Breaking :Britain to allow Huawei to build its 5G network

[MEDIA=twitter]1222129583023185920[/MEDIA]

Yanks waende nyumbani sasa. Their campaign against Huawei and China is falling and failing spectacularly.

Hahahaha ahaha. Enyewe Shinaman ameshinda white devils.

Shiit i was reading this story about Huawei in the morning. That is fast.

The UK hasn’t however given them full permission to roll it out.
[ATTACH=full]283606[/ATTACH]

Cc @patco , the old man without a brain.

You know a jelly fish has no brains, but it will always be around.

[SIZE=5]PEOPLE NEVER LEAR… PEOPLE NEVER LEARN!!!

Mtoto akililia wembe mpe.[/SIZE]

[SIZE=5]Back in 2004 China invited bids for a bullet train or maglev train. The Japanese and the Germans were very eager to submit bids.[/SIZE]

[SIZE=5]The CIA warned them of this exact scenario, that China will hack them proper. They didn’t listen. Kawasaki Heavy Industries went to China. Their computers were hacked proper and they were then shown the door.[/SIZE]

[SIZE=5]Story here : [/SIZE]

[SIZE=5] https://www.ft.com/content/60da2222-8ab5-11df-8e17-00144feab49a [/SIZE]

[SIZE=5] https://fortune.com/2013/04/15/did-china-steal-japans-high-speed-train/ [/SIZE]

[SIZE=5]Today China is the world leader in bullet train technology and they are even selling that technology worldwide. [/SIZE]

[SIZE=5]Word to the wise.[/SIZE]

[SIZE=5]FYI : Hata 5G waliiba.[/SIZE]

It’s over for Apple

ancient history… trump amechapiwa juu no matter how you spin it

We don’t need to spin anything, very soon the Britons will cry just like the Japanese. And the U.S is speaking from experience.

It is on record that some time back Huawei hacked a Canadian telcom company and today given the chance to place their 5g technology in any western country, Huawei can very easily hack in to any western style govt. facility, server etc.

Hapa Kenya they see everything they want but ignorance is bliss, I guess.

This is like England in the 1980s allowing the KGB to erect communication masts in London!

When you see the U.S and Canada refusing to release that Huawei lady it’s because of what Huawei is known to have done in the recent past. That’s why China doesn’t protest too much about her arrest. They have what they need.

And knowledge is indeed the most valuable commodity on earth.

It doesn’t matter up to this point…i would pay premium just to see the carrot guy’s face turn deep orange:D:D life sucks at times when you think you’re the king of the hill

Yeah,its common knowledge even 12yo know which one country spies on everyone:D:D:D

China learnt from the best … Uncle Sam.
And then SURPASSED IT.
IKO NINI.

China has bullet trains, USA doesn’t. Huawei 5G is eons ahead of USA Allie’s Nokia and Ericsson. Fvck America

Wacha whataboutism.

And you know very well that one of China’s key hacking interest is ongoing research in universities & companies.

You also know very well that in the U.S there are laws and penalties. If an American hacked your drawing or blueprint for a fancy state of the art next level microchip and fabricated it in the U.S you just need to grab the Cliff Ombeta or the U.S version of Cliff Ombeta and start suing immediately. And you will get your hunk of flesh.

Now can you really sue the Chinese govt that has hired military hackers in the name of Huawei or Xiaomi!!!

Because Huawei is indeed just a division of the Chinese govt.!!

You will get nowhere with your case.

Let’s come to elections, China is listening in to all of Kenya’s communications. I mean Safaricom iko na Huawei kila mahali ndani yake. These guys can very well listen to one political candidate and pass the info to the candidate they want to win thereby subverting democracy.
They could mine dirt on a govt official or company head and threaten him if he refuses to comply as pertains to tenders. They are watching all the university research going on.

I mean use your imagination.

In a normal society of normal homo sapiens sapiens you can buy the science you need and pay the inventor his patents.

For instance if you are making an app, you can purchase the templates , the music, some of the code and complete your app with full copyrights paid for and sleep well knowing that no one will sue you in the morning .

China operates by hacking the creators of the templates, the codes, the music then replicating everything and calling it their own and then they want to sell it even in the market from where they have just stolen it from!! Na wasiulizwe swali.

That is beyond robbery. Even @Mawaya the phone thief has some courtesy. He won’t steal from you and in the evening come sell back to you your phone.

5G waliiba kutoka kwa nani?
You don’t need to talk bullshit in some fields that you don’t even have an idea.

They invented it sio?

What are the names of the Chinese inventors of 5G … or who are the Chinese enginering consortium behind 5G?

And while you are at it kindly give the name(s) of the Chinese guy(s) who invented their very first smartphone and microchip?

They just woke up one day with 5G on their minds?

They jumped past all the otherG’s past all the other countries and miraculously ended up with 5G… they must be angels?

Wezi kama @Mawaya .

https://www.extremetech.com/extreme/300313-report-chinas-new-comac-c919-jetliner-is-built-with-stolen-technology

https://www.zdnet.com/article/building-chinas-comac-c919-airplane-involved-a-lot-of-hacking-report-says/

@12inchbamboo this is how they do it :

[SIZE=7]Building China’s Comac C919 airplane involved a lot of hacking, report says[/SIZE]
One of China’s most brazen hacking sprees involved intelligence officers, hackers, security researchers, and company insiders.

https://zdnet3-cbsistatic-com.cdn.ampproject.org/i/s/zdnet3.cbsistatic.com/hub/i/r/2018/08/21/a59867e9-8d75-40af-a87c-690638f8afa4/thumbnail/40x40/e9e4d21a35e101b1402c656cf979114c/catalin-cimpanu.jpg
By Catalin Cimpanu for Zero Day | October 14, 2019 – 15:00 GMT (08:00 PDT) | Topic: Security

A report published today shines a light on one of China’s most ambitious hacking operations known to date, one that involved Ministry of State Security officers, the country’s underground hacking scene, legitimate security researchers, and insiders at companies all over the world.
The aim of this hacking operation was to acquire intellectual property to narrow China’s technological gap in the aviation industry, and especially to help Comac, a Chinese state-owned aerospace manufacturer, build its own airliner, the C919 airplane, to compete with industry rivals like Airbus and Boeing.
A Crowdstrike report published today shows how this coordinated multi-year hacking campaign systematically went after the foreign companies that supplied components for the C919 airplane.
https://zdnet2-cbsistatic-com.cdn.ampproject.org/i/s/zdnet2.cbsistatic.com/hub/i/2019/10/14/e9f33a3b-54a3-4d2f-9ffc-24b1091b2752/c919.png

The end goal, Crowdstrike claims, was to acquire the needed intellectual property to manufacture all of the C919’s components inside China.

Crowdstrike claims that the Ministry of State Security (MSS) tasked the Jiangsu Bureau (MSS JSSD) to carry out these attacks.

The Jiangsu Bureau, in turn, tasked two lead officers to coordinate these efforts. One was in charge of the actual hacking team, while the second was tasked with recruiting insiders working at aviation and aerospace companies.

https://zdnet4-cbsistatic-com.cdn.ampproject.org/i/s/zdnet4.cbsistatic.com/hub/i/2019/10/14/ec0ef093-90b5-4808-9a3e-ce1969ed42df/mss-jssd-gang.png

The hacking team targeted companies between 2010 and 2015, and successfully breached C919 suppliers like Ametek, Honeywell, Safran, Capstone Turbine, GE, and others.

But unlike in other Chinese hacks, where China used cyber-operatives from military units, for these hacks, the MSS took another approach, recruiting local hackers and security researchers.

[SIZE=5]SPECIAL FEATURE[/SIZE]
https://zdnet3-cbsistatic-com.cdn.ampproject.org/i/s/zdnet3.cbsistatic.com/hub/i/r/2016/09/01/fa215859-76c8-4ab7-8b55-56a42e0d8950/resize/220x165/cf651a47272fd8abf79b87f4b45ba3c4/09-2016-special-feature-cover-art.jpg
Cyberwar and the Future of Cybersecurity

Today’s security threats have expanded in scope and seriousness. There can now be millions – or even billions – of dollars at risk when information security isn’t handled properly.
[ul]
[li]Read More[/li][/ul]
According to Crowdstrike and a Department of Justice indictment, responsible for carrying out the actual intrusions were hackers that the MSS JSSD recruited from China’s local underground hacking scene. Crowdstrike says that some of the team members had a shady history going back as far as 2004.

These hackers were tasked with finding a way inside target networks, where they’d usually deploy malware such as Sakula, PlugX, and Winnti, which they’d use to search for proprietary information and exfiltrate it to remote servers.

In the vast majority of cases, the hackers used a custom piece of malware that was specifically developed for these intrusions. Named Sakula, this malware was developed by a legitimate security researcher named Yu Pingan.

In the rare occasions when the hacking team couldn’t find a way inside a target, a second MSS JSSD officer would intervene and recruit a Chinese national working for the target company, and use him to plant Sakula on the victim’s network, usually via USB drives.

The group, which Crowdstrike said it tracked as Turbine Panda, was extremely successful. The US cyber-security firm points out that in 2016, after almost six years of non-stop hacking of foreign aviation companies, the Aero Engine Corporation of China (AECC) launched the CJ-1000AX engine, which was set to be used in the upcoming C919 airplane, and replace an engine that had been previously manufactured by a foreign contractor.

Industry reporting points out that the CJ-1000AX displays multiple similarities [1, 2] to the LEAP-1C and LEAP-X engines produced by CFM International, a joint venture between US-based GE Aviation and French aerospace firm Safran, and the foreign contractor that supplied turbine engines for the C919.

[SIZE=5]US crackdown[/SIZE]
But while the MSS JSSD’s hacking efforts might have gone unnoticed, hackers made a mistake when they overstepped and went after targets a little too big – such as healthcare provider Anthem and the US Office of Personnel Management.

Those intrusions yielded a lot of useful information for recruiting future insiders, but they also brought the full attention of the US government bearing down on their operation. It didn’t take too long after that for the US to start piecing the puzzle together.

The first ones to go were the insiders since they were the easiest ones to track down and had no protection from the Chinese government since they were operating on foreign soil.

After that came Yu, the creator of the Sakula malware, who was arrested while attending at a security conference in Los Angeles, and subsequently charged for his involvement in the Anthem and OPM hacks.

Yu’s arrest triggered a massive ripple in China’s infosec scene. The Chinese government responded by prohibiting Chinese researchers from participating at foreign security conferences, fearing that US authorities might get their hands on other “assets.”

Initially, this seemed an odd thing to do, but a subsequent Recorded Future investigation showed how the MSS had deep ties to the Chinese cyber-security research scene, and how the agency was secretly hoarding and delaying vulnerabilities found by Chinese security researchers, many of which were being weaponized by its hackers before being publicly disclosed.

But the biggest hit to Turbine Panda came in late 2018 when western officials arrested Xu Yanjun, the MSS JSSD officer in charge of recruiting insiders at foreign companies.

The arrest of a high-ranking Chinese intelligence officer was the first of its kind, and the biggest intelligence asset transfer since the Cold War, besides Snowden’s flight to Russia. Now, US officials are hoping that Xu collaborates for a reduced sentence.

However, Crowdstrike points out that “the reality is that many of the other cyber operators that made up Turbine Panda operations will likely never see a jail cell.”

China has yet to extradite any citizen charged with cyber-related crimes.

[SIZE=5]Hackers have continued to target the aviation industry[/SIZE]

In the meantime, Turbine Panda appears to have seized most of its operations, most likely crippled due to the arrests, but other Chinese cyber-espionage groups have taken over, such as Emissary Panda, Nightshade Panda, Sneaky Panda, Gothic Panda, Anchor Panda, and many more.

Attacks on foreign aviation firms are expected to continue for the foreseeable future, mainly because Comac’s C919 jet isn’t the success that the Chinese government expected (see 07:20 mark in the video below), and a fully Chinese airliner is still years away. Efforts are currently underway for building the airliner’s next iteration, the C929 model.

Story Continued in the link above…