Huawei too dangerous to do business with?

The controversy swirling around use of Huawei telecom gear raises some interesting questions about the global nature of business and the future of cyberwarfare.

The U.S. House Permanent Select Committee on Intelligence just issued a report warning telecom firms to avoid buying Huawei gear for fear the Chinese government/military has required the company to build in backdoors that would enable a host of nefarious activities, everything from snooping to theft of intellectual property and remote control.

ANALYSIS: Huawei: Separating fact from fiction

The Economist first stirred the pot in August with its story "The company that spooked the world," which explored how Huawei has grown in 33 years to become the second largest telecom equipment supplier in the world with revenues in 2011 of $32 billion.


Huawei: Separating fact from fiction

Huawei customers defend their security after congressional report

Huawei, ZTE ban is questionable, given its impact

 House Intelligence Committee report blasts Huawei, ZTE as threats to U.S. national security

Cisco said to cut ties to ZTE

'60 Minutes' torpedoes Huawei in less than 15 minutes


"Critics are convinced [Huawei] ... has stolen vast amounts of intellectual property," the magazine wrote, "and that it has been heavily subsidized in its expansion by the Chinese government, eager to use it as a Trojan horse with which to infiltrate itself into more and more foreign networks."

While Huawei seems to have outdistanced the intellectual property accusations, U.S. regulators are still spooked about the company's relationship with the Chinese government, even after holding hearings to explore those relationships.

In hours of interviews, Huawei "failed to provide thorough information about its corporate structure, history, ownership, operations, financial arrangements, or management," the report states, and also would not provide "specific details about the precise role" played by the Chinese Communist Party Committee.

Some observers dismiss all of these concerns as paranoia, reasoning the company is too big to risk its very existence this way, while others say it is simply FUD stirred up by U.S. firms afraid of the arrival of this low-cost provider.

But those with experience doing business in China not only believe what has been said, they simply expect it to be true. "Companies and the government are very tight over there," said one observer. "And people feel it is what they should be doing to help the government." What's more, he said, even though no sign of wrongdoing has been found, it doesn't have to be Trojan code, it could simply be vulnerabilities that could be exploited later.

Congress is rightly worried about the possibility of having zombies at the heart of critical infrastructure that could be awakened by a foreign power to spy on companies or play a role in a cyberwar. Failing better cooperation, it makes sense to keep Huawei out, but there are risks.

One, China is a huge and growing market that many domestic players are counting on to fuel growth. What happens if China decides to treat our top players the same way? And two, global supply chains being what they are, with components sourced from all over, does this just give us a false sense of security?

More investigation is required.

Read more about wide area network in Network World's Wide Area Network section.

Join the CSO newsletter!

Error: Please check your email address.

Tags HuaweisecuritycyberwarfareZTEintelcyberwarHuawei Chinese government

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John Dix

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place