Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Latest News
    • Mobile
    • Networking

    FCC Proposes Denying Federal Funds to Carriers That Use Chinese Gear

    Written by

    Wayne Rash
    Published March 28, 2018
    Share
    Facebook
    Twitter
    Linkedin

      The Chairman of the Federal Communications Commission has confirmed in a statement released on March 26 that the agency is moving forward with a plan to prevent carriers using equipment made in China from receiving funding from the Universal Service Fund. 

      The USF is a pool of about $8.5 Billion collected from communications users in the U.S. It’s used to help pay for communications services and infrastructure for poor, rural or otherwise disadvantaged communities. 

      Citing a set of security concerns including hidden back doors, Pai state that “Threats to national security posed by certain communications equipment providers are a matter of bipartisan concern. Hidden ‘back doors’ to our networks in routers, switches—and virtually any other type of telecommunications equipment—can provide an avenue for hostile governments to inject viruses, launch denial-of-service attacks, steal data, and more,” Pai stated. 

      His action comes in response to a letter received earlier in 2018 from the House Permanent Select Committee on Intelligence and the Senate Intelligence Committee. Attached to the letter is a 60-page report on the findings of an investigation conducted by the HPSCI in 2012 which detailed the risk. 

      The investigations found that it’s possible to embed covert code in communications infrastructure equipment that can disrupt communications or even forward communications from some users to unintended recipients. 

      While the statement by Pai didn’t mention Huawei nor ZTE by name, they are the two Chinese telecommunications vendors that operate in the U.S. The report does not call out other related equipment such as laptop computers, cell phones or tablets, perhaps because virtually all of those are made in China. 

      The order, if it’s adopted, would effectively cut off federal funding from communications providers such as cable and phone companies that use equipment from Huawei and ZTE. 

      While the major U.S. carriers don’t use Huawei or ZTE equipment, smaller networks frequently do. Partly this is because prices are lower and because those companies have aggressively marketed themselves to smaller carriers. As it happens, these same smaller carriers are the primary recipients of USF funds. The proposed FCC funding restriction would hit them especially hard. 

      Larger companies have already moved away from Huawei and ZTE. Both AT&T and Verizon were in the process of carrying mobile phones and other devices from those carriers until early in 2018, when both carriers dropped their plans. The intelligence community made no statements concerning risks from those phones, but apparently the carriers bowed to pressure from Congress and elsewhere and decided not to carry those devices. 

      The Congressional statement made that concern very clear. “We write today concerning the Chinese telecommunications equipment manufacturer Huawei and press reports that a major U.S. telecommunications provider will begin selling Huawei consumer products in the United States as early as next year, with little or no modifications to the products,” the statement began. 

      The letter went on to remind the FCC of the 2012 investigation report from the HPSCI, and to inquire whether the FCC used equipment from either of those Chinese companies or allowed its employees to do so. 

      The level of concern by the intelligence committees may seem a little paranoid by the uninitiated, but in fact it is possible to introduce functions into the ASICs (application specific integrated circuit) that operate most network equipment. Those ASICs contain hard coded instructions as well as the firmware that make up the devices operating system. 

      While it’s possible to see the code that is used for some of the operations of a network device, it’s completely possible to load hidden code into the device as well that can be triggered on command. Such code is actually quite common and it’s used by network equipment companies to provide an upgrade path for their products. 

      When service providers or equipment makers want to turn on a specific function, perhaps an advanced management capability, they can enter a license key into the device and the upgrade takes place automatically. The code was there all along, and the license key simply activated it. 

      But such code can be used for other purposes as well, including cheating during testing. Several years ago when I was testing an early version of a Gigabit Ethernet switch from a now-defunct vendor, we noticed that the switch performed unusually well in a test that involved transferring very short 64-byte packets at full line rate. Other packets did not transfer nearly as fast. 

      The reason, of course, is that at the time a popular piece of testing hardware depended on flooding the switch with 64-byte packets, so the device was designed to cheat when it saw that type of traffic, which could only be a test. 

      Other types of code can also be embedded in network hardware. In addition to the potential for back doors, it’s possible embed code that transfers copies of packets for specific IP addresses to a destination other than what’s intended, giving you the ability to siphon off traffic from a military installation for example. Some network engineers reportedly discovered Huawei switches doing just that 10 years ago. 

      So the concerns of the committees and the FCC may not be unfounded. The problem for Huawei and ZTE is that they would need to submit their products and the code that goes in them for review and so far neither company has cooperated with such investigations. 

      At this point, it appears that neither company has much of a future in selling network infrastructure equipment in the US. That could change, but not until they agree to a level of transparency that’s so far not been forthcoming.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.