Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

White House Claims Huawei Equipment Has Backdoor for Spying

Huawei accused of having backdoor capabilities

Huawei accused of having backdoor capabilities

The Chinese company Huawei can secretly tap into communications through the networking equipment it sells globally, a U.S. official charged as the White House stepped up efforts to persuade allies to ban the gear from next-generation cellular networks.

The U.S. national security adviser, Robert O’Brien, made the statement at an Atlantic Council forum on Tuesday evening after The Wall Street Journal quoted him as saying Huawei can “access sensitive and personal information” in systems it sells and maintains globally. O’Brien did not provide any evidence to support the claim.

U.S. officials have long argued that Huawei is duty-bound by Chinese law to spy on behalf of the country’s ruling Communist Party. Huawei denies that claim and issued a statement Wednesday saying the company “has never and will never covertly access telecom networks, nor do we have the capability to do so.”

Related: Huawei and Supply Chain Security – The Great Geopolitical Debate

The Trump administration has been lobbying for more than a year to persuade allies to exclude Huawei equipment from their next-generation cellular networks, known as 5G.

Britain and the European Union have declined to impose an outright ban, however. London has prohibited Huawei from supplying equipment used in the core of its 5G network but not the periphery. The EU last month unveiled security guidelines that, similar to measures already in place in Britain, are aimed at reducing cybersecurity risks.

Independent cybersecurity experts say the intelligence services of global powers including the United States routinely exploit vulnerabilities in networking equipment — regardless of the manufacturer — for espionage purposes.

The United States and other countries require that so-called “lawful intercept” capabilities be built into networks, though the equipment manufacturers are not supposed to have secret access to them.

Many analysts consider Washington’s intense anti-Huawei lobbying efforts as much about seeking global technological dominance as deterring Chinese cyber-espionage, which is already rampant and equipment agnostic.

They also note that the NSA has previously infiltrated Huawei equipment — as well as network devices of other manufacturers — as detailed in documents disclosed in 2013 by former NSA contractor Edward Snowden.

RelatedMany Potential Backdoors Found in Huawei Equipment

Related: Huawei and Supply Chain Security – The Great Geopolitical Debate

Written By

Click to comment

Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.

Network Security

Cisco patched a high-severity SQL injection vulnerability in Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition (CM SME).

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Vulnerabilities identified in TP-Link and NetComm router models could be exploited to achieve remote code execution (RCE).