U.S. Prism Project exposure: Huawei ZTE said the incident sensitive inconvenience more talk

Source: Internet
Author: User
Keywords Huawei ZTE the PRISM the U.S. Prism project
Tags agency communications communications network communications networks data information
Absrtact: Because of the Prism project's exposure, the United States has become more and more embarrassed about national information security issues. Previous US accusations and investigations into China's telecoms equipment maker Huawei and ZTE's threats to U.S. national security have thief. US government long

The US has become embarrassed by the revelation of the PRISM project on national information security issues. The US's accusations and investigations into China's telecoms equipment maker Huawei and ZTE's threats to U.S. national security have also turned out to be "thief" in a flash.

US government invades China network for long time

In early June, according to the "Prism", US intelligence department staff Snowden, the U.S. National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) through a code-named "Prism" (PRISM) of the Internet Information Screening Project direct contact with the nine major internet companies, the user data to detect suspicious behavior.

On June 12, Snowden again that the U.S. government has been engaged in cyber attacks against Chinese individuals and institutions over the years, while the US National Security Agency has more than 61,000 cyber attacks worldwide.

Snowden has released evidence that the U.S. government has invaded the mainland and Hong Kong's network for at least four years, and that U.S. government hackers have targeted hundreds of attacks, including schools. Hackers usually invade huge routers, then invade thousands of computers without one by one intrusions into individual computers.

Some analysts believe that the United States has been accused of cyber-attacks on China and other countries, but now because of the exposure of the project is embarrassing, it is difficult to "confidently" pressure others as before.

In recent years, the United States has repeatedly challenged Chinese companies operating in the US on the basis of "security issues". In 2012, October 8, local time in the United States, because of suspected Chinese communications equipment manufacturers left a back door, after a 11-month survey of ZTE and Huawei's two companies, the House Intelligence Committee reported that the US telecom operators should not co-operate with China's Huawei and ZTE's two companies, because the latter " May pose a threat to U.S. national security ".

The incident was seen as a source of concern in the United States over possible espionage and cyber attacks from China.

Mr Obama's signing of an IT spending bill has also shown a strong bias on the issue. The 240-page bill stipulates that "federal agencies such as the Ministry of Justice, the Ministry of Commerce, the Federal Bureau of Investigation and Aeronautics and Space Administration are required to obtain formal approval from the Federal Bureau of Investigation before procuring information technology products manufactured, processed or assembled by companies in China that operate or subsidize them." In addition, the risk assessment prior to the procurement of Chinese-made products must also take full account of one or more entity companies led or subsidized by the Chinese government to produce, manufacture or assemble.

Trapped in the "thief" dilemma

Snowden's explosive material hit the United States a loud slap, Beijing University of Posts and telecommunications Professor Zengjianqiu told the Securities Daily Reporter that the previous U.S. charges against Huawei and ZTE look more like thief.

According to the exposure of a U.S. National Security Agency PPT (top secret level), including Google, Microsoft, Apple, Facebook and other U.S. 9 Internet service providers and the U.S. National Security Agency (NSA) there is a data partnership. The NSA obtains user data from the nine giants and then data mining.

Rising security expert Tangwei told reporters, from the current information, the United States Government is through the agreement with some enterprises, through these enterprises to invade backbone networks and large servers. The invasion of China's network does not rule out the possibility of its communications network equipment leaving a backdoor.

The so-called back door, similar to computer software, as long as the equipment connected to the network, including computers, servers, routers and other network operating equipment, if left behind the door, there will be a risk. Through the back door, relevant agencies or individuals can easily access the information in the network equipment, and sent to the background.

Fang, a network security expert and academician of the Chinese Academy of Engineering, said last year that the US was actually pushing people to leave the door behind.

Huawei ZTE says "Prism" sensitive

Huawei and ZTE have been insisting that they comply with U.S. laws and regulations and promise not to leave the backdoor.

A report released in April 2013 by the U.S. Government Accountability Office showed that from January 2010 to October 2012 They did not find any attacks on U.S. national security through a communications network.

The first part of the survey was to examine the risks of the "supply chain" of the ICT industry, which was mandated by the Energy and Commerce Council of the House of Representatives in October 2011.

The Federal Communications Commission and the United States Department of Homeland Security have their own reporting mechanisms aimed at overseeing the operators of private communications networks, such as At&t and Verizon in the United States, which need to actively declare the situation, if there are network outages or cyber attacks, The U.S. federal government can get the first word.

The U.S. Government Accountability Office report shows that there have been 35,000 network outages in the United States since October 2011, but none has been linked to cyber attacks. The report also shows that communications networks may provide individuals, businesses or governments with an attacking medium, but these networks themselves are the least likely targets of cyber attacks.

The report directly contradicted the previous position of U.S. lawmakers.

As for the "Prism" project exposure, Huawei and ZTE both said the incident is sensitive and inconvenient to express their views. Analysts point out that for the two companies that have been frustrated but have not given up on the US market, it is also wise to remain silent and do business properly.




Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.