Dire Days Ahead for Huawei

Dire Days Ahead for Huawei

As the world’s top telecom supplier and a major phone manufacturer, Huawei has been placed in a precarious situation due to its close ties with China’s government. In response to potential spying allegations, many countries have banned the use of the Chinese company’s networking equipment, throwing a wrench in the manufacturer’s plans to become an even bigger global force in the telecom industry.

To make matters even more suspicious for Huawei, its founder and president, Zhengfei Ren, worked as a military technologist for the People’s Liberation Army before his company’s founding in 1987. It’s a common theory that Huawei is actually state-owned, even though the company maintains that it is employee-owned.

What’s the Situation So Far?

In January 2018, FBI Director Christopher Wray warned consumers against purchasing Huawei phones. In the months following, it was revealed that Facebook had provided Huawei with special access to user data, and Huawei had also cheated on a benchmark test.

In January 2019, Huawei was indicted on 23 counts of alleged trade secret theft and fraud. A few months later in March, a British watchdog organization confirmed that Huawei products were at a much greater risk than other devices. In April, Vodafone revealed the existence of hidden backdoors in equipment provided by Huawei; furthermore, the CIA stated that the Chinese state security were funding Huawei, which is suspicious to say the least.

In May, the United States president issued a national security executive order that practically banned Huawei devices. This proclamation was called Securing the Information and Communications Technology and Services Supply Chain. According to the United States Department of Commerce:

"The executive order prohibits transactions that involve information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary whenever the secretary of commerce determines that a transaction would pose a threat to national security."

Basically, this was meant to deter companies in the United States from using technology produced by companies that were deemed to be a threat to national security… in other words, Huawei.

Huawei’s Response to the Executive Order

It’s no surprise that Huawei is not a proponent of these restrictions. Besides denying its products create security threats, the company has gone on the record implying that its inability to do business in the United States could affect the 5G cellular revolution. Huawei also claims that these restrictions could cause Americans to lose jobs.

Recent Developments

In late July, more than 600 workers were laid off at Futurewei, Huawei’s research and development subsidiary in the United States. Either way, there is a considerable amount of pushback in the technology industry regarding this ban on sales, which have since led to decreased measures instigated against Huawei. The company’s chairman, Liang Hua, has expressed interest in implementing a “no-spy agreement” with the United States.

What are your thoughts on the way that this Huawei situation is being handled? Let us know in the comments, and be sure to subscribe to our blog.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, August 19 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Email Privacy User Tips Computer Microsoft Software Malware Network Security Productivity Hackers Google Business Hosted Solutions Communication Tech Term Data Mobile Devices Ransomware Internet Small Business IT Services Efficiency Hardware Cloud Computing IT Support Smartphone Workplace Tips Data Recovery Backup Android Innovation Saving Money Office 365 Managed IT Services Users Microsoft Office Business Continuity Upgrade Windows Information Internet of Things Browser Mobile Device Social Media Windows 10 Data Management Business Management Managed IT Services Windows 10 Data Backup Vulnerability Gmail Facebook Server Phishing Cybersecurity App Passwords Outsourced IT communications Productivity Word Remote Monitoring Chrome Artificial Intelligence Network Disaster Recovery Miscellaneous Encryption VoIP Smartphones Gadgets Managed Service Provider Employer-Employee Relationship Money BYOD IT Support Applications Website Infrastructure Managed Service Save Money Tip of the week Analytics Virtual Reality Settings Development Government Access Control VPN Hacker Data storage IT Management Paperless Office YouTube Quick Tips Display Risk Management Router Office Tips Unified Threat Management Google Drive Employee-Employer Relationship Bandwidth Robot Content Filtering Apps Automation Company Culture Education Antivirus Apple Big Data Maintenance Storage Document Management Printing Downtime Managing Stress Networking SaaS Wireless Solid State Drive Data Security Computers Virtualization Holiday Server Management HIPAA Hard Disk Drive Business Technology Touchscreen Spam Computing Retail Alert Virtual Private Network Outlook WiFi Mobile Security Bring Your Own Device Operating System LiFi Tablet Hosted Solution Administration Monitors Business Intelligence Vendor Management Data loss Chromebook Telephone Systems Mouse Two-factor Authentication Laptop desktop Avoiding Downtime The Internet of Things OneNote Scam End of Support Collaboration Firewall Augmented Reality Spyware Time Management Printer Computing Infrastructure Cybercrime Professional Services Software as a Service Remote Computing Uninterrupted Power Supply Business Growth Break Fix Social Networking Onboarding GDPR Password Star Wars Print Toner Network Congestion File Sharing Search Black Friday Marketing Legal Chatbots eWaste Slack Hard Disk Drives Computer Care IBM Content Huawei Servers Unified Communications Google Calendar Drones Wearable Technology Network upgrade Messaging Emergency Windows 8 Nanotechnology Wi-Fi Identity Theft Network Management Alerts USB Entertainment Writing Dark Web Motherboard Cables Digital Signage Data Warehouse Mobile Device Management Fraud Cost Management Shortcuts Deep Learning Cyber Monday Identity Continuity Monitoring Solid State Drives Training Corporate Profile Screen Reader Charging Streaming Processor Dark Data Update Automobile Legislation Halloween Smart Office Employee-Employer Relationships G Suite SharePoint Licensing Dongle iOS Dell Alt Codes Microsoft Excel Wires Troubleshooting Business Analysis Techology Assessment Security Cameras Cabling Managed IT Smart Technology Solar Spying National Security Politics WannaCry Lenovo Social Smart Tech Human Error Memory Customer Service Google Maps Statistics Budget Scary Stories Work Analysis Students How To Virus Private Cloud Downloads Information Technology Cooperation Running Cable Service Level Agreement Scalability Office Samsung Mail Merge Typing Blockchain Humor Voice over Internet Protocol VoIP Unified Threat Management Current Events Hotspot Internet Exlporer Managed Services Shortcut Best Practice Distributed Denial of Service Compliance Buisness Updates Tech Support Firefox Superfish Connectivity Virtual Desktop Device Bluetooth Comparison IT Technicians Sports Optimization Mixed Reality LED Threats Digital Payment Staff Leominster Migration Social Engineering Address Cryptocurrency Permissions Modem FinTech Digital IT solutions User Error Going Green Language Value Laptops Disaster Patch Management Managed IT Service Google Docs Regulations PowerPoint Websites Customer Relationship Management Hacks IoT Mobility Specifications Mirgation Recycling Data Breach Co-Managed IT Heating/Cooling Multi-Factor Security Google Wallet K-12 Schools Windows 7 Safety Bitcoin Cookies MSP Botnet Webcam Personal Information Cortana 3D Printing Error Machine Learning Processors Point of Sale Ben McDonald shares Travel Unsupported Software Computer Repair Relocation Supercomputer CrashOverride BDR Mobile Computing Motion Sickness Mobile Data Staffing Regulation Recovery Administrator How To Work/Life Balance Taxes Health IT Budget Web Server what was your? Printers Black Market GPS Law Enforcement IT Consultant Electronic Medical Records Notifications Cameras Twitter Meetings Physical Security Tracking Emoji Upgrades Gadget Cleaning Financial Crowdsourcing CCTV

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3