The US Has A New 5G Security Strategy

The US has released its National Strategy with the aim to: Secure 5G for the US. The brief report explains how America will protect fifth-generation wireless infrastructure at home and overseas. The 7-page policy document sets out the president’s “vision for America to lead the development, deployment, and management of secure and reliable 5G communications infrastructure globally.

President Trump has written an introduction to the document in which he makes some key statements.

“Fifth generation wireless technology, or 5G, will be a primary driver of our Nation’s prosperity and security in the 21st century".

"This new technology will provide consumers, businesses, and governments with remarkably fast network connections that will enable tens of billions of new devices to harness the power of the Internet, transforming the way we live, work, learn, and communicate.” he goes on to write.

“This is a target-rich environment for those with nefarious motives due to the number and types of devices it will connect and the large volume of data that those devices will transmit.” 

“The United States will work with like-minded countries to lead the responsible international development and deployment of 5G technology and will work to promote the availability of secure and reliable equipment and services in the market.”

This is President Trump’s first steps to meet the requirements laid out by the US Congress' Secure 5G and Beyond Act, which he recently signed into law. 

The Document Outlines Four Distinct Lines Of Activity 

They each briefly lay out the administration’s approaches and aims to:

  • Facilitate the domestic rollout of 5G
  • Assess the risks and identify the core security principles of 5G infrastructure 
  • Assess the risks to United States economic and national security during development and deployment of 5G infrastructure worldwide 
  • Promote responsible global development and deployment of 5G. 

Development of the new 5G strategy was an interagency effort, led by the National Security Council and National Economic Council.

The security of 5G has been at the top of the Trump Administariont’s priority list for a long time, principally because 5G wireless technology enables unprecedented levels of connectivity between millions of new internet of things devices and there are already a range of releases across America and in some federal agencies. 

This report lays our this 5G strategy as America is considering the potential threats from China and elsewhere from the 5G supply chain at the same time as the US is asking other nations, particularly the UK, not to use products from foreign companies, such as Huawei, which it believes might pose a serious risk to national security.

The United States and the United Kingdom have agreed to “further” reduce Huawei’s presence in telecom infrastructure, US Defense Secretary Mark Esper said at a Pentagon press conference on the 26th March when he highlighted the importance of the intelligence-sharing agreement between the United States, the United Kingdom, and the other Five Eyes intelliegnec sharing nations. 

DefenseOne:      US Congress:      Politico:      NextGov:    MeriTalk:       DefenseOne

You Might Also Read: 

Why 5G Technology Is A Geopolitical Issue:

Five Eyes Intelligence Chiefs Point The Finger:

 

 

« IoT - Pandemics, Opportunities And Massive Data Risks
An 'Infodemic' Of Phishing & Malware »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

vdiscovery

vdiscovery

vdiscovery is a provider of proprietary and best-in-breed solutions in computer forensics, document review, and electronic discovery.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

At-Bay

At-Bay

At-Bay offer an end-to-end solution to cyber risk with comprehensive risk assessment, a tailored cyber insurance policy and year-long, active, risk-management service.

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI) is an independent, global think-tank. We bring together the world’s top global researchers to undertake ground-breaking research on blockchain technology.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

SECURITI.ai

SECURITI.ai

SECURITI.ai's PrivacyOps platform is a full-stack solution that operationalizes and simplifies privacy compliance using robotic automation and a natural language interface.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

Technology Innovation Institute (TII)

Technology Innovation Institute (TII)

TII is a UAE-based research center that aims to lead global advances in AI, robotics, quantum computing, cryptography and secure communications and more.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.

London AI Safety Research (LASR)

London AI Safety Research (LASR)

London AI Safety Research Labs is a technical AI Safety research programme focussed on reducing the risk of loss of control to advanced AI.

UBDS Digital

UBDS Digital

UBDS Digital is your Digital Lifecycle Partner for Secure Cloud Transformation.