In the last months a meme went viral on social media networks that showed a multiple-choice test with the questions “Who is pushing remote working in your company?” the answers were “CEO”, “CTO”, “Covid-19”. Mutatis mutandis this joke can be translated to many other sectors that are deeply affected by the pandemic. One of these is elections and voting modalities.
With the potential of enabling not only significant economic growth but also the innovation of critical technologies in various fields, both the US and China view 5G as one of the key influencing factors in the “great power competition”.
The UK has taken an intelligence-led approach in assessing the security of its critical network[1]. This model carefully balances the commercial imperatives of network providers with national security risk in the supply chain. An approach taken well before the current debate on 5G.
5G networks represent one of the key elements upon which the future process of digital transformation of both the economic and social level of each nation is based. Indeed, the potentialities of these networks will go well beyond the supply of telecommunications services between users.
5G technologies are reshaping the way users experience the digital sphere and, thus, their daily lives. 5G is one of the game changers that would further enable cyberspace’s potentialities for our societies, economies, and lifestyle. Yet, there are multiple and contrasting geopolitical interests and security concerns regarding 5G adoptions and implementations. The current confrontation between Chinese companies and some Western governments is emblematic. What are the political and securitarian implications of such technological disputes?
The international debate regarding the acquisition of Chinese 5G technology appears symbolic of the re-emerging Great Power Competition, and stark proof of the ongoing decoupling of the global ICT supply chain. Washington has been pressing its allies for more than a year not to adopt Chinese 5G technology and threatened drastic cuts in intelligence information-sharing with those procuring it.