{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T07:41:01Z","timestamp":1764229261226,"version":"3.46.0"},"reference-count":68,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T00:00:00Z","timestamp":1756080000000},"content-version":"vor","delay-in-days":236,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Japan Political Science Association"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>This paper examines the impact of formalizing informal institutions in the U.S. telecom license process. Any foreign telecom company seeking to provide services between a foreign country and the U.S. must obtain a Section 214 license from the Federal Communications Commission (FCC). In 2020, Executive Order 13913 formalized \u201cTeam Telecom,\u201d an interagency group that had previously provided informal national security advice to the FCC.The formalization has highlighted stricter regulations, such as license revocations of Chinese firms, yet its broader objectives remain largely unexamined. Therefore, this paper examines FCC license records between 1997 and 2024 to gain a deeper understanding of Team Telecom\u2019s informal and formalized reviews through a historical institutionalism approach. The findings reveal that, against the backdrop of China\u2019s global rise, the formalization has not only strengthened Team Telecom\u2019s role but has also enabled the FCC to expand its security policy purview. This conclusion draws on evidence indicating an increased likelihood of retroactive license terminations, implying that the formalization of Team Telecom was largely motivated by the need to scrutinize authorizations held by Chinese firms. Leveraging this precedent, the FCC has strategically broadened its interpretation of the foundational purpose of Section 1 of the Communications Act\u2014\u201cnational defense\u201d and \u201cpromoting safety of life and property\u201d\u2014to include security determinations. The paper argues that the formalization of Team Telecom presented an opportunity for the FCC to reinterpret its founding objectives and assert its security role with the support of Congress. This study offers a deeper understanding of new telecommunications regulations under Team Telecom and the FCC, marking a turning point in the FCC\u2019s efforts to fulfill its role as a national security regulator.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf012","type":"journal-article","created":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T19:52:47Z","timestamp":1746042767000},"source":"Crossref","is-referenced-by-count":0,"title":["What has the U.S. Government gained by formalizing Team Telecom?: Team Telecom and the FCC\u2019s dual security approach"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3758-5924","authenticated-orcid":false,"given":"Anna","family":"Oriishi","sequence":"first","affiliation":[{"name":"Institute for Information and Communications Policy, Ministry of Internal Affairs and Communications Policy Research Department, , Tokyo 100-8926 ,","place":["Japan"]}]}],"member":"286","published-online":{"date-parts":[[2025,8,25]]},"reference":[{"volume-title":"Accountability and Oversight of the Federal Communications Commission: Hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce","year":"2019","author":"Committee on Energy and Commerce. Subcommittee on Communications and Technology","key":"2025112702372883300_bib1"},{"key":"2025112702372883300_bib2","first-page":"113","article-title":"Huawei, 5G networks, and digital geopolitics","volume":"2","author":"Tekir","year":"2020","journal-title":"International Journal of Politics and Security"},{"key":"2025112702372883300_bib3","article-title":"Huawei Technologies v. FCC & USA, 2 F.4th 421 (5th Cir. 2021)"},{"article-title":"47 U.S.C. \u00a7 151\u2013U.S. Code\u2014Unannotated Title 47. Telecommunications \u00a7 151. Purposes of chapter; \u2009Federal Communications Commission created","year":"1934","author":"FCC","key":"2025112702372883300_bib4"},{"volume-title":"FCC Homeland Security Liaison Activities","year":"2012","author":"FCC","key":"2025112702372883300_bib5"},{"volume-title":"China Mobile International (USA) Inc. Application for Global Facilities-Based and Global Resale International Telecommunications Authority Pursuant to Section 214 of the Communications Act of 1934","year":"2019","author":"FCC","key":"2025112702372883300_bib6"},{"year":"2020","key":"2025112702372883300_bib7","article-title":"Exec. Order No. 13913, 85 F.R. 19643, Establishing the committee for the assessment of foreign participation in the United States telecommunications services sector"},{"volume-title":"Process Reform for Executive Branch Review of Certain FCC Applications and Petitions Involving Foreign Ownership","year":"2020","author":"FCC","key":"2025112702372883300_bib8"},{"volume-title":"Reply comments of the Secretary of Defense in the matter of 1998 biennial regulatory review\u2014Review of international common carrier regulations","year":"1998","author":"FCC","key":"2025112702372883300_bib9"},{"volume-title":"Analysis: How Team Telecom Can Conduct Faster Reviews in No-risk Cases","year":"2023","author":"Plotinsky","key":"2025112702372883300_bib10"},{"volume-title":"Chairwoman Rosenworcel at Center for Strategic & International Studies","year":"2023","author":"FCC","key":"2025112702372883300_bib11"},{"key":"2025112702372883300_bib13","first-page":"100","article-title":"Globalization task force report","author":"NSTAC","year":"2000"},{"key":"2025112702372883300_bib14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/1372284","article-title":"The communications act policy toward competition: a failure to communicate","volume":"1978","author":"Loeb","year":"1978","journal-title":"Duke Law Journal"},{"volume-title":"Foreign Ownership Restrictions in Communications and \u2018Cultural\u2019 Trade: National Security Implications","year":"1996","author":"DiPaolo","key":"2025112702372883300_bib15"},{"key":"2025112702372883300_bib16","first-page":"567","article-title":"The likely regulators? An analysis of FCC jurisdiction over cybersecurity","volume":"66","author":"Sherling","year":"2014","journal-title":"Federal Communications Law Journal"},{"volume-title":"A Comparative Analysis of Team Telecom Review","year":"2016","author":"Fitzgerald","key":"2025112702372883300_bib17"},{"key":"2025112702372883300_bib18","first-page":"139","article-title":"Regulation of foreign direct investment and the CFIUS review process: the Ralls case (in Japanese)","volume":"27","author":"Watai","year":"2013","journal-title":"Keio Law\u00a0Journal"},{"key":"2025112702372883300_bib19","first-page":"243","article-title":"Administrative procedures as instruments of political control","volume":"3","author":"McCubbins","year":"1987","journal-title":"Journal of Law, Economics, & Organization"},{"key":"2025112702372883300_bib20","first-page":"211","article-title":"Pooling powers","volume":"115","author":"Renan","year":"2015","journal-title":"Columbia Law Review"},{"key":"2025112702372883300_bib21","first-page":"1763","article-title":"A tale of two statutes","volume":"118","author":"Berg","year":"2018","journal-title":"Columbia Law Review"},{"key":"2025112702372883300_bib22","first-page":"45","article-title":"The reality of economic statecraft under the Trump administration: the case of the regulation of inward FDI in the US(in Japanese)","volume":"205","author":"Suginohara","year":"2022","journal-title":"International Relations"},{"key":"2025112702372883300_bib23","first-page":"549","article-title":"National security creep in corporate transactions","volume":"123","author":"Eichensehr","year":"2023","journal-title":"Columbia Law Review"},{"volume-title":"Foreign Direct Investment and National Security: Regulatory Challenges for the US and Japan (in Japanese)","year":"2013","author":"Watai","key":"2025112702372883300_bib24"},{"key":"2025112702372883300_bib25","first-page":"107","article-title":"The revival of administrative control theory\u00a0(in Japanese)","volume":"30","author":"Kazama","year":"1995","journal-title":"The annuals of the Japanese Society for Public Administration"},{"key":"2025112702372883300_bib26","doi-asserted-by":"publisher","first-page":"936","DOI":"10.1111\/j.1467-9248.1996.tb00343.x","article-title":"Political science and the three new institutionalisms","volume":"44","author":"Hall","year":"1996","journal-title":"Political Studies"},{"key":"2025112702372883300_bib27","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1146\/annurev.polisci.11.060606.135342","article-title":"Discursive institutionalism: the explanatory power of ideas and discourse","volume":"11","author":"Schmidt","year":"2008","journal-title":"Annual Review of Political Science"},{"key":"2025112702372883300_bib28","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511808678","volume-title":"Institutions, Institutional Change and Economic Performance","author":"North","year":"1990"},{"author":"FCC","key":"2025112702372883300_bib29","article-title":"International Communications Filing Systems FCC LIST. U.S. Federal Communications Commission"},{"article-title":"Rules and policies on foreign participation in the U.S. telecommunications market and market entry and regulation of foreign-affiliated entities","year":"1997","author":"FCC","key":"2025112702372883300_bib30"},{"article-title":"File No. ITC-214-20040920-00370. U.S. Federal Communications Commission (filed September20, 2004)","year":"2004","author":"FCC","key":"2025112702372883300_bib31"},{"volume-title":"China and the Future of Globalization: Hearings Before the U.S.-China Economic and Security Review Commission","year":"2005","author":"U.S.\u2013China Economic and Security Review Commission","key":"2025112702372883300_bib32"},{"article-title":"PETITION submitted by DHS\/DOJ\/ FBI petition to adopt conditions and letter of assurances","year":"2008","author":"FCC","key":"2025112702372883300_bib33"},{"key":"2025112702372883300_bib34","first-page":"214","article-title":"Innovative Governance Models for emerging technologies","volume-title":"Network Security Agreements: Communications Technology Governance by Other Means","author":"Abbott","year":"2013"},{"key":"2025112702372883300_bib35","first-page":"229","article-title":"Innovative Governance Models for Emerging Technologies","volume-title":"Network Security Agreements: Communications Technology Governance by Other Means","author":"Abbott","year":"2013"},{"article-title":"World trade transformed with the rise of China","year":"2011","author":"Chi\u00a0Hung","key":"2025112702372883300_bib36"},{"key":"2025112702372883300_bib37","first-page":"391","article-title":"Detect, disrupt, deter: a whole-of-government approach to national security cyber threats","author":"Carlin","year":"2016","journal-title":"Harvard National Security Journal"},{"article-title":"Experts detailed how China Telecom used BGP hijacking to redirect traffic worldwide","year":"2018","author":"Paganini","key":"2025112702372883300_bib38"},{"key":"2025112702372883300_bib39","doi-asserted-by":"publisher","DOI":"10.5038\/2378-0789.3.1.1050","article-title":"China\u2019s Maxim\u2014leave no access point unexploited: the hidden story of China Telecom\u2019s BGP hijacking","volume":"3","author":"Demchak","year":"2018","journal-title":"MCA"},{"volume-title":"The Digital Silk Road","year":"2021","author":"Hillman","key":"2025112702372883300_bib40"},{"volume-title":"President Trump Formalizes Team Telecom Process for Reviewing Foreign Investments in U.S. Telecommunications Market","year":"2020","author":"Bressie","key":"2025112702372883300_bib41"},{"article-title":"Letter from Senator Kyl et al. to Honorable Timothy Geithner, U.S. Sec\u2019y of Treasury, et al. Federal Communications Commission","year":"2010","author":"FCC","key":"2025112702372883300_bib42"},{"volume-title":"Cybersecurity: An Examination of the Communications Supply Chain: Hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce","year":"2013","author":"Committee on Energy and Commerce. Subcommittee on Communications and Technology","key":"2025112702372883300_bib43"},{"volume-title":"FY2011 Performance Budget","year":"2011","author":"National Security Division","key":"2025112702372883300_bib45"},{"article-title":"Kurtis J. Kintzel, Keanan Kintzel, and all entities by which they do business before the Federal Communications Commission\/Resellers of Telecommunications Services","year":"2007","author":"FCC","key":"2025112702372883300_bib46"},{"article-title":"Notice of Ex Parte Presentation China Mobile International (USA) Inc. File No. 1TC-214-20110901-00289","year":"2013","author":"FCC","key":"2025112702372883300_bib47"},{"article-title":"China Mobile International (USA) Inc. application for global facilities-based and global resale international telecommunications authority pursuant to section 214 of the communications act of 1934 (Memorandum Opinion and Order, FCC-19-38)","year":"2019","author":"FCC","key":"2025112702372883300_bib48"},{"volume-title":"Oversight of the Federal Communications Commission: Hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce","year":"2018","author":"Committee on Energy and Commerce. Subcommittee on Communications and Technology","key":"2025112702372883300_bib49"},{"volume-title":"White House Mulls \u2018Team Telecom\u2019 Executive Order","year":"2019","author":"Hatch","key":"2025112702372883300_bib51"},{"article-title":"Letter from The Honorable Charles Schumer and Tom Cotton to Ajit Pai Chairman","year":"2019","author":"FCC","key":"2025112702372883300_bib52"},{"article-title":"Chairman Pai's Response to Senator Schumer Regarding Chinese Telecommunications Companies","year":"2019","author":"FCC","key":"2025112702372883300_bib53"},{"key":"2025112702372883300_bib54","article-title":"Article 10 of the Executive Order 13913 stipulates that Team Telecom\u2019s discretionary actions following its formalization shall be based on \u201crelevant authority not described in this order.\u201d In practical terms, this implies that Team Telecom continues to operate by leveraging the regulatory authority of the FCC, rather than being vested with independent statutory powers"},{"article-title":"President Creates Regime for Federal Review of Foreign Telecom Transactions","year":"2020","author":"Brown","key":"2025112702372883300_bib55"},{"volume-title":"Process Reform for Executive Branch Review of Certain FCC Applications and Petitions Involving Foreign Ownership","year":"2020","author":"FCC","key":"2025112702372883300_bib56"},{"article-title":"Assistant attorney general for national security John C. Demers delivers keynote at ACI\u2019s sixth national conference on CFIUS: Compliance and enforcement","year":"2020","author":"National Security Division","key":"2025112702372883300_bib57"},{"volume-title":"FY2022 Performance Budget","year":"2021","author":"National Security Division","key":"2025112702372883300_bib58"},{"volume-title":"Statement for the Record on the Worldwide Threat Assessment of the U.S. Intelligence Community","year":"2019","author":"Coats","key":"2025112702372883300_bib59"},{"article-title":"Reply Comments of China Unicom (Americas) Operations Limited GN Docket No. 20-110, ITC-214-20020728-00361 and ITC-214- 20020724-00427","year":"2020","author":"FCC","key":"2025112702372883300_bib60"},{"volume-title":"Threats to U.S. Networks: Oversight of Chinese Government-Owned Carriers","year":"2020","author":"Portman","key":"2025112702372883300_bib61"},{"key":"2025112702372883300_bib62"},{"article-title":"Pacific Networks Corp. and ComNet (USA) LLC Order on Revocation and Termination (Order on Revocation and Termination, FCC 22-22)","year":"2022","author":"FCC","key":"2025112702372883300_bib63"},{"volume-title":"Commerce, Justice, Science, and Related Agencies Appropriations for Fiscal Year 2021","year":"2020","author":"Subcommittee on Communications and Technology","key":"2025112702372883300_bib64"},{"volume-title":"Commerce, Justice, Science, and Related Agencies Appropriations for Fiscal Year 2021","year":"2020","author":"Committee on Energy and Commerce. Subcommittee on Communications and Technology","key":"2025112702372883300_bib65"},{"volume-title":"Revised Procedure for State Department Review of Subcable Applications","year":"2022","author":"FCC","key":"2025112702372883300_bib66"},{"volume-title":"FCC Proposes $660K Fine Against Truphone in Foreign Ownership Case","year":"2022","author":"FCC","key":"2025112702372883300_bib67"},{"volume-title":"Proposes Periodic Reviews of International Telecom Authorizations. U.S. Federal Communications Commission","year":"2023","author":"FCC","key":"2025112702372883300_bib68"},{"article-title":"Chairwoman Proposes Periodic National Security Sec. 214 Reviews","year":"2023","author":"FCC","key":"2025112702372883300_bib70"},{"volume-title":"Oversight of the Federal Communications Commission: Hearing before the Subcommittee on Communications and Technology of the Committee on Energy and Commerce","year":"2018","author":"Committee on Energy and Commerce. Subcommittee on Communications and Technology","key":"2025112702372883300_bib71"},{"volume-title":"Starks Keynote at ACI Team Telecom Conference","year":"2021","author":"FCC","key":"2025112702372883300_bib73"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf012\/64118319\/tyaf012.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf012\/64118319\/tyaf012.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T07:37:42Z","timestamp":1764229062000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf012\/8240543"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":68,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf012","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf012"}}