Tech Sovereignty: Why MI6 Says Silicon Valley Threatens National Security
- Aisha Washington

- Dec 18, 2025
- 7 min read

When the head of British intelligence walks onto a stage to define the threats of the mid-21st century, the world listens for mentions of nuclear proliferation or terrorist cells. Yet, in December 2025, Blaise Metreweli, the first female chief of MI6 ("C"), pointed her finger at a different kind of adversary: the unchecked power of technology executives.
The traditional definition of National Security is eroding. We are witnessing a historic shift where private entities possess capabilities that dwarf those of many sovereign states. This is no longer science fiction or the plot of a Bond movie; it is the operational reality of global geopolitics. Metreweli, who ascended to the top job from the role of "Q" (Director of Technology), represents a fundamental change in how intelligence agencies view the world. Her message is stark: Tech Sovereignty—the ability of corporations to control digital infrastructure without government oversight—has become a primary challenger to the authority of the state.
Practical Responses to the Crisis: Coding as Tradecraft and Public Literacy

Before analyzing the geopolitical implications, we must look at the operational changes this shift demands. The era of the "gentleman spy" relying solely on human intelligence is over. Metreweli’s speech offered concrete, actionable intelligence on how both security professionals and civilians must adapt to survive in an era dominated by Tech Sovereignty.
Why National Security Personnel Must Master Python
For decades, the core competency of an intelligence officer was the ability to recruit agents and move undetected in foreign capitals. While those skills remain, they are now insufficient. Metreweli laid out a new, non-negotiable standard for the workforce: proficiency in code.
Intelligence officers effectively need to be as fluent in Python as they are in Russian or Mandarin. This is not about every spy becoming a software engineer, but about possessing the technical literacy to understand the environment they operate in. When the battlespace is digital, code is the terrain. An officer who cannot understand how data is scraped, how an algorithm prioritizes information, or how a backdoor is exploited is an officer who cannot see the battlefield.
This directive changes recruitment pipelines. Agencies are no longer just looking for political science majors from elite universities. The demand has shifted toward individuals who can bridge the gap between human psychology and machine logic. National Security now relies on "Coding as tradecraft." It is a practical skill set required to dismantle the digital infrastructure adversaries use to undermine democratic institutions.
Civilian Defense Against Algorithmic Manipulation
The responsibility does not rest solely on intelligence agencies. Metreweli’s guidance extends to the general public, specifically regarding education. The primary weapon in the current hybrid war is the manipulation of information to sow discord.
The solution proposed is a radical update to educational curriculums. Children must be taught to evaluate the provenance of information just as they are taught to read. This goes beyond simple "fact-checking." It requires teaching the next generation to recognize the emotional triggers embedded in algorithms—identifying when a piece of content has been engineered specifically to provoke outrage or fear.
This is a form of cognitive defense. If the population remains passive consumers of algorithmically fed content, no amount of National Security spending can protect the social fabric. The defense against disinformation is a populace that understands the economic incentives behind the screen.
The Rise of Tech Sovereignty and the Decline of State Control

The central tension of our time is the consolidation of power in hands that were never elected. Tech Sovereignty refers to the capacity of major technology companies to exert influence that rivals, and often surpasses, that of nation-states.
How Tech Sovereignty Differs from Traditional Hard Power
Historically, power was measured in land, resources, and military capacity—"hard power." Industrial giants of the 20th century, like General Motors or Ford, held immense sway, but they were ultimately tethered to the physical world. They had factories, inventory, and supply chains that fell under the jurisdiction of local laws.
The new Tech Sovereignty operates differently. It is built on "soft power" amplified by global reach. A tech CEO does not need an army to destabilize a region; they only need to tweak an algorithm or suspend service provisions. They effectively control the public square, the marketplace, and the communication grid.
This creates a governance void. While states grapple with bureaucracy and borders, tech entities operate in a borderless cloud. They can implement policies on speech, privacy, and commerce that affect billions of users instantly, bypassing the legislative processes of democratic nations. The concern for National Security arises because these companies often have no allegiance to any specific flag. Their loyalty lies with shareholders and the optimization of their platforms, objectives that frequently conflict with the stability of the nations they operate within.
The Fluidity of Capital vs. The Rigidity of Borders
A key differentiator identified by observers is the liquidity of tech assets. Unlike the steel mills of Detroit, the assets of Silicon Valley—code, intellectual property, and cash reserves—are highly mobile. If a nation attempts to impose strict regulations or taxes, a tech giant can move its legal domicile or its digital infrastructure with relative ease.
This mobility holds nations hostage. Governments are terrified of stifling innovation or losing tax revenue, so they capitulate to the demands of these corporations. It creates a dynamic where Tech Sovereignty dictates terms to the state, rather than the other way around. We are seeing a return to a form of power structure where corporate entities act as "lords," granting access to their digital fiefdoms only as long as the users—and the governments—play by their rules.
National Security in the Gray Zone: The Russia Factor

The abstract threat of corporate power is compounded by tangible threats from hostile states. Metreweli characterized the current global security environment as the "gray zone"—the murky space between peace and total war.
Defining the "Space Between Peace and War"
The binary distinction between being "at war" or "at peace" is obsolete. Adversaries like Russia have mastered the art of operating below the threshold that would trigger a conventional military response (such as Article 5 of NATO).
In this gray zone, National Security is constantly tested. Attacks come in the form of cyber-intrusions, election interference, and economic sabotage. These are acts of aggression that degrade a nation's ability to function without ever firing a missile. The scary reality is that Western democracies often lack the legal and operational frameworks to respond effectively to these sub-threshold attacks. They are slow to attribute blame and hesitant to retaliate, fearing escalation.
When Algorithms Become Weapons of Sabotage
The intersection of Tech Sovereignty and hostility from state actors like Russia creates a dangerous vulnerability. Hostile states exploit the platforms built by Western tech companies. They weaponize the very openness of the internet against democratic societies.
Metreweli highlighted "sabotage" and "disinformation" as twin pillars of this strategy. Russian operatives do not need to build their own distribution networks; they simply hijack the algorithms of Twitter (X), Facebook, or TikTok. They pump noise into the system, eroding trust in institutions.
The danger is that the tech platforms themselves often lack the incentive or the capability to police this effectively. Their business models depend on engagement, and divisive content drives engagement. Thus, the mechanics of Tech Sovereignty—profit-driven algorithmic governance—inadvertently aid the adversaries of National Security. The tech giants provide the gun; the hostile states simply pull the trigger.
Corporate Feudalism: The Consolidation of Power

Underlying the security concerns is a shift in the social contract. We are drifting toward a structure often described as "techno-feudalism." In this arrangement, the vast majority of the population relies entirely on a small number of platforms for their economic survival, social connection, and information intake.
The Economic Disparity of Modern Tech Sovereignty
There is a profound disconnect between the financial valuation of these companies and their contribution to the broader economy in terms of employment. The industrial giants of the past employed hundreds of thousands of workers, creating a broad middle class. Today’s tech giants can generate trillions in value with a fraction of that workforce.
This concentration of wealth and power distorts the democratic process. When a single company has a larger GDP than most countries but employs fewer people than a regional supermarket chain, the balance of interests is skewed. The "lords" of this new era are accountable to no one but their boards.
Tech Sovereignty is not just a challenge for spies and soldiers; it is a challenge for citizens. The consolidation of power means that decisions affecting the daily lives of millions—what they see, what they can buy, and what they believe—are made in closed boardrooms.
The warning from MI6 is clear. The tools of the 21st century have outpaced the rules of the 20th. Unless nations can reassert their authority and integrate technical literacy into the heart of their defense strategies, they risk becoming vassal states in a world run by code.
FAQ Section
What is the core message of Blaise Metreweli’s MI6 speech?
The central message is that technology companies have accumulated power comparable to nation-states, creating a "Tech Sovereignty" that rivals traditional government authority. She warns that this shift challenges democratic governance and national security.
Why does MI6 emphasize learning Python for intelligence officers?
Programming skills are now considered "tradecraft" because modern espionage and warfare occur largely in the digital domain. Understanding code is essential for officers to interpret data, identify cyber threats, and operate effectively in the field.
What is the "Gray Zone" in the context of national security?
The Gray Zone refers to the space between peace and declared war, where adversaries like Russia conduct sabotage, cyberattacks, and disinformation campaigns. These actions are designed to destabilize nations without triggering a conventional military response.
How does "Tech Sovereignty" differ from the power of past industrial giants?
Unlike industrial giants that were tied to physical locations and local laws, modern tech companies possess "soft power" and highly mobile assets. Their ability to move capital and code across borders makes them harder for individual nations to regulate or tax.
What is the proposed civilian solution to algorithmic manipulation?
The primary solution is education reform that teaches children to evaluate information sources and understand algorithmic triggers. The goal is to create a population that is resilient against disinformation designed to provoke fear or anger.


