Skip to Content
Uncategorized

New Evidence that Cisco Enables Surveillance and Control of China’s Citizens

Cisco says it can’t be held responsible for what governments do with its equipment, and countless other firms seem to agree.

Cisco is once again supplying networking equipment to the Chinese government for a comprehensive effort to monitor its citizens. This time, it’s for the “Peaceful Chongqing” system, which will is to be the world’s largest surveillance system, with approximately 500,000 cameras aimed at the 12 million inhabitants of Chongqing.

Unintentional irony in advertising: Cisco has been accused of being a principle enabler of the “Great Firewall of China,” which allows state censorship of the Internet (cc CiscoSP360)

Cisco’s record of helping China create systems that could, and perhaps are, used to oppress its own people is checkered, at best. In 2005, some of its own shareholders tried, and failed, to force the company to consider the potential for its equipment to abet human rights abuses in China and elsewhere.

Cisco’s defense against charges of aiding repressive regimes has always been the same: it sells the same networking equipment – mostly routers and switches – to everyone, and doesn’t customize it specifically to aid in human rights abuses. It’s what the company told Congress in 2006, and it appears to be the company’s defense against an ongoing civil suit on behalf of Chinese citizens who were tortured and in some cases murdered by their own government, allegedly after being identified with equipment sold by Cisco.

The problem with Cisco’s defense – that it can’t be held responsible for what governments do with its wares – is that the U.S. government regularly holds companies responsible for what governments do with a company’s products, whatever the stated goal upon date of purchase.

For example, most “dual-use” technologies – items that have both a military and a civilian use – are banned for export under Federal law. This is even true of information technologies. So how does Cisco get away with selling IT to China when that technology could so easily be put to nefarious purposes in the world’s largest non-democratic nation?

Here’s how the Wall Street Journal sums up the “loophole” that Cisco exploits in shipping its wares to China:

The U.S. has prohibited export of crime-control products to China (for instance, fingerprinting equipment) ever since Beijing’s deadly 1989 Tiananmen Square crackdown. But the U.S. restrictions don’t prohibit sale of technologies such as cameras that can be used in many ways—to tame, say, either traffic jams or democracy marches. This loophole troubles some critics.

Internal company memos revealed in 2008 that Cisco is well aware that the Chinese government wants to use its equipment as a tool of repression. That memo even specifically named, as a motivation for buying Cisco’s equipment, the Chinese government’s desire to repress the Falun Gong religious organization whose members were later tortured and murdered by the state.

Suppliers of technology to the Chinese government face a straightforward dilemma: do they miss out on business opportunities in what will soon be the world’s largest economy, knowing that some other supplier will likely be secured, or do they sell their wares anyway, falling back on the defense that almost all information technology is ultimately dual-use?

Google faced a similar dilemma in China, as it first obeyed and then defied official dictates that it censor its search results within the country. Cisco appears to have chosen a different path, as have countless other companies – highlighting, if anything, the extremely unusual nature of Google’s defiance.

Keep Reading

Most Popular

computation concept
computation concept

How AI is reinventing what computers are

Three key ways artificial intelligence is changing what it means to compute.

still from Embodied Intelligence video
still from Embodied Intelligence video

These weird virtual creatures evolve their bodies to solve problems

They show how intelligence and body plans are closely linked—and could unlock AI for robots.

conceptual illustration showing various women's faces being scanned
conceptual illustration showing various women's faces being scanned

A horrifying new AI app swaps women into porn videos with a click

Deepfake researchers have long feared the day this would arrive.

pig kidney transplant surgery
pig kidney transplant surgery

Surgeons have successfully tested a pig’s kidney in a human patient

The test, in a brain-dead patient, was very short but represents a milestone in the long quest to use animal organs in human transplants.

Stay connected

Illustration by Rose WongIllustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.