Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

US Calls for Cautious EU Policy on 5G Networks

The United States on Thursday urged “like-minded governments” from the European Union to be cautious and coordinate their policies on 5G network security in light of suspicions over the system proposed by Chinese giant Huawei.

The United States on Thursday urged “like-minded governments” from the European Union to be cautious and coordinate their policies on 5G network security in light of suspicions over the system proposed by Chinese giant Huawei.

“Only with the leadership of like-minded countries we’ll be able to develop and deploy and manage secure and reliable 5G communications infrastructures,” said Joshua Steinman, a special cyber security assistant to US President Donald Trump.

Speaking at a conference in Prague organised by the Czech government, he singled out national security as “a mandatory criterion in evaluating suppliers of information and communication technologies, products and services.”

“We hope that like-minded governments will avoid committing to any one system or vendor until they’re able to properly vet and compare available technologies and fully assess risks across the life cycle of 5G network installation and operation,” said Steinman.

The United States has banned government agencies from buying equipment from Huawei over fears Beijing could spy on communications and gain access to critical infrastructure if the firm is allowed to develop foreign 5G networks offering instantaneous mobile data transfer.

Washington is adamantly opposed to Huawei’s involvement because of its obligation under Chinese law to help Beijing gather intelligence or provide other security services.

Steinman was echoed by Julian King, an EU commissioner in charge of the Security Union, who spoke in a video message screened at the conference.

“There is an urgent need for coordinated action when it comes to protecting our critical digital infrastructure, especially in the case of 5G networks which represent a technological tipping point of potentially profound significance,” King said.

Advertisement. Scroll to continue reading.

“National decisions need to be coordinated because they have European-wide implications,” he added, while insisting that his recommendations were not “targeted at any one company or any one country.”

In December, the Czech Republic’s National Cyber and Information Security Agency warned against using Huawei software and hardware, saying they posed a threat to state security.

However, the EU member’s pro-Russian, pro-Chinese president Milos Zeman met a Huawei official in Beijing last week to express his solidarity with the telecoms giant.

“The campaign against Huawei is not backed by any material evidence,” Zeman’s spokesman Jiri Ovcacek said in a statement, adding that the Czech president hoped Huawei would participate in the digitalisation of the Czech Republic, including its 5G networks.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Kim Larsen is new Chief Information Security Officer at Keepit

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.