François Godement, Ashley J. Tellis
{
"authors": [
"François Godement"
],
"type": "legacyinthemedia",
"centerAffiliationAll": "dc",
"centers": [
"Carnegie Endowment for International Peace"
],
"collections": [],
"englishNewsletterAll": "asia",
"nonEnglishNewsletterAll": "",
"primaryCenter": "Carnegie Endowment for International Peace",
"programAffiliation": "AP",
"programs": [
"Asia"
],
"projects": [],
"regions": [],
"topics": [
"Technology"
]
}Source: Getty
America, 5G, and Industrial Policy
The global debate about 5G has usually taken for granted that America is almost absent from the scene. Yet America’s pullback is more of an appearance than a reality.
Source: Institut Montaigne
The global debate about 5G – Huawei’s marketing lead and the security issue, Europe’s fragmented landscape– has usually taken for granted that America is almost absent from the scene. Yet America’s pullback is more of an appearance than a reality. Yes, it is no longer the world’s maker of handheld devices, or of much hardware gear. Once a leader for standards with CDMA (after Europe’s GSM norm, now forgotten), it has not been half as present as Chinese entities – companies, public organizations and lobbying – in defining new norms for 5G inside the international standards body 3GPP. "The Valley" is not focused on complete hardware products but on software for which it obtains huge global returns, chip design and subsets that go inside others’ brands. The three telcos – AT&T, Verizon, and Sprint (instead of the 23 European companies, not counting virtual operators) - are also very profitable. But they do not build, of course.
The simmering Huawei security issue, brought to a climax by Donald Trump’s decision on May 15 to ban Huawei from U.S. telecommunications, may seem to have been a self-inflicted wound. Where Europe has two underfinanced suppliers (Ericsson and Nokia), the U.S. seemed to have none.
That perception is wrong. American software, chip design and subsets run inside almost every existing IT system – including nascent 5G networks. Rather than take risky bets over brand dominance (with the exception of Apple), the US digital industry makes itself indispensable to competitors.
This article was originally published by Institut Montaigne.
About the Author
Former Nonresident Senior Fellow, Asia Program
Godement, an expert on Chinese and East Asian strategic and international affairs, was a nonresident senior fellow in the Asia Program at the Carnegie Endowment for International Peace.
- Reorienting China Policy By Working With EuropeOther
- China at the Gates: A New Power Audit of EU-China RelationsIn The Media
François Godement, Abigaël Vasselier
Recent Work
Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.
More Work from Malcolm H. Kerr Carnegie Middle East Center
- Exporting Fossil Fuels Through Cloud ComputingCommentary
The GCC states’ use of Artificial Intelligence will generate much leverage over the global digital infrastructure and climate talks.
Camille Ammoun
- The Promise and Risks of Artificial IntelligenceCommentary
Uneven investment in the technology will widen regional inequalities in the Middle East and North Africa.
Nur Arafeh
- The Future of Cryptocurrency in the Gulf Cooperation Council CountriesArticle
The GCC states are, to varying degrees, opening up to digital finance. This is part of an effort to diversify their economies and wean themselves off U.S.-dominated monetary systems.
Ala’a Kolkaila
- How Huawei’s Localization in North Africa Delivered Mixed ReturnsPaper
Algeria and Egypt pressed China’s telecom national champion Huawei for more value-added manufacturing and technology transfers. The company responded, but it ultimately improved its brand image without engaging in meaningful capacity building.
Tin Hinane El Kadi
- Iran’s Cyber Threat: Espionage, Sabotage, and RevengeReport
Incidents involving Iran have been among the most sophisticated, costly, and consequential attacks in the history of the internet.
Collin Anderson, Karim Sadjadpour