|FROM ||Ruben Safir
|SUBJECT ||Subject: [NYLXS - HANGOUT] Chinese Backdoors
|From owner-hangout-outgoing-at-mrbrklyn.com Mon Feb 16 21:36:25 2015
Received: by mrbrklyn.com (Postfix)
id 7A54916007B; Mon, 16 Feb 2015 21:36:25 -0500 (EST)
Received: by mrbrklyn.com (Postfix, from userid 28)
id 6D8A9161130; Mon, 16 Feb 2015 21:36:25 -0500 (EST)
Received: from mailbackend.panix.com (mailbackend.panix.com [220.127.116.11])
by mrbrklyn.com (Postfix) with ESMTP id CBF6416007B
for ; Mon, 16 Feb 2015 21:36:24 -0500 (EST)
Received: from [10.0.0.19] (unknown [18.104.22.168])
by mailbackend.panix.com (Postfix) with ESMTPSA id 9A10F19363
for ; Mon, 16 Feb 2015 21:36:23 -0500 (EST)
Date: Mon, 16 Feb 2015 21:36:23 -0500
From: Ruben Safir
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
To: "hangout-at-nylxs.com >> Hangout"
Subject: [NYLXS - HANGOUT] Chinese Backdoors
Content-Type: text/plain; charset=utf-8
* Tech Talk
China's New Rules Ask Tech Firms to Hand Over Source Code
By Jeremy Hsu
Posted 2 Feb 2015 | 17:00 GMT
China plans to unveil new cybersecurity rules that require
tech companies to hand over source code and build back doors in hardware
and software for government regulators. The rules only apply to
companies selling computer products to Chinese banks, but they have
already sparked anxiety on the part of Western tech companies about
being trapped between either giving up intellectual property or not
doing business in China.
The new rules—part of cybersecurity policies intended to protect China’s
critical industries—first appeared in a 22-page document at the end of
2014, according to a /New York Times/
report. Such rules have not been officially announced yet. But the U.S.
Chambers of Commerce joined a number of
other foreign business groups in sending a letter
to the Central Leading Group for Cyberspace Affairs, chaired by
President Xi Jinping, that called for “urgent discussions” about the
policies. Tech giants such as Microsoft, Cisco, and Qualcomm have also
independently voiced their concerns.
Under the bank rules, tech companies would have to hand over source
code, set up research and development centers in China, and build
hardware and software back doors that would permit Chinese officials to
monitor data within their computer systems.
The /New York Times/ also detailed a separate Chinese antiterrorism law
being drafted that would require companies to store all data about
Chinese users on servers physically located in China. The law would also
ask companies to hand over encryption keys and enable Chinese officials
to check content for terrorism-related activities.
China’s new policies come in the wake of revelations from former U.S.
National Security Agency contractor Edward Snowden, about the NSA’s
efforts to infiltrate Chinese tech giant Huawei
Documents leaked by Snowden include an NSA list of programs designed to
install back doors in Huawei’s software and hardware that the U.S. spy
agency could exploit for intelligence-gathering purposes.
Snowden’s revelations eventually prompted China to set up its Central
Leading Group for Cyberspace Affairs. Chinese officials have also set
the goal of reducing their reliance upon foreign tech firms and boosting
the presence of domestic tech firms.
U.S. tech companies fear that China’s new rules would force them to give
up intellectual property to Chinese state-supported companies and
possibly compromise the security of their own computer systems and
products. Companies also fear that if they don’t comply with the rules
and if the Chinese government expands such rules beyond the banking
sector, they could potentially be shut out of the Chinese market.
The letter to Xi puts their worries in the context of the Chinese market:
An overly broad, opaque, discriminatory approach to cybersecurity
policy that restricts global internet and ICT [information and
communications technolgy] products and services would ultimately
isolate Chinese ICT firms from the global marketplace and weaken
cybersecurity, thereby harming China's economic growth and
development and restricting customer choice.
The history of the United States-China cyber detente
makes it difficult for U.S. companies to trust Chinese officials with
their intellectual property and access to their computer systems. The
United States has long accused China’s government and military of
corporate espionage against U.S. companies and government agencies. Last
year, the U.S. Department of Justice charged five Chinese military
stealing a variety of trade secrets from U.S. businesses.