1 Introduction

The exponential growth of emerging technologies (ETs),Footnote 1 including 5G networks, Big Data, quantum computing, and artificial intelligence (AI), demands a reassessment of the role of technology in international affairs and its impact on the international system. Control over ETs is no longer limited to the private sector, having become “the new strategic national security fulcrum of the 21 century” (You 2021). This heightened sensitivity toward ETs arises chiefly from the unpredictable implications these technologies pose for national security, as well as their potential impact on shifting the Balance of Power due to the economic and military advantages they confer (Steff et al. 2020). And while ETs on the whole have been viewed as potential game changers in military and strategic affairs, resulting in a securitization of the high-tech sector (Sechser et al. 2019; Huang and Mayer 2023), special attention has increasingly been paid to China’s technological advancements and assertive technology policy through such initiatives as Made in China 2025, Next Generation Artificial Intelligence Development, and Digital Silk Road Project (under the Belt and Road Initiative).Footnote 2

Assessed alongside their international economic, geopolitical and military developments, and despite their limitations, China’s technological advancements have led to a widely circulated assumption that China is seeking to challenge the United States’ (US) global primacy (Allisson 2017; Eslami et al. 2023; Heath et al. 2021). As a result, China has been viewed as a strategic competitor of the US and a growing threat (in US and other countries),Footnote 3 a notion that proliferated under the TrumpFootnote 4 administration, with its emphasis on decoupling in the technological domain, and has continued during the Biden administration.Footnote 5 The resulting heightened competition, reflected in the new “Tech Cold War” (Bremmer and Kupchan 2018; Culpan 2019; Wu et al. 2019) and “AI Arms Race” debates (Pecotic 2019; Scharre 2019), has characterized the relationship between China and the US ever since.

China’s advancements in the domain of ETs could conceivably equate to the acquisition of new capabilities, thereby inducing threat perceptions among other global actors. This corresponds to the realist perspective of international affairs: the US views its hegemony as increasingly challenged vis-à-vis a rising China that could adopt an ambitious strategy with escalating demands, thereby threatening a declining state’s vital interests and raising the potential for conflict (Mearsheimer 2015; Shifrinson 2018). The designation of China’s ET advancements as a threat, and their implications, deserves systematic academic engagement and theory-informed analysis. Two issues that remain unanswered in spite of the dynamically growing research field of ET studies are: What constitutes a threat in the context of ETs and how does China fit within these criteria? And, once a state is recognized as a threat, how do other states respond? Indeed, one could argue that state behavior and patterns of alignment in ET make an interesting case for thinking through the applicability of various International Relations (IR) theories and reassessing the existing analytical tools.

The state-of-the-art on ETs includes several important contributions, such as exploring the securitization act in the context of US–China overall competition (Moore 2023) from a securitization studies perspective. Given that ETs have been characterized as a critical frontier for national security and development, several scholars have examined how China’s advancements have raised concerns among other countries (Kania 2022), with China perceived as a technological threat and an existential challenge to the Western way of life (Zhang 2021). Others have explored security discourses on critical infrastructure, especially with regard to companies like Huawei or ZTE (Campion 2020), in addition to exploring China’s ascent as a science and technology powerhouse with its growing influence on the global stage (Segal 2019).

While the well-documented competition between the US and China has garnered significant attention (Yilmaz and Sun 2023; Khan 2021), particularly in the realm of ETs (Lee 2024; Christie et al. 2023; Harwit 2023), scholarly works have homed in on specific technological domains (Rim 2023; Wang and Chen 2018; Alderman and Ray 2017). China’s aspirations to dominate information and communications technologies (ICT) and related fields such as AI have further underscored its material capabilities and modernization initiatives (Inkster 2019). Especially relevant to the present research are those studies that have focused on the US and the competition in ETs as a threat to its hegemony (Xin 2021) and assessed the implications of the US–China ET rivalry for the international system (Sun 2019; Montgomery 2017; Wu 2020; Can and Kaplan 2020) by employing the Balance of Power theory and relating the idea of threat to the distribution of power capabilities (Jensen et al. 2020; Horowitz 2018; Haas and Fischer 2020; Fischer and Wenger 2021; Ayoub and Payne 2016; Williams 2019). This is in addition to more recent contributions that have employed the BoT theory to carry out a quantitative assessment of responses to the Huawei ban as indication of response to a threat (Christie et al. 2023). Finally, scholars have explored the stances of other international actors and whether they perceive China as a threat in light of their strategic behavior (Shah 2023; Christie et al. 2023; Saltzman 2023; Papageorgiou and Melo 2022; Can and Kaplan 2020), focusing on US allies in Asia, namely, Australia, Japan, and South Korea as they have navigated expectations of mutual support from Washington in the process of decoupling Chinese technology companies from global supply chains (Lee et al. 2022) while also evaluating how the ET competition has affected alliance dynamics (Payne 2018; Corcoral 2021), the notion of extended deterrence and strategic stability (Mehta 2021). Relatedly, Friis and Lynsle (2021) have distinguished between an approach of “macrosecuritization” of China by the US and a securitization limited to specific domains like 5G technology (termed “niche securitization”).

Aiming to contribute to these dynamically growing research fields, the present paper attempts to address two existing shortcomings. First, existing studies have often explored particular strategic decisions targeting Chinese companies (such as the Huawei bans). Second, the notion of China as a threat was mostly examined by focusing on aggregate power, even though supplemented by the analysis of pre-existing ideas among the US and its allies (Lee 2023), culture, geography (Payne 2018), and the political rhetoric and ideological tensions between China and democratic/pro-Western Asian countries (Salzman 2023; Mascitelli and Chung 2019), including the idea of a potential democratic anti-China coalition amidst the escalating technology race (Grotto and Schallbruch 2019; Scott and Bordelon 2023). A systematic, theory-informed analysis of what constitutes a threat in the context of ETs, especially including an unraveling of its individual components and how China fits these criteria, remains missing. Given the importance of ETs for a new distribution of power in the international system, it seems imperative to turn to theories capable of accounting for the respective dynamics.

We turn to Walt’s Balance of Threat (BoT) theory and adopt the associated quadripartite definition of what constitutes a threat and the proposed responses to it. The BoT theory, with the power distribution in the international system at its core, is especially relevant to the objectives of this paper, aimed toward examining the “game-changing” potential of ETs, while also “understand[ing] a number of events that we cannot explain by focusing solely on the distribution of aggregate capabilities" (Walt 1987, pp. 263–264). In this perspective, China’s growing ET power is a threat that urges states to (re)consider their balancing options. The latter may vary in intensity and assume different manifestations: first, diplomatic and policy coordination among competitors of the threat; second, the adoption of bans and restrictions/export controls aiming to undermine a rival’s power; and third, strategic alignment excluding or targeting the threat and stating a clear objective of targeting its advancements in the ET domain. All the outlined options include accepting and aligning with the recommendations made by the US, particularly those aimed at countering Chinese initiatives in ETs (Christie et al. 2023). We, thus, turn to a Neorealist IR approach, applying it to a recent, multifaceted, and dynamically changing international phenomenon of ETs. The plausibility probe of the BoT theory, a stage of inquiry preliminary to the testing aimed at probing the plausibility of specific hypotheses/assumptions (Eckstein 1975), is carried out by analyzing the available statistical data from different sources, ranging from market shares to budget expenditure, and key strategic decisions, including the export restrictions, bans, and the changing alignment options of Western states, between 2017 and 2023.

We begin by presenting this study’s theoretical framework and demonstrating how the notion of threat in ETs can be approached by considering the BoT theory’s quadripartite approach, while also showing the vanishing relevance of the geographic dimension and laying out state strategies to counter the threat in the form of (external) balancing. We demonstrate China’s growing threat in the ET domain assessed through aggregate power by focusing on AI, quantum computing and Big Data, China’s offensive capabilities (corresponding to the civil-military fusion) and China’s aggressive intentions (reflected in its covert operations). We continue by laying out state strategies to counter the threat in the form of balancing and identify manifestations of balancing behavior as a response to China’s ET threat on the part of Western states between 2017 and 2023. We conclude with the characterization of balancing in the domain of ETs, which resonates with the notion of “gradual balancing,” and outline suggestions for future studies.

2 Balance of Threat Theory and Balancing Behavior in the ET Domain

Threat plays a crucial role in shaping state behavior, according to BoT theory (1987), which considers that a state’s aggregate power (total resources), as well as its geographic proximity, offensive capabilities, and aggressive intentions constitute the elements of threat, without providing guidance on how they are prioritized: “one cannot determine a priori … which sources of threat will be most important in any given case; one can say only that all of them are likely to play a role.” (ibid, p. 26).

Consequently, and first, the states with a significant number of material capabilities, whether in military, economic, land, or population, signal a threat to others and the greater the aggregate power, the greater the threat a state can pose (Walt 1987). Due to their rapid evolution, ETs may extend into areas of especial importance for state survival, including intelligence, warfare, and critical infrastructure protection (Scharre 2023). The evolution of AI, Big Data, quantum computing, and IoT has the potential to rapidly transform the capabilities of nations and introduce new elements of power. The advancement in these ETs can be assessed by diverse indicators that capture their level of development, including its many attributes, expressed, inter alia, in relevant index rankings, number of patents or market share.

The second element of the BoT theory, geographical proximity and geography in general, has been linked with a propensity toward international conflict, particularly between neighboring countries (Bak 2018; Starr 2005; Buzan 1991). According to Walt (1985, p. 10), “the ability to project power declines with distance, states that are nearby pose a greater threat than those that are far away”. The distance that lies between potential competitors limits “the ability to project power” and automatically makes the potential threat less intense (Walt 1987, pp. 21–26). However, in the ET domain, threats are not constrained by geographic boundaries as they originate from anywhere, unimpeded by traditional air, land, or sea defenses. Indeed, ETs such as AI, have become crucial to the control of geographic space and the five dimensions of warfare (land, sea, air, space, and cyber) and their interoperability (Fricke 2020), and it is the transboundary nature of ETs that makes detection and attribution more challenging.

Moreover, and third, states with large offensive capabilities, which refer to their capacity to threaten the sovereignty of other states, pose a greater threat compared to states with primarily defensive capabilities. According to Walt, “offensive power is also closely related but not identical to aggregate power” and corresponds to the ability to “threaten the sovereignty or territorial integrity of another state at an acceptable cost” (1987, p. 24). This element describes the material capabilities that can be used to initiate an attack related to military power. Offensive capabilities in military armament have defined the power competition among states, both in the quantity of armament and in technological advancement. In the ET domain, offensive capabilities can be assessed through military–civil fusion, given its implications for the rate of military technological diffusion and the offense–defense military balance (Lobell 2018). The rates of technological diffusion are associated with important military innovations that reinforce the threatening component of a rival’s power (Can and Vieira 2022; Goldman and Andres 1999; Adams 2003).

The fourth and last element, aggressive intentions, is perceived as more threatening by those seeking to maintain the status quo (Walt 1988). It is based on the notion that “states that are viewed as aggressive are likely to provoke others to balance against them” (Walt 1987, p. 25). As such, “if a state is believed to be unusually aggressive, potential victims will be more willing to use force to reduce its power, to moderate its aggressive aims, or to eliminate it entirely” (Walt 1987, p. 19). Walt considers that “aggressive intentions” are equal to or override capabilities when estimating threats given that “perceptions of intent are likely to play an especially crucial role in alliance choices.” (1987, p. 25).

Aggressive intentions are the most undertheorized element in Walt’s theory and the most difficult to both conceptualize and operationalize—and, arguably, the most important in the constitution of threat. For instance, in AI, malign usage of technology is still a complex phenomenon that might disrupt every walk of life while progression in AI might extend the scale of existing threats, introduce new threats or change typical characteristics of threats in digital, political, and physical security (Brundage et al. 2018). Aggressive intentions focus on perceptions of malevolent intent; in this case, whether the state under suspicion really does have aggressive intentions is irrelevant; what matters is how those intentions are perceived and evaluated by other states. In this regard, in the domain of ETs, covert operations such as cyberattacks, espionage, and misinformation are of special importance as assessments of each state’s intentions and motivations to use ETs. These attacks are not limited to extracting strategic information, including espionage in national defense and military intelligence fields, but also include the use of Internet bots to spread disinformation and influencing information narratives in various aspects of the targeted society. Our take on aggressive intentions sees the use of covert operations to conduct espionage, surveillance, or cyberattacks with the intent to gather sensitive information, undermine security, or disrupt critical infrastructures while AI propaganda and influence operations such as AI-powered algorithms, bots, or deepfakes to spread disinformation, manipulate public opinion, and influence political, social, or economic outcomes in a manner that serves aggressive or destabilizing goals that pose risks to the national security of states (Table 1).

Table 1 Elements of threat in ETs.

2.1 Balancing Behavior in the ET Domain

When faced with a threat, states in an anarchic international system can either balance the threat or bandwagon with the source of the threat. Balancing, also defined as “a countervailing policy designed to improve abilities to prosecute military missions in order to deter and/or defeat another state” (Elman, 2003, p.8), indicating that “alignmentFootnote 6 against the threatening power to deter it from attacking or to defeat it if it does”Footnote 7 (Walt 1988, p. 278). According to BoT theory, both external balancing and bandwagoning rely on alliances, which Walt defines as “formal or informal arrangements of security cooperation between two or more sovereign states” (Walt 1987, p. 1).

Both the BoT and other contributions agree on the different intensity of balancing. According to the former, the intensity of the balancing behavior may depend on the level of threat and the certainty about the identity of the main threat (Walt 1992). Other authors consider balancing as a process (rather than a static equilibrium), associating it with a spectrum of alignment ranging from “hard” treaty-based alliances to “soft” alignments (Selden 2013), while also acknowledging many possible types of balancing (Snyder 1991). Indeed, Walt himself recognizes that “balancing is not an instantaneous or automatic process” (Walt 1992, p. 449), without, however, elaborating on the process through which states counteract threats—in other words, how states establish diverse alliances to manage the challenges they face (He and Feng 2012).

In this vein, Walt’s understanding of balancing against threat may be seen as a progressive trajectory that eventually ends with the Balance of Power in the system. This reasoning allows us to facilitate our understanding of balancing as a gradual process with different intensities and manifestations, which, when analyzed jointly, demonstrate a coordinated balancing behavior. Given that external balancing represents the strategy of seeking allies for the common cause of confronting a shared threat (Abb 2018), or as Waltz (1987, p. 118) describes it, “moves to strengthen and enlarge one’s own alliance or to weaken and shrink an opposing one”, external balancing is, thus, approached as a gradual strengthening process (Ross 2006). By adapting the framework of balancing intensity by Roy (2005) that accounts for different levels of balancing intensity targeted toward the perceived threat, we distinguish between high, moderate, and low balancing as gradual manifestations. Moreover, given that a “state’s balancing strategies are shaped by the level of threat perception regarding a rival” (He 2012, p. 157), the high intensity balancing, associated with a certain and compelling threat, is more openly adversarial, with the political tensions reducing the possibility of cooperation. Conversely, the low intensity balancing, although indicating efforts to coordinate and join forces between the competitors of the threat, does not exclude a potential constructive relationship with the threat in issues of common importance. Indeed, balancing has been acknowledged to take different forms [and measured in a variety of ways including cooperation intensity (Papageorgiou and Vieira 2023; Papageorgiou and Vieira 2021)], with states resorting to tactics beyond military alliances, including military subversion, strategic arms sales, and arms control decisions, as well as sanctions, embargoes, and instances of non-cooperation and institutional constraints (He 2012). Nevertheless, external balancing in the form of alliances constitutes an expectation of mutual support, given that allies support each other “with all sorts of eventualities which cannot at the moment be foreseen” (Snyder 1997, pp. 356–357) including less critical issues such as to “agree on a common policy of joint action with respect to those interests” (Snyder 1997, pp. 356–357).

Thus, to account for external balancing in ETs, we distinguish among its three expressions: diplomatic and policy coordination among the main competitors of threat, bans and restrictions/export controls to undermine the threat’s power, and instances of strategic alignment that excludes the source of the threat aiming to undermine a rival’s power.

The first instance of external balancing behavior corresponds to diplomatic coordination forged to achieve a common approach to ET-related issues (Brattberg 2021). These diplomatic initiatives rely on shared rules, protocols, and behaviors conducive to “a coalition of states that coordinate their actions, to implement a goal” (Goldstein 2020, p. 80) under international policy frameworks. Nevertheless, this policy coordination, initiated due to a threatening actor, constitutes the lowest form of balancing behavior and seeks to avoid raising a counter response while also allowing for maintaining “a constructive relationship with the targeted state” (Roy 2005, p. 306).

Second, we consider the decisions to impose bans and export controls on Chinese technology and infrastructure as a proxy for understanding state behavior, as these measures represent a particular thinking that links technological capabilities directly to a country’s national security involving legal and regulatory restrictions or sanctions (Luo 2022). Bans and restrictions are considered more offensive tools and constitute attempts to bring allies on board too (Barkin 2020), indicating a regulatory cooperation (Daniel Mügge 2023). Moreover, the imposition of US restrictions and bans along with their spillover effects enhances the country’s own alliance network by building up the capacity of its allies and partners (Schmidt 2022). Accordingly, this indication of “allied technological containment” through bans and restrictions against China shows a moderate and gradual external balancing behavior (Lee and Maher 2022).

Over the past year, the US has engaged in an aggressive campaign to convince European partners to ban Chinese suppliers from their 5G network. Bans restrict market access for a specific company, especially a state-owned enterprise or a company affiliated with a country viewed as a threat, aimed at limiting proliferation of a certain technology. Full bans are indicative of a more intense balancing, contrary to the restrictions indicating a lower intensity balancing behavior. Export controls in their turn also vary in their scope and intensity. For example, within the semiconductor industry, the Netherlands has prohibited the sale of state-of-the-art lithography machines to China, yet China retains the ability to purchase earlier versions of these machines (Jiang 2023). Simultaneously, a total ban implies a complete exclusion of China in transactional relationships.

Finally, the third approach corresponds to instances of strategic alignment (that can translate into alliances, strategic partnerships, security communities, and coalitions (Wilkins 2012; Korolev 2020) that exclude the source of the threat, constituting the highest indication of external balancing, with the intensity of balancing reflected in an (institutionalized) arrangement aimed at promoting interoperability and military preparedness in the ET domain (Rim 2023). And while in the strategic or military domain, expressions of strategic alignment traditionally comprise a defense clause (indicative of an alliance), an establishment of a military base or a joint defense command (Korolev 2020), in the ET domain, respective initiatives excluding the threat-state aim to foster cooperation or joint development of ETs as an alternative to the hostile state (Torreblanca and Jorge-Ricart 2022). Reduced costs of forming alliances in the ET domain and the associated flexibility make it easier for states to build further alliances and provide extended deterrence to a balancing coalition (Mehta 2021). Moreover, cooperation and alignment in ETs reinforces already established alliances and partnerships that remain valuable by facilitating operative cooperation, data sharing, join planning, and risk assessments, while also enhancing the legitimacy of international action (Imbrie et al. 2020), and thus extending beyond the mere dialogue, in contrast to the aforementioned diplomatic initiatives (You 2021).

3 China as an ET Threat: Employing Walt’s Quadripartite Approach

We now turn to applying the BoT theory to the development of the ETs, by first, assessing China’s threat and the associated aggregate power, geographic proximity, offensive capabilities, and aggressive intentions; and second, by exploring how this threat might be balanced.

3.1 Aggregate Power

According to the Center for Strategic and International Studies, China is a near-peer competitor with the US in AI and advanced computing (Lewis 2019). Some authors even consider China to be ahead of the US and at the forefront, globally, in some fields such as quantum computing (Whalen 2019). Following the idea of threat perceptions intertwined with a change in material capabilities, and examining China’s “aggregate power” in ETs, we can observe that the country has made significant advances in various areas while still lagging behind the US in overall technological and research performance (Paszak 2019; Brooks and Wohlforth 2016). This is particularly true of semiconductors (Levine 2020).

Nevertheless, the country’s growing and expansive relative ET capabilities, advancements, and incremental growth over a short period of time have positioned it as a threat toward the US. This is supported by US officials’ accounts of the ETs, who have stated that “in many ways, it is less important whether their technology is ‘as good as ours’ than whether it is good enough to render our capabilities ineffective” (Carter 2018, p. 5). Former US Secretary of Defense Mark Esper also voiced the widely shared concern: “I think we need to be very concerned about Chinese technology getting into our systems or the systems of our allies” (Macias 2019) (Table 2).

Table 2 China’s aggregate power in ETs

Artificial intelligence is seen as the sector where China’s capabilities have enhanced and come to compete with the US. While in 2019, the US was leading in four categories (talent, research, development, and hardware), and China in two (adoption and data), in 2021, China was continuously reducing the gap in important areas and challenging the US lead, while continuously improving the quality of its AI research, and eventually surpassing the EU in AI publications, according to the Centre for Innovation Data reportFootnote 8 (Castro et al. 2019; Castro and McLaughlin 2021, para.7). In other assessments, such as 2018 Tsinghua University AI Development Report,Footnote 9 China seems to have already secured a leading position in AI, ranking first in the total of AI research papers, highly cited AI papers worldwide, AI patents, and AI venture capital investment and second in the number of AI companies, in addition to the largest AI talent pool.

While China still lags behind in the realm of core AI technologies, such as hardware and algorithm development, and also in top-tier talent where it sees a significant gap with the US, this weakness has already been acknowledged and addressed by establishing an AI talent training system under the auspices of China’s Ministry of National Education, supported by the “AI Innovation Action Plan for Institutions of Higher Learning” (Imbrie et al. 2020). According to the latest AI Index report of Stanford University's Human-Centered Artificial Intelligence (2023), there has been a significant surge in Chinese AI publications, increasing 2.3-fold since 2015.Footnote 10 China dominated the field between 2010 and 2021, accounting for 39.78% of global AI publications, followed by the EU at 15.05% and the US at 10.03%.Footnote 11 As stated in a Stanford University Human-Centered Artificial Intelligence report in 2022, China leads in AI publications, surpassing both the US and the EU, with 22% of total publications, and ranks second in private investment in AI technologies. In 2021, China ranked first in AI publications by sector, followed by the US and the EU. Also, China holds nine positions, in the top ten institutions in the world in 2021 ranked by number of AI publications in all fields, while also leading in Natural language processing publications, AI publications in speech recognition and computer vision, as well as in AI journal publications (Stanford University Human-Centered Artificial Intelligence 2022).Footnote 12 In addition, China has been actively exporting AI technologies, either under the Digital Silk Road (DSR) project or via direct trade agreements with individual countries (Greitens 2020), such as with Serbia, which maintains close trade and tech relationships with China in more general terms (Le Corre and Vuksanovic 2019). Huawei alone was able to sell AI-based surveillance equipment to 50 countries along with other tech giants like Hikvision, Dahua, and ZTE (Feldstein 2019). As a result, over 60 countries exclusively use Chinese AI surveillance technology, most of which are in Africa and Latin America, while 36 of them have signed onto China’s Belt and Road Initiative (Feldstein 2019). Furthermore, China signed an agreement with 71 countries to deploy smart city public security projects and 447 research partnerships and 145 R&D labs in different parts of the world (Cave et al. 2019).Footnote 13

In terms of Big Data, China’s market value was around US$9 billion in 2021, marking a compounded annual growth rate (CAGR) of 31.72% since 2014 (Statista 2021). In comparison, the US market stood at US$21 billion. However, according to forecasts, China is projected to reach a market size of US$42.4 billion by the year 2027 (Businesswire 2020). Close examination of the growth rate of the Big Data industry in China reveals a consistent increase from 2018 to 2021. For instance, while the growth rate was pegged at 18% in 2020, recent estimates suggest that the Big Data industry saw a 30% growth in 2021 (Slotta 2023). This growth is not solely attributed to the sheer volume of data produced, with estimates predicting China will generate approximately 48.6 trillion gigabytes annually by 2025, supported by more than 1 billion internet users. In addition, China generated the most zettabytes of data.Footnote 14 These developments constitute deliberate efforts put forth by the CCP since the mid-2010s to exploit data as the fundamental resource of the future global economy and governance system (Liu 2021; Thomala 2023). This concerted effort reached its apex with the unveiling of the comprehensive “Action Plan on Promoting Big Data Development” in 2015 (Gorman 2021). The primary aim of the Action Plan was to leverage Big Data by incorporating it into various sectors such as healthcare (through the extraction of individual health data), transportation, manufacturing, geographical data, and public security (The State Council of the People’s Republic of China 2015).

China also plays a significant role in shaping the Internet of Things (IoT), which is growing with the technological footprint of Chinese firms as leading participants in both the development of IoT applications and of the internet’s underlying infrastructure; China accounts for three quarters of cellular IoT connections worldwideFootnote 15 with three Chinese manufacturers holding over 50% of the global market share of cellular IoT modules.Footnote 16

In addition to this, Chinese manufacturers Huawei and ZTE have become dominant in IoT, selling Radio Access Network (RAN) equipment that forms a critical component of the 5G network. Huawei is leading the global implementation of 5G networks by the number of commercial contracts it has secured, accounting for 91, many of which have been signed with the governments of developing countries in Asia (Bicheno 2020). As Goldman (2020)Footnote 17 puts it, Huawei has been dominating “this field with a 30% market share (in 2018)”, displaying a growth trend.

Like other ETs, quantum technology has become a hotbed of US–China competition. A full materialization of quantum technology can make our current understanding of secure networks and encryption outdated, while revolutionizing the fields of computation, communication, and encryption. The global market value of quantum computing might reach US$1 trillion by 2035 (Howell 2023). Therefore, the prospect of such transformational power further heightens the stakes in this technological race. In recent years, China has stepped up its pace of quantum research through various projects (Smith-Goodson 2019), but its commitment to advancing quantum research is not a recent development. For instance, from 2006 to 2010, a multitude of projects on quantum information was initiated under the auspices of the Ministry of Science and Technology (MOST). This momentum continued into the subsequent “Five-Year Plan”, during which China significantly increased its funding support from US$150 million to US$490 million (Zhang et al. 2019). Of particular note, in its 14th 5-year plan (2021–2025), China expressly incorporated quantum technology goals, stating: “We will research and develop intra-city, intercity and free-space quantum communication technologies, develop a general quantum computing prototype and a practical quantum simulator, and make breakthroughs in quantum precision measurement technology” (Center for Security and Emerging Technologies 2021, p. 12). This indicates a clear and strategic intention to emerge as a frontrunner in the field of quantum technology.Footnote 18 As it stands, China currently ranks third among nations leading the charge in quantum computing adoption, trailing only slightly behind the US, which is in the first position (STATISTA 2021). However, it is important to remember that quantum computing is still an emerging technology, and its geopolitical implications are subject to unexpected advancements and setbacks.

In terms of semiconductor manufacturing capacity, China surpassed the US in 2020, with a 15% share of the global market compared to the US' 10% (Mark and Roberts 2023). Projections suggest that this gap will widen if current trends continue, with China's share expected to reach 25% by 2030 and the US’s share falling to 10% (ibid). The same trend is observed in the world share of semiconductor assembly, packaging, and testing, with China holding a 38% share compared to the US's 5% (ibid). This suggests that China is becoming increasingly dominant in the semiconductor industry, particularly in the manufacturing and assembly stages, something that has sparked US concern and prompted President Biden to issue “Executive Order 14,017 on America’s Supply Chains”, which establishes semiconductor manufacturing and advanced-packaging supply chains as a priority in the guidelines for sectors posing risks to national security.Footnote 19 However, China's reliance on foreign technology and knowledge is evident in the fact that the country has a smaller market share than the US in semiconductor production equipment, memory chip designs, and sales while being the world's largest semiconductor industry.

The analysis of the dimensions of China's progress in technological development above correlates with the data of both the Global Innovation Index and Development's Frontier Technologies Readiness Index (2023). For instance, as per the Global Innovation Index (2022), China achieved a ranking of 11 in 2022, a notable improvement from its position at 35 in 2013. This advancement is also reflected in the United Nations Conference on Trade and Development's Frontier Technologies Readiness Index (2023), where China ascended to the 9th position among 166 countries, an upgrade from its 15th position in 2021. More strikingly, as per the same index, China surpasses the US in specific categories such as in industry and information communication technologies (ICT), with rankings of 2nd and 9th, respectively, compared to the US's 16th and 11th ranks.

3.2 Geographic Proximity

Geography and distance are key factors in determining plans and strategy, as well as broader security and diplomatic policies of states (Heginbotham et al. 2015). Furthermore, the BoT theory suggests that rising powers like China, geographical proximity “will inevitably induce fear and apprehension among surrounding smaller states” (Chu et al. 2015, p. 406).

Nonetheless, the concept becomes obsolete in the face of the ETs that transcend borders, with threat perceptions no longer confined to surrounding or neighboring states. China’s pursuit of global digital leadership in multiple areas, such as digital infrastructure, e-commerce, and research collaboration (Shi-Kupfer and Ohlberg 2019), has been evident in the development of a global Chinese technology network through state-backed companies. Chinese companies supply AI surveillance technology to 63 countries that use exclusively Chinese technology, most of which are in Africa and Latin America (Feldsten 2019). At the same time, state-backed companies such as Huawei, Alibaba, and Tencent have already established their presence in numerous states' telecommunications networks, data centers, and online payment systems. Through initiatives like the Digital Silk Road (DSR), these companies, including Huawei, ZTE, Hikvision, NucTech, and others, are exporting AI technologies, providing support, and directly participating in the deployment and development of various technologies such as cloud computing, smart cities, digital payment systems, and AI within host countries (Greene and Triolo 2020; Feldstein 2019). As this intricate web of digital market interconnections continues to expand, it presents a substantial challenge to other powers irrespective of their geographical locations (Shi-Kupfer and Ohlberg 2019). As such, Beijing’s investments in several countries allow China to leverage its global technology power image (Fannin 2020).

For the BoT and the realist paradigm in general, the competition of states for territory, resources and access to important geographical positions is imperative for the power distribution in the international system; as such, the geographic expansion of Chinese manufacturers and suppliers could lead to a significant advantage over other competitors, particularly given Beijing’s principle of non-interference in a country's internal affairs when doing business (Papageorgiou 2023). The acquisition of Western firms by Chinese multinationals has increased dramatically in recent years following the Going Global Strategy. Chinese MNEs have used outwards foreign direct investments (OFDI) to acquire brands, advanced technologies, sophisticated management, and marketing skills in developed countries through aggressive strategic asset-seeking M&As (Anderson et al. 2015). For instance, two Chinese companies affiliated with the People’s Liberation Army bought three Swedish semiconductor startups in 2018 and bought off British chipmaker “Imagination” and German robot-maker "Kuka” (Braw 2020). These cross-border mergers and acquisitions have raised national security concerns for governments (Williamson and Raman 2011) and have been described as a threat to a hosts’ national security (Yang and Deng 2017; Li et al. 2017).

In the semiconductor industry in particular, with its unbalanced global value chain geography privileging a few states, China sought to increase geopolitical space amid the technological race with the US, especially since the latter seeks to return the global center of gravity for integrated circuits (IC) from East Asia back to the US through the “reshoring” of several key industries (Yeung 2022; Triolo 2023).Footnote 20

In addition, ETs such as AI are key to the control of geographic space and the five dimensions (land, sea, air, space, and cyber) of warfare and their interoperability (Fricke 2020). The US and its allies have long benefited from the geography of the internet and its global reach with the most valuable American tech companies gaining the bulk of their revenue outside the United States (Imbrie et at. 2020). Nevertheless, China is on track to possess as much as 30 percent of the world’s data by 2030Footnote 21 while its Datasphere is expected to be the largest of all regions by 2025 (compared to EMEA, APJxC, U.S.) which will allow it to deploy video surveillance in different parts of the world (Rydning et al. 2018). In addition, given that AI systems know no geographical constraints and are not confined to one geographic region (Lorenzo et al. 2021), “AI-powered intelligence systems may provide the ability to integrate and sort through large troves of data from different sources and geographic locations to identify patterns and highlight useful information, significantly improving intelligence analysis” (Allen and Chan 2017, p. 47), thus expanding the country’s global reach but also raising threat perceptions, given that the threat is not only transboundary but can be initiated from anywhere, mitigating the importance of the geographic dimension.

3.3 Offensive Capabilities

This element is particularly important to emerging powers since the offensive capabilities can be used in arms forces. The use of AI, robotics, directed energy, cyber warfare, and orbital systems secure competitive advantages and strengthen deterrence by curbing lower level challenges and achieving strategic advantage. China has developed several systems that could penetrate US defenses. According to some accounts, "China has likely surpassed the US in the development of a new class of weapons, hypersonic strike vehicles, and may be within months of deploying such systems" (Lewis 2019, p. 6). In addition, the focus is not on military expenditure or the number of military equipment but on the ability to significantly disrupt, degrade, and dismantle military infrastructure.

One could reasonably argue that China’s development and enhancement of offensive capabilities position it as a potential threat, even though its defense budget does not align with that of the US.Footnote 22 Nevertheless, Xi Jinping has pushed, as indicated in the “Military Strategic Directive for a New Era”,Footnote 23 for intensifying innovation in ETs to “build a strong military” and reach greater strategic autonomy, while the 14th 5-year plan (2021–25)Footnote 24 describes a goal of developing disruptive technologies that would give China a military advantage over rivals and close the gap with the US (Duchâtel 2023).

Concerns related to Chinese technology development have reached an apex when it comes to China’s civil–military fusion (CMF) strategy, with US decision-makers constantly referring to the CMF strategy as a malign agenda and a global security threat (Manuel and Hicks 2020). For example, in 2019, then-Secretary of State Mike Pompeo (US department of State, para. 1) stated: “I have been sounding alarm bells to the United States’ partners and allies, U.S. corporations, and to the American public about Beijing’s strategy of ‘Military-Civil Fusion’, or MCF [(…)] one of the United States’ most pressing national security threats.”

At the same time, China’s access to European dual-use technology has raised concerns not just for Europe’s bilateral relations with China, but also for the management of Europe’s relationship with the United States (Duchâtel 2023).

The European Commission’s outlining the “European Economic Security Strategy” has emphasized the need “to prevent the leakage of sensitive emerging technologies, as well as other dual-use items, to destinations of concern that operate civil–military fusion strategies” (European Commission 2023). The reason for mounting concerns stems from the blurred nature of China’s CMF strategy, which in fact builds upon decades of civil–military integration efforts of previous Chinese leaders (Kania and Laskai 2021). For other states, China’s CMF enhances its military capabilities, which could suddenly disrupt the global military balance.

AI also augments cyber capabilities to develop AI-enhanced cyber weapons (or “adversarial AI”) which may appear relatively benign, for example, enumerating the target space or repackaging malware to avoid detection and can have significant destabilizing effects in the target countries (Johnson and Krabill 2020). Another area of concern has been China enhancing its military capability by employing “intelligentized warfare” doctrine with the help of AI and ramping up its collaboration with major tech companies such as Hikvision and iFlytek that create two-way around innovation ecosystems (Kania 2017). Moreover, some scholars posit that China may employ ET, particularly AI, in psychological warfare operations to gain decision-making advantages and to anticipate the decisions of enemy forces in the gray zone. Given, also, the Chinese military’s growing emphasis on data—that is, the current informatization (information-driven) and future intelligentization (artificial intelligence-driven) views of warfare—one can conclude that the ability to manipulate information, broadly defined as information warfare (信息战),Footnote 25 including the ability to manipulate how adversaries receive and process that information (psychological warfare) has become one of China’s foremost priorities (Beacuchamp-Mustafaga 2023).

Lastly, regarding the prospective development of lethal autonomous weapon systems (LAWS), despite having repeatedly supported a legal ban on LAWS, China has been promoting a narrow understanding of these systems that intends to exclude such systems from what it deems “beneficial” uses of AI (Qiao-Franco and Bode 2023). In addition, the fact that the People’s Liberation Army (PLA) is using MCF to “weaponize biotech” using CRISPR gene-editing technology, advanced biomimetic systems, biological and biomimetic materials and human performance enhancement (Kania and VornDick 2019) indicates the offensive nature of the country’s capabilities. Considering the potentially transformative impacts of ETs across various military strategic domains, and recognizing the role of AI as a force multiplier, it becomes apparent that if an adversary's AI systems lack attributes such as transparency, reliability, and verifiability, it becomes challenging to accurately gauge the adversary's capabilities (Johnson 2020). Thus, it becomes harder to objectively assess their deterrent threat credibility, while concerns grow about how these technologies can bolster a state’s offensive capabilities and heighten other states’ threat perceptions.

3.4 Aggressive Intentions

The US government has repeatedly raised its concerns regarding potential security risks from these companies due to the influence of the Chinese government over its firms, proclaiming that the Chinese government “may force Chinese suppliers or manufacturers to modify products to perform below expectations or fail, facilitate state or corporate espionage, or otherwise compromise the confidentiality, integrity, or availability of IoT devices” (USCC, 2018, p.461). Given China’s notorious cyberattacks reputation, new tensions pertaining to the AI-cyber nexus may emerge in the near future. Cyber tactics such as cyber espionage and attacks have become a cost-effective modus operandi for states, especially China, in relation to ETs and offer a means to acquire otherwise inaccessible or heavily guarded information, providing a substantial advantage in the rapid advancement of these technologies. According to US think tank, the Center for Strategic and International Studies, between 2000 and 2023, 224 incidents were recorded, with 49% involving actors tied to the Chinese military and government. Moreover, over 1200 cyber espionage cases in either China or the US are currently under investigation (CSIS 2023a, b). Some estimates propose that the US economy suffers an annual loss of US$300 billion due to Chinese cyber espionage operations, affecting areas from quantum computing and semiconductors to AI (Laskai and Segal 2018). Over time, there have been long-standing allegations of cyber espionage efforts by China along with forced technology transfers through mergers with Western companies, which have raised significant concerns among the US and its allies and partners (Lindsay et al. 2015). At the same time, in its 2022 Annual Threat Assessment, the Office of the Director of National Intelligence (ODNI) included the following passages regarding China’s cyber capabilities and intentions: “China presents the broadest, most active, and persistent cyber espionage threat to US Government and private sector networks. China’s cyber pursuits and export of related technologies increase the threats of attacks against the US homeland. China almost certainly is capable of launching cyberattacks that would disrupt critical infrastructure services within the United States, including against oil and gas pipelines and rail systems” (ODNI 2022, 8). Between 2005 and 2022, 237 cyber operations carried out by China (state sponsored) were reported (according to Council of Foreign Affairs Cyber Operations Tracker 2023), which can be interpreted as aggressive actions of malicious intent.

Similarly, China’s disinformation campaigns reinforce the assessment of China’s intentions as aggressive. Since 2015, has expanded social media disinformation campaigns, and established a separate unit for the conduct of information warfare, the PLA Strategic Support Force (PLASSF) (Harold et al. 2021). While China has been mainly using information manipulation domestically, for instance, during the Hong Kong protests using Western social media such as Twitter (Beskow and Carley 2020), its latest extensive disinformation campaigns have posed a significant risk to US and other actors’ intelligence operations and national security. Indeed, China (similar to Russia) has been accused of spreading disinformation campaigns and propaganda amid the COVID-19 crisis by both the EU and the US (European Parliament 2020; US Embassy in Georgia 2020), with the goal of advancing “anti-Western views, and spread[ing] false information to create divisions between the United States and its partners and allies” (White House 2020, p. 7).

Finally, when it comes to intellectual theft, the US has accused Chinese companies of stealing or misusing intellectual property rights from US companies and also forced technology transfers (van der Linden and Łasak 2023). For instance, the 2021 Microsoft Exchange breach, linked to APT31 and APT40, compromised 300,000 organizations globally as claimed by Microsoft, the United Kingdom (UK) and other countries (Jarnecki and Dawda 2023). Accordingly, in their newly initiated national cyber strategies, countries like the US and the UK, have characterized China as a “systemic competitor”Footnote 26 and indicated that its aggressive acts in cyberspace pose national challenges while also indicating that “states with revisionist intent are aggressively using advanced cyber capabilities to pursue objectives that run counter to our interests and broadly accepted international norms”.Footnote 27 China’s global position, particularly in the realm of ETs, can be, thus, characterized as assertive or aggressive in our framework of analysis.

4 External Balancing Against China in the Realm of ET

The external balancing strategy in ET aims to achieve two primary goals: first, to outspend China and restrict its access to certain critical technologies, new markets,Footnote 28 and resources required for its technological progress and to counter Chinese technology acquisition, and second,Footnote 29 to stablish a network of allied states to coordinate such initiatives.Footnote 30

4.1 Diplomatic and Policy Coordination

The first approach indicates that external balancing behavior is diplomatic coordination of policy responses with the threat’s main rivals in either a bilateral or multilateral form. Indeed, the primary aim for the US is to safeguard its technological dominance by rallying other countries around itself while simultaneously curbing China’s technological expansion, especially in nations participating in the Digital Silk Road initiatives. In September 2021, the US and the EU issued the TTC Inaugural Joint Statement, announcing cooperation on export controls that go beyond traditional objectives, to combat human rights abuses as well as address concerns about ETs, signifying a potential alliance to counter Chinese technology expansion (Chorzempa and von Daniels 2023). The European Commission, in its turn, proposed an EU–US Trade and Technology Council to strengthen joint technological leadership, leading in future to an increase in multilateral PPPs as well as international cooperation regarding R&D, standards-setting and good governance practices regarding the application of technologies (Capri 2020). At the same time, it shows that the EU’s active engagement and interest in international collaboration around AI is matched with positive perceptions of the US’ role as an AI partner (Cohen and Fontaine 2020).

In a similar vein, to coordinate joint initiatives, the State Department elevated the Clean Network initiativeFootnote 31 to an international collaboration network aimed at restricting Chinese tech expansion, particularly in developing countries, such as on the African continent. The announcement of this initiative composed by countries, telecom companies and suppliers, despite its limited impact, was characterized as an “effective way to call attention to the problem of Chinese technological espionage” (Kuo 2021, par. 2) and to urge US allies and partners to avoid Huawei and other Chinese ICT firms from their 5G networks, opting for their competitors such as Ericsson and NOKIA.

In the same context, in 2019 and 2020, the US State Department initiated a series of “Joint Declarations on 5G Security” with allies in Eastern and Central Europe (except Hungary) to raise awareness of countries who are keen on adapting Chinese 5G networks. Furthermore, in the western Balkans, North Macedonia signed a similar declaration, Kosovo signed a Memorandum of Understanding, and Albania stated its intention to join the Clean Network initiative in 2020 (Taylor 2022; US Department of State 2020; Friis and Lysne 2021). Lastly, most recent diplomatic initiatives, such as the one in July 2022 between the US and Japan, include the formation of a high-level dialogue focused on semiconductor cooperation to counter China’s growing economic influence (CSIS 2023a, b).

One of the most prominent examples of joint initiatives between states threatened by China that aim to support China’s key rivals is the US allowing Taiwanese semiconductor companies to set up a factory on US soil in Arizona (Disis 2020; Swanson et al. 2020). Given that TSMC holds around 90 percent of the market share for advanced processors used in most of the world’s electronic devices, as well as in more advanced technologies such as guided missiles and machine learning (ML) applications, the decision to build a second factory in PhoenixFootnote 32 despite no significant economic benefits for TSMC or Taiwan further indicates that this decision was facilitated by political considerations and most specifically the geopolitics of chip production, driven partly by fears over China’s hostile posture toward Taiwan (Liu and Mozur 2023Footnote 33); this indicates that states perceiving China as a threat seek to join forces. Moreover, the dramatic acceleration in the US effort to control the rise of China’s advanced semiconductor sector and its attempts to engage with partners and allies to achieve that end, and the fact that TSMC also severed ties with Huawaei in May 2020, shows the increasing difficulty companies and countries face to remain insulated from geopolitics (Mark and Roberts 2023).

Initiatives akin to these have also been pursued with South Korea, evident in Samsung's monumental US$17 billion investment project in Texas, and with Japan across various ETs, including semiconductors (Hotta 2022). On an interesting note, European countries have also adopted similar initiatives, such as Germany’s recent signing of an agreement to build a US$11 billion chip manufacturing plant in the country.Footnote 34

4.2 Bans and Restrictions

Export controls and bans have played an increasingly important role in the US government’s efforts to deny China access to critical technologies (Fischer 2023). As such, the referred measures initiated by the US aim to slow Beijing’s advances in ETs. By imposing export sanctions, the US is trying to force technological decoupling and disable the functioning of global supply chains in the domains critical for Chinese high-tech to slow down or contain China’s technological and economic rise (Milutinovic and Nikolic 2023). Accordingly, the US has called its allies to protect their shared democratic values in the technological sector, ascribing even an ideological connotation to its response to Chinese tech expansionism and emphasizing its fear of digital authoritarianism diffusion (Shahbaz 2018). As the US cannot address these challenges in isolation, collaboration among its treaty allies becomes imperative, involving the sharing of sensitive advanced technologies with national security and military applications and civil and military technology research and (co-)development, (co-)production, and joint ventures, in addition to flexible partnerships with non-traditional-US allies (Limaye and Tenyotkin 2023). For example, the coordinating group has shaped a common approach on export restrictions in the semiconductor manufacturing equipment sector, in which the coordination with Japan and the Netherlands possessing advanced photolithography technologies proved essential. It has laid out a position on whether to allow US chipmakers to continue selling commodity chips to Huawei while restricting the export of the most advanced semiconductors and chip fabrication equipment (Lewis 2020).

At the same time, as the US has pressured its allies to adopt export controls and bans, the varied response of different states indicates a gradual intensity of balancing behavior, with a full ban corresponding to the “full rejection of Huawei (in accordance with US preference)” (Christie et al. 2023, p. 8), considered here a stronger expression of balancing efforts, distinct from other restrictions. The latter, which share a commonality with bans of states’ being markedly more acceptive of US policies/recommendations, include laws posing substantial barriers for Huawei, or 5G security agreements with the US, as well as 5G contracts concluded by state’s telecom operators with Huawei competitors (Nokia, Ericsson, local actors) (Christie et al. 2023), and are indications of balancing of lesser intensity. Therefore, both behaviors further confirm the BoT theory that threat perceptions of China lead to external balancing.

Regarding bans, during Donald Trump’s presidency, concerns escalated over how Chinese companies were using data, with ongoing debates about the degree to which Chinese big tech firms were participating in military projects (Kokas 2022; Mishra et al. 2022). In May 2019, Trump issued an executive order (extended in May 2020) laying the groundwork for a ban on Huawei equipment in US networks from using telecommunications equipment or cooperating with critical software and licenses (such as Huawei, ZTE).Footnote 35 This move expanded the restrictions enacted in 2018 regarding the use of Huawei by US agencies and federal contractors. In June 2020, the FCC formally designated Huawei and its affiliates (along with ZTE) as posing such a threat. The Trump administration initially urged, and then even pressured, US allies to ban Huawei from providing 5G network infrastructure (Gray 2021).

The US has been actively pressuring Huawei to limit its market access and involvement in 5G network development worldwide, citing concerns that the Chinese Communist Party could exploit the company for espionage, compromising other nations’ critical infrastructure and granting China significant influence over global telecommunications networks (Christie et al. 2023). The promotion of a comprehensive 5G technical dossier has become a matter of a distinct choice between competing alliances spearheaded by the US and China (Calcara 2023). A great deal of countries sided with the US, with the UK enacting an outright ban of Huawei from the rollout of 5G infrastructure by 2027 removing equipment from earlier generations (Kahata 2020), eventually admitting “geopolitical” concerns behind the ban (Leoni 2022). They were followed by Japan, Sweden, and New Zealand with their behavior corresponding to external strategic balancing (Cheung and Wilhelm 2020; Yasir and Kumar 2020). Despite earlier more sceptical approaches to the outright ban of Huawei, European states decided to enact legal actions (Kahata 2020) to restrict access and moved toward bans. This is the case of the Italian government’s veto of the 5G deal between Huawei and Italy’s telecom company FastWeb (Kahata 2020), whereas other European states (including Denmark, France, and more recently, Germany) have imposed significant restrictions, alongside Israel and India (Christie et al. 2023). While balancing efforts are typically associated with more advanced, industrialized countries, the US and its European allies have exerted pressure on other nations to join in countering China’s Huawei; this pressure has been applied to countries such as Kenya, Costa Rica, the Philippines and Jamaica, (Pollet and Handel 2023). Another example has been Ethiopia’s 5G network auction in May 2021 which saw Vodafone, backed by the USIDFC, outbid the Huawei-supported MTN, displaying balancing of an African country against China’s ICT influence (Woo and Wexler 2021).

In addition, the US has adopted the same approach to counter China’s influence in the semiconductor sector, as evidenced by the executive order in June 2021 to address the “threat posed by [China’s] military-industrial complex” (White House 2021a, b), forbidding investments in 59 Chinese companies, including Huawei and Semiconductor Manufacturing International Corporation (SMIC) and the enactment of the CHIPS and Science Act in 2022 (White House 2022b). This legislation aims to bolster the domestic semiconductor industry through significant capital investment, amounting to US$280 billion (Badlam et al. 2022). It includes provisions for US$39 billion in subsidies to support onshore chip manufacturing and offers a 25% investment tax credit for expenditures related to manufacturing equipment. In conjunction with these efforts, US citizens and green card holders are prohibited from working on certain chip technologies for Chinese entities, further reinforcing the strategy of restricting China’s access to advanced technology (Badlam et al. 2022). Other countries have followed in the US’ footsteps, such as Japan, the Netherlands, Germany, and even the EU as a whole have also implemented restrictions on Chinese semiconductor exports. As such, in January 2023, the US reached an agreement with both the Netherlands and Japan to deny some advanced chip manufacturing machines to China and to restrict sales of equipment for advanced semiconductors to China (Edwards 2023). The acceptance of US policy recommendations, which sometimes takes place following months of arduous negotiations, embodies a united effort from the US and its allies to impede China’s acquisition of state-of-the-art semiconductor technology with the objective of preserving their own technological superiority (Sheehan 2022; Ting-Fang et al. 2023).

Moreover, real-life applications of ETs such as TikTok and WeChat have been used as a pressure mechanism on US allies. The US has labeled TikTok as a potential risk to national security, attributing concerns to its perceived close ties with the Chinese government and the presence of party officials in significant positions within the company (Johnson 2023). Thus, the approval of the “No TikTok on Government Devices Act” and two consequential acts, namely the DATA Act and the RESTRICT Act, were introduced to the US Congress with the aim of further limiting third-party usage of private data (Bordelon 2023). As of 2023, the use of TikTok on government-issued devices has been prohibited for state government agencies, employees, and contractors in 34 out of 50 US states (Richmond 2023). Similarly, several other countries (see list in AP News 2023) have again adopted foreign policy recommendations, including Jordan and Taiwan, along with the EU, Belgium, Canada, Ireland, Norway, and the UK (all of which have enacted restrictions on the use of certain devices by government entities and staff) (Iyengar 2023). India, on the other hand, banned both TikTok and WeChat completely in 2020 and restricted the participation of ZTE and Huawei in 5G network infrastructure building (Zaveri 2023).

Overall, the US has managed to convince its allies from Western Europe to East Asia to cease exporting “sensitive technologies” in sectors such as AI and microprocessor manufacture, and, to borrow the wording, Qiu (2023), a single dominant billiard ball (the US) has led numerous other billiard balls (US allies) to set their policies accordingly, including the pressure to prevent the selling of EUV lithography equipment to China (mainly Netherlands) in the framework of the Wassenaar Agreement.

4.3 Strategic Alignment: Alliances and Strategic Partnerships

The third expression of external balancing in ETs is strategic alignment in the form of semi-formal alliances and strategic partnerships, which allow for joint efforts, sharing of information, and technology cooperation (Han and Paul 2020). At the same time, this strategic alignment in most cases is already embedded in a broader security framework and draws more commitments of expressions of mutual support by allied members. All these developments are efforts by the US and its allies to achieve mutual support on the issues that are below their alliance contract (Lee et al. 2022). In line with BoT theory, when states recognize another state as a threat, they form balancing coalitions to counter the threat; in ETs, the US has turned to its allies and partners to counter Chinese clout in global technology (Lee et al. 2022). Semiconductors and AI in particular have been identified as the key technologies for successful external balancing strategies, with the US promoting an alliance-centered reorganization of semiconductor supply chains (Lee 2023; Grochmalski et al. 2020). Washington’s focus on semiconductors is due to their enabling nature, as well as because China has so far failed to catch up with market leaders in critical industry segments. The Biden administration aims then to persuade allies to endorse US policy toward China without alienating them by applying too much pressure in an attempt to motivate allied governments (Fisher 2023). The US has even called for “friend-shoring” in semiconductors to bring the production back to the US and its like-minded allies (Coy 2021). The Biden administration has not only expanded upon the direct economic engagement with China initiated by the Trump administration (structural power of exclusion), but it has also sought to strengthen its international network of alliances (structural power of influence) (Erlbacher and Schmalz 2023). As such, they have retained most of their foreign economic policies toward China, imposing further sanctions on the semiconductor chip industry (CHIPS Act of 2022) and adopting an interventionist industrial policy approach (Inflation Reduction Act of 2022). The US has also sought to close ranks with its traditional allies in Europe by designing joint initiatives (creation of the US–EU Trade and Technology Council) (Erlbacher and Schmalz 2023). During the Biden administration, the US has pursued a multilateral, ally-focused approach to advance technology agreements through bilateral and multilateral arrangements (You 2021). These include the Chip 4/Fab Four alliance, the Quad, AUKUS, and an extensive collaboration with China’s rivals/competitors, such as Taiwan, Japan, and South Korea. The June 2019 AI partnership with Singapore on the development and use of AI technologies in the national security domain was one of the first initiatives of strategic alignment in ETs (Parameswaran 2019). In addition, the US, EU, and Japan have joined forces in conducting joint R&D on ultrafast computers and secure communications, seeking to counter China's rise in quantum computing (Oikawa 2019).

The formation of the Chip FourFootnote 36 or Fab Four,Footnote 37 a semiconductor supply-chain resilience working group, between the US, Japan, Taiwan, and South Korea has indicated the strategic alignment between US and its close allies in coordinating efforts to restructure global semiconductor supply chains to reduce reliance on China, protect relevant companies’ intellectual property (IP) and coordinate export controls (Zhang 2021Footnote 38). This foreign policy initiative by the US and its acceptance by major semiconductor manufacturers, namely South Korea, Japan, and Taiwan, aim at reducing Chinese economic coercion and market distortion (Corrado 2023).

Furthermore, the renewal of the Quadrilateral Security Dialogue (QUAD) between the US, India, Japan, and Australia brings ETs to the forefront, being one of the three collaboration initiatives promoted by the four states (White House 2021a, b). The Quadrilateral Security Dialogue has been working to establish standards on AI and bolster the resilience of the semiconductor supply chain.Footnote 39 Through the Quad Cybersecurity Partnership, Quad partners cooperate on critical infrastructure protection, supply-chain resilience and security, workforce development and talent, and software security standards (White House 2022a, b).Footnote 40 Indeed, the Quad’s cybersecurity initiatives are meant to deal with threats from China and bolster cyber resilience, not develop offensive cyber capabilities (Patil 2022). In addition, Quad’s discussions on cybersecurity and interoperability focus on adopting a “collective approach to enhancing cybersecurity” through initiatives like Quad Cybersecurity Partnership as guided by the 10 Joint Cyber Principles.Footnote 41 At the same time, QUAD’s initiatives are organized into three functions; regional public goods provision, mutual resilience enhancement, and standard setting for critical and emerging technologies driven by three major endeavors: balancing, order-building, and management of China as a threat (Satoru 2021). Furthermore, the US–Japan–ROK cooperation in areas like R&D and supply-chain security constitutes also a strong complement to the QUAD mechanism, indicating that the United States and its allies are actively supporting each other in technology and enhancing supply-chain security (Qi 2023).

AUKUS, comprising Australia, the UK, and the US, has also emphasized ETs as a potential countermeasure to the perceived Chinese threat in the region. Beyond their agreement on constructing nuclear-powered submarines, the partnership has launched various initiatives in the realm of ETs. These include the AUKUS Quantum Arrangement (AQuA), trilateral cooperation on AI, the AUKUS Undersea Robotics Autonomous Systems (AuRAS) and advanced cyber initiatives (White House 2022a). Through the focus on ETs, the US is enhancing its balancing act by leveraging its alliance with AUKUS and the Enhanced Force Posture Cooperation launched by AUSMIN (Satoru 2021). In addition, AUKUS’ focus on ETs aligns with the global trend of competing for pre-eminence in emerging technologies and its subsequent translation to military dominance (Taylor 2022). Finally, the joint advisory on Cyber ThreatsFootnote 42 released by the Five Eyes alliance in May 2022 highlights a concerning trend: the rise in cyberattacks perpetrated by nation-state threat actors targeting managed service providers (MSPs) (Oxford Analytica 2023). This advisory not only serves as a warning but also demonstrates the alliance’s commitment to aiding critical infrastructure network defenders in their efforts to identify and combat these threats. In addition, at the recent 'Emerging Technology and Securing Innovation Security Summit', high-ranking officials from the Five Eyes Countries expressed a profound concern for an unparalleled threat posed by China in high-tech sectors (Financial Times 2023). Indeed, this underscores a deeper level of strategic alignment within the alliance, extending beyond traditional information sharing, and illustrating their mutual support and coordinated approach in safeguarding their systems and infrastructure. With these initiatives, the US seeks to reinforce cooperation with its key allies to stay ahead of China and counter its technological advances in semiconductors, AI, and Big Data by raising institutional, administrative, and market barriers against competitors in both informal, diplomatic, and formal alliance settings (Malkin and He 2023). The exclusion of the threatening actor from strategic alignments further corroborates instances of balancing behavior (Table 3).

Table 3 Manifestations of gradual intensity of external balancing against China in ETs.

5 Discussion and Conclusion

China’s growing power and expansion in ETs are key to driving momentum of the global shifts in technology and the geopolitical landscape. ETs such as AI, quantum computing, the IoT, 5G and Big Data have been transforming the material distribution of power in the global order and challenging traditional theoretical considerations. China and the US have engaged in unprecedented competition in ETs, and the growing use of ETs both in civilian and military domains by China has escalated China’s stakes as a threat.

The present contribution has examined how China’s ET advancements have resulted in the perception of this country as a threat, through the theoretical lens of the BoT theory. While the multidimensionality and interconnectivity of ETs make geographical proximity an obsolete criterion for threat perception, the other criteria (aggregate power, offense-defense balance, aggressive intentions) hold true in what regards the constitution of threat and the respective state behavior in response to it. China’s aggregate power (analyzed by focusing on AI, 5G, Big Data, quantum computing, semiconductors) firmly establishes China as a near-peer competitor to the US (China is even superior to the US in some indicators in each category), displaying rapid and constant growth in its development of ETs. In parallel, China’s advancements in civil–military fusion secure a potential strategic advantage by enhancing China’s military capabilities. Finally, China’s aggressive intentions have been reflected in its covert operations that have grown in number, frequency, and more reach.

The balancing behavior adopted by Western states faced with the growing threat posed by China has found its reflection in various forms, including diplomatic efforts aimed at undermining China’s ET power, bans, and restrictions of Chinese companies (as in 5G) and use of social media applications, and securing monopoly over the critically important production of semiconductors. Balancing behavior also includes instances of strategic alignment excluding or targeting China. Thus, one can conclude that, in the context of US–China strategic rivalry, the US has sought to counter Chinese clout in global technology leadership by leveraging its extensive network of allies.

The present analysis allows us to draw three conclusions relative to the dynamically evolving research of ETs. First, by reading into the latest years’ developments, we can conclude that ETs will be determinative in the distribution of the Balance of Power, with possible implications for the international system’s polarity. However, we can also observe the formation of spheres of influence and increased competition at the early stages. Thus, while clear-cut considerations of alliances might not be as prevalent as in the Cold War period, balancing dynamics are already in place.

Second, the validation of BoT theory in the ET domain contributes to the debate between the Balance of Power and BoT theories, while also proving the relevance of the realist IR paradigm in explaining contemporary phenomena. The BoT offers a more compelling explanation of individual states’ behavior in the ET domain when compared to the Balance of Power hypothesis of states’ balancing the strongest actor in the system, which is still the US. To be sure, most of the analyzed states are already US allies, and it could be argued that the arrangements in the ET domain or individual decisions such as bans or export controls simply add another layer to the already existing alliance. However, new arrangements that exclude China as well as the diplomatic coordination aimed at undermining China does not always include the US. Instances of cooperation among the analyzed states, such as between Germany and Taiwan’s (the world’s largest) semiconductor manufacturing company, TSMC confirms the validity of the BoT theory. The present article, therefore, aligns with the contributions that, after putting the BoT to the test in the ET domain, have found that the theory holds considerable explanatory power both in terms of identifying the sources of threat and also in predicting how states will respond to threat.

Third, we concur with contributions arguing that there are different manifestations, intensity, and types of balancing, which, when analyzed jointly, allow for the identification of coordinated balancing behavior, namely, instances of diplomatic coordination among competitors of the threat, bans, and restrictions aimed at undermining the threat’s power in the ET domain as well as instances of strategic alignment excluding the threat. The BoT theory’s original notion of balancing against threat as a ‘response’ may be, therefore, presented in a more fine-grained manner if the balancing response is viewed as a process with different steps and stages, even though more academic attention is necessary here, and while it is important to highlight that mutual support is a common denominator bringing together different types of alignment that represent manifestations of the same behavior, external balancing.

The dynamically evolving ETs constitute a key strategic area of competition in IR and call for future research. This concerns especially analyzing state behavior adopted in response to China’s ET threat by focusing on more cases of states adopting specific measures and strategies. In addition, the BoT offers a fruitful avenue of future research by distinguishing not only offensive capabilities but also aggressive intentions. The latter can be explored in an especially promising way from non-realist perspectives, particularly the constructivist one, given its special attention to the issue of state interaction, national identity, status and historical experiences. At the same time, the analytical framework of this study and conceptualization of external balancing in ETs can lead to further testing while the opposing argument of bandwagoning with the threatening state could also be explored through the relations of China with other friendly nations, most notably Russia, Pakistan, and North Korea.