Academia.eduAcademia.edu

Tusikov Internet platforms weaponizing chokepoints proofpdf

2021, The Uses and Abuses of Weaponized Interdependence

China used its media and technology industries, both state- run and private, as a tool of economic retaliation against a major U.S. sporting franchise to condemn a U.S. business leader’s political speech on Hong Kong’s anti-government protests, a topic of high political sensitivity in China. This case is a continuation of China’s global efforts to control political speech in regard to Hong Kong and Taiwan, among other issues. The Rockets’ example illustrates how states can extend their power by enrolling private industry, particularly in this case of enacting choke points to control or block information flows.

Pre-Print Publication Tusikov, N. (2021) Internet Platforms Weaponizing Chokepoints. In D. Drezner, H. Farrell, and A. Newman, eds. The Uses and Abuses of Weaponized Interdependence. (pp. 133-148). Washington, DC: Brookings Institute Press. 7 Internet Platforms Weaponizing Choke Points NATASHA TUSIKOV Fans of the Houston Rockets basketball team had front-row seats to the coercive power of the Chinese government in October 2019, when the team’s general manager, Daryl Morey, tweeted his support for pro-democracy protestors in Hong Kong. Morey quickly deleted the tweet and apologized, as did the National Basketball Association (NBA), but the damage was done. Basketball is big business in China, with a rapidly growing fan base and lucrative sponsorship deals. In response to Morey’s tweet, the Chinese Basketball Association and Chinese sponsors rapidly suspended their partnerships with the NBA. Underscoring the Chinese government’s direct involvement in the case, Chinese state television canceled broadcasts of games, and government officials demanded that the NBA commissioner fire Morey.1 Chinese internet companies also lashed out. Tencent, the massive e-commerce conglomerate and operator of the WeChat social media platform, temporarily suspended all NBA preseason broadcasts. The marketplace giant Alibaba removed Houston Rockets’ merchandise from its popular Taobao and Tmall marketplaces, as did the online marketplace JD.com. U.S. politicians, both Democrats and Republicans, condemned the Chinese government for using its economic clout over the NBA to silence critics in the United States. 133 134 The Uses and Abuses of Weaponized Interdependence While the full economic repercussions are not yet fully known, the losses to the NBA and the Rockets measure in the millions. Chinese companies also suffered a serious financial blow. Tencent, for example, lost revenue from streaming and advertising NBA games. Just months earlier, in July 2019, Tencent had secured a five-year partnership with the NBA for US$1.5 billion for the exclusive rights to stream NBA games in China.2 In the terminology of this volume, the Houston Rockets’ case can be understood as a particular type of coercive interdependence that, in the book’s conclusion, Henry Farrell and Abraham Newman term “points of control,” in which states leverage networks against private actors. China used its media and technology industries, both staterun and private, as a tool of economic retaliation against a major U.S. sporting franchise to condemn a U.S. business leader’s political speech on Hong Kong’s anti-government protests, a topic of high political sensitivity in China. This case is a continuation of China’s global efforts to control political speech in regard to Hong Kong and Taiwan, among other issues. The Rockets’ example illustrates how states can extend their power by enrolling private industry, particularly in this case of enacting choke points to control or block information flows. While weaponized interdependence is a new concept within the mainstream international relations literature, the concept describes long-recognized tendencies within the internet governance and regulatory literatures. Drawing from these literatures to enrich the discussion of weaponized interdependence, this chapter argues that states with the capacity to co-opt and coerce key internet platforms can extend state control beyond traditional jurisdictional boundaries. Leveraging large platforms, however, is primarily the domain of powerful states like the United States and China, which can pressure their domestic industries and use the draw of their large markets to compel industry cooperation. Platforms here refers to entities, often from the private sector, that provide important commercial and technical services to enable the effective functioning of the internet, like payments or the domain name system. Platforms’ withdrawal of critical services can enable states to control global flows of information or Internet Platforms Weaponizing Choke Points 135 render websites commercially nonviable, essentially cutting them off from the global economy. Contextualizing Weaponized Interdependence Weaponized interdependence, as set out by Farrell and Newman, describes a situation in which a state leverages network structures to induce or compel specific actors to control flows of information or alter behavior to gain an advantage over other actors.3 Scholars from internet governance, communications, and sociolegal studies have long analyzed the state’s strategic exploitation of information and communications infrastructure.4 However, for too long there have been fruitful discussions within these disciplines but not enough cross-disciplinary engagement amongst internet governance, communications, and socio-legal studies with international relations. While there have been efforts from international relations scholars to bridge disciplinary divides,5 deeper engagement is needed to see how weaponized interdependence may engender scholarship in other fields and what ideas international relations can adapt to further develop weaponized interdependence. In the internet governance literature, the manner in which states might extend control over the budding internet infrastructure— including control over internet firms that provide increasingly critical services of search, payment, and domain name functions—has been a topic of considerable discussion since the late 1990s. Scholars in this field stress the inherent regulability of the internet and warn of the state’s interest in, and capacity for, exploiting communications technologies and internet infrastructure, particularly by co-opting or coercively pressuring private-sector service providers.6 Three key ideas from the internet governance literature explain how conceptions of the internet rapidly shifted from one of an ungovernable space to a highly regulable space where states and, importantly, private-sector actors could exert authority. First, rules can be set within technology to govern behavior, a concept captured by the well-known phrase, “code is law.”7 This refers to the capacity of actors, principally private-sector technology companies, to set rules 136 The Uses and Abuses of Weaponized Interdependence within technical architecture (or code) in software that controls the various systems, applications, and protocols that compose the internet. Depending on the nature of the rules and systems governed, the rule makers may be able to deter or even prevent certain activities, or monitor or block information flows. Second, the growth of key, often private-sector operated nodes within networks that supply the internet’s technical and commercial services offer an attractive leverage point for states, but only certain states have the capacity to exert control. While states initially took a laissez-faire approach to internet governance, in the early 2000s they began recruiting and co-opting these nodes.8 States’ ability to secure the cooperation of these nodes varies widely, as does the nodes’ capacity and desire to resist attempts to compel cooperation. Third, jurisdiction still matters online. States can achieve extraterritorial reach by tapping into private transnational networks. Control key actors, the argument goes, and one can control the provision and operation of important online services and infrastructure.9 Jurisdiction remains important for states in relation to internet platforms, as governments may have greater influence over companies that operate within or are headquartered in their territory. Platforms’ Choke-Point Effects Depending upon the type of services provided, platforms that command dominant market share can institute what I elsewhere have defined as access or revenue choke points.10 By withdrawing payment services, platforms can disable websites’ capacity to process payments or receive advertising funds, thereby “choking” the websites’ revenue streams. Platforms can also disrupt users’ ability to locate and access targeted websites by interfering with search and domain services, and they can remove sales listings from marketplaces, making it difficult to sell goods and services. The intention is to render the targeted entities commercially nonviable by impeding the sites’ proper functioning. Given their operational scope and provision of important services, these dominant platforms can have a regulatory capacity similar to or even exceeding that of typical state regulators. In recognition of the role that large, mostly U.S. companies play Internet Platforms Weaponizing Choke Points 137 in providing vital commercial and technical services on the internet, scholars have referred to platforms’ provision of key services as choke points,11 natural points of control,12 or bottlenecks.13 A handful of U.S. companies dominate the provision of important technical and commercial services including payment (PayPal, Visa, MasterCard), advertising (Google and Facebook), domain name (GoDaddy), and marketplace (eBay and Amazon). These actors are dominant because of their transnational and, in some cases, near-global platforms; their significant market share; and their regulatory capacity that stems, in part, from “their positions at the nexus points between communications networks.”14 U.S. platforms are only rivaled by their Chinese counterparts, which generate most of their revenue in China; Tencent, Alibaba, and Baidu collectively dominate the provision of payment, marketplace, search, and social media services. Internet platforms’ capacity to enact choke points on behalf of states stems from the platforms’ legal authority and business models. In terms of the former, platforms grant themselves considerable latitude through their contractual terms-of-use agreements with their users to draft, interpret, and enforce rules in ways that suit the platforms’ business models and commercial interests. Platforms’ implementation and enforcement of these rules, typically undertaken with little independent oversight or public disclosure, constitute a form of private ordering. Through these agreements, platforms can act of their own initiative in the absence of formal legal orders or involvement by law enforcement. A standard element of these agreements is a discretionary provision granting platforms the ability to remove content or terminate services even when the act in question is lawful. Platforms can also rapidly institute new rules, or change existing ones, governing their services, and studies show that few users read— or they struggle to understand— the updated legal agreements.15 In terms of business models, the regulatory capacity of a platform relies on its routine surveillance of its users’ activities and transactions as part of its data-intensive business practices that are characteristic of surveillance capitalism.16 Platforms employ surveillance not only to police users for violations of platform policies, but also, more importantly, to collect and interpret data on users to serve the platforms’ commercial interests. This mass accumulation of data presents 138 The Uses and Abuses of Weaponized Interdependence a tempting target for governments intent on surveilling or controlling their citizens online. Weaponizing Choke Points The concept of online choke points gained public prominence in 2010, when the U.S. government sought to destroy WikiLeaks after its publication of thousands of classified U.S. diplomatic cables leaked by whistleblower Chelsea Manning. Claiming the publication would harm U.S. national security interests, the U.S. government pressured key internet companies to sanction WikiLeaks. In response, companies withdrew their services, citing WikiLeaks for violating their terms-of-service agreements. Amazon stopped providing WikiLeaks with cloud-storage facilities, and EveryDNS withdrew its domain name services, meaning that users would not be able to find WikiLeaks online. PayPal, MasterCard, and Visa discontinued payment processing— a critical blow as the WikiLeaks site relied on donations and struggled to replace its payment services.17 The U.S. government’s campaign against WikiLeaks was the first high-profile case of what legal scholar Yochai Benkler described as a “denial-of-service attack” aimed at halting the “technical, payment, and business process systems to targeted sites.”18 Prior to its use on WikiLeaks, denial of service (DoS) was also used to block revenue from and freeze funds related to terrorist organizations.19 Lessons from Setting Choke Points The attack on WikiLeaks was not a singular case: it was the forerunner in the normalization of state pressure on platforms to withdraw their technical and commercial services to targeted entities. States use platforms to enact choke points against private actors to serve their strategic interests, as highlighted in the cases of WikiLeaks and the Houston Rockets. Drawing from socio-legal studies and the regulatory studies literatures, there are six important lessons to learn regarding weaponized interdependence. First, states’ capacity to recruit or coerce platforms to enact choke points varies widely. State capacity disproportionately favors pow- Internet Platforms Weaponizing Choke Points 139 erful states that can compel involvement by exerting political or legal pressure, particularly over their domestic industry. As Michael Mastanduno finds in his chapter in this volume, weaponized interdependence is a tool of strong states that have control over critical networks. States with dominant platforms headquartered in their jurisdictions have the home-court advantage. In the wake of WikiLeaks, the United States, United Kingdom, and European Commission pressured large, mostly U.S. internet platforms to withdraw their services from targeted websites and businesses. The targets were websites involved in illegal gambling, the unlawful distribution of tobacco, child pornography, counterfeit goods, and the distribution of copyright-infringing movies, software, and music.20 These state actors were successful because they credibly threatened to lay criminal charges or enact legislation if platforms did not agree to institute choke points “voluntarily” in the absence of legislation or formal legal orders.21 China has also applied considerable political and legal pressure on its platforms, given the tight control the Chinese government exerts over its internet and domestic technology companies.22 However, even powerful states face limits in their capacity to compel action from platforms. For example, the European Commission and the United Kingdom were only successful in directing U.S.-based platforms to set choke points within their respective jurisdictions regarding the distribution of counterfeit goods and copyright-infringing content.23 In these cases, pushback from platforms contributed, in part, to the jurisdictional limits on the regulatory efforts. As Adam Segal finds in his chapter on the U.S. government’s campaign against Huawei, successfully leveraging the global supply chain is a difficult task complicated by Huawei’s diversification of its suppliers and by U.S. companies’ exploitation of boycott loopholes to maintain business with Huawei. Second, states can use access to their domestic markets as leverage to compel platforms to enact choke points. The United States has a significant advantage, given the size of its domestic market, but the European Union (EU) and China can also use access to their markets as a way to secure industry cooperation. China is interested in leveraging its domestic internet platforms to serve its economic and polit- 140 The Uses and Abuses of Weaponized Interdependence ical interests, as the Houston Rockets case shows. But given that its platforms largely operate within China, its choke point capabilities are currently limited to inside China. With the continued expansion of Chinese platforms, China may have a future capacity to use platforms to set choke points that affect the provision of commercial and technical services beyond its borders. In contrast to powerful states, smaller countries have few options to coerce action from global platforms. In Canada, for example, Google banned election-related advertising rather than comply with a new law regulating elections, concluding that the Canadian market was too small to merit the trouble of making the required changes.24 Third, states’ interest in seeking to leverage specific private actors may stem from private actors’ actual or perceived specialized technical or industry knowledge, and greater access to markets. 25 Working with platforms, particularly in the absence of legislation, can also offer states the benefits of flexibility and extraterritorial reach. As platforms operate through their contractual terms-of-service agreements, their rule setting and enforcement is generally more rapid, secretive, and adaptable than legislation or legal orders. Therefore, states may perceive corporate actors to be more responsive, costeffective, and efficient actors than government agencies in certain areas.26 By working through third parties, governments can also have deniability of certain industry-facilitated choke points or may be able to operate at a scale unfeasible for government agencies. Fourth, private actors have varying interests in working with states to enact choke points, such as preventing an association of their platforms with criminality or entities perceived to be a threat to the state. Platforms, particularly those operating globally, are vulnerable to state pressure in the form of threats of legislation or legal action where they operate in an uncertain regulatory environment. Finally, private actors may view collaboration with the state as a way to curry favor with state officials, secure an advantage over commercial rivals, or expand their operations. Fifth, conflicts between states and private actors— and among private actors— are inevitable. States and platforms have shared interests, although sometimes differing goals, in expanding their control over the internet. Concepts such as “surveillance capitalism” and Internet Platforms Weaponizing Choke Points 141 “platform capitalism” underscore the importance of controlling information flows.27 States may prioritize economic, military, or security interests, while platforms follow their commercial imperatives.28 When state and corporate interests conflict, such as in the case of Apple refusing to circumvent its encryption at the request of the U.S. Federal Bureau of Investigation (FBI), states may shift to more coercive tactics like legal action, legislation, or threats of withdrawing market access but face the possibility of industry opposition, as was the case with Apple.29 In addition to state- corporate conflict, there may also be conflict within states as to the necessity, viability, or effectiveness of weaponized interdependence, or when, if at all, states should resort to this tactic. As Mastanduno argues in his chapter, the weaponization of structural power should be reserved for clear, justifiable emergencies such as national security crises. He notes that, in an environment of competition and conflict among the great powers, shifts in regional power, and the continued instability of foreign policy under the Donald Trump administration, the challenge is that weaponized interdependence may become a frequent rather than exceptional tool, at least for the United States. Sixth, and finally, the effectiveness of choke points depends upon the degree of concentration in the industry sector in question and the availability of replacement service providers. Some services are relatively easy to replace, while in some industry sectors there are few viable commercial alternatives. The online payment provider industry, for example, is highly concentrated with a small number of dominant players— PayPal, Visa, MasterCard, and, in China, Tencent’s WeChat Pay and Alibaba’s AliPay. There are also a host of smaller players, like Apple Pay, but these often rely on the large players’ payment systems. Payment providers are the most successful regulators because they can effectively defund targeted entities. Further, given the due-diligence requirements for payment providers to vet their users before granting accounts, it can be difficult to replace payment services, as WikiLeaks found. There are dominant actors in other online sectors: Google and Facebook for digital advertising; Google for search; Amazon and eBay, along with Alibaba’s Taobao and Tmall in China, for market- 142 The Uses and Abuses of Weaponized Interdependence places; and GoDaddy for domain registrars. However, in contrast to the online payment industry, these sectors are more diversified and their services are easier to replace. Unlike replacing online payment services, it is a relatively simple process to secure alternative providers for advertising, marketplaces, social media, web hosting, or cloud services. Many websites, for example, can function without advertising revenue; if a dominant search engine like Google removes search results from its index, people can use other search engines. Similarly, if a marketplace removes sales listings for certain products, as Taobao did with listings for Houston Rockets’ paraphernalia, sellers can move to another trading platform. Future Research Developing the concept of weaponized interdependence will no doubt be of value to international relations, bringing greater theoretical and empirical understanding to the state’s leveraging of network capabilities. The concept may be able to provide insight on how and under what conditions states can leverage private actors to achieve their strategic objectives against other states, as well as when private actors are most likely to comply or resist. These contributions from international relations would likely provoke fertile cross-disciplinary engagement and contribute to scholarship within internet governance, communications, and socio-legal studies, as well as other disciplines. More broadly, the case needs to be made for the utility of the concept of weaponized interdependence outside the United States. The United States has used its structural power for decades to achieve its political, security, and economic interests. Only recently has the United States realized that it can also be affected by weaponized interdependence, as Daniel Drezner notes in this book’s introduction. The rest of the world, however, has a deep familiarity with what it means to be in an interdependent relationship with a more powerful country and, in particular, has long experienced the ability of the United States to exert this type of power on allies and enemies alike. To what extent does this concept serve to explain to U.S. policymakers the newly discovered vulnerability of the United States to weaponized interdependence employed by other states, and how can it be Internet Platforms Weaponizing Choke Points 143 best developed for usefulness to non-American and non-international relations scholars and policymakers? In terms of a more specific research agenda related to internet and digital technologies, there are several fruitful lines of inquiry for future choke-point research. Scholarship should consider what other areas of commercial or technical services on the internet might be vulnerable to choke-point effects. Cloud infrastructure, for example, is a highly concentrated industry with major U.S. companies holding key market share, especially Amazon Web Services, Microsoft Azure, IBM, and Google Cloud Platform, along with China’s Alibaba Cloud (Aliyun) and Tencent Cloud. What might be the effects of choke points within cloud infrastructure, and which companies might be most amenable or resistant? With an increasing number of commercial and government services dependent upon the cloud, including education, health care, and military services, disruptions to this sector could be consequential. Scholarship also needs to examine the potential for choke points in the physical infrastructure making up the internet, the protection of which has been a long-standing national security concern in the United States, as well as in many other countries. Control of the internet’s physical infrastructure takes on a new urgency with research demonstrating that the ownership and operation of core elements of the global internet infrastructure is shifting away from the United States toward Europe and Brazil, Russia, India, China, and South Africa.30 These elements include the fiber-optic submarine cables, autonomous system numbers, and internet exchange points that constitute the “pipes” of the internet. A consortium of public and private actors is building and controlling internet infrastructure in the AsiaPacific and African regions, but the short- and long-term implications of these developments, particularly in terms of continued U.S. hegemony over the internet, are not clear.31 Analyzing choke points in the online environment requires a careful examination of the Chinese government’s interest in and capability to enact choke points. The rapid growth of Chinese internet platforms over the past decade has generated friction between the United States and China, as only China has internet platforms that rival those in the United States. In addition to having national secu- 144 The Uses and Abuses of Weaponized Interdependence rity implications, the U.S.- China trade dispute is also a technological dispute, with both parties wanting to dominate global markets in advanced technologies like robotics, autonomous vehicles, and artificial intelligence.32 The Chinese government has strategically cultivated its national technology champions, in part by banning foreign competitors and using policy incentives to favor domestic firms, which has resulted in a symbiotic partnership between the Chinese government and its commercial internet firms.33 China’s tech giants operate largely within China but control industry sectors: Baidu dominates search; Tencent operates the popular WeChat social media platform and WeChat Pay application; and the Alibaba Group’s Taobao and Tmall platforms are the dominant retail marketplaces in China, while Alibaba’s AliPay system competes with WeChat Pay for dominance of China’s online payment sector. Tencent and Alibaba are also expanding within Europe and Asia, with investments in cloud infrastructure, artificial intelligence, and payment services, raising concerns in the United States.34 How and in what industry sectors might the Chinese government impose choke points to serve its political and economic interests, and with what effects? Since Chinese platforms remain reliant on foreign capital, particularly from the United States, for continued growth,35 how might this constrain the effectiveness of the Chinese government’s use of choke points? How might China employ choke points to gain technological dominance in areas of strategic interest to itself and the United States, especially in robotics, autonomous vehicles, and artificial intelligence?36 Finally, this focus on the United States and China prompts a final critical question: How are other countries affected by weaponized interdependence? Research is needed not just on states that have the capacity and intent to wield choke points, but also in assessing how affected countries might best respond to, resist, or deter statesanctioned choke points. How might smaller countries without dominance over economic networks, like Canada, Brazil, or Australia, resist or respond to choke points? This research agenda should consider the role of the EU in facilitating or responding to weaponized interdependence. The European Union does not have a domestic internet industry that rivals that of the United States or China, but the Internet Platforms Weaponizing Choke Points 145 EU is attempting to position itself as a regulatory superpower, in part through its May 2018 implementation of the General Data Protection Regulation (GDPR), its groundbreaking privacy law. Next Steps The use of choke points will continue because globally operating internet platforms are an attractive and valuable tool for states to extend their control. The United States has a particular advantage, given the commercial dominance of its platforms across various industry sectors and its capacity to compel cooperation from its platforms. China, however, has its own internet giants over which the government exerts considerable control. The Houston Rockets’ case is a likely prelude to future scenarios in which China capitalizes upon its growing internet sector to extend its political and economic control. This chapter is structured around the Houston Rockets case because it highlights an important factor in why U.S. academics and policymakers are concerned about weaponized interdependence: a country other than the United States can now leverage networks to exert choke-point power to serve its interests. As Drezner notes in the introduction, U.S. policymakers have been slow to recognize that the United States can be affected by weaponized interdependence, and now they need to consider how they might respond to choke points targeting U.S. political, security, or economic interests. Outside the United States, the practice of weaponized interdependence is quite familiar. Countries like Canada can provide advice and counterstrategies because they have experienced the United States wielding its structural power for decades. With the United States finally experiencing the negative effects of weaponized interdependence, might U.S. policymakers consider prioritizing alternative forms of statecraft? Notes 1. Patrick Blennerhassett, “NBA Boss Adam Silver Says Chinese Government Asked Him to Fire Houston Rockets General Manager Daryl Morey,” South China Morning Post, October 18, 2019, www.scmp.com/ sport/basketball/article/3033476/adam-silver-said-chinese-government-asked -him-fire-houston-rockets. 146 The Uses and Abuses of Weaponized Interdependence 2 . Tony Xu, “China’s Tech Giants Hit Pause on NBA Ties after Executive’s Hong Kong Tweet,” TechNode, October 9, 2019, https://technode.com/2019 /10/09/chinas -tech-giants -hit-pause -on-nba-ties -after -executives -hong -kong -tweet/. 3. Henry Farrell and Abraham L. Newman, “Weaponized Interdependence: How Global Economic Networks Shape State Coercion,” International Security 44 (Summer 2019), pp. 42–79. 4. See, for example, David Harvey, The New Imperialism (Oxford University Press, 2003). 5. See Henry Farrell, “Regulating Information Flows: States, Private Actors, and E-Commerce,” Annual Review of Political Science 9 (2006), pp. 353–74. 6. See Michael D. Birnhack and Niva Elkin-Koren, “The Invisible Handshake: The Reemergence of the State in the Digital Environment,” Virginia Journal of Law and Technology 8, no. 6 (2003), pp. 1–57; Lawrence Lessig, Code and Other Laws of Cyberspace (New York: Basic Books, 1999); Joel R. Reidenberg, “Lex Informatica: The Formulation of Information Policy Rules through Technology,” Texas Law Review 76 (1998), pp. 553–93. 7. Lessig, Code and Other Laws of Cyberspace. 8. Birnhack and Elkin-Koren, “The Invisible Handshake.” 9. Annemarie Bridy, “Internet Payment Blockades,” Florida Law Review 67, no. 5 (2015), pp. 1523–68; Uta Kohl, “Google: The Rise and Rise of Online Intermediaries in the Governance of the Internet and Beyond (Part 2),” International Journal of Law and Information Technology 21, no. 2 (2013), pp. 187–234; Natasha Tusikov, Chokepoints: Global Private Regulation on the Internet (University of California Press, 2017). 10. Tusikov, Chokepoints. 11. Laura DeNardis, The Global War for Internet Governance (Yale University Press, 2014); Tusikov, Chokepoints. 12. Jonathan A. Zittrain, “A History of Online Gatekeeping,” Harvard Journal of Law and Technology 20, no. 1 (2006), pp. 253–98, at p. 254. 13. Oren Bracha and Frank Pasquale, “Federal Search Commission? Access, Fairness, and Accountability in the Law of Search,” Cornell Law Review 93 (2008), pp. 1149–1210, at p. 1161. 14. Andrew Murray, “Nodes and Gravity in Virtual Space,” Legisprudence 5 (2011), pp. 195–221, at p. 220. 15. Jonathan A. Obar and Anne Oeldorf-Hirsch, “The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services,” Information, Communication & Society 23, no. 1 (2018), pp. 128–47. 16. Shonsana Zuboff, The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (New York: Public Affairs, 2019). Internet Platforms Weaponizing Choke Points 147 17. Yochai Benkler, “WikiLeaks and the Protect-IP Act: A New Public-Private Threat to the Internet Commons,” Daedalus 140, no. 4 (2011), pp. 154–64. 18. Ibid, p. 155. 19. Ibid. 20. See Tusikov, Chokepoints. 21. Ibid. 22. See Aofei Lv and Ting Luo, “Authoritarian Practices in the Digital Age: Asymmetrical Power Between Internet Giants and Users in China,” International Journal of Communication 12 (2018), pp. 3877–95. 23. See Tusikov, Chokepoints. 24. Tom Cardoso, “Google to Ban Political Ads Ahead of Federal Election, Citing New Transparency Rules,” The Globe and Mail, March 4, 2019, www .theglobeandmail .com/politics/article -google -to -ban -political-ads -ahead -of -federal-election-citing-new/. 25. Claire A. Cutler, Virginia Haufler and Tony Porter, Private Authority and International Affairs (SUNY Press, 1999). 26. Fabrizio Cafaggi, editor, Enforcement of Transnational Regulation: Ensuring Compliance in a Global World (Cheltenham, United Kingdom: Edward Elgar Publishing, 2012). 27. See Zuboff, The Age of Surveillance Capitalism; Nick Srnicek, Platform Capitalism (Cambridge, United Kingdom: Polity, 2017). 28. Shawn M. Powers and Michael Jablonski, The Real Cyber War: The Political Economy of Internet Freedom (University of Illinois Press, 2015). 29. Lily Hay Newman, “This Apple-FBI Fight is Different from the Last One,” Wired, January 16, 2020, www.wired.com/story/apple-fbi-iphone - enc r y pt ion -p en s acol a / #:~: t ex t= For%2 0 a l l%2 0 t he%2 0 F B I ’s%2 0 posturing,to%20crack%20it%20for%20them. 30. Dwayne Winseck, “Internet Infrastructure and the Persistent Myth of U.S. Hegemony,” in Information, Technology and Control in a Changing World: Understanding Power Structures in the 21st Century, edited by Blayne Haggart, Kathryn Henne, and Natasha Tusikov (New York: Palgrave Macmillan, 2019), pp. 93–120. 31. Ibid. 32. See Natasha Tusikov, “How U.S.-Made Rules Shape Internet Governance in China,” Internet Policy Review 8, no. 2 (2019), pp. 1–22. 33. Min Jiang and King-Wa Fu, “Chinese Social Media and Big Data: Big Data, Big Brother, Big Profit?” Policy & Internet 10, no. 4 (2018), pp. 372–92. 34. Philippe Le Corre, “On China’s Expanding Influence in Europe and Eurasia,” testimony to the U.S. House of Representatives Foreign Affairs Committee, Subcommittee on Europe, Eurasia, Energy, and the Environment, Washington, May 9, 2019. 148 The Uses and Abuses of Weaponized Interdependence 35. Lianrui Jia and Dwayne Winseck, “The Political Economy of Chinese Internet Companies: Financialization, Concentration, and Capitalization,” International Communication Gazette 80, no. 1 (2018), pp. 30–59. 36. See Kim Min-hyung, “A Real Driver of U.S.–China Trade Conflict: The Sino–U.S. Competition for Global Hegemony and Its Implications for the Future,” International Trade, Politics and Development 3, no. 1 (2019) pp. 30–40.