Canada Is Suspicions Of Huawei

Canada is conducting a national security analysis to minimise cyber threats to the country from equipment made by foreign telecommunications companies, including China’s Huawei. 

This is a study that has gained importance since the United States and Australia banned the telecom giant from participating in new wireless cellular networks. Public Safety Minister Ralph Goodale, who recently had discussions in Australia about possible threats from Huawei during a meeting of the Five Eyes intelligence-sharing alliance, said on Tuesday the security analysis is government-wide, but would provide no further details.

Mr. Goodale visited Australia in late August, shortly after Canberra barred Huawei and rival Chinese telecom equipment maker ZTE from supplying parts there for the development of the mobile network known as 5G, citing national security.

“We had the opportunity to hear from Australia in terms of its decision and the decision-making process that is under way in a great many countries," Mr. Goodale told The Globe and Mail after a cabinet meeting. 

"That was useful information from Canada’s point of view, and we are making sure we have the analysis and ultimately the set of decisions that will keep Canadians safe.”

5G is the next stage in cellular technology, and will require massive infrastructure to deliver the promised faster downloads. Under Chinese law, companies must “support, co-operate with and collaborate in national intelligence work” as requested by Beijing, and security experts in the United States and Canada warn that equipment produced by firms such as Huawei could be compromised on behalf of China’s ruling party.

When asked whether Ottawa is considering following the United States and Australia, Mr. Goodale said he did not want to talk about specific companies, but added that “nothing is left out” of the security analysis.

“We are examining the issue of security in relation to supply chains right across the government very carefully. It is a topic that many countries, our allies in particular, are taking a very close look at and have been for a considerable length of time," he said. “We have not arrived at those decisions yet, but obviously we are very sensitive to the issue.”

Supply-chain cybersecurity is the task of managing security requirements for computers, telecommunications, software and networks to reduce the likelihood of attacks such as hacking, malware and theft.  This includes setting criteria for what products can be used or stipulating which vendors can be trusted to supply equipment. Examples of supply-chain cyber threats include vulnerabilities in software that malicious actors can exploit, or malware pre-installed in software or hardware.

Mr. Goodale did not say when the security analysis began, but the Trump administration, Congress and US security agencies have been cranking up pressure on Canada, Great Britain and New Zealand, three of its partners in the Five Eyes, to ban Huawei from 5G networks. 

Japan is also studying whether additional regulations are needed to reduce “security risks from using network equipment from Chinese companies," according to the Wall Street Journal, which spoke to officials responsible for cybersecurity in the Japanese government’s cabinet office. The Japanese business newspaper Sankei Shimbun also reported that the security restrictions being contemplated would effectively ban Huawei and ZTE from Japan.

Huawei’s future in India has also come into question with recent reports saying the Chinese firm was being excluded from the government’s list of partner companies for 5G trials

“We have written to Cisco, Samsung, Ericsson and Nokia, and telecom service providers to partner with us to start 5G technology-based trials, and have got positive response from them,” telecom secretary Aruna Sundararajan told ETT. “We have excluded Huawei from these trials.”

Huawei has denied it is being excluded from 5G trials in India, pointing to comments from the telecom secretary that she might be open to including the firm.

In early September, the Communications Security Establishment (CSE), the spy agency tasked with protecting Canadians from cyberattacks, acknowledged to The Globe that it has been conducting security tests since 2013 on telecommunications equipment sold in Canada by Huawei. Britain has a similar testing system, but a report in July found that the results give only limited assurances that Huawei’s operations pose no threat.

Globe&Mail

You Might Also Read: 

A Looming US vs China Tech War Over Huawei:

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones:

 

« AI Will Create 58 Million New Jobs By 2022
Dubai: Internet City »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

RSA Security

RSA Security

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, and Fraud Prevention.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Hogan Lovells

Hogan Lovells

Hogan Lovells is an international business law firm with offices across Europe, Asia and the USA. Practice areas include Privacy & Cybersecurity.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Advens

Advens

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions.

IoT Security Institute (IoTSI)

IoT Security Institute (IoTSI)

IoT Security Institute is an academic and industry body dedicated to providing frameworks and supporting educational services to assist in managing security within an Internet of Things eco-system.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Aunalytics

Aunalytics

Aunalytics is a data platform company that delivers insights as a service to answer your most important IT and business questions.

Myntex

Myntex

Myntex® is a leading encrypted phone provider, managing a world-class on-site Canadian data center. Our solutions protect against data breaches, digital surveillance, and cybercrime.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

Multidisciplinary Institute for Cybersecurity and Cyber Resilience (IMC2)

IMC2 brings together resources to carry out ambitious, innovative and multidisciplinary projects in the field of cybersecurity and cyber resilience.