recommended reading

Beijing Thinks the iPhone is a Threat to China’s National Security

An Apple store in Hong Kong displays iPhones and iPads for purchase in October.

An Apple store in Hong Kong displays iPhones and iPads for purchase in October. // Lewis Tse Pui Lung/

The iPhone became the latest target of China’s state broadcaster CCTV today. The phone’s Frequent Locations function, which tracks the exact places you have been and the amount of time you spent there, is capturing “extremely sensitive data,” a researcher told CCTV, according to Reuters. The data could ultimately reveal China’s economic situation and “even state secrets,” the researcher said.

Frequent Locations—which was added in iOS 7, the current version of Apple’s operating system—has already raised personal privacy concerns outside China, and inspired detailed online instructions about how to turn the function off. Apple says the data are used to make its mapping app more useful, and that the data are stored only on your phone and “won’t be sent to Apple without your consent.”

Even if Apple did collect the data, it’s not clear what “state secrets” Beijing thinks might be revealed. However, the state-run broadcaster issued a similar warning about Microsoft’s Windows 8 operating system last month. Analysts told CCTV that Windows presented a possible threat to national security, in part because it might collect statistics that would be “more precise and up-to-date than those collected by our National Bureau of Statistics.”

Apple is estimated to have sold more than 150 million iPhones in China, including, presumably, to the country’s wealthiest citizens. Tracking where they travel, and how long they stay there, could be interesting data for any retailer hoping to cater to this affluent bunch—again, if Apple made those data available. But perhaps Beijing’s concern is more specific. Xi Jinping’s wife, Peng Liyuan, is just one of many members of China’s political elite who has been pictured with an iPhone, happily snapping pictures. A device that that tracks how and where the country’s most influential and powerful spend their time might well reveal a state secret or two.

(Image via Lewis Tse Pui Lung /

Threatwatch Alert

Social Media Takeover

Qatar News Agency Says Hackers Published Fake Stories

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.