FCC Aims to Stop Foreign Spying Through the Technology Supply Chain

FCC Aims to Stop Foreign Spying Through the Technology Supply Chain
Federal Communications Commission Chairman Ajit Pai speaks to members of the media after a commission meeting Dec. 14, 2017, in Washington. Alex Wong/Getty Images
|Updated:

When most of us think of cyberattacks, we think of hackers breaching the networks of companies or governments, then proceeding to steal valuable data. In reality, many cyberattacks are more fundamental—exploiting vulnerabilities that work their way through the supply chain, in chips or devices that were already infected when they hit the market.

The issue of supply chain threats means that many devices are fundamentally breached through back doors and viruses installed on the inner parts of a device. Even if the user wiped the device, the vulnerability would remain. In past years, this was cited by many experts in the defense and cyber community as a threat not only for the customers and companies in the United States, but also for the military.
Joshua Philipp
Joshua Philipp
Author
Joshua Philipp is senior investigative reporter and host of “Crossroads” at The Epoch Times. As an award-winning journalist and documentary filmmaker, his works include “The Real Story of January 6” (2022), “The Final War: The 100 Year Plot to Defeat America” (2022), and “Tracking Down the Origin of Wuhan Coronavirus” (2020).
twitter