The first point to be emphasised is that despite the current furore over Russian hackers undermining Western elections, the major threats are from China. As Robert Hannigan, the former director of the UK’s GCHQ, writes: “China manufactures an estimated 90 per cent of the world’s IT hardware, including three-quarters of all smartphones.” But, not only is Chinese technology ubiquitous, “it is increasingly world-leading”. The leading suppliers of the new faster 5G technology are all Chinese. This poses a security risk. The British have been experimenting with “scrutinising the software and hardware installed by Huawei in UK networks". This involves scanning a vast amount of code, but there are severe difficulties in understanding the IT supply chains. They can be very long and software vendors could “subcontract its code writing many times over. Even where hardware and software can be scrutinised, spotting the difference between an engineering mistake and a deliberate ‘backdoor’ is often a matter of judgement”. The vast resources needed to vet the IT global supply chain are not available and even if they were, they would reduce the net economic benefit from using Chinese IT components in mobile telephony. It is in this context that an unrecognised security benefit of President Trump’s current trade war with China is that it will disrupt these Chinese-dominated supply chains and provide incentives for their replacement by indigenous ones. In a war, such security benefits trump any foregone economic benefits.
In 2015, the then President Barack Obama and President Xi Jinping signed the US-China cyber agreement that neither China nor the US would in Mr Xi’s words “be engaged in or knowingly support online theft of intellectual properties”. Yet, in November 2017, “the US Department of Justice unsealed an indictment against three individuals from Chinese internet security firm Boyusec, for cyber attacks against financial, engineering and technology companies”. The Justice Department failed to get any Chinese cooperation in its investigation, leading two commentators to note “that this indictment suggests that China is either violating the 2015 deal or exploiting its ambiguities (Zack Cooper, ps.34-35)”. This reflects Hobbes’ dictum “that covenants without the sword, are but words, and of no strength to secure a man at all”.
The basic problem in dealing with China is that it was incorporated into the international trading system on the hope that it was moving towards a private enterprise-based market economy whose actions could be judged by conventional economic criteria. Thus, mainstream economists have maintained that in a market economy, dumping would not be in the economic interest of private firms. But, as China has moved towards an authoritarian state capitalism, it has used trade policy to further its geopolitical aims even if it leads to private losses through dumping. This raises the question whether there can ever be mutually beneficial free trade with a strategic enemy.
In a survey, “Assessing the Risks of Cyber Terrorism, Cyber War and other Cyber Threats”, www.csis.org, James Lewis of the Center for Strategic and International Studies finds that “infrastructure in large industrial countries are resistant to cyber attack... Infrastructure systems, because they have to deal with failure on a routine basis are also more flexible and responsive in restoring service than early analysts realized”. The real security risks are from espionage and cybercrime. But even for infrastructure, the vulnerabilities to cyberattack increases “as societies move to a ubiquitous computing environment when more daily activities have become automated and rely on remote computer networks”. Also, the move from “relying on dedicated proprietary networks to using the Internet and internet protocols for their operation” creates new avenues of access.
It is in this context that the Indian government’s plans to prohibit the international transfer of data generated by Indian e-commerce users and the Reserve Bank of India’s prohibition of overseas transfers of Indian financial data should be seen. This will, as Financial Times has argued in an editorial (September 11, 2018), be a “further move towards breaking up the world into a series of data regimes” — a “splinternet” — which “could seriously retard the growth of data enabled innovation beyond simply the delivery of online services”. But this economic argument is unpersuasive, just as that for free immigration across national borders is no longer plausible for political reasons. Just as physical borders are an important symbol of national sovereignty, so are the growing borders in cyberspace in an increasingly dangerous geopolitical world.
In cyberspace, bilateral agreements between states to control their indigenous e-data (as Germany is instituting for reasons of privacy and security) may be desirable to get some of the gains from free trade in electronic data. It has also been suggested by Keith Alexander (Financial Times, September 5, 2018) that to counter the threat of cyberwar from the League of Dictators — particularly China — a cyber Nato of the free world should be set up. This is worth exploring. But it would need the support of the US, which for the moment seems doubtful under President Donald Trump.
To read the full story, Subscribe Now at just Rs 249 a month
Already a subscriber? Log in
Subscribe To BS Premium
₹249
Renews automatically
₹1699₹1999
Opt for auto renewal and save Rs. 300 Renews automatically
₹1999
What you get on BS Premium?
- Unlock 30+ premium stories daily hand-picked by our editors, across devices on browser and app.
- Pick your 5 favourite companies, get a daily email with all news updates on them.
- Full access to our intuitive epaper - clip, save, share articles from any device; newspaper archives from 2006.
- Preferential invites to Business Standard events.
- Curated newsletters on markets, personal finance, policy & politics, start-ups, technology, and more.
Need More Information - write to us at assist@bsmail.in