FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones

In the age of fake news, collusion, coercion, and bots, the heads of all three US intelligence agencies all agree on one thing: don’t buy Huawei phones.

CBS News reports that FBI Director Christopher Wray, CIA Director Mike Pompeo, and Director of National Intelligence Dan Coats each gave testimony on Capitol Hill recently to address the cybersecurity threats facing the nation and all admitted that they would never willingly use a Huawei handset.

The impact on you at home: The intelligence community has been warning about the risk of Huawei for years, but the timing of the message here is clear: buy the Mate 10 Pro at your own risk. Ever since a 2012 investigative report, in which Huawei was wholly uncooperative, lawmakers have been warning about the potential dangers of using Huawei phones, but with the company on the verge of a US breakout, the rhetoric has been ramped up considerably. 

Even without any hard evidence, the intelligence community seemingly has ample reason to suspect Huawei of cyber espionage, and it is stopping at nothing to ensure the Mate 10 Pro isn't a big seller in the US.

While Huawei wasn’t specifically targeted in the officials’ prepared statements on the threat assessment, Senate Intelligence Committee chairman Sen. Richard Burr steered the conversation to China when he stated, “The focus of my concern today is China, and specifically Chinese telecoms companies like Huawei and ZTE that are widely understood to have extraordinary ties to the Chinese government.”

ZTE might be a small player in the smartphone industry, but Huawei is the No. 2 or No. 3 phone maker in the world and has been desperately trying to break into the US market for years. Heading into CES it seems as though it had finally gained a foothold with a US carrier, but AT&T pulled out at the last minute after pressure from a bipartisan group of lawmakers.
When asked whether they would recommend US citizens buy phones from these manufacturers, none said they would, with committee member Sen. Mark Warner adding, “We need to make sure that this is not a new way for China to gain access to sensitive technology.”

In his opening remarks, Coats said the US is facing "a complex, volatile, and challenging threat” from foreign entities “using cyber to penetrate virtually every major action that takes place in the US.” While the agencies have yet to produce specific evidence that Huawei is working with the Chinese government to siphon data from its customers, Huawei has long been suspected of using its technology to spy on users.

With the $799 Mate 10 Pro due to begin shipping this month, Huawei had this to say in response, “Huawei is aware of a range of US government activities seemingly aimed at inhibiting Huawei’s business in the US market. Huawei is trusted by governments and customers in 170 countries worldwide and poses no greater cyber-security risk than any ICT vendor, sharing as we do common global supply chains and production capabilities.”

Recently, Huawei was caught bribing users to leave glowing reviews for the new handset on BestBuy.com. Those comments have since been removed. 

PCWorld

You Might Also Read:

Report Claims Huawei Don’t Pose a Risk to UK Security:

Public-Private Partnerships in the Cyber Domain:
 

 

« Cybersecurity Is A Job for CEOs, Not Just The IT Team
Your Questions Answered By The GDPR Advisory Board »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

HackRead

HackRead

HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends.

CEPS

CEPS

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. Topic areas include Innovation, Digital economy and Cyber-security.

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

Cyber Data-Risk Managers

Cyber Data-Risk Managers

Cyber Data-Risk Managers Pty Ltd is an insurance broker based in Melbourne, Australia specializing in Cyber insurance / Data breach insurance.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

Bores Security Consultancy

Bores Security Consultancy

Bores Security Consultancy are an established family-run business delivering expertise in security and technology.

Halcyon

Halcyon

Halcyon is the industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.