SlideShare a Scribd company logo
1 of 4
How to Set Traps with Strategic Positioning
Strategic Positioning = Trust
Krach observed that typically what the government calls marketing is really tactical
communications focused on crisis management and public diplomacy. Private-
sector marketing know-how was another unique skillset the Clean Team to build
the Clean Network into a global brand and develop the marketing campaign.
From a strategic standpoint, Krach believed that to enable transformational change
you need three things: a noble cause, an adversary, and a plan. To inspire
America’s allies and partners, the noble cause became the battle of “Freedom
versus Authoritarianism,” which provided a clear differentiation from the
adversary—the CCP.
The Strategic Positioning—Who Do You Trust?
The Clean Team purposefully targeted the CCP, not Huawei, because they
envisioned 5G as the initial beachhead in a much bigger battle. The heart of the
marketing plan consisted of the strategic positioning and three simple key messages
re-enforced countless times. As Krach said during his June 25 press conference and
repeated continuously, “The question that governments and businesses around the
globe are asking about 5G is, ‘Who do you trust?’”
What is Strategic Positioning?
Strategic Positioning is a defensible position that gives you an advantage over
your competitor. Like being on the high ground of a battlefield. The value of
your strategic positioning is the delta between you and your opponent’s
position. We leveraged
1) Nobody trusts them. Because after hundreds of data points China
Inc gets a score of 100% on untrustworthiness. the Trap for them:
“Who do you trust with your citizens’ data, companies’ IP, and
country’s information?”
2) We accentuated the importance of trust. you buy from people
you trust. you partner with people you trust. we made sure that 5G
was not a technical or financial decision. This is your most
precious information. it's priceless.
3) The Clean Network operates by a set of trust principles. China
had been taking advantage of these principles that we live by and
which they do not. The CCP used them against the us for their
economic advantage like not having to be transparent, reciprocal or
worry about rule of law, IP theft, forced labor, bribes, subsidies,
etc…
4) And in one jujitsu move where we used these principles
against them by metaphorically flipping them on their back and
turning it to our advantage. Ironically, we weaponized the very
principles that form the freedoms that we want to protect. This was
not a marketing ploy; it was strategic winning business strategy.
First Key Message: Huawei Is an Extension of the CCP
The first key message consistently linked Huawei to the CCP by reminding audiences that
Huawei was the most important company to the CCP. It was the backbone for the
CCP’s surveillance state and the only Chinese company with a world-wide brand,
backed by state-supported IP theft, subsidies, and forced technology transfers. Huawei
CEO Ren Zhengfei was not only a Communist Party member, but a veteran of the
People’s Liberation Army. Unsurprisingly, Huawei’s first contracts came from the
Chinese army. Krach often reminded the public that “Huawei is an extension of the
Chinese Government and a tool to extend its surveillance state. 5G is the backbone for
that surveillance state’s human rights abuses. All you have to do is hook up the
appendages like cameras, apps, clouds, and microphones, and you’ve got Big Brother,
George Orwell’s 1984.”
Second Key Message: CCP’s 3C’s Doctrine of Concealment, Co-Option, and Coercion
The second key message focused on the malign intentions and behavior of the CCP. In his
speeches, meetings, during TV appearances, and press interviews, Krach consistently
repeated his message, “Today as we sit here wearing masks, citizens around the world
have woken up to the truth about the CCP’s 3 C’s doctrine of concealment, co-option,
and coercion. This now has given the political will to government leaders and CEOs
around the world to stand up to the CCP bully. In Washington, for both Democrats and
Republicans, this is one of the most unifying bipartisan issues of our time.” This message
was relevant to anyone upset about the pandemic (i.e., everyone), highlighted the CCP’s
stepped up aggression, preempted the potential objection of U.S. political division, future
paced the government leaders and CEOs, and set up the final marketing message.
Third Key Message: The Bully’s Seduction, Intimidation, and Retaliation
The third key marketing message called out the elephant in the room, framed it with
another 3-point doctrine, and offered a solution that everybody can relate to. Krach said,
“The CCP’s stated doctrine is to seduce with money and reinforce with intimidation and
retaliation. I think we have all experienced a bully some time in our life. If there’s
anything I learned, when you confront a bully, he backs down and he really backs down
if you have your friends by your side. That’s why the Clean Network is so vital. There
is strength in numbers and power in solidarity. When we are united, the CCP cannot
retaliate against all of the democracies and companies in the world at the same time.” This
folksy testimonial labeled the CCP as a bully that can be confronted safely by joining the
Clean Network. The bully designation was also planned as a trap for China’s Foreign
Ministry, which served as Huawei’s unofficial sales arm. The Clean Team knew that
China Inc. was not used to backpedaling while playing defense and knew the trap
would be sprung and they would overreact to the Clean Network’s initial momentum.
The Catch 22
“The trust tenets of the Clean Network explicitly state: The goal is to include all
countries and organizations as participants. Countries that currently do not abide
by the Trust Principles will be excluded from CN membership until they reform
problematic practices and laws. No nation is excluded forever, and the CN does
not require a country to choose between partnership with the U.S. and any other
nation.”
The Trust Tenets required for membership and serve as a positive inducement
for countries and companies to uphold the trust principles. It was designed to
stand in contrast and as an alternative to China’s vision of a state-controlled
internet. While China was unlikely to make these obligations and adhere to
them, by establishing the Trust Principles that all members must endorse and
uphold, the Clean Network might prove to be too large of a market for the
Chinese government to ignore. The aim of the Clean Network was to give the
Chinese Inc. a hard choice of either sacrificing the largest market or altering its
behavior. The ah-ha for the students should be that this puts China in a catch 22.

More Related Content

Similar to Setting Traps with Strategic Positioning: Keith Krach

Road Safety Essay. Essay On Road Safety PDF
Road Safety Essay. Essay On Road Safety  PDFRoad Safety Essay. Essay On Road Safety  PDF
Road Safety Essay. Essay On Road Safety PDFLiza Shirar
 
Corporate Strategists can learn from Karl Rove
Corporate Strategists can learn from Karl RoveCorporate Strategists can learn from Karl Rove
Corporate Strategists can learn from Karl RoveMark Hutcheon
 
The Use Of Technology Devices In Education Essay
The Use Of Technology Devices In Education EssayThe Use Of Technology Devices In Education Essay
The Use Of Technology Devices In Education EssayAlexis Turner
 
Paid Essay Writing. Online assignment writing service.
Paid Essay Writing. Online assignment writing service.Paid Essay Writing. Online assignment writing service.
Paid Essay Writing. Online assignment writing service.Gladys Cepparulo
 
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...Jeff Martinez
 
Congressional China Task Force: Executing a Clean Capital Markets Strategy; K...
Congressional China Task Force: Executing a Clean Capital Markets Strategy; K...Congressional China Task Force: Executing a Clean Capital Markets Strategy; K...
Congressional China Task Force: Executing a Clean Capital Markets Strategy; K...Keith Krach
 
Complex Problem: Censorship
Complex Problem: CensorshipComplex Problem: Censorship
Complex Problem: Censorshipdunham16
 
Middle School History Writing Rubric By Emma Davis TPT
Middle School History Writing Rubric By Emma Davis TPTMiddle School History Writing Rubric By Emma Davis TPT
Middle School History Writing Rubric By Emma Davis TPTJen Wilson
 
AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesYokimura Dimaunahan
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesChikere Uchegbu
 

Similar to Setting Traps with Strategic Positioning: Keith Krach (13)

R41674
R41674R41674
R41674
 
Road Safety Essay. Essay On Road Safety PDF
Road Safety Essay. Essay On Road Safety  PDFRoad Safety Essay. Essay On Road Safety  PDF
Road Safety Essay. Essay On Road Safety PDF
 
Corporate Strategists can learn from Karl Rove
Corporate Strategists can learn from Karl RoveCorporate Strategists can learn from Karl Rove
Corporate Strategists can learn from Karl Rove
 
The Use Of Technology Devices In Education Essay
The Use Of Technology Devices In Education EssayThe Use Of Technology Devices In Education Essay
The Use Of Technology Devices In Education Essay
 
Paid Essay Writing. Online assignment writing service.
Paid Essay Writing. Online assignment writing service.Paid Essay Writing. Online assignment writing service.
Paid Essay Writing. Online assignment writing service.
 
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...
Written Testimony of Chairman J Christopher Giancarlo before the Senate Banki...
 
Congressional China Task Force: Executing a Clean Capital Markets Strategy; K...
Congressional China Task Force: Executing a Clean Capital Markets Strategy; K...Congressional China Task Force: Executing a Clean Capital Markets Strategy; K...
Congressional China Task Force: Executing a Clean Capital Markets Strategy; K...
 
Complex Problem: Censorship
Complex Problem: CensorshipComplex Problem: Censorship
Complex Problem: Censorship
 
Corporate lobbying
Corporate lobbyingCorporate lobbying
Corporate lobbying
 
Middle School History Writing Rubric By Emma Davis TPT
Middle School History Writing Rubric By Emma Davis TPTMiddle School History Writing Rubric By Emma Davis TPT
Middle School History Writing Rubric By Emma Davis TPT
 
AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spies
 
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual ChallengesInternational Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
International Strategy for Cyberspace_ Kinetic Solutions to Virtual Challenges
 
Meeting_3
Meeting_3Meeting_3
Meeting_3
 

More from Keith Krach

The Global Economic Security Strategy (GESS) Public Version
 The Global Economic Security Strategy (GESS)  Public Version The Global Economic Security Strategy (GESS)  Public Version
The Global Economic Security Strategy (GESS) Public VersionKeith Krach
 
Global Tech Security Commission Overview
Global Tech Security Commission Overview Global Tech Security Commission Overview
Global Tech Security Commission Overview Keith Krach
 
Global Tech Security Commissioner's Playbook
Global Tech Security Commissioner's  Playbook Global Tech Security Commissioner's  Playbook
Global Tech Security Commissioner's Playbook Keith Krach
 
Global Tech Security Commission Honorary Co-Chairs Playbook
Global Tech Security Commission Honorary Co-Chairs  PlaybookGlobal Tech Security Commission Honorary Co-Chairs  Playbook
Global Tech Security Commission Honorary Co-Chairs PlaybookKeith Krach
 
Global Tech Security Commission Structure & Process
Global Tech Security Commission  Structure & Process Global Tech Security Commission  Structure & Process
Global Tech Security Commission Structure & Process Keith Krach
 
Global Tech Security Commission Detailed Overview
Global Tech Security Commission Detailed OverviewGlobal Tech Security Commission Detailed Overview
Global Tech Security Commission Detailed OverviewKeith Krach
 
Advisory Council Krach Institute for Tech Diplomacy at Purdue
Advisory Council Krach Institute for Tech Diplomacy at PurdueAdvisory Council Krach Institute for Tech Diplomacy at Purdue
Advisory Council Krach Institute for Tech Diplomacy at PurdueKeith Krach
 
The Strategy for Creating a Movement Against China’s Ideology of Genocide to...
The Strategy for Creating a Movement Against  China’s Ideology of Genocide to...The Strategy for Creating a Movement Against  China’s Ideology of Genocide to...
The Strategy for Creating a Movement Against China’s Ideology of Genocide to...Keith Krach
 
The Trust Doctrine as a Policy Framework for Maintaining International Order;...
The Trust Doctrine as a Policy Framework for Maintaining International Order;...The Trust Doctrine as a Policy Framework for Maintaining International Order;...
The Trust Doctrine as a Policy Framework for Maintaining International Order;...Keith Krach
 
Safeguarding the Climate, Energy Security & Human Rights by Preventing ESG In...
Safeguarding the Climate, Energy Security & Human Rights by Preventing ESG In...Safeguarding the Climate, Energy Security & Human Rights by Preventing ESG In...
Safeguarding the Climate, Energy Security & Human Rights by Preventing ESG In...Keith Krach
 
The Strategy for Preserving Democracy in Taiwan as a Lynchpin for Internatio...
The Strategy for Preserving Democracy in Taiwan  as a Lynchpin for Internatio...The Strategy for Preserving Democracy in Taiwan  as a Lynchpin for Internatio...
The Strategy for Preserving Democracy in Taiwan as a Lynchpin for Internatio...Keith Krach
 
About TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Oppo...
About TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Oppo...About TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Oppo...
About TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Oppo...Keith Krach
 
TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Opportuni...
TRUSTED TECH FINANCE INITIATIVE  Dedicated to Advancing Freedom and Opportuni...TRUSTED TECH FINANCE INITIATIVE  Dedicated to Advancing Freedom and Opportuni...
TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Opportuni...Keith Krach
 
Prosperity Partnerships for Global Trust Network .pptx
 Prosperity Partnerships for Global Trust Network   .pptx Prosperity Partnerships for Global Trust Network   .pptx
Prosperity Partnerships for Global Trust Network .pptxKeith Krach
 
Wharton Business School Case study; Here Comes the Sun: ESG and Dirty Solar ...
Wharton Business School Case study;  Here Comes the Sun: ESG and Dirty Solar ...Wharton Business School Case study;  Here Comes the Sun: ESG and Dirty Solar ...
Wharton Business School Case study; Here Comes the Sun: ESG and Dirty Solar ...Keith Krach
 
Utilizing Industry Tech Trust Standards for Strategic Advantage Krach Instit...
 Utilizing Industry Tech Trust Standards for Strategic Advantage Krach Instit... Utilizing Industry Tech Trust Standards for Strategic Advantage Krach Instit...
Utilizing Industry Tech Trust Standards for Strategic Advantage Krach Instit...Keith Krach
 
Clean Capital Market Campaign Chinese Stocks on U.S. Stock Exchanges- Keith K...
Clean Capital Market Campaign Chinese Stocks on U.S. Stock Exchanges- Keith K...Clean Capital Market Campaign Chinese Stocks on U.S. Stock Exchanges- Keith K...
Clean Capital Market Campaign Chinese Stocks on U.S. Stock Exchanges- Keith K...Keith Krach
 
10 ESSENTIAL ELEMENTS FOR DELIVERING AN ENDURING PROVEN MODEL TO COMPETE WITH...
10 ESSENTIAL ELEMENTS FOR DELIVERING AN ENDURING PROVEN MODEL TO COMPETE WITH...10 ESSENTIAL ELEMENTS FOR DELIVERING AN ENDURING PROVEN MODEL TO COMPETE WITH...
10 ESSENTIAL ELEMENTS FOR DELIVERING AN ENDURING PROVEN MODEL TO COMPETE WITH...Keith Krach
 
Stanford Business School Case Study on Chips & Science Act: Keith Krach
Stanford Business School Case Study on Chips & Science Act: Keith Krach Stanford Business School Case Study on Chips & Science Act: Keith Krach
Stanford Business School Case Study on Chips & Science Act: Keith Krach Keith Krach
 
Strengthening U.S.-Taiwan Relations to Advance Freedom: 2021 Yushan Forum; Ke...
Strengthening U.S.-Taiwan Relations to Advance Freedom: 2021 Yushan Forum; Ke...Strengthening U.S.-Taiwan Relations to Advance Freedom: 2021 Yushan Forum; Ke...
Strengthening U.S.-Taiwan Relations to Advance Freedom: 2021 Yushan Forum; Ke...Keith Krach
 

More from Keith Krach (20)

The Global Economic Security Strategy (GESS) Public Version
 The Global Economic Security Strategy (GESS)  Public Version The Global Economic Security Strategy (GESS)  Public Version
The Global Economic Security Strategy (GESS) Public Version
 
Global Tech Security Commission Overview
Global Tech Security Commission Overview Global Tech Security Commission Overview
Global Tech Security Commission Overview
 
Global Tech Security Commissioner's Playbook
Global Tech Security Commissioner's  Playbook Global Tech Security Commissioner's  Playbook
Global Tech Security Commissioner's Playbook
 
Global Tech Security Commission Honorary Co-Chairs Playbook
Global Tech Security Commission Honorary Co-Chairs  PlaybookGlobal Tech Security Commission Honorary Co-Chairs  Playbook
Global Tech Security Commission Honorary Co-Chairs Playbook
 
Global Tech Security Commission Structure & Process
Global Tech Security Commission  Structure & Process Global Tech Security Commission  Structure & Process
Global Tech Security Commission Structure & Process
 
Global Tech Security Commission Detailed Overview
Global Tech Security Commission Detailed OverviewGlobal Tech Security Commission Detailed Overview
Global Tech Security Commission Detailed Overview
 
Advisory Council Krach Institute for Tech Diplomacy at Purdue
Advisory Council Krach Institute for Tech Diplomacy at PurdueAdvisory Council Krach Institute for Tech Diplomacy at Purdue
Advisory Council Krach Institute for Tech Diplomacy at Purdue
 
The Strategy for Creating a Movement Against China’s Ideology of Genocide to...
The Strategy for Creating a Movement Against  China’s Ideology of Genocide to...The Strategy for Creating a Movement Against  China’s Ideology of Genocide to...
The Strategy for Creating a Movement Against China’s Ideology of Genocide to...
 
The Trust Doctrine as a Policy Framework for Maintaining International Order;...
The Trust Doctrine as a Policy Framework for Maintaining International Order;...The Trust Doctrine as a Policy Framework for Maintaining International Order;...
The Trust Doctrine as a Policy Framework for Maintaining International Order;...
 
Safeguarding the Climate, Energy Security & Human Rights by Preventing ESG In...
Safeguarding the Climate, Energy Security & Human Rights by Preventing ESG In...Safeguarding the Climate, Energy Security & Human Rights by Preventing ESG In...
Safeguarding the Climate, Energy Security & Human Rights by Preventing ESG In...
 
The Strategy for Preserving Democracy in Taiwan as a Lynchpin for Internatio...
The Strategy for Preserving Democracy in Taiwan  as a Lynchpin for Internatio...The Strategy for Preserving Democracy in Taiwan  as a Lynchpin for Internatio...
The Strategy for Preserving Democracy in Taiwan as a Lynchpin for Internatio...
 
About TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Oppo...
About TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Oppo...About TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Oppo...
About TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Oppo...
 
TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Opportuni...
TRUSTED TECH FINANCE INITIATIVE  Dedicated to Advancing Freedom and Opportuni...TRUSTED TECH FINANCE INITIATIVE  Dedicated to Advancing Freedom and Opportuni...
TRUSTED TECH FINANCE INITIATIVE Dedicated to Advancing Freedom and Opportuni...
 
Prosperity Partnerships for Global Trust Network .pptx
 Prosperity Partnerships for Global Trust Network   .pptx Prosperity Partnerships for Global Trust Network   .pptx
Prosperity Partnerships for Global Trust Network .pptx
 
Wharton Business School Case study; Here Comes the Sun: ESG and Dirty Solar ...
Wharton Business School Case study;  Here Comes the Sun: ESG and Dirty Solar ...Wharton Business School Case study;  Here Comes the Sun: ESG and Dirty Solar ...
Wharton Business School Case study; Here Comes the Sun: ESG and Dirty Solar ...
 
Utilizing Industry Tech Trust Standards for Strategic Advantage Krach Instit...
 Utilizing Industry Tech Trust Standards for Strategic Advantage Krach Instit... Utilizing Industry Tech Trust Standards for Strategic Advantage Krach Instit...
Utilizing Industry Tech Trust Standards for Strategic Advantage Krach Instit...
 
Clean Capital Market Campaign Chinese Stocks on U.S. Stock Exchanges- Keith K...
Clean Capital Market Campaign Chinese Stocks on U.S. Stock Exchanges- Keith K...Clean Capital Market Campaign Chinese Stocks on U.S. Stock Exchanges- Keith K...
Clean Capital Market Campaign Chinese Stocks on U.S. Stock Exchanges- Keith K...
 
10 ESSENTIAL ELEMENTS FOR DELIVERING AN ENDURING PROVEN MODEL TO COMPETE WITH...
10 ESSENTIAL ELEMENTS FOR DELIVERING AN ENDURING PROVEN MODEL TO COMPETE WITH...10 ESSENTIAL ELEMENTS FOR DELIVERING AN ENDURING PROVEN MODEL TO COMPETE WITH...
10 ESSENTIAL ELEMENTS FOR DELIVERING AN ENDURING PROVEN MODEL TO COMPETE WITH...
 
Stanford Business School Case Study on Chips & Science Act: Keith Krach
Stanford Business School Case Study on Chips & Science Act: Keith Krach Stanford Business School Case Study on Chips & Science Act: Keith Krach
Stanford Business School Case Study on Chips & Science Act: Keith Krach
 
Strengthening U.S.-Taiwan Relations to Advance Freedom: 2021 Yushan Forum; Ke...
Strengthening U.S.-Taiwan Relations to Advance Freedom: 2021 Yushan Forum; Ke...Strengthening U.S.-Taiwan Relations to Advance Freedom: 2021 Yushan Forum; Ke...
Strengthening U.S.-Taiwan Relations to Advance Freedom: 2021 Yushan Forum; Ke...
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Setting Traps with Strategic Positioning: Keith Krach

  • 1. How to Set Traps with Strategic Positioning Strategic Positioning = Trust Krach observed that typically what the government calls marketing is really tactical communications focused on crisis management and public diplomacy. Private- sector marketing know-how was another unique skillset the Clean Team to build the Clean Network into a global brand and develop the marketing campaign. From a strategic standpoint, Krach believed that to enable transformational change you need three things: a noble cause, an adversary, and a plan. To inspire America’s allies and partners, the noble cause became the battle of “Freedom versus Authoritarianism,” which provided a clear differentiation from the adversary—the CCP. The Strategic Positioning—Who Do You Trust? The Clean Team purposefully targeted the CCP, not Huawei, because they envisioned 5G as the initial beachhead in a much bigger battle. The heart of the marketing plan consisted of the strategic positioning and three simple key messages re-enforced countless times. As Krach said during his June 25 press conference and repeated continuously, “The question that governments and businesses around the globe are asking about 5G is, ‘Who do you trust?’”
  • 2. What is Strategic Positioning? Strategic Positioning is a defensible position that gives you an advantage over your competitor. Like being on the high ground of a battlefield. The value of your strategic positioning is the delta between you and your opponent’s position. We leveraged 1) Nobody trusts them. Because after hundreds of data points China Inc gets a score of 100% on untrustworthiness. the Trap for them: “Who do you trust with your citizens’ data, companies’ IP, and country’s information?” 2) We accentuated the importance of trust. you buy from people you trust. you partner with people you trust. we made sure that 5G was not a technical or financial decision. This is your most precious information. it's priceless. 3) The Clean Network operates by a set of trust principles. China had been taking advantage of these principles that we live by and which they do not. The CCP used them against the us for their economic advantage like not having to be transparent, reciprocal or worry about rule of law, IP theft, forced labor, bribes, subsidies, etc… 4) And in one jujitsu move where we used these principles against them by metaphorically flipping them on their back and turning it to our advantage. Ironically, we weaponized the very principles that form the freedoms that we want to protect. This was not a marketing ploy; it was strategic winning business strategy.
  • 3. First Key Message: Huawei Is an Extension of the CCP The first key message consistently linked Huawei to the CCP by reminding audiences that Huawei was the most important company to the CCP. It was the backbone for the CCP’s surveillance state and the only Chinese company with a world-wide brand, backed by state-supported IP theft, subsidies, and forced technology transfers. Huawei CEO Ren Zhengfei was not only a Communist Party member, but a veteran of the People’s Liberation Army. Unsurprisingly, Huawei’s first contracts came from the Chinese army. Krach often reminded the public that “Huawei is an extension of the Chinese Government and a tool to extend its surveillance state. 5G is the backbone for that surveillance state’s human rights abuses. All you have to do is hook up the appendages like cameras, apps, clouds, and microphones, and you’ve got Big Brother, George Orwell’s 1984.” Second Key Message: CCP’s 3C’s Doctrine of Concealment, Co-Option, and Coercion The second key message focused on the malign intentions and behavior of the CCP. In his speeches, meetings, during TV appearances, and press interviews, Krach consistently repeated his message, “Today as we sit here wearing masks, citizens around the world have woken up to the truth about the CCP’s 3 C’s doctrine of concealment, co-option, and coercion. This now has given the political will to government leaders and CEOs around the world to stand up to the CCP bully. In Washington, for both Democrats and Republicans, this is one of the most unifying bipartisan issues of our time.” This message was relevant to anyone upset about the pandemic (i.e., everyone), highlighted the CCP’s stepped up aggression, preempted the potential objection of U.S. political division, future paced the government leaders and CEOs, and set up the final marketing message. Third Key Message: The Bully’s Seduction, Intimidation, and Retaliation The third key marketing message called out the elephant in the room, framed it with another 3-point doctrine, and offered a solution that everybody can relate to. Krach said, “The CCP’s stated doctrine is to seduce with money and reinforce with intimidation and retaliation. I think we have all experienced a bully some time in our life. If there’s anything I learned, when you confront a bully, he backs down and he really backs down if you have your friends by your side. That’s why the Clean Network is so vital. There is strength in numbers and power in solidarity. When we are united, the CCP cannot retaliate against all of the democracies and companies in the world at the same time.” This folksy testimonial labeled the CCP as a bully that can be confronted safely by joining the Clean Network. The bully designation was also planned as a trap for China’s Foreign Ministry, which served as Huawei’s unofficial sales arm. The Clean Team knew that China Inc. was not used to backpedaling while playing defense and knew the trap would be sprung and they would overreact to the Clean Network’s initial momentum.
  • 4. The Catch 22 “The trust tenets of the Clean Network explicitly state: The goal is to include all countries and organizations as participants. Countries that currently do not abide by the Trust Principles will be excluded from CN membership until they reform problematic practices and laws. No nation is excluded forever, and the CN does not require a country to choose between partnership with the U.S. and any other nation.” The Trust Tenets required for membership and serve as a positive inducement for countries and companies to uphold the trust principles. It was designed to stand in contrast and as an alternative to China’s vision of a state-controlled internet. While China was unlikely to make these obligations and adhere to them, by establishing the Trust Principles that all members must endorse and uphold, the Clean Network might prove to be too large of a market for the Chinese government to ignore. The aim of the Clean Network was to give the Chinese Inc. a hard choice of either sacrificing the largest market or altering its behavior. The ah-ha for the students should be that this puts China in a catch 22.