布鲁金斯学会-华为遭遇历史:1840-2021大国与电信风险(英文)-2021.3正式版.doc
《布鲁金斯学会-华为遭遇历史:1840-2021大国与电信风险(英文)-2021.3正式版.doc》由会员分享,可在线阅读,更多相关《布鲁金斯学会-华为遭遇历史:1840-2021大国与电信风险(英文)-2021.3正式版.doc(30页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、SECURITY, STRATEGY, AND ORDERMARCH 2021HUAWEI MEETS HISTORYGREAT POWERS AND TELECOMMUNICATIONS RISK, 1840-2021RUSH DOSHI AND KEVIN MCGUINESSHUAWEI MEETS HISTORYGREAT POWERS ANDTELECOMMUNICATIONS RISK, 1840-2021RUSH DOSHI AND KEVIN MCGUINESSEXECUTIVE SUMMARYIn late 2018, amid American concerns about
2、whether Canada would welcome Huawei into its telecommunications networks, Canadian Prime Minister Justin Trudeau made a series of statements that captured conventional wisdom across much of the world. “It shouldnt be a political decision,” he declared at the time, and Canada would not “let politics
3、slip into decisions” about Huaweis role in its network.1The notion that power politics could be removed from questions over telecommunications was not only optimistic, it was also out of step with the history of telecommunications. This report explores that history, and it shows how power and teleco
4、mmunications have almost always been closely linked. When states ignored those linkages and were cavalier with the security of their own networks, the results were disadvantageous and at times even disastrous.This report examines several major cases of great power competition in telecommunications d
5、ating back to the earliest inception of electrical telecommunications in the 1840s. These cases demonstrate that many of the questions policymakers confront today have close analogues to the past. While the present debate over network security and 5G infrastructure may feel new, it in fact echoes fo
6、rgotten disputes dating back to the dawn of electrical telecommunications some 150 years ago. Moreover, many of the familiar elements of telecommunications competition today such as the use of standard-setting bodies, state subsidies, cable taps, information warfare, developing country markets, and
7、encryption to gain advantage were developed more than a century ago, with important lessons for present debates.A list of these key lessons is provided below:1. Control over global telecommunications networks is a form of political power.5G networks are expected to form the foundation of a smarter,
8、connected economy linking countless devices and sensors together. Eager to build these networks worldwide, China has subsidized its 5G champion companies and projects aroundForeign Policy at Brookings | 1HUAWEI MEETS HISTORY: GREAT POWERS AND TELECOMMUNICATIONS RISK, 1840-2021telecommunications comp
9、anies and their host governments made similar promises publicly while privately breaking them and working together in both peacetime and wartime. For example, British dominance in undersea cables led the French, Germans, and Americans to advocate for keeping the lines neutral, even in war. British f
10、irms publicly declared their neutrality but in actuality deferred to British political interests, particularly at moments of great tension, and gave up neutrality entirely during periods of war. The power that comes from disrupting or intercepting rival information flows has generally been too allur
11、ing for even sincere claims of neutrality to endure.6. States often seek their own telecommunications champions once they recognize the vulnerability of relying on a competitor or adversarys firms. The United States currently lacks a major manufacturer of 5G base stations, which has prompted debates
12、 about whether it should invest in its own companies or rely on allied companies. It has also spurred disagreement over to what degree Huawei is itself a de facto state champion. These debates have some precedent. In the early 20th century, many states reliant on others for telecommunications equipm
13、ent or networks began to build their own systems. For example, Germany pushed two German companies with competing radio efforts Siemens & Halske and AEG together to establish a German alternative to British dominance in radio. Many other leading states backed companies that, while ostensibly private
14、, were intertwined with the states that supported them.7. The struggle for telecommunications standards can determine which states will wield network power, and it often requires enlisting allies and partners. States whose technology becomes the dominant standard can wield that leverage over others.
15、 The current contest over information communication technology standards is, in this way, similar to the Anglo-German contest over radio networks. Britain, through the Marconi Company which it supported, was so dominant in wireless radio that all other great powers had to pass messages through Brita
16、ins wireless network, which refused to engage with any other wireless stations. Germany ultimately found success breaking that dominance at a standard-setting body that prohibited this “non-intercommunication” policy with the help of other powers, including the United States and France a demonstrati
17、on of how similar coalitional approaches today could be used by liberal states to set or preserve favorable information and communications technology (ICT) standards if they work together.8. States turn to encryption as their communications become easier to intercept, but encryption often has limits
18、 due to determined adversaries or user error. Some argue that anxieties over Huaweis role in networks or over the general vulnerability of devices connected to the internet is ameliorated by modern encryption. These kinds of arguments have a long history. At the dawn of telecommunications a century
19、ago, the possibility that telegraph messages could be read by others who controlled network nodes, or that radio could be intercepted by passive listening equipment, led to major encryption advances that bred occasional overconfidence.Germanys complex rotor cipher machines were believed to be unbrea
20、kable, but user error and British industrial-scale efforts allowed Great Britain to compromise German codes. Low-cost updates to German equipment and ciphers could have ended Britains advantage, but Berlins overconfidence in its encryption forestalled those alterations, yielding intercepted intellig
21、ence that reshaped the course of the war. End-to-end encryption is significantly more advanced than prior efforts at encryption, but history suggests some humility is necessary.Foreign Policy at Brookings | 3HUAWEI MEETS HISTORY: GREAT POWERS AND TELECOMMUNICATIONS RISK, 1840-20219. Many states disc
22、ount the degree to which an adversary may make extraordinary efforts to compromise their networks. Amid debates over modern telecommunications, it is worth noting that states that prioritized convenience or commerce, and therefore took security shortcuts, have often been unpleasantly surprised by th
23、e efforts a determined adversary will make to compromise their networks. In World War I, Germany was surprised by the speed and ruthlessness with which Britain cut all the cables Germany used to access the outside world; similarly, Russian commanders were surprised when their radio indiscipline led
24、to a disastrous defeat at Tannenberg. In World War II, Germany did not expect the British to build a highly-centralized, industrial-scale code-breaking operation that could exploit German communications errors no matter how trivial or fleeting to break German codes.And during the Cold War, the Sovie
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 布鲁金斯 学会 华为 遭遇 历史 1840 2021 大国 电信 风险 英文 2021.3 正式版
限制150内