A Looming US vs China Tech War Over Huawei

A full-on tech trade war between the United States and China just got another step closer after Washington opened an investigation into whether Huawei broke US sanctions on Iran. The US Department of Justice has already slapped tariffs on $60 billion worth of Chinese steel and aluminum, with China raising tariffs on US goods in response, but punishing Huawei could have more serious repercussions. 

Imagine the panic in US tech boardrooms if the world’s number one manufacturer of electronic components decided to ban or restrict exports to America. 

All bets are off in this new high-stakes geopolitical stand-off. In the longer term, these retaliatory measures could even accelerate China’s metamorphosis into a self-sufficient tech powerhouse. The Justice Department investigation into Huawei recalls a similar probe into whether Shenzhen rival ZTE broke US sanctions by exporting devices containing American components to Iran. 

ZTE was found guilty last year not only of breaking the sanctions, which resulted in an $892 million fine, but of breaking the settlement deal’s terms by failing to punish those involved.

The resulting seven-year ban on US firms selling to ZTE will severely hamper its growth efforts because it relies on chips and other components from the likes of Qualcomm and Micron Technology. The probe of Huawei, which is said to have been ongoing since early 2017, could result in similar punishment if the firm is found guilty of breaking sanctions. 

Washington has belatedly realised that China is supplanting the US as the world’s pre-eminent tech superpower, resulting in increasing efforts to corral the number one telecom equipment maker and third-largest smart-phone maker in the world. 
National security concerns have been used to keep Huawei down, first in 2012 when it and ZTE were de facto banned from the US telecoms infrastructure market after a damning congressional report, and more recently when AT&T and Verizon were compelled to drop plans to sell the latest Huawei smartphones, and Best Buy stopped selling its devices.

Like ZTE, Huawei could be severely restricted if it is hit with a US components ban. But Washington would likely be shooting itself in the foot with such a heavy-handed approach.

A Tech Trade War with China Looms
First, China and its new leader-for-life Xi Jinping is more than ready and willing to stand up against what it sees as unfair trade practices by the Trump administration. It has already fired back with tariffs on US food imports and will do so again if a proposed additional $100 billion in tariffs from the US goes through. 

By the same rationale, could China respond to a ban on sales of US components to Huawei by prohibiting the sale of China-made components to US tech firms? Potentially, believes China-watcher Bill Bishop. “The US-China technology war may run much hotter than the overall conflict over trade. Xi continues to make clear that China can no longer rely on foreign technology and must go all out to end its reliance on it,” he wrote in his popular Sinocism China newsletter. 

“Technology CEOs the world over with supply chain dependencies in China, so probably all of them, should be increasingly nervous and focused on their firms' efforts to have viable contingency plans for a US-China technology cold war.”

Hackers could have a head start on researching exploits that US firms have not yet caught wind of. Why does China spot security vulnerabilities quicker than the US? Beijing-based Forrester principal analyst, Charlie Dai, thinks the potential for disruption to US supply chains could be “significant.”

“It’s hard to find effective contingency plans and the only way is to have everyone, especially the US government, to realise the importance of collaboration,” he adds.

“In a world where the global supply chain and value ecosystem have already become critical drivers for the business growth of large countries like US and China, any further action like ZTE’s case will hurt the economic relationship between the US and China, which is the last thing that companies and customers want to see.”

China’s March Toward Self-Reliance
US action against Huawei could be the reminder Beijing needs that it must become self-reliant in technology to achieve its “rightful” place as the number one global superpower. This has been a goal of Xi’s for years. In fact, that’s what the controversial Made in China 2025 initiative is all about, reducing reliance on foreign suppliers.

“Heavy dependence on imported core technology is like building our house on top of someone else's walls: No matter how big and how beautiful it is, it won’t remain standing during a storm,” Xi said as far back as 2016. 

The Chinese government has already set up a fund which aims to raise up to 200 billion yuan ($31.7 billion) to back a range of domestic firms including processor designers and  equipment makers. 

Although chips are the number one target, China’s efforts to become self-sufficient in tech expand to other spheres. It has long been trying to nurture a home-grown rival to Windows, although efforts so far have not been hugely successful.
It’s not just Chinese firms the US must be wary of, according to James Lewis, SVP at the Center for Strategic and International Studies.

“The seven-year ban on US components will only encourage foreign suppliers to rush into the space vacated by US companies,” he said of the ZTE case. 

“It will reinforce the Chinese government’s desire to replace US suppliers with Chinese companies. And it will lead others to begin to make things they did not make before, causing permanent harm to the market share of US companies.”
One final word of warning to US tech CEOs: if China is looking to close the gap on technology capabilities, be prepared for a new wave of cyber-espionage attempts focused on stealing IP. 

Innovation may be the first of Xi’s “five major concepts of development,” but that hasn’t stopped the nation pilfering in epic quantities in the past to gain parity with the West.

Can China go it Alone? 
The modern technology industry is fundamentally reliant on a global network of technology development and manufacturing partnerships. The prospect of China separating itself from that ecosystem seems unlikely on the face of it.
“It’s impossible for most countries, if not all, to be self-sufficient in all tech components,” claims Forrester’s Dai. “One chip relates to many different hardware and software components. It requires continuous investments which are hard to realise in the short-term.”

That may be so, but bet against China at your peril. If any country has the resources, and now the determination to do it, it’s the Middle Kingdom.

IDG Connect:

You Might Also Read: 

Facebook Gave Chinese Tech Firms Access To User Data:

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones:

Report Claims Huawei Don’t Pose a Risk to UK Security:
 

« Aircraft Can Be Successfully Hacked In-Flight
Digital Shock: Special Report (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigiCert

DigiCert

DigiCert is the only provider of enterprise-grade SSL, IoT and PKI solutions. Our certificates are trusted everywhere, millions of times every day, by companies across the globe.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

HancomWITH

HancomWITH

Hancomwith is an information security company. We provide optimized blockchain solutions in areas including next-generation authentication, security and digital asset transaction.

Sunartek Labs

Sunartek Labs

Sunartek are equipped with expert resources and advanced technology to identify cyber threats and prevent any breach, bypassing the security network of your organization.

Allurity

Allurity

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.

Cypfer

Cypfer

CYPFER is a global market leader in ransomware post-breach remediation and cyber-attack first response.

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.

Hudson Rock

Hudson Rock

Hudson Rock’s products — Cavalier & Bayonet — are powered by our cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.