Menu

U.S. Increasingly Focused on China’s Potential to Infiltrate Connected Devices

U.S. Increasingly Focused on China’s Potential to Infiltrate Connected Devices

The News: The U.S. government is once again sounding alarms about the potential for Chinese cellular modules to track and potentially control devices on the Internet of Things (IoT). Read the full article here.

U.S. Increasingly Focused on China’s Potential to Infiltrate Connected Devices

Analyst Take: Earlier this month, members of the House Select Committee on the Strategic Competition asked FCC Chairwoman Jessica Rosenworcel for information about the potential threat of cellular modules made by Chinese companies Quecetel and Fibocom to track and infiltrate U.S. intelligence via connected devices on the IoT. Alarmingly, China’s sweeping national security laws mandates its technology firms share any data they have anywhere in the world if requested by the country’s intelligence service. The issue came to a head when it was found that Chinese-made components in devices certified for use on federally managed public safety networks were designed to send information back to Chinese servers. Other concerns were raised for farm equipment, vehicles, and other medical equipment. According to reports, engineers associated with the project were not clear how effective their security measures were in preventing the potential issues—a clear national security risk.

How these Devices Pose a Security Risk

For IoT devices to usefully connect to the Internet, they need to have cellular modules. The national security implications are immense as there were 202 million cellular IoT connections in the US in 2022 and are projected to increase to 450 million over the ensuing five years (according to IoT Analytics). What’s concerning is that the cellular modules are typically controlled remotely, sending or receiving specific data requests without the host knowing. This includes in-band communications on traditional cellular networks as well as out-of-band communications using unlicensed spectrum for back-channel interactions. Members of Congress raised concerns because the Chinese companies could access sensitive data, control the devices, or even shut them down. With potentially millions of devices utilizing Chinese-made technology, the data could be a treasure trove of information on US citizens or even the government. Or going a step further, if Chinese-made modules are being used in critical infrastructure like energy pipelines, power grids, water systems, or emergency communication systems, we could be destabilized quickly — and potentially with lasting impacts.

The FCC is Acting – But is it Enough?

This month the FCC issued a Notice of Proposed Rulemaking to create a labeling program for IoT devices in accordance with National Institute of Standards and Technology (NIST) standards. The program would be voluntary for manufacturers but would provide information to consumers to help them understand which products are safer. With a voluntary program, there is no incentive for a company to disclose its use of Chinese technologies nor are incentives enacted to dissuade use in the first place — both of which would call into question the efficacy of the program.

So, is it enough? Congress doesn’t think so. Members of the House Select Committee are urging the FCC to take additional measures like what it did to keep Huawei out of 5G infrastructure. Currently there is no indication that the FCC will follow through with that course of action, but it would not be surprising if more information about what potential devices the Chinese could access comes to light. The FCC needs to more directly address the national security concerns of Congress and consider developing a program that requires manufacturers to provide supply sourcing information for IoT devices to users as well as disincentivize the use of China-originated components across the supply chain.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other insights from The Futurum Group:

The U.S. Hints at Tighter Restrictions on China, but Not Without Pushback

U.S. China Chip Controls

China Plays Offense with Precious Metals

Author Information

Daniel is the CEO of The Futurum Group. Living his life at the intersection of people and technology, Daniel works with the world’s largest technology brands exploring Digital Transformation and how it is influencing the enterprise.

From the leading edge of AI to global technology policy, Daniel makes the connections between business, people and tech that are required for companies to benefit most from their technology investments. Daniel is a top 5 globally ranked industry analyst and his ideas are regularly cited or shared in television appearances by CNBC, Bloomberg, Wall Street Journal and hundreds of other sites around the world.

A 7x Best-Selling Author including his most recent book “Human/Machine.” Daniel is also a Forbes and MarketWatch (Dow Jones) contributor.

An MBA and Former Graduate Adjunct Faculty, Daniel is an Austin Texas transplant after 40 years in Chicago. His speaking takes him around the world each year as he shares his vision of the role technology will play in our future.

Related Insights
Okta Q4 FY 2026 Earnings Highlight Agentic Identity Positioning
March 6, 2026

Okta Q4 FY 2026 Earnings Highlight Agentic Identity Positioning

Dion Hinchcliffe is Vice President & Practice Lead, CIO & Technology Buyers reviews Okta’s Q4 FY 2026 earnings, focusing on agentic identity positioning, evolving pricing models, and how large-customer platform...
Commvault-CrowdStrike SIEM Link Tests Bi-Directional Resilience
March 6, 2026

Commvault-CrowdStrike SIEM Link Tests Bi-Directional Resilience

Fernando Montenegro, VP and Practice Lead, Cybersecurity at Futurum, examines how Commvault’s bi-directional integration with CrowdStrike Falcon Next-Gen SIEM enables shared backup-integrity telemetry to fasten recovery after cyberattacks....
CrowdStrike Q4 FY 2026 Earnings Extend ARR Scale and AI Security Focus
March 6, 2026

CrowdStrike Q4 FY 2026 Earnings Extend ARR Scale and AI Security Focus

Fernando Montenegro, VP Cybersecurity at Futurum, highlights CrowdStrike’s Q4 FY26 earnings: Falcon expands into AI security, identity, and browser runtime, underscoring consolidation-driven cybersecurity strategies....
S3NS & Sovereignty Can Thales-Google Venture Make AI Sovereignty Work at Scale
March 5, 2026

S3NS & Sovereignty: Can Thales-Google Venture Make AI Sovereignty Work at Scale?

Nick Patience, VP & Practice Lead for AI Platforms at Futurum Research, assesses S3NS’s progress following its SecNumCloud qualification, evaluates the sovereign AI roadmap, and examines what the Thales-Google Cloud...
Ingram Micro Q4 FY 2025 Earnings Highlight Xvantage-Driven Efficiency
March 5, 2026

Ingram Micro Q4 FY 2025 Earnings Highlight Xvantage-Driven Efficiency

Futurum Research analyzes Ingram Micro’s Q4 FY 2025 results, focusing on Xvantage-driven efficiency, AI workflow automation, and the company’s approach to AI infrastructure attach opportunities....
Stellantis FY 2025 Earnings Reflect Reset Costs as H2 Momentum Builds
March 4, 2026

Stellantis FY 2025 Earnings Reflect Reset Costs as H2 Momentum Builds

Olivier Blanchard, Research Director at Futurum, reviews Stellantis FY 2025 results, focusing on the customer-led reset, product cadence, quality execution, and what the H2 recovery signals for 2026....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.