SAN FRANCISCO—A Congressional committee Monday (Oct. 8) warned American operators not to buy equipment from China's leading telecom equipment makers, Huawei Technologies Co. Ltd. and ZTE Corp., citing potential risk to U.S. national security interests.
In a report, the House Intelligence Committee strongly encouraged U.S. telecom operators to seek other vendors for their projects.
"Based on available classified and unclassified information, Huawei and ZTE cannot be trusted to be free of foreign state influence and thus pose a security threat to the United States and to our systems," the report stated.
[Get a 10% discount on ARM TechCon 2012 conference passes by using promo code EDIT. Click here to learn about the show and register.]
Other governments and organizations have previously expressed concerns about the potential security threat posed by Huawei and ZTE, the world's first and fifth largest suppliers of wireless communications infrastructure equipment, respectively. Both companies are suspected of having ties to the Chinese government, military and China's ruling communist party. The firms have been accused of designing communications equipment to allow unauthorized access by the Chinese government, a charge that has stoked fears over national security and the potential for corporate espionage.
The report recommended that the U.S. "view with suspicion the continued penetration of the U.S. telecommunications market by Chinese telecommunications companies." It further recommended that the U.S. block acquisitions, takeovers, or mergers involving Huawei and ZTE.
Both companies issued statements Monday criticizing the report's findings.
The committee's report was particularly critical of Huawei, saying that the investigation turned up evidence of bribery, copyright infringement, immigration violations and discriminatory practices by the firm. The committee said it would refer these allegations to the Justice Department for review and possible investigation.
"Both companies are suspected of having ties to the Chinese government, military and China's ruling communist party."
Well, duh! Of course they do. You don't where they are in China *without* such ties.
"The firms have been accused of designing communications equipment to allow unauthorized access by the Chinese government, a charge that has stoked fears over national security and the potential for corporate espionage."
I'm trying to imagine gear produced over there and bought here where the ability for the Chinese government to listen in would be hidden carefully enough that US engineers *wouldn't* find it. (For that matter, I'm having trouble imagining and purchases where such security might be an issue where US engineers wouldn't *look* for such back doors, given the guarded nature of the relationship between China and the West.)
I don't really see a security risk, only evidence that Congress doesn't have a technical clue, but we hardly needed more evidence to prove that point.
Starting in the early 1970's, the military systems people started using commercial components rather than the old custom military parts. I remember our military products people used to get custom IC's made at Motorola, and sadly we had to shut down other parts, and move all non-US citizens out of factory, then they brought in their wafers and masks, we ran a few operations, they took their stuff (including any broken pieces of wafers) out, and we never knew what they were for.
In 1968 Nasa started to set up its own pilot fab (for beam-lead CMOS !) in Alabama...we wrote a plan for them. Not sure how many other secure fabs were set up. But that could not keep up with cost-benefit of commercial chips.
Iridium phones and Motorola sat pagers were first good communication gear that the Chinese Army got to talk back to their leaders from remote regions. That may have prevented some border wars due to confusion. But they had to think that we were also listening.
The web and consumer electronics changed everything. Everything is open now. Perhaps that is safer? No secrets? Well...NOT if you are using the web to control the electrical grid, for example, or power plants. Options?
I must have supplied chips to you and I know how you guys work. I have no idea how the Chinese government is involved with the Huawei & ZTE business, but I have seen the revenue from you guys are declining year on year.
I see more of you guys mistakes have helped Huawei and ZTE rather than they have done better.
If you look into Marconi's performance when BT started thire 21CN, you may understand more.
Not allowing Huawei & ZTE to get into US market, the only thing we can have is to use expensive equipments which isn't any better.
Who's to say that US companies aren't doing the same thing: Leaving backdoors, etc for exploits such as Stuxnet and Flame. Or for that matter, what about PC's in general ? There's no practical way to reverse-engineer the multitude of custom SoC's that could easily have eavesdropping hardware built-in.
And then there's software...it's a given that M-Soft products have more security holes than a block of Swiss cheese.
The only way to keep your data safe is to leave your brand new computer in the box and never turn it on. Nothing is secure anymore.
January 2016 Cartoon Caption ContestBob's punishment for missing his deadline was to be tied to his chair tantalizingly close to a disconnected cable, with one hand superglued to his desk and another to his chin, while the pages from his wall calendar were slowly torn away.122 comments