Is Widespread Suspicion Of Huawei Justified?

China's ambassador to London has described demands that Chinese telecoms giant Huawei must not have a part in the proposed 5G network as a "kind of witch-hunt".  Liu Xiaoming told the BBC that Huawei is privately owned and "nothing to do with the Chinese government".

A group of senior British Conservatives MPs have now written to their fellow Tory MPs expressing concern over the government’s decision to allow Chinese technology company Huawei to have a role in building the UK’s 5G network.

Ex- Conservative Party leader, Ian Duncan Smith who is one the signatories, said there was cross-party concern about the issue. The letter, which was also signed by former ministers including Owen Paterson, David Davis and Damian Green, said some MPs were working to find a better solution to the 5G issue.

The senior Tories want “high-risk” vendors to be ruled out immediately or phased out over time. The letter states: “We are seeking to identify a means by which we ensure that only trusted vendors are allowed as primary contractors into our critical national infrastructure. Trusted vendors would be companies from countries that have fair market competition, rule of law, respect human rights, data privacy and non-coercive government agencies.”

They called on the government to rule out technology from “untrusted, high-risk vendors” in the UK’s infrastructure, or at least to ensure that future legislation includes “sunset clauses” to limit the length of time such companies can be used.

Recently President Trump reportedly had a heated conversation with British Prime Minister Boris Johnson after the United Kingdom allowed the Chinese tech manufacturer Huawei to have a role in the UK's 5G cellphone networks. The Trump administration has long opposed Huawei having any stake in next-generation cellular networks because of national security concerns.

The decision rejected longstanding US concerns about the Chinese tech giant. President Trump was reportedly furious, according to the person, who said Trump berated Johnson over the move, which he characterised as a national security threat.

The White House and Downing Street both declined comment and all they said was, “Today, President Donald J Trump spoke with Prime Minister Boris Johnson of the United Kingdom. The two leaders discussed critical regional and bilateral issues, including telecommunications security.” Since the call, the two sides have agreed to limit the use of Huawei products in the UK. 

CNN:      The Hill:        Independent:          BBC:         Guardian

You Might Also Read:

Can A 5G Network Really Be Secure?:

Just A Normal Day At The Office For Huawei:

 

 

 

 

« US Government Cyber Security Still Needs Work
Massive Growth In Britain's Cyber Security Sector »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

EYE Security

EYE Security

EYE provides enterprise-grade cyber security services and cyber insurance to SMEs in Europe, Cyber Incident Response and strategic advice in board rooms.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

Mirai Security

Mirai Security

Mirai Security are a cyber security company that specializes in Governance, Risk Management and Compliance, Cloud Security and Application Security.

Harbottle & Lewis

Harbottle & Lewis

Harbottle & Lewis is a leading UK-based law firm focused on the Private Client and Technology, Media and Entertainment sectors.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Idenhaus Consulting

Idenhaus Consulting

Idenhaus specializes in Cybersecurity and Identity Management (IAM) Consulting.