Hotels to spy on Olympics guests, says U.S. senator
He claims Chinese authorities forced foreign-owned hotels to install eavesdropping equipment
IDG News Service - Sen. Sam Brownback (R-Kan.) reiterated accusations Tuesday that China is forcing foreign-owned hotels to install electronic eavesdropping equipment ahead of next month's Olympics.
The network monitoring equipment, which Brownback claims includes both hardware and software, will allow the country's Public Security Bureau to monitor the Internet activities of guests and collate records of what they do online.
"The Chinese government has put in place a system to spy on and gather information about every guest at hotels where Olympic visitors are staying," the senator said in a statement. "This means journalists, athletes' families and other visitors will be subjected to invasive intelligence gathering by the Chinese Public Security Bureau."
Brownback first made these accusations in early May, without citing the names of any of the hotel chains allegedly involved. He said that he now has copies of translations of the original order, which "alludes to harsh punishment for failure to comply with the order," the statement said.
"The hotels have asked us to preserve their anonymity; in order to protect their safety, and in return for their courage in coming forward, I cannot divulge their identities. ... On the other hand, these hotel chains have invested millions of dollars in their Chinese properties, and while they wish to find a way to reverse this order, if they are specifically identified, they could face severe retaliation by the communist government," Brownback said.
Brownback's accusations book-end allegations made in June by two U.S. Congressmen that China-based hackers had attacked computers in their offices, including ones that may have contained information on Chinese dissidents.
- Top 12 Laptop Bags for Mobile Pros
- Think Deleted Text Messages Are Gone Forever? Think Again
- 7 New Faces of the C-suite
- 5 Ways CIOs Can Rationalize Application Portfolios
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Accelerating Network Convergence in Virtualized and Cloud Data Centers Adopting a converged networking strategy enables organizations to traffic server and storage I/O workloads on consolidated data throughput channels. Intelligent software helps optimize...
- How 10GbE Network is the Backbone of the Virtual Data Center The shift to a virtual data center has put tremendous strain on legacy networks; driving the need for more speed, lower latency, more...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts