Canada Is Suspicions Of Huawei

Canada is conducting a national security analysis to minimise cyber threats to the country from equipment made by foreign telecommunications companies, including China’s Huawei. 

This is a study that has gained importance since the United States and Australia banned the telecom giant from participating in new wireless cellular networks. Public Safety Minister Ralph Goodale, who recently had discussions in Australia about possible threats from Huawei during a meeting of the Five Eyes intelligence-sharing alliance, said on Tuesday the security analysis is government-wide, but would provide no further details.

Mr. Goodale visited Australia in late August, shortly after Canberra barred Huawei and rival Chinese telecom equipment maker ZTE from supplying parts there for the development of the mobile network known as 5G, citing national security.

“We had the opportunity to hear from Australia in terms of its decision and the decision-making process that is under way in a great many countries," Mr. Goodale told The Globe and Mail after a cabinet meeting. 

"That was useful information from Canada’s point of view, and we are making sure we have the analysis and ultimately the set of decisions that will keep Canadians safe.”

5G is the next stage in cellular technology, and will require massive infrastructure to deliver the promised faster downloads. Under Chinese law, companies must “support, co-operate with and collaborate in national intelligence work” as requested by Beijing, and security experts in the United States and Canada warn that equipment produced by firms such as Huawei could be compromised on behalf of China’s ruling party.

When asked whether Ottawa is considering following the United States and Australia, Mr. Goodale said he did not want to talk about specific companies, but added that “nothing is left out” of the security analysis.

“We are examining the issue of security in relation to supply chains right across the government very carefully. It is a topic that many countries, our allies in particular, are taking a very close look at and have been for a considerable length of time," he said. “We have not arrived at those decisions yet, but obviously we are very sensitive to the issue.”

Supply-chain cybersecurity is the task of managing security requirements for computers, telecommunications, software and networks to reduce the likelihood of attacks such as hacking, malware and theft.  This includes setting criteria for what products can be used or stipulating which vendors can be trusted to supply equipment. Examples of supply-chain cyber threats include vulnerabilities in software that malicious actors can exploit, or malware pre-installed in software or hardware.

Mr. Goodale did not say when the security analysis began, but the Trump administration, Congress and US security agencies have been cranking up pressure on Canada, Great Britain and New Zealand, three of its partners in the Five Eyes, to ban Huawei from 5G networks. 

Japan is also studying whether additional regulations are needed to reduce “security risks from using network equipment from Chinese companies," according to the Wall Street Journal, which spoke to officials responsible for cybersecurity in the Japanese government’s cabinet office. The Japanese business newspaper Sankei Shimbun also reported that the security restrictions being contemplated would effectively ban Huawei and ZTE from Japan.

Huawei’s future in India has also come into question with recent reports saying the Chinese firm was being excluded from the government’s list of partner companies for 5G trials

“We have written to Cisco, Samsung, Ericsson and Nokia, and telecom service providers to partner with us to start 5G technology-based trials, and have got positive response from them,” telecom secretary Aruna Sundararajan told ETT. “We have excluded Huawei from these trials.”

Huawei has denied it is being excluded from 5G trials in India, pointing to comments from the telecom secretary that she might be open to including the firm.

In early September, the Communications Security Establishment (CSE), the spy agency tasked with protecting Canadians from cyberattacks, acknowledged to The Globe that it has been conducting security tests since 2013 on telecommunications equipment sold in Canada by Huawei. Britain has a similar testing system, but a report in July found that the results give only limited assurances that Huawei’s operations pose no threat.

Globe&Mail

You Might Also Read: 

A Looming US vs China Tech War Over Huawei:

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones:

 

« AI Will Create 58 Million New Jobs By 2022
Dubai: Internet City »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

GeoLang

GeoLang

GeoLang’s Ascema platform protects sensitive information at the content level by identifying, classifying and tracking data across the corporate infrastructure.

Inspirria Cloudtech

Inspirria Cloudtech

Inspirria Cloudtech is a specialized Cloud Technologies Services provider and Cloud Aggregator focused on executing cloud models for clients.

TitanHQ

TitanHQ

TitanHQ offers ultimate protection from internet based threats and powerful Web filtering functionalities to SMBs, Service Providers and Education sectors around the World.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

Dutch Research Council (NWO)

Dutch Research Council (NWO)

The Dutch Research Council (NWO) is one of the most important science-funding bodies in the Netherlands and ensures quality and innovation in science.

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs are a group of IT security specialists, ethical hackers, and researchers driven to identify security flaws before cyber threat actors does.