August 24th, 2012
07:30 AM GMT
Share this on:

Hong Kong (CNN) - A group representing international companies in China has warned members that police in Beijing, Hebei and Shandong have required international firms to purchase Internet monitoring devices or risk having their connections cut.

The Quality Brands Protection Committee (QBPC), a group aimed at safeguarding intellectual property rights in China, sent an email to its 216 members late last month warning of the police visits, saying it "would cause serious concerns from our members."

The emailed alert, copies of which were provided to CNN, raise particular concerns for international businesses operating in China because many companies often use private networks that allow employees to skirt China's so-called "Great Firewall" of censors. But, based on the QBPC alert, it appears firms in some areas are being asked to install a device within their private systems to track all internet activity– and that information must be made available to police, looking for "illegal activity."

"It has come to our attention that three of our QBPC members reported that local police units in Beijing, Hebei and Shandong approached them, forcing two members to purchase Internet security software from the police designated suppliers," wrote Ron Davis, chairman of the QBPC membership services committee, in the email obtained by CNN.

"Reportedly, if they failed to do so, the police threatened to cut off their Internet connection and fine them."

Another QBPC member company received a questionnaire from the local police unit asking about its Internet security measures, according to the QBPC email. "Given that if the local PSB (public security bureau) initiative were carried forward, it would cause serious concerns from our members, we are attempting to determine if any of our other 200-plus member companies have faced this same situation or know other member companies who have," Davis wrote.

The email doesn't detail which companies were targeted. The QBPC membership represents a broad swath of international firms with operations in China, including technology companies like Apple, Nokia and Emerson, consumer product makers such as Anheuser-Busch, Procter & Gamble and Colgate-Palmolive, and automotive companies Toyota, Audi and Volkswagen AG. Time Warner, the parent company of CNN, is also a member.

Davis has confirmed that he sent the email obtained by CNN.  A spokesperson for QBPC said, so far, the group has received 15 replies from its members. Three member companies were asked by police to install internet logging equipment and two reported police requests to inspect their internet security measures. The others reported no contact from police.

QBPC wouldn’t name the members who were approached.  “The three companies are in different industries,” the spokesperson said. “Based on the members’ response, it seems the police visits are isolated incidents.” QBPC has reported the incidents to the Ministry of Commerce and “had informal discussion with various departments of the MPS (Ministry of Public Security).”

Thomas Parenty, an information security specialist and former employee of the U.S. National Security Agency, said the devices could be used to spy on foreign companies and creates industrial espionage concerns.

"From an information security perspective, something like this in place in a company's network could be used for exploratory attacks into the network itself," Parenty said. "It's a Trojan horse that fits in a computer rack.

"If you're concerned about IP (intellectual property), you might as well roll up your tents because it's essentially game over," Parenty said.

Read the rest of the article here

Posted by: ,
Filed under: BusinessChina


soundoff (17 Responses)
  1. ChasL

    Looks like more China FUD. Why is our media so intent on reporting half-truth?

    So the facts are, out of 200+ member companies, only a hand full were contacted, ever fewer were followed up.

    Looks like there isn't any edict or policy change from the central government. Rather they are isolated incidents by local police. Perhaps the local police noticed hacking going on, and are asking, politely, that unsuspecting foreign guests to beef up their internet security.

    Sacrificing journalistic standards in favor of sensationalism and ideological activism is precisely why main stream media is in decline.

    August 24, 2012 at 5:56 pm |
  2. sites

    Pretty component to content. I simply stumbled upon your blog and in accession capital to say that I get actually enjoyed account your blog posts. Any way I will be subscribing to your augment or even I achievement you get admission to persistently quickly.

    August 24, 2012 at 10:11 pm |
  3. design

    Thank you, I've just been searching for info approximately this subject for ages and yours is the best I've found out so far. But, what concerning the bottom line? Are you certain concerning the source?|What i don't realize is if truth be told how you're not really much more well-appreciated than you might be right now. You are very intelligent.

    August 24, 2012 at 10:34 pm |
  4. design

    Undeniably consider that which you said. Your favourite reason appeared to be at the web the easiest thing to be aware of. I say to you, I certainly get irked even as other people think about worries that they just don't know about. You controlled to hit the nail upon the highest and outlined out the entire thing without having side-effects , folks can take a signal. Will likely be again to get more. Thank you

    August 25, 2012 at 1:40 am |
  5. publicidade

    I feel this is among the most vital info for me. And i am glad studying your article. However want to remark on few general things, The site style is ideal, the articles is in reality excellent : D. Good process, cheers

    August 25, 2012 at 7:15 am |
  6. piypec

    Reblogged this on Informationnaija.

    August 25, 2012 at 6:30 pm |
  7. Amaterus

    If the Chinese government wanted to capture traffics, they must have done that already at the ISP’s routers.
    However, they got cheesed from getting encrypted stuffs (IPSec) the good companies use, so they now want the actual unencrypted traffics.

    I think this is only possible if the Chinese can convince ISO (which made IPSec) to ditch IPSec in China only – Dream on…….

    August 26, 2012 at 9:06 am |
  8. yatsen

    Chinas politburo are panicking and their lies will end

    August 28, 2012 at 4:12 am |
  9. zombified

    that's how it works here. like it or not. those are the rules. the chiense companies do it. So should any foreign based company. Why bother complaining. its only a small fee and you can always get a nice VPN to suffice.

    just go with the flow and find your way around as we all have done so for a long time.

    September 11, 2012 at 7:18 am |
  10. icon pack

    Bravo, what words..., a brilliant idea

    P.S. Please reivew icons

    September 17, 2012 at 10:47 am |
  11. icons library

    Quite right! Idea good, I support.

    P.S. Please review

    Waiting room Icon from health-care-icons

    September 17, 2012 at 4:27 pm |
  12. icons set

    Willingly I accept. An interesting theme, I will take part. Together we can come to a right answer.

    P.S. Please review

    High Resolution App Tab Bar Icons for iPhone from Iconoman

    September 17, 2012 at 7:18 pm |
  13. icon downloads

    It is remarkable, this very valuable message

    P.S. Please review

    Tab Bar iOS Icons from Iconoman

    September 18, 2012 at 12:52 am |
  14. icons archive

    I apologise that, I can help nothing. But it is assured, that you will find the correct decision.

    P.S. Please review

    Database Icon Set from Ikonga

    September 18, 2012 at 4:27 am |
  15. icons downloads

    It is removed

    October 4, 2012 at 11:09 pm |
  16. Ulysses Tomerlin

    This protocol is designed to protect communication in a secure manner using TCP/IP. It is a set of security extensions developed by IETF, and it provides security and authentication at the IP layer by using cryptography. To protect the content, the data is transformed using encryption techniques. There are two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and Encapsulating Security Payload (ESP). These two protocols provide data integrity, data origin authentication, and anti-replay service. These protocols can be used alone or in combination to provide the desired set of security services for the Internet Protocol (IP) layer."..,;

    http://www.healthmedicinebook.com

    Good day

    May 20, 2013 at 5:52 pm |
  17. Willow Lintner

    It's really a nice and helpful piece of information. I am happy that you simply shared this useful information with us. Please keep us up to date like this. Thanks for sharing.

    October 29, 2013 at 9:31 pm |

Post a comment


 

CNN welcomes a lively and courteous discussion as long as you follow the Rules of Conduct set forth in our Terms of Service. Comments are not pre-screened before they post. You agree that anything you post may be used, along with your name and profile picture, in accordance with our Privacy Policy and the license you have granted pursuant to our Terms of Service.

About Business 360

CNN International's business anchors and correspondents get to grips with the issues affecting world business, and they want your questions and feedback.

 
 
Powered by WordPress.com VIP