China’s Digital Silk Road

The next phase of technology competition between the US and China is going to be characterised by a geo-political dispute about  global telecommunications infrastructure and digital technologies. 

As this competition grows, so too does the likelihood of a potential split between the US and its allied democracies on the one side and countries dependent on Chinese-based information and communications technology (ICT) on the other.  The impact of this competition reaches beyond telecommunications companies and those involved in their supply chains with implications for international security. 

In the past year a number of countries have decided to exclude Chinese equipment in their 5G networks, principally targeting Huawei.  Exports of Huawei telecoms equipment is one of the many ways that China is working to creating dependencies in customer countries' economies and infrastructure that may ultimately weaken these allies links to the US. 

Attracted by the technological edge and discounted pricing that Huawei offers, numerous national network operators have eagerly adopted Huawei's telecoms  platform. 

A report from the International Institute for Strategic Studies (IISS) examines China’s “Digital Silk Road” strategy, which includes technology infrastructure investments and has found that at least 16 countries had signed memorandums of understanding with with China on projects related to the Digital Silk Road.

The IISS looked closely at at Indonesia, South Korea, the United Arab Emirates, Poland and Israel:-

  • In Indonesia, the report noted, the past two decades have seen Huawei become “deeply, if not inextricably, embedded” in the country’s information communications ecosystem, “from fibre-optic cable networks thousands of kilometres long to the latest smartphones. Communications are transmitted and relayed by Chinese-designed base-station technology and data centres. China is also playing a big role in Indonesia’s AI research efforts. 
  • In South Korea, China uses foreign direct investment as a “carrot-and-stick tool” to influence policy. South Korean tech imports to China have “been centre stage in the Sino-US silicon-chip war,” they write, referring to the competition between US and Chinese chip makers to get their chips in more electronics. 
  • Huawei has also given China an important foothold in the United Arab Emirates ( UAE) and the UAE government has bought surveillance cameras and facial recognition software to police its own citizens. 
  • In Poland, China has spent money to fund training and education, including award programs at a dozen Polish universities whose winners received a week of workshops at Huawei headquarters. The IISS  found that Huawei has an agreement with a major Polish university agreed after the United States had made efforts to turn allies away from the Chinese telecom giant and around the same time that Polish efforts to secure a permanent US base in the country failed.
  • Israel, one of the United States’ closest security partners, occupies “a special place along China’s Digital Silk Road,” having signed a research and development  agreement with Beijing. The Israeli Ministry of Defense, more attuned to US concerns, has been monitoring and raising concerns about China’s activities since the early 2000s.” 

The scope of Chinese technology penetration goes beyond those formal agreements and the IISS research has found that China had carried out significant  infrastructure projects in 137 countries worldwide.

Even if it if the US successfully discourages its allies from importing Huawei telecom equipment there are other ways China is working to creating dependencies in these countries' economies and infrastructure that may ultimately weaken links with the US. 

Technology and infrastructure partnerships give China a position in markets and an influence in government policy making. They also secure access to civilian and corporate data that can be of use to China’s tech companies and provide Chinese  intelligence operatives channels to target national populations with fake news and disinformation. 

The biggest problem, according to the  IISS, is that governments are taking no steps to determine how much or what kind of Chinese investment posed a possible risk. 

China’s global digital investments can be expected to keep expanding in technological and geographic scope and the intersection between technologies, alliance structures and defence cooperation will likely come the principal focus of competition with the US. 

CSIS:         PG-Intel:         Defense One:       IISS:       Science Focus

You Might Also Read: 

Who’s Afraid Of Huawei?:

 

« Cybersecurity Job Listings Worldwide
Facebook To Pay $650m For Facial Recognition Lawsuit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Hiscox

Hiscox

Hiscox offers cyber and data risks insurance to protect your business against the risks of holding data and using computer systems..

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

PrivateVPN

PrivateVPN

PrivateVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

Cyber Ireland

Cyber Ireland

Cyber Ireland brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Crucible

Cyber Crucible

Cyber Crucible is a cybersecurity Software as a Service company definitively removing the risk of data extortion from customer environments.

CySecK

CySecK

CySecK is a Centre of Excellence in Cybersecurity formed in 2017 by the Government of Karnataka, as part of the Technology Innovation Strategy.