What to Make of the Huawei Debate? 5G Network Security and Technology Dependency in Europe 1/2020

Page created by Johnny Little
 
CONTINUE READING
What to Make of the Huawei Debate? 5G Network Security and Technology Dependency in Europe 1/2020
1/2020

What to Make of the Huawei Debate?
5G Network Security and Technology
      Dependency in Europe
                 —
                     Tim Rühlig & Maja Björk

       PUBLISHED BY THE SWEDISH INSTITUTE OF INTERNATIONAL AFFAIRS | UI.SE
What to Make of the Huawei Debate? 5G Network Security and Technology Dependency in Europe 1/2020
Abstract
Europe is controversially discussing whether to ban the Chinese tech-giant Huawei from the roll-
out of the new generation of mobile infrastructure, better known as 5G, not least due to
conflicting pressures from the governments of the United States and the People’s Republic of
China. 5G is a critical infrastructure and will penetrate European society and its economy to an
unprecedented extent. Proponents of a ban argue that Huawei is closely allied with the
authoritarian Chinese party-state, which could utilise Huawei equipment for espionage and
sabotage. The argument is that banning Huawei is a matter of increasing network security in
Europe. This paper explains that while scepticism is reasonable, and the security concerns are
valid, a ban on Huawei is not an effective solution for generating network security. Other
technological measures – first and foremost better encryption, and redundancies coupled with
vendor diversity – would be more effective, although complete network security can never be
achieved. Scepticism of China’s influence over Huawei is reasonable. However, the idea of
banning Huawei stems, rather than from concerns over network security, from a geopolitical
logic. In this context, a ban on Huawei would help decrease European technological dependency
on China. The geopolitical fear is that China could leverage this dependency to extract political
concessions from Europe in the future. We argue that Europe should indeed respond to this
challenge but instead of striving for technological self-reliance, we discuss how the European
Union could preserve access to strategic technology by means of diversification of the supply
chain and underlying patents, coupled with “protectionism light”. We believe this could help
respond to the emerging geopolitical rivalry over high-technology such as 5G while at the same
time attempting to preserve free trade as far as possible. In short, our sceptical view on the idea
of banning Huawei from the roll-out of 5G in Europe does not stem from a trust in China or
Chinese tech companies, but rather from the perspective that it is not the most effective
response to the future challenges of 5G networks and technology dependence.

Tim Rühlig                                              Maja Björk
Research Fellow                                         Analyst
The Swedish Institute of International Affairs          The Swedish Institute of International Affairs

© 2020 The Swedish Institute of International Affairs
Language editing: Andrew Mash
Cover photo: Stefan Wermuth / AFP
What to Make of the Huawei Debate? 5G Network Security and Technology Dependency in Europe 1/2020
Content

   Introduction .................................................................................................................................. 4

   Centrality and innovation of 5G .................................................................................................... 6

   Network security concerns: the current debate ........................................................................... 8

   Geo-economics and dependencies ............................................................................................. 19

   Towards a European response .................................................................................................... 25

   Conclusion ................................................................................................................................... 29

   References ................................................................................................................................... 31

© 2019 The Swedish Institute of International Affairs
What to Make of the Huawei Debate? 5G Network Security and Technology Dependency in Europe 1/2020
Introduction                                            People’s Republic of China (PRC). China has
                                                        taken an active role in technology and
                                                        innovation, and Chinese technology
The new “fifth” generation of mobile
                                                        companies have become significant players
internet connectivity (5G) will unlock new
                                                        in 5G equipment and infrastructure in recent
and improved ways of using wireless
                                                        years. The most prominent supplier is the
technology and is expected to revolutionise
                                                        Chinese tech-giant Huawei Technologies
multiple spheres of society, not least
                                                        Co., which is also one of the world’s largest
manufacturing, construction, electricity
                                                        telecom companies.
networks, transportation and health care.
The new networks will support innovative
                                                        Huawei currently finds itself at the centre of
technologies and enable a powerful
                                                        a heated international debate over 5G
increase in the application of artificial
                                                        deployment, which has also raised serious
intelligence (AI) and the Internet of Things
                                                        security concerns and accusations against
(IoT), while also allowing societies to
                                                        the company. Western intelligence services
become significantly more connected. The
                                                        and observers have expressed concerns
5G mobile internet has already been tested
                                                        about Huawei’s ties to the PRC as well as
and launched in certain locations, but is
                                                        the company’s legal obligations to
expected to launch more widely in 2020, 1
                                                        cooperate with the Chinese security
and account for around 20% of global
                                                        apparatus. 4 The main concern is that
mobile connections by 2025. 2 While 5G will
                                                        Huawei equipment could be used as an
not change the world overnight, its
                                                        inroad for Chinese espionage, and China
importance to society will grow over time to
                                                        gaining access to data on and control over
achieve an unprecedented level. 3
                                                        critical infrastructure. Such security
                                                        concerns led the US earlier this year to place
For 5G networks to be deployed, huge
                                                        a ban on Huawei and the Chinese state-
investments in new digital infrastructure
                                                        owned telecom equipment manufacturer,
will be needed. The ongoing competition
                                                        ZTE, preventing Huawei from participating
over 5G, however, is not solely among giant
                                                        in the country’s 5G roll-out, a measure also
tech companies racing for market share and
                                                        taken by Australia and Japan. 5 Many
royalty payments. It is also turning into a
                                                        governments have been pressured to follow
geopolitical conflict among states, first and
                                                        suit, and a number of countries have either
foremost the United States (US) and the

1 Matthew Wall, “What is 5G and What Will It            Customers, Washington DC: RWR Advisory
Mean for You?,” BBC, July 24, 2018, at:                 Group, 2019. Christopher Ashley Ford, “Huawei
https://www.bbc.com/news/business-44871448.             and its Siblings, the Chinese Tech Giants:
John McCann and Mike Moore, “5G: Everything             National Security and Foreign Policy
You Need to Know,” Rechradar, August 20,                Implications,” Remarks at the Multilateral Action
2019, at:                                               on Sensitive Technologies (MAST) Conference, 11
https://www.techradar.com/news/what-is-5g-              September 2019, Washington DC: US State
everything-you-need-to-know.                            Department, 2019. Tom Uren, “Weighing the
2 David Bond and James Kynge, “China Spying             Risks in Building a 5G Network,” ASPI The
Risk Hits Huawei's UK Ambitions,” Financial             Strategist, Barton: ASPI, 2019.
Times, 3 December 2018.                                 5 Li Tao, ”Japan Latest Country to Exclude

3 Steve Lo and Kevin Lee, China Is Poised to Win        Huawei, ZTE From 5G Roll-out Over Security
the 5G Race, Hong Kong: EY, 2018.                       Concerns,” South China Morning Post, December
4 RWR Advisory Group, Assessing Huawei Risk:            10, 2018, at: https://www.scmp.com/tech/tech-
How the Track Record of the CCP Should Play into        leaders-and-founders/article/2177194/japan-
the Due Diligence of Huawei’s Partners and              decides-exclude-huawei-zte-government.

© 2020 The Swedish Institute of International Affairs                                                   4
implemented or are currently considering                already cooperate with Huawei. Outside of
various forms of restrictions on Huawei’s               China, Europe is the region in which Huawei
access to domestic markets for 5G                       has grown its market position the most in
infrastructure. Not only New Zealand,                   recent years.11 Pressure from western allies
Canada and India, but also member states                combined with the authoritarian nature of
of the European Union (EU), namely                      the Chinese party-state give many
Denmark, the Czech Republic and Poland                  Europeans a sense of unease over
consider taking a similar approach.6                    cooperating with Huawei, while European
Estonia,7 Poland 8 and Romania 9 have                   governments are under increasing pressure
signed documents with the US voicing                    to decide their position.
scepticism about Chinese 5G vendors, while
Germany and the United Kingdom (UK)                     This UI Paper engages with the debate
among others remain more hesitant toward                about whether to ban Huawei from the roll-
such a decision. While EU member states                 out of 5G in Europe. We take a sceptical
have initially adopted different responses,             view of such a ban, even though we believe
moves are now under way to coordinate an                that the concerns regarding Chinese party-
EU-wide approach. The first step has been a             state control over Huawei are valid, and that
coordinated risk assessment and a joint                 the security concerns raised are genuine
communication from the Council of the                   and need to be addressed We do not follow
European Union, and recommendations to                  the mainstream argument put forward by
all member states will follow. 10                       critics of a ban that the use of Huawei
                                                        technology is essential to avoid losing
Europe finds itself in a difficult situation,           ground in the development and roll-out of
positioned between the US and China, and                5G. If banning Huawei was an effective
facing pressure from both sides. European               means of containing the security risks, it
states are in a close security alliance with            would be worth paying an economic price
the US, which includes comprehensive                    for it. The problem with a ban on Huawei,
intelligence cooperation. China, on the                 however, is that it does not offer an
other hand, is emerging as the                          effective solution to the security challenges.
technological leader in 5G and many                     China would be able to shut down 5G
European telecommunication operators                    networks regardless of whether Huawei

6 Andreas Kluth, “Huawei Is a Paralyzing                https://www.whitehouse.gov/briefings-
Dilemma for the West,” Bloomberg, November              statements/joint-statement-president-united-
23, 2019, at:                                           states-donald-j-trump-president-romania-klaus-
https://www.bloomberg.com/opinion/articles/20           iohannis/.
19-11-23/huawei-s-5g-networks-are-a-                    10 NIS Cooperation Group, EU Coordinated Risk

paralyzing-dilemma-for-the-west.                        Assessment of the Cybersecurity of 5G Networks,
7 White House, United States – Estonia Joint            October 9, 2019, Brussels: European
Declaration on 5G Security, November 1, 2019,           Commission. Council of the European Union,
at: https://www.whitehouse.gov/briefings-               Council Conclusions on the Significance of 5G to
statements/united-states-estonia-joint-                 the European Economy and the Need to Mitigate
declaration-5g-security/.                               Security Risks Linked to 5G. Council Conclusions,
8 White House, “US-Poland Joint Declaration on          14519/19, December 3, 2019. Brussels: Council of
5G,” The White House, September 5, 2019, at:            the European Union.
https://www.whitehouse.gov/briefings-                   11 Worldwide Asset Management, The New Tech

statements/u-s-poland-joint-declaration-5g/.            War and the Geopolitics of 5G, 2019, at:
9 White House, Joint Statement from president of        https://cworldwide.com/media/PDF/WP_2019_T
the United States Donald J. Trump and President         he_New_Tech_War_and_the_Geopolitics_of_5
of Romania Klaus Iohannis, August 20, 2019, at:         G.pdf.

© 2020 The Swedish Institute of International Affairs                                                   5
technology were included in the build-up of             technology by means of diversification and
European infrastructure. Similarly, a ban on            “protectionism light”.
Huawei would not be an effective measure
for significantly reducing Chinese                      To unfold this line of argument, we first
espionage, which is mainly carried out                  summarise the central innovations and
through applications and phishing rather                revolutionary potential of 5G, before
than infrastructure. Even where                         turning to the current debate over 5G
infrastructure is necessary for espionage,              network security and what measures would
there is little reason to believe that China            best address the main security concerns.
needs Huawei equipment for its operations.              We then turn to the underlying geopolitical
Banning Huawei would instead increase                   logic of a Huawei ban and its potential
political tensions and contribute to a                  consequences. Finally, we address the
technological divide between a western and              European position and recommended
a Chinese sphere, ultimately fuelling the               response before concluding with a brief
existing rivalry and fears of a major                   summary.
confrontation between the PRC and the US.
Most importantly, however, there are other              Centrality and innovation of
more effective means of containing the
security risks than banning Huawei. Instead,            5G
banning Chinese companies from, or
limiting their access to, Europe’s build-out            While previous generations of wireless
of 5G adheres more to a geopolitical logic,             technology – from 1G to 4G – have brought
by addressing politically motivated issues              improvements and new capabilities to
and trust. A ban on Huawei would aim to                 cellular communications, the shift to 5G is
weaken China’s political and technological              predicted to be the most significant since
influence in the world rather than                      the invention of the mobile phone.12 The
effectively addressing network security                 fifth generation of mobile technology will
risks. We believe instead that reducing                 not only bring changes for consumers but
European technology dependency on                       also transform entire industries in a way not
Chinese vendors should be the policy goal               previously possible. 13 This also means that
of the EU. This ties in with ongoing                    society will become increasingly dependent
European discussions on European strategic              on mobile networks and rely on them for
autonomy and European sovereignty. We                   some of its most critical functions, including
are sympathetic to this approach but                    services such as autonomous vehicles,
believe that the debate should not fully                health care monitoring and remote medical
focus on strengthening the digital industrial           surgery, as well as emergency service
base of Europe, since this tends to put the             response. As a consequence, society will
focus on protectionism rather than the                  become more vulnerable to attacks on, and
preservation of global cooperation. We                  the malfunction of, its 5G networks, and the
therefore discuss a different take on                   damage potential of such incidents could be
reducing dependency on Chinese and US                   catastrophic as connectedness and
technology: the question of how Europe can              dependence increase.
secure access to strategically important

12
  Miriam Tuerk, "How 5G Networks Will Change            13Edison Lee and Timothy Chau, “Telecom
America," Forbes, February 27, 2019, at:                Services. The Geopolitics of 5G and IoT,”
https://www.forbes.com/sites/miriamtuerk/2019           Jefferies Franchise Note, Hong Kong: Jefferies,
/02/27/how-5g-networks-will-change-                     2017.
america/#4466acae11b5.

© 2020 The Swedish Institute of International Affairs                                                     6
The shift from 4G to 5G will also be more               In Europe, the introduction of 5G
complicated than past mobile                            technology will take place first as non-
communications revolutions, as the                      standalone (NSA) 5G, which will use existing
intentions of 5G go beyond previous goals               4G infrastructure and mainly provide higher
which were focused mainly on increasing                 data speeds, to eventually be followed by
data speeds and serving the needs of                    standalone (SA) 5G, which will require an
mobile handsets. Instead of just focusing on            entirely new network architecture. 15 A
person-to-person or person-to-device                    cellular mobile network functions
communications, 5G will also support                    essentially through the connections
machine-to-machine networking. This                     between mobile devices, through a Radio
makes 5G entirely different from previous               Access Network (RAN) that consists mainly
technology. 5G technology is expected to                of base stations (such as antenna towers)
deliver three significant new capabilities:             and a core network. Standalone 5G
                                                        technology will bring changes to both base
     1) Enhanced mobile broadband                       stations and the core network, and make
        (eMBB): higher data service speeds,             the distinction between their functions less
        managing more traffic and more                  clear. 16 One of the most important changes
        demanding services (e.g. faster                 with the shift to standalone 5G is its new
        download and upload speeds, as                  virtualised core technology. By replacing
        well as virtual and augmented                   the previous core network (Evolved packet
        reality (VR/AR)).                               core), which relies mainly on physical
                                                        network elements, 5G will introduce a
     2) Ultra-reliable and low latency                  virtualised core designed for software-
        communications (URLLC): with                    based infrastructure running on standard
        response times as low as one                    servers. 17 This will enable features such as
        millisecond, enabling close to real-            Network Function Virtualisation (NFV) and
        time services (e.g. remote medical              network slicing. 18 While cloud computing is
        surgery, self-driving cars and                  not new in itself, these features enable new
        industry automation).                           aspects of cloud use that extend beyond
                                                        storage to include communication and
     3) Massive machine-type                            remote real-time services. In other words,
        communications (mMTC):                          software and cloud functions are essential
        connection for a very large number              to the new 5G technology and will therefore
        of devices (enabling e.g. the                   become increasingly important with the
        Internet of Things, smart cities and            development of 5G networks.
        automated agricultural
        processes). 14                                  NFV allows network functions that have
                                                        traditionally run on function-specific

14 Christian de Looper, What is 5G?, Digital            Challenge, Berlin: Stiftung Neue Verantwortung,
Trends, November 18, 2019, at:                          2019, pp. 7-8.
                                                        17
https://www.digitaltrends.com/mobile/what-is-              Iwan Price-Evans, "Introducing the 5G Core
5g/.                                                    Network Functions,"Metaswitch, February 7,
15 Edison Lee and Timothy Chau, “Telecom                2019, at:
Services. The Geopolitics of 5G and IoT,”               https://www.metaswitch.com/blog/introducing-
Jefferies Franchise Note, Hong Kong: Jefferies,         the-5g-core-network-functions.
2017.                                                   18 Stephane Teral, IHS Markit Technology White

16 Jan-Peter Kleinhans, Whom to Trust in a 5G           Paper: 5G Best Choice Architecture, London, IHS
World. Policy Recommendations for Europe’s 5G           Markit, 2019.

© 2020 The Swedish Institute of International Affairs                                                 7
hardware to be replaced by virtual servers,             position in the global value chains of
which essentially share one physical server             Information and Communications
and can be available at any location. NFV               Technology (ICT) equipment, and Huawei
technology concentrates these functions in              has, not least with the help of the Chinese
centralised data centres. 19 This technology            state authorities, become the leading
also enables network slicing, which entails             supplier of 5G equipment and
subdividing different flows of data traffic in          infrastructure. 22 Huawei has also become
the network for different services, to ensure           the focus of the ongoing debate around 5G
that each network slice makes use of the                deployment that results from a number of
kind of connectivity it requires. For                   security concerns raised over the company’s
example, the communication necessary for                ties to the Chinese government. While all
self-driving cars might be different from,              global Chinese firms are subject to some
and more latency-sensitive than, other                  level of party-state control, 23 Huawei is
services within the network. 20 Some of the             thought to have particularly strong ties to
expected use cases of 5G mobile technology              the PRC security apparatus. 24 Reports
also create the need for so-called edge                 suggest the existence of a high degree of
computing, which reduces latency and                    personal overlap between China’s security
improves data speeds by enabling data                   apparatus and the company. There have
processing closer to the end-users,                     long been concerns over the background of
presenting – in this sense – a less centralised         the company’s founder, Ren Zhengfei, as a
architecture. 21                                        former Director of General Staff of the
                                                        People’s Liberation Army (PLA). Ren’s
Network security concerns:                              daughter and Huawei’s Chief Financial
                                                        Officer, Meng Wanzhou, held a “Public
the current debate                                      Affairs” passport (i.e. a diplomatic passport)
                                                        for many years.25 A much-debated article
Given the importance and potential of 5G                studying the CVs of Huawei employees,
technology, there is much to be gained                  published earlier in 2019, similarly suggests
from achieving leadership in its                        close ties between Huawei personnel and
development. China holds a very strong                  the party-state’s security apparatus. 26

19
   Yuri Gittik, “Distributed Network Functions          22 David Bond and James Kynge, “China Spying
Virtualization. An Introduction to D-NFV,” RAD          Risk Hits Huawei's UK Ambitions,” Financial
White Paper, March 2014, at:                            Times, 3 December 2018.
http://crezer.net/Newsletter/archivos/Distribute        23 Mark Wu, “The “China, Inc.” Challenge to

d-NFV-White-Paper.pdf.                                  Global Trade Governance,” Harvard
20
   EMF Explained Series, 5G Explained – How 5G          International Law Journal 57: 2, pp. 261-324,
Works, without year, at:                                2016.
                                                        24
http://www.emfexplained.info/?ID=25916.                    Douglas Black, “Huawei and China. Not Just
21 Robert Gibb, “What is Edge Computing?”               Business as Usual,” Journal of Political Risk 8:1,
Stackpath, June 18, 2019, at:                           2019.
                                                        25
https://blog.stackpath.com/edge-computing/.                Ashley Feng, “We Can't Tell if Chinese Firms
Kris Beevers, “Why 5G is Bringing Edge                  Work for the Party,” Foreign Policy, February 7,
Computing Automation Front and Center,”                 2019, at:
Network World, February 14, 2018, at:                   https://foreignpolicy.com/2019/02/07/we-cant-
https://www.networkworld.com/article/3255426            tell-if-chinese-firms-work-for-the-party/.
/why-5g-is-bringing-edge-computing-and-                 26 Christopher Balding, “Huawei Technologies’

automation-front-and-center.html.                       Links to Chinese State Security Services,” SSRN,
                                                        July 9, 2019, at:

© 2020 The Swedish Institute of International Affairs                                                    8
Huawei, along with other Chinese tech-                  Huawei’s ownership structure is not
giants, not only facilitates the build-out of           transparent, raising suspicions of effective
surveillance systems within China, but also             party-state control over the company.31
exports these technologies to third                     Moreover, of Huawei’s 160,000 employees,
countries facilitating what has been called             12,000 are party members, and they form
“digital authoritarianism”. 27 Chinese                  no fewer than 300 party cells within the
engagement in the development of                        company. Furthermore, Huawei receives
international technical standards of facial             preferential treatment, not least by means
recognition technology is only one of the               of soft loans which already amounted to
most recent subjects of western concern                 more than US $30 billion before 2011,
regarding the spread of digital                         mostly from the state-controlled China
authoritarianism. 28 There can be little doubt          Development Bank (CDB). In the period
that Huawei is more than just a normal                  2012–2018, CDB and another state-
company and plays a strategic role in the               controlled bank, the China Import Export
policy of the PRC. 29 More recent concern,              Bank, granted the company at least another
however, has focused on various pieces of               US $9.8 billion for overseas projects. 32
Chinese legislation, in particular China’s              Strikingly, however, Huawei is not that
Cyber Security Law of 2017, which legally               different from any other Chinese company.
requires Chinese companies to turn over                 In fact, even the subsidiaries and joint
information and comply with China’s                     ventures of non-Chinese tech companies,
intelligence and security services,                     such as Ericsson and Nokia, face Chinese
essentially on all matters, – not just                  Communist Party (CCP) control not least by
domestically (article 14) but also                      means of party cells and the need to comply
internationally (article 10). 30 This concern           with domestic Chinese laws – including the
becomes especially significant with regard              Intelligence Law of 2017. 33
to Huawei, given the company’s strong
position in the 5G equipment market.

                                                        30
https://papers.ssrn.com/sol3/papers.cfm?abstra             Huawei has denied this interpretation of the
ct_id=3415726.                                          Cybersecurity law, but experts are not
27 Danielle Cave et al., “Mapping China’s               convinced. Jichang Lulu, “Synopsis: Huawei's
Technology Giants,” ASPI Issues Paper Report            Lawfare by Proxy,” China Digital Times, February
1/2019, Barton: ASPI.                                   2019, at:
28 Georgina Torbet, “Chinese Companies Want             https://chinadigitaltimes.net/2019/02/sinopsis-
to help Shape Global Facial Recognition                 huaweis-lawfare-by-proxy.
Standards,” Engadget, December 2, 2019, at:             31 Christopher Balding and Donald Clarke: “Who

https://www.engadget.com/2019/12/02/china-              Owns Huawei?,” SSRN, May 8, 2019, at:
facial-recognition-                                     https://ssrn.com/abstract=3372669/.
standards/?guccounter=1&guce_referrer=aHR0c             32 Mathieu Duchâtel and Francois Godement,

HM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referre                 Europe and 5G: The Huawei Case, Paris: Institut
r_sig=AQAAAKcP2n-                                       Montaigne, 2019. Bob Seely et al., Defending
viXPHG8Lg5mkOjmdZu8gmP9WLUrOWrFcjGH                     Our Data: Huawei, 5G and the Five Eyes, London:
pxN-                                                    Henry Jackson Society, 2019.
yxHCjDcTZSfaFTBe0hbvNR4w3_oo4FaKswdCG                   33 Richard Baker, “Top 5G Suppliers Linked to

Yj8tBBq3oGZyrjCEYY-                                     China's Communist Party,” Sydney Morning
OuAKozXYYjm1IzV9_tm36fHDrg12n6OsuLVllK                  Herald, August 13, 2018, at:
qNYXAi37gDPBTQTycuU-lbLPX4jZv8cc.                       https://www.smh.com.au/business/companies/t
29 Rick Umback, “Huawei and Telefunken:                 op-5g-suppliers-linked-to-china-s-communist-
Communications Enterprises and Rising Power             party-20180812-p4zwzt.html.
Strategies,” ASPI Strategic Insights 135. Barton:
ASPI, 2019.

© 2020 The Swedish Institute of International Affairs                                                  9
There is indeed reason not to trust PRC                 foremost the Intelligence Law. 40 Hence, the
authorities and Chinese vendors. Huawei                 Council of the European Union states in a
has an opaque governance structure, 34 has              communication that “also non-technical
been accused of multiple intellectual                   factors such as the legal and policy
property thefts and of ignoring international           framework to which suppliers may be
sanctions against authoritarian states,35               subject to in third countries, should be
does not issue financial statements since it            considered.” 41
is not a publicly listed company, 36 and
shows significant software engineering and              In addition, while there have also been
cyber security problems.37 Not least the                cases of US espionage in Europe, significant
example of the Chinese company Lenovo                   differences remain between the US and
demonstrates that even in the authoritarian             China. After the Snowden revelations, US
PRC, corporates can do more to reassure                 companies signed public letters advocating
their international customers. 38 Most                  surveillance law reform, filed lawsuits for
Chinese companies, however, have done                   more transparency, and brought cases
little to increase transparency over its                against breaking encryption of digital
organisational structure 39 and the party-              communication to court; which has led to
state has failed to reassure international              changes in US policy. 42 It is unrealistic to
partners of its legal framework, first and              think that a company like Huawei or ZTE

34 Colin Hawes and Grace Li, “Transparency and          39 The Russian tech company Kaspersky, in
Opaqueness in the Chinese ICT Sector. A                 contrast, has moved storage and processing of
Critique of Chinese and International Corporate         its data to Switzerland, a measure that is far
Governance Norms,” Asian Journal of                     more reassuring than the cybersecurity centres
Comparative Law 12: 1, 2017, pp. 41-80.                 opened by Huawei. Kaspersky Lab, Kaspersky
Christopher Balding and Donald Clarke: “Who             Lab Starts Data Processing for European Users in
Owns Huawei?,” SSRN, May 8, 2019, at:                   Zurich and also Opens First Transparency Center,
https://ssrn.com/abstract=3372669/.                     November 13, 2018, at:
35 RWR Advisory Group, Huawei Risk Tracker,             https://www.kaspersky.com/about/press-
2019, at: https://huawei.rwradvisory.com/.              releases/2018_kaspersky-lab-starts-data-
36 Andrew Foster and Nicholas Borst, “Time Is           processing-for-european-users-in-zurich-and-
Ripe for Huawei to Launch an IPO, to Address            also-opens-first-transparency-center. Alliott
Political and Security Concerns Once and for            Zaagman, Huawei’s Problem of Being too
All,” South China Morning Post, May 27, 2019, at:       “Chinese”, January 24, 2019, at:
https://www.scmp.com/comment/insight-                   https://supchina.com/2019/01/24/huaweis-
opinion/article/3011510/time-ripe-huawei-               problem-of-being-too-chinese/.
launch-ipo-address-political-and-security.              40 Donald Clarke, “The Zhong Lun Declaration on

37 Huawei Cyber Security Evaluation Centre              the Obligations of Huawei and Other Chinese
Oversight Board, Annual Report: A Report to the         Companies under Chinese Law,” SSRN, March
National Security Adviser of the United Kingdom,        28, 2019, at:
March 2019, at:                                         https://papers.ssrn.com/sol3/papers.cfm?abstra
https://assets.publishing.service.gov.uk/govern         ct_id=3354211
ment/uploads/system/uploads/attachment_data             41 Council of the European Union, Council

/file/790270/HCSEC_OversightBoardReport-                Conclusions on the Significance of 5G to the
2019.pdf.                                               European Economy and the Need to Mitigate
38 Alliott Zaagman, Thinking About Working For a        Security Risks Linked to 5G. Council Conclusions,
Chinese Company? First, Find Out If It’s a              14519/19, December 3, 2019. Brussels: Council of
“Lenovo” or A “Huawei”, October 9, 2017, at:            the European Union, p. 4.
https://supchina.com/2017/10/09/thinking-               42 Jan-Peter Kleinhans, Whom to Trust in a 5G

working-chinese-company-first-find-lenovo-              World. Policy Recommendations for Europe’s 5G
huawei/.

© 2020 The Swedish Institute of International Affairs                                                  10
would bring cases about government                      “kill-switch”. Western observers fear that a
surveillance practices to Chinese courts, and           large-scale deployment of Huawei network
even if they did they would face a judiciary            equipment would provide such a kill switch
subordinate to CCP rule.                                and make it easier for China to shut down
                                                        5G infrastructure. While it is unlikely that
These concerns have led to discussions                  China would shut down an entire 5G
across many western states about whether                network and risk irreparable damage to
Huawei should be excluded from the build-               Huawei’s reputation in times of peace, such
out of 5G infrastructure. The US and                    a switch could be used for partial
Australia in particular favour a ban, and the           shutdowns, accompanied by coercive
US has been pressuring European and other               threats, or used in the event of an interstate
states to fall in line, warning about future            war.
European-US security cooperation. 43
                                                        Commentators and policymakers in the
Focus on espionage and sabotage                         west also fear that Huawei’s 5G equipment
While concerns have been raised over                    could come with backdoors that would
various risks, including privacy issues and             allow undetected Chinese access and
dual-use technology, the overwhelming                   enable economic and political espionage.
focus has been on the risks of espionage                There are similar concerns that the
and sabotage. The fear is that 5G                       company might simply hand over sensitive
equipment from Chinese vendors would                    information to the Chinese government,
allow the Chinese government to control                 especially in the light of the Chinese
critical domestic infrastructure and to gain            cybersecurity laws. China has a worrying
access to the information that travels on it.           track record of espionage in general and
                                                        cyber theft in particular. 44 There have been
In discussions about the risk of sabotage,              allegations of backdoors, espionage and
the main – and probably the most crucial –              technology theft against the company.45
concern is about the ability to shut down               Thus far, however, no “smoking gun” has
networks – a scenario often referred to as a            been discovered to confirm these, 46 but

Challenge, Berlin: Stiftung Neue Verantwortung,         attorney-general-rod-j-rosenstein-announces-
2019, p. 16.                                            charges-against-chinese-hackers.
43
   Nikos Chrysoloras and Richard Bravo, "Huawei         45 For example, Vodafone allegedly found

Deals for Tech Will Have Consequences, US               backdoors in Huawei equipment they used in
Warns EU," Bloomberg, February 7, 2019, at:             Italy in 2011 and 2012; Huawei was found liable
https://www.bloomberg.com/news/articles/2019            for stealing robotic technology in a US court in
-02-07/huawei-deals-for-tech-willhave-                  2017; and in early 2019 a Huawei employee was
consequences-u-s-warns-eu. Paul Triolo, et al.,         arrested in Poland on grounds of suspected
“One Company, Many Systems. US Forces                   espionage. See: Bloomberg News, How Huawei
Governments to Choose Sides on Huawei,”                 Became a Target for Governments, Bloomberg,
Special Report Prepared by Eurasia Group,               January 23, 2019, at:
Washington DC, Eurasia Group, 2019.                     https://www.bloomberg.com/news/articles/2019
44 Kadri Kaska et al., Huawei, 5G and China as a        -01-23/how-huawei-became-a-u-s-government-
Security Threat. Tallinn: NATO Cooperative              target-quicktake.
Cyber Defence Centre of Excellence, 2019, pp.           46 Ole Moehr, My Way or the Huawei: 5G at the

10-11. US Department of Justice, Deputy                 Center of US-China Strategic Competition, The
Attorney General Rod J. Rosenstein Announces            Atlantic Council, July 23, 2019, at:
Charges Against Chinese Hackers, December 20,           https://www.atlanticcouncil.org/blogs/econogra
2018, at:                                               phics/my-way-or-the-huawei-5g-at-the-center-
https://www.justice.gov/opa/speech/deputy-              of-us-china-strategic-competition.

© 2020 The Swedish Institute of International Affairs                                                 11
nobody can rule out the possibility of the              technology will bring new challenges,
Chinese government exploiting technical                 mainly through its technological
vulnerabilities – in any manufacturer’s                 innovations and the increase in network
equipment.47 However, experts have also                 dependency throughout society. New forms
pointed out that mobile internet                        of technological security risk arise primarily
infrastructure has not been the main focus              from the increased use of virtualisation and
of Chinese espionage, and that spear-                   of centralised software. The software focus,
phishing and social engineering are more                as well as the transferring of functions from
efficient for such purposes.48                          the core network to edge computing, create
                                                        larger attack surfaces and greater
Assessments made by the United                          opportunities to introduce vulnerabilities,
Kingdom’s Huawei Cyber Security                         which, in turn, enables methods to access
Evaluation Centre (HCSEC) suggest that                  and control data on the network. 51 In
Huawei’s equipment comes with serious                   addition, as virtual servers replace
weaknesses, a problem irrelevant to the                 specialised hardware, different parts of the
origin of the vendor that indicates that                network technology will no longer be
access could easily be obtained even                    physically isolated from each other, which
without built-in backdoors. In addition,                means that if one vulnerability is found, it
British experts at the HCSEC make clear                 could potentially be exploited to access
that no certification can rule out the                  other parts of the network. In other words,
existence of backdoors and malicious                    it could make the damage much more
code. 49 Since hackers normally focus on                dramatic if a vulnerability is found and
tracking weaknesses in the equipment of                 exploited.52
competitors, non-Huawei equipment would
also be a more likely target for Chinese                Security concerns also arise from the use of
espionage.50 The Chinese government                     network slicing, which entails separating
decided in 2018 to prevent Chinese hackers              flows of data on a network, and creating
from participating in international hacking             slices that can be used for different services
contests, which Chinese teams have often                by tailoring their use of functions to the
dominated, allegedly for national security              requirements of each service. Ensuring that
reasons.                                                each network slice is secure will be a
                                                        challenge, and there are potential risks that
While it remains unclear whether 5G will be             vulnerabilities in one slice could be used to
more or less secure than 4G networks, 5G                access traffic on other slices. 53 There are

47 Jan-Peter Kleinhans, 5G vs. National Security:       50 Author interview with an anonymous
A European Perspective. Berlin: Stiftung Neue           engineer, Berlin, May 2019.
Verantwortung, 2019.                                    51 Christopher Ashley Ford, “Huawei and its
48
   Jan-Peter Kleinhans, 5G vs. National Security:       Siblings, the Chinese Tech Giants: National
A European Perspective. Berlin: Stiftung Neue           Security and Foreign Policy Implications,”
Verantwortung, 2019.                                    Remarks at the Multilateral Action on Sensitive
49
   Huawei Cyber Security Evaluation Centre              Technologies (MAST) Conference, 11 September
Oversight Board, Annual Report: A Report to the         2019, Washington DC: US State Department,
National Security Adviser of the United Kingdom,        2019.
March 2019, at:                                         52 Author interview with Pontus Johnson,

https://assets.publishing.service.gov.uk/govern         professor in cyber security at KTH, Stockholm,
ment/uploads/system/uploads/attachment_data             June 2019.
/file/790270/HCSEC_OversightBoardReport-                53 NIS Cooperation Group, EU Coordinated Risk

2019.pdf.                                               Assessment of the Cybersecurity of 5G Networks,

© 2020 The Swedish Institute of International Affairs                                                 12
also concerns that targeted attacks on                  that makes this issue such a crucial one. In
specific slices could be motivated if what              addition to the services that will be enabled
each slice is used for becomes known. 54                by 5G technology, increasing amounts of
                                                        personal and sensitive data will be
Security risks also arise from the existence            processed on the networks, which could be
of large numbers of connected devices.                  exploited if accessed. 56
Another form of sabotage that 5G
technology is likely to facilitate, by enabling         Would banning Huawei solve the
massive machine communication and IoT, is               problem?
distributed denial-of-service (DDoS)                    The risks of sabotage and espionage are
attacks. Such attacks are carried out by                genuine and valid concerns and should be
finding and hacking machines with weak                  addressed and mitigated as best as
security and using them to overwhelm a                  possible. However, banning Huawei from
website or machine with more traffic than it            the roll-out of 5G networks would not
can handle. With the development of IoT,                effectively address or remedy these
the number of internet-connected devices is             concerns. Excluding Chinese companies
expected to grow from 14.2 billion to 25                such as Huawei from providing 5G
billion by 2021, which increases the                    infrastructure in Europe might make it
potential for and power of DDoS attacks. 55             somewhat more difficult for the Chinese
This essentially means that DDoS attacks                authorities to access and exploit European
can be used to shut down parts of the                   networks. However, a ban would only
internet, which could be very serious for 5G            marginally address the network security
networks given the importance and scale of              risks of Chinese sabotage and espionage.
the services that it is planned to support.             Experts argue that if China were interested
                                                        in accessing a network for whatever reason,
In a nutshell, the specific vulnerabilities of          it would have the capacity to do so with or
5G networks lie mainly in the complexity of             without the help of Huawei equipment.
5G infrastructure resulting from                        Already today, China carries out extensive
technological innovation (discussed above)              espionage for economic, political and
and the multitude of use cases penetrating              military purposes. APT 1, APT 3 and APT 10
future societies. It is the centrality of 5G to         are the most famous hacker groups
the economies and societies of the future               attributed to the Chinese party-state. 57

October 9, 2019, Brussels: European                     expands-so-do-concerns-over-privacy-
Commission.                                             11551236460.
54 Michael Heller, “Nokia: 5G Network Slicing           57 PwC, “Operation Cloud Hopper,” PwC, 2018,

Could Be a Boon For Security,” Techtarget, April        at: https://www.pwc.co.uk/cyber-
10, 2019, at:                                           security/pdf/cloud-hopper-report-final-v4.pdf.
https://searchsecurity.techtarget.com/news/252          Brian Barrett, “How China’s Elite hackers Stole
461410/Nokia-5G-network-slicing-could-be-a-             the World’s Most Valuable Secrets,” Wired,
boon-for-security.                                      December 20, 2018, at:
55 Nick Huber, “A Hacker’s Paradise? 5G and             https://www.wired.com/story/doj-indictment-
Cyber Security,” Financial Times, October 14,           chinese-hackers-apt10/. FireEye, Mandiant
2019, at: https://www.ft.com/content/74edc076-          APT1. Exposing One of China’s Cyber Espionage
ca6f-11e9-af46-b09e8bfe60c0.                            Unites, February 19, 2013, at:
56
   Matthew Kassel, “As 5G Technology Expands,           https://www.fireeye.com/blog/threat-
So Do Concerns over Privacy,” Wall Street               research/2013/02/mandiant-exposes-apt1-
Journal, February 26, 2019, at:                         chinas-cyber-espionage-units.html. Thomas
https://www.wsj.com/articles/as-5g-technology-          Brewster, “Chinese Trio Linked to Dangerous
                                                        APT3 hackers Charged with Stealing 407GB of

© 2020 The Swedish Institute of International Affairs                                                     13
However, the main attack vectors are spear-             We do not adhere to the popular argument
phishing and social engineering, not using              promoted by critics of a Huawei ban that
mobile communication infrastructure or                  focuses on the economic costs and
hacking into base stations. In other words,             competitive disadvantages that would be
regardless of a ban on Huawei, measures                 caused by the resulting delay in 5G roll-out,
will be needed to strengthen the security of            or other negative impacts on western
future 5G networks against third party                  competitiveness not least stemming from
access and disruption.58 In addition, a ban             Chinese retaliation.60 Another argument
would risk generating other costs and have              suggests that the debate over excluding
further implications – both economic and                Huawei from 5G participation is merely part
political. Decisions about how to manage                of the current trade dispute between China
risks related to sabotage and espionage                 and the US. Such arguments might be true,
should avoid being locked into a logic that             but this is also not what we are saying. The
focuses entirely on the fear and presence of            risks of espionage and sabotage are valid
risk without considering other aspects of               concerns. We are rather addressing the
the situation, such as the potential damage             compatibility of issue and response and
linked to the risks, costs and consequences             suggest that there are more effective and
of a ban. 59                                            appropriate means available to address the
                                                        network security concerns at the centre of
                                                        the 5G debate than to ban Huawei from

Data from Siemens,” Forbes, November 27,                https://www.project-
2017, at:                                               syndicate.org/commentary/cheney-doctrine-us-
https://www.forbes.com/sites/thomasbrewster/            war-on-chinese-technology-by-jeffrey-d-sachs-
2017/11/27/chinese-hackers-accused-of-                  2019-11.
siemens-moodys-trimble-hacks/.                          60 Handelsblatt, “Deutsche Telekom warnt.
58
   Author interviews (including telephone and           Huawei-Ausschluss würde 5G-Einführung
Skype interviews) with hackers, engeneers, and          verzögern,” Handelsblatt, January 29, 2019,
technical experts in several European cities,           https://www.handelsblatt.com/unternehmen/it-
February-October 2019. The German IT expert             medien/neuer-mobilfunkstandard-deutsche-
Jan-Peter Kleinhans exemplarily summarizes:             telekom-warnt-huawei-ausschluss-wuerde-5g-
“The current public debate around Huawei                einfuehrung-
implies that a 5G network built with Chinese            verzoegern/23921762.html?ticket=ST-38734491-
equipment makes it easier for the Chinese               9lY7UMO0LFL0PSMFVweD-ap5. Telecomlead,
government to conduct industrial espionage –            Huawei Grabs 28% Share in Global Telecom
this assumption is at least questionable. […] A         Equipment Market, December 7, 2018, at:
skilled, persistent state actor with a practically      https://www.telecomlead.com/telecom-
limitless budget will always be able to                 equipment/huawei-grabs-28-share-in-global-
compromise networks and exploit assets.” Jan-           telecom-equipment-market-87863. Andreas
Peter Kleinhans, 5G vs. National Security: A            Kluth, “Huawei Is a Paralyzing Dilemma for the
European Perspective. Berlin: Stiftung Neue             West,” Bloomberg, November 23, 2019, at:
Verantwortung, 2019, p. 9, 16.                          https://www.bloomberg.com/opinion/articles/20
59 Jeffrey D. Sachs makes a comparison of the           19-11-23/huawei-s-5g-networks-are-a-
United States’ policy on Huawei and the US              paralyzing-dilemma-for-the-west. Jodi Xu Klein,
decision to invade Iraq, and argues that the            “The Huawei Dilemma. Washington Still Stuck
same tactic is being used. He refers to it as ‚the      Trying to Balance National Security Against US
Chaney Doctrine’ and involves the use of fear           Tech Spremacy,” South China Morning Post,
over small risks to motivate drastic and                November 1, 2019, at:
ultimately misguided action. See Jeffrey D.             https://www.scmp.com/news/china/article/3035
Sachs, “America’s War on Chinese Technology,”           832/huawei-dilemma-washington-still-stuck-
Project Syndicate, November 7, 2019, at:                trying-balance-national-security-against.

© 2020 The Swedish Institute of International Affairs                                                14
European 5G mobile infrastructure. In                   number of other measures are more
addition, excluding Huawei from European                promising.
markets would not change the fact that
non-Chinese companies, such as Ericsson                 Remedies to network security risks
and Nokia, will continue to face the same               While there is no solution that would
challenges and legal environment as                     effectively eliminate these network security
Huawei in any production or business they               risks, there are ways to reduce them and
have located in China.                                  make it more difficult for anyone – not just
Responding to recent developments, in                   China – to disrupt future networks. A
September 2019, Huawei founder Ren                      number of possible measures have been
Zhengfei offered to sell access to the                  brought up for discussion, such as greater
company’s 5G code, patents, licences,                   redundancy of equipment and diversity of
technical blueprints and production                     vendors, as well as the use of encryption,
expertise to a foreign company in return for            certification and assessments, and network
a one-off fee. However, this offer is                   flow monitoring.
irrelevant as long as there is no buyer.
Ericsson and Nokia have no technological                Redundancy and diversity are interlinked
need to purchase Huawei’s source code, and              and about improving resilience and securing
US companies have no interest, not least                availability of coverage. Their purpose is to
due to the lack of political will. Regardless           provide an overlap of equipment and
of which company provides it, security                  vendors in case of network failures, to
concerns would persist over Huawei                      ensure that there is always some back-up
equipment, as well as the fact that any                 available. Given the critical services that are
buyer would still probably need to produce              expected to rely on future 5G networks,
much of it in China. 61 The case has also been          ensuring a reliable connection will be one of
made that Huawei licences will continue to              the most important aspects of network
come under Chinese law, which would                     security. Time and again, technical experts
require compliance with the PRC’s security              have emphasised how crucial redundancy
services.62                                             and diversity are, most recently during an
                                                        expert hearing in the German Parliament.63
In short, the existing vulnerabilities of 5G            Diversity of vendors means ensuring that
networks need to be addressed, but neither              many different actors participate in the
a ban on Huawei nor the purchase of its                 market, in order to prevent networks from
source code would provide a sufficient                  becoming fully reliant on a single supplier. 64
solution beyond marginal improvements in                The logic is essentially that different
European mobile network security. A                     vendors are unlikely to be subject to the
                                                        same problems at the same time. 65 Most

61 The Economist, “Ren Zhengfei May Sell                Mobilfunkstandard 5G,“ Deutscher Bundestag,
Huawei’s 5G Technology to a western Buyer,”             November 11, 2019, at:
The Economist, September 12, 2019, at:                  https://www.bundestag.de/dokumente/textarch
https://www.economist.com/business/2019/09/1            iv/2019/kw46-pa-auswaertiges-5g-665414.
                                                        64
2/ren-zhengfei-may-sell-huaweis-5g-                        Mathieu Duchâtel and Francois Godement,
technology-to-a-western-buyer.                          Europe and 5G: The Huawei Case, Paris: Institut
62 BBC, “Huawei Chief Offers to Share 5G Know-          Montaigne, 2019.
how for a Fee,” BBC, September 12, 2019, at:            65 Government Offices of Sweden, Ministry of

https://www.bbc.com/news/technology-                    Infrastructure, national 5G Risk Assessment-
49673144.                                               Sweden’s Response, memorandum
63 Deutscher Bundestag, „Experten gegen                 (unpublished), 2019.
Ausschluss von Anbietern beim

© 2020 The Swedish Institute of International Affairs                                                15
recently, the Council of the European Union             demand access to enable lawful
explicitly acknowledged the importance of               interception of data, so there are usually
vendor diversity. 66 Similarly, network                 ways to get around encryption in order to
redundancy refers to building additional                access information.
layers of equipment within the network
infrastructure (for example base stations)              Another approach to strengthening
provided by multiple vendors. 67 The aim is             network security has centred on evaluation
to ensure that alternative equipment is                 and certification of products and processes,
available for network connections to fall               which aims to reduce the risk of backdoors
back on to ensure continuous coverage in                or vulnerabilities that could be easily
the event of network outages or                         exploited by hackers. Products can be more
malfunctions. While ensuring network                    or less secure, and security audits have the
redundancy can be costly, it is also effective          potential to assess the overall product
at minimising the risk of large-scale                   quality, while also testing products and
network failures.68                                     processes against certification
                                                        requirements. One measure relevant to
Encryption addresses the safety of data                 discussions on assessments is source code
traffic by protecting the information that              review, a process of evaluating the
flows on a network from unauthorised                    programming language of a device or other
access. End-to-end encryption refers to a               equipment to confirm it works as intended
system in which only the communicating                  and to search for potential defects that
parties can access the encrypted                        could be exploited. 71 Since reviews are
information sent between them, and no                   costly and time-consuming, however, there
third party in between.69 Improving data                are limited incentives for companies to
security by means of encryption from a                  undertake them in any number internally.
policy point-of-view could involve devising             Regulation could be one way to create such
standards of encryption requirements that               incentives.72
operators must meet. There is, however, a
tension between strong encryption and the               One example of such auditing is the HCSEC,
ability of law enforcement to access data for           which was established in the UK in 2010
judicial purposes.70 While encryption is a              with the purpose of providing insight into
reliable method of securing data, law                   Huawei’s products and strategies there. In
enforcement and intelligence agencies                   its most recent annual report, from March

66 Council of the European Union, Council               at: https://www.wired.com/2014/11/hacker-
Conclusions on the Significance of 5G to the            lexicon-end-to-end-encryption/.
European Economy and the Need to Mitigate               70 Council of the European Union, Law

Security Risks Linked to 5G. Council Conclusions,       Enforcement and Judicial Aspects Related to 5G,
14519/19, December 3, 2019. Brussels: Council of        8983/19, May 6, 2019, Brussels: Council of the
the European Union, p. 5.                               European Union.
67 Jamie Davies, “Germany Outlines Its 5G               71 Douglas Busvine, “Exclusive: China’s Huawei

Security Requirements,” Telecom News, March 8,          Opens Up to German Scrutiny Ahead of 5G
2019, at: http://telecoms.com/496135/germany-           Auctions,” Reuters, October 23, 2018, at:
outlines-its-5g-security-requirements/.                 https://www.reuters.com/article/us-germany-
68 Dali Wireless, Whitepapers: Fault-Tolerant           telecoms-huawei-exclusive/exclusive-chinas-
Public Safety System, November 22, 2017, at:            huawei-opens-up-to-german-scrutiny-ahead-of-
http://www.daliwireless.com/whitepapers/                5g-auctions-idUSKCN1MX1VB.
69 Andy Greenberg, “Hack Lexicon. What Is End-          72 Author interview with Pontus Johnson,

to-End Encryption?” Wired, November 25, 2014,           professor in cyber security at KTH, Stockholm,
                                                        June 2019.

© 2020 The Swedish Institute of International Affairs                                                16
2019, the HCSEC oversight board highlights              What complicates this issue even further is
serious vulnerabilities in Huawei product               the fact that this work is complex and many
code and systematic defects in the                      operators involve vendors in the
company’s software engineering and                      maintenance work on the mobile
cybersecurity competences. 73 Aiming to                 infrastructure, providing them with direct
replicate the UK approach, Huawei has                   access to the core functions of the system.
erected transparency centres in Bonn,                   Even if restrictions were to be imposed on
Germany and Brussels. 74 In contrast to the             access for maintenance purposes, however,
UK, however, these centres are not under                such as excluding certain vendors from
the oversight of state authorities.                     making VPN connections to certain
                                                        equipment for remote maintenance or
Even more crucially, auditing and                       assigning maintenance work to specific
certification have their technological                  qualified and vetted personnel (as is the
limitations, not least that the heavy reliance          case in the UK), auditing and certification
on software-based solutions instead of                  would be insufficient measures for
hardware in 5G technology requires                      providing meaningful reassurance of the
extensive maintenance work, updates and                 security of any given mobile infrastructure
security patches. This means that a certified           technology. 76
source code will be continuously updated,
providing opportunities to include new                  Another suggested measure to mitigate
vulnerabilities or backdoors. Hence, even if            attempts at espionage as well as sabotage is
auditing and certification could prove a level          network flow monitoring, which essentially
of security of the source code at the time of           entails gathering and analysing metadata.
its assessment, it would be practically                 Operators have access to information about
impossible to review all patches individually,          the data that flows into and out of their core
leaving aside the vulnerabilities that can              network, and could therefore track data in
result from a combination of updates. Due               order to detect and investigate
to the complexity of today’s IT systems, it is          abnormalities, such as traffic rerouting or
impossible to cover the millions of lines of            leaks in which information could be
code present in devices and equipment, or               redirected or transferred from the network
to confirm the absence of backdoors. In                 to some third party.77 However, while
other words, occasional audits are                      network flow monitoring can be used to
ineffective, and attempts to assess new                 create comprehensive views of network
code before every update unrealistic. 75                activity, it might be less useful for tracking
                                                        specific targets or individuals. 78 In addition,

73 Huawei Cyber Security Evaluation Centre              75 Achour Messas et al., 5G in Europe: Time to
Oversight Board, Annual Report: A Report to the         Change Gear! Paris: Institut Montaigne, 2019.
National Security Adviser of the United Kingdom,        We do not argue that certification is not helpful
March 2019, at:                                         but rather emphasise that it is not sufficient.
https://assets.publishing.service.gov.uk/govern         Improvement of certification such as GSMA’s
ment/uploads/system/uploads/attachment_data             NESAS can only be a minor contribution to a
/file/790270/HCSEC_OversightBoardReport-                multifaceted risk mitigation.
2019.pdf, p. 20.                                        76 Jan-Peter Kleinhans, 5G vs. National Security:

74 Adam Satariano, “Huawei Security “Defects”           A European Perspective. Berlin: Stiftung Neue
Are Found by British Authorities,” The New York         Verantwortung, 2019.
Times, March 28, 2019, at:                              77 Achour Messas et al., 5G in Europe: Time to

https://www.nytimes.com/2019/03/28/technolog            Change Gear! Paris: Institut Montaigne, 2019.
y/huawei-security-british-report.html.                  78 Author interview with an anonymous

                                                        engineer, Berlin, May 2019.

© 2020 The Swedish Institute of International Affairs                                                   17
You can also read