The US Has A New 5G Security Strategy

The US has released its National Strategy with the aim to: Secure 5G for the US. The brief report explains how America will protect fifth-generation wireless infrastructure at home and overseas. The 7-page policy document sets out the president’s “vision for America to lead the development, deployment, and management of secure and reliable 5G communications infrastructure globally.

President Trump has written an introduction to the document in which he makes some key statements.

“Fifth generation wireless technology, or 5G, will be a primary driver of our Nation’s prosperity and security in the 21st century".

"This new technology will provide consumers, businesses, and governments with remarkably fast network connections that will enable tens of billions of new devices to harness the power of the Internet, transforming the way we live, work, learn, and communicate.” he goes on to write.

“This is a target-rich environment for those with nefarious motives due to the number and types of devices it will connect and the large volume of data that those devices will transmit.” 

“The United States will work with like-minded countries to lead the responsible international development and deployment of 5G technology and will work to promote the availability of secure and reliable equipment and services in the market.”

This is President Trump’s first steps to meet the requirements laid out by the US Congress' Secure 5G and Beyond Act, which he recently signed into law. 

The Document Outlines Four Distinct Lines Of Activity 

They each briefly lay out the administration’s approaches and aims to:

  • Facilitate the domestic rollout of 5G
  • Assess the risks and identify the core security principles of 5G infrastructure 
  • Assess the risks to United States economic and national security during development and deployment of 5G infrastructure worldwide 
  • Promote responsible global development and deployment of 5G. 

Development of the new 5G strategy was an interagency effort, led by the National Security Council and National Economic Council.

The security of 5G has been at the top of the Trump Administariont’s priority list for a long time, principally because 5G wireless technology enables unprecedented levels of connectivity between millions of new internet of things devices and there are already a range of releases across America and in some federal agencies. 

This report lays our this 5G strategy as America is considering the potential threats from China and elsewhere from the 5G supply chain at the same time as the US is asking other nations, particularly the UK, not to use products from foreign companies, such as Huawei, which it believes might pose a serious risk to national security.

The United States and the United Kingdom have agreed to “further” reduce Huawei’s presence in telecom infrastructure, US Defense Secretary Mark Esper said at a Pentagon press conference on the 26th March when he highlighted the importance of the intelligence-sharing agreement between the United States, the United Kingdom, and the other Five Eyes intelliegnec sharing nations. 

DefenseOne:      US Congress:      Politico:      NextGov:    MeriTalk:       DefenseOne

You Might Also Read: 

Why 5G Technology Is A Geopolitical Issue:

Five Eyes Intelligence Chiefs Point The Finger:

 

 

« IoT - Pandemics, Opportunities And Massive Data Risks
An 'Infodemic' Of Phishing & Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

ThreatBook

ThreatBook

ThreatBook is dedicated to providing real-time, accurate and actionable threat intelligence to block, detect and prevent attacks.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative

Beryllium InfoSec Collaborative is an information security and cyber security company with 40-plus years of experience across industry & government.

ForAllSecure

ForAllSecure

ForAllSecure’s mission is to make the world’s software safe by pioneering autonomous cybersecurity tools that automatically find and fix vulnerabilities in run-time executable software.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.