As more governments mull the risks of working with foreign vendors of 5G networks, eyes are on Switzerland as one of the technology’s early adopters. Will the Swiss take a heavier hand in restricting foreign providers like Huawei in the 5G supply chain or let the market decide?This content was published on October 18, 2019 - 11:00
- Deutsch 5G testet die Grenzen der Cybersicherheit in der Schweiz
- Español La 5G pone a prueba los límites de la ciberseguridad en Suiza
- Português Tecnologia 5G desafia limites de segurança na Suíça
- 中文 5G考验瑞士的网络安全底线
- عربي الجيل الخامس من الانترنت يختبر حدود الأمن السيبراني في سويسرا
- Français La 5G teste les limites de la cybersécurité en Suisse
- Pусский 5G тестирует пределы кибербезопасности в Швейцарии
- 日本語 5Gで試されるスイスのサイバーセキュリティー
- Italiano Il 5G è un test per i limiti della sicurezza informatica in Svizzera
In a grim but not-so-far-fetched scenario, a hacker attacks a base station, sending malicious signals to millions of connected devices. It causes a breakdown in the transportation system and energy grid and brings cities to a standstill. This spreads to other countries’ networks, causing a large-scale attack on the global internet.
For all the benefits that the total connectivity enabled by 5G could bring, it also raises the stakes for security as this scenario illustrates. The EU-wide 5G cybersecurity risk assessment released last week reiterated this, stating that the dependence of critical services on 5G networks means a major disruption is likely to have particularly serious consequences.
“Any technological change brings opportunities and risks,” says Florian Egloff, a senior researcher at the Center for Security Studies at the federal technology institute ETH Zurich.
Since no Swiss company has the means to supply the infrastructure required for a 5G network Egloff says the country must rely “on foreign technology providers if you’d like to adopt 5G technology”.
The Huawei case
In the case of 5G, the foreign provider that can produce “at scale and cost” all the elements of a 5G network happens to be Chinese telecom giant Huawei.
This has raised fears of cyber espionage by the Chinese government and prompted government measures ranging from by the US and Australia to proposals for new security protocols in the European Union.
The warnings have also echoed in Switzerland. Swiss politicians raised questions earlier this year about the risks of working with Huawei.
All three major Swiss telecom operators – Salt, Sunrise and Swisscom – are approved to cover the country in 5G, and all have Huawei equipment in their fixed and mobile networks. Sunrise has also contracted Huawei to provide the technology behind the 5G network.
The Swiss government says it is taking security concerns seriously. But it also acknowledges that its hands are somewhat tied.
A spokesperson from the Office of Communications (OFCOM) told swissinfo.ch that “according to the existing legal basis, the government does not have the ability to influence the acquisition of equipment providers by network operators.”
What is 5G?
5G is the next generation of wireless mobile technology, providing greater data speeds, lower latency (better responsiveness), and the possibility to simultaneously connect to more devices. 5G is expected to become what some have called the digital nervous system of society.
This is expected to help advance robotics and automation, virtual and augmented reality, and artificial intelligence and machine learning – connecting devices in ways never seen before. For more information about how Switzerland is developing 5G see here.End of insertion
Who is responsible?
So, who is responsible for guaranteeing the technology is safe? While national security is within the government’s purview, legislation doesn’t always keep apace with rapid changes in technology.
For example, Switzerland’s revised telecommunications law approved by parliament in March 2019 includes a specific article on cybersecurity, calling on companies to combat any unauthorised manipulation of their telecommunications equipment.
However, neither that legislation nor the latest revision of the law on data protection mentions potential threats stemming from contracts with foreign vendors of software or hardware.
“The revised federal telecommunications act was developed at a stage when the topic of foreign providers was not on the agenda,” says Florian Roth, an attorney specialised in telecommunications law at Walder Wyss in Zurich.
There is also a set of non-binding security guidelines that date back to 2009.
Switzerland’s revised cybersecurity strategy also remains rather vague, leaving it up to private actors to put in place measures that it fails to specify, according to Roth.
Roth notes that the approach is typical for the Swiss regulator. “It is very pragmatic. The regulator often delegates to actors on the market to specify which measures are adequate.”
This places much of the responsibility for network integrity in the hands of the telecoms.
There are currently no binding rules for these companies relating to the use of hardware of foreign providers. They also have no legal duty to report a security breach unless it causes major disruptions to service or the network. This may change with the implementation of the revised Swiss data protection act but it isn’t clear when this will come into force.
Both Swisscom and Sunrise told swissinfo.ch that they conduct risk assessments of suppliers and regularly monitor and report threats to the government. Sunrise also indicated that Huawei supplies and operates the systems but the data itself remains with Sunrise.
Swisscom, which is majority state-owned, also said it has exit clauses in all contracts and with all providers. Collaborations also have time limits, typically reviewed and retendered after 5-10 years.
The company also publishes a cybersecurity report on a regular basis.
The backdoor problem
However, some cybersecurity experts say these measures may not be enough. One big question relates to so-called “backdoors”, or hidden remote access points that can be exploited to gain control of a device.
The EU report states that since 5G networks will be largely based on software, major security flaws could make it easier for actors to maliciously insert intentional backdoors into products and make them harder to detect.
According to an addendum to the cybersecurity article in the revised telecommunications law, the government stops short of calling on telecom providers to check for physical access and backdoors in hardware and software.
An OFCOM spokesperson told swissinfo.ch that this was left out largely for feasibility reasons as it’s “often not possible for telecom companies since the customer's computer is located at home or elsewhere.”
Sunrise told swissinfo.ch that “since the first allegations of US politicians against Huawei, no irregularities have ever been detected in Huawei equipment or software, nor has any conclusive evidence been provided to support the allegations against Huawei.” It added that the company does not plan to change Huawei as a supplier.End of insertion
The reality of dependency on foreign providers for 5G infrastructure has led countries to take precautionary measures. While the US and Australia are on the extreme end by blacklisting Huawei, the EU is mulling other tactics to ward off risks, without calling out specific vendors.
The UK has called on operators to work with vendors on assurance testing and more controls on certain high-risk vendors. France is debating a proposal that would require telecom operators to seek formal permission from the Prime Minister for their 5G network projects.
Some individual operators have also been more cautious in signing contracts with Huawei. The Norwegian telecom provider Telia just announced that it has chosen Ericsson over Huawei for its rollout of 5G. The government was quick to say that they didn’t order the company to reject Huawei.
Huawei has repeatedly stated that it would rather shut down than spy for the Chinese government, offering “no-spy agreements” to several governments, most recently Poland.
Wait and see
For now, the Swiss government appears to be taking a wait-and-see approach, watching what happens first in the EU.
The regulator also must weigh protection of personal privacy and market competition when considering tightening the screws on how the sector manages cybersecurity, says Roth.
There is also the matter of rattling relations with China – one of Switzerland’s most important trading partners.
Overall, Egloff of the ETH Zurich believes that the Swiss government is taking the supply chain concerns seriously.
The latest cybersecurity report published in April notes that a general discussion is taking place in the country on how to extricate itself “from dependence on the two de facto technology giants USA and China.” The government also announced it is setting up a competency centre on cybersecurity.
But the challenges are immense from both a strategic and technical perspective. A study by the Center for Security Studies at the ETH Zurich points out that there remains ongoing ambiguity about the details of relationships with the private sector and a lack of incentives for companies to engage with national security issues.
The question, says Egloff, is “at what point onwards should the state either mandate, invest, or assist companies in the defense of their infrastructure?”
A previous version of this article incorrectly referred to a base station as an antenna.
This article was automatically imported from our old content management system. If you see any display errors, please let us know: email@example.com