Today, Germany's Der Spiegel reported on the latest wave of NSA Revelations (the provenance of which are unclear, but presumably they are Snowden-sourced).
According to the Der Spiegel article (link to GigaOm coverage in English), the most recently unveiled information indicates that the U.S. National Security Agency (NSA) was not only successful at compromising sometimes-witting-but-almost-certainly-unwilling American telecom and Internet service providers, but also at compromising American and non-American telecom and Internet infrastructure hardware and solution providers, without their knowledge.
Through what appears a combination of software hacking and cracking (and, possibly - from my personal perspective - infiltration and tampering with American components, chip-sets, etc. that feed into multinational company supply chains), the NSA has seemingly extended its global surveillance and information dragnet well beyond what had been previously reported, or even imagined.
One of the companies whose gear was reportedly compromised is my employer Huawei. The irony of this situation could not be richer (Reminder: this is a personal blog reflecting my personal thoughts).
For the last few years, China-headquartered Huawei has been the victim of a U.S. Government-wide (and beyond) conspiratorial witch-hunt. Vicious and baseless allegations have been made without end, with Huawei accused of being somehow financed, directed, controlled or otherwise uniquely vulnerable to Chinese Government cyber penetration and manipulation. Wilder and weirder myth and misinformation has been spread, slandering the company and its employees in many and nasty ways.
Never, not once - not once - has there been a shred of substantive evidence presented to support any such allegations.
Now, while to the best of my knowledge Huawei has yet to validate or invalidate the vague suggestions made by Der Spiegel, let's for the moment imagine there is some truth to what's been unveiled.
In that context, let's consider last year's U.S. House of Representatives Permanent Select Committee on Intelligence (HPSCI) "investigation" of Huawei which concluded with the company branded - with zero substantive reason - as some sort of threat to U.S. national security due to being somehow uniquely vulnerable to potential compromise by the Chinese Government.
As much of a circus-like sham as the whole exercise was, it is all the more shameful in light of today's revelations.
Indeed, HPSCI Chairman Rogers - the man charged with overseeing U.S. intelligence activities to prevent abuse, who has instead spent the last six months trying to sugar-coat such abuse - has forever redefined the height of hypocrisy by accusing Huawei of being uniquely vulnerable to compromise by one Government when, as the Chairman of HPSCI, he was almost certainly aware, the U.S. Government had already achieved this feat (at least per Der Spiegel).
You know, in the immediate wake of the initial Snowden Revelations, some joked that the reason the U.S. Government was so hell-bent on keeping Huawei out of the market was because they were uncertain they could penetrate and compromise our solutions as easily as they might the gear of our American or other Western peers.
If Der Spiegel has it right, such lighthearted wit was dead wrong.
Indeed, if Der Spiegel has it right, the whole Huawei embargo and witch-hunt was nothing more than good-old-fashioned protectionism and China-baiting - the NSA has proven that it doesn't matter where a company is headquartered in terms of it's vulnerability to potential malicious penetration and compromise.
These most recent NSA revelations expose past U.S. Government representations about Huawei (and similar opinions from sycophants like my favorite CSIS cyber-gasbag, as well as military-industrial-complex fan-boy groups like the U.S.-China Economic and Security Review Commission) as utterly baseless and equally and maliciously and knowingly duplicitous
Moreover, if Der Spiegel has it right, they have confirmed rather solidly that cyber vulnerabilities are universal, agnostic to geographies, location of headquarters, flags or borders, and demanding of universal industry-wide solutions to address such challenges.
Huawei-related fuming aside, back home, it's time for some serious accountability...
From the Administration. From the Congress.
U.S. intelligence agencies are now recognized - unequivocally - as the most advanced persistent threat to the integrity of global networks and data.
American standing on the world stage is lessened.
Our ability to project the values we have nourished and cherished for two-plus centuries is diminished.
We are increasingly distrusted abroad. Such distrust extends to our businesses, and will quite likely yet further adversely impact our economy.
Where will the buck stop?
December 29, 2013
December 18, 2013
Enough already with the vacuous HPSCI report on Huawei
Just over a year ago, in October 2012, the U.S.House of Representatives Permanent Select Committee on Intelligence (HPSCI) issued an empty, vacant, slanderous report suggesting that $35 billion dollar multinational Huawei Technologies somehow presents a threat to U.S. national security.
The report - the result of a bad-faith 11-month "investigation" by the Committee - is laughable in terms of its utter lack of substance, and generally dismissed as garbage, and not just by people who actually understand the information and communications technology industry, but within the Beltway as well.
But the damned thing keeps getting referenced in media reports as if it had merit. Check out the embedded 10 minute video which exposes the Committee's willful misrepresentations, point by point, and further details the costs of their tomfoolery.
December 06, 2013
Shame on you Associated Press, and you too Rep. Wolf
Just shy of 30 years ago, while a student at Georgetown, a
roommate of mine had a professor who's kid played in a local recreational soccer
league. His team was in need of coaches.
My friend and I, having both played soccer in high school, volunteered. Good fun.
About a decade later, in the mid-90’s, when I was a
mid-level Foreign Service Officer at the State Department in Washington, I
re-encountered the professor, who was consulting in State’s Strategy and
Planning Office.
Fast forward to 2010, when I was surprised to learn, after
joining Huawei, that the professor – still at Georgetown – was a member of
Huawei’s newly-minted International Advisory Committee, comprised of
illustrious business, academic and other counselors.
It is, indeed, a very small world.
Today, the Associated Press, in seeming-cahoots with Virginia
Congressman Frank Wolf, did a hatchet job on Professor Moran.
In September of this year, after Congressman Wolf (R-VA) “discovered” that the professor was
serving simultaneously on both Huawei’s International Advisory Committee and
the U.S. Government National Intelligence Council (a group of private sector analysts
and policy experts who advise the Office of the Director of National
Intelligence on various matters, including foreign investment in the United
States), he put pressure on the Director of National Intelligence and the professor was seemingly compelled to resign.
“Discovered?” Hardly a feat, given that both advisory positions
were prominently listed on the professor’s publicaly-available CV, and referenced
in his various publications.
Nevertheless, Wolf is one known to give an Administration
headaches, so the Administration, fully aware of the professor’s historical situation, bent over and forced the resignation.
Now, Wolf himself has some justified concerns with China,
but he also has an unfortunate and slightly-mad penchant for using Huawei, an
independent $35 billion globally-trusted and proven China-headquartered multinational,
as his proxy for China-bashing. (Indeed,
I would encourage you to pause in your reading this post and peruse my
April 2012 post featuring one of Rep Wolf’s more lunatic tilts at the Huawei
windmill before continuing).
Which brings us back to today’s Associated Press piece titled
Chinese
Firm Paid US Gov't Intelligence Adviser – a lurid and
grossly-misleading headline.
Go on. Read it. You’ll see.
Headline and remarkably-intentional journalistic bias aside, the story
is not news. Huawei, like many companies, particularly
multinational companies, has an international advisory committee. And advisors are compensated. Whoopee.
Go figure.
But, uh oh, shudder, the professor also serves on a U.S. Government
advisory committee. So, shamelessly
carrying Wolf’s dirty water, the AP blithely weaves conspiracy from
whole cloth, intentionally misleading readers.
Perhaps the most obvious example of shameless reporting: “In a policy paper distributed by Huawei,
Moran wrote in May that, ‘targeting one or two companies on the basis of their
national origins does nothing for U.S. security in a world of global supply
chains.’ Moran criticized what he described as ‘a policy of discrimination and
distortion that discourages valuable inward investment from overseas, while
providing a precedent for highly damaging copycat practices in other countries.’”
Let’s parse this out.
First off, the policy paper being referenced by the AP
is intentionally misrepresented by
the AP as somehow being a Huawei or Huawei-commissioned product. It is not. In fact, it is a paper published by the
Petersen Institute of International Economics, a world-respected economics and
trade think tank where Professor Moran serves as a Fellow.
Intentionally
misrepresented? Yes. When the AP was asked to appropriately
label the report, they declined, at the editorial level.
Now, let’s consider Professor Moran’s quotes from the policy
paper:
“Targeting one or two
companies on the basis of their national origins does nothing for U.S. security
in a world of global supply chains.”
Spot. On. See below.
“A policy of
discrimination and distortion that discourages valuable inward investment from
overseas, while providing a precedent for highly damaging copycat practices in
other countries.”
Yes. Exactly.
Why on earth would the AP suggest such statements
were somehow suspect? It boggles the
mind. All the more so in the wake of the
Snowden revelations that, by all indications, seem to be leading to a situation
in which U.S.-based companies will suffer similar discrimination in foreign
markets.
Shame on you AP for pandering to shallow, baseless,
discriminatory politicians and policy.
Shame on you Rep. Wolf for driving this bullshit. And shame on those in the U.S. Administration
that continue to demonize Huawei by virtue of its heritage in China.
Again (borrowing from my post two days ago):
The Information Communications Technology (ICT) industry is
transnational, essentially borderless. Whether you are Huawei, Cisco,
Alcatel-Lucent or Ericsson you are operating world-wide, equally vulnerable to
penetration or compromise, whether by the now-world-renowned experts at the
NSA, or whoever their counterparts may be in China, Russia or Israel. Knocking Huawei out of the market – any market
– does precisely squat to secure networks and data. And the U.S. Government knows all of this.
But (you might ask), hold on, wait a second, if the NSA
compromised U.S. companies, then certainly the Chinese Government can
compromise Huawei?
That analogy holds no water.
Let’s review:
The penetrations and compromises thus far unveiled by Edward
Snowden were primarily achieved by U.S. intelligence agencies either
compromising unwitting innocent companies or forcing unwilling (also innocent)
companies into unfortunate complicity.
In terms of the latter, from what we have learned to date,
the bulk of the data syphoned off by the NSA, et al was primarily extracted
from service operators or data managers under “legal” pretense. Knowledge of such witting but unwilling
compromise of these companies was almost certainly limited to a small few
within the companies, perhaps just C-level and legal.
Huawei is a different kind of company.
Think of the companies referenced above as water
companies.
Think of Huawei as a company that builds the pipes for the
plumbing systems used by the water companies.
The U.S. intelligence agencies went to the legal departments at the water companies and forced a spigot into their reservoirs, virtually draining them. Again, it is quite likely that very few people within the water companies were even aware of the quiet conspiracy.
Contrast that with a company like Huawei.
A quiet conspiratorial visit to the legal department or
C-level arm-twisting won't do the job.
In order to compromise Huawei’s gear, you would have to
infect each and every pipe (router, switch, etc.) which, given the volume of
product we produce and the thousands of researchers, coders and builders
involved – all around the world - would require an absurdly unbelievable and unsustainable
conspiracy of countless employees spanning far-flung countries where research, coding
and assembly take place.
But (you might ask), what about after-market “software
upgrades” or “patches” or some other digital or magical manipulation of the gear
after it’s been sold and deployed?
These are legitimate concerns.
But Huawei is not some *insert government name here*-directed
operation in some non-descript building in Shanghai or Silicon Valley. Huawei is a $35 billion company operating in
150 markets doing 70% of its business outside China, with state-of-the-art
Research and Development and software facilities scattered across the globe.
Huawei “software updates” don’t just get “pumped out”
willy-nilly. They are deployed in close
coordination with network operator customers and according to the security
procedures defined by those customers.
Moreover, within Huawei, every line of code – wherever
developed - is tracked and traced by “many eyes and many hands” (human and
virtual) which, again, would mean that for Huawei to wittingly “pump out” “back
doors” or “exploits” would again require a conspiracy of thousands of our
employees, not to mention the additional complicity of employees of our network
operator customers.
Absurd.
Could a rogue employee or group of employees plot
cyber-shenanigans within the company? Yes.
This could happen at any ICT company - we are all vulnerable. Yet, like any other world-leading ICT company
with a reputation and business to protect, Huawei has employed robust
disciplines to detect and quash such anomalies.
But a grand conspiracy?
Hogwash.
And the U.S. Government knows this. And so should Rep. Wolf.
And, as for the AP, we might grace them with not
having the experience or bandwidth to understand the issues, but they should certainly
have more journalistic integrity than to prostitute themselves to politicians…
December 04, 2013
Huawei, Korea, Pots and Kettles
Yesterday, the U.S. Administration and Senate leadership
tag-teamed a stab at undermining the legitimate commercial activities of a China-based multinational in South Korea in
order – seemingly (maybe?) – to give the Biden delegation visiting China some sort of additional
leverage in bilateral talks, perhaps related to the increasingly-contentious “Air Defense
Identification Zone” around the Diaoyu/Sanaku Islands.
That’s how I see it.
That, at least, would be a marginally rational explanation.
The purported explanation defies logic.
Yesterday, the Wall Street Journal and The Daily
Beast broke the story of a letter from the Chairs of the Senate Foreign
Relations and Select Intelligence Committees calling on the Secretaries of
State and Defense, as well as the Director of National Intelligence, to look
into “the potential threats and security
concerns” presented by Huawei’s involvement in a commercial wireless
network deal...in South Korea.
The Journal reported further that “the Obama administration is privately
raising concerns with officials in South Korea about their plans to let a
Chinese telecommunications giant develop the country's advanced wireless
network, expanding a quiet campaign to warn key allies against integrating the
Chinese technology into their systems.”
Okay. C'mon already. There should be zero possibility that anyone in the U.S. Government
is legitimately concerned about unique network security or data integrity
vulnerabilities associated with Huawei gear. The
facts are all too clear to the contrary. Consider:
The Information Communications Technology (ICT) industry is
transnational, essentially borderless. Whether you are Huawei, Cisco,
Alcatel-Lucent or Ericsson you are operating world-wide, equally vulnerable to
penetration or compromise, whether by the now-world-renowned experts at the
NSA, or whoever their counterparts may be in China, Russia or Israel. Knocking Huawei out of the market – any
market – does precisely squat to secure networks and data. And the U.S. Government knows all of this.
But (you might ask), hold on, wait a second, if the NSA compromised U.S. companies,
then certainly the Chinese Government can compromise Huawei?
That analogy holds no water. Let’s
review:
The penetrations and compromises thus far unveiled by Edward Snowden were primarily achieved by U.S. intelligence agencies either compromising
unwitting innocent companies or forcing unwilling (also innocent) companies
into unfortunate complicity.
In terms of
the latter, from what we have learned to date, the bulk of the data syphoned off by the NSA, et al was primarily extracted from service operators or data
managers under “legal”
pretense. Knowledge of such witting but
unwilling compromise of these companies was almost certainly limited to a small
few within the companies, perhaps just C-level and legal.
Huawei is a different kind of company.
Think of the companies referenced above as
water companies.
Think of Huawei as a company
that builds the pipes for the plumbing systems used by the water
companies.
The U.S. intelligence agencies went to the legal departments
at the water companies and forced a spigot into their reservoirs, virtually
draining them. Again, it is quite likely
that very few people within the water companies were even aware of the quiet
conspiracy.
Contrast that with a company like Huawei.
A quiet conspiratorial visit to the legal department or C-level arm-twisting won't do the job.
In order to compromise Huawei’s gear, you
would have to infect each and every pipe (router, switch, etc.) which, given
the volume of product we produce and the thousands of researchers, coders and
builders involved – all around the world - would require an absurdly unbelievable
and unsustainable conspiracy of countless employees spanning far-flung countries
where research, coding and assembly take place.
But (you might ask), what about after-market “software upgrades” or “patches”
or some other digital or magical manipulation of the gear after it’s been sold
and deployed?
These are legitimate concerns, though sadly, unfortunately, somewhat de-legitimized by the canned quotes from the Center for Strategic and
International Studies’ persistently-resident cyber-gasbag that were featured in the Daily Beast
article.
Per The Daily Beast, the aforementioned “expert” said
that “Huawei’s routers and switches may be clean at first. But the potential
for back doors, or exploits within the software and hardware of the equipment,
could be slipped into the gear through routine maintenance such as software
updates.” “They can pump out a software update and you have no idea what is in the
software.”
Such hyperbolic paranoia (or perhaps just utter ignorance of the business
realities in the ICT industry) borders on mind-numbing.
Huawei is not some <insert government name here>-directed
operation in some non-descript building in Shanghai or Silicon Valley. Huawei is a $35 billion company operating in
150 markets doing 70% of its business outside China, with state-of-the-art
R&D and software facilities scattered across the globe.
Huawei “software updates” don’t just get “pumped out”
willy-nilly.
They are deployed in close
coordination with network operator customers and according to the security
procedures defined by those customers.
Moreover, within Huawei, every line of code – wherever developed
- is tracked and traced by “many eyes and many hands” (human and virtual) which, again, would mean that for
Huawei to wittingly “pump out” “back doors” or “exploits” would again require a
conspiracy of thousands of our employees, not to mention the additional complicity
of employees of our network operator customers.
Absurd.
Could a rogue employee or group of employees plot
cyber-shenanigans within the company? Yes. This could happen at any ICT company - we are
all vulnerable. Yet, like any other world-leading ICT
company with a reputation and business to protect, Huawei has employed robust disciplines to detect and quash such anomalies.
But a grand conspiracy?
Hogwash.
And the U.S. Government knows this.
Which brings us back to the quest for a rational
explanation for the odd concert of Administration officials and Senate Chairs
attempting to interfere in the Korean commercial wireless marketplace. I posited one such explanation at the outset
of this post. A placeholder of sorts.
Far-fetched?
Maybe.
But one thing we do know, it has nothing to do with network security
or data integrity. Indeed, that fig leaf is growing frightfully thin...