1250x260_Light
1250x260

Huawei Risks – A Government Security Review

Date:

Intro

Huawei Technologies Co. Ltd., a Chinese multinational company, has steadily grown to become the largest telecommunications equipment vendor in the world. Huawei’s global revenues have been recording at over $100 billion globally.

Huawei’s advanced 5G network equipment has faced increased security scrutiny from security experts, intelligence agencies, and governments who have cited cybersecurity and espionage risks. Several governments have expressed their hesitancy to use Huawei’s 5G technology for critical infrastructure. 

The U.S. and other governments in Europe have cited the close ties between Huawei and its founder Ren Zhengfei with the Chinese Communist Party (CCP) and the People’s Liberation Army (PLA). Other nation-states fear that the Chinese government would easily access client data held by Huawei or compel the company to support espionage efforts. 

What Are the Applications of 5G Technology?

5G technology is designed as a single wireless communication technology covering multiple use cases. 5G can act as a single infrastructure that combines mobile telephony, radio channels, TV signals, the needs of the armed forces, and public safety. 5 g supports the convergence of all these networks into a single infrastructure through network slicing. 

In addition, 5G carried no limit on the number of connected devices. The technology prepares for the future of connected devices, and it offers a foundation for the Internet of Things. 

Lastly, a standout application area of 5G is robotics and remote control. Compared to 4G, the 5G technology drastically reduces latency. Together with other improvements, 5G has enhanced robustness and security. The vast potential of 5G will be realized in the next decade or so. 

Risks Associated with Huawei’s 5G Equipment

Increased globalization has broken down barriers between nation-states and multinational corporations. The international nature of technology is coming to the fore. IT Companies may be located anywhere in the world but create technologies or products that businesses require to run smoothly and securely. 

On the other hand, globalization has led to the collision of diverse interests – political, economic, technological, and even religious interests. The crash of these interests became dramatic when the U.S. government concluded that Huawei Technologies Co. Ltd. And ZTE Corp. posed significant threats to U.S. national security and interests as well as economic integrity.

The collision course is litter with the topics of Beijing’s espionage activities and an ongoing trade war between the U.S. and China. Allies of the U.S., including the U.K., New Zealand, and Australia, have joined in sidelining Huawei. New Zealand has wholly prohibited using Huawei equipment in any of its networks. Other countries like Germany and India have expressed concerns over using Huawei equipment to upgrade to 5G infrastructure. 

Huawei designs and manufactures the equipment that controls how and where data is send, including network gateways, switches, routers, antennae, and bridges. The network equipment traverses the internet and is critical to the proper functioning of the internet.

Huawei Risks

The most commonly cited threats associated with buying telecommunications equipment from these two Chinese companies are:

  • Intentionally Bad Software: Experts suggest that the Huawei equipment may have hidden back doors that allow attackers to access a network. The network equipment could potentially facilitate espionage, although Huawei isn’t doing so. If such evidence were to be found, companies using Huawei equipment would demand an immediate explanation. Another concern is that the equipment could be made to not function or taken down under the instructions of the Chinese government during a time of international crisis. Intentionally lousy software in any telecommunications hardware may expose encrypted data without leaving any evidence of tampering. An attacker passively taping encrypte data can carry on without being discovere for so many years. 
  • Business Issues: The differences in cultural and regulatory frameworks for competition and intellectual property are the source of business issues. That drives the conversation away from malicious software and hardware. Under Chinese political infrastructure, companies must intertwine with the Communist Party and other military and government infrastructure. The associations between Huawei and the Chinese government are not a conspiracy but is how business happens in China. Chinese companies owe their first loyalty to the Communist Party of China. 

And others are

  • Trust and Information Sharing: The commingling of interests between Huawei and the Chinese government may lead to espionage and handing over customer data to government agencies. When working with vendors, the issue complicates network equipment buyers who want guaranteed security practices. Network equipment vendors are generally considere truste partners and have broad access to information about growth plans, network configurations and to help with troubleshooting. Network and security managers must exercise caution and different attitudes when dealing with Huawei and other Chinese companies. Security managers need to keep sensitive information and access controls at a healthy distance. 
  • Transparency and Stability: Company stability and transparency issues are not specific to network and information security. How can customers be sure that Huawei will be around both in the short term and long term to support the network equipment and other products being sold now. Huawei is not as transparent as other European and American companies since company financials are unavailable. Huawei is the largest telecommunications equipment vendor globally, making it a strong company, but it’s not easy to ascertain critical company information.

The rhetoric around Huawei has been short on facts and long on political and financial concerns by the U.S. and its allies. The greatest fear is that Huawei is likely to come under extrajudicial directions from the Chinese government. Huawei cannot resist overtures from Beijing, including manipulating traffic on its devices and bringing down entire networks.

Network managers should exercise due diligence when buying equipment from Huawei by ascertaining product quality, support, and long-term viability prospects. The differences in how Chinese companies operate emphasize the need to protect sensitive information just like a business would do regardless of the nation that the vendor calls home.

Huawei Risks – A Government Security Review – by Alessandro Civati

Conclution

>>> The intellectual property of this article is protected under the Blockchain Network. You can verify it under the CDP (Certified Data Protection) Explorer, by LutinX Inc.

CDP for Huawei Risks – A Government Security Review: https://lrx.is/KntSoUAuya <<<

Popular

Subscribe to our newsletter


Your emaill address should be use only for updating you on our articles, in the respect of the privacy law

Share post:

More like this
Related

Healthcare Innovation: New Investment Opportunities

Healthcare Innovation The amount of money that venture capitalists spend on healthcare is frequently viewed as a sign of where current and

Top Innovative Health companies

and Massachusetts have also received 1.7 million doses of the vaccine. More than 100 employers and universities have used Color's testing services in the last 18 months, as well as K-12 schools in several states, including California and Texas. Finally, it supports 9,000 testing locations and 1,700 vaccination locations across the United States.

Top Blockchain Books to read in 2022

A decade ago, the blockchain industry was just getting started. Now, it's exploded. The cryptocurrency market was a very small part of the overall economy for a long time. There has been a significant increase in demand for blockchain technology in almost every industry. As a result, this article will discuss top picks for blockchain books to read in 2022 if you want to learn about the technology and put it to good use.

NFTs: The next big thing in online gaming

With NFTs, or “non-fungible tokens,” you can keep track of the ownership of any asset, even if it moves around the blockchain. And you can regale a share of that asset to previous owners. It should be a no-brainer for the world's 3 billion players. To seek unique stuff, gather limited trinkets, and unlock unique art and souvenirs to keep and treasure.