WASHINGTON, March 7, 2020— “It always comes back to trust in the supplier themselves,” said Mike Murphy, chief technology officer of Nokia’s American corporate entity, and a witness at the Senate Commerce Committee’s Wednesday 5 hearing on “5G Supply Chain Security.”
Most of the hearing focused on allegations of security risks posed by Chinese telecommunications equipment giant Huawei.
James Lewis, senior vice president at the Center for Strategic and International Studies and another witness at the hearing, said: “If you don’t want any risk, don’t use Huawei. If you decide to use Huawei, you have to work hard to manage that risk.”
Sen. John Thune, R-N.D., unveiled legislation to “ensure the security of our communications infrastructure is a clear negotiating objective of U.S. trade policy.”
Senators revealed apparent feelings of deep concern regarding the threat posed by Huawei.
Sen. Dan Sullivan, R-Alaska, referencing how Huawei is currently suing Verizon over patent infringement in American courts for $1 billion, asked, “Could Verizon go to a Beijing court and file a patent infringement suit against Huawei?”
He asked the question with his mouth open and eyebrow cocked.
Earlier, a representative from Swedish telecom giant Ericsson appeared to crumple under Sen. Cory Gardner’s, R-Colo., questioning about whether Chinese source code is incorporated into Ericsson products.
Jason Boswell, Ericson’s head of network product solutions, provided a trailing response until Gardner interjected, “So the answer is yes?”
“I would have to follow up specifically about that,” Boswell stated.
The senators also questioned panelists about current efforts to combat Huawei influence, such as the recent “rip and replace” order issued by the Federal Communications Commission. The other mandates that American carriers using Universal Service Funds rip out Huawei devices in their network and replace them by the end of the 2020.
“The undertaking to replace existing equipment is unprecedented, historic, and never been done,” said witness Steven Berry, CEO of the Competitive Carriers Association. “These carriers are essentially attempting to rebuild an airplane in mid-flight.”
Report Urges States, Local Governments Follow Federal Rules on Prohibited Equipment Purchases
Only a handful of states have crafted their purchasing decisions after federal rules banning certain companies’ equipment.
WASHINGTON, November 14, 2022 – A think tank is recommending state and local governments align their rules on buying technology from companies with federal guidelines that prevent agencies from purchasing certain prohibited foreign technology, such as ones from Chinese companies.
The Center for Security and Emerging Technology at Georgetown University notified the Federal Communications Commission late last month of a report released that month regarding what it said was a concerning trend of state and local governments having outdated procurement policies that are seeing them purchase equipment banned for federal purchase.
“State and local policymakers should not be expected to independently analyze and address the threats posed by foreign technology, but it would behoove them to align their own procurement practices with the rules set by the federal government,” the report recommends.
The FCC has a list of companies, as required by the Secure and Trusted Communications Networks Act of 2019, that it updates on a rolling basis through commission votes that it says pose a national security threat to the country’s networks. It last updated the list in September, when it added Pacific Network Corp. and China Unicom Operations Ltd. to the growing list that already includes Huawei and ZTE.
Chinese companies and following Communist Party directions
U.S. officials and experts have warned that Chinese companies operating anywhere in the world must follow directions of the Chinese Communist Party, which they say could mean anything from surveillance to American data falling into the hands of that government.
The report notes at least six state governments had their networks breached by a state-sponsored Chinese hacking group between May 2021 and February 2022.
The only states that have enacted local regulations aligned with federal provisions are Florida, Georgia, Louisiana, Texas, and Vermont, the report said. Provisions in Georgia and Texas prohibit private companies from entering into agreements with the covered companies. Vermont, Texas and Florida provisions block state entities from purchasing equipment from countries like China, Russia, Iran, North Korea, Cuba, Venezuela and Syria. Louisiana and Georgia provisions ban public-funded schools from buying prohibited technology.
The remaining 45 states do not explicitly target the equipment and services they produce, nor are they directly responsible for following federal provisions, the report said, leaving state entities vulnerable in obtaining equipment from third party contractors that could pose a security risk.
“Many government entities also lack the in-house technical expertise and procedures to understand and address such threats in the first place, and those that do may prioritize addressing immediate threats like ransomware over the more abstract risks posed by foreign ICTS,” the report said.
Section 889 of the 2019 National Defense Authorization Act is one out of four federal provisions addressing the issue, prohibiting federal agencies from using equipment and services from Huawei, ZTE, Hikvision, Dahua and Hytera as well as working with contractors that use the equipment.
Prohibited products finding their way in
In some cases, the report said, the listed companies will sell their products to third party contractors that are not listed on Section 889 to bypass regulations, according to the report. Due to the low cost of Chinese equipment, public schools and local governments will purchase from the third-party entities that are unknowingly selling prohibited equipment, it added.
“These ‘middle-man’ vendors can mask the origin of their products, which creates major challenges for organizations aiming to keep certain equipment and services off their networks”, the report reads.
“Currently, contractors are responsible for self-certifying that their products and internal networks do not contain covered [products]” and “… inspecting the IT infrastructure—equipment, services, and components – of every contractor that does business with the federal government would require a staggering level of resources, making it difficult for agencies to conduct effective oversight.”
FCC Orders China Telecom to Stop Providing Services in the U.S. Over National Security Concerns
The move is in line with FCC’s tough posture on national security risks emanating from China.
WASHINGTON, October 27, 2021 – The Federal Communications Commission voted Tuesday to revoke the operating authorizations of China Telecom’s U.S. subsidiary, effectively ending its ability to provide services in the country.
The company had initially challenged the process of revoking its authorizations that started last year under the Donald Trump presidency, but lost in court.
The FCC found that China Telecom Americas’ ties to the Chinese government raises “significant national security and law enforcement risks” to U.S. communications. The telecom must discontinue any services within sixty days after the order is released.
The FCC’s analysis concludes that “the present and future public interest, convenience, and necessity” is no longer served by allowing the company’s operations in the U.S. The commission found that China Telecom Americas is “subject to exploitation, influence, and control by the Chinese government and is highly likely to be forced to comply with Chinese government request without sufficient legal procedures subject to independent judicial oversight.”
The order also found that the company’s conduct toward the commission demonstrates “a lack of candor, trustworthiness, and reliability that erodes the baseline level of trust that the Commission and other U.S. government agencies require of telecommunications carriers.”
FCC Chairwoman Jessica Rosenworcel praised the vote, calling the decision to stop China Telecom “ an important and necessary step” to protecting U.S. communications infrastructure.
“This is not a decision we make lightly. It has support from each of my colleagues. It has support across the federal government,” she said. Continuing to allow China Telecom Americas to operate in the U.S. “could lead to real problems with our telecommunications networks through surveilling information, misrouting traffic, or disrupting service,” she added.
Revocation in-line with FCC focus on weeding out threats
The vote to block China Telecom’s services also comes as the FCC fields comments about its proposal to blacklist products and services that pose national security threats.
The U.S. government is also responding to China’s influence over digital services. In July, the Biden administration formally accused the Chinese government of hacking Microsoft’s email system. Digital policy experts have raised concern about how China’s use of digital tools threatens human rights agendas and democracy around the world.
Last June, the permanent subcommittee on investigations released a report finding the Chinese government engages in cyber efforts against the U.S. and may use telecommunications carriers to interfere with U.S. network systems.
The ban on China Telecom follows a Canadian order to ban another company — China Mobile — from operating in the country, citing similar national security concerns. The company, which had an agreement to resell services of telco giant Telus, was told in August that it couldn’t continue operations. The company has since filed an appeal in the federal court.
Hytera and Huawei Respond to FCC Blocking Chinese Equipment as U.S. Players React
Companies, industries, and associations chime in on FCC equipment blacklist proposal.
WASHINGTON, September 21, 2021 – Hytera, a company with ties to China that has been the subject of a national security blacklist proposal and whose partners have vouched for its innocence, said Monday that its United States radio equipment is being unfairly maligned.
Meanwhile, several key industry trade groups – including the leading wireless industry and consumer technology associations – urged a lighter-touch approach to “compliance challenges” involving Chinese companies, saying that under hardline Federal Communications Commission rules, burdens “may be passed on to consumers.”
But other U.S. advocates aren’t satisfied and want even stricter rules by the FCC to weed out alleged threats in America’s networks.
Hytera says that is has been unfairly targeted by the FCC
Hytera US, a supplier of radio equipment to emergency first responders, said in a submission to the FCC on Monday that it has been unfairly targeted because of confusion over the FCC’s authority in its blacklist, which is a product of Congress’ Secure Networks Act of 2019.
The FCC in March proposed a list of equipment and services from certain vendors from which to revoke or to deny future equipment approvals due to the “unacceptable risk” to the country’s national security. Included in the list is video surveillance and telecommunications equipment from Hytera, as well as equipment and services from Huawei, ZTE, Hangzhou Hikvision, and Dahua. Part of its process is to ask the industry for comments on its proposal.
Hytera said in its submission Monday that its radio equipment does not connect to the internet or otherwise can’t be compromised by a foreign government. And it argued Monday that the FCC only has authority to blacklist certain equipment, not paint whole entities as threats.
Hytera has said that its competitors in the radio equipment space have allegedly been using this narrative to paint it as a risky company to deal with, which has resulted in Hytera dealers suffering “greatly, losing deals, being barred from bidding for projects, being maligned.”
Hytera asks for clear distinction between radio equipment and broadband
Hytera is recommending the FCC make the distinction clear to the public and to specifically clarify that the blacklist “only includes equipment and services providing broadband service having a connection speed of at least 200 [kilobits per second] in either direction.”
Diversified and Alpha Prime have argued that Hytera radio equipment does not transmit data over the internet and so cannot be a threat under the FCC’s rules.
In a letter accompanying its submission, Hytera US vice president of sales Thomas Wineland said the FCC’s list has “destroyed our dealers’ ability to sell Hytera. Even if they can convince their customers that the two-way radios they plan to buy are not on the Covered List, the customers, in turn, answer to their bosses.
“They tell the dealer they ‘just can’t take the risk’ that the FCC will demand that Hytera equipment be removed and replaced,” he said. “They see Hytera’s name on the Covered List and choose a different manufacturer.
“Certainly this anti-competitive impact in the two-way radio marketplace was not what was contemplated in creating the Covered List,” Wineland continued. “Hytera US is a good citizen in each of its communities. It does not market broadband equipment in the US. A clarification that the Covered List reaches only broadband equipment would give Hytera the ability to neutralize the Covered List’s anti-competitive impact and allow the free market to operate.”
Huawei says FCC hasn’t shown proof its equipment is a threat
In its own submission on Monday, Huawei said the FCC has allegedly shown no evidence of a threat from its equipment, and its decision makes little sense on a cost-benefit analysis.
“The Commission has no evidence that Huawei has violated any of these rules,” the submission said. “Huawei’s equipment has been recognized by independent third parties, world leading carriers, major enterprise and industry customers as being of the highest technical quality. The identity of a manufacturer, by itself, cannot rationally be connected to any of the purposes of the equipment authorization rules.”
Huawei is one of the world’s largest telecommunications equipment manufacturers. It supplies equipment all over the world, with part of its allure being its relatively low cost.
“The rules would impose substantial costs on carriers, end-users, distributors, suppliers, and resellers of Huawei equipment,” the company said. “Revoking existing equipment authorizations and prohibiting new ones would require these United States entities to divert limited resources, threaten service quality, and increase the cost of service, without equivalent benefits.”
The company also argued that the FCC is exceeding its authority by proposing to prohibit the “importation, marketing, or sale of a company’s products based on the identity of the manufacturer without regard to the technical characteristics of a particular product.”
On the proposal, FCC Commissioner Brendan Carr said the commission, “through its current equipment authorization process, continues to approve for use in the U.S. thousands of applications from Huawei and other entities deemed national security threats.
“The FCC has approved more than 3,000 applications from Huawei alone since 2018…We are launching this proceeding with a simple and important goal in mind—to protect America’s communications networks and, in turn, our national security. The rules we propose are simple: equipment from entities that pose a national security risk will no longer be eligible for FCC approval.”
Industry associations say list could have ‘unintended consequences’
A number of associations that represent the broadband and wireless industries said in a combined submission on Monday that there could be “unintended consequences” with the proposal, including difficulty in implementation, harm to American consumers, and weaker supply chains.
Those groups include the ACT – The App Association, Consumer Technology Association, the Council to Secure the Digital Economy, the USTelecom broadband association, the Internet Association, the Information Technology Industry Council, the Telecommunications Industry Association, and the CTIA.
The CTIA said the FCC should consider more tailored approaches, including addressing “compliance challenges” and observe the costs and benefits of the proposed changes, including “burdens that may be passed on to consumers.”
The proposal “extends far beyond national security concerns, contemplating sweeping regulatory oversight of the cybersecurity features of the connected devices and systems that will drive the 5G future and beyond,” the submission added.
“Cybersecurity is best addressed through public-private partnerships and flexible, risk-based solutions, not prescriptive mandates,” it said. “Rather than duplicating the ongoing work of its federal partners, the Commission should support industry-led efforts, promote the National Institute of Standards and Technology’s leadership on voluntary and flexible guidance for [internet of things] security, and look to the Communications Security, Reliability and Interoperability Council for input.”
China Tech Threat, Blue Path Labs press FCC for more
China Tech Threat, a research institution that focuses on threats from China, and Blue Path Labs, an organization that studies China and that has clients in the federal government, filed a joint submission Monday recommending the commission broaden the list and said all information technology emanating from China is “vulnerable to that government’s intrusion.”
The submission recommends adding to the list laptop manufacturer Lenovo and memory chip maker Yangtze Memory Technologies.
“The FCC has made a good start to propose prohibiting equipment authorizations from 5 Chinese military aligned companies, but there are many more entities operating in the US which pose an unacceptable national security risk,” the submission said.
“The FCC needs to apply these restrictions to all the equipment from vulnerable Chinese government owned and military aligned entities which operate in the U.S. today, as described by the US- China Economic and Security Review Commission, the Department of Commerce Bureau of Industry and Security (BIS) Entity List, and the Department of Defense list of Communist Chinese Military Companies (CCMC).”
Co-founder of China Tech Threat, Roslyn Layton, told Broadband Breakfast following Diversified Communications plea that the ban list isn’t about Hytera per se, but what the Communist party in China requires of its companies.
Signup for Broadband Breakfast
Broadband Breakfast Research Partner
House Bill to Make Broadband Grants Non-Taxable Introduced
NTIA Launching $1.5B Innovation Fund to Explore Alternative Wireless Equipment
Maryland Bans TikTok on State Network, New Head of Open Technology Institute, UScellular Expands 5G
Pierre Trudeau: Life in the Trenches, or Lessons Learned Deploying Broadband in MDUs
Cable Providers Back Hybrid Fiber-Coax Networks in Face of Pure Fiber
Sen. John Thune Launches Broadband Oversight Effort
Experts Discuss Enforcement Against Imposter Fraud, Other Consumer Protection Issues
Talent for Growth Taskforce, ‘Grave Mistakes’ in FCC Maps, Lumen Expanding Fiber
E-Rate Bidding Portal Dilemma, Sustainable Funding for Indigenous Broadband, NYC Kills Internet Plan
Garland McCoy: Some State Attorneys General Are Preparing to Take the FCC to Court
Keynote Address and Q&A at Digital Infrastructure Investment
BAI Buys 1,100 Fiber Miles of Network, Workforce Training Partnership, New Executive at US Cellular
FCC Releases National Broadband Map Amid Controversy
Federal Communications Commission Mandates Broadband ‘Nutrition’ Labels
‘It Is a Concern’: FCC Contractor Responds to Commercial Conflict Concerns Over Map Challenge Process
FCC Told No to C-Band Changes, New Tribal Entity Grants, Surfshark Report on Internet Value
Twitter Takeover by Elon Musk Forces Conflict Over Free Speech on Social Networks
Local Leadership and Coordination Key to Proper Federal Fund Allocation, Conference Hears
Amazon Asks FCC to Allow Drones in 60-64 GHz Band in Preparation For New Delivery Service
Trump’s Twitter Account Reinstated as Truth Social Gets Merger Extension
Broadband Breakfast on November 30, 2022 – The 12 Days of Broadband
Small ISPs Face Economic, Incumbent Bundling Headwinds: CoBank Economist
Venture Capital, Private Equity and Institutional Investors on Digital Infrastructure Investment
Financing Mechanisms for Community Broadband, Panel 3 at Digital Infrastructure Investment
Right Track or Wrong Track on Mapping? Panel 2 at Digital Infrastructure Investment
What’s the State of the IIJA? Panel 1 at Digital Infrastructure Investment
Broadband Breakfast on December 28, 2022 – New Year Recap: Biggest Stories in Broadband
Broadband Breakfast on December 21, 2022, – Robotics, Telehealth and Future Health
Broadband Breakfast on December 14, 2022 – In the Trenches: Better Broadband for Multi-Dwelling Units
Keynote Address and Q&A at Digital Infrastructure Investment
Cybersecurity4 weeks ago
Internet of Things Devices May Provide a Weak Point for Cybersecurity, Says CableLabs
Infrastructure1 week ago
Keynote Address and Q&A at Digital Infrastructure Investment
Broadband Roundup3 weeks ago
BAI Buys 1,100 Fiber Miles of Network, Workforce Training Partnership, New Executive at US Cellular
Fiber4 weeks ago
Fiber Providers Need to Go Beyond Speed for Differentiation, Consultant Says
Funding4 weeks ago
After FCC Map Release Date, NTIA Says Infrastructure Money to Be Allocated by June 2023
Broadband Mapping & Data4 weeks ago
Draft National Broadband Map To Be Released November 18, FCC Says
Infrastructure4 weeks ago
Perfect Timing to Attend Digital Infrastructure Investment in Washington on Nov. 17
Spectrum3 weeks ago
Carr Advocates Release of More Spectrum as Deadline to Extend FCC Auction Authority Looms