5G Mobile Technology Poses An Espionage Risk

Superfast "fifth generation 5G" mobile internet could be launched as early as next year in some countries, promising download speeds 10 to 20 times faster than we have now. 

What is 5G exactly?
It's the next, fifth-generation of mobile Internet connectivity promising much faster data download and upload speeds, wider coverage and more stable connections. It's all about making better use of the radio spectrum and enabling far more devices to access the mobile internet at the same time. 

When is it coming?
Most countries are unlikely to launch 5G services before 2020, but Qatar's Ooredoo says it has already launch a commercial service, while South Korea is aiming to launch next year, with its three largest network operators agreeing to kick off at the same time. China is also racing to launch services in 2019.

5G technology can be used for espionage purposes. 
This is according to David Vigneault, Director of the Canadian Security Intelligence Service (CSIS), 5G can be used to target large companies and universities in order to get new information and technologies. Targets are mostly dual-use technologies, having both civilian and possibly military or security purposes. “CSIS has seen a trend of state-sponsored espionage in fields that are crucial to Canada’s ability to build and sustain a prosperous, knowledge-based economy,” he said. 

“I’m talking about areas such as AI, quantum technology, 5G, biopharma and clean tech. In other words, the foundation of Canada’s future growth.” 

Mr. Vigneault said large corporations typically hold the most valuable information but they try to put in state-of-the-art cyber defenses, while Canadian universities are largely unaware how they are vulnerable to economic espionage and the threat of infiltration by unnamed state actors who would use their expertise to gain an edge in military technologies. 

These comments come at a time when the head of UK’s Secret Intelligence Service, MI6, raised concerns of Huawei, the Chinese technology giant, being involved in the development of the country’s 5G infrastructure. 5G, the next iteration of mobile network technology, could potentially help cities become more connected to smart technology. 

According to MI6 Chief Alex Younger, “We need to decide the extent to which we are going to be comfortable with Chinese ownership of these technologies and these platforms in an environment where some of our allies have taken very definite positions”.

Echoing the words of spy chiefs in the United States, Australia and New Zealand, Mr. Younger said 5G technology, which offers faster download speeds, poses a greater national security threat than conventional mobile technology.

“With 4G there are specific modes of technology and we developed a very good understanding with Huawei of where we were able to monitor and look at that aspect of their offer,” Mr. Younger said. “That is impossible with 5G.”

The MI6 chief said the advent of 5G technology would make it more challenging to monitor Huawei technology, a task made especially difficult by China’s one-party state. “In China, they have a different legal and ethical framework,” Mr. Younger said.

“They are able to use and manipulate data sets on a scale that we can only dream of.”

These concerns regarding 5G technology also come at a time when three members (New Zealand, Australia, US) of the Five Eyes intelligence-sharing alliance have decided to ban Huawei from 5G networks.

I-HLS:         BBC

You Might Also Read:

British Telecom Is Stripping Huawei Out Of Its Network:

 

« The Fourth Industrial Revolution Built On Blockchain And AI
South African Cybercrime Is Advancing Fast »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

National Association of Software and Services Companies (NASSCOM) - India

National Association of Software and Services Companies (NASSCOM) - India

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

Zivaro

Zivaro

Zivaro provides transformational consulting and technology services to help clients attain real business value from their technology investments.

IronNet Cybersecurity

IronNet Cybersecurity

IronNet’s product and services provide enterprise-wide security management and visibility of your network, users and assets.

Fiserv

Fiserv

Fiserv offers a wide array of Risk & Compliance solutions to help you prevent losses from fraud and ensure adherence to regulatory and compliance mandates.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

Cryptoloc

Cryptoloc

Cryptoloc's core business is developing solutions designed to protect businesses from all kinds of security threats using a unique patented cryptography.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

Pelta Cyber Security

Pelta Cyber Security

Pelta Cyber Security is the cyber security consulting and solutions division of Softworld Inc. We provide staffing and recruitment services as well as consulting and solutions for outsourced projects.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

Strata Identity

Strata Identity

Strata is pioneering identity orchestration to unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.

GoCloud Systems

GoCloud Systems

GoCloud is an IT consulting firm. We provide IT strategy and cloud adoption services to the New Zealand Government, Non-Profit Organisations and private industry.