Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

Congressional Panel Concludes China Telecom Giants 'Cannot Be Trusted'

October 8, 2012

A congressional investigation has concluded that Chinese telecom giants Huawei and ZTE pose a security threat to the United States and should be barred from US contracts and acquisitions.

The panel launched its probe over concerns that China could use the fast-growing firms for economic or military espionage, or cyber attacks.

"Based on available classified and unclassified information, Huawei and ZTE cannot be trusted to be free of foreign state influence and thus pose a security threat to the United States and to our systems," the draft document said.

Both Huawei and ZTE have denied any ties with the Chinese government. Top executives of the firms appeared at a hearing held by the panel last month, stressing that they were focused on business, not politics.

Huawei reiterated that position in response to queries.

"The integrity and independence of Huawei's organization and business practices are trusted and respected across almost 150 markets," Huawei vice president William Plummer said in an emailed statement.

"Purporting that Huawei is somehow uniquely vulnerable to cyber mischief ignores technical and commercial realities, recklessly threatens American jobs and innovation, does nothing to protect national security, and should be exposed as dangerous political distractions."

ZTE did not immediately respond to requests for comment.

The committee said both companies failed to provide adequate answers to lawmakers' questions about their relationship with the Chinese government.

"China has the means, opportunity and motive to use telecommunications companies for malicious purposes," said the report, due to be published today.

Based on its investigation, the panel said US authorities "must block acquisitions, takeovers or mergers involving Huawei and ZTE given the threat to US national security interests."

The panel said the US should even consider extending the authority of a super-secret panel that reviews foreign acquisitions to include purchasing agreements.

US government systems, particularly sensitive ones, should not include Huawei or ZTE equipment -- not even component parts -- nor should those of government contractors working on sensitive US programs, it said.

The report also said private US firms "are strongly encouraged to consider the long-term security risks associated with doing business with either ZTE or Huawei for equipment or services."

Because of the lack of clear information on how the companies operate, the committee report said they could be used for "malicious Chinese hardware or software implants" that could serve as "a potent espionage tool."

The committee said it received what appeared to be authentic internal Huawei documents showing the company provides "special network services to an entity the employee believes to be an elite cyber-warfare unit" in the Chinese military.

The 59-page draft report cited a host of other potential issues with the two firms, including unfair subsidies, allegations of bribery or corruption, dealings with Iran and ties with China's military and Communist Party.

In addition to the concerns cited by the lawmakers, the report said an unpublished, classified annex includes even more.

"That information cannot be shared publicly without risking US national security," it said.

House committee chairman Mike Rogers told the CBS program "60 Minutes" in a segment aired Sunday that he would urge American firms looking at doing business with Huawei to "find another vendor if you care about your intellectual property, if you care about your consumers' privacy, and you care about the national security of the United States of America."

The probe was called amid ongoing reviews around the world on whether the big firms are linked to the Chinese military or government.

(www.securityweek.com)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Are You Trusted, Regular or Risky? Airline Security Checkpoints Could be Based on a Risk Profile

    See More
  • Cyber Security Said to be a Challenge to U.S.-China Ties

    See More
  • Person holding cellphone

    Millions of Android, iPhone Users Could Be Sending Data to China

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing