The Guardian view on cybersecurity: trust – but verify | Editorial

The use of Chinese-made equipment in Britain’s broadband infrastructure demands, and gets, careful scrutiny

How far can we trust Chinese companies to supply our critical national infrastructure? The question was raised by the Hinkley Point power station, but is even more pressing in the telecoms business. Broadband internet is now as critical a part of the infrastructure as the road or rail network. So the question seems to answer itself. Many countries are extremely reluctant to allow two Chinese telecoms companies in particular, Huawei and ZTE, to do business with them. They view both of them as arms of the Chinese state, even though Huawei is legally a private company. In fact the US government nearly shut down ZTE altogether this year by forbidding its American component suppliers to deal with it, although it was later allowed to resume operations on payment of a $1bn fine. The British National Cyber Security Centre has already warned telecoms companies against the use of ZTE equipment or services.

Huawaei had already abandoned the US market in 2013, but in the UK it has had a central position in BT’s broadband operation since 2010, having won its first contract in 2005. A 2013 report by the parliamentary intelligence and security committee was extremely critical of the way in which that deal had been nodded through without any ministerial input at all. Partly as a result, an arrangement was reached that allowed experts from GCHQ to examine the code in Huawei equipment used in Britain. The latest report from the oversight committee, which watches the progress of monitoring, suggests that there is more work to be done in some areas, mostly to do with third party components. This is not very alarmist language, and the company claims that it shows the process is working as designed. But it still reminds us of the inherent dangers of an obscure situation.

There are numerous recorded cases of governments using routing equipment to spy on their enemies. In fact everyone does who can. In 2014 the Snowden revelations included the detail that the NSA was tinkering with American routers destined for foreign countries to insert special spying equipment. The African Union headquarters in Addis Ababa were built by the Chinese government and after five years’ operation were discovered to have been in surreptitious contact with servers in China for two hours every night, presumably reporting back everything that had been recorded by day. Nothing will stop these efforts, any more than any other kind of espionage can be entirely controlled. Security experts suggest that the precautions taken in Huawei’s case certainly make it more difficult for the Chinese state to hack into crucial systems. But constant vigilance is necessary, against human error as much as against deliberate malice. The modern world depends on complicated software interacting in complex and sometimes unforeseeable ways. Making that secure, and keeping it so, is a task as endless as painting the Forth Bridge – but increasingly essential.

Contributor

Editorial

The GuardianTramp

Related Content

Article image
The Guardian view on cyberwar: an urgent problem | Editorial
Editorial: The internet is now used as a low-level weapon of war. How should Britain best defend itself?

Editorial

22, Jan, 2018 @5:42 PM

Article image
The Guardian view on cyberwars: enter the trolls | Editorial
Editorial: The great breach in the US government’s database is a classic case of informational smash and grab. But operations to plant misinformation are also worrying for states which care about truth

Editorial

05, Jun, 2015 @6:11 PM

Article image
The Guardian view on the defence budget: be realistic | Editorial
Editorial: The military has suffered from austerity and the world is a dangerous place, but that doesn’t mean the case for higher defence spending needs no interrogation

Editorial

27, Jun, 2018 @5:31 PM

Article image
The Guardian view on Russia and hacking: time to tackle our vulnerabilities | Editorial
Editorial: The disrupted cyber-attack on the chemical weapons watchdog and allegations of a sophisticated Chinese hardware hack have highlighted the dangers

Editorial

05, Oct, 2018 @4:48 PM

Article image
Are China and the US ready for a truce on cyber-espionage? | Misha Glenny
For China the right to control content for its citizens is a key concern but for the US, it is the struggle to maintain the system of intellectual property rights and technological supremacy

Misha Glenny

23, Sep, 2015 @4:16 PM

Article image
From Turing to Snowden: how US-UK pact forged modern surveillance

Revelations show transatlantic intelligence pact started in second world war is expanding beyond states' ability to control it

Nick Hopkins

02, Dec, 2013 @8:00 AM

Article image
The Chinese firm taking threats to UK national security very seriously
Overseen by a UK government board, the Cell is a part of Huawei in Oxfordshire ensuring its own technology cannot be compromised for nefarious purposes

Juliette Garside

07, Aug, 2016 @6:00 AM

Article image
GCHQ: inside the top secret world of Britain's biggest spy agency
Files leaked by Edward Snowden reveal how the NSA pays for and influences some of the UK's intelligence gathering programmes. The documents also give unique insights into the challenges faced by the agency and the concerns it has about how to tackle them

Nick Hopkins, Julian Borger and Luke Harding

01, Aug, 2013 @11:41 PM

Article image
The Guardian view on internet security: complexity is vulnerable | Editorial
Editorial: A huge weakness in wifi security erodes online privacy. But the real challenge is designing with human shortcomings in mind

Editorial

19, Oct, 2017 @6:39 PM

Article image
Empire of digital chip meets nemesis: the law of diminishing political returns | Simon Jenkins

Simon Jenkins: The innovations of the past few years, initially so exhilarating, show ever more downsides

Simon Jenkins

24, Oct, 2013 @7:19 PM