Alltech IT Solutions Blog

A Dive Into the US/Huawei Issues

A Dive Into the US/Huawei Issues

Huawei has found itself in an... interesting spot lately. Despite being the top telecom supplier in the world and second in phone manufacturing, many countries have banned the use of the Chinese company’s networking equipment. This is primarily due to the close ties Huawei has with China’s government, and the potential spying Huawei could do.

This isn’t all, either. Zhengfei Ren, Huawei’s founder and president, worked as a military technologist for the People’s Liberation Army before founding Huawei in 1987. It is believed that Huawei is actually state-owned, despite the company maintaining that it is employee-owned.

What Has Happened Thus Far

This may help explain why, in January of 2018, FBI Director Christopher Wray cautioned consumers against purchasing Huawei phones. In the months that followed, it was revealed that Facebook had provided Huawei with special access to user data, and that Huawei had cheated on a benchmark test.

In January of 2019, Huawei was indicted on 23 counts of alleged trade secret theft and fraud, and in March, a British watchdog organization confirmed that Huawei products offered a significant increase in risk. April saw Vodafone reveal hidden backdoors in equipment produced by the telecom powerhouse, and the CIA claim that Chinese state security is responsible for funding Huawei.

By May, the United States president released a national security executive order that more or less banned Huawei devices, called Securing the Information and Communications Technology and Services Supply Chain. According to the United States Department of Commerce:

"The executive order prohibits transactions that involve information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary whenever the secretary of commerce determines that a transaction would pose a threat to national security."

In essence, this order is meant to prevent United States companies from utilizing technology produced by companies deemed a threat to national security (in this case, Huawei). 

Huawei’s Response to the Executive Order

Naturally, Huawei has spoken out against these restrictions. In addition to denying that its products pose any security threats, the company has also implied that preventing it from doing business in the United States would negatively impact the implementation of a 5G cellular network. Furthermore, Huawei also said that these restrictions would cause Americans to lose their jobs.

Recent Developments

This proved not to be an empty promise, as more than 600 workers at Futurewei (Huawei’s research and development subsidiary in the United States) were laid off in late July.

Regardless, after considerable pushback from the technology industry for the ban on sales to Huawei to be lifted, some steps have been made to walk back the ban that has been placed on Huawei technology. The company’s chairman, Liang Hua, has also expressed a willingness to enter into a “no-spy agreement” with the United States.

What do you think about this whole situation? Is the relationship between Huawei and the United States salvageable, and would it be wise to salvage it anyway? Share your thoughts in the comments!

Seven great Business Communications Options
You Need to Prioritize Metrics that Support Effici...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, August 24 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Thank You Information Recovery Healthcare Customer Service Employee-Employer Relationship Conferencing PowerPoint IT budget Operating System SSD Data Windows XP Paste Workplace Tips Printer Server Video Streaming Media Authorization Comparison Network Attached Storage Hiring/Firing VPN Medical IT Electronic Health Records Dongle Remote Control Threat Leadership Productivity WiFi Hosted Solution Solid State Drive Cryptocurrency Batteries Windows 10 Paperless Office Hacking IaaS Save Money Outlook Alert Wireless Internet Synergy Excel Data Security Battery Copy Wi-Fi Apple App Ransomware Company Culture Multi-Factor Security IT Services Yahoo Mobile Device Management Laptop Windows Server 2008 R2 Voice over Internet Protocol Virus Help Desk Hard Disk Drive Troubleshooting Access Networking Tip of the Week Lead Generation Processors Money Word File Sharing Millennials CrashOverride Managing Stress Payment Trends Current Events Sports Office Tips Autocorrect GDPR Certification Social Media Telephone Systems Security Entertainment Scalability iPhone Chrome OS RAM Sales Printer Politics Security Cameras Instagram Email Management E-Commerce Google Computer Care Holiday HP Printers Avoiding Downtime Telecommute BYOD Network Security Cybercrime Retail Human Resources Tech Term Gaming Console Authentication Android disposal Marketing Computers Hardware Cost Management How To Content Filtering Windows 7 Dark Web National Security Upgrade Gmail Remote Support IT Support Education Outsourced IT Error eCommerce Government Voice over IP Budget Movies Patch Management Staffing Online Shopping Business Continuity Financial Saving Money Personal Information Search Value Business Technology Office Update Antivirus Business Intelligence Training Tip of the week Recycling Eliminating Downtime Employer Employee Relationship Applications Paper Backup Phishing Compliance Downloads Access Control e-waste Office 365 Emoji Cabling Network Chrome Microsoft Teams Employees Miscellaneous Cloud Going Green Managed IT Service Live Streaming Passwords IT Support Business Management DDoS Physical Security Cloud Computing Cortana Environment Scheduling Small Business Browser Server Management Data Recovery Database Information Technology Twitter Quick Tips Edge Automobile User Tips VoIP Display Tablet Files Google Maps Website Health Webcam A.I. Unified Communications Biometrics Hosted Solutions Big Data Gadgets Samsung Hackers Phone System Remote Monitoring Processor Dark Data Staff Technology Tips Malware Windows 10 Data Breach Touchscreen Google Drive Congratulations Websites Server Disaster Recovery Analysis Router Updates Ink Telephone System Facebook Password User Security Communications Cybersecurity Analytics Hacker Smartphones Encryption Managed IT Services Spam Hybrid Cloud Hard Drives Printing Time Management Proactive IT Efficiency Mobile Device Telephony Technology Microsoft Office Settings Travel Television Knowledge Freedom of Information Best Practices Mobility Business Computing OneNote Internet Shortcut Employer-Employee Relationship Business Data Backup Blockchain Managed IT Data Management Tech Support eWaste Internet of Things WannaCry News Machine Learning Windows HIPAA Virtualization Wireless Charging Bring Your Own Device Amazon Data Protection Bandwidth Microsoft Office 365 Maintenance The Internet of Things Innovation Reporting Worker VoIp Specifications Smart Technology Backup and Disaster Recovery Vulnerabilities Wearables Plug-In Document Management Productivity Connectivity IT Management Work/Life Balance Microsoft SaaS Spotify Profitability Computer Gadget Software Storage Licensing Communication Collaboration Emergency Alerts Risk Management BDR Users Remote Computing Cables Internet Explorer Workers Virtual Assistant Tech Terms Automation Two-factor Authentication Managed Service Cleaning Credit Cards Vendor Management Spyware Inventory Benchmarks instant Messaging Wireless Regulation Video Games Net Neutrality Mobile Devices Taskbar WhatsApp Managed Service Provider Mobile Security Spam Blocking Law Enforcement Email Digital Unified Threat Management Artificial Intelligence Telecommuting Safety Botnet Smartphone Tactics Data loss Apps Privacy HaaS User Tip Hard Drive Vulnerability Remote Monitoring and Management G Suite Managed IT Services Scam