The US Has A New 5G Security Strategy

The US has released its National Strategy with the aim to: Secure 5G for the US. The brief report explains how America will protect fifth-generation wireless infrastructure at home and overseas. The 7-page policy document sets out the president’s “vision for America to lead the development, deployment, and management of secure and reliable 5G communications infrastructure globally.

President Trump has written an introduction to the document in which he makes some key statements.

“Fifth generation wireless technology, or 5G, will be a primary driver of our Nation’s prosperity and security in the 21st century".

"This new technology will provide consumers, businesses, and governments with remarkably fast network connections that will enable tens of billions of new devices to harness the power of the Internet, transforming the way we live, work, learn, and communicate.” he goes on to write.

“This is a target-rich environment for those with nefarious motives due to the number and types of devices it will connect and the large volume of data that those devices will transmit.” 

“The United States will work with like-minded countries to lead the responsible international development and deployment of 5G technology and will work to promote the availability of secure and reliable equipment and services in the market.”

This is President Trump’s first steps to meet the requirements laid out by the US Congress' Secure 5G and Beyond Act, which he recently signed into law. 

The Document Outlines Four Distinct Lines Of Activity 

They each briefly lay out the administration’s approaches and aims to:

  • Facilitate the domestic rollout of 5G
  • Assess the risks and identify the core security principles of 5G infrastructure 
  • Assess the risks to United States economic and national security during development and deployment of 5G infrastructure worldwide 
  • Promote responsible global development and deployment of 5G. 

Development of the new 5G strategy was an interagency effort, led by the National Security Council and National Economic Council.

The security of 5G has been at the top of the Trump Administariont’s priority list for a long time, principally because 5G wireless technology enables unprecedented levels of connectivity between millions of new internet of things devices and there are already a range of releases across America and in some federal agencies. 

This report lays our this 5G strategy as America is considering the potential threats from China and elsewhere from the 5G supply chain at the same time as the US is asking other nations, particularly the UK, not to use products from foreign companies, such as Huawei, which it believes might pose a serious risk to national security.

The United States and the United Kingdom have agreed to “further” reduce Huawei’s presence in telecom infrastructure, US Defense Secretary Mark Esper said at a Pentagon press conference on the 26th March when he highlighted the importance of the intelligence-sharing agreement between the United States, the United Kingdom, and the other Five Eyes intelliegnec sharing nations. 

DefenseOne:      US Congress:      Politico:      NextGov:    MeriTalk:       DefenseOne

You Might Also Read: 

Why 5G Technology Is A Geopolitical Issue:

Five Eyes Intelligence Chiefs Point The Finger:

 

 

« IoT - Pandemics, Opportunities And Massive Data Risks
An 'Infodemic' Of Phishing & Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

Rewertz

Rewertz

Rewterz is a cyber security company based out of Dubai, serving customers in UAE, Oman, Qatar, Bahrain, Saudi Arabia, and Pakistan.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

FPT Software

FPT Software

As a leading technology service provider, FPT assists customers of all sizes and from any industries in implementing and adapting digital technologies including cybersecurity.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.