Skip to Content
Computing

The US threatens to stop sharing intelligence with allies if they use Huawei

February 22, 2019

The US will stop sharing intelligence with countries that use Huawei hardware in their core communication systems, US Secretary of State Mike Pompeo has said.

The threat: “If a country adopts this [Huawei equipment] and puts it in some of their critical information systems, we won’t be able to share information with them, we won’t be able to work alongside them,” Pompeo said during an interview with Fox Business on Thursday. “In some cases there’s risk—we won’t even be able to co-locate American resources, an American embassy, an American military outpost,” he added. 

Defiance: Britain, New Zealand, and Germany all signaled this week that they may be willing to continue using Huawei gear as they prepare their infrastructure for the arrival of 5G. Pompeo’s remarks are a major escalation in tensions between the US and its allies over the role of Huawei.

American concerns: It’s got a lot to do with the role of 5G and whether China could use security back doors to exert undue control over a nation’s digital infrastructure via Huawei’s equipment. Confusingly, on the same day as Pompeo’s comments, President Donald Trump tweeted that he wanted the US to win in 5G development “through competition, not by blocking out currently more advanced technologies.”

Denials: In an interview with the BBC this week, Huawei founder Ren Zhengfei said the company has never installed back doors into its technology and never would do so, even if required to by Chinese law.

Deep Dive

Computing

Everything dies, including information

Digitization can help stem the tide of entropy, but it won’t stop it.

What’s next in cybersecurity

“When it comes to really cutting off ransomware from the source, I think we took a step back.”

Moving money in a digital world

Security is the critical element to expanding digital-first payments.

Cyber resilience melds data security and protection

Organizations face pervasive and sophisticated cyberattacks, but modern data protection techniques can provide a multifaceted defense.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.