Connley Walker Independent Security Consulting Group Logo

Connley Walker Security Consulting Blog: Do You Trust Chinese Security Products?

The USA has recently passed the National Defense Authorization Act for Fiscal Year 2019. In this, for reasons stated in the Act, they have banned the use of some Chinese products including those made by Huawei Technologies Company, Hytera Communications Corporation, Hangzhou Hikvision, Digital Technology Company, Dahua Technology Company, or ZTE Corporation (or any subsidiary, successor entity, or affiliate of such entities).

The Act indicates that the risks are that these brands have evidence of malicious software or hardware that enables unauthorized network access or control and the type and level of risk, and a plan to share such report, based on appropriate access to classified information, with U.S. allies, partners, and U.S. cleared defense contractors and telecommunications services providers.

At a hearing in the US in February, the directors of the CIA, FBI, NSA and several other intelligence agencies express their distrust of Huawei and fellow Chinese telecom company ZTE.

Australia has recently committed $200 million of foreign aid to prevent Huawei from building a sub sea cable to the Solomon Islands and Papua New Guinea. This is significant due to the national security concerns of China being able to monitor communications if they were to provide the link.

A number of Chinese Telcos including China Mobile International (Australia) have plans for setting up in Australia, but how they would comply with the telecommunications security requirements are yet to be established. The security requirements for any telco include the ability to monitor and decrypt phone calls and messages, which might be a conundrum for the authorities in granting the licence.

So, as a responsible security consultancy, we do not recommend these products to clients as we rely on the integrity of the US authorities that there may be a security problem with them, even if the problem is classified.

What are your thoughts?

Contact Us

FIll out the form below and we will contact you as soon as possible

Connley Walker is an independent security consulting group with engineers specialising in physical and cyber security and risk management.

Copyright ©2023 Connley Walker Holdings Pty Ltd. All Rights Reserved.

LICENCES AND REGISTRATIONS

ACT – Security Master Licence No. 17502533.

NSW – Security Master Licence No. 409109204.

NT – No licence required.

QLD – Security Firm Licence No. 3255594.

QLD – Registered Professional Engineers No. 21615.

SA – Exempt from a licence as Engineers (Security and Investigation Industry Regulations Part 2, 5 (1) (b)).

VIC – Registered Building Practitioners No. EE21166.

VIC – Private Security Business Registration No. 720-062-90S.

TAS – Building Service Provider Licence No. 363589169.

WA – Security Agent Licence No. SA56167.

CREDENTIALS AND AFFILIATIONS

ISO 9001:2015 Quality Assured.

SCEC Endorsed Security Zone Consultants (Registration Number 0075).

Pre-qualified consultants to the Victorian Government.

Pre-qualified consultants to the NSW Government.

Pre-qualified consultants to the NT Government.

Pre-qualified consultants to the Tasmanian Government.

Represent Engineers Australia on Australian Standards for Security.

Members of Australian Security Industry Association Limited (ASIAL).

Members of Australian Institute of Project Management (AIPM).

Members of Engineers Australia.

Federal Government Endorsed Suppliers.

Interested in Free Security Awareness Training?

Ensuring the safety of your business and personal space is essential. Before you go, why not join our FREE Security Awareness Training Platform?

Our training program offers:

  • Fundamental Security Practices: Learn the basics of protecting your premises.
  • Threat Identification: Recognise potential risks before they become incidents.
  • Access Control Strategies: Understand how to manage and monitor entry points effectively.
  • Emergency Preparedness: Be ready for any situation with our expert guidelines.
  • Real-Life Case Studies: Gain insights from real-world security scenarios.