China’s Digital Silk Road

The next phase of technology competition between the US and China is going to be characterised by a geo-political dispute about  global telecommunications infrastructure and digital technologies. 

As this competition grows, so too does the likelihood of a potential split between the US and its allied democracies on the one side and countries dependent on Chinese-based information and communications technology (ICT) on the other.  The impact of this competition reaches beyond telecommunications companies and those involved in their supply chains with implications for international security. 

In the past year a number of countries have decided to exclude Chinese equipment in their 5G networks, principally targeting Huawei.  Exports of Huawei telecoms equipment is one of the many ways that China is working to creating dependencies in customer countries' economies and infrastructure that may ultimately weaken these allies links to the US. 

Attracted by the technological edge and discounted pricing that Huawei offers, numerous national network operators have eagerly adopted Huawei's telecoms  platform. 

A report from the International Institute for Strategic Studies (IISS) examines China’s “Digital Silk Road” strategy, which includes technology infrastructure investments and has found that at least 16 countries had signed memorandums of understanding with with China on projects related to the Digital Silk Road.

The IISS looked closely at at Indonesia, South Korea, the United Arab Emirates, Poland and Israel:-

  • In Indonesia, the report noted, the past two decades have seen Huawei become “deeply, if not inextricably, embedded” in the country’s information communications ecosystem, “from fibre-optic cable networks thousands of kilometres long to the latest smartphones. Communications are transmitted and relayed by Chinese-designed base-station technology and data centres. China is also playing a big role in Indonesia’s AI research efforts. 
  • In South Korea, China uses foreign direct investment as a “carrot-and-stick tool” to influence policy. South Korean tech imports to China have “been centre stage in the Sino-US silicon-chip war,” they write, referring to the competition between US and Chinese chip makers to get their chips in more electronics. 
  • Huawei has also given China an important foothold in the United Arab Emirates ( UAE) and the UAE government has bought surveillance cameras and facial recognition software to police its own citizens. 
  • In Poland, China has spent money to fund training and education, including award programs at a dozen Polish universities whose winners received a week of workshops at Huawei headquarters. The IISS  found that Huawei has an agreement with a major Polish university agreed after the United States had made efforts to turn allies away from the Chinese telecom giant and around the same time that Polish efforts to secure a permanent US base in the country failed.
  • Israel, one of the United States’ closest security partners, occupies “a special place along China’s Digital Silk Road,” having signed a research and development  agreement with Beijing. The Israeli Ministry of Defense, more attuned to US concerns, has been monitoring and raising concerns about China’s activities since the early 2000s.” 

The scope of Chinese technology penetration goes beyond those formal agreements and the IISS research has found that China had carried out significant  infrastructure projects in 137 countries worldwide.

Even if it if the US successfully discourages its allies from importing Huawei telecom equipment there are other ways China is working to creating dependencies in these countries' economies and infrastructure that may ultimately weaken links with the US. 

Technology and infrastructure partnerships give China a position in markets and an influence in government policy making. They also secure access to civilian and corporate data that can be of use to China’s tech companies and provide Chinese  intelligence operatives channels to target national populations with fake news and disinformation. 

The biggest problem, according to the  IISS, is that governments are taking no steps to determine how much or what kind of Chinese investment posed a possible risk. 

China’s global digital investments can be expected to keep expanding in technological and geographic scope and the intersection between technologies, alliance structures and defence cooperation will likely come the principal focus of competition with the US. 

CSIS:         PG-Intel:         Defense One:       IISS:       Science Focus

You Might Also Read: 

Who’s Afraid Of Huawei?:

 

« Cybersecurity Job Listings Worldwide
Facebook To Pay $650m For Facial Recognition Lawsuit »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

ActiveCyber

ActiveCyber

ActiveCyber is a source for news, reviews, learning, and technological innovation in the active cyber defense industry.

Arete

Arete

Arete is a global cyber risk company whose mission is to transform the way organizations prepare for, respond to, and prevent cybercrime.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Corvus Insurance

Corvus Insurance

Corvus' mission is to create a safer, more productive world through technology-enabled commercial insurance.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

LTIMindtree

LTIMindtree

LTIMindtree is a new kind of technology consulting firm. We help businesses transform – from core to experience – to thrive in the marketplace of the future.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

Quantexa

Quantexa

Quantexa automates millions of operational decisions, at scale, across multiple business units, including Anti-Money Laundering, Know-Your-Customer, Fraud, Credit Risk and Customer Intelligence.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

KingsGuard Solutions

KingsGuard Solutions

KingsGuard Solutions is a San Diego Cybersecurity company that specializes in complex and innovative security solutions for companies throughout Southern California.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

SecurEyes

SecurEyes

SecurEyes is a leading cybersecurity firm that provides specialised services, including cybersecurity assessments, managed services, and governance risk and compliance services.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.