BNMC Blog

Dire Days Ahead for Huawei

Dire Days Ahead for Huawei

As the world’s top telecom supplier and a major phone manufacturer, Huawei has been placed in a precarious situation due to its close ties with China’s government. In response to potential spying allegations, many countries have banned the use of the Chinese company’s networking equipment, throwing a wrench in the manufacturer’s plans to become an even bigger global force in the telecom industry.

To make matters even more suspicious for Huawei, its founder and president, Zhengfei Ren, worked as a military technologist for the People’s Liberation Army before his company’s founding in 1987. It’s a common theory that Huawei is actually state-owned, even though the company maintains that it is employee-owned.

What’s the Situation So Far?

In January 2018, FBI Director Christopher Wray warned consumers against purchasing Huawei phones. In the months following, it was revealed that Facebook had provided Huawei with special access to user data, and Huawei had also cheated on a benchmark test.

In January 2019, Huawei was indicted on 23 counts of alleged trade secret theft and fraud. A few months later in March, a British watchdog organization confirmed that Huawei products were at a much greater risk than other devices. In April, Vodafone revealed the existence of hidden backdoors in equipment provided by Huawei; furthermore, the CIA stated that the Chinese state security were funding Huawei, which is suspicious to say the least.

In May, the United States president issued a national security executive order that practically banned Huawei devices. This proclamation was called Securing the Information and Communications Technology and Services Supply Chain. According to the United States Department of Commerce:

"The executive order prohibits transactions that involve information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary whenever the secretary of commerce determines that a transaction would pose a threat to national security."

Basically, this was meant to deter companies in the United States from using technology produced by companies that were deemed to be a threat to national security… in other words, Huawei.

Huawei’s Response to the Executive Order

It’s no surprise that Huawei is not a proponent of these restrictions. Besides denying its products create security threats, the company has gone on the record implying that its inability to do business in the United States could affect the 5G cellular revolution. Huawei also claims that these restrictions could cause Americans to lose jobs.

Recent Developments

In late July, more than 600 workers were laid off at Futurewei, Huawei’s research and development subsidiary in the United States. Either way, there is a considerable amount of pushback in the technology industry regarding this ban on sales, which have since led to decreased measures instigated against Huawei. The company’s chairman, Liang Hua, has expressed interest in implementing a “no-spy agreement” with the United States.

What are your thoughts on the way that this Huawei situation is being handled? Let us know in the comments, and be sure to subscribe to our blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 18 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud User Tips Email Computer Privacy Microsoft Malware Productivity Hackers Network Security Google Software Hosted Solutions Business Communication Data Tech Term Hardware Mobile Devices Small Business IT Services Ransomware Efficiency Internet Cloud Computing IT Support Smartphone Data Recovery Android Workplace Tips Backup Innovation Windows Outsourced IT Upgrade Saving Money Managed IT Services Smartphones Office 365 Managed IT Services Miscellaneous Microsoft Office Information Users Mobile Device Data Backup Social Media Business Continuity Internet of Things Windows 10 Data Management Server Phishing Business Management Browser Windows 10 Passwords Word Productivity Facebook Cybersecurity communications Gmail App Vulnerability Remote Monitoring VoIP Chrome Gadgets Artificial Intelligence Infrastructure Network Disaster Recovery Encryption Managed Service Managed Service Provider Apps BYOD Employer-Employee Relationship Tip of the week Analytics Website Save Money Applications IT Support VPN Money Virtual Reality Maintenance Big Data Company Culture Government Employee-Employer Relationship Quick Tips Settings Google Drive Bandwidth Content Filtering Development Education Display Apple Storage YouTube Paperless Office Antivirus Risk Management Robot Data storage Unified Threat Management Office Tips Hacker Automation Router Access Control IT Management Collaboration Firewall Server Management WiFi Business Technology Bring Your Own Device Operating System Touchscreen Social Virtual Private Network LiFi SaaS Downtime Hosted Solution Document Management Tablet Administration MSP Augmented Reality Computers Virtualization Managing Stress Solid State Drive Mouse Holiday Wireless OneNote Retail Alert Two-factor Authentication Hard Disk Drive Managed IT Service Avoiding Downtime HIPAA Printing Scam Monitors Vendor Management Chromebook Mobile Security Search Data loss Networking Telephone Systems End of Support Business Intelligence desktop Laptop Outlook Spam Computing The Internet of Things Data Security Human Error Memory Legislation Modem Remote Computing FinTech Analysis Students Staff Leominster Virus SharePoint Network Congestion Regulations Scalability Microsoft Excel Budget Language Value Typing Humor Mirgation Recycling Uninterrupted Power Supply Managed Services Utility Computing Managed IT Smart Technology Information Technology IoT Cybercrime Spyware Updates Techology File Sharing Device Reducing Cost Statistics Current Events Writing Cookies Computer Care IBM Mixed Reality How To Lenovo Best Practice Marketing Wi-Fi K-12 Schools LED Threats Downloads Social Networking Migration Mail Merge Blockchain Computing Infrastructure Professional Services Cryptocurrency Dark Data Chatbots Update eWaste Laptops Remote Workers Shortcut Distributed Denial of Service Star Wars Identity Theft PowerPoint VoIP Unified Threat Management Network upgrade Mobility Batteries Bluetooth Comparison IT solutions Going Green Nanotechnology Training Corporate Profile Data Breach Firefox Superfish Google Docs Wearable Technology Co-Managed IT Hacks Motherboard Cables G Suite Windows 7 Address Permissions Alerts USB Halloween Politics Automobile Bitcoin Customer Service Identity Continuity Dell Software as a Service Managed Services Provider Patch Management Google Wallet Fraud Cost Management Onboarding GDPR User Error Smart Office Private Cloud Cabling Print Toner Myths Specifications Office Screen Reader Samsung Charging WannaCry Slack Hard Disk Drives Customer Relationship Management Business Growth Google Maps Content Huawei Heating/Cooling Multi-Factor Security Password BDR Wires Messaging Legal Licensing Dongle Scary Stories Tech Support Printer Windows 8 Solar Entertainment Break Fix Unified Communications Drones Assessment Running Cable Digital Signage Data Warehouse Time Management Work Buisness Shortcuts Mobile Management Black Friday Social Engineering Smart Tech Monitoring Solid State Drives Streaming Processor Servers Google Calendar Mobile Device Management Voice over Internet Protocol Virtual Desktop Employee-Employer Relationships Emergency Deep Learning Cooperation Service Level Agreement Sports Websites Network Management Compliance iOS Dark Web Hotspot Internet Exlporer Digital Payment Troubleshooting Business Analysis Alt Codes IT Technicians Optimization Disaster Security Cameras Profiles Cyber Monday Safety Connectivity Digital Spying National Security Mobile Computing Cleaning Personal Information Botnet Cortana CCTV 3D Printing Printers Webcam Processors Machine Learning Unsupported Software Error Point of Sale Ben McDonald shares Computer Repair Relocation Travel Financial Mobile Data Recovery How To Work/Life Balance Supercomputer CrashOverride Health Motion Sickness Staffing Black Market Taxes Administrator Web Server what was your? Vendor Law Enforcement IT Budget Electronic Medical Records Notifications Regulation GPS Twitter IT Consultant Physical Security Emoji Cameras Upgrades Gadget Meetings Crowdsourcing Tracking

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3