Traveling to China? Skeptical about their interest in your information?
Let’s address that skepticism with a concrete example provided by a trade delegation from Belgium which recently traveled to China.
What happened?
The largest trade mission to China, led by Princess Astrid, had their electronics diddled with while they were in China, and their information on board those devices compromised.
According to Geert Baudewijns, of Secutec, who was a member of the trade mission, he recorded 135 attacks an hour from Chinese bots. Baudewijns said that the delegation had received a warning briefing, but many of the members of the delegation did not heed the warning.
Baudewigns said that as part of his prep for the trip, he employed the “honey-pot” technique using both protected (not further explained) and unprotected equipment. He detected attempts by China to install spyware on devices.
The Belgian security service, the VSSE, in their travel security brochure (available here French language) provides tips on protecting your data while in travel mode. While not specifically mentioning China, the recommendations within are all applicable.
In 2018, the Dutch Security Service reported a similar series of experiences when a Dutch trade delegation traveled to China. The security service urged travelers to only use clean devices.
Securely Travel Advice
Travel with “travel devices.” Travel devices are contain only that information which you are willing to be exposed, lost and or exploited by an adversary. Use encryption for your devices at the root level.
Have in place a travel program which includes OPSEC and counterintelligence briefings! Avail that program to all employees.
Companies or individuals who wish counsel on preparing their company and the protection of their data while in travel mode, should contact Securely Travel for both a travel briefing and request a enhanced OPSEC and counterintelligence assessment for the locales which are being visited.