Generational Dynamics |
|
Forecasting America's Destiny ... and the World's | |
HOME WEB LOG COUNTRY STUDIES COMMENT FORUM | |
DOWNLOADS FOURTH TURNING ARCHIVE ABOUT | |
Government urges not doing business with China's Huawei and ZTE
by John J. Xenakis
This morning's key headlines from GenerationalDynamics.com
The Trump administration has issued a presidential order blocking the $117 billion proposed takeover of US-based chip maker Qualcomm Inc. by Singapore-based chip maker Broadcom Ltd. Excerpts of the order are as follows:
"There is credible evidence that leads me to believe that Broadcom Limited, a limited company organized under the laws of Singapore (Broadcom) ..., through exercising control of Qualcomm Incorporated (Qualcomm), a Delaware corporation, might take action that threatens to impair the national security of the United States. ...On the basis of the findings set forth in section 1 of this order, ... I hereby order that:
(a) The proposed takeover of Qualcomm by the Purchaser is prohibited, and any substantially equivalent merger, acquisition, or takeover, whether effected directly or indirectly, is also prohibited.
(b) All 15 individuals listed as potential candidates on the Form of Blue Proxy Card filed by Broadcom and Broadcom Corporation with the Securities and Exchange Commission on February 20, 2018 (together, the Candidates), are hereby disqualified from standing for election as directors of Qualcomm. Qualcomm is prohibited from accepting the nomination of or votes for any of the Candidates."
Broadcom said in a statement it was reviewing the order and that it "strongly disagrees that its proposed acquisition of Qualcomm raises any national security concerns."
Supporters of the proposed merger point to the fact that Broadcom was a US-based company until its headquarters moved to Singapore in 2016 because of a merger, and that it was in the process of moving its headquarters back to the U.S., partly to allay national security concerns associated with this kind of merger.
A reason that administration officials are giving for blocking the merger is that Broadcom would curtail investment in the aggressive research and development program that Qualcomm has been pursuing, particularly in 5G technology, the new technology that will substantially speed up data transfers to and from smartphones. If Qualcomm is slowed down from technology development, it would give an advantage to Qualcomm's major competitor, China-based Huawei [pronounced WAH way] Technologies Co., , the world's largest telecommunications-equipment manufacturer. So, based on this logic, the administration determined that the merger would pose a national security risk.
However, as convenient and simplistic as that explanation is, there are obviously much bigger issues. There has been growing resistance in both the White House and in Congress to allowing Chinese investments in the US and imposing tariffs on a broad range of its imports to punish Beijing for its alleged theft of intellectual property.
Theft of intellectual property is the real heart of the matter. Whether based in Singapore of the US, Broadcom has ties to several Chinese firms, most notably Huawei, the world's largest telecommunications-equipment manufacturer.
China uses every opportunity it can to force any company wanting to do business in China to make all its intellectual property available to a government-controlled company, and hence to any other Chinese company. It's feared that if Broadcom acquires Qualcomm, then China will find a way to force the merged company to turn over all its intellectual property to the Chinese government.
President Donald Trump has been extremely critical of China's trade practices well before becoming president. In the last year, Trump has killed almost a dozen attempted takeovers by foreign countries, and in all but one of the cases, the foreign country was China. In August of last year, Trump ordered an official investigation of China's practices:
U.S Trade Representative Robert Lighthizer formally initiated an investigation of China under Section 301 of the Trade Act of 1974. The investigation will seek to determine whether acts, policies, and practices of the Government of China related to technology transfer, intellectual property, and innovation are unreasonable or discriminatory and burden or restrict U.S. commerce."
This investigation is still ongoing. If the investigation finds against China, then the US could impose a number of penalties, probably triggering retaliation.
Computer chips, such as those produced by Broadcom, Qualcomm and Huawei, are used not only in desktop computers and smartphones, but also in all kinds of military devices. White House and Bloomberg and US Trade Representative (14-Aug-2017) and AP and Variety
Amazon and Best Buy are now offering a new Android smartphone, the Huawei Mate SE, with a large 5.93-inch screen and a big battery, for just $229. However, six intelligence agencies, including the CIA, FBI and NSA, are all advising Americans not to do business with Chinese firms Huawei Technologies Co. or ZTE Corp.
In February, FBI directory Christopher Wray testified:
"We're deeply concerned about the risks of allowing any company or entity that is beholden to foreign governments that don't share our values to gain positions of power inside our telecommunications networks.That provides the capacity to exert pressure or control over our telecommunications infrastructure. It provides the capacity to maliciously modify or steal information. And it provides the capacity to conduct undetected espionage."
A Huawei spokesman responded in a statement:
"Huawei is aware of a range of U.S. government activities seemingly aimed at inhibiting Huawei's business in the U.S. market. Huawei is trusted by governments and customers in 170 countries worldwide and poses no greater cybersecurity risk than any ICT vendor, sharing as we do common global supply chains and production capabilities."
Well, he's not denying that Huawei could maliciously modify and steal information, and conduct undetected espionage. So I'll take that as a "yes," the Chinese are doing exactly that. And 170 other governments are stupid enough to allow it.
I wrote about this subject back in 2012, when the House Intelligence Committee warned against doing business with Huawei and ZTE, and were warning about a "Cyberwar Pearl Harbor attack" from China. At that time, Secretary of Defense Leon Panetta warned that chips manufactured by Huawei or ZTE could be controlled remotely by the Chinese, and develop tools that could "cause panic and destruction and even the loss of life." For example, working remotely, China could "derail passenger trains or even more dangerous, derail trains loaded with lethal chemicals."
I've spent a part of my career developing chip-level operating system software for embedded systems, so I know exactly how to do what Panetta is suggesting. Furthermore, I can tell you that not only is it doable, it's not even particularly difficult for someone with the right skills.
Huawei could develop a chipset that works exactly as described in the public specifications. The chipset could be subjected to thousands of tests, and they would all work perfectly.
But what Huawei could do is install a "backdoor" into the chipset. When the chip receives, say, a secret 1024-bit code, then it will execute commands sent to it by Chinese engineers. Thus, the Chinese are then in control of any devices with Huawei or ZTE chips.
As I said, this is not only doable, it's easy to do. The "backdoor" could not be detected until an attack had been launched, and then it would be too late.
And since it CAN be done, I'm absolutely certain that it HAS been done.
Huawei was founded by Ren Zhengfei, a former Red Army engineer. China has been preparing for war with the U.S. in every possible way. They've built large, illegal military bases in the South China Sea, and repeatedly lied about them. They've developed numerous nuclear-tipped ballistic and hypersonic missile systems designed to successfully strike and destroy American aircraft carriers, American cities, and American bases. They've demonstrated a capability to destroy American communications and GPS satellites. They have thousands of missiles ready to launch against Taiwan, and they have large military deployments in western Tibet ready to invade India.
China has been preparing in every possible way for years for a successful pre-emptive military strike against the United States, and there is absolutely no doubt that they would also prepare by installing "backdoors" in all the chips and switches and other electronic devices that they sell.
Basically, any electronic device linked to a Chinese firm is under suspicion, because it's almost certain that the Chinese are preparing to use backdoors and other tools to take control of them remotely in time of war. The Broadcom acquisition of Qualcomm does not have an obvious relation to this threat, but an opening might occur in the future as Broadcom and Huawei continue to do business.
The Trump administration is using every tool it can to prevent anything that might in the future give Chinese engineers the chance to control American electronic devices. Killing attempted Chinese acquisitions of American products is one way of doing that. CNBC and Forbes and Reuters (16-Jan) and CNBC (13-Feb)
Related Articles:
(Comments: For reader comments, questions and discussion, see the 14-Mar-18 World View -- Trump blocks Broadcom acquisition of Qualcomm over national security thread of the Generational Dynamics forum. Comments may be
posted anonymously.)
(14-Mar-2018)
Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal
Web Log Summary - 2018
Web Log Summary - 2017
Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004
Web Log - December, 2018
Web Log - November, 2018
Web Log - October, 2018
Web Log - September, 2018
Web Log - August, 2018
Web Log - July, 2018
Web Log - June, 2018
Web Log - May, 2018
Web Log - April, 2018
Web Log - March, 2018
Web Log - February, 2018
Web Log - January, 2018
Web Log - December, 2017
Web Log - November, 2017
Web Log - October, 2017
Web Log - September, 2017
Web Log - August, 2017
Web Log - July, 2017
Web Log - June, 2017
Web Log - May, 2017
Web Log - April, 2017
Web Log - March, 2017
Web Log - February, 2017
Web Log - January, 2017
Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004