Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
World Wide Web
Next Generation Data Center Is Here!
Average Rating:
Rate this article:  
Sprint, Seeking OK on Merger, Agrees To Shun Huawei Gear
Sprint, Seeking OK on Merger, Agrees To Shun Huawei Gear

By Jennifer LeClaire
March 29, 2013 12:15PM

    Bookmark and Share
Although a House investigation concluded there were "credible reports" of Huawei's illegal behavior, there is no conclusive evidence that either Huawei or ZTE are installing telecom equipment with hidden codes to transmit information back to China. But with the recent back-and-forthing between the U.S. and China over cyber-security, the issue remains.
 


Sprint and Softbank, the company planning to acquire the third-largest U.S. carrier, are committed to meeting national security concerns to make their merger a reality. The companies made it clear to Washington that they will no longer purchase or use equipment the Chinese telecom giant manufactures.

According to The New York Times, Sprint-Softbank's agreement with the U.S. government would allow national security officials to monitor changes to the company's system of routers, servers, and switches, among other equipment and processes. Softbank has offered $20 billion to acquire most of Sprint but needs U.S. government approval.

"I have met with Softbank and Sprint regarding this merger and was assured they would not integrate Huawei in to the Sprint network and would take mitigation efforts to replace Huawei equipment in the Clearwire network," said Rep. Mike Rogers, R-Mich., chairman of the House Intelligence Committee. "I expect them to make the same assurances before any approval of the deal in the CFIUS process."

CFIUS is the Committee on Foreign Investment in the United States, a federal government inter-agency panel that reviews the national security implications of foreign investment in the U.S.

Spying on U.S. Communications

What's the problem with Huawei? Last October, a House Intelligence Committee report warned that buying Huawei Technologies products poses a security risk to the nation. Huawei vehemently opposed the allegations, which include visa fraud and job bias. The report also called out ZTE, another Chinese telecom firm.

The overarching allegation is that China could use equipment these companies manufacture to spy on U.S. communications systems and threaten U.S. technology infrastructure. Some U.S. analysts are saying the report is steeped in protectionism and neither China nor Huawei is taking the report lying down.

Although the House investigation concluded there are "credible reports" of Huawei's illegal behavior, there is no conclusive evidence that either Huawei or ZTE are installing telecom equipment with hidden codes to transmit information back to China. But with the recent back-and-forthing between the U.S. and China government over cyber-security, the issue remains at the fore.

Is the Threat Real?

Paul Henry, a security and forensic analyst at Lumension, told us not to be mistaken -- there is danger here.

"This isn't a case of the government being overly paranoid, though I might also argue that there is no such thing when it comes to cyber-security," Henry said. "It is very possible that back doors are being built into the hardware shipped by the Chinese."

As Henry sees it, the real danger here is that if Chinese companies, deliberately or not, are leaving easy back doors into their products, then malware could be executed at the firmware and peripheral level.

"What that boils down to is a piece of malware executed at a level below the operating system, where it is virtually undetectable by just about every cyber-security product on the market today," Henry said.

"There is some amount of doubt in the security community about whether this sort of attack is even practically possible, but I assure you, it is. It was demonstrated in two proof-of-concept rootkits, Red Pill and Blue Pill, by Joanna Rutkowska at Black Hat in 2006. There is a real danger here that everyone -- not just the government -- should be considering when purchasing IT equipment manufactured overseas."
 

Tell Us What You Think
Comment:

Name:



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 World Wide Web
1.   Facebook Outage Puts Users in Tizzy
2.   Twitter Buys Password Manager Mitro
3.   Gov't User Data Requests Skyrocket
4.   Internet.org App to Debut in Zambia
5.   HealthCare.gov's Rollout Probed


advertisement
OkCupid Experiments with Daters
Unethical without user consent?
Average Rating:
Radical.FM's Freemium Biz Model
Online radio startup asks for donations.
Average Rating:
Twitter Buys Password Manager Mitro
Startup to release code as open source.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Ruling Against Microsoft Raises E-Mail Privacy Concern
Microsoft has been ordered to hand over e-mails to law enforcers in the United States as part of a criminal investigation, even though the e-mail is stored at a data center in Dublin,Ireland.
 
Twitter Buys Password Manager Startup Mitro
Following on the heels of another acquisition earlier this week, Twitter is adding to its fold a password-manager security startup called Mitro, which in turn is releasing its code as open source.
 
Government Requests for Customer Data Skyrocket
Requests for customer data from the government jumped 50 percent in the first half of 2014, according to Twitter, which received more than 2,000 requests for user info from gov't agencies.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.