Feeds

Most Hong Kong iPhone 5s to be smuggled into China

Analyst reveals massive grey market racket

Security for virtualized datacentres

A whopping 70 per cent of shiny new iPhones and iPads bought in Hong Kong this year will be smuggled into China and sold on the grey market to feed the insatiable demand for all things Apple, according to analyst firm Forrester.

Beijing-based analyst Bryan Wang told The Reg that the illegal trade in the fruity tech is down to two main reasons:

“Firstly, the launch of Apple products is always one quarter later in China than Hong Kong, so consumers can only get the products from grey market and the supply is mostly from Hong Kong,” he said. ”Second, the price in Hong Kong is approximately 15-20 per cent lower than in China.”

The Reg visited Shenzhen earlier this week and found the city’s tech stores awash with Apple products.

It wasn’t possible to confirm their provenance, but many traders were taking pre-orders for iPhone 5s for delivery next week, despite a launch date for the device in China not yet being announced.

Counterfeit iPhone shop, Shenzhen, China

Counterfeit iPhone shop, Shenzen, China

The revelation that up to 70 per cent of Apple kit sold in Hong Kong will be smuggled across the border is the more surprising given that Apple has, since the last iPad launch, instituted a Reserve & Pickup system at its Hong Kong store.

Designed to foil the scalpers who pour across the border to snap up sacks full of devices to take back and sell at a profit, the system requires users to register their details with a Hong Kong ID whereupon a lottery system is used to decide who gets the chance to buy their device the following day.

However, as local site MIC Gadget reported in an exposé of the grey market this week, there are many Hong Kong locals who would like to make a bit of extra money – around HK$1,500 – HK$2,000 (£125-£170) for the iPhone 5 – by selling to a dodgy trader.

Hong Kong is something of a hub for the grey market anyway, so shipments are also flying in from Europe and the US, where they will be dispatched across the border.

It’s not just iGoods that are being bought and sold in this way to make a few entrepreneurial types rather rich, however. Here in Hong Kong there has been a clampdown of late on so-called ‘parallel traders’ buying cheaply on one side of the border and selling for a profit on the other.

More than 130 mainland Chinese were arrested this week on suspicion of violating immigration laws, The Standard reported.

The land border with China is a tempting route on which to smuggle goods given the Hong Kong MTR and Shenzhen Metro services run all the way up to the border check-point. ®

Internet Security Threat Report 2014

More from The Register

next story
TEEN RAMPAGE: Kids in iPhone 6 'Will it bend' YouTube 'prank'
iPhones bent in Norwich? As if the place wasn't weird enough
Crouching tiger, FAST ASLEEP dragon: Smugglers can't shift iPhone 6s
China's grey market reports 'sluggish' sales of Apple mobe
Sea-Me-We 5 construction starts
New sub cable to go live 2016
EE coughs to BROKEN data usage metrics BLUNDER that short-changes customers
Carrier apologises for 'inflated' measurements cockup
Comcast: Help, help, FCC. Netflix and pals are EXTORTIONISTS
The others guys are being mean so therefore ... monopoly all good, yeah?
Surprise: if you work from home you need the Internet
Buffer-rage sends Aussies out to experience road rage
EE buys 58 Phones 4u stores for £2.5m after picking over carcass
Operator says it will safeguard 359 jobs, plans lick of paint
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.