Skip to content
China Tech Threat

China Tech Threat

  • The Threat
    • Overview
    • National Security
    • IP Theft
    • Personal Privacy
  • CTT Blog
  • News
  • Resources
    • Gov’t Reports
    • Think Tanks
    • China’s View
  • CTT Special Reports
    • Risky Holiday Gifts
    • Policy Review of SME Export Control
    • State Contracts with Banned Manufacturers
    • CFIUS, TikTok, and Lenovo
    • Chinese Think Tank Ranks US Governors
    • DOD IG’s Audit of Cybersecurity Risks
  • About Us
    • Our Mission
    • 13 Questions
    • John Strand
    • Roslyn Layton
  • Contact Us

Did You Know ?

Over 30 US companies unknowingly purchased servers rigged with Chinese surveillance tech in 2018.
MIT cut all research ties with Huawei and ZTE in 2019.
The heads of six major U.S. intelligence agencies have warned that American citizens shouldn’t use products made by Huawei and ZTE.
The Department of Defense Inspector General identified Lenovo computers as a cybersecurity risk
China’s National Intelligence Law from 2017 requires organizations and citizens to “support, assist and cooperate with the state intelligence work.”
Lenovo products have been banned by intelligence agencies in Australia, Canada, New Zealand, the U.K. and the U.S. since the mid-2000s.

Data Collection

DHS Issues Warning to U.S. Businesses about China Threat

Posted on December 23, 2020December 23, 2020 by China Tech Threat
DHS Issues Warning to U.S. Businesses about China Threat
The U.S. Department of Homeland Security (DHS) issued a warning on Tuesday to American businesses about data security risks from Chinese communications equipment and services. The 15-page advisory warns U.S. companies about the threat of data theft through partnerships with… Read More
Posted in National SecurityTagged Data Collection, Department of Homeland Security

About China Tech Threat

We bring attention to the threats, dangers and vulnerabilities posed of information technology from entities owned and affiliated with the Chinese government. We conduct research and collect on materials from other experts to better understand these complex issues and improve policy.

Read More

  • The Threat
  • CTT Blog
  • News
  • About Us
  • Contact Us
Privacy Policy | Cookie Policy | Terms & Conditions
  • The Threat
  • CTT Blog
  • News
  • Resources
  • Special Report on the DoD IG’s Inquiry
  • About Us
  • Contact Us