US intelligence: We need an internal network to protect against Chinese neo-colonialism

22
In the US, they announced plans to create a high-speed internal network 5G, which will have a high degree of protection. Reports about it TASS with reference to the western portal Axios. According to the publication, such a network should have the necessary level of security to prevent cyber threats from the People’s Republic of China.

Axios in turn, it refers to data from the “secret” report of the US National Security Council.



US intelligence: We need an internal network to protect against Chinese neo-colonialism


From the material:
China has taken a dominant position in the production and management of network infrastructure. And the refusal to create such a network will lead to a constant lagging behind China in the information field. These efforts will help developing countries counter China’s neo-colonial behavior.


The phrase about “neo-colonial behavior of China” itself looks strange, to put it mildly, taking into account the fact that it is the United States that is trying with all its might to maintain a unipolar world order, spreading its interests in dozens of countries turned into colonies.

It is noted that the new network should appear in the US over the next 3 years. At the same time, it is stated that the 5G network will most likely be created not by private US operators, but by “government forces”. This fact gives reason to suspect the US authorities in their desire to transfer the surveillance of citizens in communications networks to a new level - under the cover of statements allegedly about "protection from Chinese cyber threats".
22 comments
Information
Dear reader, to leave comments on the publication, you must sign in.
  1. +3
    29 January 2018 06: 02
    In principle, this concerns us as well.
    1. 0
      29 January 2018 06: 04
      Quote: 210ox
      In principle, this concerns us as well.
      - Yes, it is for everyone ... Is it only America and China that are so advanced? And what about our computer successes to hear? And it’s for sure - they are pushed into the convoy!
      1. +1
        29 January 2018 07: 25
        Op-pan-ki ... Woke up? Good morning, USA, overslept already
        smile
        1. +2
          29 January 2018 18: 35
          Quote: Shurik70
          Woke up?


          And there’s nowhere to rock laughing Order any equipment in China tongue
    2. +1
      29 January 2018 06: 11
      There is nothing to hide, all these systems are on the side. winked
      1. +2
        29 January 2018 06: 21
        There is nothing to hide, all these systems are on the side. winked


        In personal life, many citizens have something to hide ... smile
        Well, for example, trips to mistresses ... it's no secret that the location of all devices is tracked with a geographical reference ... then left wages ... you transferred money from the employer by card automatically this information goes to the fiscal authorities, etc.

        That is, the personal life of citizens is no longer so personal .... under the control of interested people in various organizations and departments.

        There is a wonderful movie ...Enemy of the state... I am sure that what is described in it may be relevant to our country.
    3. +7
      29 January 2018 08: 00
      Here we need a long time ago a network to protect the world from the United States.
  2. +1
    29 January 2018 06: 04
    This fact gives reason to suspect US authorities of the desire to take surveillance of citizens in communication networks to a new level


    I would like to know about the methods and methods of a multi-level system for monitoring citizens of both the USA and RUSSIA ... I’m absolutely sure that the same system is being created in our country as well ... this is an objective process related to the desire of the state to keep everything under control.
    1. 0
      29 January 2018 06: 10
      Quote: The same LYOKHA
      I would like to know about the methods and methods of a multi-level system for tracking citizens of both the USA and RUSSIA ...

      NSA
      1. 0
        29 January 2018 06: 15
        NSA

        smile So what ?

        And smartphones ... what programs are used for surveillance (so as not to drive them into the device)?
        and computers ... what hardware contains windows for computer control?
        and anti-virus programs ... which of them, by scanning citizens' computers, simultaneously sends reports to the table to the special departments of the NSA ... the FSB, etc.
        and endless routers in networks ...
        and many many others... smile
    2. +1
      29 January 2018 06: 21
      Quote: The same Lech
      ... I’m absolutely sure that the same system is being created in our country ... this is an objective process related to the desire of the state to keep everything and everything under control.
      First of all, they would directly control their bureaucracy.
  3. +2
    29 January 2018 06: 23
    Actually, to the real networks of the fifth generation even further than to the moon on foot! What is achieved in the laboratories, in reality, is unacceptable because of the fantastic high cost, and unnecessarily complex nodes of the transceiver equipment!
  4. +1
    29 January 2018 06: 47
    the necessary level of security to prevent cyber threats from the People's Republic of China. Nu-nu. Until you create your 5th, China will move affectionately to the 7th level. I'm afraid to imagine what Russia will do ...
  5. +1
    29 January 2018 06: 49
    a new network should appear in the USA within the next 3 years
    The other day, Medvedev said that by 2020 Russia needs to begin the transition to 5G. Therefore, this issue is being considered not only in the United States and not because of China's cyber threats.
    1. +1
      29 January 2018 07: 26
      Gennady hi 5G networks do not currently exist! Developments are underway, a lot of work is in progress, but all this is terribly expensive and unnecessarily complicated! What they get in laboratories and research institutes corresponds to 4,5G networks, but not to the fifth generation networks! And the difference there is very huge.
      1. +1
        29 January 2018 07: 32
        hi It’s clear that you can’t do this so easily with the cantanker. But we remembered our leap from 3G to 4G (we didn’t have time to introduce one thing, as they introduce another one) - the population had to change TVs or buy set-top boxes to watch in digital. Shocked then the Russian consumer nobly.
  6. +3
    29 January 2018 06: 55
    Now it’s important to deploy your own networks, on your own equipment, with your own software. While we use Western hardware and software, including operating systems such as Windows and MacOS, we will be forever under the cybercablock with the NSA, the CIA, the FBI and other western sniffing brothers.
    The phrase on neocolonialism of China sounds from the USA, as the phrase about Hitler’s inhumanity of the Soviet people. No one in the history of the world has exterminated as many Chinese in colonial claims as the Anglo-Saxons.
  7. +1
    29 January 2018 07: 26
    Everything is as usual, money is needed - create a threat and sculpt any product, you won’t have to answer, everything is tied. And at the expense of wiretapping - that’s how it is conducted well on the old network.
  8. +1
    29 January 2018 07: 57
    Well, chat with notes on paper! This sales is not a well-forgotten old, so consider YESTERDAY!
  9. 0
    29 January 2018 10: 23
    Quote: The same LYOKHA
    And smartphones ... what programs are used for surveillance (so as not to drive them into the device) ?.

    But who will tell you about this

    Quote: The same Lech
    and computers ... what hardware contains windows to control the computer ?.

    I repeat, and who will tell you this?

    Quote: The same Lech
    and anti-virus programs ... which of them, by scanning citizens' computers, simultaneously sends reports to the table to the special departments of the NSA ... the FSB, etc.

    the best way to not install any antivirus software at all and not to go online. Then you certainly won’t catch the virus, and infa will not go to special services ...

    Quote: The same Lech
    and endless routers in networks ...

    How funny you are. Who will share such data. Here it’s like in the proverb “Do you like to ride (have all these devices on the network), love and carry sledges (be aware that they can follow)”
    1. 0
      30 January 2018 03: 53
      the best way to not install any antivirus software at all and not to go online. Then you certainly won’t catch the virus, and infa will not go to special services ...


      Not at all like that. Computer infection is possible even without access to the network, a trivial, not disconnected autorun from a flash drive as the most common reason.

      Information from the device can be merged without the Internet, there are enough ways. From the introduction into the PC of the module that transfers them to a nearby device, to the use of changing the fan speed as an encoding and recording them, for example, to a microphone and then converting the code into information. Only this method has low bandwidth.
  10. 0
    29 January 2018 14: 08
    I thought that the infrastructure should be developed to raise the level of service and quality of services. But it turned out that this was necessary in order to contain the Chinese threat)))