Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

US Bans Huawei, ZTE Telecoms Gear Over Security Risk

Huawei, ZTE Banned by FCC

US authorities announced a ban Friday on the import or sale of communications equipment deemed “an unacceptable risk to national security” — including gear from Chinese giants Huawei Technologies and ZTE.

Huawei, ZTE Banned by FCC

US authorities announced a ban Friday on the import or sale of communications equipment deemed “an unacceptable risk to national security” — including gear from Chinese giants Huawei Technologies and ZTE.

Both firms have been on a roster of companies listed as a threat by the Federal Communications Commission (FCC), and the new rules bar future authorizations of their equipment.

The move is the latest in a series of actions to limit the access of Chinese telecoms firms in United States networks, and comes amid a long-running standoff between the world’s two biggest economies.

US officials have shown growing wariness in recent years of Chinese telecommunications companies and technology.

{ Related: Many Potential Backdoors Found in Huawei Equipment: Study }

“The FCC is committed to protecting our national security by ensuring that untrustworthy communications equipment is not authorized for use within our borders,” said the commission’s chairwoman Jessica Rosenworcel in a statement.

She added that the new rules are a part of ongoing work to guard against security threats.

The order also affects companies including video surveillance equipment firms Hangzhou Hikvision and Dahua Technology.

Advertisement. Scroll to continue reading.

The FCC said Friday that it was also seeking comment on future action relating to existing authorizations.

Previously, Washington had banned Huawei from supplying US government systems and strongly discouraged the use of its equipment in the private sector, with fears that Huawei equipment could be compromised by Chinese intelligence.

In 2019, it put Huawei on a trade blacklist that barred US suppliers from doing business with it, cutting the Chinese firm — also a top smartphone brand — off from Google’s Android mobile operating system.

The US has cited national security fears as well to restrict the operations of China’s big three state-owned mobile carriers.

RelatedHuawei and Supply Chain Security – The Great Geopolitical Debate

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...