Transcripts For CSPAN2 FCC Chair Ajit Pai On 5G Technology

Transcripts For CSPAN2 FCC Chair Ajit Pai On 5G Technology Competition 20240713

Good afternoon everybody. Everybody who was looking at us fruitfully and in line in the security line to going to get in, and everybody who will be watching us sometime soon on a cable network. I am jane harman, president and ceo of the boston center. Today we are prepping a very complicated issue that is, you might be doubling of policymakers, in washington and all over the world. At least three parts of that problem are, the u. S. , china, and the five g supply chain. The Wilson Center has just produced, leaving my prop. This is the prop. A spectacular policy brief by Melissa Griffith who is in the front right here. You will see her ill obit. Which is entitled, there is more to worry about than what way. I say you get the gist of this. She will explain in detail but run, dont walk. During this to get this and read it. Meanwhile, what captures the attention around 5g is the china based weight has led the way in developing the superfast networks which will power some carving car Virtual Reality and other cuttingedge Technology Since Chinese Companies are required by law to comply with information requests from Chinese Intelligence Services u. S. Officials are properly concerned that companies who want to incorporate this Chinese Technology will end up compromising the data in the data of the users. Otherwise it could be complicated for your mice to and we will talk about that. But a few more thoughts. While the mantra and he finds the last decade of Technological Developments was moved fast and pray things. Thats a suggestion from here and maybe we should say about slow down and assess things. I say thats what you will hear today. What is the problem, and what are some policy solutions that will help solve at least part of the problem. Fortunately, the Wilson Center offers policymakers and their staffers the tools to assess new technologies like five g. And the implications for your interNational Security. And for the luddites in the room if there are any. I doubt it. Our audiences are always smart. We have given around 400 samplers from capitol hill, from nearly 300 offices on capitol hill, the foundation and Technical Skills through our bipartisan and bicameral, cyber and ai, who camps. They take place each friday. Those boot camps are part of our Science Technology and innovation programs which is greatly led by that king who hiding in the hall probably. She is outside. She is hiding the quarter. Thats where she is. She directs our socalled subprogram. Science Technology Innovation program. When these labs are housed. Overall, 800 hill staffers have come here on friday. The others have gone to our Foreign Policy poster program. Who that they can learn Foreign Policy as well as we can teach it. Today, we are talking about one problem that we have talked about much here but we are delighted to welcome the man with the plan. The chairman, and the last time i saw him was in the hamptons. In a warmer period of this year and possibly less hectic than the one we are in now. But we participated in a panel and i learned a lot and we discussed them coming here. And guess what happened, he is the first fcc chairman to go viral. Thats cool. Often appearing in videos where he embraces internet means by announcing new policies. It is really cool. He joined the fellow communications greenish patient in 2012 by a present obama provider term in 2017, he was designated as chairman i President Trump good. Bipartisan love it. He is also worked at the doj and the u. S. Senate in the fccs office of general counsel and in the private sector and verizon. Today he joins me to discuss a proposal. Actually two. Which the commission will vote on on tuesday. And i wont summarize what they are because he will tell us what they are. That is my first question. And following our conversation, and audience questions, there will be a panel of really smart people will introduce themselves joining us. And one of those ive already told you is the author of this amazing site Technology Innovation program. And i guess when we call this, policy brief. Who im going to sit down of the introduce energy will have a short conversation who get your brilliant questions ready. Thank you so much. [applause] the first question is the surprise question. One of the rules for your fcc. Thank you congresswoman for the question. Before you answered though, i do want to express my gratitude to the Lesson Center for your hosting this important conversation and obviously the center some of the most important policy discussions in washington. It might be of course, there has brought much more things were important than news. I thank you personally for your your personal leadership. I found consistently on house intelligence committees as well as the other legislative assignments you have, always have a a sense of bipartisanship and the focus on the national interest. Back at you thank you. His tunic and saunas and a personal note, we actually shares might be aware the extension of having both services of cancel the subcommittee in the constitution and the Senate Judiciary committee. Obviously you cant do much Higher Grounds that i have a feeling they have a little bit of chasing to do. In order to keep up with you. Stigma chairman. Romac. Former house member who you mightve served with. But this is in a really important conversation. The critical question is often, what is five g and why does it matter. In the United States weve made in a National Priority to lead in the development and deployment of five g technologies because the two pointed out, these technologies increasingly are going to transform American Industries and transportation to help go from agriculture to education many manufacturing to shipping. Who we have done that at the fcc by incrementing what i call the five g pastime. Plan for your facilitating american superiority in five g technologies. You can find out more details about the planet fcc. Com five g but in a nutshell, that plan involves getting more spectrums into the commercial marketplace, getting the Wireless Infrastructure deployed from small cells and the other infrastructure in the future and also promoting which is critical for your curing this wireless traffic into the core of the network. Hope you had a good more detail. The metrics of success who far, but in that shell we want to advance American Leadership in five g. Knowing this connected future however comes a major challenge as you know well, which is that the attack who to speak, in terms of security is much greater. Five g will be unlike predecessor technologies like four g and three g, in that these networks will be increasingly Software Defined. As opposed to defined by hardware. That software can be located anywhere in the world. In addition to that because we are talking about gubelli is more connected devices coming online, it wont just be thought, it will be everything from refrigerators to cars. We need to ensure that security protocols are upfront as opposed to afterthefact. As of the United States government position overall, the fcc in particular, is that many say about five g security now. The early stages of this and as opposed to afterwards. When retrofitting might be prohibitively expensive if not impossible who what are the fcc doing to accommodate this interest. Two things. Voting this coming week, on a proposal that is forwardlooking and backward looking. The forwardlooking component involved what is known as a universal service fund. This is about a 9 billiondollar annual Capital Expenditure fund and the fcc overseas. The her name from the fund is distributed to telecom communities across the country primarily to support infrastructure in rural areas and underserved areas. One of the things weve proposed to do Going Forward, is to prohibit the use of the funding from being used by recipients on equipment or services that have been determined to be a National Security threat to the United States. And based in part on legislation passed by congress in a bipartisan last year, the National Authorization act, we include as an initial designation, both huawei and cte companies would be on the circle prohibited list in terms of their ways that the comedies could use his her name. Thats a forwardlooking component. The backward component is to see we understand the may be problematic equipment already in our network. Four g part networks in particular. Sore starting a conversation about understanding where that equipment might be, who is using it, but it is being used for your etc. Then also to kickstart a conversation about how the refinance the removal and the replacement of that equipment. Especially to the extent that we are talking about rural carriers that have been incorporated some of this problematic equipment. They might not have the resources on their own to be able to do that. Who in consultation with them members of hundred station and we want to make sure we have an accurate sense of where we are now. Who forwardlooking and backward looking, set of proposals that we will be voting on next week. What is the prognosis. Well pass. I totally hope it will print on a bipartisan basis, and time in which the political environment is becoming an increasingly capitalized. But what i do say in our National Security we do speak with a unified voice and my expectation based on some of the conversations ive had with my colleague, as well see some very strong bipartisan votes next week. That certainly is what we are seeing in terms of letters coming from Congress Paid members from both sides, staying what we support your efforts in this regard. Who basically this is using the u. S. Fund as a leverage to get companies to do something on a forwardlooking basis and then on the backward looking basis to trade in technology they may already purchase because there is Huawei Technology in the United States already . Thats correct. Part non Huawei Technology but the rest of world is out there enemy how do you see this in the context of a world where one Way Technology is available just about everywhere and certainly not just here. Thats right question. This part of the reason why the last several months i have been very involved with my counterparts across the United States government and going to other countries. And represent United States government on these issues and not just work that company we recognize the risk profile is or applies to any company. One understand what it is for your any company that is putting incredibly important equipment and services into our network. Who when i travel through the middle east, youre up elsewhere, has been we want to make sure we all have a common understanding of what the risk is in the best strategy to mitigate the risk and how we can Work Together to share information about how that risk is materializing. This been a conversation that is ongoing but we have had very positive feedback who far. Its an i would guess everybody agrees about the problem. Everybody wants to manage risk. But i would guess a somewhat irate. I know much less about this and you do that there are different strategies and that some countries are going to go ahead and ate a keep or buy huawei technologies. Is that fair. There are some countries that they are exploring different strategies from the United States. And her message is pretty consistent that to the extent with a security assessment, we have horse respect right to make whatever decision you want. Speaking of the United States, we do not believe this is an area where we can take those risk and hope for your less. Given the transformative five g type technologies are likely to become of the United States at least wants to make sure the five g security is aforethought opposed to an afterthought who we say very carefully about the risk profile of any equipment coming into our network. Connect certainly say that is the worthy objective but i can imagine another government staying to you, okay yes, were worried about risk profile. But our answered to that is we will make sure that our systems and you mentioned that these are software specific systems. Unlike the prior ones. On paper to understand what the differences are. No. Of the point of intersection where you can block bad guys from coming in. No smoke in the mail. Did i get this right. I am learning. But even who, what about the answered we are worried about this and we are going to fight intrusion but we say that even if we dont buy chinese based are made technology there could be intrusion from others our theory is we will just fight intrusion weather is using white technology or not. Soy offers several response to that first of course we erase the framework. Affordable to any supplier of equipment for your five G Network Equipment or services. The question is one to the degree of risk. And he pointed out in your opening remarks quite accurately to the extent that china has National Intelligence law that compels any Company Subject to its jurisdiction, to comply with the question of Chinese Intelligence Services and also prohibit as a comedy from disclosing effective the question is thirdparty such as customers of all away for your example in china or abroad that rape represents a serious risk in additionally, the ability of the host government to be able to do detect the risk in realtime. Out very well that we are not talking about just a wireless tower the need to be upgraded. Were talking about software that time, millions of lines of codes that need updated in any one of those lines are malicious could be a sector for your including malware and viruses. Does any government have the ability to police in realtime to all of those lines of code in the threepoint, i assume the answered to that is no. We certainly believe that risk is is it too great that is beyond the scope of the Government News ability to police. In the third and final. Which is related to what we often hear as well. That equipment is substantially steeper. Sometimes only problem is cheap as it ends up costing is it too much. Less in terms of our Security Risk which is something that is very difficult to for the value on. Even on its own term, even if something is 50 percent cheaper or 80 percent cheaper, after time, and you are locked into inventor, there are backdoors you have to police or other kinds of problems, over time you will end up paying the price for your making a decision at the beginning. Who we dont want any countries, certainly not her own to be bullish about this question. I get that. Other countries will have to say about that. As i understand it again from the policy paper, the wall white software is buggy did what a great word. Megan said technical term. [laughter] when anybody software me possibly buggy even if it is more expensive. Forces not based on the u. S. Government, and the uk cybersecurity report for your example, the independent researchers have examined some of the equivocal we do say that there is a difference in kind. Again, even if there were others one is the risk. Given the national raymore especially in china, both National Intelligence on the lack of the judiciary and general willingness and Chinese Government to use as leverage we see in this country this past month over basketball and a flag in the live for your users in hong kong and macau, we do have concerns that the Chinese Government would behave strategically. What if you succeed, lucky you. And then one of the, Wilson Center geniuses goes over to china and forgets to take his marathon. And take his regular phone. No chinese based technology and has found that is compromised in china, then what. Whenever i traveled by myself, given everything mayday great team about cyber hygiene and the like who we are certainly encourage any United States person traveling on government or not, to take those precautions. We take we work with the Homeland Security, National Intelligence communities agencies and others to make sure that whenever we go abroad, were taking steps necessary to protect ourselves and our fellow citizens. But mistakes are made for your their just always made. Who even with the purest of intentions and purest of technology, it still could be compromised by the chinese. Then pick another country. And we still could end up with bugs and effects workarounds, whatever. That we didnt intend to write. Absolutely and who thats why i say the issues like cyber hygiene are not just one with the fcc, is across governmental efforts is important for your anybody traveling aboard. Not to just china, anywhere. To be

© 2025 Vimarsana