EU Pol. Strategy Centre - Rethinking Strategic Autonomy in The Digital Age - July 2019
EU Pol. Strategy Centre - Rethinking Strategic Autonomy in The Digital Age - July 2019
July 2019
Rethinking Strategic
Autonomy in the Digital Age
In the 21st century, those who control digital technologies are increasingly able to influence
economic, societal and political outcomes. Policymakers around the world are waking up to the
critical imprint that digital technologies have on their countries’ strategic autonomy and a global race for
technological leadership has ensued.
Despite its many assets, the EU is in danger of falling behind in this race. This not only places its long-term
economic prosperity at risk, but opens it up to a whole range of strategic vulnerabilities – all the more so
against a backdrop of escalating geopolitical tensions.
While staying true to its long-standing commitment to openness, competition, and free and fair trade, the
EU must also acknowledge and better understand the new dependencies and vulnerabilities that accompany
technological progress and ubiquitous connectivity, and ensure it has the right protections in place to deal with
them. The EU’s ability to defend and promote its interests, as well as its credibility as a strong
foreign policy actor, will largely be a function of its cyber resilience and technological command.
EPSC Strategic Notes are analytical papers on topics chosen by the President of the European Commission. They are produced by the European Political
Strategy Centre (EPSC), the European Commission’s in-house think tank.
Disclaimer
The views expressed in the EPSC Strategic Notes series are those of the authors and do not necessarily correspond to those of the European Commission.
1
EPSC Strategic Notes
While the notion of strategic autonomy has primarily Challenges faced Opportunities for rogue
been understood as a defence-related concept, there is by state actors / non-state actors
growing impetus to consider a broader set of defining • Lack of cyber capacity • Manipulation and nudging
factors.2 It is also important to note that strategic leading to struggle with of public opinion
attribution, deterrence and • Cybercrime for economic
autonomy is not an end in itself but rather a means retaliation or political purposes
for protecting one’s interests. This reflects the fact that • Erosion of state monopoly
Europe’s ability to decide and act independently • Interference in public order
on force and security
is being challenged on new levels, warranting • New strategic imperatives • Undermining governance &
a rethinking of the strategic paradigms that have critical infrastructure
traditionally guide domestic and foreign policy. While
Source: European Political Strategy Centre
this relates to many areas, the impact of developments
in the digital technologies realm is particularly Those who are able to control digital technologies –
important, as ubiquitous connectivity permeates whether by developing the systems themselves, exploiting
every aspect of society, the economy and politics, them, or manipulating them – are increasingly able to
giving rise to new vulnerabilities. shape economic, societal and political developments.
Payoffs range from large-scale economic benefits to
Several trends increase the urgency of assessing and improved military capabilities and a comparatively
better understanding how weaknesses and shortcomings higher degree of strategic autonomy. A global race for
in digital technologies might translate into security leadership in key digital technologies or enabling
threats and strategic impediments. First, digital systems – such as Artificial Intelligence, 5G, or quantum
technologies are blurring traditional lines between computing – has ensued as a result, and it is increasingly
military and civilian technologies (Figure 1) as dual- characterised by international tensions and a growing
use technologies are rolled out and as the weaponisation ‘geopoliticisation’ of digital technologies around
of digital applications becomes easier, cheaper and more the globe. Yet, even those with the greatest technological
accessible. Seemingly innocuous digital innovations capacities are not immune to the vulnerabilities of the
in the civilian sphere are transforming into digital age – as evidenced by Russia’s interference in the
potential military threats, challenging the traditional US presidential elections in 2016. This highlights the need
defence-centred definition of strategic autonomy. for a greater anticipation of possible malign abuses of
new technologies – something that Western democracies
In addition, ubiquitous connectivity and digitalisation have all too often overlooked until it was too late.
are redefining the very notion of critical
infrastructure, as systems that were previously If Europe wants to maintain its ‘Weltpolitikfähigkeit’
isolated become connected, adding levels of (ability to play a role in shaping global affairs) in this
complexity for those operating – and safeguarding environment, it needs to react to these developments,
– them. Today, it is no longer just information and step up the competitiveness of its home-grown tech
communications technology (ICT) systems that are sector and mitigate factors that are undermining its
open to cyberattacks, but an ever-larger share of the strategic autonomy.
infrastructures that support an increasingly data-based
ecosystem – and that includes electoral processes.
2012
2013
2014
2015
2016
2017
2018*
instantaneously compared with the billions of years of
processing that would be needed using conventional
Source: OECD estimates, based on Crunchbase (July 2018)
computers. According to industry experts, in little more
than five years, quantum computers will render many
of today’s security standards insufficient,16 potentially
Figure 4: China massively investing in
compromising not only private and commercial
interests, but also sensitive governmental and military quantum applications
secrets. In anticipation of these game-changing Quantum application patent families by priority countries and
publication year
developments, malign actors are suspected of ‘data
China North America Japan EU27 South Korea
harvesting’ – scraping and storing wastes of currently 600
encrypted information for future decryption and use. 500
2013
2014
2015
2016
2017
With the number of connected devices projected to rise On the one hand, overreliance on imports as well as
exponentially over the next decade, security aspects foreign ownership of critical public and private
will become more pressing. Already in 2018, Internet of infrastructures and service providers make the
Things devices ranked as the number one attack target on EU and its Member States susceptible to external
the Internet, with Distributed Denial of Service being the pressure and even coercion. This has been the case in
most common attack type.17 Europe appears especially the EU’s foreign policy conduct, where decisions are to
vulnerable, with Polish cybersecurity firm F5 Networks be taken by unanimity in the Council. While the risk of
observing over 50% of reported global Distributed Denial external pressures is not restricted to digital technologies,
of Service attacks to take place on the continent.18 Europe’s dependencies on foreign technology can provide
adversaries with additional leverage – which is only likely
While these vulnerabilities are not exclusive to to grow further with the proliferation of new technologies.
foreign imports, global supply chains do muddy the
picture and make enforcement of cybersecurity On the other hand, technology has become an
standards and prosecution of perpetrators all the increasingly central element of democracy and
more difficult. For instance, one of the main suppliers governance in the digital era. While this has opened
of products used in the ‘Mirai’ attack, Chinese camera unprecedented new avenues for public discourse,
manufacturer Xiongmai Technology, only offered a democratic debate and citizen engagement, it is also
muted response to the incident, and critics argue that increasingly being hijacked and weaponised by malign
the security risks and poor design and production safety forces to undermine Western democracies. Threats can
standards of many Chinese Internet of Things producers be split into three vectors:
continue to be an issue.19
• Attacks that target IT systems and data to
interfere with the electoral process or voting
Furthermore, technical risks are only one side
technology: The US Department of Homeland Security
of the equation. A key contentious issue is the
announced it had evidence that Russian hackers
extraterritorial nature of certain foreign laws,
targeted voting systems in over 75% of states in the
such as the US Cloud Act, which gives its authorities
2016 US presidential election.22 Closer to home, the
legal access to data stored on US cloud providers’
supposedly ‘state-of-the art’ software developed for
servers regardless of their location. Similar provisions
operating Swiss elections was found to contain a grave
exist in Chinese law, raising even more serious privacy
cryptographic backdoor, theoretically allowing for large-
and data security concerns (see box page 12).
scale, untraceable manipulation of election results.23
Similar security concerns have led a number of European
Unclear boundaries between state and non-state
countries to drop electronic voting in recent years.
actors in third countries constitute another
serious political risk. In China, the entanglement • Threats that manipulate voting behaviour and
of ostensibly private companies with the Communist undermine trust in democracy: When malicious
Party and state networks adds a layer of opaqueness. A actors are unable to penetrate or corrupt particular
recent report by the Mercator Insitute for China Studies technical systems to disrupt elections, they can also
describes the challenge of tracking the web of party aim to delegitimise public institutions and the entire
influence, state control mechanisms and international democratic process. This can take place through
linkages that tie China’s digital ecosystem to central, targeted hacks and leaks to sway public opinion;
provincial and local governments – and the military.20 fake news to influence electoral results; and the
While ZTE’s ties to the state are officially recognised, use of psychometrically-targeted messaging based
Huawei promotes itself as a fully privately owned on mined user data – such as in the Cambridge
enterprise. This claim is disputed by experts who Analytica/Facebook scandal or the hack against the
point out complex governance structures and dilluted then presidential election frontrunner Emmanuel
decision-making powers that give way to party-state Macron’s campaign team in 2017 in France.24
co-optation in the form of government funding and
• Attacks that target public institutions: Recent
preferential procurement.21
hacks against and infiltrations of the EU’s diplomatic
communications network – often suspected to be
Political autonomy: linked to Russian and Chinese operatives – highlights
European democracies undermined? the EU’s persistent vulnerabilities.25 Reports about
Russian hacking group APT28 placing malware
The vulnerabilities described above have both direct and in German government networks and infiltrating
indirect implications for the political aspects of strategic both the foreign and defence ministries further
autonomy, i.e. the ability of the EU and its Member underscore the need for utmost caution, especially as
States to make decisions freely and without undue cybersecurity vulnerabilities are increasingly exploited
interference from foreign pressures. for geopolitical gains.26
Russia has been widely recognised as pioneering Europe’s large market for online content and data-
the exploitation of disinformation operations and based services has enabled it to implement ambitious
cyberattacks as a foreign policy tool. But now, more consumer and data protection regulation, which has had
governments and non-state actors are employing a strong signalling effect on the global level and already
these tactics. Crucially, as trust in public institutions prompted action by many other jurisdictions. However,
and democratic mechanisms is declining, even the European players have not yet managed to capture
perception of vulnerabilities in such areas can already sufficiently significant market shares in the Internet
have harmful consequences. economy to achieve a similar norm-making status.
Similarly, although European tech companies were well-
When cyberattacks and manipulated information
positioned in the specification of international technical
pollute and distort the public debate, they
standards for cellular networks such as 2G, 3G and 4G,
effectively interfere with democracies’ ability
they are not in a similar position when it comes to 5G.27
to make well-informed decisions freely and
independently. However, more than that, by driving
In the meantime, as China’s technological and economic
polarisation and sowing division within targeted
footprint grows, so is its influence in international
societies, disinformation campaigns are effectively
standardisation processes (Figure 5). The country is also
leading to a growing fragmentation of the political
using its Belt and Road Initiative to generate lock-in
landscape in Europe, making it more difficult than ever
effects by imposing Chinese content requirements
to form stable governments and maintain consensus
and infrastructure standards. As the geography of
throughout their mandates. Weakened governments,
innovation shifts eastwards, it will become increasingly
driven by a distorted public discourse, find themselves
challenging for European players to pursue their
dissipating their political capital on domestic quarrels
interests on the global level.
rather than on international affairs, which in turn
reduces their country’s standing and ability to defend
Figure 5: China expanding its presence in
their interests in the global arena.
standard-setting bodies
From rule-maker to rule-taker Share (%) of Chinese representatives in ISO Technical Committee (TC)
secretariats, Sub-Technical Committee (SC) secretariats and Working Group
Ultimately, the ability of the EU and European (WG) secretariats.
stakeholders to shape rules and standards governing 2011 2018
10
digital technologies, their use, and the companies
producing and operating them, is crucial for its strategic 8
autonomy. Not only do industrial standards affect the 6
Share in %
China is the major supplier of critical raw Such reliance on external partners carries with it the
materials, accounting for 70% of global supply and dual risk of supply chain disruptions and of intentionally
62% of the EU’s supply (e.g. rare earth elements, compromised components penetrating the EU’s digital
magnesium, antimony, natural graphite, etc.). Brazil, equipment and infrastructure.
Kazakhstan, Nigeria, Russia and Turkey are other
producers on which the EU has a high reliance.
Russia
Scandium 67%
Norway Tungsten 50%
Silicon metal 23% Vanadium 60%
USA
Erbium 40% China
Helium 51% Antimony 90%
Samarium 40% Baryte 44%
Bismuth 84%
Morocco Cerium 62%
Phosphate rock Dysprosium 40%
Mexico 27% Europium 40%
Fluorspar 27% Gadolinium 40%
Gallium 36%
Turkey Germanium 43%
Borate 98% Holium 40%
Nigeria Indium 28%
Tantalum 43% Indonesia Lanthanum 40%
Brazil
Niobium 71% Natural rubber 32% Lutetium 40%
Magnesium 94%
Natural graphite 69%
Neodymium 40%
Praseodymium 40%
Terbium 40%
Thulium 40%
Ytterbium 40%
Yttrium 40%
Source: European Commission, DG GROW
20
Share of worldwide revenues
15 30%
10
5 20%
0
Electronic Electronic Semiconductors Other 10%
equipment boards electronic
stand alone components
embedded 0%
Q4 15
Q1 16
Q2 16
Q3 16
Q4 16
Q1 17
Q2 17
Q3 17
Q4 17
Q1 18
Still in the race When it comes to public investment, even the most
ambitious European R&D programmes seem timid in
Despite these shortcomings, there are fields in global comparison. While French President Emmanuel
which European players maintain a strong global Macron set up a 1.5 billion euro fund for R&D in Artificial
position. This includes enterprise software – with Intelligence in France in April 2018,44 the Chinese city
global giants SAP or Amadeus; industrial robotics – with of Tianjin alone announced a plan to pump 13.5 billion
8 out of the world’s 20 biggest firms headquartered euro into the industry.45
in Europe;38 or indeed mobile infrastructure – a fast-
growing market that notably includes 5G. Although
Huawei is expanding rapidly and has become the single Figure 10: EU providers remain in top 3
Revenue shares (%) of worldwide service provider equipment*
largest player with a 29% share of the global telecom
equipment market in Q3 2018, the two leading European Huawei Nokia (inc Alcatel Lucent) Ericsson ZTE
Cisco Ciena Samsung
mobile infrastructure companies – Nokia and Ericsson 32%
– together still hold 30.4% of the global market (Figure
Revenue Share %
10) – despite China’s market being largely closed off. 24%
16%
Too timid on R&D
8%
In order to preserve its competitive sectors and regain
ground in others, investments in future technologies are 0%
2013 2014 2015 2016 2017 2018
essential. However, there are reasons to fear that Europe Note: *includes broadband access, carrier IP telephony, microwave,
might again fall behind on key strategic technologies. mobile RAN, optical, SP router and CE switch, wireless packet core
Research and development (R&D) activities targeting Source: Dell’Oro, 2018
digital technologies have been substantially higher
in both the US and China for many consecutive years.
China, in turn, is critically dependent on foreign technology for semiconductors, which are central to most
electronic devices (Figure 11).41 This reliance of Chinese businesses on foreign technology was highlighted when
the US embargo on China-based technology company ZTE almost led to its collapse. Faced with a 260 billion US
dollar annual import bill, China is trying to grow its chip industry, namely through acquisitions abroad, prompting
countries such as Taiwan and South Korea to put policies in place to restrict Chinese purchases of domestic
semiconductor producers and intellectual property flows into China.42 After a state-owned enterprise from China
failed to take over US chipmaker Micron in 2015, the latter reported a massive case of industrial espionage and
accused newly founded Fujian Jinhua Integrated Circuits of attempts to copy its products.43
As these cases illustrate, in today’s interconnected world of globalised supply chains, no one can walk alone.
From a strategic point of view, the issue is hence more complex than simply seeking to prevent, or
eliminate, vulnerabilities in supply chains. In many respects, it appears more realistic to find ways to
manage and reduce, when possible, these vulnerabilities. Likewise, some dependencies might be less
critical than others, depending on the country of origin and the technologies involved.
Trends in the private sector paint a similar picture: Intellectual property at risk
US and Chinese companies by far outpace their EU
counterparts in terms of growth of R&D investments, on an unlevel playing field
increasing their spending by 9% and 20% respectively Europe’s struggles cannot all be put down to lack
from 2017 to 2018, against just 5.5% for the EU. of R&D investment in digital technologies. There
Consequently, the global R&D share of European are indeed examples of where it has succeeded in
companies in ICT industries retracted by more developing frontier technologies and even of building
than 8% compared to 2017.46 frontrunner, innovative companies. However, all too
often, these are then bought up by non-EU competitors
These developments are also reflected in patent trends. – along with all their know-how, copyrights and patents.
In 2017, China surpassed Japan and came in second This is all the more likely to happen in an environment
after the US as the main source of international patent where start-ups face a lack of available scale-up
applications.47 A look at the types of patents filed also funding, but it can also be the result of targeted
shows the direction of travel, with four of the five top foreign industrial strategies and a distorted,
categories representing applications from the digital unlevel playing field (Figure 13).
technology sphere. In fact, two Chinese telecoms
companies were the top filers of international patent Increased foreign acquisitions and strategic investments
applications in 2017, with Huawei (number one filer) in Europe have siphoned away ownership over some of
and ZTE (number two) followed by Intel, Mitsubishi and Europe’s most innovative companies. While the influx
Qualcomm. All top 10 firms – Ericsson being the only of capital has been a welcome boost to the economy
European one – are from the digital technology sphere, in certain cases, it has also come with concerns about
underlining the research intensity of the sector.48 unfair trade and investment practices, strategic
technology transfers and opaque ownership structures.50
In addition, while American and Chinese patent activity In recent years, China’s industrial policy has been
prioritised digital communications, computer technology specifically tailored towards gaining access to
and electronics, the European frontrunner, Germany, key technologies in Europe and the US in order
filed most of its patents in the field of transport, to build up its own global presence (see box on
followed by electronics and mechanical elements (Figure page 12).
12). It is therefore perhaps unsurprising that projections
foresee that 95% of the roughly 200 billion Internet of European businesses also regularly point out other
Things devices connected globally by 2020 will have unfair industrial and investment practices,
been produced in China.49 ranging from large-scale industrial espionage, to
lax intellectual property protection in the Chinese
From a strategic autonomy perspective, it should market and ‘forced’ knowledge transfer, whereby
be clear that, as digitalisation progresses, these companies wanting to gain access to the Chinese market
technological shortfalls will not only generate are made to enter into joint ventures that result in their
economic disadvantages, but also have much technology being handed over to their Chinese partners.
broader implications for the EU’s ability to protect The role of China’s state-owned companies –
its strategic interests. This is all the more true as supported by tax breaks, subsidies and low-cost loans
commercial innovation already outpaces military R&D from state-owned banks – is particularly problematic.
in many areas including dual-use technologies, making
cutting-edge R&D a cornerstone of strategic
autonomy in the long term.
Figure 13: EU’s commitment to open
markets not always reciprocal
Restrictions on foreign investments are higher in China than in the EU
Figure 12: A question of priorities according to the FDI Restrictiveness Index (1=closed; 0=open)
Research priorities, ranked by number of patent applications, 2017 0,35
US China Japan Germany
0,30
Transport 3rd 1st 0,25
Medical technology 2nd 2nd 0,20
Digital 3rd 1st 0,15
communication
0,10
Computer 1st 2nd 0,05
technology
0,00
Mechanical China Canada United States Japan EU22 (OECD
elements 3rd
members)
Electrical machinery, closed open
apparatus, energy 3rd 1st 2nd
Source: Organisation for Economic Cooperation and Development,
Source: World Intellectual Property Organisation FDI Restrictiveness Index 2017
Not only do these firms benefit from an unlevel playing opaque relationship between China’s private sector and
field when competing to buy up innovative technology its Communist Party, even deals with ostensibly private
firms, but there is also a probability that any intellectual entities can become controversial, as highlighted by the
property acquired in the process could be passed on to the takeover of German robotics company Kuka in 2016 by
Chinese state rather than retained as a commercial secret. Chinese household manufacturer Midea. While concerns
German machinery company KraussMaffei Group and focused on the risk of technology transfers and the
Swedish microchip manufacturer Silex Microsystems offshoring of production capacity, it is also noteworthy
are just some examples of recent takeovers of high- that soon after the takeover, Kuka entered into a joint
technology European assets with the involvement of venture with Changan Industry, a subsidiary of one of the
Chinese state-owned enterprises.54 Furthermore, given the country’s largest state-owned military enterprises.55
China’s ‘techno-protectionism’
Figure 14: China aiming for substitution
China pursues a state-centric approach, combining Semi-official targets for the domestic market share of Chinese
a comprehensive industrial policy with several products (in %)
strategic instruments. Its ‘Made in China 2020 2025
New energy vehicles
2025’ strategy aims to drastically reduce China’s High-tech ship components
dependence on imported technologies by replacing New and renewable energy equipment
foreign supply with domestic production (Figure 14).51 Industrial robots
Beijing is aiming for 70% ‘self-sufficiency’ in High performance medical devices
Large tractors above 200 hp
high-tech industries by 2025 and a ‘dominant’ and harvesters
Mobile phone chips
global position by 2049. Notably, takeovers in Wide-body aircraſts
Europe are especially targeting next-generation 0 20 40 60 80
IT (27.7%, see figure 15). Furthermore, many of Source: MERICS / Expert Commission for the Construction of a
Manufacturing Superpower
the technologies and products that this strategy
covers are dual-use, looking to boost not only China’s
economic strength but also its military capabilities. Figure 15: Europe’s next-generation IT
The Chinese system is also very protective with
targeted by Chinese takeovers
Chinese investments in Europe related to ‘Made in China 2025’ by
regard to public order: In the name of upholding sector of the acquired firm
the ‘national security and interests of the People’s Biopharmaceutical and
high-tech medical dev. 3.8%
Republic of China’, Beijing has, for instance, introduced New materials 10.0%
far-reaching legal obligations on companies Electrical equipment 9.2%
and individuals, regardless of geography. These Energy-saving and new 22.3%
energy vehicles
requirements are featured across several laws – most Advanced rail equipment 1.5%
Aerospace and aviation equipment 6.2%
prominently in the National Intelligence Law, Numerical control machinery 19.2%
and robotics
which demands that any organisation or citizen Next generation IT 27.7%
shall not only support, provide assistance, and Source: JRC computations on foreign ownership database. Period:
cooperate in national intelligence work, but Jan 2015 - Aug 2018
also guard the secrecy of any national intelligence
work that they are aware of (Article 7). The law also gives sweeping powers to Chinese intelligence agencies to
search premises, seize property and mobilise individuals or organisations to conduct espionage, giving intelligence
agencies legal ground to operate both within and outside of China.
In addition, the Internet is systematically closed off from foreign information and all content is subject to sophisticated
surveillance and control. China’s Cybersecurity Law develops the concept of ‘cyberspace sovereignty’. Therein,
the Chinese government sets out security reviews for critical information infrastructure to determine whether possible
damage, loss of function or data leaks of the related facilities would pose a significant threat to national security
and public interests.52 Economic, technological or scientific data relevant to national security or the public
interest can no longer leave China. In addition, Chinese authorities must ‘test’ and ‘certify’ computer
equipment of foreign firms – raising concerns over intellectual property theft.53
For instance, when Meng Wanzhou, the daughter of the updates to ensure the integrity of European telecoms
founder of Huawei, was arrested in Vancouver in late 2018, infrastructure? What disruptions could affect Europe’s
it took China less than a week to detain two Canadian critical infrastructure, households and businesses if the US
nationals in a move that was widely seen as an act of does not extend its 90-day grace period for this ban? What
retaliation.67 In early 2019, Polish authorities arrested two future for US-EU security cooperation when US Secretary
individuals – one of them a Chinese citizen and Huawei of State Michael Pompeo has already warned that the
employee – on spying charges and are now calling for the US might stop sharing information with partners who
EU and NATO to take a ‘joint stance’ on Huawei.68 adopt Chinese 5G technology in their networks and critical
information systems?72
In this volatile environment, the EU finds itself
squeezed between an emergent China and a Being subject to such arbitrary actions – without any
US fighting to retain its global tech supremacy. control but with maximum exposure – is why the EU must
Without any doing of its own, the EU now risks being get serious about its own digital strategic autonomy.
caught in a dispute that can have more adverse effects
than, for instance, in the United States, which is broadly
speaking without Chinese telecoms infrastructure. This is A measured approach to
in stark contrast to Europe, where Huawei equipment
already constitutes a significant share of mobile strategic autonomy in the
network infrastructure (Figure 15). Huawei’s stake in
Europe’s 4G base-station market for 2018 is reported at digital age
over 40%,69 and thought to be even higher for individual
Member States). On 5G, Chinese network manufacturers With the US and China raising the stakes in the struggle
ZTE and Huawei are involved in one third of trial projects for technological leadership, the EU and its Member
in the EU28, while European competitors are allowed States need to consider their own positioning
only a marginal role in China’s 5G rollout.70 in this global race. Based on a rigorous and honest
analysis, they need to devise strategies on how to
With Huawei already a leading manufacturer of 5G trial respond to current vulnerabilities – and anticipate future
equipment in Europe,71 and in the absence of a change in challenges better and earlier.
Member States’ approach to the company, its presence
is slated to grow. Its considerable footprint in European It is clear that they already have a wide arsenal of
markets and networks makes it difficult to estimate the instruments at their disposal to safeguard and build up
knock-on effects that US restrictions on the firm might have their strategic autonomy – even in this fast-paced digital
in the EU. The recent export ban by the US administration age. However, what is still lacking is an overarching
caused turmoil and highlighted some pressing questions: and strategically-driven vision guiding the use of
Will Huawei still be in a position to provide the necessary these instruments towards protecting European interests.
The EU should also step up flanking measures that The EU’s public procurement rules and grant
can help reduce dependencies and increase its provisions ought to better take account of the criticality
level of strategic autonomy. For instance, a faster of digital technologies in sensitive sectors and more
transition towards a circular economy can reduce clearly address liability and security issues. This means
reliance on certain critical raw materials. giving sufficient weight to security considerations
when evaluating proposals – and developing a more
In a world with ubiquitous connectivity between all common understanding of what these are. But it also
things, vulnerabilities will increase exponentially. And means placing greater emphasis on the diversification
as sensors, algorithms and data flows become an of hard- and software providers, as well as on
integral part of our lives, citizens’ distrust in technologies the transparency of supply chains for network
stems overwhelmingly from security concerns. That is equipment – particularly when it comes to the
why existing institutional structures need to be ownership and governance structures of suppliers
strengthened – or new ones built – so Europe can and service providers.
more effectively address the multitude of policy
issues that are arising at the intersection of digital The same is true for questions of ownership of critical
and security. information infrastructure, where foreign direct investment
screening provides a valuable tool, but could be supported
Furthermore, the EU should continue to shape by a more structural assessment from the European
the digital sphere in line with Member States’ Commission that proactively informs Member States of
preferences, who on their own stand little chance sectoral and technological trends that could affect the
of upholding their citizens’ interests vis-à-vis global Union’s strategic autonomy. Ultimately, this process might
tech giants or managing disruptions brought about by warrant restrictions or specific requirements – such
digitalisation. Building on its strong track record in setting as proof of integrity – to be applied to certain
standards and acting as a normative power, as illustrated suppliers when it comes to critical infrastructure or
by the General Data Protection Regulation (GDPR), the sensitive government functions such as intelligence
‘ethics guidelines for trustworthy Artificial Intelligence’ agencies or executive offices – a procedure already
or the ‘Code of Practice against disinformation’,77 EU implemented in various Member States.
policymakers are developing a rich toolbox to ensure
that developments in the digital age are compatible with Levelling the playing field
European values and strategic interests.
As outlined in the Joint Communication ‘EU-China: A
Strategic Outlook’,78 the EU and its Member States must
Protecting critical information balance competition and open markets – as key drivers of
infrastructure innovation – with safeguards that ensure that domestic
It is clear that the EU cannot and should not aspire industries do not suffer from unfair, distortive trade or
full self-sufficiency in digital technologies. A significant industrial practices by global competitors.
share of its existing digital infrastructure, such as
telecommunications networks, relies strongly on foreign Although trade and investment barriers may result in an
technology and providers, and will continue to do so. This economic negative-sum game, they might nonetheless
is not a problem per se and can even bring advantages be considered necessary for certain critical sectors in
such as lower prices and greater choice. Yet, in light light of strategic concerns, as demonstrated with the
of ensuring Europe’s cyber resilience, supply chain recent adoption of the EU foreign investment screening
security and the integrity of its critical information mechanism. Similar safeguards may be warranted in
infrastructure must be considered more thoroughly. other areas and the full range of EU policies should
In particular, as regards the rollout of 5G networks, be reviewed critically to assess whether they risk
a more precautionary approach is needed that running counter to the EU’s strategic autonomy.
acknowledges security risks as well as the long-
term economic benefits of secure and trustworthy Against this backdrop, the European Commission
network infrastructure. Indeed, Europe can only seize should review the openness of European funding
the new economic opportunities offered by mission- programmes such as Horizon Europe, Important
critical 5G services if these are trusted by all actors in Projects of Common European Interest’ or the
the economy and society. Otherwise, what may seem 5G public-private partnership, with a view to
‘cheap’ today may actually turn out to be very expensive identifying and scrutinising projects that are potentially
in the long run, when considering the cost of losing disadvantageous to Europe’s strategic autonomy or its
technology leadership or the price of being dependent on long-term interests. For example, should third countries
authoritarian third countries. that do not reciprocate European openness in their own
research programmes be entitled to participate? Does
it make sense to pool significant EU resources towards be paramount for Europe to build on such initiatives
building world-class technology solutions in an effort to and activate its broad global network to foster future
pursue strategic autonomy and digital leadership, while at alliances on digital security. And, given the need for all
the same time inviting companies from countries that are countries to gradually adopt new technologies such as 5G
deemed ‘systemic rivals’ into the consortia? and AI in the near-term, while being exposed to the same
challenges, partner countries should be encouraged
In addition, and following the implementation of the to opt for higher levels of data protection and
foreign direct investment screening mechanism, a security standards, especially in accession countries
pertinent next step would be the adoption of the and the European neighbourhood region.
International Procurement Instrument as an
offensive measure aimed at ensuring reciprocal market In addition, the EU and its Member States should enhance
access in public procurement. Furthermore, the EU and their cyber defensive efforts in line with the EU Cyber
its Member States should strengthen export rules Defence Policy Framework. They also need to increase their
to avoid unintentional technology transfer, especially cyber diplomacy efforts, including further operationalisation
of potential dual-use applications of general-purpose of the joint EU diplomatic response to malicious cyber
technologies such as Artificial Intelligence. activities (the ‘cyber diplomatic toolbox’). Above all, the EU
should continue efforts to set rigorous cybersecurity
Upgrading digital diplomacy and standards, to discourage the development and
proliferation of weaponised digital technologies, and
shaping tech developments with to promote trusted supply chains around the globe.
like-minded countries
As the EU knows from its own experience, nations
In the current environment, there is a clear risk of stand taller in the international realm when they
fragmentation, expanding digital protectionism, stand – and act – together. The beginning of a
and waning trust, which would be detrimental to new political cycle offers a much-needed opportunity
both economic and political relationships globally. to upgrade ‘digital diplomacy’ to a joint priority
Successful international cooperation and multilateral for EU institutions and EU Member States’ diplomatic
solutions will be paramount to set defining joint standards services, creating a network of trusted digital partners.
and guidelines, and avoid the disruption of global value The seeds for such an approach are already being sown
chains and data flows. with the EU’s ambitious ‘Connectivity Strategy’ with Asia.
Notes
1. High Representative of the Union for Foreign Affairs and Security 23. Zetter, Kim, Researchers Find Critical Backdoor in Swiss Online
Policy and Vice-President of the European Commission, Shared Voting System, Motherboard, 12 March 2019.
Vision, Common Action: A Stronger Europe, June 2016. 24. Untersinger, M., La campagne d’Emmanuel Macron dans le viseur
2. Earlier noteworthy publications on this topic include: de pirates russes, April 2017.
Timmers, Paul, Cybersecurity Is Forcing A Rethink Of Strategic 25. Sanger, David & Erlanger, Steven, Hacked European Cables Reveal
Autonomy, 14 September 2018; Lippert, Barbara, von Ondarza, a World of Anxiety About Trump, Russia and Iran, The New York
Nicolai and Perthes, Volker, European Strategic Autonomy, SWP Times, 2018; Cerulus, L., EU mission in Moscow discovers potential
Research Paper, 4 March 2019. hack into systems, May 2019.
3. See, e.g., République Française, Revue Stratégique de Défense et 26. DW, Germany admits hackers infiltrated federal ministries, Russian
de Sécurité Nationale, 2017. group suspected, 2018.
4. Supply risk, as defined by DG GROW, reflects the risk of a disruption 27. Ericson, The missing puzzle piece in Europe’s bid for tech
in the EU supply of the material. It is based on the concentration leadership, Politico, 2018.
of primary supply from raw materials producing countries,
considering their governance performance and trade aspects. It 28. European Commission, Critical Raw Materials, 2018.
considers the ‘bottleneck’ stage of the material (extraction or 29. European Commission, Report on critical raw materials and the
processing) as presenting the highest supply risk for the EU, while circular economy, 2018, p. 34.
substitution and recycling are considered risk-reducing measures. 30. European Commission, Critical Raw Materials, 2018.
5. In acknowledgement of this, the European Commission since 2011 31. Based on Eurostat data.
curates a list of critical raw materials, subject to regular review
32. European Commission, ‘Boosting Electronics Value Chains in
and updates. While not specific to digital technologies, the list
Europe’, June 2018.
encompasses those raw materials of high importance to the wider
EU economy that are also of high risk associated with their supply. 33. International Data Corporation, Smartphone Market Share, 2018;
See European Commission, Critical Raw Materials, 2018. Business Insider France, Here are the companies that sell the most
PCs worldwide, 2017.
6. Operators of essential services are private businesses or public
entities with an important role to provide security in healthcare, 34. High-level representatives of companies and research and
transport, energy, banking and financial market infrastructure, technology organisations, Boosting Electronics Value Chains in
digital infrastructure and water supply. Europe - A report to Commissioner Gabriel, June 2018.
7. European Commission, Commission Recommendation of 26 March 35. Much of this production is in fact for US-headquartered
2019 on Cybersecurity of 5G networks, March 2019. semiconductor companies, which produce close to 40% of the
world market – but only partly in the US.
8. Cimpanu, Catalin, Cisco removed its seventh backdoor account this
year, ZDNet, 7 November 2018. 36. Synergy Research Group, Cloud Growth Rate Increased Again in Q1;
Amazon Maintains Market Share Dominance, April 2018.
9. Whittaker, Zack, Juniper confirms leaked NSA exploits affect its
firewall, ZDNet, 23 August 2016. 37. See, for instance, Delcker, J., German watchdog says Amazon cloud
vulnerable to US snooping, April 2019.
10. Government of the United Kingdom, Huawei cyber security
evaluation centre oversight board: annual report 2019, March 38. Technavio Blog, Top 21 Industrial Robotics Companies in the World
2019. 2019, February 2019.
11. Lepido, Daniele, Vodafone Found Hidden Backdoors in Huawei 39. Interagency Task Force in Fulfillment of Executive Order 13806,
Equipment, Bloomberg, 30 April 2019. Assessing and Strengthening the Manufacturing and Defense
Industrial Base and Supply Chain Resiliency of the United States,
12. Fields, Ziska, Handbook of Research on Information and Cyber
September 2018.
Security in the Fourth Industrial Revolution, IGI Global, 2018.
40. Kay, Amanda, Top Rare Earth Mining Reserves by Country, Rare
13. Graham, Chris, Cyber attack hits German train stations as hackers
Earth Investing News, 2018.
target Deutsche Bahn, May 2017.
41. McBride, James, Is ‘Made in China 2025’ a Threat to Global Trade?,
14. Cloudflare, Inside the infamous Mirai IoT Botnet:
Council on Foreign Relations, 2018.
A Retrospective Analysis, December 2017.
42. The Economist, Chip wars: China, America and silicon supremacy,
15. Fiott, Daniel & Lindstrom, Gustav, Artificial Intelligence: What
December 2018.
implications for EU security and defence?, EUISS Brief, 2018.
43. Feng, Emily, How China acquired mastery of vital microchip
16. Foremski, Tom, IBM warns of instant breaking of encryption by
technology, Financial Times, January 2019.
quantum computers: ‘Move your data today’, ZDNet, 2018.
44. Le Parisien, Intelligence artificielle : Macron annonce un plan à 1,5
17. Boddy, Sarah et al., The Hunt for IoT: Multi-Purpose Attack
milliard d’euros, March 2018.
Thingbots Threaten Internet Stability and Human Life, F5 Labs,
2018. 45. Reuters, China’s city of Tianjin to set up $16-billion artificial
intelligence fund, May 2018.
18. Bell, Lee, Europe is the world’s biggest target for DDoS attacks, F5
Networks claims, ITPRO, 2018. 46. European Commission, 2018 Industrial R&D Scoreboard: EU
companies increase research investment amidst a global
19. Naming & Shaming Web Polluters: Xiongmai, October 2018.
technological race, December 2018.
20. Shi-Kupfer, K., Ohlberg, M., China’s Digital Rise: Challenges for
47. World Intellectual property Organisation, China Drives International
Europe, Mercator Insitute for China Studies, April 2019.
Patent Applications to Record Heights; Demand Rising for
21. Bloomberg News, Huawei Personnel Worked With China’s Military Trademark and Industrial Design Protection, March 2018.
on Research Projects, 27 June 2019.
48. World Intellectual Property Organisation, Who filed the most PCT
22. Riley, M. and Robertson, J., Russian Hacks on U.S. Voting System patent applications in 2017?, March 2018.
Wider Than Previously Known, June 2017.
49. Desvignes, Frank, The Internet of Things – Made in China, AxA Including Google, Restrict Dealings With Huawei After Trump Order,
Group, October 2016. New York Times, May 2019.
50. European Commission, 36th Annual Report from the Commission 65. Warren, T., ARM cuts ties with Huawei, threatening future chip
to the European Parliament and the Council on the EU’s Anti- designs – A major blow to Huawei, The Verge, May 2019.
Dumping, Anti-Subsidy and Safeguard activities, 31 July 2018. 66. Johnson, K, Groll, E., China Raises Threat of Rare-Earths Cutoff to
51. Wübbeke, Jost et al., MADE IN CHINA 2025 - The making of a U.S., Foreign Policy, May 2019.
high-tech superpower and consequences for industrial countries, 67. Abedi, Maham, Canadians’ detainment in China is retaliation for
Mercator Institute for China Studies, December 2016. Huawei arrest, Trump adviser says, Global News Canada, 2018.
52. Wagner, Jack, China’s Cybersecurity Law: What You Need to Know, 68. The Guardian, Poland calls for ‘joint’ EU-Nato stance on Huawei
The Diplomat, 2017. after spying arrest, January 2019.
53. Tanner, Murray Scot, Beijing’s New National Intelligence Law: From 69. Satake, M., Europe adopts Huawei gear into 5G networks over US
Defense to Offense. Lawfare, 2017. objections, May 2019.
54. Frankfurter Allgemeine, China kauft Krauss Maffei, January 2016; 70. Based on the ’European 5G Trials’ list by the 5G PPP, accessed on
Feng, Emily, How China acquired mastery of vital microchip 21 June 2019.
technology, Financial Times, January 2019.
71. Shi-Kupfer, K., Ohlberg, M., China’s Digital Rise: Challenges for
55. KUKA ZWISCHENBERICHT Q3/17 Europe, Mercator Insitute for China Studies, April 2019.
56. Interagency Task Force in Fulfillment of Executive Order 13806, 72. Pham, Sherisse, The US is stepping up pressure on Europe to ditch
op. cit. Huawei, CNN Business, February 2019.
57. Muñoz, Carlo, Chinese rapid military advance closing gap on U.S., 73. European Commission, Commission Recommendation of 26 March
Pentagon warns, The Washington Times, 2018. 2019 on Cybersecurity of 5G networks, March 2019.
58. Volz, Dustin, Trump signs into law U.S. government ban on 74. https://eur-lex.europa.eu/legal-content/EN/
Kaspersky Lab software, Reuters, 2017 TXT/?uri=uriserv:OJ.C_.2014.188.01.0004.01.ENG
59. Denyer, Simon, Japan effectively bans China’s Huawei and ZTE 75. Noteworthy ongoing initiatives also include the ECSEL JU, a
from government contracts, joining U.S. The Washington Post, Public-Private Partnership for electronic components and systems,
2018; Vieira, Paul & McNish, Jacquie, Canada Faces Pressure which funds research, development and innovation projects for key
to Ban Huawei Equipment, The Wall Street Journal, 2018; enabling technologies, and the contractual PPP on cybersecurity
Slezak, Michael & Bogle, Ariel, Huawei banned from 5G mobile launched in 2016 with the aim of stimulating the cybersecurity
infrastructure rollout in Australia. ABC News Australia, 2018. industry in Europe and fostering cooperation between public and
60. Weinland, Don, US national security reviews to hit Chinese private actors at early stages of the research process of new
investment, Financial Times, 2018. cybersecurity solutions.
61. Meanwhile, the final report was published: Brown, Michael and 76. https://ec.europa.eu/digital-single-market/en/eurohpc-joint-
Pavneet Singh, China’s Technology Transfer Strategy: How Chinese undertaking
Investments in Emerging Technology Enable A Strategic Competitor 77. European Commission, Ethics guidelines for trustworthy AI,
to Access the Crown Jewels of U.S. Innovation, Defence Innovation April 2019; European Commission, Code of Practice against
Unit Experimental, 2018. disinformation, January 2019.
62. Wilson Sonsini Goodrich & Rosati, CFIUS in 2017: A Momentous 78. European Commission and HR/VP, EU-China – A strategic outlook,
Year, 2018. March 2019.
63. Hanemann, T., Gao, C. & Lysenko, A., Net Negative: Chinese 79. Bing, C., Stubbs, J., U.S. to press allies to keep Huawei out of 5G in
Investment in the US in 2018, Rhodium Group, 2019. Prague meeting: sources, Reuters, April 2019.
64. Satariano, A., Zhong, R., and Wakabayashi, D., U.S. Tech Suppliers,
PDF: ISBN: 978-92-76-09035-9 • DOI: 10.2872/231231 • ISSN: 2467-4222 • Catalogue number: ES-AA-19-001-EN-N
HTML: ISBN: 978-92-76-09034-2 • DOI: 10.2872/407179 • ISSN: 2467-4222 • Catalogue number: ES-AA-19-001-EN-Q