Why 5G Technology Is A Geopolitical Issue

5G technology only came into operation in 2019, yet at the expected rapid rate of deplyment will soon become  commoplace and while 5G networks are leveraging technologies that are software-centric are moving from custom hardware to software components running on commercial hardware. 

While 5G will certainly increases speeds, there are a number of issues that still to be dealt with. In particular, the increase in software content across 5G platform raises problems, as these technology innovations are widening the attack surface of the system. 

While 5G core network functions are making use of a new and different software architecture, common technologies like HTTP and REST APIs that are well known are replacing proprietary interfaces of the past. All of these things increase the potential for cyber security attacks and vulnerabilities.

Much attention has been paid to the economic and espionage implications of a Chinese lead in developing and operating 5G infrastructure, but the military implications remain largely overlooked.  The military applications of 5G technology have vital strategic and battlefield implications for the US. Historically, the US military has reaped enormous advantages from employing cutting edge technology on the battlefield. 5G technology holds similar innovative potential.

Perhaps most obviously, the next generation of telecommunications infrastructure will have a direct impact on improving military communications, however, it will also produce cascading effects on the development of other kinds of military technologies, such as robotics and artificial intelligence. 

Space-based communications will play a key role in connecting 5G devices and the US military officials have expressed concern over China winning the race to 5G. 

The global competition over 5G technology has accelerated. The Trump administration is working to isolate China’s Huawei, the world’s largest telecommunications equipment manufacturer, from developing a larger foothold in US partner countries. 
For instance, if the United States was conducting a military operation in an area of interest to China, it is plausible that the Chinese government could leverage Huawei to intercept or even deny military communications. 

The administration has specifically worked to keep members of the Five Eyes intelligence-sharing group, the US, UK, Canada, Australia and New Zealand, from working with Huawei, although his has not worked in UK, which is still saying it will implement a reduced version of 5G’s Chinese operations. 

Huawei won't be allowed to have its technology involved in key parts of the UK's Critical National Infrastructure, 'core' parts of communications networks, or at sensitive military or nuclear sites. On top of this, the government is also putting a restriction on the amount of a network that Huawei can own: 35 per cent.

In any event, China's Huawei will have strong 5G presence is a concern for the US military as it could potentially undermine operations will increasngly rely more on 5G connectivity, and cannoy risk having China involved in building out American infrastructure using Chinese-made tech from the likes of Huawei.

Although there are plenty of companies from around the world that are building 5G mobile networks (Nokia, Samsung, Ericsson, to name but three), a seriously big player across the world is Huawei and the Five Eyes intelligence operation believes Huawei to be run by the Chinese Government. 

TechRadar:        Council On Foreign Relations:        I-HLS:       Wired

You Might Also Read: 

Cyber Effects Of Industry 4.0 On Warfare:

Is Widespread Suspicion Of Huawei Justified?:

 

 

 

« The US & Britain Edge Closer To An Agreement On Huawei
Coronavirus And Your Phone »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

ETAS

ETAS

ETAS (formerly Escrypt) is a pioneer and one of today’s leading solution providers for embedded IT security.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

RhodeCode

RhodeCode

RhodeCode is an open source repository management platform. It provides unified security and team collaboration across Git, Subversion, and Mercurial.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

Quod Orbis

Quod Orbis

Quod Orbis are a fast-growing, innovative company providing market-leading expertise in cyber security and Continuous Controls Monitoring (CCM).

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

Revytech

Revytech

Revytech is a tech company providing services in a broad range of areas including IT operations, cyber security and network engineering.

Sciber

Sciber

Sciber - data-driven cybersecurity. Strengthen your cyber defence with proactive, science-based and improvement-driven services.