5G Mobile Technology Poses An Espionage Risk

Superfast "fifth generation 5G" mobile internet could be launched as early as next year in some countries, promising download speeds 10 to 20 times faster than we have now. 

What is 5G exactly?
It's the next, fifth-generation of mobile Internet connectivity promising much faster data download and upload speeds, wider coverage and more stable connections. It's all about making better use of the radio spectrum and enabling far more devices to access the mobile internet at the same time. 

When is it coming?
Most countries are unlikely to launch 5G services before 2020, but Qatar's Ooredoo says it has already launch a commercial service, while South Korea is aiming to launch next year, with its three largest network operators agreeing to kick off at the same time. China is also racing to launch services in 2019.

5G technology can be used for espionage purposes. 
This is according to David Vigneault, Director of the Canadian Security Intelligence Service (CSIS), 5G can be used to target large companies and universities in order to get new information and technologies. Targets are mostly dual-use technologies, having both civilian and possibly military or security purposes. “CSIS has seen a trend of state-sponsored espionage in fields that are crucial to Canada’s ability to build and sustain a prosperous, knowledge-based economy,” he said. 

“I’m talking about areas such as AI, quantum technology, 5G, biopharma and clean tech. In other words, the foundation of Canada’s future growth.” 

Mr. Vigneault said large corporations typically hold the most valuable information but they try to put in state-of-the-art cyber defenses, while Canadian universities are largely unaware how they are vulnerable to economic espionage and the threat of infiltration by unnamed state actors who would use their expertise to gain an edge in military technologies. 

These comments come at a time when the head of UK’s Secret Intelligence Service, MI6, raised concerns of Huawei, the Chinese technology giant, being involved in the development of the country’s 5G infrastructure. 5G, the next iteration of mobile network technology, could potentially help cities become more connected to smart technology. 

According to MI6 Chief Alex Younger, “We need to decide the extent to which we are going to be comfortable with Chinese ownership of these technologies and these platforms in an environment where some of our allies have taken very definite positions”.

Echoing the words of spy chiefs in the United States, Australia and New Zealand, Mr. Younger said 5G technology, which offers faster download speeds, poses a greater national security threat than conventional mobile technology.

“With 4G there are specific modes of technology and we developed a very good understanding with Huawei of where we were able to monitor and look at that aspect of their offer,” Mr. Younger said. “That is impossible with 5G.”

The MI6 chief said the advent of 5G technology would make it more challenging to monitor Huawei technology, a task made especially difficult by China’s one-party state. “In China, they have a different legal and ethical framework,” Mr. Younger said.

“They are able to use and manipulate data sets on a scale that we can only dream of.”

These concerns regarding 5G technology also come at a time when three members (New Zealand, Australia, US) of the Five Eyes intelligence-sharing alliance have decided to ban Huawei from 5G networks.

I-HLS:         BBC

You Might Also Read:

British Telecom Is Stripping Huawei Out Of Its Network:

 

« The Fourth Industrial Revolution Built On Blockchain And AI
South African Cybercrime Is Advancing Fast »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Zamna

Zamna

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

SIEM Xpert

SIEM Xpert

SIEM Xpert is a leader in Cyber Security Trainings and services since 2015.

Night Lion Security

Night Lion Security

Night Lion Security provides discreet and bespoke investigation and incident response recovery services.