- Registration time
- Last login
- Online time
- 1443 Hour
- Reading permission
Here is why US has been desperately trying to pin down Huawei. It is also why Australia and New Zealand (link with US regarding National Security) has banned Huawei without a good reason but based on false allegations.|
The NSA's global spy operation may seem unstoppable, but there's at least one target that has proven to be a formidable obstacle: the Chinese communications technology firm Huawei, whose growth could threaten the agency's much-publicized digital spying powers.
An unfamiliar name to American consumers, Huawei produces products that are swiftly being installed in the internet backbone in many regions of the world, displacing some of the western-built equipment that the NSA knows – and presumably knows how to exploit – so well.
That obstacle is growing bigger each year as routers and other networking equipment made by Huawei Technologies and its offshoot, Huawei Marine Networks, become more ubiquitous. The NSA and other U.S. agencies have long been concerned that the Chinese government or military – Huawei's founder is a former officer in the People's Liberation Army – may have installed backdoors in Huawei equipment, enabling it for surveillance. But an even bigger concern is that with the growing ubiquity of Huawei products, the NSA's own surveillance network could grow dark in areas where the equipment is used.
For that reason, as the latest Snowden revelations showed last week, the spy agency reportedly hacked Huawei as part of an operation launched in 2007. The plan involved stealing source code for some of Huawei's products in the hope of finding vulnerabilities. Such security holes could allow the NSA to exploit the products and spy on traffic in countries where Huawei equipment is used – such as Iran, Afghanistan, Pakistan, Kenya, and Cuba.
“Many of our targets communicate over Huawei-produced products,” an internal NSA document obtained by Snowden noted in 2010, according to the New York Times. “We want to make sure that we know how to exploit these products ... to gain access to networks of interest” around the world.