U.S. lawmakers quiz ZTE, Huawei over spying concerns
They seek answers on the telecom companies' connections to the Chinese government
IDG News Service - Two U.S. congressmen have asked executives at Chinese telecom companies ZTE and Huawei to explain their connection to the Chinese government out of concern that the companies' products represent a risk to U.S. national security.
Reps. Mike Rogers (R-Mich.) and C.A. "Dutch" Ruppersberger (D-Md.) asked for the companies' "interactions and relationships" with several Chinese government agencies, including the Ministry of National Defense and the Ministry of State Security, in letters to executives of the two companies sent Monday.
It's important for the lawmakers, both senior members of the U.S. House of Representatives Intelligence Committee, to understand the links between the two companies and the Chinese government, said Rogers, the committee chairman. Huawei and ZTE have cooperated with a committee investigation, and the committee hopes to receive more information about the "influence of the Chinese government" in their businesses, he said in a statement released Wednesday.
"I remain concerned about the national security threat posed by the potential expansion of Huawei and ZTE into our telecommunications infrastructure," Rogers added. "We must get to the bottom of these issues before the companies have further access to our market."
In their letter to Hauwei executives, the lawmakers asked about the company's Communist Party Committee and what influence it has on business operations. The lawmakers also asked for a list of Huawei's U.S. contracts, and for the amount of funding the Chinese government has provided to Hauwei for research and development.
Rogers and Ruppersberger also asked for details about the military career of Hauwei's founder, Ren Zhengfei.
In the ZTE letter, the lawmakers asked about a "favorable" $15 billion loan to the company from the China Development Bank. They also asked if the Chinese government has ever ordered ZTE to provide it with information. The two also ask about ZTE's statements to the committee in May that it has no knowledge of any cybersecurity incidents at the company.
"To your knowledge, has ZTE ever been the victim of a cyber incident whereby a non-ZTE employee or other company attempted to retrieve ZTE's intellectual property by maliciously exploiting ZTE's networks?" the letter asked
The lawmakers also asked about ZTE's relationship to Zhongxingxin, its largest shareholder and a company controlled by the Chinese government.
A ZTE representative said the company is committed to "remaining transparent, candid, and cooperative" throughout the U.S. inquiry.
Huawei didn't respond to a request for a comment.
Committee members have met with representatives both companies in Hong Kong this year. The committee appreciated the "candid" discussion and an opportunity for additional dialog, Ruppersberger said.
"As I told these companies directly, the security of our telecommunications infrastructure and networks is one of my biggest concerns," he said in statement.A "While I appreciate the need for international competition, it is my responsibility to look critically at foreign companies, especially those whose government continues to conduct cyber espionage against U.S. enterprises."
(Michael Kan in Beijing contributed to this report.)
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts