Light Reading

NSA Reportedly Spying on Huawei: What's Chinese for 'Ironic'?

Ray Le Maistre
3/24/2014
100%
0%

In an ironic twist to the war of words between US officials and Huawei, the latest revelations about the NSA's hacking activities shows how the US security agency tapped into the Chinese vendor's servers to monitor its internal communications and learn how its technology works. (See Obama Weighs In on NSA Data Collection.)

According to a report in the New York Times, based on information revealed by whistleblower and Light Reading Hall of Famer Edward Snowden, the US National Security Agency was hacking into Huawei Technologies Co. Ltd. 's systems to check on internal communications -- and to figure out how its technology works so it could hack into comms networks built using Huawei kit -- just as the US authorities were branding Chinese technology suppliers as security threats. (See US vs Huawei/ZTE: The Verdict and Light Reading Announces 2013 Hall of Fame Inductees.)

Not surprisingly, Huawei isn't impressed.

It's official statement, is quite muted, though:

    If the actions in the report are true, Huawei condemns such activities that invaded and infiltrated into our internal corporate network and monitored our communications. Corporate networks are under constant probe and attack from different sources -- such is the status quo in today's digital age. We reiterate that Huawei disagrees with all activities that threaten the security of networks and is willing to work with all governments, industry stakeholders and customers, in an open and transparent manner, to jointly address the global challenge of network security.

    The security and integrity of our corporate network and our products are our highest priorities. That is the reason why we have an end-to-end security assurance system and why we are continuously working to enhance that system. Like other enterprises, we continuously block, clean and reinforce our infrastructure from cyber threats.

Of course, none of this (that Chinese firms pose a security threat, or that the NSA hacked into Huawei) has been proven with any "hard" evidence. What has been proven, though, is that security threats are a very major concern for network operators and their customers, and that network security is becoming an increasingly important issue for communications service providers worldwide as fixed and mobile networks shift to all-IP networks. (See Digging Into Mobile Security, The Role of Identity Management and DNS Attacks on the Rise.)

— Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading


Want to learn more about this topic? Check out the agenda for Mobile Network Security Strategies, which will take place on May 21 at The Thistle Marble Arch hotel in London. For more on the event, including the stellar service provider speaker line-up, see the event's official site.


(23)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Page 1 / 3   >   >>
Mitch Wagner
50%
50%
Mitch Wagner,
User Rank: Lightning
3/25/2014 | 5:49:24 PM
Re: NSA Hacking
brookseven -  True, but this development is a marketing coup for Huawei.
sam masud
50%
50%
sam masud,
User Rank: Light Sabre
3/25/2014 | 3:18:23 PM
Remember
Remember we were also told that Huawei could not be trusted to do business in the US--so while this revelation is hardly a surprise--or  should not be a surprise, let's remember that companies on this side of the pond allowed our own spooks to spy on us.
mendyk
100%
0%
mendyk,
User Rank: Light Sabre
3/25/2014 | 1:20:11 PM
Re: NSA Hacking
"Sabre rattling" is exactly what's going on, and money as you say is almost always at the root of issues like this. In taking an exclusionary tack toward Huawei and ZTE, the U.S. runs the risk of isolating itself from most of the rest of the world regardng telecom technology.
KBode
50%
50%
KBode,
User Rank: Light Sabre
3/25/2014 | 1:07:21 PM
Re: NSA Hacking
"I don't think there's any question that the militant stance toward Huawei and ZTE stems in part from some very unsavory and uncomfortable and outdated color concepts -- as in, red menace and yellow peril."

I think that's being used as the bogeyman, but I think by and large this really (as most things do) comes down to money. Cisco and others don't want them in the United States markets. There was a Washington Post report a while back that clearly pointed out most of the "concerns" about Huawei spying was originating with Cisco. That seems to long have been ignored:

http://www.washingtonpost.com/business/technology/huaweis-us-competitors-among-those-pushing-for-scrutiny-of-chinese-tech-firm/2012/10/10/b84d8d16-1256-11e2-a16b-2c110031514a_story.html

That they might spy is kind of irrelevant. All of this gear, American or otherwise, is made in China. All spies agencies exploit all gear, no matter who it's made by. Bunch of protectionist, nonsensical saber rattling. 
R Clark
50%
50%
R Clark,
User Rank: Blogger
3/25/2014 | 11:35:01 AM
Re: NSA Hacking
The protectionism I'm describing is China tit-for-tat protectionism. China doesn't need much encouragement to find ways of obstructing or banning foreign businesses. Huawei is proscribed because it's a Chinese firm that could theoretically compromise networks. On those grounds China could outlaw a lot of firms.

The Mandiant report last January, and some reporting by Bloomberg in 2012 described the nature of China cyber-attacks, which are carried out by semi-independent and deniable hacking groups under the auspices of the PLA. The attacks are absolutely huge in scale but there's nothing to connect Huawei to them.

 

 

 

 

 

 

 

 
mendyk
50%
50%
mendyk,
User Rank: Light Sabre
3/25/2014 | 8:59:42 AM
Re: NSA Hacking
The industrial protectionism argument doesn't hold up too well when you consider that non-US companies like Ericsson aren't proscribed from selling to US network operators. Or rather, US network operators aren't proscribed from buying their equipment.
Ray@LR
0%
100%
Ray@LR,
User Rank: Blogger
3/25/2014 | 5:43:08 AM
Re: NSA Hacking
A few observations from the UK (so away form the 'red mist' of both N America and Far East Asia).

 

1 - Of course China is spying on everyone and everyone is spying on China. That's how it is. I don't think anyone is going to suggest that is not the case.

2 - TO what extent is Huawei involved? That's where there is a big question mark. Some accusations that Huawei is a Trojan Horse for Chinese spies/potential industrial or political attacks (or digital warfare) appear to be based purely on the fact that the president and founder, Ren Zhengfei, was formerly an officer in the Chinese army and might be a communist. He's a 70-years-old Chinese male, for goodness sakes... If there is some independent evidence that Huawei's technology is a back door/Trojan Horse, let's see it.

3 - The 'Chinese companies are security threats' accusation may look like good old-fashioned racism (and perhaps it is) and/or 'reds-under-the-bed' stuff --  but for me it looks more like good old-fashioned industrial protectionsim. Huawei is a threat to a number of US technology companies -- proclaiming that any US company that does business with Huawei or ZTE is being unpatriotic and exposing the US to potential security attacks looks like good business for the US.  

4 - That the NSA hacked into Huawei is no surprise. But isn't it a bit rich to say that one country has the moral high ground and is 'protecting freedom' etc by spying, while another is not? IN China, no doubt, people are led to believe that the hacking of US systems is defenisve, to protect China against the imperialist threat of the US. In every country, the others are the 'bad guys'. IT is no different here in the UK (though the majority of the media here tend to take the same view as the US, for cultural and political reasons.)

 

It's all relative. If the Chinese authorities were to accuse US vendors of providing a Trojan Horse security threat to China because a senior executive used to be high up in the US army and is active in the Republican Party, would that seem somewhat ridiculous? Of course.

It's all about perspective. And the (non) existence of tangible proof IN THE CASE OF HUAWEI. 

And, of course,w e should point out that, as we have noted before, Huawei has brought some of this on itself, too -- it's much easier to believe that a company poses a security threat when it has been caught in naive industrial espionage activities in the past.

Can Huawei Change?


http://www.lightreading.com/asia/can-huawei-change/a/d-id/700428

Huawei in Spying Flap


http://www.lightreading.com/ethernet-ip/huawei-in-spying-flap/d/d-id/603775

 

AND  - final point - none of this means that any one company's technology does NOT pose a security threat. It would be wrong to say that Huawei's technology, strategy, motives, aims, affiliations, etc are not worthy of examination. They are. What's needed is objective examination and a reliance on hard evidence, not political/racial/industrial mud-slinging. 

 
brookseven
100%
0%
brookseven,
User Rank: Light Sabre
3/25/2014 | 12:09:56 AM
Re: NSA Hacking
Mitch,

The NSA hacking and the Chinese hacking are orthogonal.  You can't assume one means the other is not true.  In fact, it should show you that it IS true.

What do spies do?  They spy!

 

seven
smkinoshita
50%
50%
smkinoshita,
User Rank: Light Sabre
3/24/2014 | 11:54:31 PM
Re: NSA metadata
@RitchBlasi:  The problem isn't whether or not you have something to hide, but rather if they THINK you have something to hide.  History shows that people are prone to error but pride makes the persist down an incorrect path, and that is the actual problem.  

Worse:  What if their data has a false positive?  It doesn't matter if one is innocent; a party that has already predetermined guilt will dig and dig until they find their 'evidence' and will make leaps of logic to prove their point.  

The real root of the problem is how flawed people are.
R Clark
50%
50%
R Clark,
User Rank: Blogger
3/24/2014 | 11:03:13 PM
Beating a path to protectionism
Nothing wrong with NSA probing Huawei to find intelligence leaks. That's its job. But pretty astonishing that having found nothing most Washington security agencies and the Hill claim Huawei is a security threat. 


Just giving an excuse for China to proscribe US and other foreign companies. They don't need much encouragement.

My blog: http://www.electricspeech.com/journal/2014/3/25/huawei-ban-is-beating-a-path-to-protectionism.html

 
Page 1 / 3   >   >>
More Blogs from Shades of Ray
Juniper looks like it's on the offensive and defensive with the acquisition of data center interconnect (DCI) specialist BTI Systems but will it need to do more?
Nokia's Virtualized Service Router (VSR) and Virtualized Mobile Gateway (VMG) are the latest virtual functions to get an independent evaluation.
The UK government's conclusion that there is no consensus over the need for FTTP has angered the altnet.
Alcatel-Lucent has become part of Nokia, spelling the end for two of the giant brands of the legacy telecom era.
Critical appointment for UK incumbent as it once again adds mobile to the mix and takes its first steps towards a virtualized cloud infrastructure.
From The Founder
Light Reading sits down at CES with the head of Cisco's service provider video business, Conrad Clemson, to discuss how NFV and cloud security relate to video, the challenge of managing 4K/8K traffic, the global expansion of Netflix and virtual reality.
Flash Poll
Live Streaming Video
CLOUD / MANAGED SERVICES: Prepping Ethernet for the Cloud
Moderator: Ray LeMaistre Panelists: Jeremy Bye, Leonard Sheahan
LRTV Custom TV
Join Us at the Digital Operations Transformation Summit

2|4|16   |   03:52   |   (0) comments


The Digital Operations Transformation Summit on February 21, 2016 at the Crowne Plaza Barcelona Fira Centre will bring together 50 senior executives to engage in a unique debate on the opportunities and challenges presented by the transformative evolving digital landscape. RSVP now at events@lightreading.com.
LRTV Custom TV
Making the Test: ADVA Ensemble Connector vs. Open vSwitch

2|4|16   |   01:28   |   (0) comments


Light Reading, in partnership with EANTC, recently tested ADVA's Ensemble Connector, which replaces open vSwitch and offers carrier-grade capability and interoperability. The test results strengthen ADVA's credibility as a provider in the virtualization space.
LRTV Custom TV
Bridging the Gap Between PoCs & Deployment in NFV

2|4|16   |   31:50   |   (0) comments


Charlie Ashton of Wind River presents the keynote at Light Reading's 2020 Vision executive summit in Dublin.
Between the CEOs
CEO Chat With Mike Aquino

2|3|16   |   17:34   |   (0) comments


The former CEO of Overture Networks, Mike Aquino, discusses why truly open virtualization solutions provide service providers with the greatest choice.
Shades of Ray
MWC: Buckle Up for 5G & the IIoT

2|2|16   |   02:28   |   (0) comments


This year's Mobile World Congress looks set to be a 5G land grab and a chance to get down and dirty with the Industrial Internet of Things (IIoT) – but what will the 5G discussions actually be about?
LRTV Custom TV
Case Study: Building China's Next-Gen TV Networks

2|2|16   |   5:01   |   (0) comments


With over 2 billion viewers worldwide, Shenzhen Media Group is one of China's largest content producers. By partnering with Huawei and Sobey, SZMG was able to modernize media operations with the Converged News Center, a production studio that is a model for next-generation workflows.
LRTV Custom TV
Quad Channel Modulator Driver with 46 Gbaud Capability from MACOM

1|28|16   |     |   (0) comments


MACOM's MAOM-003427 is the industry's first surface-mount modulator driver with 46 Gbaud capability to support next generation 200G and 400G applications.
LRTV Custom TV
Video Infographic: Validating Cisco's NFV Infrastructure

1|26|16   |   02:24   |   (1) comment


We all know that the network of the future will be virtual, but when will virtual become a reality? This video infographic covers the four key areas in which Light Reading, in partnership with EANTC, tested Cisco's NFV infrastructure: performance, reliability, multi-service capabilities and single pane of glass management.

For the full report, see

Between the CEOs
CEO Chat With Phil McKinney, CableLabs

1|22|16   |   13:36   |   (1) comment


At CES in Las Vegas, we met with Phil McKinney, CEO of CableLabs. Phil provides an update on the rollout of DOCSIS 3.1, his views on the future of open source and how consumer interest in virtual reality could affect network traffic.
Between the CEOs
Ericsson CTO on the Changing Telecom Market

1|21|16   |   10:26   |   (0) comments


At CES 2015, CTO of Ericsson, Ulf Ewaldsson, sits down with CEO of Light Reading, Steve Saunders, to discuss the changing telecom market, the new partnership with Cisco and the future of the telecom industry.
LRTV Interviews
Ireland's Data Dream

1|21|16   |   14:31   |   (0) comments


Host In Ireland president Gary Connolly tells Light Reading's Steve Saunders about the role Ireland is playing in hosting data for the world's largest organizations.
LRTV Custom TV
Brocade Keynote: Transitioning to the New IP

1|20|16   |   27:23   |   (0) comments


At 2020 Vision in Dublin, Andrew Coward, VP of Service Provider Strategy at Brocade, presents the transition to the New IP.
Upcoming Live Events
March 10, 2016, The Cable Center, Denver, CO
April 5, 2016, The Ritz Carlton, Charlotte, NC
May 23, 2016, Austin, TX
May 24-25, 2016, Austin Convention Center, Austin, TX
All Upcoming Live Events
Infographics
Cisco's latest VNI numbers suggest the world will be using 366.8 exabytes of data on smartphones and Internet of Things devices, up from 44.2 exabytes, in 2015.
Hot Topics
Alphabet Is Serious About Google Fiber
Mari Silbey, Senior Editor, Cable/Video, 2/1/2016
Did Juniper Pay 'Peanuts' for BTI?
Mitch Wagner, West Coast Bureau Chief, Light Reading, 2/2/2016
Google's 5G Radio Ambitions Are Expanding
Dan Jones, Mobile Editor, 2/5/2016
How Data Center Outsourcing Fuels AT&T NetBond Growth
Carol Wilson, Editor-at-large, 2/3/2016
3.5GHz Startup Gets $22M for Small Cells
Dan Jones, Mobile Editor, 2/2/2016
Like Us on Facebook
Twitter Feed
Webinar Archive
BETWEEN THE CEOs - Executive Interviews
The former CEO of Overture Networks, Mike Aquino, discusses why truly open virtualization solutions provide service providers with the greatest choice.
As anyone who knows me will tell you, I like to think I know a fair bit about this next-gen-comms malarkey, but there's nothing like an interview with one of the ...
Animals with Phones
Happy Groundhogs for Technology Day! Click Here
Live Digital Audio

Broadband speeds are ramping up across Europe as the continent, at its own pace, follows North America towards a gigabit society. But there are many steps to take on the road to gigabit broadband availability and a number of technology options that can meet the various requirements of Europe’s high-speed fixed broadband network operators. During this radio show we will look at some of the catalysts for broadband network investments and examine the menu of technology options on offer, including vectoring and G.fast for copper plant evolution and the various deployment possibilities for FTTH/B.