"Both companies are suspected of having ties to the Chinese government, military and China's ruling communist party."
Well, duh! Of course they do. You don't where they are in China *without* such ties.
"The firms have been accused of designing communications equipment to allow unauthorized access by the Chinese government, a charge that has stoked fears over national security and the potential for corporate espionage."
I'm trying to imagine gear produced over there and bought here where the ability for the Chinese government to listen in would be hidden carefully enough that US engineers *wouldn't* find it. (For that matter, I'm having trouble imagining and purchases where such security might be an issue where US engineers wouldn't *look* for such back doors, given the guarded nature of the relationship between China and the West.)
I don't really see a security risk, only evidence that Congress doesn't have a technical clue, but we hardly needed more evidence to prove that point.
Starting in the early 1970's, the military systems people started using commercial components rather than the old custom military parts. I remember our military products people used to get custom IC's made at Motorola, and sadly we had to shut down other parts, and move all non-US citizens out of factory, then they brought in their wafers and masks, we ran a few operations, they took their stuff (including any broken pieces of wafers) out, and we never knew what they were for.
In 1968 Nasa started to set up its own pilot fab (for beam-lead CMOS !) in Alabama...we wrote a plan for them. Not sure how many other secure fabs were set up. But that could not keep up with cost-benefit of commercial chips.
Iridium phones and Motorola sat pagers were first good communication gear that the Chinese Army got to talk back to their leaders from remote regions. That may have prevented some border wars due to confusion. But they had to think that we were also listening.
The web and consumer electronics changed everything. Everything is open now. Perhaps that is safer? No secrets? Well...NOT if you are using the web to control the electrical grid, for example, or power plants. Options?
I must have supplied chips to you and I know how you guys work. I have no idea how the Chinese government is involved with the Huawei & ZTE business, but I have seen the revenue from you guys are declining year on year.
I see more of you guys mistakes have helped Huawei and ZTE rather than they have done better.
If you look into Marconi's performance when BT started thire 21CN, you may understand more.
Not allowing Huawei & ZTE to get into US market, the only thing we can have is to use expensive equipments which isn't any better.
Who's to say that US companies aren't doing the same thing: Leaving backdoors, etc for exploits such as Stuxnet and Flame. Or for that matter, what about PC's in general ? There's no practical way to reverse-engineer the multitude of custom SoC's that could easily have eavesdropping hardware built-in.
And then there's software...it's a given that M-Soft products have more security holes than a block of Swiss cheese.
The only way to keep your data safe is to leave your brand new computer in the box and never turn it on. Nothing is secure anymore.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Are the design challenges the same as with embedded systems, but with a little developer- and IT-skills added in? What do engineers need to know? Rick Merritt talks with two experts about the tools and best options for designing IoT devices in 2016. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.