Canada Is Suspicions Of Huawei

Canada is conducting a national security analysis to minimise cyber threats to the country from equipment made by foreign telecommunications companies, including China’s Huawei. 

This is a study that has gained importance since the United States and Australia banned the telecom giant from participating in new wireless cellular networks. Public Safety Minister Ralph Goodale, who recently had discussions in Australia about possible threats from Huawei during a meeting of the Five Eyes intelligence-sharing alliance, said on Tuesday the security analysis is government-wide, but would provide no further details.

Mr. Goodale visited Australia in late August, shortly after Canberra barred Huawei and rival Chinese telecom equipment maker ZTE from supplying parts there for the development of the mobile network known as 5G, citing national security.

“We had the opportunity to hear from Australia in terms of its decision and the decision-making process that is under way in a great many countries," Mr. Goodale told The Globe and Mail after a cabinet meeting. 

"That was useful information from Canada’s point of view, and we are making sure we have the analysis and ultimately the set of decisions that will keep Canadians safe.”

5G is the next stage in cellular technology, and will require massive infrastructure to deliver the promised faster downloads. Under Chinese law, companies must “support, co-operate with and collaborate in national intelligence work” as requested by Beijing, and security experts in the United States and Canada warn that equipment produced by firms such as Huawei could be compromised on behalf of China’s ruling party.

When asked whether Ottawa is considering following the United States and Australia, Mr. Goodale said he did not want to talk about specific companies, but added that “nothing is left out” of the security analysis.

“We are examining the issue of security in relation to supply chains right across the government very carefully. It is a topic that many countries, our allies in particular, are taking a very close look at and have been for a considerable length of time," he said. “We have not arrived at those decisions yet, but obviously we are very sensitive to the issue.”

Supply-chain cybersecurity is the task of managing security requirements for computers, telecommunications, software and networks to reduce the likelihood of attacks such as hacking, malware and theft.  This includes setting criteria for what products can be used or stipulating which vendors can be trusted to supply equipment. Examples of supply-chain cyber threats include vulnerabilities in software that malicious actors can exploit, or malware pre-installed in software or hardware.

Mr. Goodale did not say when the security analysis began, but the Trump administration, Congress and US security agencies have been cranking up pressure on Canada, Great Britain and New Zealand, three of its partners in the Five Eyes, to ban Huawei from 5G networks. 

Japan is also studying whether additional regulations are needed to reduce “security risks from using network equipment from Chinese companies," according to the Wall Street Journal, which spoke to officials responsible for cybersecurity in the Japanese government’s cabinet office. The Japanese business newspaper Sankei Shimbun also reported that the security restrictions being contemplated would effectively ban Huawei and ZTE from Japan.

Huawei’s future in India has also come into question with recent reports saying the Chinese firm was being excluded from the government’s list of partner companies for 5G trials

“We have written to Cisco, Samsung, Ericsson and Nokia, and telecom service providers to partner with us to start 5G technology-based trials, and have got positive response from them,” telecom secretary Aruna Sundararajan told ETT. “We have excluded Huawei from these trials.”

Huawei has denied it is being excluded from 5G trials in India, pointing to comments from the telecom secretary that she might be open to including the firm.

In early September, the Communications Security Establishment (CSE), the spy agency tasked with protecting Canadians from cyberattacks, acknowledged to The Globe that it has been conducting security tests since 2013 on telecommunications equipment sold in Canada by Huawei. Britain has a similar testing system, but a report in July found that the results give only limited assurances that Huawei’s operations pose no threat.

Globe&Mail

You Might Also Read: 

A Looming US vs China Tech War Over Huawei:

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones:

 

« AI Will Create 58 Million New Jobs By 2022
Dubai: Internet City »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Wayra UK

Wayra UK

Wayra UK, part of Telefónica Open Future, has been chosen to run a new cyber accelerator facility to help UK start-ups grow and take the lead in producing the next generation of cyber security systems

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

C-MRiC collaborates on initiatives, ranging from national cyber security, enterprise security, information assurance, protection strategy, climate control to health and life sciences.

Aversafe

Aversafe

Aversafe provides individuals, employers and certificate issuers around the world with a first line of defense against credential fraud.

Absa Cybersecurity Academy

Absa Cybersecurity Academy

Absa Cybersecurity Academy is an initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

Secure Blink

Secure Blink

Secure Blink provides automated application and API security solutions that empower developers and security engineers to protect critical assets from exploitation.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.