"Both companies are suspected of having ties to the Chinese government, military and China's ruling communist party."
Well, duh! Of course they do. You don't where they are in China *without* such ties.
"The firms have been accused of designing communications equipment to allow unauthorized access by the Chinese government, a charge that has stoked fears over national security and the potential for corporate espionage."
I'm trying to imagine gear produced over there and bought here where the ability for the Chinese government to listen in would be hidden carefully enough that US engineers *wouldn't* find it. (For that matter, I'm having trouble imagining and purchases where such security might be an issue where US engineers wouldn't *look* for such back doors, given the guarded nature of the relationship between China and the West.)
I don't really see a security risk, only evidence that Congress doesn't have a technical clue, but we hardly needed more evidence to prove that point.
Starting in the early 1970's, the military systems people started using commercial components rather than the old custom military parts. I remember our military products people used to get custom IC's made at Motorola, and sadly we had to shut down other parts, and move all non-US citizens out of factory, then they brought in their wafers and masks, we ran a few operations, they took their stuff (including any broken pieces of wafers) out, and we never knew what they were for.
In 1968 Nasa started to set up its own pilot fab (for beam-lead CMOS !) in Alabama...we wrote a plan for them. Not sure how many other secure fabs were set up. But that could not keep up with cost-benefit of commercial chips.
Iridium phones and Motorola sat pagers were first good communication gear that the Chinese Army got to talk back to their leaders from remote regions. That may have prevented some border wars due to confusion. But they had to think that we were also listening.
The web and consumer electronics changed everything. Everything is open now. Perhaps that is safer? No secrets? Well...NOT if you are using the web to control the electrical grid, for example, or power plants. Options?
I must have supplied chips to you and I know how you guys work. I have no idea how the Chinese government is involved with the Huawei & ZTE business, but I have seen the revenue from you guys are declining year on year.
I see more of you guys mistakes have helped Huawei and ZTE rather than they have done better.
If you look into Marconi's performance when BT started thire 21CN, you may understand more.
Not allowing Huawei & ZTE to get into US market, the only thing we can have is to use expensive equipments which isn't any better.
Who's to say that US companies aren't doing the same thing: Leaving backdoors, etc for exploits such as Stuxnet and Flame. Or for that matter, what about PC's in general ? There's no practical way to reverse-engineer the multitude of custom SoC's that could easily have eavesdropping hardware built-in.
And then there's software...it's a given that M-Soft products have more security holes than a block of Swiss cheese.
The only way to keep your data safe is to leave your brand new computer in the box and never turn it on. Nothing is secure anymore.
As we unveil EE Times’ 2015 Silicon 60 list, journalist & Silicon 60 researcher Peter Clarke hosts a conversation on startups in the electronics industry. Panelists Dan Armbrust (investment firm Silicon Catalyst), Andrew Kau (venture capital firm Walden International), and Stan Boland (successful serial entrepreneur, former CEO of Neul, Icera) join in the live debate.