Politics, not security, behind Huawei, ZTE allegations, say analysts
China's Huawei and ZTE pose security threats to the U.S., according to an upcoming report from a U.S. congressional committee
IDG News Service - A year-long investigation by a U.S. congressional committee has reportedly concluded that Chinese telecommunication equipment vendors Huawei Technologies and ZTE pose a security threat to the nation, and the committee is advising U.S. firms to buy networking gear from other vendors. But analysts say the committee's investigation is motivated more by politics, while doing little to safeguard U.S. telecommunication networks.
The U.S. House Intelligence Committee is scheduled to release a report on its investigation on Monday. It made its conclusions after finding that both Huawei and ZTE could be influenced by the Chinese state government to undermine U.S. security, according to media reports. The committee has also recommended the U.S. block any attempts by the two companies to make acquisitions or mergers in the country, and has encouraged U.S. private firms to consider the security risks in doing business with Huawei and ZTE for equipment or services.
The investigation's findings could tarnish the reputations of both Huawei and ZTE, which have faced repeated accusations that the companies' equipment could be used by the Chinese government to spy on U.S. telecommunication networks.
In an interview on CBS News' show 60 Minutes aired on Sunday, chairman of the committee and U.S. representative Mike Rogers said, "If I were an American company today ... I would find another vendor if you care about your intellectual property, if you care about your consumers' privacy, and you care about the national security of the United States of America."
While Huawei and ZTE have yet to receive the report, both companies have repeatedly defended themselves from allegations that they pose security risk, while trying to assist with the committee's investigation. Last month, representatives from Huawei and ZTEappeared at a hearing with the House Intelligence Committee, and denied any ties with the Chinese government, stating that their companies would never sabotage a customers' network.
"The security and integrity of our products are world proven," said Huawei spokesman Scott Sykes, citing how the company has done business in almost 150 markets with more than 500 telecommunication operators. "Those are the facts, political agendas aside," he said in an email.
ZTE spokesman David Dai Shu said the company would offer comment once the congressional committee's report is released. A ZTE letter addressed to the committee on Sept. 25, however, questioned why ZTE was the focus of the committee's investigation, when larger Western telecommunication equipment vendors were also manufacturing their equipment in China.
"By way of example, ZTE's U.S. telecom infrastructure equipment sales last year were less than $30 million. In contrast, two of the larger Western vendors alone had US sales in excess of $14 billion," the letter said. "ZTE has suggested, respectfully, that the scope of the Committee's inquiry is too narrow to fully protect US national security."
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Malware and Vulnerabilities White Papers | Webcasts