FILE PHOTO: Hands are seen on a keyboard in front of a displayed cyber code in this picture illustration taken October 4, 2018. REUTERS/Dado Ruvic/Illutration
December 14, 2021
By Guy Faulconbridge
LONDON (Reuters) – Britain said it would push back at what it casts as attempts by Russia and China to establish national sovereignty over the communications arteries and emerging technologies which will shape the 21st Century.
Britain depicts China and Russia as strategic rivals whose rush for control of some major technologies such as artificial intelligence, quantum computing and microprocessor design could threaten both Western security and a relatively free internet.
“China and Russia continue to advocate for greater national sovereignty over cyberspace as the answer to security challenges,” according to Britain’s new National Cyber Strategy to be published on Wednesday.
“Debates over the rules governing cyberspace will increasingly become a site of systemic competition between great powers, with a clash of values,” Britain said.
That competition, Britain said, will increasingly put pressure on a free internet as big powers and major technology companies promote competing visions of technical standards and internet governance.
The United States remains the world’s top cyber power, followed by China, the United Kingdom, Russia and the Netherlands, according to Harvard University’s Belfer Center Cyber 2020 Power Index.
China and Russia have both repeatedly denied Western allegations that either was behind cyber attacks. Both Moscow and Beijing have said the West is in no position to lecture them on hacking or on the technologies they choose to develop.
Britain said 6G, artificial intelligence, microprocessors, and a range of quantum technologies including quantum computing, quantum sensing and post-quantum cryptography were priorities for development.
Protecting data would become more crucial, Britain said.
“This infrastructure is a vital national asset,” Britain said. “We will take a greater role in ensuring that data is sufficiently protected when processed, in transit, or stored at scale, for example in external data centres.”
(Reporting by Guy Faulconbridge; editing by Michael Holden)