WASHINGTON, February 18, 2020 – Technology industry officials unloaded on what they regard as the Trump administration’s excessive measures against the Chinese company Huawei, officials said Tuesday at an Information Technology and Innovation Foundation panel on export controls.
“Unilateral actions end up hurting the very U.S. industry you are trying to protect,” said Kevin Wolf of Akin Gump Strauss Hauer and Feld.
Wolf said that export control law called for imposition upon items that are considered “essential” to national security. Wolf said that didn’t apply to Huawei gear.
The Trump administration has placed many controls on technological products that seem to have no bearing on national security, such as chips in smartphones, according to John Neuffer of SIA America.
According to Wolf, the administration has also yet to clarify the difference between “emerging” and “digital” technologies, as stated in the Export Control Reform Act passed in August 2018. The measure strengthened export controls in apparent response to the perceived threat from Chinese companies.
Robert Atkinson, president of ITIF and moderator of the panel, claimed that government officials are suffering from HDS, or “Huawei Derangement Syndrome.” Atkinson used this phrase to describe the heavy-handedness of the government in banning export of a broad array of products to China.
“As someone who used to see the intel,” chimed Wolf, who worked in intelligence prior to his current position, he is “quite sympathetic with the desire to do something” about Huawei.
That being said, the tools of export control can be “more harmful than helpful,” and he thinks this is the case now.
A humorous moment occurred when Wolf read out the following live tweets from President Trump:
In addition to garnering laughs, Wolf used the tweet to bolster his argument that the current administration has a capricious stance on Huawei. This ambiguity impairs the U.S.’s credibility and “discourage[s] nations that want to do business with the U.S.”
In response to a question about the U.S.’s efforts to prevent allied countries from adopting Huawei infrastructure, David Hanke of Arent Fox stated “if you attack the king you gotta kill the king, and it’s not clear to me that you can do that.”
The audience responded with nervous laughter.
Report Urges States, Local Governments Follow Federal Rules on Prohibited Equipment Purchases
Only a handful of states have crafted their purchasing decisions after federal rules banning certain companies’ equipment.
WASHINGTON, November 14, 2022 – A think tank is recommending state and local governments align their rules on buying technology from companies with federal guidelines that prevent agencies from purchasing certain prohibited foreign technology, such as ones from Chinese companies.
The Center for Security and Emerging Technology at Georgetown University notified the Federal Communications Commission late last month of a report released that month regarding what it said was a concerning trend of state and local governments having outdated procurement policies that are seeing them purchase equipment banned for federal purchase.
“State and local policymakers should not be expected to independently analyze and address the threats posed by foreign technology, but it would behoove them to align their own procurement practices with the rules set by the federal government,” the report recommends.
The FCC has a list of companies, as required by the Secure and Trusted Communications Networks Act of 2019, that it updates on a rolling basis through commission votes that it says pose a national security threat to the country’s networks. It last updated the list in September, when it added Pacific Network Corp. and China Unicom Operations Ltd. to the growing list that already includes Huawei and ZTE.
Chinese companies and following Communist Party directions
U.S. officials and experts have warned that Chinese companies operating anywhere in the world must follow directions of the Chinese Communist Party, which they say could mean anything from surveillance to American data falling into the hands of that government.
The report notes at least six state governments had their networks breached by a state-sponsored Chinese hacking group between May 2021 and February 2022.
The only states that have enacted local regulations aligned with federal provisions are Florida, Georgia, Louisiana, Texas, and Vermont, the report said. Provisions in Georgia and Texas prohibit private companies from entering into agreements with the covered companies. Vermont, Texas and Florida provisions block state entities from purchasing equipment from countries like China, Russia, Iran, North Korea, Cuba, Venezuela and Syria. Louisiana and Georgia provisions ban public-funded schools from buying prohibited technology.
The remaining 45 states do not explicitly target the equipment and services they produce, nor are they directly responsible for following federal provisions, the report said, leaving state entities vulnerable in obtaining equipment from third party contractors that could pose a security risk.
“Many government entities also lack the in-house technical expertise and procedures to understand and address such threats in the first place, and those that do may prioritize addressing immediate threats like ransomware over the more abstract risks posed by foreign ICTS,” the report said.
Section 889 of the 2019 National Defense Authorization Act is one out of four federal provisions addressing the issue, prohibiting federal agencies from using equipment and services from Huawei, ZTE, Hikvision, Dahua and Hytera as well as working with contractors that use the equipment.
Prohibited products finding their way in
In some cases, the report said, the listed companies will sell their products to third party contractors that are not listed on Section 889 to bypass regulations, according to the report. Due to the low cost of Chinese equipment, public schools and local governments will purchase from the third-party entities that are unknowingly selling prohibited equipment, it added.
“These ‘middle-man’ vendors can mask the origin of their products, which creates major challenges for organizations aiming to keep certain equipment and services off their networks”, the report reads.
“Currently, contractors are responsible for self-certifying that their products and internal networks do not contain covered [products]” and “… inspecting the IT infrastructure—equipment, services, and components – of every contractor that does business with the federal government would require a staggering level of resources, making it difficult for agencies to conduct effective oversight.”
FCC Orders China Telecom to Stop Providing Services in the U.S. Over National Security Concerns
The move is in line with FCC’s tough posture on national security risks emanating from China.
WASHINGTON, October 27, 2021 – The Federal Communications Commission voted Tuesday to revoke the operating authorizations of China Telecom’s U.S. subsidiary, effectively ending its ability to provide services in the country.
The company had initially challenged the process of revoking its authorizations that started last year under the Donald Trump presidency, but lost in court.
The FCC found that China Telecom Americas’ ties to the Chinese government raises “significant national security and law enforcement risks” to U.S. communications. The telecom must discontinue any services within sixty days after the order is released.
The FCC’s analysis concludes that “the present and future public interest, convenience, and necessity” is no longer served by allowing the company’s operations in the U.S. The commission found that China Telecom Americas is “subject to exploitation, influence, and control by the Chinese government and is highly likely to be forced to comply with Chinese government request without sufficient legal procedures subject to independent judicial oversight.”
The order also found that the company’s conduct toward the commission demonstrates “a lack of candor, trustworthiness, and reliability that erodes the baseline level of trust that the Commission and other U.S. government agencies require of telecommunications carriers.”
FCC Chairwoman Jessica Rosenworcel praised the vote, calling the decision to stop China Telecom “ an important and necessary step” to protecting U.S. communications infrastructure.
“This is not a decision we make lightly. It has support from each of my colleagues. It has support across the federal government,” she said. Continuing to allow China Telecom Americas to operate in the U.S. “could lead to real problems with our telecommunications networks through surveilling information, misrouting traffic, or disrupting service,” she added.
Revocation in-line with FCC focus on weeding out threats
The vote to block China Telecom’s services also comes as the FCC fields comments about its proposal to blacklist products and services that pose national security threats.
The U.S. government is also responding to China’s influence over digital services. In July, the Biden administration formally accused the Chinese government of hacking Microsoft’s email system. Digital policy experts have raised concern about how China’s use of digital tools threatens human rights agendas and democracy around the world.
Last June, the permanent subcommittee on investigations released a report finding the Chinese government engages in cyber efforts against the U.S. and may use telecommunications carriers to interfere with U.S. network systems.
The ban on China Telecom follows a Canadian order to ban another company — China Mobile — from operating in the country, citing similar national security concerns. The company, which had an agreement to resell services of telco giant Telus, was told in August that it couldn’t continue operations. The company has since filed an appeal in the federal court.
Hytera and Huawei Respond to FCC Blocking Chinese Equipment as U.S. Players React
Companies, industries, and associations chime in on FCC equipment blacklist proposal.
WASHINGTON, September 21, 2021 – Hytera, a company with ties to China that has been the subject of a national security blacklist proposal and whose partners have vouched for its innocence, said Monday that its United States radio equipment is being unfairly maligned.
Meanwhile, several key industry trade groups – including the leading wireless industry and consumer technology associations – urged a lighter-touch approach to “compliance challenges” involving Chinese companies, saying that under hardline Federal Communications Commission rules, burdens “may be passed on to consumers.”
But other U.S. advocates aren’t satisfied and want even stricter rules by the FCC to weed out alleged threats in America’s networks.
Hytera says that is has been unfairly targeted by the FCC
Hytera US, a supplier of radio equipment to emergency first responders, said in a submission to the FCC on Monday that it has been unfairly targeted because of confusion over the FCC’s authority in its blacklist, which is a product of Congress’ Secure Networks Act of 2019.
The FCC in March proposed a list of equipment and services from certain vendors from which to revoke or to deny future equipment approvals due to the “unacceptable risk” to the country’s national security. Included in the list is video surveillance and telecommunications equipment from Hytera, as well as equipment and services from Huawei, ZTE, Hangzhou Hikvision, and Dahua. Part of its process is to ask the industry for comments on its proposal.
Hytera said in its submission Monday that its radio equipment does not connect to the internet or otherwise can’t be compromised by a foreign government. And it argued Monday that the FCC only has authority to blacklist certain equipment, not paint whole entities as threats.
Hytera has said that its competitors in the radio equipment space have allegedly been using this narrative to paint it as a risky company to deal with, which has resulted in Hytera dealers suffering “greatly, losing deals, being barred from bidding for projects, being maligned.”
Hytera asks for clear distinction between radio equipment and broadband
Hytera is recommending the FCC make the distinction clear to the public and to specifically clarify that the blacklist “only includes equipment and services providing broadband service having a connection speed of at least 200 [kilobits per second] in either direction.”
Diversified and Alpha Prime have argued that Hytera radio equipment does not transmit data over the internet and so cannot be a threat under the FCC’s rules.
In a letter accompanying its submission, Hytera US vice president of sales Thomas Wineland said the FCC’s list has “destroyed our dealers’ ability to sell Hytera. Even if they can convince their customers that the two-way radios they plan to buy are not on the Covered List, the customers, in turn, answer to their bosses.
“They tell the dealer they ‘just can’t take the risk’ that the FCC will demand that Hytera equipment be removed and replaced,” he said. “They see Hytera’s name on the Covered List and choose a different manufacturer.
“Certainly this anti-competitive impact in the two-way radio marketplace was not what was contemplated in creating the Covered List,” Wineland continued. “Hytera US is a good citizen in each of its communities. It does not market broadband equipment in the US. A clarification that the Covered List reaches only broadband equipment would give Hytera the ability to neutralize the Covered List’s anti-competitive impact and allow the free market to operate.”
Huawei says FCC hasn’t shown proof its equipment is a threat
In its own submission on Monday, Huawei said the FCC has allegedly shown no evidence of a threat from its equipment, and its decision makes little sense on a cost-benefit analysis.
“The Commission has no evidence that Huawei has violated any of these rules,” the submission said. “Huawei’s equipment has been recognized by independent third parties, world leading carriers, major enterprise and industry customers as being of the highest technical quality. The identity of a manufacturer, by itself, cannot rationally be connected to any of the purposes of the equipment authorization rules.”
Huawei is one of the world’s largest telecommunications equipment manufacturers. It supplies equipment all over the world, with part of its allure being its relatively low cost.
“The rules would impose substantial costs on carriers, end-users, distributors, suppliers, and resellers of Huawei equipment,” the company said. “Revoking existing equipment authorizations and prohibiting new ones would require these United States entities to divert limited resources, threaten service quality, and increase the cost of service, without equivalent benefits.”
The company also argued that the FCC is exceeding its authority by proposing to prohibit the “importation, marketing, or sale of a company’s products based on the identity of the manufacturer without regard to the technical characteristics of a particular product.”
On the proposal, FCC Commissioner Brendan Carr said the commission, “through its current equipment authorization process, continues to approve for use in the U.S. thousands of applications from Huawei and other entities deemed national security threats.
“The FCC has approved more than 3,000 applications from Huawei alone since 2018…We are launching this proceeding with a simple and important goal in mind—to protect America’s communications networks and, in turn, our national security. The rules we propose are simple: equipment from entities that pose a national security risk will no longer be eligible for FCC approval.”
Industry associations say list could have ‘unintended consequences’
A number of associations that represent the broadband and wireless industries said in a combined submission on Monday that there could be “unintended consequences” with the proposal, including difficulty in implementation, harm to American consumers, and weaker supply chains.
Those groups include the ACT – The App Association, Consumer Technology Association, the Council to Secure the Digital Economy, the USTelecom broadband association, the Internet Association, the Information Technology Industry Council, the Telecommunications Industry Association, and the CTIA.
The CTIA said the FCC should consider more tailored approaches, including addressing “compliance challenges” and observe the costs and benefits of the proposed changes, including “burdens that may be passed on to consumers.”
The proposal “extends far beyond national security concerns, contemplating sweeping regulatory oversight of the cybersecurity features of the connected devices and systems that will drive the 5G future and beyond,” the submission added.
“Cybersecurity is best addressed through public-private partnerships and flexible, risk-based solutions, not prescriptive mandates,” it said. “Rather than duplicating the ongoing work of its federal partners, the Commission should support industry-led efforts, promote the National Institute of Standards and Technology’s leadership on voluntary and flexible guidance for [internet of things] security, and look to the Communications Security, Reliability and Interoperability Council for input.”
China Tech Threat, Blue Path Labs press FCC for more
China Tech Threat, a research institution that focuses on threats from China, and Blue Path Labs, an organization that studies China and that has clients in the federal government, filed a joint submission Monday recommending the commission broaden the list and said all information technology emanating from China is “vulnerable to that government’s intrusion.”
The submission recommends adding to the list laptop manufacturer Lenovo and memory chip maker Yangtze Memory Technologies.
“The FCC has made a good start to propose prohibiting equipment authorizations from 5 Chinese military aligned companies, but there are many more entities operating in the US which pose an unacceptable national security risk,” the submission said.
“The FCC needs to apply these restrictions to all the equipment from vulnerable Chinese government owned and military aligned entities which operate in the U.S. today, as described by the US- China Economic and Security Review Commission, the Department of Commerce Bureau of Industry and Security (BIS) Entity List, and the Department of Defense list of Communist Chinese Military Companies (CCMC).”
Co-founder of China Tech Threat, Roslyn Layton, told Broadband Breakfast following Diversified Communications plea that the ban list isn’t about Hytera per se, but what the Communist party in China requires of its companies.
Signup for Broadband Breakfast
Broadband Breakfast Research Partner
LEO Technology Could Connect the Unconnected, Although Capacity Questions Remain
Ye Suspended From Twitter, FCC Issues Licenses, Streamlining ReConnect
Jeff Miller: Tools to Manage the Next-Generation Network Buildouts
Senators Join CFTB’s Chairman in Calling for Crypto Regulation in Light of FTX Implosion
FCC December Agenda, Biden to Visit TSMC plant, Weak Economy Presents Cyber Problem
Florida, Georgia, Iowa, Minnesota, Missouri and Utah to Receive Nearly $1 Billion in American Rescue Plan Funds
States Face Roadblocks in Challenge Processes, FCC Tries to Facilitate
U.S. Must Lead on International Tech Standards to Counter Chinese Influence: Raimondo
Vermont Challenges FCC Fabric, BTX Gets President, Starlink Performance Dip
Interference Concerns with FCC Raised Over Wi-Fi in 6 GigaHertz Band
BAI Buys 1,100 Fiber Miles of Network, Workforce Training Partnership, New Executive at US Cellular
Carr Advocates Release of More Spectrum as Deadline to Extend FCC Auction Authority Looms
Report Urges States, Local Governments Follow Federal Rules on Prohibited Equipment Purchases
FCC Releases National Broadband Map Amid Controversy
Federal Communications Commission Mandates Broadband ‘Nutrition’ Labels
Senators Push Bill to Make Broadband Grants Non-Taxable By Year-End
‘It Is a Concern’: FCC Contractor Responds to Commercial Conflict Concerns Over Map Challenge Process
Concerns About Tribal Funding from NTCA, Ed Markey and Twitter Verification, T-Mobile 5G
Anniversary of Infrastructure Act, Gigi Sohn Has a Real Shot at FCC, West Haven Approves Utopia
Johnny Kampis: Federal Bureaucracy an Impediment to Broadband on Tribal Lands
Broadband Breakfast on November 30, 2022 – The 12 Days of Broadband
Small ISPs Face Economic, Incumbent Bundling Headwinds: CoBank Economist
Venture Capital, Private Equity and Institutional Investors on Digital Infrastructure Investment
Financing Mechanisms for Community Broadband, Panel 3 at Digital Infrastructure Investment
Right Track or Wrong Track on Mapping? Panel 2 at Digital Infrastructure Investment
What’s the State of the IIJA? Panel 1 at Digital Infrastructure Investment
Broadband Breakfast on December 28, 2022 – New Year Recap: Biggest Stories in Broadband
Broadband Breakfast on December 21, 2022, – Robotics, Telehealth and Future Health
Broadband Breakfast on December 14, 2022 – In the Trenches: Better Broadband for Multi-Dwelling Units
Keynote Address and Q&A at Digital Infrastructure Investment
Cybersecurity3 weeks ago
Internet of Things Devices May Provide a Weak Point for Cybersecurity, Says CableLabs
Artificial Intelligence4 weeks ago
AI Should Compliment and Not Replace Humans, Says Stanford Expert
Innovation4 weeks ago
Semiconductor Export Restrictions Could Harm U.S. Companies, Industry Says
Broadband Roundup2 weeks ago
BAI Buys 1,100 Fiber Miles of Network, Workforce Training Partnership, New Executive at US Cellular
Fiber3 weeks ago
Fiber Providers Need to Go Beyond Speed for Differentiation, Consultant Says
Funding3 weeks ago
After FCC Map Release Date, NTIA Says Infrastructure Money to Be Allocated by June 2023
Infrastructure4 weeks ago
Broadband Breakfast Releases Video Preview of Digital Infrastructure Investment–Washington
Broadband Roundup4 weeks ago
New York State Challenges Broadband Map, FCC in Space, Examining the Tribal Broadband Gap