- The Strategist - https://www.aspistrategist.org.au -

Editors’ picks for 2018: ‘The African Union headquarters hack and Australia’s 5G network’

Posted By on December 27, 2018 @ 06:00



Originally published 13 July 2018.

Last week, Greg Austin wrote in The Strategist that ‘those in Australia advocating for a ban on Huawei in the 5G network—mimicking the opinion of US intelligence chiefs expressed in February 2018—have not reviewed all of the available information and perspectives’. While I don’t agree with the article’s broader argument, Austin was spot-on in one area—we haven’t reviewed all of the available information.

In Addis Ababa, the gleaming 20-storey headquarters of the African Union (AU) rises above the dusty skyline as a testament to the China–Ethiopia and broader China–Africa relationship. The Chinese government, which announced the project in 2006, built and financed the entire US$200 million complex, from the attached 2,500-seat grand conference hall to the office furniture. According to the World Bank, around 12,000 to 15,000 officials and representatives from various entities visit the AU Commission for summits, meetings and other events each year.

In January 2012, the completed building was handed over at a public ceremony. At the opening, Jia Qinglin, then-chairman of the National Committee of the Chinese People’s Political Consultative Conference, delivered a speech in which he said:
The international community should provide support and help to the resolution of African issues. China believes that such help should be based on respect for the will of the African people and should be constructive. It should reinforce, rather than undercut, Africa’s independent efforts to solve problems. Interference in Africa’s internal affairs by outside forces out of selfish motives can only complicate the efforts to resolve issues in Africa.

The AU’s grand and sprawling complex was the focus of intrigue and controversy earlier this year—controversy that sheds light on reported ‘national security concerns’ in Australia about which companies should be involved in our 5G network and other critical infrastructure projects.

In January 2018, France’s Le Monde newspaper published an investigation, based on multiple sources, which found that from January 2012 to January 2017 servers based inside the AU’s headquarters in Addis Ababa were transferring data between 12 midnight and 2  am—every single night—to unknown servers more than 8,000 kilometres away hosted in Shanghai. Following the discovery of what media referred to as ‘data theft’, it was also reported that microphones hidden in desks and walls were detected and removed during a sweep for bugs.

The Chinese government refuted Le Monde’s reporting. Chinese state media outlet CGTN (formerly CCTV) reported that China’s foreign ministry spokesperson called the Le Monde investigation ‘utterly groundless and ridiculous’. China’s ambassador to the AU said it was ‘ridiculous and preposterous’. The BBC also quoted the ambassador as saying that the investigation ‘is not good for the image of the newspaper itself’.

Other media outlets, including the Financial Times, confirmed the data theft in reports published after the Le Monde investigation. It’s also been reported on by think tanks and private consultancies from around the world.

One AU official told the Financial Times that there were ‘many issues with the building that are still being resolved with the Chinese. It’s not just cybersecurity’.

The Le Monde report also said that since the discovery of the data theft, ‘the AU has acquired its own servers and declined China’s offer to configure them’. Other media reports confirmed that servers and equipment were replaced and that following the incident ‘other enhanced security features have also been installed’.

Since the reported theft, the AU Commission has put out a variety of tenders and awarded contracts in relation to the headquarters’ information and communications technology (ICT) infrastructure, including bidding documents for a new WiFi system and a US$85,406 contract for the ‘supply, delivery and installation of firewalls for the AU Commission’.

This week an additional tender was published in relation to the AU’s data centre—the same centre that is referenced in Le Monde’s report. The tender invited organisations to bid for the ‘supply, installation, configuration, testing and implementation of next generation firewall data center for the African Union Commission’ and the bidding document explained that:
African Union’s Data Center is a very critical asset for the African Union. The data stored and systems hosted in this data center need to be protected from any form of internal or external threats and unauthorized access.

What seems to have been entirely missed in the media coverage at the time was the name of the company that served as the key ICT provider inside the AU’s headquarters.

It was Huawei.

The AU Commission signed a contract with Huawei on 4 January 2012. By the time the building hosted its first AU Summit on 29 January 2012, Huawei’s ICT solution—which included computing, storage sharing, WiFi and unified resource allocation services through cloud data centres—was in play. As explained on Huawei’s website:
As a top organization coordinating pan-African political, economic, and military issues, the African Union Commission (AUC) needed a robust information system to support a large number of conferences and the larger amounts of data that they entail. As most of this information is of a confidential nature, legacy PCs were proving too vulnerable to hackers, phishing, viruses, and other forms of compromise.

Huawei provided a range of services to the AU. It provided cloud computing to the AU headquarters and signed a memorandum of understanding with the AU on ICT infrastructure development and cooperation. It also trained batches and batches of the AU Commission’s technical ICT experts.

The main service that Huawei provided to the AU was a ‘desktop cloud solution’. Huawei described the service provision as follows:
The AU needed a robust solution to streamline their conference operations and protect their data from a variety of security threats. They chose Huawei’s FusionCloud Desktop Solution, which offers computing, storage sharing, and resource allocation through cloud data centers.

According to Huawei’s website, part of this solution included providing equipment and resources to the AU’s data centre:
The [Huawei] solution deployed all computing and storage resources in the AU’s central data center where it seamlessly connects to the original IT system. Then, Huawei installed Wi-Fi hotspots and provided the industry’s first Thin Clients (TC) customized with Wi-Fi access …Traditional PC-based architecture exposes data to serious security risks. With Operating Systems (OS) and applications installed on individual machines, data is vulnerable to viruses and plain text transmissions are easier to steal. The FusionCloud solution moves the OS and applications to centralized servers in the AU’s data center to minimize information leakage while TC security measures such as authentication and encryption further secure data.

Huawei’s desktop cloud solution was central to the AU’s cybersecurity and data-protection efforts. Huawei listed ‘better security’ as one of its key benefits. Huawei described the provision of this better security as follows:
Centralized storage in the data center protects data from attack and prevents data leakage from PCs. The system further protects with terminal authentication and encrypted transmission.

But despite the installation and use of Huawei’s ICT services, reputable media outlets reported that the AU’s confidential data wasn’t protected.

There are several possible explanations for why the AU’s confidential data wasn’t protected and safeguarded appropriately from security threats. Let’s say that Huawei was in no way complicit in the alleged data theft. With this option placed to the side, what else is left on the table? There’s the possibility of a (very lengthy) insider threat, for example. There’s also cybersecurity incompetence. Or perhaps the company never discovered the alleged five-year data theft?

Could the reported theft of data have occurred from a set of servers that were outside of Huawei’s purview? While that’s possible, we do know that Huawei ‘deployed all computing and storage resources in the AU’s central data center. Le Monde described the data transfer as occurring from the AU’s servers—servers which were then replaced.

There was also another company that had some involvement in the AU headquarters’ ICT infrastructure: Chinese telecommunications company ZTE. A current bidding document states: ‘New Conference Center (China Building) uses ZTE and HUAWEI technologies.’ There’s little information, in open-source documents at least, about the services ZTE may currently or have previously provided. Nor is there information that suggests it had an overarching role in the provision of ICT services inside the headquarters. Job advertisements for telecommunications engineers inside the AU Commission do cite managing a ‘ZTE integrated business exchange device (IBX)’ as one of the role’s major responsibilities.

So let’s cycle back to the debate on whether Huawei should be allowed to participate in Australia’s 5G network. Let’s say you’re not bothered by the fact that Huawei regularly funds the overseas travel of our politicians (which is within the law). You’re also not convinced by the arguments that Huawei is too great of a technical and cybersecurity risk to our 5G network.

You’ve also decided to dismiss—although I don’t know how—China’s 2017 National Intelligence Law (and other legislation, such as the counterespionage law), which states that ‘all organizations and citizens shall, in accordance with the law, support, cooperate with, and collaborate in national intelligence work, and guard the secrecy of national intelligence work they are aware of’.

Now we have a startling piece of new information to add into the mix. Despite a very public commitment to cybersecurity and the provision of secure data protection, and despite promotional material that boasts of Huawei’s robust and enhanced information security services to the AU—it turns out the AU’s confidential data wasn’t secure at all.

This doesn’t mean the company was complicit in any theft of data from the AU headquarters. But it does mean it must answer some tough questions in relation to this incident. Why? Because it’s hard to see how—given Huawei’s role in providing equipment and key ICT services to the AU building and specifically to the AU’s data centre—the company could have remained completely unaware of the apparent theft of large amounts of data, every day, for five years.

But if in fact Huawei never discovered what appears to be one of the longest-running thefts of confidential government data that we know about, and if it remained completely unaware of this alleged theft for approximately 1,825 days in a row—what are we left with?

A national security concern.


Article printed from The Strategist: https://www.aspistrategist.org.au

URL to article: https://www.aspistrategist.org.au/editors-picks-for-2018-the-african-union-headquarters-hack-and-australias-5g-network/

[1] Greg Austin wrote in The Strategist: https://www.aspistrategist.org.au/the-campaign-against-huawei/

[2] headquarters of the African Union: http://www.skyscrapercenter.com/building/african-union-headquarters/13950

[3] grand conference hall: https://au.int/en/auccc/facilities

[4] office furniture: https://www.reuters.com/article/ozatp-africa-china-20120129-idAFJOE80S00K20120129

[5] According to the World Bank: http://documents.worldbank.org/curated/en/205721468194353464/pdf/816180PAD0P126010Box385177B00OUO090.pdf

[6] public ceremony: http://english.cntv.cn/program/newsupdate/20120129/102944.shtml

[7] he said: http://www.gov.cn/english/2012-01/29/content_2053803.htm

[8] sheds light: https://www.afr.com/business/telecommunications/can-we-trust-the-spies-on-chinas-huawei-20180615-h11fe7

[9] national security concerns: https://www.aspistrategist.org.au/national-security-the-public-debate-and-the-end-of-just-trust-us/

[10] investigation: https://www.lemonde.fr/afrique/article/2018/01/26/a-addis-abeba-le-siege-de-l-union-africaine-espionne-par-les-chinois_5247521_3212.html

[11] reported: https://www.reuters.com/article/us-africanunion-summit-china/china-denies-report-it-hacked-african-union-headquarters-idUSKBN1FI2I5

[12] reported that: https://news.cgtn.com/news/346b6a4e30677a6333566d54/share_p.html

[13] as saying: https://www.bbc.com/news/world-africa-42861276

[14] including the Financial Times: https://www.ft.com/content/c26a9214-04f2-11e8-9650-9c0ad2d7c5b5

[15] think tanks: https://www.cfr.org/blog/african-union-bugged-china-cyber-espionage-evidence-strategic-shifts

[16] private consultancies: https://www.geopoliticalmonitor.com/african-union-rocked-by-china-spying-allegations/

[17] information and communications technology: https://au.int/sites/default/files/bids/34509-bidding_document_-_supply_and_delivery_it_equipment_and_accessories.pdf

[18] infrastructure: https://au.int/sites/default/files/pages/21054-file-contracts_awarded_during_2017.pdf

[19] a new WiFi system: https://au.int/sites/default/files/bids/34462-supply_and_installation_of_supply_and_installation_of_ruckus_high_density_wireless_lan_wifi_for_african_union_conference_areas_and_julius_nyerere_building.pdf

[20] AU’s data centre: https://au.int/sites/default/files/bids/34602-supply_installation_configuration_testing_and_implementation_of_next_generation_firewall_data_center_for_the_african_union_commission_addis_ababa_africa_union_commission.pdf

[21] signed a contract: https://www.huawei.com/en/about-huawei/publications/winwin-magazine/13/HW_147045

[22] cloud computing: http://webcache.googleusercontent.com/search?q=cache:ZRd3o1APSK0J:e-file.huawei.com/~/media/EBG/Download_Files/Cases/en/AU%2520Conference%2520Center%2520Desktop%2520Cloud-a%2520Secure%2520and%2520Efficient%2520Office%2520Platform.pdf+&cd=2&hl=en&ct=clnk&gl=au

[23] a memorandum of understanding: https://www.zawya.com/story/African_Union_and_Huawei_Sign_MoU_on_Partnership-ZAWYA20150130041842/

[24] ICT infrastructure development and cooperation: https://au.int/en/newsevents/29758/auc-signs-mou-huawei-partnership-ict

[25] batches: http://www.xinhuanet.com/english/2017-05/26/c_136318335.htm

[26] batches: https://au.int/en/pressreleases/20151203-3

[27] described the service provision as follows: https://e.huawei.com/au/case-studies/global/older/hw_201214

[28] this solution: http://cdn2.hubspot.net/hubfs/756638/Descargas/Fernando_Velazquez.pdf?t=1460755143345

[29] reported: https://www.thetimes.co.uk/article/china-planted-bugs-while-building-african-union-hq-wqgw5ff7q

[30] that the: https://www.ft.com/content/c9f8367a-05b1-11e8-9650-9c0ad2d7c5b5

[31] states: https://au.int/sites/default/files/bids/34457-revamping_of_old_campus_network_replacement_of_core_switches_bid.pdf

[32] do cite: http://www.aucareers.org/viewvacancy.aspx?id=582

[33] funds the overseas travel: https://www.aspi.org.au/report/who-funds-federal-parliamentarians-overseas-travel

[34] technical and cybersecurity risk: https://www.afr.com/opinion/columnists/the-technical-reasons-why-huawei-too-great-a-5g-risk-20180614-h11e3o

[35] China’s 2017 National Intelligence Law: https://www.aspistrategist.org.au/huawei-highlights-chinas-expansion-dilemma-espionage-or-profit/

[36] counterespionage law: https://www.reuters.com/article/uk-china-lawmaking-espionage/china-adds-broad-new-definitions-to-counter-espionage-law-idUKKBN1E01DF