Start your day with intelligence. Get The OODA Daily Pulse.
China’s National Internet ID: Increased Control and Strategic Competition
In the evolving cyber competition between great powers, technological shifts often lead geopolitical realignment. China’s latest policy initiative called the National Network Identity Authentication system (aka, Internet ID) is not just a data security reform; it represents a strategic readjustment of how a nation state manages its domestic digital identity as well as project authority across cyberspace. This is not merely a government policy, but an operational pivot in the information domain whose implementation will have implications for digital control, impacts on civil liberties with respect to Internet usage, and will undoubtedly affect global cyber competition.
This development is not a surprise as Beijing has long pursued an incremental erosion of online freedoms, and any anonymity that might come along with it. Since 2010, Beijing has mandated real-name registration requirements that have compelled domestic Internet users to verify their identities. This development has ostensibly helped the government maximize its monitoring and filtering via its Great Firewall, the name given to the national system that restricts access to the global Internet within mainland China’s borders. The two initiatives have helped identify both questionable content as well as those individuals seeking to circumvent state censorship.
Now, Internet ID further institutionalizes this control on an even more granular level of individual attribution. Under this national digital identity system, citizens submit biometric data (including facial scans), linked to a unique digital identifier that will enable them to access various other public services and popular applications without having to enter login credentials. In a pilot phase alone, more than six millionChinese citizens had already enrolled by mid-2025, reflecting early integration within commercial and social systems. This represents a departure from fragmented identity verification toward centralized digital identity architecture. Rather than isolated authentication events per platform, a single government-issued credential becomes the passport for online life. Though some maintain that opting into Internet ID is optional, Beijing has a way of making access to essential service reliant upon compliance.
Immediately, this raises alarm bells as such a consolidation of information can be viewed as both blessing and curse. While Chinese authorities will promote the advantages of such a move as to improve their ability to protect citizens from external cyber threats, such a move certainly enhances the government’s ability to better monitor and control the activities that happen on its portion of the Internet, as well as being able to correlate and attribute it to a specific individual. In this capacity, policing becomes a much more efficient endeavor. What’s more, government authorities can tailor censorship and restriction controls on an individual basis based on their behavior habits. Therefore, the government is now able to narrow the focus of governance control from a macro network level to a more micro person level.
Under Xi Jinping Beijing has increasingly ratcheted up digital governance with social management. There have been consistent efforts to counter narratives that paint China in a poor light. In September 2025, China’s Cyberspace Administration conducted a campaign to curb social media posts that exaggerated “negative and pessimistic sentiments” that run contrary to Beijing’s desire to project a more positive outlook from its citizens, and bolster China’s global image. The Internet ID system synergizes with this goal by magnifying the efficacy of content moderation and online behavior.
In addition to supporting more traditional forms of information control, Internet ID also feeds into a topic that has gained substantial traction in 2025 – cognitive and influence operations. Information dominance is not limited to draconian surveillance or the ability to exploit vulnerable systems; it includes the ability to touch and shape the cognitive environment of populations. States with this level of identity systems potentially possess a detailed map of social topology, and therefore, vectors that can be used to influence. Understanding the communication channels of individuals and who they contact and how often and under what context can enable a government to manipulate at scale, providing the necessary foundation to execute tailored messaging and build predictive social analytics.
Beijing’s endeavors with Internet ID have another possible consequence that extend beyond China’s borders – imitation from similar minded regimes that support state sovereignty with respect to their cyberspaces. China and Russia have an already increasing array of support from states when it comes to controlling their portions of the Internet. For those more authoritarian governments, such identity management may be less of an administrative utility and more of an instrument of state power. Internet ID’s centralized identity infrastructure would be something that aligns with these principles and could be replicated in other parts of the world and with Beijing’s assistance.
What does this mean for the United States?
As with many cyber policies enacted by China and are embraced by foreign governments, there is a difficult duality that exists when it comes to purpose. Yes, identity verification can enhance cybersecurity postures and practices reducing crime, fraud, and illegal activity. On the other hand, centralized control of identity information is at odds with open digital ecosystems. Some issues that Washington, and other Western-style democracies, should consider are:
China’s Internet ID initiative suggests a broader strategic shift where states weaponize identity to exert control over information domains and domestic populations. More alarming, there is the potential that it may influence the international digital order. At a time where digital control equals geopolitical leverage, identity governance can define not only people’s interactions online, but also who controls how those interactions are conducted. Therefore, it’s essential that we recognize that identity is not neutral, but an operational asset in the competition for influence, autonomy, and cyber advantage.