U.S. lawmakers quiz ZTE, Huawei over spying concerns
They seek answers on the telecom companies' connections to the Chinese government
IDG News Service - Two U.S. congressmen have asked executives at Chinese telecom companies ZTE and Huawei to explain their connection to the Chinese government out of concern that the companies' products represent a risk to U.S. national security.
Reps. Mike Rogers (R-Mich.) and C.A. "Dutch" Ruppersberger (D-Md.) asked for the companies' "interactions and relationships" with several Chinese government agencies, including the Ministry of National Defense and the Ministry of State Security, in letters to executives of the two companies sent Monday.
It's important for the lawmakers, both senior members of the U.S. House of Representatives Intelligence Committee, to understand the links between the two companies and the Chinese government, said Rogers, the committee chairman. Huawei and ZTE have cooperated with a committee investigation, and the committee hopes to receive more information about the "influence of the Chinese government" in their businesses, he said in a statement released Wednesday.
"I remain concerned about the national security threat posed by the potential expansion of Huawei and ZTE into our telecommunications infrastructure," Rogers added. "We must get to the bottom of these issues before the companies have further access to our market."
In their letter to Hauwei executives, the lawmakers asked about the company's Communist Party Committee and what influence it has on business operations. The lawmakers also asked for a list of Huawei's U.S. contracts, and for the amount of funding the Chinese government has provided to Hauwei for research and development.
Rogers and Ruppersberger also asked for details about the military career of Hauwei's founder, Ren Zhengfei.
In the ZTE letter, the lawmakers asked about a "favorable" $15 billion loan to the company from the China Development Bank. They also asked if the Chinese government has ever ordered ZTE to provide it with information. The two also ask about ZTE's statements to the committee in May that it has no knowledge of any cybersecurity incidents at the company.
"To your knowledge, has ZTE ever been the victim of a cyber incident whereby a non-ZTE employee or other company attempted to retrieve ZTE's intellectual property by maliciously exploiting ZTE's networks?" the letter asked
The lawmakers also asked about ZTE's relationship to Zhongxingxin, its largest shareholder and a company controlled by the Chinese government.
A ZTE representative said the company is committed to "remaining transparent, candid, and cooperative" throughout the U.S. inquiry.
Huawei didn't respond to a request for a comment.
Committee members have met with representatives both companies in Hong Kong this year. The committee appreciated the "candid" discussion and an opportunity for additional dialog, Ruppersberger said.
"As I told these companies directly, the security of our telecommunications infrastructure and networks is one of my biggest concerns," he said in statement.A "While I appreciate the need for international competition, it is my responsibility to look critically at foreign companies, especially those whose government continues to conduct cyber espionage against U.S. enterprises."
(Michael Kan in Beijing contributed to this report.)
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts