All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "643541",
"signature": "Article:643541",
"url": "https://staging.dailymaverick.co.za/article/2020-06-10-are-south-africans-safe-with-huawei-part-2-a-different-kind-of-virus/",
"shorturl": "https://staging.dailymaverick.co.za/article/643541",
"slug": "are-south-africans-safe-with-huawei-part-2-a-different-kind-of-virus",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "Are South Africans safe with Huawei? (Part 2): A different kind of virus",
"firstPublished": "2020-06-10 01:05:36",
"lastUpdate": "2020-06-12 20:47:50",
"categories": [
{
"id": "9",
"name": "Business Maverick",
"signature": "Category:9",
"slug": "business-maverick",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/business-maverick/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
},
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 23023,
"contents": "<span style=\"font-weight: 400;\">First, let’s get the good news out of the way. British intelligence services </span><a href=\"https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk\"><span style=\"font-weight: 400;\">have been scrutinising Huawei’s network</span></a><span style=\"font-weight: 400;\"> equipment for more than a decade, but have never reported evidence of the Chinese state using the company’s technology for espionage.</span>\r\n\r\n<span style=\"font-weight: 400;\">So, for the time being, let’s set aside discussions of trade spats, extreme sanctions and cyberwars between global superpowers and talk about something far less exciting: cybersecurity in South Africa.</span>\r\n\r\n<span style=\"font-weight: 400;\">Now for the bad news. </span><a href=\"https://www.gov.uk/search/all?keywords=HCSEC+&order=relevance\"><span style=\"font-weight: 400;\">British intelligence services</span></a><span style=\"font-weight: 400;\"> have repeatedly</span><span style=\"font-weight: 400;\"> found that Huawei has serious, company-wide cybersecurity issues and, over the years, the company has often been unable to resolve them.</span>\r\n\r\n<span style=\"font-weight: 400;\">Fortunately for the Brits, UK authorities say they can handle the cybersecurity risks posed by Huawei equipment. Unfortunately for South Africans, our country’s resources to mitigate such risks don’t come close to the UK’s arsenal. This is despite the fact that South Africa is far more reliant on Huawei than the UK.</span>\r\n\r\n<span style=\"font-weight: 400;\">Huawei’s cybersecurity issues have become public knowledge thanks to annual reports published over the past five years about the work of a unique facility in the quaint town of Banbury in Oxford in the UK. It’s the Huawei Cyber Security Evaluation Centre (HCSEC) and within it UK cyber experts examine Huawei equipment for security flaws. </span>\r\n\r\n<span style=\"font-weight: 400;\">(In case you are new to all of this: examples of telecom equipment include antennae, base stations, switches – the digital version of the erstwhile telephone exchange – and all the software that accompanies such equipment.) </span>\r\n\r\n<span style=\"font-weight: 400;\">HCSEC’s work is overseen by a special oversight board, which is chaired by the chief executive officer of the UK’s National Cyber Security Centre (NCSC), the country’s leading authority on cybersecurity. The NCSC is a division of Britain’s leading electronic signals intelligence agency, the Government Communications Headquarters (GCHQ).</span>\r\n\r\n<span style=\"font-weight: 400;\">Huawei and several network operators also have representatives on the board. Every year since 2015 the oversight board has issued a report to the UK cabinet on HCSEC’s work. The next annual report is due in a few months.</span>\r\n\r\n<span style=\"font-weight: 400;\">The </span><a href=\"https://www.gov.uk/government/publications/huawei-cyber-security-evaluation-centre-oversight-board-annual-report-2019\"><span style=\"font-weight: 400;\">2019 report</span></a><span style=\"font-weight: 400;\"> states that HCSEC has repeatedly detected “significant technical issues” in Huawei’s “unique software engineering and cyber security processes”. The report said the issues brought “significantly increased risk” to the UK’s networks.</span>\r\n\r\n<span style=\"font-weight: 400;\">It also stated that the HCSEC oversight board had “not yet seen anything to give it confidence in Huawei’s capacity” to implement its own plans to fix “underlying defects”.</span>\r\n\r\n<span style=\"font-weight: 400;\">The findings are significant for South Africans too: </span><a href=\"http://www.connectingafrica.com/author.asp?section_id=761&doc_id=753041\"><span style=\"font-weight: 400;\">Huawei equipment is critical</span></a><span style=\"font-weight: 400;\"> to the country’s telecoms networks, and the HCSEC’s findings show that cybersecurity issues potentially occur in </span><i><span style=\"font-weight: 400;\">many </span></i><span style=\"font-weight: 400;\">Huawe</span><i><span style=\"font-weight: 400;\">i</span></i><span style=\"font-weight: 400;\"> products, so problems aren’t necessarily limited to the UK’s networks.</span>\r\n\r\n<span style=\"font-weight: 400;\">Keywords from the 2019 HCSEC report are “unique” and “underlying”. It means that the problems are specific to Huawei as a company, and to the way their engineers work.</span>\r\n\r\n<span style=\"font-weight: 400;\">All telecoms equipment manufacturers have security issues. But the 2019 report repeatedly states that Huawei does not meet expectations of “industry good practice”. In a June 2019 press conference, about two months after the report was released, the technical director of the NCSC, Ian Levy, </span><a href=\"https://www.theguardian.com/technology/2019/jun/07/huawei-must-raise-shoddy-standards-gchq-senior-uk-cybersecurity-official\"><span style=\"font-weight: 400;\">put it more bluntly</span></a><span style=\"font-weight: 400;\"> to </span><i><span style=\"font-weight: 400;\">The Guardian</span></i><span style=\"font-weight: 400;\">: </span>\r\n\r\n<span style=\"font-weight: 400;\">“Huawei as a company builds stuff very differently to their Western counterparts… the security is objectively worse.”</span>\r\n<blockquote><span style=\"font-weight: 400;\">Although the last report was damning, a closer look shows some problems go much further back, illustrating Huawei’s long-standing inability to fully resolve cybersecurity issues.</span></blockquote>\r\n<span style=\"font-weight: 400;\">To boot, the 2019 report expressed the NCSC’s strong doubts about future Huawei products, stating that it was “highly likely that there would be new software engineering and cyber security issues in products” that HCSEC had </span><span style=\"font-weight: 400;\">“not yet examined”.</span>\r\n\r\n<span style=\"font-weight: 400;\">Huawei has acknowledged the problem. In response to the findings last year, </span><a href=\"https://www.huawei.com/za/facts/voices-of-huawei/interview-with-xu-zhijun\"><span style=\"font-weight: 400;\">rotating chairman Eric Xu said</span></a><span style=\"font-weight: 400;\"> the company was “definitely not just about addressing the concerns of the UK”.</span>\r\n\r\n<span style=\"font-weight: 400;\">Huawei has promised company-wide transformation, pledging $2-billion over a five-year period to do that. Xu said this was “just an initial fund”. But the 2019 HCSEC report was sceptical, stating that it was “no more than a proposed initial budget for as yet unspecified activities”.</span>\r\n\r\n<span style=\"font-weight: 400;\">At the June 2019 press conference, Levy said he still hadn’t seen any concrete plans, saying that Huawei had a lot of work to do: “</span><span style=\"font-weight: 400;\">You wouldn’t expect to have, in six months since we published that report, less than that, them coming out going ‘we’ve fixed it’. That would be unachievable.”</span>\r\n\r\n<span style=\"font-weight: 400;\">Although the last report was damning, a closer look shows some problems go much further back, illustrating Huawei’s long-standing inability to fully resolve cybersecurity issues.</span>\r\n<blockquote><span style=\"font-weight: 400;\">The core network is considered far more sensitive as it is basically the “brain” of the network. It carries far more information because it keeps track of customer billing data, connects calls and routes data, among other things. If hackers target the core, they can steal massive amounts of information, or bring down the network.</span></blockquote>\r\n<span style=\"font-weight: 400;\">In 2010, UK cybersecurity authorities demanded that Huawei fix problems with a practice known as configuration management</span><i><span style=\"font-weight: 400;\">. </span></i><span style=\"font-weight: 400;\">Roughly speaking, this is a fundamental part of the software development process that can affect cybersecurity. Huawei worked to improve their processes, but UK authorities weren’t satisfied. In 2016, HCSEC issued a special report about the lingering issues, but Huawei rejected it. Those issues remained, with the 2019 report labelling them “systemic across the product lines in the company”.</span>\r\n\r\n<span style=\"font-weight: 400;\">By 2018 there was fresh hell for the UK’s cyber experts, with </span><a href=\"https://www.gov.uk/government/publications/huawei-cyber-security-evaluation-centre-oversight-board-annual-report-2018\"><span style=\"font-weight: 400;\">that year’s HCSEC report</span></a><span style=\"font-weight: 400;\"> stating that “shortcomings in Huawei’s engineering processes have exposed new risks in the UK telecommunication networks”. For the first time, the HCSEC oversight board said it “could provide only limited assurance” that all risks posed by Huawei equipment to the UK’s national security could be “sufficiently mitigated”. In 2019 the risks remained.</span>\r\n\r\n<span style=\"font-weight: 400;\">Additional unknowns are something South Africa can scarcely afford in its fight against cybercrime, especially now. Cybersecurity attacks saw a massive increase in March following the announcement of the National State of Disaster, </span><a href=\"https://www.businesslive.co.za/bd/national/2020-03-25-unprecedented-spike-in-cyber-attacks-hits-sa-since-declaration-of-national-disaster/\"><i><span style=\"font-weight: 400;\">Business Day</span></i><span style=\"font-weight: 400;\"> reported</span></a><span style=\"font-weight: 400;\">. According to cybersecurity firm Kaspersky Lab, numbers were up from 30,000 targeted devices per day to as many as 310,000. </span>\r\n\r\n<span style=\"font-weight: 400;\">Multiple experts have sharply criticised South Africa’s lax cybersecurity, with phrases like “</span><a href=\"https://www.itweb.co.za/content/kYbe9MXxax3MAWpG\"><span style=\"font-weight: 400;\">horribly exposed</span></a><span style=\"font-weight: 400;\">” and “</span><a href=\"https://www.itweb.co.za/content/lwrKxv3JO1Lqmg1o\"><span style=\"font-weight: 400;\">safe haven for cyber criminals</span></a><span style=\"font-weight: 400;\">” used to describe the situation. Major criticisms include inaction from intelligence services and ineffective legislation.</span>\r\n\r\n<span style=\"font-weight: 400;\">There is no equivalent to the UK’s HCSEC in South Africa, despite the fact that the country is infinitely more dependent on Huawei than Britain is. In the UK, Huawei components are only used in so-called non-core parts (like base stations and radio antennae); South Africa relies on Huawei for both core and non-core components, particularly </span><a href=\"https://www.mtnconsulting.biz/upcoming-commercialization-of-5g-in-south-africa/\"><span style=\"font-weight: 400;\">Cell C</span></a><span style=\"font-weight: 400;\">, </span><a href=\"https://techcentral.co.za/sa-needs-co-ordinated-response-to-huawei-dilemma-telkom-ceo/89828/\"><span style=\"font-weight: 400;\">Telkom</span></a><span style=\"font-weight: 400;\"> and </span><a href=\"https://www.huawei.com/za/press-events/news/za/rain-and-huawei-jointly-launch-the-first-5g-commercial-network-in-south-africa\"><span style=\"font-weight: 400;\">Rain</span></a><span style=\"font-weight: 400;\">. </span>\r\n\r\n<span style=\"font-weight: 400;\">The core network is considered far more sensitive as it is basically the “brain” of the network. It carries far more information because it keeps track of customer billing data, connects calls and routes data, among other things. If hackers target the core, they can steal massive amounts of information, or bring down the network.</span>\r\n\r\n<span style=\"font-weight: 400;\">However, the NCSC has said it cannot effectively mitigate the risks of components from vendors like Huawei in core networks, which is why </span><a href=\"https://www.ncsc.gov.uk/guidance/ncsc-advice-on-the-use-of-equipment-from-high-risk-vendors-in-uk-telecoms-networks#section_5\"><span style=\"font-weight: 400;\">Huawei gear is only used in non-core parts</span></a><span style=\"font-weight: 400;\">. In January, despite pressure from the </span><a href=\"https://www.bbc.com/news/technology-51283059\"><span style=\"font-weight: 400;\">US to ban Huawei</span></a><span style=\"font-weight: 400;\">, British Prime Minister Boris Johnson gave the company a 35% share in the roll-out of future non-core 5G network sections. The British were able to do this in part because they have the HCSEC to help mitigate risk.</span>\r\n\r\n<span style=\"font-weight: 400;\">(An aside: The UK’s announcement in late May that the </span><a href=\"https://www.theguardian.com/technology/2020/may/24/cyber-security-review-may-lead-to-huawei-loss-of-uk-5g-deal\"><span style=\"font-weight: 400;\">NCSC would do an emergency security review</span></a><span style=\"font-weight: 400;\"> on Huawei following even stricter sanctions from the US, means a new question mark hangs over Huawei’s future in the UK. The matter is likely not so much one of espionage, but rather an issue of supply chain risk. The US sanctions will prevent any company, regardless of nationality, from selling parts to Huawei if US tech was used to make those parts.)</span>\r\n<blockquote><span style=\"font-weight: 400;\">Then</span><a href=\"https://www.c-span.org/video/?460706-1/state-department-official-raises-concerns-reliance-chinese-vendors-5g-networks&playEvent=&beta=&action=getTranscript&transcriptType=cc&service-url=/common/services/programSpeakers.php&appearance-filter=&personSkip=0&ccSkip=0&transcriptSpeaker=&transcriptQuery=bug\"><span style=\"font-weight: 400;\"> there’s the so-called “bugdoor”</span></a><span style=\"font-weight: 400;\"> – a backdoor dressed up as a bug, ideal for espionage since one cannot prove intent to spy even if you detect the error.</span></blockquote>\r\n<span style=\"font-weight: 400;\">Although the UK’s intelligence community will continue to push Huawei to improve its cybersecurity practices, they can only advocate for better product security in UK networks. That means South Africa cannot necessarily rely on the outcomes of HCSEC’s efforts to see improvements in its own network security. It also doesn’t look like South Africa will be getting its own HCSEC any time soon.</span>\r\n\r\n<span style=\"font-weight: 400;\">HCSEC’s history reveals some prerequisites for establishing a cybersecurity evaluation centre that’s accountable to both governments and their citizens. These include highly skilled cybersecurity experts, skilled intelligence officials, mechanisms to hold intelligence officials accountable, and strong political will. But there are clear indications that South Africa lacks these prerequisites.</span>\r\n\r\n<span style=\"font-weight: 400;\">First, South Africa </span><a href=\"https://www.dailymaverick.co.za/article/2018-07-13-mind-the-gap-addressing-south-africas-cybersecurity-skills-shortage/\"><span style=\"font-weight: 400;\">reportedly has a significant shortage</span></a><span style=\"font-weight: 400;\"> of skilled cybersecurity technicians. Though it is unclear just </span><a href=\"https://businesstech.co.za/news/technology/307362/south-africa-to-tackle-cyber-security-shortage/\"><span style=\"font-weight: 400;\">how many are needed</span></a><span style=\"font-weight: 400;\">, the government views it as a major problem. Globally, the research group Cybersecurity Ventures estimates a </span><a href=\"https://cybersecurityventures.com/jobs/\"><span style=\"font-weight: 400;\">3.5 million shortage of cybersecurity experts</span></a><span style=\"font-weight: 400;\"> by 2021.</span>\r\n\r\n<span style=\"font-weight: 400;\">HCSEC is staffed with about 40 cybersecurity experts who work with Huawei’s research and development teams and UK network operators to address security problems. These experts have to make it through strict government security vetting processes.</span>\r\n\r\n<span style=\"font-weight: 400;\">More specifically, HCSEC examines Huawei’s software source codes for vulnerabilities. Roughly speaking, source codes are the original blueprints for software programmes. In general, </span><a href=\"https://uk.norton.com/norton-blog/2016/02/the_8_most_famousco.html\"><span style=\"font-weight: 400;\">vulnerabilities are weak points in source code</span></a><span style=\"font-weight: 400;\"> that can allow a hacker to insert a computer virus into the system. Viruses, in turn, can allow a hacker to completely shut down a network, disable parts of it, take control of it, steal data or spy on communications and Internet activities.</span>\r\n\r\n<span style=\"font-weight: 400;\">Vulnerabilities can include bugs and backdoors: the former are innocent errors in computer code that may cause malfunctioning, while the latter are sections of code deliberately built-in that allow a hacker to secretly take control of a system and intercept data, including trade secrets and communications.</span>\r\n\r\n<span style=\"font-weight: 400;\">Then</span><a href=\"https://www.c-span.org/video/?460706-1/state-department-official-raises-concerns-reliance-chinese-vendors-5g-networks&playEvent=&beta=&action=getTranscript&transcriptType=cc&service-url=/common/services/programSpeakers.php&appearance-filter=&personSkip=0&ccSkip=0&transcriptSpeaker=&transcriptQuery=bug\"><span style=\"font-weight: 400;\"> there’s the so-called “bugdoor”</span></a><span style=\"font-weight: 400;\"> – a backdoor dressed up as a bug, ideal for espionage since one cannot prove intent to spy even if you detect the error.</span>\r\n\r\n<span style=\"font-weight: 400;\">Every time software is updated, it’s possible for these </span><a href=\"https://www.businesslive.co.za/bd/companies/2019-10-29-huawei-cannot-fully-be-trusted-germanys-intelligence-boss-says/\"><span style=\"font-weight: 400;\">vulnerabilities to be inserted into the code</span></a><span style=\"font-weight: 400;\">. Constant scrutiny is needed.</span>\r\n\r\n<span style=\"font-weight: 400;\">Not just anyone can audit Huawei’s source code. The 2019 report states that the work requires “exceptional technical skill and insight”, due to Huawei’s “exceptionally complex and poorly controlled development” process. In certain cases, the report states, Huawei developers “may be actively working to hide bad coding practice”.</span>\r\n<blockquote><span style=\"font-weight: 400;\">To keep things under control, apart from sharp cybersecurity experts, you need even sharper intelligence agents.</span></blockquote>\r\n<span style=\"font-weight: 400;\">Just how hard that job is, became clear when HCSEC tried to ensure consistently “clean” source code (ie, code free of bugs and backdoors) through the highly complex process of “demonstrating binary equivalence”. HCSEC has been trying to do this for a while now, at least as far back as 2016, according to </span><a href=\"https://www.gov.uk/government/publications/huawei-cyber-security-evaluation-centre-oversight-board-annual-report-2016\"><span style=\"font-weight: 400;\">that year’s annual report</span></a><span style=\"font-weight: 400;\">. But the experts cannot get it right because of Huawei’s complex development processes. In fact, the 2019 report shows that the more they try, the more flaws they uncover.</span>\r\n\r\n<span style=\"font-weight: 400;\">It’s a problem because it means the version of a product evaluated in the HCSEC lab may not be identical, or at least similar, to the same version of that product running in the actual network. An inability to compare apples to apples, roughly speaking.</span>\r\n\r\n<span style=\"font-weight: 400;\">Eventually, HCSEC hopes to routinely demonstrate binary equivalence with all Huawei products in UK networks, as “is usual with a well-managed software engineering process”, the 2019 report reads. But, at the time, even with skilled experts, it was declared “impractical at any useful scale”.</span>\r\n\r\n<span style=\"font-weight: 400;\">To keep things under control, apart from sharp cybersecurity experts, you need even sharper intelligence agents.</span>\r\n\r\n<span style=\"font-weight: 400;\">Securing critical infrastructure – like telecoms networks – is a standard component of the mandates of intelligence services the world over. In addition, commercial network operators cannot necessarily be left to their own devices, as the</span><a href=\"https://www.ncsc.gov.uk/blog-post/blog-post-security-complexity-and-huawei-protecting-uks-telecoms-networks\"><span style=\"font-weight: 400;\"> NCSC’s Levy explains</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">Ultimately operators need to make a profit and if cheaper, less secure equipment does the job, they’ll buy it: </span>\r\n\r\n<span style=\"font-weight: 400;\">“No one currently buys telecoms services based on how secure they are, so a company wouldn’t get rewarded if they invested more than their competitors in making a more secure service,” says Levy.</span>\r\n\r\n<span style=\"font-weight: 400;\">But if the government sets minimum cybersecurity standards for operators, it evens out the playing field. </span>\r\n\r\n<span style=\"font-weight: 400;\">There is, however, a vast difference between UK and South African intelligence agencies. </span>\r\n\r\n<span style=\"font-weight: 400;\">The UK’s GCHQ took the initiative to start </span><a href=\"https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk\"><span style=\"font-weight: 400;\">engaging with Huawei in 2003</span></a><span style=\"font-weight: 400;\">, about two years before the company signed its first big UK contract with British Telecom (BT). The GCHQ did so without orders from any UK ministry. In fact, </span><a href=\"https://www.parliament.uk/documents/other-committees/intelligence-security/Critical-National-Infrastructure-Report.pdf\"><span style=\"font-weight: 400;\">BT signed the deal with Huawei </span></a><span style=\"font-weight: 400;\">without consulting any ministers about security issues.</span>\r\n\r\n<span style=\"font-weight: 400;\">Despite this lack of ministerial involvement, the GCHQ went ahead and built working relationships with Huawei’s China-based research and development teams to resolve security issues, and established the same with Huawei’s Product Security Incident Response Team (PSRIT). This wasn’t always easy. The latter is a division dedicated to dealing with new vulnerabilities as they arise. The </span><a href=\"https://www.gov.uk/government/publications/huawei-cyber-security-evaluation-centre-oversight-board-annual-report-2015\"><span style=\"font-weight: 400;\">2015</span></a><span style=\"font-weight: 400;\"> and 2016 HCSEC annual reports show that the relationship between HCSEC and the PSIRT got off to a tense, rocky start.</span>\r\n<blockquote><span style=\"font-weight: 400;\">Apart from the rest of that last paragraph, the statement also leaves out details about just how the SSA will “continuously monitor” all that hardware and software.</span></blockquote>\r\n<span style=\"font-weight: 400;\">In South Africa, the body ultimately responsible for leading the fight for national cybersecurity is the State Security Agency (SSA). The Minister of State Security, Ayanda Dlodlo, has said the SSA has things “covered”.</span>\r\n\r\n<span style=\"font-weight: 400;\">In July 2019,</span><a href=\"https://pmg.org.za/committee-question/11893/\"> <span style=\"font-weight: 400;\">she wrote a reply</span></a><span style=\"font-weight: 400;\"> to a parliamentary question about 5G and national security that shed a rare bit of light on the SSA’s activities. (5G is a new technology standard that will allow for much faster internet speeds. South Africa is in the early stages of rolling out its 5G networks and Huawei will play a crucial role.) Dlodlo assured Parliament that existing 2G, 3G and 4G networks are “covered by the current security precautions and methods applied by SSA security advisory services and related stakeholders”.</span>\r\n\r\n<span style=\"font-weight: 400;\">She added: “SSA will [be required to] further verify and continuously monitor all hardware and software providing 5G services to detect potential threats and vulnerabilities as manda (sic).”</span>\r\n\r\n<span style=\"font-weight: 400;\">Apart from the rest of that last paragraph, the statement also leaves out details about just how the SSA will “continuously monitor” all that hardware and software.</span>\r\n\r\n<span style=\"font-weight: 400;\">The minister’s promise of security is made against the backdrop of an embattled organisation. It is still reeling from Jacob Zuma’s presidency; in 2018 </span><a href=\"https://www.politicsweb.co.za/documents/report-of-the-highlevel-review-panel-on-the-ssa\"><span style=\"font-weight: 400;\">a formal presidential review panel</span></a><span style=\"font-weight: 400;\"> found that it had been turned into his private spy agency and that the agency had “an almost complete disregard for the Constitution, policy, legislation and other prescripts”. Now, corrupt officials need to be ousted, and the </span><a href=\"https://www.news24.com/SouthAfrica/News/ssa-to-be-restructured-as-ramaphosas-national-security-council-gets-the-nod-from-cabinet-20191217\"><span style=\"font-weight: 400;\">agency restructured simultaneously</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">Legislation empowering the SSA to fight cybercrime is somewhere in the ether. The Cabinet approved the </span><a href=\"https://www.gov.za/documents/national-cybersecurity-policy-framework-4-dec-2015-0000\"><span style=\"font-weight: 400;\">National Cybersecurity Policy Framework</span></a><span style=\"font-weight: 400;\"> in 2012 as a blueprint to secure cyberspace, but the SSA only formally published it in 2015, and it’s nowhere near a stage of comprehensive implementation.</span>\r\n\r\n<span style=\"font-weight: 400;\">The legislation meant to give the framework teeth, </span><a href=\"https://www.ellipsis.co.za/cybercrimes-bill/\"><span style=\"font-weight: 400;\">the Cybercrimes</span></a><span style=\"font-weight: 400;\"> and </span><a href=\"https://www.justice.gov.za/legislation/bills/CyberCrimesBill2017.pdf\"><span style=\"font-weight: 400;\">Cybersecurity Bill</span></a><span style=\"font-weight: 400;\">, was first published for public comment in August 2015. But it is now with the Select Committee on Security and Justice in the National Council of Provinces (NCOP). The NCOP is processing public comments on the bill, with a major issue being that, in its current form, it allows authorities to search people’s computers without warrants.</span>\r\n\r\n<span style=\"font-weight: 400;\">There is also doubt in the South African Police Service’s (SAPS) ability to implement sections of the bill for which they are responsible.</span>\r\n\r\n<span style=\"font-weight: 400;\">Then there is what may be a mere PR disaster or signs of institution-wide incompetence.</span>\r\n\r\n<span style=\"font-weight: 400;\">In February, Dlodlo, her deputy minister, Zizi Kodwa, and an undisclosed number of departmental officials </span><a href=\"https://www.dailymaverick.co.za/article/2020-02-27-phones-of-s-africas-state-security-minister-other-officials-found-to-be-cloned/\"><span style=\"font-weight: 400;\">had their cellphones cloned</span></a><span style=\"font-weight: 400;\">. Officials realised this when some of them received text messages from Kodwa that he didn’t send. At the time, the department said it didn’t know who the culprits were or if confidential information was stolen but had reported the case to the police. </span>\r\n\r\n<span style=\"font-weight: 400;\">The public is unlikely to find out to what extent the cloning episode speaks to the SSA’s abilities to secure cyberspace. This brings us to a third prerequisite for establishing an HCSEC: parliamentary oversight.</span>\r\n\r\n<span style=\"font-weight: 400;\">Such oversight in the UK strongly contributed to HCSEC’s public accountability. </span><a href=\"https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/416878/HCSEC_Report.pdf\"><span style=\"font-weight: 400;\">HCSEC started off in 2010</span></a><span style=\"font-weight: 400;\">, but it was not until 2014 that oversight was ramped up. It was prompted by a </span><a href=\"https://www.parliament.uk/documents/other-committees/intelligence-security/Critical-National-Infrastructure-Report.pdf\"><span style=\"font-weight: 400;\">scathing and public report</span></a><span style=\"font-weight: 400;\"> from the UK’s parliamentary intelligence and security committee and a subsequent</span><a href=\"https://www.gov.uk/government/publications/huawei-cyber-security-review\"><span style=\"font-weight: 400;\"> review of HCSEC’s governance</span></a><span style=\"font-weight: 400;\"> by Britain’s National Security Adviser.</span>\r\n\r\n<span style=\"font-weight: 400;\">This resulted in establishing the HCSEC oversight board and its annual reporting to Cabinet. The report includes advice on Huawei’s risk levels and the results of Ernst & Young’s annual audits that aim to ensure that HCSEC is running without interference from its funder, Huawei. So far (and to Huawei’s credit), unlike Huawei’s code, those audits have come up clean.</span>\r\n\r\n<span style=\"font-weight: 400;\">But in South Africa, the parliamentary body that is supposed to hold the SSA publicly accountable – the Joint Standing Committee on Intelligence (JSCI) – never allows public attendance of its meetings. The JSCI is shrouded in as much mystery as the SSA itself.</span>\r\n<blockquote><span style=\"font-weight: 400;\">In July 2019, </span><a href=\"https://4irsa.org/storage/2019/07/Presidential-address.pdf\"><span style=\"font-weight: 400;\">President Cyril Ramaphosa came out guns blazing </span></a><span style=\"font-weight: 400;\">in support of Huawei, saying that “only this company Huawei can lead us to 5G”, and calling Huawei a “victim” of the US-China trade war.</span></blockquote>\r\n<span style=\"font-weight: 400;\">Another way in which politicians can call the SSA to account in Parliament is to ask the minister of state security direct questions. But it is easy to </span><a href=\"https://pmg.org.za/question_replies/?filter%5Bminister%5D=36\"><span style=\"font-weight: 400;\">provide evasive answers</span></a><span style=\"font-weight: 400;\">. A mainstay response for sensitive matters is that anything considered part of the SSA’s “broader operational framework” is “classified and privileged”. This is routinely followed by assurance from the minister that the SSA will be held accountable by the JSCI.</span>\r\n\r\n<span style=\"font-weight: 400;\">This leaves us with the fourth prerequisite for a transparent evaluation centre for Huawei products: political will.</span>\r\n\r\n<span style=\"font-weight: 400;\">When </span><a href=\"https://www.independent.co.uk/news/uk/politics/boris-johnson-huawei-5g-decision-trump-tories-a9380561.html\"><span style=\"font-weight: 400;\">Boris Johnson was sandwiched</span></a><span style=\"font-weight: 400;\"> between UK network operators’ commercial imperatives and pressure from the US to oust Huawei, he compromised by allowing Huawei only a limited share in future 5G networks. But, after giving Huawei the green light, Johnson faced, as the UK Independent put it, his “first major Commons rebellion”, with senior Conservative MPs wanting Huawei out of the UK’s networks by 2022.</span>\r\n\r\n<span style=\"font-weight: 400;\">Johnson is now facing renewed pressure from conservatives to backtrack on his decision after Covid-19 stirred an </span><a href=\"https://www.bbc.com/news/technology-52189281\"><span style=\"font-weight: 400;\">anti-China backlash</span></a><span style=\"font-weight: 400;\"> in the British Parliament.</span>\r\n\r\n<span style=\"font-weight: 400;\">Quite the opposite has occurred in South Africa. In July 2019, </span><a href=\"https://4irsa.org/storage/2019/07/Presidential-address.pdf\"><span style=\"font-weight: 400;\">President Cyril Ramaphosa came out guns blazing </span></a><span style=\"font-weight: 400;\">in support of Huawei, saying that “only this company Huawei can lead us to 5G”, and calling Huawei a “victim” of the US-China trade war.</span>\r\n\r\n<span style=\"font-weight: 400;\">Praise for Huawei from South African officials is nothing new. Ministers have a history of pleasant interactions with Huawei, attending marketing events, publicly </span><a href=\"https://mybroadband.co.za/news/telecoms/340109-huawei-can-take-south-africa-to-the-next-level.html\"><span style=\"font-weight: 400;\">expressing their dedication to cooperate </span></a><span style=\"font-weight: 400;\">with Huawei and </span><a href=\"https://www.huawei.com/za/press-events/news/za/huawei-celebrates-20-years-in-sub-saharan-africa\"><span style=\"font-weight: 400;\">handing out awards of excellence</span></a><span style=\"font-weight: 400;\">. </span>\r\n\r\n<span style=\"font-weight: 400;\">The bond seems to have been strengthened by the Covid-19 disaster. In March, </span><a href=\"https://www.huawei.com/za/press-events/news/za/2020/huawei-donates-a-million-rand-to-assist-sas-covid-19-fight\"><span style=\"font-weight: 400;\">Huawei donated R1-million </span></a><span style=\"font-weight: 400;\">to battle the disease. According to the Huawei press release, Health Minister Zweli Mkhize “hailed the donation as a very important mark of friendship, solidarity and partnership from Huawei and other Chinese businesses”. The company also donated </span><a href=\"https://www.huawei.com/za/press-events/news/za/2020/huaweis-cloud-and-artificial-intelligence--solution-to-boost-sas-covid-19-fight\"><span style=\"font-weight: 400;\">special diagnostic equipment</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">Compared to the UK, South Africa also doesn’t face a strong external political push to oust Huawei. Britain’s 74-year </span><a href=\"https://www.theguardian.com/world/2013/nov/02/nsa-portrait-total-surveillance\"><span style=\"font-weight: 400;\">membership to the Five Eyes Alliance </span></a><span style=\"font-weight: 400;\">contributed greatly to </span><a href=\"https://www.forbes.com/sites/zakdoffman/2019/04/29/u-s-threat-to-u-k-we-will-rethink-intelligence-sharing-if-you-use-huawei/#4fb46b68a1ec\"><span style=\"font-weight: 400;\">pressure from the US</span></a><span style=\"font-weight: 400;\"> to ban Huawei. The alliance, born out of World War II, is an information-sharing espionage network that includes the US, Australia, Canada, New Zealand and the UK.</span>\r\n\r\n<span style=\"font-weight: 400;\">There’s also a </span><a href=\"https://protonvpn.com/blog/5-eyes-global-surveillance/\"><span style=\"font-weight: 400;\">Fourteen Eyes Alliance</span></a><span style=\"font-weight: 400;\"> – the Five Eyes plus Denmark, France, the Netherlands, Norway, Germany, Belgium, Italy, Spain and Sweden. Since 2018, as US pressure has mounted, Huawei has established the </span><a href=\"https://huawei.eu/press-release/huawei-opens-security-innovation-lab-bonn\"><span style=\"font-weight: 400;\">Huawei Security Innovation Lab</span></a><span style=\"font-weight: 400;\"> in Bonn, Germany, and the Huawei </span><a href=\"https://www.huawei.com/za/about-huawei/trust-center/transparency/huawei-cyber-security-transparency-centre-brochure\"><span style=\"font-weight: 400;\">Cyber Security Transparency Centre</span></a><span style=\"font-weight: 400;\"> in Brussels, Belgium.</span>\r\n\r\n<span style=\"font-weight: 400;\">In February 2019, Huawei offered to open up a </span><a href=\"https://www.reuters.com/article/us-poland-security/huawei-offers-to-build-cyber-security-center-in-poland-idUSKCN1PV10P\"><span style=\"font-weight: 400;\">security centre in Poland</span></a><span style=\"font-weight: 400;\">, after a Huawei employee was arrested for espionage, putting pressure on the company to prove its trustworthiness.</span>\r\n\r\n<span style=\"font-weight: 400;\">In South Africa, there is little sign of this kind of pressure. In World War II, the country was an intelligence ally to the UK but didn’t make it into any special clubs thereafter. </span>\r\n\r\n<span style=\"font-weight: 400;\">In the end, there is no apparent pressure on the SSA to take the lead in securing South Africa’s telecoms networks. It seems highly unlikely that South Africa will establish something akin to the HCSEC to hold Huawei accountable to Parliament and the public. And that is the </span><i><span style=\"font-weight: 400;\">real</span></i><span style=\"font-weight: 400;\"> risk. </span><b>DM</b>\r\n\r\n<em>Daily Maverick sent questions to all five major network operators, the State Security Agency, the Joint Standing Committee on Intelligence and, of course, Huawei. We received answers from Huawei, as well as all operators except Cell C. Since the responses are detailed and technical, we’ve published them in full for our readers. The JSCI referred the questions to the SSA. The SSA did not answer our questions.</em>\r\n\r\nRead Huawei's <a href=\"https://www.dailymaverick.co.za/wp-content/uploads/Huawei-correspondence-DM.pdf\">full response here</a>.\r\n\r\nRead MTN's <a href=\"https://www.dailymaverick.co.za/wp-content/uploads/MTN-MEDIA-Questions-from-the-DAILY-MAVERICK-HUAWEI-CYBER-SECURITY.pdf\">full response here</a>.\r\n\r\nRead Rain's <a href=\"https://www.dailymaverick.co.za/wp-content/uploads/RAIN-Gmail-MEDIA-Questions-from-the-DAILY-MAVERICK-HUAWEI-CYBER-SECURITY.pdf\">full response here</a>.\r\n\r\nRead Telkom's <a href=\"https://www.dailymaverick.co.za/wp-content/uploads/TELKOM-RESPONSE-MEDIA-Questions-from-the-DAILY-MAVERICK-HUAWEI-CYBER-SECURITY-copy.pdf\">full response here</a>.\r\n\r\nRead Vodacom's <a href=\"https://www.dailymaverick.co.za/wp-content/uploads/VODACOM-MEDIA-Questions-from-the-Daily-Maverick-copy.pdf\">full response here</a>.\r\n\r\n<i><span style=\"font-weight: 400;\">Heidi Swart is an investigative journalist who reports on surveillance and data privacy issues. This story was commissioned by the Media Policy and Democracy Project, an initiative of the University of Johannesburg’s Department of Journalism, Film and TV and Unisa’s Department of Communication Science.</span></i>",
"teaser": "Are South Africans safe with Huawei? (Part 2): A different kind of virus",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "509",
"name": "Heidi Swart",
"image": "http://local.dailymaverick.co.za/wp-content/uploads/heidiswart.jpg",
"url": "https://staging.dailymaverick.co.za/author/heidiswart/",
"editorialName": "heidiswart",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "8329",
"name": "Huawei",
"url": "https://staging.dailymaverick.co.za/keyword/huawei/",
"slug": "huawei",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Huawei",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "11469",
"name": "Ayanda Dlodlo",
"url": "https://staging.dailymaverick.co.za/keyword/ayanda-dlodlo/",
"slug": "ayanda-dlodlo",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Ayanda Dlodlo",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "11899",
"name": "SSA",
"url": "https://staging.dailymaverick.co.za/keyword/ssa/",
"slug": "ssa",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "SSA",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "85262",
"name": "Cybersecurity",
"url": "https://staging.dailymaverick.co.za/keyword/cybersecurity/",
"slug": "cybersecurity",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybersecurity",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "244125",
"name": "GCHQ",
"url": "https://staging.dailymaverick.co.za/keyword/gchq/",
"slug": "gchq",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "GCHQ",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "109883",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/Huawei-part-2.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/yCkI1JvAa2cBDhtawwYAKlKUU8s=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Huawei-part-2.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/06HEKHn0L2UJp2M5o4qfoCPoSyc=/450x0/smart/file/dailymaverick/wp-content/uploads/Huawei-part-2.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/ADAVinV6kTSjSO3Fg2E-PsZsTnE=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Huawei-part-2.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/MvAvvd9eBvDRG-aBVkiaxi6_PhE=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Huawei-part-2.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/aYXFDTweZu1iy_M07akp3UAU52A=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Huawei-part-2.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/yCkI1JvAa2cBDhtawwYAKlKUU8s=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Huawei-part-2.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/06HEKHn0L2UJp2M5o4qfoCPoSyc=/450x0/smart/file/dailymaverick/wp-content/uploads/Huawei-part-2.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/ADAVinV6kTSjSO3Fg2E-PsZsTnE=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Huawei-part-2.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/MvAvvd9eBvDRG-aBVkiaxi6_PhE=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Huawei-part-2.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/aYXFDTweZu1iy_M07akp3UAU52A=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/Huawei-part-2.jpg",
"type": "image"
}
],
"summary": "Covid-19 has lent renewed vigour to the US’s drive to keep Huawei out of global 5G networks. But South Africa has never shared US fears that Huawei will spy for China and, if anything, the pandemic has strengthened the country’s ties with the company. Yet it’s easy to forget that Huawei has major, long-standing cybersecurity issues.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "Are South Africans safe with Huawei? (Part 2): A different kind of virus",
"search_description": "<span style=\"font-weight: 400;\">First, let’s get the good news out of the way. British intelligence services </span><a href=\"https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk\"><span s",
"social_title": "Are South Africans safe with Huawei? (Part 2): A different kind of virus",
"social_description": "<span style=\"font-weight: 400;\">First, let’s get the good news out of the way. British intelligence services </span><a href=\"https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk\"><span s",
"social_image": ""
},
"cached": true,
"access_allowed": true
}