A Closer Look: U.S.-China Data & Network Infrastructure

Changes in communication technologies create risks as well as opportunities as the rapid development and scale of communication technologies can increase dependency and vulnerability. [1] For example, the U.S. economy grows more slowly with a lack of adequate trade and collaboration, and China suffers severely under U.S. pressure because China currently depends on the U.S. and global markets for supplies.[2] However, the global supply chain used for telecommunications networks software and hardware, can raise security concerns including increased concern about the risks posed by the “acquisition and deployment” of communications technologies from untrustworthy suppliers. [3]

A. U.S.-China Network Infrastructure and Device Manufacturing

Despite the U.S. and China being each other’s most important trade partners, their rivalry combined with their network infrastructure and device manufacturing trade reliance, makes for a complicated relationship. [4] As the push to become the technological leader becomes greater, so too do the stakes. [5] The U.S. was the undisputed leader in 4G technology, but China is the primary supplier of 5G networking equipment and is working to expand its network technology globally.[6] More recently, China leapfrogged[7] the world with the first 6G[8] experimental satellite that launched on November 7, 2020. [9]

1.       Broadband Network Infrastructure and Software Technology

      China depends on the global supply of advanced technologies which places it at a disadvantage and vulnerable to U.S. policies. [10] However, China is quickly gaining leverage over the U.S. with its growing dominance of Huawei[11] which has evolved into the world’s largest supplier of telecom equipment.[12] Only a few other companies[13], like Nokia and Ericsson, both based in Europe, sell comparable equipment. [14] Although U.S. carriers like Sprint and Verizon have attempted to launch 5G services for customers, their networking equipment is heavily dependent on foreign suppliers.[15]  The increased demand for broadband network equipment worldwide spotlights just how much the U.S. is absent from the wireless technology industry, despite being a technology leader in other respects.[16] Moreover, it shows the downfall of a once vibrant ecosystem of American companies that formerly went neck-and-neck with the likes of Nokia and Ericsson, but it also puts a focus on Chinese companies like Huawei, whose dominance has come at the expense of U.S. networking companies. [17]

To give another perspective on Huawei’s enormous influence, “the company’s chief rivals, Nokia and Ericsson, account for 17 percent and 13 percent of the global market for telecom equipment, respectively, according to figures compiled by the research firm Dell’Oro Group.” [18] While U.S technology giants, sell switches and routers that reside in the innermost part of a carrier’s network, they do not complete in the wireless infrastructure that allows cell sites to connect with smartphones and other mobile devices. [19] “There is no U.S.-based wireless access equipment provider today that builds those solutions,” said Sandra Rivera, a senior vice president at Intel who helps guide the chipmaker’s 5G strategy. [20] It is this part of the Internet ecosystem that is increasingly important as more devices and appliances gain wireless connectivity and smart capabilities.[21]

2.       Device Manufacturing

Although China has the upper-hand when it comes to broadband network infrastructure, China’s most essential supply risk are semiconductors,[22] also known as integrated circuits or computer chips. [23] The U.S. and China may both protect and develop their own cutting-edge manufacturing capabilities, especially regarding advanced semiconductor manufacturing and 3D printing. [24] China relies on imports for 84% of its semiconductor needs.[25] In the short-term, China will most likely depend on global semiconductor supplies to put together most of their technology. [26] China comprises over half of the global semiconductor demand, but domestic manufactures can only supply around 30% of this demand, making China extremely vulnerable to changes in global supply-chain. [27]

China hope to gain semiconductor self-reliance[28] by catching up to the world’s most advanced manufacturers, but it remains years behind the U.S. [29] China wants to use 3D printing along with other manufacturing advances to become a leading supplier of high-tech components and equipment, like semiconductors. [30] However, the US, recently included semiconductor and 3D printing technologies in export restrictions because they do not want China to surpass its own technological capabilities. [31] Companies like Huawei,[32] are developing custom chips with funding from Made in China 2025[33] (MIC2025) which has been labeled as “unfair” by the current U.S. administration. [34] While this may have short-term success, China has plans for future large-scale semiconductor manufacturing, but experts say these efforts will not see success for over ten years. [35] China is aiming “to take over more and more segments of the semiconductor market,” says White House trade adviser Peter Navarro, who fears Beijing will flood the market with inexpensive products and bankrupt U.S. companies.[36]

B.      National Security & Economic Espionage

National security is increasingly a component of debates over telecommunication networks and cybersecurity. [37] Therefore, there is no surprise that the ongoing competition for technical superiority between the United States and China is partly rooted in national security concerns.[38] In recent years, China has made significant strides toward positioning itself as a leader[39] in a number of important future technologies. [40] Because the wireless technology enables a vastly larger and different class of devices to enter the wireless ecosystem, network infrastructure presents new issues of cybersecurity and also potentially far-reaching military applications. [41]

It is generally accepted that American national security depends on rapid innovation in certain security-sensitive technologies, such telecommunications.[42] This is why national security experts warn, “the U.S. and its allies cannot fall substantially behind China in 5G implementation,” raising additional concerns over China’s “monopoly” in telecommunications networking. [43] In May 2020, the President invoked his authority under the “Constitution and laws of the United States,” including IEEPA[44] and the NEA,[45] to declare a national emergency with respect to this threat. [46] President Trump then prohibited transactions with foreign countries or foreign nationals that pose “an undue risk of sabotage to or subversion” of the “maintenance of information and communications technology or services in the United States” or “otherwise pose an unacceptable risk” to the national security.[47]

1.       Huawei

It is difficult to discuss national security without mentioning Huawei. Founded in the late 1980s by Ren Zhengfei, a former engineer for the Chinese military, Huawei began as a technology supplier[48] for Chinese customers. [49] Huawei receives an abundance of resources and assistance from the Chinese government, raising concerns with American intelligence experts[50] The concerns raised are about Huawei and whether the company is an extension of the Chinese government, leveraging their infrastructure equipment for espionage or surveillance purposes, by installing covert backdoors in software, for example. [51]  With its clear competitive advantage, Huawei  has contracts all over the world despite U.S. pressures, thus many countries rely on Huawei networks. [52] President Trump has been using Huawei as a bargaining chip, further escalating tr tensions saying, “Huawei is something that is very dangerous …. It’s possible that Huawei would be included in some kind of trade deal.” [53] In February, U.S. officials further urged allies not to use Huawei equipment during bilateral meetings, at an industry conference in Barcelona. [54] U.S. officials expressed concerns that Huawei’s equipment could enable eavesdropping by authoritarian regimes.[55] Despite U.S. partners acknowledging the risk, they have asked for more concrete evidence to back up the U.S. allegations.[56] Huawei vehemently denies it is a security risk saying it is an independent firm with more than 500 carriers in over 170 nations using its technology that does not act on behalf of the Chinese government. [57]

The Trump Administration’s focus has been on the next generation of wireless technology, urging American companies to “step up” and compete to provide the next generation of high-speed, low-lag wireless services.[58] Although this ideology is noble, the execution of such reality faces a major challenge, because barely any U.S. companies manufacture the technology’s most important equipment. [59] Additionally, Huawei already provides equipment to roughly 25 percent of the U.S. smallest wireless carriers. [60] “The Rural Wireless Association, a trade group that represents 55 small carriers, estimates that it would cost its members $800 million to $1 billion to replace equipment from Huawei and ZTE, China’s other maker of networking gear.” [61]

2.       TikTok

TikTok[62] is a “globally popular video-sharing smartphone application” and has become a serious competitor to American social media platforms like Facebook, Instagram, and YouTube. [63] Like Huawei, TikTok is under increased scrutiny by the U.S. government as a potential threat to national security. [64] This is because like all technology companies doing business in China, it is subject to Chinese laws[65] that require companies operating in the country to turn over user data when asked by the government.[66] On Aug. 6, under the IEEPA, 50 U.S.C. §§1701-08,[67] [68] [69] [70] the U.S. government imposed sanctions on TikTok[71] and its parent company, ByteDance, barring all ‘transactions’ with them effective 45 days later.[72] The executive orders come on the heels of the announcement to expand the Clean Network Program in an effort to protect the nation’s telecommunications and technology infrastructure. [73] The Trump administration has cited national security threats to target the platform, accusing TikTok of “sharing American user data with the CCP, spreading disinformation that benefits the CCP, and censoring content that displeases Beijing[74].” [75] Other countries have also taken action against TikTok on the grounds of security. India banned TikTok and 50 other Chinese apps in June 2020, calling them a “threat to sovereignty and integrity.” 45[76] Although TikTok denies these claims, many security and privacy advocates are skeptical.[77]  The American Civil Liberties Union argues that “Chinese apps in particular have a reputation for grabbing more data than required to provide their services, often sending information to advertising networks … [they] are frequently far more abusive than others….”[78] However, the CIA has concluded that there is “no evidence” showing that TikTok has done so. [79] Despite this, politicians and lawmakers in several other countries including Australia,[80] Japan, and the UK have also voiced concerns about TikTok’s Chinese origin and have raised the possibility of a future ban.[81] Banning TikTok will further solidify the dominance and monopoly of American social media platforms. [82]

Taken together, these methods signal an all hands approach to curb the perceived threat to national security presented by weaknesses in the telecom technology and services infrastructure, and supply chain. [83] Some believe TikTok and other apps developed and owned by Chinese companies pose a serious security risk to the U.S. because  of China’s Cybersecurity laws that require compliance with the government requests for data. [84] Researchers often differ over how TikTok’s collection of user data compares with other social media apps and whether TikTok actually poses a distinctive threat to the privacy and security of its U.S. users.[85] Others believe that TikTok is caught up in increasing trade tensions between China and the United States and TikTok has fallen into “the crosshairs of a global technology battle” based on technology trade protectionism. [86] For Western democracies, while banning TikTok may solve national security concerns over the platform, it is only a short-sighted solution to long-term issues. [87]

The impact of the U.S.- China trade war threatens the global economy, endangers democracy, impact technological innovation and will likely cause technological bifurcation if unresolved. [88] The tumultuous relationship between the U.S and China has been referred to as the “New Cold War” in a recent New York Times editorial.[89] If the U.S.-China continue their polarizing trade wars, “[t]he world may well be headed towards a system where most commercially significant countries are pressed to align with one or another of these giants.”[90] While the damage from the trade war will have long-term repercussions, if the U.S. does not learn how to coexist in a world with a new balance of power, it will suffer the most because they have no influence in the 5G standards.[91] “It is estimated that export controls put in place by the Trump administration could cause a loss of $14 to $56 billion in sales and 18,000 to 74,000 jobs over the next five years in the U.S.” [92]  On the other hand, the trade war has “positively” impacted Chinese companies who are in the process of developing their own operating systems and semiconductors for their telecommunication devices. [93] This not only provides Chinese companies the ability to “withstand a protracted trade war longer than the U.S. would be able to, “but it also brings more Chinese products into the global marketplace. [94]


[1] Id

[2] Jackson Barkstrom, Implications of the Technology Race: What is the Technology Race; Why is it Important, (May 24, 2020), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7244942/pdf/978-3-030-39204-8_Chapter_4.pdf

[3] James Andrew Lewis, Criteria for Security and Trust in Telecommunications Networks and Services, (May 1, 2020), https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/200511_Lewis_5G_v3.pdf

[4] NETWORKING & INFO. TECH. RESEARCH & DEV. SUBCOMM., NAT’L SCI. & TECH. COUNCIL, THE NATIONAL ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT STRATEGIC PLAN (2016), https://www.nitrd.gov/pubs/national_ai _rd_strategic_plan.pdf

[5] Jackson Barkstrom, Implications of the Technology Race: What is the Technology Race; Why is it Important, (May 24, 2020), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7244942/pdf/978-3-030-39204-8_Chapter_4.pdf

[6] David Makichuk, China Leapfrogs World With First 6G Experimental Satellite, (Nov. 7, 2020) https://asiatimes.com/2020/11/china-leapfrogs-world-with-first-6g-experimental-satellite/

[7] According to a white paper published by Finland’s University of Oulu, the 6G technology is still in its infancy and must overcome several technical hurdles in basic research, hardware design, and its environmental impact before the technology becomes commercially available. Id.

[8] The 6G technology is expected to be more than 100 times faster than 5G, allowing for lossless transmission in space to achieve long-distance communications with a smaller power outputs. Id.

[9]  Id.

[10] Jackson Barkstrom, Implications of the Technology Race: What is the Technology Race; Why is it Important, (May 24, 2020), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7244942/pdf/978-3-030-39204-8_Chapter_4.pdf

[11] Huawei sells various types of technology, such as smartphones, but the bulk majority of its revenue comes from sales of equipment that moves data through broadband networks and to devices. Huawei is essential for several wireless carriers that serve sprawling, sparsely populated areas because its equipment for transmitting cell signals usually costs a lot less than other options. Brian Fung, How China’s Huawei took the Lead Over U.S. Companies in 5G Technology¸(April 10, 2019) https://www.washingtonpost.com/technology/2019/04/10/us-spat-with-huawei-explained/

[12]  Id.

[13] four companies, Sweden’s Ericsson, Finland’s Nokia and China’s Huawei and ZTE, account for two-thirds of the global market for telecom equipment, according to analyst estimates

[14] Id.

[15] Cecilia Kang, Huawei Ban Threatens Wireless Services in Rural Areas, (May 25, 2019), https://www.nytimes.com/2019/05/25/technology/huawei-rural-wireless-service.html

[16]  Brian Fung, How China’s Huawei took the Lead Over U.S. Companies in 5G Technology¸(April 10, 2019) https://www.washingtonpost.com/technology/2019/04/10/us-spat-with-huawei-explained/

[17] Id.

[18] Id.

[19] Id.

[20] Stefan Pongratz, Key Takeaways – Worldwide Telecom Equipment Market 2018, DELL’ORO GROUP (Mar. 4, 2019), https:// www.delloro.com/telecom-equipment-market-2018-2/; see also Gisela Grieger, European Parliamentary Research Serv., 5G in the EU and Chinese Telecoms Suppliers, at 1, PE 637.912 (Apr. 2019), https://www.europarl.europa.eu/Reg Data/etudes/ ATAG/2019/637912/EPRS_ATA(2019)637912_EN.pdf

[21] Id.

[22] Semiconductors perform the main processing of phones, computers, smart cars, and so on—you cannot make such devices without them—and these chips are China’s Achilles’ heel because the US, Taiwan, Korea, Japan and Europe are the only areas in the world capable of designing and manufacturing the most advanced semiconductors, that is, microprocessors

[23] Jackson Barkstrom, Implications of the Technology Race: What is the Technology Race; Why is it Important, (May 24, 2020), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7244942/pdf/978-3-030-39204-8_Chapter_4.pdf

[24] Id.

[25] Puja Tayal, China Accelerates Its Semiconductor Self-Sufficiency Efforts, (June 6, 2019), https://marketrealist.com/2019/06/china-accelerates-its-semiconductor-self-sufficiency-efforts/

[26] Jackson Barkstrom, Implications of the Technology Race: What is the Technology Race; Why is it Important, (May 24, 2020), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7244942/pdf/978-3-030-39204-8_Chapter_4.pdf

[27] China Inside: Chinese Semiconductors Will Power Artificial Intelligence. 2018. Deloitte Insights, December.

[28] Huawei, Xiaomi and Alibaba Funding are developing custom chips with funding from MIC2025.

[29] Jackson Barkstrom, Implications of the Technology Race: What is the Technology Race; Why is it Important, (May 24, 2020), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7244942/pdf/978-3-030-39204-8_Chapter_4.pdf

[30] Id.

[31] Jackson Barkstrom, Implications of the Technology Race: What is the Technology Race; Why is it Important, (May 24, 2020), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7244942/pdf/978-3-030-39204-8_Chapter_4.pdf

[32] Xiaomi and Alibaba Funding

[33] In 2015, Prime Minister Li Keqiang launched “Made in China”, an initiative which sets to modernize China’s industrial capability. This 10-year, comprehensive strategy focuses heavily on intelligent manufacturing in 10 strategic sectors and has the aim of securing China’s position as a global powerhouse in high-tech industries such as robotics, aviation, and new energy vehicles such as electric and biogas.

[34] Institute for Security and Policy, Made in China 2025¸ (June 2018),  https://isdp.eu/content/uploads/2018/06/Made-in-China-Backgrounder.pdf

[35] Jackson Barkstrom, Implications of the Technology Race: What is the Technology Race; Why is it Important, (May 24, 2020), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7244942/pdf/978-3-030-39204-8_Chapter_4.pdf

[36] Bob Davis, China’s Next Target: U.S. Microchip Hegemony, (July 27, 2017),  https://www.wsj.com/articles/chinas-next-target-u-s-microchip-hegemony-1501168303

[37] 36 Santa Clara High Tech. L.J. 369, 374-377

[38] Id.

[39] The MIC2025 2015 report identified several key technology fields, including pharmaceuticals, aerospace, information technology, and robotics, in which the Chinese government intended to make strategic pushes through policy and funding.

[40] 36 Santa Clara High Tech. L.J. 369, 374-377

[41] Id. at 372

[42] Id. at 375.

[43] Patricia Moloney Figliola, TikTok: Technology Overview and Issues, (Nov. 17, 2020) https://crsreports.congress.gov/product/pdf/R/R46543

[44]International Economic Emergency Powers Act (IEEPA) contains a broad grant of authority to declare national emergencies and to prohibit certain transactions with foreign countries or foreign nationals that pose risks to the national security of the United States. But IEEPA also contains two express limitations relevant here: the “authority granted to the President . . . does not include the authority to regulate or prohibit, directly or indirectly” either (a) the importation or exportation of “information or informational materials”; or (b) “personal communication[s], which do not involve a transfer of anything of value.” 50 U.S.C. § 1702(b)(1), (3) (emphasis added); See also Tiktok Inc. v. Trump, Civil Action No. 1:20-cv-02658 (CJN), 2020 U.S. Dist. LEXIS 177250, at *13 (D.D.C. Sep. 27, 2020)

[45] National Emergencies Act

[46] U.S. WeChat Users All. v. Trump, No. 20-cv-05910-LB, 2020 U.S. Dist. LEXIS 172816, at *10 (N.D. Cal. Sep. 19, 2020)

[47] Id.

[48] But by the early 2000s, Huawei had begun selling globally, and now does a robust business not only in network equipment but also in consumer smartphones and enterprise services. See also Brian Fung, How China’s Huawei took the Lead Over U.S. Companies in 5G Technology¸(April 10, 2019) https://www.washingtonpost.com/technology/2019/04/10/us-spat-with-huawei-explained/

[49]  Id.

[50] ARTICLE: OF MONOPOLIES AND MONOCULTURES: THE INTERSECTION OF PATENTS AND NATIONAL SECURITY, 36 Santa Clara High Tech. L.J. 369, 385

[51]  Cecilia Kang, Huawei Ban Threatens Wireless Services in Rural Areas, (May 25, 2019), https://www.nytimes.com/2019/05/25/technology/huawei-rural-wireless-service.html

[52] Jackson Barkstrom, Implications of the Technology Race: What is the Technology Race; Why is it Important, (May 24, 2020), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7244942/pdf/978-3-030-39204-8_Chapter_4.pdf

[53]  Cecilia Kang, Huawei Ban Threatens Wireless Services in Rural Areas, (May 25, 2019), https://www.nytimes.com/2019/05/25/technology/huawei-rural-wireless-service.html

[54]  Ellen Nakashima, Brian Fung, U.S. Allies Differ on Difficulty of Containing Huawei Security Threat, (March 6, 2019). https://www.washingtonpost.com/technology/2019/03/06/us-allies-are-skeptical-trump-administrations-huawei-argument/

[55]   Id.

[56]  Brian Fung, How China’s Huawei took the Lead Over U.S. Companies in 5G Technology¸(April 10, 2019) https://www.washingtonpost.com/technology/2019/04/10/us-spat-with-huawei-explained/

[57]  Cecilia Kang, Huawei Ban Threatens Wireless Services in Rural Areas, (May 25, 2019), https://www.nytimes.com/2019/05/25/technology/huawei-rural-wireless-service.html

[58] Brian Fung, How China’s Huawei took the Lead Over U.S. Companies in 5G Technology¸(April 10, 2019) https://www.washingtonpost.com/technology/2019/04/10/us-spat-with-huawei-explained/

[59]  Id.

[60]  Cecilia Kang, Huawei Ban Threatens Wireless Services in Rural Areas, (May 25, 2019), https://www.nytimes.com/2019/05/25/technology/huawei-rural-wireless-service.html

[61]  Id.

[62] TikTok  is owned by ByteDance Ltd., a privately held company headquartered in Beijing, China. Id.

[63]  Jufang Wang, From Banning to Regulating TikTok: Addressing Concerns of National Security, Privacy, and Online Harms, (October 2020), https://www.researchgate.net/publication/344584442_From_banning_to_regulating_TikTok_Addressing_concerns_of_national_security_privacy_and_online_harms

[64]  Patricia Moloney Figliola, TikTok: Technology Overview and Issues, (Nov. 17, 2020) https://crsreports.congress.gov/product/pdf/R/R46543

[65] The Cybersecurity Law of the People’s Republic of China was passed in November 2016 and went into effect in June 2017. It was updated in November 2018 by the Regulations on Internet Security Supervision and Inspection by Public Security Organs. These laws (1) strictly control online activities, (2) mandate the local storage of user data and the mandate the local storage of user data and the registration of certain network assets; and (3)allow the government to conduct onsite and remote inspection of computer networks.  The law requires Chinese companies to cooperate with government intelligence operations if so requested30 and may allow the Chinese government access to user data collected by any company doing business in China. One analyst notes that “by demanding access to any data collected and stored in China, the updated regulations force [domestic and] foreign companies based in China to comply with its investigative measures, leaving intellectual property and private information vulnerable to government abuse. Id.

[66] Id.

[67] For the purpose of this paper, only shorter statues have been included as footnotes to reference.

[68]  50 U.S.C. § 1701- Unusual and extraordinary threat; declaration of national emergency; exercise of Presidential authorities

states:

(a) Any authority granted to the President by section 203 [50 USCS § 1702] may be exercised to deal with any unusual and extraordinary threat, which has its source in whole or substantial part outside the United States, to the national security, foreign policy, or economy of the United States, if the President declares a national emergency with respect to such threat.

(b) The authorities granted to the President by section 203 [50 USCS § 1702] may only be exercised to deal with an unusual and extraordinary threat with respect to which a national emergency has been declared for purposes of this title [50 USCS §§ 1701 et seq.] and may not be exercised for any other purpose. Any exercise of such authorities to deal with any new threat shall be based on a new declaration of national emergency which must be with respect to such threat.

      50 USCS § 1701.

[69]  50 U.S.C. § 1704- Authority to issue regulations:
 

The President may issue such regulations, including regulations prescribing definitions, as may be necessary for the exercise of the authorities granted by this chapter.

 

     50 USCS § 1704.

[70] 50 U.S.C. § 1705- Penalties states:

(a)Unlawful acts

It shall be unlawful for a person to violate, attempt to violate, conspire to violate, or cause a violation of any license, order, regulation, or prohibition issued under this chapter.

(b)Civil penaltyA civil penalty may be imposed on any person who commits an unlawful act described in subsection (a) in an amount not to exceed the greater of—

      (1)  $250,000; or

      (2)  an amount that is twice the amount of the transaction that is the basis of the violation with respect to
            which the penalty is imposed.

(c)Criminal penalty

A person who willfully commits, willfully attempts to commit, or willfully conspires to commit, or aids or abets in the commission of, an unlawful act described in subsection (a) shall, upon conviction, be fined not more than $1,000,000, or if a natural person, may be imprisoned for not more than 20 years, or both.

     50 USCS § 1705.

[71] TikTok is a popular video-sharing smartphone application owned by ByteDance Ltd., a privately held company headquartered in Beijing, China.

[72] Robert Chesney, Will TikTok Win Its Lawsuit Against Trump, LAWFARE, (August 25, 2929, 9:17PM), https://www.lawfareblog.com/will-tiktok-win-its-lawsuit-against-trump

[73] Caroline E. Brown, Trump’s TikTok, WeChat Orders May Yield Different Results, Law360, (August 12, 2020), https://www.law360.com/articles/1300599

[74] Some media reports revealed that leaked TikTok documents instructed its moderators to suppress content that Beijing deemed politically sensitive. Id.

[75]  Jufang Wang, From Banning to Regulating TikTok: Addressing Concerns of National Security, Privacy, and Online Harms, (October 2020), https://www.researchgate.net/publication/344584442_From_banning_to_regulating_TikTok_Addressing_concerns_of_national_security_privacy_and_online_harms

[76] Patricia Moloney Figliola, TikTok: Technology Overview and Issues, (Nov. 17, 2020) https://crsreports.congress.gov/product/pdf/R/R46543

[77] Id.

[78]  Id.

[79]  Jufang Wang, From Banning to Regulating TikTok: Addressing Concerns of National Security, Privacy, and Online Harms, (October 2020), https://www.researchgate.net/publication/344584442_From_banning_to_regulating_TikTok_Addressing_concerns_of_national_security_privacy_and_online_harms

[80] Australia ruled out a possible ban after a security review on TikTok this August. Id.

[81] Jufang Wang, From Banning to Regulating TikTok: Addressing Concerns of National Security, Privacy, and Online Harms, (October 2020), https://www.researchgate.net/publication/344584442_From_banning_to_regulating_TikTok_Addressing_concerns_of_national_security_privacy_and_online_harms

[82] Id.

[83] Caroline E. Brown, Trump’s TikTok, WeChat Orders May Yield Different Results, Law360, (August 12, 2020), https://www.law360.com/articles/1300599

[84] Amitrajeet A. Batabyal, Rules-based Trade Made the World Rich. Trump’s Policies May Make It Poorer, (June 10, 2018), https://theconversation.com/ rules-based-trade-made-the-world-rich-trumps-policies-may-make-it-poorer-97896

[85] Id.

[86] Id.

[87]  Jufang Wang, From Banning to Regulating TikTok: Addressing Concerns of National Security, Privacy, and Online Harms, (October 2020), https://www.researchgate.net/publication/344584442_From_banning_to_regulating_TikTok_Addressing_concerns_of_national_security_privacy_and_online_harms

[88] Jackson Barkstrom, Implications of the Technology Race: What is the Technology Race; Why is it Important, (May 24, 2020), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7244942/pdf/978-3-030-39204-8_Chapter_4.pdf

[89] Id.

[90] Craig VanGrasstek, The Trade Policy of the United States Under the Trump Administration, 16 (Robert Schuman Centre for Advanced Studies Research Paper No. RSCAS 2019/11, Feb. 2019), https://ssrn.com/abstract=3330577

[91] Jackson Barkstrom, Implications of the Technology Race: What is the Technology Race; Why is it Important, (May 24, 2020), https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7244942/pdf/978-3-030-39204-8_Chapter_4.pdf

[92] Id.

[93] US-China Trade War Risks Global Technology Split, FIN. TIMES (June 12, 2019), https://www.ft.com/content/0e6c322e-8c4e-11e9-a1c1-51bf8f989972

[94] Id.

Previous
Previous

The Need For Global Data & Network Infrastructure Standards

Next
Next

U.S-China Trade Wars: The Fight for Digital Dominance