May 03, 2019
The 5G Future Is Not Just About Huawei
This week, representatives from the United States and more than 30 European Union and NATO countries met in Prague to hash out security principles for 5G—fifth-generation wireless networks. The meeting was convened by Czech Prime Minister Andrej Babis to bring like-minded nations together to agree on non-binding recommendations to safely introduce 5G within their respective countries. Nonetheless, ahead of the summit, Germany and the United Kingdom decided to allow Huawei equipment as part of their 5G networks. The United States cannot adopt this approach.
Quiet quarantines and soft bans, which would be consistent with a softening diplomatic tone toward China, won’t protect U.S. digital infrastructure. Instead, U.S. President Donald Trump should sign the pending executive order that would ban Huawei and other Chinese companies from U.S. networks. Doing so would achieve two things: First, the United States’ decision to exclude Chinese companies would provide cover for allies seeking to enact their own stringent measures against China, whether outright bans or more rigorous security protocols. Second, signing the executive order would communicate that the United States seeks to protect against systemic security risks that go well beyond Huawei—that the security of 5G networks is nonnegotiable.
It is hard to overstate the value of U.S. cover on Huawei issue. Before choosing Huawei rival Ericsson to build Denmark’s 5G network, the Danish defense minister lamented that his hands were tied when it came to legislating against Huawei. Poland also signaled in January that it wanted to take a harder line against the firm, before reevaluating its stance in recent weeks. And amid warnings of Huawei’s close relationship to the Chinese state from his country’s security services, Norway’s justice minister admitted his government was looking at “steps taken in the United States and Britain” in advance of a final decision on whether to exclude the company from building its 5G network.
Read the full article in Foreign Policy.
More from CNAS
-
Technology & National Security / National Security Law
CNAS Insights | The Case for Long-Term CISA 2015 ReauthorizationLast fall, one of the United States’ most important cyber defense laws expired. For six weeks, the private sector no longer had legal protections to share critical cyber threa...
By Carrie Cordero & Morgan Peirce
-
Technology & National Security
Taiwan Is the Key to AI DominanceA country determined to win the defining technological race of the century can’t allow its chief rival to control the industrial base on which that race depends....
By David Feith
-
Defense / Technology & National Security
WarTalk: Iran War with Jack ShanahanThe “love tap” White House readout. A failed convoy operation. KSA pulling overflight rights. Iran with 70% of its missile force still intact. And one F-15E shoot-down from ab...
By Lt. Gen. Jack Shanahan & Jordan Schneider
-
Technology & National Security
American AI Companies Can’t Get Enough ChipsIn 2026, artificial intelligence (AI) chip production has become a binding constraint on the pace of the AI compute buildout. Demand for computing power to train and deploy ad...
By James Sanders, Janet Egan & Rory Madigan
