I have been reading an excellent but terrifying novel by two cyber tech specialists, Peter Singer and August Cole, called Ghost Fleet, which imagines how the Chinese ambition to push the US Navy out of the Western Pacific would play out. It begins with Chinese hackers disabling the Pentagon’s command and control system which makes US fleets blind, particularly as many have Chinese manufactured electronic components with “backdoors” embedded in their operational systems. With a Pearl Harbor-type attack on the US Hawaiian fleet, China occupies Hawaii and controls the Western Pacific. In the fightback, the US resurrects its old naval ships, which had been mothballed but have the advantage of not having any modern electronics that could be hacked. This is the ghost fleet which is armed by a newly invented Mach7 cannon called the rail-gun, developed by the US’ DARPA to counter the Chinese new DF21-D anti-ship missile known as the ‘carrier killer’. This US ghost fleet destroys the hitherto triumphant Chinese fleet it engages near Hawaii. How realistic is this and what are the lessons to be learnt from this imagined future?
The first point to be emphasised is that despite the current furore over Russian hackers undermining Western elections, the major threats are from China. As Robert Hannigan, the former director of the UK’s GCHQ, writes: “China manufactures an estimated 90 per cent of the world’s IT hardware, including three-quarters of all smartphones.” But, not only is Chinese technology ubiquitous, “it is increasingly world-leading”. The leading suppliers of the new faster 5G technology are all Chinese. This poses a security risk. The British have been experimenting with “scrutinising the software and hardware installed by Huawei in UK networks". This involves scanning a vast amount of code, but there are severe difficulties in understanding the IT supply chains. They can be very long and software vendors could “subcontract its code writing many times over. Even where hardware and software can be scrutinised, spotting the difference between an engineering mistake and a deliberate ‘backdoor’ is often a matter of judgement”. The vast resources needed to vet the IT global supply chain are not available and even if they were, they would reduce the net economic benefit from using Chinese IT components in mobile telephony. It is in this context that an unrecognised security benefit of President Trump’s current trade war with China is that it will disrupt these Chinese-dominated supply chains and provide incentives for their replacement by indigenous ones. In a war, such security benefits trump any foregone economic benefits.
The first point to be emphasised is that despite the current furore over Russian hackers undermining Western elections, the major threats are from China. As Robert Hannigan, the former director of the UK’s GCHQ, writes: “China manufactures an estimated 90 per cent of the world’s IT hardware, including three-quarters of all smartphones.” But, not only is Chinese technology ubiquitous, “it is increasingly world-leading”. The leading suppliers of the new faster 5G technology are all Chinese. This poses a security risk. The British have been experimenting with “scrutinising the software and hardware installed by Huawei in UK networks". This involves scanning a vast amount of code, but there are severe difficulties in understanding the IT supply chains. They can be very long and software vendors could “subcontract its code writing many times over. Even where hardware and software can be scrutinised, spotting the difference between an engineering mistake and a deliberate ‘backdoor’ is often a matter of judgement”. The vast resources needed to vet the IT global supply chain are not available and even if they were, they would reduce the net economic benefit from using Chinese IT components in mobile telephony. It is in this context that an unrecognised security benefit of President Trump’s current trade war with China is that it will disrupt these Chinese-dominated supply chains and provide incentives for their replacement by indigenous ones. In a war, such security benefits trump any foregone economic benefits.
Illustration by Ajay Mohanty
Disclaimer: These are personal views of the writer. They do not necessarily reflect the opinion of www.business-standard.com or the Business Standard newspaper

)