China's Propaganda and Influence Operations, Its Intelligence Activities That Target the United States, and the Resulting Impacts on U.S

Total Page:16

File Type:pdf, Size:1020Kb

China's Propaganda and Influence Operations, Its Intelligence Activities That Target the United States, and the Resulting Impacts on U.S CHINA’S PROPAGANDA AND INFLUENCE OPERATIONS, ITS INTELLIGENCE ACTIVITIES THAT TARGET THE UNITED STATES, AND THE RESULTING IMPACTS ON U.S. NATIONAL SECURITY HEARING BEFORE THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED ELEVENTH CONGRESS FIRST SESSION _________ APRIL 30, 2009 _________ Printed for use of the United States-China Economic and Security Review Commission Available via the World Wide Web: www.uscc.gov UNITED STATES-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION WASHINGTON : JUNE 2009 U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION CAROLYN BARTHOLOMEW, Chairman LARRY M.WORTZEL, Vice Chairman Commissioners: PETER T.R. BROOKES Hon. WILLIAM A. REINSCH DANIEL BLUMENTHAL DENNIS C. SHEA ROBIN CLEVELAND DANIEL M. SLANE JEFFREY FIEDLER PETER VIDENIEKS Hon. PATRICK A. MULLOY MICHAEL R. WESSEL T. SCOTT BUNTON, Executive Director KATHLEEN J. MICHELS, Associate Director The Commission was created on October 30, 2000 by the Floyd D. Spence National Defense Authorization Act for 2001 § 1238, Public Law No. 106-398, 114 STAT. 1654A-334 (2000) (codified at 22 U.S.C.§ 7002 (2001), as amended by the Treasury and General Government Appropriations Act for 2002 § 645 (regarding employment status of staff) & § 648 (regarding changing annual report due date from March to June), Public Law No. 107-67, 115 STAT. 514 (Nov. 12, 2001); as amended by Division P of the "Consolidated Appropriations Resolution, 2003," Pub L. No. 108-7 (Feb. 20, 2003) (regarding Commission name change, terms of Commissioners, and responsibilities of Commission); as amended by Public Law No. 109-108 (H.R. 2862) (Nov. 22, 2005) (regarding responsibilities of Commission and applicability of FACA); as amended by Division J of the “Consolidated Appropriations Act, 2008, “Public Law No. 110-161 (December 26, 2007) (regarding responsibilities of the Commission, and changing the Annual Report due date from June to December). The Commission’s full charter is available at www.uscc.gov. ii May 26, 2009 The Honorable ROBERT C. BYRD President Pro Tempore of the Senate, Washington, D.C. 20510 The Honorable NANCY PELOSI Speaker of the House of Representatives, Washington, D.C. 20515 DEAR SENATOR BYRD AND SPEAKER PELOSI: We are pleased to transmit the record of our April 30, 2009 public hearing on “China’s Propaganda and Influence Operations, Its Intelligence Activities that Target the United States, and the Resulting Impacts on U.S. National Security.” The Floyd D. Spence National Defense Authorization Act (amended by Pub. L. No. 109-108, section 635(a)) provides the basis for this hearing, stating that the Commission shall examine “…the triangular economic and security relationship among the United States, Taipei and the People's Republic of China,” as well as “…the implications of restrictions on speech and access to information in the People's Republic of China for its relations with the United States in the areas of economic and security policy.” The first panel of the day examined the Chinese government’s propaganda directed to foreign audiences, and the extent to which this might affect U.S.-China relations. Dr. Nicholas J. Cull, professor of public diplomacy at the University of Southern California, opened the panel with a discussion of China’s public diplomacy, which he defined as “the process by which an international actor conducts foreign policy by engaging a foreign public.” He identified five components in this process: listening, advocacy, cultural diplomacy, exchange diplomacy, and international broadcasting, and maintained that the People’s Republic of China (PRC) engages actively in all of them. He also described an effort by the PRC to “buy friends” by cultivating influential figures in developing countries, and advised that such efforts could be successful in displacing western influence and values throughout much of the world. In response, he advocated renewed efforts for U.S. public diplomacy, particularly through the expansion or revival of U.S.-supported news broadcasting. Next, Dr. Judy Polumbaum, professor of journalism and mass communications at the University of Iowa, focused on the role of journalists within China’s state-controlled media system. She emphasized that China’s media system is not monolithic, and that different institutional actors may have differing outlooks and interests. She also stated that China’s reported plan to expand English- language media outlets does not necessarily represent a systematic effort to enhance the PRC’s foreign propaganda, but might be explained at least in part as bureaucratic “empire building” by actors such as the Xinhua state news agency. Finally, Dr. Anne-Marie Brady, associate professor of political science at the University of Canterbury, New Zealand, discussed the Chinese Communist Party (CCP)’s efforts to take a less visible hand in direction of the state media—to employ “management” rather than “control”— and to make its propaganda more convincing and effective through the adoption of western practices. Despite this seemingly softer touch, Dr. Brady emphasized the continuing critical importance of propaganda as the “life blood of the Party” and its effort iii to maintain itself in power. Witnesses in the second panel examined ways in which the Chinese government has allegedly sought to levy influence over U.S. institutions. Dr. Ross Terrill, associate in research with the John K. Fairbank Center for Chinese Studies at Harvard University, testified about PRC efforts to influence the writings of U.S. opinion-makers such as academics and think tank researchers. He described both coercive steps, such as the denial of visas to writers who angered the Chinese government, as well as more subtle efforts to co-opt scholars and institutions through financial donations made by parties friendly to Beijing’s views. In response, he recommended that the United States resist such efforts to “pick winners and losers” among academics who study China. Following these remarks, Dr. Eric Anderson, analyst with Science Applications International Corporation, described in his testimony alleged efforts by the PRC to gain leverage over U.S. policy through state-backed investments in the U.S. financial sector. Dr. Anderson concluded that no signs of such efforts could be found, and that Chinese investments were benign actions undertaken in the expectation of profitable returns. The last speaker of the panel, Dr. Jacqueline Newmyer, President and CEO of the Long-Term Strategy Project, analyzed alleged PRC efforts to influence U.S. institutions within the broader context of PRC foreign policy strategy. In her testimony, she described an active and coordinated effort by the PRC authorities to manipulate foreign perceptions of China’s rise and future course, supporting this assertion with quotations from internal, restricted- distribution CCP publications. As cited by Dr. Newmyer, these documents called for the use of “public relations weapons”—such as the cultivation of prominent people and media outlets in other countries—to create a benign and reassuring image of China. The third panel discussed the extent of Chinese espionage directed against the United States. Drawing upon 25 years of service with the FBI, Mr. I.C. Smith, a former special agent with the Federal Bureau of Investigation, observed that the PRC views the United States as its “number one adversary,” and he also directly stated his opinion that the PRC represented the “number one threat to the United States.” He described the Chinese model of espionage as relying heavily on seeking to recruit or intimidate Americans of Chinese heritage into performing tasks on behalf of the Chinese government. He also noted the decentralized and frequently amateur nature of Chinese intelligence gathering, particularly as it pertains to the acquisition of technology. Mr. Smith warned that the large numbers of Chinese students entering the United States would include many students either encouraged or intimidated by the government into seeking out technological acquisitions on behalf of the PRC. He advised “stricter reciprocity in dealing with the PRC,” to include possibly cutting the number of visas granted to Chinese students. Dr. James Mulvenon, director of the Center for Intelligence Research and Analysis, Defense Group, Incorporated, focused his remarks on economic espionage carried out by “espionage entrepreneurs” who did not possess any formal intelligence training. He identified the PRC as the largest perpetrator of economic espionage against the United States, and described extensive “mom and pop” operations directed at acquiring technology through “secondary market distributors,” as well as via exports that involved the obfuscation of end users. By way of response, he advised that the United States apply a means-ends test in order to best focus on items that the Chinese iv seek to acquire in order to fill gaps in their military capabilities, and to work more closely with the Hong Kong authorities to block transshipments of dual-use technology. The hearing’s final panel examined Chinese cyber espionage directed against the United States. In his testimony, Mr. Kevin Coleman, senior fellow with the Technolytics Institute, assessed that “we are in the early stages of a cyber arms race,” and presented a stern warning that the United States is not adequately prepared for the level of cyber threat that it currently faces. He opined that China, in particular, was the source of four times as many cyber attacks against U.S. targets as any other country. Next, Mr. Rafal Rohozinski, principal with the SecDev Group of Ottawa, Canada, described his recent research analyzing a cyber-espionage network called “Ghost Net” that had infected over 1,200 computers of government and other political entities in 103 different countries. His organization traced the control servers for this network back to China; and while he could not conclusively prove PRC government involvement, he opined that aspects of Ghost Net’s activities showed signs of consciously directed intelligence collection whose effective exploitation would require resources beyond that of a private actor. However, Mr.
Recommended publications
  • Internet Surveillance in China
    The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks.
    [Show full text]
  • Who Set the Narrative? Assessing the Influence of Chinese Media in News Coverage of COVID-19 in 30 African Countries the Size Of
    Who Set the Narrative? Assessing the Influence of Chinese Media in News Coverage of COVID-19 in 30 African Countries The size of China’s State-owned media’s operations in Africa has grown significantly since the early 2000s. Previous research on the impact of increased Sino-African mediated engagements has been inconclusive. Some researchers hold that public opinion towards China in African nations has been improving because of the increased media presence. Others argue that the impact is rather limited, particularly when it comes to affecting how African media cover China- related stories. This paper seeks to contribute to this debate by exploring the extent to which news media in 30 African countries relied on Chinese news sources to cover China and the COVID-19 outbreak during the first half of 2020. By computationally analyzing a corpus of 500,000 news stories, I show that, compared to other major global players (e.g. Reuters, AFP), content distributed by Chinese media (e.g. Xinhua, China Daily, People’s Daily) is much less likely to be used by African news organizations, both in English and French speaking countries. The analysis also reveals a gap in the prevailing themes in Chinese and African media’s coverage of the pandemic. The implications of these findings for the sub-field of Sino-African media relations, and the study of global news flows is discussed. Keywords: China-Africa, Xinhua, news agencies, computational text analysis, big data, intermedia agenda setting Beginning in the mid-2010s, Chinese media began to substantially increase their presence in many African countries, as part of China’s ambitious going out strategy that covered a myriad of economic activities, including entertainment, telecommunications and news content (Keane, 2016).
    [Show full text]
  • China As a Hybrid Influencer: Non-State Actors As State Proxies COI HYBRID INFLUENCE COI
    Hybrid CoE Research Report 1 JUNE 2021 China as a hybrid influencer: Non-state actors as state proxies COI HYBRID INFLUENCE COI JUKKA AUKIA Hybrid CoE Hybrid CoE Research Report 1 China as a hybrid influencer: Non-state actors as state proxies JUKKA AUKIA 3 Hybrid CoE Research Reports are thorough, in-depth studies providing a deep understanding of hybrid threats and phenomena relating to them. Research Reports build on an original idea and follow academic research report standards, presenting new research findings. They provide either policy-relevant recommendations or practical conclusions. COI Hybrid Influence looks at how state and non-state actors conduct influence activities targeted at Participating States and institutions, as part of a hybrid campaign, and how hostile state actors use their influence tools in ways that attempt to sow instability, or curtail the sovereignty of other nations and the independence of institutions. The focus is on the behaviours, activities, and tools that a hostile actor can use. The goal is to equip practitioners with the tools they need to respond to and deter hybrid threats. COI HI is led by the UK. The European Centre of Excellence for Countering Hybrid Threats tel. +358 400 253 800 www.hybridcoe.fi ISBN (web) 978-952-7282-78-6 ISBN (print) 978-952-7282-79-3 ISSN 2737-0860 June 2021 Hybrid CoE is an international hub for practitioners and experts, building Participating States’ and institutions’ capabilities and enhancing EU-NATO cooperation in countering hybrid threats, located in Helsinki, Finland. The responsibility for the views expressed ultimately rests with the authors.
    [Show full text]
  • Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest
    Internet Freedom in China: U.S. Government Activity, Private Sector Initiatives, and Issues of Congressional Interest Patricia Moloney Figliola Specialist in Internet and Telecommunications Policy May 18, 2018 Congressional Research Service 7-5700 www.crs.gov R45200 Internet Freedom in China: U.S. Government and Private Sector Activity Summary By the end of 2017, the People’s Republic of China (PRC) had the world’s largest number of internet users, estimated at over 750 million people. At the same time, the country has one of the most sophisticated and aggressive internet censorship and control regimes in the world. PRC officials have argued that internet controls are necessary for social stability, and intended to protect and strengthen Chinese culture. However, in its 2017 Annual Report, Reporters Without Borders (Reporters Sans Frontières, RSF) called China the “world’s biggest prison for journalists” and warned that the country “continues to improve its arsenal of measures for persecuting journalists and bloggers.” China ranks 176th out of 180 countries in RSF’s 2017 World Press Freedom Index, surpassed only by Turkmenistan, Eritrea, and North Korea in the lack of press freedom. At the end of 2017, RSF asserted that China was holding 52 journalists and bloggers in prison. The PRC government employs a variety of methods to control online content and expression, including website blocking and keyword filtering; regulating and monitoring internet service providers; censoring social media; and arresting “cyber dissidents” and bloggers who broach sensitive social or political issues. The government also monitors the popular mobile app WeChat. WeChat began as a secure messaging app, similar to WhatsApp, but it is now used for much more than just messaging and calling, such as mobile payments, and all the data shared through the app is also shared with the Chinese government.
    [Show full text]
  • Retweeting Through the Great Firewall a Persistent and Undeterred Threat Actor
    Retweeting through the great firewall A persistent and undeterred threat actor Dr Jake Wallis, Tom Uren, Elise Thomas, Albert Zhang, Dr Samantha Hoffman, Lin Li, Alex Pascoe and Danielle Cave Policy Brief Report No. 33/2020 About the authors Dr Jacob Wallis is a Senior Analyst working with the International Cyber Policy Centre. Tom Uren is a Senior Analyst working with the International Cyber Policy Centre. Elise Thomas is a Researcher working with the International Cyber Policy Centre. Albert Zhang is a Research Intern working with the International Cyber Policy Centre. Dr Samanthan Hoffman is an Analyst working with the International Cyber Policy Centre. Lin Li is a Researcher working with the International Cyber Policy Centre. Alex Pascoe is a Research Intern working with the International Cyber Policy Centre. Danielle Cave is Deputy Director of the International Cyber Policy Centre. Acknowledgements ASPI would like to thank Twitter for advanced access to the takedown dataset that formed a significant component of this investigation. The authors would also like to thank ASPI colleagues who worked on this report. What is ASPI? The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI International Cyber Policy Centre ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy.
    [Show full text]
  • Xi Jinping's Address to the Central Conference On
    Xi Jinping’s Address to the Central Conference on Work Relating to Foreign Affairs: Assessing and Advancing Major- Power Diplomacy with Chinese Characteristics Michael D. Swaine* Xi Jinping’s speech before the Central Conference on Work Relating to Foreign Affairs—held November 28–29, 2014, in Beijing—marks the most comprehensive expression yet of the current Chinese leadership’s more activist and security-oriented approach to PRC diplomacy. Through this speech and others, Xi has taken many long-standing Chinese assessments of the international and regional order, as well as the increased influence on and exposure of China to that order, and redefined and expanded the function of Chinese diplomacy. Xi, along with many authoritative and non-authoritative Chinese observers, presents diplomacy as an instrument for the effective application of Chinese power in support of an ambitious, long-term, and more strategic foreign policy agenda. Ultimately, this suggests that Beijing will increasingly attempt to alter some of the foreign policy processes and power relationships that have defined the political, military, and economic environment in the Asia- Pacific region. How the United States chooses to respond to this challenge will determine the Asian strategic landscape for decades to come. On November 28 and 29, 2014, the Central Chinese Communist Party (CCP) leadership convened its fourth Central Conference on Work Relating to Foreign Affairs (中央外事工作会)—the first since August 2006.1 The meeting, presided over by Premier Li Keqiang, included the entire Politburo Standing Committee, an unprecedented number of central and local Chinese civilian and military officials, nearly every Chinese ambassador and consul-general with ambassadorial rank posted overseas, and commissioners of the Foreign Ministry to the Hong Kong Special Administrative Region and the Macao Special Administrative Region.
    [Show full text]
  • The Limits of Commercialized Censorship in China
    The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship.
    [Show full text]
  • The Future of Internet Governance: Should the United States Relinquish Its Authority Over ICANN?
    The Future of Internet Governance: Should the United States Relinquish Its Authority over ICANN? Lennard G. Kruger Specialist in Science and Technology Policy September 1, 2016 Congressional Research Service 7-5700 www.crs.gov R44022 The Future of Internet Governance: Should the U.S. Relinquish Its Authority over ICANN Summary Currently, the U.S. government retains limited authority over the Internet’s domain name system, primarily through the Internet Assigned Numbers Authority (IANA) functions contract between the National Telecommunications and Information Administration (NTIA) and the Internet Corporation for Assigned Names and Numbers (ICANN). By virtue of the IANA functions contract, the NTIA exerts a legacy authority and stewardship over ICANN, and arguably has more influence over ICANN and the domain name system (DNS) than other national governments. Currently the IANA functions contract with NTIA expires on September 30, 2016. However, NTIA has the flexibility to extend the contract for any period through September 2019. On March 14, 2014, NTIA announced the intention to transition its stewardship role and procedural authority over key Internet domain name functions to the global Internet multistakeholder community. To accomplish this transition, NTIA asked ICANN to convene interested global Internet stakeholders to develop a transition proposal. NTIA stated that it would not accept any transition proposal that would replace the NTIA role with a government-led or an intergovernmental organization solution. For two years, Internet stakeholders were engaged in a process to develop a transition proposal that will meet NTIA’s criteria. On March 10, 2016, the ICANN Board formally accepted the multistakeholder community’s transition plan and transmitted that plan to NTIA for approval.
    [Show full text]
  • The Pulitzer Prizes 2020 Winne
    WINNERS AND FINALISTS 1917 TO PRESENT TABLE OF CONTENTS Excerpts from the Plan of Award ..............................................................2 PULITZER PRIZES IN JOURNALISM Public Service ...........................................................................................6 Reporting ...............................................................................................24 Local Reporting .....................................................................................27 Local Reporting, Edition Time ..............................................................32 Local General or Spot News Reporting ..................................................33 General News Reporting ........................................................................36 Spot News Reporting ............................................................................38 Breaking News Reporting .....................................................................39 Local Reporting, No Edition Time .......................................................45 Local Investigative or Specialized Reporting .........................................47 Investigative Reporting ..........................................................................50 Explanatory Journalism .........................................................................61 Explanatory Reporting ...........................................................................64 Specialized Reporting .............................................................................70
    [Show full text]
  • The Regional Internet Registry System Leslie Nobile
    “How It Works” The Regional Internet Registry System Leslie Nobile v Overview • The Regional Internet Registry System • Internet Number Resource Primer: IPv4, IPv6 and ASNs • Significant happenings at the RIR • IPv4 Depletion and IPv6 Transition • IPv4 transfer market • Increase in fraudulent activity • RIR Tools, technologies, etc. 2 The Regional Internet Registry System 3 Brief History Internet Number Resource Administration • 1980s to 1990s • Administration of names, numbers, and protocols contracted by US DoD to ISI/Jon Postel (eventually called IANA) • Registration/support of this function contracted to SRI International and then to Network Solutions • Regionalization begins - Regional Internet Registry system Jon Postel forms • IP number resource administration split off from domain name administration • US Govt separates administration of commercial Internet (InterNIC) from the military Internet (DDN NIC) 4 What is an RIR? A Regional Internet Registry (RIR) manages the allocation and registration of Internet number resources in a particular region of the world and maintains a unique registry of all IP numbers issued. *Number resources include IP addresses (IPv4 and IPv6) and autonomous system (AS) numbers 5 Who Are the RIRs? 6 Core Functions of an RIR Manage, distribute -Maintain directory -Support Internet and register Internet services including infrastructure through Number Resources Whois and routing technical coordination (IPv4 & IPv6 registries addresses and Autonomous System -Facilitate community numbers (ASNs) -Provide
    [Show full text]
  • Congressional-Executive Commission on China Annual
    CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA ANNUAL REPORT 2016 ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION OCTOBER 6, 2016 Printed for the use of the Congressional-Executive Commission on China ( Available via the World Wide Web: http://www.cecc.gov U.S. GOVERNMENT PUBLISHING OFFICE 21–471 PDF WASHINGTON : 2016 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Mar 15 2010 19:58 Oct 05, 2016 Jkt 000000 PO 00000 Frm 00003 Fmt 5011 Sfmt 5011 U:\DOCS\AR16 NEW\21471.TXT DEIDRE CONGRESSIONAL-EXECUTIVE COMMISSION ON CHINA LEGISLATIVE BRANCH COMMISSIONERS House Senate CHRISTOPHER H. SMITH, New Jersey, MARCO RUBIO, Florida, Cochairman Chairman JAMES LANKFORD, Oklahoma ROBERT PITTENGER, North Carolina TOM COTTON, Arkansas TRENT FRANKS, Arizona STEVE DAINES, Montana RANDY HULTGREN, Illinois BEN SASSE, Nebraska DIANE BLACK, Tennessee DIANNE FEINSTEIN, California TIMOTHY J. WALZ, Minnesota JEFF MERKLEY, Oregon MARCY KAPTUR, Ohio GARY PETERS, Michigan MICHAEL M. HONDA, California TED LIEU, California EXECUTIVE BRANCH COMMISSIONERS CHRISTOPHER P. LU, Department of Labor SARAH SEWALL, Department of State DANIEL R. RUSSEL, Department of State TOM MALINOWSKI, Department of State PAUL B. PROTIC, Staff Director ELYSE B. ANDERSON, Deputy Staff Director (II) VerDate Mar 15 2010 19:58 Oct 05, 2016 Jkt 000000 PO 00000 Frm 00004 Fmt 0486 Sfmt 0486 U:\DOCS\AR16 NEW\21471.TXT DEIDRE C O N T E N T S Page I. Executive Summary ............................................................................................. 1 Introduction ...................................................................................................... 1 Overview ............................................................................................................ 5 Recommendations to Congress and the Administration ..............................
    [Show full text]
  • Institution-Based Barriers to Innovation in Smes in China
    Asia Pac J Manag DOI 10.1007/s10490-011-9263-7 Institution-based barriers to innovation in SMEs in China Yanmei Zhu & Xinhua Wittmann & Mike W. Peng # Springer Science+Business Media, LLC 2011 Abstract Despite significant development, small and medium-sized enterprises (SMEs) in China continue to experience institution-based barriers, especially in the area of innovation. What exactly are these barriers? How do these barriers influence innovation? How about the status quo of the institutional environment for SMEs’ innovation and development? We seek to uncover these underexplored areas by developing a model characterized by a cost-risk-opportunity (CRO) innovation triangle. Wethen enrich this model by interviewing 82 top managers and owners at 41 SMEs. We identify the five key institution-based barriers to innovation in China: (1) competition fairness, (2) access to financing, (3) laws and regulations, (4) tax burden, and (5) support systems. These findings enhance the institution-based view of entrepreneurship by shedding light on how institution-based barriers affect innovation in SMEs. Keywords Small and medium-sized enterprise (SME) . Innovation . Institution . Policy. China There is hardly any debate on a key proposition in the institution-based view of entrepreneurship: institutions matter (North, 1990). Specifically, “managers and firms We thank Garry Bruton, Shulin Gu, Steve Sauerwald, and Steven Si for helpful comments. An earlier version was accepted for presentation at the Academy of International Business, Nagoya, Japan, June 2011 and the IACMR Conference, Shanghai, China, June 2010. We thank Jihong Sanderson who interviewed managers at over 20 enterprises together with the first author in Shanghai and Shenzhen and composed the report in Chinese for the 2009 Pujiang Innovation Forum.
    [Show full text]