{"id":24244,"date":"2026-05-10T15:31:09","date_gmt":"2026-05-10T19:31:09","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/?page_id=24244"},"modified":"2026-05-10T15:31:09","modified_gmt":"2026-05-10T19:31:09","slug":"the-national-security-internet","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/in-print\/volume-114\/volume-114-issue-3-february-2026\/the-national-security-internet\/","title":{"rendered":"The National Security Internet"},"content":{"rendered":"<p class=\"p1\"><i>In response to widespread foreign surveillance and growing geopoliti<\/i><i>cal distrust, governments are erecting a national security internet. <\/i><i>Pioneered by <\/i><i>China, national firewalls have gone global. But where fire<\/i><i>walls sought to keep information out, they now seek to keep data in. <\/i><i>Governments keen to avoid their citizens\u2019 data from falling into foreign <\/i><i>hands demand not only that personal data be stored on local servers, but <\/i><i>also require that it be stored on local servers by local companies<\/i><span class=\"s1\">\u2014<\/span><i>what <\/i><i>this Article calls <\/i><span class=\"s1\">\u201c<\/span><i>data localization squared.<\/i><span class=\"s1\">\u201d <\/span><i>Enforcing this demand <\/i><i>requires a new mechanism of transnational control: immunity from foreign <\/i><i>jurisdiction. Artificial Intelligence (AI) systems, too, now need licenses for <\/i><i>export. We are witnessing the creation of Digital Berlin Walls, complete <\/i><i>with Checkpoint Charlies to permit border crossings.<\/i><\/p>\n<p class=\"p1\"><i>The ascent of digital border controls in the name of national security <\/i><i>treats a domain of speech and commerce according to the rules of war. <\/i><i>This Article traces this turn through six case studies: TikTok, the United <\/i><i>States <\/i><span class=\"s1\">\u201c<\/span><i>rip and replace<\/i><span class=\"s1\">\u201d <\/span><i>program, the Chinese <\/i><span class=\"s1\">\u201c<\/span><i>Delete America<\/i><span class=\"s1\">\u201d <\/span><i>program, <\/i><i>Microsoft 365, connected cars, and AI models. The TikTok saga is but the <\/i><i>visible edge of a broad reconfiguration of international economic relations <\/i><i>largely occurring through obscure administrative processes. Existing schol<\/i><i>arship <\/i><i>has <\/i><i>recognized various aspects of this national security turn; this <\/i><i>Article weaves <\/i><i>together regulatory moves from TikTok to cars, from the <\/i><i>United States to China, to identify a paradigm shift in digital regulation.<\/i><\/p>\n<p class=\"p1\"><i>The Article argues that the national security internet will come at a <\/i><i>steep price, disrupting trade and investment, reducing competition, invit<\/i><i>ing <\/i><i>retaliation, <\/i><i>increasing government control over speech, and <\/i><i>under<\/i><i>mining efforts to stem climate change and promote development, while <\/i><i>offering easily circumvented protection against foreign surveillance. The <\/i><i>Article introduces a typology of corporate strategies to satisfy national <\/i><i>security demands and assesses their limitations. The Article proposes <\/i><i>reforms that constrain foreign surveillance in order to protect both civil <\/i><i>rights and national security.<\/i><\/p>\n<p>Continue reading <a href=\"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-content\/uploads\/sites\/26\/2026\/05\/Chander_The-National-Security-Internet.pdf\"><strong><em>The National Security Internet<\/em><\/strong><\/a><em>.<\/em><\/p>\n<a href=\"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-content\/uploads\/sites\/26\/2026\/05\/Chander_The-National-Security-Internet.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Chander_The-National-Security-Internet<\/a>\n","protected":false},"excerpt":{"rendered":"<p>In response to widespread foreign surveillance and growing geopolitical distrust, governments are erecting a national security internet. Pioneered by China, national firewalls have gone global. But where firewalls sought to [&hellip;]<\/p>\n","protected":false},"author":13871,"featured_media":0,"parent":24239,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"abstract.php","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-24244","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/24244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/users\/13871"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/comments?post=24244"}],"version-history":[{"count":1,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/24244\/revisions"}],"predecessor-version":[{"id":24245,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/24244\/revisions\/24245"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/pages\/24239"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/georgetown-law-journal\/wp-json\/wp\/v2\/media?parent=24244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}