5G Mobile Technology Poses An Espionage Risk

Superfast "fifth generation 5G" mobile internet could be launched as early as next year in some countries, promising download speeds 10 to 20 times faster than we have now. 

What is 5G exactly?
It's the next, fifth-generation of mobile Internet connectivity promising much faster data download and upload speeds, wider coverage and more stable connections. It's all about making better use of the radio spectrum and enabling far more devices to access the mobile internet at the same time. 

When is it coming?
Most countries are unlikely to launch 5G services before 2020, but Qatar's Ooredoo says it has already launch a commercial service, while South Korea is aiming to launch next year, with its three largest network operators agreeing to kick off at the same time. China is also racing to launch services in 2019.

5G technology can be used for espionage purposes. 
This is according to David Vigneault, Director of the Canadian Security Intelligence Service (CSIS), 5G can be used to target large companies and universities in order to get new information and technologies. Targets are mostly dual-use technologies, having both civilian and possibly military or security purposes. “CSIS has seen a trend of state-sponsored espionage in fields that are crucial to Canada’s ability to build and sustain a prosperous, knowledge-based economy,” he said. 

“I’m talking about areas such as AI, quantum technology, 5G, biopharma and clean tech. In other words, the foundation of Canada’s future growth.” 

Mr. Vigneault said large corporations typically hold the most valuable information but they try to put in state-of-the-art cyber defenses, while Canadian universities are largely unaware how they are vulnerable to economic espionage and the threat of infiltration by unnamed state actors who would use their expertise to gain an edge in military technologies. 

These comments come at a time when the head of UK’s Secret Intelligence Service, MI6, raised concerns of Huawei, the Chinese technology giant, being involved in the development of the country’s 5G infrastructure. 5G, the next iteration of mobile network technology, could potentially help cities become more connected to smart technology. 

According to MI6 Chief Alex Younger, “We need to decide the extent to which we are going to be comfortable with Chinese ownership of these technologies and these platforms in an environment where some of our allies have taken very definite positions”.

Echoing the words of spy chiefs in the United States, Australia and New Zealand, Mr. Younger said 5G technology, which offers faster download speeds, poses a greater national security threat than conventional mobile technology.

“With 4G there are specific modes of technology and we developed a very good understanding with Huawei of where we were able to monitor and look at that aspect of their offer,” Mr. Younger said. “That is impossible with 5G.”

The MI6 chief said the advent of 5G technology would make it more challenging to monitor Huawei technology, a task made especially difficult by China’s one-party state. “In China, they have a different legal and ethical framework,” Mr. Younger said.

“They are able to use and manipulate data sets on a scale that we can only dream of.”

These concerns regarding 5G technology also come at a time when three members (New Zealand, Australia, US) of the Five Eyes intelligence-sharing alliance have decided to ban Huawei from 5G networks.

I-HLS:         BBC

You Might Also Read:

British Telecom Is Stripping Huawei Out Of Its Network:

 

« The Fourth Industrial Revolution Built On Blockchain And AI
South African Cybercrime Is Advancing Fast »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NCX Group

NCX Group

NCX Group is committed to helping customers identify and mitigate the risks inherent in today’s interconnected environments and business processes.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Humming Heads

Humming Heads

Humming Heads offers a complete solution to fight the advanced threats that target a company's endpoints and servers.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

Eleviant Tech (CTG Group)

Eleviant Tech (CTG Group)

Eleviant Tech (CTG Group) is a USA based digital transformation company with expertise in Mobile, Cloud, Web, IoT, AR, RPA, Cyberseurity and AI Technologies.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.