Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

New Bill Would Prohibit Intelligence Sharing With Countries That Use Huawei

A bill introduced this week by Senator Tom Cotton (R-Arkansas) would ban the sharing of intelligence with countries that use Huawei technologies in their fifth generation (5G) networks.

A bill introduced this week by Senator Tom Cotton (R-Arkansas) would ban the sharing of intelligence with countries that use Huawei technologies in their fifth generation (5G) networks.

The United States has long expressed concerns that Huawei equipment may contain backdoors that would allow for the Chinese government to conduct espionage operations, and some European countries are sharing the same concerns.

Although Huawei has denied the accusations, the U.S. has banned the use of Huawei products in federal agencies and the Federal Communications Commission in November barred U.S. telecom providers from buying equipment from Huawei and China-based ZTE using government subsidies.

Moreover, President Donald Trump has signed an order that barred companies from using foreign telecoms equipment considered a security risk. Facebook, Google and top research universities also cut their ties to the Chinese telecommunications giant.

The newly introduced legislation (PDF) would prohibit the sharing of “intelligence of or under the control of the United States,” including products of the intelligence community, with countries that allow Huawei to operate 5G networks within their national borders.

“The United States shouldn’t be sharing valuable intelligence information with countries that allow an intelligence-gathering arm of the Chinese Communist Party to operate freely within their borders. I urge our allies around the world to carefully consider the consequences of dealing with Huawei to their national interests,” Senator Cotton said.

Related: US Regulators Bar Govt Telecom Funds for Huawei, ZTE

Related: US Formalizes Ban on Government Contracts to China’s Huawei, Others

Advertisement. Scroll to continue reading.

Related: Huawei Accuses US of Cyberattacks, Coercing Employees

Related: Huawei’s Czech Unit Secretly Collected Data: Report

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.