عربي Espa?ol Русский Fran?ais 简体中文

Intervention by Counselor Wang Lei, Head of Chinese Delegation,on Supply-Chain Security at the First Formal Session of UN OEWG

2019-10-18 08:31

Mr. Chair, Colleagues,

I noted that some colleagues mentioned 5G supply-chain security in their statements, and I would like to elaborate on China's position on this issue.

First, let me ask a question: does the so-called "5G supply-chain security" issue proposed by some countries really make sense? People with the slightest knowledge of the history of ICTs will know that supply-chain security has always been there throughout the development and evolution of ICTs. It is not something new nor exclusive to the 5G technology. Why did no one raise the supply chain issue regarding 2G, 3G or 4G? The reason is that the country and its allies who are touting the so-called "supply-chain security" issue all over the world have always been at the top of the supply-chain and controlled major equipment providers during the periods of 2G, 3G and 4G. However when it comes to the 5G era, a company from a developing country, thanks to innovation and hard work, gained substantial market share and recognition from a majority of countries and finally became the world's leading vendor for 5G equipments. Certain countries, out of ill political intentions, cooked up the so-called "5G supply-chain security" issue without any evidence to oppress and smear the Chinese company. This kind of immoral and discriminatory action disrupts the international

endeavor to focus on and tackle the real problems concerning cybersecurity.

Mr. Chair,

According to evaluation by technical experts, the major security risk in the 5G era is inflicted by IOT (Internet of Things), which will bring both convenience as well as new security risks to people's life. Cyber attacks will be launched mainly through end-users' equipments, IOT applications in such fields as energy and transportation will become new targets of APT attacks, and single-point vulnerability may expand through the network and evolve into systematic security risks. Under such circumstances, it will be harder to predict and control the consequences and scope of cyber conflicts among countries. Cyber conflicts are "unbearable pain" to all states and people who depend on ICTs, and that's why it is more important and urgent than ever to uphold a peaceful cyber environment in the 5G era. China has repeatedly advocated that the international community should all agree that a cyber war cannot be won and must never be fought. We call on all states to put our common interests at the center, and abandon the fallacy of winning a cyber war.

China has consistently supported and advocated the security of supply-chain. Early in 2015, China and Russia as well as other member states of Shanghai Cooperation Organization (SCO) jointly submitted a revised draft of "International Code of Conduct for International Security", in which Article 5 stipulates that:

"To endeavor to ensure the supply chain security of information and communications technology goods and services, in order to prevent other States from exploiting their dominant position in information and communication technologies, including dominance in resources, critical infrastructures, core technologies, information and communications technology goods and services and communication networks to undermine States' right to independent control of information and communication technology goods and services, or to threaten their political, economic and social security."

Mr. Chair,

China is looking forward to having in-depth discussions on supply-chain security and proposing viable solutions with all parties under non-discriminatory condition.

--States should not exploit their dominant position in ICTs to undermine the security of other states's supply-chain of ICT goods and services.

--States should prohibit ICT goods and services providers from illegal access to users' data, control and manipulation of users' devices and systems by installing hidden functions. States should also prohibit ICT goods and services providers from seeking illegitimate interests by taking advantage of users' dependence on their products, or forcing users to upgrade their systems or devices. States should request ICT goods and services providers to make a commitment that their cooperation partners and users would be noticed in a timely manner if serious vulnerabilities are detected in their products.

--States should be commited to upholding a fair, just and non-discriminatory market environment. States should not abuse national security as a pretext for restricting development and cooperation of ICTs and limiting the market access for ICT products and the export of high-tech products.

Thank you, Mr. Chair.

Suggest to a friend
Print