BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
โ€ข
ยฉ 2026
โ€ข
blacktemple.net
  1. Privacy Threats
  2. /Huawei
๐Ÿ‡จ๐Ÿ‡ณ

Huawei

Also known as: Huawei Technologies ยท Huawei Consumer

device manufacturer70/100
HQ Country
๐Ÿ‡จ๐Ÿ‡ณ China
Category
device manufacturer
Threat Score
70/100
Incidents
20
Known Clients
Telecom operators worldwideChinese government and state enterprisesAfrican Union (headquarters network infrastructure)European 4G/5G network operators
Deployment Countries
๐Ÿ‡จ๐Ÿ‡ณ CN๐Ÿ‡ฌ๐Ÿ‡ง GB๐Ÿ‡ฉ๐Ÿ‡ช DE๐Ÿ‡ซ๐Ÿ‡ท FR๐Ÿ‡ฎ๐Ÿ‡ณ IN๐Ÿ‡ง๐Ÿ‡ท BR๐Ÿ‡ท๐Ÿ‡บ RU๐Ÿ‡ฟ๐Ÿ‡ฆ ZA๐Ÿ‡ฆ๐Ÿ‡ช AE๐Ÿ‡ฎ๐Ÿ‡ฉ ID๐Ÿ‡น๐Ÿ‡ญ TH๐Ÿ‡ฒ๐Ÿ‡พ MY๐Ÿ‡ณ๐Ÿ‡ฑ NL
References
U.S. Entity List Designation (2019)UK Decision to Ban Huawei from 5G Networks (2020)Vodafone Italy Backdoor Discovery (Bloomberg, 2019)

Threat Score Factor Analysis

70/ 100

Overall Threat Score

Overview

Huawei Technologies Co., Ltd. is a Chinese multinational technology corporation headquartered in Shenzhen, Guangdong. Founded in 1987 by Ren Zhengfei, a former officer in the People's Liberation Army (PLA), Huawei has grown into the world's largest telecommunications equipment manufacturer and one of the largest smartphone vendors globally. The company reported revenue of approximately $99 billion in 2023, employs over 207,000 people, and operates in more than 170 countries.

Strategic Significance

Huawei occupies a uniquely consequential position in global privacy and security debates. As the dominant supplier of telecommunications infrastructure, the physical equipment that carries internet traffic, phone calls, and data for hundreds of millions of people, Huawei's equipment sits at the most sensitive chokepoint in digital communications. Unlike a social media app that collects data from willing users, telecommunications infrastructure has the theoretical capability to intercept, copy, or redirect all traffic passing through it.

This infrastructure role, combined with Huawei's Chinese ownership and the Chinese government's legal authority to compel cooperation from domestic companies, has made Huawei the subject of the most significant geopolitical technology dispute of the 21st century. The United States, United Kingdom, Australia, Canada, Japan, Sweden, and other nations have restricted or banned Huawei from their 5G telecommunications networks, while China has retaliated with its own technology restrictions.

Ownership and Governance

Huawei claims to be 100% employee-owned through a complex shareholding structure. However, the nature of this ownership has been questioned by researchers and intelligence agencies:

  • Founder Ren Zhengfei retains approximately 1% of shares but holds effective veto power through governance mechanisms
  • The trade union committee that nominally holds remaining shares has been scrutinized as potentially serving as a proxy for state interests
  • Academic research, including a 2019 paper by Christopher Balding and Donald Clarke, concluded that the ownership structure is opaque and the trade union's actual independence is unclear
  • Huawei has never been publicly listed, precluding the transparency requirements of stock exchange regulation

Data Collection Practices

Huawei's data collection profile spans two distinct domains: consumer devices (smartphones, tablets, wearables) and telecommunications infrastructure (base stations, core network equipment, and cloud services).

Consumer Devices

Huawei's consumer electronics division, which sold approximately 35 million smartphones in 2023, collects device and usage data through:

  • HarmonyOS / EMUI: Huawei's proprietary operating systems collect device telemetry, usage statistics, app activity, and diagnostic data
  • Huawei Mobile Services (HMS): After being cut off from Google Mobile Services due to U.S. sanctions, Huawei developed its own services ecosystem including AppGallery (app store), Petal Search, Petal Maps, and Huawei Cloud, each of which collects user data
  • Health and fitness data: Huawei wearables and health apps collect biometric data including heart rate, sleep patterns, blood oxygen levels, and exercise data
  • Location data: Through Petal Maps and device location services

Telecommunications Infrastructure

Huawei's network equipment is deployed in telecommunications networks in over 170 countries. The privacy implications of infrastructure-level access are categorically different from application-level data collection:

  • Traffic interception capability: Core network equipment has the theoretical ability to intercept, copy, and redirect all data traffic passing through it, including calls, messages, emails, and internet browsing
  • Lawful intercept interfaces: Telecommunications equipment includes built-in lawful intercept capabilities required by regulators worldwide. The concern with Huawei equipment is that these interfaces could be exploited or that additional undisclosed interfaces could exist
  • Software updates: Remote software updates to network equipment could theoretically introduce surveillance capabilities after deployment, a vector that is difficult to detect through pre-deployment security audits
  • Metadata collection: Even without content interception, network equipment generates metadata about communications patterns, volumes, and endpoints that is intelligence-valuable

Huawei Cloud

Huawei Cloud, the company's cloud computing division, provides infrastructure-as-a-service and platform services in multiple markets. Huawei Cloud operates data centers in China, Southeast Asia, Africa, Latin America, and Europe. Cloud services involve direct custody of customer data, making Huawei Cloud's relationship to Chinese legal authorities a material concern for enterprise and government customers.

Known Clients & Government Contracts

Global Telecom Operators

Huawei supplies network equipment to the majority of the world's mobile operators. Key relationships include:

  • European operators: Deutsche Telekom, Vodafone, BT (historically), Orange, Telefonica, and KPN have used Huawei equipment in their 4G and early 5G networks
  • African operators: Huawei is the dominant infrastructure provider across sub-Saharan Africa, supplying equipment to MTN, Safaricom, Ethio Telecom, and dozens of other carriers
  • Southeast Asian operators: Major deployments with operators in Indonesia, Thailand, Malaysia, the Philippines, and Vietnam
  • Middle Eastern operators: Etisalat (UAE), STC (Saudi Arabia), and other Gulf state operators
  • Latin American operators: Infrastructure deployments across Brazil, Mexico, Argentina, and other markets

Chinese Government and State Enterprises

Huawei is a primary technology supplier to the Chinese government:

  • Public security and surveillance: Huawei has provided surveillance infrastructure to Chinese cities as part of "Safe City" and "Smart City" projects, including video surveillance systems, facial recognition integration, and data analytics platforms
  • Xinjiang: Reports by IPVM and other researchers have documented Huawei's involvement in providing surveillance technology deployed in Xinjiang, where the Chinese government has conducted mass surveillance of the Uyghur population. Huawei has disputed characterizations of its role.
  • State-owned enterprises: China's state-owned telecom operators (China Mobile, China Unicom, China Telecom) are major Huawei customers

African Union Headquarters

In January 2018, Le Monde reported that the African Union headquarters in Addis Ababa, Ethiopia, built and equipped by China as a $200 million gift, had been found to be transferring data to servers in Shanghai nightly for five years. Huawei had supplied the IT infrastructure. Huawei denied involvement in any data exfiltration, and the African Union initially denied the reports before launching an investigation. The incident, regardless of Huawei's specific culpability, illustrated the risks of Chinese-supplied telecommunications infrastructure in sensitive government facilities.

Five Eyes Intelligence Assessment

The Five Eyes intelligence alliance (United States, United Kingdom, Canada, Australia, New Zealand) has conducted extensive classified assessments of Huawei's security risk. While the specific intelligence remains classified, the resulting policy actions, bans or restrictions in all five countries, indicate that the intelligence agencies concluded Huawei equipment poses unacceptable security risks for critical infrastructure.

Privacy Incidents & Litigation

Vodafone Italy Backdoor Discovery (2019)

In April 2019, Bloomberg reported that Vodafone had identified hidden backdoors in Huawei equipment deployed in its Italian fixed-line network. The investigation found:

  • Telnet service vulnerabilities: Huawei equipment contained an undisclosed telnet service that could provide unauthorized remote access
  • Repeated recurrence: Vodafone reported that vulnerabilities were removed after being reported but then reappeared in subsequent software updates
  • Timeline: The vulnerabilities were identified as early as 2011 and persisted through 2012 despite Huawei's assurances that they had been addressed

Huawei stated that the issues were software errors rather than intentional backdoors and that they were resolved when identified. Vodafone confirmed the vulnerabilities existed but disputed that they constituted backdoors, describing them as "diagnostic functions" that should have been removed. The incident crystallized concerns about the difficulty of distinguishing inadvertent vulnerabilities from intentional access mechanisms in telecommunications equipment.

U.S. Entity List Designation (May 2019)

In May 2019, the U.S. Department of Commerce added Huawei to the Entity List, effectively banning American companies from selling technology to Huawei without a license. The action was based on national security determinations that Huawei's equipment could be used for espionage and that the company's ties to the Chinese government made it an unacceptable risk. The designation:

  • Cut Huawei off from Google Mobile Services, forcing the development of HarmonyOS and HMS
  • Restricted access to advanced semiconductor manufacturing, severely impacting Huawei's smartphone and 5G chipset production
  • Triggered a cascade of allied nations reassessing their own Huawei deployments
  • Escalated into broader U.S.-China technology competition affecting the entire semiconductor industry

Meng Wanzhou Arrest (December 2018)

Huawei's Chief Financial Officer, Meng Wanzhou (also the daughter of founder Ren Zhengfei), was arrested in Vancouver, Canada, in December 2018 on a U.S. extradition request. The charges alleged that Meng committed bank fraud by misleading HSBC about Huawei's business dealings in Iran, violating U.S. sanctions. The case became a major geopolitical flashpoint:

  • China detained two Canadian citizens, Michael Kovrig and Michael Spavor, in what was widely characterized as hostage diplomacy
  • The case was resolved in September 2021 through a deferred prosecution agreement, with Meng returning to China and the two Canadians being released simultaneously
  • The incident underscored the geopolitical dimensions of Huawei's operations and the Chinese government's willingness to use state power in response to legal actions against the company

UK 5G Ban (July 2020)

In July 2020, the UK government announced that Huawei equipment would be banned from the country's 5G networks, with all existing Huawei 5G equipment to be removed by 2027. The decision reversed a January 2020 decision that had allowed Huawei limited participation in non-core 5G infrastructure. The reversal was driven by:

  • Updated intelligence assessments following U.S. Entity List sanctions, which the UK's NCSC determined undermined confidence in Huawei's supply chain security
  • Political pressure from the United States and Five Eyes allies
  • Revised technical assessments by the Huawei Cyber Security Evaluation Centre (HCSEC), the UK-based facility established to audit Huawei's source code

The ban imposed significant costs on UK telecom operators, estimated at GBP 2 billion in equipment removal and replacement expenses.

HCSEC Annual Reports

The Huawei Cyber Security Evaluation Centre, established in 2010 as a condition of Huawei's participation in UK networks, published annual reports identifying persistent security concerns:

  • 2018 report: Identified "shortcomings in Huawei's engineering processes" that created new risks
  • 2019 report: Found "significant technical issues" and stated it could provide "only limited assurance" that risks to UK national security could be managed
  • 2020 report: Identified "no significant change" in Huawei's security practices despite years of reported deficiencies

The HCSEC reports provided rare independent technical assessment of Huawei's code quality and security practices, consistently finding deficiencies that Huawei failed to remediate.

PRC National Security Law Obligations

China's legal framework creates structural obligations that apply to Huawei regardless of the company's stated intentions:

  • National Intelligence Law (2017): Article 7 requires organizations to "support, assist, and cooperate with national intelligence work"
  • Cybersecurity Law (2017): Requires network operators to provide technical support and assistance to public security and national security agencies
  • Counter-Espionage Law (2023 amendment): Broadened the definition of espionage-related activities
  • Data Security Law (2021): Contains national security provisions that override data protection requirements

These laws mean that the Chinese government has legal authority to compel Huawei to provide access to its technology, data, or infrastructure, regardless of Huawei's corporate policies or contractual obligations to foreign customers.

Threat Score Analysis

Huawei receives a composite threat score of 70/100, reflecting the unique infrastructure-level risk posed by a Chinese telecommunications equipment manufacturer operating under PRC national security laws:

  • Data Collection (68/100): Huawei's consumer device data collection is comparable to other major manufacturers. However, the company's telecommunications infrastructure is deployed in networks carrying traffic for hundreds of millions of users worldwide. The theoretical capability of network equipment to intercept all passing traffic, combined with the opacity of Huawei's software update processes, creates a data collection risk profile that extends far beyond typical device manufacturers. Huawei Cloud further extends custody of customer data.

  • Third-Party Sharing (65/100): There is no public evidence that Huawei has shared telecommunications data with the Chinese government or any third party for intelligence purposes. However, China's National Intelligence Law creates a legal obligation for cooperation that cannot be mitigated through corporate policy alone. The African Union data transfer allegations, while disputed, illustrated the type of risk that classified intelligence assessments reportedly identified. The Five Eyes ban reflects the intelligence community's assessment that this risk is not theoretical.

  • Breach History (55/100): Huawei has not experienced a catastrophic consumer data breach. However, the Vodafone Italy backdoor discovery, the persistent HCSEC findings of security deficiencies, and the reappearance of vulnerabilities after reported remediation indicate systemic software engineering concerns. For telecommunications infrastructure, even minor vulnerabilities can have nation-state-level consequences.

  • Government Contracts (90/100): Huawei's relationship with the Chinese government is the defining element of its threat profile. The company was founded by a PLA officer, operates under national security laws requiring cooperation with intelligence services, supplies surveillance infrastructure to Chinese "Safe City" projects, and has been linked to technology deployed in Xinjiang. The Five Eyes nations' collective determination that Huawei equipment cannot be trusted in critical infrastructure is the strongest governmental assessment of threat since the Cold War.

  • Transparency (32/100): Huawei's transparency is fundamentally limited by its Chinese jurisdiction and private ownership. The company does not face public market disclosure requirements, its ownership structure has been found to be opaque by independent researchers, and its engineering practices have been consistently criticized by the UK's HCSEC. Huawei publishes annual reports and participates in some industry transparency initiatives, but the structural limitations of operating under PRC national security laws make meaningful transparency impossible on the core question: whether and how the company cooperates with Chinese intelligence.

Weighted calculation: (68 * 0.25) + (65 * 0.25) + (55 * 0.20) + (90 * 0.15) + (32 * 0.15) = 17 + 16.25 + 11 + 13.5 + 4.8 = 62.55, adjusted to 70 due to the unprecedented infrastructure-level risk of a telecom equipment manufacturer operating under legal obligations to cooperate with Chinese intelligence services, validated by Five Eyes bans.

Transparency & Accountability

Huawei's transparency and accountability challenges are structural rather than merely behavioral. The company operates at the intersection of Chinese state interests and global critical infrastructure, creating accountability gaps that cannot be resolved through corporate governance alone.

The Structural Transparency Problem

The fundamental question about Huawei, whether it has provided or would provide data or access to Chinese intelligence services, cannot be answered through normal transparency mechanisms. China's National Intelligence Law prohibits organizations from disclosing intelligence cooperation. This means that even if Huawei wanted to be transparent about government data requests, Chinese law would prevent disclosure. The absence of evidence of intelligence cooperation cannot be interpreted as evidence of absence.

HCSEC: Transparency by Exception

The UK's Huawei Cyber Security Evaluation Centre represented the most rigorous independent oversight of Huawei's technology in any country. Despite this unprecedented access, which included source code review, HCSEC consistently found deficiencies and could provide only "limited assurance" of security. When the UK ultimately banned Huawei from 5G, the decision effectively acknowledged that even exceptional transparency measures were insufficient to mitigate the risk.

Corporate Communications vs. Structural Reality

Huawei maintains an active public relations operation, publishes annual sustainability reports, and has repeatedly denied that it has been asked to or would install backdoors in its equipment. Founder Ren Zhengfei has stated publicly that he would "shut the company down" rather than spy on customers. However, these assurances are not legally binding, and Chinese law would prohibit disclosure even if the company were cooperating with intelligence services.

Global Infrastructure Dependencies

The fundamental accountability challenge is that much of the world's telecommunications infrastructure already depends on Huawei equipment. In Africa, Southeast Asia, and parts of Latin America and the Middle East, replacing Huawei equipment is not economically feasible. This creates a dependency relationship where the nations most reliant on Huawei equipment are the least able to hold the company accountable, as any disruption would damage their own telecommunications capabilities.

The 5G Precedent

The global debate over Huawei's role in 5G networks established a precedent for evaluating the privacy and security implications of critical infrastructure suppliers. The determination by multiple democratic governments that a technology company's national jurisdiction creates unacceptable security risks, regardless of the company's specific behavior, represents a new framework for assessing privacy threats at the infrastructure level. This framework extends beyond Huawei to any technology supplier operating under legal obligations that could compel cooperation with intelligence services.

All Companies