Main menu

Pages

Jon Pelson on Huawei's threat in China

featured image

In this special episode, we talked to Jon Pelson, author of “Wireless Wars: China’s Dangerous Domination of 5G and How We’re Fighting Back.” He investigates Huawei as the United States investigates equipment being built near missiles and nuclear facilities, the dangers to national security, and what steps need to be taken to stop the threat. I talked about what I’m doing.

Explaining why Huawei is a security risk, Personne said: “When manufacturing equipment that goes into the cell tower, Huawei does not run that network, but because it manufactures equipment, it keeps its hands on the equipment. When installing, for Verizon and AT & T But even in the case of such a rural family-owned company, the company that built it needs to monitor it and make sure it provides software updates. Service issues, they are the boxes themselves. You can look at it and fix it remotely. Huawei is remotely controlled because it doesn’t intend to fly anyone in the world to repair the remote cell tower. Therefore, if it exists, it will be over the connection. Even if you can’t eavesdrop on what’s being said, you can still know it. It’s possible. It’s not clear if they can be done — you can know through what’s called metadata. That day. You can see who is at your base and who you are calling. That is, you can see the phone number, text message, location, volume, volume. There is a lot of activity going on. Navy SEAL If there is a base, Huawei equipment is around the Navy SEAL base, and suddenly it turns out that activity is skyrocketing, these elderly people in the Pentagon are now at that SEAL base. Who is who? Because you know, so keep that in mind.

“Maybe you can’t hear what they’re saying, but you say,” Why are these people at the base? ” Geopolitical rivals and enemies can say, “I know America is preparing to do something.” You could also say, “I’m sending a signal here, but that cell site doesn’t work very well.” Most military communications go through public networks rather than the Pentagon’s end-to-end network. As a result, the company operating the device may be able to deactivate or throttle the device. This is very damaging and very dangerous in the event of a crisis. “

Are there any other topics you would like us to cover? Please contact us: chinainfocus@ntdtv.org

And if you want to buy us coffee: https: //donorbox.org/china-in-focus

For more direct news from China, subscribe to our newsletter.

Follow China with a focus on social media:

twitter: https://twitter.com/ChinaInFocusNTD
Truth Social: https://truthsocial.com/@chinainfocus

Gettr: https://gettr.com/user/chinainfocus
Facebook: https://www.facebook.com/NTDChinainFocus
Gab: https://gab.com/ChinaInFocus
Telegram: https: //t.me/ChinainFocusNTD

Below the video[保存]Click the button later[マイリスト]Access from.

Follow EpochTV on social media:

twitter: https://twitter.com/EpochTVus
Rumble: https: //rumble.com/c/EpochTV
Truth Social: https://truthsocial.com/@EpochTV

Gettr: https://gettr.com/user/epochtv
Facebook: https://www.facebook.com/EpochTVus
Gab: https://gab.com/EpochTV
Telegram: https: //t.me/EpochTV

..

Comments