Advantage IT Management Blog

A Dive Into the US/Huawei Issues

A Dive Into the US/Huawei Issues

Huawei has found itself in an... interesting spot lately. Despite being the top telecom supplier in the world and second in phone manufacturing, many countries have banned the use of the Chinese company’s networking equipment. This is primarily due to the close ties Huawei has with China’s government, and the potential spying Huawei could do.

This isn’t all, either. Zhengfei Ren, Huawei’s founder and president, worked as a military technologist for the People’s Liberation Army before founding Huawei in 1987. It is believed that Huawei is actually state-owned, despite the company maintaining that it is employee-owned.

What Has Happened Thus Far

This may help explain why, in January of 2018, FBI Director Christopher Wray cautioned consumers against purchasing Huawei phones. In the months that followed, it was revealed that Facebook had provided Huawei with special access to user data, and that Huawei had cheated on a benchmark test.

In January of 2019, Huawei was indicted on 23 counts of alleged trade secret theft and fraud, and in March, a British watchdog organization confirmed that Huawei products offered a significant increase in risk. April saw Vodafone reveal hidden backdoors in equipment produced by the telecom powerhouse, and the CIA claim that Chinese state security is responsible for funding Huawei.

By May, the United States president released a national security executive order that more or less banned Huawei devices, called Securing the Information and Communications Technology and Services Supply Chain. According to the United States Department of Commerce:

"The executive order prohibits transactions that involve information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary whenever the secretary of commerce determines that a transaction would pose a threat to national security."

In essence, this order is meant to prevent United States companies from utilizing technology produced by companies deemed a threat to national security (in this case, Huawei). 

Huawei’s Response to the Executive Order

Naturally, Huawei has spoken out against these restrictions. In addition to denying that its products pose any security threats, the company has also implied that preventing it from doing business in the United States would negatively impact the implementation of a 5G cellular network. Furthermore, Huawei also said that these restrictions would cause Americans to lose their jobs.

Recent Developments

This proved not to be an empty promise, as more than 600 workers at Futurewei (Huawei’s research and development subsidiary in the United States) were laid off in late July.

Regardless, after considerable pushback from the technology industry for the ban on sales to Huawei to be lifted, some steps have been made to walk back the ban that has been placed on Huawei technology. The company’s chairman, Liang Hua, has also expressed a willingness to enter into a “no-spy agreement” with the United States.

What do you think about this whole situation? Is the relationship between Huawei and the United States salvageable, and would it be wise to salvage it anyway? Share your thoughts in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 17 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Productivity Network Security Hackers Malware User Tips Efficiency Hardware Google Microsoft communications Communication Computer Data Tech Term Smartphones Cybersecurity Internet Software Innovation Email Ransomware Managed IT Services Backup Mobile Device Business Management Outsourced IT Business VoIP Passwords Windows 10 Smartphone Hosted Solutions Android IT Support Small Business Users Apps Managed IT Services Network Social Media Browser Gadgets Miscellaneous Alert Mobile Devices IT Services Internet of Things Wi-Fi Bandwidth Applications Collaboration Windows Microsoft Office Cloud Computing Data Backup Save Money Workplace Tips Business Intelligence Employer-Employee Relationship Information Saving Money Holiday Data Recovery Computers Facebook Twitter Password IT Support Blockchain Router Virtualization Access Control Chrome Wireless Data Management Office Upgrade Business Continuity Gmail Managed Service Word Paperless Office Value Patch Management Laptop Quick Tips Law Enforcement Data Breach Settings Telephony BYOD Government Automation Excel Office 365 Mobile Device Management Analytics Phishing Workers Physical Security Battery Networking Politics Hosted Solution Marketing Vulnerability VoIP Cybercrime Company Culture Update RAM Telephone Systems Compliance BDR Cortana Retail How To VPN Operating System Virtual Assistant Going Green Voice over Internet Protocol Healthcare Maintenance Education Artificial Intelligence Website Health Cost Management Net Neutrality Data Protection Disaster Recovery Virus Productivity Remote Monitoring and Management Apple Data Security Medical IT Server Dark Web HIPAA G Suite Mobility Spam App Hacking Wireless Charging Processor Managed IT Service iPhone Tip of the week Scam Tech Terms Connectivity Remote Computing Remote Monitoring Smart Technology Recovery Access Google Maps Storage Solid State Drive Printers Data loss Hybrid Cloud Security Cameras Worker Spyware Business Technology Information Technology Lithium-ion battery Network Attached Storage Downloads Telecommuting Managed IT Wireless Internet Bitcoin Lead Generation Inventory Managed Service Provider Chrome OS Printing Google Drive Specifications Taskbar Streaming Media Benchmarks eCommerce Gadget Live Streaming Files Plug-In instant Messaging Work/Life Balance Error Hard Disk Drive Personal Information Staff Office Tips Cables Wearables Printer HP Remote Control Human Resources Server Management Trends Microsoft Teams Help Desk Payment Cards Mobile Security Remote Support Avoiding Downtime Paper Two-factor Authentication Conferencing Troubleshooting National Security Tech Support Risk Management Online Shopping Technology Tips Shortcut WhatsApp Proactive IT Vulnerabilities Spam Blocking Sales Touchscreen Video SaaS Websites Disaster WiFi Document Management Database Reporting Employee-Employer Relationship Biometrics DDoS A.I. Managing Stress Certification WannaCry Environment IT budget Ink Content Filtering Spotify Botnet Outlook Backup and Disaster Recovery Cryptocurrency Antivirus Digital Tactics Email Management Tablet Microsoft Office 365 Customer Service eWaste Best Practice Updates Millennials Safety Emergency Automobile Electronic Health Records Distributed Denial of Service Machine Learning Movies The Internet of Things Windows 10 Hard Drive e-waste Copy File Sharing IT Management PowerPoint Multi-Factor Security User Tip Profitability Recycling Hard Drives News Analysis Windows 7 Edge Internet Explorer Knowledge Authentication OneNote Phone System Licensing Sports Amazon E-Commerce Social Engineering Search GDPR Employees Entertainment Printer Server Telecommute Unified Communications Uninterrupted Power Supply Windows XP Bring Your Own Device Training Processors disposal Paste User Security Cabling Eliminating Downtime Batteries SSD Telephone System Time Management Big Data Threat Comparison Current Events Authorization Windows Server 2008 R2 Cleaning Display Voice over IP Dongle Travel Webcam Payment Social Leadership Thank You Unified Threat Management Scalability Budget Dark Data Computer Care Yahoo Congratulations Regulation Instagram Credit Cards Chromecast Encryption Gaming Console Wireless Technology Employer Employee Relationship Trending Vendor Management Video Games Internet Exlporer Financial Freedom of Information IaaS Hiring/Firing Synergy Autocorrect CrashOverride HaaS Administrator Staffing Emoji Money Scheduling Television Samsung

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Mia Taylor Tip of the Week: How to Handle a Paper Jam Without Freaking Out
13 September 2019
You have posted a fantastic blog! This is the best blog, most concise step by step guide. Toshiba te...
Galvin Caldwell How and Why Cyber Crime is so Effective
06 September 2019
Cyber crime is the crime has the well recognized worth all over the world due to the lack of the sec...
Abby Aspinall Ransomware Increasingly Targets Android Devices
27 August 2019
Ransom ware has some targets that were among the all android devices that were good to be read over ...
JozephChristopher Google Wants You to Tweet Emojis at Them. Here’s Why
22 August 2019
As per my research with a dissertation writing services company, Google was working on this from a l...
Chris Greenwalty Most Noteworthy Data Breaches in 2019
21 August 2019
Since there are many threats that we are listening about data breach. You need to figure out the bes...