After Congress' report, what next for China's tech firms?
- 11 October, 2012 10:12
WASHINGTON -- There's a new television show, "Revolution," which looks at what happens to society after every piece of complex technology, including power generation, stops working. The reasons for this outage aren't explained.
Maybe it's China's fault. After years of allegedly building backdoors into equipment, something implanted by China went awry and accidentally turned off everything everywhere.
The prelude for this plotline was written by the U.S. House intelligence committee in its report Monday about Chinese telecommunications vendors Huawei Technologies and ZTE. The committee is telling private sector firms -- in a big headline on its website -- to "use another vendor" as it warns of "long-term security risks."
At the minimum, analysts believe the House intelligence report will bring more scrutiny to joint efforts and agreements by U.S. and China technology companies, but trade problems can't be ruled out either.
What is certain is that China is embedded in U.S. technology supply chains as it works to build its own competitive capacity. Huawei illustrates this, with more than $32 billion in revenue last year, with about 70% of its revenue coming from outside China, it said in testimony delivered last month to the House intelligence committee.
Lenovo, which bought IBM's PC division in 2005, may have just surpassed Hewlett-Packard as the world's top PC maker, Gartner says.
There are many firms in China that provide code development through its offshore outsourcing services, assemble and manufacturer everything from components to complete systems, including printers, PCs and servers for multinational firms.
U.S. firms, including Huawei rival Cisco, all have major R&D facilities in China.
To avoid serious problems, Gartner analyst Neil McDonald said tech firms will have to do more to ensure trust. Companies will have to offer more transparency about their operations, management, and source code and allow a full evaluation. Without it, "the lack of trust continues to grow and it continues to fragment," he said.
The House committee accused Huawei of not fully cooperating with its probe, particularly its relationship with the Chinese government, something the company disputes.
The trust issue isn't new and is something McDonald examined in a recent report on supply chains. Supply chains are easy targets and increasingly complex. "Hardware vendors are increasingly outsourcing not just manufacturing, but also design to OEM suppliers and contractors located in Asia and India. In some cases, established Asian suppliers are outsourcing to emerging economies, such as Brazil, Vietnam and Indonesia," the report said.
While this House intelligence report is ostensibly about two telecommunication firms, it includes broad assertions about the increasing sophistication and intensity of China's intelligence gathering efforts. It describes an "ongoing onslaught" of network intrusions originating in China.
Mario Mancuso, a former Under Secretary of Commerce for Industry who was a senior decision-maker on the committee that oversaw export controls of critical technologies, said: "This [House intelligence] report makes plain a simple fact -- that U.S.-China technology transactions and relationships are subject to U.S. government scrutiny generally."
"I think there is a very significant impact beyond Huawei and its prospective U.S. customers," said Mancuso, a partner at the law firm Fried Frank. For Chinese companies looking to invest in the United States, seeking to acquire U.S. assets, patents, and other tech firms, "the issues of U.S.-China technology transfer are squarely on the table. I think they are on the table in a more acute way today than they have ever been."
Darren Hayes, the Computer Information Systems Program chair at Pace University, said the House report adds a new dimension to economic espionage, and could lead to new laws that impact Chinese investment in the U.S.
Hayes said there are already some federal agencies that won't purchase some overseas telecom products because there are areas of memory that they can't access and read the code.
What happens next between the U.S. and China over this report is hard to say, but Rob Enderle, the principal analyst at the Enderle Group, said "you shouldn't assume that this problem will spread" to other companies in China.
Lenovo, for instance, "is far more expert at dealing with U.S. agencies and much of their executive team is located here not there," he said.
Lenovo is increasing its presence in the U.S., and this month announced plans to open a manufacturing plant in North Carolina. It already has operations in that state that employ about 2,000. "The announcement defies a trend that has seen electronics manufacturing jobs migrate overseas for more than two decades," said North Carolina officials in a statement.
Patrick Thibodeau covers cloud computing and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov or subscribe to Patrick's RSS feed. His e-mail address is email@example.com.
Read more about security in Computerworld's Security Topic Center.
Join the Computerworld Australia group on Linkedin. The group is open to IT Directors, IT Managers, Infrastructure Managers, Network Managers, Security Managers, Communications Managers.
- Leading insurance provider’s desktop virtualization deployment
- Forrester Report: Close The Gaps Left by Traditional Vulnerability Management Through Continuous Monitoring
- Implementing an Effective Vulnerability Management Program
- Forrester Research: Total Economic Impact Of The Management Suite
- Taking Managed Security Services to the Next Level
Turnbull asks how the NBN got that way
Vodafone launches smartphone app for encrypted calls
Thanks a million, Drupal
Optus goes over the top with VoIP service
Turnbull asks how the NBN got that way