Why 5G Technology Is A Geopolitical Issue

5G technology only came into operation in 2019, yet at the expected rapid rate of deplyment will soon become  commoplace and while 5G networks are leveraging technologies that are software-centric are moving from custom hardware to software components running on commercial hardware. 

While 5G will certainly increases speeds, there are a number of issues that still to be dealt with. In particular, the increase in software content across 5G platform raises problems, as these technology innovations are widening the attack surface of the system. 

While 5G core network functions are making use of a new and different software architecture, common technologies like HTTP and REST APIs that are well known are replacing proprietary interfaces of the past. All of these things increase the potential for cyber security attacks and vulnerabilities.

Much attention has been paid to the economic and espionage implications of a Chinese lead in developing and operating 5G infrastructure, but the military implications remain largely overlooked.  The military applications of 5G technology have vital strategic and battlefield implications for the US. Historically, the US military has reaped enormous advantages from employing cutting edge technology on the battlefield. 5G technology holds similar innovative potential.

Perhaps most obviously, the next generation of telecommunications infrastructure will have a direct impact on improving military communications, however, it will also produce cascading effects on the development of other kinds of military technologies, such as robotics and artificial intelligence. 

Space-based communications will play a key role in connecting 5G devices and the US military officials have expressed concern over China winning the race to 5G. 

The global competition over 5G technology has accelerated. The Trump administration is working to isolate China’s Huawei, the world’s largest telecommunications equipment manufacturer, from developing a larger foothold in US partner countries. 
For instance, if the United States was conducting a military operation in an area of interest to China, it is plausible that the Chinese government could leverage Huawei to intercept or even deny military communications. 

The administration has specifically worked to keep members of the Five Eyes intelligence-sharing group, the US, UK, Canada, Australia and New Zealand, from working with Huawei, although his has not worked in UK, which is still saying it will implement a reduced version of 5G’s Chinese operations. 

Huawei won't be allowed to have its technology involved in key parts of the UK's Critical National Infrastructure, 'core' parts of communications networks, or at sensitive military or nuclear sites. On top of this, the government is also putting a restriction on the amount of a network that Huawei can own: 35 per cent.

In any event, China's Huawei will have strong 5G presence is a concern for the US military as it could potentially undermine operations will increasngly rely more on 5G connectivity, and cannoy risk having China involved in building out American infrastructure using Chinese-made tech from the likes of Huawei.

Although there are plenty of companies from around the world that are building 5G mobile networks (Nokia, Samsung, Ericsson, to name but three), a seriously big player across the world is Huawei and the Five Eyes intelligence operation believes Huawei to be run by the Chinese Government. 

TechRadar:        Council On Foreign Relations:        I-HLS:       Wired

You Might Also Read: 

Cyber Effects Of Industry 4.0 On Warfare:

Is Widespread Suspicion Of Huawei Justified?:

 

 

 

« The US & Britain Edge Closer To An Agreement On Huawei
Coronavirus And Your Phone »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

Telelogos

Telelogos

Telelogos is a European provider of Enterprise Mobility Management software, Digital Signage software and Data Transfer and Synchronization software.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

CAPSLOCK

CAPSLOCK

CAPSLOCK delivers career-changing cyber training to help adults re-skill. Learn online to become a cyber security professional and pay no tuition until you land a high-paying job.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Boecore

Boecore

Boecore is an aerospace and defense engineering company that specializes in software solutions, systems engineering, cybersecurity, enterprise networks, and mission operations.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe

Liverton Security

Liverton Security

Liverton Security is a New Zealand-owned cyber security provider offering consultancy and security-related products to government and commercial customers throughout New Zealand.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.