The US Has A New 5G Security Strategy

The US has released its National Strategy with the aim to: Secure 5G for the US. The brief report explains how America will protect fifth-generation wireless infrastructure at home and overseas. The 7-page policy document sets out the president’s “vision for America to lead the development, deployment, and management of secure and reliable 5G communications infrastructure globally.

President Trump has written an introduction to the document in which he makes some key statements.

“Fifth generation wireless technology, or 5G, will be a primary driver of our Nation’s prosperity and security in the 21st century".

"This new technology will provide consumers, businesses, and governments with remarkably fast network connections that will enable tens of billions of new devices to harness the power of the Internet, transforming the way we live, work, learn, and communicate.” he goes on to write.

“This is a target-rich environment for those with nefarious motives due to the number and types of devices it will connect and the large volume of data that those devices will transmit.” 

“The United States will work with like-minded countries to lead the responsible international development and deployment of 5G technology and will work to promote the availability of secure and reliable equipment and services in the market.”

This is President Trump’s first steps to meet the requirements laid out by the US Congress' Secure 5G and Beyond Act, which he recently signed into law. 

The Document Outlines Four Distinct Lines Of Activity 

They each briefly lay out the administration’s approaches and aims to:

  • Facilitate the domestic rollout of 5G
  • Assess the risks and identify the core security principles of 5G infrastructure 
  • Assess the risks to United States economic and national security during development and deployment of 5G infrastructure worldwide 
  • Promote responsible global development and deployment of 5G. 

Development of the new 5G strategy was an interagency effort, led by the National Security Council and National Economic Council.

The security of 5G has been at the top of the Trump Administariont’s priority list for a long time, principally because 5G wireless technology enables unprecedented levels of connectivity between millions of new internet of things devices and there are already a range of releases across America and in some federal agencies. 

This report lays our this 5G strategy as America is considering the potential threats from China and elsewhere from the 5G supply chain at the same time as the US is asking other nations, particularly the UK, not to use products from foreign companies, such as Huawei, which it believes might pose a serious risk to national security.

The United States and the United Kingdom have agreed to “further” reduce Huawei’s presence in telecom infrastructure, US Defense Secretary Mark Esper said at a Pentagon press conference on the 26th March when he highlighted the importance of the intelligence-sharing agreement between the United States, the United Kingdom, and the other Five Eyes intelliegnec sharing nations. 

DefenseOne:      US Congress:      Politico:      NextGov:    MeriTalk:       DefenseOne

You Might Also Read: 

Why 5G Technology Is A Geopolitical Issue:

Five Eyes Intelligence Chiefs Point The Finger:

 

 

« IoT - Pandemics, Opportunities And Massive Data Risks
An 'Infodemic' Of Phishing & Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CyberESI

CyberESI

CyberESI is a Managed Security Service Provider providing 24x7 remote security monitoring and management of your mission-critical networks.

DTS Solution

DTS Solution

DTS Solution delivers advanced cyber security solutions through is technology partnerships with industry leading security vendors and advanced consulting services.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Optimum Speciality Risks

Optimum Speciality Risks

Optimum Speciality Risks are an experienced team of cyber insurance experts, backed by Lloyds of London.

Raonsecure

Raonsecure

Raonsecure is one of Korea’s leading ICT security software companies – providing a variety of PC and mobile security solutions to financial institutions, government, and enterprise.

SafeCipher

SafeCipher

SafeCypher are crypto specialists with a very specialized knowledge of Public Key Infrastructure (PKI), Hardware Security Modules (HSM), Quantum Resistant Cryptography and Crypto-Agility.

FAIR Institute

FAIR Institute

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Dimension Data

Dimension Data

Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including intelligent security solutions.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

CYBRI

CYBRI

CYBRI is a cybersecurity company helping businesses detect and remediate mission-critical vulnerabilities before they get exploited by hackers.

Acclaim Technical Services (ATS)

Acclaim Technical Services (ATS)

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs.

Walacor

Walacor

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems.