Why 5G Technology Is A Geopolitical Issue

5G technology only came into operation in 2019, yet at the expected rapid rate of deplyment will soon become  commoplace and while 5G networks are leveraging technologies that are software-centric are moving from custom hardware to software components running on commercial hardware. 

While 5G will certainly increases speeds, there are a number of issues that still to be dealt with. In particular, the increase in software content across 5G platform raises problems, as these technology innovations are widening the attack surface of the system. 

While 5G core network functions are making use of a new and different software architecture, common technologies like HTTP and REST APIs that are well known are replacing proprietary interfaces of the past. All of these things increase the potential for cyber security attacks and vulnerabilities.

Much attention has been paid to the economic and espionage implications of a Chinese lead in developing and operating 5G infrastructure, but the military implications remain largely overlooked.  The military applications of 5G technology have vital strategic and battlefield implications for the US. Historically, the US military has reaped enormous advantages from employing cutting edge technology on the battlefield. 5G technology holds similar innovative potential.

Perhaps most obviously, the next generation of telecommunications infrastructure will have a direct impact on improving military communications, however, it will also produce cascading effects on the development of other kinds of military technologies, such as robotics and artificial intelligence. 

Space-based communications will play a key role in connecting 5G devices and the US military officials have expressed concern over China winning the race to 5G. 

The global competition over 5G technology has accelerated. The Trump administration is working to isolate China’s Huawei, the world’s largest telecommunications equipment manufacturer, from developing a larger foothold in US partner countries. 
For instance, if the United States was conducting a military operation in an area of interest to China, it is plausible that the Chinese government could leverage Huawei to intercept or even deny military communications. 

The administration has specifically worked to keep members of the Five Eyes intelligence-sharing group, the US, UK, Canada, Australia and New Zealand, from working with Huawei, although his has not worked in UK, which is still saying it will implement a reduced version of 5G’s Chinese operations. 

Huawei won't be allowed to have its technology involved in key parts of the UK's Critical National Infrastructure, 'core' parts of communications networks, or at sensitive military or nuclear sites. On top of this, the government is also putting a restriction on the amount of a network that Huawei can own: 35 per cent.

In any event, China's Huawei will have strong 5G presence is a concern for the US military as it could potentially undermine operations will increasngly rely more on 5G connectivity, and cannoy risk having China involved in building out American infrastructure using Chinese-made tech from the likes of Huawei.

Although there are plenty of companies from around the world that are building 5G mobile networks (Nokia, Samsung, Ericsson, to name but three), a seriously big player across the world is Huawei and the Five Eyes intelligence operation believes Huawei to be run by the Chinese Government. 

TechRadar:        Council On Foreign Relations:        I-HLS:       Wired

You Might Also Read: 

Cyber Effects Of Industry 4.0 On Warfare:

Is Widespread Suspicion Of Huawei Justified?:

 

 

 

« The US & Britain Edge Closer To An Agreement On Huawei
Coronavirus And Your Phone »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

GovCERT Austria

GovCERT Austria

GovCERT Austria is the Austrian Government Computer Emergency Response Team. Its constituency consists of Austria's public administration.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

Farsight Security

Farsight Security

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

Beosin

Beosin

Beosin is a blockchain security company providing cybersecurity services including security audits, on-chain asset investigation, threat intelligence and wallet security.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

CyberFOX

CyberFOX

CyberFOX is a global cybersecurity solutions provider focused on identity access management (IAM) for managed service providers (MSPs) and IT professionals.

Cythera

Cythera

Cythera is an Australian cyber security company with in-house cyber security professionals providing world-class cyber protection to medium to large companies all over Australia.