Feeds

Chinese firm hits back at cyberspy claims

Huawei welcomes UK.gov backdoor probe

Beginner's guide to SSL certificates

The enemy is everywhere

Huawei's BT 21CN contract award in 2005 effectively shut down British rival Marconi. The multi-billion-pound deal was approved by then-Trade Secretary Patricia Hewitt, who is now a non-executive director of BT.

Huawei now competes globally against Silicon Valley-based Cisco and Juniper Networks on similar massive IP networking upgrades.

The firm also lists Orange, Vodafone, T-Mobile and O2's Spanish parent company Telefonica as major customers. Its main competitors in the mobile market are Alcatel-Lucent, Ericsson, Nokia-Siemens and Nortel.

The source added that BT had conducted an extensive and "industry leading" security investigation of the equipment, but said this had not satisfied intelligence officials.

Asked how the the security of its products compared to rivals, Huawei said: "Our customers, including top operators, audit Huawei in all aspects on an ongoing basis. We are confident about the safety of our equipment and the many long term partnerships formed with our customers is the best proof."

Dr Richard Clayton, a security researcher at the University of Cambridge, said that no programme of testing could guarantee security from a remote attack based on covert vulnerabilities. "It's no win for Huawei," he said. "Proving the absence of a backdoor is essentially impossible."

Asked if it would allow intelligence agencies to inspect its source code, the firm said: "Huawei is confident that its solutions meet the requirements of its customers and is open and willing to engage with relevant authorities to address their security concerns."

While industry and academic opinion suggests intelligence agencies' concerns over Huawei are moot, history shows they cannot be dismissed as paranoia. Foreign governments have been exposed as co-opting IT manufacturers to provide remote access to equipment before, although the culprits were not Chinese.

In the 1990s stories emerged that the US National Security Agency had for decades allegedly rigged the products of Swiss encryption firm Crypto AG. It was reportedly able to effortlessly decode secret diplomatic and military messages as a result. Similarly, the Israeli government - which probably has closer ties to its commercial technology sector than Beijing does - was accused in 2000 of spying via backdoors in wiretapping equipment supplied to US law enforcement by Comverse Infosys.

Both those firms have continued to thrive despite their alleged sidelines in espionage. For Huawei, the stain of an alleged association with the Chinese military is not likely to vanish. Yet with rapidly growing sales of more than $23bn last year, and increasing global market share, past experience suggests that perhaps it need not care.

For UK intelligence officials, meanwhile, the issue cannot be so easily dismissed. The equipment is already out there, relaying billions of our trivial and our important communications every day. If a backdoor is out there too, they are unlikely to discover it - until, perhaps, it's already too late. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.