Wednesday, May 6, 2020

THE CHINA 5G NETWORKS


CHINA CHIPS INTO CIA, US MILITARY and COMMERCIAL SERVERS, leaving them OPEN TO HACKS.



The security threat is so enormous to consider that the findings, studies, investigations, and other discoveries on the technology theft by China against the US named as the world leader in technology advancements is mounting, but China in its place as the supply chain for the world handling, manufacturing of these highly sensitive products had created the security the threat as very huge and incalculable for the entire security of the world. Most devices supplied to the US by China has been tampered by insertions of microchips providing as the backdoor for the PLA to sneak and steal valuable secrets from its customers worldwide but not limited to the CIA, the US congress, the Whitehouse, the military and others that technically had placed all of them as at risk. These information’s were widely investigated by the concerned US departments and the media for many years and the report is very real to the threat not only of the US but for the entire world.

The risk expands entirely worldwide significantly involving allies of the United States in Europe including the so-called “Five Eyes” intelligence-sharing of these countries. But the discovery by the US of these threats had created restraints primarily for the United States to defend and secure its government and other sensitive homeland security protocols to avert the supply and for the use of these materials that will put at risk the US and all allies everywhere.

The emerging trouble with these allies today is their refusal to heed on the US intelligence findings that they proceed even more to use Huawei technologies for their 5g networks that naturally will affect their relations and intelligence sharing.  Because of the new installations of the 5g infrastructures in Britain for example, the US is now pulling its military assets in that region including those intelligence sectors that will be affected. Entirely, the whole security systems of military installations and cooperation by the US with these countries or in Europe is now affected by the withdrawals of forces now being made.  

Relating this matter to our situation, our government has engaged with China in almost major communication infrastructures in a country using its devices in every sector of our military, communications, power grids, government, private, and business organizations that entirely will shut down by a remote click of a button form China. It was reported alone that our power grids are feared threatened for an imminent shutdown that the country will readily fall because of our infrastructures and its own technical personnel and engineers hold sensitive positions in the power grid that only they know how to operate or encrypted anything in the grid. The exclusion of our own technical people in the key positions to operate or design these devices in the facilities are practically troubling.


The third telco player alone in the country is suspected as support in funds and loans by China and can be deemed as a categorical threat to us. It is very compelling to imagine that our choices for China in all our loans, infrastructure systems, even in the government, intelligence and the military have reduced this country as a subordinate state to China.

We are a sovereign country, and we should maintain to protect ourselves against the power, influence, and pressures of world powers. We should stand alone and be safe by doing things that will provide us with security by first improving our economy by turning our GDP into trillions upon trillions of dollars that will make us independent from China as an example. We should encourage our people to be entrepreneurs in every field and manufacture products that our households need so as to attain national security by means of self-sustainability.

Unless our government concentrate more on trade and commerce, multiply our exports, there is none that we can achieve national security.


This opinion is based on CHINA HACK from the WARZON report


No comments:

Post a Comment