia is not suitable, other digital options should be identified and developed. This approach could address election security concerns while also preventing the disenfranchisement of the millions of Ukrainians currently living abroad or defending the country against Russia’s invasion.

Skeptics may argue that the Diia system or any other digital voting platform would be vulnerable to hacking. This would undoubtedly be the key issue to address before proceeding with digital elections. At the same time, it is important not to overstate the challenges this represents. Fraud is always possible in any election, but the transparency of digital tools may actually reduce the risk when compared to paper ballots. Indeed, Ukraine’s digitalization experience suggests that the introduction of digital platforms actually reduces the scope for abuses.

Ukrainians are not yet demanding elections, but there are signs that public distrust of the authorities is mounting and may soon reach alarming levels. At a time when national unity is so crucial for the country’s survival, this mood of frustration must be taken seriously.

With no end in sight to the Russian invasion, Ukraine cannot afford to postpone all elections indefinitely. It is therefore time to start the process of digitalizing Ukraine’s democracy and employing the same kind of innovative thinking that has proved so effective on the battlefield. The technologies to do so already exist. The Ukrainian government must now demonstrate that they also have the political will to find the right solutions.

Brian Mefford is a senior nonresident fellow at the Atlantic Council. He has lived and worked in Ukraine since 1999.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post Digital democracy is the key to staging wartime elections in Ukraine appeared first on Atlantic Council.

]]>
Navigating the new reality of international AI policy https://www.atlanticcouncil.org/blogs/geotech-cues/navigating-the-new-reality-of-international-ai-policy/ Mon, 21 Jul 2025 15:59:47 +0000 https://www.atlanticcouncil.org/?p=833064 To reach their goals of national AI adoption, governments must continue to advance the global policy discussion on trust, safety, and evaluations.

The post Navigating the new reality of international AI policy appeared first on Atlantic Council.

]]>
Since the start of 2025, the strategic direction of artificial intelligence (AI) policy has dramatically shifted to focus on individual nation-states’ ability to win “the global AI race” by prioritizing national technological leadership and innovation. So, what does the future hold for international AI policy? Is there appetite for meaningful work to address AI risks through testing and evaluation? Or will there be a further devolution into national adoption and investment priorities that leave little room for global collaboration?

As India prepares to host the next AI Impact Summit in New Delhi next February, there is an opportunity for national governments to advance discussions on trust and evaluations even amid tensions in the policy conversation between ensuring AI safety and advancing AI adoption. At next year’s summit, national governments should come together to encourage a collaborative, globally coordinated approach to AI governance that seeks to minimize risks while maximizing widespread adoption.

Paris: The AI adoption revolution begins

Initial momentum for policies focused on ensuring AI safety and its potential to pose existential risks to humanity began at the first UK-hosted AI Safety Summit in Bletchley Park in 2023. This discussion was further advanced in subsequent international summits in Seoul, South Korea, and San Francisco, California, in 2024. Yet, as France held the first AI Action Summit in Paris in February of this year, shortly after US President Donald Trump was sworn in for his second term and Prime Minister Keir Starmer took the helm of a brand-new Labour government in the United Kingdom, these discussions on AI risks and safety appeared to lose momentum.

At the AI Action Summit in Paris, French President Emmanuel Macron declared that now is “a time for innovation and acceleration” in AI, while US Vice President JD Vance said that “the AI future is not going to be won by hand-wringing about safety.” As the summit concluded, the United States and the United Kingdom opted not to join other countries in signing the Statement on Inclusive and Sustainable AI for People and Planet. Days later, the United Kingdom renamed its AI Safety Institute to the AI Security Institute, reflecting its shift toward focusing on the national security-related risks stemming from the most advanced AI models as opposed to addressing broader concerns around existential risks to society that AI systems might pose. This approach has also been adopted by the United States, which rebranded the US AI Safety Institute to the Center for AI Standards and Innovation in June.

The Paris AI Action Summit was an early indicator of what the first six months of 2025 would further reveal: a shift away from focusing on the potential existential risks and societal harms posed by AI. Instead, more countries have doubled down on AI research and development investments and the development of secure AI data centers, further increased their focus on extended training for large language models (LLMs), developed national AI adoption mandates, and made proposals to slow down or prevent additional regulation that may inhibit AI adoption.

AI investment and adoption mandates

The United States has taken several steps in this new direction. The Trump administration repealed several Biden-era executive actions on AI during the first few weeks of January, including repealing the “Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence.” In February, the administration issued a request for information to develop a new “AI Action Plan,” pursuant to an executive order signed in January called “Removing Barriers to American Leadership in Artificial Intelligence.” The Trump administration’s AI executive order calls for the reduction of administrative and regulatory burdens to AI development and adoption, as well as a further alignment of US AI strategy with national security interests and economic competitiveness goals. Taken together, these actions emphasize an approach that views deregulation as essential for US global leadership in AI.

Simultaneously, a policy debate has emerged in the United States over whether the federal government should preempt state-level AI legislation that would impose regulations on the industry. The industry has been concerned that the numerous and varying approaches to AI legislation being developed at the state level could create a patchwork of regulations that would render the compliance environment complicated and overwhelming.

But even as the debate over federal preemption continues, state-level proposals on AI risk management and governance have stalled. Virginia’s proposed High-Risk Artificial Intelligence Developer and Deployer Act was vetoed by Governor Glenn Youngkin in March. Meanwhile, the Texas Responsible Artificial Intelligence Governance Act was significantly slimmed down before it was signed into law last month, with all references to high-risk AI systems and corresponding prohibitions removed.

Across the pond, the European Union (EU) continues to take steps to identify ways in which the implementation of its cross-cutting EU AI Act can be simplified as part of its AI Continent Action Plan. Industry expressed growing concern over the ability to meet enforcement deadlines without additional guidance and clarifications from the EU AI Office, with forty-four European CEOs calling for a delay in its implementation. This focus on adoption over safety concerns was also reflected at the Group of Seven (G7) Leaders’ Summit held in Canada last month. At the summit, G7 leaders issued a statement on AI for Prosperity, which highlighted the ways in which AI can drive economic growth and benefit people, in addition to laying out a roadmap for AI adoption.

Adapting to this shift in global AI policy

Given this marked shift in the tone of global AI policy discussions, some might wonder whether there are still opportunities to advance conversations on AI trust and safety. Yet, businesses crave certainty and trust remains paramount to creating an ecosystem that supports adoption. Moreover, the AI landscape continues to evolve, requiring continued discussions on “what good looks like” when it comes to AI models used in a variety of enterprise applications and scenarios. Emerging technologies such as agentic AI—AI systems designed to act autonomously, making decisions and taking actions to achieve specific goals with minimal human intervention—as well as evolving enterprise deployment challenges, make it clear that 2025 does not represent the dusk of international AI policy aimed at evaluating and mitigating risks, but a potential dawn.

The upcoming AI Impact Summit in New Delhi presents an opportunity to continue conversations about how creating a robust AI testing and evaluation ecosystem can drive innovation and foster trust, furthering AI security and adoption. There are four key areas that national governments should individually prioritize in their efforts to advance AI adoption while also collaborating on a global level.

1. Assess and address regulatory gaps based on new evolutions in AI technology. Agentic AI is the next evolution of AI technology. Like other iterations of the technology, it can offer significant benefits, but at the same time, either amplify existing risks or introduce new risks because it can execute tasks autonomously. Governments should undertake an assessment of existing regulatory frameworks to ensure they account for any new risks related to agentic AI. Additionally, to the extent that gaps are identified, they should consider the creation of flexible, future-proof frameworks that can be adapted to future evolutions of AI technology.

2. Advance industry-led discussions around open-source and open-weight models, including specific considerations for national security concerns. Transparency and access vary widely across open-source and open-weight models, and researchers and businesses should understand the extent to which models and data sets remain open. Stakeholders—including national governments—need to understand not only what constitutes an open-source or open-weight model, but also what elements of those models are necessary to share downstream. Additionally, enterprises and industry players need certainty around any relevant fault lines for these considerations when choosing partners and third-party vendors when open-source or open-weight models could impact national security. Such discussions will allow enterprises to determine which models and markets offer safe and secure foundations for experimentation and what transparency measures can reasonably be expected.

3. Foster trust by encouraging the development and adoption of AI testing, benchmarks, and evaluations. Governments should encourage the adoption of globally recognized, consensus-based AI testing, benchmarks, and evaluations. Frontier model developers need to be able to understand, analyze, and iterate on their LLMs with the help of detailed performance and safety evaluations. Governments should support the development of robust testing and evaluation frameworks to ensure that such frameworks are fit for purpose, address issues such as a lack of consistency and reliability in how evaluation results are reported, and improve the availability of high-quality and trustworthy evaluation datasets. These frameworks should also be built to further understand and iterate on evaluation results to improve models without overfitting, or creating models that match the training set so closely that they fail to make correct predictions on new data.

4. Drive public-private collaboration across borders to promote AI adoption and drive risk management. The technological conversation is not bound by national borders. Thus, it is important that both public-sector and private-sector stakeholders recognize and harness the interdependence of the AI value chain while engaging in conversations about AI governance and transparency. It is also vital that policymakers and different actors in the AI value chain have a clear understanding of their roles and responsibilities. Enterprises and national governments should continue to use international fora such as the Organisation for Economic Co-operation and Development, the Global Partnership on Artificial Intelligence, the International Network of Safety Institutes, and the United Nations to facilitate public-private collaboration across borders. This will help ensure that different approaches are interoperable and that countries and organizations are best leveraging their own strengths.

***

The world must not lose the gains already made by researchers, policymakers, and enterprises that have been working to address AI risks over the past several years by over-indexing on adoption alone. The answers required to address the challenges and risks associated with AI are intertwined with the ability to capitalize on the opportunities AI presents and can ensure the accountability and security of these technologies for years to come. If AI adoption is the objective, then AI testing, evaluations, and governance are the methods. A collaborative effort to advance AI policy that reflects this fact should be every nation’s priority.


Evi Fuelle is a nonresident senior fellow at the Atlantic Council’s GeoTech Center.

Courtney Lang is a nonresident senior fellow at the Atlantic Council’s GeoTech Center.

Further Reading

The GeoTech Center champions positive paths forward that societies can pursue to ensure new technologies and data empower people, prosperity, and peace.

The post Navigating the new reality of international AI policy appeared first on Atlantic Council.

]]>
Ukraine can benefit from growing tech ties between Gulf states and the US https://www.atlanticcouncil.org/blogs/ukrainealert/ukraine-can-benefit-from-growing-tech-ties-between-gulf-states-and-the-us/ Sun, 13 Jul 2025 14:38:11 +0000 https://www.atlanticcouncil.org/?p=859697 As the Middle East adjusts to new geopolitical realities, growing tech sector cooperation between the US and the Gulf states is creating a range of opportunities for Ukraine, writes Anatoly Motkin.

The post Ukraine can benefit from growing tech ties between Gulf states and the US appeared first on Atlantic Council.

]]>
The recent conflict between Israel and Iran has shaken Middle Eastern security assumptions and set the stage for new strategic alignments across the region. Amid escalating threats and shifting power dynamics, the United States and Gulf nations have moved swiftly to fortify a different kind of alliance; one anchored not in oil prices or arms sales, but in cooperation to develop and implement cutting-edge technologies.

This emerging US-Gulf tech partnership is not only a response to regional instability, but also a platform for global influence. For Ukraine, it presents a strategically exciting opportunity to deepen engagement with both Washington and the Gulf nations, while also advancing the country’s own recovery and integration into established international innovation networks.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

The Gulf’s recalibration following the unprecedented recent escalation in hostilities between Israel and Iran has reinforced the urgency of technological self-sufficiency and digital resilience. From Riyadh to Abu Dhabi, national strategies such as Saudi Vision 2030 and the UAE’s AI agenda are gaining new importance.

The United States, meanwhile, is seeking reliable partners to counter the rise of authoritarian tech ecosystems led by China, Russia, and Iran. These converging interests are creating a new basis for cooperation that is focused on issues such as semiconductors, AI, cybersecurity, energy transition, and space innovation.

The current shift has potentially long-lasting geopolitical implications. In contrast to China’s closed and tightly state-controlled tech model, the US-Gulf partnership emphasizes transparency, interoperability, and market access.

The Gulf’s geographic position and capital resources make it an ideal hub for restructured supply chains and next-generation infrastructure. In this context, the recent Israel-Iran conflict has served as both catalyst and justification for deeper American-Gulf integration, particularly in terms of dual-use technologies with civilian and defense applications.

For Ukraine, the relevance of this rapidly evolving geopolitical landscape is immediate and multi-dimensional. Ukrainian battlefield-tested technologies in electronic warfare, counter-drone systems, and cyber defense all directly address the concerns of Gulf nations regarding growing regional threats.

Meanwhile, Ukraine’s agritech innovation can support Gulf food security strategies in what are increasingly arid environments. The country’s globally respected software talent and cybersecurity expertize can also offer value to American firms operating in the Gulf.

Looking ahead, the convergence of US innovation, Gulf investment, and Ukrainian resilience could become an attractive blueprint for Kyiv’s postwar recovery. Ukraine’s reconstruction is set to be one of the largest rebuilding efforts of the twenty-first century. This unprecedented rebuilding process can serve as a real-world testbed for smart infrastructure, digital services, and clean energy systems co-developed by Ukrainians together with partners in the US and the Gulf region.

To take full advantage of this moment, Ukraine must adopt a targeted strategy. First, the country should identify the most strategically attractive niche sectors including cybersecurity, agritech, and defense tech. These should be areas where Ukraine’s assets complement rather than compete with American and Gulf priorities.

Second, Ukraine must invest in human capital by expanding tech education and exchange programs that connect Ukrainian talent with innovation centers in the Gulf and the United States. Thirdly, Kyiv should position itself as a proactive contributor to this emerging innovation bloc, not just as a beneficiary of international aid but as a co-creator of strategic value.

Recent shifts in the geopolitical landscape of the Middle East have accelerated existing global divisions in terms of both technology and security. The US-Gulf alliance is emerging as a stabilizing force, grounded in shared values and mutual technological ambition. Through focused engagement and smart positioning, Ukraine can become an indispensable partner in this alliance, and can help shape a more secure and innovative global future.

Anatoly Motkin is president of StrategEast, a non-profit organization with offices in the United States, Ukraine, Georgia, Kazakhstan, and Kyrgyzstan dedicated to developing knowledge-driven economies in the Eurasian region.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine can benefit from growing tech ties between Gulf states and the US appeared first on Atlantic Council.

]]>
Chhangani cited in KPMG 2025 Futures Report on the market size for tokenized assets by 2030 https://www.atlanticcouncil.org/insight-impact/in-the-news/chhangani-cited-in-kpmg-2025-futures-report-on-the-market-size-for-tokenized-assets-by-2030/ Thu, 10 Jul 2025 15:00:33 +0000 https://www.atlanticcouncil.org/?p=857884 Read the full report here.

The post Chhangani cited in KPMG 2025 Futures Report on the market size for tokenized assets by 2030 appeared first on Atlantic Council.

]]>
Read the full report here.

The post Chhangani cited in KPMG 2025 Futures Report on the market size for tokenized assets by 2030 appeared first on Atlantic Council.

]]>
Exploring the global digital ID landscape https://www.atlanticcouncil.org/in-depth-research-reports/report/exploring-the-global-digital-id-landscape/ Thu, 10 Jul 2025 11:00:00 +0000 https://www.atlanticcouncil.org/?p=856311 The worldwide adoption of digital identity systems varies significantly across regions and implementation approaches.

The post Exploring the global digital ID landscape appeared first on Atlantic Council.

]]>

Executive summary

In an increasingly digital world, digital identity systems represent a fundamental transformation in how personal information is authenticated and managed, shifting from traditional physical identification methods to electronic credentials that enable access to digital services across government and private-sector platforms. These systems utilize authenticated credentials that verify individual qualifications and personal information to establish trusted digital documentation, spanning use cases from health certificates to mobile identification for travel security and banking verification.

The worldwide adoption of digital identity systems varies significantly across regions and implementation approaches. Estonia’s comprehensive e-ID system, mandatory for all residents, demonstrates transformative societal impact by connecting organizations through distributed databases and blockchain technology. India’s Aadhaar program serves a massive population, proving that large-scale digital identity systems can operate in developing countries while bringing previously undocumented populations into formal economic systems, albeit not without criticism. The European Union’s eIDAS framework mandates that all member states offer digital identity wallets to citizens and businesses, creating interoperability across member states. The African Union has faced infrastructure and data protection challenges, while the United States remains fragmented with individual states implementing mobile driver’s licenses without federal coordination.

Digital identity systems offer a breadth of benefits including enhanced convenience, improved access for underserved populations, stronger privacy protections through data minimization principles, and significant cost savings for organizations. These systems hold tremendous potential to transform the delivery of government services and industry interactions, though there are potential risks and limitations to be considered.

Despite promising advantages, limitations across technical, political, and social spheres present an array of challenges. Technical limitations include interoperability between different systems, cybersecurity vulnerabilities, and accessibility barriers in regions with limited digital infrastructure. Political obstacles include insufficient regulatory frameworks, lack of adherence to international standards, and coordination issues between jurisdictions. Social limitations center on concerns over public trust, particularly regarding surveillance and privacy, along with unequal access that can further marginalize vulnerable populations including refugees, elderly citizens, and those with limited digital literacy.

Successful implementation of digital identity systems requires coordinated efforts across sectors. Governments must adopt user-first design principles, ensure interoperability through technical standards, tailor systems to local contexts, and establish effective public-private partnerships. Private sector actors should prioritize transparency, data security, and accessibility while implementing privacy-enhancing technologies. Civil society organizations play crucial roles in public education and representing user interests.

As digital identity systems become the cornerstone of personal identification, effective implementation depends on building systems that genuinely serve user needs while maintaining robust protections against misuse and public trust through transparency and accountability measures, particularly ensuring the protection and well-being of marginalized and disadvantaged populations.

View the full report

About the authors

Related content

Explore the program

The GeoTech Center champions positive paths forward that societies can pursue to ensure new technologies and data empower people, prosperity, and peace.

The post Exploring the global digital ID landscape appeared first on Atlantic Council.

]]>
Kumar cited in The Banker on Hong Kong stablecoin legislation https://www.atlanticcouncil.org/insight-impact/in-the-news/kumar-cited-in-the-banker-on-hong-kong-stablecoin-legislation/ Mon, 16 Jun 2025 13:57:11 +0000 https://www.atlanticcouncil.org/?p=853663 Read the full article here.

The post Kumar cited in The Banker on Hong Kong stablecoin legislation appeared first on Atlantic Council.

]]>
Read the full article here.

The post Kumar cited in The Banker on Hong Kong stablecoin legislation appeared first on Atlantic Council.

]]>
Seven charts that will define Canada’s G7 Summit https://www.atlanticcouncil.org/blogs/new-atlanticist/seven-charts-that-will-define-canadas-g7-summit/ Thu, 12 Jun 2025 17:01:47 +0000 https://www.atlanticcouncil.org/?p=853166 Our experts provide a look inside the numbers that will frame the high-stakes gathering of Group of Seven leaders in Alberta.

The post Seven charts that will define Canada’s G7 Summit appeared first on Atlantic Council.

]]>
It’s a high-stakes summit among the high summits. Leaders from the Group of Seven (G7) nations are set to convene in the Rocky Mountain resort of Kananaskis, Alberta, Canada, from June 15 to 17. This year also marks the group’s fiftieth meeting. In 1975, the newly created Group of Six (G6) held its first meeting in France amid oil price shocks and financial fallout from then US President Richard Nixon’s decision to remove the dollar from the gold standard. In recent years, the G7 has coalesced around coordinating sanctions on Russia, supporting Ukraine’s reconstruction, and responding to Chinese manufacturing overcapacity. But 2025 comes with new challenges, including an ongoing trade war between G7 members, which will test the resolve and the raison d’etre of the grouping.

Here’s a look inside the numbers that will frame the summit.


The G7 was formed fifty years ago so the world’s advanced-economy democracies could align on shared economic and geopolitical challenges. But what happens when the cause of instability is coming from inside the G7? That’s the question confronting the leaders as they assemble this week in Kananaskis. 

US President Donald Trump is still getting to know some of his new colleagues, including German Chancellor Friedrich Merz, UK Prime Minister Keir Starmer, Japanese Prime Minister Shigeru Ishiba, and the summit’s host, Canadian Prime Minister Mark Carney. Trump will try to coordinate the group against China’s economic coercion. But the rest of the leaders may turn back to Trump and say that this kind of coordination, which is at the heart of why the G7 works, would be easier if he weren’t imposing tariffs on his allies. The chart above shows the friction points heading into one of the most consequential G7 summits in the organization’s history.

Josh Lipsky is the chair of international economics at the Atlantic Council, senior director of the GeoEconomics Center, and a former adviser to the International Monetary Fund (IMF). 


Originally created as an economic coordination body, the G7 began to put foreign policy and national security on its agenda in the 1980s, as the Soviet Union’s political influence was waning. Soon after, Russia attended its first G7 Summit as a guest in 1991, formally joined in 1998, creating the Group of Eight (G8), and then was suspended in 2014 due to its annexation of Crimea. 

In the years since, new geopolitical rivals have entered the fray: Since the COVID-19 pandemic, G7 summits and declarations have attempted to address China’s role in the global economy. Last year’s leaders’ communiqué was especially harsh on China—which was mentioned twenty-nine times—on everything from its material support to Russia’s war against Ukraine to Beijing’s malicious cyber activities. But China was once a guest at the forum, first joining in this capacity in 2003.

Other members of the G7+5, an unofficial grouping of large emerging markets—India, Mexico, Brazil, and South Africa—have been invited as guests in recent years. If that sounds familiar, it is because India, Brazil, and South Africa, along with Russia and China, are the founding members of the BRICS group of emerging economies, which some would consider a representation of the geopolitical and economic competition the G7 faces today. 

This year, Australia, Ukraine, South Korea, Brazil, Mexico, and India were invited to attend as guests. These invitations are a signal of broad alignment among the G7 and its guests. These invitations demonstrate the importance of the guests’ economic might on the global stage, even though India has shifted away from the G7 quite significantly in the last fifty years, as seen in the graph above. In 1992, when Russia first attended the G7 as a guest, its gross domestic product (GDP) was less than 1 percent of the world’s GDP, and the combined economies of the five founding BRICS countries made up less than 9 percent of global GDP. At the time, the G7 represented 63 percent of the world’s GDP. Today, the G7’s share is now 44 percent of the world’s GDP and the founding BRICS members’ share has more than doubled to almost 25 percent. 

Ananya Kumar is the deputy director for future of money at the Atlantic Council’s GeoEconomics Center.


In 2024, G7 countries attracted over 80 percent of global private artificial intelligence (AI) investments, led primarily by the United States. In ten years, private AI investments have grown almost fifteen-fold. This month, the US Department of Commerce rebranded its AI Safety Institute as the Center for AI Standards and Innovation (CAISI)—shifting away from an emphasis on “safety” and toward promoting rapid commercial development.

Carney has said that he plans to put AI at the top of his agenda at the upcoming G7 Leaders’ Summit. He has been a long-standing advocate of AI—dating back to his 2018 presentation on AI and the global economy while he was governor of the Bank of England.

But while the United States leads in AI innovation and investment, Europe continues to set the pace on regulation, and China strategically develops its own AI models. All this leaves Canada asking where it fits in.

That may be why Carney hopes to lead on this issue. The G7 presidency offers Canada a unique opportunity to convene democracies to work together on AI. Rather than trying to outspend the United States or out-regulate Europe, Canada can focus on building connections—creating shared standards, developing trusted public-private data hubs, coordinating strategic investments, and outlining guidelines for common learning and collaboration across borders.

Alisha Chhangani is an assistant director at the Atlantic Council’s GeoEconomics Center.


Ten years after the first G6 meeting took place in France, another landmark meeting took place at the Plaza Hotel in New York, in September 1985. At the meeting, then US Treasury Secretary James Baker convinced his counterparts from West Germany, France, the United Kingdom, and Japan to support a significant devaluation of the US dollar—what became known as the Plaza Accord.

Today, the dollar’s value relative to its G7 counterparts is on the rise again, fueled by tight monetary policy and expansionary fiscal spending. Although the current appreciation is milder than the surge seen in the early 1980s, the Trump administration may use the G7 Summit to raise concerns about the burden of being the world’s reserve currency, especially when it comes to export competitiveness. In late 2024, the current chair of Trump’s Council of Economic Advisers, Stephen Miran, proposed a “Mar-a-Lago Accord” as an updated version of the Plaza Accord, though no real progress on this is apparent. Moreover, this time a key global player is absent from the conversation—China.

Bart Piasecki is an assistant director at the Atlantic Council’s GeoEconomics Center.


The finance ministers and central bank governors of the G7 already held their meeting last month in the Canadian Rockies, emerging with a consensus on tackling “excessive imbalances” and nonmarket policies. While the G7’s finance ministers and central bank governors’ communiqué didn’t call out China by name, it’s clear that’s who they were referring to. Simultaneously, the US-UK trade deal called for the United Kingdom to meet US requirements on the security of supply chains, which infuriated Beijing.

Washington wants coordinated economic security partnerships to help counter China and encourage more investment in the United States. But the United States has been calling for allies to divest from China for a while now. In response, G7 counterparts could point to the data above and ask: How much more do we need to give?

Over the past five years, nearly every G7 country, with the exception of Canada, has scaled down their investments in China and scaled up their investments in the United States. For example, Japan has reduced foreign direct investment in China by 60 percent over the past decade, including shuttering a major Honda plant in Guangzhou. Meanwhile, the Japanese carmaker pledged to put $300 million into a plant outside of Columbus, Ohio. This has been the trend as the United States’ G7 partners reassess their economic dependencies on China. But amid ongoing trade wars, how much are they willing to coordinate more closely with the United States?

Jessie Yin is an assistant director with the Atlantic Council’s GeoEconomics Center.


Foreign aid, or official development assistance (ODA), from G7 countries dropped sharply in 2024, and early projections through 2025 and 2026 suggest even steeper declines ahead for most nations. The United States has exhibited the most drastic retreat, following the effective dismantling of the US Agency for International Development. But European countries have also scaled back development budgets and are redirecting funds toward defense and domestic economic issues. While ODA briefly surged in response to the COVID-19 pandemic and the war in Ukraine, that uptick masked a longer-term downward trend in traditional development funding as a percentage of G7 countries’ economies.

Most G7 nations have failed for years to meet the United Nations Sustainable Development Goals Target 17.2, which called for allocating 0.7 percent of gross national income to ODA. As of 2024, none of them has reached this benchmark. This retreat is particularly troubling given today’s fractured geopolitical and economic landscape. In such times, investing in global partnerships and life-saving aid through ODA is not just a moral imperative—it’s also a strategic one.

Lize de Kruijf is a program assistant at the Atlantic Council’s Economic Statecraft Initiative. 


A major focus heading into the G7 Summit will be how Carney handles his latest meeting with Trump. The two managed to have a cordial meeting in May, and Carney’s announcement this week that Canada will increase its defense spending could help to placate Trump, who has long complained about Canada’s lagging defense spending.

But Canada is also looking beyond its southern neighbor. Carney has invited the leaders of Australia, Brazil, India, Indonesia, Mexico, South Korea, South Africa, Ukraine, and Saudi Arabia to join him in Alberta. Under former Prime Minister Justin Trudeau, Canada’s relationships with both Saudi Arabia and India reached diplomatic low points. By inviting these leaders, Carney is demonstrating a willingness to reengage partners. In no area is Carney more likely to pursue new partnerships than in the defense sector. Canada stated its desire to join the ReArm Europe Initiative and has signed a major deal for an Australian radar system. Expect Carney to seek new partners as Canada rebuilds its defense capacity, potentially with some of the countries invited to this year’s G7.

Imran Bayoumi is an associate director at the Atlantic Council’s Scowcroft Center for Strategy and Security.


Canada’s hosting of the G7 Summit in Alberta carries exceptional significance amid escalating tensions with the United States. Trump’s attendance, which will mark his first G7 Summit since 2019, signals renewed engagement with Canada. This could spark talks on renegotiating the United States-Mexico-Canada Agreement (USMCA) ahead of the trade deal’s first joint review in July 2026. The timing of the G7 Summit coincides with heightened Canadian nationalism and intense public focus on Canada-US relations, particularly around tariff disputes affecting sectors such as steel.

The Trump-Carney relationship differs markedly from previous dynamics between Trudeau and Trump, potentially enabling more productive G7 cooperation when US foreign policy dominates global conversations. The trilateral presence of Mexican President Claudia Sheinbaum, Trump, and Carney creates an opportunity for preliminary USMCA discussions. However, critical questions emerge: Will Mexico and Canada align against the Trump administration? Will Canada prioritize repairing bilateral US relations over Mexico-Canada ties? The summit’s outcome is likely to significantly shape hemispheric trade relationships and regional diplomatic strategies.

Maite Gonzalez Latorre is a program assistant at the Adrienne Arsht Latin America Center and Caribbean Initiative.


Sophia Busch, Ella Wiss Mencke, Ethan Garcia, and Miguel Sanders contributed to the data visualizations in this article. The data visualization titled “US jobs rely on Mexico and Canada more than any other trade partner” originally appeared in an article by Sophia Busch published on January 16, 2025.

The post Seven charts that will define Canada’s G7 Summit appeared first on Atlantic Council.

]]>
Carole House testifies to House Financial Services Committee on the gaps and opportunities for digital asset regulation https://www.atlanticcouncil.org/commentary/testimony/carole-house-testifies-to-house-financial-services-committee-on-the-gaps-and-opportunities-for-digital-asset-regulation/ Mon, 09 Jun 2025 19:24:32 +0000 https://www.atlanticcouncil.org/?p=852516 On June 6, Senior Fellow Carole House testified to the House Committee on Financial Services at a hearing titled, “American Innovation and the Future of Digital Assets: From Blueprint to a Functional Framework."

The post Carole House testifies to House Financial Services Committee on the gaps and opportunities for digital asset regulation appeared first on Atlantic Council.

]]>
On June 6, Senior Fellow Carole House testified to the House Committee on Financial Services at a hearing titled, “American Innovation and the Future of Digital Assets: From Blueprint to a Functional Framework.” Below are her prepared remarks.

Thank you Chairman Hill, Ranking Member Waters, and distinguished members of the Committee for holding this hearing continuation and the honor of the invitation to testify on the future of digital assets. I applaud your leadership in convening the Committee on this important issue and continuing the years-long efforts of this Committee across several Congresses to evaluate and build legislation around a clear, comprehensive, and competitive cryptocurrency regulatory framework. I hope my testimony will be helpful in considering some of the most important aspects of frameworks needed to drive innovation in a secure, competitive, safe, and sound digital finance ecosystem that reinforces national security interests, defends consumers, and preserves personal liberty.

I have spent my career working at the intersection of national, economic, and technological security. I have spent two tours at the National Security Council (NSC) leading cryptocurrency initiatives; led crypto and cybersecurity policy at the US Financial Crimes Enforcement Network (FinCEN), the US anti-money laundering and countering financing of terrorism (AML/CFT) regulator; and served on advisory boards for the US Commodity Futures Trading Commission (CFTC), the Idaho Department of Finance, and the New York Department of Financial Services (NYDFS). Over recent years, I have observed massive growth, collapses, experimentation, exploitation, and innovation across the digital asset market. Of course, innovation and exploitation in finance are not unique to digital assets, and the risks and benefits of one blockchain system are not equivalent across all assets — they depend significantly on the design and features of specific systems. To make best use of the benefits and mitigate the critical risks, we need to ensure that technology, operations, and policy are aligned along critical safeguards and also with driving competitive and liquid US markets.

That brings us to this critical juncture – the current alignment and implementation of protections in digital assets is not working. The status quo has not benefited consumers, markets, or national security. As just one example, the largest heist in history just occurred in February of this year targeting this sector, perpetrated by North Korean actors as part of their revenue generation to fund activities like their proliferation program. This incident also was not in a vacuum but instead was yet another cyber theft as part of a years-long building trend in this industry exploiting both pervasive cybersecurity and AML/CFT vulnerabilities. This is just one example, which sits alongside highly volatile markets that have lost trillions and defrauded consumers, but also an environment that is reportedly set to drive the best developers abroad rather than inspiring them to stay here and build to agreed upon guardrails. Inaction by both government and industry will not achieve desired outcomes for protecting consumers or businesses.

I applaud Congress for continuing to elevate the issue of digital asset legislation to ensure appropriate regulation in the United States. Despite calls from some to avoid regulation of digital assets that may seemingly legitimize an immature sector, I maintain that regulation is critical to give a north star that demands legitimate and responsible activity within an industry with many actors who aim to bring positive evolutions in finance and cryptocurrency. Regulation also provides legitimate authorities and levers to supervisors and enforcement agencies to hold accountable illicit actors that seek to defraud consumers, launder criminal proceeds, and undermine the integrity of the US financial system. As I have testified to previously, clear and comprehensive guardrails are necessary to protect consumers, national security, and US competitiveness in financial innovation. While timely progress is critical after several Congresses being unable to establish a comprehensive approach, these frameworks must also be deliberate, thoughtful, and comprehensive of the real and present risks, as well as opportunities, that we have observed in the digital asset ecosystem and broader financial system.

The stated goals of the Digital Asset Market CLARITY Act of 2025 (the “Clarity Act”) to help address regulatory gaps and to provide clarity for an industry seeking it are laudable. Unfortunately, the tenets of the proposed legislation as drafted appear to be overly complex, forging notable gaps for coverage under consumer and market protections rather than closing them; leave insufficiently or unaddressed key areas like meaningful implementation and enforcement measures, countering illicit finance, and cybersecurity; and depart from the long bipartisan-stated principles of technology-neutrality that would enable regulations to persist in the face of technological innovations.In my testimony, I briefly offer opportunities for addressing those issues and preserving a framework built on the key pillars of sound market regulation and national security interests. I draw many of these recommendations from the groundbreaking work of the Commodity Futures Trading Commission (CFTC) Technology Advisory Committee (TAC), where I co-chaired a group of 19 incredible industry, government, and academic experts to produce a first-ever comprehensive review of risks and opportunities in decentralized finance (DeFi), with outlined steps for policymakers to take build the framework for DeFi. I encourage legislators to consider these measures especially where existing digital asset market structures differ from traditional financial market structure, and urge you to be extremely deliberate when choosing to depart from long-tested principles needed to preserve integrity of markets, such as consumer protections, resilience against exploitation and shocks, and addressing separations of functions and conflict of interests.

Regulatory gaps and potential for confusion

As I mentioned above, seeking to provide regulatory clarity, in both authority and application, are important at this critical juncture. It will establish clear rules of the road for responsible actors to engage and innovate in the space as well as ensure strong footing for regulators and enforcement agencies to oversee markets and investigate wrongdoing. A clear framework will also (finally) help level the playing field for US firms that have long been more compliant than many foreign-operating cryptocurrency businesses that exploited their savings in non-compliance as a competitive advantage against more responsible US companies.

The Clarity Act as currently written attempts to provide clarity through defining regulatory jurisdictional bounds between the Securities Exchange Commission (SEC) and CFTC as well as defining key terms of assets to establish scope of coverage as securities versus digital commodities. The bill also includes some important protection measures, specifically around areas like segregation of customer assets, limited disclosures such as around token structure and conflicts of interest, and registration requirements.

However, the Clarity Act is still absent many important protections that we have observed to be critical to protect consumers and markets in the wake of a crisis. Within the 236 pages of the bill are confusing and ambiguous definitions and missing elements that pave the way for regulatory arbitrage and exploitation:

  • No clear non-securities spots market authority: This bill does not appear to clearly outline authority over spots markets for assets that are not securities. The definition of “digital commodity” may be restrictive insofar as to only cover a limited set of tokens, which would leave potentially hundreds of tokens unregulated and/or without clear guidance on its applicability even if they function as financial assets.
  • Unclear definitions and impacts on securities laws: There are various definitions in the bill whose challenges with clarity may subvert the drafters’ intent to provide clarity and defend against regulatory arbitrage. Some definitions may be seen to be crafted to frame large exemptions from responsibility decentralized finance, such as in defining concepts like groups and common control in a a “decentralized governance system,” which in the bill is a system where participation (not even active involvement, just the pretext of participation) is “not limited to or under the effective control of, any person or group of persons under common control.” In another example, the bill treats assets called “investment contract assets” as digital commodities, though “investment contracts” have generally been a key element of securities laws.
  • Conflating decentralization and maturity: The test for decentralization in the bill is described as a test of blockchain maturity. In a sector where projects that are (or at least claim to be) decentralized are being targeted and exploited for weaknesses in their code, cybersecurity, and irrevocability of mistakes or illicitly acquired assets, it is confusing on why a greater extent of decentralization — a concept that is also vague in the bill — inherently means maturity rather than other markers of good governance and operations. The decentralization test also introduces some confusion that may challenge real-world implementation, and is unclear on how such a feature impacts an asset functioning like a commodity versus a security. Current and former regulatory leadership has warned against arbitrary carve-outs of protections like under securities laws simply based on complex issues like decentralization that so far have largely been met with convoluted definitions that risk exemption significant amounts of high-risk investment-related activity. This also threatens potentially creating the opposite of a future-proofed regulatory approach that cannot keep up with future technological innovation.

National security and the critical role of enforcement

n the wake of serious national security threats like billion+ dollar hacks by rogue nations, growing integration of cryptocurrency as a tool for transnational organized crime, market manipulation and fraud that can threaten system integrity and stability, as well as pressure from adversarial nations seeking to develop and leverage alternative financial systems to weaken and circumvent the dollar, it is clear that strong safeguards, including for US competitiveness, are needed. This framework also demands we ensure policy and enforcement approaches both domestically and internationally create a level playing field for US firms – often the most compliant firms in the world – to be able to compete fairly. Otherwise, the foundation we build these systems on risk faltering, with the potential to not only reap significant harms but also prevent us from harnessing the greatest positive potential that is possible from a secure and innovative digital finance ecosystem.

There is limited discussion of either illicit finance or cybersecurity in the Clarity Act—many more pages are honed on establishing large regulatory carve-outs than on establishing expectations, driving needed industry standards or sponsoring research and development, or appropriating necessary resources to ensure appropriately scaled and timely enforcement of these critical requirements. Also important to note, especially in light of recent changes in enforcement posture—beyond just creating the policy framework, the government and industry must work to apply and enforce the framework. A policy that isn’t enforced or implemented does nothing to benefit consumers nor US firms with stronger compliance programs that have been operating at higher costs and less competitive advantages than many foreign-operating firms.

I have testified previously to the critical needs for strengthening AML/CFT and sanctions authorities in the cryptocurrency space, which generally have been suggested to be saved for “comprehensive market legislation.” Such enhanced protections like appropriations for skilled enforcement and investigative personnel, sharpening tools like 9714/311 designation authorities, ensuring extraterritorial application of regulations and/or through designations of entities of high national security risk, creation of an enforcement strategy to scale timely enforcement against the most egregious violators, or resourcing public-private partnerships like the Illicit Virtual Asset Notification (IVAN) program are missing from the legislation but could be easily added in to help strengthen the holistic cryptocurrency framework. In the face of disbanding of the Department of Justice (DOJ) National Cryptocurrency Enforcement Team (NCET)14 and significant downsizing and weakening of enforcement offices and personnel across the US Government, the legislation could help ensure that tools are being honed to better address the worst actors in the space. Only with meaningful enforcement can policy be truly impactful and can we reward the best actors in the space, which are typically American companies.

An alternative approach for consideration – Joint, targeted, adaptable, and balanced

I support calls for a legislative solution that enables nuance and distinct treatment across various assets based on their economic function and which will ensure persistent clarity and flexibility for regulators to address significant risks of fraud, manipulation, and investor exploitation that we have seen in the space. The legislation should also guide regulators with key principles, many of which are similar to those outlined in the Clarity Act, and should be done in full view of the benefits that some aspects of digital assets uniquely provide, such as an unprecedented level of market transparency for on-chain financial activity to enable greater market surveillance and oversight.

An alternative approach may help meet the intent of the drafters while giving time for greater exploration and experimentation while meeting near-term calls for the most beneficial transparency needs of the market, which I have observed to most consistently be calls for a clear pathway to registration. I encourage policymakers to consider a much more streamlined approach if a more complex bill proves too difficult to reconcile:

  • Dual rulemaking: Similar to efforts undertaken in the wake of the 2008 Financial Crisis and pursuant to the joint rulemaking efforts directed in Title VII of Dodd Frank, Congress could again direct the SEC and CFTC to jointly develop a framework and rulemakings to give greater specificity and adaptability to approaches to ensure appropriate coverage but at least one of the markets regulators.
  • Mandate for sandboxes and clear registration pathways: In the interim while the SEC and CFTC craft their approach, Congress could direct a near-term establishment via sandboxes, provisional registrations, and other requirements with clear guardrails to help ensure clear near-term coverage while giving the time needed to thoughtfully evaluate the more complex issues like dual-registered entities, defining tokens, defining the jurisdictional hand-off, and how to address DeFi. Policymakers should consider looking to the United Kingdom’s current joint efforts between the Bank of England and the FCA under the Digital Securities Sandbox for inspiration.
  • Clarify commodity spots market authorities: The legislation should specify clearly authority to the CFTC over commodity spots markets, or at a minimum digital commodity spots markets.
  • Explicit appropriations and mandate for additional AML/CFT and cybersecurity initiatives: The legislation would also optimally integrate near-term resourcing, not just authorizations, to ensure the ability to effectively police bad actors in the system, which should include the earlier-referenced initiatives like expanded targeting authorities, appropriations, public-private partnerships, and cybersecurity and information sharing standards.
  • Undertake steps to address the regulatory perimeter and controls with DeFi: Finally, legislators should direct the SEC and CFTC to jointly undertake the steps recommended by the CFTC TAC in evaluating how to evolve market structure in addressing issues like the unique constructs in DeFi. These steps include mapping ecosystem players, processes, and data; assessing compliance and requirements gaps; identifying risks; evaluating options, benefits, and costs of changes to the regulatory perimeter, and surging research and development and standards partnerships.

With guardrails established and more consistent oversight by Congress, this approach, implemented through administrative procedure and thoughtful regulation with public engagement, I think is likely the best way to achieve a comprehensive and enduring framework.

In closing, I’d like to again underscore my gratitude for the honor of the opportunity to speak with you all today. It is critical that the United States make timely progress on establishing and implementing cryptocurrency regulatory frameworks, which should leverage years of effort on defining critical holistic protections that also reinforce the central role in the financial system and as a leader in technological innovation.

Thank you.

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post Carole House testifies to House Financial Services Committee on the gaps and opportunities for digital asset regulation appeared first on Atlantic Council.

]]>
G7 leaders have the opportunity to strengthen digital resilience. Here’s how they can seize it. https://www.atlanticcouncil.org/blogs/geotech-cues/g7-leaders-have-the-opportunity-to-strengthen-digital-resilience-heres-how-they-can-seize-it/ Fri, 06 Jun 2025 17:10:35 +0000 https://www.atlanticcouncil.org/?p=852065 At the upcoming Group of Seven Leaders’ Summit in Canada, member state leaders should advance a coherent, shared framework for digital resilience policy.

The post G7 leaders have the opportunity to strengthen digital resilience. Here’s how they can seize it. appeared first on Atlantic Council.

]]>
The 2025 Group of Seven (G7) Leaders’ Summit in Kananaskis, Alberta, Canada, on June 15-17 will take place amid a growing recognition of the importance of digital resilience. This is especially apparent in Canada, the summit’s host country and current G7 president. Following his election win, Canadian Prime Minister Mark Carney announced the creation of a new Ministry of Artificial Intelligence and Digital Innovation. This bold step positions Canada to champion a digital resilience agenda at the summit that unites security, economic growth, and technological competitiveness while strengthening the resilience of its partners and allies.

The G7 must seize this opportunity to advance a coherent, shared framework for digital policy, one that is grounded in trust, reinforced by standards, and aligned with democratic values. To do so, it can build on some of the insights from the Business Seven (B7), the official business engagement group of the G7. The theme of this year’s B7 Summit, which was held from May 14 to May 16, in Ottawa, Canada, was “Bolstering Economic Security and Resiliency.” The selection of this theme emphasized the importance of defending against threats and enhancing the ability of societies, governments, and businesses to adapt and recover.

In the spirit of that theme, the Atlantic Council’s GeoTech Center, in partnership with the Cyber Statecraft Initiative and the Europe Center, convened a private breakfast discussion alongside the B7 in Ottawa on May 15. The roundtable brought together government officials, business leaders, and civil society representatives to discuss how digital resilience can be strengthened within the G7 framework. The participants laid out foundational principles and practical approaches to building digital resilience that support economic security and long-term competitiveness. As G7 leaders gather for the summit in Kananaskis later this month, they should consider these insights on how its member states can work together to bolster their digital resilience.

1. Develop a common language for shared goals on digital sovereignty

When developing a common framework, definitions (or taxonomy) are critical. Participants emphasized that shared vocabulary is a prerequisite for meaningful cooperation. Discrepancies in how countries define concepts such as digital sovereignty can lead to fundamental misunderstandings in critical areas such as risk, which creates friction and confusion.

For example, a G7 country might frame sovereignty in terms of national control over infrastructure while another country, such as China, defines it as regulating the digital information environment. In that case, this misalignment will hinder cooperation from the outset. Specifying precise definitions of each government’s goals, including “trust,” “resilience,” and “digital sovereignty,” would enable governments and industry to align on priorities and respond more effectively to emerging standards. This definitional clarity is crucial for policymaking and a prerequisite for compliance, implementation, and interoperability across borders.

2. Build on existing multilateral and regional frameworks

Participants stressed the importance of building on existing progress toward digital resilience, both in and out of the G7, rather than discarding it in pursuit of novelty. The G7 and its partners already possess a strong foundation of digital policy initiatives. Key milestones such as the Hiroshima AI Process, launched under Japan’s 2023 G7 presidency, established International Guiding Principles and an International Code of Conduct for the development and use of artificial intelligence (AI) systems, which included frontier models. Prior to the Hiroshima AI Process, several consecutive G7 Summits committed to developing the data free flow with trust framework, which prioritizes enabling the free flow of data across borders while protecting privacy, national security, and intellectual property.

Beyond the G7, participants cited European Union (EU) partnerships as examples of forward-leaning policy environments that balance innovation with safeguards. These included the EU AI continent action plan, which aims to leverage the talent and research of European industries to strengthen digital competitiveness and bolster economic growth, as well as Horizon Europe, the EU’s primary financial program for research and innovation.

With these partnership frameworks already in place, G7 leaders should build on existing work and avoid seeking to design unique solutions that may become time-consuming—particularly when it comes to gaining political buy-in. Even in areas like AI and the use of data, where policymakers have observed rapid changes since last year’s summit, the B7 discussion participants emphasized that governments can leverage work they’ve already completed in designing and implementing existing standards. If prior technical standards and regulations are inapplicable or insufficient, policymakers can still learn lessons from an in-depth assessment, including by taking note of where they’ve fallen short of their goals.

3. Start new initiatives with small working groups and pilot projects  

Ensuring digital resilience requires managing inevitable trade-offs between national security, economic vitality, and open digital ecosystems. As one participant remarked, “the digital economy is the economy,” so policies shaping cyberspace must consider both national security and economic impacts. The G7 provides a platform for frank discussions among allies and partners about how to get these trade-offs right. But waiting for buy-in from all like-minded partners risks missed opportunities in the short term.

Participants noted that by starting with smaller forums, policymakers can build consensus that can lead to real progress. Pilot projects and working groups among smaller clusters of G7 countries could build momentum and inform scalable solutions. Participants emphasized that despite the contentious nature of some of the issues surrounding digital resilience, such as protectionism and market fragmentation, G7 governments are operating with a shared set of values. These values can motivate collaboration across the G7 on the many areas of common ground they already share, but they can also provide the basis for projects among smaller groups within the G7 to get new ideas off the ground.

A pivotal summit for digital resilience

As G7 leaders meet in Kananaskis and work toward a common framework that balances digital security and economic growth, a few key lessons can be garnered from this B7 meeting. G7 member states should prioritize developing a common taxonomy and building on the progress made on digital resilience both inside and outside the G7, all while remaining responsive to shifting geopolitical dynamics.

Disagreements among member states should be viewed not as a barrier, but as evidence of a maturing policy landscape. Constructive tension can drive refinement so long as partners are clear about their priorities. The G7’s unique value lies in its ability to forge alignment among diverse actors. False consensus only delays progress. It will take transparency, specificity, and trust to move the digital resilience agenda forward.


Sara Ann Brackett is an assistant director at the Atlantic Council’s Cyber Statecraft Initiative.

Coley Felt is an assistant director at the Atlantic Council’s GeoTech Center.

Raul Brens Jr. is the acting senior director of the Atlantic Council’s GeoTech Center.

Further Reading

The GeoTech Center champions positive paths forward that societies can pursue to ensure new technologies and data empower people, prosperity, and peace.

The post G7 leaders have the opportunity to strengthen digital resilience. Here’s how they can seize it. appeared first on Atlantic Council.

]]>
For dollar-backed stablecoins to be truly stable, the US needs to set international standards https://www.atlanticcouncil.org/blogs/new-atlanticist/dollar-backed-stablecoins-international-standards/ Tue, 03 Jun 2025 19:43:47 +0000 https://www.atlanticcouncil.org/?p=851203 The current patchwork of regulations around the globe creates more confusion, more friction in payments, and ultimately higher costs for consumers.

The post For dollar-backed stablecoins to be truly stable, the US needs to set international standards appeared first on Atlantic Council.

]]>
For all the debate about trade wars and flight away from the dollar in the aftermath of the April 2 “liberation day,” a more immediate challenge for many financial policymakers is actually a rush toward the dollar triggered by the global demand for dollar-backed stablecoins.

That’s why the world’s financial leaders are closely watching the debate playing out in Congress right now over the future of stablecoin legislation. Next week, the Senate will likely take up the GENIUS Act, which will define the responsibilities for US stablecoin issuers and clarify who is responsible for oversight. 

Stablecoins are cryptocurrencies whose values are pegged to a specific underlying asset. This makes them “stable”—at least in theory.

Currently, 98 percent of stablecoins are pegged to the US dollar, but over 80 percent of stablecoin transactions happen outside the United States. 

Countries around the world are taking notice. In April, Italy’s finance minister, Giancarlo Giorgetti, said that new US policies on dollar-backed stablecoins present an “even more dangerous” threat to European financial stability than tariffs. His argument was that access to dollars without needing a US bank account would be attractive to millions of people and could undermine the effectiveness of monetary policy not just in Europe but around the world.

In many ways, it’s an old problem with new technology. Dollarization—the situation where citizens in another country try to swap their local currency for dollars—has been a risk in emerging markets and developing economies for decades. In the early 2000s, for example, a range of countries from Ecuador to Zimbabwe to Argentina had difficulty managing the demand for dollars instead of local currency. In each situation, years of economic pain followed in these countries. 

Now stablecoins are making it cheaper and easier for people around the globe to get ahold of what is still the single most in-demand asset in the world.

Now stablecoins are making it cheaper and easier for people around the globe to get ahold of what is still the single most in-demand asset in the world.

Instead of the old way of having to go to a bank and exchange local currency for US dollars, which is time consuming and often involves significant fees, stablecoins make dollars seamlessly available to anyone with a cell phone.

US officials argue that this benefits the United States. When I interviewed Federal Reserve Governor Christopher Waller, who oversees payments at the central bank, about this issue in February, he said that stablecoins “could be in any fiat currency,” such as pounds or euros, “but everyone wants dollar-denominated stablecoins.” He added that “if we can get good regulation, allow these things to go out, this will only strength the dollar as a reserve currency.”

Waller’s point was that if stablecoin issuers need to back up their coins with Treasuries or other liquid assets, the increase in stablecoin usage around the world will generate even higher demand for dollars. The whole point of a stablecoin is that you can fully convert it into a dollar if you want to—meaning the issuers need to have those dollars on hand.

US Treasury Secretary Scott Bessent has put it even more bluntly. “We are going to keep the US the dominant reserve currency in the world, and we will use stablecoins to do that,” he said in March.

If so, the United States should tread cautiously. 

The global proliferation of stablecoins means that some companies will take advantage of the demand and issue stablecoins that claim they are digital versions of the dollar but in reality aren’t fully backed by dollars.   

If that company failed, it wouldn’t just cost consumers their savings. It could trigger a run on all kinds of financial assets.

Think back to the collapse of the algorithmic stablecoin TerraLuna in 2022. Over $45 billion in value for TerraLuna holders was wiped out within a week. But since that time, stablecoin volumes have increased across the world by over 60 percent

The current patchwork of regulations around the globe creates more confusion, more friction in payments, and ultimately higher costs for consumers. 

Already, that’s what’s happening. As new research from the Atlantic Council GeoEconomics Center shows, some countries want to create their own central bank digital currencies to compete with stablecoins, while other countries are trying to regulate the wallets that hold stablecoins. 

Instead of waiting for new regulatory fences to be built up in the coming years, the United States should show that it recognizes the concerns other countries have about dollar-backed stablecoins. The legislation in front of Congress helps domestically by creating transparency and reporting requirements, but it does little internationally.

This is where the Group of Twenty (G20) comes in. The United States has a golden opportunity to help set international standards around digital assets, including the risks and regulations associated with stablecoins, during its G20 presidency next year. A key first step would be creating a new G20 payments roadmap. 

A first roadmap was agreed to in 2020 and delivered important innovations on faster payments. But technology has rapidly changed in the past five years, and it’s time for an upgrade. 

If the United States made stablecoins a focus this year, it would raise the bar across the world and ensure that dollar-backed stablecoin users in all countries are getting what they bargain for—an actual dollar—instead of an imitation of one. 

The rest of the world will welcome US leadership in this space and will take it as a sign that, at least when it comes to the future of the dollar, the United States is not looking to export instability.


Josh Lipsky is the chair of international economics at the Atlantic Council and senior director of the Atlantic Council’s GeoEconomics Center. 

The post For dollar-backed stablecoins to be truly stable, the US needs to set international standards appeared first on Atlantic Council.

]]>
Cryptocurrency Regulation Tracker cited by GIR on the regulatory landscape for cryptocurrencies https://www.atlanticcouncil.org/insight-impact/in-the-news/cryptocurrency-regulation-tracker-cited-by-gir-on-the-regulatory-landscape-for-cryptocurrencies/ Tue, 27 May 2025 14:32:35 +0000 https://www.atlanticcouncil.org/?p=850695 Read the full article

The post Cryptocurrency Regulation Tracker cited by GIR on the regulatory landscape for cryptocurrencies appeared first on Atlantic Council.

]]>
Read the full article

The post Cryptocurrency Regulation Tracker cited by GIR on the regulatory landscape for cryptocurrencies appeared first on Atlantic Council.

]]>
Unpacking Russia’s cyber nesting doll https://www.atlanticcouncil.org/content-series/russia-tomorrow/unpacking-russias-cyber-nesting-doll/ Tue, 20 May 2025 10:00:00 +0000 https://www.atlanticcouncil.org/?p=842605 The latest report in the Atlantic Council’s Russia Tomorrow series explores Russia’s wartime cyber operations and broader cyber web.

The post Unpacking Russia’s cyber nesting doll appeared first on Atlantic Council.

]]>

Russia’s full-scale invasion of Ukraine in February 2022 challenged much of the common Western understanding of Russia. How can the world better understand Russia? What are the steps forward for Western policy? The Eurasia Center’s new “Russia Tomorrow” series seeks to reevaluate conceptions of Russia today and better prepare for its future tomorrow.

Table of contents

When the Russian government launched its full-scale invasion of Ukraine on February 24, 2022, many Western observers braced for digital impact—expecting Russian military and security forces to unleash all-out cyberattacks on Ukraine. Weeks before Moscow’s full-scale war began, Politico wrote that the “Russian invasion of Ukraine could redefine cyber warfare.” The US Cybersecurity and Infrastructure Security Agency (CISA) worried that past Russian malware deployments, such as NotPetya and WannaCry, could find themselves mirrored in new wartime operations—where the impacts would spill quickly and globally across companies and infrastructure. Many other headlines and stories asked questions about how, exactly, Russia would use cyber operations in modern warfare to wreak havoc on Ukraine. Some of these questions were fair, others clearly leaned into the hype, and all were circulated online, in the press, and in the DC policy bubble ahead of that fateful February 24 invasion.

As the Putin regime’s illegal war unfolded, however, it quickly belied these hypotheses and collapsed many Western assumptions about Russia’s cyber power. Russia didn’t deliver the expected cyber “kill strike” (instantly plummeting Ukraine into darkness). Ukrainian and NATO defenses (insofar as NATO has spent considerable time and energy to support Ukraine on cyber defense over the years) were sufficient to (mainly) withstand the most disruptive Russian cyber operations, compared at least to pre-February 2022 expectations. And Moscow showed serious incompetencies in coordinating cyber activities with battlefield kinetic operations. Flurries of operational activity, nonetheless, continue to this day from all parties involved in the war—as Russia remains a persistent and serious cyber threat to the United States, Ukraine, and the West. Russia’s continued cyber activity and major gaps between wartime cyber expectations and reality demand a Western rethink of years-old assumptions about Russia and cyber power—and of outdated ways of confronting the threats ahead.

Russia is still very much a cyber threat. Patriotic hackers and state security agencies, cybercriminals and private military companies, and so on blend together with deliberate state decisions, Kremlin permissiveness, entrepreneurialism, competition, petty corruption, and incompetence to create the Russian cyber web that exists today. The multidirectional, murky, and dynamic nature of Russia’s cyber ecosystem—relying on a range of actors, with different incentives, with shifting relationships with the state and one another—is part of the reason that the Russian cyber threat is so complex.

Policymakers in the United States as well as allied and partner countries should take at least five steps to size up and confront Russia’s cyber threat in the years to come:

  • When assessing the expectations-versus-reality of Russia’s wartime cyber operations, distinguish between capabilities and wartime execution.
  • Widen the circle of analysis to include not just Russian state hackers but the broader Russian cyber web, including patriotic hackers and state-coerced criminals.
  • Avoid the trap of assuming Russia can separate out cyber and information issues from other bilateral, multilateral, and security-related topics—maintaining its hostility toward Ukraine while, say, softening up on cyber operations against the United States.
  • Continue cyber information sharing about Russia with allies and partners around the world.
  • Invest in cyber defense and in cyber offense where appropriate.

Russia’s cyber ecosystem

Russia is home to a complex ecosystem of cyber actors. These include military forces, security agencies, state-recruited cybercriminals, state-coerced technology developers, state-encouraged patriotic hackers, self-identified patriotic hackers acting of their own volition, and more. Even Russian private military companies offer cyber operations, signals intelligence (SIGINT), and other digital capabilities to their clients. Together, these actors form a large, complex, often opaque, and dynamic ecosystem. The Kremlin has substantial power over this ecosystem, both guiding its overall shape (such as permitting large amounts of cybercrime to be perpetuated from within Russia) and leveraging particular actors as needed (discussed more below). Simultaneously, decisions aren’t always top-down, as entrepreneurial cybercriminals and hackers—much like “violent entrepreneurs” in Russian business and crime, or the “adhocrats” vying for Putin’s ear to pitch ideas—take initiative, build their own capabilities, and sell them to the state as well.

The relationships that different security agencies, at different levels, in different parts of the country and world, have with Russian hackers also vary over time. A local security service office might provide legal cover to a group of criminal hackers one day (after the necessary payoffs change hands, of course), only for a Moscow-based team to recruit them for a state operation the next. While the Kremlin has a sort of “social contract” with hackers—focus mainly on foreign targets; don’t undermine the Kremlin’s geopolitical objectives; be responsive to Russian government requests—its tolerance for a specific cybercriminal group can change on a whim, too. Security officials might take a bribe from a cybercriminal, much as their colleagues do on the regular, and still find their patrons in prison and their own wrists in handcuffs.

On the Russian government side, the principal units involved in offensive cyber operations are the Federal Security Service (FSB), the military intelligence agency (GRU), and the Foreign Intelligence Service (SVR). Russia does not have a proper, centrally coordinating cyber command; it was never launched despite attempts in the 2010s. The Ministry of Defense’s initial efforts to make one happen by circa 2014 were, it came to be understood later, overtaken by the subsequent establishment of Information Operations Troops with seemingly some coordinating functions—though experts still debate its analogousness to a “cyber command” and its level of shot-calling compared to bodies like the Presidential Administration. So while it is possible for the Russian security agencies to coordinate their (cyber) operations with one another, their engagements are marked more by competition than cooperation.

The most prominent example of this potential overlap or inefficiency is when GRU-linked APT28 and SVR-linked APT29 both hacked the Democratic National Committee in 2016, making it unclear whether each knew the other was carrying out a similar campaign. This operational friction is exacerbated by the fact that the agencies’ general remits—SVR on human intelligence, for instance, and FSB mostly domestic—do not translate to the digital and online world. All three agencies hack military and civilian targets and, for example, the FSB actively targets and hacks organizations outside of Russia’s borders. Each agency approaches cyber operations differently, too, often in line with their overall institutional cultures—such as the GRU, known for its brazen kinetic operations including sabotage and assassination, carrying out the boldest and most destructive cyber operations, contrasted with the SVR, and its emphasis on secrecy, focusing on quiet cyber intelligence gathering like in the SolarWinds campaign. Still, the Russian state agencies with cyber operations remain active threats to the United States, Ukraine, the West, and plenty of others through intelligence-gathering efforts, disruptive operations, and efforts that meld both, such as hack-and-leak campaigns.

Beyond government units themselves, the state encourages patriotic hackers—sometimes just young, technically proficient Russians—to go after foreign targets through televised and online statements (such as disinformation about Ukraine). Different security organizations, such as the FSB, may hire cybercriminals for specific intelligence operations and pay them based on the targets they penetrate. Other private-sector companies pitch their own services to the state of their own volition, bid on government contracts, and support a range of offensive capability development, research and development, and talent cultivation efforts (including defensive activities and benign or even globally cybersecurity-positive activities beyond the scope of this paper). Russian private military companies increasingly offer capabilities related to cyber and SIGINT to their private and government clients around the world, too. All the while, the state retains the capability to target specific people and companies in Russia that otherwise have nothing to do with the state, apply the relevant pressure, and compel them to assist with state cyber objectives, which it can wield to extraordinary effect.

As the historian Stephen Kotkin notes, “The Russian state can confound analysts who truck in binaries.” While there are several core themes to this ecosystem—complexity; state corruption; overwhelming tolerance for and even tacit support of cybercrime; myriad offensive cyber actors in play—Russia’s cyber ecosystem neither fits into a neat box nor is a neatly run one at that.

For all the threats these actors pose to Ukraine and the West, assuming that the Putin regime controls all cyber activity emanating from within Russia’s borders is not just inaccurate (e.g., the country’s too big; there are too many players; it’s not all top down), but is the kind of assumption that serves as a “useful fiction” for the Kremlin. It makes the system appear ruthlessly efficient and coordinated, gives disconnected or tactically myopic actions a veneer of larger strategy, and puts Putin at the center of all cyber operation decision-making. Thinking as much can, intentionally or not, further feed into the idea that the Kremlin’s motives are clear and fixed or driven by some kind of “hybrid war” strategy. It also obscures the fact that—unlike many Western countries that do, in fact, publish official “cyber strategies”—Russia does not have a defined cyber strategy document, instead drawing on a range of documents and sweeping “information security” concepts to frame information, the internet, and cyber power.

On the contrary, it is the multidirectional, murky, and dynamic nature of Russia’s cyber ecosystem that makes cyber activity subject to sudden change, feeds opportunities for interagency rivalries, contributes to effects-corroding corruption and competition, and provides the Kremlin with a spectrum of talent, capabilities, and resources to tap, direct, and deny (plausibly or implausibly) as it needs. It is in part this dynamism and multidirectional nature that makes Russia’s cyber threat so complex—as mixes of deliberate state decisions, Kremlin permissiveness, entrepreneurialism, competition, petty corruption, and incompetence blend together to create the Russian cyber web that exists today. Relationships between the state proper, at different levels, in different organizations, with nonstate cyber affiliates are often shifting; ransomware groups persistently targeting Western critical infrastructure, for example, may be prolific for months before collapsing under internal conflict and reconstituting into new groups, with new combinations of the old tactics and talent. It is also the reason that what is known to date about cyber operations during Russia’s full-out war on Ukraine provides such a valuable case study in assessing the status quo of this ecosystem—and, coupled with lessons from past incidents (like Russian cyberattacks on Estonia in 2007, Georgia in 2008, and Ukraine in 2014), helps to better weigh the future threat.

What happened to Russia’s cyber might?

Cyber operations have played a substantial role in Russia’s full-on invasion of Ukraine in February 2022 and the ensuing war. These activities range from distributed denial of service (DDoS) attacks knocking Ukrainian websites offline and Ukrainian patriotic hackers’ attacks on Russian government sites (what Kyiv calls its “IT Army”) to Russia using countless malware variants to exfiltrate data and targeting Ukrainian Telegram chats and Android mobile devices. Without getting into a timeline of every major operation—neither this paper’s focus nor possible given limits on public information—it is clear that Russian and Ukrainian forces and their allies, partners, and proxies have made cyber operations part of the war’s military, intelligence, and information dimensions.

There are many ways to define cyber power, which is by no means limited to offensive capabilities. In Russia’s case, analysts could focus on anything from Russia’s national cyber threat defense system—the Monitoring and Administration Center for General Use Information Networks (GosSOPKA), which effectively brings together intrusion detection, vulnerability management, and other technologies for entities handling sensitive information—to the enormous IT brain drain problems the country suffered immediately following the full-on invasion of Ukraine. As explored in a study last year for the Atlantic Council, Russia’s growing digital tech isolationism—both a long-standing goal and increasing reality for the Kremlin—has driven more independence in some areas, like software, while heightening dependence and strategic vulnerability in others, such as dependence on Chinese hardware. This paper’s focus, though, will remain on Russia’s offensive capabilities.

Pre-February 2022 expectations in the United States and the West, as highlighted above, were dominated by those predicting extensive Russian disruptive and destructive cyber operations. In these scenarios, Russia would leverage its state, state-affiliated, state-encouraged, and other capabilities to cause serious damage to Ukrainian critical infrastructure (telecommunications, water systems, energy grids, and so forth) and cleanly augment its kinetic onslaught. Russia would “employ massive cyber and electronic warfare tools” to collapse Ukraine’s will to fight through digital means.

To be sure, some predictions were more measured. Some pointed to the 2008 Russo-Georgian War, as an illustration of Russian forces effectively using DDoS attacks (Moscow’s shatter-communications approach) in concert with disinformation and kinetic action to prepare the battlefield, and conjectured that Moscow would do the same if it moved troops further into Ukraine. Others highlighted Russia turning off Ukrainian power grids as a possible menu option for Moscow as it escalated. Cybersecurity scholars Lennart Maschmeyer and Nadiya Kostyuk, contrary to widely held positions, argued two weeks before Russia’s full-scale invasion that “cyber operations will remain of secondary importance and at best provide marginal gains to Russia,” incisively noting that press headlines talking of “cyber war” rest on “the implicit assumption that with the change in strategic context, the role of cyber operations will change as well.” The overwhelming sentiment, though, was worry and anticipation of what some considered true, cyber-enabled, twenty-first century warfare.

But the cyber operations that unfolded immediately before and after the February 2022 invasion defied what many Western (including American) commentators were predicting. Russia didn’t deliver the cyber kill strike expected (instantly plummeting Ukraine into darkness). Ukrainian and NATO defenses were sufficient to (mainly) withstand the most disruptive FSB and GRU cyber operations, compared at least to pre-February 2022 expectations. And Moscow showed serious incompetencies in coordinating cyber activities with battlefield kinetic operations. Many experts who did not expect cyber-Armageddon per se have still been surprised by the limited impact of Russian attacks, the focus on wiper attacks (that delete a system’s data via malware) and data gathering over critical infrastructure disruptions, and apparent poor coordination between cyber and kinetic moves made by the Russian Armed Forces and intelligence services.

What, then, explains the gulf between expectations—decisive moves, cleanly executed operations, and visible results—and reality, with some operations, certainly, but the overwhelming focus on kinetic activity and far less on destructive cyber movement than anticipated? Scholars and analysts have, since February 2022, put forward several buckets of hypotheses.

Various commentators argue, as National Defense University scholar Jackie Kerr compiles and breaks down, that Russia’s weak integration of cyber into offensive campaigns was symptomatic of broader problems with Russian military preparations for full-on war; that Western observers simply overestimated Russia’s cyber capabilities; that poor coordination and competition between Russian security agencies impeded operational success; or that Ukraine’s cyber defenses have been extraordinarily robust. Some have gone so far as to attribute Ukrainian cyber defenses, backed up by Western allies and partners, as the primary reason for Russian offensive failures. Russia cyber and information expert Gavin Wilde argues that Russia focused on countervalue operations (against civilian infrastructure, to demoralize political leaders and the public) more than counterforce operations (against Ukrainian military capabilities), to little effect, “a sign of highly sophisticated intelligence tradecraft being squandered in service of a deeply flawed military strategy.”

Professors Nadiya Kostyuk and Erik Gartzke write that Russia’s full-on war on Ukraine is about territory and physical control, making physical military activity far more important than cyber operations themselves. Cyber scholar Jon Bateman argues that traditional signals jamming and Russia’s cyberattack against the Viasat satellite communications system, coupled with a chaotic slew of data-deletion attacks, may have helped Russia initially—but that cyber operations from there had diminishing novelty and impact. Russia’s poor strategy, insufficient intelligence preparation, and interagency mistrust have been presented as causes for undermining Russia’s cyber-kinetic strike coordination, too. Others argue that Russians wanted to gather intelligence from Ukrainian systems more than disrupt them, that Russia’s information-focused troops have been more optimized for propaganda than cyber operations, and that cyber scholars’ and pundits’ expectations were plain wrong given that Russia wanted to inflict physical violence on Ukraine more than achieve cyber-related effects—necessitating bombs, missiles, and guns over malware, zero days, and DDoS attacks.

In reality, of course, many factors are likely in play at once. Plenty of the above scholars and commentators recognize this multifactorial situation and say it outright (although a few do push a single prevailing explanation for the war’s cyber outcomes). However, it’s worth explicitly stressing that many factors coexist, in light of occasional efforts to provide reductive explanations for complex wartime activities and effects. Concluding that Russia is no longer a cyber threat, for instance, is wrong. While Ukraine as a country has demonstrated extraordinary will and resilience, and while Ukrainian cyber defenses have been more than commendable, explanations that place the rationale solely on formidable Ukrainian cyber defenses are likewise reductive. Taking such explanations as fact simplifies the many factors involved and can veer analysis and debates away from the policy actions that are still needed, such as continued cyber threat information sharing between the United States and Ukraine.

The above, plausible, evidence-grounded explanations are not mutually exclusive. FSB officers, rife with paranoia, conspiratorialism, and a Putin-pleasing orientation, did indeed grossly misinterpret the situation on the ground in Ukraine in 2022 and fed that bad information to the Kremlin, potentially skewing assessments of cyber options as well.

Interagency competition may very well have undermined, once again, the ability of the FSB, GRU, and SVR to coordinate activities with one another, let alone with the Ministry of Defense and Russian proxies in Belarus, and therefore hampered more effective planning, coordination, and execution of cyber operations. For example, during the war’s initial stages, elements of the SVR may very well have sought to technically gather intelligence from targets that GRU- or FSB-tied criminal groups were indiscriminately trying to knock offline or wipe with malware, thrusting uncoordinated activities into tension.

Like in every other country on earth, Russian cyber operators are additionally subject to resource constraints: A hacker spending a day on breaking into a Ukrainian energy company is a hacker not spending time on spying on expats in Germany or setting up a collaboration with a ransomware group. Competition, therefore, not just between agencies—turf wars, budget fights, who gets the primary jurisdiction over Ukraine, and so forth—but within them, over who gets to spend what time and resources targeting which entities, sit within broader Russian government calculi over cyber, military, and intelligence operations. And, among others, Russia’s overall strategy did lead to bad moves, as Wilde and others have noted, with limited effect and burning away Russian capabilities (like exploits) in the process. Recognizing these many likely factors will facilitate better analysis of where Russia stands.

The gap between the imagined, all-out “cyber war” and the past three years’ reality also begs the question of whether the right metrics were considered in the first place. As much as cyber capabilities are inextricable from modern intelligence operations, and as much as cyber and information capabilities are embedded throughout militaries around the world, war is obviously about far more than cyber as a domain. But experts studying cyber all day, every day, may fall into the unintentional trap (as anyone can) of having their area of study become the focal point of analysis in a war with many moving pieces and considerations—hence, some of the commentary anticipated Russian destruction of Ukraine to happen through code, compared to a range of military weaponry. Academic theories, moreover, of how cyber conflict will unfold in political science-modeled simulations or think tank war games may similarly fail to map to battlefield realities, such as generalizing how cyber fits into warfare without adequately considering unique contexts in a country like Russia. Layered on top of all this—in the academies, in the media, in the data and artificial intelligence (AI) era—is a frequent desire to quantify everything, too, obscuring the fact that not everything can be effectively, quantifiably measured and that counting up the number of observed Russian cyber operations and scoring them may still not get to the heart of their inefficacy. Clearly, as US and Western perspectives on Russian cyber power shift with more information and time, it is worth rethinking Russia’s future cyber power—not just for how the West can recalibrate its assumptions and size up the threats, but in how the West can prepare to act and respond in the future.

Unpacking the (cyber) nesting doll

The takeaway from comparing predictions and reality shouldn’t be that pundits are always wrong or that Russia’s cyber operations are considerably less threatening in 2025. Nor should it be that Ukraine is propped up solely by Western government and private-sector cyber defenses, and that Russia is simply waiting to unleash a devastating cyber operation to end it all.

Russia remains a sophisticated, persistent, and well-resourced cyber threat to the United States, Ukraine, and the West generally. This is not going to change anytime soon. Kremlin-spun “crackdowns” on cybercrime (arrests that were little more than public relations stunts), frenetic talk of US-Russia rapprochement, and wishful thinking about Putin’s willingness to cease subversive activity against Ukraine do not portend, as some might suggest, that the United States can sideline Russia as a central cyber problem—and focus instead on China.

The Russian government views cyber and information capabilities as key to its military and intelligence operations, and the Kremlin still has one top enemy in its national security sights: the United States. Outside the Russian state per se, a range of ransomware gangs and other hackers in Russia will continue targeting companies, critical infrastructure, and other entities in the United States, Ukraine, and the West, too. There are at least five steps US policymakers and their allies and partners should take to size up this threat—against the full scope of Russia’s cyber web and integrating lessons learned so far from Russia’s full-out war on Ukraine—and confront it head-on in the coming years.

When assessing the expectations-versus-reality of Russia’s wartime cyber operations, distinguish between capabilities and wartime execution. Clearly, Russian offensive cyber activity during its full-on war against Ukraine has not matched up against Western assumptions that envisioned a cyber onslaught that turned off power grids, disrupted water treatment facilities, and blacked out communications. Evaluating how and why Russia did not make this happen is critical to understanding Russia’s operational motives, play-by-play planning and coordination between security agencies, targeting interests, and much more. But analysts and media must be careful to avoid thinking that Russia’s cyber capabilities themselves are weak. Clearly, when Russian hackers put the pedal to the metal, so to speak—ransomware gangs targeting American hospitals, or the GRU going after Ukrainian phones—they can deliver serious results. A better approach is policymakers and analysts in the United States, as well as in allied and partner countries, breaking out Russia’s continued cyber threats across ransomware, critical infrastructure targeting, mobile-device hacking, and so on while pairing the capabilities against where execution could fall short in practice. Doing so will give a better sense of Russia’s cyber strengths and weaknesses—and distinguish between the different components of carrying out a cyber operation.

Widen the circle of analysis to include not just Russian state hackers but the broader Russian cyber web, including patriotic hackers and state-coerced criminals. Focusing Western intelligence priorities, academic studies, and industry analysis mainly on Russian government agencies as the primary vector of Russian cyber power loses the importance of the overall Russian cyber web. Putting the focus mostly on Russian government agencies also loses, as my colleague Emma Schroeder has unpacked in detail, the role that public-private partnerships have played in cyber operations and defenses in the conflict, and the opportunity to assess similar public-private dynamics on the Russian side. Conversely, making sure to consider the roles of government contractors, military universities, patriotic hackers, state-tapped cybercriminals, and other actors as described above should help to fight the temptation to treat all Russian cyber operations as top-down—and illuminate the many ways in which Russia can build capabilities, source talent, and carry out operations against the West. Understanding these actors will allow for better tracking, threat preparation, defense, and, where needed, disruption.

Avoid the trap of assuming Russia can separate out cyber and information issues from other bilateral, multilateral, and security-related topics—maintaining its hostility toward Ukraine while, say, softening up on cyber operations against the United States. Whether the US government can or cannot separate out cyber issues vis-à-vis Russia from other elements of the US-Russia relationship (e.g., trade, nuclear security), Western policymakers should avoid the trap of assuming the Russian government is currently capable, let alone willing, of genuinely and seriously doing the same: separating out its cyber activities from other policy and security issues.

The Russian government has come to view the internet and digital technologies as both weapons that can be wielded against the state and weapons to use against Russia’s enemies. In this sense, cyber operations (as well as information operations) are core not just to Moscow’s approach to modern security, military activity, and intelligence operations but, perhaps more importantly, to the Kremlin’s conceptualization of regime security as well. Paranoia and propaganda about fifth columnists (with, sometimes, one feeding the other), persistent efforts to crack down on the internet in Russia, and a continued belief that Western tech companies and civil society groups are weaponizing the internet to undermine the Kremlin, mean that the regime will not truly believe it can put “information security” on the sidelines—and that includes not just internet control but cyber operations. Policymakers must go into diplomatic and other engagements with Russia with their eyes wide open.

Continue cyber information sharing about Russia with allies and partners around the world. For years, military and intelligence scholars and analysts have referred to Russia’s actions in Georgia, Ukraine, and other former Soviet republics as a “test bed” or “sandbox” for what Russia might do in other countries. It would be a strategic, operational, and tactical mistake to think that Russian cyber operations against Ukraine are just confined to Ukraine and that two-way information sharing with Ukraine about cyber threats is a waste of time and resources. Quite the opposite: Russia’s cyber and information activities against Ukraine today can give the United States and its allies and partners critical insights into the types of capabilities and operations that could, and very well might be, carried out against them at the same time or days or months later. Whether hack-and-leak operations designed to embarrass political figures, wiper attacks designed to destroy government databases, espionage operations, or anything in between, having real-time information about Russian cyber threats will only help the United States and its allies and partners better defend their own networks and systems against hacks and attacks.

Invest in cyber defense and in cyber offense where appropriate. Persistent, sophisticated Russian cyber threats to a range of key US and allied and partner systems—military networks, hospitals, financial institutions, critical infrastructure, advanced tech companies, civil society groups—demand continued investments in cyber defense. In addition to information-sharing, the United States and its allies and partners need to continue prioritizing market incentives for companies to enhance cyber defenses along with baseline requirements for essential measures such as multifactor authentication, detailed access controls, robust encryption, continuous monitoring, network segmentation, resourced and empowered cybersecurity decision-makers, and much more. Just as the Russians clearly possess a range of advanced cyber capabilities, any number of recent operations, including against Ukraine, show that Russian operations (like those carried out by many other powers) continue to succeed with basic moves such as phishing emails. The United States and its allies and partners need to continually increase cyber defenses. And, where appropriate, the United States and its allies and partners should ensure the right capabilities and posture to carry out cyber offensive operations—including to preemptively disrupt Russian attacks (the “defend forward” euphemism). As the Kremlin is more paranoid and conspiratorial, the notion of diplomatic talks and establishing cyber redlines is less and less realistic. Active mitigation and disruption of threats, rather than relying too heavily on diplomatic meetings or endless criminal indictments, are together a more feasible approach to protecting US and allied and partner interests against Russian cyber threats in the years to come.

Conclusion

Lessons from cyber operations—and about cyber operations and capabilities—from the Russian full-on war against Ukraine will continue to emerge in the coming years. This trickle of information may slowly dissipate some of the “fog of war” surrounding the back-and-forth hacks and shed much-needed light on issues such as coordination and conflict between Russian security agencies in cyberspace.

For now, however, the issue for the United States is clear: Russia remains a persistent, sophisticated, and well-resourced cyber threat to the United States and its allies and partners around the world. The threat stems from a range of Russian actors, and it stands to continue impacting a wide range of American government organizations, businesses, civil society groups, individuals, and national interests across the globe. As wonderful as the idea of cyber détente might be, Putin’s paranoia about Western technology, Russian officials’ insistence that the internet is a “CIA project” and Meta is a terrorist organization, and military and intelligence interest in conflict and subversion against the West will not evaporate with a wartime ceasefire or a newfound agreement with the United States. These are hardened beliefs and fairly cemented institutional postures that are not going to shift under the current regime.

Rather than dismissing Russia’s cyber prowess because of unmet expectations since February 2022, American and Western policymakers must size up the threat, unpack the complexity of Russia’s cyber web, and invest in the right proactive measures to enhance their security and resilience into the future.

Acknowledgements

The author would like to thank Brian Whitmore and Andrew D’Anieri for the invitation to write this paper and for their comments on an earlier draft. He also thanks Gavin Wilde, Trey Herr, Aleksander Cwalina, Ambassador John Herbst, and Nikita Shah for their comments on the draft.

About the author

Justin Sherman is a nonresident senior fellow with the Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs. He is also the founder and CEO of Global Cyber Strategies, a Washington, DC-based research and advisory firm; an incoming adjunct professor at Georgetown University’s School of Foreign Service; a contributing editor at Lawfare; and a columnist at Barron’s. He writes, researches, consults, and advises on Russia security and technology issues and is sanctioned by the Russian Ministry of Foreign Affairs.

Explore the programs

The Eurasia Center’s mission is to promote policies that strengthen stability, democratic values, and prosperity in Eurasia, from Eastern Europe in the West to the Caucasus, Russia, and Central Asia in the East.

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

Related content

The post Unpacking Russia’s cyber nesting doll appeared first on Atlantic Council.

]]>
CBDC Tracker cited by the US Treasury Department on global development of CBDCs https://www.atlanticcouncil.org/insight-impact/in-the-news/cbdc-tracker-cited-by-the-us-treasury-department-on-global-development-of-cbdcs/ Fri, 09 May 2025 16:34:09 +0000 https://www.atlanticcouncil.org/?p=845760 Read the full report

The post CBDC Tracker cited by the US Treasury Department on global development of CBDCs appeared first on Atlantic Council.

]]>
Read the full report

The post CBDC Tracker cited by the US Treasury Department on global development of CBDCs appeared first on Atlantic Council.

]]>
Kumar referenced in the T7 Canada Communiqué https://www.atlanticcouncil.org/insight-impact/in-the-news/kumar-referenced-in-the-t7-canada-communique/ Fri, 09 May 2025 16:32:09 +0000 https://www.atlanticcouncil.org/?p=845749 Read the full communiqué

The post Kumar referenced in the T7 Canada Communiqué appeared first on Atlantic Council.

]]>
Read the full communiqué

The post Kumar referenced in the T7 Canada Communiqué appeared first on Atlantic Council.

]]>
CBDC Tracker cited in Reuters on digital currency development https://www.atlanticcouncil.org/insight-impact/in-the-news/cbdc-tracker-cited-in-reuters-on-digital-currency-development/ Mon, 28 Apr 2025 13:53:27 +0000 https://www.atlanticcouncil.org/?p=843012 Read the full article

The post CBDC Tracker cited in Reuters on digital currency development appeared first on Atlantic Council.

]]>
Read the full article

The post CBDC Tracker cited in Reuters on digital currency development appeared first on Atlantic Council.

]]>
Fast payments in action: Emerging lessons from Brazil and India https://www.atlanticcouncil.org/blogs/econographics/fast-payments-in-action-emerging-lessons-from-brazil-and-india/ Mon, 21 Apr 2025 16:42:44 +0000 https://www.atlanticcouncil.org/?p=841172 These lessons are shaping a framework governments can use to evaluate their need for central bank-led immediate payment systems, their potential structure, organizational features, and the trade-offs involved.

The post Fast payments in action: Emerging lessons from Brazil and India appeared first on Atlantic Council.

]]>
As the rise of instant payment systems transforms the global financial sector, more governments are considering launching their own central bank-led immediate payment systems. Pix and Unified Payments Interface (UPI), Brazil and India’s respective instant payment systems, provide two key lessons for governments interested in implementing new fast or immediate payment systems. 

First, the significant effect that government-led instant payment systems can have on citizens and the financial market transforms financial inclusion and market structures. Second, decisions made during the early stages of the process, such as system pricing and ownership structure, shape the power dynamics between local and international players, as well as incumbent and new entrants. 

These lessons are shaping an emerging framework governments can use to evaluate their need for central bank-led immediate payment systems, their potential structure, organizational features, and trade-offs involved in implementing a similar approach. The framework is composed of a three-step approach, including prerequisite weighting (i.e., “do we need this system”), the preparations needed to hit the ground running, and the process of setting up new immediate payment systems.

Pix and UPI: Initial development to growing pains

But first, it’s important to understand how immediate payment systems have developed into what they are today. 

Over the last decade, India and Brazil launched their instant payment systems, UPI and Pix, on a national scale, reshaping their payment landscapes. With 350 million UPI users and 140 million Pix users, about 25 percent of India’s population and approximately 65 percent of Brazil’s population use the systems. One of every eleven adults in the world uses either Pix or UPI to send or receive immediate payments. 

Brazil’s immediate payments policy is a payments-first approach. The Brazilian Central Bank (BCB) owns Pix and pushes it to cooperate with domestic private market players, focusing mainly on immediate payments and adjacent products. The system was launched in 2020 after a two-year ideation and development period.

A church with a stained glass window

Description automatically generated
Brazil – Pix QR codes and information at the Rio de Janeiro Cathedral, January 2025

Pix is the most quickly adopted immediate payment system in the world. As of the second quarter in 2024, it had reached 15.4 billion quarterly transactions. Its growth was fueled by a high degree of cooperation with the local financial ecosystem, as well as the fact that institutions with over 500,000 transacting accounts were required to participate, creating a network effect.

India developed UPI as a part of its Digital Public Infrastructure (DPI) program and implemented it as a part of a broad tech stack. Its approach to both DPI and UPI has long been for the state to develop the basic infrastructure, including a digital identity pillar, data exchange pillar, and payments pillar, allowing private sector innovation on top of the existing system.

UPI was developed under the National Payments Corporation of India, which is independent of India’s central bank and owned by various private banks. It became India’s most popular digital payment method, processing over 75 percent of the nation’s retail digital payments.

A shelf with food items on it

Description automatically generated
UPI QR code displayed at a store in a Mumbai market, January 2025

However, UPI’s growth was initially slow. It only reached 10 million monthly transactions in 2017 and took about three years to reach 1 billion monthly transactions. The growth was later expedited due to India’s demonetization, which started in 2016, the COVID-19 transition away from cash, and internationally backed payment providers entering the market.

Both Pix and UPI have significantly increased financial inclusion, supported growth in the fintech sector, and become the payment standards in their respective countries. However, their impact has not been entirely positive. Their use has also increased fraud and reshaped the power balance between different players in their markets.  

Winners and losers: Market impacts in Brazil and India 

Both systems transformed their respective markets, benefitting some players and reducing the market power of others. 

The table below provides a snapshot of the market dynamics, highlighting each of the key players, their initial power and interest mapping (green for high, yellow for medium, and red for low) and the power shifts in the market caused by Pix. Power shifts are categorized into market share and decision-making power—red with a downward-facing arrow indicates a decrease, green with an upward-facing arrow signifies an increase, and yellow represents retained power or a mixed trend.

In Brazil, Pix has transformed the financial sector by benefiting new domestic players while challenging incumbents and credit card schemes. 

Brazilian neobanks and fintech startups have grown significantly by leveraging Pix’s cost model to attract new customers. They take advantage of the optional fee structure for its value offer, including no fees for consumers and bearing the mandatory fees for businesses. Eliminated transaction fees and immediate payments increased consumer trust. It made digital payments more accessible, particularly for the previously unbanked population. Small businesses and micro-entrepreneurs have also gained access to low-cost, instant transactions, fostering financial inclusion and reducing reliance on cash. This, in turn, drove an increase in such banks’ target addressable market (i.e., relevant customer base).

However, traditional banks and credit card networks have been disrupted. Before Pix, Brazilian banks charged significant fees for interbank transfers, but Pix’s free and instant model eroded this revenue stream. As a result of Pix’s launch, traditional banks’ revenue from payments decreased by 8 percent between 2020 and 2021.

Credit card companies are seriously threatened by Pix. In 2022, BCB’s governor predicted that Pix would make credit cards obsolete. However, transaction data tells a more complicated story. With Pix introducing new consumers into the market, banks are leveraging “maturing cohorts” of consumers to offer them credit cards. Before Pix, credit card payment volumes were at a 12.7 percent annual CAGR (compound annual growth rate) between 2018 and 2020. After the launch of Pix, CAGR almost tripled, reaching 31.7 percent between 2020 and 2022.

UPI’s rapid adoption in India similarly transformed the power balance in the market and benefitted payment technology providers. 

Large-scale third-party application providers (TPAPs), particularly Google Pay and PhonePe, dominate the UPI transaction space, accounting together for over 80 percent of UPI transactions. These players leveraged UPI’s no-cost model to gain significant user adoption. Consumers and merchants have also benefited from seamless, real-time payments without additional fees. 

However, traditional banks struggle with UPI’s zero-fee structure, as it increases transaction volumes and associated costs without direct revenue gains. Some banks have pushed for the introduction of transaction fees to compensate for operational costs. For that reason, in 2022 RBI introduced subsidies for small transactions to banks, which they can share with TPAPs. In 2024, these accounted for 10 percent of PhonePe’s annual revenue. Credit card companies have also faced increasing competition. However, similar to Brazil, credit card usage volume has actually increased following UPI’s scaling. From a declining CAGR of 7.3 percent between 2018 and 2020 in payment volume, after UPI scaled, credit card growth reached a 24.2 percent CAGR between 2020 and 2022.

Big tech vs. local tech: Divergent approaches

A key distinction between Pix and UPI is their approach to global technology firms (“big tech”) and multinationals generally.

BCB has actively blocked big tech from entering the market, emphasizing the need for domestic control over digital payments. This approach is part of a general policy to strengthen the domestic ecosystem over incorporating multinational players. In 2020, for example, BCB suspended WhatsApp’s Brazilian immediate payments offering launch. It cited regulatory concerns and the potential risk to financial stability, launching Pix later that year. This strategy has helped the local fintech ecosystem and brought domestic players, mainly neobanks, to the front of the stage. 

In contrast, India’s approach has allowed big techs and multinational players to participate in the UPI ecosystem and often relied on them for last mile delivery, and consumer onboarding, driving its scaleup. Google Pay and PhonePe, respectively backed by Alphabet and Walmart, quickly dominated.They could offer payments as a loss leader (i.e., sell at a loss to attract customers to other, profitable products) while benefiting from other products over time. 

While doing so accelerated lagging adoption rates, it has also led to concerns about data privacy and market concentration

The Indian government has since explored regulatory measures, such as imposing a 30 percent market share cap on individual TPAPs, though enforcement has been repeatedly delayed. Another claim voiced by government officials in the debate is that, given UPI’s universal nature, providers are interchangeable, thus eliminating anti-competitive claims.

This divergence in strategies and outcomes reflects the broader debate about whether emerging economies should embrace or limit big tech’s role in financial infrastructure.

Stages of implementation

Based on Brazil and India’s experiences, a three-stage framework emerges for countries considering immediate payment systems adoption.

The first stage of weighting prerequisites involves assessing the need for a state-led payments system based on three factors: the existence of alternatives (e.g., a strong credit card presence), expected change (primarily driven by the level of financial inclusion, development costs, and the size of the economy), and state capacity. As a result, countries with low banking penetration and high reliance on cash are more likely to benefit from such systems. 

The second stage involves getting ready to hit the ground running, focusing on implementation and scaling. Understanding the existing market conditions and the shifts anticipated from the introduction of the system is crucial. Additionally, selecting an appropriate governance model—whether a central bank-led approach like Pix, a consortium-led model like UPI, or a provider model—plays a vital role in determining long-term implications. Lastly, the fee structure will also influence both adoption and market entry and should be actively established at this stage. 

The final stage involves setting up a long-term process by establishing cooperation mechanisms and managing externalities. Policymakers must implement regulatory adjustments based on market responses to address issues such as monopolization and consumer protection against fraud. They should also explore engagement mechanisms for local players through forums and bilateral consultation schemes, focusing on gaining knowledge and legitimacy as well as efficiency considerations. 

While many regions worldwide consider the future of payments, this framework can serve as an initial point of assessment. There is no perfect “one size fits all” solution. However, states’ varied ability to execute and enforce participation, the size of their economies, and the preexisting market structures significantly influence decisions concerning the “what” and the “how” of launching immediate payment systems.

Pix and UPI offer several additional insights into how state-led payment systems can reshape economies. 

While Brazil focused on domestic financial players and regulatory control, India leveraged global technology firms for swift adoption. Consequently, Brazil fostered the expansion of its local fintech ecosystem, while India established an environment with significant multinational involvement. 

In both cases, incentives for private market players aligned to support the growth of credit card provision as a subsequent step after initially introducing consumers to the financial system through Pix and UPI. While there is room for discussion about the implications of this step, it is a definitively critical point to consider when launching such systems and weighing their outcomes.

Lastly, the key lesson from these models lies in the decisions made by policymakers to initiate transformative processes. Both models illustrate the potential of such systems to enhance financial inclusion, disrupt traditional banking, and reshape economies, thereby aiding in their advancement. These lessons from UPI and PIX can be narrowly applied to public sector entities looking to create state-led systems, however, it is important to consider that market structure transformation might not be the ideal solution for every economy, especially more advanced economies which have a larger share of private sector players. Ultimately within a jurisdiction, policymakers bear the ultimate responsibility of acting to launch immediate payment systems.


Polina Kempinsky is a second-year Master of Public Policy student at the Harvard Kennedy School. This paper is part of Polina’s PAE (Policy Analysis Exercise) for her program, which explores the instant payment systems of Brazil and India.

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.


The post Fast payments in action: Emerging lessons from Brazil and India appeared first on Atlantic Council.

]]>
Cryptocurrency Regulation Tracker cited by the International Journal of Economics, Business and Management Research on global efforts to regulate cryptocurrency https://www.atlanticcouncil.org/insight-impact/in-the-news/cryptocurrency-regulation-tracker-cited-by-the-international-journal-of-economics-business-and-management-research-on-global-efforts-to-regulate-cryptocurrency/ Mon, 21 Apr 2025 14:36:49 +0000 https://www.atlanticcouncil.org/?p=850701 Read the full paper

The post Cryptocurrency Regulation Tracker cited by the International Journal of Economics, Business and Management Research on global efforts to regulate cryptocurrency appeared first on Atlantic Council.

]]>
Read the full paper

The post Cryptocurrency Regulation Tracker cited by the International Journal of Economics, Business and Management Research on global efforts to regulate cryptocurrency appeared first on Atlantic Council.

]]>
Kumar quoted in NewsNation on the new US crypto strategic reserve https://www.atlanticcouncil.org/insight-impact/in-the-news/kumar-quoted-in-newsnation-on-the-new-us-crypto-strategic-reserve/ Fri, 04 Apr 2025 20:29:58 +0000 https://www.atlanticcouncil.org/?p=838708 Read the full article

The post Kumar quoted in NewsNation on the new US crypto strategic reserve appeared first on Atlantic Council.

]]>
Read the full article

The post Kumar quoted in NewsNation on the new US crypto strategic reserve appeared first on Atlantic Council.

]]>
Kumar quoted by Central Banking on the Bank of Russia’s role in sanctions evasion and building alternative payment infrastructure https://www.atlanticcouncil.org/insight-impact/in-the-news/kumar-quoted-by-central-banking-on-the-bank-of-russias-role-in-sanctions-evasion-and-building-alternative-payment-infrastructure/ Fri, 04 Apr 2025 17:10:03 +0000 https://www.atlanticcouncil.org/?p=840383 Read the full article here

The post Kumar quoted by Central Banking on the Bank of Russia’s role in sanctions evasion and building alternative payment infrastructure appeared first on Atlantic Council.

]]>
Read the full article here

The post Kumar quoted by Central Banking on the Bank of Russia’s role in sanctions evasion and building alternative payment infrastructure appeared first on Atlantic Council.

]]>
The European Commission’s Teresa Ribera: ‘We will defend’ Europeans in the face of new US tariffs https://www.atlanticcouncil.org/blogs/new-atlanticist/the-european-commissions-teresa-ribera-we-will-defend-europeans-in-the-face-of-new-us-tariffs/ Thu, 03 Apr 2025 21:56:09 +0000 https://www.atlanticcouncil.org/?p=838496 The United States' new sweeping tariffs are “bad news for the whole world—including Americans,” Ribera said at an Atlantic Council Front Page event.

The post The European Commission’s Teresa Ribera: ‘We will defend’ Europeans in the face of new US tariffs appeared first on Atlantic Council.

]]>

Watch the full event

US President Donald Trump’s sweeping tariffs, announced Wednesday, are “bad news for the whole world—including Americans,” said Teresa Ribera, executive vice-president of the European Commission for a clean, just, and competitive transition. 

“We will defend the Europeans,” from businesses to citizens, added Ribera at an Atlantic Council Front Page event Thursday. The European Union (EU) will first look to avoid a “big clash” with the United States. “We will remain firm and open,” and see if there are any avenues to “solve any type of misunderstanding and avoid conflict,” she said. 

As for what the US tariffs mean for the EU’s trade strategy, Ribera said that the bloc will “keep on developing and deepening the relationship with the rest of the world.”  

“The whole world is bigger, or larger, than the US market. So yes, of course, we will try to keep on building that,” she said. 

She added that it is “worth it to defend” the “multilateral-order-based rules,” including ones around trade, that the EU has built with its partners “during the last eighty years.” 

Below are more highlights from the conversation, moderated by Europe Center Distinguished Fellow Frances Burwell, which also touched upon the EU’s competitiveness agenda and green transition. 

All for one . . . 

  • Ribera argued that in responding to the US tariffs, it will be important to have a “strong” EU that is “united” in a “common approach.”  
  • “I say that we are boringly reliable, but I think that it is absolutely true,” Ribera said. She pointed to the EU remaining together against Russian President Vladimir Putin’s attempts to divide it. “This is one of the most important principles we need to stick [with],” she said. 
  • She added that internal changes—such as removing barriers to trade within the European single market—could help offset losses incurred from US tariffs, seeing as internal trade barriers amount to the equivalent of a 45 percent tariff.  
  • Ribera noted that the US-EU trade relationship has come to be a “story of success” in joint cooperation, so the two parties should not look to weaken the relationship, but to strengthen it. “It’s good to count on supply chains that work, markets that work and are predictable,” she said. 
  • In order to address today’s challenges and address society’s demands, she said, “it is much [easier] to build bridges than to build barriers.” 

Guided by a new “Compass”

  • Ribera will soon review the EU’s competition policy, which regulates mergers and acquisitions. She said the policy has been built on a global situation that “has changed” with the power of the West diminishing in its ability to set the terms of global markets. She said she will identify how the tools can actually help attain a more competitive environment, in line with the EU’s new Competitive Compass
  • After US Federal Trade Commissioner Andrew Ferguson said that he was “suspicious” of the EU Digital Markets Act (which imposes restrictions on tech companies operating in Europe) and criticized laws that “get at American companies abroad,” Ribera argued that the act is “not intending to go against anyone.” She said, rather, it is intended to protect from the development of monopolies against new innovators in the EU market. 

Clean, green machine 

  • In addressing criticism that the EU’s green push is getting in the way of achieving competitiveness priorities, Ribera said that the green framework can actually be a “main driver” of Europe’s future competitiveness. 
  • Other countries have come to realize the value of the green transition and now “have a big share of the international market dealing with green equipments,” she said. “We don’t want to miss the train anymore.” 
  • With the European Commission having proposed the Omnibus package of measures to simplify rules (such as those around sustainability reporting) for businesses, Ribera said that “simplification is very important.” She said she hears from businesses that they want simpler reporting obligations and more clarity from the EU to help them make the “right decisions” on investments. 
  • The EU must show investors and the industrial community that it will not go “back to the past to solve the problems of today,” Ribera said. “This is clean, this is industrial, but this is a deal,” she added, explaining that the deal means the EU will be “paying attention to where the concerns may be and how we can . . . [better] bring better everybody together.” 

Katherine Golden is an associate director of editorial at the Atlantic Council.

Watch the event

The post The European Commission’s Teresa Ribera: ‘We will defend’ Europeans in the face of new US tariffs appeared first on Atlantic Council.

]]>
DeepSeek shows the US and EU the costs of failing to govern AI https://www.atlanticcouncil.org/blogs/geotech-cues/deepseek-shows-the-us-and-eu-the-costs-of-failing-to-govern-ai/ Tue, 01 Apr 2025 20:40:01 +0000 https://www.atlanticcouncil.org/?p=837566 The West must urgently consider what DeepSeek’s R1 model means for the future of democracy in the AI era.

The post DeepSeek shows the US and EU the costs of failing to govern AI appeared first on Atlantic Council.

]]>
Note: This piece was updated on April 4, 2025.

DeepSeek’s breakthrough has made the West reflect on its artificial intelligence (AI) strategies, specifically regarding cost and efficiency. But the West must also urgently consider what DeepSeek’s R1 model means for the future of democracy in the AI era.

That is because the R1 model shows how China has taken the lead in open-source AI: systems that are made available to users to use, study, modify, and share the tool’s components, from its codes to its datasets, at least according to the Open Source Initiative (OSI), a California-based nonprofit. While there are varying definitions of open-source, its application for AI has immense potential, as it can encourage greater innovation among developers and empower individuals and communities to create AI-driven solutions in sectors such as education, healthcare, and finance. The technology, ultimately, accelerates economic growth.

However, according to reports, R1 appears to censor and withhold information from users. Thus, democracies not only risk the loss of the AI technological battle; they also risk falling behind in the race to govern AI and could fail to ensure that democratic AI proliferates more widely than systems championed by authoritarians.

Therefore, the United States must work with its democratic allies, particularly the European Union (EU), to set global standards for open-source AI. Both powers should leverage existing legislative tools to initiate an open-source governance framework. Such an effort would require officially adopting a definition of open-source AI (such as OSI’s) to increase governance effectiveness. After that, the United States and EU should accelerate efforts to ensure democratic values are embedded in open-source AI models, paving the way for an AI future that is more open, transparent, and empowering.

How China overtook the lead

Part of DeepSeek’s success can be understood by the Chinese Communist Party’s (CCP’s) showing signs of incorporating the norm-building of open-source AI into its legal framework. In April 2024, the Model AI Law—a multi-year expert draft led by the Chinese Academy of Social Sciences, which is influential in the country’s lawmaking process—laid out China’s support for an open-source AI ecosystem. Article 19 states that the CCP “promotes construction of the open source ecosystem” and “supports relevant entities in building or operating open source platforms, open source communities, and open source projects.” It encourages companies to make “software source code, hardware designs, and application services publicly available” to foster industry sharing and collaboration. The draft also highlights reducing or removing legal liability for the provision of open-source AI models, providing that individuals and organizations have established a governance system compliant with national standards and have taken corresponding safety measures. Such legal liability would have held developers accountable for infringing the rights of citizens. This is a notable contrast to China’s past laws governing AI that explicitly stated the goal of protecting those rights. The specific provisions in the Model AI Law, albeit a draft, shouldn’t be overlooked, as they essentially serve as a blueprint of how open-source AI is deployed in the country and what China’s models exported globally would look like.

Furthermore, the AI Safety Governance Framework, a document that China aims to use as a guide to “promote international collaboration on AI safety governance at a global level,” echoes the country’s assertiveness on open-source AI. The document was drafted by China’s National Technical Committee 260 on Cybersecurity, a body working with the Cyberspace Administration of China, whose cybersecurity standard practice guidelines were adopted by CCP in September 2024. The framework reads, “We should promote knowledge sharing in AI, make AI technologies available to the public under open-source terms, and jointly develop AI chips, frameworks, and software.” Appearing in a document meant for global stakeholders, the statement reflects China’s ambition to lead in this area as an advocate.

What about the United States and EU?

In the United States, advocates have touted the benefits of open source for some time, and AI industry leaders have called for the United States to focus more on open-source AI. For example, Mark Zuckerberg launched the open-source model Llama 3.1 last year, and in doing so, he argued that open-source “represents the world’s best shot” at creating “economic opportunity and security for everyone.”

Despite this advocacy, the United States has not established any law to promote open-source AI. A US senator did introduce a bill in 2023 calling for building a framework for open-source software security, but the bill has not progressed since then. Last year, the National Telecommunications and Information Administration published a report on dual-use AI foundation models with open weights (meaning the models are available for use, but are not fully open source). It advised the government to more deeply monitor the risks of open-weight foundation models in order to determine appropriate restrictions for them. The Biden administration’s final AI regulatory framework was friendlier to open models: It set restrictions for the most advanced closed-weight models while excluding open-weight ones.

The future of open-source models remains unclear. US President Donald Trump has not yet created any guidance for open-source AI. So far, he has repealed Biden’s AI executive order, but the executive order that replaced it has not outlined any initiative that guides the development of open-source AI. Overall, the United States has been overly focused on playing defense by developing highly capable models while working to prevent adversaries from accessing them, without considering the wider global reach of those models.

Since unveiling the General Data Protection Regulation (GDPR), the EU has established itself as a regulatory powerhouse in the global digital economy. Across the board, countries and global companies have adopted EU compliance frameworks for the digital economy, including the AI Act. However, the EU’s effort on open-source AI is lacking. Although Article 2 of the AI Act briefly mentions open-source AI as an exemption from regulation, the actual impact seems minor. The exemption is even absent for commercial-purpose models.

In other EU guidance documents, the same paradox can be found. The latest General-Purpose AI Code of Practice published in March 2025 acknowledged how open-source models have a positive impact on the development of safe, human-centric, and trustworthy AI. However, there is no meaningful elaboration promoting the development and use of open-source AI models. Even in the EU Competitiveness Compass—a framework targeting overregulation, regulatory complexity, and strategic competitiveness in AI—“open source” is absent.

The EU’s cautious approach to regulating open-source AI stems from the challenge of defining it. Open-source AI is different from traditional open-source software in that it includes pre-trained AI models rather than simply source code. And, of course, the definition from OSI has not yet been acknowledged in the international legal community. The debate over what constitutes open-source AI creates legal uncertainty that the EU is likely uncomfortable to accept. Yet the real driver of inactivity lies deeper. The EU’s regulatory successes, like GDPR, make the Commission wary of exemptions that could weaken its global influence over a technology still so poorly defined. This is a gamble Brussels has, so far, had no incentive to take.

The new power imbalance in AI geopolitics 

China’s push to become technologically self-sufficient, a push which has included solidifying open-source AI strategies, is partly motivated by US export controls on advanced computing and semiconductors dating back at least to 2018. These measures stemmed from US concerns about national security, economic security, and intellectual property, while China’s countermeasures also reflect the broader strategic competition in technological superiority between both countries. The EU, on the other hand, asserts itself in the race by setting the global norms of protecting fundamental rights and a host of democratic values such as fairness and redistribution, which ultimately have shaped the policies of leading global technology companies.

By positioning itself as a leader in open-source AI, China has turned the export and policy challenge into an opportunity to sell its version of AI to the world. The rise of DeepSeek, along with other domestic rival companies such as Alibaba, is shifting the pendulum by reducing the world’s appetite for closed AI models. DeepSeek has released smaller models with fewer parameters for less powerful devices. AI development platform Hugging Face has started replicating DeepSeek-R1’s training process to enhance its models’ performance in reinforcement learning. Microsoft, OpenAI, and Meta have embraced model distillation, a technique that drew much attention with the DeepSeek breakthrough. China has advanced the conversation around openness, with the United States adapting to the discourse for the first time and the EU being trapped in legal inertia, leaving a power imbalance in open-source AI.

China is offering a concerning version of open-source AI. The CCP strategically deploys a “two-track” system that allows greater openness for AI firms while limiting information and expression for public-facing models. Its openness is marked by the country’s historical pattern that restricts the architecture of a model, such as requiring the input and output to align with China’s values and a positive national image. Even in its global-facing AI Safety Governance Framework (in which Chinese authorities embrace open-source AI), the CCP says that AI-generated content poses threats to ideological security, hinting at the CCP’s limited acceptance of freedom of speech and thought.

Without a comprehensive framework based on the protection of democracy and fundamental rights, the world could see China’s more restrictive open-source AI models reproduced widely. Autocrats and nonstate entities worldwide can build on them to censor information and expression while touting that they are promoting accessibility. Simply focusing on the technological performance of China is not sufficient. Instead, democracies should respond by leading with democratic governance.

Transatlantic cooperation is the next step

The United States and EU should consider open-source diplomacy, advancing the sharing of capable AI models across the globe. In doing so, they should create a unified governance framework and work toward shaping a democratic AI future by forming a transatlantic working group on open-source AI. Existing structures, including the Global Partnership on Artificial Intelligence (GPAI), can serve as a vehicle. But it’s essential that technology companies and experts from both sides of the Atlantic are included in the framework development process.

Second, the United States and EU should, through funding academic institutions and supporting startups, promote the development of open-source AI models that align with democratic values. Such models, free from censorship and security threats, would set a powerful contrast to the Chinese models. To promote such models, the United States and EU will need to recognize that the benefits of such models outweigh the risks in the broader picture. Similarly, the EU must also continue leveraging its regulatory advantage; it must also be more decisive about governing open-source AI, even if it means embracing some uncertainty about its legal definition, in order to outpace China’s momentum.

The United States and EU may currently have a rocky relationship. However, US-EU collaboration rather than competition is crucial with China’s ascendence in open-source AI. To take back leadership in this pivotal arena, the United States and European Union must launch a transatlantic initiative on open-source AI that employs forward-thinking policy, research, and innovation in setting the global standard for a rights-respecting, transparent, and creative AI future.


Ryan Pan is a project assistant at the Atlantic Council GeoTech Center.

Kolja Verhage is a senior manager of AI governance and digital regulations at Deloitte.

The views reflected in the article are the author’s views and do not necessarily reflect the views of their employers.

Further Reading

The GeoTech Center champions positive paths forward that societies can pursue to ensure new technologies and data empower people, prosperity, and peace.

The post DeepSeek shows the US and EU the costs of failing to govern AI appeared first on Atlantic Council.

]]>
House quoted in Axios on stablecoin legislation https://www.atlanticcouncil.org/insight-impact/in-the-news/house-quoted-in-axios-on-stablecoin-legislation/ Tue, 25 Mar 2025 01:33:45 +0000 https://www.atlanticcouncil.org/?p=831876 Read the full article

The post House quoted in Axios on stablecoin legislation appeared first on Atlantic Council.

]]>
Read the full article

The post House quoted in Axios on stablecoin legislation appeared first on Atlantic Council.

]]>
Donovan interviewed for the Public Key Podcast on the role of cryptocurrencies in global sanctions https://www.atlanticcouncil.org/insight-impact/in-the-news/donovan-interviewed-for-the-public-key-podcast-on-the-role-of-cryptocurrencies-in-global-sanctions/ Tue, 25 Mar 2025 01:29:34 +0000 https://www.atlanticcouncil.org/?p=835047 Listen to the full podcast here

The post Donovan interviewed for the Public Key Podcast on the role of cryptocurrencies in global sanctions appeared first on Atlantic Council.

]]>
Listen to the full podcast here

The post Donovan interviewed for the Public Key Podcast on the role of cryptocurrencies in global sanctions appeared first on Atlantic Council.

]]>
What is strategic about the new digital assets reserve? https://www.atlanticcouncil.org/blogs/econographics/what-is-strategic-about-the-new-digital-assets-reserve/ Fri, 14 Mar 2025 13:58:08 +0000 https://www.atlanticcouncil.org/?p=832960 To many on Wall Street and Main Street, this executive order on a strategic bitcoin reserve may still seem more like political maneuvering than sober monetary policy.

The post What is strategic about the new digital assets reserve? appeared first on Atlantic Council.

]]>
Last week, President Donald Trump announced the creation of a digital asset stockpile and strategic bitcoin reserve amid a flurry of recent executive orders. The decision was met with downturns in the digital asset and traditional equities markets and reflects several serious downsides as a matter of public policy.

For starters, the plan stems from a 2024 proposal by Senator Cynthia Lummis and largely functions as a centralized repository for assets that have already been seized by the federal government—for example, as part of criminal proceedings. That might be “budget neutral,” as the order says, but it is not a reserve in the traditional sense of a gold reserve used by central banks to redeem depositors or pay international debts. As a prominent Bitcoin thinker succinctly put it, “[t]here is no ‘strategic’ value in a crypto reserve.”

The executive order directs the government to simply hold (or later on, perhaps buy and hold) assets like bitcoins. Although the order vaguely criticizes the government’s “premature sales” in the past, “HODL’ing” (as the expression goes) may or may not be fiscally prudent, depending on whether or when to sell the assets. Separately, there are serious questions about if it is prudent for the government to essentially invest in select digital assets, as opposed to generating revenue in other ways. At the very least, the Secretary of the Treasury should develop concrete criteria and an authorization process for periodically selling or buying digital assets, to add transparency and provide an orderly means of decreasing volatility exposure. Senator Lummis’s original proposal, for example, contained some selling thresholds.

Second, the White House crypto czar David Sachs estimated that the federal government’s reserves comprised 200,000 bitcoin worth a staggering $17.5 billion at recent prices. If those numbers are still accurate, that would equal more than the total amount of gold held at almost all Federal Reserve Banks. That cannot be right as a matter of monetary policy. Even putting aside the polarizing debates about the long-term value of bitcoin (or lack thereof), the size of the new strategic reserve seems disproportionate given the risks and functions of the assets involved. Consistent with a transparent sales process, the Treasury should rightsize any digital asset reserve and use the remaining proceeds for other government programs.

Third, the cybersecurity challenges of having a centralized digital asset pool are not trivial, as the Atlantic Council highlighted in a prior report. Yet the executive order says nothing about how to start securing this new stockpile. Sacks tweeted that the pool would be akin to a “digital Fort Knox.” But Fort Knox has legendary security, is operated by 1,700 specialized employees, and adjoins a military base with 26,000 trained personnel. It is unclear what office, if any, at the Treasury could manage such a gargantuan security task for a digital asset reserve. The endeavor would be particularly difficult after the Department of Government Efficiency—or DOGE—unceremoniously disbanded teams of engineers like those in the 18F division, who were renowned for their private sector expertise. By contrast, Senator Lummis’s 2024 proposal highlighted security measures for “state-of-the-art physical and digital security” through inter-agency cooperation.

Perhaps most importantly, the ultimate risk of the executive order is that it embodies a form of crypto boosterism. Namely, it appears to tout an industry that President Trump came to embrace during the later phases of his political campaign, famously including the launch of his own meme coin just days before inauguration. To be fair, the White House revised the president’s earlier announcement that the reserve would include proactive purchases of select “altcoins,” which industry insiders worried “could be a vehicle for corruption and self-dealing.” That was a prudent move. But to many on Wall Street and main street, the order may still seem more like political maneuvering than sober monetary policy.

In a parallel universe, there could have been a thoughtful way for the Federal Reserve and Treasury to gradually study the possibility of holding digital assets on the balance sheet. They could have scrutinized the economic implications and prepared for security contingencies that might have included a bipartisan compromise around stablecoin legislation to specifically promote the strength of the dollar. But in today’s world, this executive order looks more slapdash than strategic. That may have been intended to bolster digital asset markets, but it has fallen flat on most fronts.


JP Schnapper-Casteras is a nonresident senior fellow at the Atlantic Council’s GeoEconomics Center and the founder and managing partner at Schnapper-Casteras, PLLC.

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post What is strategic about the new digital assets reserve? appeared first on Atlantic Council.

]]>
India’s path to AI autonomy https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/indias-path-to-ai-autonomy/ Thu, 13 Mar 2025 13:00:00 +0000 https://www.atlanticcouncil.org/?p=830704 India is taking a distinctive approach to the global race for artificial intelligence (AI) supremacy.

The post India’s path to AI autonomy appeared first on Atlantic Council.

]]>
India’s unique approach to AI autonomy: A three-pillar strategy

India is taking a distinctive approach to the global race for artificial intelligence (AI) supremacy. While the United States and China focus on AI for economic dominance and national security, India’s vision revolves around AI autonomy through the development of homegrown AI solutions that are closely linked to its development goals.1 This approach seeks to position India as a prominent global AI leader through a three-pillar strategy that distinguishes it from other major nations. India’s vision of AI autonomy is based on:

  • Democratizing AI through open innovation: Leading the development of open-source models and platforms that make AI more accessible and adaptable to India’s local needs including the Bhashini platform, which incorporates Indian languages in large language model processing, and the iGOT Karmayogi online learning platform for government training.
  • Public-sector-led development applications: Implementing AI solutions to address critical development challenges through government-led initiatives in healthcare, agriculture, and education, ensuring that technology meets societal needs.
  • Global leadership in AI for sustainable development: Championing the integration of AI to achieve the Sustainable Development Goals2 (SDGs) on a global scale while pushing ethical AI governance and South-South collaboration.

This strategy seeks to establish India as a global AI leader while addressing pressing social issues, closing economic gaps, and improving the quality of life for its diverse population of over 1.3 billion people.

India’s journey toward AI autonomy goes beyond technological independence; it creates a narrative in which innovative AI technologies drive inclusive growth. This philosophy is reflected in the “India AI” mission and its National Strategy for AI, which positions India as both an adopter and developer of AI technologies and a global hub for ethical and development-oriented AI innovation.3

India’s AI landscape: A vision of innovation and strategy

The Indian AI ecosystem is a dynamic landscape shaped by government initiatives, private-sector innovation, and academic research. There has been a notable increase in AI-focused start-ups in recent years, with the National Association of Software and Service Companies (NASSCOM) reporting over 1,600 in 2023.4 This growing sector highlights India’s technological capabilities and entrepreneurial spirit in tackling local challenges.

Several strategic government initiatives at the core of this ecosystem have paved the way for India’s advancements in AI. The India AI mission, launched in 2023, is a government initiative to build a comprehensive ecosystem to foster AI innovation across various sectors in India. Spearheaded by the Ministry of Electronics and Information Technology (MeitY), it focuses on developing AI applications to address societal challenges in healthcare, education, agriculture, and smart cities while promoting responsible and ethical AI development.5

IndiaAI reflects the country’s ambitions to become a global AI powerhouse and is supported by the National AI Strategy, created by the National Institution for Transforming India (NITI Aayog). The strategy provides a comprehensive road map for AI adoption in those sectors targeted by IndiaAI.6

What sets these initiatives apart from AI strategies in other countries is their emphasis on using AI for social good. For instance, the government of India organized the Responsible AI for Social Empowerment (RAISE) initiative in 2020,7 preceding the current AI hype. This demonstrates India’s commitment to ethical AI development, and such initiatives align with India’s National Development Agenda 2030, positioning AI as a driver of economic growth and a crucial enabler for achieving SDGs.8

Democratizing AI through open innovation

India is making significant progress in promoting open-source AI development, fostering inclusivity and collaboration within the global AI community. Open-source frameworks, driven by collaborative innovation, offer transparency, interoperability, and scalability—essential qualities for a diverse country like India.

The Bhashini initiative, led by the MeitY, exemplifies this commitment by leveraging open-source frameworks to build natural language processing (NLP) models that support twenty-two official Indian languages and numerous dialects. This project goes beyond basic language processing; it signifies India’s dedication to AI democratization by making these models and datasets freely available to developers and start-ups.9

The iGOT Karmayogi platform showcases the scalability of open-source AI solutions to improve digital literacy in government. Designed to upskill twenty million employees, it utilizes open-source AI tools to provide personalized learning pathways, reducing costs while ensuring continuous improvement based on user feedback.10

Leading academic institutions like the Indian Institute of Science (IISc) in Bangalore and the Indian Institute of Technology (IIT) Madras actively contribute to open-source AI research through global public platforms such as TensorFlow and Hugging Face.11 Their work encompasses various fields, including computer vision for healthcare, autonomous vehicles, and environmental monitoring.12

For Indian start-ups, using open-source AI models or systems provides significant benefits such as lower costs, greater customization flexibility, access to a larger developer community, the ability to tailor models to specific Indian languages and dialects, and enhanced data security by allowing deployment on premises, making it ideal for building localized AI solutions while maintaining control over sensitive data.

In August 2024, Meta’s open-source Llama model reached a significant milestone of 350 million cumulative downloads since the release of Llama 1 in early 2023.13. India has emerged as one of the top three markets globally for this model.14 Several Indian start-ups and well-known consumer apps, including Flipkart, Meesho, Redbus, Dream11, and Infoedge, have announced their integration of Llama into their applications.

Additionally, IBM Elxsi, a partnership between IBM and Tata Elxsi, India’s largest technology company, focuses on designing local digital engineering solutions, like using open-source models to develop AI-powered edge network solutions for rural and remote areas, enhancing AI accessibility while reducing latency and energy consumption.15

The democratization of AI through open-source initiatives is critical to India’s development trajectory and technological autonomy. This approach enables rapid, cost-effective AI adoption across India’s diverse sectors and regions, with tangible results already visible: The development cycle for AI solutions has been reduced from years to months, as evidenced by the rapid deployment of language models via the Bhashini initiative, which now serves millions in their native languages. Unlike the West, where most AI development is primarily driven by private companies with proprietary technologies, India’s adoption of an open-source-first approach has led to an independent ecosystem in which government initiatives, academic institutions, and private-sector innovations coexist.

The public-sector role in developing applications to address India’s unique challenges

The profound socioeconomic challenges that India’s 1.3 billion people face have fundamentally shaped its approach to AI.

India faces critical healthcare challenges: 70 percent of healthcare infrastructure is concentrated in urban areas serving only 30 percent of the population, and the doctor-patient ratio stands at 1:1,511, far below the World Health Organization’s recommended 1:1,000.16

The education sector struggles with fundamental gaps, as 250 million Indians lack basic literacy skills, with only 27 percent having access to internet-enabled devices for online learning, further complicated by the country’s diversity of twenty-two official languages and 1,600 dialects.17

Agricultural challenges are particularly acute, with the sector employing 42 percent of the workforce but contributing only 18 percent to gross domestic product; 86 percent are small and marginal farmers with less than two hectares of land, and 40 percent of food production is lost due to inefficient supply chains.18

Financial inclusion remains a significant barrier to development, with 190 million unbanked adults, 70 percent of rural transactions being cash-based, and a stark digital gender divide where only 33 percent of women have mobile internet access compared to 67 percent of men.19

The size and complexity of these challenges necessitate innovative technological solutions that are both scalable and relevant to India’s specific issues.

India’s development-focused AI vision strategically responds to these pressing issues. Rather than viewing AI solely as a tool for economic competition or technological advancement, India has positioned it as a transformative tool for closing fundamental development gaps.

AI is closing critical gaps in access and the quality of care in healthcare. Through the government’s eSanjeevani platform—India’s national telemedicine service offering patients access to medical specialists and doctors remotely via smartphones—has been revolutionary, with over one hundred million teleconsultations in 2023 and the aim of closing the urban-rural healthcare gap.20 The platform developed AI/machine learning models to improve data collection, quality of care, and doctor-patient consultations on eSanjeevani.21 The Indian Council of Medical Research’s collaborations with AI start-ups for disease prediction models in tuberculosis and diabetes paved the way for preventive healthcare interventions.

The agricultural sector is experiencing an AI revolution, driven by government initiatives, particularly through two key platforms. The mKisan portal gives more than fifty million farmers personalized SMS access to critical agricultural information, while the Agristack initiative lays the groundwork for precision agriculture by providing AI-powered advisory services for crop planning, pest control, and weather forecasting. The Indian Meteorological Department’s use of AI has improved monsoon forecast accuracy by 20 percent, significantly impacting agricultural planning.22

In education, state governments have contracted with Embibe, a company that offers AI-powered learning for basic education to bridge the learning gaps and expand access to quality education. It identifies gaps in knowledge and creates content that addresses them by studying data from student interactions. FutureSkills Prime, an initiative of the National Association of Software and Service Companies, provides AI skills training—and has developed a large AI talent pool, with more than 2.5 million technology professionals trained in AI in India. According to the 2025 Global Workplace Skills Study by Emeritus, 96% of Indian professionals are using AI and generative AI tools at work, significantly higher than the 81% in the US and 84% in the UK. This workforce advantage has made India a preferred destination for global companies seeking skilled AI professionals.

India’s public-sector-led approach to AI development uniquely integrates technology with development priorities. The government’s strategic leadership in deploying AI solutions in healthcare, agriculture, education, and finance demonstrates a unique model in which technology acts as a force multiplier for development efforts. Unlike many developed countries, where private-sector innovation drives AI advancement, India’s government-led initiatives ensure that AI solutions address fundamental development challenges on a large scale.

By combining scale, accessibility, and local relevance, India’s public-sector leadership in AI deployment is a unique model for other developing countries facing similar challenges, demonstrating that technology can effectively accelerate inclusive development when guided by clear public-policy goals.

Shaping tomorrow: India’s position in global AI leadership and development

India’s global AI leadership position is uniquely shaped by proactive government policies and collaborative initiatives. As a founding member of the Global Partnership on Artificial Intelligence (GPAI), India has used its presidency in 2024 to advance key priorities such as democratizing access to AI skills, addressing societal inequities, promoting responsible AI development, and applying AI in critical sectors such as agriculture and education.

AI plays a critical role in India’s vision to achieve all seventeen SDGs by 2030. India also aims to be one of the top three countries in AI research, innovation, and application by 2030, which reflects a larger ambition: to create a more equitable and sustainable global AI landscape. This unique approach balances technological autonomy and inclusive development, by aligning AI initiatives with socioeconomic priorities to address India’s unique challenges.

However, the expansion of India’s AI ecosystem faces several critical challenges, including the demand for an advanced AI compute infrastructure, developing accessible AI tools, ensuring data privacy, and mitigating algorithmic bias at scale. Addressing these issues requires multistakeholder collaboration between the government, local industry leaders, and academic institutions.

As India progresses in its AI journey, its experience provides valuable insights into how to use AI to drive socioeconomic development. The country’s development-focused approach to AI adoption and governance may serve as a model for other developing countries looking to capitalize on AI’s potential for inclusive growth.

About the authors

Mohamed “Mo” Elbashir is a nonresident senior fellow at the Atlantic Council’s GeoTech Center, as well as Meta Platforms’ global infrastructure risk and enablement manager. With over two decades of experience, he specializes in global technology governance, regulatory frameworks, public policy, and program management.

Kishore Balaji Desikachari is the executive director for government affairs at IBM India/South Asia. With over thirty years of leadership experience at Microsoft, Intel, and Hughes, he is a recognized regional policy commentator on AI, quantum computing, semiconductors, trade, and workforce strategies.

Related content

Explore the program

The GeoTech Center champions positive paths forward that societies can pursue to ensure new technologies and data empower people, prosperity, and peace.

1    World Economic Forum, “Sovereign AI: What It Is, and 6 Ways States Are Building It,” September 10, 2024, https://www.weforum.org/stories/2024/04/sovereign-ai-what-is-ways-states-building/.
2    United Nations member states adopted these SDGs in 2015. See “The 17 Goals,” United Nations Department of Economic and Social Affairs, accessed February 20, 2025, https://sdgs.un.org/goals
3    The National AI Portal of India,” INDIAai, n.d., https://indiaai.gov.in/.
4    “Indian AI Ecosystem: State of the Industry Report,” National Association of Software and Service Companies, December 2023, https://nasscom.in/knowledge-center/publications/weathering-challenges-indian-tech-start-landscape-report-2023.
5    Ministry of Electronics and Information Technology, “India AI Mission: Vision and Implementation Strategy,” Government of India, 2023, https://www.meity.gov.in/indiaai.
6    “National Strategy for Artificial Intelligence: Updated Framework,” National Institution for Transforming India (aka NITI Aayog), Government of India, 2021, https://niti.gov.in/national-strategy-artificial-intelligence.
7    “Raise.” 2020. IndiaAI. 2020. https://indiaai.gov.in/raise.
8    “An Overview of SDGs,” NITI Aayog, n.d., https://www.niti.gov.in/overview-sustainable-development-goals.
9    “Bhashini,” Government of India, 2024, https://bhashini.gov.in/.
10    Department of Personnel and Training, “iGOT Karmayogi: Transforming Capacity Building in Government,” Government of India, 2023, https://igot.gov.in/.
11    “Indian Institute of Science,” n.d., https://iisc.ac.in/; and “Indian Institute of Technology Madras, Tamilnadu,” 2019, https://www.iitm.ac.in/.
12    Bharat, “Top 7 Computer Vision Research Institutes in India,” OpenCV, January 3, 2024, https://opencv.org/blog/computer-vision-research-in-india/.
13    “With 10x Growth Since 2023, Llama Is the Leading Engine of AI Innovation,” Meta, 2024, https://ai.meta.com/blog/llama-usage-doubled-may-through-july-2024/
14    Supreeth Koundinya, “How I Met Your Llama,” Analytics India Magazine, October 26, 2024, https://analyticsindiamag.com/ai-origins-evolution/how-i-met-your-llama/.
15    “Role of Edge AI in Enhancing Real-Time Data Processing,” Hindustan Times (as shown on Tata Elxsi website), December 12, 2024, https://www.tataelxsi.com/news-and-events/role-of-edge-ai-in-enhancing-real-time-data-processing.
16    “Health and Family Welfare Statistics in India 2023,” Ministry of Health and Family Welfare, Government of India, 2023, https://mohfw.gov.in/?q=publications-11; and Sakthivel Selvara et al., India Health System Review, World Health Organization Regional Office for South-East, Health Systems in Transition 11, no. 1 (2022), https://iris.who.int/handle/10665/352685.
17    ASER Centre, “Annual Status of Education (Rural) Report 2023,” Pratham Education Foundation, January 2024, https://asercentre.org/wp-content/uploads/2022/12/ASER-2023-Report-1.pdf
18    “Analytical Reports,” PRS Legislative Research, n.d., https://prsindia.org/policy/analytical-reports/state-agriculture-india.
19    Reserve Bank of India–Annual Report,” 2024, Rbi.org.in, https://www.rbi.org.in/Scripts/AnnualReportPublications.aspx?Id=1404.
20    “Esanjeevani,” n.d., https://esanjeevani.mohfw.gov.in/.
21    “Clinical Decision Support System (CDSS) for Esanjeevani,” MIT SOLVE, 2022, https://solve.mit.edu/challenges/heath-in-fragile-contexts-challenge/solutions/75300.
22    “AI Helps Improve Predictability of Indian Summer Monsoons,” Department of Science & Technology,” 2023, https://dst.gov.in/ai-helps-improve-predictability-indian-summer-monsoons.

The post India’s path to AI autonomy appeared first on Atlantic Council.

]]>
Carole House testifies to House Committee on Financial Services on regulation and security in stablecoins and digital payments https://www.atlanticcouncil.org/commentary/testimony/carole-house-testifies-to-house-committee-on-financial-services-on-regulation-and-security-in-stablecoins-and-digital-payments/ Wed, 12 Mar 2025 21:02:37 +0000 https://www.atlanticcouncil.org/?p=832334 On March 11, Senior Fellow Carole House testified to the House Committee on Financial Services at a hearing titled, "Examining a Federal Framework for Payment Stablecoins and Consequences of a US Central Bank Digital Currency."

The post Carole House testifies to House Committee on Financial Services on regulation and security in stablecoins and digital payments appeared first on Atlantic Council.

]]>
On March 11, Senior Fellow Carole House testified to the House Committee on Financial Services at a hearing titled, “Navigating the Digital Payments Ecosystem: Examining a Federal Framework for Payment Stablecoins and Consequences of a U.S. Central Bank Digital Currency . Below are her prepared remarks.

Thank you Chairman Hill, Ranking Member Waters, and distinguished members of the committee, for holding this hearing and the honor of the invitation to testify on the digital payments ecosystem. I applaud your leadership in convening the committee on this important issue and continuing the years-long efforts of this committee across several Congresses to evaluate and build legislation for a stablecoin regulatory framework. I hope my testimony will be helpful in considering some of the most important aspects of frameworks needed to drive innovation in a secure, competitive, safe, and sound digital payments ecosystem that reinforces national security interests, defends consumers, and preserves personal liberty.

I have spent my career working at the intersection of national, economic, and technological security. I have had the honor of serving three tours in the White House, including recently departing from my second stint at the National Security Council leading various policy efforts on cybersecurity, emerging technology, and digital assets, to include the US Counter-Ransomware Strategy and the previous administration’s Executive Order on Ensuring Responsible Development of Digital Assets. I previously led digital asset policy initiatives at the US anti-money laundering and countering financing of terrorism (AML/CFT) regulator, the Financial Crimes Enforcement Network (FinCEN) and have served on advisory boards for the US Commodity Futures Trading Commission, the Idaho Department of Finance, and the New York Department of Financial Services (NYDFS). Through my ongoing work as a senior fellow at the Atlantic Council GeoEconomics Center and previous work as a consultant and executive at a venture capital firm, I have advised companies, academia, and policymakers in support of strategy, policy, standards, and product development ranging across areas like cybersecurity, AML/CFT, digital assets, and artificial intelligence and machine learning. The views I share are my own and do not reflect the views of the Atlantic Council.

The most important message I can underscore to this committee is the criticality of ensuring our regulatory frameworks create a foundation for providing trustworthy and affordable access to financial services for consumers while also reinforcing the centrality of the United States in the financial system and as the home for responsible, cutting-edge innovation in emerging technologies and payments. That includes the critical need for timely progress on a comprehensive stablecoin framework that supports these objectives, as well as driving broader experimentation and competitiveness in digital payments. Just as important, any framework demands more than just policy that is clear, strong, and comprehensive, but also that is implemented and enforced timely and scoped to shape the sector.

While timely progress is critical, these frameworks must be deliberate, thoughtful, and comprehensive of the real and present risks, as well as opportunities, that we have observed in the digital asset ecosystem and broader financial system. In the wake of serious national security threats like billion-dollar hacks by rogue nations, growing integration of cryptocurrency as a tool for transnational organized crime, market manipulation and fraud that can threaten system integrity and stability, as well as pressure from adversarial nations seeking to develop and leverage alternative payment systems to weaken and circumvent the dollar, it is clear that strong safeguards, including for US competitiveness, are needed. This framework also demands we ensure policy and enforcement approaches both domestically and internationally create a level playing field for US firms—often the most compliant firms in the world—to be able to compete fairly. Otherwise, the foundation we build these systems on risks faltering, with the potential to not only reap significant harms but also prevent us from harnessing the greatest positive potential that is possible from a secure and innovative digital payments ecosystem.

Background: Exigency for competition, security, and liberty

Stablecoin features, uses, benefits, and risks

Stablecoins, a class of cryptoassets that maintain a stable value in relation to another asset, most predominantly fiat currencies, hold potential to help drive needed innovations in our digital payments ecosystem. Stablecoins with proper protections can help improve efficiency in delivery of financial products and services, promoting greater transparency for monitoring of various risks in financial services, enhancing resiliency within the financial system, dismantling barriers to financial access and inclusion, and promoting innovation and competition that can strengthen US markets and leadership. With the current stablecoin market cap sitting at over $227 billion, use cases are growing across areas like dollar settlement for financial services firms, cross-border remittances, relief efforts like to Ukrainian refugees, and even for inflation hedges in places like Venezuela. However, stablecoins are largely still used as settlement in trading activity on cryptocurrency platforms—wide adoption in exchange for goods and services is not yet a reality, though it’s possible that a clear regulatory framework to enable greater trust and accountability may facilitate higher adoption.

Most of the core features for any cryptocurrencies apply to stablecoins—including their ability to transfer significant value peer-to-peer (i.e., from user to user without the need for a typical custodial role of a third-party financial intermediary), pseudonymously, immutably (or irreversibly), with global reach, with increased speed and cost efficiencies—though we must note that these are all features that are attractive to both licit and illicit actors. Challenges in mitigating risks in cryptocurrency are especially driven by by lagging AML/CFT compliance as well as broader prudential standards across the sector internationally, reinforced by the absence or reduction of financial institution intermediaries and central points of control in more highly decentralized cryptocurrency systems that can obscure clear lines of responsibility and accountability within cryptocurrency ecosystems. While stablecoins are used across more decentralized networks, in most cases stablecoins generally at least central administrators and issuers that can ease establishing lines of responsibility.

Where there is an absence of clear responsible parties, compounded by the immutability or unchangeability of cryptocurrency ledgers, it can be extremely challenging to provide mechanisms for victim recourse as well as timely adaptation to take measures to stop movement of illicit funds or patch security vulnerabilities in networks and smart contracts. However, in contrast to SWIFT, FedWIRE, and cash movements that do not publish transactions to public ledgers, on-chain stablecoin transactions include a lot of public transparency that can be beneficial to market surveillance and crypto investigations. Though ultimately the benefits presented by this transparency can be difficult to leverage with earlier-mentioned challenges with compliance, acceptance of accountability, and expertise across both public and private stakeholders.

Risks that can be presented by stablecoins without proper controls in place generally reflect the same kinds of risks that can exist in traditional finance (or “tradfi”). For example, fraud, market manipulations, and conflicts of interest across stablecoin leaders or public officials can present risks to investors and consumers. Pump-and-dump schemes and front-running capabilities enabled through maximal extractable value (MEV) schemes can endanger market integrity, and complex interconnections, concentration risks, and hardwired procyclicality in stablecoin or any other decentralized finance (“defi”) systems can present risks to financial system stability. Failures like that of Synapse Financial Technologies and of stablecoin Terra underscored the consequences of insufficient oversight of regtech and stablecoin platforms, and the devastating consequences to consumers without access or ability to recover some or all of their funds.

The risks to national security on getting the stablecoin framework wrong—either by being too lax on controls or by overly restricting companies and driving innovation offshore—are also important to evaluate. If stablecoins present the greatest potential for at-scale adoption for cross-border payments in cryptocurrency, then national security concerns of losing sanctions and AML/CFT tool efficacy can present in several ways: either from failing to drive US stablecoin competitiveness compared to other national currency denominated stablecoins or payment systems; or risks that could present from stablecoins and other defi diminishing reliance or need for US correspondent banking relationships in foreign exchange (FX) transactions or other cross-border funds flows.

The need for a framework

The United States does not yet have a comprehensive framework for regulation of stablecoins. Instead, existing authorities are fragmented at the federal level largely only via AML/CFT regulation and then across certain states like New York that cover stablecoins. In the absence of leveraging existing bank and trust charter authorities; using Dodd-Frank payment, clearing, and settlement activity designation authorities; setting up a Federal payments charter; or taking any other action to create a framework, the United States lags behind many other jurisdictions like the European Union, Singapore, Japan, and the United Arab Emirates that have established requirements and most importantly clear pathways to registration and supervision for stablecoins operating within their jurisdictions.

The United States must prioritize establishing a stablecoin framework during this Congress. Similar in many functions and operations to more traditional financial assets, stablecoins and associated deposit and payments activities are things that we understand how to regulate and protect. This framework is achievable, able to build on years of bipartisan efforts working across the aisle to construct a truly comprehensive approach. With Congress and the administration positioned to prioritize this legislation, we are at a critical juncture to get a law passed in 2025.

We need strong prudential and consumer protection regulations to ensure that stablecoins are truly “stable,” allowing any user to trust in its value and avoid losses from the issuer’s default or illiquidity. In this way, a clear regulatory framework that fosters trust can actually help set conditions that could help drive broader adoption and competition. We also need to have strong AML/CFT protections in place for stablecoin ecosystems. These different regimes do not operate in silos, but instead mutually reinforce each other and address vulnerabilities that are being exploited by illicit actors targeting the cryptocurrency sector. For example, in the case of Democratic People’s Republic of Korea (DPRK) hacks of cryptocurrency platforms, like the recent $1.5 billion Bybit hack, are exploiting both cybersecurity weaknesses and vulnerabilities as well as AML/CFT deficiencies in their crypto heists and subsequent laundering activities. In crypto heists, stablecoins have been targets as well as laundering tools exploited by hackers. Only through a comprehensive framework can we ensure that measures across the spectrum of areas like cybersecurity and AML/CFT are holistically addressed in these important ecosystems.

Though also important to note, especially in light of recent changes in enforcement posture—beyond just creating the policy framework, the government and industry must work to apply and enforce the framework. A policy that is not enforced or implemented does nothing to benefit consumers nor US firms with stronger compliance programs that have been operating at higher costs and less competitive advantages than many foreign operating firms.

Proposed stablecoin legislation:Ensuring sufficient protections

There has been a great amount of attention paid to stablecoin legislation in recent years with various stablecoin bills introduced, including the McHenry-Waters bill and Lummis-Gillibrand Payment Stablecoin Act developed last Congress, as well as the STABLE Act and GENIUS Act introduced so far this Congress.

I am very glad to see the level of support within Congress for elevating stablecoin legislation to a priority this year, something I spoke to as essential in my testimony to the Subcommittee on Digital Assets, Financial Technology, and Inclusion last year. I am also pleased to see many elements included in the STABLE Act referenced for this hearing that I support, such as high-quality reserves on at least a 1:1 basis, envisioned roles for both state and Federal regulators, and restrictions on rehypothecating reserve assets as well as stablecoin issuer activities. However, the STABLE Act appears to walk back a lot of the hard work done for years across the aisle to develop the negotiated text between then Chair McHenry and Ranking Member Waters in 2024. It is unclear why some of those critical protections, especially the prudential framework and clear AML/CFT and sanctions applicability to US dollar-denominated stablecoin activity, are absent in the STABLE Act and the GENIUS Act or if the associated risks are otherwise being addressed.

Here I outline some areas for the Committee’s consideration in hopes that the legislation for stablecoins issued this year can be truly comprehensive:

  • Ensuring federal line-of-sight for supervision on issues of systemic importance: The STABLE Act, in some ways similar to the existing banking regime, provides for both federal and state authorities to charter stablecoin issuers. However, the STABLE Act does not include any coordination between the federal and state regulators. Rather, the current draft permits a system where a trillion-dollar nonbank stablecoin issuer, engaging in globally reaching payments activity that would typically place an institution under the oversight of federal authorities, without any sufficient line of sight by the Federal Reserve of activities and risks that rise to systemic importance. Unclearly defined “exigent” circumstances, especially in the way of Loper-Bright, as the only context for certain additional regulatory authorities severely restrict a regulator’s ability to monitor for and intervene to mitigate risks for assets that operate 24/7 around the world and with no concerns for borders.

I agree with many others who have testified before you all that state authorities provide an important chartering and oversight capability, including agility and expertise that can help scale appropriate supervision. State regulators with strong prudential, AML/CFT, and consumer protection frameworks are critical partners on the front lines of regulating the cryptocurrency industry, and I am sympathetic to the desire to preserve the states’ regulatory authorities. Though, it stands to reason that when these issuers are operating systems, especially large platforms, that are administering a substitute for the US dollar in international payments, some federal regulator—like the Federal Reserve Board, with its responsibility for monetary policy and financial stability, or the Office of the Comptroller of the Currency (OCC) with its chartering and supervision authority—should have the ability to monitor for their critical risks and have a say in the standards that stablecoin issuers need to meet, at a minimum when they are of a large enough size. The STABLE Act, as it currently stands, raises serious questions around the ability of federal authorities to have visibility of and ability to respond timely to moments of financial crisis and address systemic risks that may arise.

  • Scope of risk coverage and enforcement regime: The STABLE Act references risks to mitigate around operational and cybersecurity risks, but otherwise is severely lacking in reference to credit risk, market risk, concentration risk, and even limitations on additional management of capital and liquidity risk beyond the 1:1 reserve collateralization requirement. There is no clear articulation of responsibility for rules or implementation of requirements under privacy regimes like Gramm-Leach-Bliley Act or the AML/CFT framework of the Bank Secrecy Act (e.g., if Treasury/FinCEN would have sole AML/CFT rulemaking authority for payment stablecoin issuers or if they would be issued jointly). Additionally, the enforcement framework is unclear, with no references to specific penalties or enforcement provisions, including no clarity on extraterritorial operations of US dollar-denominated stablecoins.
  • Affiliate controls and application of the Bank Holding Company Act and Bank Services Company Act: The STABLE Act does not address affiliate relationships and restrictions for nonbank payment stablecoin issuers to preserve separation of activities like banking and commerce. In this new bill, it is unclear to what extent controls like from the Bank Holding Company Act as well as authorities for oversight and delegation of functions as delineated under the Bank Services Company Act apply to payment stablecoin issuers.
  • AML/CFT and sanctions: While the STABLE Act and GENIUS Act delineate that payment stablecoin issuers are financial institutions under the Bank Secrecy Act, it is not clear (especially to the degree needed in the wake of Loper-Bright) to what degree rulemaking can cover different parts of stablecoin ecosystems and which agency would be responsible for the rulemaking and oversight. Stablecoins have been exploited by illicit actors ranging from cartels to sanctions evaders to terrorism financiers, especially leveraging the absence of sufficient compliance across international operations and defi platforms. The United States Treasury has underscored the benefit for Congress to clarify that any US-dollar denominated stablecoin must comply with US sanctions policy, including extraterritorial applicability, and also make clear the expectation to maintain and assert freeze and recovery capability for illicit proceeds across the stablecoin. We should not find it acceptable for a US dollar stablecoin to be leveraged in transactions to designated actors and jurisdictions that present threats to US national security.

While unlikely in this round of legislation, Congress should start solidifying its views and drafting legislation to expand the regulatory perimeter to help mitigate risks across more decentralized applications of the assets. Expanding such a perimeter would generally involve considering what other entities would be of greatest utility to cover due to visibility and control of the assets, and ensuring that a risk-based approach properly scopes the obligations and does so in full understanding of what is technologically and operationally possible. While there are many differing views on how to approach defi controls, it is encouraging to see that within the defi community there are actors who are trying to implement responsible innovative fixes, even if they are not yet successful, as we saw recently in the unsuccessful attempt by several THORChain developers to try to stop DPRK money laundering on their platform.

  • Bankruptcy and resolution measures: Bankruptcy protections are one of the last lines of defense for fostering consumer trust in a product—building comfort for the customer that they will be able to get access to or redeem their assets held by the platform or issuer at any time on demand. The US Bankruptcy code, if applied to stablecoins in the wake of a failure, could be disastrous for token holders who would be treated equivalently to all other unsecured creditors. The McHenry-Waters bill outlined a potential alternative resolution process to help expedite recovery of assets for token holders that could work across federal and state levels and provide critical recourse for consumers.
  • Fed master accounts and broader payments framework: There is no reference in the STABLE Act or GENIUS Act to the authority of the Federal Reserve to grant access for stablecoin issuers to a master account, something that likely will continue to be sought especially as stablecoins get more regulated and attain higher assurance of their safety and soundness. With this legislation aiming to serve as the comprehensive construct of guardrails and authorities to enable innovation and protect payments, it should include provisions like this to ensure the capability exists with the Federal Reserve for any issuer it deems to be appropriate to grant access.

More broadly, stablecoin legislation would optimally be pursued as part of a holistic approach to regulation and supervision of all payments platforms, which are growing enough in complexity and adoption. Many of the risks for stablecoins are similar to those for broader payments, and given the desire to ensure critical protections for consumers regardless of the denomination of their asset or which app they happen to be using, Congress should keep an eye toward how to evolve regulatory frameworks to capture any of these activities regardless on if it is blockchain-based or not.

Again, I applaud the committee’s work on this issue and the continued leadership on these issues by key leaders like Chair Hill and Ranking Member Waster. I encourage the Committee to consider working from the previously negotiated McHenry-Waters bill, which includes bipartisan-vetted provisions that address many of the outstanding issues for the desired comprehensive stablecoin framework. I hope that my views on key missing elements will be helpful to the Committee in its thoughtful efforts to build out and implement a competitive, comprehensive stablecoin framework that addresses risks while promoting responsible innovation.

Proposed CBDC legislation: Privacy as paramount in retail CBDC

The new proposed CBDC Anti-Surveillance State Act bans CBDC experimentation. Innovations in digital payments and across digital forms of both public and private money can also take many forms—whether wholesale or retail CBDCs, stablecoins, tokenized deposits, digital payment applications, etc.—each of which carry a spectrum of diverse implementations and associated risks. Ultimately, it is likely that a mix of modernizations of public and privately-administered rails, such as with the current financial system, will be needed to achieve a future of vision like global instantaneous reach and accessibility of the dollar.

This legislation is pointed specifically at addressing concerns around privacy specific to CBDCs, which is a greater point of concern around retail CBDC implementations rather than wholesale payments that are not associated with specific consumers and related sensitive personal data. The bill proposes to address the privacy concerns by banning even experimentation to even assess if there are technological and governance implementations that could achieve desired privacy outcomes, whether in the US or even just for templates that partner nations could implement. The bill also does not address privacy issues presented by private cryptocurrencies, such as privacy concerns exacerbated by public unobscured records of financial transactions and challenged cybersecurity practices across the sector.

An apparent improvement on this bill from earlier versions appears to be amending the prohibition to only retail CBDCs. Concerns around privacy for a retail CBDC are understandable and very important, especially in the United States given sentiments of Americans around making information available to the government and even challenges that have existed in trying to adopt digital identity infrastructure. Many feel that given such concerns in the United States, focus on wholesale CBDCs as an initial area for innovation in cross-border settlement could be ripe for nearer-term exploration.

The kinds of building blocks that could enable privacy preservation and security in technologies like CBDCs—innovative technologies like digital identity infrastructure and privacy enhancing technologies like homomorphic encryption, multiparty computation, and zero-knowledge proofs—are also building blocks that can enable privacy and security in private cryptocurrency implementations as well. Even if specific development of a US retail CBDC is not likely, broader research and development and experimentation across the more nascent and underlying technologies and components can be helpful to identify mechanisms to achieve desired objectives across a variety of future forms of public and private money innovations.

This bill could further exacerbate a growing gap for the United States in digital payments innovation, as over one hundred countries representing 98 percent of global GDP continue to explore CBDCs and conduct cross-border pilots. The United States remains the only member of the G20 to not be in advanced stages of CBDC exploration. CBDC experimentation is at the heart of significant research and development across the international community trying to shape what the future of the financial system looks like, experimentation that without a major US leadership presence is in some ways both a symptom and a driver towards interest of potential rails less reliant on the dollar, and something in which we cannot idly forsake leadership.

In the interests of safeguarding capabilities for experimentation and ensuring that the United States remains at the forefront of digital payments innovation, I outline here some areas for consideration for this proposed anti-CBDC legislation:

  • Narrowing the prohibition to retail CBDCs: Recent updates to the proposed CBDC Anti-Surveillance State Act appears to narrow the prohibition of research and development, testing, or issuance to retail CBDCs only with the addition of the feature “widely available to the general public” into the definition of CBDC. If that is the intent, this avoids several significant challenges presented by the previous House-passed version of the bill, as well as that referenced in the recent executive order prohibition, that even the Congressional Budget Office (CBO) noted included such broad definitions that it was unclear if they could be interpreted to ban existing digital forms of central bank reserves and impact the ability to conduct monetary policy. However, if this bill is aimed at prohibiting wholesale digital payments innovation, or other forms of digital payments innovations like tiered or intermediated innovations like in certain implementations of stablecoins or tokenized deposits, additional concerns would remain related to stifling the ability to modernize the US financial system.
  • Legal necessity unclear: The necessity of this legislation to prohibit any experimentation and research and development in CBDCs appears unnecessary if the ultimate concern is to ensure against the issuance of a retail CBDC without Congressional approval. The Federal Reserve already published its own analysis highlighting that the Federal Reserve Act does not authorize direct Federal Reserve accounts for individuals. Both the Fed and Treasury have also voiced that they would only move forward with issuance of a CBDC with clear support from both Congress and the executive branch. With Congressional approval already assessed as a precondition to issuance of at least retail CBDCs, and supported as necessary by the lead executive authorities, this prohibition appears unnecessary to achieve the policy outcome when Congress could just withhold authorization. If the refocus of this updated proposed legislation is only prohibiting retail CBDCs, research and development as well as operations to optimize and conduct of digital wholesale payments and settlement activities by central banks would hopefully not affected by this legislation as the Congressional Budget Office assessed could have been impacted by previously proposed versions.
  • Adjusting framing: The US government fully supports privacy in any democratic CBDC: This bill’s title and corresponding messaging unfortunately present an inaccurate picture that CBDCs must inherently intimate an authoritarian “surveillance state.” CBDCs do not have to mean “Big Brother” just as cryptocurrencies do not have to mean anarchy. The implications for privacy are vastly different for wholesale versus retail CBDCs. Just as with privately administered cryptocurrencies, inherent features like privacy and discoverability are completely dependent upon the specific design of the systems. The Federal Reserve, the US Treasury and prior Administrations have been extremely consistent in messaging, including alongside the G7, that “rigorous standards of privacy” and accountability for that privacy are critical for any retail CBDC implementation. The CBDC discussion warrants nuance, just as the cryptocurrency discussion does.
  • Refocusing on impactful privacy measures: Rather than this legislation barring pilots and experimentation of implementations and building blocks to preserve privacy for some future possible CBDCs likely at least a decade away (research that could also help provide building blocks for other digital assets like stablecoins), Congressional action could instead pivot to focus on long-existing challenges presented by the absence of comprehensive consumer data privacy legislation. Especially given the low likelihood and far-off reality of cross-US government and public interest in a US retail CBDC (which the Federal Reserve, US Treasury, and potentially Congress have all agreed would require Congressional approval to issue if there ever were such an interest), Congressional focus on privacy legislation would be a more impactful area for focus.
  • Needed clarity on the protections meant for private stablecoins: It is unclear exactly what protections are being offered under section 4, which defends from prohibition only “any dollar-denominated currency that is open, permissionless, and private, and fully preserves the privacy protections of United States coins and physical currency.” This is oddly framed and could place significant prohibitions on industry cryptocurrency implementations, if this intimates that there are intended to be restrictions here placed on certain industry cryptocurrency implementation, such as private stablecoins that aim to get a master account with the Federal Reserve. It is unclear if this intimates that permissioned stablecoin implementations may be barred from direct or indirect relationship with the Fed. It is also unclear what fully preserved privacy protections means in this context, given that the privacy features of cash (e.g., can move value without a third party, is not posted to any ledgers) do not exactly equate to the privacy features of any existent cryptocurrency (e.g., value movements generally require certain types of third parties—even if unregulated intermediaries—such as miners and validators, and transactions post on public ledgers). It would be important to clarify which privacy features of cash they desire, or what the specific balance of discoverability versus obfuscation is desired in the cryptocurrency system, as part of broader clarity on what this section is intended to achieve.

In closing, I would like to again underscore my gratitude for the honor of the opportunity to speak with you all today. It is critical that the United States make timely progress on establishing and implementing a comprehensive stablecoin regulatory framework that leverages years of effort on defining critical holistic protections that also reinforce the central role in the financial system and as a leader in technological innovation.

Thank you.

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post Carole House testifies to House Committee on Financial Services on regulation and security in stablecoins and digital payments appeared first on Atlantic Council.

]]>
Emerging technology policies and democracy in Africa: South Africa, Kenya, Nigeria, Ghana, and Zambia in focus https://www.atlanticcouncil.org/in-depth-research-reports/report/emerging-technology-policies-and-democracy-in-africa-south-africa-kenya-nigeria-ghana-and-zambia-in-focus/ Mon, 10 Mar 2025 12:30:00 +0000 https://www.atlanticcouncil.org/?p=830835 How are African nations navigating the governance of AI, digital infrastructure, and emerging technologies? Emerging Technology Policies and Democracy in Africa: South Africa, Kenya, Nigeria, Ghana, and Zambia in Focus examines how five key countries are shaping regulatory frameworks to drive innovation, protect digital rights, and bridge policy gaps in an evolving tech landscape.

The post Emerging technology policies and democracy in Africa: South Africa, Kenya, Nigeria, Ghana, and Zambia in focus appeared first on Atlantic Council.

]]>

Executive summary

Africa is increasingly asserting its participation in the advancement of emerging technologies by engaging in active dialogues and devising roadmaps for the development, deployment, and regulation of these technologies. However, strategies to employ emerging technologies vary widely both in levels of progress as well as regulatory mechanisms. This report explores how five African countries—South Africa, Kenya, Nigeria, Ghana, and Zambia—are strategically navigating the governance of new technologies to enrich their citizens’ lives while mitigating potential risks. It focuses on three key emerging technology domains, namely: connectivity, digital public infrastructure, and artificial intelligence (AI).

Beginning with an analysis of the foundational digital technology policies around data protection and governance and cybersecurity, the country reviews highlight the current landscape of laws, and strategies governing each of the emerging technologies of interest. By exploring the strengths and weaknesses of each country’s policy landscape across these technology domains, the report offers insights into prospects and challenges in harnessing emerging technologies for societal good.

The report finds that governments are generally optimistic about the potential impact of emerging technologies on economic development in their respective countries. This is reflected in the large public investment in technology infrastructure, promotion of innovative ecosystems, and the integration of information and communication technologies (ICTs) into e-governance and e-services toward a holistic digitalized economy and society. The countries’ multistakeholder approaches highlight the need for responsible governance while promoting active private-sector engagement for the public good.

Nigeria, South Africa, Kenya, and Ghana were found to have comparatively robust policies for each emerging technology examined, or at least—as is the case with Kenya—documentation or drafts in the form of gazettes and public consultation documents. Government efforts are more prominent in the AI domain, given the increased attention it has garnered lately. However, these frameworks are hampered by limited implementation capacities, poor infrastructure, policy fragmentation and overlap, low digital literacy levels, and a growing digital divide. Zambia on the other hand, while having strong aspirations to become an ICT-enabled knowledge economy, lacks dedicated policies pertaining to emerging technologies. Although the country’s data-protection laws, intellectual property, cyber security, and consumer protection provide a foundational framework, more updated regulations are required to keep pace with the speed at which emerging technologies are playing an increasingly pivotal role in citizens’ daily lives.

A SWOT (i.e., strengths, weaknesses, opportunities, and threats) analysis of the broader digital-technologies sector across these countries reveals some universal themes. Strengthwise, governments are generally proactive and enthusiastic about engaging new technology issues, and ICT authorities tend to adapt quickly to new developments by publishing subsidiary laws, releasing draft statements, or convening multistakeholder workshops, where national policy frameworks are absent. An overarching rather than specific sectoral or technology-domain approach also drives national technology pursuits, where for example, all the five countries examined have a national ICT/digital economy strategy which predates and already makes foundational provisions for emerging technology policies. Policy-formulation processes were driven by stakeholder engagement and public consultations, as seen in regular calls for contributions and multistakeholder convenings leading up to policy enactment. Yet huge disparities were observed within countries, where rural and marginalized urban communities, as well as women, are left behind by governmental technology ambitions. This calls for updated policy frameworks and strategies that emphasize inclusion and other sociopolitical considerations to avoid deepening inequities.

For Africa to leverage emerging technologies for socioeconomic development while maintaining accountable and transparent systems, legislative frameworks must be streamlined alongside strong institutional integration to ensure effective enforcement. It is imperative that policymakers develop a strong understanding of emerging technologies to enhance their capacities for developing comprehensive policies to address them. Equally important is raising public awareness to protect the African people’s digital rights and foster safe digital environments.

About the authors

Ayantola Alayande is a Researcher at the Global Center on AI Governance. There, Ayantola works on the African Union Continental AI Strategy and the African Observatory on Responsible AI. He is also a researcher at the Bennett Institute for Public Policy at the University of Cambridge, where he focuses on industrial policy and the future of work in the public sector.

Samuel Segun, PhD is a Senior Researcher at the Global Center on AI Governance. He is also an AI Innovation & Technology consultant for the United Nations Interregional Crime and Justice Research Institute (UNICRI), where he works on the project ‘Toolkit for Responsible AI Innovation in Law Enforcement’.

Leah Junck, PhD is a Senior Researcher at the Global Center on AI Governance. Her work explores human-technology experiences. She is the author of Cultivating Suspicion: An Ethnography and Like a Bridge Over Trouble: An Ethnography on Strategies of Bodily Navigation of Male Refugees in Cape Town.

Explore the program

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

The post Emerging technology policies and democracy in Africa: South Africa, Kenya, Nigeria, Ghana, and Zambia in focus appeared first on Atlantic Council.

]]>
Ukraine’s IT sector offers opportunities for pragmatic partnership with the US https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-it-sector-offers-opportunities-for-pragmatic-partnership-with-the-us/ Thu, 27 Feb 2025 21:03:50 +0000 https://www.atlanticcouncil.org/?p=829408 As the new Trump administration reassesses its foreign partnerships through a lens of transactional pragmatism, Ukraine’s IT sector presents a potentially compelling case for deepening bilateral cooperation, write Anatoly Motkin and Hanna Myshko.

The post Ukraine’s IT sector offers opportunities for pragmatic partnership with the US appeared first on Atlantic Council.

]]>
As the new Trump administration reassesses its foreign partnerships through a lens of transactional pragmatism, Ukraine’s IT sector presents a potentially compelling case for deepening bilateral cooperation.

While Ukrainian President Volodymyr Zelenskyy has sought to maintain strong ties with the United States, the current shift away from aid-based diplomacy signals that Ukraine must further demonstrate its economic value. In this context, the thriving Ukrainian IT industry is a key asset. This sector not only drives domestic economic resilience, but also offers tangible benefits to American businesses through investment, technological innovation, and cybersecurity expertise.

Since the onset of Russia’s full-scale invasion three years ago, Ukraine’s IT industry has proven to be a resilient and dynamic force. Despite the ongoing war with Russia, the sector has demonstrated remarkable adaptability. In 2024, Ukraine’s IT services exports reached $6.45 billion, contributing 4.4 percent of the country’s GDP and accounting for approximately 38 percent of Ukraine’s total service exports. This strong performance has been possible despite the challenges posed by the largest European invasion since World War II, underscoring the Ukrainian IT sector’s ability to operate under extreme conditions.

Beyond its financial contribution, the Ukrainian IT industry also plays a crucial role in employment. By 2024, Ukraine’s IT workforce had grown to more than 300,000 specialists, solidifying its position as a major employer and a pillar of Ukrainian economic stability in today’s wartime environment.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

The United States is already an important partner for Ukraine’s IT industry. In 2023, the US was the largest importer of Ukrainian IT services, accounting for $2.39 billion or 37.2 percent of the industry’s total exports. This presents opportunities for intensified bilateral collaboration in both the private and public sectors that have the potential to transcend the kind of aid-based relations found elsewhere in the region.

Ukrainian IT companies are not seeking handouts but are actively investing in the US market. Rather than displacing American jobs, they are creating new opportunities and fostering technological advancements. Importantly, these companies are not appropriating US technologies but are in many cases sharing their own advanced developments. This cooperative approach could strengthen both economies, reinforcing a business-driven relationship that aligns with the Trump administration’s strategic vision.

The knowledge-based economy benefits immensely from such international partnerships. Unlike resource-dependent models, this framework ensures a two-way exchange of expertise. Ukraine’s IT professionals are already playing a significant role in cybersecurity, actively defending against digital threats and ensuring the integrity of critical infrastructure. From the early days of Russia’s full-scale invasion, they have consistently delivered in even the most difficult of circumstances and have enhanced Ukraine’s global reputation as a leading tech nation.

Moreover, the war has propelled Ukrainian engineers to the forefront of innovation in autonomous systems including aerial, maritime, and other drone technologies. Many of Ukraine’s most recent innovations in the drone sphere leverage AI. The depth of experience gained in developing and deploying these systems under real combat conditions is unparalleled worldwide. For the US defense industry, collaboration with Ukraine in this domain could be invaluable, offering access to battle-tested innovations that have the potential to redefine modern warfare.

The obvious synergies between the US and Ukrainian tech industries extends beyond the private sector. Cooperation in areas such as dual-use technologies should be prioritized by both governments to enhance security and drive innovation. Strengthening this partnership could contribute to a safer and more prosperous future for both nations.

By leveraging Ukraine’s IT expertise, the United States can improve its own technological capabilities while supporting a partner nation at a critical time. This partnership can bring further economic and strategic benefits to both parties. As the Trump administration moves toward a business-driven approach to US foreign policy, strengthening ties with Ukraine’s IT sector could boost innovation and security while also offering a range of business opportunities.

Anatoly Motkin is president of StrategEast, a non-profit organization with offices in the United States, Ukraine, Georgia, Kazakhstan, and Kyrgyzstan dedicated to developing knowledge-driven economies in the Eurasian region. Hanna Myshko is regional director for Ukraine, Moldova, and the Gulf at StrategEast.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine’s IT sector offers opportunities for pragmatic partnership with the US appeared first on Atlantic Council.

]]>
Samaan in Institut Montaigne: AI: United Arab Emirates, key partner of France or risk for its digital sovereignty? https://www.atlanticcouncil.org/insight-impact/in-the-news/samaan-in-institut-montaigne-ai-united-arab-emirates-key-partner-of-france-or-risk-for-its-digital-sovereignty/ Tue, 25 Feb 2025 18:13:48 +0000 https://www.atlanticcouncil.org/?p=828392 The post Samaan in Institut Montaigne: AI: United Arab Emirates, key partner of France or risk for its digital sovereignty? appeared first on Atlantic Council.

]]>

The post Samaan in Institut Montaigne: AI: United Arab Emirates, key partner of France or risk for its digital sovereignty? appeared first on Atlantic Council.

]]>
CBDC tracker and event with Fed Governor Waller cited in CoinGeek https://www.atlanticcouncil.org/insight-impact/in-the-news/cbdc-tracker-and-event-with-fed-governor-waller-cited-in-coingeek/ Tue, 18 Feb 2025 15:48:38 +0000 https://www.atlanticcouncil.org/?p=827649 Read the full article here

The post CBDC tracker and event with Fed Governor Waller cited in CoinGeek appeared first on Atlantic Council.

]]>
Read the full article here

The post CBDC tracker and event with Fed Governor Waller cited in CoinGeek appeared first on Atlantic Council.

]]>
Tran cited in paper on Chinese technological influence published by the Carnegie Endowment for International Peace https://www.atlanticcouncil.org/insight-impact/in-the-news/tran-cited-in-paper-on-chinese-technological-influence-published-by-the-carnegie-endowment-for-international-peace/ Fri, 14 Feb 2025 19:26:34 +0000 https://www.atlanticcouncil.org/?p=826002 Read the full paper here

The post Tran cited in paper on Chinese technological influence published by the Carnegie Endowment for International Peace appeared first on Atlantic Council.

]]>
Read the full paper here

The post Tran cited in paper on Chinese technological influence published by the Carnegie Endowment for International Peace appeared first on Atlantic Council.

]]>
Event with Fed Governor Waller featured in Business Insider on how stablecoins can promote the dollar’s global use and status https://www.atlanticcouncil.org/insight-impact/in-the-news/event-with-fed-governor-waller-featured-in-business-insider-on-how-stablecoins-can-promote-the-dollars-global-use-and-status/ Fri, 14 Feb 2025 16:02:30 +0000 https://www.atlanticcouncil.org/?p=824281 Read the full article here

The post Event with Fed Governor Waller featured in Business Insider on how stablecoins can promote the dollar’s global use and status appeared first on Atlantic Council.

]]>
Read the full article here

The post Event with Fed Governor Waller featured in Business Insider on how stablecoins can promote the dollar’s global use and status appeared first on Atlantic Council.

]]>
Central bank digital currencies versus stablecoins: Divergent EU and US perspectives https://www.atlanticcouncil.org/blogs/econographics/central-bank-digital-currencies-versus-stablecoins-divergent-eu-and-us-perspectives/ Wed, 12 Feb 2025 18:21:09 +0000 https://www.atlanticcouncil.org/?p=825191 All policymakers agree on one point: both CBDCs and stablecoins will significantly impact the global role of the US dollar.

The post Central bank digital currencies versus stablecoins: Divergent EU and US perspectives appeared first on Atlantic Council.

]]>
The relationship between central bank digital currencies (CBDCs) and stablecoins will take center stage this year. New United States policies support dollar-backed stablecoins and oppose CBDCs. European policies take the opposite stance, arguing that CBDCs—including the digital euro and digital pound—provide financial stability, while cryptocurrencies and stablecoins create financial stability risks. All policymakers agree on one point: both CBDCs and stablecoins will significantly impact the global role of the US dollar.

Few were surprised, therefore, when President Trump began his second term with an executive order that prioritizes stablecoins as the preferred mechanism for safeguarding both the global role of the US dollar and financial stability. The executive order also stated that CBDCs create financial stability threats. In contrast, the monetary policy minutes from the December 2024 European Central Bank rate-setting meeting took the opposite position and proposed that crypto assets could create financial stability threats for the eurozone.

The 2025 reserve currency policy landscape: Four key issues to watch

Legislation: Despite their policy differences, European Union (EU) and US policymakers all face the same hurdle. CBDCs can not be issued without legislation.  Lawmakers in Brussels, London, and Washington are each declining to move forward quickly.  The European Parliament to date has declined to schedule a vote on the digital euro package submitted by the European Commission—despite urging by the ECB.  Nor has the UK Parliament moved forward with a digital pound initiative. 

The Republican-led Congress and the White House oppose CBDCs, ensuring that no CBDC legislation will move forward in the United States in the foreseeable future.  The Federal Reserve agrees. Chairman Jerome Powell yesterday testified to Congress  that he will not propose or pursue a digital dollar during the balance of his tenure at the central bank.  Chairman Powell’s term expires in spring 2026.  All relevant policymakers in the United States (the White House, Congressional leaders, regulatory agencies, the central bank) are now united in their opposition to a domestic CBDC. Their focus now turns towards articulating a legislative and regulatory framework supporting stablecoins.

House Financial Services Committee Chairman Hill’s 2025 interview with CNBC confirms that leading US lawmakers believe expanded stablecoin adoption would help “extend the reserve currency status” of the US dollar globally. In addition, Federal Reserve Governor Christopher Waller now publicly supports stablecoins “because they are likely to propagate the dollar’s status as a reserve currency, though they need a clear set of rules and regulations.” Senate Banking Committee Chairman Tim Scott weighed in during January, pledging to craft a stablecoin “regulatory framework that…will promote consumer choice, education, and protection and ensure compliance with any appropriate Bank Secrecy Act requirements.” It remains to be seen if dollar-backed stablecoins could strengthen the dollar’s role in the global payment system.

The structure of legislation will materially impact growth trajectories for stablecoin markets domestically and internationally, with implications for US sovereign bond markets. For example, a regulatory framework could require stablecoin issuers to hold US Treasury securities to back their stablecoins, thus guaranteeing liquidity and demand for US dollar-denominated sovereign paper. Additional proposals to create a crypto asset reserve at the federal level could provide additional liquidity support to crypto markets. 

Geopolitics: President Trump campaigned on promises to safeguard the global role of the dollar. His promises included wielding tariffs as a mechanism to discipline foreign countries that undermine the global role of the dollar, presumably in addition to aggressive sanctions enforcement. The Trump administration is not alone in raising red flags regarding certain CBDC use cases. Growing concern exists internationally that non-US dollar CBDC networks could be used to evade Western sanctions. Against this backdrop, in October 2024, the Bank for International Settlements withdrew from the wholesale CBDC mBridge project, whose members include central banks from China, Hong Kong, Thailand, the United Arab Emirates, and Saudi Arabia. The BIS General Manager reiterated the policy that “…the BIS does not operate with any countries, nor can its products be used by any countries that are subject to sanctions…we need to be observant of sanctions and whatever products we put together should not be a conduit to violate sanctions.” In addition, Russia has called for a multipolar global financial system with a separate non-dollar clearing and settlement system.

Distributed free markets: Stablecoins currently occupy a tiny fraction of financial market activity. Crypto itself remains minor relative to US capital markets. Globally, the estimated stablecoin market size is $227 billion in market capitalization, as compared to $6.22 trillion for US capital markets and $3.39 trillion for global cryptocurrency markets. If current double-digit growth rates for stablecoins continue, they could constitute a considerable proportion of overall crypto market capitalization, if not capital markets themselves. More importantly, the vast majority of stablecoins are pegged to the US dollar.

Rapid adoption rates paired with speedy transaction volumes and velocity in stablecoin markets mean that today’s stablecoin and CBDC decisions may amplify ongoing shifts in reserve currency markets. Dramatic shifts in reserve currency status historically have been rare events. The more likely scenario for threats to dollar dominance involve a range of alternative currencies nibbling at the dollar’s role at the margins. While the US dollar is comfortably in the lead, accounting for 49.2 percent of international payment messaging through SWIFT, its share of global FX reserves has fallen from 71 percent in 2001 to 54.8 percent at present. Decreased demand for dollars has increased demand for non-traditional currencies, gold, and several pairs of local currencies, rather than traditional reserve currencies.

In this context, choices made by individual users can materially impact global reserve currency status. The broad adoption of US dollar-backed stablecoins could even reverse the de-dollarization trend.  Decisions made by policymakers during 2025 will thus materially impact how the stablecoin and dollar markets evolve. 

European crypto rules: EU officials promote the digital euro as a mechanism for delivering strategic and economic autonomy relative to the US dollar. At the retail level, they compete with local payments processes currently dominated by US credit card companies. Globally, they facilitate increased usage of the euro as an international transaction currency. Secondary use cases include using blockchain technology to create “ tokenized” (euro-denominated) deposits that would cement the role of commercial banks within the payment system. European policymakers have also begun experimenting with tokenized securities. Slovenia became the first eurozone sovereign country to issue a tokenized euro area sovereign bond. In December, the Bank of France became the first eurozone central bank to complete transactions in the secondary market for both sovereign fixed income and equity using an unnamed digital currency on a blockchain.

However, if a critical mass of individuals in a country holds wealth in a foreign currency stablecoin, the competitive landscape, if not the survival of other reserve currencies, requires that they provide a digital alternative. The scenario also creates incentives for other jurisdictions to make it difficult to achieve  interoperability with non-euro stablecoins, while creating economic hurdles for local users to choose US dollar-backed stablecoins—essentially preserving their economic and monetary sovereignty.

Some see the newly issued EU crypto regulatory framework—the Markets in Crypto Assets (MiCA); and specifically the 1:1 ratio of required liquid reserves for stablecoins —as a strategic tool to raise barriers to non-EU issuers of US dollar-denominated stablecoins. MiCA extends bank-like regulatory requirements to crypto asset issuers and intermediaries. We discussed that framework and its relationship to the US crypto asset policy landscape in our January 28, 2025 Econographics essay. The framework potentially provides European regulators with the time and tools to play defense by regulating local stablecoin markets to permit either a digital euro or euro-denominated stablecoins to gain market traction. Market data will provide the metric for policy effectiveness.


Barbara Matthews is a nonresident senior fellow at the Atlantic Council’s Geoeconomics Center. She is also Founder and CEO of BCMstrategy, inc., a company that generates AI training data and signals regarding public policy.

Hung Tran is a nonresident senior fellow at the Atlantic Council’s Geoeconomics Center and senior fellow at the Policy Center for the New South; a former senior official at the Institute of International Finance and International Monetary Fund.

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post Central bank digital currencies versus stablecoins: Divergent EU and US perspectives appeared first on Atlantic Council.

]]>
Global China Hub nonresident fellow Hanna Dohmen in South China Morning Post https://www.atlanticcouncil.org/insight-impact/in-the-news/global-china-hub-nonresident-fellow-hanna-dohmen-in-scmp/ Tue, 11 Feb 2025 20:13:27 +0000 https://www.atlanticcouncil.org/?p=824304 On February 7th, 2025, South China Morning Post published an article referencing Global China Hub nonresident fellow Hanna Dohmen’s testimony for the US-China Economic and Security Review Commission on the effectiveness of export controls in slowing China’s AI advances.

The post Global China Hub nonresident fellow Hanna Dohmen in South China Morning Post appeared first on Atlantic Council.

]]>

On February 7th, 2025, South China Morning Post published an article referencing Global China Hub nonresident fellow Hanna Dohmen’s testimony for the US-China Economic and Security Review Commission on the effectiveness of export controls in slowing China’s AI advances.

The post Global China Hub nonresident fellow Hanna Dohmen in South China Morning Post appeared first on Atlantic Council.

]]>
Event on the future of payments with Federal Reserve Governor Christopher Waller featured in Politico’s Morning Money newsletter https://www.atlanticcouncil.org/insight-impact/in-the-news/event-on-the-future-of-payments-with-federal-reserve-governor-christopher-waller-featured-in-politicos-morning-money-newsletter/ Fri, 07 Feb 2025 21:13:44 +0000 https://www.atlanticcouncil.org/?p=824087 Read the full newsletter here

The post Event on the future of payments with Federal Reserve Governor Christopher Waller featured in Politico’s Morning Money newsletter appeared first on Atlantic Council.

]]>
Read the full newsletter here

The post Event on the future of payments with Federal Reserve Governor Christopher Waller featured in Politico’s Morning Money newsletter appeared first on Atlantic Council.

]]>
Event on the future of payments with Federal Reserve Governor Christopher Waller restreamed by Yahoo Finance https://www.atlanticcouncil.org/insight-impact/in-the-news/event-on-the-future-of-payments-with-federal-reserve-governor-christopher-waller-restreamed-by-yahoo-finance/ Fri, 07 Feb 2025 21:13:06 +0000 https://www.atlanticcouncil.org/?p=824082 Watch the full event here

The post Event on the future of payments with Federal Reserve Governor Christopher Waller restreamed by Yahoo Finance appeared first on Atlantic Council.

]]>
Watch the full event here

The post Event on the future of payments with Federal Reserve Governor Christopher Waller restreamed by Yahoo Finance appeared first on Atlantic Council.

]]>
Did DeepSeek just trigger a paradigm shift? https://www.atlanticcouncil.org/blogs/geotech-cues/did-deepseek-just-trigger-a-paradigm-shift/ Tue, 04 Feb 2025 19:05:51 +0000 https://www.atlanticcouncil.org/?p=823172 The release of DeepSeek's AI model may have far-reaching implications for global investment trends, regulatory strategies, and the broader AI industry.

The post Did DeepSeek just trigger a paradigm shift? appeared first on Atlantic Council.

]]>
DeepSeek stunned the artificial intelligence (AI) industry when it released its AI model, called DeepSeek-R1, claiming to have achieved performance rivaling OpenAI’s models while utilizing significantly fewer computational resources.

The bottom line is that DeepSeek has carved an alternative path to high-performance AI by employing a mixture-of-experts (MoE) model and optimizing data processing. Although these techniques are not completely novel, their successful application could have far-reaching implications for global investment trends, regulatory strategies, and the broader AI industry.

That said, questions remain about the true cost and nature of DeepSeek’s hardware and training runs. DeepSeek’s assertions should not be taken at face value, and further research is needed to assess the company’s claims, particularly given the number of examples of Chinese firms secretly working with the government and hiding state subsidies—particularly in industries the Chinese Communist Party considers strategically important.

The traditional AI development model

The prevailing AI paradigm has supported the development of ever-larger models trained on massive datasets using high-performance computing clusters. OpenAI, for example, has pursued increasingly expansive models, necessitating exponential growth in computational power and finances. OpenAI’s dense transformer models, such as GPT-4, are believed to activate all model parameters for every input token throughout training and inference, further compounding the computational burden.

However, this approach has diminishing returns: Increasing the model size does not always yield proportional improvements in performance. Additionally, with this traditional model, there are considerable resource constraints—access to high-end graphics processing units (GPUs) is limited due to supply chain bottlenecks and geopolitical restrictions. There are also high financial barriers. Large-scale training runs using OpenAI’s transformer architecture can require tens of millions of dollars in funding.

Rather than processing every input through a monolithic transformer, MoE routes queries to specialized sub-networks, enhancing efficiency. And by activating fewer parameters per computation, MoE models demand less power. This structure allows for easier expansion without requiring proportional increases in hardware investment.

Several research efforts have previously explored MoE architectures, but DeepSeek successfully deployed MoE in a way that optimized performance while minimizing computational cost.

DeepSeek also leveraged sophisticated techniques that reduced training time and cost. For example, its model was trained in stages, with each stage focused on achieving targeted improvements and the efficient use of resources. Additionally, its model employed self-supervised learning and reinforcement learning, leveraging the Group Relative Policy Optimization (GRPO) framework to rank and adjust responses (minimizing the use of labeled datasets and human feedback). And to compensate for potential data gaps, DeepSeek-V3 was fine-tuned on synthetic datasets to improve domain-specific expertise.

These techniques helped DeepSeek mitigate the inefficiencies associated with training on overly oversized, noisy datasets—a problem that has long plagued AI developers.

Implications

Important questions around the true cost of DeepSeek’s training and access to hardware notwithstanding, DeepSeek-R1 could mark a turning point in AI research. By leveraging MoE architectures and optimized training strategies, DeepSeek may have created a roadmap to achieve high performance without the prohibitive costs and inefficiencies of traditional dense models. Whether new capabilities and improvements can be unlocked by reconfiguring existing dense models like GPT-4 to take advantage of these techniques remains to be seen.

DeepSeek’s apparent success also raises crucial policy questions around the efficacy of export controls aimed at restricting Chinese access to high-performance hardware. If AI development becomes less reliant on cutting-edge GPUs and more focused on efficient architectures, these restrictions could lose their bite. It could also potentially disrupt major planned investments in data centers, many of which have been fueled by the OpenAI model of dense AI development. With DeepSeek’s resource-efficient paradigm as a new benchmark, organizations may need to reassess or restructure some of these investments to fit within that paradigm.

While further research is crucial to assess the significance of DeepSeek’s innovation, its emergence stands as a clear wake-up call to leading AI organizations, policymakers, and investors alike. Attention, perhaps, is not all you need.


Ryan Arant is the director of the N7 Research Institute at the Atlantic Council.

Newton Howard is founder and was the first chairman of C4ADS.

Further Reading

The GeoTech Center champions positive paths forward that societies can pursue to ensure new technologies and data empower people, prosperity, and peace.

The post Did DeepSeek just trigger a paradigm shift? appeared first on Atlantic Council.

]]>
What DeepSeek’s breakthrough says (and doesn’t say) about the ‘AI race’ with China https://www.atlanticcouncil.org/blogs/new-atlanticist/what-deepseeks-breakthrough-says-and-doesnt-say-about-the-ai-race-with-china/ Tue, 28 Jan 2025 16:21:54 +0000 https://www.atlanticcouncil.org/?p=821383 DeepSeek’s achievement has not exactly undermined the United States’ export control strategy, but it does bring up important questions about the broader US strategy on AI.

The post What DeepSeek’s breakthrough says (and doesn’t say) about the ‘AI race’ with China appeared first on Atlantic Council.

]]>
This week, tech and foreign policy spaces are atwitter with the news that a China-based open-source reasoning large language model (LLM), DeepSeek-R1, was found to match the performance of OpenAI’s o1 model across a number of core tasks. It has reportedly done so for a fraction of the cost, and you can access it for free. 

The most impressive thing about DeepSeek-R1’s performance, several artificial intelligence (AI) researchers have pointed out, is that it purportedly did not achieve its results through access to massive amounts of computing power (i.e., compute) fueled by high-performing H100 chips, which are prohibited for use by Chinese companies under US export controls. Instead, it may have conducted the bulk of the training for this new model by optimizing inter-chip memory bandwidth of the less sophisticated H800s (allowing these less sophisticated chips to “share” the size of a very large model). This meant that training the model cost far less in comparison to similarly performing models trained on more expensive, higher-end chips. DeepSeek’s breakthrough has led some to question whether the US government’s export controls on China have failed. 

However, such a conclusion is premature. Other recent “breakthroughs” in Chinese chip technologies were the result not of indigenous innovation but developments that were already underway before export controls seriously impacted the supply of chips and semiconductor equipment available to Chinese firms. In late 2023, for example, US foreign policy observers experienced a shock when Huawei announced that it had produced a smartphone with a seven nanometer chip, despite export restrictions that should have made it impossible to do so. But rather than showcasing China’s ability to either innovate such capabilities domestically or procure equipment illegally, the breakthrough was more a result of Chinese firms stockpiling the necessary lithography machines from Dutch company ASML before export restrictions came into force. The influx of machines bought China time before the impact of export controls would be seen in the domestic market. 

Much of the conversation in US policymaking circles focuses on the need to limit China’s capabilities.

There is evidence to suggest that DeepSeek is benefiting from a similar dynamic. China AI researchers have pointed out that there are still data centers operating in China running on tens of thousands of pre-restriction chips. They also note that the real impact of the restrictions on China’s ability to develop frontier models will show up in a couple of years, when it comes time for upgrading. Or, it may show up after Nvidia’s next-generation Blackwell architecture has been more fully integrated into the US AI ecosystem.

While DeepSeek’s achievement has not exactly undermined the United States’ export control strategy, it does bring up important questions about the broader US strategy on AI. Much of the conversation in US policymaking circles focuses on the need to limit China’s capabilities—specifically by restricting its ability to access compute. While not wrong on its face, this framing around compute and access to it takes on the veneer of being a “silver bullet” approach to win the “AI race.” This kind of framing creates narrative leeway for bad faith arguments that regulating the industry undermines national security—including disingenuous arguments that governing AI at home will hobble the ability of the United States to outcompete China. 

Such arguments emphasize the need for the United States to outpace China in scaling up the compute capabilities necessary to develop artificial general intelligence (AGI) at all costs, before China “catches up.” This has led some AI companies to convincingly argue, for example, that the negative externalities of speed-building massive data centers at scale are worth the longer-term benefit of developing AGI. Such an argument has significant business upside for AI companies, as they amass greater numbers of chips to gain a competitive advantage. What the DeepSeek example illustrates is that this overwhelming focus on national security—and on compute—limits the space for a real discussion on the tradeoffs of certain governance strategies and the impacts these have in spaces beyond national security.

To plug this gap, the United States needs a better articulation at the policy level of what good governance looks like. This should include a proactive vision for how AI is designed, funded, and governed at home, alongside more government transparency around the national security risks of adversary access to certain technologies. It also requires the US government to be clear about what capabilities, technologies, and applications related to AI it is specifically aiming to regulate. This would help to elevate conversations on risk and enable communities of practice to come together to establish adaptive governance strategies across technological, economic, political, and social domains—as well as for national security.

How to best develop, deploy, and govern AI-enabled technologies is not a question that can be answered with “silver bullet” solutions. Rather, it is a process, one that requires consistent, thoughtful engagement from practitioners and experts across a wide variety of issue sets and backgrounds. No one strategy will win the “AI race” with China—and as new capabilities emerge, the United States needs a more adaptive framework to meet the challenges these technologies and applications will bring. 


Kenton Thibaut is a senior resident China fellow at the Atlantic Council’s Digital Forensic Research Lab (DFRLab), where she leads China programming for the Democracy + Tech Initiative.

The post What DeepSeek’s breakthrough says (and doesn’t say) about the ‘AI race’ with China appeared first on Atlantic Council.

]]>
Lipsky quoted in Reuters on Trump’s impact on CBDC development in the US https://www.atlanticcouncil.org/insight-impact/in-the-news/lipsky-quoted-in-reuters-on-trumps-impact-on-cbdc-development-in-the-us/ Tue, 28 Jan 2025 15:08:28 +0000 https://www.atlanticcouncil.org/?p=821752 Read full article here

The post Lipsky quoted in Reuters on Trump’s impact on CBDC development in the US appeared first on Atlantic Council.

]]>
Read full article here

The post Lipsky quoted in Reuters on Trump’s impact on CBDC development in the US appeared first on Atlantic Council.

]]>
CBDC tracker cited in Reuters on digital euro progress https://www.atlanticcouncil.org/insight-impact/in-the-news/cbdc-tracker-cited-in-reuters-on-digital-euro-progress/ Fri, 24 Jan 2025 21:08:40 +0000 https://www.atlanticcouncil.org/?p=824029 Read the full article here

The post CBDC tracker cited in Reuters on digital euro progress appeared first on Atlantic Council.

]]>
Read the full article here

The post CBDC tracker cited in Reuters on digital euro progress appeared first on Atlantic Council.

]]>
What is next for crypto regulation in the US? https://www.atlanticcouncil.org/blogs/econographics/what-is-next-for-crypto-regulation-in-the-us/ Thu, 23 Jan 2025 22:12:51 +0000 https://www.atlanticcouncil.org/?p=820648 What does success on the regulatory front actually look like? What does it mean for the rest of the world? We dive into the dozen bills under consideration in Congress and zoom in on the three big themes for crypto regulation in 2025.

The post What is next for crypto regulation in the US? appeared first on Atlantic Council.

]]>
I’m here in Davos where US President Donald Trump addressed the delegates virtually on Thursday—emphasizing that the United States will be the Crypto Capital of the world. A few hours later, the White House issued the much anticipated executive order on digital assets. Since winning the election in November, Trump and his team have sent all the right smoke signals—including appointing David Sacks to be the White House crypto and artificial intelligence (AI) czar. Under the Biden administration, the crypto industry’s biggest complaint was the lack of regulatory clarity and the Securities and Exchange Commission’s (SEC) regulation by enforcement practices. The Trump administration intends to fill the regulatory gap and propel a broader agenda of deregulation in the innovation sector in the early days of his presidency. 

With legislators favorable to the industry—including Representative French Hill as the chair of the House Financial Services Committee (watch his Atlantic Council event on stablecoins here), Senator Cynthia Lummis as the newly formed chair of the Senate Banking Committee’s subcommittee on digital assets, SEC chair pick Paul Atkins, and advisors like Elon Musk and commerce secretary nominee Howard Lutnick—confidence is growing that crypto-forward agenda is on its way. But what does success on the regulatory front actually look like? What does it mean for the rest of the world? We dive into the dozen bills under consideration in Congress and zoom in on the three big themes for crypto regulation in 2025.

The SEC vs CFTC: Finally, a truce?

One of the major disagreements between the industry and legislators has been whether the SEC or the Commodity Futures Trading Commission (CFTC) is the right regulator for crypto. As is often debated in Washington, is crypto a security or a commodity? Under the former SEC chair, Gary Gensler, the agency regularly fined crypto companies when it found them in breach of securities laws. This led to some legislators and industry favoring the CFTC as the regulator. Several bills under consideration, including the Financial Innovation and Technology for the 21st Century Act, the Digital Asset Market Structure and Investor Protection Act, the Responsible Financial Innovation Act, and the BRIDGE Digital Assets Act, address the jurisdiction of SEC and the CFTC regarding crypto.

One of the Trump campaign’s biggest promises to the industry is an end to this era of regulation by enforcement. Paul Atkins, Trump’s pick to replace Gary Gensler as SEC chair, is seen as friendly to the crypto industry. His appointment follows a wave of legal decisions over the past two years that have ruled in favor of the companies against the SEC. Atkins’ job, once he’s sworn in, will be two-fold: He will need to clarify the SEC’s jurisdiction over the crypto market and then actually enforce regulations on crypto-assets—their issuance, use, and role in the US economy. Congress will augment these efforts, and you can expect several bills rebalancing the SEC and CFTC’s jurisdiction and enforcement powers. See below for the full breakdown.

Stablecoins, ahoy! 

Stablecoins have now passed $190 billion in global circulation. They can provide much needed liquidity for the crypto market and act as conduits between crypto and non-crypto-assets. Stablecoins increasingly aim to address humanitarian aid and cross-border payments such as remittances, including in Ukraine.

While 98 percent of stablecoins are pegged to the dollar, over 80 percent of stablecoin transactions happen abroad. This makes these “digital dollars” subject to regulatory frameworks set in Europe, Asia, and Africa. Europe’s stablecoin framework, known as Markets in Crypto-Assets, came into full effect in January 2025. Implementing the framework should result in some introspection across the Atlantic over the pending stablecoin legislation in Congress. The Clarity for Payment Stablecoins Act and the Lummis-Gillibrand Payment Stablecoins Act are the two bills under consideration. The Clarity Act has been under consideration by the House Financial Services Committee for the last year, coming close to bipartisan consensus a few times. It has evolved into a discussion draft proposed by Senator Bill Hagerty. The Lummis-Gillibrand Act was introduced to the Senate in May 2024. 

The bottom line, as our cryptocurrency regulatory tracker shows, is that regulations in the United States play a key role in the future of crypto around the world. While other countries have been developing their own regulatory frameworks, the United States has lagged behind—that may finally change in the months to come. 

A trailblazing national bitcoin reserve  

With the appointment of Lummis as the chair of the digital assets subcommittee at the Senate Banking Committee, it’s likely that talks of a bitcoin reserve will continue on the Hill. The logic behind the bill is to purchase bitcoin to be able to pay back the national debt. There are some open questions about the Lummis bitcoin reserve proposal—including the convoluted funding model, which revalues gold certificates from their 1993 price to their current value. 

There are also proposals for a US Central Bank Digital Currency (CBDC). The Trump administration and Republican lawmakers have made it clear that a retail CBDC, or the digital dollar, is not going to happen in the United States. This puts the United States at odds with its peers like Europe, which is rolling out a pilot of the digital euro in 2025, and the United Kingdom, which set up a CBDC lab just last week. The executive order directs all agencies to stop any ongoing work on a CBDC.

The breakdown of all the major pieces of legislation currently being considered is below.


Ananya Kumar is the deputy director, future of money at the Atlantic Council’s GeoEconomics Center.

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post What is next for crypto regulation in the US? appeared first on Atlantic Council.

]]>
Your expert guide to the debate over banning TikTok  https://www.atlanticcouncil.org/blogs/new-atlanticist/your-expert-guide-to-the-debate-over-banning-tiktok/ Thu, 09 Jan 2025 22:43:53 +0000 https://www.atlanticcouncil.org/?p=817154 As the US Supreme Court takes up the case, our experts outline the competing arguments over whether the US should ban TikTok on national security grounds.

The post Your expert guide to the debate over banning TikTok  appeared first on Atlantic Council.

]]>
Tik . . . tik . . . boom? On Friday, the US Supreme Court will hear arguments over the fate of the massively popular social media platform TikTok. Last year, Congress passed a law setting a January 19 deadline for the video app’s parent company, Chinese-owned ByteDance, to divest from TikTok or else it would be banned in the United States, due to national security concerns. ByteDance says the law violates First Amendment free speech protections. US President-elect Donald Trump, meanwhile, has asked the court to pause enforcement of the law, and he has indicated support for TikTok. 

For more context and to make sense of all the competing arguments, we turned to our experts on China and technology. 

Click to jump to an expert analysis:

Graham Brookie: The Supreme Court’s decision will shape global tech competition

Shelly Hahn: To China, algorithms are a national interest 

Kenton Thibaut: The US data security problem is bigger than TikTok

Caroline Costello: If you’re interested in protecting civil society, you should be concerned about TikTok

Mark Scott: Worries around TikTok’s data collection and security apply to all social media giants

Matt Geraci: US data privacy laws are not up to the task 

Emerson T. Brooking: If TikTok was a tool of Chinese foreign interference, someone forgot to tell China

Samantha Wong: The national security risks will remain whether TikTok is banned or not

Konstantinos Komaitis: A TikTok ban would be a direct attack on the open and global internet

Kitsch Liao: ByteDance’s First Amendment argument is a distraction from its refusal to divest


The Supreme Court’s decision will shape global tech competition 

The United States Supreme Court is set to start 2025 with a blockbuster case on a tight timeline with significant domestic tech and geopolitical ramifications.  

The law in question in the case of TikTok v. Garland—the Protecting Americans from Foreign Adversary Controlled Applications Act—was passed by Congress in April 2024 with widespread bipartisan support: a 352–65 vote in the House and 79–18 in the Senate. US President Joe Biden signed the bill into law, giving him the authority to force TikTok’s divestiture from its Chinese parent company or be banned from the United States. The Department of Justice set a deadline of January 19—forcing this dramatic showdown. The Supreme Court will proceed in hearing the case on January 10 despite Trump’s request to delay until after his inauguration and the fact that the high court typically defers to its two co-equal branches of government on matters of national security.  

The Atlantic Council previously published an in-depth technical analysis of whether the threats of legal control, data access, algorithmic tampering, or broad influence efforts by the Chinese government are unique or singularly focused on TikTok. The threat of legal control proved to be real and ongoing. The other potential risks remain considerable with loopholes not specific to TikTok, such as the sheer amount of Americans’ data for sale on the open market or the litany of US-owned platforms the Chinese Communist Party (CCP) has used to perpetrate influence efforts. Chinese ownership of TikTok is undoubtedly a core strength in its global approach to “discourse power.” The key questions remain whether a Chinese company’s ownership of such a popular social media platform poses unique national security risks to the United States, whether banning such a popular app violates the rights of the company or the app’s US users, and how China may react or force ByteDance to react. Beyond TikTok v. Garland, any outcome will shape global tech competition from the global reach of digital platforms to broader tech governance. If new evidence is surfaced, it will shape both. 

Graham Brookie is the vice president of technology programs and founding director of the Digital Forensic Research Lab at the Atlantic Council. 


To China, algorithms are a national interest

The TikTok saga highlights Beijing’s strategy of using private companies to exert influence globally, while restricting foreign companies’ operations within China. 

Beijing views algorithms as critical tools to exert national power, with Chinese leader Xi Jinping emphasizing the importance of artificial intelligence in military and economic power competition. As TikTok has gained market clout, the Chinese government has taken a more assertive stance on its technologies, especially content recommendation algorithms. Since 2020, China has implemented measures to protect its technological assets, including adding algorithms to the restricted list  of technologies from export in August 2020, and passing the “Export Control Law” in October 2020, which governs the sale of these technologies to foreign buyers.China now strongly opposes any forced sale of TikTok, asserting its legal authority to veto such transactions

Beijing has railed against the United States’ enforcement actions against TikTok, using abusive and inflammatory rhetoric to paint those actions as a violation of international norms. Chinese officials have called these actions “an act of bullying” (Xinhua editorial), “an abuse of national power” (Ministry of Foreign Affairs Spokeswoman Mao Ning), and “hypocritical and double standards” (Xinhua editorial). They have warned of potential consequences for the global economic order. 

That is interesting rhetoric given that Beijing would not allow a US or other foreign company to operate similarly in China. China maintains a restrictive environment for foreign media and technology companies, blocking most foreign social media platforms, search engines, and news outlets. When probed about this disparity, a Ministry of Foreign Affairs spokesperson claimed that “China’s policy on overseas social media is completely incomparable to the US’ attitude towards TikTok . . . as long as foreign media companies comply with the requirements of Chinese laws and regulations, all foreign media platforms and news agencies are welcomed.” In reality, these laws give the CCP firm control over data flows and information within its borders. 

Beijing’s robust defense of TikTok and its underlying technology underscores China’s growing confidence in its tech sector and its willingness to challenge what it perceives as unfair treatment in the global marketplace. 

Shelly Hahn is the deputy director of the Atlantic Council’s Global China Hub. 


The US data security problem is bigger than TikTok 

There is no doubt that People’s Republic of China (PRC) state entities see the value in collecting data on Americans for intelligence purposes. However, the proposed actions on TikTok leave open serious questions on how effectively a ban or divestment would protect Americans’ data from exfiltration.

The Atlantic Council’s Digital Forensic Research Lab previously conducted a technical, policy, and legal analysis of the stated national security risks posed by TikTok. Our research found that TikTok can be said to present a unique risk in terms of its Chinese ownership, in that the PRC’s National Intelligence Law does give the government broad leeway to potentially compel the company to grant it access to TikTok’s data, including on Americans. In addition, even under the circumstances of outside control of TikTok’s data storage, it would be almost impossible to know if Chinese intelligence authorities somehow maintained a backdoor into these data streams.

At the same time, however, we found that TikTok’s data collection practices on Americans are not outside what is commonly practiced by social media companies, including Meta, X, and others. More importantly, the data that TikTok can provide on Americans pales in comparison to what the Chinese government has accessed through both its illegal hacking activities and what is available legally on the open market through US-based third-party data brokers.  

In fact, a report from Duke University’s Sanford School of Public Policy found that via data brokers, it is “not difficult to obtain sensitive data about active-duty members of the military, their families, and veterans, including non-public, individually identified, and sensitive data, such as health data, financial data, and information about religious practices,” noting that location data was also available for purchase. A narrow, national-security oriented focus on TikTok to address potential threats to the US data ecosystem risks overlooking much broader security vulnerabilities and thus undermines more effective policy solutions. That is to say, while there is much about TikTok’s data gathering and privacy policy to side-eye, the challenge is far wider than TikTok alone and requires a more wide-ranging policy solution to address. 

Kenton Thibaut is a senior resident China fellow at the Digital Forensic Research Lab of the Atlantic Council’s Technology Programs. 


If you’re interested in protecting civil society, you should be concerned about TikTok 

The debate surrounding TikTok is about a tool that empowers China to extend its high-tech surveillance state beyond its own borders. While it’s true that other social media platforms engage in similar surveillance, other platforms are not beholden to the government of a foreign adversary. 

TikTok’s owner, ByteDance, is a Chinese company. In China, the CCP has absolute control over companies. In China’s authoritarian system, the party is always above the law, but the CCP took the extraordinary step of enshrining this capability into law, likely to make very clear to Chinese companies exactly what they should expect. Article 7 of the National Intelligence Law of 2017 states that “all organizations and citizens shall support, assist, and cooperate with national intelligence efforts,” meaning the government has the right to secretly demand TikTok user data, and the company must share it. 

When defending against these allegations, TikTok has insisted that it stores all US user data in the United States, but the company has also acknowledged that nevertheless, China-based employees can still access US user data, and those same employees must obey any and all edicts from the CCP. In fact, thanks to leaked audio from internal meetings, we now know that China-based employees have repeatedly done so. This includes two cases in which a China-based team at TikTok planned to use the app to monitor the location of specific US citizens.  

Chinese intelligence services have a well-documented history of harassing and intimidating human rights activists and journalists on US soil. Even if you don’t mind the PRC surveilling you, and even if you don’t care about US-China competition, if you’re interested in protecting civil society, you should be concerned about TikTok. 

There is one important caveat, though. As demonstrated in a report from the Atlantic Council’s Digital Forensic Research Lab, foreign adversaries can also buy this data from brokers that rely on US-based companies surveilling their users. In fact, US-based companies have been accused of using targeted surveillance against civil society, as in the cases of Uber and Meta reportedly tracking the location of journalists reporting on their apps. TikTok is just one piece of a broader data security vulnerability perpetuated by US platforms. 

Caroline Costello is a program assistant at the Global China Hub. 


Worries around TikTok’s data collection and security apply to all social media giants

Central to concerns around TikTok is how the app collects, stores, and uses information it gathers on users. The fear, according to US officials, is that such data may be weaponized by Beijing, though no evidence of such activity has yet to be proven. Based on a review of TikTok’s privacy policy and external analysis, the social media platform does collect a lot of information on users if they give the company permission. That includes information on individuals’ exact location, their phone numbers and those of their contacts, people’s other social media accounts, and detailed information about individuals’ devices (often used by marketers to target specific demographics). 

That may sound creepy. But TikTok’s data collection practices are no different than those of US social media giants, which similarly gather as much information as possible on their users to tailor these firms’ advertising offerings. That also includes in-app web browsers built into the likes of Instagram and X that allow these companies to collect just as much information on people’s web habits—so long as they are surfing the internet from within these social media networks. 

So would forcing TikTok off of US app stores make Americans’ data more private and secure? The short answer is no. While US officials have raised concerns about how Americans’ data may be accessed by Chinese government officials via TikTok, such personal information—from people’s phone numbers and home addresses to internet activity to consumer purchasing history—is already available commercially, via so-called domestic data brokers. The outgoing Biden administration tried to tackle that problem with the Protecting Americans’ Data from Foreign Adversaries Act and prohibitions placed on these data brokers from transferring such sensitive data to foreign adversaries like China. 

Yet, in reality, the lack of comprehensive federal privacy legislation means that Americans’ data—no matter what eventually happens with the potential TikTok ban or sale—remains significantly more at risk compared to their counterparts in other Western countries. State-based laws, particularly those in California and Virginia, have provided a modest degree of greater control for people in how companies gather and use their personal information. But the removal of TikTok from US app stores, which have similarly set baseline levels of privacy protections for users, will not make Americans’ overall data either more private or more secure. 

 Mark Scott is senior resident fellow at the Democracy + Tech Initiative within the Atlantic Council Technology Programs. 


US data privacy laws are not up to the task 

The absence of common-sense data privacy laws in the United States created an environment that allowed TikTok to become a security risk. Removing TikTok from app stores will not change this. As a 2022 Consumer Reports investigation revealed, TikTok uses many of the same data harvesting techniques employed by companies like Meta and Google for targeting ads. They also concluded that claims by TikTok and others that data is used solely for advertising cannot be verified by consumers or privacy researchers. 

The Cambridge Analytica scandal, which involved unauthorized data collection from millions of Facebook users for targeted political ads, remains fresh in the minds of Americans who are skeptical about the stated reasons for removing TikTok. Although the Federal Trade Commission forced new privacy restrictions on Facebook, the scandal has not led to national legislation like the European Union’s General Data Protection Regulation (GDPR) that could be applied to all companies, including TikTok. Despite this, various US states have endeavored to draft their own laws since the scandal. Yet, companies like Meta, Google, and Amazon often attempt to thwart these efforts through lobbying.  

Regulatory changes are essential to mitigate data security threats from Beijing. However, US tech companies seem to lack enthusiasm for supporting new data protections, and Congress has struggled to make progress. Nearly all the major US tech companies have been fined for violating the European Union’s GDPR (including Amazon, Google, Meta, and Twitter/X), so clearly this is an area that needs improvement. Companies are not ideal self-regulators. TikTok adds another layer given that it must answer to an authoritarian regime and thus poses even larger risks when allowed to operate in an unregulated environment. 

TikTok’s popularity, data collection practices, and Chinese ownership create a unique national security challenge requiring careful consideration. Tech companies should work with the US government to improve data privacy protections, rather than targeting TikTok under the guise of national security while simultaneously perpetuating a harmful regulatory status quo

Matt Geraci is an associate director at the Global China Hub. 


If TikTok was a tool of Chinese foreign interference, someone forgot to tell China 

It’s true that the push for TikTok’s divestment from ByteDance is deeply rooted in fears of Chinese information manipulation. In a March 2024 House Committee on Energy and Commerce report on the forced divestment measure, the committee cited China’s potential use of TikTok to “push misinformation, disinformation, and propaganda on the American public.”  

It’s also true that these fears were never substantiated. The CCP’s propaganda strategy—its quest for “discourse power”—has always been premised on the incremental manipulation of information across many different platforms at the same time. The idea that Beijing built a shiny red button to turn TikTok into a tool of mass brainwashing never accorded with reality.  

Indeed, so far it appears that only a single fake CCP-adjacent TikTok account sought to influence the 2024 US election. Ironically, far more CCP accounts on other platforms sought to stir resentment about a potential TikTok ban. By contrast, Russia—which has had no unique claim to TikTok—extensively used the service for the purposes of information manipulation. In December 2023, the Digital Forensic Research Lab and the BBC uncovered a massive Russian campaign that used artificial intelligence to instrumentalize more than 12,800 accounts to undermine Ukraine.  

Perhaps the CCP was just subtly tweaking the TikTok algorithm to achieve its goals? But this is also unlikely. One of the few available independent studies of TikTok content policy suggests that the platform may have actually reduced the salience of certain hashtags in line with the wishes of US lawmakers. The bizarre nature of some of the material that goes viral on TikTok is explained by the tastes of TikTok’s Millennial- and Gen Z-majority user base, not a global conspiracy. TikTok has repeatedly failed the American people in the realm of transparency and public accountability. So has every US-based social media platform.  

Emerson T. Brooking is director of strategy and resident senior fellow at the Digital Forensic Research Lab. 


The national security risks will remain whether TikTok is banned or not 

Last February, Biden issued a much-needed executive order limiting the sale of sensitive personal US data or US government-related data to “countries of concern,” including China, to prevent them from “engag[ing] in espionage, influence, kinetic or cyber operations or to identify other potential strategic advantage over the United States.” This is supported by additional legislation, such as the Protecting Americans’ Data from Foreign Adversaries Act of 2024 and the Protecting Americans from Foreign Adversary Controlled Applications Act, both aimed at protecting sensitive US data from being accessed by “foreign adversary nations.” 

However, these new measures are not foolproof. The executive order only targets data brokers from “countries of concern,” and the bill doesn’t address data. One way China can easily circumvent these laws is by purchasing data from companies in third-party countries that obtained it through domestic data brokers that sold the data without knowledge of the final recipient or its intended use. Essentially, if TikTok was a US company, China would still be able to purchase personal US data from TikTok through third-country entities.  

Furthermore, China could easily access any sensitive, critical data through hacking US infrastructure. China is constantly investing and building up its offensive cyber ecosystem to train Chinese hackers to target and acquire critical US intelligence. Although the ban on TikTok would prevent Chinese firms from easily accessing US data, China has the resources to access this sensitive information illegally and is not afraid to implement these illicit operations if it feels the need to do so.  

Ultimately, the TikTok ban addresses only a small aspect of a much larger issue. Even if TikTok were banned or became a US-owned company, the core national security risks would remain. The United States should instead implement broader legislation aimed at strengthening domestic cybersecurity infrastructure and closing any third-party loopholes that could undermine existing protective laws. 

Samantha Wong is a program assistant with the Global China Hub. 


A TikTok ban would be a direct attack on the open and global internet

In the conversation about whether the United States should or should not ban TikTok, there is one parameter that no one is mentioning: what will this mean for the internet? The answer is straightforward. If the United States proceeds with banning TikTok, such a move will be nothing short of a direct attack on the open and global internet.  

The internet is based on a decentralized architecture, which means that there is no center of control. The value of the open internet is that networks should be able to connect without any restrictions. The internet was not designed so that only specific networks could connect; rather, any network should be able to connect as long as it is willing to abide by certain rules—the internet’s open standards and protocols. Banning TikTok will affect how networks get to interconnect. 

 At the same time, a potential ban will also affect the internet’s global reach and integrity. The whole idea of the internet is that no entity should inspect or modify packets carried through different networks beyond what might be necessary to route the packet as advertised. This is an expectation that users have no matter where they are in the world, and it will not be met should the ban take effect.  

The United States has historically and unequivocally been a strong supporter of the open and global internet. In fact, for more than two decades, the United States has been at the forefront of pushing back at attempts by authoritarian governments to centralize internet control. A TikTok ban will be a setback to all these years of effort and will legitimize the narrative by other authoritarian states that the internet should be subject to government control and management. It will also weaken the United States’ position globally, especially at the United Nations, where conversations about the future of internet governance are currently taking place. 

 Konstantinos Komaitis is a resident senior fellow and Global Democracy and Technology lead with the Democracy + Tech Initiative. 


ByteDance’s First Amendment argument is a distraction from its refusal to divest

ByteDance has yet to provide a rationale commensurate with freedom of speech or national security regarding why TikTok cannot be a US company without ties to the Chinese Communist party-state. Yet, on January 10, the nation will focus on the US Supreme Court’s hearing for the “TikTok ban,” highlighting First Amendment concerns. 

This is a distraction. The government has already successfully argued in court against TikTok on both national security and data collection grounds. ByteDance has sidestepped the national security argument by pointing to the lack of public evidence and argued that TikTok’s data collection practices are the same as those of other platforms. TikTok, however, failed to argue against its intent to endanger US national security, and it’s a point that bears reiterating.  

A series of reports from 2019 to 2021 detailed TikTok’s extreme security risks, including that the app allowed remote downloading and execution of binary files, essentially acting like a pre-installed backdoor ready for payload delivery. This sets it apart from other social media platforms and established its intent to harm. A “black hat” hacker would usually have to compromise a target’s devices through phishing or other means before it can achieve what TikTok pre-installed for its users. A Washington, DC court ruling also stressed TikTok’s continued malicious intent to abuse data collected from US citizens, even after the establishment of TikTok US Data Security.   

Until TikTok’s cord with the PRC is cut, it will continue to test the waters and find legal and illegal means to endanger US national security, as it clearly possesses both the intent and capability to do so.  

The essence of security is to make it harder for an adversary to do you harm. Just because China can obtain US user data through other ways doesn’t mean we should let them do so through TikTok. Deterrence through cost imposition is a foundational concept in international security, and the “cost,” be it through financial means or legal risks should China decide to furnish data through other social media giants operating within the United States, is very real. 

Kitsch Liao is an associate director at the Global China Hub. 

The post Your expert guide to the debate over banning TikTok  appeared first on Atlantic Council.

]]>
Global China Hub nonresident fellow Dakota Cary in the Washington Post https://www.atlanticcouncil.org/insight-impact/in-the-news/global-china-hub-nonresident-fellow-dakota-cary-in-washington-post/ Sat, 04 Jan 2025 03:42:00 +0000 https://www.atlanticcouncil.org/?p=816451 On January 3rd, 2025, Global China Hub nonresident fellow Dakota Cary spoke to the Washington Post about Beijing Integrity Tech, the cybersecurity company linked to the Flax Typhoon attacks.

The post Global China Hub nonresident fellow Dakota Cary in the Washington Post appeared first on Atlantic Council.

]]>

On January 3rd, 2025, Global China Hub nonresident fellow Dakota Cary spoke to the Washington Post about Beijing Integrity Tech, the cybersecurity company linked to the Flax Typhoon attacks.

The post Global China Hub nonresident fellow Dakota Cary in the Washington Post appeared first on Atlantic Council.

]]>
By the numbers: The global economy in 2024 https://www.atlanticcouncil.org/blogs/new-atlanticist/by-the-numbers-the-global-economy-in-2024/ Thu, 19 Dec 2024 17:52:02 +0000 https://www.atlanticcouncil.org/?p=814918 Our GeoEconomics Center experts take you inside the numbers that mattered—including many you may have missed—in 2024.

The post By the numbers: The global economy in 2024 appeared first on Atlantic Council.

]]>
.number { position: relative; color: #000; width: 100%; max-width: 1200px; z-index: 1; margin: 0px auto; align-self: center; } /* number header */ .number-headline { position: relative; color: #000; font-size: 80px; font-weight: 800; margin: 0; text-align: center; width: 100%; max-width: 1200px; z-index: 1; margin: 10px auto; } /* number subheader */ .number-subheading { position: relative; color: #292a2b; font-size: 1.4em; font-weight: normal; line-height: 150%; margin: 0; padding-top: 10px; z-index: 1; text-align: center; padding-bottom: 20px; text-transform: uppercase; } @media screen and (max-width: 600px) { .number-headline { font-size: 3em; } }

100 percent

US tariff rate on electric vehicles imported from China


In May, US President Joe Biden announced a 100 percent tariff on all electric vehicles (EVs) imported from China. The administration had two main objectives: 1) Protect and stimulate US clean energy industries and supply chains, and 2) counter a flood of Chinese goods as Beijing turns to exports to compensate for its weak internal demand. For the United States, these tariffs are largely preventative and symbolic, as Chinese EVs make up only around 2 percent of total EV imports. For other Group of Seven (G7) countries, it’s too late for prevention, as Chinese EVs already dominate.

The Biden administration coordinated with concerned allies and, in August, Canada also announced it would levy a 100 percent tariff on EV imports from China. The European Union (EU) later imposed up to 45.3 percent tariffs on Chinese EVs. Economic stress due to Chinese dumping increasingly reaches beyond the United States––and even beyond the G7. Since 2023, Argentina, Brazil, India, and Vietnam have all begun anti-dumping or anti-subsidy investigations into Beijing’s practices. 

The incoming Trump administration will now have a choice. It can revert to President-elect Donald Trump’s previous preference for bilateral negotiations, or it can continue to restrict China’s access in step with allies and partners, possibly by creating a “buyers club” to regulate standards and open markets to a select few.

Sophia Busch is an assistant director at the Atlantic Council’s GeoEconomics Center. 


Ten septillion (10^25)

Computational operations triggering new investment prohibitions


In October 2024, the US Department of the Treasury issued final regulations implementing the Executive Order on Addressing United States Investments in Certain National Security Technologies and Products in Countries of Concern. Once it comes into effect on January 2, 2025, the Outbound Investment Security Program (OISP) regulations will prohibit or subject to notification requirements certain transactions involving Americans and persons affiliated with designated countries of concern (presently, China, including Hong Kong and Macau) operating in the semiconductor and microelectronics, quantum information technology, or artificial intelligence (AI) sectors (“covered foreign persons”). 

With respect to AI, the OISP will generally prohibit US persons from investing in a covered foreign person that develops any AI system trained using a quantity of computing power greater than ten septillion (10^25) computational operations (integer or floating-point operations). In addition, the OISP sets forth other computational thresholds implicating investment prohibitions (i.e., greater than 10^24 computational operations using primarily biological sequence data) or notification requirements (i.e., greater than 10^23 computational operations). Notably, regardless of computing power, covered transactions involving AI systems designed or intended for military, government intelligence, mass surveillance, cybersecurity, digital forensics, penetration testing tools, or the control of robotic systems end uses are also subject to prohibitions or notification requirements.

Absent practical guidance or enforcement history, exactly what these computing power thresholds mean in practice, as well as how they reasonably can be determined, remain to be seen. However, given its breadth, complexity, and enforceability, the OISP seems likely to have a significant effect—most notably with respect to US persons, but also in connection with the activities of certain foreign persons controlled by US persons or for which US persons serve in key roles. Such persons have until the new year to start making sense of what may be about 10^25 questions regarding their exposure under the OISP.

Annie Froehlich is a nonresident senior fellow at the GeoEconomics Center and partner at Cooley LLP.


40

Number of countries in Kazan, Russia, for the BRICS+ annual summit


The 2024 meeting of the BRICS+ gathered the representatives of forty countries on October 22-24 in Kazan, Russia. This number is about four times the size of the BRICS+ (named for members Brazil, Russia, India, China, and South Africa), which expanded in 2023 to include Argentina, Egypt, Ethiopia, Iran, the United Arab Emirates, and Saudi Arabia.

While the creation of a BRICS currency still appears unlikely, the bloc announced a substitute for Western payment systems called BRICS Clear. Circumventing sanctions or the extraterritoriality of US banks and, more generally, becoming less dependent on the US dollar are clear motivations behind such endeavors, as well as a growing interest in making bilateral arrangements to use China’s e-yuan.

Some notable leaders, such as Argentine President Javier Milei and Brazilian President Luiz Inácio Lula da Silva, were absent. But the attendees were a large and heterogeneous group, including both Turkey and North Korea. But without being officially opposed to the United States, the US dollar, or even the G7, the summit in Kazan visibly illustrated increasing global fragmentation. True, it took two world wars for the British pound to be dethroned by the dollar, and the latter remains dominant, representing about 60 percent of central banks’ official reserves, international debt, and credit. But in a multipolar world, could too much hegemony be its own undoing?

Marc-Olivier Strauss Kahn is a nonresident senior fellow at the Atlantic Council and honorary director general at Banque de France.


97

Percentage of raw lithium used in the EU originating from China


Russia’s invasion of Ukraine laid bare a vulnerability in Europe’s energy strategy: an overreliance on a single supplier for critical resources. The EU is determined to avoid repeating the same mistake with lithium, a critical mineral often referred to as “white gold” for its indispensable role in the decarbonization race. However, the EU faces an uphill battle to reduce its near-total dependence on China, which currently supplies 97 percent of the bloc’s raw lithium.

With its ability to produce lithium at low cost thanks to cheaper labor, state-controlled financing, and energy subsidies, Beijing has flooded global markets and produced much more lithium “than the world needs today, by far,” according to Jose Fernandez, under secretary for economic growth, energy, and the environment at the US Treasury Department. To mitigate this monopoly, the EU has set ambitious targets, including producing at least 10 percent of its annual lithium consumption within the bloc by 2030. However, the region’s lithium mining projects are not expected to begin production until the end of 2026, leaving a significant gap in the interim.

As the world transitions to green technologies, lithium will remain a cornerstone of the global energy transition. For the EU, building a resilient, diversified supply chain is a strategic necessity.

Grace Kim is a young global professional with the GeoEconomics Center.


64

Countries that held elections


Almost half of the world held elections in 2024. In Western democracies, opposition parties have won six out of fifteen decisive elections. Globally, more than half of incumbents or ruling coalitions managed to stay in power. However, unstable coalitions prompted multiple collapsed governments in Europe, including Germany and France.

Meanwhile, Russia’s efforts to interfere in Eastern European and Eurasian countries’ elections were a prominent but not unexpected problem. Russia’s direct and indirect interference in the Georgian parliamentary elections has been thoroughly researched and documented. Like in Georgia, the Moldovan elections were fraught with Russian disinformation and meddling, although pro-Western incumbent President Maia Sandu emerged victorious. Meanwhile, Romanian intelligence services declassified documents showing that the country’s elections have become the target of “aggressive hybrid Russian action,” including 85,000 cyberattacks on Romanian election websites. 

These instances of interference throughout 2024 demonstrated that Russia and other adversaries are invested in undermining elections as a fundamental principle of democracy. This is an opportunity for the United States and the EU to leverage positive economic statecraft tools to equip countries in Eastern Europe and Eurasia with secure election technologies and provide financial assistance to educate populations in identifying and thwarting Russian propaganda and disinformation. 

Kimberly Donovan is the director of the Economic Statecraft Initiative within the Atlantic Council’s GeoEconomics Center. Follow her at @KDonovan_AC.

Maia Nikoladze is the associate director at the Economic Statecraft Initiative within the Atlantic Council’s GeoEconomics Center. Follow her at @Mai_Nikoladze.

—Mikael Pir-Budagyan is a young global professional at the Economic Statecraft Initiative within the Atlantic Council’s GeoEconomics Center.



Since the start of the year, the cryptocurrency market capitalization nearly doubled from $1.65 trillion to $3.65 trillion. This year, the digital asset industry made significant inroads into the global economy, especially bitcoin and stablecoins. 

Bitcoin continues to dominate the digital asset market, accounting for more than 50 percent of the total market capitalization as the asset crossed $100,000 on December 4. On January 10, the US Securities and Exchange Commission approved the bitcoin spot exchange-traded funds, giving retail and institutional investors greater access to the asset—in November, a group of US bitcoin exchange-traded funds recorded $6.2 billion of inflow. Stablecoins also saw significant, use accounting for trillions of dollars of transaction volume every month. In October, Stripe acquired stablecoin platform Bridge for $1.1 billion, demonstrating what may be fintech firms’ bigger push into digital assets. 

Digital assets should be expected to see more mainstream adoption under the Trump administration and a Republican-led House and Senate, which have expressed a pro-crypto stance. This will likely result in more open-source developers in the United States and greater exploration by financial institutions. 

Nikhil Raghuveera is a nonresident senior fellow at the GeoEconomics Center and co-founder of Predicate.


$1.4 trillion

Debt service spending by developing countries


As interest rates hit twenty-year highs, developing countries paid out a staggering sum of $1.4 trillion to service their foreign debts. The details behind that headline are equally stark and troublesome. Interest payments alone amounted to more than $400 billion as rates surged. And, as with most shocks, the poorest countries and most economically insecure people have been hit the hardest as governments are forced to make tradeoffs between development and growth, and as spending is diverted from critical health, education, and infrastructure investments. Low-income economies eligible for the International Development Association (IDA) paid $96 billion in debt service; and their interest payments now amount to nearly 6 percent of the export earnings of IDA-eligible countries—a level that hasn’t been seen in more than twenty-five years. For some countries, the payments run as high as 38 percent of export earnings. And more money is flowing out than in. Since 2022, foreign private creditors took in almost $13 billion more in debt-service payments from public sector borrowers in IDA-eligible economies than they doled out in new financing. Multilateral banks have been playing a larger role, even as service payments, interest rates, fees, charges, and surcharges have come under scrutiny. 

For its part, the World Bank announced in advance of the Annual Meetings in October that it was lowering the minimum equity-to-loan ratio from 19 percent to 18 percent, freeing up $30 billion more in financing, removing certain fees, and lowering the price of loans for smaller economies. Meanwhile, the International Monetary Fund (IMF) announced a package of reforms to its General Resources Account lending that will significantly reduce the cost of IMF borrowing, which has compounded the crisis for many countries. The principal changes include a reduction of the margin over the Special Drawing Rights interest rate, an increase in the threshold at which surcharges apply, a lower rate for time-based surcharges, and a higher threshold for commitment fees. More than a third of General Resources Account (GRA) borrowers are currently subject to surcharges. By fiscal year 2026, the number of nations subject to surcharges is projected to drop from twenty to thirteen. Hefty savings for GRA borrowers are expected––$1.2 billion annually, or 36 percent.

––Nicole Goldin, PhD, is a nonresident senior fellow at the Atlantic Council’s Geoeconomics Center.


56.6 percent

The drop in revenue from Chinese government entities’ sale of state-owned land in the first three quarters of 2024 compared with the same period in 2021


Nothing encapsulates China’s economic crisis better than the steep fall in government revenue from “land use” sales. Since peaking in 2021, the country’s booming real estate sector has fallen into a deep depression, with construction grinding to a halt in many cities and falling prices adding to deflationary pressures in the Chinese economy. That has proven devastating to China’s heavily indebted local governments, which have relied on the sale of “land use” rights for much of their operating income. The IMF estimated in 2023 that the debt of local governments and financing vehicles they’ve set up over the years to raise (and spend) money totaled more than 100 trillion yuan ($13.7 trillion). With an estimated fifty million residences sitting empty nationwide, many property developers having defaulted on debts, and local governments unable to pay their bills, Beijing is struggling to sustain economic growth.

Jeremy Mark is a nonresident senior fellow at the Atlantic Council’s GeoEconomics Center.


318

The number of transactions each year that Treasury estimates could be covered by the new Outbound Investment Security Program


In 2024, the US Department of the Treasury took the final steps to implement Biden’s Executive Order 14105 to create a targeted Outbound Investment Security Program. During the rulemaking process, Treasury initially estimated that 212 transactions per year could fall within the program’s jurisdiction. The public comment period apparently caused Treasury to raise their estimates to 318 to “account for the likely underrepresentation of potentially relevant transactions,” but the private markets are famously opaque and Treasury went on to concede that “precise data that matches the scope of potential covered transactions is not available.” Treasury’s revised estimate should still only implicate less than 1 percent of deal activity (by deal count, vice value). The question for 2025 is whether this small percentage is an accurate reflection of the program’s impact on US outbound investments and the costs of compliance.

—Jesse Sucher is a nonresident senior fellow at the Atlantic Council’s Economic Statecraft Initiative in the GeoEconomics Center. 


10%? 20%? 25%? 60%? 100%? 

Trump’s tariff proposals


There is nothing like large, unilateral, and across-the-board tariff proposals from the United States to get tongues wagging and economic models churning. The latest tariff proposals from the president-elect are no exception. But maybe more important than the impact of such tariffs is the question of whether the EU should view these tariff proposals as weapons and threats directed against trading partners, or as tools of US domestic policy that result in collateral damage to the EU. Each characterization is credible, but the difference is huge in terms of the direction of transatlantic relations.  And once EU policymakers start to publicly own one narrative or the other, it is hard to go back. 

If the tariff proposals are viewed as weapons and threats, a reasonable EU response—and maybe the only one—is retaliatory tariffs, and to refuse to negotiate “with a gun to our heads” (in well-worn EU parlance). This would likely lead to tit-for-tat retaliation or even a trade war. If, by contrast, the EU views the tariff proposals as tools of US domestic policy that inflict collateral damage on the EU, then a reasonable response is an early bilateral discussion on other ways to achieve US domestic policy objectives, but with less or no collateral damage to the EU. 

Among the policy objectives for these and previous proposed tariffs are: addressing persistent goods trade imbalances, encouraging domestic manufacturing, raising revenue, and protecting against and disincentivizing nonmarket excess capacity. These are policy goals that the EU and other trading partners can understand (and even arguably share), even if they disagree that tariffs are always a good way to achieve them. Indeed, some of these goals—like addressing the challenges posed by nonmarket economies—are better achieved in coordination with like-minded allies, which provides a clear opening and opportunity for collaboration.  

The current moment is ripe for early US-EU engagement on achieving the United States’ policy objectives while minimizing collateral tariff damage (including to the US economy itself). Engagement could, indeed, drive the percentage numbers in the header above closer to zero, at least for the EU.

––L. Dan Mullaney is a nonresident senior fellow with the Atlantic Council’s Europe Center and GeoEconomics Center.


$50 billion


That’s the amount of money generated by pulling forward future interest earnings on Russia’s blocked sovereign assets. For nearly three years, the G7 debated how to handle the $300 billion in Russian foreign exchange reserves being held in Western central banks. While some advocated for a total seizure of the full amount, others worried about the legality of such a move and the backlash it would create across the Global South. 

So the G7 reached a game-changing compromise. Creatively, and drawing in part on Atlantic Council GeoEconomics Center research (see our simple annuity formula below), the G7 calculated the interest these assets would earn over the next twenty years and deliver that total—$50 billion—to Ukraine in this calendar year. When you consider that Ukraine’s total budget in 2023 was around $80 billion, you understand that this solution is more than just a temporary fix—it’s a surge of resources delivered at a critical moment. And the number also represents what can happen when allies work together and think outside the box during an unprecedented situation.

––Josh Lipsky is the senior director of the Atlantic Council’s GeoEconomics Center.


57

Number of countries with an active digital ID system that has been operationalized in two or more sectoral use cases.


Digital ID presents massive opportunities for governments and the private sector to interact with people more efficiently; well-known examples include India’s Aadhar system and Estonia’s e-ID. As governments digitize services and interfaces with constituents, digital ID is expected to play a significant role in resource allocation, access control, and data collection. At the same time, digital ID poses a number of challenges. Prior research (including from me and my colleagues at Carnegie Mellon University) has shown that ID requirements can pose significant barriers—particularly to marginalized populations—due to procedural challenges and/or limited resources for onboarding, identity-proofing, and authenticating individuals. Another prominent challenge is privacy and security. Digital ID systems typically collect and process sensitive data such as biometrics; ensuring proper privacy and security protections for this data is far from trivial. Moreover, not all countries with digital ID systems even have data protection laws in place—or the means to enforce them. 

As governments around the world increasingly embrace digitization and adopt digital ID, they will face a challenging balancing act between providing useful, usable services while also providing safeguards against many potential pitfalls that can have disastrous outcomes for constituents.

Giulia Fanti is a nonresident senior fellow at the Atlantic Council’s GeoEconomics Center and an Angel Jordan associate professor of electrical and computer engineering at Carnegie Mellon University.


35 percent


Through May of 2024, Russia supplied approximately 35 percent of US imports for nuclear fuel. Biden imposed a ban on the importation of uranium products from Russia, which went into effect in August. This was a significant move for the US energy sector transitioning away from resources that had been a critical part of the US nuclear energy regime. It’s important to note that a waiver process exists to allow some importation of enriched uranium to continue for a limited time. 

This very narrow resource that continued to be purchased from Russia by a country that had imposed crippling sanctions on the Russian economy is an important reminder that Russia was still very much part of global supply chains this year. 

Daniel Tannebaum is a partner at Oliver Wyman, where he leads the Global Anti-Financial Crime Practice, and a nonresident senior fellow within the Atlantic Council’s GeoEconomics Center.


3

Technology companies that plan to use energy generated by nuclear power plants by 2030.  


In October, the Associated Press reported that Microsoft and Google would invest in small nuclear reactors to support “surging demand [for carbon-free electricity] from data centers and artificial intelligence.” Amazon also announced plans to invest in small nuclear reactors as dedicated sources of zero-carbon energy to support its data centers and server infrastructure.

These investments occur as technological innovation sparks sharp increases in demand for electricity, as seen in data released by the US Energy Information Administration.

Goldman Sachs research this year estimates that AI alone will generate a more than 160 percent surge in demand by 2030 for electric power to cool data centers and maintain operational integrity for the physical servers that support cloud-based AI computing.  

The share of demand for electricity by US data centers is expected to double by 2030, although it will still remain in the single digits relative to other sources of demand.

For decades, energy and national security have had a high degree of overlap with geopolitics due to the unique role that fossil fuels play in the global economy. One consequence of Russia’s aggression in Ukraine since 2014 has been to incentivize the rapid adoption of clean energy in order to minimize geoeconomic vulnerabilities associated with imported fossil fuel energy. 

Many will celebrate the proactive shift toward renewable and nuclear energy by the three largest technology companies on Earth. But the shift will also create national security issues among three critical infrastructures: the electricity grid, nuclear energy, and AI/data centers. Local, renewable, zero-emission energy will transform and potentially complicate the interplay between national security policy, energy policy, and AI policy.

Barbara C. Matthews is the CEO of BCMstrategy, Inc., a company that generates AI training data from the language of public policy. When in government, she was the first US Treasury Department attaché to the EU and, prior to that, senior counsel to the House Financial Services Committee. She is a nonresident senior fellow with the Atlantic Council’s GeoEconomics Center.

The post By the numbers: The global economy in 2024 appeared first on Atlantic Council.

]]>
Mapping South Asia’s digital landscape https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/mapping-south-asias-digital-landscape/ Thu, 14 Nov 2024 16:00:35 +0000 https://www.atlanticcouncil.org/?p=803693 Data protection regulations are becoming critical for South Asia, where some countries are increasingly driven by digital economies.

The post Mapping South Asia’s digital landscape appeared first on Atlantic Council.

]]>
Data protection regulations in Bangladesh, India, and Pakistan are of immense importance to the three countries and to the world. In addition to their geopolitical importance, Bangladesh, India, and Pakistan are home to large and young populations, with digital economies that are either fast-growing or have the potential to be. Close to 2 billion people in total reside in the three countries, with more than 60 percent of this population younger than 35 years old. All three countries boast high cellular connectivity: there are around 200 million mobile phone subscribers each in Bangladesh and Pakistan and over 1.2 billion in India. This connectivity is driving rapid growth in new, data-reliant industries such as e-commerce.

Recognizing this rapid progress as well as the tremendous potential, policymakers in the three countries are rightly betting on the promise of their technology sectors to play key roles in economic growth, job creation, and overall social good. As policymakers are aware, developing vibrant and innovative technology sectors is even more urgent given the ongoing transition worldwide from labor-intensive economies to more knowledge-intensive ones. This trend is accelerating because of recent technological breakthroughs, including in automation and robotics, big data, and generative artificial intelligence (AI).

Policymakers are also rightly prioritizing greater data regulation, for reasons that range from combating misinformation to safeguarding national security and sovereignty. These priorities—including economic, social, and security—involve complex trade-offs.

To be sure, none of these trade-offs and complexities are unique to these three South Asian countries. Governments across the world are navigating similar issues, made even more challenging by the rapid pace of technological progress.

Recognizing the importance and complexity of this topic, the Atlantic Council’s South Asia Center embarked in 2023 on a study of the state of data protection regulations in Bangladesh, India, and Pakistan. The project resulted in three issue briefs—one each for the three countries—that were published from March through May 2023 and provided an overview of the regulatory landscape, the underlying politics, and watchpoints. This paper represents the capstone of the project.

The subsequent sections of this paper provide summaries of the three issue briefs. A snapshot of the main reasons why data protection regulation matters is presented below.

  1. Economic: A broad range of sectors and companies stand to gain substantially from well-designed data protection regulations, and to thereby enable countries’ economic objectives that include growth, job creation, foreign direct investment, and foreign exchange reserves. Small and medium-size enterprises stand to gain substantially from opportunities in e-commerce and gig economies. Conversely, they are more likely than large firms to be hurt by digital trade restrictions. Good data protection regulations support the growth of innovative sectors such as those in AI, blockchain, biotech, robotics, 3D printing, electric vehicles, and other technologies of the 21st century. Digital trade regulations can enable or curtail the growth of services such as IT, financial, and business consulting.
  2. Social: Data protection regulations affect social development objectives, such as privacy, the growth and effectiveness of democracies, and the efficient delivery of essential social services, such as health care, education, and benefits. Achieving these social objectives involves careful navigation of trade-offs in data regulations, for instance, between the goal of protecting free speech and the goal of minimizing hate speech and misinformation.

Join the South Asia Center mailing list

The South Asia Center serves as the Atlantic Council’s focal point for work on greater South Asia as well as its relations between these countries, the neighboring regions, Europe, and the United States.



  • This field is for validation purposes and should be left unchanged.

Bangladesh

The South Asia Center’s issue brief on Bangladesh, “Bangladesh’s Draft Data Protection Act,” authored by Stephen Weymouth in March 2023, focused on the potential implications of new restrictions on cross-border data flows and data localization requirements. The brief tracked the recent history of efforts by the Bangladesh government to promote digitalization of the economy while seeking to curb threats to data privacy and to protect personal data. 

The Digital Bangladesh initiative, launched in 2009, sought to build a national digital infrastructure that could connect Bangladesh to the larger global economy, position it as a regional commercial hub, and spur more access for its citizens to digital services. The initiative was generally seen as successful in providing the digital underpinnings for an economy that saw enormous growth in the decade that followed. The Digital Security Act of 2018 and its successor, the Cyber Security Act, however, raised questions about the increased role of Bangladesh enforcement bodies in governing the digital activities of its citizens.

The draft Data Protection Act of 2022 caused concerns among many stakeholders over the risk of some of the proposed provisions undermining the vision and ambitions of the Digital Bangladesh initiative. Some of the proposed measures were seen as being counterproductive by constraining the required range of digital services and increasing regulatory uncertainties and costs. The concerns of stakeholders included aspects such as the draft act’s requirement that sensitive data, user-generated data, and classified data be stored on servers located in Bangladesh and the draft act’s proposed restrictions on the transfer of personal data outside Bangladesh. 

More recently, there have been encouraging signs that the Bangladesh government is noting some of the inputs received about the Data Protection Act. The latest version, issued in January 2024, took an important step forward in narrowing the scope to “personal data” rather than the more general “data.” Stakeholders in the United States and elsewhere have welcomed this improvement and expressed hope that this trend toward less restrictive treatment of data flows will continue as Bangladesh finalizes and enacts the legislation.

Concerns remain, however, about some aspects of the latest draft act. For instance, the three-year transition period that was included in a March 2023 draft has been deleted, even though it would have enabled stakeholders to fully understand and properly implement new data flow restrictions. Additionally, the conditions for transfer of data that is not “classified” outside Bangladesh are not clear in the draft and could create new legal uncertainties for data fiduciaries. The draft could also benefit from greater discussion and clarity about proposed measures involving extraterritorial application, disclosure of protected data to government authorities, and the practicality of parental consent and age verification.

Bangladesh is at a turning point, with significant potential to build on its remarkable socioeconomic progress and diversifying beyond dependence on the garments sector. If Bangladesh strikes a productive balance between policies that would bolster its vibrant growth and those that enable government oversight, the country will be on a fast track to unlocking its immense potential.

To note, the ongoing political crisis in Bangladesh has added new uncertainties to policy making, including the digital landscape.

India

Stephen Weymouth also authored the South Asia Center’s issue brief on India, “India’s Personal Data Protection Act and the Politics of Digital Governance,” in May 2023. The brief highlighted the role of digital trade in India’s continuing economic growth and the recent efforts of the Indian government under the Narendra Modi administration to bring some regulatory order to the country’s burgeoning digital marketplace. The brief provided a summary of the wide-ranging legislation in the works at that time, including the Digital Personal Data Protection Bill, the Digital India Bill, and the Telecommunications Bill. 

Since then, the government succeeded in passing two pieces of legislation: the Digital Personal Data Protection Act (DPDP Act) and the Telecommunications Act. The government’s vision going forward involves a comprehensive regulatory framework to govern digital commerce and trade. Its legislative agenda therefore includes other rules and draft bills such as the Information Technology Rules, the draft Digital Competition Bill, and the draft National E-Commerce Policy. It remains to be seen how this agenda is advanced through the many relevant ministries. 

Reactions to all this activity have been mixed. For example, on the US-India bilateral front, the joint statement on the Trade Policy Forum, convened by Minister of Commerce and Industry Piyush Goyal and US Trade Representative Katherine Tai on January 12, 2024, noted that Ambassador Tai “appreciated India’s extensive consultations and noted that India’s approach of enhancing data protection, privacy and security while enabling connectivity will support further expansion of the bilateral digital trade.” To this point, an important and welcome amendment to the final DPDP Act was a shift from data localization—a prospect in earlier drafts that had caused widespread concern—toward permitting data flows from trusted geographies. However, while the DPDP Act signals a moving away from express data localization mandates, it does not specify to which countries data may be transferred nor does it list the criteria for trusted geographies.

The Modi administration is preparing for a third term in power following India’s national elections, conducted from April 19 to June 4. Despite Prime Minister Modi’s party falling short of a majority in parliament and now leading a coalition government, the administration’s likely focus will remain on preparing India to be the third-largest economy in the world by the end of the decade and to be a compelling pole in an increasingly multipolar world. The global marketing of data public infrastructure, as witnessed during India’s G20 presidency, is a manifestation of this.

To enable the administration’s vision for India’s growth and global stature, the government needs to promote foreign investment in both goods and services production. At the same time, the government is sensitive to concerns in key electoral constituencies about the threat of foreign competition. The government has also sought to regulate social media content with measures that have been criticized by some as authoritarian and intended to control the political narrative but supported by others as necessary to prevent the spread of misinformation and to ensure public order.

The Modi administration has demonstrated admirable ability to advance a socioeconomic agenda by navigating these trade-offs and to take into account inputs from a range of stakeholders. The administration should continue to show its readiness to listen to many different voices through opportunities for consultation and stakeholder engagement. Doing so will help continue putting in place a regulatory environment that balances complex trade-offs and lays the groundwork for India’s continued rise in the coming decades.

Pakistan

In his April 2023 issue brief, “Pakistan’s Data-Protection Landscape in 2023,” Uzair Younus highlighted that the Pakistan government risks curtailing the development of its digital economy if its legislation on data protection increases regulatory uncertainties and costs. Such legislation may discourage foreign investment and impede development of a facilitative ecosystem for local start-ups as well as other domestic and multinational investors. Per Younus,1 this would be a self-inflicted wound, given the impressive growth of Pakistan’s technology sector from USD 1 billion in fiscal year 2018 to around USD 2.6 billion in 2023.

The Prevention of Electronic Crimes Act (PECA) of 2016 was among the first pieces of data regulation in Pakistan. The act involves many measures that are stated as being intended for public order and to prevent misinformation, which are important goals. However, the act is also counterproductive to building a strong, globally competitive digital economy. PECA increases uncertainties and costs of doing business, for instance, providing unclear levels of authority to the Pakistan Telecommunication Authority to control content on social media. Although a range of private sector and civil society stakeholders within and outside Pakistan have advocated against continuing this approach, the measures remain in place and appear likely to be reinforced with new legislation on data protection. 

Since 2020, the Ministry of Information Technology and Telecommunication has been working on data protection legislation that involves potential features that could negatively affect growth and homegrown innovation in digital services. These features include data localization requirements, many controls on data flows, low autonomy of data regulatory authorities, and insufficient opportunities for checks and feedback on enforcement. These concerns were discussed in bilateral US-Pakistan trade dialogues, as reflected in the joint statement on the ninth meeting of the Trade and Investment Framework Agreement Council in February 2023. 

While admittedly operating in challenging circumstances, Pakistan’s government—newly formed after elections in February—could consider slowing the pace of new data regulations and prioritizing additional rounds of inputs and consultations on existing and proposed legislation. The government could even seize the opportunity to reset and refresh the regulatory agenda by considering changes to the Data Protection Act approved by the cabinet. Additional engagements with key stakeholders both in the private sector and civil society groups would enable the new government to revise the act to better balance the goals of protecting data privacy, preventing misinformation, and promoting a robust digital economy.

Pakistan’s technology sector holds tremendous promise for the country’s future, even more so amid the ongoing economic stasis. The sector can play a key role in Pakistan’s economic recovery and in fully realizing the country’s economic potential. The Pakistan government should safeguard and catalyze the sector through any means in its tool kit. A well-designed regulatory framework could be a core component of that tool kit.

Conclusion

With their large, youthful, and highly digitized and connected populations, Bangladesh, India, and Pakistan have immense potential as emerging economies, vibrant demographies, and key players in a multipolar world. Admittedly, each country is in a different state of development in terms of economic growth, economic diversification, digitization, integration into global trade and value chains, democratic parameters, and social services, among others.

The differences in context notwithstanding, all three countries stand to benefit economically and socially from well-designed data protection regulations. For instance, suitable regulatory frameworks could enable each country to supercharge growth of its technology sector and enable it to capitalize on opportunities through greater digital linkages and trade with large markets such as the United States and the European Union. Conversely, each country’s immense potential risks being negatively affected by limitations in its regulatory frameworks in areas such as extraterritorial scope and governance of personal data sharing with governments.

In this context, the Atlantic Council’s project resulted in the following main observations and recommendations to policymakers and other stakeholders in the three countries.

  • Bangladesh: Bangladesh’s most recent draft of the Personal Data Protection Act, 2024, contained measures that were welcomed by stakeholders, such as the narrowing of the act’s scope to personal data. The government could continue to refine the draft based on consultations, including, for instance, to permit an appropriate transition period. The government could also continue to remain open to inputs from key stakeholders for future data protection legislation. However, recent developments in Bangladesh’s political climate have brought new uncertainties to the trajectory of policy making in the country.
  • India: India’s consultative and iterative approach with the DPDP Act was welcomed by many, as were some of the main updates incorporated into the final act. Industry, civil society, and other stakeholders would welcome a similarly consultative and iterative approach toward ongoing and future data regulations, including the work-in-progress draft E-Commerce Policy.
  • Pakistan: Pakistan’s new government could consider slowing down the pace of data protection legislation and could prioritize inputs and consultations with key stakeholders from the private sector and civil society. In addition, the government could seize the opportunity to review and refresh the latest version of the Personal Data Protection Act and welcome inputs from stakeholders to that end.

More broadly, all three governments—and governments across the world—could choose to adopt more nimble and flexible approaches to policymaking in this complex and rapidly evolving context. A “regulatory sandbox” approach, while undoubtedly complex politically and administratively, could enable policymakers to learn, adapt, and customize regulations over time.

About the authors

Mark Linscott is a nonresident senior fellow with the Atlantic Council’s South Asia Center. Prior to joining the Atlantic Council, Linscott was the assistant US trade representative (USTR) for South and Central Asian Affairs.

Gopal Nadadur is a nonresident senior fellow at the Atlantic Council’s South Asia Center and is also vice president for South Asia at The Asia Group.

Related content

Our work

The South Asia Center is the hub for the Atlantic Council’s analysis of the political, social, geographical, and cultural diversity of the region. ​At the intersection of South Asia and its geopolitics, SAC cultivates dialogue to shape policy and forge ties between the region and the global community.

1    Uzair Younus, “Pakistan Needs to Press Pause on Its Data Overhaul,” New Atlanticist, July 26, 2023, https://www.atlanticcouncil.org/blogs/new-atlanticist/pakistan-needs-to-press-pause-on-its-data-overhaul/.

The post Mapping South Asia’s digital landscape appeared first on Atlantic Council.

]]>
Kumar cited in “Smart Money: How digital currencies will win the new Cold War – and why the West needs to act now” https://www.atlanticcouncil.org/insight-impact/in-the-news/kumar-cited-in-smart-money-how-digital-currencies-will-win-the-new-cold-war-and-why-the-west-needs-to-act-now/ Fri, 01 Nov 2024 18:34:16 +0000 https://www.atlanticcouncil.org/?p=804244 Read the book here

The post Kumar cited in “Smart Money: How digital currencies will win the new Cold War – and why the West needs to act now” appeared first on Atlantic Council.

]]>
Read the book here

The post Kumar cited in “Smart Money: How digital currencies will win the new Cold War – and why the West needs to act now” appeared first on Atlantic Council.

]]>
Kumar and Lipsky cited in”The Geoeconomics of Money in the Digital Age” https://www.atlanticcouncil.org/insight-impact/in-the-news/kumar-and-lipsky-cited-inthe-geoeconomics-of-money-in-the-digital-age/ Fri, 01 Nov 2024 18:33:45 +0000 https://www.atlanticcouncil.org/?p=804242 Read the book here

The post Kumar and Lipsky cited in”The Geoeconomics of Money in the Digital Age” appeared first on Atlantic Council.

]]>
Read the book here

The post Kumar and Lipsky cited in”The Geoeconomics of Money in the Digital Age” appeared first on Atlantic Council.

]]>
Global DPI models: Lessons from India, Brazil, and beyond  https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/global-dpi-models-lessons-from-india-brazil-and-beyond/ Fri, 25 Oct 2024 14:21:48 +0000 https://www.atlanticcouncil.org/?p=802235 The concept of Digital Public Infrastructure (DPI) is gaining momentum globally, as countries seek to digitize essential services like identification, payments, and civil registration.

The post Global DPI models: Lessons from India, Brazil, and beyond  appeared first on Atlantic Council.

]]>
The concept of digital public infrastructure (DPI), while relatively new, has rapidly gained traction among policymakers. Countries around the world have long attempted to digitize government service delivery. Some wealthier nations in the Global North build atop legacy systems that include public and private actors that offer essential goods and services, such as identification, payments, civil registration and vital statistics (CRVS), and data exchange.

In contrast, low- and middle-income countries of the Global South have built novel indigenous systems with new technologies and best practices, leapfrogging the Global North’s digital government systems. Models such as India’s highlight DPI’s potential as a tool for financial inclusion and economic development. Because of its initial success, DPI has gained traction as other Global South countries embark on their own DPI projects or adopt technology from counterparts such as India and Brazil, which offer open-architecture access. In contrast to some legacy systems, these new digital goods aim to employ open standards and protocols, be interoperable and non-excludable, use federated architecture, engage privacy by design, and offer the digital equivalent of physical infrastructure in providing access to each country’s overall digital economy. In building these sui generis digital systems, Global South countries are rethinking how to balance public and private-sector involvement, regulations for interoperability, the appropriate role and limits of markets, how to create trust in institutions, and how to build consequentially inclusive digital government goods and services.

Two key recent events have accelerated the interest in digital public infrastructure: the COVID-19 pandemic and India’s presidency of the Group of Twenty (G20) Summit. The COVID-19 pandemic exposed vulnerabilities and the urgent need for scalable, digital services, accelerating countries’ investments in offering goods and services digitally.
1 India’s leadership at the G20 further galvanized this movement, positioning DPI as a crucial global conversation. International and multilateral groups from the Group of Seven (G7), the Quad, and now the United Nations (UN) Global Digital Compact have all been working to address and define DPI.
2 The European Parliament is now holding conferences on a “Euro Stack” as it explores new ways to assert digital sovereignty and create equitable access to the digital economy.3

In the context of these developments, the Atlantic Council’s South Asia Center assembled working groups to research and discuss the definition of digital public infrastructure, what makes it “new,” learnings from historical examples, and key questions going forward. These working groups comprised digital government, trade, innovation, payments, foreign policy, industrial policy, and internet experts. They kindly shared their time and insights in a series of meetings and panels. The working groups also conducted structured interviews with DPI experts around the world. We graciously thank all participants and commentators for their openness and time given to the project. 

This issue brief establishes the background of DPI development, discusses existing examples of DPI, and provides the policy recommendations essential for the next stage of DPI exploration, implementation and deployment. This brief is followed by two papers on cybersecurity and financial inclusion, addressing the fundamental issues affecting the development of DPI.

DPI: Scope and definition    

The nomenclature “digital public infrastructure” is a new entrant in the government technology literature, but projects bearing elements of what we now consider DPI have existed for decades.4 As technologies have changed, so have the definitions of what is public and what is infrastructure.5 Although often credited to the Nobel Prize-winning economist Paul Samuelson, the concept of public goods extends back to John Stuart Mill, Italian writer Ugo Mazzola, and Swedish economist Knut Wicksell.6 Samuelson extended this definition to include non-rivalry (i.e., one person’s use of a good does not diminish another person’s use) and non-excludability (i.e., everyone has equal access to that good, such as air).7 Digital public goods (DPGs) are open-source software packages meant for governments to build digital tools that broadly fit these two criteria. 8 Not all DPI projects use DPGs, and using open-source software is neither necessary nor sufficient for a government DPI project to be truly open protocol, transparent, interoperable, and reusable, as many definitions of DPI require. The definition of DPI remains a topic of a vibrant and ongoing debate. For the purposes of this paper, we use the Global DPI Repository definition: “interoperable, open, and inclusive systems supported by technology to provide essential, society-wide public and private services.”

What is new about DPI?

DPI assumes that citizens have a right to access basic features of a country’s digital economy. These features typically include identification, civil registration and vital statistics, payments, and data exchange. Proponents of DPI argue that markets have not, or have not properly, provided these products and services to all members of the digital economy. Therefore, they argue, the government should step in to provide these basic goods and services in ways that allow societal reach.

The DPI movement asks what the role of the state should be in the digital economy. Has the private sector failed in delivering goods and services to the world’s poorest and most underserved?

Government involvement in payments systems provides the clearest example of digital domains historically run by the private sector, but there are also emerging attempts to deploy DPI models for open commerce, ride hailing, and even decentralized compute.

India stack

India’s leadership of the 2023 G20 catapulted the conversation about these digital government offerings to the international stage. The New Delhi Leaders’ Declaration defined DPI as “a set of shared digital systems that are secure and interoperable, built on open technologies, to deliver equitable access to public and/or private services at a societal scale.”9 Over the past decade, India has digitally and financially included millions of people and built a system of digital goods around a core group of IDs, payments, and data exchange. This set of government-led digital products, known as India Stack, enables access to the Indian domestic digital economy.10

As a result, India is often seen as the model for DPI implementation due to the successful launches of its Aadhaar digital identity platform, Unified Payments Interface (UPI) instant payments system, and civil registration services. Its ability to scale DPI is attributed to its large population, technological expertise, low mobile data costs, and supportive political and economic conditions.

For New Delhi, the development of the stack has been a project for more than a decade. In 2010, the Indian government launched Aadhaar, a biometric digital identity system. Enrollment centers across the country collected face and retina scans, fingerprints, and demographic data. The government of India has tied a variety of government benefits and account setups to Aadhaar, such as setting up a bank account. Although legally optional, having an Aadhaar card remains imperative for access to the digital economy in India.11 In less than a decade, more than 1.3 billion people, nearly 90 percent of the population, have joined Aadhaar.

Digital payments form the second layer in the stack. The Central Bank’s Pradhan Mantri Jan Dhan Yojana (PMJDY), a project to bring a bank account to all Indian households, opened accounts for 166 million people in its first year. This grew to 510 million by the end of 2023, according to India’s Ministry of Finance. This allowed the introduction of the UPI, a new layer of the retail payments systems that allowed banks to exchange messages with each other and with non-bank firms, capitalizing on the financial technology (fintech) innovators that had developed tools to cheaply and easily store and transfer funds.12

Anyone with access to the system—including consumers and small merchants who previously found it difficult to make and receive payments—could now send or receive payments for goods and services through a digital app. A crucial feature of this system was its intra-system interoperability; users were able to transact with all actors on the UPI rails. The government accomplished this interoperability by establishing a single application programming interface (API)-based rail along which all payments providers had to transact.

Data verification and consented exchange represent the third layer of the stack. The Data Empowerment and Protection Architecture, launched in 2020, aims to facilitate the seamless and consent-based exchange of personal data. An Account Aggregator framework aims to enable atomized control over one’s personal data, whereby each individual user can track and consent to different digital actors accessing said data.13

India Stack has experienced several challenges and controversies since its rollout. The growth of account ownership hit a lull with the pandemic, even declining slightly from 80 to 78 percent by 2021. Some doubts have also been raised regarding the universal utility of the accounts, as India has one of the world’s highest percentages of inactive accounts. Additionally, several high-profile data breaches have raised concerns about the security of the Aadhaar system.14 Experts have flagged the potential security risks of centralizing such large quantities of identity information and the possibility that saved fingerprints could be used improperly.15 Others have worried that governments could use such large databases as tools to track and surveil citizens.16

Brazils digital payments system

Brazil’s new payment system, Pix, is another example of a DPI. Launched in November 2020 by the Central Bank of Brazil (BCB), the Pix electronic payment system aimed to reduce reliance on cash, increase financial inclusion, strengthen competition, and reduce the cost and ease the acceptance for merchants. Several features have ensured the success of Pix. First, the BCB made participation by banks and payments providers mandatory, allowing peer-to-peer usage to increase over time. Second, Pix payments settle in three seconds on average, faster than credit or debit cards.17 Third, the BCB set zero-fee transaction costs for individuals, with a cost to the merchant of 0.33 percent of the transaction amount. These dynamics led the largest banks operating in Brazil to work together to develop the network in a way that mandated interoperability. The BCB also established a Pix Forum, in which users and stakeholders can have a dialogue through its implementation cycle.18

Pix has had impressive results since its rollout. In its first two years, 140 million Brazilians—nearly 80 percent of the adult population—used Pix. By the end of 2022, more than 3 billion transactions took place on Pix per month, five times more than credit and debit cards. The head of Brazil’s central bank, Roberto Campos Neto, famously declared that the Pix system would result in “credit cards ceasing to exist at some point soon.”19 Pix has led to the growth of non-bank payments fintechs and a decrease in the price of payments.20

In terms of its governance, Pix is more centralized than India Stack. The BCB both owns and operates the payment scheme, as well as the user address database that contains user identification. The BCB is also the regulator for the overall payments system and, thus, the regulator for Pix. The central bank has added several features to Pix since its inception, including payment scheduling, access to third-party payment providers, and the ability to withdraw cash from automated teller machines. Pix has also been the subject of controversy. As volumes and online account ownership have increased, so have instances of cybercrime and fraud.21

Estonia’s digital highway: The X-Road

More than half of the Estonian population voted in the 2023 election from their home computers. Estonia’s digitized government system—which allows access to government services, e-health records, and secure digital identity—made this feat possible.

Estonia’s DPI project began in the 1990s with a decision to rebuild the country’s economy on a digital basis. Through the so-called “Tiigerhüpe,” or tiger leap program, the government used public-private partnerships to invest in network infrastructure to modernize Estonia’s post-Soviet infrastructure, including providing internet to all Estonian schools and government agencies. An electronic identification (e-ID) program followed suit. The electronic governance platform also includes digital voting, an e-file system for access to the judicial system, and the government cloud, which, through partnerships with private companies, has put 99 percent of public services online.

The X-Road system represents the key infrastructure behind Estonia’s digital government. A secure data-exchange platform that connects more than 450 public and private-sector organizations, X-Road enables more than three thousand digital services. The Nordic Institute for Interoperability Solutions—a nonprofit organization created by the governments of Estonia, Iceland, and Finland—now manages the X-Road platform and its international adoption projects. More than twenty countries have adapted or plan to adapt the X-Road program through open-source access. 

Working with the private sector proved essential for the success of the Estonian experiment. While the government ideated the digital ID card early in the 1990s, the first digital IDs were “only good for scratching the ice off the windshield of a car,” according to one of their developers.22 Working with banks to improve the user experience and creating incentives to use the cards proved essential to the system’s ultimate success.23

In contrast to the payment systems in Brazil or India, X-Road has no single point of failure. X-Road’s peer-to-peer architecture is focused primarily on resiliency.24 Because X-Road allows Estonia’s public agencies to share data securely with each other, every ministry manages access to its own database, which ensures data are not stored in a common pool that could become a single point of failure.

As with India and Brazil, Estonia has faced cyber threats to its DPI system. In 2007, the country faced a weeks-long attack by cyber criminals in which all government services were taken down. This led Estonia to develop a data embassy, which created a backup of critical data and services stored in a remote location.25

The role of payment systems in DPI

India, Brazil, and Estonia offer distinct yet instructive models for implementing DPI. Their unique experiences reflect the different regulatory, technological, and governance choices that countries can make. India’s society-level approach, Brazil’s emphasis on speed and accessibility, and Estonia’s integration of security and privacy into digital services each provide lessons for how digital infrastructure can be developed to meet local needs. The recurring challenges of cybersecurity and privacy standards across these examples illustrate the need for secure and resilient digital architecture. These examples set the stage for a deeper exploration of a key component of DPI: payment systems.

Why study payments?

The term “payments” means moving value between actors across businesses, consumers, and governments. It is the process or service of exchanging units of value and was historically led by the private sector (e.g., by banks or merchants). Money is a discrete unit of value and governments historically play the role of enforcing that it has been spent only once at a time. Moving value digitally incurs transaction costs.26 Someone must facilitate, clear, settle, and assume risk in the movement of that value from one account to another. Running a cash-based system also incurs costs to both the operator and the users of cash.27 The advent of government-offered payment rails, such as India’s UPI and Brazil’s PIX, has raised new questions about the lines between the state and its citizens, the definition of “public” in public goods, and the long-term direction of financial exchange in the digital economy.28

Types of DPI payments systems

For the purposes of this brief, we identified four major types of DPI payments systems. These different forms come from the different payment instruments they support and the participants among which they can transact payment instruments.

All the below DPI payments systems involve actors moving value between them and either charging to do so (via interchange) or being funded by some other mechanism (e.g., government funding/subsidies or value-add services such as telecommunications subscription services). Each of these methods is either:

  • a low-cost system linking a handful of banks or other institutions to do account-to-account (A2A) payments;
  • government-led facilitation like public rails (e.g., UPI or a central bank digital currency (CBDC)); or
  • involving entities that do not directly monetize the payment flow itself because they monetize another aspect of customer interaction (e.g., M-PESA).

In each of these examples, either government funding plays a role in facilitating the transaction or retail banks cover the cost and the issuing bank charges for the service. In all, some alternate source of funding (whether government subsidy or cross-subsidy) maintains the rails.

Cross-domain payment systems

The first payments system is the interoperable, or cross-domain, system. Cross-domain systems allow all accredited financial actors to transact payment instruments in near real time and on equal or progressive cost footing. They ideally allow for all-to-all switching, clearing, and exchange of instruments within one system between banks, microfinance institutions (MFIs), mobile money operators (MMOs), savings and credit cooperatives, and a government’s central bank. Cross-domain payment systems represent the aspirational goal of many DPI programs because they allow the most payments interoperability in an economy.

Bank instant payment systems

A bank instant payment system (IPS) allows for the instant messaging and transaction of payments instruments between member banks. Thus, this system only allows for transactions involving instruments associated with bank accounts (e.g., debit or credit electronic funds transfers). To facilitate instant payments between other parties, those parties would need to partner with a bank that is a member of the bank IPS.

Interoperable mobile money payments systems

Interoperable mobile money operator (I-MMO) payment systems allow for the messaging and transaction of payments instruments between or within mobile operators. These systems typically work in e-money instruments and are often run by the private sector. In contrast to centralized DPI payment systems, these I-MMO payments rely on a series of multilateral and bilateral agreements between MMOs to facilitate the transfer of funds between them. Sometimes the MMOs act as indirect participants in the instant payments system via a bank that is a direct participant in the settlement infrastructure (e.g., PesaLink in Kenya). Note that this type of interoperable payment system contrasts with closed-loop payment systems such as Venmo, in which a customer can only transact with other in-network participants. The ability of MMOs to move these e-money instruments depends on the legal architecture of the country in which they operate and whether it facilitates such private-to-private exchanges between non-banks.29

Central bank digital currencies

Retail CBDCs are a way for governments to issue fiat as digital legal tender. The advent of blockchain and cryptocurrencies has increased interest in CBDCs as this kind of ledgered cryptography can increase the security of storing fiat digitally. CBDCs can be seen as a type of instant payments DPI. Both retail CBDCs and traditional DPI payments software systems can use cryptography and APIs to ensure security and accessibility. Because they both reduce transaction costs, they can enable the creation of private-sector entrants and increased competition. In contrast to other digital payments systems, CBDCs represent a claim on the central bank, not on the intermediaries.

Cross-border DPI systems

In a regional DPI system, various countries group together to allow for instant payments transactions across borders and, sometimes, between different currencies. In the case of regional DPI payments, clearing either occurs through an agreed-upon central bank or through a third-party hub. Each participant (MMOs, MFIs, commercial banks) connects to the hub either directly or through a national switch.

For example, two of the three regional IPS in Africa—Pan-African Payment and Settlement System (PAPSS) and Groupement Interbancaire Monétique de l’Afrique Centrale (GIMACPAY)—use hub arrangements, while Transactions Cleared on an Immediate Basis (TCIB) follows a hub-switch arrangement.

The public-private divide

As some countries look to use open-source software to build indigenous payments systems, they must make sure to use the correct tools to scale, meet their goals, and continue to innovate as consumer needs change. However, the political systems and civil society underpinning software design and implementation arguably play a larger role in determining that DPI system’s success than the technology itself. This working group emphasizes that a diversity of institutions and balanced trade-offs can create long-term sustainable payments systems that both include and serve their end customers.

Working group policy recommendations

Governance

While financial inclusion remains important, sound internal governance and oversight of DPI projects are paramount for their long-term success.30 Governance will determine the success of DPI projects in serving all communities and replicating success globally. The working group members with experience studying industrial policy and trade protection raised questions about the role of the central bank and its mandate in a particular jurisdiction, and how to resolve potential conflicts of interest when governments act as both regulator and operator. The group felt that governance should be designed to enhance public-private collaboration to encourage competition and innovation, as well as to safeguard against government favoring specific technologies (that is, technology neutrality) and to prevent crowding out of private-sector solutions.

Cost

As excellent research from the World Bank’s Project FASTT group shows, cash-based systems also incur costs (on cash providers as well as users). It is, therefore, essential that governments and private-sector players are aware of the costs of upgrading and digitization, as well as the costs of opting out of these efforts. Research on pricing, interchange, and consumer elasticity in financial products can help illuminate the conversation on free or low-cost, instant, push-payments systems.

To ensure the success of DPI, particularly in the realm of financial inclusion, it is essential to enable digital readiness by investing in key infrastructure like internet access and cellular networks while also rigorously evaluating a country’s preparedness for digital transformation. This digital readiness should be complemented by strong privacy and cybersecurity frameworks that ensure user trust, safety, and resilience. By implementing internationally recognized standards for data privacy and cybersecurity (such as the National Institute of Standards and Technology or International Organization for Standardization frameworks), countries can safeguard user data, promote transparency, and ensure that financial inclusion efforts are secure, inclusive, and sustainable for the long term.

Design for users

DPI should be inclusive, affordable, and able to address digital divides. It should prioritize users and their needs like literacy, accessibility, and fraud protection.31 Consumer preferences and design should be at the center of DPI improvement, which will require continuous monitoring and evaluation even as these technologies are deployed.

Share data and learnings

Transparency, citizen involvement, and accountability are keys to a successful implementation. Sharing scheme rules and uptake data builds trust and establishes independent progress evaluation. Much of the leading research on DPI and instant payment systems comes from stakeholder interviews and not from public-access websites.32

In conclusion, the exploration of digital public infrastructure (DPI) across various national models highlights the transformative potential of these systems in addressing key societal needs such as financial inclusion and service delivery. Countries from both the Global North and South are shaping DPI to suit their respective context, with developing nations often trying innovative indigenous systems. As India’s leadership at the G20 and Brazil’s Pix system show, DPI offers a critical tool for digital governance, enabling broad and public and private access to essential services. This working group’s findings underscore the need for continued international collaboration, robust governance, and strong privacy-oriented cybersecurity frameworks to ensure longevity and inclusivity in DPI. Policymakers and stakeholders ought to focus on building resilient, and interoperable systems to fully harness the benefits of DPI.

About the authors

Authors & working group co-chairs  

  • Barbara Kotschwar, Georgetown University  
  • Colin Colter, Atlantic Council  

Working group members

  • Rob Atkinson, ITIF
  • Ravi Shankar Chaturvedi, Tufts University
  • Dan Chenok, IBM Center for The Business of Government
  • David Eaves, University College London
  • Arya Goel, ASG
  • Jeff Lande,  The Lande Group & Atlantic Council
  • Mark Linscott, Atlantic Council
  • Srujan Palkar, Atlantic Council
  • Aparna Pande, Hudson Institute
  • Anand Raghuraman, Mastercard
  • Susan Ritchie
  • Kati Suominen, Nextrade Group
  • Atman M Trivedi, ASG & Atlantic Council
  • Tiffany Wong, ASG

Related content

1    “COVID-19: Embracing Digital Government During the Pandemic and Beyond,” UN Department of Economic and Social Affairs, 2020, https://digitallibrary.un.org/record/3856978?v=pdf.
2    Anand Raghuraman, “What Should Digital Public Infrastructure Look Like? The G7 and G20 Offer Contrasting Visions,” Atlantic Council, April 18, 2024, https://www.atlanticcouncil.org/blogs/new-atlanticist/what-should-digital-public-infrastructure-look-like-g7-g20/.
3    “The European Digital Identity Wallet: Why It Matters and to Whom,” Caribou Digital, June 25, 2024, https://www.cariboudigital.net/publication/the-european-digital-identity-wallet-why-it-matters-and-to-whom/.
4    David Eaves and Krisstina Rao, “What Do We Know about the State of DPI in the World? Preliminary Insights from the DPI Map,” Medium, July 15, 2024, https://medium.com/iipp-blog/what-do-we-know-about-the-state-of-dpi-in-the-world-preliminary-insights-from-the-dpi-map-51d5e49f299b.
5    David Eaves, Mariana Mazzucato, and Beatriz Vasconcellos, “Digital Public Infrastructure and Public Value: What Is ‘Public’ about DPI?” UCL Institute for Innovation and Public Purpose, March 21, 2024, https://www.ucl.ac.uk/bartlett/public-purpose/publications/2024/mar/digital-public-infrastructure-and-public-value-what-public-about-dpi; Ethan Zuckerman, “What Is Digital Public Infrastructure?” Center for Journalism and Liberty, November 17, 2020, https://www.journalismliberty.org/publications/what-is-digital-public-infrastructure.
6    Mark Blaug, Economic Theory in Retrospect, fourth edition (Cambridge, United Kingdom: Cambridge University Press, 1985); “About Us,” Global DPI Repository, last visited October 21, 2024, https://www.dpi.global/home/aboutus.
7    Julian Reiss, “Public Goods” in Edward N. Zalta, ed., The Stanford Encyclopedia of Philosophy (Palo Alto, CA: Stanford University Press, 2021), https://plato.stanford.edu/archives/fall2021/entries/public-goods.  
8    “Roadmap,” Digital Public Goods Alliance, last visited October 16, 2024, https://digitalpublicgoods.net/map/; Matthias Finger and Juan Montero, “Digitalizing Infrastructure, Digital Platforms and Public Services,” Competition and Regulation in Network Industries 24, 1 (2023), 40–53, https://journals.sagepub.com/doi/10.1177/17835917231156099.
9    Other entities—such as the United Nations Development Programme, US Agency for International Development, and United Nations Economic Commission for Africa—are developing their own definitions and terminology.
10    Derryl D’Silva, et al., “The Design of Digital Financial Infrastructure: Lessons from India,” BIS Papers 106 (2019), https://ideas.repec.org/b/bis/bisbps/106.html.
11    Ananya Bhattacharya and Nupur Anand, “Aadhaar Is Voluntary—but Millions of Indians Are Already Trapped,” Quartz, September 26, 2018, https://qz.com/india/1351263/supreme-court-verdict-how-indias-aadhaar-id-became-mandatory.
12    Sapna Das, “About 10 Crore of Over 50 Jan-Dhan Accounts Dormant, Govt Says This Is an Industry Trend,” CNBC TV18, August 28, 2023, https://www.cnbctv18.com/finance/prime-minister-jan-dhan-yogana-pmjdy-bank-accounts-dormant-deposit-base-9th-anniversary-17657371.htm.
13    Pratik, Bhakta, “NBFC Account Aggregators Hit by Cyber Frauds, Home Ministry Steps in With Technical Help,” Economic Times, last updated August 5, 2024, https://economictimes.indiatimes.com/tech/technology/govt-offers-tech-aid-to-account-aggregators-facing-fraud-deluge/articleshow/112270341.cms.
14    Das, “About 10 Crore of Over 50 Jan-Dhan Accounts Dormant, Govt Says This Is an Industry Trend.”; “Aadhaar: ‘Leak’ in World’s Biggest Database Worries Indians,” BBC, January 4, 2018, https://www.bbc.com/news/world-asia-india-42575443; “Aadhaar Details of 81.5 CR People Leaked in India’s ‘Biggest’ Data Breach,” Hindustan Times, October 31, 2023, https://www.hindustantimes.com/technology/in-indias-biggest-data-breach-personal-information-of-81-5-crore-people-leaked-101698719306335.html.
15    David Medine, “India Stack: Major Potential, but Mind the Risks,” Center for Global Development, April 10, 2017, https://www.cgap.org/blog/india-stack-major-potential-mind-risks.
16    John Thornhill, “India’s All-Encompassing ID System Holds Warnings for the Rest of World,” Financial Times, November 11, 2021, https://www.ft.com/content/337f6d6e-7301-4ef4-a26d-a4e62f602947.
17    “Pix: Brazil’s Successful Instant Payment System,” International Monetary Fund, July 31, 2023, https://www.elibrary.imf.org/view/journals/002/2023/289/article-A004-en.xml.
18    “Forum Pix,” Banco Central do Brasil,” last visited October 21, 2024, https://www.bcb.gov.br/estabilidadefinanceira/forumpagamentosinstantaneos.  
19    “Pix: Brazil’s Successful Instant Payment System.”
20    Ibid.
21    “Why Is Brazil a Hotspot for Financial Crime?” Economist, January 4, 2024, https://www.economist.com/the-americas/2024/01/04/why-is-brazil-a-hotspot-for-financial-crime.
22    “Raul Walter: Estonia’s Digital Identity Giant,” E-Estonia, February 12, 2024, https://e-estonia.com/raulwalter-estonia-digital-identity-giant/.
23    Ibid
24    Yogesh Hirdaramani, “Estonia’s X-Road: Data Exchange in the World’s Most Digital Society,” GovInsider, March 21, 2024, https://govinsider.asia/intl-en/article/estonias-x-road-data-exchange-in-the-worlds-most-digital-society.
25    “Estonia X-Road: Open Digital Ecosystem (ODE) Case Study,” Omidyar and Boston Consulting Group, 2022.
26    Running a cash-based economy also incurs costs and should not be thought of as a zero-cost transaction. The World Bank offers countries a framework for assessing the cost of running cash. For example, the cost of cash in Guyana takes almost 2.6 percent of the country’s gross domestic product, with digital payment taking roughly one-third of the costs of cash. See: Holti Banka, “Initial Findings from the Implementation of the ‘Practical Guide for Measuring Retail Payment Costs,’” World Bank Blogs, May 28, 2018, https://blogs.worldbank.org/en/psd/initial-findings-implementation-practical-guide-measuring-retail-payment-costs.
27    Thomas Lammer, Holti Banka, and Gergana Lyudmilova Kostova, “Retail Payments: A Practical Guide for Measuring Retail Payment Costs,”World Bank Group, November 1, 2016, http://documents.worldbank.org/curated/en/255851482286959215/Retail-payments-a-practical-guide-for-measuring-retail-payment-costs.
28    For a conversation on the positive liberties associated with DPI, see: Eaves, et al., “Digital Public Infrastructure and Public Value.”
29    Defining MMO interoperability as a kind of payments DPI is a controversial claim. The spirit of payments DPI is interoperability as core operating structure, not as an afterthought built from possibly inefficient and redundant bilateral private-to-private agreements. We argue that the results of a payments system matter more than the structure of it in defining it as DPI (e.g., the scope of this paper). So long as a payments system allows broad interoperability and scale that serve high-volume, low-value transactions, in ways that serve the poor and respond to customer needs, we argue it fits the definition of DPI payments.
30    “G20 Policy Recommendations for Advancing Financial Inclusion and Productivity Gains through Digital Public Infrastructure,” Group of Twenty, Global Partnership for Financial Inclusion, and World Bank, 2023, 38–40, https://documents1.worldbank.org/curated/en/099092023121016458/pdf/P178703046f82d07c0bbc60b5e474ea7841.pdf.
31    Jayshree Venkatesan, et al., “Responsible DPI for Improving Outcomes Beyond Inclusion,” Center for Financial Inclusion and Accion International, June 2024, https://www.centerforfinancialinclusion.org/wp-content/uploads/2024/07/Responsible-DPI-for-Improving-Outcomes-Beyond-Inclusion_jul1.pdf.
32    See the “Methodology” section of “State of Inclusive Instant Payment Systems in Africa—2023 Report,” AfricaNenda Foundation, January 2024, https://www.africanenda.org/en/siips2023.

The post Global DPI models: Lessons from India, Brazil, and beyond  appeared first on Atlantic Council.

]]>
How digital public infrastructure can support financial inclusion https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/how-digital-public-infrastructure-can-support-financial-inclusion/ Mon, 21 Oct 2024 14:00:00 +0000 https://www.atlanticcouncil.org/?p=800629 As digital transformation accelerates, Digital Public Infrastructure (DPI) is at the forefront of the global push for financial inclusion. This paper examines how DPI frameworks, particularly those pioneered in India, are bringing financial services to previously underserved populations.

The post How digital public infrastructure can support financial inclusion appeared first on Atlantic Council.

]]>
Understanding DPI

With digital transformation of economies and societies progressing at an increasingly rapid pace, the global community has recognized the need for clear policies, increased financing, creative innovation, and effective regulation of digital technologies to serve the public good and enhance financial inclusion of underserved populations. Digital public infrastructure, or DPI, brings together these priorities in a holistic framework for countries to adopt and adapt per their own developmental objectives. The Group of Twenty (G20) New Delhi Leaders’ Declaration defines DPI as “a set of shared digital systems that are secure and interoperable, built on open technologies, to deliver equitable access to public and/or private services at a societal scale.”1 As in the case of India, successful DPI requires a symbiotic and mutually reinforcing relationship between the public and private sectors on public policy, digital assets, and market innovation (Figure 1).

Operationalizing DPI and financial inclusion

DPI spurs innovation for financial inclusion in myriad ways. Most notably, if implemented well, it expands access to digital services for even the most remote consumers and businesses who might otherwise be underserved by incumbent financial-services offerings. New products and services built on top of DPI targeting previously uncovered populations significantly expand the potential consumer base.

For the financial-inclusion benefits of the new digital infrastructure to be fully realized, entrepreneurs and other private-sector innovators must be able to identify large enough market opportunities for various last-mile use cases and be rewarded for the risk they undertake in solving such user challenges. By adopting the right mix of incentives and regulations, countries should be able to attract private-sector investment to fund their exponential growth and reach sustainable scale.

The India model and its global relevance

How India has used DPI to foster financial inclusion    

DPI has been at the heart of India’s digital transformation, and financial inclusion has been at the heart of India’s DPI. While other countries, such as Brazil, have also taken a similar approach, India’s experience stands out for both its scale and scope. By enabling a policy framework that fosters data privacy and empowerment, mandates interoperability, and promotes market participation accompanied by public investment in digital assets, India’s DPI has expanded the market for goods and services. Over the last decade, this approach has transformed and dramatically increased the country’s financial inclusion, also helping India meet its SDG goals.2

India’s DPI framework

Data by Anit Mukherjee https://orfamerica.org/newresearch/dpi-india-mukherjee-backgr16

Access to financial services has increased globally over the last decade. According to the Global Findex Database 2022, 71 percent of adults in developing economies now have a formal financial account, compared to 42 percent in 2011. The gap in access between men and women in developing economies has fallen from nine percentage points to six percentage points, indicating a closing of the gender gap in financial inclusion.3

Even given this improvement, India’s experience stands out from those of other developing countries largely thanks to its innovative DPI. Nearly 80 percent of all Indian adults (age fifteen and up) had a bank account in 2021, compared to 35 percent in 2011. Two-thirds of the new bank accounts were opened to receive government transfers targeted at the bottom 40 percent of the population, including the rural poor, mainly through the Pradhan Mantri Jan-Dhan Yojana (PM-JDY)—the national mission to provide financial access—from 2014 onward     .

This was followed by the creation of the Unified Payments Interface (UPI), which leveraged Aadhaar, electronic know your customer guidelines, and smartphones—the so-called Jan Dhan– Aadhaar– Mobile (JAM) trinity. India’s UPI is currently the world’s largest instant digital- payments system with a 46- percent share in global transactions volume.4 While available to all Indians, UPI-based payment applications are being utilized by previously cash-dependent and vulnerable populations, such as the urban and rural poor.

Beyond the technology stack itself, India’s DPI has benefitted from the country’s enabling environment for digital inclusion. India has one of the lowest costs of mobile access and data transmission globally, at  16 cents on average, largely due to low telecommunications tariffs for mobile internet access as well as widespread fourth-generation (4G) coverage.5 India has also implemented policies and programs to promote bank account ownership, such as the PM-JDY and the licensing of payment banks as a special category of banking institutions. While questions remain about the regulation of payments banks, as shown by the Reserve Bank of India’s recent actions against Paytm, the move to license these banks set the precedent for a banking institution focused on both digital and financial inclusion. These factors, among others, have enabled India’s DPI readiness by fostering digital inclusion that could serve as a model for other countries to follow. Of course, for all of its strengths, India’s model of financial inclusion is not necessarily a one-size-fits-all solution and might need to be adapted to better suit countries that do not have both a large population and technological capacity.

Lessons learned from India’s stack    

India’s DPI model has the potential to help other countries in the Global South leapfrog previously necessary steps and systems to create inclusive government services and financial systems. Because these countries lack legacy systems, they can also— to some extent—avoid impediments to technological innovation associated with creating their own DPIs. By leveraging technology and a network approach, efficiency, accuracy, and effectiveness of financial-inclusion programs can be vastly improved, and India can help this process by sharing its DPI technology and expertise.

There are also some lessons to keep in mind about the Indian model. The first is that its degree of centralization is both a positive aspect and an area for caution and improvement. The centralization introduced by Aadhaar and leveraged by other layers of India’s DPI contributed to its efficacy and reach, increasing financial inclusion for many underserved individuals and communities. However, centralization raises questions about data security and the government’s intention with centralizing that much personal data, which may in turn introduce doubts among potential users and inhibit their participation.

Second, ensuring constructive and equitable cooperation between the government and private sector will help promote a healthy competitive ecosystem for DPI. India has experienced challenges in this regard. For instance, on the UPI, the National Payments Corporation of India has sometimes been at odds with foreign investors seen as proponents of privatizing DPI. Given the scale at which India is operating, there is significant space for the private sector, both domestic and foreign, to be included in the DPI ecosystem. For optimum outcomes, the “public” in digital public infrastructure should not mean government dominance or control of infrastructure      but, rather, public ownership and prioritization of the public interest. Developing robust cooperation methods and mechanisms for the public and private sectors will help maximize innovation, regulation, and collective ownership and accountability, enabling high-quality and high-impact DPI.

To enable this ecosystem flywheel, successful DPI should neither prevent nor discourage commercialization in financial services, including in payments, digital savings and credit, fintech infrastructure, and insurance. A healthy DPI ecosystem must encourage both private and public innovation with appropriate fee structures, funding mechanisms, data guardrails, and stable, predictable regulatory frameworks. DPI can accelerate every aspect of financial innovation for local inclusion, especially in markets with less mature financial services industries. Examples can include new neobanks for mobile money, monthly subscriptions for insurance and other key products, supplemental data to encourage better and more affordable underwriting for under-banked populations, and merchant solutions for small businesses with limited digital footprints to grow their businesses. A robust mechanism for ongoing collaboration with the private sector, civil society groups, and technology innovators is also critical for successful, sustainable, and inclusive DPI. Enacted thoughtfully, DPI has the potential to spur an entire new Silicon Valley of financial-services innovation in new geographies to expand what’s possible for financial inclusion.

Balancing regulation and innovation in the DPI ecosystem

There are two additional lessons of India’s financial-inclusion experience that can be built upon as the idea of a DPI-based financial inclusion diffuses globally. The first is that financial inclusion is not the same thing as financial access. Inclusion in this context entails financial stability, security, and trust in the system, which requires specific attention. Second, components of the DPI stack, such as the use of biometric ID for authentication and a digital-first approach to payments, might leave certain vulnerable groups behind, especially the elderly and the rural poor. Efforts to mitigate these adverse effects should be part of the DPI design, not an afterthought.

Policy recommendations    

Financial health and well-being are integral to thriving individuals, communities, institutions, and economies. The current discourse on DPI and financial inclusion has focused on access and usage while disregarding other factors that lead to a financially healthy life, especially in a digital-first environment. These include capacity to interact with the digital ecosystem, building trust and ensuring security, and creating an innovation ecosystem that supports inclusion and well-being. Taking a holistic, outcome-based approach vis-à-vis the role of DPI in the financial ecosystem will enable policymakers to set objectives, provide financing, track outcomes, and monitor progress toward the achievement of the Sustainable Development Goals (SDGs). 

I. Enable and rigorously evaluate digital readiness.  

Countries seeking to develop DPI should invest in enabling factors for digital readiness, including internet access, cellular network coverage, technology governance, and other infrastructure to build a robust foundation for DPI. These are essential to build applications that run on DPI rails, especially financial inclusion and digital payments.

II. Adopt a holistic approach to digital financial inclusion.    

Policymakers should follow an outcome-based and people-first approach to digital financial inclusion. This approach should advance financial inclusion by working toward      measurable outcomes that demonstrate progress and impact— for example, by tracking Global Findex indicators for financial account ownership and usage and linking it to the DPI stacks.

III. Prioritize user centricity and trust.    

Countries following the DPI approach should center the interests and well-being of individual users and their communities to ensure adoption and promote trust in digital financial services, broadly defined. Countries should seek to balance innovation and regulation so that they reinforce each other (Figure 2). A robust mechanism for ongoing collaboration with the private sector, civil society groups, and technology innovators is also critical for a successful, sustainable, inclusive, and trustworthy DPI. Governments can also support and empower innovation hubs to pilot new financial technologies in controlled environments with regulatory support—for example, through sandboxes.

IV. Align public and private-sector incentives.    

Stakeholders should work to align public and private-sector incentives to achieve an optimal balance of innovation and regulation in DPI. Private-sector innovation should be sought, and space should be created for the private sector to experiment. Governments and regulators should focus on the objectives of public interest and data safety by directing the private sector rather than being a lead, solo actor on DPI.  

V. Prioritize sustainability, durability, and literacy.    

Countries should invest in the long-term durability of DPI through investments in digital literacy and capacity. Sustaining DPI in the long run requires a skilled workforce of developers, including fostering of an open-source technology community, to maintain existing and build new infrastructure as countries seek to expand their technology stacks. By developing their own human and technical capacity, countries can ensure ongoing DPI innovation and make it a sovereign pursuit that utilizes their citizens’ expertise and creativity. Moreover, for the end users—particularly in developing countries—many citizens are getting their hands on technology, particularly the internet, for the first time. Digital literacy  is, therefore, a key area for governments to focus on. Digital etiquette and know-how—from simple aspects like how and where to securely store passwords and information to utilizing DPI for day-to-day activities such as bill payments—are best initiated by governments to ensure maximum reach and create a digitally responsible populace.

About the authors

Working group leaders

  • Katherine Hadda, CSIS
  • Anit Mukherjee, ORF America

Working Group Members

  • Ajay Chhibber, Atlantic Council & George Washington University
  • Melissa Frakman, Emphasis Ventures
  • Ananya Kumar, Atlantic Council
  • Jeff Lande, The Lande Group & Atlantic Council
  • Aran Mehta, ASG
  • Srujan Palkar, Atlantic Council
  • Rakhi Sahay, Access Assist and UNCDF
  • Heba Shams , Mastercard
  • Atman M Trivedi, ASG & Atlantic Council

Acknowledgements

This report was made possible in part by the generous support of Mastercard. 

This report is written and published in accordance with the Atlantic Council Policy on Intellectual Independence. The authors are solely responsible for its analysis and recommendations. The Atlantic Council and its donors do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions.

Related content

1    “G20 New Delhi Leaders’ Declaration,” Group of Twenty, September 9–10, 2023, https://www.mea.gov.in/Images/CPV/G20-New-Delhi-Leaders-Declaration.pdf.
2    “Digital Development: Emulating India’s Digital Public Infrastructure to Reach the Sustainable Development Goals,” Observer Research Foundation America, August 31, 2023, https://orfamerica.org/newresearch/dpi-india-mukherjee-backgr16.
3    “The Little Data Book on Financial Inclusion 22,” World Bank Group, 2022, https://openknowledge.worldbank.org/server/api/core/bitstreams/a57b273f-12e1-5b10-89e2-d546f2ea7125/content.
4    “India Tops World Ranking in Digital Payments, Beats China by Huge Margin: Report,” Times of India, June 12, 2023, https://timesofindia.indiatimes.com/gadgets-news/india-tops-world-ranking-in-digital-payments-beats-china-by-huge-margin-report/articleshow/100944643.cms.
5    “The Cost of 1GB of Mobile Data in 237 Countries,” Cable.co.uk, September 2023, https://www.cable.co.uk/mobiles/worldwide-data-pricing/.

The post How digital public infrastructure can support financial inclusion appeared first on Atlantic Council.

]]>
End of the line: The cost of faltering reforms https://www.atlanticcouncil.org/in-depth-research-reports/report/end-of-the-line-the-cost-of-faltering-reforms/ Wed, 09 Oct 2024 12:00:00 +0000 https://www.atlanticcouncil.org/?p=798483 The China Pathfinder project examines whether China’s economy is converging or diverging with the world's leading open market economies.

The post End of the line: The cost of faltering reforms appeared first on Atlantic Council.

]]>

Table of contents

Foreword

Can China’s economic system be compared to the world’s largest and most open advanced economies? Four years ago, when we began the China Pathfinder Project, the teams from Rhodium Group and the Atlantic Council GeoEconomics Center set out to answer that question.

In the intervening years, the global economy navigated a pandemic, supply chain shocks, the highest inflation in forty years in the United States, and the return of industrial policy across the Group of Seven and beyond.

That means today’s economic landscape is far different from the one we set out to explore. What began as an effort to create a shared language for understanding China’s economic trajectory—and benchmark its movement toward or away from open market economy norms—has evolved into a project that is trying to understand what it means to be an open market economy in the 2020s.

At the beginning of the project, policymakers and financial leaders in the West still viewed the Chinese economy with cautious optimism. Despite growing tensions between Beijing and Washington during the trade wars of the last decade, China had made modest progress toward market economy norms.

It was an open question whether China would continue that progress. Four years later, we all know the answer. The Chinese economy has shifted away from market norms. But how the movement happened is just as important as the top line.

In nearly every area we have tracked—financial system development, market competition, innovation, trade, and direct and portfolio investment—China’s progress has stalled or, in some cases, backslid. The initial hope that China would adopt more transparent and market-oriented policies has given way to a reality in which systemic state intervention and opaque decision-making continue to dominate.

The lack of clarity around China’s decision-making is now seen as a source of global economic risk. The Chinese Communist Party’s growing role in the economy stifles the private sector’s dynamism and fosters a dangerous environment of uncertainty for investors. The decline of the property sector and the correlated focus on manufacturing have raised alarm bells worldwide about a second China trade shock.

Look more closely at China Pathfinder, and you’ll uncover another layer of the story. Like a scientist who begins with one experiment but discovers in the lab that her antibiotic actually treats another disease, the China Pathfinder Project has revealed unexpected outcomes.

China’s prioritization of national security over economic growth has frozen most reform efforts. But what about the world’s advanced economies? Many have begun pursuing a range of policies based on the concept of economic statecraft, which, in our rankings, move their scores further away from open market norms.

This is the value of a data-driven approach to China’s economy. Instead of trying to calibrate policy based on officials’ statements, or one-off events, our method was to be comprehensive, objective, and focused on long-term trends.

All eyes will be on the US presidential election in the coming weeks. The next administration will develop a range of policies to grapple with China on trade, technology, Taiwan, and more. What kind of economic system will they be dealing with? As you will see in the following pages, China Pathfinder helps tell that story.

What has surprised us the most in this process is how universally translatable the story is. These reports have been used by economists from West Point to Warsaw. Whether in London, Paris, Tokyo, or Beijing, you will find China Pathfinder now referenced in your government’s own economic assessments.

And, so, the answer to the question we set out to explore is clear. Is it possible to compare China’s system to the world’s advanced economies? Yes. And it is necessary work.

We are grateful to the teams at the Atlantic Council and Rhodium Group, whose tireless work and dedication made this project possible. We extend our thanks to the policymakers, business leaders, and academics who engaged with and provided feedback on this research. As we close this chapter of China Pathfinder and look forward to the next evolution of the project, we hope that the lessons from China Pathfinder will continue to help policymakers navigate a rapidly changing global economy.

Josh Lipsky
Senior Director, Atlantic Council GeoEconomics Center

Executive summary

The current cycle of China Pathfinder is coming to a close at a critical time for China’s economy. After delaying major policy moves in 2023, China announced a major slate of reforms at the long-awaited Third Plenum of the Chinese Communist Party in July 2024. It faces enormous challenges: 2023 saw lackluster growth, continued property sector woes, and growing foreign pushback against manufacturing overcapacity and the treatment of foreign firms. China’s reform experience in 2023 and its successes and failures set the stage for the new reforms.

To track Beijing’s reform efforts to date, China Pathfinder compares China’s economic system to those of market economies. Using six components of the market model financial system development, market competition, modern innovation system, trade openness, direct investment openness, and portfolio investment openness—we established a quantitative framework for understanding China’s progress or regression on reform. China’s outsized role in the global economy and the necessity of reform to maintain the country’s growth make this work key to understanding China’s future trajectory.

Key findings

  • Compared to its own 2010 baseline, China has improved. In all of the clusters analyzed by China Pathfinder, China has narrowed the gap with the Organisation for Economic Co-operation and Development (OECD). However, further progress has been elusive, and our indicators suggest China has hit limits on convergence with the OECD. This gap will likely remain in the coming years.
  • In market competition—especially seen in the presence of state-owned enterprises in the economy, but also more broadly—China is unwilling to make the concessions to the traditional role of the state in its economy necessary to achieve more durable structural reform.
  • China’s progress stalled in several areas tracked by China Pathfinder. These include innovation, as China’s fiscal constraints began to have a meaningful impact on its technological and development capacity by some metrics. They also include trade, where security concerns and geopolitics (including uncertainty over data and security rules) weigh on China’s trade openness. Even as China exported more and more in 2023 and became increasingly important for marginal economic growth, services trade has been affected.
  • In a narrow sense, China saw some progress in dealing with financial challenges in 2023. Beijing prevented debt emergencies in the property sector and local government financing space from triggering a general financial crisis; the resulting slowdown in credit (and cleanup) was reflected in an improvement of China’s financial system reform score. Its composite cluster score surpassed that of several OECD countries for the first time since 2020. However, such achievements are modest compared to ongoing problems: poor- quality financial intermediation, declining capital productivity, and deviations from market financial regulatory principles.
  • Developed market scores continued to decline on average in several categories, including innovation and market competition (marginally). This shows some reform backsliding and a resurgence of industrial policy (and geoeconomic security policy) in the OECD, even as most countries remain well ahead of where they were in 2010.
  • There are more data obstacles now to analyzing China’s economy than in 2019, including data lags and delays that hamper study and have a chilling effect on open discussion of economic problems in China. But alternative data—and a rise in frank domestic and international economic commentary—are improving these conditions.

Figure 1: 2023 annual economic benchmarks

Chapter 1: A decade of tracking China’s economic structure

How it started, how it’s going

Years of tracking China’s economic policy evolution make clear that its appetite to converge with liberal market economic norms has reached its limit in several areas. This slowing of progress is a major factor behind the developing bifurcation in global economic systems. It is directly reflected in the rise of de-risking and decoupling efforts in developed economies. Such a shift in systemic direction has deep ramifications for the world, creating challenges for liberal economic hopes and a serious macroeconomic slowdown for the citizens of China. Tracking these systemic dynamics is what China Pathfinder was created to do.

China Pathfinder was undertaken as an Atlantic Council- Rhodium Group partnership in 2021 and will complete its four-year funding cycle in the fall of 2024. China Pathfinder built on a prior program, China Dashboard, produced from 2016 to 2020 by Rhodium Group and Asia Society, tracking China’s progress toward its self-stated economic reform goals. We defined those goals in China’s own terms, as laid out at the Chinese Communist Party’s (CCP’s) Third Plenum meeting of November 2013, and analyzed in great detail in the report Avoiding the Blind Alley: China’s Economic Overhaul and Its Global Implications in 2014.1 China Dashboard measured China’s policy footprint benchmarked against where it was in 2013 to document whether Beijing was successful at “making the market decisive,” as it had pledged. While reforms were made in earnest from 2013 to 2015, by 2016, we observed a stall. Since 2021, the emphasis on politics over market signals in guiding the economy has been manifest, and not just as a response to the COVID-19 pandemic.

Our goal in benchmarking China against those market   economies—exemplified   by    the    members of the Organisation for Economic Co-operation and Development (OECD)—has always been to take Beijing’s stated policy ambitions at face value and provide an independent voice to validate evidence of marketization and convergence with the norms of market economy status. In addition to its stated commitment to marketization, China’s leaders unambiguously pledged to continually improve the quality of national economic statistics for the benefit of policymaking at home and transparency for researchers, businesses, and the public in China and abroad.

The ability of China Pathfinder to forge consensus on policy adjustment in China was, by design, contingent on accurate and timely official data. Days after Chinese President Xi Jinping issued his Third Plenum reform blueprint in November 2013, his government committed to upgrading China’s statistical accounting system. Since 2021, we have continued to record assurances that that statistical system would be modernized. Official reports are common.2 And yet, as of this writing, China is still using a statistical system based on the United Nations System of National Accounts 1993 framework. That is, Beijing is measuring a 2024 economy with a thirty-year-old methodology; OECD nations use the SNA2008 or equivalent and are preparing to upgrade to SNA2025. As research has shown, this has long led to a distorted estimate of economic activity in China, for instance, understating the size of the property bubble and underestimating the value of private sector service activity.3 More recently, unexplained changes to China’s method of counting trade imbalances hid hundreds of billions of dollars of growth in external surpluses during the middle year of our China Pathfinder program. These have often been buried in the appendices of the International Monetary Fund’s (IMF’s) consultations with Chinese officials.4

While we hoped for statistical upgrading, we built China Pathfinder to make do with existing data standards. Unfortunately, that turned out to be overly optimistic. Four problems have arisen to frustrate our methodological game plan. First, over the past four years, several data series we’ve relied on have ceased to be available or have undergone significant changes. These include several published by the OECD and the IMF. Second, the time lags of many of the data series have gotten longer. Third, many data that remain available have shown increasing inconsistencies with other evidence or have been revised without explanation. Fourth, as a result of the preceding realities, rather than setting our methodology at the start of this four-year project and applying it consistently throughout (which best practice requires), we have had to scramble for want of basic data, often late in production cycles, to come up with workarounds for missing information. The risk of distortion has risen as we have had to be increasingly creative to fill these data gaps.

Yet, despite challenges, our goal of objective analysis of China’s economy has not wavered. Each year we have noted workarounds and corrections in footnotes and methodological notes. We discuss 2023 updates later in this chapter. We also discuss the next evolution of China Pathfinder in the conclusions of this report.

Four-year conclusions and 2024 annual findings

On net, we believe the insights gleaned through the China Pathfinder Project have justified our methodological approach. Indeed, limitations of our research design as we reach the end of the project’s lifespan are themselves an important takeaway, and the difficulty of accurately assessing China’s progress is, in part, an indication of its status. The developed markets grouping, by definition, can be evaluated on a common statistical basis, and data quality concerns are not generally an issue. The emerging markets world—a much larger set—is frequently characterized by less reliable data and questions about the reliability of statistics. There are wider margins of error around EM performance estimates, and higher risk is attached to dealing with these economies accordingly.

At the start of the China Pathfinder Project just four years ago, there was a broad consensus that China was on the cusp of inclusion in the developed market cohort. Global portfolio indices recommended a growing allocation to China, and most businesspeople believed significant diversification from China—let alone more draconian “decoupling”—was impossible given the logic of continued engagement. In the brief period since then, the world’s largest money managers have asked whether China is “uninvestable.”5 Over the life of China Pathfinder, the value of China plus Hong Kong equities has fallen by $5.1 trillion, and the value of property assets has fallen by about $7 trillion. The sum of these losses constitutes almost 70 percent of China’s gross domestic product (GDP).

For our four-year assessment of China’s economic trajectory, we observe that all (six out of six) dimensions of market economy policy norms have seen narrowing gaps with our OECD benchmark since 2010, using our combination of original and replacement indicators. In at least two of these clusters, the change has as much to do with the OECD’s movement downward as China’s improvement. This reflects how the role of the state is now in flux in high-income economies, too, as appetites for industrial policy grow. These score outcomes based on changes in our indicators largely accord with a common-sense diagnosis of what has happened in the world economy, where post-COVID-19-pandemic policies have given way to increasing economic and geoeconomic competition.

The foremost conclusion we take from these results is that the gulf between China’s economic system and those of open market economies, while narrower than in 2010 and 2020, will remain for years to come. Four years of tracking China’s progress has made it clear that its reform trajectory has plateaued in several areas, adding to mounting evidence of the developing bifurcation in global economic systems. Growing partial decoupling efforts by liberal market economies in recent years are a recognition of this state of affairs. These developments have deep ramifications for nations built on liberal economic foundations.

Not all economic interactions with China are harmful to the interests of developed market economies. A systemic bifurcation does not necessarily mean countries cannot engage in mutually beneficial interactions. However, open market economies need to comprehensively review how to manage this partial decoupling. Such efforts may be contingent upon changes in China’s economy, but the burden of adjustment is on Beijing.

Our final annual net assessment on the six market economy dimensions is detailed in Chapter 2. Three cross-cutting takeaways for the year (the 2023 data year) stand out. First, China saw backsliding away from open economy norms on balance across our benchmarks. Since 2010, there has been marked improvement across most of our indicators to China’s credit. However, these gains appear to have wavered in 2023, with half of our benchmark indicators witnessing slight regression in 2023 compared to the previous year. There are some bright spots in 2023, but the few optimistic trends are overshadowed by the far larger number of benchmarks that have reversed course. In some areas, such as market competition, China remains a stark outlier, especially with respect to state-owned enterprise (SOE) presence in the economy. In other areas, such as innovation, China looked to be converging but was met with stalled progress.

Part of these trends are attributable to global macroeconomic dynamics. Our open economy samples all experienced mild backsliding in 2023—for example, with respect to trade intensity. However, the major source for many of these developments remains China’s policy choices themselves. As our policy year in review sections demonstrate, Beijing has doubled down on a policy direction that steers China, on net, away from open economy norms.

We would also be remiss if we did not reflect on the role COVID-19 played in outcomes over the 2021–24 period. The pandemic triggered state activism in all economies. In all six clusters in our framework, we can easily tell a story about the appropriate insertion of the state in lieu of normal market economy activity. One example can be seen in the market competition cluster, where SOE presence in several OECD economies increased after 2020 partly due to a surge of government rescue funding. Yet, we have also carefully evaluated the stated intentions of Chinese policy in the system in our qualitative quarterly China Pathfinder reviews. These have made clear that while the pandemic offered a textbook opportunity for Beijing to rebalance the growth model toward household consumption and away from systemic bias toward the supply side and more capacity creation, leaders did the opposite. This has clearly widened the gap with OECD notions of compatibility.

The China Pathfinder indicators also illustrate how the flows of goods, services, and capital are becoming increasingly strained. China’s portfolio and direct investment benchmark indicators both declined in 2023 after making moderate progress since 2010. Services trade intensity declined, and the services trade restrictiveness index for China worsened slightly. Intellectual property (IP) protection remains a large issue for firms operating in China, reducing incentives for direct investment. Unequal treatment of foreign firms and other problematic market competition dynamics compound these concerns. Overall, the only flow left redeeming the Chinese economy is trade in goods intensity, which saw another increase, consistent with its long-term trend. This is emblematic of an economy that is overly reliant on exports as the last remaining source of reliable growth. At the same time, Germany and Japan within our comparison group have also variously leaned on exports during their economic history; neither has concurrently faced comparable pressures across other financial and trade flows.

Lastly, the outsized role played by the CCP in the economy continues to be a major obstacle to China’s convergence with open market norms. In Chapter 2, we point out in several sections how the CCP continues to influence the economy unduly. Some of these dynamics are intangible or unquantifiable in our framework. The CCP’s reach into the private sector continues apace, with few signs of slowing down, affecting corporate governance and distorting what would otherwise be market-driven innovation and competition dynamics. Many of our benchmarks, however, do underscore these points. On SOE presence in the economy, China is a far outlier amongst the countries under study. Until the state retreats from its influential, structural position, it will be difficult for China to fully converge with open market economy norms in many of our cluster areas.

In Chapter 3, we return to these and other broader conclusions drawn from across the China Pathfinder Project’s lifespan.

China Pathfinder data and analytic methodology: Updates for 2024

As stated in our inaugural 2021 report, the goal of China Pathfinder is to objectively assess China’s structural economic reform progress in order to promote consensus on where China stands in relation to advanced market economies. We do this with an evaluation framework reliant on data collection, synthesis, and analysis. We draw from many sources and series published by governments, international organizations, and nongovernmental organizations, as well as our own proprietary efforts. The quantitative findings in our reports have tracked the qualitative policy scene closely each year.

Our framework evaluates China’s convergence with market economy norms across six clusters covering both domestic and foreign-facing features of China’s economic system (Table 11). The domestic dimensions include China’s financial system development, market competition policies, and innovation system, while the external clusters include trade, direct investment, and portfolio investment openness. Each cluster is tracked with annual benchmark indicators—readily available data series with cross-country coverage that capture the essence of that dimension. A composite score for each cluster is also calculated by taking the simple average of each benchmark indicator to produce an overview of China’s annual trends.

There are aspects of China’s economy that are not easy to compare with other countries. We recognize the importance of addressing these characteristics and thus include supplemental indicators, which inform our conclusions but do not contribute to the annual composite scores. The final component of our framework is a qualitative review of policy changes in each cluster. Throughout the year, China Pathfinder publishes quarterly updates highlighting major developments and making qualitative judgments on movements closer or further from market economy norms. This annual report synthesizes these updates in Chapter 2, adding nuance to our benchmarks and helping clarify how scoring changes manifest in China’s politics and economics.

We have sought to establish a rigorous and consistent methodology with the China Pathfinder framework. By maintaining a similar approach year after year, we have been able to identify trends in China’s economic reform. Over the project’s lifespan, however, we have had to accept some methodological updates. With each successive report, we have made adjustments while preserving the basic approach. For example, in 2022, we began including 2010 baselines not only for China but also for each OECD country in our sample. The largest change to our methodology came in 2023 when we adopted a new min-max methodology that calculated relative scores for countries drawing from all data in the scope of our analysis. For the 2024 edition, we have elected to carry forward our methodology with no major revisions. Additional improvements would add marginally to precision but at the cost of increased complexity and decreased accessibility. One of the primary goals of our research design was to provide quantitative measures that are rigorous but also accessible to non-economic experts.

While our analytic methodology has seen no change this year, there have been significant changes in data availability, which has become increasingly challenging for the framework. At the outset of this project, we attempted to hedge against this issue by making data availability and consistency key criteria for inclusion in our annual benchmark indicators (the most important data series that feed into our composite scores). Indicators were selected based on whether they correlate with and are essential for openness and market orientation, are consistently available for both China and comparators, have a limited time lag of six months maximum, and are straightforward enough for a broad audience to understand. Many indicators now fail the timeliness and consistency criteria. In the 2024 edition, we encountered availability issues in almost a third (ten out of twenty-nine) of our foundational data series, a marked uptick from previous years. For example, the OECD’s FDI Openness Index, IMF’s Financial Institutions Depth Index and Financial Markets Access Index, and World Integrated Trade Solution (WITS) tariff rates, all key indicators used in our cross- country comparison, are missing current-year data for 2023 as of the time of publication.

Moreover, gaps are unevenly distributed across the clusters, magnifying the problem. Portfolio investment and direct investment openness both lack data in 2023 for half of their constituent benchmark indicators, requiring us to seek alternatives. While some indicators are no longer published, others have faced increasing time delays in their publication that make their inclusion unfeasible with the cadence of our annual analysis. This is not to mention data quality concerns, such as those noted in the trade balance statistics above.

To be sure, data drop-off is an issue with any long- running research initiative. To its credit, the immense number of hours devoted to stress testing and the evaluation of our expertise and analytic procedure early on in this project’s life cycle has paid large dividends. For example, pandemic-related disruptions to our data retrieval were minimal. However, as more data series have become unavailable, we are left with difficult choices. We must balance methodological consistency against using alternative data that speaks to the questions at hand. In the latest cycle, the gulf between these two priorities has widened. Assessing China’s progression has forced us to veer further from our original data sources. This is acceptable for an intra- year comparison and benchmark, but it adds greater unreliability to cross-year comparisons. Because the focus of the project is first and foremost on tracking China’s evolution, this presents, in our view, severe obstacles.

The options for addressing all this are imperfect. The choices for gap-filling include:

  1. Carry forward the prior year’s data. This reduces or discounts the potential magnitude of change in the cluster.
  2. Impute or splice the data by applying some form of average growth rates, across countries within a year or across countries across years. This risks missing surprising forward or backward movements.
  3. Draw from alternative data sources that speak to the same underlying issue. This introduces comparability issues across years.
  4. Reconstruct missing data indicators. This requires the availability of methodological documentation and additional data series relied upon to construct the indicator, neither of which are always readily available.

For our analysis in this report, we combine these solutions to address data gaps. A consistent principle adopted in China Pathfinder is transparency. To that end, we make clear in each subsection of Chapter 2 the data complications we had and what procedure we adopted as a remedy. Additionally, we put great effort into caveating our conclusions as appropriate. In some instances, the quantitative results present contradictory or surprising findings. We offer a qualified interpretation of these results based on our domain expertise.

As China Pathfinder comes to a close, the data issues outlined here are to be expected. Many would be obviated if China adopted the same data transparency and publication standards as OECD nations. Absent this, however, we believe that our efforts at objectivity, consistency, and rigor provide the next-best solution. The analytic methodology has proven robust, if imperfect, and offers lessons for future research on competing economic systems—lessons that will be carried forward, hopefully, in future China Pathfinder phases.

Remainder of the report

In the next chapter, we address each of our cluster issue areas. Following that, in Chapter 3, we summarize significant takeaways drawn from specific clusters and build on them to offer cross-cutting conclusions about the past year based on the evidence we collected. Since this is the final edition of this series, we also share lessons learned and principles for success based on our experience analyzing China’s economic system today and over the past four years. Finally, we preview our ideas for a next-generation China Pathfinder 2.0 design and refresh our mission statement for the kind of public policy research we believe will serve the interests of people and policymakers in the advanced economies, China, and the wider emerging world alike.

Table 1: Summary of China Pathfinder clusters and indicators, 2024

Chapter 2: Historical baseline and 2023 stocktaking

In this chapter, we review each of our six clusters in detail. We define each cluster and its relevance to a market-oriented economy. This provides a framework for how we selected indicators and why they are a fair proxy of that particular area of economic performance. The next section outlines each indicator and its corresponding methodology, followed by an analysis of the 2023 data findings for China and open market economies. The individual indicator stocktaking leads to our overall composite score results, where we assess countries’ relative performance and interesting trends for 2010, 2020, 2021, 2022, and 2023. The six sections of this chapter each conclude with a review of the major policies enacted and other relevant developments that occurred in China in 2023.

2.1 Financial system development

Figure 2.1: Composite index: Financial system development, 2023

Definition and relevance

Open market economies rely on modern financial systems to efficiently price risk and allocate capital.6 Key pillars of modern financial systems are generally market-driven credit pricing, the availability of a broad range of financial instruments, the absence of distortive administrative controls on credit price and quantity, and access for foreign firms to financial services and foreign exchange markets.

2023 stocktaking: How does China stack up?

In 2023, China’s financial system development score improved over both its 2022 score and its 2010 baseline. However, it continued to lag behind the OECD average in 2023. There were improvements in several indicators, including the efficiency of credit pricing and financial market access. China’s stock market capitalization as a share of GDP also saw improvements, though it was distorted by the slowdown in GDP growth between 2022 and 2023. China continues to maintain a high degree of state ownership in the financial sector compared to OECD economies.

In calculating this score, we chose the following annual indicators to benchmark China’s financial system development against that of open market economies.

Efficient pricing of credit

We use the absolute value difference between the average borrowing rates for nonfinancial corporations and projected GDP growth as a proxy for efficient pricing of credit. In an efficient financial system, the cost of capital (the average interest rate) should roughly mirror the expected return (for which we use the projected GDP growth rate). Countries with efficient credit pricing will be close to zero in our chart.

In 2010, China’s projected growth rate far exceeded the real interest rate for corporate borrowers, effectively subsidizing producers and punishing savers.7 In 2023, a combination of tightening credit markets, a sharp slowdown in growth, and China’s slowing economic growth—which have both affected new credit and reduced inflation-adjusted interest rates—has seen the gap narrow in our sample. China’s score for credit pricing has thus significantly improved and now exceeds both the OECD average and the United States’, reaching over 9.0 points in 2023.

As we noted in 2022, in many open economies, high inflation rates outpaced produced a negative real cost of borrowing. Lower growth (with the exception of the United States) and high interest rates in developed markets saw the gap between the two converge across the OECD scores in 2023.

Direct financing

The extent of direct financing in an economy reflects firms’ ability to borrow directly from the market instead of going through banks and other intermediaries. We include two measures of direct financing: stock market capitalization as a share of GDP and outstanding non- government debt securities as a share of GDP.

China’s stock market capitalization-to-GDP ratio does exceed that of Italy, Germany, and Spain, though it trails behind the OECD average and far behind the United States. Denominator effects are partially at play, given China’s growth slowdown in 2022 and 2023. However, even though credit growth was sluggish last year, growing debt finance helped China surpass all countries in our sample except for South Korea and the United States. Equity finance via the stock market continued to increase as a share of GDP, though China remains well behind most of the OECD.

State ownership in top ten financial institutions

We again deploy our own composite indicator, looking at the degree of state ownership in the country’s top ten financial institutions by market capitalization. For each country, we look at the proportion of each institution’s public stock owned by the government. We then weigh the results according to each institution’s market capitalization.

The high degree of state participation in China’s financial institutions remains a core systemic difference between China’s financial system and that of open economies. China’s weighted average of government ownership of financial institutions has improved in comparison to when it stood at 47 percent in 2010. However, it has stagnated at 39 to 40 percent from 2021 to 2023. Simultaneously, the OECD weighted average has remained around 3 to 4 percent over the same period. South Korea’s government ownership share is the only other rate exceeding 10 percent. South Korea’s share has not significantly improved from 2010 levels, standing at 18 percent in 2023, yet remains markedly ahead of China.

Financial institutions depth

Previous reports deployed a financial institutions depth indicator compiled by the IMF as a proxy for overall financial system sophistication. However, that indicator ceased updates in 2021. To compensate, we deploy our own composite indicator using the IMF’s methodology and alternative data series with more recent data available for 2023.8 We use this index to generate updated baseline scores for 2010 and 2023. Because they draw on alternative data streams, they are not directly comparable with the previous IMF scores. However, the new index shows similar country ranks and direction of change since 2010.

China’s performance on the composite depth index still lagged behind the OECD average in 2023. However, China’s score markedly improved from 2010 (by 0.9). While it previously ranked just behind Spain and Italy in financial institutional depth, China surpassed those countries last year. This is due (in part) to declining private credit and insurance premium volumes in those countries in 2023.

Financial markets access

As with the above, the IMF’s financial markets access indicator is no longer published, requiring us to deploy our own composite indicator based on existing methodology. While the old IMF indicator utilized data on the number of bond issuers per capita, our indicator deploys data on overall corporate debt volume per one hundred thousand adults. It preserves the use of a second input series, the percentage of market capitalization outside of the top ten largest companies, to proxy access to stock markets.

As with the financial system depth indicator, in 2023, China performed better than the lower-performing OECD economies of Italy and Spain. China has also shown substantial improvement since 2010. China’s score reflects the rapid expansion of its bond markets since 2010. China’s score would likely decrease if our indicator utilized data on issuers rather than the value of issued bonds.

Composite score

Blending our annual indicators, our Financial System Development Composite Index puts China at 4.4 in 2023, a notable improvement over its score of 3.5 in 2022.9 All OECD countries improved from the previous year except for Japan, which saw a very small technical decrease (less than 0.1 points). Thus, China’s score surpassed Italy and Spain for the first time; until 2022, China consistently scored the lowest among all in- country samples. This reflects nascent improvement in China’s credit allocation, under deleveraging policies and amidst the collapse of its property sector, which caused lenders to pull back on new credit.

Our composite scoring captures major movements in China’s performance using indicators comparable across economies. In addition to these benchmark indicators, we also track relevant policy signals germane to financial system development and monitor several additional higher-frequency or China- specific indicators. These policies are detailed below, and Figure 23 presents a selected number of these supplemental data points, including the pace of credit growth in the Chinese economy; the distribution of credit to consumers, the private sector, and SOEs; the distribution of Chinese bond ratings; interest rates for savers; and exchange rate dynamics.

A year in review: China’s 2023 financial system policies and developments

In 2023, the Chinese government focused on mitigating the outcomes of domestic financial system stress— including a loss of domestic and foreign business confidence—rather than core structural issues.

Mounting local government debt continued to weigh on financial stability. Calling on a playbook of measures to deal with the property sector, weaker growth, and local government financing vehicle (LGFV) debt in 2014–15, the central government initiated a debt refinancing policy package that would offer extensions and rate cuts on LGFV debt.10 The midyear budget revision increased central government bond issuance by RMB 1 trillion, with RMB 500 billion to be disbursed in 2023.11 The People’s Bank of China (PBOC) also increased the pledged supplementary lending quota by RMB 500 billion at the end of 2023 to support policy loans for housing projects, urban revitalization, and public infrastructure. Of that, RMB 99.4 billion in lending was extended by year-end.12 These measures provide LGFVs a solvency reprieve without addressing the underlying causes of liquidity constraints, perpetuating systemic moral hazard by allowing LGFVs to maintain unsustainable debt positions and increasing the risk of zombie enterprises. These measures also burden financial institutions with fulfilling state policy priorities at the expense of profit maximization.

On the other hand, several market-oriented measures eased local government access to listing SOEs on the stock market. These developments included the rollout of a new registration-based system for initial public offerings (IPOs), which replaced a system that required approval from the securities regulator, and the relaxing of some hard requirements on profitability and other financial ratios, making it easier for SOEs to qualify for listings.13 SOEs are valuable local government assets. Sales can assist in the repayment of local debt.

Throughout the year, the Central Commission for Discipline Inspection’s ongoing anti-corruption campaign in the financial sector and crackdowns on financial sector wages were a continued constraint on market forces. The heightened insecurity caused by crackdowns is likely to make loan officers more conservative and perpetuate pressures to lend to SOEs over private sector actors. There was also little progress on implementing government promises to improve market conditions for the private sector, including improvements to private enterprises’ credit conditions and increased investment in the private sector.

Market reforms for foreign players were slightly more promising. In June, the State Council rolled out new pilot measures for six of China’s twenty-one free trade zones (FTZs) and free trade ports, which included several actions opening the financial sector.14 However, the impacts of the new regulations on the business operating environment will likely take time to manifest. Revisions were made to speed up the processing of investment remittances (e.g., dividends, capital gains, etc.) and to allow individuals and companies to use overseas financial services. The new measures also promise that the government will not be permitted to ask for the source code of any software imported and distributed within the six FTZs.

Figure 2.2: Annual indicators: Financial system development (2023*)

2.2 Market competition

Figure 2.4: Composite index: Market competition, 2023

Definition and relevance

Market economies rely on a pro-competitive environment where firms face low entry and exit barriers, market power abuses are disciplined, consumer interests are prioritized, and government participation in the marketplace is limited and governed by clear principles. These dynamics are important to the overall development of an economy because firms with healthy competitors have a greater incentive to innovate and improve productivity. This adds diversity to the market and promotes higher-quality growth.

2023 stocktaking: How does China stack up?

In 2023, China’s market competition score remained mostly unchanged compared to 2022. Persistent problems continue to hinder fair competition in the Chinese economy. The rule of law is still exceedingly weak, and SOEs and other government-controlled or influenced firms continue to have an outsized presence amongst the largest listed firms by market capitalization. While China does have a lower market concentration score than OECD economies, it is excessively low and indicative of other problems in the Chinese economy, such as interprovincial barriers to commercial activity. To its credit, China has not backslid as far as open economies have on several measures in recent years, but it remains far behind those economies on average.

We chose the following annual indicators to benchmark China’s market competition against open market economies.

Market concentration

We measure overall market concentration across all industries using the top five listed companies’ revenue as a share of total industry revenue. The higher the proportion of total revenue the five firms constitute, the more concentrated the industry. The indicator is a simple average of the calculated proportions from eleven industries: communications, consumer discretionary, consumer staples, energy, financials, healthcare, industrials, materials, real estate, technology, and utilities. The industry categorization is consistent across all countries in the sample. For countries with industries comprising less than fifty listed companies, we use the top 10 percent of the total firms in the industry instead of the top five. The indicator was constructed using data from Bloomberg.

Similar to our scoring for China in 2022, China’s economy remained relatively less concentrated than economies in our OECD sample. Our benchmark indicator of concentration decreased marginally from 38.4 percent to 38.2 percent between 2022 and 2023. This is a substantial decrease from China’s baseline measure of 55.7 percent in 2010. By contrast, the open market economy average became slightly more concentrated this year, increasing from 61 percent to 61.6 percent. Canada and France had the largest increases, adding about 5 percent industry concentration, while Germany and Canada decreased by about 5 percent.

Lower market concentration in China should be interpreted carefully, however, as excessively high and abnormally low levels of market concentration may be indicative of problems in the economy. China’s low score on market concentration is mostly the result of structural issues, whereby interprovincial barriers and local government support artificially suppress rates of firms’ market exit. Indeed, the percentage of loss-making firms continues to rise across numerous industries. Where we might expect to see some industries become increasingly concentrated, state intervention is instead enabling fragmentation in the economy. Conversely, a smaller number of industries, such as transportation and energy, are highly concentrated as the state exercises monopoly rights.

SOE presence in the top ten firms

One important determinant of market competition is the role of SOEs in the economy. Our indicator for this area is calculated by summing the market capitalization of SOEs in the top ten firms within each industry and dividing it by the total market capitalization of the top ten firms by market capitalization within each industry. This ratio is then averaged across industries to arrive at our measure of SOE presence. This procedure remedies an issue in earlier editions of China Pathfinder, where the massive assets held by Chinese SOEs compared to their counterparts in OECD economies were insufficiently reflected in the benchmark. The process is repeated for the eleven industries listed in the market concentration indicator description.

Government ownership disclosures reported by companies in market economies capture the extent of state ownership more reliably. For these countries, a company was considered an SOE if the government owned 50 percent or more of its shares. However, many Chinese SOEs’ largest shareholders are not clear-cut government entities such as the State-owned Assets Supervision and Administration Commission (SASAC) of the State Council or Ministry of Finance. The team used firm-reported ownership information from WIND supplemented with Chinese-language reporting to conduct outside research on Chinese companies, determining whether a company counted any of the following governmental entities as a key shareholder:

  1. other SOEs
  2. the Central Huijin Investment Co. (a state-owned investment company); or
  3. The Hong Kong Securities Clearing Company (of which the Hong Kong government is the largest shareholder).

This supplemented the results offered in firm disclosures accessed via Bloomberg. As with prior years, the role of SOEs in China’s economy continues to be a key differentiating factor. In 2023, SOEs comprised 65.4 percent of the top ten firms’ market capitalization across industries. This represents a 14.5 percent increase over 2022’s measure, which was a 30 percent increase over 2021’s. It also increased over the 2010 benchmark, which stood at 53.6 percent. In contrast, open economies SOEs’ presence has been consistently smaller in open economies, with only Italy, France, and South Korea showing more than a couple of percentage points of state presence over the entire study period (and France, as of 2024, scored <0.5 percent). Even Italy, the economy with the largest SOE presence in the top ten firms at 12.6 percent in 2024, does not even remotely approach China’s score.

Overall, rather than show convergence with OECD market norms on the role of the state in the economy, China continues to trend in the opposite direction. As the private sector becomes increasingly marginalized, SOEs will continue to play an outsized role in China’s economy, at least in the near to medium term.

Foreign direct investment restrictiveness

Openness to competition from foreign companies is a characteristic of open market economies. To benchmark this characteristic, China Pathfinder has to date relied upon the OECD’s FDI Regulatory Restrictiveness Index, an established indicator that measures how open an economy is to foreign competition.15 However, this data series is no longer maintained, with the last update made in 2022 (covering policies and practices of countries in 2021). For our calculations, we carry forward the latest entry in this data series. China scores 0.73 on this index, which ranges from zero (most restrictive) to one (least restrictive). The open market economy average is, by comparison, 0.92. While China has improved notably over its 2010 baseline of 0.53, the latest update to this series leaves it far below its market economy counterparts. Indeed, discrimination against foreign firms remains a large problem in China, with continuing complaints from foreign companies regarding forced technology transfers, unequal access to procurement, and little progress on easing the Negative List for foreign investment.

Rule of law

Another key ingredient for a competitive marketplace is the fair and impartial enforcement of rules. The World Bank’s Rule of Law Index captures the extent to which actors have confidence in the law, including elements such as the quality of contract enforcement, property rights, and the courts. Our adjusted index ranges from zero to five, with lower values representing less rule- of-law-based governance. On this indicator, China lags far behind its open economy peers. The update to this year’s metric saw China remain around 2.5. The open economy average regressed very slightly from 3.8 to 3.7. China has made little progress on this indicator over its 2010 benchmark, especially compared to its progress on many other indicators.

Composite score

On balance, China experienced mild backsliding in our Market Competition Composite Index from 4.3 in 2022 to 4.2 in 2023. In comparison, the score for our sample of open market economies also declined marginally from 7.31 to 7.22 over the same period (Figure 25).

While China’s score has improved greatly since 2010 (where it scored a 1.7), it appears that further progress on market competition has stalled. Excluding the data with no new updates for 2023, China backslid on every other benchmark indicator this year (market concentration, SOE presence, and rule of law). While there are segments of the economy that exhibit true competitiveness and have robust market dynamics, overall, China’s economy falls far short of open economy norms. The primary issue is the role of the state in reducing market competitive dynamics. SOEs have monopolies in numerous sectors, government subsidies and interprovincial barriers sustain firms that would otherwise fail, and the reach of the CCP into corporate affairs subverts the rule of law.

While the magnitude of decline on average in our market economy sample was roughly equivalent to that of China’s, these economies have, overall, sustained a much higher level of market competitive dynamics year over year; the average for open economies in 2010 was 7.5, close to their 2023 score. Overall, our quantitative indicators show that China is not on track to close the gap with OECD countries. Moreover, these quantitative indicators only capture market competition in part. Dynamics such as informal barriers to market participation (discrimination in procurement against foreign and private companies), uneven access to industrial policies amongst firms, and the influence of the CCP in corporate governance via grassroots party organization and administrative guidance can’t be adequately quantified by the currently available data, but complement the picture painted by our benchmarks.

To help address these gaps, we track policy developments in 2023 below and present a number of alternative indicators. These include more granular measures of state ownership in the Chinese economy.16

A year in review: China’s 2023 market competition policies and developments

Overall, policy trends in 2023 reinforced the backsliding found in our quantitative indicator. In 2013, Chinese President Xi Jinping emphasized the importance of market mechanisms in guiding resource allocation. Over a decade later, such aspirations have yet to achieve their full potential, and the role of the state in the economy is resurgent. Combined with arbitrary, stringent regulations and a pervasive focus on national security, this left a pessimistic outlook for both the domestic and foreign business communities.

Several pieces of legislation posed heightened challenges for business operations in China in 2023, especially for foreign firms. For example, the Cyberspace Administration of China (CAC) finalized the Cross-border Transfer of Personal Information Standard Contract, which included many provisions that were ultimately stricter than what had been proposed in working drafts. It introduced additional measures enforcing stricter alignment of any cross- border transfer agreement with that of the Standard Contract and heightened the requirement of monitoring by Chinese authorities of foreign recipients of personal information. For foreign companies, especially those in financial services and technology, these rules pose steep barriers to their operations and cause essentially discriminatory treatment in the domestic market.

Similarly, China’s Anti-Espionage Law received an amendment and went into effect in the middle of 2023. It was widely noted to be ambiguous in its formulation, with new language added broadening the scope of potential espionage targets to include “all documents, data, materials, and articles” related to national security interests.17 Because “national security interests” as a term is ill defined and potentially expansive, foreign companies have feared that these rules could be applied arbitrarily. Such worries built off a series of raids on foreign consulting groups, including Mintz Group, Capvision, and Bain & Company, where staff were detained for questioning.18 A large fine was additionally levied on Deloitte for allegedly failing to perform its duties adequately in auditing China Huarong Asset Management Company.19 Lastly, Chinese regulators directed SOEs and publicly traded domestic firms to heighten scrutiny when hiring foreign accounting firms, which has further restricted the ability of auditors to independently assess Chinese company data. These events highlight the tighter supervision of data, especially sensitive economic data, by Beijing and have disproportionately affected foreign firms.

There were some improvements in the policy environment in the latter half of 2023. The State Council sought public comments on several issues concerning private sector investment, such as market entry barriers, unfair competition, and arbitrary fines. There was a recognition by officials that further guidance and potential easing of cross-border data transfers would be forthcoming, but that has yet to materialize. The CAC hinted that some personal information involved in routine commercial activities, such as cross-border shopping, may be exempt from security assessments.

Ultimately, however, optimism for improvements faded as meaningful changes failed to materialize. Firms, especially foreign ones, have been left facing more uncertainty. Clarifying regulations and standards and ensuring the equal treatment of foreign versus domestic and state versus private firms would do much to repair the loss of confidence in the business community in 2023.

Figure 2.5: Annual indicators: Market competition (2023*)

2.3 Modern innovation system

Figure 2.7: Composite index: Modern innovation system, 2023

Definition and relevance

Market economies rely on innovation to drive competition, increase productivity, and create wealth. Innovation system designs vary across countries. However, market economies generally employ systems that rely on government funding for basic research but emphasize private sector investment, encourage the commercial application of knowledge   through the strong protection of IP rights, and encourage collaboration with and participation of foreign firms and researchers, except in defense-relevant technologies.

2023 stocktaking: How does China stack up?

China’s innovation system reform efforts in 2023 were similar to those in the previous year, lagging many of the developed economies in the sample. China’s IP was less attractive globally and fewer high-quality patents were filed by Chinese entities. Increases in OECD spending on research and development (R&D) outpaced that of China’s, as well, though China performed marginally better in securing venture capital (VC) spending than comparable economies. In general, we evaluate that progress in reforming the innovation system has stagnated.

We chose the following annual indicators (also used in previous China Pathfinder reports) to benchmark China’s track record against open market economies in terms of a modern innovation system.

National spending on research and development

R&D expenditures as a percentage share of GDP measure R&D spending relative to comprehensive economic activity across the economies in our sample.

China’s R&D expenditure as a share of GDP has steadily increased from 1.7 in 2010 to 2.55 in 2022, as expected of countries moving toward innovation- driven economic growth. At 2.55 percent, China’s share significantly converged toward the OECD average of 2.64 in 2022. However, in 2023, China’s funding ratio stagnated at its 2022 level, while the OECD average marginally increased to 2.67. While spending on R&D and innovation is likely to remain a high priority for China’s central and local governments, as articulated in high-level policy documents, the need for increased spending for social welfare—for example, on pensions and health care—due to an aging population, alongside stagnating growth prospects and local government fiscal debt burdens, is straining the fiscal space available to continue increasing funding for R&D.

Venture capital attractiveness

While recognizing the limitations of using R&D spending as a measure of innovation, we also look at VC investment as a share of GDP. VC plays a key role in innovation-driven entrepreneurship and shows the confidence of private sector investors in an economy’s ability to catalyze disruptive new technologies.20

In 2023, all sampled countries experienced a decline in VC investment as a share of GDP as the global venture market took a steep downturn. According to PitchBook data, global capital invested fell to 2018–20 levels, and exit value fell to 2017 levels.21 The United Kingdom and the United States experienced the greatest decrease in their shares (sixty-three and thirty-eight percentage points, respectively). The OECD average fell from 50 percent in 2022 to 30 percent in 2023. While China was no exception, it fared relatively better, losing only five percentage points and dropping its share from around 40 percent to 35 percent in the same period, demonstrating significant convergence toward the OECD average. This is not as strong as China’s performance in 2021, when it stood at 67 percent, compared to an OECD average of 63 percent, but marks a significant improvement from 2022, when China’s share fell ten percentage points below the OECD average. Along with heightened geopolitical risk, a reassessment in the prioritization of investing domestically, and high federal fund rates in the United States, China’s increasingly challenging business environment for foreign capital in tech and other popular VC destinations still poses barriers for foreign firms. State investment continues to be a significant driver of VC in China through government guidance funds and other vehicles as an alternative to traditional grant funding.

Triadic patent families

As an indicator for the quality of innovation output, we use the number of triadic patent families filed, controlled for GDP. Triadic patent families are corresponding patents filed at the European Patent Office, the United States Patent and Trademark Office, and the Japan Patent Office. They are generally considered higher- quality patents and, thus, offer a better perspective than purely looking at the number of patents.

China’s total number of filed triadic patents decreased by roughly 100 in the analysis year. The number of filings by other countries either decreased (Japan, the United States, France, Germany) or increased marginally by an average of eleven patent families. Increased costs and disruptions due to the COVID-19 pandemic may have affected new patent filings in the period; China’s drop in our 2023 indicator was not as sharp as that of the United States or Japan.

International attractiveness of a nation’s intellectual property

Another proxy for a country’s innovation output quality and global relevance is the receipts for payments from abroad for the use of IP. Controlled for GDP, this indicator offers a perspective on the relative attractiveness of national IP to other nations.22 China’s improvement on this indicator in 2022 proved temporary. In 2023, IP receipts as a share of GDP decreased by more than 50 percent to 0.06 percent of GDP, while the open economy average remained roughly the same (0.6 percent of GDP).

Strength of IP protection regime

To measure the protection of IP, we use the International Intellectual Property Index provided by the US Chamber of Commerce’s Global Innovation Policy Center. The index is composed of fifty individual indicator scores that look at existing regulations and standards and their enforcement. Because the index was not launched until 2012, we use that year as our baseline. China’s performance on IP remains unchanged from the previous year, as do almost all rankings for the OECD countries in our sample.

Composite score

Our analysis has some limitations. For example, it does not include certain unique aspects of China’s economy, like the presence of SOEs in leading sectors relevant to innovation, including telecommunications, airspace, biotech, and semiconductors. Data constraints also restrict our insight into specific components of China’s innovation ecosystem, such as subsidies or government guidance funds.

In 2023, China’s score on the Modern Innovation System Composite Index remained similar to 2022 levels, at 2.5, short of the OECD average of 4. The United States, the UK, and Germany saw the largest score decreases of 0.3, 0.4, and 0.6, respectively. Poor performance on VC, patenting, and IP attractiveness depressed the OECD average score to its 2020 level of 5.6.

A year in review: China’s 2023 innovation policies and developments

The major development in innovation policy in 2023 was bureaucratic shuffling that indicates Xi and the CCP will drive the direction of China’s innovation for the foreseeable future. For one, the Ministry of Science and Technology was given a lead role in coordinating China’s R&D ecosystem. Moving forward, it will play a key part in determining the allocation of science and research-related funding. Additionally, the Central Science and Technology Commission, a CCP committee, was elevated to a policymaking role in China’s R&D ecosystem. This centralizes control of China’s innovation infrastructure even further in the hands of the CCP rather than with private actors.

Although some positive indications began   to emerge on artificial intelligence (AI) policy, they were ultimately overshadowed by state interference in market dynamics. Overly restrictive regulations on AI research and commercial activity were toned down in 2023, and four large generative AI models passed government assessments. But the state continues to anoint winners, and government-sponsored language models dominate the industry. More strident guidance on data use targets for industries and local authorities also leaves less and less room for the market to play a role, let alone a decisive one.

In 2024, the mood at innovative firms is somber. State sector damage to dynamism has been severe and will be difficult to reverse. Credible policy signals would need to convince anxious private companies, foreign businesses, and venture investors that market-driven innovation will not only be tolerated but promoted. Clear definitions and practical examples of what “important data” means in the CAC’s “toned-down” cross-border data flow regulations would encourage investment. Ongoing Chinese de-risking efforts driven by rising security pressures are also reducing room for technology transfers, hurting the innovation outlook. There are conciliatory steps Beijing could take to arrest that trend, such as tempering brash foreign policy postures, but few expect such a pivot.

Figure 2.8: Annual indicators: Modern innovation system (2023*)

2.4 Trade openness

Figure 2.10: Composite index: Trade openness, 2023

Definition and relevance

Free trade is a key feature of open market economies to facilitate specialization based on comparative advantage. We define trade openness as the cross- border flow of market-priced goods and services free from discriminatory, excessively burdensome, or restrictive measures.23

2023 stocktaking: How does China stack up?

In 2023, China backslid heavily in its overall trade openness. China does perform well on metrics concerning trade in goods, but this is unsurprising given the economy’s reliance on exports to drive growth. Conversely, restrictions on trade in services continue to hold back China’s overall progress. To assess this, we apply the following annual indicators to benchmark China against open market economies.

Goods and services trade intensity

Our primary de facto trade openness indicators are gross two-way goods trade as a share of global two- way goods trade and gross two-way services trade as a share of global two-way services trade. This metric is often referred to as the trade openness ratio. However, a low ratio doesn’t necessarily imply restrictive policies— it can also derive from the size of a country’s economy or a non-trade-friendly geographic location.

Both indicators show that China is heavily integrated into global trade flows. Of the countries under study, China has the highest trade in goods intensity, at 11.9 percent in 2023. This is a slight increase of 3.5 percent over the previous year (11.5 percent intensity), and a 33.7 percent increase over 2010 (8.9 percent intensity).24 Open market economies typically sustained lower scores and were more consistent year over year, with the exceptions of Germany and France, which had slight increases in their trade in goods intensity scores in 2023. The United States held the highest trade in goods intensity amongst our OECD sample at 10.6 percent.

Regarding services, China had a trade intensity of 5.2 percent in 2023. This is a decline over its 2022 score of 6.4 percent, though it remains an improvement over its 2010 baseline of 4.2 percent. Services trade intensity declined on average amongst our open economy sample as well, falling from an average of 4.2 percent in 2022 to 3.8 percent in 2023. The United States leads this group with a score of 10.7 percent, while most other open economies scored in the lower single-digit percentages.

Trade Barriers: Tariff Rates

We utilize official tariff rates to judge the formal barriers to trade. Our methodology employs the simple mean of most favored nation (MFN) tariff rates across all product categories. We use a simple mean instead of a weighted average because the latter is often skewed downward (goods facing high tariffs are imported less, lowering their weight in the calculation).25 The MFN rate is used instead of the applied rate for data availability and comparability across countries.

As of mid-2024, the tariff rate data from the WITS have not been updated. We thus carry forward the latest available data covering 2021. China maintained a tariff rate of 5.3 percent, which is higher than our comparison market economies, though lower than in previous years. However, it is important to note that all sampled countries reduced their tariff rates over the study period. China has reduced its MFN rate to around 3 percent since 2010, down from 8.1 percent.

Restrictions on services trade

For a de jure measure for services trade openness, we rely on the OECD’s Services Trade Restrictiveness Index (STRI), which measures policy restrictions on traded services across four major sectoral categories.26 These are physical, digital, and professional services and logistics, all weighted equally. Each sectoral category also contains several specific industry subindices. A lower score on the index indicates a less open policy to services trade, with scores ranging from zero to one. This index only started to provide data in 2014, so this is the earliest year for benchmark comparison.

In 2023, China’s STRI score was 0.36, slightly higher than its 2022 score of 0.35. This indicates that the services trade became more restrictive both within China (even though it has improved notably since 2010) and in comparison to our open economy sample, which averaged 0.20 in 2022 and 0.21 in 2023. The open economy scores have consistently maintained better services trade openness scores since 2014.

Restrictions on digital services trade

In previous years, China was an even greater outlier in digital services trade, a crucial subcategory of global services trade. Our research adapts the OECD’s Digital Services Trade Restrictiveness Index (DSTRI), which measures barriers that affect trade in digitally enabled services across fifty countries.27 This includes infrastructure, connectivity, electronic transactions, payment systems, and IP rights. The index ranges from zero to one, with higher scores indicating a greater degree of restrictiveness. This index only started to provide data in 2014, so this is the earliest year for all countries in our sample.

In 2023, China’s DSTRI score was 0.35. This is an increase (more restrictive) over 2022’s score of 0.31. Throughout the study, China has scored higher on this benchmark than its open economy peers and has, in fact, backslid significantly from 2014. This is likely reflective of the increasing securitization and control of the digital sphere under Xi. On the other hand, OECD economies have moved little from their 2014 benchmark.

Composite score

China’s Trade Openness Composite Index score in 2023 was 4.36, a notable decline from the previous year’s score of 5.11, though still an improvement over the 2010 baseline score of 3.50 (Figure 211). The primary source of this decline was the enhanced restrictions on digital services trade. China’s DSTRI index for 2023 marked the lowest score of any country in the sample over the study period. This, combined with additional decreases in trade in services intensity and reduced service trade flows, resulted in a much lower score for China’s trade benchmark. While Canada and the United States saw decreased trade scores this year, every other open market economy in the study improved.

While we have good access to basic trade-related data, our coverage faces several shortcomings. China’s trade intensity measures are a yardstick for fairness and openness. The services trade data have flaws, including significant distortions through tourism spending and hot money flows. Also, measuring services trade, including tourism, during the pandemic years can produce skewed results. Finally, some of China’s most problematic practices—for example, nontariff barriers, informal discrimination, and exchange rate interventions—are difficult to capture through internationally comparable datasets.

To help address these shortcomings, we outline below policy developments relative to trade openness and present several supplemental indicators of China’s progress in Figure 2-12.

A year in review: China’s 2023 trade policies and developments

China’s trade openness contracted in the second half of last year, marked by increased controls. Trade dragged on GDP growth in the second half of 2023 despite surging exports in some sectors that are fueling foreign concerns about dumping and spillovers from Chinese overcapacity.

China maintains domestic subsidies and supply-side policies while decrying policy support for consumer demand as welfarism. This asymmetry leads to overcapacity, aggravating trade imbalances. Rather than acknowledge the unfair implications for producers in other nations and propose some sort of voluntary export restraints, Beijing emphasizes the decarbonization potential of its products and appeals to anxieties about global warming. Exports of electric vehicles (EVs), lithium-ion batteries, and solar products to the European Union (EU) took off in 2022 and remained high through 2023. China has also argued that its exports have a disinflationary effect on the global economy, and that countries struggling to rein in inflation should welcome China’s subsidization of its exports.28

Parallel to these exports, China imposed export controls on key intermediate inputs for EV batteries, semiconductors, wind turbines, and other technologies. The curbs on graphite, germanium, gallium, and the technology used for making permanent rare earth magnets—China is the top producer globally of all of these—would make it more challenging for other countries to diversify their supply chains. The Ministry of Commerce (MOFCOM) and the Ministry of Science and Technology jointly invoked national security concerns in rolling out export controls on drones, laser radars, and technology used for making optical sensors, among other items. These measures are ostensibly in reaction to US controls on equipment exports and chips related to China’s high-end semiconductor sector.

At the end of 2023, China announced the end of tariff cuts on twelve chemical imports from Taiwan and accused Taipei of violating World Trade Organization (WTO) rules, ratcheting up restrictions on Taiwan trade just prior to Taiwan’s elections. At the same time, Chinese officials extended an olive branch on other goods, rescinding tariffs on Taiwanese grouper and Australian meat and barley.

China’s use of economic statecraft and political influence over trade policy is not likely to change soon. There is ample room for Beijing to change this impression by stepping up reporting of subsidies to the WTO or eliminating existing trade coercion measures. Specific actions that would indicate greater trade openness include moving away from the practice of raising or lowering the value-added tax, which distorts global crop markets; revising China’s decrees on food imports, which were implemented in 2022 and required the registration of all foreign food manufacturers; and publishing data on how Intellectual Property Action Plans have been enforced. This would demonstrate meaningful efforts to achieve fair and transparent trade practices outside of the more common trade opening measures that China has adopted, like adding free trade zones.

Figure 2.11: Annual indicators: Trade openness (2023*)

2.5 Direct investment openness

Figure 2.13: Composite index: Direct investment openness, 2023

Definition and relevance

Direct investment openness refers to fair, nondiscriminatory access for foreign firms to domestic markets and freedom for local companies to invest abroad without restrictions or political mandates. Direct investment openness is a key feature of open market economies that encourages   competitive   markets and facilitates the global division of labor based on comparative advantage.

2023 stocktaking: How does China stack up?

In 2023, China made little progress in improving its direct investment openness and it remains far behind open market economies. Inbound and outbound FDI continued to decline as a share of GDP. Developed economies, on the other hand, have become more open and have increased their relative inward and outward FDI in recent years. Direct investment openness is the area where China remains furthest behind its peers. We use the following annual indicators to benchmark China against open market economies in terms of direct investment openness.

FDI intensity

Our main de facto indicator for inbound direct investment is the inbound FDI intensity of the economy, which is calculated by dividing the total inbound FDI stock of an economy by its GDP. In recent years, China’s ratio of inbound FDI stock to GDP has declined from its 2010 level of 26 percent, plateauing at around 20 percent from 2021 to 2023. By contrast, the OECD average has risen more than ten percentage points, from 30 percent in 2010 to a steady 40 percent. In 2023, the United States and Canada’s inbound FDI intensity scores recovered from drops reported in 2022, increasing by eight and ten points, respectively.

Outflows are measured by outbound FDI intensity, which is calculated by dividing outward FDI stock by GDP. China’s outbound investment intensity has experienced an even greater decline than inbound investment. In 2010, China’s level of outbound investment intensity was 35 percent, which declined to around 15 percent by 2021 and remained there in 2022. In 2023, China saw a slight increase in its outbound investment intensity to 17 percent. The OECD average was at a comparable level to China’s in 2010, at 35 percent, but has steadily risen to 52 percent as of 2023, with a two percent age point increase in the past year. The UK’s rate was an exception to the OECD average increase over the past year, declining from 70 percent to 64 percent.

Direct investment restrictiveness

We built our own indicator for direct investment restrictiveness to measure de jure restrictiveness for FDI. While there is a robust body of academic work on cross-border capital controls, existing research was unsuitable for our purposes due to the lack of a magnitude metric,29 coverage gaps, and significant time lags.30 Our indicator is compiled for outflows and inflows and covers three types of restrictions: national security reviews, sectoral and operational restrictions, and repatriation requirements and other foreign exchange restrictions. The scoring is based on a proprietary framework derived from information contained in the IMF’s Annual Report on Exchange Arrangements and Exchange Restrictions (AREAER) as well as proprietary research on national security review mechanisms and sectoral restrictions.31 At the time of publication, IMF AREAER data for 2023 was unavailable, and 2022 values were used in scoring.

From 2010 to 2022, every country sampled, except China, increased restrictions on inbound investment, as measured by the restrictiveness indicator. Likewise, all countries’ scores on outbound investment restrictions showed no change or increased restrictiveness since 2010, with China the only improvement. China’s heavily regulated capital controls set it far behind the OECD average as a baseline, and domestic and foreign firms are still operating in a much smaller market access window than in open economies, with reforms remaining targeted and incremental.

Composite score

In 2023, China’s score on the Direct Investment Openness Composite Index continued to improve slowly, rising from 2.1 in 2022 to 2.2, driven by growth in both inward and outward FDI stock in 2023, as well as a slight improvement in outbound restrictiveness in 2022 (carried forward to the current scoring period). Over the past four years, regulatory uncertainty and slowing economic growth prospects have changed prospects for investors who rushed in to capitalize on cheaper costs of capital and labor to build manufacturing capacity in the 2010s. China’s attempts to attract foreign investment through investment incentives and the easing of restrictions on certain sectors and special economic zones (reflected in the improvement of China’s inbound restrictions score since 2010) contributed to the slight increase in China’s inward FDI stock as a share of GDP in 2023. Despite recent discussions characterizing China’s outbound FDI in recent years as accelerating, China’s strict capital controls maintain a level of outbound investment flows that are modest for its economic size. China’s score has improved from 0 in 2010 to 0.9 in 2023, but China remains the lowest performer in the group.

However, compared to the other indices covered in China Pathfinder, there is less volatility in the change in open economies’ scores on the Direct Investment Openness Composite Index from 2010 to 2023. China’s 1.6-point score increase from 2010 to 2023 represents the strongest growth out of the sample countries. Canada comes in a close second with a 1.4-point score growth. While the average OECD score stands distinctly ahead of China’s, its improvement has been more modest, from 6.1 in 2010 to only 6.3 in 2023. The scores of several countries, including Australia, Germany, Italy, and South Korea, have declined in 2010, which has largely been driven by worsening scores on inbound and outbound investment restrictiveness.

As with other indicators, our de facto measures for direct investment openness are imperfect because they are influenced by a host of non-policy variables, such as market size, economic growth, and business cycles. Our measures for de jure restrictiveness reflect scoring judgments that are subject to a certain degree of subjectivity. We address these shortcomings below by providing a summary of major policy developments in 2023 pertaining to direct investment openness. Supplemental indicators are presented in Figure 2.15 to help provide additional context.

A year in review: China’s 2023 direct investment policies and developments

According to official data, in 2023, inbound FDI flows hit new lows. MOFCOM data recorded a 19 percent and SAFE a 78 percent year-over-year decrease in inbound FDI, with unprecedented net FDI outflows in quarterly data.32 Regulatory uncertainty under Xi, China’s changing growth prospects, and the rise of investment screening regimes and other restrictions have resulted in a slowdown in new inbound FDI flows to China since 2021. On the other hand, China’s outbound FDI intensity grew marginally, increasing by one percentage point in 2023 as outbound FDI flows increased, according to MOFCOM data. Diversification pressures and enhanced inbound investment screening regimes in Western countries and Japan have contributed to shifting Chinese outbound investment. Investments are becoming more concentrated in certain sectors while also targeting new destinations. Expanded export controls on Chinese industry are also motivating some targeted industries to expand or move production abroad. Rhodium Group research finds that China’s investment in Europe and the UK dropped to its lowest levels since 2010 and became even more heavily concentrated in the EV supply chain.33

Over the second half of 2023, China developed several initiatives to bring back foreign investment. At the end of June, new pilot programs for six of China’s 21 free trade zones and ports were announced, with the goal of reducing trade barriers and streamlining customs procedures.34 In August of 2023, the State Council released a 24-point plan to help boost inbound FDI. These measures were largely devised to restore foreign business confidence, which, after three years of the zero-COVID policy and deteriorating macroeconomic and geopolitical conditions, had reached a new low.35 In November 2023, the State Council separately released a “23 Tasks” plan to boost Beijing’s services sectors, followed in December by pledges at the Central Economic Work Conference to boost foreign investment in sectors including telecommunications and medical services in 2024. Promises include several pro-market reforms such as reducing the scope of the Negative List that outlines restrictions on foreign investment in some sectors,36 lifting ownership caps, and increasing opportunities for foreign private companies to participate in government procurement processes. However, the proposed reforms only apply to certain sectors, and their implementation has been limited so far. In addition, other factors, like evolving data security regulations and the lack of substantive financial system reform, continued to dampen investor sentiment toward the Chinese market.

While these reforms will increase opportunities for foreign firms, China’s application of the Anti-Espionage Law became increasingly unpredictable in 2023. State- directed raids, threats, and intimidation of foreign businesses—particularly consulting and due diligence companies—undermine efforts to preference market forces and level the playing field for foreign investors. Under the new law, bureaucratic processing times and red tape for investment approval and market research have also increased.

In 2024, foreign-invested enterprises in China are waiting to see action on promised reforms outlined at the Central   Economic   Work   Conference   and the implementation of a new data security policy. However, reforms directed toward fundamental issues contributing to heightened costs for foreign investors would be a more significant step toward opening direct investment.

Figure 2.14: Annual indicators: Direct investment openness (2023*)

2.6 Portfolio investment openness

Figure 2.16: Composite index: Portfolio investment openness, 2023

Definition and relevance

Portfolio investment openness refers to limited controls on two-way cross-border investment in equities, debt, and other financial instruments. It is a key ingredient for financial market efficiency and market-driven exchange rate adjustments in open market economies.

2023 stocktaking: How does China stack up?

China’s portfolio investment openness saw little change between 2022 and 2023. While there has been moderate improvement since 2010, China lags far behind OECD economies in liberalizing cross-border financial flows. We apply the following annual indicators to benchmark China against open market economies in terms of portfolio investment openness.

Internationalization of debt and equity markets

To measure de facto openness to portfolio investment, we calculate the sum of cross-border debt (government and corporate bonds) assets and liabilities relative to the size of the economy, as well as the sum of cross- border equity (stocks) assets and liabilities relative to the size of the economy. Assets are holdings of foreign securities by residents, and liabilities represent foreign holdings of securities issued by residents. China lags significantly behind the open-economy average in both categories.

Since 2010, China’s cross-border debt assets and liabilities as a share of GDP have increased from 3 percent to a steady 6 to 7 percent since 2020, far behind the OECD average of 83 percent. China’s equity assets and liabilities as a share of GDP have grown even slower. Standing at 8 percent in 2010, China’s share reached 13 percent in 2020 before declining over the past three years to 9 percent in 2023. In 2023, the OECD average rate of equity assets to GDP recovered from a drop in 2022, rising from 86 percent to 93 percent in 2023.

Portfolio investment restrictiveness

For a de jure perspective, we created our own Portfolio Investment Restrictiveness Indicator that captures regulatory restrictions on portfolio investment flows based on the IMF’s AREAER database and our own research. We calculate separate indices for portfolio outflow and inflow restrictiveness, assigning numerical scores based on the implementation of opening or closing measures during a given year. At the time of publication, IMF AREAER data for 2023 is unavailable and 2022 values were used in scoring.

The inward portfolio restrictiveness indicator captures rules that prevent nonresidents from purchasing bonds and equity securities locally and rules that stop residents from selling and issuing bonds and equity securities abroad. The outward portfolio restrictiveness indicator captures rules that prevent residents from purchasing foreign securities and restrictions on nonresidents selling and issuing bonds and equity securities.

Historically, China has tightly restricted short-term foreign capital inflows, allowing a select number of transactions through narrow programs such as the Qualified Foreign Institutional Investor (QFII) scheme.

Since 2010, China’s inbound restrictiveness score has improved from 0 to 2.9 in 2022. However, it trails far behind the OECD average score, which has remained around 9.3 to 9.4 since 2010. Over the past decade, several schemes such as the 2014 and 2016 Shanghai- and Shenzhen-Hong Kong Stock Connects, the 2017 Bond Connect, and the 2020 China Interbank Bond Market Direct, as well as the loosening of certain restrictions, have opened greater access to China’s markets. Yet, investment quotas and inadequate cross- border settlement infrastructure still pose major barriers for foreign investors.

Concerns about the destabilizing effect of large- scale capital outflows guide China’s caution toward liberalizing outward portfolio restrictiveness. In recent years, China has expanded connections with several international exchanges, including the UK, Swiss, and German markets, with the ongoing development of the Shenzhen-London Connect in 2023. However, households remain generally unable to invest in overseas securities, and institutional investors are constrained by special programs, such as the Qualified Domestic Investor Initiative, which is capped by SAFE. As a result, China’s outbound restriction score has only improved from 0 in 2010 to 1.7 in 2022, while the OECD score has remained around 9.5 to 9.6 since 2010.

Composite score

With limited fluctuation in China’s debt and equity assets as a share of GDP and values for investment restrictiveness carried forward from 2022, China’s Portfolio Investment Openness Composite Index score remained at 1.2 in 2023. China’s score in 2010 was zero, representing the lowest level of openness among all sampled countries across all years. The China Pathfinder normalization method captures countries’ progress or regression compared to their performance in prior years. As such, China remains far behind all other countries, with the OECD average standing at seven in 2023, but has shown a very modest improvement over the past decade.

China exercises a level of control over its capital account that is distinct from open market economies. We have seen large improvements in the ability of foreigners to access and participate in China’s markets relative to 2010 through investment programs such as the QFII, stock and bond connects, and through the raising of quotas for several programs and easing of restrictions (such as reducing the number of industries restricted from listing stocks on the Negative List for foreign investment). However, the de facto indicators of debt and equity asset and liability levels also capture fluctuations with discrete impacts from policy changes, such as market sentiment, macroeconomic dynamics, and other business environment factors, such as tax optimization and financial system designs.

We noted in 2022 how these factors impacted portfolio volume as a share of GDP data, with sizable declines for both China and OECD economies compared to 2021. In 2023, all open economies sampled showed an improvement in their scores. The average OECD score showed a slight recovery, rising from 6.9 to 7, but has  still  not  reached  2020–21  levels.  Since  2010,  the scores of all economies sampled, except the UK, have improved. The UK’s score decline is primarily driven by a dropping ratio of debt securities to GDP. On the other hand, Canada and Japan have improved market access the most, both showing significant growth in shares of debt and equity positions to GDP since 2010.

While our benchmark indicators capture major movements in China’s reform progress and allow for a standardized comparison with open market economies, we undergo a qualitative assessment of China’s policy reforms in the section below to provide greater context to China’s progress in 2023. Supplemental indicators relevant to portfolio investment openness are presented in Figure 2.18.

A year in review: China’s 2023 portfolio investment policies and developments

As part of efforts to boost economic growth in 2023, Beijing rolled out several measures that marginally opened capital markets at the beginning of the year. These steps were followed by substantial government intervention to artificially shape supply, demand, and prices in the second half of the year. State interventions sought to regulate the effects of heavy portfolio capital outflow pressures brought about by a yawning interest rate gap with the United States and other market economies and the abysmal performance of China’s stock market in 2023, the worst of major stock markets globally.

In the earlier half of the year, prior to the stock market downturn, there was marginal progress in opening portfolio investment markets in some areas. The Shenzhen and London exchanges took additional steps toward establishing the Shenzhen-London Connect, which will improve capital market connectivity. The China Securities Regulatory Commission (CSRC) also softened restrictions on the offshore listing of Chinese companies with variable interest entity structures, and a new registration-based IPO system will allow investors opportunities to invest in a wider range of companies.37

In the second half of the year, government-guided security   purchases   aimed   to   stabilize   markets and assuage investor confidence as stock market performance took a steep downturn. China’s Central Huijin Investment fund purchased exchange-traded funds in October, and the China Reform Holdings Corp (another state-owned strategic investor) purchased tech-focused index funds in December. Meanwhile, the government allowed social platforms such as WeChat to direct retail investors to the stock market. Government-backed funding vehicles also acquired “golden share” stakes in Alibaba and Tencent’s local operations, allowing more government oversight of company decisions. In January, CAC was reported to have taken a 1 percent stake in an Alibaba digital media subsidiary in Guangzhou.38

To regulate supply, the government raised barriers for new public offerings and introduced restrictions on trading, aiming to reduce supply volatility. The CSRC slowed the pace of IPOs and tightened restrictions on refinancing activities for underperforming listed firms. The CSRC also tightened rules on share sales by large shareholders of listed firms and increased scrutiny of program trading, later banning mutual fund managers from selling more shares than they bought daily.

China’s response to portfolio investment troubles also contained some marginal market opening. To reduce transaction costs, China halved the stamp duty on stock trading and reduced transaction handling fees submitted by brokers to the exchanges. Chinese stock exchanges also lowered margin requirements to boost investor financing.

Figure 2.17: Annual indicators: Portfolio investment openness (2023*)

Chapter 3: Conclusions and implications

The challenge to reform in China has always been its real and perceived costs. China’s policymakers and economic experts have long understood the need for economic reforms; the key question has been whether policymakers and leaders would accept and incur the consequences of short-term growth, unproductive state-owned firms, and other interests. Whether in the marquee 2013 Third Plenum reform program, the supply side capacity reduction push in 2015–16, or the financial de-risking program that peaked in 2018,39 previous reform pushes aimed to alter economic principles in China. All involved facts of ceding economic leadership to the private sector, embracing foreign investment and competition, and resolving longstanding questions of fiscal capacity and domestic demand, accepting short- term disruption for long-term viability. Instead, in 2023— as since 2013—policymakers retreated when faced with costs and constraints. Increasing geostrategic competition with the United States and Europe, increasing state direction of investment, and surging support for priority sectors instead took priority. These dynamics presaged what emerged in July 2024—in an overdue meeting from 2013—during the Third Plenum of the CCP.

Stalled reform, however, does not imply that China made no progress, whether in 2023 or since 2020 when the China Pathfinder Project was launched. But these small improvements come with major caveats, and the China Pathfinder results thus point to ongoing friction between the OECD and China in the coming years.

Main findings from China Pathfinder 2024

In 2023, China’s policy reforms stalled, while OECD scores came under pressure. On net and pulling together the findings from our detailed benchmark assessment of six clusters, we make the following observations.

Beijing continued to emphasize SOEs, even as it demanded more from the private sector to meet industrial policy goals: The dominance of state firms in China’s economy continued to grow in 2023. Given China’s ambitious technological goals and urgent fiscal crisis, analysts might have predicted policy to reduce SOEs’ throw weight and empower private sector innovation. Even some targeted asset privatization might have been reasonable, generating much-needed revenue at the cost of local protectionism. Instead, the weighted average of state ownership among top firms across sectors continued to grow, reaching 65 percent; it continues to surpass 2010 levels. State ownership in China’s top financial institutions also remained above 60 percent. Several policies increased state support for SOEs in 2023. Beijing granted new tranches of LGFV stimulus in 2023 and relaxed regulations on public offerings for listing SOEs. At the same time, there were few signs of action on promised private sector reform in 2023. High-level policy directives to stimulate domestic investment in innovation, manufacturing sectors, and industrial development are calling on the private sector to take on more funding responsibility. The private sector has responded; in 2023, its stated share of R&D spending in China reached its highest rate since 2020. But it is unclear what else the government can practically, and effectively, do to fund additional innovation. Government funding is constrained, and inbound VC and FDI are deteriorating. Increasing funding for SOEs without meaningful structural reform to address existing debt troubles will expand moral hazard and pose risks to capital productivity.

Surging goods trade numbers highlight overcapacity, while services trade suffers from the impact of geostrategic and security policies: China’s exports from certain sectors increased dramatically in 2023 as overcapacity industries offloaded products elsewhere to compensate for low domestic demand. These overcapacity issues are likely to get worse. But as concerning as overcapacity is for the OECD, security and geostrategic policies in 2023 had a more dramatic impact on China’s trade openness, especially in services.

China’s 2023 exports of commercial and transport services declined by $43 billion and $59 billion, respectively, and heightened regulatory barriers restricted market access. The drop reflects the extended crackdown on technology firms, as well as data and cybersecurity restrictions that worried foreign companies. Consequently, China’s digital services trade openness score dropped below its 2010 level. That Beijing chose to reinforce security over increased services trade highlights how economic policymakers were unable to convince high-level leaders of the need (and benefits of) services engagement. Lingering effects from COVID-19 lockdowns in 2023 explain some of the decline in China’s services trade, but Beijing’s focus on security—and unwillingness to accept trade- offs between digital growth and digital control—resulted in intervention in other areas of the economy.

Innovation ratings declined in the OECD: In 2023, innovation scores across most of the OECD decreased, while China’s score showed little change from 2022. Both developments reflect financial constraints: all countries suffered from the global VC slowdown in 2023, as seen in decreased indicator scores, and high interest rates hampered access to debt financing. Funding for innovation remained a top priority for the Chinese government in 2023, and government funding did attempt to spur development during the year. However, fiscal constraints in 2023 and increased spending on areas key to social stability threaten China’s ability to subsidize and finance innovative industries and strategic sectors. Local governments are tasked with greater funding responsibilities amid a lack of substantive financial system reform to improve debt positions. Yet China was not alone, and many OECD countries also saw declines in patent output and IP attractiveness. Rising barriers to investment and trade constrain access to critical inputs, market scale, and international research collaborations, which are necessary for both Chinese and OCED economies to grow or maintain a robust innovation ecosystem.

Looking back at four years of systemic change

After four years of analysis, we can see that 2023 was not exceptional. While both China and OECD progress during the four-year period was mixed, China’s challenges during the China Pathfinder period were consistent, and structural, as certain reforms remained off the table. Based on this report and previous China Pathfinder editions, we make the following observations about China’s progress, and the challenges of interpreting data during the period.

China has shown improvement in several areas since 2020: China’s financial system reforms have expanded market depth and access along several dimensions, even as shortcomings remain. In 2022, China scored the lowest out of all sampled economies on the Financial System Development Composite Index indicator. In 2023, however, China stands ahead of Italy and Spain. Most of this movement is due to the Chinese government’s deleveraging policies in the wake of the property sector collapse, which have improved China’s credit efficiency. But significant problems remain. Despite government efforts to support stock exchange through the creation of bond and stock connect programs and the easing of restrictions on stock market access, China’s stock market continues to falter, incurring losses upwards of $6 trillion since 2021.40 State ownership in China’s financial system, and the absence of more significant structural reforms to improve local government debt, hold China back from closing the gap with our broader sample of OECD markets. China has also improved the prioritization of innovation funding and diversity of funding sources in its economy. Since 2020, China’s score for R&D spending as a share of GDP has risen to almost meet the OECD average, bolstered by strong prioritization of R&D for central and local government funding. Diverse government funding vehicles outside of traditional grants and tax incentives provide alternative avenues to finance China’s innovation ecosystem. Private funding for innovation has also remained well above the OECD average since 2010, and China’s score has grown at a faster rate than the OECD’s through 2023. Reinvestment of profits is the largest source of R&D funding for commercial actors by value, and as China’s fiscal space becomes more constrained, commercial actors are being called on to take a greater role in R&D funding. These actors are subject to state influence as Beijing attempts to ensure that spending is directed toward government priorities. China’s performance on the Direct Investment Openness Composite Index has also shown slow but consistent improvement, though it still trails the OECD average. A gradual easing of China’s heavily restricted FDI inflows and outflows in certain sectors has improved China’s scores on FDI restrictiveness indicators.

But a lack of system-wide structural financial system reform constrains China’s ability and willingness to reform in other areas: China’s financial system has opened since 2010, and its composite benchmark score increased moderately in 2023 as credit allocation improved. Yet even China’s improved score is still lower than it was in 2020 and remains lower than all countries in our sample other than Italy and Spain. These subcomponents of China’s scores since 2020 tell the story. While their scores are higher than in 2010, financial market access and our direct financing ratio benchmarks have all decreased since 2020, reflecting deep-seated constraints on depth and efficiency of the financial system. This has impacts well beyond the financial system. A distorted financial system will continue to struggle to stimulate domestic consumption, and preferential credit will make it harder for private and foreign firms to compete. Despite its side effects, domestic credit will continue to power investment in China’s economy. Innovation goals will be more difficult to accomplish if R&D and start-up activity cannot be effectively financed. Portfolio and direct investment could fill some of this gap. But while our scoring of, for example, China’s portfolio investment openness has improved marginally since 2020, it remains far below that of all other countries in the sample (at 1.2 points compared to the next-lowest scorer, South Korea, at 5.9 points). China’s VC investment score (in the innovation cluster) did not improve significantly during the China Pathfinder study period. The absence of deep and liquid financial markets and constraints on government funding will be bottlenecks to funding a rich innovation ecosystem that allows Chinese firms to remain at the forefront of technological innovation.

The COVID-19 pandemic affected our benchmarking between 2020 and 2024 and continues to affect economic analysis today: The scores we track reflect the challenge of interpreting economic data in the wake of the COVID-19 pandemic. The first China Pathfinder report was launched in 2020, at the height of the pandemic, as markets and government policy scrambled to respond. While 2010 data provides a comparative baseline for our market sample, COVID-19 dynamics mean that the changes in scores we have observed since 2020 may be temporary adjustments enduring movements toward or away from market norms, making it harder to conclusively determine reform patterns in China and the OECD. One-off COVID effects have impacted several scores in these reports; for example, supply chain disruptions may have suppressed China’s FDI stock performance in 2021–22 and affected services trade in countries with large tourism and transport sectors. There are special challenges in disaggregating the impact of COVID-19 on China’s performance. In the years prior to the pandemic, China’s economic growth began to slow, the expansion of domestic credit began to cool, and China entered a trade war with the United States. Shortly after the onset of the pandemic, China’s property market downturn sent shockwaves through a destabilized system. Retrenchment toward familiar tools of state intervention in response to these sources of economic instability can thus be difficult to attribute to discrete pandemic effects. It may instead represent the strengthening of a persistent structural feature. However, policies such as zero-COVID are examples where China’s pandemic response may obscure longer- term trends in the prioritization of state versus market forces.

Geo-fragmentation and backsliding impact OECD scores: China isn’t the only economy backsliding on reform. OECD countries are also relapsing as trade barriers, nearshoring, and the securitization of economic interactions grow. The OECD average for both inbound and outbound investment restrictiveness has dropped below 2010 levels as of 2022, the most recent year surveyed, and digital services trade restrictiveness has remained below the 2010 benchmark for several years despite slow improvement. Restrictions on flows of investment and people, alongside supply chain fragility under geopolitical tensions, create challenges for international research exchange and access to inputs needed for cutting-edge science and technology development. In 2023, the OECD’s patent score dropped back to 2010 levels.

Beyond the framework

Beyond its quantitative results, the China Pathfinder Project has important implications for how analysts should approach China’s economy and system. In light of our past four years of work, three principles bear special mention:

First, as noted in Chapter 1, the way the world looks at China has changed radically since China Pathfinder began. Rather than assuming that China has joined (or is soon to join) the club of developed markets, global investors in 2024 now analyze China with the same principles and caution they deploy for analyzing other emerging market countries. Between equity and property assets, China has lost $15 trillion in value since 2021; for global investors, such losses require them to question whether China is even baseline investable. Answering that question requires sufficient quantitative data, as does a broader analysis of China’s economic performance, like the China Pathfinder Project. The challenges we faced with data availability, reliability, and continuity illustrate the challenges faced by any analyst of China’s economy at the aggregate level. We are not alone in our quest for reliable metrics, whether from China—where data series have been retired, rebased, or arbitrarily suppressed—or from international organizations, which face publication delays and their own priority shifts that may orphan critical data streams without notice. International investors have many reasons to worry about China’s markets, including period crackdowns on private firms, increasing geopolitical tension, and reform promise fatigue. Data unreliability is yet another plausible justification for pulling back on investment in China. Just as some analysts have turned to anecdata or qualitative approaches, in the future, any attempt to quantitatively engage with China will require muddling through.

Second, statistical data access is not the only constraint on independent researchers conducting studies like this one. Since 2020, the ability to do firsthand research and meetings has been dampened by a perfect storm of factors, including pandemic travel restrictions, pressure on Chinese officials not to interact with foreigners, and a chilling effect on economists and due diligence professionals who might otherwise publicly criticize authorities. This has damaged the overall degree of transparency and free flow of information that serves as a critical input to our framework and hampers interpretation.

Third, the China Pathfinder Project takes a targeted— but potentially too narrow—view of economic outcomes. The framework evaluates a broad set of indicators covering many facets of market economic systems. However, it does not directly compare the outputs of these systems: growth outcomes and productivity. The latter includes the concept of total factor productivity (TFP), the proportion of potential economic output that cannot be accounted for by factors like a growing labor force or more capital investment. China’s productivity has been declining for several years,41 and our evidence of partial, stagnating reforms reinforces how policy is prolonging that slowdown. Our evidence would also predict a continued decline. If these dynamics persist in coming years, whatever China’s progress in specific metrics, a wider view of China’s system as compared to other economies might need to integrate analysis of outcomes to fully address the effects of piecemeal reform.

These takeaways present a challenge for future research, but conditions are changing. For starters, despite the severe problems with the quantity and quality of Chinese data, we believe new analytic strategies can deliver answers. Alternative credit data, satellite imagery, and efforts to integrate (and rectify) mirror and partner country data offer creative researchers increasingly valuable tools. There remains a lot of value in quantitative analysis, even with a higher margin of error than we expected, and even if approaches must adapt to new data streams.

A larger takeaway, though, is that serious Chinese economists share these concerns about data, information, and productivity. As hopes of an easy post-COVID recovery have faded, these economists have become more pointed in their critique of current conditions. Academics like Zhang Bin, Huang Yiping, Yu Yongding, and others have correctly asserted the need for credible economic statistics and a clear-eyed assessment of China’s economic conditions. With time and facing as substantial an economic challenge as China currently confronts, there is some reason to hope that objective data from within China and frank discussion of that data will once again be possible in the coming years.

Looking ahead

What does the future hold, based on what we have learned in the China Pathfinder Project? We conclude with a few conjectures about that for business and policymaking. We also offer a look ahead to our research team’s next-generation ambitions, with some lessons learned for analysts.

We predict that today’s observed structural slowdown will be persistent because it is clearly rooted in divergence from market-oriented policy reorientation. In theory, market systems are more efficient than politically controlled economies, enabling them to reach a higher production possibility frontier and potential growth rate. This is also what we observe in practice. China turned toward marketization, and its growth outperformed. It is now steering toward statism, and its growth is underperforming. This trend predates the COVID-19 pandemic and survived it.

Slower macro expansion means businesses will need to fight over market share rather than count on a fast- growing pie to feed all firms. In theory, this should compel competitors to work harder to attract customers, which could drive innovation and productivity. If the government suppresses competition to avoid structural adjustment and instability, this will deplete productivity. The “lie flat” movement—a widespread disinclination to strive due to a sense of low probability of success— can be seen as a reflection of this tendency. Slower domestic growth also increases the marginal pressure to export, invest abroad, and compete for customers overseas in higher-growth opportunity markets. This is a major theme presently and one our framework suggests will become even more salient.

Shifting business expectations for the quantity and quality of China’s macroeconomic growth will also impact the political economy of business-government relations in the West. Less concerned with shielding their China operations from home government policies, firms will shift their lobbying focus from moderating strategic and commercial de-risking to advocating for trade protection, relocation subsidies, innovation incentives, and other benefits.

Political and national security policymakers in market democracies will lift their ambitions in response to this change in business sector positioning. Economic security as a subfield of economic policymaking, including industrial policy, will continue its nascent rise in importance as a result of the competitive risks and opportunities of a bifurcating global supply chain landscape. Financial officials will be greatly concerned about the risks of crises and financial spillovers due to shifting economic flows, stranded assets, and changing assumptions about supply and demand.

This is just a rough initial sketch of some of the likely repercussions of an extended slowdown of China’s economy. Whether China’s “socialist market economy” model ceases to be emulated around the world is another huge question, as is whether the liberal market approach is the default to which attention returns. The seal has been broken on industrial policy in the West, and this is likely to persist.

Another policy-level question is at the international organization level. Institutions including the IMF, the WTO, the World Bank, and even the industrialized- democracies-centered OECD largely accepted China’s variant of the economy and lauded it for its developmental achievements over the past two decades. Even today, these organizations are over- cautious about critizing China’s official economic performance narrative. Institutionally, they view their remit as challenging member data, even if staff views often differ from leadership. How these organizations function in a world focused on bifurcation and de- risking is unclear.

China Pathfinder: The next generation

Our annual and quarterly China Pathfinder reports have been read worldwide: the website is most used by users from the United States, but the second-most users are from China itself, followed by Germany, France, and the UK. As discussed at length above, a methodology dependent on official Chinese data has grown harder to employ, but the demand for an integrated perspective on China’s economy has never been higher. Thus, we intend to continue our research partnership with modifications.

As of this writing, a variety of next-generation strategies are under discussion. The principles we will carry forward are clear, though: 1) policymakers and business decision- makers are the primary audience; 2) readers find the most value in assessment of specific, real economy outcomes; 3) our decade of quantitative databasing is foundational; 4) we must maintain a systemic analysis which takes stock of political and security factors; and 5) our outputs should speak to the most pressing, current topics, rather than perennial debates. On what is topical, discussions about overcapacity, diversification, growth slowdown, and barriers to cross-border capital, information, and technology flows are illustrative.

We intend to focus less on cataloging China’s policy aspirations and more on performance outcomes. We intend to evaluate performance less with official data at the core and more based on alternative proxies that are less prone to delay and politicization. We intend to maintain objectivity and quantification while putting more weight on independent measures of economic activity at risk outside China as a function of non- market norms and interventions in China. Finally, we will continue to critique excessively protectionist policies unreasonably justified as necessary to respond to China.

Parting words

The China Pathfinder Project illustrates China’s relative progress on reform: China’s economic system looks much different than it did in 2010, even as it continues to diverge from market norms. Despite China’s stagnation or backsliding in several of the areas China Pathfinder evaluates, there is still room—and need—for managed, constructive economic engagement between China and the rest of the world. While market economies seek to de-risk from China where necessary, trade and investment in other sectors still offer mutual benefits. The global commons also presents China and the OECD with challenges that we must manage together as effectively as possible. If nothing else, China Pathfinder shows the importance of economic and policy choices. China’s past reform choices do not prevent its leaders from making different ones that can further benefit China’s growth and its people. We encourage fellow researchers in China and elsewhere to take a broad, long-term view of economic reform and all readers of China Pathfinder to engage with us on how our work can be more valuable and impactful.

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

About China Pathfinder

Mission

China Pathfinder is a joint initiative from the Atlantic Council’s GeoEconomics Center and Rhodium Group that measures China’s economic system relative to advanced market economy systems. Few people, even within the circle of China experts, seem to agree about the country’s economic system, where it is headed, or what that means for the world. This initiative aims to shed light on whether the Chinese economic system is converging with or diverging from open market economies. Over the course of two decades, China has risen from the world’s sixth-largest economy, with a gross domestic product (GDP) of $1.2 trillion in 2000, to the second largest, boasting a GDP of $17.95 trillion in 2022. China now intersects with the interests of all nations, businesses, and individuals. With China’s past and future systemic choices impacting the world in both positive and negative ways, it is essential to understand its global footprint. The hope is that China Pathfinder’s approach and findings can fill in some of the missing puzzle pieces in this ongoing debate—and, in turn, inform policymakers and business leaders seeking to understand China.

Partners

The Atlantic Council is a nonpartisan organization that galvanizes US leadership and engagement worldwide, in partnership with allies and partners, to shape solutions to global challenges. By informing its network of global leaders, the Atlantic Council provides an essential forum for navigating the economic and political changes defining the twenty-first century. The Atlantic Council shapes policy choices and strategies to create a more free, secure, and prosperous world through the papers it publishes and the ideas it generates.

Rhodium Group is a leading independent research provider. Rhodium Group has one of the largest China research teams in the private sector, with a consistent track record of producing insightful and path-breaking analysis. Rhodium China provides research, data, and analytics to the private and public sectors that help clients understand and anticipate changes in China’s macroeconomy, politics, financial and investment environment, and international interactions.

Authors

This report was produced by Rhodium Group’s China team in collaboration with the Atlantic Council’s GeoEconomics Center. The principal contributors on Rhodium’s team were Daniel H. Rosen, Matthew Mingey, Charles Austin Jordan, and Laura Gormley. The principal contributors from the Atlantic Council’s GeoEconomics Center were Josh Lipsky, Jeremy Mark, Sophia Busch, and Benjamin Lenain.

Acknowledgments

The authors wish   to   acknowledge   a   superb   set of colleagues and fellow analysts who helped us strengthen the study in group review sessions and individual consultations. These individuals took the time, in their private capacity, to critique the indicators and analysis in draft form; offer suggestions, warnings, and advice; and help us to ensure that this initiative makes a meaningful contribution to public debate.

The authors also wish to acknowledge the members of the China Pathfinder Advisory Council: Steven Denning, Gary Rieschel, and Jack Wadsworth, whose partnership has made this project possible.

This report is written and published in accordance with the Atlantic Council’s intellectual independence policy. The authors are solely responsible for its analysis and recommendations. The Atlantic Council, Rhodium Group, and its donors do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions. This report is published in conjunction with an interactive data visualization toolkit, at http://chinapathfinder.org/. Future quarterly and annual updates to the China Pathfinder Project will be published on the website listed.

1    Daniel H. Rosen, Avoiding the Blind Alley: China’s Economic Overhaul and Its Global Implications, Asia Society Policy Institute and Rhodium Group, October 2014, https://rhg.com/wpcontent/uploads/2014/10/AvoidingBlindAlley_FullReport.pdf.
2    Global Times, “China’s NBS launches statistical inspection in six provinces to shore up official data authenticity,” July 26, 2023, https://www.globaltimes.cn/page/202307/1295091.shtml.
3    Center for Strategic and International Studies, “Broken Abacus? A More Accurate Gauge of China’s Economy,” September 15, 2015, YouTube video, https://www.csis.org/events/broken-abacus-more-accurate-gauge-chinas-economy.
4    Brad W. Setser, “China’s Imaginary Trade Data,” Follow the Money (blog), Council on Foreign Relations, August 14, 2024, https://www.cfr.org/blog/chinas-imaginary-trade-data
5    Hudson Lockett and Joseph Cotterill, “‘Uninvestable’: China’s $2tn stock rout leaves investors scarred,” Financial Times, February 2, 2024https://www.ft.com/content/88c027d2-bda6-4e52-97f3-127197aef1bd.
6    William Hynes, Patrick Love, and Angela Stuart, eds., The Financial System (Paris: Organisation for Economic Co-operation and Development, 2020),https://www.oecd-ilibrary.org/finance-and-investment/the-financial-system_d45f979e-en
7    In error, previous China Pathfinder cycles incorrectly calculated real interest rates, affecting scoring for China and the other sample countries. This error is corrected for 2023, and data should be seen as superseding previous versions.
8    Katsiaryna Svirydzenka, “Introducing a New Broad-based Index of Financial Development,” IMF Working Paper WP/16/5, January 2016, https://www.imf.org/en/Publications/WP/Issues/2016/12/31/Introducing-a-New-Broad-based-Index-of-Financial-Development-43621
9    This reflects a rebase from the score in our previous annual report, accounting for China’s score with the new composite indices deployed.
10    Tom Hancock, “China Kicks Off $137 Billion Plan to Tackle LGFV Debt Risk,” Bloomberg, September 27, 2023, https://www.bloomberg.com/news/articles/2023-09-27/china-starts-local-government-debt-swap-program?embedded-checkout=true&sref=H0KmZ7Wk.
11    Shen Cheng, “透视我国增发2023年国债1万亿元的深意” [The profound meaning of my country’s additional issuance of 1 trillion yuan of national debt in 2023], Xinhua, October 24, 2023, https://cn.chinadaily.com.cn/a/202310/25/WS65386944a310d5acd876ba70.html.
12    Monetary Policy Analysis Group of the People’s Bank of China, China Monetary Policy Report Q4 2023, People’s Bank of China, February 8, 2024, 17, http://www.pbc.gov.cn/en/3688229/3688353/3688356/4756453/5330013/2024041610102997035.pdf.
13    China Securities Regulatory Commission, “全面实行股票发行注册制制度规则发布实施” [The rules for the full implementation of the stock issuance registration system have been issued and implemented], February 17, 2023, http://www.csrc.gov.cn/csrc/c100028/c7123213/content.shtml.
14    State Council, “推进制度型开放若干措施的通知” [Notice on several measures to promote institutional opening-up], June 29, 2023, https://www.gov.cn/zhengce/content/202306/content_6889026.htm.
15    Blanka Kalinova, Angel Palerm, and Stephen Thomsen, “OECD’s FDI Restrictiveness Index. 2010 Update,” OECD Working Papers on International Investment, No. 2010/03, Organisation for Economic Co-operation and Development, August 1, 2010, https://doi. org/10.1787/5km91p02zj7g-en.
16    Methodologies to measure market competition,” OECD, accessed September 25, 2024, https://web-archive.oecd.org/temp/2022-12-16/547046- methodologies-to-measure-market-competition.html.
17    Standing Committee of the National People’s Congress, “中华人民共和国反间谍法” [Counterespionage Law of the People’s Republic of China], April 26, 2023, https://flk.npc.gov.cn/detail2.html?ZmY4MDgxODE4N2FhMzJmOTAxODdiZDJlNDQwYjA1MmE=.
18    Kelly Ng, “Capvision: China raids another consultancy in anti-spy crackdown,” BBC, May 9, 2023, https://www.bbc.com/news/world-asia- china-65530082.
19    Reuters, “China fines Deloitte $31 million for auditing negligence,” March 17, 2023, https://www.reuters.com/business/china-fines-deloitte-31-mln- auditing-negligence-2023-03-18/.
20    Tristan L. Botelho, Daniel Fehder, and Yael Hochberg, “Innovation-Driven Entrepreneurship,” Working Paper 28990, National Bureau of Economic Research, 2021, https://www.nber.org/system/files/working_papers/w28990/w28990.pdf.
21    Kyle Stanford, “Final data for 2023 illustrates the extent of VC’s tough year,” PitchBook, January 6, 2024, https://pitchbook.com/newsletter/final- data-for-2023-illustrates-the-extent-of-vcs-tough-year.
22    One caveat for this indicator is that some of the input data may be subject to distortions from international tax optimization practices and balance of payments (BOP) data quality problems.
23    Halit Yanikkaya, “Trade Openness and Economic Growth: A Cross-Country Empirical Investigation,” Journal of Development Economics 72 (1): 57–89, https://doi.org/10.1016/s0304-3878(03)00068-3.
24    The figures presented here are different from what was previously reported in China Pathfinder 2023. The underlying data series utilized for this benchmark indicator underwent revision as the OECD migrated its data platform. These balances are derivative of BOP figures and were likely updated as the 2023 figures were published. While the precise numbers are different, the direction of change and subsequent conclusions remain the same.
25    Chad P. Bown and Douglas A. Irwin, “What Might a Trump Withdrawal from the World Trade Organization Mean for US Tariffs?” Policy Briefs 18- 23, Peterson Institute for International Economics, November 2018, https://www.piie.com/publications/policy-briefs/what-might-trump-withdrawal- world-trade-organization-mean-us-tariffs.
26    Organisation for Economic Co-operation and Development, OECD Services Trade Restrictiveness Index: Policy trends up to 2020, January 2, 2021, https://www.oecd-ilibrary.org/trade/oecd-services-trade-restrictiveness-index-policy-trends-up-to-2021_611d2988-en.
27    Janos Ferencz, “The OECD Digital Services Trade Restrictiveness Index,” OECD Trade Policy Papers No. 221, OECD Publishing, 2019, https://doi. org/10.1787/16ed2d78-en.
28    Joe Leahy et al., “Xi Jinping says China’s exports are helping to ease global inflation,” Financial Times, April 16, 2024, https://www.ft.com/ content/7cc89622-66a7-4b1c-9b2e-138f121a4731.
29    Andrés Fernández et al., “Capital Control Measures: A New Dataset,” IMF Economic Review 64 (2016): 548–574, https://doi.org/10.1057/ imfer.2016.11.
30    Menzie D. Chinn and Hiro Ito, “What matters for financial development? Capital controls, institutions, and interactions,” Journal of Development Economics 81 (1): 163–192, https://doi.org/10.1016/j.jdeveco.2005.05.010.
32    Rhodium Group analysis of Ministry of Commerce (MOFCOM) and State Administration of Foreign Exchange (SAFE) data. The gap between SAFE and MOFCOM’s estimates reflects reporting and methodological differences; both datasets show a drop in inbound investment in recent years. See Nicholas R. Lardy, “Foreign direct investment is exiting China, new data show,” Realtime Economics (blog), Peterson Institute for International Economics, November 17, 2023, https://www.piie.com/blogs/realtime-economics/foreign-direct-investment-exiting-china-new-data-show.
33    Agatha Kratz et al., Chinese FDI in Europe: 2023 Update, Rhodium Group and MERICS, June 6, 2024, https://rhg.com/research/chinese-fdi-in- europe-2023-update/.
34    State Council, “国务院印发关于在有条件的自由贸易试验区和自由贸易港试点对接国际高标准推进制度型开放若干措施的通知]” [Notice of the State Council on Several Measures to Promote Systematic Liberalization by Matching International High Standards on a Pilot Basis in Conditional Pilot Free Trade Zones and Free Trade Ports], June 29, 2023, https://www.gov.cn/zhengce/content/202306/content_6889026.htm
35    State Council, “加大吸引外商投资力度的意见” [Opinions on increasing efforts to attract foreign investment], August 13, 2023, https://www.gov. cn/zhengce/content/202308/content_6898048.htm.
36    China’s National Development and Reform Commission and the Ministry of Commerce jointly maintain a “Negative List” limiting or prohibiting foreign investment, such as in certain areas of manufacturing, healthcare, and telecommunications. See MOFCOM, “跨境服务贸易特别管理措施(负面清单)2024年版” [Special Administrative Measures for Cross-Border Trade in Services (Negative List) 2024 edition], March 22, 2024, https://www.gov.cn/gongbao/2024/issue_11366/202405/content_6954195.html.
37    China Securities Regulatory Commission, “关于上线境内企业境外发行上市备案管理信息系统的通知” [Notice on the launch of the domestic enterprise overseas listing registration management information system], February 17, 2023, http://www.csrc.gov.cn/csrc/c101932/c7124559/ content.shtml.
38    Yingzhi Yang, Brenda Goh, and Josh Horwitz, “China acquires ‘golden shares’ in two Alibaba units,” Reuters, January 13, 2023, https://www. reuters.com/technology/china-moving-take-golden-shares-alibaba-tencent-units-ft-2023-01-13/.
39    Logan Wright, Grasping Shadows: The Politics of China’s Deleveraging Campaign, Center for Strategic and International Studies, April 10, 2023, https://www.csis.org/analysis/grasping-shadows-politics-chinas-deleveraging-campaign.
40    Abhishek Vishnoi and Charlotte Yang, “China’s $6.3 Trillion Stock Selloff Is Getting Uglier by the Day,” Bloomberg, January 19, 2024, https:// www.bloomberg.com/news/articles/2024-01-19/china-s-6-3-trillion-stock-selloff-is-getting-uglier-by-the-day?sref=E0nAM78N&embedded- checkout=true.
41    For further evidence supporting this, see: Logan Wright, “China’s Economy Has Peaked. Can Beijing Redefine its Goals?” China Leadership Monitor, September 2024. https://www.prcleader.org/post/china-s-economy-has-peaked-can-beijing-redefine-its-goals.

The post End of the line: The cost of faltering reforms appeared first on Atlantic Council.

]]>
Transatlantic horizons: A collaborative US-EU policy agenda for 2025 and beyond https://www.atlanticcouncil.org/in-depth-research-reports/report/transatlantic-horizons-a-collaborative-us-eu-policy-agenda-for-2025-and-beyond/ Mon, 07 Oct 2024 15:00:00 +0000 https://www.atlanticcouncil.org/?p=792962 With new leadership on both sides of the Atlantic, this report outlines an agenda for common action for the next US administration and European Commission.

The post Transatlantic horizons: A collaborative US-EU policy agenda for 2025 and beyond appeared first on Atlantic Council.

]]>
This year marks a critical moment for the transatlantic relationship. Elections on both sides of the Atlantic will usher in new governments, administrations, and commissions for some 785 million people across the United States and European Union (EU). Transition and turnover for a new US administration and European Commission specifically offer a chance to reflect on what’s working in US-EU relations and to adapt what’s not.

This report offers an agenda for common US-EU action to meet today’s challenges and set a productive vision for transatlantic relations for years to come. It identifies the issues policymakers must tackle and presents actionable recommendations for the next US administration and European Commission. The topics are varied, highlighting the breadth and depth of the US-EU relationship.

The analysis and recommendations are nonpartisan, but they are driven by the Atlantic Council’s conviction that we are stronger together. From technology policy to the green energy transition and support for Ukraine, Washington and Brussels both benefit when they collaborate.

read the essays

James Batchik served as the rapporteur and editor of this report. Stuart Jones and Jacopo Pastorelli also contributed to the report.

Explore the Transatlantic Horizons series

hear from the experts on #AtlanticDebrief

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

The post Transatlantic horizons: A collaborative US-EU policy agenda for 2025 and beyond appeared first on Atlantic Council.

]]>
Navigating between data war and peace https://www.atlanticcouncil.org/in-depth-research-reports/report/navigating-between-data-war-and-peace/ Mon, 07 Oct 2024 15:00:00 +0000 https://www.atlanticcouncil.org/?p=793057 A true settlement on transatlantic data flows should be the focus of the next administrations in the United States and the European Union, or the conflict could flare again.

The post Navigating between data war and peace appeared first on Atlantic Council.

]]>
This essay is part of the report “Transatlantic horizons: A collaborative US-EU policy agenda for 2025 and beyond,” which outlines an agenda for common action for the next US administration and European Commission.

The bottom line

Ever since Edward Snowden revealed details on the US National Security Agency (NSA) covertly collecting Europeans’ electronic communications, companies have contended with deep uncertainty over whether they may continue to transfer personal data from Europe to the United States. Washington and Brussels, in their efforts to resolve a long-running dispute with major commercial consequences, have vacillated between data war and peace. A true settlement should be the focus of the next administrations in the United States and the European Union (EU), or the conflict could flare again. For the time being, a fragile truce prevails.

Commercial data transfers from the EU to the United States

State of play

As a direct result of the Snowden revelations, the Luxembourg-based Court of Justice of the EU (CJEU) twice invalidated EU-US international arrangements designed to ensure transatlantic data transfers consistent with EU privacy law. In 2015, the EU-US Safe Harbor Framework was struck down by the court, and in 2020, a successor arrangement, the Privacy Shield, met the same fate.

A third transfer arrangement, the EU-US Data Privacy Framework (DPF), concluded in 2023, put significant additional safeguards in place for Europeans’ personal data. Another legal challenge was immediately filed at the CJEU, this one by Philippe Latombe, a French parliamentarian. The court quickly denied Latombe’s request for a temporary injunction to suspend the application of the DPF. Final disposition of the case remains pending, though many commentators believe it ultimately will fail for procedural reasons.

A greater litigation threat looms, however. The European privacy advocacy organization NOYB —short for None of Your Business—headed by Austrian privacy activist Max Schrems, issued a statement last year suggesting that it also was considering a judicial challenge. There are recent signs that it could be close to doing so. Austria has just implemented a new EU directive enabling consumer protection organizations to file suits for collective redress—a European equivalent to US-style class action lawsuits. NOYB may avail itself of this new remedy in an Austrian court in an effort to block the DPF. A referral to the CJEU could follow quickly, setting the stage for a decisive legal determination by the judges in Luxembourg in the next year or two.

Looking ahead

For the time being, there is little for European Commission and US officials to do other than to jointly ensure that the DPF’s safeguards are being rigorously applied and to sharpen their arguments for the EU legal challenge. The DPF’s prospects before the CJEU are mixed. US observers tend to be impressed by the creativity and seriousness of the reforms that the US government has put in place. However, some European counterparts are more skeptical, pointing out remaining areas where the US steps still may fall short of strict CJEU fundamental rights requirements.

If the DPF, like its predecessors, were to be struck down, a new US administration—Democratic or Republican—might well hesitate whether to go back to the negotiating table with the European Commission for a fourth time. Adding even more US legal safeguards to protect Europeans’ personal data would likely require enactment of a US statute—a doubtful proposition in a new Congress—and could run up against US constitutional constraints.

A Trump administration could well conclude that enough is enough—that instead, it is time to fight back against endless European threats to transatlantic data flows. The Heritage Foundation‘s Project 2025 report, which was written by the former president’s allies though he has distanced himself from it, already has called for a skeptical review of the DPF safeguards and has mooted the possibility of curtailing US intelligence sharing with European governments if commercial data sharing is interrupted. Such an approach would once again vault data transfers into the first rank of transatlantic economic conflict.

Law enforcement data transfers

State of play

The NSA is not the only US challenge the EU sees to its digital sovereignty. Running a close second is the CLOUD Act, a 2018 US law. It empowers US law enforcement to demand that US cloud service providers turn over personal data companies host on foreign servers, including those located in Europe. Although several EU countries, including Belgium, give their prosecutors similar extraterritorial criminal evidentiary powers, the CLOUD Act has been heavily criticized in Europe.

However, the CLOUD Act also offers foreign governments an olive branch to accompany its unilateral offensive provisions. It authorizes the US Department of Justice (DOJ) to negotiate binding international agreements establishing the terms and limits under which each may directly seek electronic evidence from communications service providers. The United States has already reached such agreements with the United Kingdom and Australia, and negotiations with other Five Eyes nations are underway.

For the past five years, the DOJ and the European Commission also have been negotiating a CLOUD Act agreement. The talks paused for several years while the EU finalized its own counterpart legislation, the E-Evidence Regulation, but resumed actively last year. Progress has been slow and difficult. But in June, senior EU and US home affairs and justice officials issued an optimistic joint statement welcoming “further progress” in the negotiations and looking forward to “advancing and completing” them.

Policy recommendations

Now that an agreement appears to be within reach, negotiators should redouble their efforts to finalize the text—or at least come to a political agreement in principle— by the end of this year, before changes in leadership on both sides. Although transatlantic law enforcement negotiations historically have been largely nonpartisan in nature, a Trump administration DOJ might nonetheless question whether to continue negotiations with the EU.

Completing the CLOUD Act agreement would neutralize EU sensitivities over judicial sovereignty in a way comparable to how the DPF has quieted concerns over US foreign surveillance activities in Europe. The two, taken together, would bring an important measure of data peace to transatlantic digital relations.

National security limits to data transfers

State of play

After four decades of propounding unrestricted international commercial data flows, in late 2023, the United States made a course correction—opting to control certain data exports to China, Russia, and other “foreign adversaries” for national security reasons. The new approach is reflected in both legislation and an executive order. The measures will subject a range of data flows to these countries to either outright bans or export controls through a regime akin to what is in place for goods.

The United States similarly reversed course in a World Trade Organization (WTO) negotiation intended to liberalize services trade, the Joint Statement Initiative on Electronic Commerce (JSI). Last fall, the Office of the US Trade Representative unexpectedly withdrew its proposal that the prospective agreement guarantee the free flow of data across borders. The final text of the JSI, announced in July, not only lacks such an obligation, it also allows parties essentially unlimited scope to restrict data flows for data protection reasons, as the EU had sought.

Most notably, the United States singled out its view that the essential security exception is inadequate as a reason for deciding not to join the JSI agreement. That provision simply refers to the essential security exception in the existing General Agreement on Trade and Tariffs (GATT) and the General Agreement on Trade in Services (GATS). Although the United States traditionally had taken a broad view of the GATT/GATS provisions, it now appears to believe that its new national security data controls might not pass WTO muster. Thus, the United States has come full circle on digital trade—from being a principal proponent of free data flows to an opponent of a traditional multilateral limitation on its ability to restrict them for security reasons.

The new US multilateral posture on data transfers reflects a degree of convergence between Washington and Brussels on the proper extent to which data protection may be invoked as a limitation, no doubt to Brussels’ satisfaction. The European Commission has acknowledged some puzzlement, however, over why the United States is no longer content with the WTO’s historic national security exception.

Looking ahead

Neither a Democratic nor a Republican US administration is likely to alter the new approach emphasizing national security considerations in data flows to certain adversary countries.

Although Europe is not, of course, the home of “foreign adversary” countries, the new US policy could eventually pose problems there if Washington were to pressure European governments to adopt similar measures. Alternatively, the United States could seek to directly shut down data transfers from European companies to China and Russia analogous to how it has employed secondary sanctions in the financial realm.

Such steps could pose dilemmas in Europe. The EU, as an institution, largely lacks meaningful authority over export controls, which are reserved to member states, as are national security measures. Individual member states would struggle to develop coherent responses to such potential US pressure.

The United States and the EU have come far toward settling on safeguards accompanying access to personal data by their national security and law enforcement authorities, but definitive resolution in both areas still awaits. In the meantime, new concerns over foreign adversaries’ access to data have emerged, also calling for transatlantic coordination.


Kenneth Propp is a nonresident senior fellow at the Atlantic Council’s Europe Center. He teaches EU law at Georgetown University Law Center and is a former legal counselor to the US Mission to the European Union in Brussels.

read more essays

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

The post Navigating between data war and peace appeared first on Atlantic Council.

]]>
Looking ahead to the next chapter of US-EU digital collaboration https://www.atlanticcouncil.org/in-depth-research-reports/report/looking-ahead-to-the-next-chapter-of-us-eu-digital-collaboration/ Mon, 07 Oct 2024 15:00:00 +0000 https://www.atlanticcouncil.org/?p=793525 There are opportunities for further transatlantic collaboration, especially in addressing emerging technologies and the risks both sides face from bad actors in the digital sphere.

The post Looking ahead to the next chapter of US-EU digital collaboration appeared first on Atlantic Council.

]]>
This essay is part of the report “Transatlantic horizons: A collaborative US-EU policy agenda for 2025 and beyond,” which outlines an agenda for common action for the next US administration and European Commission.

The bottom line

In the past four years, during Ursula von der Leyen’s first term as European Commission president and Joe Biden’s time as US president, there has been a strong convergence across the Atlantic in the governmental approach to digital and technology-related issues. However, the transatlantic agenda for the coming years remains unclear and will depend on the impact of the debate over competitiveness now emerging in Europe and the outcome of the US election in November. There are opportunities for further collaboration, especially in addressing emerging technologies and the risks both sides face from bad actors in the digital sphere. Whether this will be an effort driven by the European Union (EU) or one in which the United States is an equal partner is not yet certain.

State of play

Von der Leyen entered office in late 2019 with a strong focus on digital policy. Despite the pressures of the COVID-19 pandemic and Russia’s full-scale invasion of Ukraine, the European Commission put forward a tsunami of legislation, most of which has now passed, including the Digital Markets Act, Digital Services Act (DSA), Data Governance Act, Data Act, Cyber Resilience Act, and the Artificial Intelligence Act. While there is a growing debate about the impact of such extensive regulation on European innovation, as discussed in former President of the European Central Bank Mario Draghi’s recent report on competitiveness, there are few indications of any back-tracking on these new laws.

In contrast, the Biden administration entered office without strong ambitions in this area, although the president had expressed some concerns about the impact of social media on the electorate. However, there was a big shift in the administration’s attitude toward artificial intelligence (AI) as that technology developed. Through a series of “blueprints,” voluntary guidelines, and executive orders, the Biden administration has largely adopted the EU’s risk-based approach to AI, at least in its assessment of the dangers and its objectives.

This convergence in tech policy cannot be divorced from the growing transatlantic alignment on China. The Biden administration has emphasized the need for greater oversight and restrictions on transfers of technology and data to that country. The 2023 suspension of US participation in the World Trade Organization’s digital trade efforts and the citing of national security considerations in limiting data flows to “countries of concern,” including China, seem to mark a turning away from the long-held US commitment to open data flows. Moreover, the Protecting Americans’ Data from Foreign Adversaries Act passed as part of a foreign aid package for Ukraine and Israel puts restrictions on data brokers that receive US personal data based on their foreign ownership.

In Europe, there has been a growing caution about Chinese equipment and investments in the communications and high-tech sectors, although the policy is often described as differentiating between trusted and untrusted vendors. Most recently, the EU has opened investigations into China’s subsidization of its electric vehicle (EV) battery and wind turbine industries. Although there are still differences, the last four years have seen a growing transatlantic consensus on the risks posed by China’s anti-competitive behavior and its impact on US and EU autonomy in key technologies.

The strategic imperative

The US-EU digital relationship is one of the strongest and most lucrative in the world—US tech companies earn more in Europe than anywhere else in the world. At the same time, EU rules affect those companies’ operations not only in the European market but often far beyond. The question for US and EU policymakers is how to create a more coherent transatlantic—and perhaps even global—digital marketplace, one where regulation and innovation incentives can be balanced. Can the United States and the EU find enough common ground to achieve that ambition? If they do not cooperate—and perhaps even adopt opposing policy approaches—will companies then face two distinct markets? In that circumstance, will the EU become even more focused on digital sovereignty and restrictive regulations while the United States becomes a relatively less-regulated space? Will companies be forced to choose whether to adhere to strict European regulations or forgo the profitable European market?

Looking ahead

Whether the United States and the EU will succeed in building greater cooperation on digital and tech issues will depend in large part on two factors. First, the EU is engaged in an internal discussion on how to enhance the bloc’s economic competitiveness. A key element of that should be to provide a more business-friendly environment across the economy while encouraging citizens, governments, and businesses to participate in the digital transition and provide the protections they expect. Competitiveness does not mean no regulation, but rather that compliance with the rules does not create prohibitive burdens, especially for innovative start-ups. Europe also needs to boost its digital engagement and provide its people with the skills needed to flourish in the digital economy. In short, will it be Estonia or France that emerges as the model for how Europe balances regulation and innovation? If Europe comes to believe that the only way it can enhance its competitiveness is by restricting certain markets to European companies, transatlantic cooperation will inevitably become more challenging.

Second, the future of US-EU collaboration will also depend on the outcome of the US presidential election. Although digital and tech policy has figured little in the race to date, there are some clear differences. Vice President Kamala Harris has been deeply engaged in the Biden administration’s approach to AI, and measures such as those in the Biden administration’s executive order on AI are likely to be reinforced in a Harris administration.

The path forward is murkier if former President Donald Trump returns to the White House. He has already said that he would withdraw the Biden administration executive order on AI, a move that would distance the United States from the Group of Seven and others who seek to constrain some uses of AI. While messages from the Trump campaign have been mixed when it comes to the large tech companies, the conservative manifesto Project 2025 has called for the end of the Federal Trade Commission and its anti-trust role, as well as removing environmental and other rules that the project’s authors believe have constrained the growth of technology companies. This position will be received with much skepticism, if not alarm, in Europe. US tech companies are already viewed in Europe as under-regulated, and a relaxation of current US rules is likely to lead Europe to respond by stepping up enforcement of its new digital rules even further. Even if a Trump administration does not roll back existing regulation, all indications are that it will resist any further constraints on tech companies, including measures such as labeling AI-generated content or restricting the distribution of fake videos. Such a stance is unlikely to provide a foundation for greater US-EU cooperation.

For much of the last four years, the EU has been a world leader when it comes to tech regulation, while the United States, in some areas, has not even had a policy in place. Some would argue that the EU’s focus on regulation has hampered corporate innovation and the opportunity for European tech superstar companies to develop. That may be, but in the absence of comparable US regulation, the EU has become the default arbiter of rules that govern the digital economy, including the global behavior of US companies. Unless the United States engages more actively—including putting forward concrete legislative and regulatory proposals—Europe is likely to continue to set the pace, especially on regulating AI and disinformation. And if the United States fails to enact guardrails in the digital sector and instead decides that the digital economy should continue to be lightly regulated, the EU is likely to respond by strengthening enforcement of its own rules, especially against US companies. Consistent and constructive US-EU regulatory engagement, therefore, is an essential component of a transatlantic digital marketplace.

Policy recommendations

The United States and the EU should focus on a few key areas to create a more coherent transatlantic digital marketplace. These do not represent the entire universe of existing digital policy. (One area omitted here is competition policy, which is governed by distinct legal processes in the United States and the EU.) It should also be noted that during the coming years, entirely new areas of digital and tech are likely to emerge as crucial in the transatlantic partnership. Thus, it is important that a mechanism exists that allows for continuous conversations about these matters. During 2021–24, the US-EU Trade and Technology Council (TTC) provided valuable opportunities for consultation and for aligning US and EU approaches. During the next US administration, a revamped TTC or similar mechanism should be available to ensure continued close communication across the Atlantic on these fast-moving issues.

Cybersecurity: During the past few years, the United States and Europe have experienced an increasing number of cyberattacks, although specific numbers are difficult to secure, given that not every victim reports an attack. In 2023, the cost of cybercrime was estimated at $11.5 trillion and is expected to be almost $15 trillion in 2024. Both China and Russia have been identified as facilitating—if not ordering—some of these attacks, demonstrating cyber’s growing role as a key area of hostile state action, in addition to the longtime involvement of criminal enterprises. Coordinating policy toward cyberattacks and developing greater cyber resilience should be a top priority for policymakers. The US-EU Cyber Dialogue has been important in facilitating dialogue about specific attacks and strategies for countering those efforts. Recently, it has also started to address the different US and EU regulatory measures aimed at creating resilience, both in critical infrastructure and in connected devices. Coordination between the United States and the EU will be essential not only in ensuring that consumers are safe but also in building the collaboration required to keep societies secure in the face of a growing onslaught by hostile actors. Some important steps have been taken, but the threat will evolve, and so must the response.

AI and emerging technologies: One of the biggest successes of the TTC was the convergence it inspired on the issue of AI. While the EU led with the AI Act, the Biden administration gradually moved from inaction to establishing voluntary guidelines and then to issuing Executive Order 14110 imposing rules on those seeking to do AI-related business with the US government. The commercialization of ChatGPT happened just as the AI Act was nearing completion, and a few provisions were hastily added in response, especially to ensure that generative AI was treated as high risk. While the United States will probably struggle to pass comprehensive AI legislation, some US states have started to fill the domestic breach by passing their own AI laws. For example, the Colorado law passed in May imposes similar restrictions and responsibilities on AI developers as does the EU AI Act. But there is no denying that AI is a rapidly evolving technology that will require ongoing government review and regulation. Indeed, Microsoft president Brad Smith recently called for more government regulation to combat “abusive AI-generated content.” During the next five years, as AI is integrated into people’s daily lives and as more uses (good and bad) develop, US-EU cooperation in facilitating the productive use of AI while constraining its harmful uses will be essential. As a first step, transatlantic conversations about the implementation of rules for the EU AI Act will determine how compatible US and EU rules will be in practice.

Quantum computing: AI is not the only technology that requires cooperation across the Atlantic. Quantum computing has already been identified by the TTC as the next emerging technology worthy of focus. Given the enhanced power and computing speed that quantum would provide for researchers and AI developers and deployers, for example, there is definite value in the technology. But it also offers those same capabilities to those seeking to hack into critical infrastructure systems or financial or healthcare institutions. Thus, ensuring that quantum capabilities are securely held should be a top transatlantic priority for ongoing tech discussions. On September 5, the US Commerce Department issued rules establishing export controls on certain elements of quantum computing. Although some EU member states were identified as eligible for exemptions from these restrictions, the EU as a whole is not. Discussions on quantum computing are already underway in the TTC, but they are now more urgent so that the United States and the EU can maintain a united front.

Data governance: This topic should also be much higher on the list of US-EU priorities than it has been in the past. To date, this discussion has focused on ensuring the transfer of EU personal data to the United States in the commercial setting in a manner compatible with the EU General Data Protection Regulation. But the recent US decision to begin limiting how US data can be shared and the continuing US-EU negotiation on law enforcement access to electronic evidence make this issue one that is ripe for intensive US-EU discussions, especially as the new Commission will present a European Data Union Strategy. The United States and the EU urgently need to build more consensus in the movement and governance of data.

Online safety and combating disinformation: In the wake of the European Parliament elections—and with the US elections looming—increased attention should be paid to the threat of intentional disinformation, as well as the harms done by online targeting of individuals. AI has escalated this threat, as demonstrated by faked audio recordings released during the Slovak election campaign and the AI-generated fake video of Harris featured on X. While the EU has the DSA and other legislation to rein in illegal and harmful content, the United States has resisted such measures, citing free-speech protections. Once the US elections are over and the impact of online and offline disinformation can be assessed, this should become an important area of collaboration between the two democracies. But there is also great potential for transatlantic tensions in this area, especially since European and US ideas—and laws—on free and prohibited speech can vary. A Trump administration may well view EU attempts at content moderation under the DSA as efforts to censor free speech. Recent communications between then-European Commissioner Thierry Breton and X owner Elon Musk demonstrate the potential for misunderstanding, especially if the focus becomes harmful, rather than illegal, speech. In the future, close consultation will be essential if the US-EU partnership is to be effective in managing real disinformation.


Frances G. Burwell is a distinguished fellow at the Atlantic Council’s Europe Center and a senior director at McLarty Associates.

read more essays

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

The post Looking ahead to the next chapter of US-EU digital collaboration appeared first on Atlantic Council.

]]>
#AtlanticDebrief – How can policymakers navigate between data war and peace? | A debrief from Kenneth Propp https://www.atlanticcouncil.org/content-series/atlantic-debrief/atlanticdebrief-how-can-the-us-and-eu-navigate-between-data-war-and-peace-a-debrief-from-kenneth-propp/ Mon, 07 Oct 2024 15:00:00 +0000 https://www.atlanticcouncil.org/?p=609809 Kenneth Propp outlines the challenges and opportunities for US-EU alignment on international commercial data flows including the role of national security.

The post #AtlanticDebrief – How can policymakers navigate between data war and peace? | A debrief from Kenneth Propp appeared first on Atlantic Council.

]]>

IN THIS EPISODE

As Europe and the United States navigate leadership change and turnover on both sides of the Atlantic, the Europe Center’s new report Transatlantic horizons: A collaborative US-EU policy agenda for 2025 and beyond offers a productive vision for transatlantic relations with forward-looking policy recommendations for the next US administration and European Commission

On this special edition of the #AtlanticDebrief, Europe Center Nonresident Senior Fellow Kenneth Propp discusses his section of the report “Navigating between data war and peace” and recommendations for policymakers on both sides of the Atlantic.

ABOUT #ATLANTICDEBRIEF

MEET THE #ATLANTICDEBRIEF HOST

The post #AtlanticDebrief – How can policymakers navigate between data war and peace? | A debrief from Kenneth Propp appeared first on Atlantic Council.

]]>
China’s lobbying did not block the EU’s new EV tariffs. But it may yet weaken them. https://www.atlanticcouncil.org/blogs/new-atlanticist/chinas-lobbying-did-not-block-the-eus-new-ev-tariffs-but-it-may-yet-weaken-them/ Fri, 04 Oct 2024 19:59:50 +0000 https://www.atlanticcouncil.org/?p=797462 The European Union voted on October 4 to increase tariffs on Chinese battery electric vehicles, but this is just the beginning—especially if Beijing gets its way.

The post China’s lobbying did not block the EU’s new EV tariffs. But it may yet weaken them. appeared first on Atlantic Council.

]]>
European Union (EU) member states voted in favor today of allowing the European Commission to increase tariffs by up to 35.3 percent on Chinese battery electric vehicles (BEVs). The new levies are expected to go into effect by October 31. Although this decision signals growing alignment with the United States, there are important contextual differences that make transatlantic coordination on China’s economic practices even more essential.

How Washington and Brussels differ

The United States and EU have approached this issue from very different starting points. Unlike the EU, the United States navigated this process more smoothly since the measures were preemptive. The United States had little prior exposure to Chinese BEV imports or US BEV exports to China, making its decisions easier.

In May, the Biden administration announced a swath of tariffs on Chinese products in strategic sectors, including an increase of the tariff rate on Chinese BEVs from 25 percent to 100 percent under Section 301 of the Trade Act of 1974. The administration argued that the Chinese government’s subsidies in that industry contribute to unfair, nonmarket practices that would threaten the US auto industry and American jobs. Canada followed suit a few months later, announcing an increase from a tariff rate of 6.1 percent to 100 percent on Chinese BEV imports. And more recently, in late September, the US Commerce Department proposed rules that would “prohibit the sale or import of connected vehicles that incorporate certain technology and the import of particular components themselves from countries of concern, specifically the People’s Republic of China (PRC) and Russia” due to national security concerns.

While the United States has already moved on from tariffs to the national security issues surrounding connected vehicles, the EU understandably moved at a slower pace. This is due to the differing priorities of its member states, many of which are already significantly exposed to China in this sector. European Commission President Ursula von der Leyen announced the launch of the official European Commission investigation a year ago, stating that the EU’s leadership and innovation in the BEV sector “are being impeded by market distortions and unfair competition” by China. However, the need for approval by member states made the EU’s decision on this issue more fraught, which led to the emergence of two main factions. One group, led by von der Leyen and French President Emmanuel Macron, advocated for strengthening the tariffs to address market distortions. The other, led primarily by German Chancellor Olaf Scholz and supported by the German auto industry, had been Beijing’s ally on the inside, opposing these measures, largely due to enormous overexposure to Chinese markets. Unlike the United States’ situation, the results of the October 4 vote should also not be taken to mean that EU countries supporting the tariffs, such as France and Italy, are entirely against growing their engagement with China on BEVs.

China’s campaign to divide the EU

In recent months, China carried out a campaign aimed at dividing the EU on this issue ahead of the October 4 vote. Beijing ramped up these efforts further after the bloc set its provisional tariff rates in July, which were slightly reduced in August following a comment period. China’s campaign included leader-level outreach from Xi Jinping, as well as talks led by Minister of Commerce Wang Wentao and Minister of Foreign Affairs Wang Yi. Wang Wentao’s EU-level negotiations, combined with efforts from Scholz, showed some initial progress with the postponement of the final vote from September 25 to October 4. This postponement followed Wang Wentao’s meeting with European Commission Executive Vice-President Valdis Dombrovskis on September 19, which gave China a final opportunity to provide an attractive enough deal for the EU to mitigate the tariffs or end the inquiry altogether before the vote. Although the new vote date moved forward as scheduled, the European Commission has left the door open for continued negotiations with China even after the tariffs go into effect at the end of this month.

The most public tactic Beijing wielded was threatening trade retaliation targeting specific EU member states in key EU export sectors, including pork, brandy, and dairy. France, a major exporter of all three, was clearly being targeted as the primary instigator of the tariff policy in Beijing’s eyes. Spain, the key target for pork, flipped its position right after Spanish Prime Minister Pedro Sánchez met with Xi in Beijing on September 9, and it ultimately voted to abstain today, a shift from its informal, nonbinding ‘yes’ vote on July 15. However, other key pork exporters, such as the Netherlands and Denmark, maintained their support for the tariffs. Ireland, a major dairy exporter to China, changed to vote in favor of the tariffs today*, according to a report from Reuters, after abstaining from the previous informal, nonbinding vote in July. Ten other EU countries remained on the fence as well during the nonbinding vote, while only four (Slovakia, Hungary, Cyprus, and Malta) voted against the tariffs. Although Germany initially abstained from the July vote due to domestic pressure and to allow the process to move forward, Scholz wielded executive power to force a no vote for Germany today.

China has also offered carrots in the form of investment opportunities, such as offering to establish electric vehicle manufacturing plants in parts of Europe or forging joint development agreements between European and Chinese automakers. For instance, Beijing offered to invest in Spain’s local manufacturing capacity. Although reportedly delayed until October 2025, Chinese BEV producer Chery Auto plans to establish a manufacturing plant in Barcelona, which could potentially allow the company to circumvent the roughly 21 percent tariff rate it is currently facing. Hungary, which voted against the tariffs, will reportedly have an operational BYD manufacturing plant in 2025. Italy, though it voted in favor of the tariffs, is in talks with Dongfeng and Chery Auto for a manufacturing plant. Poland, which also voted in favor, has likely helped China avoid the tariffs by allowing Leapmotor International, a joint venture between Stellantis and Leapmotor, to begin manufacturing in the country as of this past June. And perhaps most surprisingly, Polestar, which is owned by Geely Holding and Geely-owned Volvo Cars, launched a manufacturing plant in South Carolina this past August, which could allow it to avoid some (though not necessarily all) of the US and EU tariffs.

Looking forward

To the European Commission’s credit, the current tariff episode marks a notable shift in the EU’s readiness to push back against Chinese pressure, especially when compared to past antidumping and subsidy cases involving solar energy and 5G infrastructure. However, the passage of the tariffs does not mark the end of this saga, as Beijing’s push to scale the manufacturing capacity of BEVs in Europe will likely blunt their effectiveness over time and further entrench itself within European markets. Further, even with some Chinese BEV companies such as Geely feeling the full impact of the tariffs, evidence indicates that they are unlikely to be high enough to significantly slow China’s market share gains. Beijing’s efforts, compounded by German efforts to protect the short-term interests of its auto industry, have successfully reduced the severity of the tariffs, allowed for continued opportunities for greenfield investments that could bypass them entirely, and opened the door to a potential negotiated compromise even after the tariffs are imposed, possibly involving a minimum import price or volume cap.

The EU tariffs will not fully block Chinese-made BEVs, and Beijing will likely still have the opportunity to establish a solid foothold on the continent. This is a key distinction between the United States and EU on this issue. Whereas the imposition of tariffs was largely security-driven in the United States, the EU tariffs were fundamentally trade-driven. As a result, Europe will now have to increasingly grapple with the national security impacts of vehicles equipped with cameras and other connected surveillance and software under China’s control. Further, the United States will continue to weigh in by raising data security risks associated with the increasing presence of Chinese BEVs in the EU, underscoring this issue by restricting Chinese-developed software in connected vehicles. Discussions on the security risks associated with connected vehicles, led by the United States, alongside the EU and other allies, are still in their infancy. The first Multinational Meeting to Address Connected Vehicle Risks was only just held in late July.

The United States must remain focused on uniting allies and partners to address challenges posed by China while acknowledging their agency. While Washington should continue to stress that tariffs alone are insufficient to address the broader risks posed by BEVs in the EU, it needs to recognize that the EU has unique interests and must address internal divisions in its own way. The United States also cannot expect allies and partners to blindly follow when its own strategy for derisking its relationship with China remains unclear.


Matt Geraci is an associate director of the Atlantic Council’s Global China Hub.

Correction: A previous version of this article misstated Ireland’s position on the EV tariffs. It voted in favor, according to a report in Reuters.

The post China’s lobbying did not block the EU’s new EV tariffs. But it may yet weaken them. appeared first on Atlantic Council.

]]>
House and Cryptocurrency Regulation Tracker cited by the World Economic Forum on digital asset regulation https://www.atlanticcouncil.org/insight-impact/in-the-news/house-and-cryptocurrency-regulation-tracker-cited-by-the-world-economic-forum-on-digital-asset-regulation/ Tue, 01 Oct 2024 18:41:44 +0000 https://www.atlanticcouncil.org/?p=797362 Read the full report here

The post House and Cryptocurrency Regulation Tracker cited by the World Economic Forum on digital asset regulation appeared first on Atlantic Council.

]]>
Read the full report here

The post House and Cryptocurrency Regulation Tracker cited by the World Economic Forum on digital asset regulation appeared first on Atlantic Council.

]]>
Kumar quoted by Cointelegraph on CBDC legislation and development in the US https://www.atlanticcouncil.org/insight-impact/in-the-news/kumar-quoted-by-cointelegraph-on-cbdc-legislation-and-development-in-the-us/ Fri, 13 Sep 2024 21:59:00 +0000 https://www.atlanticcouncil.org/?p=792010 Read the full article here

The post Kumar quoted by Cointelegraph on CBDC legislation and development in the US appeared first on Atlantic Council.

]]>
Read the full article here

The post Kumar quoted by Cointelegraph on CBDC legislation and development in the US appeared first on Atlantic Council.

]]>
Donovan and the Dollar Dominance Monitor cited by The Banker on growing alternatives to Swift and the dollar amid rising geopolitical tensions https://www.atlanticcouncil.org/insight-impact/in-the-news/donovan-and-the-dollar-dominance-monitor-cited-by-the-banker-on-growing-alternatives-to-swift-and-the-dollar-amid-rising-geopolitical-tensions/ Fri, 06 Sep 2024 13:40:43 +0000 https://www.atlanticcouncil.org/?p=790130 Read the full article here

The post Donovan and the Dollar Dominance Monitor cited by The Banker on growing alternatives to Swift and the dollar amid rising geopolitical tensions appeared first on Atlantic Council.

]]>
Read the full article here

The post Donovan and the Dollar Dominance Monitor cited by The Banker on growing alternatives to Swift and the dollar amid rising geopolitical tensions appeared first on Atlantic Council.

]]>
Chhangani quoted by Fast Company on the risks of a US strategic bitcoin reserve https://www.atlanticcouncil.org/insight-impact/in-the-news/chhangani-quoted-by-fast-company-on-the-risks-of-a-us-strategic-bitcoin-reserve/ Thu, 22 Aug 2024 16:06:39 +0000 https://www.atlanticcouncil.org/?p=786824 Read the full article here

The post Chhangani quoted by Fast Company on the risks of a US strategic bitcoin reserve appeared first on Atlantic Council.

]]>
Read the full article here

The post Chhangani quoted by Fast Company on the risks of a US strategic bitcoin reserve appeared first on Atlantic Council.

]]>
The UN finally advances a convention on cybercrime . . . and no one is happy about it https://www.atlanticcouncil.org/blogs/new-atlanticist/the-un-finally-adopts-a-convention-on-cybercrime-and-no-one-is-happy/ Wed, 14 Aug 2024 20:47:22 +0000 https://www.atlanticcouncil.org/?p=785503 The treaty risks empowering authoritarian governments, harming global cybersecurity, and endangering human rights.

The post The UN finally advances a convention on cybercrime . . . and no one is happy about it appeared first on Atlantic Council.

]]>
On August 8, a contentious saga on drastically divergent views of how to address cybercrime finally came to a close after three years of treaty negotiations at the United Nations (UN). The Ad Hoc Committee set up to draft the convention on cybercrime adopted it by consensus, and the relief in the room was palpable. The member states, the committee, and especially the chair, Algerian Ambassador Faouzia Boumaiza-Mebarki, worked for a long time to come to an agreement. If adopted by the UN General Assembly later this year, as is expected, it will be the first global, legally binding convention on cybercrime. However, this landmark achievement should not be celebrated, as it poses significant risks to human rights, cybersecurity, and national security.

How did this happen? Russia, long opposed to the Council of Europe’s 2001 Budapest Convention on cybercrime, began this process in 2017. Then, in 2019, Russia, along with China, North Korea, Myanmar, Nicaragua, Syria, Cambodia, Venezuela, and Belarus, presented a resolution to develop a global treaty. Despite strong opposition from the United States and European states, the UN General Assembly adopted a resolution in December 2019, by a vote of seventy-nine in favor and sixty against (with thirty abstentions), that officially began the process. Already, it was clear that the member states did not share one vision. Indeed, they could not even agree on a name for the convention until last week. What they ended up with is a mouthful: “Draft United Nations convention against cybercrime: Strengthening international cooperation for combating certain crimes committed by means of information and communications technology systems and for the sharing of evidence in electronic form of serious crimes.”

This exceedingly long name reveals one of the biggest problems with this convention: its scope. At its heart, this convention is intended to allow law enforcement from different countries to cooperate to prevent, investigate, and prosecute cybercrime, which costs trillions of dollars globally each year. However, the convention covers much more than the typical cybercrimes that come to mind, such as ransomware, and includes crimes committed using technology, which reflects the different views as to what constitutes cybercrime. As if that were not broad enough, Russia, China, and other states succeeded in pushing for negotiations on an additional protocol that would expand the list of crimes even further. Additionally, under the convention, states parties are to cooperate on “collecting, obtaining, preserving, and sharing of evidence in electronic form of any serious crime”—which in the text is defined as a crime that is punishable by a maximum of four years or more in prison or a “more serious penalty,” such as the death penalty.

Rights-respecting states should not allow themselves to be co-opted into assisting abusive practices under the guise of cooperation.

In Russia, for example, association with the “international LGBT movement” can lead to extremism charges, such as the crime of displaying “extremist group symbols,” like the rainbow flag. A first conviction carries a penalty of up to fifteen days in detention, but a repeat offense carries a penalty of up to four years. That means a repeat offense would qualify as a “serious crime” under the cybercrime convention and be eligible for assistance from law enforcement in other jurisdictions that may possess electronic evidence relevant to the investigation—including traffic, subscriber, and even content data. Considering how much of modern life is carried out digitally, there will be some kind of electronic evidence for almost every serious crime under any domestic legislation. Even the UN’s own human rights experts cautioned against this broad definition.

Further, under the convention, states parties are obligated to establish laws in their domestic system to “compel” service providers to “collect or record” real-time traffic or content data. Many of the states behind the original drive to establish this convention have long sought this power over private firms. At the same time, states parties are free to adopt laws that keep requests to compel traffic and content data confidential—cloaking these actions in secrecy. Meanwhile, grounds for a country to refuse a cooperation request are limited to instances such as where it would be against that country’s “sovereignty,” security, or other “essential” interest, or if it would be against that country’s own laws. The convention contains a vague caveat that nothing in it should be interpreted as an obligation to cooperate if a country “has substantial grounds” to believe the request is made to prosecute or punish someone for their “sex, race, language, religion, nationality, ethnic origin, or political opinions.”

Russia claimed that such basic safeguards, which do offer some protection in the example regarding LGBT activity as “extremist,” were merely an opportunity for some countries to “abuse” the opportunity to reject cooperation requests. Those safeguards, conversely, could also be abused by the very same states that opposed them. The Iranian delegation, for its part, proposed a vote to delete that provision, as well as all other human rights safeguards and references to gender, on the day the text was adopted. These provisions had already been weakened significantly throughout the negotiation process and only survived thanks to the firm stance taken by Australia, Canada, Colombia, Iceland, the European Union, Mexico, and others that drew a red line and refused to accept any more changes.

The possible negative consequences of this convention are not limited to human rights but can seriously threaten global cybersecurity and national security. The International Chamber of Commerce, a global business organization representing millions of companies, warned during negotiations that “people who have access to or otherwise possess the knowledge and skills necessary” could be forced “to break or circumvent security systems.” Worse, they could even be compelled to disclose “previously unknown vulnerabilities, private encryption keys, or proprietary information like source code.” Microsoft agreed. Its representative, Nemanja Malisevic, added that this treaty will allow “for unauthorized disclosure of sensitive data and classified information to third states” and for “malicious actors” to use a UN treaty to “force individuals with knowledge of how a system functions to reveal proprietary or sensitive information,” which could “expose the critical infrastructure of a state to cyberattacks or lead to the theft of state secrets. Malisevic concluded that this “should terrify us all.”

Similarly, independent media organizations called for states to reject the convention, which the International Press Institute has called a “surveillance treaty.” Civil society organizations including Electronic Frontier FoundationAccess NowHuman Rights Watch, and many others have also long been ringing the alarm bell. They continue to do so as the final version of the convention adopted by the committee has failed to adequately address their concerns.

Given the extent and cross-border nature of cybercrime, it is evident that a global treaty is both necessary and urgent—on that, the international community is in complete agreement. Unfortunately, this treaty, perhaps a product of sunk-cost fallacy thinking or agreed to under duress for fear of an even worse version, does not solve the problems the international community faces. If the UN General Assembly adopts the text and the required forty member states ratify it so that it comes into force, experts are right to warn that governments intent on engaging in surveillance will have the veneer of UN legitimacy stamped on their actions. Rights-respecting states should not allow themselves to be co-opted into assisting abusive practices under the guise of cooperation. Nor should they willingly open the door to weakening their own national security or global cybersecurity.


Lisandra Novo is a staff lawyer for the Strategic Litigation Project at the Atlantic Council specializing in law and technology.

The post The UN finally advances a convention on cybercrime . . . and no one is happy about it appeared first on Atlantic Council.

]]>
Tech regulation requires balancing security, privacy, and usability  https://www.atlanticcouncil.org/blogs/econographics/tech-regulation-requires-balancing-security-privacy-and-usability/ Mon, 12 Aug 2024 14:44:33 +0000 https://www.atlanticcouncil.org/?p=785037 Good policy intentions can lead to unintended consequences when usability, privacy, and security are not balanced—policymakers must think like product designers to avoid these challenges.

The post Tech regulation requires balancing security, privacy, and usability  appeared first on Atlantic Council.

]]>
In the United States and across the globe, governments continue to grapple with how to regulate new and increasingly complex technologies, including in the realm of financial services. While they might be tempted to clamp down or impose strict centralized security requirements, recent history suggests that policymakers should jointly consider and balance usability and privacy—and approach their goals as if they were a product designer.

Kenya is a prime example: In 2007, a local telecommunications provider launched a form of mobile money called M-PESA, which enabled peer-to-peer money transfers between mobile phones and became wildly successful. Within five years, it grew to fifteen million users, with a deposit value approaching almost one billion dollars. To address rising security concerns, in 2013, the Kenyan government implemented a law requiring every citizen to officially register the SIM card (for their cell phone) using a government identification (ID). The measure was enforced swiftly, leading to the freezing of millions of SIM cards. Over ten years later, SIM card ID registration laws have become common across Africa, with over fifty countries adopting such regulations. 

But that is not the end of the story. In parallel, a practice called third-party SIM registration has become rampant, in which cell phone users register their SIM cards using someone else’s ID, such as a friend’s or a family member’s. 

Our recent research at Carnegie Mellon University, based on in-depth user studies in Kenya and Tanzania, found that this phenomenon of third-party SIM registration has both unexpected origins and unintended consequences. Many individuals in those countries face systemic challenges in obtaining a government ID. Moreover, some participants in our study reported having privacy concerns. They felt uncomfortable sharing their ID information with mobile money agents, who could repurpose that information for scams, harassment, or other unintended uses. Other participants felt “frustrated” by a process that was “cumbersome.” As a result, many users prefer to register a SIM card with another person’s ID rather than use or obtain their own ID.

Third-party SIM registration plainly undermines the effectiveness of the public policy and has additional, downstream effects. Telecommunications companies end up collecting “know your customer” information that is not reliable, which can impede law enforcement investigations in the case of misconduct. For example, one of our study subjects shared the story of a friend lending their ID for third-party registration, and later being arrested for the alleged crimes of the actual user of the SIM card. 

A core implication of our research is that the Kenyan government’s goals did not fully take into account the realities of the target population—or the feasibility of the measures that Kenya and Tanzania proposed. In response, people invented their own workarounds, thus potentially introducing new vulnerabilities and avenues for fraud.

Good policy, bad consequences 

Several other case studies demonstrate how even well-intentioned regulations can have unintended consequences and practical problems if they do not appropriately consider security, privacy and usability together. 

  • Uganda: Much like our findings in Kenya and Tanzania, a biometric digital identity program in Uganda has considerable unintended consequences. Specifically, it risks excluding fifteen million Ugandans “from accessing essential public services and entitlements” because they do not have access to a national digital identity card there. While the digitization of IDs promises to offer certain security features, it also has potential downsides for data privacy and risks further marginalizing vulnerable groups who are most in need of government services.
  • Europe: Across the European Union (EU), a landmark privacy law called General Data Protection Regulation (GDPR) has been critical for advancing data protection and has become a benchmark for regulatory standards worldwide. But GDPR’s implementation has had unforeseen effects such as some websites blocking EU users. Recent studies have also highlighted various usability issues that may thwart the desired goals. For example, opting out of data collection through app permissions and setting cookie preferences is an option for users. But this option is often exclusionary and inconvenient, resulting in people categorically waiving their privacy for the sake of convenience.
  • United States (health law): Within the United States, the marquee federal health privacy law passed in 1996 (the Health Insurance Portability and Accountability Act, known as HIPAA) was designed to protect the privacy and security of individuals’ medical information. But it also serves as an example of laws that can present usability challenges for patients and healthcare providers alike. For example, to comply with HIPAA, many providers still require the use of ink signatures and fax machines. Not only are technologies somewhat antiquated and cumbersome (thereby slowing information sharing)—they also pose risks arising from unsecured fax machines and misdialed phone numbers, among other factors.
  • Jamaica: Both Jamaica and Kenya have had to halt national plans to launch a digital ID in light of privacy and security issues. Kenya already lost over $72 million from a prior project that was launched in 2019, which failed because of serious concerns related to privacy and security. In the meantime, fraud continues to be a considerable problem for everyday citizens: Jamaica has incurred losses of more than $620 million from fraud since 2018.
  • United States [tax system]: The situation in Kenya and Jamaica mirrors the difficulties encountered by other digital ID programs. In the United States, the Internal Revenue Service (IRS) has had to hold off plans for facial recognition based on concerns about the inadequate privacy measures, as well as usability concerns—like long verification wait times, low accuracy for certain groups, and the lack of offline options. The stalled program has resulted in missed opportunities for other technologies that could have allowed citizens greater convenience in accessing tax-related services and public benefits. Even after investing close to $187 million towards biometric identification, the IRS has not made much progress.

Collectively, a key takeaway from these international experiences is that when policymakers fail to simultaneously balance (or even consider) usability, privacy, and security, the progress of major government initiatives and the use of digitization to achieve important policy goals is hampered. In addition to regulatory and legislative challenges, delaying or canceling initiatives due to privacy and usability concerns can lead to erosion in public trust, increased costs and delays, and missed opportunities for other innovations.

Policy as product design

Going forward, one pivotal way for government decision makers to avoid pitfalls like the ones laid out above is to start thinking like product designers. Focusing on the most immediate policy goals is rarely enough to understand the practical and technological dimensions of how that policy will interact with the real world.

That does not mean, of course, that policymakers must all become experts in creating software products or designing user interfaces. But it does mean that some of the ways that product designers tend to think about big projects could inform effective public policy.

First, policymakers should embrace user studies to better understand the preferences and needs of citizens as they interact digitally with governmental programs and services. While there are multiple ways user studies can be executed, the first often includes upfront qualitative and quantitative research to understand the core behavioral drivers and systemic barriers to access. These could be complemented with focus groups, particularly with marginalized communities and populations who are likely to be disproportionately affected by any unintended outcomes of tech policy. 

Second, like early-stage technology products that are initially rolled out to an early group of users (known as “beta-testing”), policymakers could benefit from pilot testing to encourage early-stage feedback. 

Third, regulators—just like effective product designers—should consider an iterative process whereby they solicit feedback, implement changes to a policy or platform, and then repeat the process. This allows for validation of the regulation and makes room for adjustments and continuous improvements as part of an agency’s rulemaking process.

Lastly, legislators and regulators alike should conduct more regular tabletop exercises to see how new policies might play out in times of crisis. The executive branch regularly does such “tabletops” in the context of national security emergencies. But the same principles could apply to understanding cybersecurity vulnerabilities or user responses before implementing public policies or programs at scale.

In the end, a product design mindset will not completely eliminate the sorts of problems we have highlighted in Kenya, the United States, and beyond. However, it can help to identify the most pressing usability, security, and privacy problems before governments spend time and treasure to implement regulations or programs that may not fit the real world.


Karen Sowon is a user experience researcher and post doctoral research associate at Carnegie Mellon University.

JP Schnapper-Casteras is a nonresident senior fellow at the Atlantic Council’s GeoEconomics Center and the founder and managing partner at Schnapper-Casteras, PLLC.


Giulia Fanti is a nonresident senior fellow at the Atlantic Council’s GeoEconomics Center and an assistant professor of electrical and computer engineering at Carnegie Mellon University.

At the intersection of economics, finance, and foreign policy, the GeoEconomics Center is a translation hub with the goal of helping shape a better global economic future.

The post Tech regulation requires balancing security, privacy, and usability  appeared first on Atlantic Council.

]]>
The future of digital transformation and workforce development in Latin America and the Caribbean https://www.atlanticcouncil.org/in-depth-research-reports/report/the-future-of-digital-transformation-and-workforce-development-in-latin-america-and-the-caribbean/ Thu, 08 Aug 2024 14:00:00 +0000 https://www.atlanticcouncil.org/?p=775109 During an off-the-record private roundtable, thought leaders and practitioners from across the Americas evaluated progress made in the implementation of the Regional Agenda for Digital Transformation.

The post The future of digital transformation and workforce development in Latin America and the Caribbean appeared first on Atlantic Council.

]]>
The sixth of a six-part series following up on the Ninth Summit of the Americas commitments.

An initiative led by the Atlantic Council’s Adrienne Arsht Latin America Center in partnership with the US Department of State continues to focus on facilitating greater constructive exchange among multisectoral thought leaders and government leaders as they work to implement commitments made at the ninth Summit of the Americas. This readout was informed by a private, information-gathering roundtable and several one-on-one conversations with leading experts in the digital space.

Executive summary

At the ninth Summit of the Americas, regional leaders agreed on the adoption of a Regional Agenda for Digital Transformation that reaffirmed the need for a dynamic and resilient digital ecosystem that promotes digital inclusion for all peoples. The COVID-19 pandemic exacerbated the digital divide globally, but these gaps were shown to be deeper in developing countries, disproportionately affecting women, children, persons with disabilities, and other vulnerable and/or marginalized individuals. Through this agenda, inclusive workforce development remains a key theme as an avenue to help bridge the digital divide and skills gap across the Americas.

As part of the Atlantic Council’s consultative process, thought leaders and practitioners evaluated progress made in the implementation of the Regional Agenda for Digital Transformation agreed on at the Summit of Americas, resulting in three concrete recommendations: (1) leverage regional alliances and intraregional cooperation mechanisms to accelerate implementation of the agenda; (2) strengthen public-private partnerships and multisectoral coordination to ensure adequate financing for tailored capacity-building programs, the expansion of digital infrastructure, and internet access; and (3) prioritize the involvement of local youth groups and civil society organizations, given their on-the-ground knowledge and role as critical indicators of implementation.

Recommendations for advancing digitalization and workforce development in the Americas:

  1. Leverage regional alliances and intraregional cooperation mechanisms to accelerate implementation of the agenda.
  • Establish formal partnerships between governments and local and international universities to broaden affordable student access to exchange programs, internships, and capacity-building sessions in emerging fields such as artificial intelligence and cybersecurity. Programs should be tailored to country-specific economic interests and sectors such as agriculture, manufacturing, and tourism. Tailoring these programs can also help enhance students’ access to the labor market upon graduation.
  • Ensure existing and new digital capacity-building programs leverage diaspora professionals. Implement virtual workshops, webinars, and collaborative projects that transfer knowledge and skills from technologically advanced regions to local communities. Leveraging these connections will help ensure programs are contextually relevant and effective.
  • Build on existing intraregional cooperation mechanisms and alliances to incorporate commitments of the Regional Agenda for Digital Transformation. Incorporating summit commitments to mechanisms such as the Alliance for Development in Democracy, the Americas Partnership for Economic Prosperity, the Caribbean Community and Common Market, and other subregional partnerships can result in greater sustainability of commitments as these alliances tend to transcend finite political agendas.
  • Propose regional policies to standardize the recognition of digital nomads and remote workers, including visa programs, tax incentives, and employment regulations. This harmonization will facilitate job creation for young professionals and enhance regional connectivity.
  1. Prioritize workforce development for traditionally marginalized groups by strengthening public-private partnerships and multisectoral collaboration.
  • Establish periodic and open dialogues between the public and private sectors to facilitate the implementation of targeted digital transformation for key sectors of a country’s economy that can enhance and modernize productivity. For instance, provide farmers with digital tools for precision agriculture, train health care workers in telemedicine technologies, and support tourism operators in developing online marketing strategies.
  • Foster direct lines of communication with multilateral organizations such as the Inter-American Development Bank and the World Bank. Engaging in periodic dialogues with these actors will minimize duplication of efforts and maximize the impact of existing strategies and lines of work devoted to creating digital societies that are more resilient and inclusive. Existing and new programs should be paired with employment opportunities and competitive salaries for marginalized groups based on the acquired skills, thereby creating strong incentives to pursue education in digital skills.
  • Collaborate with telecommunications companies to offer subsidized internet packages for low-income households and small businesses and simplify regulatory frameworks to attract investment in rural and underserved areas, expanding internet coverage and accessibility.
  • Enhance coordination with private sector and multilateral partners to create a joint road map for sustained financing of digital infrastructure and workforce development to improve investment conditions in marginalized and traditionally excluded regions and cities.
  1. Increase engagement with local youth groups and civil society organizations to help ensure digital transformation agendas are viable and in line with local contexts.
  • Facilitate periodic dialogues with civil society organizations, the private sector , and government officials and ensure that consultative meetings are taking place at remote locations to ensure participation from disadvantaged populations in the digital space. Include women, children, and persons with disabilities to ensure capacity programs are generating desired impact and being realigned to address challenges faced by key, targeted communities.
  • Work with local actors such as youth groups and civil society organizations to conduct widespread awareness campaigns to help communities visualize the benefits of digital skills and technology use. Utilize success stories and case studies to show how individuals and businesses can thrive in a digital economy, fostering a culture of innovation and adaptation.
  • Invest in local innovation ecosystems by providing grants and incentives for start-ups and small businesses working on digital solutions. Create business incubators and accelerators to support the growth of digital enterprises, particularly those addressing local challenges.
  • Offer partnership opportunities with governments to provide seed capital, contests, digital boot camps, and mentorship sessions specifically designed for girls and women in school or college to help bridge the gender digital divide.

Related content

Solar panels on a field of grass

Report

May 31, 2024

PACC 2030 objectives: The road to implementation

By Wazim Mowla, Charlene Aguilera

The Atlantic Council organized a PACC 2030 Working Group and worked closely with governments, the business community, and civil society organizations to support the implementation of PACC 2030’s objectives.

Caribbean Climate Change & Climate Action
Medical personnel handling COVID swab test.

Report

Apr 16, 2024

Advancing health and resilience policies in Latin America and the Caribbean

By Isabel Chiriboga, Martin Cassinelli, Diego Area

During an off-the-record private roundtable, thought leaders and practitioners from across the Americas discussed how to further enhance access to and finance for health services and products in the region.

Coronavirus Latin America

Summit of the Americas

An initiative led by the Adrienne Arsht Latin America Center of the Atlantic Council in partnership with the US Department of State focused on facilitating greater, constructive exchange among multi-sectoral thought leaders and government leaders as they work to implement Summit commitments.

Related experts



Subscribe to LAC Source Newsletter
Get monthly updates on Latin America and the Caribbean (LAC) to receive the latest developments of the region, upcoming public events and recaps, new reports, and more.

The Adrienne Arsht Latin America Center broadens understanding of regional transformations and delivers constructive, results-oriented solutions to inform how the public and private sectors can advance hemispheric prosperity.

The post The future of digital transformation and workforce development in Latin America and the Caribbean appeared first on Atlantic Council.

]]>
Effective US government strategies to address China’s information influence https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/effective-us-government-strategies-to-address-chinas-information-influence/ Tue, 30 Jul 2024 12:00:00 +0000 https://www.atlanticcouncil.org/?p=782361 To mount the most effective response to Chinese influence and the threat it poses to democratic interests at home and on the international stage, the United States should develop a global information strategy, one that reflects the interconnected nature of regulatory, industrial, and diplomatic policies with regard to the information domain.

The post Effective US government strategies to address China’s information influence appeared first on Atlantic Council.

]]>

China’s global influence operations have received increasing attention in the national security community. Numerous congressional hearings, media reports, and academic and industry findings have underscored China’s increased use and resourcing of foreign information manipulation and interference (FIMI) tactics in its covert operations both in the United States and abroad.

In response, US government offices the Foreign Malign Influence Center (FMIC), the Global Engagement Center (GEC), and the Cybersecurity and Infrastructure Security Agency (CISA), among others, have made strides in raising awareness of the issue and charting pathways to increase the resilience of the US information ecosystem to foreign influence. To date, however, the efforts to counter the influence of the People’s Republic of China (PRC) have been fragmented. That fragmentation is indicative of a lack of cohesion around the concept of influence operations itself.

Across the government and nongovernment sectors alike, there is considerable variation regarding the definition and scope of information manipulation. For example, the Department of State’s (DOS’s) GEC has an expansive definition, which includes “leveraging propaganda and censorship, promoting digital authoritarianism, exploiting international organizations and bilateral partnerships, pairing cooptation and pressure, and exercising control of Chinese-language media.” Others define it more narrowly as disinformation and propaganda spread by a foreign threat actor in a coordinated, inauthentic manner, and largely occurring on social media platforms.

This variation is a reflection of the holistic and multifaceted nature of Chinese influence. Coercive tactics and influence operations have long been a central part of China’s strategic tool kit and core to how it engages with the outside world. Because China conceives of the information domain as a space that must be controlled and dominated to ensure regime survival, information operations are part of a much bigger umbrella of influence that spans the economic, political, and social domains. It may be more useful to think of information manipulation as existing within the broader conceptual framework of China’s weaponization of the information domain in service of its goal to gain global influence.

As previous work by the Digital Forensic Lab (DFRLab) has shown, China’s approach to the information domain is coordinated and proactive, taking into account the mutually constitutive relationships between the economic, industrial, and geopolitical strategies of the Chinese Communist Party (CCP). The aim of its efforts is to gain influence—or “discourse power”—with the ultimate goal of decentering US power and leadership on the global stage. One of the main mechanisms through which the CCP seeks to achieve this objective is by focusing on the dominance of information ecosystems. This ecosystem encompasses not only narratives and content that appear in traditional and social media but also the digital infrastructure on which communication systems rely, the policies that govern those systems at the international level, and the diplomatic strategy deployed by Beijing’s operatives abroad to gain buy-in for the CCP’s vision of the global order.

The DFRLab’s previous two reports, which explored China’s strategy and the impacts of its operations abroad, found that the United States will not be successful in addressing the challenges of Chinese influence if it sees that influence as separate from the interconnected economic, political, and technical domains in which its strategy is embedded.

To this end, the DFRLab hosted a series of one-on-one expert interviews, conducted research and workshops, and held a virtual roundtable discussion with scholars and practitioners with expertise on or experience in addressing authoritarian influence and information operations, US government processes and policies around these issues, and Chinese foreign policy. This issue brief is part of a larger body of work that examines the Chinese government’s interests and capabilities and the impacts of party’s efforts to shape the global information ecosystem. The focus of this report is on how the US government can best respond to those challenges, including the architecture, tools, and strategies that exist for addressing PRC influence and information manipulation, as well as any potential gaps in the government tool kit.

This report finds that, to mount the most effective response to Chinese influence and the threat it poses to democratic interests at home and on the international stage, the United States should develop a global information strategy, one that reflects the interconnected nature of regulatory, industrial, and diplomatic policies with regard to the information domain. A core assumption undergirding this concept is that US policymaking space tends to over-index on the threat of information manipulation in particular while under-indexing on the core national interest of fostering a secure, interoperable information environment on a larger scale.

The limits of understanding Chinese influence as systemic and part of a broader strategy has sometimes led US response to be pigeonholed as an issue of strategic communications, rather than touching on the information and technology ecosystems, among others, where China focuses its information and influence efforts. Responding to Chinese influence with government messaging is not sufficient to address the complex nature of the challenge and places the United States in a position of reactivity.

In short, understanding that the CCP (1) integrates its tech industrial strategy, governance policy, and engagement strategy and (2) connects its approach at home to how it engages abroad, the United States needs to do the same, commensurate with its values. It should not respond tit-for-tat but rather have a collective strategy for a global competition for information that connects its tech strategy to its governance approach to its engagement around the world.

That is not to say that a US strategy on information resilience should mirror China’s, or that such a strategy should be developed in response to the PRC’s actions in the information domain. Nor is it to say that the United States should adopt a similar whole-of-government approach to the information domain. There are silos by design in the US system and important legal and normative foundations for the clear delineation of mission between them. What this issue brief argues for is a strategic breaking down of silos to facilitate proactive action versus a dangerous breaking down of legally required silos.

This report emphasizes that the United States should articulate how major initiatives like the CHIPS and Science Act, regulatory approaches like the recent executive orders on AI and data security, and the DOS’s recent cyberspace and digital policy strategy are part of a cohesive whole and should be understood and operationalized as such.

The strategy should outline what the United States stands for as much as what it is against. This requires that the United States frame its assessment of threat within a broader strategy of what its values are and how those values should be articulated in its regulatory, strategic, and diplomatic initiatives to promote open information environments and shore up information resilience. This includes working with allies and partners to ensure that a free, open, and interoperable internet is a global priority as well as a domestic one; developing common standards for understanding and thresholding foreign influence; and promoting connectivity at home and abroad. One finding of this report is that the United States is already leaning into its strengths and values, including championing policies that support openness and continuing support for civil society. This, along with the awareness of influence operations as the weaponization of the information domain, is a powerful response to authoritarian attacks on the integrity of both the domestic US and global information spaces.

The United States has a core national security interest in the existence of a rules-based, orderly, and open information environment. Such an environment facilitates the essential day-to-day tasks related to public diplomacy, the basic expression of rights, and investment in industries of strategic and economic value. Absent a coherent strategy on these core issues related to the integrity of the United States’ information environment that is grounded in an understanding of the interconnected nature of their constitutive parts, the challenges of foreign influence and interference will only continue to grow. This issue brief contains three sections. For sections one and two, experts in different aspects of the PRC’s information strategy addressed two to three main questions; during the course of research, further points were raised that are included in the findings. Each section represents a synthesis of the views expressed in response to these questions. The third section comprises recommendations for the US government based on the findings from the first two sections.

About the author

Related content

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

The post Effective US government strategies to address China’s information influence appeared first on Atlantic Council.

]]>
A policymaker’s guide to ensuring that AI-powered health tech operates ethically https://www.atlanticcouncil.org/blogs/geotech-cues/a-policymakers-guide-to-ensuring-that-ai-powered-health-tech-operates-ethically/ Mon, 29 Jul 2024 20:00:57 +0000 https://www.atlanticcouncil.org/?p=782140 The private sector is moving quickly with the development of AI tools. The public sector will need to keep up with new strategies, standards, and regulations around the deployment and use of such tools in the healthcare sector.

The post A policymaker’s guide to ensuring that AI-powered health tech operates ethically appeared first on Atlantic Council.

]]>
The healthcare landscape is undergoing a profound transformation thanks to artificial intelligence (AI) and big data. However, with this transformation come complex challenges surrounding data collection, algorithmic decision-making, transparency, and workforce readiness.

That was a topic of a recent roundtable hosted by the GeoTech Center and Syntropy, a platform that works with healthcare, government, and other groups to collaborate on data in a single ecosystem geared toward informing healthcare research.

At the roundtable, experts from the public and private sectors discussed the complex challenges that arise with the transformation of the healthcare sector, arguing that these challenges lie not only in the development of the technology but also in the implementation and use of it.

As AI becomes more and more integrated with healthcare, policymakers must lay the groundwork for a future in which AI augments, rather than replaces, human expertise in the pursuit of better health outcomes for all. Below are the roundtable participants’ recommendations for policymakers, focusing on building strong data foundations, setting guidelines for algorithm testing and maintenance, fostering trust and transparency, and supporting a strong workforce.

1. Building strong data foundations

Data sets in the healthcare sector can be messy, small in scale, and lacking in diversity, leading to inherent biases that can skew the outcomes of AI-driven analyses—and decisions made following such analyses. Moreover, these biases are not always apparent and often require extensive work to identify. Thus, it is important at the outset to ensure the integrity, quality, and diversity of the data with which AI systems are trained.

The ability to do so will in part depend on the strength of the workforce and the infrastructure that collects and manages data. For example, hospitals—from large, well-funded facilities to smaller community-based hospitals with fewer resources—play an important role in collecting data.

A strong foundation for data is one that protects data. In an ideal world, all individuals (regardless of socioeconomic status or geographic location) can benefit from AI-driven healthcare technologies. With that come concerns about the protection of health data, particularly in countries with fragile democracies and low regulatory standards. The potential misuse of health data by governments around the world poses significant risks to individual privacy and autonomy, highlighting the need for robust legal and ethical frameworks to safeguard against such abuses.

To address such challenges with data collection and management, policymakers can begin by implementing the following:

  • Establishing a foundational data strategy for healthcare data that will improve patient equity by setting standards for inclusive data sets.
  • Allocating more resources and support for community hospitals to ensure that the data collected in such facilities is high quality and diverse.
  • Encouraging the development of robust data systems that allow for better data sharing, collaboration, and interoperability.
  • Optimizing patient benefits by providing transparency about not only the healthcare providers but also about anyone else participating in data sharing.

2. Establishing guidelines for algorithm testing and maintenance by healthcare-technology companies

While building an algorithm may be a complex process, understanding and testing its performance over time is even more challenging. The dynamic nature of the healthcare industry demands ongoing adaptation and refinement of algorithms to account for evolving patient needs, technological advancements, and regulatory requirements.

In addition to continuous testing, it’s important to recognize that the same algorithms may exhibit different risk profiles when deployed in different contexts. Factors such as patient demographics, disease prevalence, and healthcare infrastructure can all influence the performance and safety of AI algorithms. A one-size-fits-all approach to AI deployment in healthcare is neither practical nor advisable.

To ensure that algorithms are constantly tested and maintained, policymakers should consider the following:

  • Developing guidelines that inform developers, testers, data scientists, regulators, and clinicians about their shared responsibility of maintaining algorithms.
  • Instituting an oversight authority to continuously monitor the risks associated with decisions that have been made based on AI to ensure the algorithms remain accurate, reliable, and safe for clinical settings.

3. Fostering patient trust and transparency

As technology continues to impact the healthcare industry, and as patients often find themselves unaware of the integration of AI technologies into their care processes, it becomes more difficult for those patients to give informed consent. This lack of transparency undermines patient autonomy and raises profound ethical questions about patients’ right to be informed and participate in health-related decisions. A lack of awareness about the integration of AI technologies is just one layer to the problem; even if a patient knows that AI is playing a role in their care, they may not know about who sponsors such technologies. Sponsors pay for the testing and maintenance of these systems, and they may also have access to the patient’s data.

When AI technologies are involved in care processes, it is still important to achieve the right balance between human interaction and AI-driven solutions. While AI technologies hold great promise for improving efficiency and accuracy in clinical decision-making, they must be integrated seamlessly into existing workflows and complement (rather than replace) human expertise and judgment.

The willingness to accept AI in healthcare varies significantly among patients and healthcare professionals. To bridge this gap in acceptance and address other challenges with trust and transparency, policymakers should consider the following:

  • Providing transparent information about the capabilities, limitations, and ethical considerations of AI technologies.
  • Encouraging companies to use particular design methods that ensure that tools and practices align with privacy values and protect patient autonomy.
  • Producing guiding principles for hospitals to promote a deep understanding of the implications of AI and proactively addressing concerns related to workforce dynamics and patient care.
  • Developing strategies to strengthen institutional trust to encourage patients to share data, avoiding algorithms that develop in silos.
  • Awarding organizations with an integrity badge for transparency, responsible use, and testing.

4. Supporting a strong workforce

The integration of AI tools into healthcare workflows is challenging, particularly because of the changes in processes, job roles, patient-provider interactions, and organizational culture such implementation creates. It will be necessary to support the hospital workforce with strategies to manage this change and also with comprehensive education and training initiatives. While the focus here is on humans rather than technology, such support is just as integral to realizing the full potential of these innovations in improving patient outcomes and healthcare delivery.

Many hospitals lack the necessary capabilities to effectively leverage AI technologies to their fullest potential, but supporting technical assistance training and infrastructure could help in the successful deployment of AI technologies.

To navigate the changes that AI tools would bring to the workplace, policymakers should consider the following:

  • Releasing guidance to healthcare companies to anticipate change management, education, training, and governance.
  • Incentivizing private-sector technical assistance training and infrastructure to provide services to communities with fewer resources.
  • Creating training programs tailored to the specific needs of healthcare organizations so that stakeholders can ensure AI implementations are both effective and sustainable in the long run.

The private sector is moving quickly with the development of AI tools. The public sector will need to keep up with new strategies, standards, and regulations around the deployment and use of such tools in the healthcare sector.


Coley Felt is a program assistant at the GeoTech Center.

The GeoTech Center champions positive paths forward that societies can pursue to ensure new technologies and data empower people, prosperity, and peace.

The post A policymaker’s guide to ensuring that AI-powered health tech operates ethically appeared first on Atlantic Council.

]]>
The sovereignty trap https://www.atlanticcouncil.org/blogs/geotech-cues/the-sovereignty-trap/ Fri, 26 Jul 2024 19:11:47 +0000 https://www.atlanticcouncil.org/?p=781286 When sovereignty is invoked in digital contexts without an understanding of the broader political environment, several traps can be triggered.

The post The sovereignty trap appeared first on Atlantic Council.

]]>
This piece was originally published on DFRLab.org.

On February 28, 2024, a blog post entitled “What is Sovereign AI?” appeared on the website of NVIDIA, a chip designer and one of the world’s most valuable companies. The post defined the term as a country’s ability to produce artificial intelligence (AI) using its own “infrastructure, data, workforce and business networks.” Later, in its May 2024 earnings report, NVIDIA outlined how sovereign AI has become one of its “multibillion dollar” verticals, as it seeks to deliver AI chips and software to countries around the world.

On its face, “sovereign AI” as a concept is focused on enabling states to mitigate potential downsides of relying on foreign-made large AI models. Sovereign AI is NVIDIA’s attempt to turn this growing demand from governments into a new market, as the company seeks to offer governments computational resources that can aid them in ensuring that AI systems are tailored to local conditions. By invoking sovereignty, however, NVIDIA is weighing into a complex existing geopolitical context. The broader push from governments for AI sovereignty will have important consequences for the digital ecosystem on the whole and could undermine internet freedom. NVIDIA is seeking to respond to demand from countries that are eager for more indigenous options for developing compute capacity and AI systems. However, sovereign AI can create “sovereignty traps” that unintentionally grant momentum to authoritarian governments’ efforts to undermine multistakeholder governance of digital technologies. This piece outlines the broader geopolitical context behind digital sovereignty and identifies several potential sovereignty traps associated with sovereign AI.1

Background

Since its inception, the internet has been managed through a multistakeholder system that, while not without its flaws, sought to uphold a global, open, and interoperable internet. Maintaining this inherent interconnectedness is the foundation by which the multistakeholder community of technical experts, civil society organizations, and industry representatives have operated for years.

One of the early instantiations of digital sovereignty was introduced by China in its 2010 White Paper called “The State of China’s Internet.” In it, Beijing defined the internet as “key national infrastructure,” and as such it fell under the scope of the country’s sovereign jurisdiction. In the same breath, Chinese authorities also made explicit the centrality of internet security to digital sovereignty. In China’s case, the government aimed to address internet security risks related to the dissemination of information and data—including public opinion—that could pose a risk to the political security of the Chinese Communist Party (CCP). As a result, foreign social media platforms like X (formerly Twitter) and Facebook have been banned in China since around 2009. It is no coincidence that the remit of China’s main internet regulator, the Central Cyberspace Affairs Commission, has evolved from developing and enforcing censorship standards for online content to becoming a key policy body for regulating privacy, data security, and cybersecurity.

This emphasis on state control over the internet—now commonly referred to by China as “network sovereignty” or “cyber sovereignty” (网络主权), also characterizes China’s approach to the global digital ecosystem. Following the publication of its White Paper in 2010, in September of the following year, China, Russia, Tajikistan, and Uzbekistan jointly submitted an “International Code of Conduct for Information Security” to the United Nations General Assembly, which held that control over policies related to the governance of the internet is “the sovereign right of states”—and thus should reside squarely under the jurisdiction of the host country.

In line with this view, China has undertaken great efforts in recent years to move the center of gravity of internet governance from multistakeholder to multilateral fora. For example, Beijing has sought to leverage the platform of the Global Digital Compact under the United Nations to engage G-77 countries to support its vision. China has proposed language that would make the internet a more centralized, top-down network over which governments have sole authority, excluding the technical community and expert organizations that have helped shape community governance from the internet’s early days.

Adding to the confusion is the seeming interchangeability of the terms “cyber sovereignty,” used more frequently by China, and “digital sovereignty,” a term used most often by the European Union and its member states. While semantically similar, these terms have vastly different implications for digital policy due to the disparate social contexts in which they are embedded. For example, while the origin of the “cyber sovereignty” concept in China speaks to the CCP’s desire for internet security, some countries view cyber sovereignty as a potential pathway by which to gain more power over the development of their digital economies, thus enabling them to more efficiently deliver public goods to their citizens. There is real demand for this kind of autonomy, especially among Global Majority countries.

Democracies are now trying to find alternative concepts to capture the spirit of self-sufficiency in tech governance without lending credence to the more problematic implications of digital sovereignty. For example, in Denmark’s strategy for tech diplomacy, the government avoids reference to digital sovereignty, instead highlighting the importance of technology in promoting and preserving democratic values and human rights, while assisting in addressing global challenges. The United States’ analogous strategy invokes the concept of “digital solidarity” as a counterpoint, alluding to the importance of respecting fundamental rights in the digital world.

Thus, ideas of sovereignty, as applied to the digital, can have both a positive, rights-affirming connotation, as well as a negative one that leaves the definition of digital rights and duties to the state alone. This can lead to confusion and often obscures the legitimate concerns that Global Majority countries have about technological capacity-building and autonomy in digital governance.

NVIDIA’s addition of the concept of “sovereign AI” further complicates this terrain and may amplify the problems presented by authoritarian pushes for sovereignty in the digital domain. For example, national-level AI governance initiatives that emphasize sovereignty may undermine efforts for collective and collaborative governance of AI, reducing the efficacy of risk mitigations. Over-indexing on sovereignty in the context of technology often cedes important ground in ensuring that transformative technologies like AI are governed in an open, transparent, and rights-respecting manner. Without global governance, the full, uncritical embrace of sovereign AI may make the world less safe, prosperous, and democratic. Below we outline some of the “traps” that can be triggered when sovereignty is invoked in digital contexts without an understanding of the broader political contexts within which such terms are embedded.

Sovereignty trap 1: Sovereign systems are not collaborative

If there is one thing we have learned from the governance of the internet in the past twenty years, it is that collaboration sits at the core of how we should address the complexity and fast-paced nature of technology. AI is no different. It is an ecosystem that is both diverse and complex, which means that no single entity or person should be responsible for allocating its benefits and risks. Just like the internet, AI is full of “wicked problems,” whether regarding the ethics of autonomy or the effects that large language models could have on the climate, given the energy required to build large models. Wicked problems can only be solved through successful collaboration, not with each actor sticking its head in the sand.

Collaboration leads to more transparent governance, and transparency in how AI is governed is essential given the potential for AI systems to be weaponized and cause real-world harm. For example, many of the drones that are being used in the war in Ukraine have AI-enabled guidance or targeting systems, which has had a major impact on the war. Just as closed systems on the internet can be harmful for innovation and competition, as with operating systems or app stores built as “walled gardens,” AI systems that are created in silos and are not subject to a collaborative international governance framework will produce fewer benefits for society.

Legitimate concerns about the misappropriation of AI systems will only worsen if sovereign AI is achieved by imposing harsh restrictions on cross-border data flows. Just like in the case of the internet, data flows are crucial because they ensure access to information that is important for AI development. True collaboration can help level the playing field between stakeholders and address existing gaps, especially in regard to the need for human rights to underlie the creation, deployment, and use of AI systems.

Sovereignty trap 2: Sovereign systems make governments the sole guarantors of rights

Sovereign AI, like its antecedent “digital sovereignty,” means different things to different audiences. On one hand, it denotes reclaiming control of the future from dominant tech companies, usually based in the United States. It is important to note that rallying cries for digital sovereignty stem from real concerns about critical digital infrastructure, including AI infrastructure, being disrupted or shut down unilaterally by the United States. AI researchers have long said that actors in the Global Majority must avoid being relegated to the status of data suppliers and consumers of models, as AI systems that are built and tested in the contexts where they will actually be deployed will generate better outcomes for Global Majority users.

The other connotation of sovereign AI, however, is that the state has the sole authority to define, guarantee, or deny rights. This is particularly worrying in the context of generative AI, which is an inherently centralizing technology due to its lack of interpretability and the immense resources required to build large AI models. If governments choose to pursue sovereign AI by nationalizing data resources, such as by blocking cross-border transfer of datasets that could be used to train large AI models, this could have significant implications for human rights. For instance, governments might increase surveillance to better collect such data or to monitor cross-border transfers. At a more basic level, governments have a more essentialist understanding of national identity than civil society organizations, sociotechnical researchers, or other stakeholders who might curate national datasets, meaning government-backed data initiatives for sovereign AI are still likely to hurt marginalized populations.

Sovereignty trap 3: Sovereign systems can be weaponized

Assessing the risks of sovereign AI systems is critical, but governments lack the capacity and the incentives to do so. The bedrock of any AI system lies in the quality and quantity of the data used to build it. If the data is biased or incomplete, or if the values encoded in the data are nondemocratic or toxic, an AI system’s output will reflect these characteristics. This is akin to the old adage in computer science, “garbage in, garbage out,” emphasizing that the quality of output is determined by the quality of the input.

As countries increasingly rely on AI for digital sovereignty and national security, new challenges and potential risks emerge. Sovereign AI systems, designed to operate within a nation’s own infrastructure and data networks, might inadvertently or intentionally weaponize or exaggerate certain information based on their training data.

For instance, if a national AI system is trained on data that overwhelmingly endorses nondemocratic values or autocratic perspectives, the system may identify certain actions or entities as threats that would not be considered as such in a democratic context. These could include political opposition, civil society activism, or free press. This scenario echoes the concerns about China’s approach to “cyber sovereignty,” where the state exerts control over digital space in several ways to suppress information sources that may present views or information contradicting the official narrative of the Chinese government. This includes blocking access to foreign websites and social media platforms, filtering online content, and monitoring digital communications to prevent the dissemination of dissenting views or information deemed sensitive by the government. Such measures could potentially be reinforced through the use of sovereign AI systems.

Moreover, the legitimacy that comes with sovereign AI projects could be exploited by governments to ensure that state-backed language models endorse a specific ideology or narrative. This is already taking place in China, where the government has succeeded in censoring the outputs of homegrown large language models. This also aligns with China’s push to leverage the Global Digital Compact to reshape internet governance in favor of a more centralized approach. If sovereign AI is used to bolster the position of authoritarian governments, it could further undermine the multistakeholder model of internet and digital governance.

Conclusion

The history of digital sovereignty shows that sovereign AI comes with a number of pitfalls, even as its benefits remain largely untested. The push to wall off the development of AI and other emerging technologies with diminished external involvement and oversight is risky: lack of collaboration, governments as the sole guarantors of rights, and potential weaponization of AI systems are all major potential drawbacks of sovereign AI. The global community should focus on ensuring AI governance is open, collaborative, transparent, and aligned with core values of human rights and democracy. While sovereign AI will undoubtedly boost NVIDIA’s earnings, its impact on democracy is more ambiguous.

Addressing these potential threats is crucial for global stability and security. As AI’s impact on national security grows, it is essential to establish international norms and standards for the development and deployment of state-backed AI systems. This includes ensuring transparency in how these systems are built, maintained, released, and applied, as well as implementing measures to prevent misuse of AI applications. AI governance should seek to ensure that AI enhances security, fosters innovation, and promotes economic growth, rather than exacerbating national security threats or strengthening authoritarian governments. Our goal should be to advance the well-being of ordinary people, not sovereignty for sovereignty’s sake.


Konstantinos Komaitis is a nonresident fellow with the Democracy + Tech Initiative of the Atlantic Council’s Digital Forensic Research Lab.

Esteban Ponce de León is a research associate at the Atlantic Council’s Digital Forensic Research Lab based in Colombia.

Kenton Thibaut is a resident China fellow at the Atlantic Council’s Digital Forensic Research Lab.

Trisha Ray is an associate director and resident fellow at the Atlantic Council’s GeoTech Center.

Kevin Klyman is a visiting fellow at the Atlantic Council’s Digital Forensic Research Lab.

Further Reading

1    A note that countries could pursue sovereign AI in different ways, including by acquiring more AI chips and building more data centers to increase domestic capacity to train and run large AI models, training of fine-tuning national AI models with government support, building datasets of national languages (or images of people from the country) to enable the creation of more representative training datasets, or by blocking foreign firms and countries from accessing domestic resources that might otherwise be used to train their AI models (e.g., critical minerals, data laborers, datasets, or chips). This piece focuses on data, as it has been critical in discussions of digital sovereignty.

The post The sovereignty trap appeared first on Atlantic Council.

]]>
Ukraine’s drone success offers a blueprint for cybersecurity strategy https://www.atlanticcouncil.org/blogs/ukrainealert/ukraines-drone-success-offers-a-blueprint-for-cybersecurity-strategy/ Thu, 18 Jul 2024 20:28:12 +0000 https://www.atlanticcouncil.org/?p=780918 Ukraine's rapidly expanding domestic drone industry offers a potentially appealing blueprint for the development of the country's cybersecurity capabilities, writes Anatoly Motkin.

The post Ukraine’s drone success offers a blueprint for cybersecurity strategy appeared first on Atlantic Council.

]]>
In December 2023, Ukraine’s largest telecom operator, Kyivstar, experienced a massive outage. Mobile and internet services went down for approximately twenty four million subscribers across the country. Company president Alexander Komarov called it “the largest hacker attack on telecom infrastructure in the world.” The Russian hacker group Solntsepyok claimed responsibility for the attack.

This and similar incidents have highlighted the importance of the cyber front in the Russian invasion of Ukraine. Ukraine has invested significant funds in cybersecurity and can call upon an impressive array of international partners. However, the country currently lacks sufficient domestic cybersecurity system manufacturers.

Ukraine’s rapidly expanding drone manufacturing sector may offer the solution. The growth of Ukrainian domestic drone production over the past two and a half years is arguably the country’s most significant defense tech success story since the start of Russia’s full-scale invasion. If correctly implemented, it could serve as a model for the creation of a more robust domestic cybersecurity industry.

Stay updated

As the world watches the Russian invasion of Ukraine unfold, UkraineAlert delivers the best Atlantic Council expert insight and analysis on Ukraine twice a week directly to your inbox.

Speaking in summer 2023, Ukraine’s Minister of Digital Transformation Mykhailo Fedorov outlined the country’s drone strategy of bringing together drone manufacturers and military officials to address problems, approve designs, secure funding, and streamline collaboration. Thanks to this approach, he predicted a one hundred fold increase in output by the end of the year.

The Ukrainian drone production industry began as a volunteer project in the early days of the Russian invasion, and quickly became a nationwide movement. The initial goal was to provide the Ukrainian military with 10,000 FPV (first person view) drones along with ammunition. This was soon replaced by far more ambitious objectives. Since the start of Russia’s full-scale invasion, more the one billion US dollars has been collected by Ukrainians via fundraising efforts for the purchase of drones. According to online polls, Ukrainians are more inclined to donate money for drones than any other cause.

Today, Ukrainian drone production has evolved from volunteer effort to national strategic priority. According to Ukrainian President Volodymyr Zelenskyy, the country will produce more than one million drones in 2024. This includes various types of drone models, not just small FPV drones for targeting personnel and armored vehicles on the battlefield. By early 2024, Ukraine had reportedly caught up with Russia in the production of kamikaze drones similar in characteristics to the large Iranian Shahed drones used by Russia to attack Ukrainian energy infrastructure. This progress owes much to cooperation between state bodies and private manufacturers.

Marine drones are a separate Ukrainian success story. Since February 2022, Ukraine has used domestically developed marine drones to damage or sink around one third of the entire Russian Black Sea Fleet, forcing Putin to withdraw most of his remaining warships from occupied Crimea to the port of Novorossiysk in Russia. New Russian defensive measures are consistently met with upgraded Ukrainian marine drones.

In May 2024, Ukraine became the first country in the world to create an entire branch of the armed forces dedicated to drone warfare. The commander of this new drone branch, Vadym Sukharevsky, has since identified the diversity of country’s drone production as a major asset. As end users, the Ukrainian military is interested in as wide a selection of manufacturers and products as possible. To date, contracts have been signed with more than 125 manufacturers.

The lessons learned from the successful development of Ukraine’s drone manufacturing ecosystem should now be applied to the country’s cybersecurity strategy. “Ukraine has the talent to develop cutting-edge cyber products, but lacks investment. Government support is crucial, as can be seen in the drone industry. Allocating budgets to buy local cybersecurity products will create a thriving market and attract investors. Importing technologies strengthens capabilities but this approach doesn’t build a robust national industry,” commented Oleh Derevianko, co-founder and chairman of Information Systems Security Partners.

The development of Ukraine’s domestic drone capabilities has been so striking because local manufacturers are able to test and refine their products in authentic combat conditions. This allows them to respond on a daily basis to new defensive measures employed by the Russians. The same principle is necessary in cybersecurity. Ukraine regularly faces fresh challenges from Russian cyber forces and hacker groups; the most effective approach would involve developing solutions on-site. Among other things, this would make it possible to conduct immediate tests in genuine wartime conditions, as is done with drones.

At present, Ukraine’s primary cybersecurity funding comes from the Ukrainian defense budget and international donors. These investments would be more effective if one of the conditions was the procurement of some solutions from local Ukrainian companies. Today, only a handful of Ukrainian IT companies supply the Ukrainian authorities with cybersecurity solutions. Increasing this number to at least dozens of companies would create a local industry capable of producing world-class products. As we have seen with the rapid growth of the Ukrainian drone industry, this strategy would likely strengthen Ukraine’s own cyber defenses while also boosting the cybersecurity of the wider Western world.

Anatoly Motkin is president of StrategEast, a non-profit organization with offices in the United States, Ukraine, Georgia, Kazakhstan, and Kyrgyzstan dedicated to developing knowledge-driven economies in the Eurasian region.

Further reading

The views expressed in UkraineAlert are solely those of the authors and do not necessarily reflect the views of the Atlantic Council, its staff, or its supporters.

The Eurasia Center’s mission is to enhance transatlantic cooperation in promoting stability, democratic values, and prosperity in Eurasia, from Eastern Europe and Turkey in the West to the Caucasus, Russia, and Central Asia in the East.

Follow us on social media
and support our work

The post Ukraine’s drone success offers a blueprint for cybersecurity strategy appeared first on Atlantic Council.

]]>
Cryptocurrency Regulation Tracker and Kumar cited by Axios on crypto regulation https://www.atlanticcouncil.org/insight-impact/in-the-news/cryptocurrency-regulation-tracker-and-kumar-cited-by-axios-on-crypto-regulation/ Thu, 18 Jul 2024 16:06:45 +0000 https://www.atlanticcouncil.org/?p=781060 Read the full newsletter here.

The post Cryptocurrency Regulation Tracker and Kumar cited by Axios on crypto regulation appeared first on Atlantic Council.

]]>
Read the full newsletter here.

The post Cryptocurrency Regulation Tracker and Kumar cited by Axios on crypto regulation appeared first on Atlantic Council.

]]>
Cryptocurrency Regulation Tracker cited by Axios on global crypto regulation https://www.atlanticcouncil.org/insight-impact/in-the-news/cryptocurrency-regulation-tracker-cited-by-axios-on-global-crypto-regulation/ Mon, 15 Jul 2024 13:45:54 +0000 https://www.atlanticcouncil.org/?p=781000 Read the full newsletter here.

The post Cryptocurrency Regulation Tracker cited by Axios on global crypto regulation appeared first on Atlantic Council.

]]>
Read the full newsletter here.

The post Cryptocurrency Regulation Tracker cited by Axios on global crypto regulation appeared first on Atlantic Council.

]]>
Cryptocurrency Regulation Tracker cited by Politico on crypto relevance in US election https://www.atlanticcouncil.org/insight-impact/in-the-news/cryptocurrency-regulation-tracker-cited-by-politico-on-crypto-relevance-in-us-election-cycle/ Mon, 15 Jul 2024 13:38:22 +0000 https://www.atlanticcouncil.org/?p=780996 Read the full newsletter here.

The post Cryptocurrency Regulation Tracker cited by Politico on crypto relevance in US election appeared first on Atlantic Council.

]]>
Read the full newsletter here.

The post Cryptocurrency Regulation Tracker cited by Politico on crypto relevance in US election appeared first on Atlantic Council.

]]>
The impact of corruption on cybersecurity: Rethinking national strategies across the Global South   https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/the-impact-of-corruption-on-cybersecurity-rethinking-national-strategies-across-the-global-south/ Tue, 02 Jul 2024 00:08:00 +0000 https://www.atlanticcouncil.org/?p=818032 As the Global South prepares for the next stage in ICT development, governments must prioritize policies that reduce corruption in critical network software procurement to protect those countries' developing cyberspace.

The post The impact of corruption on cybersecurity: Rethinking national strategies across the Global South   appeared first on Atlantic Council.

]]>

Executive summary

Recent government-wide shutdowns of information systems in a half-dozen developing countries ranging from Albania to Vanuatu suggest that ransomware and state-sponsored attacks are finding success in targeting critical infrastructure networks of the Global South. Over the first decade of their integration with the digital economy low-income and lower-middle-income countries faced relatively few cyberattacks, but that honeymoon appears to be over, with the Global South now ranking first in cyberattacks per institution and cyberattacks per capita. 

As mobile device e-commerce and ICT networks continue to expand across the Global South, this rise in cyberattacks is not surprising. Nevertheless, the level of digital integration in the region still trails the rest of the world, suggesting the record-setting levels of cyberattacks may be the result of vulnerabilities systemic to the region. The most corrosive of these problems is corruption. While few governments in the Global South have publicized the role of IT corruption in critical infrastructure enterprises, this analysis builds on donor and regional software association investigations to argue that IT departments in the Global South are vulnerable to corrupt procurement schemes catalyzed by the proliferation of pirated software.  

Until recently the prevalence of pirated or lapsed licensed software on government networks across the Global South may have led to little more than poor or unpredictable network performance. This is no longer the case today, as networks built around pirated software serve as easy targets for ransomware gangs and hacktivists that still find decades-old malware like the “WannaCry” worm to be effective in countries challenged by systemic corruption. 

In response to the growing cyber threat, governments in the region and foreign donors focused their response on the best practices found in the action plans and policy initiatives drawn from national cybersecurity strategies designed for the Global North. As a result, not one government’s national cybersecurity strategy in the Global South recognizes corruption as an important issue for critical infrastructure network security.  

This analysis underlines the effects of addressing corruption on cybersecurity by highlighting the positive impacts of Ukraine’s switch to an autonomous and transparent procurement platform by comparing the experience of cyberattacks in 2017 with those that accompanied the 2022 full-scale invasion of the country. Taking these lessons forward, cybersecurity officials across the Global South must consider identifying procurement corruption as a cybersecurity risk and develop initiatives to mitigate the impact of systemic corruption on cybersecurity.  

Introduction

“Cyber criminals are coming for the Global South”

Deutsch Welle1

The global revolution in information and communications technology (ICT) has expanded educational and economic opportunities across the Global South2 even as it brings new threats of inequality and cyber vulnerability. Whether these countries are prepared, they now represent the fastest-growing population of new internet users. Moreover, malicious hackers have recognized this rise in networked users, with Latin America and the Caribbean now leading the globe in the rate of cyberattacks as a share of the networked population,3 while Africa leads in the rate of cyberattacks per institution.4   

The process of digital transformation started later in the Global South, which likely limited the vulnerability of these countries to ransomware attacks. This is no longer the case. Vanuatu served as a wake-up call in 2022 when most of the island’s public services shut down after hackers encrypted the government’s data networks.5  The ransomware gang’s commitment of time and resources to infiltrate Vanuatu’s government networks demonstrates that even the smallest nations in the Global South can no longer assume they will be overlooked by global hacker organizations.  

A critical lesson from the first decade of ubiquitous cyberattacks is the importance of patching an enterprise’s network software. Unfortunately, the vulnerabilities that IT professionals must track and patch each year have been growing, especially since the arrival of cryptocurrency in the mid-2010s offered the first practical means for hackers to receive payments after locking up or seizing data.6 Figure 1 shows MITRE’s recorded annual increase in registered vulnerabilities and exposures, which shows the growth has been rising at an exponential rate since 2018. As ransomware began to grow and criminal organizations sought to continue finding lucrative and vulnerable targets, hackers suddenly turned to institutional networks in countries they might never have heard of before researching potential targets.7 A growing horde of ransomware organizations appear to be choosing targets based first on vulnerability, which has resulted in more attacks on institutions in the Global South.8  

Although the need to patch software vulnerabilities has never been higher, corrupt practices in software procurement explain why many organizations do not regularly update their security. Functioning software that was not legitimately acquired rarely provides a connection to the software vendor.9  The presence of pirated software on a network reduces the likelihood that the network is regularly receiving updates that the software’s producer distributes to patch newly discovered vulnerabilities.10
 
An organization’s cybersecurity can also face vulnerabilities due to obsolete versions of software still running on its network. This can happen for multiple reasons, from vendors going out of business to developers choosing to no longer support a product line. In underfunded institutions across the globe, it is not rare to find the continued use of obsolete software. This vulnerability is further exacerbated by procurement managers prioritizing corrupt rents over issues of trusted vendors or sustainable support for software.  

Given the epidemic levels of corruption in public and private procurement across the Global South,11  this study draws from recent cybersecurity experiences in European and Eurasian economies similarly challenged by corruption to argue that a digitally integrated Global South may be more susceptible to cyberattacks than those in the Global North. While the limited scale of the digital economy across most of the Global South continues to keep these countries out of top spots in terms of the total number of attacks, the Global South has suddenly become a disproportionately high malware target.12 This new reality reflects unique challenges to cybersecurity in the Global South and also suggests that the solutions to this challenge may not be found in the traditional national cybersecurity strategies based on the playbooks of more developed countries.  

The digitalization of the Global South has only begun 

The International Telecommunication Union estimates that the Global South passed the milestone of more than half of its citizens gaining access to the internet in 2022. At this growth rate, more than 75 percent of the Global South will be connected by the end of 2025.13  Most of this access is represented by limited bandwidth connections to mobile phone subscribers, which allow for a range of services to citizens that, because of resource constraints or great distances, were previously impractical to offer at scale. For example, the tiny nation of Vanuatu provides its citizens residing across its far-flung islands the ability to use mobile phones to pay utility bills and taxes or initiate government document requests without a long trip between islands.14 The economic impact is enormous for citizens who are no longer required to spend 1-2 days of travel for administrative tasks. 

Figure 2

The private services offered by early mobile phone entrepreneurs in the Global South have been no less impressive. Widespread mobile phone use looks to be a pathway from poverty for millions of citizens once isolated from the global flow of information resources.15 ICT-based businesses may already be the leading force for economic growth in many of these countries. A study between 2007 and 2016 found mobile phone diffusion had a more significant impact on the rise in gross national product (GNP) in Sub-Saharan Africa than any other form of investment.16 Across Africa, rural residents who lack access to landline phones or banks benefit from nearly one billion mobile phones that allow them to tap into the internet sites (notably, banking and wholesale services) necessary to engage in entrepreneurial activity.17 Moreover, the nascent digital information space in these countries has allowed the emergence of internet-based businesses specifically supporting rural entrepreneurs with a range of supply chain and logistic services.18

Despite the rapid growth in mobile phone-led economic activity, most countries in the Global South are just now starting to develop the ICT infrastructure needed to support this demand. Many states in the Global South have only completed the “first mile” of broadband access–global connections to their capitals and large cities–and large parts of the population still lack access to reliable broadband internet.19 Like mobile phone connectivity, widely distributed broadband is positively associated with economic growth. Two findings have become measuring sticks in the digital development sphere: the World Bank estimates that a 10 percent increase in broadband leads to a 1.4% increase in GNP20 and the McKinsey Global Institute found ICT economic activity over the first decade of internet connectivity may have accounted for more than 21% of the gross domestic product (GDP) growth in mature economies.21 

The new wave of ICT development in the Global South is realizing this economic potential by bringing broadband infrastructure to smaller cities and rural communities. Improved connectivity is already affecting the quality of life in the Global South,22 allowing for national e-business, good governance solutions, and social services like healthcare and education to operate beyond the limited bandwidth offered by mobile phone data connections. 

The World Bank has provided more than $1.2 billion in ICT lending alone for broadband development in Africa, the South Pacific, and the Caribbean.23 Moreover, Nigeria and Mozambique have led the way in Africa by licensing SpaceX’s Starlink service, which offers near broadband connections through low-orbit satellites for private users.24 Certainly, Starlink’s fees and terminals are barriers to access for most citizens in the Global South, but it and future providers are the first competitors to largely state-owned services in the region that have not succeeded in providing economical and reliable high-speed service across large swaths of territory.  

Nevertheless, the growing benefits of the information age in the region come with risks–this same connectivity also attracts scores of cyber criminals who expect to profit from vulnerabilities in connected enterprise networks. 

Corruption in public procurement 

Corruption in procurement processes is a global problem, but the scale of systemic corruption in procurement tenders in the Global South has long been a major obstacle to developing effective governance and prosperity.25 This issue does not go unrecognized by local leaders and external advisors, but they rarely account for this threat when drafting new regulatory or development initiatives.26 The backroom decisions on what hardware and software is purchased for large enterprise information networks may be the archetype of systemic corruption but it is routinely missed by national cybersecurity strategists.  

As with most forms of corruption, there are few studies on corrupt practices in software procurement but countless anecdotes of rent-seeking found in public sector network management in developing countries.27 In this author’s thirteen years of experience overseeing IT development projects in four post-Soviet countries in Europe and Eurasia, this was the common view of corruption held by those working for critical infrastructure enterprises and IT Departments inside and outside government. Control over IT procurement decisions in systemically corrupt countries is ideally suited for inflating costs and hiding kickbacks because networks are built around software that is neither visible nor readily measurable as authentic through the standard procurement oversight measures of quantity, delivery, and price.28

Another barrier to changing the software procurement culture in the Global South is the social norms and expectations among senior management and network administrators who in their everyday lives use or interact with pirated software on personal devices.29 In countries where the use of pirated software is not viewed as a significant ethical or technical issue, managers of critical infrastructure enterprises may be less hesitant to acquire cheaper, pirated software for their networks. In fact, this may even be perceived as a positive decision that reduces the organization’s IT budget.  

The Business Software Alliance (BSA) found that although globally one-third of software in the private sector is unlicensed, in countries in the Global South this proportion may be twice as high. In the last breakdown for the Middle East and Africa in 2019, for instance, the BSA found that fifty-six percent of software in use was pirated.30 This short-sighted view of the risks of pirated software undermines the state’s ability over the long term to protect domestic networks from cyberattacks. While most government officials in the region were raised in a previous era of altruistic websites distributing unlicensed software with few downsides, this is no longer the case. One of the few studies examining pirated software samples from eleven developing countries found that 61 percent contained malware.31

The illicit rents found in legal software procurement, on the other hand, come in the form of bribes paid to one or more employees at the purchasing firm, an intermediary, or the supplier.  This can occur through the purchasing enterprise soliciting the bribe (extortion), the seller offering the bribe for colluding (kickback), or an intermediary receiving fees or commissions on the inflated price of the transaction.32 Interviews with investigators of private procurement fraud in the Global South find that most align with the dominant embezzlement practices found in the country’s wider economy.33 As the seller can often procure pirated or unsupported software at a fraction of the market price, the rents gained by the supplier can approach 100 percent of the stated cost.  

An organization that continually uses pirated or unsupported software will likely develop a culture of avoiding–rather than actively pursuing–interactions with its software’s producers. Although some software companies claim to provide software patches to customers even after they stop paying for licenses, in practice those using pirated network software rarely receive updates from the vendors.Angela Moscaritolo, “Losses from software piracy leads $51 billion in 2009,” SC Media, May 13, 2010, https://ww34 It is a source of debate as to where the blame lies. On the one hand, users complain of significant technical hurdles for updating unregistered software. On the other hand, vendors claim that few network administrators overseeing unlicensed copies ever seek them out, leaving them unaware of who is running pirated copies of their unpatched software. In either case, the presence of pirated software increases the likelihood that the organization’s network is susceptible to vulnerabilities.35 Even if an unregistered organization seeks out and applies a patch, because the process is not timely or automatic, there will always be a window of time with unpatched vulnerabilities.  

In evaluating their country’s cybersecurity posture, governments in the Global South must measure the degree to which pirated and unpatched software is present on their information platforms and identify mechanisms that can decrease their rate of use. It may be wise for policymakers to look at culture and practice instead of simply increasing IT budgets. Comparative country research shows that the income of countries or individual enterprises was not a consistent predictor of choosing licensed or pirated software. Instead, the strongest predictors were a tolerance of open pirated software markets and the degree of systemic corruption in the country.36 Moreover, a comparison of a half dozen policy measures in eleven African countries found that the strongest initiative reducing the presence of pirated software on networks was implementing corruption-control policies, not measures that raised incomes or procurement budgets.37

Case study: IT procurement corruption in Pakistan 

Even donor-funded procurement can fall victim to IT procurement schemes. Drawing on a 2019 World Bank loan, the Pakistan Federal Board of Revenue (FBR) used $80 million to upgrade the Karachi data center as its hardware and software were no longer supported by vendors and had been assessed as “end-of-life equipment.”38 Just a year after the procurement, the US Assistant Secretary of State Alice Wells publicly accused FBR of using pirated versions of US software in the data center.39 A year later, a suspected Russian cybercriminal gang gained access to the center’s more than 1,500 computers and data; reportedly benefiting from the pirated and unsupported Microsoft Hyper-V software used for the virtual hard disks storing FBR data.40The FBR has never identified the vendor involved in the World Bank procurement or whether they paid the ransom to unlock their data that was advertised for sale on a Russian dark web site.  

As countries struggling with public corruption or high levels of pirated software integrate further into the global digital economy, they are increasingly susceptible to cyberattacks on their critical infrastructure. Some observers already view 2022 as an inflection point in the rising number of successful hacks of smaller countries.41 In July 2022, for example, the government of Albania was forced to shut down its government computer and internet systems after a devastating cyberattack. The intrusion was a result of an unpatched version of the file-sharing software Microsoft SharePoint Server (versus the more common cloud-based Microsoft 365 SharePoint) that understaffed IT teams had maintained for years on their networks.42 Albania has not chosen to explain how its software did not get the patch for this vulnerability released automatically by Microsoft two years earlier. As mentioned previously, the island nation of Vanuatu was also hit by a ransomware attack in 2022 that froze nearly all government network servers, shutting down fire and rescue services, erasing five months of court data, and preventing 315,000 citizens from paying taxes or utilities.43 That same year, two more ransomware attacks by the Russia-based Conti Group led the Costa Rican government to declare a national emergency,44 and cybercrime groups also temporarily gained control of government networks in Montenegro and Chile. 

Regardless of the technical cause, the lessons from these examples are the same: Countries seeking to protect networks across their critical infrastructure must prioritize systematic communications with software developments and implement regular updates or face an army of hackers that target unpatched vulnerabilities to gain control of a network. 

The ascendancy of cyberattacks in the Global South buoyed by these successful breaches also suggests that cybercriminals are now targeting small or economically challenged countries because they may be viewed as “softer” hacking targets. Certainly, enterprises around the world continue to pay ransomware, as 2023 set a record for total and average payments of ransoms. The recent cybercriminal focus on the Global South, however, may partly reflect a perception that their networks represent lower-risk targets with a higher willingness to pay for returning access to their data.45 The strong correlation between systemic corruption and a preference for pirated software may shape an approach to ransomware that is appealing to cyber criminals. If an organization’s management has been earning significant kickbacks on purchases of pirated software, for example, they are unlikely to pursue a strategy of resisting ransom requests, instead quietly choosing to pay and maintain the status quo. The focus on the Global South may also reflect a landscape of reduced opportunities in the Global North. Leading ransomware negotiator Coveware recently reported that the portion of victims in the U.S. paying the ransom has fallen by half over the last three years (See Figure 3); the same exact period that has seen a dramatic increase in attacks on enterprises in the Global South.46  

Moving forward, more and more government institutions and critical infrastructure enterprises in the Global South will likely be targeted as they continue to integrate with global information and communication networks. What is less certain is whether the procurement culture in these countries can keep up by transforming from one of avoiding the attention of software developers to a strategy of maximizing communication and exchanges. This transition is unlikely to succeed if corrupt practices continue to incentivize avoiding transparent procurement and collaboration with vendors to support resilient network systems. Moreover, the transition will require a proactive government guided by a clear national cybersecurity strategy that addresses the unique cyber policy challenges in the Global South. 

What is in the National Cybersecurity Strategies – And what isn’t

As digital connectivity continues to expand, more than 100 countries have developed national cybersecurity strategies to serve as the framework for synchronized public-private cybersecurity development. A review of the twenty-three published national strategies from countries in Africa and the Asia-Pacific region found that, in general, the strategies’ objectives were grouped across a minimum of four pillars for strengthening cyber resilience.47 

The first common pillar consists of strategic objectives that often include developing new cybersecurity agencies and/or improving coordination between disparate ministries overseeing cybersecurity policy. This pillar also includes new policy initiatives based on gap analyses of the country’s cybersecurity architecture. The government’s structural reform steps are often intertwined with the second pillar of legislation and regulations. The Council of Europe has been the most influential donor in this space, assisting in the development of legislative frameworks and advising in the development of national cybersecurity strategies in at least nineteen countries in the Global South.  

The last two pillars focus on external initiatives. The third pillar is focused on public-private partnerships, including cooperation with multinational software producers and other governments pursuing cybersecurity. The fourth major pillar usually describes information campaigns and education initiatives that would strengthen cybersecurity in the workforce. While national strategies in the Global South have prescribed more limited activities in the fourth pillar, the EU has recently joined the US in developing cybersecurity workforce frameworks to bridge the gap between the planning and development of cybersecurity educational standards and the workplace requirements for the knowledge and skills needed to defend critical infrastructure networks.  

Across the national cybersecurity strategies in the Global South, not one of the twenty-three documents contained the terms “corruption” or “pirated software.” In some ways, this is not surprising. The leading roadmap to developing a national cybersecurity strategy, the UN’s International Telecommunication Union’s (ITU) Guide to Developing a National Cybersecurity Strategy, also does not reference corruption or pirated software. The 2018 guide was produced by a partnership between ITU, the World Bank, the Council of Europe, the Organization of American States (OAS), Interpol, Microsoft, Deloitte, and the NATO Cooperative Cyber Defense Center of Excellence, as well as several think tanks. The guide specifically states its objective is “to “provide direction and good practice on ‘what’ should be included in a National Cybersecurity Strategy, as well as on ‘how’ to build, implement and review it.”48

Case study: International counter ransomware initiative 

The most significant US-sponsored global cybersecurity initiative is arguably the International Counter Ransomware Initiative (CRI). Now in its third year of existence, the group has established a platform for capacity building and developing best practices to reduce the success of ransomware, including via a joint statement that member countries should not pay ransoms.49 Although more than a dozen of the fifty nation-state participants in the CRI are considered Global South countries that face significant challenges in addressing systemic corruption, the CRI’s policy and capacity-building efforts have so far followed the ITU and World Bank’s lead in not addressing procurement corruption as part of cybersecurity initiatives.50

As representatives of government and civil society in the Global South look to further develop and reassess their national policies and infrastructure for cybersecurity, they are unlikely to find anti-corruption best practices in the prevailing guiding documents and best practices. The reality is that top cybersecurity officials in North America and the EU do not consider the role of corruption to be a major or even minor factor in their country’s cybersecurity resilience. Instead, countries in the Global South must consider the context of corruption and its impact on cybersecurity and critical infrastructure resilience when developing their strategies, as well as learn from the experiences of other states’ adoption of reform initiatives focused on procurement corruption.  

Global South lessons learned: The Ukrainian response to corruption

Ukraine offers a case study of how a country challenged by systemic corruption can reduce its impact on network security. In the years leading up to the start of open conflict with Russia in 2014, on more than one occasion senior officials in Ukrainian ministries iterated to the author that they would rather cancel a project than not receive their preference for an expensive network software solution. In at least one case this prevented a donor-supported project from moving ahead as the ministry refused to use a simpler, less expensive software product that was more aligned with their needs and local network. Across several ministries, the practice of procuring the highest-cost network solutions over this period would result in arrears owed to the vendor due to the inability to pay annual fees. At one point, the sales representative of a global network software company told the author that they would not sell new software to a US-funded project if the ministry did not agree to pay off years of outstanding annual license fees owed from past procurement.  

By late 2014, as the first wave of cyberattacks on Ukraine preceded the Russian military’s annexation of Crimea, most critical state infrastructure had been operating for years without licenses (and the associated updates and patches), even legally purchased software.51 Many institutions were instead paying a fraction of the retail price to obtain pirated versions of software, which conveniently left the bulk of the recorded procurement expenditures for corrupt rent-seeking. This explains how, prior to 2014, an estimated eighty percent of the network software used in Ukrainian private and public enterprises either never had been or no longer was supported by the software’s vendors.52 

As hackers associated with Russia began cyberattacks in support of the new “special operation” in Ukraine, they targeted local software commonly used in the two countries by exploiting vulnerabilities for which patches had not been installed.53 Most notably, in 2015 the Russian military hacker group Sandworm used Blackenergy-3 malware to temporarily knock out the information networks of three energy distribution companies, denying power to more than 200,000 homes in 2015. The next year, the Industroyer-1 malware was used to target the Kyiv region’s power grid.54 Slovakian cybersecurity firm ESET found that the hackers benefited from knowledge of common post-Soviet electric grid networks and control system software. ESET reported that a major factor in the success of the power grid attacks was the failure of Ukrainian electrical distribution enterprises to change obsolete and unpatched operating system software. 

In arguably the most damaging cyberattack in history, in 2017 the Sandworm group unleashed the NotPetya wiper malware that specifically targeted a well-publicized vulnerability in Microsoft network software that the company had patched in updates a few months before the attack. At that time, most Ukrainian enterprises were using either pirated or older versions of Microsoft data management software and thus did not receive timely or automatic updates.55 Although Microsoft and other vendors in principle permit operators of pirated software to request and apply updates, this is rarely accomplished and the exploitation of unprotected networks in Ukraine accounted for more than an estimated $10 billion in commercial losses.56 The NotPetya malware is also an example of a software vendor advertising new software updates after an attack. A secondary effect of this disclosure, however, is that it provides hackers a roadmap for similar attacks on other unpatched systems in the Global South.  

Policy recommendations drawn from Ukraine

Since 2017, Ukraine has adopted, with mixed results, a range of internal and donor-supported anti-corruption initiatives ranging from the establishment of investigation bureaus to prosecuting state corruption and mounting ad campaigns that promote good governance.57 One of the most well-known developments, which also had an outsized impact on software procurement corruption, is the launch of a national e-government tool for public procurement.58 A public/private-administered electronic platform for government tenders, ProZorro, which means “through transparency” in Ukrainian, began operating with more than 300 private suppliers in 2016. ProZorro largely put an end to backroom procurement processes in Ukraine by making bidding and decision-making available to the public, which reduces opportunities for rent-seeking.59

Over the next four years, additional legislative and operational improvements were made to ProZorro, including integrating the role of tax authorities directly onto the platform to provide additional oversight for fraudulent pricing and hidden kickback schemes. By gaining private sector support early in its development, ProZorro was able to move the government’s IT infrastructure purchases onto a platform by 2019, which by then was facilitating $22 billion worth of tenders across the government.60 In a sign of trust in the transparency and efficiency of ProZorro, the World Bank has also began conducting its own Ukrainian procurement through the platform.61 

In 2022, the Computer Emergency Response Team of Ukraine (CERT) reported a total of 2,194 investigated malware attacks, twenty-five percent of which targeted government systems, with at least a dozen cases in which the malware was detected on critical infrastructure information systems.62 Nonetheless, the work of the CERT, bolstered by robust private sector partnerships with software developers, led to quick responses to patch identified vulnerabilities before malware could spread and result in significant network outages. The result of this new capacity has been the prevention of cyber-induced infrastructure outages such as the electric grid collapses that plagued Ukraine in 2015-2016.63  

In the years following the NotPetya attack, Ukrainian public and private organizations began addressing old debts to network software vendors while using the ProZorro platform for new IT procurement. As a result, the country’s state-owned critical infrastructure operators were forced to pursue open tenders on a public-private run platform while network software companies returned to selling licenses to the state enterprises. The author was told by senior officials at Ukraine’s State Special Communications Service (SSCS) that they estimated the share of pirated and unsupported software on the country’s networks had dropped from more than eighty percent at the start of the conflict with Russia in 2014 to only twenty percent in 2020. 

While state enterprises have been required to make transparent software purchases since 2020, anti-corruption progress in the private sector is less certain. As part of the 2022 Russian cyberattacks on Ukraine, the Mandiant cybersecurity firm found that Russian military intelligence hackers likely uploaded “trojanized” versions of Microsoft software on torrent sites popular with Ukrainians.64The malware was part of the Ukrainian language packs that, if selected, would perform reconnaissance on a system and install further malware as needed.  

The commitment of state critical infrastructure in Ukraine to rapidly expand licensed software on their networks also drew the interest of large international software vendors that saw Ukraine as ground zero in identifying new malware.65 Therefore, as Ukrainian public and private sector enterprises pursued legitimate purchases of licensed software, they also found that vendors were just as motivated to repair relationships with Ukraine’s large network operators. A benefit that few could have predicted in 2016 at the start of Ukraine’s anticorruption agenda is the role that the return of licensed software vendors would have in countering the much larger volume of cyberattacks that accompanied the 2022 Russian invasion. The major network software vendors, such as Microsoft and Cisco, established computer response and threat intelligence teams in Ukraine as part of their effort to identify and mitigate new threats to their licensed software before the malware targeting Ukraine could become a global problem.66

The transformation of Ukrainian cybersecurity resilience over the five years between the last of the most harmful cyberattacks on the country (WannaCry and NotPetya) in 2017 and the resilience in the face of the relentless wave of malware attacks that accompanied Russia’s 2022 full-scale invasion suggests governments can proactively make progress against serious systemic vulnerabilities. Nonetheless, the anti-corruption approach must be relentless to succeed. For example, it was no surprise when in late 2023 national anti-corruption investigators uncovered a large IT software kickback where two senior SSCS officials had falsely categorized some procurement as classified, keeping it from being posted on the ProZorro site.67  

Overall, the Ukrainian experience suggests that countries burdened with systemic corruption should integrate procurement reform into their cybersecurity measures to mitigate the impact of cultures across the Global South that have promoted or looked the other way at the use of pirated or unsupported software.  

Addressing corruption in cybersecurity strategies

The decision by a dozen of the world’s most influential institutions promoting international cybersecurity not to address the threat of systemic corruption in their 2018 Guide to Developing a National Cybersecurity Strategy continues to be echoed in advisory and technical assistance offered to countries in the Global South. A recent example is the removal of considerations for sectoral vulnerability to procurement corruption in the World Bank’s 2023 influential sectoral cyber capability maturity model (C2M2) assessment tool, which was originally present in the pioneering PRoGReSS sectoral C2M2 developed by Tel Aviv University that the assessment tool is based upon.68 

It is clear from the Ukrainian case study that neglecting issues of corruption in software procurement may result in overlooking an important lever for reducing overall cyber vulnerabilities. While officials in both the Global South and Global North tend to avoid public discussions of corruption, Ukraine’s IT procurement transparency reform offers cybersecurity policymakers a more targeted and politically acceptable policy goal. Certainly, the absence of guidance on IT procurement corruption is leaving cybersecurity strategists in countries challenged by systemic corruption without inspirational goals or advice on mitigating a key threat to their critical infrastructure networks.  

As profiled in this analysis, Pakistan offers a cogent example of a country seeking to address its vulnerability to IT procurement corruption. Just two years after a Russian ransomware organization gained complete access to the revenue service’s new data center riddled with unsupported software, the Ministry of Foreign Affairs official responsible for cybersecurity championed the need to adopt national policies in line with the 2018 Guide to Developing a National Cybersecurity.69 The Guide offers a robust set of recommendations and certainly should influence Pakistan’s implementation of its 2021 national cybersecurity strategy, but a government that witnessed first-hand how procurement corruption undermines critical infrastructure cybersecurity would also have benefited from the inclusion of guidance and materials on targeted procurement anticorruption measures—advice not found in the 2018 Guide. 

The dramatic turnaround in the resilience of Ukrainian networks demonstrates the importance of cybersecurity strategies that include the adoption of external and transparent procurement platforms for critical infrastructure enterprise software and technology. As with any capacity-building measure, a cybersecurity anti-corruption initiative could start small as countries struggle to wrestle public procurement from rent-seeking interest groups. A national public tender system that covers all procurement, such as Ukraine’s ProZorro, is an ambitious goal that requires years to develop and operationalize. Nevertheless, national cybersecurity strategies could promote more limited platforms focused on critical infrastructure enterprise procurement from the handful of network software providers serving the market.  

IT procurement reform success depends on the degree to which sectoral or national institutions introduce public-private collaboration, transparency, and autonomy into decision-making processes that currently happen in the backrooms of state bureaucracies. A failed approach was demonstrated in Kenya when the centralization of IT procurement within a single ministry led to the doubling or tripling of prices for key technologies negotiated by newly empowered senior officials.70 Kenya’s cybersecurity strategists should be credited with seeking to address the vulnerabilities linked to IT procurement processes. Moreover, they were proposing solutions in a sphere (IT procurement reform) that international donors and cybersecurity consultants continue to avoid.  

The most durable solution is for national cybersecurity strategies to begin to address procurement processes to remove the role of illicit rent-seekers in transactions. Kenya’s failed 2019 centralization of state IT procurement is an example of how many countries in the Global South have only adopted narrow measures limiting the impact of reform to just IT procurement. The next step would be to further limit that procurement to transparent and external electronic tender platforms modeled on Ukraine’s ProZorro system. The e-tender process would serve to transform the country’s critical infrastructure networks by shifting procurement to licensed and updated network software while attracting increased software vendor competition because sales revenues are no longer flowing back to rent-seeking IT administrators.  

A shift in national cybersecurity strategies toward the adoption of e-tender platforms can be facilitated by the rapid growth in e-governance across the Global South. The first generation of e-tender platforms, like ProZorro, were “semi-distributed” to the degree that public and private entities supervise their analytical dashboards across the platform.71 The growing role of blockchain technology in creating transparent contracts across peer-to-peer networks will certainly transform the next generation of transparent procurement platforms.  

Addressing IT procurement vulnerabilities can also build on existing resilience measures in national cybersecurity strategies. For example, cybersecurity awareness campaigns championed in existing national strategies can be leveraged to have a potential anti-corruption role. Their messaging could target not only individuals but also enterprises while highlighting the vulnerabilities that follow the choice to adopt pirated or other unsupported software. A generation of IT managers, who spent decades downloading pirated software for their personal use, must understand that those practices are no longer safe in the era of the ransomware gang and their recent turn toward targeting the Global South.  

Another strategy that often is proposed as a cybersecurity solution for budget-constrained institutions in the Global South is open-source software (OSS). Paying for commercial software is not the only means to reduce the portion of pirated software on an enterprise’s network. OSS software has long been the building blocks of the world’s dominant network software sold by private vendors, and for more than two decades governments in the Global North have been adopting requirements mandating that officials first seek OSS alternatives before purchasing commercial software for their critical infrastructure networks.72 Nonetheless, malware has increasingly been targeting open-source solutions and a policy shift toward OSS in the Global South must be part of a wider government-led effort to recognize the need to support OSS as another element of critical infrastructure.73

As countries continue to innovate in measures to raise transparency in the procurement of IT software and hardware, donors should reconsider their past hesitancy to advocate for anti-corruption measures as part of the cybersecurity strategies they support. The absence of even indirect references to the role of corruption in national cybersecurity strategies across the Global South is inexplicable given the serious cybersecurity risks that are present for countries standing up large information networks founded on pirated or unsupported software. Given the significant challenges developing countries face in responding to cyber threats, they cannot afford to simultaneously overlook the vulnerability associated with corrupt procurement practices.  

Conclusion

Developing countries are continuing to make progress in digitizing governance and trade while simultaneously raising transparency in their public expenditures. Nevertheless, 2022’s country-wide network outages across the Global South suggest this capacity has been built on networks left vulnerable by unlicensed and unsupported software. As governments and critical infrastructure in the Global South prepare for the next stage in ICT development, they must prioritize policies that can reduce corruption in the critical procurement of the network software responsible for protecting their country’s nascent cyberspace. As Adam and Fazekos argue, reform-minded governments and donors throughout the Global South have adopted ICT practices in the fight against national corruption but have developed a blind spot to the role corruption plays in undermining the security of this rapid digitization.74  

Cybersecurity strategists working in the Global South must reevaluate a decade of national strategies that largely replicated those from the Global North. It is no longer safe to assume that cyber best practices are divorced from the harsh reality of addressing systemic corruption. At a minimum, national cybersecurity strategies must, for the first time, identify procurement corruption as a cybersecurity risk. Moreover, countries challenged by systemic corruption and under-resourced governance should consider more limited initiatives, such as creating transparent and autonomous IT tender processes for the most critical state sectors. The digital integration of the Global South offers its citizens greater prosperity and transparency in governance, but as decades of past economic development have demonstrated, the equity and reliability of this new revenue stream will depend on leaders not overlooking the adverse impact corruption can play in the social outcomes of their digital development. 


About the author

Robert Peacock is a nonresident senior fellow at the Cyber Statecraft Initiative of the Atlantic Council’s Digital Forensic Research Lab, where his work builds on his past role supporting the highly correlated goals of reducing corruption in critical infrastructure procurement and developing cybersecurity resilience in the Global South. Peacock is Senior Strategic Technical Advisor at DAI Global advising on cybersecurity development programs, funded by the US Agency for International Development (USAID), across a half dozen countries in Eastern Europe and Eurasia. Peacock’s past advisory roles have included developing assistance programs in Armenia, Mozambique, Morocco, while more recently serving as a co-creator for USAID’s first bilateral cybersecurity program (Ukraine) and first regional cyber pathway for women program (Balkans).


The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.

1    Janosch Delcker, “Ransomware: Cyber criminals are coming for Global South,” Deutsch Welle, August 28, 2022, https://www.dw.com/en/ransomware-cyber-criminals-are-coming-for-the-global-south/a-62917234.
2    Although the term Global South is a preferred term for those nations most challenged in economic growth and good governance, there is no set definition of its membership. This policy brief defines the Global South not by geography or GNP, but rather by any country that is not one of the top 60 countries in Transparency International’s Global Corruption Perceptions Index (CPI). Therefore, geography is not the defining feature that explains why Uruguay (Latin America’s richest country and 14th ranked by the CPI index) is defined as Global North while Hungary is not. 
3    Charlette Donalds, Corlane Barclay, and Kweku-Muata Osei-Bryson, Cybercrime and Cybersecurity in the Global South, (London: Taylor & Francis, Routledge, 2022).
4    “Global Cyberattacks Continue to Rise with Africa and APAC suffering most,” Checkpoint Research, April 27, 2023, https://blog.checkpoint.com/research/global-cyberattacks-continue-to-rise/.
5    Nabilah S., “The Vanuatu ransomware attack serves as a warning to others,” TechinPacific, May 2023, https://www.techinpacific.com/the-vanuatu-ransomware-attack-serves-as-a-warning-to-others.
6    Nikhilesh De, “State of crypto: Ransomware is a crypto problem,” Coindesk, February 10, 2022, https://www.coindesk.com/policy/2021/06/08/state-of-crypto-ransomware-is-a-crypto-problem/
7    Sheera Frenkel, “Hackers find ‘ideal testing ground’ for attacks: Developing countries” The New York Times, July 2, 2017,  https://www.nytimes.com/2017/07/02/technology/hackers-find-ideal-testing-ground-for-attacks-developing-countries.html.
8    Jai Viljayan, “Majority of ransomware attacks last year exploited old bugs.,” Dark Reading, February 20, 2023, https://www.darkreading.com/cyberattacks-data-breaches/dozens-of-vulns-in-ransomware-attacks-offer-adversaries-full-kill-chain.
9    Paul Tassi, “Why Microsoft is giving away Windows 10 to Pirates,” Forbes, March 19, 2015, https://www.forbes.com/sites/insertcoin/2015/03/19/why-microsoft-is-giving-away-windows-10-to-pirates/?sh=51c6e4ae712f.
10    Victor DeMarines, “Look before you click: The risk of buying pirated software,” Revenera, January 17, 2020, https://www.revenera.com/blog/software-monetization/look-before-you-click-the-risk-of-buying-pirated-software/
11    Sope Williams-Elegbe, “Systemic corruption and public procurement in developing countries: are there any solutions?,” Journal of Public Procurement (2018) vol. 18, no. 2, 131-147,  https://doi.org/10.1108/JOPP-06-2018-009.
12    “Global Cyberattacks Continue to Rise with Africa and APAC suffering most,” Checkpoint Research.
13    “Global Connectivity Report 2022, ITU, 2022,  https://www.itu.int/itu-d/reports/statistics/global-connectivity-report-2022.
14    John Jack, “E-governance in Vanuatu: A whole-of-government approach,” Asia Pacific Journal of Public Administration (2018), https://www.tandfonline.com/doi/abs/10.1080/23276665.2018.1545354.
15    Valentina Rotondi, “Leveraging mobile phones to attain sustainable development,” Proceedings of the National Academy of Sciences, June 1, 2020, https://www.pnas.org/doi/full/10.1073/pnas.1909326117.
16    Raif Bahrini, and Alaa A. Qaffas, “Impact of information and communication technology on economic growth: Evidence from developing countries,” Economies (2019)vol. 7, no. 1, https://www.mdpi.com/2227-7099/7/1/21
17    Andrea Willige, “Here’s Why Africa is the World Leader in Digital and Mobile Banking, World Economic Forum, November 21, 2023, https://www.weforum.org/agenda/2023/11/africa-digital-mobile-banking-financial-inclusion.
18    Raif Bahrini and Alaa A. Qaffas, “Impact of information and communication technology on economic growth.” 
19    Laura Wood, “The future of African fiber markets 2023,” BusinessWire, June 15, 2023, https://www.tandfonline.com/doi/abs/10.1080/23276665.2018.1545354
20    Extending Reach and Increasing Impact: Information and Communications for Development, World Bank, 2009, https://documents1.worldbank.org/curated/en/645821468337815208/pdf/487910PUB0EPI1101Official0
Use0Only1.pdf
21    Ankit Fadia, Mahir Nayfeh, and John Noble, “Follow the leaders: How governments can combat intensifying cybersecurity risks,” McKinsey & Company, September 16, 2020, https://www.mckinsey.com/industries/public-and-social-sector/our-insights/follow-the-leaders-how-governments-can-combat-intensifying-cybersecurity-risks
22    Temitaya Jalyeola, “73% Africans in rural areas lack internet access,” Punch, December 19, 2022, https://punchng.com/73-africans-in-rural-areas-lack-internet-access.
23    World Bank Data – Vanuatu,  The World Bank, 2020, https://data.worldbank.org/country/VU.
24    Jason Rainbow, “Starlink approved in Nigeria and Mozambique, says Elon Musk,” Spacenews, May 27, 2022, https://spacenews.com/starlink-approved-in-nigeria-and-mozambique-says-elon-musk/.
25    Jens Ivo Engels, “Corruption and anticorruption in the era of modernity and beyond” in Ronald Kroeze, Andre Vitoria, G. Geltner (Eds.),  Anticorruption in History,  (Oxford: Oxford University Press, 2018).
26    Sandipto Dasgupta, “The power of corruption,” Comparative Studies of South Asia, Africa, and the Middle East (2019), vol. 29, no. 3, https://doi.org/10.1215/1089201X-7885524.
27    Dante Deo, “Mega millions lost to software procurement fraud and error,” ITWeb, May 9, 2023, https://www.itweb.co.za/article/mega-millions-lost-to-software-procurement-fraud-and-error/KBpdg7pmNKjMLEew
28    Jonathan Klaaren et al., “Public Procurement and Corruption in South Africa,” Public Affairs Research Institute, October 2022, https://ideas.repec.org/p/osf/osfxxx/bej9z.html
29    Rajeev K. Goel and Michael A. Nelson, “Determinants of software piracy: economics, institutions, and technology,” Journal of Technology Transformation (2009), 34, https://link.springer.com/article/10.1007/s10961-009-9119-1.
30    “Software Management: Security Imperative, Business Opportunity,” Business Software Alliance, June 2018, https://www.bsa.org/files/2019-02/2018_BSA_GSS_Report_en_.pdf.
31    Brian Prince, “Software piracy costly to enterprise security, research finds,” Security Week, March 20, 2014, https://www.securityweek.com/software-piracy-costly-enterprise-security-research-finds/
32    “Drivers of Corruption: A Brief Review,” The World Bank, 2014, https://documents1.worldbank.org/curated/en/808821468180242148/text/Drivers-of-corruption.txt.
33    David P. Nolan, “Procurement fraud – an old fraud flourishing in emerging markets and costing businesses billions,” Financier Worldwide Magazine, September 2017, https://www.financierworldwide.com/procurement-fraud-an-old-fraud-flourishing-in-emerging-markets-and-costing-businesses-billions#.Y-jdcC-B3X8.
35    Atanu Lahiri, “Revisiting the incentive to tolerate illegal distribution of software products,” Decision Support Systems (2012)vol. 52, no. 2, 2012, https://doi.org/10.1016/j.dss.2012.01.007.
36    Peerayuth Charoensukmongkol et al., “Analyzing software piracy from supply and demand factors: The competing roles of corruption and economic wealth,” International Journal of Technoethics (2012), vol. 3 no. 1, https://econpapers.repec.org/article/iggjt0000/v_3a3_3ay_3a2012_3ai_3a1_3ap_3a28-42.htmhttps://econpapers.repec.org/article/iggjt0000/v_3a3_3ay_3a2012_3ai_3a1_3ap_3a28-42.htm.
37    Antonio R. Andres and Simplice A. Asongu, “Fighting software piracy: Which governance tools matter in Africa?” Journal of Business Ethics (2013), 118, https://www.econstor.eu/bitstream/10419/87824/1/730896803.pdf
38    Rana Shahbaz, “Neglect caused FBR cyber-attack,” The Express Tribune, August 22, 2021, https://tribune.com.pk/story/2316604/neglect-caused-fbr-cyber-attack.
39    Jehangir Nasir, “US accuses FBR of using pirated software,” ProPakistani. January 30, 2020, https://propakistani.pk/2020/01/30/us-accuses-fbr-of-using-pirated-software-report.
40    Haroon Hayder, “Here’s the real reason why FBR system got hacked,” ProPakistani, August 20, 2021, https://propakistani.pk/2021/08/20/heres-the-real-reason-why-fbrs-system-got-hacked/.
41    Cynthia Brumfield, “2022 was the year of crippling ransomware attacks on small countries,” README Blog, December 16, 2022, https://readme.security/2022-was-the-year-of-crippling-ransomware-attacks-on-small-countries-e63b5bc3b756.
42    “Microsoft investigates Iranian attacks against the Albanian Government,” Microsoft, September 8, 2022, https://www.microsoft.com/en-us/security/blog/2022/09/08/microsoft-investigates-iranian-attacks-against-the-albanian-government.
43    Christopher Cottrell, “Vanuatu officials turn to phone books and typewriters, one month after cyberattack,” The Guardian, November 29, 2022, https://www.theguardian.com/world/2022/nov/29/vanuatu-officials-turn-to-phone-books-and-typewriters-one-month-after-cyber-attack
44    Matt Burgess, “Conti’s attack against Costa Rica sparks a new ransomware era, Wired, June 12, 2022, https://www.wired.co.uk/article/costa-rica-ransomware-conti.
45    Andy Greenberg, “Ransomware payments hit a record $1.1 billion in 2023,” Wired, February 7, 2024, https://www.wired.com/story/ransomware-payments-2023-breaks-record.
46    Bill Toulas, “Ransomware payments drop to record low as victims refuse to pay,” Bleeping Computer, January 29, 2024, https://www.bleepingcomputer.com/news/security/ransomware-payments-drop-to-record-low-as-victims-refuse-to-pay/.
47    The review of 23 national cybersecurity strategies consisted of 14 documents published by countries in Africa (Botswana, Benin, Burkina Faso, Gambia, Ghana, Kenya [draft], Malawi, Mauritius, Mozambique [draft], Nigeria, Sierra Leone, South Africa, Tanzania, and Uganda); and 9 documents published by countries in the Asia-Pacific region (Afghanistan, Bangladesh, China, India, Malaysia, Nepal [draft], Philippines, Samoa, and Vanuatu).
48    The International Telecommunication Union (ITU), The World Bank, Commonwealth Secretariat (ComSec), the Commonwealth Telecommunications Organisation (CTO), NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE). 2018. Guide to Developing a National Cybersecurity Strategy – Strategic engagement in cybersecurity. Creative Commons Attribution 3.0 IGO (CC BY 3.0 IGO). https://www.itu.int/hub/publication/d-str-cyb_guide-01-2018/.
49    Michael Hill, “Governments should not pay ransoms, International Counter Ransomware initiative members agree,” CSO, November 2, 2023, https://www.csoonline.com/article/657877/governments-should-not-pay-ransoms-international-counter-ransomware-initiative-members-agree.html.
50    “International Counter Ransomware Initiative Joint Statement,” The White House, November 1, 2023, https://www.whitehouse.gov/briefing-room/statements-releases/2023/11/01/international-counter-ransomware-initiative-2023-joint-statement.  
51    Olena Removska and Robert Coalson, “Ukraine’s trade privileges on line over intellectual piracy concerns,” Radio Free/Radio Liberty, March 14, 2013, https://www.rferl.org/a/ukraine-sanctions-intellectual-property/24928537.html.
52    “Software management: Security Imperative, Business Opportunity,” Business Software Alliance. 
53    Patrick Tucker, “Russia launched cyberattacks against Ukraine before ship seizures,” Defense One, December 7, 2018, https://www.defenseone.com/technology/2018/12/russia-launched-cyber-attacks-against-ukraine-ship-seizures-firm-says/153375/.
54    Mark Temnycky, “Russian Cyber Threat: US Can Learn from Ukraine,” Atlantic Council, May 27, 2021, https://www.atlanticcouncil.org/blogs/ukrainealert/russian-cyber-threat-us-can-learn-from-ukraine.
55    Olena Removska and Robert Coalson, “Ukraine’s trade privileges on line over intellectual piracy concerns.”
56    Andy Greenberg, “The untold story of NotPetya, the most devastating cyberattack in history,” Wired, August 22, 2018, https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/.
57    “Anti-Corruption Reforms in Ukraine: Pilot 5th Round of Monitoring Under the OECD Istanbul Anti-Corruption Action Plan,” OECD, 2022. https://www.oecd-ilibrary.org/docserver/b1901b8c-en.pdf?expires=1707274542&id=id&accname=guest&checksum=E8B9D84D2CAB41F47CCF08E6A475AB17.
58    Christopher Yukins and Steven Kelman, “Overcoming corruption and war: Lessons from Ukraine’s ProZorro procurement system,” NCMA Contract Management Magazine, July 2022, https://www.hks.harvard.edu/publications/overcoming-corruption-and-war-lessons-ukraines-prozorro-procurement-system.
59    Andre Petheram, Walter Pasquarelli, and Richard Stirling, “The next generation of anti-corruption tools: Big data, open data, and artificial intelligence,” Oxford Insights, 2022, https://ec.europa.eu/futurium/en/system/files/ged/researchreport2019_thenextgenerationofanti-corruptiontools_bigdataopendataartificialintelligence.pdf
60    “Guidelines for non-Ukrainian suppliers on participation in public procurement tenders in Ukrainian,” European Bank for Reconstruction and Development,  November 2020, https://infobox.prozorro.org/upload/files/main/1398/547/gpa-guide-ukraine-fin-update2020-2.pdf.
61    Nataliya Synyutka, Oksana Kurylo, and Mariya Bondarchuk, “Digitalization of public procurement: The case study of Ukraine,” Annales Oeconomia (2019), https://journals.umcs.pl/h/article/viewFile/9273/6961.  
62    “In 2022, CERT-UA reports 2,194 cyberattacks,” Ukraine Media Center, January 17, 2023, https://mediacenter.org.ua/in-2022-cert-ua-reports-2-194-cyberattacks-a-quarter-of-them-against-government-agencies-state-service-for-special-communications/.
63    Jon Bateman, “Russia’s wartime cyber operations in Ukraine: Military impacts, influences, and implications,” Carnegie Endowment for International Peace, 2022, https://carnegie-production-assets.s3.amazonaws.com/static/files/Bateman_Cyber-FINAL21.pdf.
64    “Trojanized Windows 10 Operating System Installers Targeted Ukrainian Government,” Mandiant Intelligence, “December 15, 2022, https://cloud.google.com/blog/topics/threat-intelligence/trojanized-windows-installers-ukrainian-government/.
65    Emma Schroeder and Sean Dack, “A parallel terrain: Public-private defense of the Ukrainian information environment,” Atlantic Council, February 27, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/a-parallel-terrain-public-private-defense-of-the-ukrainian-information-environment.
66    Robert Peacock, “How Ukraine has defended itself against cyberattack – Lessons for the US,” The Conversation, April 5, 2022, https://theconversation.com/how-ukraine-has-defended-itself-against-cyberattacks-lessons-for-the-us-180085.  
67    Daryna Antoniuk, “Second top Ukrainian cyber official arrested amid corruption probe,” The Record, November 27, 2023, https://therecord.media/second-cyber-official-detained-zhora.
68    “Sectoral Cybersecurity Maturity Model,” The World Bank, June 2023, https://documents1.worldbank.org/curated/en/099062623085028392/pdf/P17263707c36b702309f7303dbb7266e1cf.pdf
69    Shahrukh Khan, “Cybersecurity Challenges in Pakistan: An Assessment,” Science Diplomacy, March 2022, https://www.researchgate.net/publication/360256123_Cyber_Security_Challenges_in_Pakistan_An_Assessment.
70    Wanjohi Githae, “Concern over graft as state centralizes IT procurement,” Nation. January 12, 2019, https://nation.africa/kenya/news/concern-over-graft-as-state-centralises-it-procurement–127312.
71    Pedro Bustamante, et al., “Government by code? Blockchain applications to public sector governance,” Frontiers in Blockchain (2022), vol. 5, https://doi.org/10.3389/fbloc.2022.869665
72    Benjamin J. Birkinbine, Incorporating the Digital Commons: Corporate Involvement in Free and Open Source Software, (London: University of Westminster Press, 2020), https://library.oapen.org/bitstream/handle/20.500.12657/37226/1/incorporating-the-digital-commons.pdf.
73    Stewart Scott, et al., “Avoiding the success trap: Toward policy for open-source software as infrastructure,” Atlantic Council, August 8, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/report/open-source-software-as-infrastructure/
74    Isabelle Adam and Mihaly Fazekas, “Are emerging technologies helping win the fight against corruption? A review of the state of the evidence,” Information Economics and Policy (2021), vol. 57, December 2021, https://www.sciencedirect.com/science/article/pii/S016762452100038X.

The post The impact of corruption on cybersecurity: Rethinking national strategies across the Global South   appeared first on Atlantic Council.

]]>
Transatlantic Economic Statecraft Report cited in the International Cybersecurity Law Review on semiconductor supply chains https://www.atlanticcouncil.org/insight-impact/in-the-news/transatlantic-economic-statecraft-report-cited-in-the-international-cybersecurity-law-review-on-semiconductor-supply-chains/ Tue, 25 Jun 2024 13:57:00 +0000 https://www.atlanticcouncil.org/?p=779317 Read the journal article here.

The post Transatlantic Economic Statecraft Report cited in the International Cybersecurity Law Review on semiconductor supply chains appeared first on Atlantic Council.

]]>
Read the journal article here.

The post Transatlantic Economic Statecraft Report cited in the International Cybersecurity Law Review on semiconductor supply chains appeared first on Atlantic Council.

]]>
Kumar cited by Axios on wholesale central bank digital currency development https://www.atlanticcouncil.org/insight-impact/in-the-news/kumar-cited-by-axios-on-wholesale-central-bank-digital-currency-development/ Mon, 24 Jun 2024 16:37:39 +0000 https://www.atlanticcouncil.org/?p=776865 Read the full newsletter here.

The post Kumar cited by Axios on wholesale central bank digital currency development appeared first on Atlantic Council.

]]>
Read the full newsletter here.

The post Kumar cited by Axios on wholesale central bank digital currency development appeared first on Atlantic Council.

]]>
CBDC Tracker cited by Coingeek on wholesale central bank digital currency development https://www.atlanticcouncil.org/insight-impact/in-the-news/cbdc-tracker-cited-by-coingeek-on-wholesale-central-bank-digital-currency-development/ Sat, 22 Jun 2024 16:33:53 +0000 https://www.atlanticcouncil.org/?p=776861 Read the full article here.

The post CBDC Tracker cited by Coingeek on wholesale central bank digital currency development appeared first on Atlantic Council.

]]>
Read the full article here.

The post CBDC Tracker cited by Coingeek on wholesale central bank digital currency development appeared first on Atlantic Council.

]]>
Zaaimi in Leadership Connect: Tribal Spotlight Interview https://www.atlanticcouncil.org/insight-impact/in-the-news/zaaimi-in-leadership-connect-tribal-spotlight-interview/ Tue, 18 Jun 2024 18:57:35 +0000 https://www.atlanticcouncil.org/?p=774275 The post Zaaimi in Leadership Connect: Tribal Spotlight Interview appeared first on Atlantic Council.

]]>

The post Zaaimi in Leadership Connect: Tribal Spotlight Interview appeared first on Atlantic Council.

]]>
Tran, Matthews, and CBDC Tracker cited by YouTube video on Saudi Arabia mBridge membership https://www.atlanticcouncil.org/insight-impact/in-the-news/tran-matthews-and-cbdc-tracker-cited-by-youtube-video-on-saudi-arabia-mbridge-membership/ Mon, 17 Jun 2024 20:48:40 +0000 https://www.atlanticcouncil.org/?p=774963 Watch the full video here.

The post Tran, Matthews, and CBDC Tracker cited by YouTube video on Saudi Arabia mBridge membership appeared first on Atlantic Council.

]]>
Watch the full video here.

The post Tran, Matthews, and CBDC Tracker cited by YouTube video on Saudi Arabia mBridge membership appeared first on Atlantic Council.

]]>
Kumar and CBDC Tracker cited by Axios on global central bank digital currency development https://www.atlanticcouncil.org/insight-impact/in-the-news/kumar-and-cbdc-tracker-cited-by-axios-on-global-central-bank-digital-currency-development/ Mon, 17 Jun 2024 20:32:28 +0000 https://www.atlanticcouncil.org/?p=774947 Read the full newsletter here.

The post Kumar and CBDC Tracker cited by Axios on global central bank digital currency development appeared first on Atlantic Council.

]]>
Read the full newsletter here.

The post Kumar and CBDC Tracker cited by Axios on global central bank digital currency development appeared first on Atlantic Council.

]]>
Designing a blueprint for open, free and trustworthy digital economies https://www.atlanticcouncil.org/blogs/econographics/designing-a-blueprint-for-open-free-and-trustworthy-digital-economies/ Fri, 14 Jun 2024 21:21:25 +0000 https://www.atlanticcouncil.org/?p=773476 US digital policy must be aimed at improving national security, defending human freedom, dignity, and economic growth while ensuring necessary accountability for the integrity of the technological bedrock.

The post Designing a blueprint for open, free and trustworthy digital economies appeared first on Atlantic Council.

]]>
More than half a century into the information age, it is clear how policy has shaped the digital world. The internet has enabled world-changing innovation, commercial developments, and economic growth through a global and interoperable infrastructure. However, the internet is also home to rampant fraud, misinformation, and criminal exploitation. To shape policy and technology to address these challenges in the next generation of digital infrastructure, policymakers must confront two complex issues: the difficulty of massively scaling technologies and the growing fragmentation across technological and economic systems.

How today’s policymakers decide to balance freedom and security in the digital landscape will have massive consequences for the future. US digital policy must be aimed at improving national security, defending human freedom, dignity, and economic growth while ensuring necessary accountability for the integrity of the technological bedrock.

Digital economy building blocks and the need for strategic alignment

Digital policymakers face a host of complex issues, such as regulating and securing artificial intelligence, banning or transitioning ownership of TikTok, combating pervasive fraud, addressing malign influence and interference in democratic processes, considering updates to Section 230 and impacts on tech platforms, and implementing zero-trust security architectures. When addressing these issues, policymakers must keep these core building blocks of the digital economy front and center:

  • Infrastructure: How to provide the structure, rails, processes, standards, and technologies for critical societal functions;
  • Data: How to protect, manage, own, use, share, and destroy open and sensitive data; and
  • Identity: How to represent and facilitate trust and interactions across people, entities, data, and devices.

How to approach accountability—who is responsible for what—in each of these pillars sets the stage for how future digital systems will or will not be secure, competitive, and equitable.

Achieving the right balance between openness and security is not easy, and the stakes for both personal liberty and national security amid geostrategic competition are high. The open accessibility of information, infrastructure, and markets enabled by the internet all bring knowledge diffusion, data flows, and higher order economic developments, which are critical for international trade and investment.

However, vulnerabilities in existing digital ecosystems contribute significantly to economic losses, such as the estimated $600 billion per year lost to intellectual property theft and the $8 trillion in global costs last year from cybercrime. Apart from direct economic costs, growing digital authoritarianism threatens undesirable censorship, surveillance, and manipulation of foreign and domestic societies that could not only undermine democracy but also reverse the economic benefits wrought from democratization.

As the United States pursues its commitment with partner nations toward an open, free, secure internet, Washington must operationalize that commitment into specific policy and technological implementations coordinated across the digital economy building blocks. It is critical to shape them to strengthen their integrity while preventing undesired fragmentation, which could hinder objectives for openness and innovation.

Infrastructure

The underlying infrastructure and technologies that define how consumers and businesses get access to and can use information are featured in ongoing debates and policymaking, which has led to heightened bipartisan calls for accountability across platform operators. Further complicating the landscape of accountability in infrastructure are the growing decentralization and aggregation of historically siloed functions and systems. As demonstrated by calls for decentralizing the banking system or blockchain-based decentralized networks underlying cryptocurrencies, there is an increasing interest from policymakers and industry leaders to drive away from concentration risks and inequity that can be at risk in overly centralized systems.

However, increasing decentralization can lead to a lack of clear lines of responsibility and accountability in the system. Accountability and neutrality policy are also impacted by increasing digital interconnectedness and the commingling of functions. The Bank of the International Settlement recently coined a term, “finternet,” to describe the vision of an exciting but complexly interconnected digital financial system that must navigate international authorities, sovereignty, and regulatory applicability in systems that operate around the world.

With this tech and policy landscape in mind, infrastructure policy should focus on two aspects:

  • Ensuring infrastructure security, integrity, and openness. Policymakers and civil society need to articulate and test a clear vision for stakeholders to coordinate on what openness and security across digital infrastructure for cross-economic purposes should look like based on impacts to national security, economic security, and democratic objectives. This would outline elements such as infrastructure ecosystem participants, the degree of openness, and where points for responsibility of controls should be, whether through voluntary or enforceable means. This vision would build on ongoing Biden administration efforts and provide a north star for strategic coordination with legislators, regulators, industry, civil society, and international partners to move in a common direction.
  • Addressing decentralization and the commingling of infrastructure. Technologists must come together with policymakers to ensure that features for governance and security are fit for purpose and integrated early in decentralized systems, as well as able to oversee and ensure compliance for any regulated, high-risk activity.

Data

Data has been called the new oil, the new gold, and the new oxygen. Perhaps overstated, each description nonetheless captures what is already the case: Data is incredibly valuable in digital economies. US policymakers should focus on how to surround how to address the privacy, control, and integrity of data, the fundamental assets of value in information economies.

Privacy is a critical area to get right in the collection and management of information. The US privacy framework is fragmented and generally use-specific, framed for high risk sectors like finance and healthcare. In the absence of a federal-government-wide consumer data privacy law, some states are implementing their own approaches. In light of existing international data privacy laws, US policy also has to account for issues surrounding harmonization and potential economic hindrances brought by data localization.

Beyond just control of privacy and disclosure, many tech entrepreneurs, legislators, and federal agencies are aimed at placing greater ownership of data and subsequent use in the hands of consumers. Other efforts supporting privacy and other national and economic security concerns are geared toward protecting against the control and ownership of sensitive data by adversarial nations or anti-competitive actors, including regulations on data brokers and the recent divest-or-ban legislation targeted at TikTok.

There is also significant policy interest surrounding the integrity of information and the systems reliant on it, such as in combating the manipulation of data underlying AI systems and protecting electoral processes that could be vulnerable to disinformation. Standards and research are rising, focused on data provenance and integrity techniques. But there remain barriers to getting the issue of data integrity right in the digital age.

While there is some momentum for combating data integrity compromise, doing so is rife with challenges of implementation and preserving freedom of expression that have to be addressed to achieve the needed balance of security and freedom:

  • Balancing data security, discoverability, and privacy. Stakeholders across various key functions of law enforcement, regulation, civil society, and industry must together define what type of information should be discoverable by whom and under what conditions, guided by democratic principles, privacy frameworks, the rule of law, and consumer and national security interests. This would shape the technical standards and requirements for privacy tech and governance models that government and industry can put into effect.
  • Preserving consumer and democratic control and ownership of data. Placing greater control and localization protections around consumer data could bring great benefits to user privacy but must also be done in consideration of the economic impacts and higher order innovations enabled from the free flow and aggregation of data. Policy efforts could pursue research and experimentation for assessing the value of data
  • Combating manipulation and protecting information integrity. Governments must work hand in hand with civil society and, where appropriate, media organizations to pursue policies and technical developments that could contribute to promoting trust in democratic public institutions and help identify misinformation across platforms, especially in high-risk areas to societies and democracies such as election messaging, financial services and markets, and healthcare.

Identity

Talk about “identity” can trigger concerns of social credit scores and Black Mirror episodes. It may, for example, evoke a sense of state surveillance, criminal anonymity, fraud, voter and political dissident suppression, disenfranchisement of marginalized populations, or even the mundane experience of waiting in line at a department of motor vehicles. As a force for good, identity enables critical access to goods and services for consumers, helps provide recourse for victims of fraud and those seeking public benefits, and protects sensitive information while providing necessary insights to authorities and regulated institutions to hold bad actors accountable. With increasing reliance on digital infrastructure, government and industry will have to partner to create the technical and policy fabric for secure, trustworthy, and interoperable digital identity.

Digital identity is a critical element of digital public infrastructure (DPI). The United States joined the Group of Twenty (G20) leaders in committing to pursue work on secure, interoperable digital identity tools and emphasized its importance in international fora to combat illicit finance. However, while many international efforts have taken root to establish digital identity systems abroad, progress by the United States on holistic domestic or cross-border digital identity frameworks has been limited. Identity security is crucial to establish trust in US systems, including the US financial sector and US public institutions. While the Biden administration has been driving some efforts to strengthen identity, the democratized access to sophisticatedAI tools increased the threat environment significantly by making it easy to create fraudulent credentials and deepfakes that circumvent many current counter-fraud measures.

The government is well-positioned to be the key driver of investments in identity that would create the underlying fabric for trust in digital communications and commerce:

  • Investing in identity as digital public infrastructure. Digital identity development and expansion can unlock massive societal and economic benefits, including driving value up to 13 percent of a nation’s gross domestic product and providing access to critical goods and services, as well as the ability to vote, engage in the financial sector, and own land. Identity itself can serve as infrastructure for higher-order e-commerce applications that rely on trust. The United States should invest in secure, interoperable digital identity infrastructure domestically and overseas, to include the provision of secure verifiable credentials and privacy-preserving attribute validation services.
  • Managing security, privacy, and equity in Identity. Policymakers must work with industry to ensure that identity systems, processes, and regulatory requirements implement appropriate controls in full view of all desired outcomes across security, privacy, and equity, consistent with National Institute of Science and Technology standards. Policies should ensure that saving resources by implementing digital identity systems also help to improve services for those not able to use them.

Technology by itself is not inherently good or evil—its benefits and risks are specific to the technological, operational, and governance implementations driven by people and businesses. This outline of emerging policy efforts affecting digital economy building blocks may help policymakers and industry leaders consider efforts needed to drive alignment to preserve the benefits of a global, interoperable, secure and free internet while addressing the key shortfalls present in the current digital landscape.


Carole House is a nonresident senior fellow at the Atlantic Council GeoEconomics Center and the Executive in Residence at Terranet Ventures, Inc. She formerly served as the director for cybersecurity and secure digital innovation for the White House National Security Council, where Carole will soon be returning as the Special Advisor for Cybersecurity and Critical Infrastructure Policy. This article reflects views expressed by the author in her personal capacity.

The post Designing a blueprint for open, free and trustworthy digital economies appeared first on Atlantic Council.

]]>
Cryptocurrency Regulation Tracker cited in Bank of International Settlements Paper on CBDC and crypto development https://www.atlanticcouncil.org/insight-impact/in-the-news/cryptocurrency-regulation-tracker-cited-in-bank-of-international-settlements-paper-on-cbdc-and-crypto-development/ Fri, 14 Jun 2024 16:04:00 +0000 https://www.atlanticcouncil.org/?p=781057 Read the full report here.

The post Cryptocurrency Regulation Tracker cited in Bank of International Settlements Paper on CBDC and crypto development appeared first on Atlantic Council.

]]>
Read the full report here.

The post Cryptocurrency Regulation Tracker cited in Bank of International Settlements Paper on CBDC and crypto development appeared first on Atlantic Council.

]]>
House published in Bloomberg Law on US public-private investment in critical technology https://www.atlanticcouncil.org/insight-impact/in-the-news/house-published-in-bloomberg-law-on-us-public-private-investment-in-critical-technology/ Fri, 14 Jun 2024 14:51:07 +0000 https://www.atlanticcouncil.org/?p=773352 Read the full article here.

The post House published in Bloomberg Law on US public-private investment in critical technology appeared first on Atlantic Council.

]]>
Read the full article here.

The post House published in Bloomberg Law on US public-private investment in critical technology appeared first on Atlantic Council.

]]>
CBDC Tracker cited by MSN on central bank digital currency development outside US https://www.atlanticcouncil.org/insight-impact/in-the-news/cbdc-tracker-cited-by-msn-on-central-bank-digital-currency-development-outside-us/ Thu, 13 Jun 2024 14:44:23 +0000 https://www.atlanticcouncil.org/?p=773349 Read the full article here.

The post CBDC Tracker cited by MSN on central bank digital currency development outside US appeared first on Atlantic Council.

]]>
Read the full article here.

The post CBDC Tracker cited by MSN on central bank digital currency development outside US appeared first on Atlantic Council.

]]>
Intentionally vague: How Saudi Arabia and Egypt abuse legal systems to suppress online speech https://www.atlanticcouncil.org/in-depth-research-reports/report/intentionally-vague-how-saudi-arabia-and-egypt-abuse-legal-systems-to-suppress-online-speech/ Wed, 12 Jun 2024 11:00:00 +0000 https://www.atlanticcouncil.org/?p=771211 Egypt and Saudi Arabia are weaponizing vaguely written domestic media, cybercrime, and counterterrorism laws to target and suppress dissent, opposition, and vulnerable groups.

The post Intentionally vague: How Saudi Arabia and Egypt abuse legal systems to suppress online speech appeared first on Atlantic Council.

]]>

Egypt and Saudi Arabia are weaponizing vaguely written domestic media, cybercrime, and counterterrorism laws to target and suppress dissent, opposition, and vulnerable groups. Political leaders in Egypt and Saudi Arabia often claim that their countries’ judicial systems enjoy independence and a lack of interference, a narrative intended to distance the states from the real and overzealous targeting and prosecution of critics. Such claims can be debunked and dismissed, as the Egyptian and Saudi governments have had direct involvement in establishing and implementing laws that are utilized to target journalists and human rights defenders.

Egypt and Saudi Arabia were selected as case studies for this report because of their status as among the most frequently documented offenders in the region when it comes to exploiting ambiguously written laws to target and prosecute journalists, critics, activists, human rights defenders, and even apolitical citizens. The two countries have consolidated power domestically, permitting them to utilize and bend their domestic legal systems to exert control over the online information space. Punishments for those targeted can involve draconian prison sentences, travel bans, and fines, which result in a chilling effect that consequently stifles online speech and activities, preventing citizens from discussing political, social, and economic issues.

Both Egypt and Saudi Arabia enacted media, cybercrime, and counterterrorism laws with ambiguous language and unclear definitions of legal terms, allowing for flexible interpretations of phrases such as “false information,” “morality,” or “family values and principles.” The laws in both countries also loosely define critical terms like “terrorism,” thereby facilitating expansive interpretations of what constitutes a terrorist crime. Further, anti-terror laws now include articles that connect the “dissemination of false information” with terrorist acts. This vague and elastic legal language has enabled the Egyptian and Saudi regimes to prosecute peaceful citizens on arbitrary grounds, sometimes handing out long prison sentences or even death sentences, undermining respect for the rule of law in the two countries.

This report explores the development of media, cybercrime, and counterterrorism laws in both countries, and demonstrates through case studies how Saudi Arabia and Egypt weaponize the laws to prosecute opposition figures and control narratives online. This report examines the relationship between criminal charges tied to one’s professional activities or online speech and how those charges can trigger online smear campaigns and harassment. In cases that involve women, gender-based violence is often used to harm a woman’s reputation. Though a direct correlation between judicial charges and online harassment cannot be ascertained, these case studies suggest that dissidents are likely to face online harm following legal persecution, even after they are released.

Related content

The Atlantic Council’s Digital Forensic Research Lab (DFRLab) has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

The post Intentionally vague: How Saudi Arabia and Egypt abuse legal systems to suppress online speech appeared first on Atlantic Council.

]]>
CBDC Tracker cited by Cryptonews on digital euro development https://www.atlanticcouncil.org/insight-impact/in-the-news/cbdc-tracker-cited-by-cryptonews-on-development-of-digital-euro/ Wed, 05 Jun 2024 14:44:41 +0000 https://www.atlanticcouncil.org/?p=771270 Read the full article here.

The post CBDC Tracker cited by Cryptonews on digital euro development appeared first on Atlantic Council.

]]>
Read the full article here.

The post CBDC Tracker cited by Cryptonews on digital euro development appeared first on Atlantic Council.

]]>
Lipsky quoted and CBDC Tracker cited by US News on Saudi Arabia decision to join China-led CBDC project https://www.atlanticcouncil.org/insight-impact/in-the-news/lipsky-quoted-and-cbdc-tracker-cited-by-us-news-on-saudi-arabia-decision-to-join-china-led-cbdc-project/ Wed, 05 Jun 2024 14:42:06 +0000 https://www.atlanticcouncil.org/?p=771268 Read the full article here.

The post Lipsky quoted and CBDC Tracker cited by US News on Saudi Arabia decision to join China-led CBDC project appeared first on Atlantic Council.

]]>
Read the full article here.

The post Lipsky quoted and CBDC Tracker cited by US News on Saudi Arabia decision to join China-led CBDC project appeared first on Atlantic Council.

]]>
Lipsky quoted and CBDC Tracker cited by Reuters on Saudi Arabia decision to join China-led CBDC project https://www.atlanticcouncil.org/insight-impact/in-the-news/lipsky-quoted-and-cbdc-tracker-cited-by-reuters-on-saudi-arabia-decision-to-join-china-led-central-bank-digital-currency-project/ Wed, 05 Jun 2024 14:36:00 +0000 https://www.atlanticcouncil.org/?p=771263 Read the full article here.

The post Lipsky quoted and CBDC Tracker cited by Reuters on Saudi Arabia decision to join China-led CBDC project appeared first on Atlantic Council.

]]>
Read the full article here.

The post Lipsky quoted and CBDC Tracker cited by Reuters on Saudi Arabia decision to join China-led CBDC project appeared first on Atlantic Council.

]]>
Who’s a national security risk? The changing transatlantic geopolitics of data transfers https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/whos-a-national-security-risk-geopolitics-of-data-transfers/ Wed, 29 May 2024 19:34:02 +0000 https://www.atlanticcouncil.org/?p=767982 The geopolitics of data transfers is changing. How will Washington's new focus on data transfers affect Europe and the transatlantic relationship?

The post Who’s a national security risk? The changing transatlantic geopolitics of data transfers appeared first on Atlantic Council.

]]>

Table of contents

Introduction
Data transfer politics come to America
Data transfer politics in Europe
Conclusions

Introduction

The geopolitics of transatlantic data transfers have been unvarying for the past decade. European governments criticize the US National Security Agency (NSA) for exploiting personal data moving from Europe to the United States for commercial reasons. The US government responds, through a series of arrangements with the European Union, by providing assurances that NSA collection is not disproportionate, and that Europeans have legal avenues if they believe their data has been illegally used. Although the arrangements have not proven legally stable, on the whole they have sufficed to keep data flowing via subsea cables under the Atlantic Ocean.

Now the locus of national security concerns about international data transfers has shifted from Brussels to Washington. The Biden administration and the US Congress, in a series of bold measures, are moving aggressively to interrupt certain cross-border data flows, notably to China and Russia.

The geopolitics of international data flows remain largely unchanged in Europe, however. European data protection authorities have been mostly noncommittal about the prospect of Russian state surveillance collecting Europeans’ personal data. Decisions on whether to transfer European data to Russia and China remain in the hands of individual companies.

Will Washington’s new focus on data transfers to authoritarian states have an impact in Europe? Will Europe continue to pay more attention to the surveillance activities of its liberal democratic allies, especially the United States? Is there a prospect of Europe and the United States aligning on the national security risks of transfers to authoritarian countries?

Data transfer politics come to America

The US government long considered the movement of personal data across borders as primarily a matter of facilitating international trade.1 US national security authorities’ surveillance of foreigners’ personal data in the course of commercial transfers was regarded as an entirely separate matter.

For example, the 2001 EU-US Safe Harbor Framework,2 the first transatlantic data transfer agreement, simply allowed the United States to assert the primacy of national security over data protection requirements, without further discussion. Similarly, the 2020 US-Mexico-Canada Free Trade Agreement3 and the US-Japan Digital Trade Agreement4 contain both free flow of data guarantees and traditional national security carve-outs from those obligations.

Edward Snowden’s 2013 revelations of expansive US NSA surveillance in Europe put the Safe Harbor Framework’s national security derogation into the political spotlight. Privacy activist Max Schrems then challenged its legality under EU fundamental rights law, and the Court of Justice of the European Union (CJEU) ruled it unacceptable.5

The 2023 EU-US Data Privacy Framework6 (DPF) is the latest response to this jurisprudence. In it, the United States commits to hold national security electronic surveillance of EU-origin personal data to a more constrained standard, as the European Commission has noted.7 The United States’ defensive goal has been to reassure Europe that it conducts foreign surveillance in a fashion that can be reconciled with EU fundamental rights law.

Now, however, the US government has begun expressly integrating its own national security considerations into decisions on the foreign destinations to which US-origin personal data may flow. It is a major philosophical shift from the prior free data flows philosophy, in which national security limits played a theoretical and marginal role.

One notable development is a February 28, 2024, executive order, Preventing Access to Americans’ Bulk Sensitive Personal Data and United States Government-Related Data by Countries of Concern.8 The EO empowers the Department of Justice (DOJ), in consultation with other relevant departments, to identify countries “of concern” and to prohibit or otherwise regulate bulk data transfers to them, based on a belief that these countries could be collecting such data for purposes of spying on or extorting Americans. A week later DOJ issued a proposed rule describing the envisaged regulatory regime, and proposing China, Cuba, Iran, North Korea, Russia, and Venezuela as the countries “of concern.”9

The White House, in issuing the bulk data EO, was at pains to insist that it was limited in scope and not inconsistent with the historic US commitment to the free flow of data, because it applies only to certain categories of data and certain countries.10 Nonetheless, as has been observed by scholars Peter Swire and Samm Sacks, the EO and proposed rule are, for the United States, part of “a new chapter in how it regulates data flows” in that they would create an elaborate new national security regulatory regime applying to legal commercial data activity.11

Hard on the heels of the bulk data EO came congressional passage in April of the Protecting Americans’ Data from Foreign Adversaries Act, which the president signed into law.12 It prohibits data brokers from selling or otherwise making available Americans’ sensitive information to four specified countries: China, Iran, North Korea, and Russia. The new law has a significantly broader scope than the EO. It cuts off certain data transfers to any entity controlled by one of these adversary countries, apparently including corporate affiliates and subsidiaries. It extends to any sensitive data, not just data in bulk. It remains to be seen how the administration will address the overlaps between the new law and the EO.

Another part of the same omnibus legislation ordered the ban or forced sale of TikTok, the Chinese social media platform widely used in this country.13 Advocates of the law point to the government of China’s ability under its own national security law to demand that companies operating there turn over personal data, including, potentially, TikTok users’ data transferred from the United States. Critics have cast the measure as a targeted punishment of a particular company, done without public evidence being offered of national security damage. TikTok has challenged the law as a violation of the First Amendment.14

Finally, the data transfer restrictions in these measures are thematically similar to a January 29 proposed rule from the Commerce Department obliging cloud service providers to verify the identity of their customers, on whose behalf they transfer data.15 The rule would impose know your customer (KYC) requirements—similar to those that apply in the international banking context—for cloud sales to non-US customers, wherever located.

This extraordinary burst of legislative and executive action focused on the national security risks of certain types of data transfers from the United States to certain authoritarian states is indicative of how far and fast political attitudes have shifted in this country. But what of Europe, which faces similar national security data challenges from authoritarian states? Is it moving in a similar direction as the United States?

Data transfer politics in Europe

The EU, unlike the United States, has long had a systematic set of controls on personal data flows from EU territory abroad, articulated in the General Data Protection Regulation (GDPR).16 The GDPR conditions transfers to a foreign jurisdiction on the “adequacy” of its data protection safeguards—or, as the CJEU has refined the concept, their “essential equivalence” to the GDPR regime.

The task of assessing foreign legal systems falls to the European Commission, the EU’s quasi-executive arm. Article 45 of the GDPR instructs it to consider, among other things, “the rule of law, respect for human rights and fundamental freedoms, relevant legislation . . . including concerning . . . the access of public authorities to personal data.”

For much of the past decade, the central drama in the European Commission’s adequacy process has been whether the United States meets this standard. As previously noted, the CJEU invalidated first the Safe Harbor Framework,17 in 2015, and then the Privacy Shield Framework,18 in 2020. The DPF is the third try by the US government and the European Commission to address the CJEU’s fundamental rights concerns. Last year, the European Commission issued yet another adequacy decision that found the DPF adequate.19 The EU understandably has focused its energies on the United States, since vast amounts of Europeans’ personal data travels to cloud service providers’ data centers in the United States and, as Snowden revealed, offered an inviting target for the NSA.

Separately, the European Commission has gradually expanded the range of other countries benefiting from adequacy findings, conferring this status on Japan,20 Korea,21 and the United Kingdom.22 However, the 2019 adequacy decision for the UK continues to be criticized in Brussels. On April 22, the Committee on Civil Liberties, Justice, and Home Affairs (LIBE) of the European Parliament wrote to the UK House of Lords complaining about UK national security bulk data collection practices and the prospect of onward transfer of data from UK territory to jurisdictions not deemed adequate by the EU.23 Next year, the European Commission will formally review the UK’s adequacy status.

List of countries with European Commission Adequacy Decisions

This past January, the European Commission renewed the adequacy decisions for eleven jurisdictions which had long enjoyed them, including, notably, Israel.24 On April 22, a coalition of civil society groups published an open letter to the European Commission questioning the renewal of Israel’s adequacy decision.25 The letter expressed doubts about the rule of law in Israel itself, the specific activities of Israeli intelligence agencies in Gaza during the current hostilities there, and the surveillance powers exercised by those agencies more generally.

Also delicate is the continuing flow of personal data from the European Union to Russia and China. Although neither country has been—or is likely to be—accorded adequacy status, data nonetheless can continue to flow to their territories, as to other third countries, if accompanied by contractual data protection safeguards. The CJEU established in its Schrems jurisprudence that such standard contractual clauses (SCCs) must uphold the same fundamental rights standards as an adequacy decision. The European Data Protection Board (EDPB) subsequently issued detailed guidance on the essential guarantees against national security surveillance that must be in place in order for personal data to be sent to a nonadequate jurisdiction.26

In 2021, the EDPB received an outside expert report27 on several foreign governments’ data access regimes. Its findings were clear. “Chinese law legitimises broad and unrestricted access to personal data by the government,” it concluded. Similarly, with respect to Russia, “The right to privacy is strongly limited when interests of national security are at stake.” The board did not take any further steps to follow up on the report, however.

Shortly after Russia invaded Ukraine, Russia was excluded from the Council of Europe and ceased to be a party to that body’s European Convention on Human Rights.28 The European Data Protection Board issued a statement confirming that data transfers to Russia pursuant to standard contract clauses remained possible, but stressed that safeguards to guard against Russian law enforcement or national security access to data were vital.29

Over two thousand multinational companies continue to do business in Russia, despite the Ukraine war, although a smaller number have shut down, according to a Kyiv academic research institute.30 Data flows between Europe and Russia thus remain substantial, if less than previously. Companies engaged in commerce in Russia also are subject to requirements that data on Russian persons be localized in that country.31 Nonetheless, data flows from Europe to Russia are not subject to categorical exclusions, unlike the new US approach.

The sole reported case of a European data protection authority questioning data flows to Russia involves Yango, a taxi-booking mobile app developed by Yandex, a Russian internet search and information technology company. Yango’s European services are based in the Netherlands and are available in other countries including Finland and Norway. In August 2023, Finland’s data protection authority (DPA) issued an interim decision to suspend use of Yango in its territory because Russia had just adopted a decree giving its state security service (FSB) unrestricted access to commercial taxi databases.32

The interim suspension decision was short-lived. A month later, the Finnish authority, acting in concert with Norwegian and Dutch counterparts, lifted it, on the basis of a clarification that the Russian decree in fact did not apply to use of the Yango app in Finland.33 The Finnish authority further announced that the Dutch authority, in coordination with it and Norway, would issue a final decision in the matter. The Dutch investigation reportedly remains open, but it does not appear to be a high priority matter.

The day after lifting the Yango suspension, the Finnish data protection authority rushed out yet another press release advising that its decision “does not address the legality of data transfers to Russia,” or “mean that Yango data transfers to Russia would be in compliance with the GDPR or that Russia has an adequate level of data protection.”34

One can interpret this final Finnish statement as at least indirectly acknowledging that continued commercial data transfers from an EU jurisdiction to Russia may raise rule of law questions bigger than a single decree allowing its primary security agency, known as the FSB, to access certain taxi databases. Otherwise, the Finnish decision could be criticized for ignoring the forest for the birch trees.

Equally striking is the limited extent of DPA attention to data transfers between EU countries and China. China maintains an extensive national security surveillance regime, and lately has implemented a series of legal measures that can limit outbound data transfers for national security reasons.35 In 2023, the Irish Data Protection Commissioner36 imposed a substantial fine on TikTok for violating the GDPR with respect to children’s privacy, following a decision by the EDPB.37 This inquiry did not examine the question of whether Chinese government surveillance authorities had access to European users’ data, however.

Personal data actively flows between Europe and China in the commercial context, pursuant to SCCs. China reportedly may issue additional guidance to companies on how to respond to requests for data from foreign law enforcement authorities. To date there is no public evidence of European DPAs questioning companies about their safeguard measures for transfers to China.

Indeed, signs recently have emerged from China of greater openness to transfers abroad of data generated in the automotive sector, including from connected cars. Data from connected cars is a mix of nonpersonal and personal data. China recently approved Tesla’s data security safeguards, enabling the company’s previously localized data to leave the country.38 In addition, the government of Germany is trying to ease the passage of data to and from China on behalf of German carmakers. On April 16, several German government ministers, part of a delegation visiting China led by Chancellor Olaf Scholz, issued a joint political statement with Chinese counterparts promising “concrete progress on the topic of reciprocal data transfer—and this in respect of national and EU data law,” with data from connected cars and automated driving in mind.39

Conclusions

The United States and the European Union are, in some respects, converging in their international data transfer laws and policies. In Washington, free data transfers are no longer sacrosanct. In Europe, they never have been. Viewed from Brussels, it appears that the United States is, finally, joining the EU by creating a formal international data transfers regime—albeit constructed in a piecemeal manner and focused on particular countries, rather than through a comprehensive and general data privacy law.

Yet the rationales for limiting data transfers vary considerably from one side of the Atlantic to the other. Washington now focuses on the national security dangers to US citizens and to the US government from certain categories of personal data moving to the territories of “foreign adversaries.” Brussels instead applies more abstract criteria relating to foreign governments’ commitment to the rule of law, human rights, and especially their access to personal data.

A second important difference is that the United States has effectively created a blacklist of countries to which certain categories of data should not flow, whereas the EU’s adequacy process serves as a means of “white listing” countries with comparable data protection frameworks to its own. Concretely, this structural difference means that the United States concentrates on prohibiting certain data transfers to China and Russia, while the EU institutionally has withheld judgment about transfers to those authoritarian jurisdictions. Critics of the EU’s adequacy practice instead have tended to concentrate on the perceived risks of data transfers to liberal democracies with active foreign surveillance establishments: Israel, the United Kingdom, and the United States.

The transatlantic—as well as global—geopolitics of data transfers are in flux. The sudden US shift to viewing certain transfers through a national security lens is unlikely to be strictly mirrored in Europe. In light of the emerging differences in approach, the United States and European governments should consider incorporating the topic of international data transfers into existing political-level conversations. Although data transfer topics have thus far not figured into the formal work of the EU-US Trade and Technology Council (TTC),40 which has met six times since 2022 including most recently in April,41 there is no evident reason why that could not change. If the TTC resumes activity after the US elections, it could become a useful bilateral forum for candid discussion of perceived national security risks in data flows.

Utilizing a broader grouping, such as the data protection and privacy authorities of the Group of Seven (G7), which as a group has been increasingly active in the last few years,42 also could be considered. The deliberations of this G7 group already have touched generally on the matter of government access, and they could readily expand to how its democratic members assess risks from authoritarians in particular. Eventually, such discussions could be expanded beyond the G7 frame into broader multilateral fora. The Organisation of Economic Co-operation and Development (OECD) Declaration on Government Access43 is a good building block.

The days when international data transfers were a topic safely left to privacy lawyers are long gone. It’s time for Washington and Brussels to acknowledge that the geopolitics of data flows has moved from the esoteric to the mainstream, and to grapple with the consequences.

About the author

Related content

The Europe Center promotes leadership, strategies, and analysis to ensure a strong, ambitious, and forward-looking transatlantic relationship.

1    Kenneth Propp, “Transatlantic Digital Trade Protections: From TTIP to ‘Policy Suicide?,’” Lawfare, February 16, 2024, https://www.lawfaremedia.org/article/transatlantic-digital-trade-protections-from-ttip-to-policy-suicide.
2    U.S.-EU Safe Harbor Framework: Guide to Self-Certification, US Department of Commerce, March 2009, https://legacy.trade.gov/publications/pdfs/safeharbor-selfcert2009.pdf.
3    “Chapter 19: Digital Trade,” US-Mexico-Canada Free Trade Agreement, Office of the United States Trade Representative, https://ustr.gov/sites/default/files/files/agreements/FTA/USMCA/Text/19-Digital-Trade.pdf.
4    “Agreement between the United States of America and Japan Concerning Digital Trade,” Office of the United States Trade Representative, https://ustr.gov/sites/default/files/files/agreements/japan/Agreement_between_the_United_States_and_Japan_concerning_Digital_Trade.pdf.
5    Schrems v. Data Protection Commissioner, CASE C-362/14 (Court of Justice of the EU 2015), https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:62014CJ0362.
6    “President Biden Signs Executive Order to Implement the European Union-U.S. Data Privacy Framework,” Fact Sheet, White House Briefing Room, October 7, 2022, https://www.whitehouse.gov/briefing-room/statements-releases/2022/10/07/fact-sheet-president-biden-signs-executive-order-to-implement-the-european-union-u-s-data-privacy-framework/.
7    European Commission, “Commission Implementing Decision of 10.7.2023 Pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the Adequate Level of Protection of Personal Data under the EU-US Data Privacy Framework,” July 10, 2023, https://commission.europa.eu/system/files/2023-07/Adequacy%20decision%20EU-US%20Data%20Privacy%20Framework_en.pdf.
9    Department of Justice, “National Security Division; Provisions Regarding Access to Americans’ Bulk Sensitive Personal Data and Government-Related Data by Countries of Concern,” Proposed Rule, 28 C.F.R. 202 (2024), https://www.federalregister.gov/d/2024-04594.
10    “President Biden Issues Executive Order to Protect Americans’ Sensitive Personal Data,” Fact Sheet, White House Briefing Room, February 28, 2024, https://www.whitehouse.gov/briefing-room/statements-releases/2024/02/28/fact-sheet-president-biden-issues-sweeping-executive-order-to-protect-americans-sensitive-personal-data/.
11    Peter Swire and Samm Sacks, “Limiting Data Broker Sales in the Name of U.S. National Security: Questions on Substance and Messaging,” Lawfare, February 28, 2024, https://www.lawfaremedia.org/article/limiting-data-broker-sales-in-the-name-of-u.s.-national-security-questions-on-substance-and-messaging.
12    “Protecting Americans from Foreign Adversary Controlled Applications Act,” in emergency supplemental appropriations, Pub. L. No. 118–50, 118th Cong. (2024), https://www.congress.gov/bill/118th-congress/house-bill/7520/text.
13    Cristiano Lima-Strong, “Biden Signs Bill That Could Ban TikTok, a Strike Years in the Making,” Washington Post, April 24, 2024, https://www.washingtonpost.com/technology/2024/04/23/tiktok-ban-senate-vote-sale-biden/.
14    “Petition for Review of Constitutionality of the Protecting Americans from Foreign Adversary Controlled Applications Act,” TikTok Inc. and ByteDance Ltd. v. Merrick B. Garland (US Court of Appeals for the District of Columbia Cir. 2024), https://sf16-va.tiktokcdn.com/obj/eden-va2/hkluhazhjeh7jr/AS%20FILED%20TikTok%20Inc.%20and%20ByteDance%20Ltd.%20Petition%20for%20Review%20of%20H.R.%20815%20(2024.05.07)%20(Petition).pdf?x-resource-account=public.
15    Department of Commerce, “Taking Additional Steps to Address the National Emergency with Respect to Significant Malicious Cyber-Enabled Activities,” Proposed Rule, 15 C.F.R. Part 7 (2024), https://www.govinfo.gov/content/pkg/FR-2024-01-29/pdf/2024-01580.pdf.
16    “Regulation (EU) 2016/679 of the European Parliament and of the Council of April 27, 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation),” 2016/679, Official Journal of the European Union (2016), https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679.
17    Schrems v. Data Protection Commissioner.
18    Data Protection Commissioner v. Facebook Ireland & Schrems, CASE C-311/18 (Court of Justice of the EU 2020), https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:62018CJ0311.
19    The Commission’s decision has since been challenged before the CJEU. See Latombe v. Commission, No. Case T-553/23 (Court of Justice of the EU 2023), https://curia.europa.eu/juris/document/document.jsf?text=&docid=279601&pageIndex=0&doclang=EN&mode=lst&dir=&occ=first&part=1&cid=1498741.
20    European Commission, “European Commission Adopts Adequacy Decision on Japan, Creating the World’s Largest Area of Safe Data Flows,” Press Release, January 23, 2019, https://commission.europa.eu/document/download/c2689793-a827-4735-bc8d-15b9fd88e444_en?filename=adequacy-japan-factsheet_en_2019.pdf.
21    “Commission Implementing Decision (EU) 2022/254 of 17 December 2021 Pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the Adequate Protection of Personal Data by the Republic of Korea under the Personal Information Protection Act,” Official Journal of the European Union, December 17, 2021, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32022D0254.
22    “Commission Implementing Decision (EU) 2021/1772 of 28 June 2021 Pursuant to Regulation (EU) 2016/679 of the European Parliament and of the Council on the Adequate Protection of Personal Data by the United Kingdom,” Official Journal of the European Union, June 28, 2021, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32021D1772.
23    European Parliament Justice Committee, Correspondence to Rt. Hon. Lord Peter Ricketts regarding Inquiry into Data Adequacy, April 22, 2024, https://content.mlex.com/Attachments/2024-04-25_L75PCWU60ZLVILJ5%2FLIBE%20letter%20-%20published%20EAC.pdf.
24    “Report from the Commission to the European Parliament and the Council on the First Review of the Functioning of the Adequacy Decisions Adopted Pursuant to Article 25(6) of Directive 95/46/EC,” European Commission, January 15, 2024, https://commission.europa.eu/document/download/f62d70a4-39e3-4372-9d49-e59dc0fda3df_en?filename=JUST_template_comingsoon_Report%20on%20the%20first%20review%20of%20the%20functioning.pdf.
25    European Digital Rights et al., Letter to Vice-President of the European Commission Věra Jourová Regarding Concerns following  Reconfirmation of Israel’s Adequacy Status, April 22, 2024, https://edri.org/wp-content/uploads/2024/04/Concerns-Regarding-European-Commissions-Reconfirmation-of-Israels-Adequacy-Status-in-the-Recent-Review-of-Adequacy-Decisions-updated-open-letter-April-2024.pdf.
26    Milieu Consulting and Centre for IT and IP Law of KU Leuven, “Recommendations 02/2020 on the European Essential Guarantees for Surveillance Measures,” Prepared for European Data Protection Board (EDPB), November 10, 2020, https://www.edpb.europa.eu/sites/default/files/files/file1/edpb_recommendations_202002_europeanessentialguaranteessurveillance_en.pdf.
27    Milieu Consulting and Centre for IT and IP Law of KU Leuven, “Government Access to Data in Third Countries,” EDPB, EDPS/2019/02-13, November 2021, https://www.edpb.europa.eu/system/files/2022-01/legalstudy_on_government_access_0.pdf.
28    European Convention on Human Rights, November 4, 1950, https://www.echr.coe.int/documents/d/echr/Convention_ENG.
29    Statement 02/2022 on Data Transfers to the Russian Federation, European Data Protection Board, July 12, 2022,
https://www.edpb.europa.eu/system/files/2022-07/edpb_statement_20220712_transferstorussia_en.pdf.
30    “Stop Doing Business with Russia,” KSE Institute, May 20, 2024, #LeaveRussia: The List of Companies that Stopped or Still Working in Russia (leave-russia.org).
31    “Russian Data Localization Law: Now with Monetary Penalties,” Norton Rose Fulbright Data Protection Report, December 20, 2019, https://www.dataprotectionreport.com/2019/12/russian-data-localization-law-now-with-monetary-penalties/.
32    “Finnish DPA Bans Yango Taxi Service Transfers of Personal Data from Finland to Russia Temporarily,” Office of the Data Protection Ombudsman, August 8, 2023, https://tietosuoja.fi/en/-/finnish-dpa-bans-yango-taxi-service-transfers-of-personal-data-from-finland-to-russia-temporarily.
33    “European Data Protection Authorities Continue to Cooperate on the Supervision of Yango Taxi Service’s Data Transfers–Yango Is Allowed to Continue Operating in Finland until Further Notice,” Office of the Data Protection Ombudsman, September 26, 2023, https://tietosuoja.fi/en/-/european-data-protection-authorities-continue-to-cooperate-on-the-supervision-of-yango-taxi-service-s-data-transfers-yango-is-allowed-to-continue-operating-in-finland-until-further-notice.
34    “The Data Protection Ombudsman’s Decision Does Not Address the Legality of Data Transfers to Russia–the Matter Remains under Investigation,” Office of the Data Protection Ombudsman, September 27, 2023, https://tietosuoja.fi/en/-/the-data-protection-ombudsman-s-decision-does-not-address-the-legality-of-data-transfers-to-russia-the-matter-remains-under-investigation#:~:text=The%20Office%20of%20the%20Data%20Protection%20Ombudsman%27s%20decision,Protection%20Ombudsman%20in%20October%2C%20was%20an%20interim%20decision.
35    Samm Sacks, Yan Lou, and Graham Webster, “Mapping U.S.-China Data De-Risking,” Freeman Spogli Institute for International Studies, Stanford University, February 29, 2024), https://digichina.stanford.edu/wp-content/uploads/2024/03/20240228-dataderisklayout.pdf.
36    “Irish Data Protection Commission Announces €345 Million Fine of TikTok,” Office of the Irish Data Protection Commissioner, September 15, 2023, https://www.dataprotection.ie/en/news-media/press-releases/DPC-announces-345-million-euro-fine-of-TikTok.
37    “Following EDPB Decision, TikTok Ordered to Eliminate Unfair Design Practices Concerning Children,” European Data Protection Board, September 15, 2023, https://www.edpb.europa.eu/news/news/2023/following-edpb-decision-tiktok-ordered-eliminate-unfair-design-practices-concerning_en.
38    “Tesla Reaches Deals in China on Self-Driving Cars,” New York Times, April 29, 2024, https://www.nytimes.com/2024/04/29/business/elon-musk-tesla-china-full-self-driving.html.
39    “Memorandum of Understanding with China,” German Federal Ministry of Digital and Transport, April 16, 2024,
https://bmdv.bund.de/SharedDocs/DE/Pressemitteilungen/2024/021-wissing-deutschland-china-absichtserklaerung-automatisiertes-und-vernetztes-fahren.html.
40    Frances Burwell and Andrea Rodríguez, “The US-EU Trade and Technology Council: Assessing the Record on Data and Technology Issues,” Atlantic Council, April 20, 2023, https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/us-eu-ttc-record-on-data-technology-issues/.
41    “U.S.-EU Trade and Technology Council (TTC),” US State Department, https://www.state.gov/u-s-eu-trade-and-technology-council-ttc/.
42    “G7 DPAs’ Action Plan,” German Office of the Federal Commissioner for Data Protection and Freedom of Information (BfDI), June 22, 2023, https://www.bfdi.bund.de/SharedDocs/Downloads/EN/G7/2023-Action-Plan.pdf?__blob=publicationFile&v=1.
43    OECD, Declaration on Government Access to Personal Data Held by Private Sector Entities, December 14, 2022, OECD/LEGAL/0487, https://legalinstruments.oecd.org/en/instruments/OECD-LEGAL-0487.

The post Who’s a national security risk? The changing transatlantic geopolitics of data transfers appeared first on Atlantic Council.

]]>