Rapid Deployment Of 5G Is A Headache

As communications  technology becomes a key isssue for the the fast-expanding Internet of Things (IoT),the need to create  additional bandwidth is critical . While 5G technology only came into operation in 2019 its use will be almost conventional by the end of 2020.

The transition to 5G increases both speed and volume of data communication, but there are a number of important issues that are problematic. 

A lot of attention has been paid to the economic and espionage implications of the Chinese  telecoms indutry's lead in developing and operating 5G infrastructure, but the military implications remain largely overlooked.  Furthermore. 5G networks are leveraging technologies that are software-centric and are moving from custom hardware to software components running on commercial hardware. 

Fake News & Other Problems 

Recently the popular singer Keri Hilson tweeted that that 5G has been used to spread the Corona virus. Citing Wikipedia, Hilson tweeted that the first 5G service launched last November in China, writing that what we're now going through is "the affects of radiation." She is even reported to said that people died when 5G first launched although such comments are nonsense.

With the increase in software content across comes some new problems as these new 5G technology innovations are widening the attack surface of the system.  While 5G core network functions are making use of a new and different software architecture, common technologies like HTTP and REST APIs that are well known are replacing proprietary interfaces of the past. 

All of these things increase the potential for cyber security vulnerabilities and the military applications of 5G technology have vital strategic and battlefield implications for the US and many other leading military powers. 

Historically, the US military has reaped enormous advantages from employing cutting edge technology on the battlefield and  5G technology holds similar innovative potential. The next generation of telecommunications infrastructure will have a direct impact on improving military communications, however, it will also produce cascading effects on the development of other kinds of military technologies, such as robotics and artificial intelligence. 

Space-based communications will play a key role in connecting 5G devices, US Air Force leadership stressed and while military officials have expressed concern over China winning the race to 5G. “We need to up our game in 5G,” Will Roper, the US Air Force’s head of equipmnt acquisition said recently.

The global competition over 5G technology has accelerated. The Trump administration is working to isolate China’s Huawei, the world’s largest telecommunications equipment manufacturer, from developing a larger foothold in US partner countries. 

For instance, if the United States were to conduct a military operation in an area of interest to China, it is plausible that the Chinese government could leverage Huawei to intercept or even deny military communications. 

The Trump administration has specifically worked to keep members of the Five Eyes intelligence-sharing group, the US, UK, Canada, Australia and New Zealand, from working with Huawei. Although, so far this has not worked on UK, which is still saying it will implement a reduced version of Huawei's 5G’s network equipment.

The British Prime Minister has decided that the Chinese technology firm, along with other companies deemed "high-risk," are allowed to be part of the country's 5G and telecoms networks. But their involvement is limited. Huawei won't be allowed to have its technology involved in key parts of the UK's Critical National Infrastructure, 'core' parts of communications networks, or at sensitive military or nuclear sites. 

5G Is A Geopolitical Issue

Huawei's strong 5G presence is a concern for the US military as it could potentially undermine operations as all military activities will begin to rely more on 5G connectivity, it can’t risk having China involved in building out American infrastructure using Chinese-made tech from the likes of Huawei.

It’s all about two of the dominant superpowers in the world, China and the USA. Although there are plenty of companies from around the world that are building 5G mobile networks (notably including Nokia, Samsung and Ericsson), China's Huawei is a majot global competitor and the Five Eyes intelligence operation believes Huawei to be run by the Chinese Government. 

Wired:       I-HLS:      Council on Foreig Relations:       TechRadar:        Paper

You Might Also Read: 

Is Widespread Suspicion Of Huawei Justified?:

 

« AI Can Give An Early Warning Of Coronavirus
New Guidelines For Maritime Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality ISAC operates as a central hub for sharing sector-specific cyber security information and intelligence.

Labris Networks

Labris Networks

Labris Networks specializes in DDoS mitigation, NG Firewall, Unified Threat Management, Centralized Management, Regulatory Compliances and SOC/CERT Services.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

National Cybersecurity Society (NCSS)

National Cybersecurity Society (NCSS)

The National Cybersecurity Society is a non-profit organization focused on providing cybersecurity education, awareness and advocacy to small businesses.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

NI Cyber Security Centre

NI Cyber Security Centre

NI Cyber Security Centre works to make Northern Ireland cyber safe, secure and resilient for its citizens and businesses.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.

Inholo

Inholo

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service.