What The West's Caution Over Chinese Tech Really Means

The expansion of the Internet of Things (IoT) market is a security concern. If every washing machine in the UK switched on simultaneously, it could overload the National Grid while also causing a temporary water shortage.

Fear of digital attacks is at an all-time high, with China in particular portrayed as a huge threat to the global West.

Multiple government and legislative bodies have banned TikTok usage by its employees based on fears of profiling and tracing technologies. And earlier this year, the US House Energy and Commerce Committee took a look at Chinese ownership of TikTok. ByteDance (TikTok’s parent company) shared details of a $1.5 billion project with Oracle Corp designed to safeguard data and content from its 150million American users from Chinese influence, but the congressmen were unmoved. Ranking member Frank Pallone said: “I still believe that the Beijing communist government will still control and have the ability to influence what you’re doing.” 

But it is not just data spying and possibility of Internet of Things (IoT) devices being used as trojan horses for attacks that concerns the West. Security is simply the tip of the iceberg, with issues of power and money lying below; cyber security is really about cyber politics and cyber economics.

China Is Changing

A few decades ago, China became the world’s factory, developing its economy using cheap labour and a wealth of natural resources. The trade-off for cheap, innovative products has been a reduction in security. As standards became globalised, imports were less closely monitored. 

However, China has now reached the stage of being an affluent country with a thriving middle class. In fact, they are now the largest single market in the world, making China less interested in the global economy. 

As such, there is a move away from globalisation. Prices are rising and China is starting to dominate both economically and technologically. Feeling threatened, the Western world is seeking greater protection of its economy and technology.

The current Western concern around securing networks and devices will extend outward to cover the entire supply chain, allowing countries to secure economic and political power while still sharing in technological advances.

While it's unlikely that we’ll return to the protectionist policies of the early 20th century, we will see a greater bifurcation of technology. We are already seeing it when it comes to things like semiconductors and applications ─ there is one set of technologies operating in the West, one in China, another in Russia, and so on.

Slowing Pace Of Innovation

The world moves in big cycles, shifting back and forth between protectionism and globalisation. In the coming, more protected, cycle, consumers will still enjoy a lot of the benefits of technology but things like 6G will take longer to roll out and likely cost much more.

The growing bifurcation of technologies and protection of national interests will likely lead to a slowing of innovation. We are already seeing tech giants cutting jobs in anticipation of things slowing down, readjusting the levels of investment that delivered the tech boom of the past two decades.

And with China no longer serving as the world’s factory, products will also become more expensive. Shifting manufacturing out of China will likely cause a lot of friction and disruption of supply chains in the near future. In the longer term, however, this shift may help rebalance job creation and wealth distribution, especially in developing regions like Africa.

The good news is that the learnings and development will still be shared; the global market won’t be closed just yet. Rather, organisations, like the Mobile Ecosystem Forum (MEF), will step in to become facilitators of collaboration and development, helping manufacturers, software engineers and application developers work closely together to create technologies that work seamlessly across different regions, networks and devices.

Summary

The focus on China as a malicious security threat is somewhat of a distraction. The real battle is in military and economic power. Security, in this lens, is about protecting the entire supply chain in order to be able to protect national interests. 

This end-to-end protection of service delivery will likely lead to a bifurcation of technologies and standards, potentially creating localised services tied to particular nations, regions, and/or technology providers, and a shift away from globalisation.

It will be interesting to see how this plays out on a geopolitical stage. 

Dario Betti is CEO of the Mobile Ecosystem Forum 

References: 

CBN:      Gov.UK :    BBC

You Might Also Read: 

Cyber Security Issues For The Mobile Industry:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Immutable Storage Is The One Solution That Will Keep Your Data Safe
Has Someone Taken Out A Subscription Against You? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TestingXperts

TestingXperts

TestingXperts is a specialist software QA and testing company.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Authorize.Net

Authorize.Net

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transactions.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

Government Communications Security Bureau (GCSB)

Government Communications Security Bureau (GCSB)

GCSB contributes to New Zealand’s national security by providing information assurance and cyber security to the New Zealand Government and critical infrastructure organisations.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

Thridwayv

Thridwayv

Thirdwayv helps your enterprise realize the full potential of loT connectivity. All while neutralizing security threats that can run ruin the customer experience - and your reputation.

Envieta

Envieta

Envieta is a leader in cryptographic solutions. From server to sensor, we design and implement powerful security into new or existing infrastructure.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

Axellio

Axellio

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

Information Technology Solutions (ITS)

Information Technology Solutions (ITS)

Information Technology Solutions is a single source provider for managing and securing mission-critical IT services.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

Cisilion

Cisilion

Cisilion's mission is simple – to transform and connect business with next-generation IT infrastructure. Our expertise includes enterprise networking, security, data centre & cloud, managed services.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.