A Looming US vs China Tech War Over Huawei

A full-on tech trade war between the United States and China just got another step closer after Washington opened an investigation into whether Huawei broke US sanctions on Iran. The US Department of Justice has already slapped tariffs on $60 billion worth of Chinese steel and aluminum, with China raising tariffs on US goods in response, but punishing Huawei could have more serious repercussions. 

Imagine the panic in US tech boardrooms if the world’s number one manufacturer of electronic components decided to ban or restrict exports to America. 

All bets are off in this new high-stakes geopolitical stand-off. In the longer term, these retaliatory measures could even accelerate China’s metamorphosis into a self-sufficient tech powerhouse. The Justice Department investigation into Huawei recalls a similar probe into whether Shenzhen rival ZTE broke US sanctions by exporting devices containing American components to Iran. 

ZTE was found guilty last year not only of breaking the sanctions, which resulted in an $892 million fine, but of breaking the settlement deal’s terms by failing to punish those involved.

The resulting seven-year ban on US firms selling to ZTE will severely hamper its growth efforts because it relies on chips and other components from the likes of Qualcomm and Micron Technology. The probe of Huawei, which is said to have been ongoing since early 2017, could result in similar punishment if the firm is found guilty of breaking sanctions. 

Washington has belatedly realised that China is supplanting the US as the world’s pre-eminent tech superpower, resulting in increasing efforts to corral the number one telecom equipment maker and third-largest smart-phone maker in the world. 
National security concerns have been used to keep Huawei down, first in 2012 when it and ZTE were de facto banned from the US telecoms infrastructure market after a damning congressional report, and more recently when AT&T and Verizon were compelled to drop plans to sell the latest Huawei smartphones, and Best Buy stopped selling its devices.

Like ZTE, Huawei could be severely restricted if it is hit with a US components ban. But Washington would likely be shooting itself in the foot with such a heavy-handed approach.

A Tech Trade War with China Looms
First, China and its new leader-for-life Xi Jinping is more than ready and willing to stand up against what it sees as unfair trade practices by the Trump administration. It has already fired back with tariffs on US food imports and will do so again if a proposed additional $100 billion in tariffs from the US goes through. 

By the same rationale, could China respond to a ban on sales of US components to Huawei by prohibiting the sale of China-made components to US tech firms? Potentially, believes China-watcher Bill Bishop. “The US-China technology war may run much hotter than the overall conflict over trade. Xi continues to make clear that China can no longer rely on foreign technology and must go all out to end its reliance on it,” he wrote in his popular Sinocism China newsletter. 

“Technology CEOs the world over with supply chain dependencies in China, so probably all of them, should be increasingly nervous and focused on their firms' efforts to have viable contingency plans for a US-China technology cold war.”

Hackers could have a head start on researching exploits that US firms have not yet caught wind of. Why does China spot security vulnerabilities quicker than the US? Beijing-based Forrester principal analyst, Charlie Dai, thinks the potential for disruption to US supply chains could be “significant.”

“It’s hard to find effective contingency plans and the only way is to have everyone, especially the US government, to realise the importance of collaboration,” he adds.

“In a world where the global supply chain and value ecosystem have already become critical drivers for the business growth of large countries like US and China, any further action like ZTE’s case will hurt the economic relationship between the US and China, which is the last thing that companies and customers want to see.”

China’s March Toward Self-Reliance
US action against Huawei could be the reminder Beijing needs that it must become self-reliant in technology to achieve its “rightful” place as the number one global superpower. This has been a goal of Xi’s for years. In fact, that’s what the controversial Made in China 2025 initiative is all about, reducing reliance on foreign suppliers.

“Heavy dependence on imported core technology is like building our house on top of someone else's walls: No matter how big and how beautiful it is, it won’t remain standing during a storm,” Xi said as far back as 2016. 

The Chinese government has already set up a fund which aims to raise up to 200 billion yuan ($31.7 billion) to back a range of domestic firms including processor designers and  equipment makers. 

Although chips are the number one target, China’s efforts to become self-sufficient in tech expand to other spheres. It has long been trying to nurture a home-grown rival to Windows, although efforts so far have not been hugely successful.
It’s not just Chinese firms the US must be wary of, according to James Lewis, SVP at the Center for Strategic and International Studies.

“The seven-year ban on US components will only encourage foreign suppliers to rush into the space vacated by US companies,” he said of the ZTE case. 

“It will reinforce the Chinese government’s desire to replace US suppliers with Chinese companies. And it will lead others to begin to make things they did not make before, causing permanent harm to the market share of US companies.”
One final word of warning to US tech CEOs: if China is looking to close the gap on technology capabilities, be prepared for a new wave of cyber-espionage attempts focused on stealing IP. 

Innovation may be the first of Xi’s “five major concepts of development,” but that hasn’t stopped the nation pilfering in epic quantities in the past to gain parity with the West.

Can China go it Alone? 
The modern technology industry is fundamentally reliant on a global network of technology development and manufacturing partnerships. The prospect of China separating itself from that ecosystem seems unlikely on the face of it.
“It’s impossible for most countries, if not all, to be self-sufficient in all tech components,” claims Forrester’s Dai. “One chip relates to many different hardware and software components. It requires continuous investments which are hard to realise in the short-term.”

That may be so, but bet against China at your peril. If any country has the resources, and now the determination to do it, it’s the Middle Kingdom.

IDG Connect:

You Might Also Read: 

Facebook Gave Chinese Tech Firms Access To User Data:

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones:

Report Claims Huawei Don’t Pose a Risk to UK Security:
 

« Aircraft Can Be Successfully Hacked In-Flight
Digital Shock: Special Report (£) »

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

Advantech

Advantech

Advantech is a leader in providing trusted innovative embedded and automation products and solutions. Activities include IoT security.

Cymulate

Cymulate

Cymulate’s advanced technology allows organizations to launch simulations of cyber attacks against themselves, exposing vulnerabilities and providing mitigation procedures to close each gap.

SafeRide Technologies

SafeRide Technologies

SafeRide is a leading provider of anomaly uncovering and cyber threat prevention solution for connected and autonomous vehicles.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Protocol 46

Protocol 46

Prortocol 46 deliver an affordable, simple, holistic cyber security solution, enabling customers to understand and mitigate cyber risk.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

Smartrev Cybersec

Smartrev Cybersec

Smartrev Cybersec is a cybersecurity niche consultancy providing specialized services for best of breed start-ups targeting Financial Institutions.