- New prosthetic hand technology lets amputees feel again
- Child killed, 4 injured in Idaho elementary school bus crash
- Obama downplays IRS scandal, blames Obamacare rollout on ‘outdated’ agencies
- Pregnancies decline overall, up among older women
- Pentagon plans to destroy Syrian chemical arms on ship at sea
- Paris Metro issues ‘politeness manual’ to improve passengers’ behavior
- Justin Bieber, crew detained at Australian airport in drug search
- Lee Rigby trial: Muslim who machete-hacked soldier calls it ‘humane’ kill
- GM ending Chevy sales in Europe to focus on Opel and Vauxhall
- Putin’s diplomats to U.S. busted for living high life off $1.5M bilked from Medicaid
Two Chinese telecoms deny spying
House report cites ZTE Corp, Huawei as cyberprobe suspects
Equipment made by the two biggest Chinese telecommunications manufacturers secretly sends data back to China and has flaws that allow hackers to infiltrate computer and phone networks, according to details of a scathing new congressional report issued Monday.
The two companies — Huawei Technologies Ltd. and ZTE Corp. — also breached U.S. law, including sanctions and anti-bribery statutes, states the report, the result of an 11-month investigation by staff of the House Select Committee on Intelligence.
Officials from the two firms once again strongly denied charges they had aided Beijing’s cyberspying efforts, with Huawei Vice President William Plummer telling the Xinhua news agency that the latest accusations were “dangerous political distractions.”
“The report released by the committee today employs many rumors and speculations to prove nonexistent accusations,” the Shenzen-based company said in a statement.
“We hope the U.S. Congress can respect the truth and overcome biases so as to boost bilateral economic and trade cooperation, and not the reverse,” he told reporters in Beijing.
The House committee report recommended that government equipment should not include components made by Huawei and ZTE, the administration should use national security powers to block any mergers or takeovers they attempt, and U.S. firms should not do business with them at all.
“As a majority of U.S. networks are run by private companies, we recommend that private network providers find other vendors. Government systems and contractors should also exclude these companies’ products as well,” the Michigan Republican said Monday.
The report, without giving any details, says investigators found examples of “beaconing” — a hidden component inside a network secretly broadcasts to an outside computer.
A router allows multiple computers or other devices to use the same connection to the Internet. Large routers, such as those made by Huawei, are at the heart of modern telephone and computer networks.
Huawei, a private company founded by a former high-ranking Chinese military engineer, operates in more than 140 countries and has grown with astonishing speed in the past five years to become the world’s second-largest supplier of network hardware.
ZTE is the world’s fourth-largest mobile phone manufacturer, with 90,000 employees worldwide.
Committee members have made the beaconing allegation before, and Mr. Rogers was challenged about the absence of any detail about the charge in his panel’s report. He said the victims of the beaconing were reluctant to come forward.
“So there isn’t this huge outcry, people wanting to line up at press conferences to talk about material that they’ve had beaconed off of their particular routers,” Mr. Rogers said.
Similarly, the report provides few specifics to back up the committee’s allegations that equipment made by the companies has secret “back doors” that allow unauthorized access to the networks in which they are used.
But at a security conference earlier this year, a well-known “white hat” computer hacker who uses the handle FX demonstrated a series of vulnerabilities in Huawei systems.
“The flaws [he demonstrated] are numerous and [include vulnerabilities to] simple attacks known since the 1990s,” said Ira Victor, a computer forensic specialist for Data Clone Labs who attended the presentation. “These are not flaws that are found in competing vendors.”
The committee report states that, since the firms’ products often include thousands of components and millions of lines of code, it is nearly impossible to ensure their security against deliberate efforts to compromise it by the manufacturers.
The report also states that evidence about unrelated illegal activity concerning sanctions busting, bribery, and labor and immigration law violations has been handed over to the FBI.
© Copyright 2013 The Washington Times, LLC. Click here for reprint permission.
About the Author
Shaun Waterman is an award-winning reporter for The Washington Times, covering foreign affairs, defense and cybersecurity. He was a senior editor and correspondent for United Press International for nearly a decade, and has covered the Department of Homeland Security since 2003. His reporting on the Sept. 11 Commission and the tortuous process by which some of its recommendations finally became ...
- Britain eyes new powers to thwart Islamic extremists
- In global op, feds help seize websites selling fake goods
- Privacy board springs to life after NSA revelations
- Morocco trains 500 imams to counter spread of radical Islam
- Rice promises 'progressive' Asia tilt on women's rights, climate change
Latest Blog Entries
Why such hatred toward America's freedom of religion?
- 'Hunger Games' delivers Obama's message on income inequality: liberal group
- Activists urge Obama to go rogue, sidestep Congress
- Blast of winter weather heads to D.C. area
- PRUDEN: British press horrified as London's new mayor dares to proclaim the truth
- Child killed, 4 injured in Idaho elementary school bus crash
- Spike in battlefield deaths linked to restrictive rules of engagement
- New battlefront emerges in war between Republicans, tea party
- U.S. pilot scares off Iranians with 'Top Gun'-worthy stunt: 'You really ought to go home'
- Obama lived with Uncle Onyango Obama in the 1980s, White House admits
- Inside China: Nuclear submarines capable of widespread attack on U.S.
Independent voices from the The Washington Times Communities
Criticism may not be agreeable, but it is necessary. It fulfills the same function as pain in the human body. It calls attention to an unhealthy state of things.
Understanding economic events with a free market explanation
John Wood illustrates a new American politics, and the path to get there.
Interviews and show reviews from the Los Angeles punk scene past and present. Los Angeles has always been rich in punk rock talent since punk rock was born.
White House pets gone wild!