Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
China United States

US To Open Program To Replace Huawei Equipment In US Networks (reuters.com) 31

An anonymous reader quotes a report from Reuters: The U.S. Federal Communications Commission (FCC) on Monday said it would open a $1.9 billion program to reimburse mostly rural U.S. telecom carriers for removing network equipment made by Chinese companies deemed national security threats like Huawei and ZTE. The program, which was finalized in July, will open Oct. 29 for applications through Jan. 14, 2022.

Last year, the FCC designated Huawei and ZTE as national security threats to communications networks -- a declaration that barred U.S. firms from tapping an $8.3 billion government fund to purchase equipment from the companies. The FCC in December adopted rules requiring carriers with ZTE or Huawei equipment to "rip and replace" that equipment. The issue is a big one for rural carriers that face high costs and difficulty finding workers to remove and replace equipment. The FCC's final order expanded the companies eligible for reimbursement from those with 2 million or fewer customers to those with 10 million or fewer customers. The FCC in September 2020 estimated it would cost $1.837 billion to remove and replace Huawei and ZTE equipment from networks. [...] The affected companies included the previously designated Huawei and ZTE, as well as Hytera, Hangzhou Hikvision Digital Technology Co and Zhejiang Dahua Technology Co.

This discussion has been archived. No new comments can be posted.

US To Open Program To Replace Huawei Equipment In US Networks

Comments Filter:
  • Good. Since the authoritarian expansionist CCP has declared that those companies are part of their military establishment and must comply with any demands from the party then i totally agree with this move.
  • Thanks cayenne8. [slashdot.org]

    But I"ve heard that Huawei hardware may actually be welcome to be used in the US again....so, I guess no one in the govt. gives a fsck about national security anymore.

    And the 5 idiots that modded that nonsense Insightful.

  • We've got a bunch of 2G/3G stuff stacked up in the warehouse.

  • Hopefully this'll be a bonanza of networking equipment on the cheap on eBay.

    I for one am not really concerned about our business being hacked by the Chinese government. Nothing really worth their time.

  • Here is $1.9B to have it your way.

  • Once all of a particular model is offline, they need to release the technical data showing proof of whatever backdoor or suspiciously severe security bug they were basing this all on. Because if there is none, as many suspect, they need to go ahead and admit the real reason and pay damages. And if there is, it's a PR win for credibility and trust in intelligence agencies, which couldn't desperately use some.
    • A few million and some universities taking these installations to a forensic autopsy is needed to justify 1.9 Billion, plus the other billions previously spent, plus several billions to replace Chinese made gear, with more Chinese made gear, only with an American flag that gets it over the 50% mark. Too bad if 100% of the software is also Chinese sourced from a front company, in say Houston, Remember if the Chinese supply backend software, they will know the holes. Go on, and employ some American talent to
      • by thomn8r ( 635504 )

        Remember if the Chinese supply backend software, they will know the holes. Go on, and employ some American talent to solve unproven assertions for good.

        There's nothing to prevent them from pushing a "security patch" at a later date that opens up more holes.

        • A forensic autopsy will also include a inspection tool to stop unauthorized changes and reveal checksums for everything. Telco have DEV,QA and Prod test environments. You never to live updates on production, unless you are a 2 bit company. Obviously 'inactivated' code wont exist, and the security logs examined. You give these university students, say a 100K reward, and sent regular dumps, then you have have a high confidence level. The days of buy and forget, are over.
    • But risk-assessments and vulnerability mitigations are done in the pre-proof phase - ie, to AVOID trouble, or potential trouble, before it hits you in the face. Eg, how many traffic accidents do YOU need before you're convinced to wear a seat belt?

      This whole "slave to human nature" thing never stops hurting us; by this I mean the instinct deficiencies when working intangibles -- especially future probabilities, statistics, risk, etc. And clearly some strategies could be both *-ist and non- *-ist at the s
    • Closest to proof you are going to get without proper disclosure. https://www.cvedetails.com/ven... [cvedetails.com]
  • by flyingfsck ( 986395 ) on Tuesday September 28, 2021 @01:26AM (#61840063)
    Meng was released and went back to China. The two Michaels were released and returned to Canada. So the Huawei equipment should be magically safe now.
  • You know, where you do not suspect it is insecure, but you _know_ it is insecure! Knowing is always better than suspecting, right?

  • Regardless of your political views. CCP , ACCESS DENIED why too late as well
  • Huawei has agreed to add NSA backdoors too.
    I wonder what China will have to say about that...

As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...