https://assets.aclu.org/live/uploads/document/foia/huawei-powerpoint-slides.pdf
https://cryptome.wikileaks.org/2014/03/nsa-huawei-02.pdf
https://cryptome.wikileaks.org/cryptome-2016-1996.htm
NSA Spied on Chinese Government and Networking Firm
Slides Describe Mission Involving Huawei https://www.nytimes.com/interactive/2014/03/23/world/asia/23nsa-docs.html
Statement on Establishing a Global Cyber Security Assurance System https://cryptome.wikileaks.org/2014/03/huawei-cyber-security.pdf
WRITTEN STATEMENT FOR CHARLES DING PERMANENT SELECT COMMITTEE ON INTELLIGENCE U.S. HOUSE OF REPRESENTATIVES https://cryptome.wikileaks.org/2012/10/huawei-no-spy.pdf
Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE https://cryptome.wikileaks.org/2012/10/cn-cyberspy-2012.pdf
Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation Prepared for The US-China Economic and Security Review Commission https://cryptome.wikileaks.org/2012/10/cn-cyberspy-2009.pdf
CVE-2015-7755: Juniper ScreenOS Authentication Backdoor
https://www.rapid7.com/blog/post/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor/
NSA Leak Dokumente Liste https://wiki.piratenpartei.de/NSA_Leak_Dokumente_Liste
U.S. Officials Say Huawei Can Covertly Access Telecom Networks https://www.wsj.com/articles/u-s-officials-say-huawei-can-covertly-access-telecom-networks-11581452256
N.S.A. Breached Chinese Servers Seen as Security Threat https://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html
US finds Huawei has backdoor access to mobile networks globally, report says https://www.cnet.com/tech/mobile/us-finds-huawei-has-backdoor-access-to-mobile-networks-globally-report-says/
Cyber Security Evaluation Centre HCSEC Oversight Board-annual report 2020 https://assets.publishing.service.gov.uk/media/5f75bc438fa8f54e8fb2d1e2/Huawei_Cyber_Security_Evaluation_Centre__HCSEC__Oversight_Board-_annual_report_2020.pdf
The Bureaucratic Politics of Cyber Strategy. Journal of Global Security Studies, Vol 10. https://academic.oup.com/jogss/article/10/3/ogaf007/8104758
Cyber Strategy: The Evolving Character of Power and Coercion https://www.google.lt/books/edition/Cyber_Strategy/aHpVDwAAQBAJ?hl=en&gbpv=0
Salamek / huawei-lte-api https://github.com/Salamek/huawei-lte-api
Researchers Solve Juniper Backdoor Mystery; Signs Point to NSA https://www.wired.com/2015/12/researchers-solve-the-juniper-mystery-and-they-say-its-partially-the-nsas-fault/
Huawei HG866 - Authentication Bypass https://www.exploit-db.com/exploits/19185
Hack In The Box: researcher reveals ease of Huawei router access https://www.zdnet.com/home-and-office/networking/hack-in-the-box-researcher-reveals-ease-of-huawei-router-access/
How the Chinese Communist Party Uses Cyber Espionage to Undermine the American Economy https://www.csis.org/analysis/how-chinese-communist-party-uses-cyber-espionage-undermine-american-economy
Analyzing China's Manufacturing Export Boom https://www.jusdaglobal.com/en/article/analyzing-chinas-manufacturing-export-boom
Understanding China’s Economic Miracle https://www.jstor.org/stable/48527477
China's Strategic Shift: From Cheap Labor to High-Tech https://stratheia.com/chinas-strategic-shift-from-cheap-labor-to-high-tech
Journey https://www.huawei.com/minisite/whoishuawei/journey.html
Top comments (0)