The world’s technological future will be defined in large part by the United States and China, two tech superpowers that are increasingly locked in conflict and distrust. Yet the old international rulebook provides little guidance for how Washington, Beijing, and others can find security and prosperity in a digital age wracked by great power confrontation. Carnegie develops practical insights to help policymakers manage U.S.-China tech tensions and, where possible, create pathways for stable co-existence. We draw on our rich network of government and private sector contacts, and our deep knowledge of technology and security policy, in both countries and around the world.
A partial “decoupling” of U.S. and Chinese technology ecosystems is well underway. Without a clear strategy, Washington risks doing too little or—more likely—too much to curb technological interdependence.
Public attribution is an important yet sensitive issue in cyberspace interaction between China and the United States. The gaps that exist between the two countries’ understanding of the issue have posed a growing negative impact on maintaining stable and healthy China-U.S. relations, both in this area and in broader terms.
A global network of similarly-structured CBDCs could ultimately facilitate lower-cost payments relative to U.S.-regulated channels, thus diminishing the power of U.S. sanctions and curbing dollar usage in cross-border trade.
The Chinese government has unveiled plans to reshape a vast array of technical standards that shape the products and services that consumers around the world rely on, but Beijing’s designs could spawn unintended consequences.
In calling out China’s involvement in cyber attacks on Microsoft email servers, the United States and its allies missed a chance to preempt Beijing’s tit-for-tat response. Here’s how they could regroup.
U.S. allies have joined Washington in voicing concerns about Chinese cyber behavior after the Microsoft Exchange hack. But lingering differences between the partners could still blunt an effective response.
A recent report suggests that China trails the United States in cyberspace. But Chinese leaders are eying a long-term strategy, so Western governments would be wise not to underestimate Beijing.
China’s new digital currency, the e-CNY, could give Beijing valuable information about financial transactions and be used by Chinese firms to sidestep U.S. sanctions. But in order for it to meet lofty ambitions, there are some tricky structural questions that must be worked out first.
In September 2015, a bilateral summit between Chinese President Xi Jinping and then U.S. president Barack Obama laid the foundation for an international norm against cyber- enabled theft of intellectual property for commercial gain.
While the United States is right to counteract illicit technology transfer and protect work opportunities for Americans, it must do so in a way that avoids inflicting unnecessary harm on its own science and innovation base by disrupting one of its most important international STEM talent sources.