"at Congress was up in arms about were routers and communications devices used in enterprise systems, not consumer-level smartphones. Even so, we are now considering trusting our most personal information to Huawei-built devices. Smartphones are both incredibly personal and incredibly data-intensive. If anything will be of interest to an organization interested in stealing secrets, it would be the personal data found on a smartphone.
Except for one thing: that's not really China's style. China tends to conduct big-picture espionage. The country seems far more interested in big scores, like the plans for our F-35 multirole and F-22 tactical fighters. China seems more than willing to let US taxpayers foot the bill for stolen R&D, which eventually found its way into its Chengdu J-20 Dragon fighter.
In fact, according to the 2013 edition of the always-excellent Verizon Data Breach Investigations Report, 30 percent of all cyberespionage activities originated in China. By contrast, the former Soviet states are into financial hacking. The same Data Breach Investigations Report attributes 40 percent of all financial hacking to Bulgaria, Romania, and Russia.
One of the issues I am particularly curious about is how we, as a global culture, manage technologies that are supplied by nations we may or may not have cordial relationships with. This is of particular concern since national policies can be so transitory, based on whatever regime is in power at any given time."