The US Has A New 5G Security Strategy

The US has released its National Strategy with the aim to: Secure 5G for the US. The brief report explains how America will protect fifth-generation wireless infrastructure at home and overseas. The 7-page policy document sets out the president’s “vision for America to lead the development, deployment, and management of secure and reliable 5G communications infrastructure globally.

President Trump has written an introduction to the document in which he makes some key statements.

“Fifth generation wireless technology, or 5G, will be a primary driver of our Nation’s prosperity and security in the 21st century".

"This new technology will provide consumers, businesses, and governments with remarkably fast network connections that will enable tens of billions of new devices to harness the power of the Internet, transforming the way we live, work, learn, and communicate.” he goes on to write.

“This is a target-rich environment for those with nefarious motives due to the number and types of devices it will connect and the large volume of data that those devices will transmit.” 

“The United States will work with like-minded countries to lead the responsible international development and deployment of 5G technology and will work to promote the availability of secure and reliable equipment and services in the market.”

This is President Trump’s first steps to meet the requirements laid out by the US Congress' Secure 5G and Beyond Act, which he recently signed into law. 

The Document Outlines Four Distinct Lines Of Activity 

They each briefly lay out the administration’s approaches and aims to:

  • Facilitate the domestic rollout of 5G
  • Assess the risks and identify the core security principles of 5G infrastructure 
  • Assess the risks to United States economic and national security during development and deployment of 5G infrastructure worldwide 
  • Promote responsible global development and deployment of 5G. 

Development of the new 5G strategy was an interagency effort, led by the National Security Council and National Economic Council.

The security of 5G has been at the top of the Trump Administariont’s priority list for a long time, principally because 5G wireless technology enables unprecedented levels of connectivity between millions of new internet of things devices and there are already a range of releases across America and in some federal agencies. 

This report lays our this 5G strategy as America is considering the potential threats from China and elsewhere from the 5G supply chain at the same time as the US is asking other nations, particularly the UK, not to use products from foreign companies, such as Huawei, which it believes might pose a serious risk to national security.

The United States and the United Kingdom have agreed to “further” reduce Huawei’s presence in telecom infrastructure, US Defense Secretary Mark Esper said at a Pentagon press conference on the 26th March when he highlighted the importance of the intelligence-sharing agreement between the United States, the United Kingdom, and the other Five Eyes intelliegnec sharing nations. 

DefenseOne:      US Congress:      Politico:      NextGov:    MeriTalk:       DefenseOne

You Might Also Read: 

Why 5G Technology Is A Geopolitical Issue:

Five Eyes Intelligence Chiefs Point The Finger:

 

 

« IoT - Pandemics, Opportunities And Massive Data Risks
An 'Infodemic' Of Phishing & Malware »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

Israel National Cyber Directorate (INCD)

Israel National Cyber Directorate (INCD)

The Israel National Cyber Directorate is the national security and technological agency responsible for defending Israel’s national cyberspace and for establishing and advancing Israel’s cyber power.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Virsec Systems

Virsec Systems

Virsec detects and remediates previously “indefensible” advanced memory-based attacks on critical applications and server endpoints.

CybeReady

CybeReady

CybeReady’s Autonomous Platform offers continuous adaptive training to all employees and guarantees significant reduction in organizational risk of phishing attacks.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

Motorola Solutions

Motorola Solutions

Motorola Solutions build mission-critical services, software, video and analytics, backed by secure, resilient land mobile radio communications.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

AppSentinels

AppSentinels

Appsentinels are a group of security and technology experts with a mission to fix gaps in application security.

Nothreat

Nothreat

Nothreat has revolutionized how businesses like yours protect themselves from damaging cyber attacks. Our tech learns and adapts in real time, protecting clients from even zero-day attacks.

Cynclair

Cynclair

Cybersecurity is a complex beast. And we're the beast-tamers. Our team thrives on deciphering the latest threats, building cutting-edge defenses, and making your digital world much safer.

P3M Works

P3M Works

P3M Works delivers Cyber Security and Digital Transformation projects across both private and public sector clients.

Skylark

Skylark

Skylark is a leading global IT services provider, transforming client’s businesses through innovative and advanced technology solutions.