A Looming US vs China Tech War Over Huawei

A full-on tech trade war between the United States and China just got another step closer after Washington opened an investigation into whether Huawei broke US sanctions on Iran. The US Department of Justice has already slapped tariffs on $60 billion worth of Chinese steel and aluminum, with China raising tariffs on US goods in response, but punishing Huawei could have more serious repercussions. 

Imagine the panic in US tech boardrooms if the world’s number one manufacturer of electronic components decided to ban or restrict exports to America. 

All bets are off in this new high-stakes geopolitical stand-off. In the longer term, these retaliatory measures could even accelerate China’s metamorphosis into a self-sufficient tech powerhouse. The Justice Department investigation into Huawei recalls a similar probe into whether Shenzhen rival ZTE broke US sanctions by exporting devices containing American components to Iran. 

ZTE was found guilty last year not only of breaking the sanctions, which resulted in an $892 million fine, but of breaking the settlement deal’s terms by failing to punish those involved.

The resulting seven-year ban on US firms selling to ZTE will severely hamper its growth efforts because it relies on chips and other components from the likes of Qualcomm and Micron Technology. The probe of Huawei, which is said to have been ongoing since early 2017, could result in similar punishment if the firm is found guilty of breaking sanctions. 

Washington has belatedly realised that China is supplanting the US as the world’s pre-eminent tech superpower, resulting in increasing efforts to corral the number one telecom equipment maker and third-largest smart-phone maker in the world. 
National security concerns have been used to keep Huawei down, first in 2012 when it and ZTE were de facto banned from the US telecoms infrastructure market after a damning congressional report, and more recently when AT&T and Verizon were compelled to drop plans to sell the latest Huawei smartphones, and Best Buy stopped selling its devices.

Like ZTE, Huawei could be severely restricted if it is hit with a US components ban. But Washington would likely be shooting itself in the foot with such a heavy-handed approach.

A Tech Trade War with China Looms
First, China and its new leader-for-life Xi Jinping is more than ready and willing to stand up against what it sees as unfair trade practices by the Trump administration. It has already fired back with tariffs on US food imports and will do so again if a proposed additional $100 billion in tariffs from the US goes through. 

By the same rationale, could China respond to a ban on sales of US components to Huawei by prohibiting the sale of China-made components to US tech firms? Potentially, believes China-watcher Bill Bishop. “The US-China technology war may run much hotter than the overall conflict over trade. Xi continues to make clear that China can no longer rely on foreign technology and must go all out to end its reliance on it,” he wrote in his popular Sinocism China newsletter. 

“Technology CEOs the world over with supply chain dependencies in China, so probably all of them, should be increasingly nervous and focused on their firms' efforts to have viable contingency plans for a US-China technology cold war.”

Hackers could have a head start on researching exploits that US firms have not yet caught wind of. Why does China spot security vulnerabilities quicker than the US? Beijing-based Forrester principal analyst, Charlie Dai, thinks the potential for disruption to US supply chains could be “significant.”

“It’s hard to find effective contingency plans and the only way is to have everyone, especially the US government, to realise the importance of collaboration,” he adds.

“In a world where the global supply chain and value ecosystem have already become critical drivers for the business growth of large countries like US and China, any further action like ZTE’s case will hurt the economic relationship between the US and China, which is the last thing that companies and customers want to see.”

China’s March Toward Self-Reliance
US action against Huawei could be the reminder Beijing needs that it must become self-reliant in technology to achieve its “rightful” place as the number one global superpower. This has been a goal of Xi’s for years. In fact, that’s what the controversial Made in China 2025 initiative is all about, reducing reliance on foreign suppliers.

“Heavy dependence on imported core technology is like building our house on top of someone else's walls: No matter how big and how beautiful it is, it won’t remain standing during a storm,” Xi said as far back as 2016. 

The Chinese government has already set up a fund which aims to raise up to 200 billion yuan ($31.7 billion) to back a range of domestic firms including processor designers and  equipment makers. 

Although chips are the number one target, China’s efforts to become self-sufficient in tech expand to other spheres. It has long been trying to nurture a home-grown rival to Windows, although efforts so far have not been hugely successful.
It’s not just Chinese firms the US must be wary of, according to James Lewis, SVP at the Center for Strategic and International Studies.

“The seven-year ban on US components will only encourage foreign suppliers to rush into the space vacated by US companies,” he said of the ZTE case. 

“It will reinforce the Chinese government’s desire to replace US suppliers with Chinese companies. And it will lead others to begin to make things they did not make before, causing permanent harm to the market share of US companies.”
One final word of warning to US tech CEOs: if China is looking to close the gap on technology capabilities, be prepared for a new wave of cyber-espionage attempts focused on stealing IP. 

Innovation may be the first of Xi’s “five major concepts of development,” but that hasn’t stopped the nation pilfering in epic quantities in the past to gain parity with the West.

Can China go it Alone? 
The modern technology industry is fundamentally reliant on a global network of technology development and manufacturing partnerships. The prospect of China separating itself from that ecosystem seems unlikely on the face of it.
“It’s impossible for most countries, if not all, to be self-sufficient in all tech components,” claims Forrester’s Dai. “One chip relates to many different hardware and software components. It requires continuous investments which are hard to realise in the short-term.”

That may be so, but bet against China at your peril. If any country has the resources, and now the determination to do it, it’s the Middle Kingdom.

IDG Connect:

You Might Also Read: 

Facebook Gave Chinese Tech Firms Access To User Data:

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones:

Report Claims Huawei Don’t Pose a Risk to UK Security:
 

« Aircraft Can Be Successfully Hacked In-Flight
Digital Shock: Special Report (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network (CyAN)

CyAN provides a not-for-profit platform that helps private and public organisations as well as governments to identify trusted advisors in the area of Cyber Security and Cyber Crime.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

CYSIAM

CYSIAM

CYSIAM provides world-leading expertise in offensive security and critical incident response. We train our clients to be able to protect themselves and respond to attacks and breaches when they occur.

Canonic Security

Canonic Security

Canonic streamlines app review, continuously monitors apps, and reduces the risks involved in third-party access to your data.

GetHacked.ca

GetHacked.ca

GetHackded.ca is a certified company offering penetration testing and specialized cybersecurity services.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Global Resilience Federation (GRF)

Global Resilience Federation (GRF)

GRF builds, develops and connects security information sharing communities for mutual defense.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.