美國抵製華為真正的意圖是什麽?
美國政府說禁止美國的電信公司使用華為的設備,甚至販賣華為的手機是為了國家安全。英國,澳洲和紐西蘭也紛紛跟進。台灣的蔡英文政府最近幾日也意圖跟進,工研院和國科會先後宣布區內禁用華為的手機,似乎響應美國的號召。
另外,台灣和中國的,還有亞洲的媒體評論,認為美國的這個動作其實是科技之爭,抵製華為的5G, 因為美方已經在5G通信科技方麵落後,采取的政策幹預,和國家介入私人企業商業的行為!
以上的看法全部完全錯!都不是真正的原因!
關於美國宣稱是為了國家安全的理由,破綻在:
1。沒有任何證據顯示華為賣出的設備隱藏任何監聽的木馬程式,華為的總裁任正非1/17日召開記者會出來否認,說不曾為中國政府做間諜,竊聽軟件,或提供客戶資料,通信記錄等。華為以客戶為中心,不損害客戶的權益。
如果華為賣給美國企業,或任何國家的通信設備有間諜或竊聽軟件,美國,英國,澳洲和紐西蘭等早就采取法律行動,查封華為,緝捕華為在各國的主管,並會下達國際刑警緝捕華為總裁等!
單單美國的刑罰,就可以立刻讓華為必須宣告破產解散,美國的司法部可以沒收華為的資產,之外,還可以開上千億美元的罰金, 並且勒令華為必須解散!
華為的CFO孟晚舟的通緝與美國國家安全無關,是美國懷疑華為2015年之前,違反美國對伊朗的貿易製裁,采取的霸道無理行為。不要混為一談!
2。有人或許說,華為的通訊設備現在沒有隱藏間諜或監聽軟件,不代表未來不會有, 為了防範,提前禁止也是合理的!
這種說法其實是無賴的行為!相當於因為懷疑某人未來可能會犯法,所以先把人關到監獄裏,非常的荒唐!
3。禁止華為的通訊設備(交換機,路由器,Gateway)等或許還沾上可能發生安全的理由。但禁止華為的手機是完全與安全無關,是蠻橫的行為!
手機本身不會接觸到整個通信網的流量和資訊, 是Peer to Peer的通信,是通信終端的設備。沒有任何手機可以監控塔台,交換機,或看到其它手機的通信信息和資料。
有些木馬程式,若裝到手機裏,可以讓遠端的手機控製,打開錄音或錄影功能,達到監聽監視的功能。但這不是大範圍的監聽,達不到間諜的功能!這是要預先在對象的手機上一一裝置監聽木馬程式,談何其難!而且很容易被使用者發現!
如果華為可以在美國重要官員使用的手機上一一安裝木馬程式,這表示也可以在他們家裏,辦公室裏裝監視監聽器!這難度是一樣的!美國的政府官員也不一定全部使用華為的手機,大部分美國人使用的是蘋果,三星的手機。
華為若要這麽做,還不如寫一個很受歡迎的手機應用程式(APP),免費下載,而這個APP其實有間諜的功能!這樣監聽就會普及,不僅僅限製在華為的手機上!又不會引火上身,被人抓到!這時製造病毒或木馬軟件,不用牽扯到手機!
所以為了國家安全的緣故而禁止華為的手機是腦殘的行為,台灣的工研院難道都是科技盲嗎?不過是為了政治的意識形態,而全部變成瞎子和白癡!
那麽,有沒有可能是想打擊華為的第五代移動通訊(5G)?
華為的第五代移動通訊(5G)設備還在測試, 小區域試用改進階段,賣出去的設備不到1% 華為的銷售額!全球可以說沒有任何一個國家已經推廣使用。
美國政府所禁止的不是限於最新的第五代移動通訊(5G)設備,而是華為和中興所有的設備!包括目前開始普遍的4G設備或還在使用的3G設備,全部禁止!在時間上,美國不是最近才禁止,而是2009年就禁止,或道德勸說,或威脅美國的電信企業,若是使用華為的設備,將失去聯辦政府的投標資格。當時還沒有5G!
華為最大的營收除了來自手機,就是電信公司購買的第移動通訊3G和4G設備。先進已開發的國家,未來會購買的最可能是4G的設備!東南亞,非洲,南美洲的國家還在3G的設備。
所以中國,台灣地區或亞洲的評論員說是為了打擊華為移動5G通訊是可笑的!華為雖然已初步測試成功,但還談不上能夠壟斷全球,連在中國還隻是試用階段!雖然起步速度快,不見得能夠跑贏,變得全球的標準!這第五代移動通訊(5G)是長跑,是馬拉鬆比賽!是未來20年移動通信的主要規格!
究竟是設麽原因呢?
這是為了美國現有的全球監視網, Global Surveillance Networks, 由5顆眼睛(Five Eyes),美國,英國,澳洲,加拿大,紐西蘭5國聯盟組成, 分別在全球各地區從事監視,收集情報和間諜事務。從事的監控包括網際網路所有的活動,訪問者的IP紀錄,網路搜索紀錄,商業和私人電子信箱郵件,傳真等。方法有:
1。利用美國的核能潛艇,在洲際光纖纜安裝資訊拷貝儲存器,把通過光纖的所有資料複製儲存,定期上載收集。
然而這種收集到的資訊是原始,混亂,參雜在一起,又是巨量的。要剝離變成有用可以閱讀,可以搜索的資料非常困難,要浪費很多時間和人力, 與大海撈針差不多。
2。利用美國的跨國公司如Google, Microsoft, Yahoo, Facebook, 蘋果等所收集的大數據,要求這些企業分享給美國國家安全局(NSA),也就是情收集報分析組織。這計劃叫做Prism,是美國的NSA瓶喲聘用 計算機維護工程師,Edward Snowden下載CIA內部的大量資料後,逃往國外後公布的!
歐巴馬政府曾經下達格殺勿論的指令,欲要把他在公布資料前阻止! Prism這計劃大概在2000年, 911事件之後開始的。小布什政府的Patriot Act, 10/26/2001在國會通過後,允許美國的情報單位,FBI, 警察局收集和搜索個人的資料,商業記錄,監視個人,包括圖書館所借的書,網路上訪問的網頁等,無所不涵蓋。雖然後來Patriot Act原定在2005年落幕,但被小布什和歐巴馬政府延續,2015年更換名字為Freedom Act後繼續保留。
這樣的收集情報,收集商業機密和個人隱私是最簡單的!2010年Google宣布撤離中國,說是為了保護使用戶的隱私,不願意讓中國政府監控,現在看來是一個大笑話!因為當時Google就在配合美國的政府,提供巨量的使用戶的搜索曆史和GMail內容,違反使用戶的隱私權,而不告知!
Google的Search, Microsoft 的Bing,都會永久保留使用戶使用過的搜索關鍵字。 Google Map, 永久保留客戶搜索過的地圖, 即使使用者已經從該電腦/手機上刪除,還保留在Google的資料庫,與使用者GMAIL帳號連接,永遠保存!
俺現在懷疑當初Google 1998年成立,大約2004年新上市時,可以迅速壯大,背後有美國政府的幫助,打算將來成為美國收集情報的民間機構!
當時許多分析師,都不看好Google,不知道Google免費提供儲存量1GB, 分析師們懷疑Google營收來源是否足夠購買那麽多伺服器和容量!當時個人計算機最大的硬盤容量大約就是100GB。而當時領先Google很多,最大的科技公司微軟所提供使用者免費的電子郵箱Hotmail,與MSN EMAIL的容量大約是100MB, Yahoo也大約是如此!這兩家都比當時的Google規模大100-1000倍,而且盈利非常的高,而無法或不願意提供 1G的免費存量。而Google剛起步,能夠花上幾十億美元,甚至上百億美元建立當時超過 10萬台伺服器的PC Farm, 實在令人驚訝! 目前Google的伺服器是機密,有人估計超過數百萬台!
PRISM利用美國企業壟斷的優勢,從事幫美國收集情報的作用,不管是自願或被迫的,無疑就是從事間諜行為。因為這是跨國的,不僅僅限製在美國境內。
Prism的好處,是所得到的資料是直接和深入的。比如從FB可以把所有關係人連接起來。從Google Map的曆史質料,可以知道此人過去去過什麽地方。免費的GMAIL提供此人過去的通信記錄,沒有比這更好的情報收集!
2013年8月1日,媒體報道紐約長島有一戶人家,因為在網上利用Google搜索“壓力鍋”(Pressure Cooker)和背包(Back pack), 隔幾日就被反恐單位8位人員上門搜索調查。 這是因為之前波士頓的馬拉鬆賽跑活動出現壓力鍋的爆炸案,引起反恐人員對壓力鍋和背包的注意。但這也顯示Google的角色, 並非隻是簡單的提供大批的Metadata(元數據),不包含個人的特殊資料。也許FBI在特殊的情況下,要求Google提供所有有這樣搜索記錄的使用者成為嫌疑犯。 換言之,Google是積極的參與者,是積極幫FBI反恐。
當然事後政府單位否認,說是得到有人密報!這戶人家是完全清白的,看姓名應是白人,不是中東,中亞或回教徒的姓名。所謂有人密報是恐怖分子的概率是零。
以下是當時的新聞:
Michele Catalano, who lives in Long Island, New York, said her web searches for pressure cookers, her husband's hunt for backpacks and her "news junkie" son's craving for information on the Boston bombings had combined somewhere in the internet ether to create a "perfect storm of terrorism profiling".
3。XKeyScore,這間諜軟件工具的功能據Edward Snowden的描述如下:
On January 26, 2014, the German broadcaster Norddeutscher Rundfunk asked Edward Snowden in its TV interview: "What could you do if you would use XKeyscore?" and he answered:
You could read anyone's email in the world, anybody you've got an email address for. Any website: You can watch traffic to and from it. Any computer that an individual sits at: You can watch it. Any laptop that you're tracking: you can follow it as it moves from place to place throughout the world. It's a one-stop-shop for access to the NSA's information.
... You can tag individuals ... Let's say you work at a major German corporation and I want access to that network, I can track your username on a website on a form somewhere, I can track your real name, I can track associations with your friends and I can build what's called a fingerprint, which is network activity unique to you, which means anywhere you go in the world, anywhere you try to sort of hide your online presence, your identity.
以上所描述的非常驚人,美國的科技難道已經超出人類的範圍嗎?無所不在,無所不知的隻有神!
其實很簡單,全球大約有90%的個人計算機是使用微軟視窗。如果微軟視窗裏有後門,NSA可以很容易設計間諜軟件閱讀該計算機,植入標簽和監視軟件,隻要一上網, 就自動把微軟作業係統下的文件當,電子郵箱,IE的閱覽網頁曆史全部自動匯報給XKeyscore。
所以這部計算機的主人即使換地方,到不同的國家,一連接網路,位置因所在的IP不同而被自己的計算機報告給XKeyscore,IP位址可以追查出國家,城市與住址!個人計算機簡直變成追蹤器!
如果俺的分析合理而真實,XKeyScore的間諜功能就遠比Prism和海底光纖收集情報高明!個人電腦被植入的軟件,可以透過微軟的更新時植入。這間諜軟件在計算機閑暇時間,稍描整個計算機硬盤,尋找可疑的關鍵字,比如說某個賓拉登,某個組織,某個武器,炸彈等,然後悄悄匯報給XKeyScore作判斷和建檔案。
也隻有這樣才能做到XKeyScore的無所不知,無所不在的神奇功能!說穿了就不值錢!
微軟的視窗作業係統,許多國家都懷疑是有後門的,有MasterKey(萬能鑰匙), 可以讓美國的NSA直接進入。曾經有60個國家禁止政府部門使用微軟視窗,包括俄羅斯和中國政府。
大約2004-2008年之間,微軟突然宣稱願意提供微軟的Security API(安全介麵)的原始碼(Source Code),讓各國政府檢視,表示沒有隱藏間諜功能或後門,各國政府可以放心使用!
然而這動作更加起人疑竇,是“此地無銀三百兩”的行為,欲蓋彌彰的動作!微軟視視窗的原始瑪為聚寶盆,防範戒備森嚴,怎麽突然轉性,要把部分安全介麵的原始碼與其它國家分享呢?為什麽要說服他們使用視窗作業係統呢?目的何在?
其它的作業係統如UNIX和LINUX已存在多年,從來沒有人懷疑這作業係統有問題,特別是間諜問題!Linux是公開原始碼的作業係統,自然不可能有隱藏的木馬程式。而UNIX Berkerley (BSD UNIX, 1977年)和UNIX 5(1982年),曆史都比Windows作業係統久,後來成為IBM的AIX ,Oracle(Sun Micro System)的Solaris,HP UNIX, 還有APPLe MAC OS的藍本,從來沒有人懷疑過。為何單獨懷疑微軟的視窗作業係統?
許多國家在檢視了微軟提供的原始程式後還是不解除禁令!為什麽?
因為微軟所提供的程式碼即使看不出有問題,不代表微軟視窗作業係體不會有問題!微軟每一個版本的視窗都經常更新。一年下來的補丁,包括安全係統的補丁超過百個。比如作業係統視窗2000,當時微軟的總裁比爾蓋之(Bill Gate)在2000年時說要打造成最為可靠,穩定和安全的作業係統,為此延後發行半年,解決了2000個錯誤後才發行。但Win 2000發行後,最少還有2000個錯誤,必須利用補丁來更新的。 同樣的Windows XP, 有XP1,XP2, 和XP3,補丁程式超過數百個。
微軟公司,可以在任何一個補丁裏,植入間諜軟件,是太容易了!更何況,微軟就做過這樣的事!
這是1997年美國聯邦政府調查微軟利用壟斷的視窗地位,搭售Internet Explorer(簡稱IE),打擊Netscape 的互聯網瀏覽器。這是當時使用最廣的瀏覽器。在答辯當中,微軟的律師代表團說IE是Win95 不可分割的軟件,是無法剝離的!這是資訊(軟件設計)最可笑的答辯!因為Windows 95 的第一個版本根本就沒有IE,到了Windows 95 的B版才有包含IE。
結果反壟斷的聯邦政府檢查官清Princeton 大學的計算機教授負責剝離IE與Win95 需噢業係統。很快就完成。可是微軟在法庭上,拿一部計算機,請那位教授裝上他剝離的IE,結果不能運行!教授立刻回答法官說,微軟更動了演示的Win95,造成他剝離的IE不能跑, 原始微軟提供的作業係統上是可以完美運行的!這是微軟公堂上作假,當場被法官Thomas Penfield Jackson 嚴厲斥責!
同樣的,微軟提供給各國政府的Source Code, 自然可以在某一次更新的補丁裏換掉,植入間諜軟件!
俺曾在1998年看到CBS的一則新聞,說加拿大多倫多的計算機教授,在研究視窗的安全界麵時,發現含有2個MasterKey(萬能鑰匙), 一隻屬於微軟,另一隻屬於NSA!可是該新聞在大約幾個小時後就消失,被刪除了!
4。但這還不夠全麵,有些人不使用計算機傳送信息,打固定電話(Land Line),使用手機要如何攔截監聽?
美國政府原本就要求美國所有的電信公司如AT&T,Verizon, Sprint, T-Mobile 等的設備必須提供執法單位監聽的功能。這是The Commission on Accreditation for Law Enforcement Agencies, Inc., (CALEA®) 的要求。
美國情報或執法單位隻要輸入要監聽的號碼,IP, 任何經過該通信交換機的通話,簡訊,都會自動複製到監控中心錄音,或記錄下來。
但是對於外國的電信局,通訊公司,美國政府沒有管轄權,無法下令監聽,要如何做到呢?
這就是2013-2014年爆發的CISCO設備被NSA植入監聽軟件事件。
Cisco當時的CEO John Chambers上媒體哭訴抱怨美國國家安全局(NSA)偷偷把CISCO出口的設備拆開後,一一植入間諜軟件,他表現的非常不滿與生氣, 還寫信給歐巴馬要求約束NSA!
其實這不過是演戲!
事實是Cisco應NSA的要求,把CALEA監聽的功能要包含在出口的設備裏,但不告訴對方,變成隱藏的監聽後門,因是不同國家,是違反國際法的,所以這樣的監聽軟件可以稱為間諜軟件。 NSA有萬能鑰匙,可以任意在別人領土上的電信局裏非法監聽,從事間諜活動!
若說NSA不得到Cisco的幫助,是私自拆箱植入間諜軟件幾乎是不肯能做到的!因為:
A。一一拆箱太麻煩。還要一一按不同的設備和型號植入不同篡改版本的軟件實在是要花費很多時間也容易出錯!一旦出錯,裝錯不同的軟件,設備就無法啟動。
B。沒有Cisco的原始碼,要植入監聽程式,必須先破解機器碼,做逆向工程。然後改寫後編譯,必須多次測試才能保證沒有錯誤。這困難度比NSA的軟件工程師在自行開發Cisco的電信設備軟件還要難!
如果逆向工程很容易,企業就不需要花大筆錢在研發。隻要把對手的新產品買一套,做逆向工程,就可以開發出自己的新產品。實際上逆向工程會比自己開飯來得複雜, 花費更高。
整個NSA的工程師都沒有整個Cisco的那麽多,又沒有Cisco產品的軟件設計藍圖,任何修改都可能造成修改後的程式不工作!通訊設備的種類型號很多,程式都不一樣,可以說有幾百種以上。
所以這是不可能做到的!更不用舍近求遠,隻要與Cisco合作,甚至委托Cisco附加隱藏的監聽軟件,就變得很簡單。因為監聽軟件是CALEA的要求,把這功能隱藏起來,裝到出口的設備上,一手由CISCO包辦,就變得太簡單!
C。最重要是通信設備的軟件是可以更新的,是常常更新的,因為軟件常常會有意想不到的Bug(錯誤), 所以必須更新。也可能是新增加功能所以需要更新。這更新是可以在當地的電信局裏或透過互聯網, 又Cisco遠端更新。
所以即使NSA官員私自拆箱,灌進自行篡改植入的軟件,在未來軟件更新的過程當中也會失去,換回Cisco原本無毒, 無間諜軟件的。 NSA豈不是白做工了嗎?
移動5G的重要性是不可以否認的。由於通訊的速度增加,未來的應用會更廣,更深入消費者家庭。比如用來控製機器人,家用電器和燈光,無人駕駛的更改路線和目的地。這無疑要更依賴大數據庫,也更好成為收集情報的來源。各國情報機構無疑想要掌握這樣的數據庫,可以知道個人的行程和作息時間。 各國政府在自己的管轄範圍內這麽做也許無可厚非,但若是要強加在別人的領土上,這就是違反國際法,是間諜的行為。而且是非常不道德的,因為這是利用民間企業當作間諜的工具!
總結:
為了監控全球,收集情報,收集商業機密,科技機密,美國政府 利用微軟,穀歌,亞虎,臉書,Cisco的設備,數據庫,個人檔案資料庫,進行無差別的收集,掃描和分析,收集情報,收集商業,軍事和科技機密。利用個人能計算機,利用電信局的交換機,路由器等設備,在互聯網上到處安置間諜軟件。
如果華為的設備, 被全世界電信局廣為接納,美國就沒有能力安裝間諜軟件。達不到可以監視監聽世界上任何一部電腦上互聯網,搜索,瀏覽和通訊的資料。任何一部手機,傳真都必須經由交換機。 所以華為的設備阻擋了美國在全球電信設備的非法入侵,安置間諜軟件的行為i。這是破壞美國的利益!Five Eyes國家一同抵製華為的設備,就是相同的原因!這五個國家,違反國際法,在全世界從事間諜和非法監聽活動,所以必須抵製中國華為的設備。
若是這五個國家的電信公司都開始采用華為的設備,就阻擋了政府的監聽行為。因為華為出口的設備,不會隱藏監聽的軟件。美國NSA也很難植入間諜軟件到華為設備的係統程式裏,最簡單的方法就是禁止。禁止的表麵理由是擔心華為的設備被中國政府安置間諜軟件。美國是做賊的喊抓賊!美國自己已經這麽做,而且被抓包了!
真實的理由是華為的設備,美國NSA無法安裝間諜軟件,妨礙美國收集自己國民的情報,也妨礙美國收集世界各國采用華為設備的國家的情報!所以必須找理由清除!
------------------------------------------------------------------------------
參考:
The Five Eyes, often abbreviated as FVEY, is an anglophone intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence.[1][2][3]
In the late 1990s, the existence of ECHELON was disclosed to the public, triggering a major debate in the European Parliament and, to a lesser extent, the United States Congress. As part of efforts in the ongoing War on Terror since 2001, the FVEY further expanded their surveillance capabilities, with much emphasis placed on monitoring the World Wide Web. The former NSA contractor Edward Snowden described the Five Eyes as a "supra-national intelligence organisation that does not answer to the known laws of its own countries".[6] Documents leaked by Snowden in 2013 revealed that the FVEY have been spying on one another's citizens and sharing the collected information with each other in order to circumvent restrictive domestic regulations on surveillance of citizens
ECHELON network disclosures (1988–2000)[edit]
By the end of the 20th century, the[color=#f00][b] ECHELON surveillance network[/b][/color] had evolved into a global system capable of sweeping up massive amounts of private and commercial communications, including telephone calls, fax, e-mail and other data traffic. This was done through the interception of communication bearers such as satellite transmission and public switched telephone networks.[34]
The Five Eyes has two types of information collection methods: the [color=#f00][b]PRISM[/b][/color] program and the Upstream collection system. The PRISM program gathers user information from technology firms such as Google, Apple and Microsoft, while the Upstream system gathers information directly from the communications of civilians via fiber cables and infrastructure as data flows past.[citation needed] In 1988, Duncan Campbell revealed in the New Statesman the existence of ECHELON, an extension of the UKUSA Agreement on global signals intelligence [Sigint]. The story, 'Somebody's listening,' detailed how the eavesdropping operations were not only being employed in the interests of 'national security,' but were regularly abused for corporate espionage in the service of US business interests. The piece passed largely unnoticed outside of journalism circles.[35] In 1996, a detailed description of ECHELON was provided by New Zealand journalist Nicky Hager in a book titled "Secret Power – New Zealand's Role in the International Spy Network", which was cited by the European Parliament in a 1998 report titled "An Appraisal of the Technology of Political Control" (PE 168.184).[36] On 16 March 2000, the Parliament called for a resolution on the Five Eyes and their ECHELON surveillance network, which, if passed, would have called for the "complete dismantling of ECHELON".[37]
XKeyscore (XKEYSCORE or XKS) is a formerly secret computer system first used by the United States National Security Agency for searching and analyzing global Internet data, which it collects on a daily basis. The program has been shared with other spy agencies including the Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, Japan's Defense Intelligence Headquarters and the German Bundesnachrichtendienst.[1]
PRISM – Operated by the NSA together with the GCHQ and the ASD[53][54]
XKeyscore – Operated by the NSA with contributions from the ASD and the GCSB[55]
Tempora – Operated by the GCHQ with contributions from the NSA[56][57]
MUSCULAR – Operated by the GCHQ and the NSA[58]
STATEROOM – Operated by the ASD, CIA, CSE, GCHQ, and NSA[59]
https://en.wikipedia.org/wiki/Five_Eyes
https://en.wikipedia.org/wiki/XKeyscore
In Letter to Obama, Cisco CEO Complains About NSA Allegations
https://www.recode.net/2014/5/18/11627004/in-letter-to-obama-cisco-ceo-complains-about-nsa-allegations
Snowden: The NSA planted backdoors in Cisco products
'No Place to Hide,' the new book by Glenn Greenwald, says the NSA eavesdrops on 20 billion communications a day -- and planted bugs in Cisco equipment headed overseas
https://www.infoworld.com/article/2608141/internet-privacy/snowden--the-nsa-planted-backdoors-in-cisco-products.html
Backdoors Keep Appearing In Cisco's Routers
by Lucian Armasu July 19, 2018 at 10:00 AM - Source: Cisco Tools
Over the past few months, not one, not two, but five different backdoors joined the list of security flaws in Cisco routers.
https://www.tomshardware.com/news/cisco-backdoor-hardcoded-accounts-software,37480.html
Obama administration spied on German media as well as its government
https://www.cnn.com/2015/07/03/politics/germany-media-spying-obama-administration/index.html
The NSA's Secret Spy Hub in Berlin
According to SPIEGEL research, United States intelligence agencies have not only targeted Chancellor Angela Merkel's cellphone, but they have also used the American Embassy in Berlin as a listening station. The revelations now pose a serious threat to German-American relations.
http://www.spiegel.de/international/germany/cover-story-how-nsa-spied-on-merkel-cell-phone-from-berlin-embassy-a-930205.html
Huawei launches a charm offensive — but PR execs say it may face a 'literally impossible' task
https://www.cnbc.com/2019/01/21/huawei-goes-on-the-pr-push-to-fix-its-damaged-reputation.html
U.S. vs, Microsoft: Timeline
https://www.wired.com/2002/11/u-s-v-microsoft-timeline/
United States v. Microsoft Corporation, 253 F.3d 34 (D.C. Cir. 2001),[1] is a U.S. antitrust law case, settled by the Department of Justice (DOJ), in which the technology company Microsoft was accused of holding a monopoly and engaging in anti-competitive practices contrary to sections 1 and 2 of the Sherman Antitrust Act.
The plaintiffs alleged that Microsoft had abused monopoly power on Intel-based personal computers in its handling of operating system and web browser sales (at the time web browsers were not freeware). The issue central to the case was whether Microsoft was allowed to bundle its flagship Internet Explorer (IE) web browser software with its Windows operating system. Bundling them is alleged to have been responsible for Microsoft's victory in the browser wars as every Windows user had a copy of IE.
https://en.wikipedia.org/wiki/United_States_v._Microsoft_Corp.
New York woman visited by police after researching pressure cookers online
Long Island resident said her web search history and 'trying to learn how to cook lentils' prompted a visit from authorities but police say search was prompted by tipoff
https://www.theguardian.com/world/2013/aug/01/new-york-police-terrorism-pressure-cooker
Patriot Act
The USA PATRIOT Act is an Act of Congress signed into law by United States President George W. Bush on October 26, 2001.[1] With its ten-letter abbreviation (USA PATRIOT) expanded, the Act's full title is "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001".
https://en.wikipedia.org/wiki/Patriot_Act
The USA Freedom Act (H.R. 2048, Pub.L. 114–23) is a U.S. law enacted on June 2, 2015 that restored in modified form several provisions of the Patriot Act, which had expired the day before. The act imposes some new limits on the bulk collection of telecommunication metadata on U.S. citizens by American intelligence agencies, including the National Security Agency. It also restores authorization for roving wiretaps and tracking lone wolf terrorists.[3][4] The title of the act originally was a ten-letter backronym (USA FREEDOM) that stood for Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection and Online Monitoring Act.
https://en.wikipedia.org/wiki/USA_Freedom_Act
Evo Morales grounding incident
On 1 July 2013, president Evo Morales of Bolivia, who had been attending a conference of gas-exporting countries in Russia, gave an interview to the RT television network in which he appeared predisposed to offer asylum to Edward Snowden.[1] Snowden had fled the United States a month earlier after his disclosure of secret, widespread surveillance by the NSA, for which he faced criminal charges in the U.S..
Spain, France, and Italy (red) denied permission to cross their airspace. The plane landed in Austria (yellow)
https://en.wikipedia.org/wiki/Evo_Morales_grounding_incident
https://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa-files-timeline
20 May Edward Snowden, an employee of defence contractor Booz Allen Hamilton at the National Security Agency, arrives in Hong Kong from Hawaii. He carries four laptop computers that enable him to gain access to some of the US government's most highly-classified secrets.
1 June Guardian journalists Glenn Greenwald and Ewen MacAskill and documentary maker Laura Poitras fly from New York to Hong Kong. They meet Snowden in a Kowloon hotel after he identifies himself with a Rubik's cube and begin a week of interviews with their source.
5 June The Guardian publishes its first exclusive based on Snowden's leak, revealing a secret court order showing that the US government had forced the telecoms giant Verizon to hand over the phone records of millions of Americans.
6 June A second story reveals the existence of the previously undisclosed programme Prism, which internal NSA documents claim gives the agency "direct access" to data held by Google, Facebook, Apple and other US internet giants. The tech companies deny that they have set up "back door access" to their systems for the US government.
7 June Barack Obama defends the two programmes, saying they are overseen by the courts and Congress. Insisting that "the right balance" had been struck between security and privacy, he says: "You can't have 100% security, and also then have 100% privacy and zero inconvenience."
The Guardian reports that GCHQ has been able to see user communications data from the American internet companies, because it had access to Prism.
8 June Another of Snowden's leaks reveals the existence of an internal NSA tool – Boundless Informant – that allows it to record and analyse where its data comes from, and raises questions about its repeated assurances to Congress that it cannot keep track of all the surveillance it performs on American communications.
9 June Snowden decides to go public. In a video interview he says: "I have no intention of hiding who I am because I know I have done nothing wrong."
10 June Snowden checks out of his Hong Kong hotel.
12 June Hong Kong's South China Morning Post publishes the first interview with Snowden since he revealed his identity. He says he intends to stay in the city until asked to leave and discloses that the NSA has been hacking into Hong Kong and Chinese computers since 2009.
14 June The Home Office instructs airlines not to allow Snowden to board any flights to the UK.
16 June The Guardian reports that GCHQ intercepted foreign politicians' communications at the 2009 G20 summit.
20 June Top secret documents published by the Guardian show how US judges have signed off on broad orders allowing the NSA to make use of information "inadvertently" collected from domestic US communications without a warrant.
土共對美帝屁都不敢放一個,隻敢抓住加拿大來勁,可惜沒用!
既然是戰爭,要麽是輸或贏,要麽兩敗俱傷最後談和。如果敗了,那就是前蘇聯的結果。沒有捷徑可走。
語民族的地皮,群起攻之,置你死地,什麽民主自由公平和諧,騙騙小學生的。
中國政府過去太疏忽,華為也不反擊,讓公關形象變得很差。當然中國政府必需以國家的力量來幫華為打,以其人之道還擊美國,大肆宣揚美國政府縱容NSA裝植間諜軟件在出口的通訊設備上。在全球不斷重複播放Cisco的John Chambers在媒體上指控美國NSA的片段。
樓主分析的很有道理。 華為和中國的興起會挑戰美國的霸主地位, 這一點美國是不會容忍的。 老大打壓老二, 美國不會讓中國在科技方麵占到先機。 中美之間的惡鬥一定持續下去越演越烈, 不會以平民百姓的意願為轉移。