Is Widespread Suspicion Of Huawei Justified?

China's ambassador to London has described demands that Chinese telecoms giant Huawei must not have a part in the proposed 5G network as a "kind of witch-hunt".  Liu Xiaoming told the BBC that Huawei is privately owned and "nothing to do with the Chinese government".

A group of senior British Conservatives MPs have now written to their fellow Tory MPs expressing concern over the government’s decision to allow Chinese technology company Huawei to have a role in building the UK’s 5G network.

Ex- Conservative Party leader, Ian Duncan Smith who is one the signatories, said there was cross-party concern about the issue. The letter, which was also signed by former ministers including Owen Paterson, David Davis and Damian Green, said some MPs were working to find a better solution to the 5G issue.

The senior Tories want “high-risk” vendors to be ruled out immediately or phased out over time. The letter states: “We are seeking to identify a means by which we ensure that only trusted vendors are allowed as primary contractors into our critical national infrastructure. Trusted vendors would be companies from countries that have fair market competition, rule of law, respect human rights, data privacy and non-coercive government agencies.”

They called on the government to rule out technology from “untrusted, high-risk vendors” in the UK’s infrastructure, or at least to ensure that future legislation includes “sunset clauses” to limit the length of time such companies can be used.

Recently President Trump reportedly had a heated conversation with British Prime Minister Boris Johnson after the United Kingdom allowed the Chinese tech manufacturer Huawei to have a role in the UK's 5G cellphone networks. The Trump administration has long opposed Huawei having any stake in next-generation cellular networks because of national security concerns.

The decision rejected longstanding US concerns about the Chinese tech giant. President Trump was reportedly furious, according to the person, who said Trump berated Johnson over the move, which he characterised as a national security threat.

The White House and Downing Street both declined comment and all they said was, “Today, President Donald J Trump spoke with Prime Minister Boris Johnson of the United Kingdom. The two leaders discussed critical regional and bilateral issues, including telecommunications security.” Since the call, the two sides have agreed to limit the use of Huawei products in the UK. 

CNN:      The Hill:        Independent:          BBC:         Guardian

You Might Also Read:

Can A 5G Network Really Be Secure?:

Just A Normal Day At The Office For Huawei:

 

 

 

 

« US Government Cyber Security Still Needs Work
Massive Growth In Britain's Cyber Security Sector »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

Humming Heads

Humming Heads

Humming Heads offers a complete solution to fight the advanced threats that target a company's endpoints and servers.

Newberry Group

Newberry Group

The Newberry Group provides comprehensive IT services and solutions that optimize operations, minimize risk and deliver measurable business value.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

Slamm Technologies

Slamm Technologies

Slamm Technologies is a trusted IT firm that offers Cyber Security Support, Corporate IT Solutions and Professional IT Training courses with international certification.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

SixMap

SixMap

SixMap is a continuous threat exposure management platform that automatically provides comprehensive enterprise visibility, contextual threat intelligence, and a suite of remediation actions.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.