Canada Is Suspicions Of Huawei

Canada is conducting a national security analysis to minimise cyber threats to the country from equipment made by foreign telecommunications companies, including China’s Huawei. 

This is a study that has gained importance since the United States and Australia banned the telecom giant from participating in new wireless cellular networks. Public Safety Minister Ralph Goodale, who recently had discussions in Australia about possible threats from Huawei during a meeting of the Five Eyes intelligence-sharing alliance, said on Tuesday the security analysis is government-wide, but would provide no further details.

Mr. Goodale visited Australia in late August, shortly after Canberra barred Huawei and rival Chinese telecom equipment maker ZTE from supplying parts there for the development of the mobile network known as 5G, citing national security.

“We had the opportunity to hear from Australia in terms of its decision and the decision-making process that is under way in a great many countries," Mr. Goodale told The Globe and Mail after a cabinet meeting. 

"That was useful information from Canada’s point of view, and we are making sure we have the analysis and ultimately the set of decisions that will keep Canadians safe.”

5G is the next stage in cellular technology, and will require massive infrastructure to deliver the promised faster downloads. Under Chinese law, companies must “support, co-operate with and collaborate in national intelligence work” as requested by Beijing, and security experts in the United States and Canada warn that equipment produced by firms such as Huawei could be compromised on behalf of China’s ruling party.

When asked whether Ottawa is considering following the United States and Australia, Mr. Goodale said he did not want to talk about specific companies, but added that “nothing is left out” of the security analysis.

“We are examining the issue of security in relation to supply chains right across the government very carefully. It is a topic that many countries, our allies in particular, are taking a very close look at and have been for a considerable length of time," he said. “We have not arrived at those decisions yet, but obviously we are very sensitive to the issue.”

Supply-chain cybersecurity is the task of managing security requirements for computers, telecommunications, software and networks to reduce the likelihood of attacks such as hacking, malware and theft.  This includes setting criteria for what products can be used or stipulating which vendors can be trusted to supply equipment. Examples of supply-chain cyber threats include vulnerabilities in software that malicious actors can exploit, or malware pre-installed in software or hardware.

Mr. Goodale did not say when the security analysis began, but the Trump administration, Congress and US security agencies have been cranking up pressure on Canada, Great Britain and New Zealand, three of its partners in the Five Eyes, to ban Huawei from 5G networks. 

Japan is also studying whether additional regulations are needed to reduce “security risks from using network equipment from Chinese companies," according to the Wall Street Journal, which spoke to officials responsible for cybersecurity in the Japanese government’s cabinet office. The Japanese business newspaper Sankei Shimbun also reported that the security restrictions being contemplated would effectively ban Huawei and ZTE from Japan.

Huawei’s future in India has also come into question with recent reports saying the Chinese firm was being excluded from the government’s list of partner companies for 5G trials

“We have written to Cisco, Samsung, Ericsson and Nokia, and telecom service providers to partner with us to start 5G technology-based trials, and have got positive response from them,” telecom secretary Aruna Sundararajan told ETT. “We have excluded Huawei from these trials.”

Huawei has denied it is being excluded from 5G trials in India, pointing to comments from the telecom secretary that she might be open to including the firm.

In early September, the Communications Security Establishment (CSE), the spy agency tasked with protecting Canadians from cyberattacks, acknowledged to The Globe that it has been conducting security tests since 2013 on telecommunications equipment sold in Canada by Huawei. Britain has a similar testing system, but a report in July found that the results give only limited assurances that Huawei’s operations pose no threat.

Globe&Mail

You Might Also Read: 

A Looming US vs China Tech War Over Huawei:

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones:

 

« AI Will Create 58 Million New Jobs By 2022
Dubai: Internet City »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Howden Broking Group

Howden Broking Group

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

ProWriters

ProWriters

As a leading cyber insurance company, ProWriters offers flexible Cyber Liability Insurance coverage designed to cover privacy, data, and network exposures.

KnectIQ

KnectIQ

Building Trust Environments in a Zero-Trust World. KnectIQ offers KIQAssure, an Ultra High Security Solution for Data in Flight.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

watchTowr

watchTowr

Continuous Attack Surface Testing, with the watchTowr Platform. The future of Attack Surface Management.

Vaultree

Vaultree

We believe in an encrypted tomorrow. Vaultree technology enables a foundational change in how we communicate with each other: Safely!

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

DV Cyber Security

DV Cyber Security

DV Cyber (formerly A76) is an innovative cyber security company vertically focused on Threat Intelligence and Cyber Security Research.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.