Navigation
21Vianet 2600Hz 3Com 3GPP 3Leaf 4G 4G licensing 5G Africa Alcatel Shanghai Bell Alcatel-Lucent Alibaba Android antiitrust Apple APT Satellite Arete AT&T auction backbone Baidu Bain bandwidth base station Battery broadband cable CBN CCP censorship Cfius China China brands China FTTH China hi-tech China market China media China Mobile China Mobile Hong Kong China Science China Telecom China Unicom chips Ciena Cisco civil society CNNIC Communist Party convergence copyright CSL cybersecurity Datang drones Egypt Elop Ericsson EU Facebook FDD LTE FDD-LTE feature phones Fiberhome FLAG forecasts Foxconn FTZ Galaxy S3 Google GSMA GTI handset handsets Hisilicon HKBN HKIX HKT HKTV Hong Kong HTC Huawei Hugh Bradlow Hutchison India Infinera Innovation Intel internet investment iOS iPad iPad 2 iPhone IPv6 ITU Japan KDDI KT labour shortage Leadcore low-cost smartphone LTE MAC MAE Mandiant market access Mediatek Meego Miao Wei Microsoft MIIT mobile broadband mobile cloud mobile data mobile security mobile spam mobile TV mobile web Motorola music MVNO MWC national security NDRC New Postcom Nokia Nokia Siemens Nortel NSA NTT DoCoMo OTT Pacnet Panasonic patents PCCW piracy PLA politics Potevio price war private investment Project Loon Qualcomm quantum Reach regulation Reliance Communications Ren Zhengfei Renesys RIM roaming Samsung sanctions Scania Schindler security shanzhai Sharp SKT Skype smartphones Snowden software Sony Ericsson spectrum Spreadtrum standards startups subsea cables subsidies supply chain Symbian tablets Tata Communications TCL TD LTE TD-LTE TD-SCDMA Telstra Trump Twitter urban environment USA US-China vendor financing Vitargent Vodafone New Zealand WAC WCIT Web 2.0 web freedom WeChat WhatsApp Wi-Fi Wikileaks Wimax Windows Mobile WIPO WTO Xi Guohua Xiaolingtong Xinjiang Xoom Youku YTL ZTE
« At last, a mobile spam crackdown | Main | Hong Kong TV drama »
Tuesday
Mar252014

Huawei ban is beating a path to protectionism

By the lofty standards of the NSA scandal, the revelation that it hacked not just Huawei’s servers but also its products may rank as a mere footnote.

But it sends a few more awkward questions to the agency’s inbox. Such as over the legality of planting backdoors in Huawei’s equipment. Does that enhance national security or is it unlawful over-reach?

There’s also the obvious point, made by Huawei executive William Plummer and many commentators:

“The irony is that exactly what they are doing to us is what they have always charged that the Chinese are doing through us.”

It reinforces the view of this blog that US suspicion of Huawei is a massive case of projection; the Pentagon, the CIA and the NSA fear that Huawei will do to the US what they are doing to everybody else.

In fairness, probing communications vendors, and especially those from China, the world’s most shameless cyber attacker, is a reasonable part of the NSA mission. Building backdoors is probably not.

But the NSA occupation of Huawei’s networks failed to yield any sign of an intelligence relationship with Beijing – something else this blog has previously inferred. In which case the US should allow the company to go about its business in the United States and elsewhere. 

The logic of the security state lays down a path to protectionism. This harassment of Huawei gives China the excuse to do the same to foreign companies in China. In a state-driven economy in a country held together by nationalist ideology, it doesn’t take much encouragement.

MIT’s Technology Review makes exactly that point:

But the bigger fallout may be a rise in protectionism. “It’s been mostly open competition since the beginning of the Internet, and the companies that did well are the ones that won the competitions,” says [analysts James] Lewis. Now, with escalating security worries, countries may take the chance to stack the deck against foreign competitors or build up their own industries.

PrintView Printer Friendly Version

EmailEmail Article to Friend

Reader Comments

There are no comments for this journal entry. To create a new comment, use the form below.

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Post:
 
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>