Remove Risk Remove Surveillance Remove Technology Remove Telecommunications
article thumbnail

On Chinese "Spy Trains"

Schneier on Security

There is definitely a national security risk in buying computer infrastructure from a country you don't trust. Meanwhile, the chairman of China's technology giant Huawei has pointed to NSA spying disclosed by Edward Snowden as a reason to mistrust US technology companies. This is a complicated topic.

article thumbnail

Section 889: the US Regulation that extends far beyond the US

IT Security Guru

It went into effect on 13 th August 2020 and addresses the new prohibition on the use of banned telecommunications equipment and services, while also clarifying the ban from 2019 on buying such equipment. There are five specific companies that fall under the category of ‘Prohibited Technology’. government and industry. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Some hold this view dogmatically, claiming that it is technologically impossible to provide lawful access without weakening security against unlawful access. But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. That telecommunications company was GTE­which became Verizon.

article thumbnail

The War in Technology: A Digital Iron Curtain Goes Up

SecureWorld News

Is it better to cut off Russia or allow free communication, with all the risks and benefits it provides? We know that war has impacts on telecommunications, but what we've seen in Ukraine is on a different level.". And it might have been prepared for this moment, years ago, as a surveillance tool.

article thumbnail

Attorney General Barr and Encryption

Schneier on Security

Some hold this view dogmatically, claiming that it is technologically impossible to provide lawful access without weakening security against unlawful access. But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. That telecommunications company was GTE -- which became Verizon.

article thumbnail

3.5m IP cameras exposed, with US in the lead

Security Affairs

Businesses and homeowners increasingly rely on internet protocol (IP) cameras for surveillance. And while cosmetic security measures are in place, security leaders have long warned that technologies produced by Chinese companies can be exploited by China’s government. Surge in internet-facing cameras. Most insecure brands.

article thumbnail

Episode 167: Made in America? Trade Tensions highlight Supply Chain Risk

The Security Ledger

We're joined by Terry Dunlap the co-founder of ReFirm Labs to talk about why software supply chain risks. » Related Stories From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military Episode 165: Oh, Canada! government ban on the technology. Read the whole entry. » agencies.

Risk 40