5G Mobile Technology Poses An Espionage Risk

Superfast "fifth generation 5G" mobile internet could be launched as early as next year in some countries, promising download speeds 10 to 20 times faster than we have now. 

What is 5G exactly?
It's the next, fifth-generation of mobile Internet connectivity promising much faster data download and upload speeds, wider coverage and more stable connections. It's all about making better use of the radio spectrum and enabling far more devices to access the mobile internet at the same time. 

When is it coming?
Most countries are unlikely to launch 5G services before 2020, but Qatar's Ooredoo says it has already launch a commercial service, while South Korea is aiming to launch next year, with its three largest network operators agreeing to kick off at the same time. China is also racing to launch services in 2019.

5G technology can be used for espionage purposes. 
This is according to David Vigneault, Director of the Canadian Security Intelligence Service (CSIS), 5G can be used to target large companies and universities in order to get new information and technologies. Targets are mostly dual-use technologies, having both civilian and possibly military or security purposes. “CSIS has seen a trend of state-sponsored espionage in fields that are crucial to Canada’s ability to build and sustain a prosperous, knowledge-based economy,” he said. 

“I’m talking about areas such as AI, quantum technology, 5G, biopharma and clean tech. In other words, the foundation of Canada’s future growth.” 

Mr. Vigneault said large corporations typically hold the most valuable information but they try to put in state-of-the-art cyber defenses, while Canadian universities are largely unaware how they are vulnerable to economic espionage and the threat of infiltration by unnamed state actors who would use their expertise to gain an edge in military technologies. 

These comments come at a time when the head of UK’s Secret Intelligence Service, MI6, raised concerns of Huawei, the Chinese technology giant, being involved in the development of the country’s 5G infrastructure. 5G, the next iteration of mobile network technology, could potentially help cities become more connected to smart technology. 

According to MI6 Chief Alex Younger, “We need to decide the extent to which we are going to be comfortable with Chinese ownership of these technologies and these platforms in an environment where some of our allies have taken very definite positions”.

Echoing the words of spy chiefs in the United States, Australia and New Zealand, Mr. Younger said 5G technology, which offers faster download speeds, poses a greater national security threat than conventional mobile technology.

“With 4G there are specific modes of technology and we developed a very good understanding with Huawei of where we were able to monitor and look at that aspect of their offer,” Mr. Younger said. “That is impossible with 5G.”

The MI6 chief said the advent of 5G technology would make it more challenging to monitor Huawei technology, a task made especially difficult by China’s one-party state. “In China, they have a different legal and ethical framework,” Mr. Younger said.

“They are able to use and manipulate data sets on a scale that we can only dream of.”

These concerns regarding 5G technology also come at a time when three members (New Zealand, Australia, US) of the Five Eyes intelligence-sharing alliance have decided to ban Huawei from 5G networks.

I-HLS:         BBC

You Might Also Read:

British Telecom Is Stripping Huawei Out Of Its Network:

 

« The Fourth Industrial Revolution Built On Blockchain And AI
South African Cybercrime Is Advancing Fast »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

SEPPmail

SEPPmail

SEPPmail is a patented e-mail encryption solution to secure your electronic communication.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

Canadian Technology Accelerator (CTA)

Canadian Technology Accelerator (CTA)

The Canadian Technology Accelerator helps Canadian companies with an existing technology, product or service explore opportunities in foreign markets. Program areas include Cybersecurity.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

Grove Security

Grove Security

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.