Report alleges job bias, visa fraud at Huawei
Current and former Huawei workers allege lawbreaking to House Intelligence Committee investigators
Computerworld - WASHINGTON - A U.S. House intelligence committee report warning that two Chinese networking companies are posing security risks to the country also includes allegations of job bias and visa fraud at one of the firms, Huawei Technologies.
The report, released Monday by the Permanent Select Committee on Intelligence, charges that some foreign Huawei employees used visitor rather than work visas and that the company engaged in "widespread discriminatory behavior."
Some Huawei employees told investigators "that non-Chinese nationals are often laid-off only to be replaced by individuals on short-term visas from China."
The report also alleges that it was "very difficult, if not impossible for any non-Chinese national to be promoted in Huawei offices in the United States."
It also claims that only Chinese nationals working at Huawei in the United States could participate in a company stock plan.
The report, in sum, offers a catalog of complaints voiced by current and former employees, including allegations of fraud and bribery when Huawei sought contracts in the U.S.
The committee is referring the various allegations to the Department of Homeland Security, U.S. Justice Department, and other "appropriate agencies."
The report may just be just the first pitch in a legal obstacle course for Huawei and the the other company cited, ZTE.
The thrust of the intelligence committee report concerns security risks to the U.S. from Chinese networking gear, and says that the U.S. "should view with suspicion the penetration of the U.S. telecommunications market" by Chinese companies.
This report advised private sector firms to consider "long-term security risks" associated with the use of either ZTE or Huawei equipment. But beyond the security issues are allegations of visa fraud.
Congressional investigators, in the report, said Huawei employees "provided credible evidence" about violations of immigration law. Numerous workers said "that that Huawei employees visiting from China on tourist or conference visas are actually working fulltime at Huawei facilities," they added.
Although the report does not name the visas, it is likely describing the B-1 visitor visa.
The B-1 visa has limited uses, such as for conference travel and negotiations. Foreign nationals requiring a temporary work visa use an H-1B or an L-1 document.
The former and current employees who provided this information were unnamed in the report.
Huawei was asked to comment by email on the immigration allegations, but responded with a statement that broadly addressed the report, contending that it "employs many rumors and speculations to prove non-existent accusations."
Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov, or subscribe to Patrick's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts