Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

ZTE Corp and Huawei to Answer Questions on Capitol Hill

Congress is interested in speaking to China’s top telecommunications firms as part of an ongoing investigation in to their organizational structures, history, and potential ties to China’s PLA.

Congress is interested in speaking to China’s top telecommunications firms as part of an ongoing investigation in to their organizational structures, history, and potential ties to China’s PLA.

The House of Representatives Permanent Select Committee on Intelligence has asked both ZTE Corp and Huawei to testify at a hearing next week. One of the items discussed with be the companies’ relationships with China’s government, including the PLA. While ZTE has issued a statement to the fact that it “intends to participate in the upcoming congressional hearing.”

China, ZTE, HuaweiIn letters to the two firms, obtained by Reuters and dated June 12, the House panel asked them to provide details on their relationship with Chinese authorities, as well as the Communist Party and ministries of defense and state security. The letters explained that such explanations were related to the panel’s investigation into “the threat posed to our critical infrastructure and counter-intelligence posture by companies with potential ties to the Chinese government.”

ZTE Corp is clear on their participation, but the company that has the most people panicked on Capitol Hill, Huawei, is coy on the topic of the hearings and investigations. However, that doesn’t mean that Huawei is a stranger to D.C. According to the Washington Post, Huawei has quadrupled their spending on lobbyists, to the tune of nearly $820,000 in the first half of 2012.

The boost in spending, the company said, is one of the ways they plan to counter the fear that they are working for the PLA, a claim they deny. Answering questions on the boost in lobbyist expenses, the company told the Post that they were seeking to “clarify the facts about the company and undo misperceptions, and we’ve resourced ourselves accordingly…”

Moreover, in terms of the investigation, “…we’ve been engaged in an open and cooperative dialogue and exchange of information for almost nine months, and look forward to further cooperating with the committee,” the company said.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.