Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Obama’s Stopgap Spending Bill Blocks Government IT Purchases from China

On Tuesday, President Obama signed the continuing resolution that will keep the government running though the end of the fiscal year – avoiding a shutdown. However, within the resolution itself, section 516 to be exact, there is a provision to block IT purchases from China.

On Tuesday, President Obama signed the continuing resolution that will keep the government running though the end of the fiscal year – avoiding a shutdown. However, within the resolution itself, section 516 to be exact, there is a provision to block IT purchases from China.

According to section 516 (PDF), none of the money appropriated by the continuing resolution can be used by the Department of Commerce, the Department of Justice, NASA, or the National Science Foundation to acquire IT technology unless the head of the entity involved, along with the FBI has assessed “any associated risk of cyber-espionage or sabotage associated with the acquisition of such system…” 

WhitehouseThis includes any risk associated with IT technology that was “produced, manufactured or assembled by one or more entities that are owned, directed or subsidized by the People’s Republic of China.”

The only way that such a purchase can be made is if the technology is in the national interest of the U.S.

Such wording and measures only continues the administration’s stance against firms such as ZTE and Huawei. While the government has spent the last year blasting those two firms for their alleged ties to cyber-espionage and other related crimes against U.S. interests, as well as being beholden to the Chinese government first and all others second, section 516 also prevents funds from going to Lenovo – one of the world’s largest hardware vendors when it comes to laptops and other IT needs.

Last week, Mandiant’s Kevin Mandia told a hearing of the Senate Armed Services Committee that China has placed a large investment in cyber-espionage operations.

“It would take thousands of people, thousands of systems… the mere infrastructure alone, and the time, and duration and scope of this effort to steal our secrets has gone on for so long that there’s a large amount of investment in it,” he said.

Earlier this month, China’s Foreign Minister, Yang Jiechi, said that talk of China being on a hacking spree targeting international governments and high-value targets is built on shaky ground, adding that anyone “who tries to fabricate or piece together a sensational story to serve a political motive will not be able to blacken the name of others nor whitewash themselves.”

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.