Aug 8th 2020

The Global Implications of China’s National and Cyber Security Laws

by Daniel Wagner

 

Daniel Wagner is CEO of Country Risk Solutions and author of the new book The Chinese Vortex: The Belt and Road Initiative and its Impact on the World.

 

The recent implementation of a new national security law in Hong Kong has brought to much of the world’s attention something that companies operating in  China have understood for years. The Chinese government’s 2015 National Security Law states that all information systems in China must be “secure and controllable”, which means that every company operating in China – whether domestic or foreign - is required to give the Chinese government their source code, encryption keys, and backdoor access to their computer networks in China. Hong Kong is just the tip of the iceberg. The Law has had profound implications for any Chinese company operating inside or outside of China, for their joint venture partners, and for foreign companies operating inside China.

In other words, businesses must hand the government the lifeblood of their companies and products, while also giving the CCP a free pass to spy on their networks. The Chinese government has arranged that, in order to do business in China, the information that Chinese agents once had to steal through cyberattacks are now automatically provided for the ‘privilege’ of doing business there. Incredibly, even the largest, best known, and most influential foreign companies that operate in China are doing just that.

A good example is IBM, which became the first major US tech company to agree to the new rules in 2015. IBM began delivering its technical knowledge to Chinese companies that had clearly stated their objective of replacing IBM’s markets in China. The company passed information about how to build its high-end servers and the software that runs the servers to Beijing-based Teamsun, which proudly declared its strategy to ‘absorb and then innovate’, enabling it to eliminate the capability gap between Chinese and American companies and create products that could replace those sold by companies in the US.[i]

That was not the first time IBM had done something similar. In 2014, the company sold its x86 server division to Chinese computer company Lenovo. The $2.1 billion sale included the x86 BladeCenter HT servers used in some critical US Navy systems, including its Aegis Combat System, which controlled the Navy‘s ballistic missile and air defense systems. When a business with products used in critical government and military networks reveals its code to another government, it becomes a national security issue.

The US Navy was subsequently forced to identify and purchase new servers, concerned that Chinese government agents could remotely access the systems by compromising routine maintenance. A vulnerability on Lenovo computers was subsequently discovered, which took advantage of the Lenovo System Update, leaving the door open for hackers. The servers were used by Navy assets, including its guided missile cruiser and destroyer fleets, and ballistic missile and anti-air defenses.[ii]

In 2015, Hewlett-Packard (HP) sold more than half of its networking and server operations to China, whose restrictions on foreign technology vendors pushed its banks, military, and major companies to stop buying foreign technology. HP gave up control of its then $4.5 billion business to remain in the Chinese market, selling 51% of its networking and server operations in the country to an arm of Beijing’s Tsinghua University.[iii] Presumably, the only reason HP was being allowed to remain at the time was because the Chinese government had not yet acquired what it perceived to be all of HP’s intellectual and material capital. That was 5 years ago. Multiply these examples exponentially and you begin to understand the implications of the National Security Law.

In 2017, China’s first Cybersecurity Law was enacted, which significantly increased compliance costs for multinationals, leaving them vulnerable to industrial espionage, and ultimately giving some Chinese companies an unfair advantage. While some aspects of the Law were welcomed as a milestone in much needed data privacy, it also had the effect of helping Beijing steal trade secrets and intellectual property from foreign companies. The Law is both extremely vague and exceptionally wide in scope, potentially putting companies at risk of regulatory enforcement that is not related to cybersecurity.

Among its key provisions are that:

 

·                All companies must undertake a security assessment before moving data out of China if it contains the personal information of more than half a million users or data is “likely to affect national security or social public interests”. That means that a ride sharing or food delivery service could therefore be labeled a national security risk;

 

·                “Critical infrastructure” companies must store “personal information and other important data” collected in China inside the country; and

 

·                “Important network products and services” must undergo a “national security review” before being sold in China (which is so vague that it could mean anything).

 

The Law is part of a drive by Beijing to shield Chinese data from the eyes of foreign governments. Under it, companies must introduce data protection measures—a novelty for many Chinese businesses—and data relating to the country’s citizens or national security must be held on Chinese servers. Companies must submit to a review by regulators before transferring large amounts of personal data abroad. “Critical” companies—whose designation encompasses sensitive entities such as power companies or banks, but also any company holding data that, if breached, could “harm people’s livelihoods”―must store all data collected in China within the country. These companies, and any services bought by them, must go through a “national security review” to ensure they and their data systems are “secure and controllable”.

The Law allows Beijing to demand access to computer program source code (usually known only by the software developer) and national security reviews may also permit China to delve even further into companies’ intellectual property.[iv] In conventional democracies, laws limit what companies may do with information and the extent to which governments can get their hands on it. China’s National Security and Cybersecurity Laws give the government unrestricted access to almost all personal and commercial data. The largest Chinese companies that hold data (such as Alibaba, Baidu, and Tencent) routinely obey government demands to access data.

The rest of the world’s companies and governments have to assume that any firm that is Chinese, operates in China, has access to Chinese citizens, whose information passes through China, or for which the Chinese government deems information relevant to national security is subject to these Laws, and that the government will do whatever is necessary to obtain the information they possess. That means that Huawei or any other firms that are owned or operated by Chinese private of public sector companies, or are otherwise answerable to Beijing, fall under the Laws’ guidelines from the government’s perspective.

It is time for the world’s governments and companies to wake up. Beijing’s reach is wide and deep. It is taking advantage of the West’s openness – and gaps and inconsistencies in our data protection protocols - to acquire information on all of us. The hacks on Anthem, Equifax, Marriott, and the US government are good examples of how they have already done so. American and Western companies need to take a hard look at the costs and benefits associated with operating in China and continuing to have Chinese partners. Those partners must comply with these Laws. American and Western companies that continue to operate with them may unwittingly well be aiding and abetting the Chinese government.

 

Daniel Wagner is CEO of Country Risk Solutions and author of the new book The Chinese Vortex: The Belt and Road Initiative and its Implications for the World.

This article first appeared in Diplomatic Courier.


[i] Philipp, Joshua, “CHINA SECURITY: IBM Shows Chinese Agents Its Source Code”, The Epoch Times, October 19, 2015, http://www.theepochtimes.com/n3/1881004-china-security-ibm-shows-chinese-agents-its-source-code/.

[ii] Philipp, Joshua, “US Navy Cruisers and Destroyers Look to Ditch Lenovo Servers”, The Epoch Times, May 7, 2015, http://www.theepochtimes.com/n3/1348839-us-navy-cruisers-and-destroyers-look-to-ditch-lenovo-servers/.

[iii] “HP Partners with Tsinghua to Create a Chinese Technology Powerhouse”, HP, May 21, 2015, http://www8.hp.com/us/en/hp-news/press-release.html?wireId=1950801#.WRxxM2jyvic.

[iv] Yuan Yang, “China’s Cyber Security Law Rattles Multinationals”, Financial Times, May 30, 2017, https://www.ft.com/content/b302269c-44ff-11e7-8519-9f94ee97d996.

 


This article is brought to you by the author who owns the copyright to the text.

Should you want to support the author’s creative work you can use the PayPal “Donate” button below.

Your donation is a transaction between you and the author. The proceeds go directly to the author’s PayPal account in full less PayPal’s commission.

Facts & Arts neither receives information about you, nor of your donation, nor does Facts & Arts receive a commission.

Facts & Arts does not pay the author, nor takes paid by the author, for the posting of the author's material on Facts & Arts. Facts & Arts finances its operations by selling advertising space.

 

 

Browse articles by author

More Current Affairs

Apr 14th 2009

While the President is off being the leader of the free world and trying to restore prosperity at home, someone needs to manage the blind trust of the Democratic Party before its assets dwindle like shares of Citigroup.

Apr 14th 2009

NEW YORK - Mild signs that the rate of economic contraction is slowing in the United States, China, and other parts of the world have led many economists to forecast that positive growth will return to the US in the second half of the year, and that a similar recovery w

Apr 11th 2009

Knowledge workers of all varieties are reviving the old chest-high desk as the best way to stay on their toes. Indeed, if you're having trouble keeping a clear mind when you stare at your computer screen (now, for example), maybe it's not your eyes.

Apr 9th 2009

NEW YORK - This year is likely to be the worst for the global economy since World War II, with the World Bank estimating a decline of up to 2%.

Apr 8th 2009

U.S. President Barack Obama's trip to Europe marked the culmination of a generational shift in leadership among Western democracies. The generation yielding power -- the Baby Boomers -- are so strongly connected to the 1960's that they are often called "68ers" in Europe.

Apr 8th 2009

GENEVA - Leaders of the G-20 have now declared that "the era of banking secrecy is over," and have threatened to take action against "non-cooperative jurisdictions, including tax havens." No one should include Switzerland among these, for the Swiss government has already o

Apr 8th 2009

The new Israeli government led by Likud leader Benjamin Netanyahu has raised
many conflicting feelings among those concerned about the fate of the
Arab-Israeli peace process. Will Netanyahu scuttle the little progress that was

Apr 7th 2009

It was speech that stirred my soul, both as an American and as a Muslim.

Apr 6th 2009

Long before Barack Hussein Obama was sworn in as the 44th president of the United States of America, people in Turkey had expressed a sentiment of hope about his presidency.

Apr 6th 2009

ISTANBUL - "If we can show that a big Muslim nation can modernize itself with the help of friends," former German Foreign Minister Joschka Fischer has argued on behalf of Turkey's admission to the European Union, "it demonstrates that a strong civil society, equa

Apr 5th 2009

Wall Street cheered the Geithner Plan to save the American financial system unveiled on March 23. The S & P has rallied by over 22% at this writing (April 2) since the outline was leaked in early March. Shares of selected fund management companies took off like a rocket.

Apr 4th 2009

ROME/STOCKHOLM - The ongoing global economic crisis is shaking beliefs and approaches that have long been enshrined in European policies. Indeed, the crisis is calling into question the very foundations of the European Union.

Apr 3rd 2009

In several years books will be radically different. I don't know what form they will take, but one thing for sure is that they won't be ink on paper.

Apr 3rd 2009

When Benjamin Netanyahu became Prime Minister in 1996, he ran on a platform dedicated to ending the Israeli-Palestinian peace process. That is what he said in Israel. For U.S.

Apr 2nd 2009

Today, the leaders of the world's 20 largest economies are meeting in London.

Apr 1st 2009

PARIS - Negotiations over Iran's nuclear program have been stalled for more than three years. For six years, the voices of reason have largely been drowned out, with passions and delusions claiming primacy.

Apr 1st 2009

Where's the gravitas? Where are the leaders? I know there's talk that people want to be forever young, but I'd like to make a counter-argument. If there was ever a time that the world needed some grownups (or at least some grownup behavior), it's now.

Mar 31st 2009

CAMBRIDGE - A huge struggle is brewing within the G-20 over the future of the global financial system. The outcome could impact the world - and not only the esoteric world of international finance - for decades to come.