Exporting Digital Authoritarianism: the Russian and Chinese Models Alina Polyakova and Chris Meserole

Total Page:16

File Type:pdf, Size:1020Kb

Load more

POLICY BRIEF Exporting digital authoritarianism: The Russian and Chinese models Alina Polyakova and Chris Meserole As Russia, China, and other states advance influence through forms of digital authoritarianism, stronger responses are needed from the U.S. and like-minded partners to limit the effects of their efforts. EXECUTIVE SUMMARY unprecedented high-tech repression deployed in Xinjiang in recent years, and has exported Digital authoritarianism — the use of digital surveillance and monitoring systems to at least 18 information technology by authoritarian regimes countries. Russia relies less on filtering information to surveil, repress, and manipulate domestic and more on a repressive legal regime and and foreign populations — is reshaping the power intimidation of key companies and civil society, a balance between democracies and autocracies. lower-cost ad hoc model more easily transferable to At the forefront of this phenomenon, China and most countries. The Russian government has made Russia have developed and exported distinct recent legal and technical moves which further technology-driven playbooks for authoritarian rule. tighten control, including legislation passed this Beijing’s experience using digital tools for domestic year to establish a “sovereign Russian internet.” censorship and surveillance has made it the supplier of choice for illiberal regimes looking to deploy The authors recommend that the United States their own surveillance systems, while Moscow’s and other democracies should tighten export lower-cost digital disinformation tools have proven controls on technologies that advance digital effective in repressing potential opposition at home authoritarianism, sanction regimes engaging in and undermining democracies abroad. digital authoritarianism and firms that supply them, develop a competitive democratic model of digital This policy brief examines the development and governance with a code of conduct, and increase export of both the Chinese and Russian models. public awareness around information manipulation, China pioneered digital age censorship with its including funding educational programs to build “Great Firewall” of a state-controlled Internet and digital critical thinking skills among youth. 1 DEMOCRACY & DISORDER EXPORTING DIGITAL AUTHORITARIANISM: THE RUSSIAN AND CHINESE MODELS INTRODUCTION on the digital domain since the early 2000s, it has not been the “industry leader” in developing In January 2010, Secretary of State Hillary Clinton these tools. Rather, Moscow’s domestic model delivered a landmark speech on internet freedom in is relatively low-tech when it comes to domestic which she argued that the spread of communications surveillance. Its main focus has been the export of technology and free flow of information would digital disinformation tools — a suite of information ultimately lead to greater freedom and democracy.1 influence techniques easily bought and deployed by In the years since, that view has come under other state and non-state actors. Moscow’s model increasing strain. Most notably, China and Russia of low-tech surveillance, due to its relative low cost have learned how to leverage both the internet and and adaptability, is finding appeal among resource- information technology in ways that have reduced poor governments that lack China’s economic rather than expanded human freedom. Worse, prowess, human capital capacities, and centralized they have also begun to export their models of state control. digital authoritarianism across the globe. Absent an effective democratic response, including an Yet as different as the Chinese and Russian international rules of the road framework around motivations and capabilities have been, the surveillence technology exports, further advances end result is remarkably similar: each country in information technology may well yield a world of has developed a set of tools that enable rising ever greater repression rather than liberalization. authoritarians to repress potential opposition at home while undermining democracies abroad. Digital authoritarianism — the use of digital information technology by authoritarian regimes to surveil, repress, and manipulate domestic and THE CHINESE MODEL foreign populations — is reshaping the power Beijing’s approach to information technology dates balance between democracies and autocracies. back to the reformist era of Deng Xiaoping. In keeping While China is driving innovation in high-tech with Deng’s vision for opening China’s economy social control, Russia has been more willing to while maintaining social stability, Zhongnanhai weaponize information technologies as part of has consistently viewed digital technology as a key targeted influence operations. Both countries have driver of economic development as well as a tool developed and exported new tech-driven playbooks for preserving and even extending political control.2 for authoritarian rule, but their strategies are quite The strategy has largely been a success. China distinct. The Chinese have long pioneered digital now boasts world-class technology and the second tools for domestic censorship and surveillance, largest economy in the world,3 yet the country’s dating back to the initial launch of its “Great Firewall” openness to global trade and information technology over two decades ago. More recently, Beijing’s long has not led to any meaningful political reform. The experience building a robust digital surveillance Chinese Communist Party (CCP) remains thoroughly architecture has started to pay dividends: China entrenched in power, and Xi Jinping enjoys an has increasingly become the supplier of choice extraordinary degree of political control.4 for illiberal regimes looking to deploy surveillance systems of their own. Beijing has leveraged information technology both online and offline. Email first arrived in China in By contrast, Moscow is struggling to catch up 1987, and the commercial internet in 1994.5 Not with China’s high-tech model of domestic control. long after, Party leaders began insisting that the Although the Russian government has sought to web would need to be used in accord with “Chinese clamp down on internet freedom, gain access to characteristics.”6 In 1996, when only 150,000 citizens’ personal data, and impose more control 2 DEMOCRACY & DISORDER EXPORTING DIGITAL AUTHORITARIANISM: THE RUSSIAN AND CHINESE MODELS Imams and Chinese government officials pass under security cameras as they leave the Id Kah Mosque in Kashgar, Xinjiang Uighur Autonomous Region, China, during a trip organized by the government for foreign reporters. January 4, 2019. REUTERS/Ben Blanchard Chinese were online, State Council Order No. 195 rights activists are nonetheless frequently detained explicitly brought the internet under state control. for what they post on popular social media sites like Within a year Wired was already referring to the Weibo and WeChat, both of which are aggressively “The Great Firewall of China.”7 In the twenty years monitored.11 (Indeed, in Xinjiang, residents are only since, Beijing’s legal and technical architecture allowed to use WeChat, precisely because it is so for web censorship and surveillance has grown widely monitored.)12 Meanwhile, applications and dramatically. Although Xi centralized control over websites that do not comply with Beijing’s demands the internet in 2013, principally through the creation operate at considerable peril: in the first three weeks of a Cyberspace Administration that reports directly of 2019 alone, the Xi regime shut down over 700 to him, the Chinese web is now overseen by over websites and 9,000 mobile apps, including those sixty agencies with vast legal and technical ability to owned by prominent companies like Tencent.13 monitor and regulate online activity.8 Far from sparking a political opening, within China the internet has been a valuable space for state censorship and surveillance. Far from sparking a political opening, within Yet the Chinese are not just monitoring online China the internet has been a valuable space activity. In 2005, the Ministry of Public Security for state censorship and surveillance. (MPS) and Ministry of Industry and Information Technology (MIIT) jointly launched a program called SkyNet, which aimed to install a national network of Beijing’s control over both the infrastructure and CCTV feeds.14 By 2010, Beijing alone was blanketed application layer of the web has had a profound with 800,000 surveillance cameras, and by 2015 impact on political behavior.9 Although the CCP allows Beijing police boasted that the city was 100% for some forms of criticism,10 dissidents and human covered. More than 20 million more cameras were 3 DEMOCRACY & DISORDER EXPORTING DIGITAL AUTHORITARIANISM: THE RUSSIAN AND CHINESE MODELS in use nationwide.15 Based on the success of the Beijing is not just constructing separate SkyNet program, the National Development and surveillance systems for the web and real-world. It Reform Commission (NDRC) in 2015 then set the is also increasingly seeking to link the two. Most ambitious goal of covering all of China’s public notably, in 2014 the State Council announced its spaces and leading industries in cameras by 2020, goal to establish a national “social credit score” with the aim of creating an “omnipresent, fully system by 2020.25 As with “Sharp Eyes,” that networked, always working and fully controllable” deadline will likely prove infeasible. A national surveillance system.16 Although that goal is far- system that can aggregate
Recommended publications
  • Internet Surveillance in China

    Internet Surveillance in China

    The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks.
  • Egypt Digital Rights Landscape Report

    Egypt Digital Rights Landscape Report

    ids.ac.uk Digital Rights in Closing Civic Space: Lessons from Ten African Countries 209 Egypt Digital Rights Landscape Report Egypt Digital Rights Landscape Report Mohamed Farahat This is an Open Access report distributed under the terms of the Creative Commons Attribution 4.0 International licence (CC BY), which permits unrestricted use, distribution, and reproduction in any medium, provided the original authors and source are credited and any modifications or adaptations are indicated. This report is part of ‘Digital Rights in Closing Civic Space: Lessons from Ten African Countries’; the Introduction is also recommended reading. © 2021 Mohamed Farahat © Institute of Development Studies. DOI: 10.19088/IDS.2021.014 ids.ac.uk Digital Rights in Closing Civic Space: Lessons from Ten African Countries 210 Egypt Digital Rights Landscape Report 1. Introduction Egypt has experienced many political and social changes prior to and since the 2011 uprising. These changes have had a significant impact on civic space offline, as well as online. Digital rights are simply human rights in online spaces and are recognised as being of central importance. This is especially true when closing civic space in the physical world means that opening civic space online is a necessary last resort. The coronavirus (Covid-19) pandemic has highlighted the importance of digital rights, especially for vulnerable groups such as refugees and people in rural and remote areas. The main objective of this report is to give an overview of digital rights in Egypt, especially in the context of freedom of expression and freedom of assembly, the right to access the internet, and for access to information, and the right to knowledge; and to explore the impacts of the political context on civic space in general and digital rights in particular.
  • Who Set the Narrative? Assessing the Influence of Chinese Media in News Coverage of COVID-19 in 30 African Countries the Size Of

    Who Set the Narrative? Assessing the Influence of Chinese Media in News Coverage of COVID-19 in 30 African Countries the Size Of

    Who Set the Narrative? Assessing the Influence of Chinese Media in News Coverage of COVID-19 in 30 African Countries The size of China’s State-owned media’s operations in Africa has grown significantly since the early 2000s. Previous research on the impact of increased Sino-African mediated engagements has been inconclusive. Some researchers hold that public opinion towards China in African nations has been improving because of the increased media presence. Others argue that the impact is rather limited, particularly when it comes to affecting how African media cover China- related stories. This paper seeks to contribute to this debate by exploring the extent to which news media in 30 African countries relied on Chinese news sources to cover China and the COVID-19 outbreak during the first half of 2020. By computationally analyzing a corpus of 500,000 news stories, I show that, compared to other major global players (e.g. Reuters, AFP), content distributed by Chinese media (e.g. Xinhua, China Daily, People’s Daily) is much less likely to be used by African news organizations, both in English and French speaking countries. The analysis also reveals a gap in the prevailing themes in Chinese and African media’s coverage of the pandemic. The implications of these findings for the sub-field of Sino-African media relations, and the study of global news flows is discussed. Keywords: China-Africa, Xinhua, news agencies, computational text analysis, big data, intermedia agenda setting Beginning in the mid-2010s, Chinese media began to substantially increase their presence in many African countries, as part of China’s ambitious going out strategy that covered a myriad of economic activities, including entertainment, telecommunications and news content (Keane, 2016).
  • Egypt: Freedom on the Net 2017

    Egypt: Freedom on the Net 2017

    FREEDOM ON THE NET 2017 Egypt 2016 2017 Population: 95.7 million Not Not Internet Freedom Status Internet Penetration 2016 (ITU): 39.2 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 15 16 Political/Social Content Blocked: Yes Limits on Content (0-35) 15 18 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 33 34 TOTAL* (0-100) 63 68 Press Freedom 2017 Status: Not Free * 0=most free, 100=least free Key Developments: June 2016 – May 2017 • More than 100 websites—including those of prominent news outlets and human rights organizations—were blocked by June 2017, with the figure rising to 434 by October (se Blocking and Filtering). • Voice over Internet Protocol (VoIP) services are restricted on most mobile connections, while repeated shutdowns of cell phone service affected residents of northern Sinai (Se Restrictions on Connectivity). • Parliament is reviewing a problematic cybercrime bill that could undermine internet freedom, and lawmakers separately proposed forcing social media users to register with the government and pay a monthly fee (see Legal Environment and Surveillance, Privacy, and Anonymity). • Mohamed Ramadan, a human rights lawyer, was sentenced to 10 years in prison and a 5-year ban on using the internet, in retaliation for his political speech online (see Prosecutions and Detentions for Online Activities). • Activists at seven human rights organizations on trial for receiving foreign funds were targeted in a massive spearphishing campaign by hackers seeking incriminating information about them (see Technical Attacks). 1 www.freedomonthenet.org Introduction FREEDOM EGYPT ON THE NET Obstacles to Access 2017 Introduction Availability and Ease of Access Internet freedom declined dramatically in 2017 after the government blocked dozens of critical news Restrictions on Connectivity sites and cracked down on encryption and circumvention tools.
  • Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest

    Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest

    Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government.
  • Ant Financial Case Study.Pdf

    Ant Financial Case Study.Pdf

    EO INTELLIGENCE Cover photo credit to IC photo Deciphering the Trillion-valued Unicorn -Ant Financial Case Study Copyright ©2019 EO Intelligence. All Rights Reserved. EO INTELLIGENCE INTRODUCTION According to the World Development Report 2019 issued by the World Bank in October 2018, Ant Financial was rated as the most valuable fintech company in the world. As a financial services company that has just spun off from Alibaba Group for four years, it does deserve the title "the most valuable company" with a valuation of USD 160 billion. In China, there is a huge gap between the lofty valuation of Ant Financial and the valuation of other unicorn companies. It can be seen that Ant Financial is growing rapidly and outperforming financial institutions that have been developing for decades in China and even the world. Ant Financial cannot be labeled as a simple fintech or a financial company, because in terms of the 15-year accumulation and development from Alipay to Ant Financial, both the innovation capability of its financial business and the technical output capability serving a third-party financial and non-financial institution are indispensable consideration factors for its valuation of USD 160 billion. Why is Ant Financial selected? By making a summary and analysis on the development of Ant Financial, EO Intelligence hopes to have a deep understanding of the impetus for the industry brought by the combination of technology and finance, and the logic behind it. The scale and uniqueness of the Ant Financial ecosystem may not be replicable today, but the exploration course of Ant Financial will definitely give practitioners food for thought.
  • Retweeting Through the Great Firewall a Persistent and Undeterred Threat Actor

    Retweeting Through the Great Firewall a Persistent and Undeterred Threat Actor

    Retweeting through the great firewall A persistent and undeterred threat actor Dr Jake Wallis, Tom Uren, Elise Thomas, Albert Zhang, Dr Samantha Hoffman, Lin Li, Alex Pascoe and Danielle Cave Policy Brief Report No. 33/2020 About the authors Dr Jacob Wallis is a Senior Analyst working with the International Cyber Policy Centre. Tom Uren is a Senior Analyst working with the International Cyber Policy Centre. Elise Thomas is a Researcher working with the International Cyber Policy Centre. Albert Zhang is a Research Intern working with the International Cyber Policy Centre. Dr Samanthan Hoffman is an Analyst working with the International Cyber Policy Centre. Lin Li is a Researcher working with the International Cyber Policy Centre. Alex Pascoe is a Research Intern working with the International Cyber Policy Centre. Danielle Cave is Deputy Director of the International Cyber Policy Centre. Acknowledgements ASPI would like to thank Twitter for advanced access to the takedown dataset that formed a significant component of this investigation. The authors would also like to thank ASPI colleagues who worked on this report. What is ASPI? The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI International Cyber Policy Centre ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy.
  • Xi Jinping's Address to the Central Conference On

    Xi Jinping's Address to the Central Conference On

    Xi Jinping’s Address to the Central Conference on Work Relating to Foreign Affairs: Assessing and Advancing Major- Power Diplomacy with Chinese Characteristics Michael D. Swaine* Xi Jinping’s speech before the Central Conference on Work Relating to Foreign Affairs—held November 28–29, 2014, in Beijing—marks the most comprehensive expression yet of the current Chinese leadership’s more activist and security-oriented approach to PRC diplomacy. Through this speech and others, Xi has taken many long-standing Chinese assessments of the international and regional order, as well as the increased influence on and exposure of China to that order, and redefined and expanded the function of Chinese diplomacy. Xi, along with many authoritative and non-authoritative Chinese observers, presents diplomacy as an instrument for the effective application of Chinese power in support of an ambitious, long-term, and more strategic foreign policy agenda. Ultimately, this suggests that Beijing will increasingly attempt to alter some of the foreign policy processes and power relationships that have defined the political, military, and economic environment in the Asia- Pacific region. How the United States chooses to respond to this challenge will determine the Asian strategic landscape for decades to come. On November 28 and 29, 2014, the Central Chinese Communist Party (CCP) leadership convened its fourth Central Conference on Work Relating to Foreign Affairs (中央外事工作会)—the first since August 2006.1 The meeting, presided over by Premier Li Keqiang, included the entire Politburo Standing Committee, an unprecedented number of central and local Chinese civilian and military officials, nearly every Chinese ambassador and consul-general with ambassadorial rank posted overseas, and commissioners of the Foreign Ministry to the Hong Kong Special Administrative Region and the Macao Special Administrative Region.
  • The Limits of Commercialized Censorship in China

    The Limits of Commercialized Censorship in China

    The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship.
  • Security Analytics for Enterprise Threat Detection

    Security Analytics for Enterprise Threat Detection

    MADE: Security Analytics for Enterprise Threat Detection Alina Oprea Zhou Li Northeastern University University of California, Irvine [email protected] [email protected] Robin Norris Kevin Bowers EMC/Dell CIRC RSA [email protected] [email protected] ABSTRACT These concerns affect not only individuals, but enterprises as well. Enterprises are targeted by various malware activities at a staggering The enterprise perimeter is only as strong as its weakest link and rate. To counteract the increased sophistication of cyber attacks, that boundary is becoming increasingly fuzzy with the prevalence most enterprises deploy within their perimeter a number of secu- of remote workers using company-issued computers on networks rity technologies, including firewalls, anti-virus software, and web outside of the enterprise control. Enterprises attempt to combat cyber proxies, as well as specialized teams of security analysts forming attacks by deploying firewalls, anti-virus agents, web proxies and Security Operations Centers (SOCs). other security technologies, but these solutions cannot detect or In this paper we address the problem of detecting malicious ac- respond to all malware. Large organizations employ “hunters” or tivity in enterprise networks and prioritizing the detected activities tier 3 analysts (part of the enterprise Security Operations Center – according to their risk. We design a system called MADE using ma- SOC) [44] to search for malicious behavior that has evaded their chine learning applied to data extracted from security logs. MADE automated tools. Unfortunately, this solution is not scalable, both due leverages an extensive set of features for enterprise malicious com- to the lack of qualified people and the rate at which such malware is munication and uses supervised learning in a novel way for prior- invading the enterprise.
  • Operation Black Atlas

    Operation Black Atlas

    A TrendLabs Report Operation Black Atlas How Modular Botnets are Used in PoS Attacks TrendLabs Security Intelligence Blog Jay Yaneza and Erika Mendoza Trend Micro Cyber Safety Solutions Team December 2015 Trend Micro | Operation Black Atlas: How Modular Botnets are Used in Attacks Contents Introduction ............................................................................................................ 3 Technical Details ................................................................................................... 3 Probing and Penetrating the Environment ......................................................... 3 Point-of-Sale Threats ......................................................................................... 5 New Items in NewPosThings ............................................................................. 7 Use of Known PoS Malware Threats ............................................................... 10 Gorynych or Diamond Fox ............................................................................... 13 Spy Net RAT .................................................................................................... 20 Victimology .......................................................................................................... 21 Attribution ............................................................................................................ 23 Conclusion ........................................................................................................... 25 TREND MICRO LEGAL
  • Spring 2011 Cover Thru Page 11.Indd

    Spring 2011 Cover Thru Page 11.Indd

    ANGEL TALES MAGAZINE Spring/Summer 2011 Annual Report The Beck Family and the Launch of the GusMobile Spay/Neuter Van National Impact Rejuvenation Tips PAWS Chicago’s No Kill model spreading across for Older Pets the country www.pawschicago.org Spring 2011 cover thru page 11.indd 1 5/24/11 9:42:30 AM PAWS Chicago Dottie Cross Leaves a Legacy for Guardian ngel the Animals AProgram In 2004, Dottie Cross retired to pursue her dream of living on the road with her beloved rescue dogs – Biscuit, Jenny and Gus. Combining her interests as an adventurer and an animal lover, Dottie now spends her time rock climbing and educating people in Mexico on how to care for their pets in an effort to reduce the number of stray dogs living on the streets. However, while caring for other’s animals, a sudden accident put the future of her own dogs in perspective. “Knowing that my dogs will be loved and cared for after my death is a wonderful feeling.” Last year, Dottie fell while rock climbing and shattered her leg. As a single woman, she was concerned that, had she died, her dogs would be put down without having a plan in place for their care. Through the PAWS Chicago Guardian Angel program, Dottie has While in the process of updating her ensured the futures of Biscuit (5, Mix Breed), Jenny (3, Beagle Mix) trust, Dottie read about PAWS Chicago’s and Gus (3, Pit Bull Mix), should she be unable to care for them. Guardian Angel program and chose to make a planned gift that would enable her to provide shelter, food, veterinary care, medicines and loving new homes for countless animals long after she was gone.