Skip to content
China Tech Threat

China Tech Threat

  • The Threat
    • Overview
    • National Security
    • IP Theft
    • Personal Privacy
  • CTT Blog
  • News
  • Resources
    • Gov’t Reports
    • Think Tanks
    • China’s View
  • CTT Special Reports
    • Risky Holiday Gifts
    • Policy Review of SME Export Control
    • State Contracts with Banned Manufacturers
    • CFIUS, TikTok, and Lenovo
    • Chinese Think Tank Ranks US Governors
    • DOD IG’s Audit of Cybersecurity Risks
  • About Us
    • Our Mission
    • 13 Questions
    • John Strand
    • Roslyn Layton
  • Contact Us

Did You Know ?

MIT cut all research ties with Huawei and ZTE in 2019.
China’s National Intelligence Law from 2017 requires organizations and citizens to “support, assist and cooperate with the state intelligence work.”
The Department of Defense Inspector General identified Lenovo computers as a cybersecurity risk
The heads of six major U.S. intelligence agencies have warned that American citizens shouldn’t use products made by Huawei and ZTE.
Lenovo products have been banned by intelligence agencies in Australia, Canada, New Zealand, the U.K. and the U.S. since the mid-2000s.
Over 30 US companies unknowingly purchased servers rigged with Chinese surveillance tech in 2018.

Economic Security

Trump Administration Publishes List of Chinese and Russian Companies with Military Ties

Posted on December 22, 2020December 22, 2020 by China Tech Threat
Trump Administration Publishes List of Chinese and Russian Companies with Military Ties
The U.S. Department of Commerce published a list of Chinese and Russian companies with military ties on Monday. U.S. companies will be restricted from selling certain goods and technology to those named. The final list includes 103 entities, 14 fewer… Read More
Posted in Economic Security, Economic SecurityTagged Entity List, SMIC

About China Tech Threat

We bring attention to the threats, dangers and vulnerabilities posed of information technology from entities owned and affiliated with the Chinese government. We conduct research and collect on materials from other experts to better understand these complex issues and improve policy.

Read More

  • The Threat
  • CTT Blog
  • News
  • About Us
  • Contact Us
Privacy Policy | Cookie Policy | Terms & Conditions
  • The Threat
  • CTT Blog
  • News
  • Resources
  • Special Report on the DoD IG’s Inquiry
  • About Us
  • Contact Us