Fear of China and ICT production, part 2

Recently I wrote a blog post on the lessons behind the takedown by Microsoft of 3322.org. BTW, this organisation is back online after striking a deal with Microsoft. (Click here.)

In the blog I focussed on the fact that most ICT products are wholly or partly manufactured in China and in a presuming way sketched risks for cyber security.

This week a U.S. congressional report was published that reflects on the same topic. In short U.S. congress thinks it better for U.S. entities not to do business with two Chinese companies, Huawei and ZTE. This basically follows earlier Australian policy to exclude Huawei from participating in a national tender. I wonder if and when the E.U. (countries) will follow.

Don’t get me wrong. I’m not saying that China is spying through the systems provided by Chinese companies or the ICT products manufactured in China, the question is whether an entity, whether government, NGO or commercial, can afford to run the risk. Mind, not just from an espionage point of view, but also Also I wondered out loud what effects could be of private, mobile devices being hooked up to official networks every day. Any way the debate is way out in the open. Here’s some interesting links.

An interesting article on U.S. security and the chain of supply risk here.

The congressional report here.

Australia banning Huawei from participation here.

Wout de Natris, De Natris Consult

Leiderdorp, 12 October 2012

Advertisements

About Wout de Natris

As a consultant I specialise in establishing new and different relationships between industry, governments and law enforcement where internet safety and the fight against cyber crime are concerned. This makes me a bridge builder. Hence the blogs name. In this blog I intend to stress the need for interaction, cooperation and exchange of information in order to change the mentioned relationships. On offer: a comprehensive training on all non-technical aspects of spam enforcement and a cyber awareness presentation for companies and institutions
This entry was posted in Cyber awareness, Cyber espionage, Cyber security, Cyber warfare, Hacking, Internet governance and tagged , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s