Why 5G Technology Is A Geopolitical Issue

5G technology only came into operation in 2019, yet at the expected rapid rate of deplyment will soon become  commoplace and while 5G networks are leveraging technologies that are software-centric are moving from custom hardware to software components running on commercial hardware. 

While 5G will certainly increases speeds, there are a number of issues that still to be dealt with. In particular, the increase in software content across 5G platform raises problems, as these technology innovations are widening the attack surface of the system. 

While 5G core network functions are making use of a new and different software architecture, common technologies like HTTP and REST APIs that are well known are replacing proprietary interfaces of the past. All of these things increase the potential for cyber security attacks and vulnerabilities.

Much attention has been paid to the economic and espionage implications of a Chinese lead in developing and operating 5G infrastructure, but the military implications remain largely overlooked.  The military applications of 5G technology have vital strategic and battlefield implications for the US. Historically, the US military has reaped enormous advantages from employing cutting edge technology on the battlefield. 5G technology holds similar innovative potential.

Perhaps most obviously, the next generation of telecommunications infrastructure will have a direct impact on improving military communications, however, it will also produce cascading effects on the development of other kinds of military technologies, such as robotics and artificial intelligence. 

Space-based communications will play a key role in connecting 5G devices and the US military officials have expressed concern over China winning the race to 5G. 

The global competition over 5G technology has accelerated. The Trump administration is working to isolate China’s Huawei, the world’s largest telecommunications equipment manufacturer, from developing a larger foothold in US partner countries. 
For instance, if the United States was conducting a military operation in an area of interest to China, it is plausible that the Chinese government could leverage Huawei to intercept or even deny military communications. 

The administration has specifically worked to keep members of the Five Eyes intelligence-sharing group, the US, UK, Canada, Australia and New Zealand, from working with Huawei, although his has not worked in UK, which is still saying it will implement a reduced version of 5G’s Chinese operations. 

Huawei won't be allowed to have its technology involved in key parts of the UK's Critical National Infrastructure, 'core' parts of communications networks, or at sensitive military or nuclear sites. On top of this, the government is also putting a restriction on the amount of a network that Huawei can own: 35 per cent.

In any event, China's Huawei will have strong 5G presence is a concern for the US military as it could potentially undermine operations will increasngly rely more on 5G connectivity, and cannoy risk having China involved in building out American infrastructure using Chinese-made tech from the likes of Huawei.

Although there are plenty of companies from around the world that are building 5G mobile networks (Nokia, Samsung, Ericsson, to name but three), a seriously big player across the world is Huawei and the Five Eyes intelligence operation believes Huawei to be run by the Chinese Government. 

TechRadar:        Council On Foreign Relations:        I-HLS:       Wired

You Might Also Read: 

Cyber Effects Of Industry 4.0 On Warfare:

Is Widespread Suspicion Of Huawei Justified?:

 

 

 

« The US & Britain Edge Closer To An Agreement On Huawei
Coronavirus And Your Phone »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

PartnerRe

PartnerRe

PartnerRe provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

Sysmosoft

Sysmosoft

Sysmosoft specializes in providing highly secured telecommunication solutions for mobile devices for companies requiring protected access to sensitive data remotely.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

Prelude

Prelude

Prelude offer the first autonomous platform built to attack, defend and train critical assets through continuous red-teaming.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

Microminder Cyber Security

Microminder Cyber Security

Microminder Cyber Security are innovators, advisors, strategists committed to solving your cyber security challenges.

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.