The Chinese military and their hackers, which are one and the same, have spent their time doing corporate espionage. They've built competitive weapon systems based on what their hackers were able to steal. And then they're able to steal that and create competite, competing infor structure. When somebody wants to put five in their country, they're going to choose between the chinese five g and american or norwegian,. you know, scandinavian basely five g from the westrect that is the play book here. It does feel like the one two punch of having heath ledger's joker of booten coming and crossing massive chaos. Now that leaves a wide open path for
Jason does a short news segment on China’s Bitcoin Mining hash rate falling to 0 and how the U.S. is now the largest mining hub (1:59). Then, Jacob Helberg author of "The Wires of War: Technology and the Global Struggle for Power," joins to discuss China's long-term goals (9:03), the United States' lack of preparedness, the struggle for control of front-end and backend technologies (32:22), plus much more.