& cplSiteName &

NSA Reportedly Spying on Huawei: What's Chinese for 'Ironic'?

Ray Le Maistre
3/24/2014
100%
0%

In an ironic twist to the war of words between US officials and Huawei, the latest revelations about the NSA's hacking activities shows how the US security agency tapped into the Chinese vendor's servers to monitor its internal communications and learn how its technology works. (See Obama Weighs In on NSA Data Collection.)

According to a report in the New York Times, based on information revealed by whistleblower and Light Reading Hall of Famer Edward Snowden, the US National Security Agency was hacking into Huawei Technologies Co. Ltd. 's systems to check on internal communications -- and to figure out how its technology works so it could hack into comms networks built using Huawei kit -- just as the US authorities were branding Chinese technology suppliers as security threats. (See US vs Huawei/ZTE: The Verdict and Light Reading Announces 2013 Hall of Fame Inductees.)

Not surprisingly, Huawei isn't impressed.

It's official statement, is quite muted, though:

    If the actions in the report are true, Huawei condemns such activities that invaded and infiltrated into our internal corporate network and monitored our communications. Corporate networks are under constant probe and attack from different sources -- such is the status quo in today's digital age. We reiterate that Huawei disagrees with all activities that threaten the security of networks and is willing to work with all governments, industry stakeholders and customers, in an open and transparent manner, to jointly address the global challenge of network security.

    The security and integrity of our corporate network and our products are our highest priorities. That is the reason why we have an end-to-end security assurance system and why we are continuously working to enhance that system. Like other enterprises, we continuously block, clean and reinforce our infrastructure from cyber threats.

Of course, none of this (that Chinese firms pose a security threat, or that the NSA hacked into Huawei) has been proven with any "hard" evidence. What has been proven, though, is that security threats are a very major concern for network operators and their customers, and that network security is becoming an increasingly important issue for communications service providers worldwide as fixed and mobile networks shift to all-IP networks. (See Digging Into Mobile Security, The Role of Identity Management and DNS Attacks on the Rise.)

— Ray Le Maistre, Circle me on Google+ Follow me on TwitterVisit my LinkedIn profile, Editor-in-Chief, Light Reading


Want to learn more about this topic? Check out the agenda for Mobile Network Security Strategies, which will take place on May 21 at The Thistle Marble Arch hotel in London. For more on the event, including the stellar service provider speaker line-up, see the event's official site.


(23)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View        ADD A COMMENT
Page 1 / 3   >   >>
Mitch Wagner
50%
50%
Mitch Wagner,
User Rank: Lightning
3/25/2014 | 5:49:24 PM
Re: NSA Hacking
brookseven -  True, but this development is a marketing coup for Huawei.
sam masud
50%
50%
sam masud,
User Rank: Light Sabre
3/25/2014 | 3:18:23 PM
Remember
Remember we were also told that Huawei could not be trusted to do business in the US--so while this revelation is hardly a surprise--or  should not be a surprise, let's remember that companies on this side of the pond allowed our own spooks to spy on us.
mendyk
100%
0%
mendyk,
User Rank: Light Sabre
3/25/2014 | 1:20:11 PM
Re: NSA Hacking
"Sabre rattling" is exactly what's going on, and money as you say is almost always at the root of issues like this. In taking an exclusionary tack toward Huawei and ZTE, the U.S. runs the risk of isolating itself from most of the rest of the world regardng telecom technology.
KBode
50%
50%
KBode,
User Rank: Light Sabre
3/25/2014 | 1:07:21 PM
Re: NSA Hacking
"I don't think there's any question that the militant stance toward Huawei and ZTE stems in part from some very unsavory and uncomfortable and outdated color concepts -- as in, red menace and yellow peril."

I think that's being used as the bogeyman, but I think by and large this really (as most things do) comes down to money. Cisco and others don't want them in the United States markets. There was a Washington Post report a while back that clearly pointed out most of the "concerns" about Huawei spying was originating with Cisco. That seems to long have been ignored:

http://www.washingtonpost.com/business/technology/huaweis-us-competitors-among-those-pushing-for-scrutiny-of-chinese-tech-firm/2012/10/10/b84d8d16-1256-11e2-a16b-2c110031514a_story.html

That they might spy is kind of irrelevant. All of this gear, American or otherwise, is made in China. All spies agencies exploit all gear, no matter who it's made by. Bunch of protectionist, nonsensical saber rattling. 
R Clark
50%
50%
R Clark,
User Rank: Blogger
3/25/2014 | 11:35:01 AM
Re: NSA Hacking
The protectionism I'm describing is China tit-for-tat protectionism. China doesn't need much encouragement to find ways of obstructing or banning foreign businesses. Huawei is proscribed because it's a Chinese firm that could theoretically compromise networks. On those grounds China could outlaw a lot of firms.

The Mandiant report last January, and some reporting by Bloomberg in 2012 described the nature of China cyber-attacks, which are carried out by semi-independent and deniable hacking groups under the auspices of the PLA. The attacks are absolutely huge in scale but there's nothing to connect Huawei to them.

 

 

 

 

 

 

 

 
mendyk
50%
50%
mendyk,
User Rank: Light Sabre
3/25/2014 | 8:59:42 AM
Re: NSA Hacking
The industrial protectionism argument doesn't hold up too well when you consider that non-US companies like Ericsson aren't proscribed from selling to US network operators. Or rather, US network operators aren't proscribed from buying their equipment.
Ray@LR
0%
100%
Ray@LR,
User Rank: Blogger
3/25/2014 | 5:43:08 AM
Re: NSA Hacking
A few observations from the UK (so away form the 'red mist' of both N America and Far East Asia).

 

1 - Of course China is spying on everyone and everyone is spying on China. That's how it is. I don't think anyone is going to suggest that is not the case.

2 - TO what extent is Huawei involved? That's where there is a big question mark. Some accusations that Huawei is a Trojan Horse for Chinese spies/potential industrial or political attacks (or digital warfare) appear to be based purely on the fact that the president and founder, Ren Zhengfei, was formerly an officer in the Chinese army and might be a communist. He's a 70-years-old Chinese male, for goodness sakes... If there is some independent evidence that Huawei's technology is a back door/Trojan Horse, let's see it.

3 - The 'Chinese companies are security threats' accusation may look like good old-fashioned racism (and perhaps it is) and/or 'reds-under-the-bed' stuff --  but for me it looks more like good old-fashioned industrial protectionsim. Huawei is a threat to a number of US technology companies -- proclaiming that any US company that does business with Huawei or ZTE is being unpatriotic and exposing the US to potential security attacks looks like good business for the US.  

4 - That the NSA hacked into Huawei is no surprise. But isn't it a bit rich to say that one country has the moral high ground and is 'protecting freedom' etc by spying, while another is not? IN China, no doubt, people are led to believe that the hacking of US systems is defenisve, to protect China against the imperialist threat of the US. In every country, the others are the 'bad guys'. IT is no different here in the UK (though the majority of the media here tend to take the same view as the US, for cultural and political reasons.)

 

It's all relative. If the Chinese authorities were to accuse US vendors of providing a Trojan Horse security threat to China because a senior executive used to be high up in the US army and is active in the Republican Party, would that seem somewhat ridiculous? Of course.

It's all about perspective. And the (non) existence of tangible proof IN THE CASE OF HUAWEI. 

And, of course,w e should point out that, as we have noted before, Huawei has brought some of this on itself, too -- it's much easier to believe that a company poses a security threat when it has been caught in naive industrial espionage activities in the past.

Can Huawei Change?


http://www.lightreading.com/asia/can-huawei-change/a/d-id/700428

Huawei in Spying Flap


http://www.lightreading.com/ethernet-ip/huawei-in-spying-flap/d/d-id/603775

 

AND  - final point - none of this means that any one company's technology does NOT pose a security threat. It would be wrong to say that Huawei's technology, strategy, motives, aims, affiliations, etc are not worthy of examination. They are. What's needed is objective examination and a reliance on hard evidence, not political/racial/industrial mud-slinging. 

 
brookseven
100%
0%
brookseven,
User Rank: Light Sabre
3/25/2014 | 12:09:56 AM
Re: NSA Hacking
Mitch,

The NSA hacking and the Chinese hacking are orthogonal.  You can't assume one means the other is not true.  In fact, it should show you that it IS true.

What do spies do?  They spy!

 

seven
smkinoshita
50%
50%
smkinoshita,
User Rank: Light Sabre
3/24/2014 | 11:54:31 PM
Re: NSA metadata
@RitchBlasi:  The problem isn't whether or not you have something to hide, but rather if they THINK you have something to hide.  History shows that people are prone to error but pride makes the persist down an incorrect path, and that is the actual problem.  

Worse:  What if their data has a false positive?  It doesn't matter if one is innocent; a party that has already predetermined guilt will dig and dig until they find their 'evidence' and will make leaps of logic to prove their point.  

The real root of the problem is how flawed people are.
R Clark
50%
50%
R Clark,
User Rank: Blogger
3/24/2014 | 11:03:13 PM
Beating a path to protectionism
Nothing wrong with NSA probing Huawei to find intelligence leaks. That's its job. But pretty astonishing that having found nothing most Washington security agencies and the Hill claim Huawei is a security threat. 


Just giving an excuse for China to proscribe US and other foreign companies. They don't need much encouragement.

My blog: http://www.electricspeech.com/journal/2014/3/25/huawei-ban-is-beating-a-path-to-protectionism.html

 
Page 1 / 3   >   >>
More Blogs from Shades of Ray
The social media giant's solar-powered Aquila drone, designed to provide Internet access to remote locations, has taken to the skies – but why?
European vendor's momentum continues into 2016 as it reports impressive sales growth, only some of which comes from its Overture acquisition, but its profitability isn't keeping up.
A fiber-to-the-home broadband trial in the city of York using CityFibre's network looks likely to lead to more competitive ultra-broadband services across the UK.
The notion of 5G most commonly conjures up a vision of incredibly high-speed wireless/mobile broadband connectivity, but right now it's fixed line broadband that is key to operators' 5G plans.
The UK's decision to quit the European Union has had global reverberations but it's hard to tell exactly how bad the aftershocks will be.
Light Reading’s Upskill U is a FREE, interactive, online educational resource that delivers must-have education on themes that relate to the overall business transformation taking place in the communications industry.
NEXT COURSE
Wednesday, August 3, 1:00PM EDT
The Central Office Re-Architected as a Data Center
Guru Parulkar, Executive Director, Open Networking Research Center, Open Networking Lab
UPCOMING COURSE SCHEDULE
Wednesday, August 10, 1:00PM EDT
Telcos & Open Source 101
Phil Robb, Senior Technical Director, OpenDaylight
Friday, August 12, 1:00PM EDT
The Role of Open Source in NFV
Jim Fagan, Director, Cloud Practice, Telstra
Wednesday, August 17, 1:00PM EDT
Using Open Source for Data Centers and Cloud Services
Roz Roseboro, Senior Analyst, Heavy Reading
in association with:
From The Founder
Light Reading today starts a new voyage as part of a larger Enterprise.
Flash Poll
Live Streaming Video
Charting the CSP's Future
Six different communications service providers join to debate their visions of the future CSP, following a landmark presentation from AT&T on its massive virtualization efforts and a look back on where the telecom industry has been and where it's going from two industry veterans.
LRTV Custom TV
Reinventing Operations for a Virtual, Software-Defined World

7|28|16   |   5:23   |   (0) comments


Heavy Reading Senior Analyst Jim Hodges speaks with Accenture's Larry Socher and Matt Anderson about what service providers must do to transform their business to get the benefits of SDN and NFV including: leveraging DevOps, introducing real-time OSS and implementing analytics.
Women in Comms Introduction Videos
Fujitsu Sales Leader Shares Lessons Learned

7|27|16   |   5:12   |   (1) comment


As Fujitsu's only female sales leader, Annie Bogue knows the importance of asking for what you want, being flexible (she's been relocated five times), keeping a meticulous calendar, 'leaning in,' working harder than everyone else around you, being aware and more.
Telecom Innovators Video Showcase
VeEX Test & Measurement Solutions

7|25|16   |   08:57   |   (0) comments


Cyrille Morelle, president and CEO of VeEX Inc., talks test and measurement with Light Reading's Steve Saunders at BCE 2016. This includes innovative products such as VeSion Cloud-Based platform for network monitoring; MTTplus Modular Test platform for Access, Business, Carrier Ethernet, Transport and Core services; and OPX-BOX+ for Fiber Optics.
LRTV Custom TV
VeEX: Live From BCE 2016

7|25|16   |   03:20   |   (0) comments


VeEX's Senior Director of Business Development, Perry Romano, explains how VeEX provides tools to help install, maintain, monitor and manage network infrastructure efficiently and effectively. The portfolio of products on display include the RXT-6000, MTTplus and TX300s.
LRTV Custom TV
Real-Time Telemetry & Analytics for Intelligent SDN Orchestration

7|25|16   |   03:09   |   (0) comments


Packet Design CEO Scott Sherwood discusses how real-time network telemetry and analytics are enabling a new breed of SDN orchestration applications.
From the Founder
The Russo Report: Driving Disruption

7|25|16   |   07:44   |   (0) comments


In the first episode of a four-part series, Light Reading Founder and CEO Steve Saunders and Calix President and CEO Carl Russo drive around town discussing the disruptive mega-changes in the communications industry and where hope lies for service providers to meet the escalating demands of the cloud.
LRTV Custom TV
NetScout: Maximizing Enterprise Cloud for Digital Transformation

7|20|16   |   04:53   |   (0) comments


Light Reading Editor Mitch Wagner talks to NetScout CMO Jim McNiel about maximizing the benefits of enterprise cloud and digital transformation while minimizing potential pitfalls with a proper monitoring and instrumentation strategy.
Women in Comms Introduction Videos
Ciena's VP Offers a Career Crash Course

7|20|16   |   4:14   |   (2) comments


How did Ciena's Vice President of Sales, Angela Finn, carve out her career path? Simple, she tells WiC. She stayed true to her company, customers and principles. She shares her advice for women on how to be authentic and credible, as well as for companies that want to make a real change to their culture and practices.
LRTV Custom TV
NFV in 2016: Part 2 – Climbing the Virtualization Maturity Curve

7|19|16   |   06:56   |   (0) comments


Many of the initial use case implementations are single-vendor and self-contained. The industry is still climbing the virtualization maturity curve, needing further clarity and stability in the NFV infrastructure (NFVi) and greater availability and choice of virtualized network functions (VNFs). Interoperability between NFVis and VNFs from different vendors ...
Telecom Innovators Video Showcase
Versa Networks' Kumar Mehta on SD-WAN Managed Services

7|19|16   |     |   (0) comments


In Silicon Valley, Steve Saunders sits down with Versa's Kumar Mehta for an interview focused on why service providers are building SD-WAN managed services, and how Versa's telco customers are innovating.
LRTV Custom TV
Juniper Networks & The Evolution of NFV

7|19|16   |   06:01   |   (0) comments


Senior Juniper Networks executives talk to Light Reading Founder & CEO Steve Saunders about NFV developments and the recent independent evaluation by test lab EANTC of Juniper's Cloud CPE solution.
LRTV Interviews
CenturyLink Goes Beyond Managed WiFi

7|19|16   |     |   (0) comments


CenturyLink's managed WiFi allows enterprises, such as retailers and resorts, to track guest WiFi usage in order to help them better communicate with customers.
Upcoming Live Events
September 13-14, 2016, The Curtis Hotel, Denver, CO
November 3, 2016, The Montcalm Marble Arch, London
November 30, 2016, The Westin Times Square, New York City
December 6-8, 2016,
May 16-17, 2017, Austin Convention Center, Austin, TX
All Upcoming Live Events
Infographics
Five of the Top 10 most targeted countries in Check Point Software Technologies' global Malware & Threat Index for Q1 2016 are in Africa.
Hot Topics
Verizon Sports Big Plans for Yahoo
Alan Breznick, Cable/Video Practice Leader, Light Reading, 7/26/2016
Light Reading Beyond
Steve Saunders, CEO and founder, Light Reading, 7/28/2016
Are IP/Optical Integration Initiatives Moving to Silos?
Faisal Khan, Network Operator Technology Planning Dept., 7/28/2016
Yahoo Signing Off in $4.83B Sale to Verizon
Mari Silbey, Senior Editor, Cable/Video, 7/25/2016
Ericsson Board Has Been Asleep at the Wheel – Consultant
Ray Le Maistre, Editor-in-chief, 7/25/2016
Like Us on Facebook
Twitter Feed
BETWEEN THE CEOs - Executive Interviews
There's no question that, come 2020, 5G technology will turn the world's conception of what mobile networking is on its head. Within the world of 5G development, Dr. ...
I've enjoyed interviewing many interesting people since I rejoined Light Reading, but William A. "Bill" Owens certainly takes the biscuit, as we say where I come from.
Animals with Phones
Live Digital Audio

Our world has evolved through innovation from the Industrial Revolution of the 1740s to the information age, and it is now entering the Fourth Industrial Revolution, driven by technology. Technology is driving a paradigm shift in the way digital solutions deliver a connected world, changing the way we live, communicate and provide solutions. It can have a powerful impact on how we tackle some of the world’s most pressing problems. In this radio show, Caroline Dowling, President of Communications Infrastructure & Enterprise Computing at Flex, will join Women in Comms Director Sarah Thomas to discuss the impact technology has on society and how it can be a game-changer across the globe; improving lives and creating a smarter world. Dowling, a Cork, Ireland, native and graduate of Harvard Business School's Advanced Management Program, will also discuss her experience managing an international team focused on innovation in an age of high-speed change.