Given the existence of Wireshark
"...Huawei to put backdoors and monitoring gear into the hardware, then use those points to intercept and spy on communications..."
Give the existence of Wireshark, you'd think that somebody would have copied-and-pasted a crystal clear example by now.
I'm not claiming that it doesn't exist, just that nobody seems to have bothered providing an example that would justify all this.
Remember the Cuban Missile Crisis? They put up huge pictures of the missile installations at the UN and said, "Look..." and "Don't wait for the translation."
In the 1980s, Clifford Stoll famously tracked a spy through the maze of computers. In the 1980s!!
Ref. his book, 'The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage'