{"id":43509,"date":"2024-06-27T14:07:31","date_gmt":"2024-06-27T14:07:31","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?p=100630"},"modified":"2024-06-27T14:07:31","modified_gmt":"2024-06-27T14:07:31","slug":"us-examines-security-risks-posed-by-china-telecom-and-china-mobiles-operations","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/us-examines-security-risks-posed-by-china-telecom-and-china-mobiles-operations\/","title":{"rendered":"US examines security risks posed by China Telecom and China Mobile\u2019s operations"},"content":{"rendered":"<p>The Biden administration is conducting a review of China Mobile, China Telecom, and China Unicom due to concerns that these companies could take the American data they access through US cloud and internet providers and provide it to Beijing. According to three sources familiar with the matter, the Commerce Department is carrying out this previously<a class=\"excerpt-read-more\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/2024\/jun\/27\/us-examines-security-risks-posed-by-china-telecom-and-china-mobiles-operations\/\" title=\"ReadUS examines security risks posed by China Telecom and China Mobile&#8217;s operations\">&#8230; Read more &#187;<\/a><\/p>\n<p>The post <a href=\"https:\/\/www.cloudcomputing-news.net\/news\/2024\/jun\/27\/us-examines-security-risks-posed-by-china-telecom-and-china-mobiles-operations\/\">US examines security risks posed by China Telecom and China Mobile&#8217;s operations<\/a> appeared first on <a href=\"https:\/\/www.cloudcomputing-news.net\/\">Cloud Computing News<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Biden administration is conducting a review of China Mobile, China Telecom, and China Unicom due to concerns that these companies could take the American data they access through US cloud and internet providers and provide it to Beijing. According &#8230;<\/p>\n","protected":false},"author":682,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[285,433,104,2336,6166],"tags":[18,118],"class_list":["post-43509","post","type-post","status-publish","format-standard","hentry","category-applications","category-china","category-cloud-computing","category-cybersecurity","category-regulation-government","tag-cloud","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/682"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=43509"}],"version-history":[{"count":3,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43509\/revisions"}],"predecessor-version":[{"id":43550,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/43509\/revisions\/43550"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=43509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=43509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=43509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}