top of page

MI5’s Investigation into Chinese Green Technology in the UK

Writer: Team WrittenTeam Written

MI5 is conducting an investigation into the national security implications of Chinese-manufactured green technology being used in the United Kingdom’s critical infrastructure. This includes components such as wind turbines, solar panels, and industrial battery systems deployed in the UK’s renewable energy sector. There is growing concern that these technologies could be exploited for espionage or sabotage. While no confirmed incidents have been reported to date, officials fear that embedded hardware or software in Chinese-supplied equipment might enable unauthorized data collection or remote interference in energy systems.


This investigation comes amid a broader awareness in the UK government of potential vulnerabilities associated with foreign involvement in critical infrastructure. It aligns with recent warnings about the scale of state-sponsored espionage and the need to safeguard the nation’s push toward clean energy. MI5, in coordination with other agencies, is assessing the scope of Chinese involvement in UK green technology projects and evaluating the security of these systems. The goal is to identify any weaknesses and ensure robust protective measures are in place so that the drive for renewable energy does not come at the expense of national security.


The United Kingdom’s rapid expansion of renewable energy has been supported by technology and equipment from various international suppliers, including those from the People’s Republic of China. Chinese companies are major producers of green technology worldwide, dominating the manufacturing of solar panels, wind turbine components, and high-capacity batteries. As the UK strives to meet ambitious climate targets and upgrade its energy infrastructure, it has inevitably imported Chinese-made renewable energy hardware to build wind farms, solar parks, and energy storage facilities.


This growing presence of Chinese green technology in critical UK projects has raised security questions within the government and intelligence community. Senior officials and experts have pointed out that infrastructure critical to national power supply could be exposed if potential adversaries have built or programmed the underlying components. In recent months, political leaders and security agencies have increased scrutiny of foreign technology in sensitive sectors. Against this backdrop, MI5 has launched an investigation to determine whether the use of Chinese green technology poses risks to the UK’s national security and, if so, how to mitigate them.


Chinese manufacturers have become key players in the global wind power industry. In the UK, attention has centered on a major offshore wind project known as the Green Volt wind farm in the North Sea. This project – poised to be one of Europe’s largest floating wind farms – is slated to use turbines supplied by Mingyang Smart Energy, a Chinese firm. The involvement of a Chinese supplier in such a critical project triggered alarms within the Ministry of Defence and other departments, given that wind farms form part of the UK’s strategic energy infrastructure. Officials fear that relying on foreign-made turbines could introduce unseen vulnerabilities. For example, if control systems or software for these turbines remain under the manufacturer’s oversight, there is a risk (however theoretical) that an external actor could gain access or even shut down the turbines remotely. These concerns have prompted calls for guarantees that operational control of wind turbines remains solely in British hands and that no hidden “backdoor” access is built into the systems.


The UK’s solar energy sector also relies heavily on Chinese technology. A significant proportion of photovoltaic (PV) panels installed across British solar farms and rooftops are produced by Chinese companies. This is largely due to China’s dominance in solar panel production and cost-effectiveness. While solar panels themselves primarily convert sunlight to electricity, the supporting electronics – such as inverters and control units – are also often imported from China. These devices communicate with grids and can be remotely monitored or updated. MI5 is examining whether such equipment could be manipulated to disrupt power generation or to siphon data. Although there is no public evidence of malicious exploitation of solar infrastructure, the mere presence of foreign-manufactured control systems in the national grid raises a flag for security planners. The concern is that, in a time of crisis or conflict, devices built with inadequate security or under hidden influence could be instructed to malfunction or gather intelligence (for instance, by reporting detailed performance data that reveals how the UK’s energy grid is operating).


As the UK increases its capacity for energy storage (to balance the intermittent nature of wind and solar power), it has started deploying large-scale industrial battery systems. Chinese companies are among the world leaders in advanced battery technology and have supplied battery cells and management software for projects globally. In the UK, some utility-scale battery installations and electric vehicle charging infrastructure include Chinese-made components. These battery systems typically come with sophisticated software for managing charging cycles, thermal control, and grid connectivity. MI5’s investigation covers whether such software or hardware could be vulnerable to external control or cyber infiltration. A compromised battery system could, in theory, be shut down or have its output manipulated, potentially destabilizing parts of the electric grid. Additionally, batteries and smart grid devices often communicate usage data; if intercepted, such data might reveal patterns about energy usage or other sensitive operational details.


Chinese green technology has a considerable footprint in the UK’s clean energy landscape. This technology is often high-quality and cost-competitive, helping the UK advance its renewable energy goals. However, its prevalence in critical systems means that the integrity and security of these components are now under review. MI5’s task is to map out exactly where Chinese-supplied equipment is used and to evaluate how much control or access foreign suppliers might have once the equipment is installed and running in the UK.


MI5’s investigation is driven by several interrelated security concerns. The agency is examining how Chinese-sourced green technology could be leveraged – intentionally or unintentionally – to compromise UK interests. One major worry is that equipment made in China could secretly facilitate espionage. In practice, this might mean hidden sensors or data-transmission capabilities built into hardware, or software that can covertly send information back to the manufacturer (and by extension, potentially to the Chinese state). For instance, an offshore wind turbine’s control system might be able to record and transmit data about the power grid’s status or even surrounding activities. Even if the data seems innocuous (like performance metrics), in aggregate it could reveal patterns or vulnerabilities in UK infrastructure. Moreover, any connection that allows remote monitoring could theoretically be used as an entry point into broader networks. The concern is not just hypothetical; it stems from China’s known track record of industrial and cyber espionage. MI5 analysts are therefore scrutinizing whether ostensibly benign green technologies could be Trojan horses that provide a channel for intelligence-gathering on UK soil.


Another critical concern is the possibility of remote interference or shutdown of key systems. If a hostile actor gained the ability to control or disable energy infrastructure components, they could wreak havoc during a diplomatic crisis or conflict. For example, if the software running a fleet of wind turbines or a grid battery system is maintained by a company with ties to China, there is a risk (however small in peacetime) that in extreme circumstances those systems could be instructed to shut down. Even a temporary loss of a large wind farm or a major battery buffer during peak demand could cause blackouts or grid instability. Worse, simultaneous disruptions across multiple sites could strain the energy network’s resilience. MI5 is investigating whether adequate safeguards are in place to prevent such scenarios. This includes verifying that no unauthorized remote access is possible and that manual overrides or local controls can assert full control if needed. The goal is to ensure the UK can operate its critical green energy assets independently, without fear of an outside entity literally “turning off the lights.” While there is no evidence that China has ever exercised such a capability abroad, the mere potential for sabotage is taken seriously given the strategic importance of energy security.


Beyond direct exploits, MI5’s analysis is also considering the broader strategic dependency that comes with heavy reliance on Chinese technology. If a significant portion of the UK’s renewable energy infrastructure is built with Chinese components, the UK could become vulnerable to supply chain pressures. In a geopolitical standoff, China could theoretically leverage its position as a supplier – for instance, by withholding critical replacement parts, delaying software updates, or prioritizing its own needs over export commitments. Such leverage might not result in immediate sabotage, but it could erode the performance and reliability of UK infrastructure over time. Furthermore, dependence on foreign technology might limit the UK’s visibility into how systems work internally. If problems or anomalies arise in Chinese-made equipment, British engineers might have to rely on the manufacturer for solutions, creating a permanent reliance on external expertise. This aspect of risk is less about secret malicious code and more about national resilience: ensuring that the push for green energy does not inadvertently hand another nation enduring influence over Britain’s critical systems.


In evaluating these risks, MI5 is careful to differentiate between theoretical vulnerabilities and actual threats. At this stage, these scenarios remain potential risks rather than realities. The investigation has not uncovered any active attempt to use green technology for espionage or sabotage in the UK. However, the purpose of the intelligence review is to stay ahead of such threats by identifying weaknesses now and advising on how they can be fixed or mitigated before any adversary seeks to exploit them.


MI5’s approach to this issue is proactive and multifaceted. Recognizing that the challenge spans both the cyber domain and physical supply chains, MI5 is working closely with other branches of the UK’s national security apparatus, including GCHQ’s National Cyber Security Centre (NCSC), the Ministry of Defence (MoD), and relevant government departments like the Department for Energy Security and Net Zero.


MI5 is first establishing a comprehensive map of where Chinese green technology is present in UK infrastructure. This involves gathering intelligence on contracts, suppliers, and components in major energy projects. For example, identifying all projects that have purchased Chinese-made turbines, solar panel systems, or battery units. MI5 is leveraging intelligence from open sources, partner agencies, and possibly covert sources to understand the extent of Chinese involvement, whether through direct investment, joint ventures, or supply agreements. This mapping exercise is crucial because it pinpoints the potential points of vulnerability that require closer examination.


In cooperation with cyber security experts and engineers, MI5 is evaluating the technical security of specific equipment and software provided by Chinese companies. This may entail analysis of hardware for any unusual modules or chips, and rigorous testing of software/firmware for hidden functions or backdoors. The NCSC’s technical expertise is likely being utilized to conduct cybersecurity audits on sample devices – for instance, inspecting a Chinese-manufactured turbine’s control system in a lab setting to see if it communicates unexpectedly or has undocumented access channels. If any suspicious capabilities are found, further investigation would determine if they pose a genuine threat or if they can be neutralized through patches and security controls.


MI5 analysts are also conducting “red team” scenario planning: imagining how a hostile actor might try to exploit the identified technologies. By thinking like an adversary, they assess which vulnerabilities would be most attractive to exploit and what impact that could have. For instance, they might simulate a scenario in which an attacker attempts to simultaneously shut down multiple wind farms via a common manufacturer’s maintenance link, and then examine how quickly such an attack could be detected and countered. This analytical exercise helps MI5 provide informed warnings and recommendations to policymakers about which risks are most urgent. It also helps determine if additional countermeasures (such as intrusion detection systems or stricter access controls on energy management networks) are needed.


As part of the investigation, MI5 and partner agencies are engaging in quiet dialogue with the energy industry and international allies. UK energy companies operating these wind farms or solar parks need to be aware of the risks and cooperate in security assessments. MI5 is likely facilitating information sharing with these companies – for example, alerting them to specific known vulnerabilities or urging them to adopt certain security practices (like changing default passwords, restricting remote access, etc. on their equipment). Similarly, MI5 is in contact with intelligence partners in countries like the United States and European allies, who have parallel concerns about Chinese technology in their own infrastructure. By comparing notes on findings, the UK can benefit from allies’ experiences (for instance, any known incidents or discovered malware in similar equipment abroad) and contribute to a coordinated Western response to ensure critical systems remain secure.


At present, MI5’s assessment is ongoing and remains largely precautionary. Early findings have not revealed any concrete evidence of espionage implants or sabotage plots linked to Chinese green tech in the UK. However, MI5 emphasizes that the absence of evidence is not evidence of absence. The mere fact that vulnerabilities exist is enough to warrant diligent preventative action. This investigation has heightened awareness within government circles about the need for stringent security standards in procurement and deployment of all critical infrastructure technology, regardless of country of origin. MI5’s role is to provide the intelligence foundation so that informed decisions can be made about how to balance the benefits of Chinese technology against the security risks.


The alarm raised by this issue has prompted a broader policy discussion in the UK about how to handle foreign technology in critical sectors. Government officials have been pressed by lawmakers to explain what measures are being taken to protect national security while pursuing renewable energy targets. In parliamentary sessions, questions have been asked directly about the implications of involving Chinese firms in projects like the Green Volt wind farm. The government’s response so far has been one of cautious assurance, emphasizing that robust processes are in place to mitigate risks.


The government has indicated that any major energy project involving foreign suppliers undergoes a security review. In the case of the Green Volt wind farm, ministers have stated that they are subjecting the project to the “highest level” of security scrutiny. This involves evaluating the specific arrangements with the Chinese turbine supplier to ensure that once the turbines are installed, they cannot be covertly accessed or controlled from abroad. Officials have cited procedures to minimize risk, such as requiring that critical software systems be isolated from external networks and that data links, if any, are tightly monitored.


Policymakers are pushing for guarantees that operational control of key infrastructure lies with UK entities. For example, there have been calls to ensure that the software controlling wind turbines or batteries is managed by a UK-based team (or at least under UK jurisdiction) rather than left entirely in the hands of the foreign manufacturer. One practical outcome from this debate is an emphasis on establishing clear handover protocols: once a turbine or system is commissioned, the manufacturer’s remote access should be limited or revoked, handing full control to the British operator. The government is examining contractual and technical mechanisms to enforce this, such as escrowed source code, on-site supervisory control systems, and requirements for local authentication of any software updates.


In light of the concerns, regulators may introduce stricter standards for cybersecurity and supply chain transparency in the energy sector. The UK already has laws addressing national security risks in technology (for instance, the Telecommunications Security Act was used to remove high-risk vendors like Huawei from 5G networks). Similar principles are being considered for the energy domain. This could mean expanding the mandate of the National Security and Investment Act to cover significant renewable energy equipment deals, allowing the government to block or impose conditions on deals that pose security concerns. Additionally, industry standards might be updated to require that all grid-connected devices meet certain cybersecurity certifications, regardless of origin.


Another aspect of the policy response is the encouragement of domestic or non-adversarial sources for green tech. While not an immediate solution, the government has signaled interest in reducing reliance on any single foreign country for critical equipment. This could translate into support for UK-based manufacturing of wind and solar components, partnerships with trusted allies (for example, sourcing more turbines from European, American, or Japanese companies), and investment in research to innovate alternatives. By diversifying suppliers, the UK can maintain energy security even if one source becomes problematic. This long-term strategy addresses the strategic dependency issue highlighted by MI5’s assessment.


The government, guided by MI5’s and others’ findings, is establishing mechanisms for ongoing monitoring of the situation. Rather than treat it as a one-time review, there is an understanding that as technology evolves and geopolitical relations shift, new risks can emerge. The security agencies will continue to watch for any signs of interference or espionage related to these technologies. The government has also committed to working with international allies in sharing intelligence on threats to critical infrastructure. This collaborative stance helps ensure that the UK stays ahead of potential threats and benefits from a collective defensive posture among allied nations facing similar challenges with Chinese technology.


So far, the official stance is that the UK can pursue its green energy goals without compromising security, provided appropriate precautions are in place. Government ministers have sought to reassure both Parliament and the public that they are not naive about the risks. They acknowledge the concerns raised by intelligence officials and have pledged to integrate those insights into decision-making. However, they also emphasize the importance of pragmatism: outright rejection of all Chinese technology could slow down crucial energy projects and increase costs, so the focus is on risk management rather than blanket bans at this stage.


MI5’s investigation into Chinese green technology in the UK is a prudent response to a complex challenge: balancing the imperatives of sustainability and national security. The UK’s transition to a low-carbon economy is essential and urgent, but it must be pursued with eyes open to the geopolitical realities that accompany global supply chains. Chinese companies will likely remain major players in green tech due to their scale and expertise, and completely disentangling from them may not be feasible in the short term. Therefore, the emphasis must be on intelligent risk mitigation.


To date, the investigation has not uncovered specific malicious acts tied to Chinese-made energy equipment in the UK. There is no evidence of covert “spy hardware” planted in wind turbines or solar farms, nor of any attempt by a foreign power to disrupt operations via these avenues. This absence of direct threats is reassuring, but it also reflects the fact that the UK has only just begun to rigorously examine these systems from a security standpoint. The findings underscore that many critical systems were integrated primarily for efficiency and performance, with security as an assumption rather than a verified guarantee. Now, with MI5’s input, that security assumption is being tested and strengthened.


Based on the insights gathered, MI5 is likely to recommend a series of measures to fortify the UK’s defenses in this area. Before any foreign-supplied technology is installed in critical infrastructure, it should undergo rigorous vetting for security vulnerabilities. This vetting should not be a one-time process but continuous, covering software updates and hardware upgrades over the system’s lifespan.


Contracts with suppliers should include strict clauses about remote access and data handling. The default stance should be that overseas manufacturers have no remote kill-switch capability. If remote monitoring or maintenance is necessary, it must be done through secure, government-supervised channels.


The energy sector should incorporate the possibility of tech-based interference into its emergency planning. This means having contingencies for quickly isolating or shutting off compromised components and maintaining power supply through alternative means if certain installations are lost or taken offline unexpectedly.


Intelligence and security agencies should maintain enhanced collaboration with industry regulators and companies. Creating a formal liaison or task force for critical infrastructure security could ensure that warnings and threat intelligence flow quickly to those who can act on them. Energy companies, on their part, should be encouraged (or required) to report any anomalies in system behavior that could hint at interference.


In the bigger picture, MI5’s analysis supports a long-term strategy of reducing high-risk dependencies. Investing in homegrown innovation, forging technology partnerships with allies, and diversifying supply chains all contribute to a more secure foundation for the UK’s green economy. Over time, such steps will diminish the leverage any single foreign actor might have over the UK’s critical systems.


The UK’s embrace of green technology remains vital to its future, but this episode serves as a reminder that national security must evolve in tandem with technological change. MI5’s investigation has elevated awareness that even technologies designed to combat climate change can become vectors of risk if not properly secured. Policymakers and security professionals are now armed with better information about where potential weaknesses lie. Going forward, the integration of security considerations into the deployment of renewable energy infrastructure will be standard practice. By acting proactively on MI5’s recommendations, the UK can continue to innovate and lead in clean energy while keeping the nation safe from covert threats. This balanced approach will help ensure that the benefits of green technology are realized without opening doors to espionage or sabotage. The ultimate goal is a resilient, clean energy system that suppliers cannot easily exploit – a goal that is now firmly on the path to being achieved.



 
 
bottom of page