Administration pushes back on IT sourcing restrictions

china flag

The Obama administration does not think new restrictions on government procurement of IT products sourced from China will benefit cybersecurity. The measure was tucked away in the continuing resolution Obama signed into law March 26, and requires NASA, the Commerce and Justice departments and the National Science Foundation to clear IT acquisitions that involve companies with supply-chain links to Chinese state-owned or state-directed firms.

White House spokeswoman Caitlin Hayden told The Hill on April 5 that, "The undefined terms of this provision will make implementation challenging." The measure, she said, "could prove highly disruptive without significantly enhancing the affected agencies' cybersecurity. While the administration has raised concerns about the cyber threats emanating from China, resolving this issue requires open dialogue between the U.S. and China."

While the White House appears to be seeking the removal of the language regarding China IT sourcing from future appropriations bills, the provision is currently the law of the land, and the government is expected to put forth rules for its implementation. A congressional staffer familiar with the issue told FCW that he had "every confidence that the law would be implemented effectively and appropriately," and said, "I hope agencies remember that it's Congress and not the White House that's responsible for their appropriations." The language in the continuing resolution was originally proposed by Rep. Frank Wolf (R-Va.) who heads the Appropriations subcommittee that funds the four agencies affected by the law. Wolf has been among the most outspoken members of Congress on the potential threat posed to U.S. interests from IT firms with strong Chinese government connections.

Industry groups are also pushing back against the rule. U.S.-China Business Council president John Frisbie urged the leadership of both parties in the Senate and the House of Representatives to reject "country-specific restrictions" in cybersecurity legislation. In an April 8 letter, Frisbie wrote, "The U.S. and Chinese government should cooperate to address cybsersecurity issues as they impact the commercial relationship, starting with one fundamental premise: commercial espionage should not be tolerated and if it is not addressed, it could undermine a constructive commercial relationship."

This underscores the complaint in an April 4 letter signed by the U.S. Chamber of Commerce, TechAmerica, and other key groups warning that the measure set "a troubling and counterproductive precedent that could have significant international repercussions and put U.S.-based global IT companies at a competitive disadvantage in global markets."

The congressional aide expects to see the language included in the 2014 version of the appropriation for the affected agencies, and that it might be extended by other appropriators. "We see it as a pilot strategy to deal with this problem," he said.

About the Author

Adam Mazmanian is executive editor of FCW.

Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy, health IT and the Department of Veterans Affairs. Prior to joining FCW, Mr. Mazmanian was technology correspondent for National Journal and served in a variety of editorial roles at B2B news service SmartBrief. Mazmanian started his career as an arts reporter and critic, and has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, Architect magazine, and other publications. He was an editorial assistant and staff writer at the now-defunct New York Press and arts editor at the online network in the 1990s, and was a weekly contributor of music and film reviews to the Washington Times from 2007 to 2014.

Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.

The Fed 100

Read the profiles of all this year's winners.


  • Shutterstock image (by wk1003mike): cloud system fracture.

    Does the IRS have a cloud strategy?

    Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

  • Shutterstock image: illuminated connections between devices.

    Who won what in EIS

    The General Services Administration posted detailed data on how the $50 billion Enterprise Infrastructure Solutions contract might be divvied up.

  • Wikimedia Image: U.S. Cyber Command logo.

    Trump elevates CyberCom to combatant command status

    The White House announced a long-planned move to elevate Cyber Command to the status of a full combatant command.

  • Photo credit: John Roman Images /

    Verizon plans FirstNet rival

    Verizon says it will carve a dedicated network out of its extensive national 4G LTE network for first responders, in competition with FirstNet.

  • AI concept art

    Can AI tools replace feds?

    The Heritage Foundation is recommending that hundreds of thousands of federal jobs be replaced by automation as part of a larger government reorganization strategy.

  • DOD Common Access Cards

    DOD pushes toward CAC replacement

    Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group