US’s attempts to decrease Chinese influence on 5G

  • The U.S. is begging its allies to not include Huawei products in their 5G networks.

  • Telecoms operators can obviously turn to Nokia and/or Ericsson instead, but things aren’t quite that simple.

  • The technologies held by Microsoft, Dell, and AT&T are useful for computing applications but they don’t have the expertise in radio technology.


In an effort to cut down the dominance of Huawei Technologies Co., the White House is said to be working with U.S. technology companies and create advanced software for next-generation 5G telecommunications networks.
 

The United States has finally specified its accusation against Huawei, saying that the Chinese telecoms equipment firm maintains spying access to the traffic flowing through its products.
 

Governments around the world say telecoms equipment has to include this access, for the benefit of their law enforcement and intelligence agencies—in the U.S., the relevant law is called the Communications Assistance for Law Enforcement Act, or CALEA. But the makers of the equipment are not supposed to be able to poke around—accessing data such as what people are looking at online, and their emails and text messages—without permission from the operators that are their customers.
 

According to a Tuesday article in the Wall Street Journal, Huawei secretly maintains that access, and that is why the U.S. is begging its allies to not include Huawei products in their 5G networks—networks that will connect not just people but billions of cars, buildings, and devices, providing exciting new avenues for espionage and sabotage.
 

“The big-picture concept is to have all of the U.S. 5G architecture and infrastructure done by American firms, principally. That also could include Nokia and Ericsson because they have big U.S. presences.”

-Larry Kudlow, White House Economic Adviser


Britain has already called the Trump administration’s bluff, betting that officials would back away from their threat to cut off intelligence sharing with any country that used Huawei equipment in its network. Apart from an angry phone call between President Trump and Prime Minister Boris Johnson, Britain appears to be paying no price for its decision to let Huawei into limited parts of its network, under what the British say will be rigorous surveillance.

 

Germany now appears ready to follow a similar path, despite an endless stream of cajoling and threats by Secretary of State Mike Pompeo, Defense Secretary Mark T. Esper and other U.S. officials at a global security conference in Munich last weekend.
 

Learn more: THE US IS MAKING ITS OWN 5G TECHNOLOGY WITH AMERICAN AND EUROPEAN COMPANIES, AND WITHOUT HUAWEI
 

In public speeches and private conversations, Mr. Pompeo and Mr. Esper continued to hammer home the dangers of letting a Chinese firm into networks that control critical communications, saying it would give the Chinese government the ability to spy on — or, in times of conflict, turn off — those networks. The security risks are so severe, they warned, that the United States would no longer be able to share intelligence with any country whose network uses Huawei.
 

“If countries choose to go the Huawei route, it could well jeopardize all the information sharing and intelligence sharing we have been talking about, and that could undermine the alliance, or at least our relationship with that country.”

-Mark T. Esper, U.S. Defense Secretary


The Huawei fight is just one part of a bigger U.S.-China battle, as Washington tries to contain Beijing’s influence and power and ensure that the world’s second-largest economy does not come to dominate advanced industries that could give it an economic and military edge. That includes the next-generation telecommunications networks that Huawei is building, known as 5G. Those superfast networks will control communications, critical infrastructure and, most worrying for American officials, the “internet of things�� devices that are already controlling factories, autonomous vehicles and the day-to-day operations of military bases.

 

Learn more: REBUFFED BY UK, U.S. PITCHES 'BIG TENT' FOR HUAWEI RIVALS IN EUROPE
 

Huawei is the world’s leading supplier of 5G telecoms equipment. Its prices are lower than those of main rivals Nokia and Ericsson, thanks largely to cash flowing in from Chinese state support, plus the economies of scale that result from the country’s hyperactive 5G network rollout.
 

Telecoms operators can obviously turn to Nokia and/or Ericsson instead, but things aren’t quite that simple. Operators want multiple vendors’ equipment in their networks for flexibility, and they don’t want to pay any more than they have to, says Ian Fogg, an industry veteran who heads up the team of analysts at mobile analytics firm Opensignal.
 

Nokia and Ericsson aside, these may not be the most obvious players to take on Huawei. “The technologies held by Microsoft, Dell, and AT&T are useful for computing applications, but they don’t have the expertise in radio technology to achieve the high level of performance needed in the market,” says Joe Madden, president of the Californian analyst house Mobile Experts.
 

But there may still be something to the idea—though it probably won’t be to the liking of Nokia and Ericsson.
Nokia and Ericsson already operate in the U.K. The other two players worth mentioning are ZTE—a non-starter, given that ZTE is Chinese and potentially also poses risks—and the South Korean electronics giant Samsung.
 

Samsung has made some gains in the U.S. and South Korean 5G network markets, and also recently inked a deal with Canada’s Videotron, but it’s still relatively young in the space.
 

Last week, U.S. Attorney General William Barr expressed enthusiasm for the idea of the U.S. directly or indirectly (via a “consortium of private American and allied companies”) taking a controlling stake in Nokia or Ericsson, which he described as the “only two companies that can compete with Huawei right now as 5G infrastructure suppliers.”

“Putting our large market and financial muscle behind one or both of these firms would make it a more formidable competitor and eliminate concerns over its staying power,” Barr said. “We and our closest allies certainly need to be actively considering this approach… What we need today is a product that can win contracts right now.”
 

There are two big problems with this approach. First, as Fogg notes: “It’s not clear that ownership change will enhance the competitiveness of a company like Nokia or Ericsson. They want to be successful vendors in the mobile industry—they’re already going hell-for-leather to do that. Change of ownership could just be another distraction.”
 

Secondly, the Europeans would be displeased at the idea of one of their prize telecoms firms—Nokia is Finnish and Ericsson Swedish—being bought out by the Americans.
 

In a position paper approved Tuesday by Angela Merkel’s Christian Democrats and one of its coalition partners, the Christian Social Union, the conservative parties not only rejected the idea of a U.S.-pleasing ban on Huawei’s participation in German 5G networks, but also called for a common European industrial strategy that would push back against hostile foreign takeovers of 5G-critical European companies.
 

The fight over Huawei has put many European countries in a no-win position, forcing them to either rebuff a key intelligence ally’s warnings and risk their key alliance, or alienate China, a critical trading partner. Further complicating the decision is the lack of definitive U.S. intelligence showing that Huawei has ever gained access to data that flows across its networks during the two decades it has provided telecommunications equipment to Europe.

Spotlight

Other News
Network Security

Cato Networks Introduces World's First SASE-based XDR

PR Newswire | January 25, 2024

Cato Networks, the leader in SASE, announced the expansion of the Cato SASE Cloud platform into threat detection and incident response with Cato XDR, the world's first SASE-based, extended detection and response (XDR) solution. Available immediately, Cato XDR utilizes the functional and operational capabilities of the Cato SASE Cloud to overcome the protracted deployment times, limited data quality, and inadequate investigation and response experience too often associated with legacy XDR solutions. Cato also introduced Cato EPP, the first SASE-managed endpoint protection platform (EPP/EDR). Together, Cato XDR and Cato EPP mark the first expansion beyond the original SASE scope pioneered by Cato in 2016 and defined by industry analysts in 2019. SASE's security capabilities encompassed threat prevention and data protection in a common, easy-to-manage, and easy-to-adopt global platform. With today's announcement, Cato is expanding SASE into threat detection, incident response, and endpoint protection without compromising on the architectural elegance captured by the original SASE definition. "Cato SASE continues to be the antidote to security complexity," says Shlomo Kramer, CEO and co-founder of Cato Networks. "Today, we extend our one-of-a-kind SASE platform beyond threat prevention and into threat detection and response. Only Cato and our simple, automated, and elegant platform can streamline security this way." An early adopter of Cato XDR is Redner's Markets, an employee-owned supermarket chain headquartered in Reading, Pennsylvania, with 75 locations. Redner's Markets' vice president of IT and Infrastructure, Nick Hidalgo, said, "The Cato platform gave us better visibility, saved time on incident response, resolved application issues, and improved network performance ten-fold." (Read more about Redner's Markets and Cato in this blog. "The convergence of XDR and EPP into SASE is not just another product; it's a game-changer for the industry," said Art Nichols, CTO of Windstream Enterprise, a Cato partner. "The innovative integration of these capabilities brings together advanced threat detection, response capabilities, and endpoint security within a unified, cloud-native architecture—revolutionizing the way enterprises protect their networks and data against increasingly sophisticated cyber threats." (Read more about what Cato partners are saying about today's news in this blog.) Platform vs. Product: The Difference Matters Cato XDR takes full advantage of the enormous benefits of the Cato SASE Cloud platform, the first platform built from the ground up to enable enterprises to connect, secure, and manage sites, users, and cloud resources anywhere in the world. Unlike disjointed point solutions and security appliances, Cato capabilities are instantly on, always available at scale, and fully converged, giving IT teams a single, shared context worldwide to understand their networks, prevent threats, and resolve problems. As an autonomous platform, Cato SASE Cloud sustains its evolution, resiliency, optimal performance, and security posture, saving enterprises the operational overhead of maintaining enterprise infrastructure. Enterprises simply subscribe to Cato to meet their business needs. Cato's cloud-native model revolutionized security and networking operations when it was introduced in 2016, a fact validated three years later in 2019 when the Cato approach was formally recognized by the industry as SASE. Breach Times Still Too Long; Limitations of Legacy XDR Cato is again revolutionizing cybersecurity with the first SASE platform to expand into threat detection, empowering security teams to become smarter and remediate incidents faster. The flood of security alerts triggered by network sensors, such as firewalls and IPS, complicates threat identification. In 2023, enterprises required 204 days on average to identify breaches.1 XDR tools help security analysts close this gap by ingesting, correlating, and contextualizing threat intelligence information with the data from native and third-party sensors. However, legacy XDR tools suffer from numerous problems relating to data quality. Sensor deployment extends the time-to-value as IT must not only install the sensors but also develop a baseline of specific organizational activity for accurate assessments. Data quality is also compromised when importing and normalizing third-party sensor data, complicating threat identification and incident response. Security analysts waste time sorting through incident stories to identify the ones most critical for immediate remediation. Once determined, incident remediation is often hampered by missing information, requiring analysts to master and switch between disparate tools. No wonder in 2023, average breach containment required more than two months.1 Cato XDR and Cato EPP Expands the Meaning of SASE Cato XDR addresses legacy XDR's limitations. Instantly activated globally, Cato XDR provides enterprises with immediate insights into threats on their networks. Incident detection is accurate due to Cato's many native sensors – NGFW, advanced threat prevention (IPS, NGAM, and DNS Security), SWG, CASB, DLP, ZTNA, RBI, and now EPP/EDR. Powered by Bitdefender's world-leading malware prevention technology, Cato EPP protects endpoints from attack – in the Cato way. Endpoint threat and user data are stored in the same converged Cato data lake as the rest of the customer's network data, simplifying cross-domain event correlation. The result is incredibly high-quality data that improves the incident identification and remediation process. Cato AI uses the data to accurately identify and rank incidents, empowering analysts to focus critical resources on an organization's most important remediation cases. Cato AI is battle-tested and proven across years of threat hunting and remediation handling by Cato MDR service agents. Remediation times reduce as detected incident stories contain the relevant information for in-depth investigation. Cato's tools sit in the same console as the native engines, enabling security analysts to view everything in one place -- the current security policy and the reviewed story. Finally, incident reporting is simplified with generative AI. Purpose-built for investigations, this natural language engine provides human-readable explanations of incident stories. Analysts save time sharing incident information with other teams and reporting to their managers.

Read More

Network Security

Ampliphae, HPE Athonet and Arqit deliver Quantum-Safe Private 5G using Symmetric Key Agreement

PR Newswire | January 19, 2024

Arqit Quantum Inc, a leader in quantum-safe encryption, and Ampliphae Ltd (Ampliphae), a leader in network cyber security solutions, have today announced successful completion of a project that will deliver enhanced quantum-safe security for Private 5G networks. The Security Enhanced Virtualised Networking for 5G (SEViN-5G) project, funded by Innovate UK, the UK Government’s innovation agency, leveraged Ampliphae’s network security analytics technology and Arqit’s Symmetric Key Agreement Platform to deliver a quantum-secure Private 5G testbed that can protect against both current and future cyber threats. Athonet, a Hewlett Packard Enterprise acquisition, provided the Radio Access Network (RAN) equipment for the project with a cloud core hosted on AWS. Private enterprise networks based on 5G cellular technology are accelerating digital transformation across industries including manufacturing, healthcare, defence and smart cities. Private 5G gives enterprises access to high-speed, massively scalable, and ultra-reliable wireless connectivity, allowing them to implement innovative IoT and mobile solutions that enhance productivity, drive automation and improve customer engagement. The security of these networks will be paramount as they will support safety-critical infrastructure and carry highly sensitive data. But like any new technology, 5G comes with potential new threats and security risks including the threat from quantum computing. The project finished in December 2023 and customer engagement has already begun. David Williams, Arqit Founder, Chairman and CEO said: “Enterprises want to deploy Private 5G networks with complete confidence that they will be safe from both current and future cyber threats including from quantum computers. Working alongside Ampliphae, we have shown that a quantum-safe Private 5G network is deliverable using Arqit’s unique encryption technology.” Trevor Graham, Ampliphae CEO said: “Private 5G can be hosted partly or completely in the Cloud, giving enterprises the opportunity to rapidly set up their own cellular networks customised to support their operations. With Ampliphae and Arqit they can now be certain that those Private 5G networks are monitored and secure against eavesdropping and disruption.” Nanda Menon, Senior Advisor Hewlett Packard Enterprise said: “In an era where security is paramount, the completion of the SEViN-5G project is a significant milestone. The delivery of a quantum-secure Private 5G testbed, achieved where Athonet have combined the Athonet core with CableFree radios, underscores the commitment to innovation and reinforces the confidence enterprises can have in deploying networks that are both cutting-edge and secure from both present and future threats.” About Arqit Arqit Quantum Inc. (Nasdaq: ARQQ, ARQQW) (Arqit) supplies a unique encryption Platform as a Service which makes the communications links of any networked device, cloud machine or data at rest secure against both current and future forms of attack on encryption – even from a quantum computer. Compliant with NSA standards, Arqit’s Symmetric Key Agreement Platform delivers a lightweight software agent that allows devices to create encryption keys locally in partnership with any number of other devices. The keys are computationally secure and operate over zero trust networks. It can create limitless volumes of keys with any group size and refresh rate and can regulate the secure entrance and exit of a device in a group. The agent is lightweight and will thus run on the smallest of end point devices. The Product sits within a growing portfolio of granted patents. It also works in a standards compliant manner which does not oblige customers to make a disruptive rip and replace of their technology. Recognised for groundbreaking innovation at the Institution of Engineering and Technology awards in 2023, Arqit has also won the Innovation in Cyber Award at the National Cyber Awards and Cyber Security Software Company of the Year Award at the Cyber Security Awards. Arqit is ISO 27001 Standard certified. www.arqit.uk About Ampliphae Ampliphae’s distributed network analytics technology provides insight into how networks are used to support enterprise operations at every level. A graduate of the prestigious LORCA cyber accelerator in London, and the AWS European Defence Accelerator, Ampliphae’s technology is already used by enterprises across multiple verticals to discover, analyse and secure the network traffic that supports their key applications and business processes. Ampliphae’s Encryption Intelligence product operates at enterprise scale to discover devices and applications that use cryptography, analysing their encryption capabilities to detect risks, including assets that are vulnerable to future quantum computer attack. Using Encryption Intelligence, the organisation can gather effective operational intelligence about their encryption landscape, both within and outside the organisation, and build an effective mitigation program to address current and future vulnerabilities.

Read More

Spotlight

Resources