in

China is using tech to grow its influence, warns UK spy chief

Getty Images/iStockphoto

China’s government is aiming to build strategic advantage by by shaping the world’s use of technology according to the head of the UK’s GCHQ spy agency.

Sir Jeremy Fleming, the director of GCHQ said that the Chinese Communist Party (CCP) is seeking to gain influence abroad by exporting technologies used in everything from Internet of Things (IoT) connected devices which power smart cities, to innovative new tech used by businesses. And those products, which could be appealing due to low prices, could come with “hidden costs” which endanger security and privacy of everyone. 

“As it is for every nation, technological innovation is key to China’s growth. And that’s because it’s so central to how we communicate, trade, work and live,” said Fleming speaking at the Royal United Services Institute (RUSI) Annual Security Lecture in central London. 

“China understands all that. It’s deliberately and patiently set out to gain strategic advantage by shaping the world’s technology ecosystem. So, we need to ask ourselves: are we happy with that?” he asked. 

Fleming said that the UK wants to compete and collaborate with a strong China, but the question of how that strength is used – or misused – by the Chinese Communist Party is at the heart of the issue and said that this is an “increasingly urgent problem” which must be acknowledged and addressed.  

China has deliberately and patiently set out to gain strategic advantage by shaping the world’s technology ecosystem, Fleming said. “So, we need to ask ourselves: are we happy with that?”

Fleming said as a result the definition of national security has grown into a much broader concept. “Technology has become not just an area for opportunity, for competition and collaboration, it’s a battleground for control, values and influence,” he said.  

Also: The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats

Some of this comes in the form of setting standards around technology, and in the form of the government of China offering loans to supply Chinese-technology to smaller countries, but offers of technology to these countries are another area of potential concern. 

“This may be offers of new technologies, like smart cities, which have the potential to export surveillance and data,” Fleming said. 

“In a future crisis, Beijing could exploit information covertly extracted from client economies and governments”. 

And he warned: “Mortgaging the future by buying into the Chinese vision for technology may be attractive to some in the short term – particularly for nations suffering the stress of higher energy and food costs resulting from Russian’s invasion of Ukraine. We need to offer alternative solutions that are practical, that are affordable, and are backed by international funding or market investment. If we don’t, in the longer term, the hidden costs of China’s cheap technology solutions will become very obvious.”

But Fleming emphasized that it isn’t just smaller and developing countries which need to be wary of the of the potential security issues threats posed by a mass rollout of Chinese technology – and UK businesses and academia should think about if certain technology contracts are worth the potential security and privacy risks, especially if those providers are closely tied to a hostile state. 

And while GCHQ plays a role in helping to protect UK organizations from foreign threats, organizations should also think about security and privacy issues when making decisions about their technology – and that cheap offerings from China could come with “hidden costs”. 

“This will play out in your boardrooms, in your labs, in your team meetings. You should be protecting your systems and your IP. You should actively manage the potential threat in your dealings with China. The seemingly small daily choices around cyber, investment, IP protection and more, all matter,” said Fleming. 

MORE ON CYBERSECURITY


Source: Information Technologies - zdnet.com

Kata Containers 3's marriage of virtual machines and containers continues

How to enable suspicious message alerts and protect yourself from spam in Android 13