Is Widespread Suspicion Of Huawei Justified?

China's ambassador to London has described demands that Chinese telecoms giant Huawei must not have a part in the proposed 5G network as a "kind of witch-hunt".  Liu Xiaoming told the BBC that Huawei is privately owned and "nothing to do with the Chinese government".

A group of senior British Conservatives MPs have now written to their fellow Tory MPs expressing concern over the government’s decision to allow Chinese technology company Huawei to have a role in building the UK’s 5G network.

Ex- Conservative Party leader, Ian Duncan Smith who is one the signatories, said there was cross-party concern about the issue. The letter, which was also signed by former ministers including Owen Paterson, David Davis and Damian Green, said some MPs were working to find a better solution to the 5G issue.

The senior Tories want “high-risk” vendors to be ruled out immediately or phased out over time. The letter states: “We are seeking to identify a means by which we ensure that only trusted vendors are allowed as primary contractors into our critical national infrastructure. Trusted vendors would be companies from countries that have fair market competition, rule of law, respect human rights, data privacy and non-coercive government agencies.”

They called on the government to rule out technology from “untrusted, high-risk vendors” in the UK’s infrastructure, or at least to ensure that future legislation includes “sunset clauses” to limit the length of time such companies can be used.

Recently President Trump reportedly had a heated conversation with British Prime Minister Boris Johnson after the United Kingdom allowed the Chinese tech manufacturer Huawei to have a role in the UK's 5G cellphone networks. The Trump administration has long opposed Huawei having any stake in next-generation cellular networks because of national security concerns.

The decision rejected longstanding US concerns about the Chinese tech giant. President Trump was reportedly furious, according to the person, who said Trump berated Johnson over the move, which he characterised as a national security threat.

The White House and Downing Street both declined comment and all they said was, “Today, President Donald J Trump spoke with Prime Minister Boris Johnson of the United Kingdom. The two leaders discussed critical regional and bilateral issues, including telecommunications security.” Since the call, the two sides have agreed to limit the use of Huawei products in the UK. 

CNN:      The Hill:        Independent:          BBC:         Guardian

You Might Also Read:

Can A 5G Network Really Be Secure?:

Just A Normal Day At The Office For Huawei:

 

 

 

 

« US Government Cyber Security Still Needs Work
Massive Growth In Britain's Cyber Security Sector »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

Teramind

Teramind

Teramind provides a user-centric security approach to monitor employee behavior in order to identify suspicious activity, detect possible threats, monitor efficiency, and ensure industry compliance.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

Linksoft Integrated Services

Linksoft Integrated Services

Linksoft provides consulting and customized solutions and services to help our clients make informed decisions for their Cyber Security and Managed Services needs.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

CONCORDIA

CONCORDIA

Concordia is a Cybersecurity Competence Network with leading research, technology, and competences to build the European Secure, Resilient and Trusted Ecosystem.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

Mobilicom

Mobilicom

Mobilicom is an end-to-end provider of cybersecurity and smart solutions for drones, robotics & autonomous platforms.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.