Home / News

FCC to Block China Mobile From Gaining Access to the U.S. Market

Federal Communications Commission Chairman Ajit Pai has opposed China Mobile's Application to provide telecom services in the United States. In a statement released on Wednesday, he announced: "After reviewing the evidence in this proceeding, including the input provided by other federal agencies, it is clear that China Mobile’s application to provide telecommunications services in our country raises substantial and serious national security and law enforcement risks."

— "China Mobile USA is a Delaware corporation that is indirectly and ultimately owned and controlled by the Chinese government," as stated by FCC. "China Mobile USA is an indirect but wholly-owned subsidiary of China Mobile Limited, one of the largest telecommunications companies in the world."

China Mobile filed an application on Sept. 1, 2011, to provide international facilities-based and resale telecommunications services between the U.S. and foreign destinations.

A much larger U.S. vs. China tech battle: "China could seek to retaliate against U.S. carriers who partner with Chinese providers, much as China Mobile would have partnered with American carriers in the United States," writes Brian Fung in the Washington Post.

By CircleID Reporter – CircleID's internal staff reporting on news tips and developing stories. Do you have information the professional Internet community should be aware of? Contact us. Visit Page

CircleID Newsletter The Weekly Wrap

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

VINTON CERF
Co-designer of the TCP/IP Protocols & the Architecture of the Internet

Comments

 Be the first to post a comment!

Add Your Comments

 To post your comments, please login or create an account.

Related

Topics

Whois

Sponsored byWhoisXML API

Brand Protection

Sponsored byAppdetex

Cybercrime

Sponsored byThreat Intelligence Platform

DNS Security

Sponsored byAfilias

Domain Names

Sponsored byVerisign

New TLDs

Sponsored byAfilias

Cybersecurity

Sponsored byVerisign