The FCC has expanded its ban on foreign-made technology imports, now prohibiting new consumer networking gear from countries deemed an unacceptable risk to U.S. national security. This action, mirroring a prior drone ban, will affect virtually all future consumer routers, as the majority are manufactured abroad. While existing devices and already authorized products are unaffected, new router manufacturers must now secure conditional approval or face the prospect of not selling in the U.S. market. This move is justified by the FCC’s National Security Determination, which cites economic, national security, and cybersecurity risks, as well as implicated foreign-produced routers in cyberattacks targeting critical infrastructure.
Read More
According to US Treasury Secretary Scott Bessent, the US and China have finalized a deal to transfer TikTok’s US operations to new ownership, with details agreed upon in Madrid and awaiting finalization between leaders. The deal, part of a broader trade framework, follows a September executive order by Trump facilitating US-based ownership with American investors holding a majority stake. This transfer, valued at approximately $14 billion, will see new investors oversee the app’s algorithm and control the majority of board seats. The agreement is expected to be formalized during a meeting between Trump and Xi Jinping, where trade balance and the fentanyl crisis will also be discussed.
Read More
The U.S. plans to ban the import of Chinese and Russian vehicle connectivity system hardware, starting with 2030 vehicle models. This isn’t an immediate change, giving automakers a significant timeframe to adjust their supply chains. The delay highlights the immense challenge of disentangling from deeply embedded foreign technology, particularly considering the extensive Chinese investment in many global car manufacturers, including brands like Volvo, Polestar, and Lotus.
This move is intended to address national security concerns, stemming from the potential for backdoors in connected vehicle systems to be exploited by hostile governments. The worry isn’t just about isolated incidents; it’s about the cumulative effect of numerous vehicles acting as potential surveillance points, constantly transmitting data about their locations, routes, and surroundings.… Continue reading