itb-au logo
Story image

Huawei calls on the US to adjust its approach to cybersecurity

Huawei today filed a motion for summary judgment as part of the process to challenge the constitutionality of Section 889 of the 2019 National Defense Authorisation Act (2019 NDAA). It also called on the US government to halt its state-sanctioned campaign against Huawei because it will not deliver cybersecurity.

“Banning Huawei using cybersecurity as an excuse will do nothing to make networks more secure. They provide a false sense of security, and distract attention from the real challenges we face,” said Huawei chief legal officer Song Liuping.

“Politicians in the US are using the strength of an entire nation to come after a private company,” Song noted.

“The US government has provided no evidence to show that Huawei is a security threat. There is no gun, no smoke. Only speculation.”

In the complaint, Huawei argues that Section 889 of the 2019 NDAA singles out Huawei by name and not only bars US government agencies from buying Huawei equipment and services, but also bars them from contracting with or awarding grants or loans to third parties who buy Huawei equipment or services—even if there is no impact or connection to the US government.

Song also addressed the addition of Huawei to the “Entity List” by the US Commerce Department two weeks ago. “This sets a dangerous precedent. Today it's telecoms and Huawei. Tomorrow it could be your industry, your company, your consumers,” he said.

“The judicial system is the last line of defence for justice. Huawei has confidence in the independence and integrity of the US judicial system. We hope that mistakes in the NDAA can be corrected by the court,” Song added.

Glen Nager, Huawei’s lead counsel for the case, said Section 889 of the 2019 NDAA violates the Bill of Attainder, Due Process, and Vesting Clauses of the United States Constitution. Thus, the case is purely “a matter of law” as there are no facts at issue, thereby justifying the motion for a summary judgement to speed up the process.

Huawei believes that US suppression of Huawei will not help make networks more secure. Huawei expects the US to take the right approach and adopt honest and effective measures to enhance cybersecurity for everyone if the US government’s real goal is security.

In line with a court scheduling order, a hearing on the motion is set for Sept. 19.

Story image
Extracting insights from data requires more than just a pretty dashboard
If you’re not sure where your data comes from, or how clean it is, you can’t trust the reports you generate from it. In some cases, if you don’t know what you have, you don’t even know how to ask the right questions. More
Link image
Register now for Slack Sessions - A virtual panel with Mike Cannon-Brookes and Stewart Butterfield
Join Atlassian and Slack CEOs as they share their insights on navigating the disruption of work.Wed, 19 August at 10.30am AESTMore
Story image
Google and Amazon overtake Apple as most imitated brands - Check Point
Google and Amazon were the most imitated brands in phishing attempts for the second quarter of 2020, according to Check Point. More
Story image
Video: 10 Minute IT Jam - Who is 8x8?
In this interview, we speak with 8x8 regional manager for New Zealand Deane Jessep. 8x8 is a provider of integrated cloud phone, meeting, collaboration and contact centre as a service solutions, and has a global network with offices all over the world. More
Story image
Research: Wearables market to grow by 137% by 2024
“The pandemic greatly increased the awareness of wearable devices as their use cases increased. This has resulted in an increase in device innovation as more companies race to develop new ways to cash in and help limit the spread of the virus.”More
Story image
10 cybersecurity risks to consider when transitioning back to the office
According to BSI, working from home (WFH) and working from office (WFO) scenarios should be applied by organisations interchangeably when reopening, with an aim to mitigate potential cybersecurity risks and ensure data privacy regulations are not violated.More