& cplSiteName &

NSA Reportedly Spying on Huawei: What's Chinese for 'Ironic'?

Ray Le Maistre
3/24/2014
100%
0%

In an ironic twist to the war of words between US officials and Huawei, the latest revelations about the NSA's hacking activities shows how the US security agency tapped into the Chinese vendor's servers to monitor its internal communications and learn how its technology works. (See Obama Weighs In on NSA Data Collection.)

According to a report in the New York Times, based on information revealed by whistleblower and Light Reading Hall of Famer Edward Snowden, the US National Security Agency was hacking into Huawei Technologies Co. Ltd. 's systems to check on internal communications -- and to figure out how its technology works so it could hack into comms networks built using Huawei kit -- just as the US authorities were branding Chinese technology suppliers as security threats. (See US vs Huawei/ZTE: The Verdict and Light Reading Announces 2013 Hall of Fame Inductees.)

Not surprisingly, Huawei isn't impressed.

It's official statement, is quite muted, though:

    If the actions in the report are true, Huawei condemns such activities that invaded and infiltrated into our internal corporate network and monitored our communications. Corporate networks are under constant probe and attack from different sources -- such is the status quo in today's digital age. We reiterate that Huawei disagrees with all activities that threaten the security of networks and is willing to work with all governments, industry stakeholders and customers, in an open and transparent manner, to jointly address the global challenge of network security.

    The security and integrity of our corporate network and our products are our highest priorities. That is the reason why we have an end-to-end security assurance system and why we are continuously working to enhance that system. Like other enterprises, we continuously block, clean and reinforce our infrastructure from cyber threats.

Of course, none of this (that Chinese firms pose a security threat, or that the NSA hacked into Huawei) has been proven with any "hard" evidence. What has been proven, though, is that security threats are a very major concern for network operators and their customers, and that network security is becoming an increasingly important issue for communications service providers worldwide as fixed and mobile networks shift to all-IP networks. (See Digging Into Mobile Security, The Role of Identity Management and DNS Attacks on the Rise.)

— Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading


Want to learn more about this topic? Check out the agenda for Mobile Network Security Strategies, which will take place on May 21 at The Thistle Marble Arch hotel in London. For more on the event, including the stellar service provider speaker line-up, see the event's official site.


(23)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Page 1 / 3   >   >>
Mitch Wagner
50%
50%
Mitch Wagner,
User Rank: Lightning
3/25/2014 | 5:49:24 PM
Re: NSA Hacking
brookseven -  True, but this development is a marketing coup for Huawei.
sam masud
50%
50%
sam masud,
User Rank: Light Sabre
3/25/2014 | 3:18:23 PM
Remember
Remember we were also told that Huawei could not be trusted to do business in the US--so while this revelation is hardly a surprise--or  should not be a surprise, let's remember that companies on this side of the pond allowed our own spooks to spy on us.
mendyk
100%
0%
mendyk,
User Rank: Light Sabre
3/25/2014 | 1:20:11 PM
Re: NSA Hacking
"Sabre rattling" is exactly what's going on, and money as you say is almost always at the root of issues like this. In taking an exclusionary tack toward Huawei and ZTE, the U.S. runs the risk of isolating itself from most of the rest of the world regardng telecom technology.
KBode
50%
50%
KBode,
User Rank: Light Sabre
3/25/2014 | 1:07:21 PM
Re: NSA Hacking
"I don't think there's any question that the militant stance toward Huawei and ZTE stems in part from some very unsavory and uncomfortable and outdated color concepts -- as in, red menace and yellow peril."

I think that's being used as the bogeyman, but I think by and large this really (as most things do) comes down to money. Cisco and others don't want them in the United States markets. There was a Washington Post report a while back that clearly pointed out most of the "concerns" about Huawei spying was originating with Cisco. That seems to long have been ignored:

http://www.washingtonpost.com/business/technology/huaweis-us-competitors-among-those-pushing-for-scrutiny-of-chinese-tech-firm/2012/10/10/b84d8d16-1256-11e2-a16b-2c110031514a_story.html

That they might spy is kind of irrelevant. All of this gear, American or otherwise, is made in China. All spies agencies exploit all gear, no matter who it's made by. Bunch of protectionist, nonsensical saber rattling. 
R Clark
50%
50%
R Clark,
User Rank: Blogger
3/25/2014 | 11:35:01 AM
Re: NSA Hacking
The protectionism I'm describing is China tit-for-tat protectionism. China doesn't need much encouragement to find ways of obstructing or banning foreign businesses. Huawei is proscribed because it's a Chinese firm that could theoretically compromise networks. On those grounds China could outlaw a lot of firms.

The Mandiant report last January, and some reporting by Bloomberg in 2012 described the nature of China cyber-attacks, which are carried out by semi-independent and deniable hacking groups under the auspices of the PLA. The attacks are absolutely huge in scale but there's nothing to connect Huawei to them.

 

 

 

 

 

 

 

 
mendyk
50%
50%
mendyk,
User Rank: Light Sabre
3/25/2014 | 8:59:42 AM
Re: NSA Hacking
The industrial protectionism argument doesn't hold up too well when you consider that non-US companies like Ericsson aren't proscribed from selling to US network operators. Or rather, US network operators aren't proscribed from buying their equipment.
Ray@LR
0%
100%
Ray@LR,
User Rank: Blogger
3/25/2014 | 5:43:08 AM
Re: NSA Hacking
A few observations from the UK (so away form the 'red mist' of both N America and Far East Asia).

 

1 - Of course China is spying on everyone and everyone is spying on China. That's how it is. I don't think anyone is going to suggest that is not the case.

2 - TO what extent is Huawei involved? That's where there is a big question mark. Some accusations that Huawei is a Trojan Horse for Chinese spies/potential industrial or political attacks (or digital warfare) appear to be based purely on the fact that the president and founder, Ren Zhengfei, was formerly an officer in the Chinese army and might be a communist. He's a 70-years-old Chinese male, for goodness sakes... If there is some independent evidence that Huawei's technology is a back door/Trojan Horse, let's see it.

3 - The 'Chinese companies are security threats' accusation may look like good old-fashioned racism (and perhaps it is) and/or 'reds-under-the-bed' stuff --  but for me it looks more like good old-fashioned industrial protectionsim. Huawei is a threat to a number of US technology companies -- proclaiming that any US company that does business with Huawei or ZTE is being unpatriotic and exposing the US to potential security attacks looks like good business for the US.  

4 - That the NSA hacked into Huawei is no surprise. But isn't it a bit rich to say that one country has the moral high ground and is 'protecting freedom' etc by spying, while another is not? IN China, no doubt, people are led to believe that the hacking of US systems is defenisve, to protect China against the imperialist threat of the US. In every country, the others are the 'bad guys'. IT is no different here in the UK (though the majority of the media here tend to take the same view as the US, for cultural and political reasons.)

 

It's all relative. If the Chinese authorities were to accuse US vendors of providing a Trojan Horse security threat to China because a senior executive used to be high up in the US army and is active in the Republican Party, would that seem somewhat ridiculous? Of course.

It's all about perspective. And the (non) existence of tangible proof IN THE CASE OF HUAWEI. 

And, of course,w e should point out that, as we have noted before, Huawei has brought some of this on itself, too -- it's much easier to believe that a company poses a security threat when it has been caught in naive industrial espionage activities in the past.

Can Huawei Change?


http://www.lightreading.com/asia/can-huawei-change/a/d-id/700428

Huawei in Spying Flap


http://www.lightreading.com/ethernet-ip/huawei-in-spying-flap/d/d-id/603775

 

AND  - final point - none of this means that any one company's technology does NOT pose a security threat. It would be wrong to say that Huawei's technology, strategy, motives, aims, affiliations, etc are not worthy of examination. They are. What's needed is objective examination and a reliance on hard evidence, not political/racial/industrial mud-slinging. 

 
brookseven
100%
0%
brookseven,
User Rank: Light Sabre
3/25/2014 | 12:09:56 AM
Re: NSA Hacking
Mitch,

The NSA hacking and the Chinese hacking are orthogonal.  You can't assume one means the other is not true.  In fact, it should show you that it IS true.

What do spies do?  They spy!

 

seven
smkinoshita
50%
50%
smkinoshita,
User Rank: Light Sabre
3/24/2014 | 11:54:31 PM
Re: NSA metadata
@RitchBlasi:  The problem isn't whether or not you have something to hide, but rather if they THINK you have something to hide.  History shows that people are prone to error but pride makes the persist down an incorrect path, and that is the actual problem.  

Worse:  What if their data has a false positive?  It doesn't matter if one is innocent; a party that has already predetermined guilt will dig and dig until they find their 'evidence' and will make leaps of logic to prove their point.  

The real root of the problem is how flawed people are.
R Clark
50%
50%
R Clark,
User Rank: Blogger
3/24/2014 | 11:03:13 PM
Beating a path to protectionism
Nothing wrong with NSA probing Huawei to find intelligence leaks. That's its job. But pretty astonishing that having found nothing most Washington security agencies and the Hill claim Huawei is a security threat. 


Just giving an excuse for China to proscribe US and other foreign companies. They don't need much encouragement.

My blog: http://www.electricspeech.com/journal/2014/3/25/huawei-ban-is-beating-a-path-to-protectionism.html

 
Page 1 / 3   >   >>
More Blogs from Shades of Ray
I've got my travel coffee-making set already packed for the long trip from London to Austin, Texas: Here's a whole host of reasons why I should see you there.
ADVA has further developed the virtual switch technology it brought on board with the acquisition of Overture and is ready to pitch it into commercial NFV environments following an independent evaluation of the technology.
A new report outlines the state of play in the network functions virtualization (NFV) world and provides an eight-step strategy for network operators based on the experiences of the early adopters.
Who deserves to be welcomed into Light Reading's Hall of Fame this year? Let's take a look – and you can vote for your favorites.
There's still time to enter this year's Leading Lights awards -- here are the details you need.
From The Founder
The independent evaluation of Nokia's key virtual network functions (VNFs) was a defining moment for the Finnish giant.
Flash Poll
Live Streaming Video
Charting the CSP’s Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it’s going from two industry veterans.
LRTV Custom TV
Cisco's Innovations in Cable

5|26|16   |   03:18   |   (0) comments


Marc Aldrich from Cisco discusses the latest in security, the evolution and momentum for CCAP and what the industry will be seeing next from Cisco.
LRTV Documentaries
Leading Lights 2016 Highlights

5|25|16   |   02:26   |   (1) comment


Some of the high points from this year's Leading Lights awards dinner at the Hotel Ella in Austin, Texas.
LRTV Documentaries
Light Reading Hall of Fame 2016

5|23|16   |   05:43   |   (0) comments


Find out who has been welcomed into Light Reading's Hall of Fame this year.
LRTV Custom TV
ZTE TM Forum Highlights

5|23|16   |     |   (0) comments


ZTE showcased its new ICT solutions at TM Forum in Nice.
LRTV Interviews
Gamma's MD on the Emergence of UC2

5|20|16   |     |   (0) comments


Gamma Communications Managing Director David Macfarlane believes the unified communications (UC) market has reached a tipping point.
LRTV Custom TV
The Ultimate 5-Minute Guide to Digital Customer Engagement

5|20|16   |     |   (0) comments


In this short video, you will hear all about how Digital Customer Engagement is the key to meeting customer expectations, keeping them happy, and maximizing revenue. VP Product & Marketing at Pontis, Ofer Razon, breaks down for us the five essential capabilities for successful Digital Customer Engagement. Don’t miss!
LRTV Custom TV
NFV in 2016: Part 1 – NFV Use Cases Get Real

5|19|16   |   05:57   |   (0) comments


Consensus is building around the key use cases for NFV, including managed IP services at the network edge and on customer premises, which can generate new revenues from enterprises/SMBs and consumers; Evolved Packet Core to support LTE migration; and adjacent technologies, such as TAS and IMS, to support VoLTE and next-generation charging and policy control ...
LRTV Custom TV
Nokia's Steve Vogelsang on NFV – Part 3

5|19|16   |     |   (0) comments


Steve Vogelsang discusses the challenges of operational transformation and how Nokia helps its customers. Join Steve at the Big Communications Event in Austin the morning of May 24, on his keynote and optical networking panel.
LRTV Interviews
Level 3: Why UC Is In Demand

5|17|16   |   04:12   |   (1) comment


Andrew Edison, Level 3's senior VP of sales, EMEA region, talks about the drivers of growth in the unified communications services market.
LRTV Custom TV
ARM's OPNFV Action

5|17|16   |     |   (0) comments


At the ARM booth at MWC 2016, Joe Kidder and Bob Monkman speak to Light Reading about OPNFV and their upcoming action.
LRTV Custom TV
Nokia's Steve Vogelsang on NFV – Part 2

5|16|16   |     |   (0) comments


Steve Vogelsang gives advice to service providers on how to move to NFV. Join Steve at the Big Communications Event in Austin the morning of May 24, on his keynote and optical networking panel.
LRTV Interviews
Interoute CTO on NFV's Maturity

5|13|16   |   06:46   |   (1) comment


Matt Finnie, CTO at international operator Interoute, explains how NFV has made life easier in terms of logistics and how Interoute can now enable a 'software-defined moment' for its customers.
Upcoming Live Events
September 13-14, 2016, The Curtis Hotel, Denver, CO
December 6-8, 2016,
June 16-18, 2017, Austin Convention Center, Austin, TX
All Upcoming Live Events
Infographics
A new survey conducted by Heavy Reading and TM Forum shows that CSPs around the world see the move to digital operations as a necessary part of their overall virtualization strategies.
Hot Topics
DT: Telcos Must Escape Vendor Prison
Iain Morris, News Editor, 5/24/2016
AT&T to Start 5G 'Friendly' Trial by 2016 End
Dan Jones, Mobile Editor, 5/24/2016
Cable Is Eyeing Its Retail Options
Mari Silbey, Senior Editor, Cable/Video, 5/25/2016
AT&T's Margaret Chiosi Retires
Ray Le Maistre, Editor-in-chief, 5/25/2016
Cisco's Patel Hails 'Microculture' Successes
Iain Morris, News Editor, 5/26/2016
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
In this latest installment of the CEO Chat series, Craig Labovitz, co-founder and CEO of Deepfield, sits down with Light Reading's Steve Saunders in Light Reading's New York City office to discuss how Deepfield fits in with the big data trend and more.
Grant van Rooyen, president and CEO of Cologix, sits down with Steve Saunders, founder and CEO of Light Reading, in the vendor's New Jersey facility to offer an inside look at the company's success story and discuss the importance of security in the telecom industry.
Animals with Phones
Live Digital Audio

Our world has evolved through innovation from the Industrial Revolution of the 1740s to the information age, and it is now entering the Fourth Industrial Revolution, driven by technology. Technology is driving a paradigm shift in the way digital solutions deliver a connected world, changing the way we live, communicate and provide solutions. It can have a powerful impact on how we tackle some of the world’s most pressing problems. In this radio show, Caroline Dowling, President of Communications Infrastructure & Enterprise Computing at Flex, will join Women in Comms Director Sarah Thomas to discuss the impact technology has on society and how it can be a game-changer across the globe; improving lives and creating a smarter world. Dowling, a Cork, Ireland, native and graduate of Harvard Business School's Advanced Management Program, will also discuss her experience managing an international team focused on innovation in an age of high-speed change.