国产视频

In Short

The Trump Administration’s Approach to Huawei Risks Repeating China’s Mistakes

Trump
JStone / Shutterstock.com

This article in , a collaboration among , , and .

Last week, the U.S. government issued a dramatic one-two punch in its fight to manage supply chain risks in tech infrastructure and avoid Chinese companies鈥 dominance in next-generation 5G wireless networks. Both actions in their own way targeted the Chinese telecom giant Huawei, which has long been a focus of U.S. scrutiny over allegations that the Chinese government could use its products for espionage or sabotage.

First and most acutely, the Commerce Department announced that Huawei will be cut off from U.S. suppliers without special licenses and that licensing applications will be subject to the 鈥減resumption of denial.鈥 As a result, Huawei could lose access to components such as specialized microprocessors and to software, including the Android mobile operating system, which runs on the company鈥檚 thriving line of smartphones鈥攏one of which it can easily replace with non-U.S. alternatives.

Second, an executive order gave the commerce secretary and other officials broad authority to restrict U.S. tech purchases that they deem a risk to national security and linked to a 鈥渇oreign adversary.鈥 This will likely be used to ban Huawei equipment in 5G networks, but it could end up having a much broader use than that. The U.S. government has 150 days to determine exactly how that order will be implemented. What happens during that period will decide whether the order is a wise response to real cybersecurity risks or a folly that will effectively cut off the U.S. market from useful and harmless products. At the worst, it could duplicate China鈥檚 own highly problematic system for deciding which products are secure enough for Chinese use鈥攁 system that in effect uses sweeping definitions of national security as justification to block foreign competition, allowing Chinese companies to thrive.

For years, the U.S. government and industry have protested the Chinese government鈥檚 opaque regime for security reviews of technology products. Pushback accelerated in the months leading up to the release of China鈥檚 Cybersecurity Law in late 2016, as early drafts circulated among industry experts.

Within weeks of the law entering force in 2017, China published a rather obscure draft regulation called the 鈥,鈥 though it鈥檚 more commonly known as the Cybersecurity Review Regime, or CRR. Currently, the measures are in a 鈥渢rial鈥 form and require products to undergo security review if their application poses certain types of security risks. U.S. companies began referring to it as a 鈥渂lack box鈥 review, because there are no publicly known metrics or processes to pass it. In effect, the CRR means that companies do not know what they can buy and sell to whom. Reviews could kick in and affect a company, creating sunk costs and making upgrades impossible or expensive.

There is little public information about what exactly the CRR means in practice. In part, that鈥檚 because not many companies have actually gone through it yet, since the regime has not yet been widely implemented. The very existence of the regime on the books has caused alarm simply because of the threat it could be used at any point. U.S. policymakers and industry groups fear that companies could be compelled to disclose source code or corporate secrets in the process of being evaluated under the CRR. from the Ministry of Public Security even suggested that law enforcement would have authority to conduct random on-site inspections and demand remote access to corporate networks.

When the law and review regime went into effect in June 2017, few beyond China鈥檚 tech policy watchers were even aware of the debate surrounding China鈥檚 emerging cyberspace governance regime. But less than a year later, that would all change. By March 2018, the U.S. government was preparing a whole-of-government effort to take Beijing to task for all the ways that U.S. companies in China experienced an unfair playing field: cybertheft, pressure to turn over technology and intellectual property to Chinese partners, and the laws and regulations that advantage Chinese companies. Against this backdrop, the Office of the United States Trade Representative issued a nearly that ultimately provided justification for imposing tariffs on billions of dollars鈥 worth of Chinese goods by documenting all of these grievances. And it cited China鈥檚 Cybersecurity Law, which undergirds China鈥檚 review regime, as forcing U.S. firms to submit to ambiguous reviews in the name of 鈥渘ational security鈥 and 鈥渃ybersecurity.鈥 China鈥檚 black box review was a stated irritant for the United States.

The irony was not likely lost on observers in Beijing, then, that last week鈥檚 U.S. executive order used flexible language in announcing new powers to block tech transactions or require unspecified extra steps鈥攑erhaps even including security reviews鈥攊f linked to vaguely defined 鈥渇oreign adversaries.鈥 The order gives the U.S. government new authority to consider the provenance of a product or service and block transactions that could jeopardize broad public interests. It鈥檚 full of open-ended language. For instance, it targets 鈥渁n undue risk of catastrophic effects on the security or resiliency of United States critical infrastructure or the digital economy.鈥 This huge latitude鈥攚hat, indeed, counts as a catastrophic effect on the digital economy?鈥攇ives the government broad discretion, but it also risks mirroring some of the most troublesome features of China鈥檚 own regime.

First, both the Chinese regulation and the U.S. order give officials broad authority to identify the scope of their own power. The U.S. order gives the commerce secretary 鈥渄iscretion鈥 to 鈥渄esign or negotiate measures to mitigate concerns鈥 over product security, effectively granting the authority to create an entire system of procedures and rules not set out by the president or Congress. The Chinese regulation says that 鈥渢he State shall, in accordance with law, identify third party institutions鈥 to 鈥渦ndertake third party-evaluation work,鈥 leaving the players and procedures in this delegated authority up to bureaucrats.

Second, the Chinese regulation and U.S. order both enumerate some specific areas where their review process may apply, but they also include flexible catch-all language that gives officials the ability to move the goal posts based on their interpretation of 鈥渘ational security.鈥 The Chinese black box review may apply when 鈥渙ther risks that may endanger national security鈥 are at stake, while the U.S. powers apply to transactions that 鈥渙therwise pos[e] an unacceptable risk to the national security of the United States or the security and safety of United States persons.鈥

Third, the ranges of technologies or products subject to the two regimes are so broadly defined as to make it hard for many businesses to determine what is covered or reliably safe. The U.S. order says its scope covers 鈥渋nformation and communications technology or services designed, developed, manufactured, or supplied, by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary.鈥 The Chinese system鈥檚 scope includes 鈥渋mportant network products and services related to national security network and information system procurement.鈥

In both cases, further regulatory documents could give more clarity. The Chinese regime probably won鈥檛 become less opaque soon, but the U.S. order gives the government 150 days to develop policies to implement its objectives. During that time, officials would do well to remember some of the downsides of China鈥檚 own attempt to solve the problem of which equipment to trust.

China鈥檚 government has spent years developing a conceptual boundary between 鈥渟ecure and controllable鈥 or 鈥渋ndependent and controllable鈥 technologies, generally made in China, versus foreign suppliers that cannot be totally trusted鈥攕uch as the so-calledof Cisco, IBM, Google, Qualcomm, Intel, Apple, Oracle, and Microsoft that so much of China鈥檚 tech ecosystem once relied on.

Huawei鈥檚 rise is seen in China as one way to reduce China鈥檚 dependency on these foreign giants. Now, the U.S. government is beginning to draw its own line at trusting Huawei. Yet in doing so, it risks going beyond Huawei in ways that appear to parallel Beijing鈥檚 own aspirations for a 鈥.鈥

Security and national origin may be related, but they鈥檙e not the same thing. In order to accomplish important cybersecurity goals without causing unnecessary confusion or cost for businesses and consumers, the U.S. government should be targeted and transparent in laying out the scope of 鈥渇oreign adversary鈥濃揵ased IT regulations.

At least some officials seem to favor this tailored approach. Department of Homeland Security official Robert Kolasky answered industry concerns about 鈥渦nintended impacts鈥 by saying, 鈥淲e will look broadly at where there could be elements of risk 鈥 but I鈥檓 hoping we鈥檒l be able to be narrow.鈥

In the case of China鈥檚 opaque review regime, one of the top concerns among businesses is that its very secrecy gives Chinese officials room to insert politics or corruption into the IT market. Until the implementation of the U.S. order becomes clearer, similar concerns may apply to the U.S. government鈥攅specially since the issue of Huawei is so loaded.

The Trump administration has struggled to separate economic negotiations with China from its global campaign against the use of Huawei equipment for next-generation 5G wireless networks. The president has himself undermined official claims that the was a pure law enforcement matter and independent from bilateral negotiations, : 鈥淚f I think it鈥檚 good for what will be certainly the largest trade deal ever made 鈥 I would certainly intervene, if I thought it was necessary.鈥

The United States needs government attention to cybersecurity commensurate with the risks and threats that come along with advances in technology, and this order can play a part. But if its implementation allows for the appearance or reality of political entanglements, it risks undermining industry and public trust in government cybersecurity efforts far beyond the question of Huawei or China.

More 国产视频 the Authors

Graham Webster
Graham Webster1
Graham Webster

Research Scholar, Program on Geopolitics, Technology, and Governance, Stanford University

Samm Sacks
IMG-1387.jpeg
Samm Sacks

Senior Fellow, Future Security

The Trump Administration’s Approach to Huawei Risks Repeating China’s Mistakes