Hosea 5:9 Ephraim shall be desolate in the day of rebuke; among the tribes of Israel have I made known that which shall surely be.
Jeremiah 7:15 And I will cast you out of My sight, as I have cast out all your brethren, even the whole seed of Ephraim.

Why is the US government trying to persuade allied countries to avoid telecommunications equipment from China’s Huawei Technologies?

Godfree Roberts

January 20, 2019
Ed.D. Education & Geopolitics, University of Massachusetts, Amherst (Graduated 1973)

Huawei is the only company in the world that owns most 5G IP and can produce all the elements of a 5G network and assemble them together at scale and cost. It has no rivals.

The US calls Huawei a ‘security risk’ for a funny reason: it uses an encryption system that prevents the NSA from intercepting its communications. A number of governments and secret services in the non-Western world (think Germany) have begun to equip themselves exclusively with Huawei materials, and are doing so to protect the confidentiality of their communications: “Most of the personal data you store on your Huawei device (such as your photos, call logs, mailing list, messages, frequently visited websites, and so on) will be strictly protected. In addition, you will be clearly notified of any personal information being collected, and have complete control over the collection, processing, and sharing of your personal data. Without your authorization, your personal data will not be disclosed with any third parties.”

Back when Snowden came out in 2014, New York Times, Time, and Reuters disclosed that the NSA had infiltrated Huawei headquarters, monitored all of their executives, going through their entire data infrastructure (NSA infiltrates servers of China telecom giant Huawei). One of their goals was to find links between Huawei and the PLA, and the other was to find vulnerabilities so that the NSA could spy on nations that have installed Huawei instead of Cisco (which had installed ‘back doors’ for the CIA.

Another goal was to find connections between Huawei and People’s Liberation Army, according to The Times, which said the operation also sought to exploit Huawei’s technology by conducting surveillance through the computer and telephone networks Huawei sold to other nations.

The NSA planned to unleash offensive cyber attacks through Huawei if ordered by the President, “Many of our targets communicate over Huawei-produced products. We want to make sure that we know how to exploit these products,” the Times quoted an NSA document as saying, to “gain access to networks of interest” around the world.

Convincing US firms like Cisco to leave back doors in their equipment is quite simple: the US Government can threaten companies’ management or boards with tax or bribery investigations or over other shady activities, but that is not so easy when the company is hosted in China.

This treatment is not meted out to ‘allies’ like Israel. From Five Eyes Against Huawei:

1993: “Israel accused of selling US secrets to China” Israel accused of selling US secrets to China

2004: “Israel secretly sells American nuclear weapons to China” The Insider | Israel secretly sells American nuclear weapons to China

2013: “Israel Passes U.S. Military Technology to China” Report: Israel Passes U.S. Military Technology to China

“U.S. Furious With Israel After Sale of Advanced Military Technology to China” U.S. Furious With Israel After Sale of Advanced Military Technology to China

2017: “Israel Steals US Technology” — “Placing Israeli citizens in key industries is a secret to Israel’s success.” Phil Giraldi

Former CIA Phil Giraldi: “Israel Steals US Technology”

No arrests of Israelis.

Normal bugs and vulnerabilities are found by techies and computer scientists. There’s a robust international IT community where you get brownie points + job offers + $$$ + fame for finding these. Bugs money: Software sleuths cash in

This is the norm for the last 30 years, until very recently, when all of a sudden, it’s the spooks and their GOVERNMENT stooges coming out of the wood works. Why in the world do people believe that those who devote their entire lives and their formidable intellects solely to computer technologies can’t find the bugs, but some shadowy spooks trained in the rather separate discipline of killing people can, just beats me! If the spooks are so smart without even having to work hard on the subject, why don’t they do something productive, like discovering the cure for cancer?

If you want a preview of what a back door looks like, just look at the US Transportation Security Administration’s “master keys” for the locks on our luggage. Since 2003, the TSA has required all locked baggage travelling within, or transiting through, the USA to be equipped with Travelsentry locks, which have been designed to allow anyone with a widely held master key to open them. What happened after Travelsentry went into effect? Stuff started going missing from bags. Lots and lots of stuff. A CNN investigation into thefts from bags checked in US airports found thousands of incidents of theft committed by TSA workers and baggage handlers. And though “aggressive investigation work” has cut back on theft at some airports, insider thieves are still operating with impunity throughout the country, even managing to smuggle stolen goods off the airfield in airports where all employees are searched on their way in and out of their work areas.

China’s Huawei said it backed Apple’s chief executive Tim Cook in his stand-off with the United States government over breaking into an iPhone, but stopped short of saying explicitly it would adopt the same stance. “It is very important, we agree with that,” Richard Yu, chief executive of Huawei’s consumer business group, told reporters in Barcelona gathered for the Mobile World Congress. “Privacy protection is very important for Huawei, we put a lot of investment into privacy, and security protection is key, it is very important for the consumer.

“Apple is resisting US government demands that it unlock an iPhone used by Rizwan Farook, who along with his wife, Tashfeen Malik, shot and killed 14 people and wounded 22 others at a holiday party in San Bernardino in December.

“Tim Cook spoke up for that (privacy) … for us it is really very important,” Yu said. “I think it’s good letting the government understand why we cannot do some things. There are some things we can do, but there are some things we cannot do.”

The Five Eyes is a system of electronic espionage by Australia, Canada, the United States, New Zealand and the United Kingdom. They have begun to exclude Huawei from their auctions.

Their decision will put Five Eyes ten years behind China (and the EU if it resists US pressure) in 5G and its associated technologies.

For The Quora Article Click HERE

Isaiah 28:3 The crown of pride, the drunkards of Ephraim, shall be trodden under feet.


~ by Joel Huan on July 18, 2020.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: