Why 5G Technology Is A Geopolitical Issue

5G technology only came into operation in 2019, yet at the expected rapid rate of deplyment will soon become  commoplace and while 5G networks are leveraging technologies that are software-centric are moving from custom hardware to software components running on commercial hardware. 

While 5G will certainly increases speeds, there are a number of issues that still to be dealt with. In particular, the increase in software content across 5G platform raises problems, as these technology innovations are widening the attack surface of the system. 

While 5G core network functions are making use of a new and different software architecture, common technologies like HTTP and REST APIs that are well known are replacing proprietary interfaces of the past. All of these things increase the potential for cyber security attacks and vulnerabilities.

Much attention has been paid to the economic and espionage implications of a Chinese lead in developing and operating 5G infrastructure, but the military implications remain largely overlooked.  The military applications of 5G technology have vital strategic and battlefield implications for the US. Historically, the US military has reaped enormous advantages from employing cutting edge technology on the battlefield. 5G technology holds similar innovative potential.

Perhaps most obviously, the next generation of telecommunications infrastructure will have a direct impact on improving military communications, however, it will also produce cascading effects on the development of other kinds of military technologies, such as robotics and artificial intelligence. 

Space-based communications will play a key role in connecting 5G devices and the US military officials have expressed concern over China winning the race to 5G. 

The global competition over 5G technology has accelerated. The Trump administration is working to isolate China’s Huawei, the world’s largest telecommunications equipment manufacturer, from developing a larger foothold in US partner countries. 
For instance, if the United States was conducting a military operation in an area of interest to China, it is plausible that the Chinese government could leverage Huawei to intercept or even deny military communications. 

The administration has specifically worked to keep members of the Five Eyes intelligence-sharing group, the US, UK, Canada, Australia and New Zealand, from working with Huawei, although his has not worked in UK, which is still saying it will implement a reduced version of 5G’s Chinese operations. 

Huawei won't be allowed to have its technology involved in key parts of the UK's Critical National Infrastructure, 'core' parts of communications networks, or at sensitive military or nuclear sites. On top of this, the government is also putting a restriction on the amount of a network that Huawei can own: 35 per cent.

In any event, China's Huawei will have strong 5G presence is a concern for the US military as it could potentially undermine operations will increasngly rely more on 5G connectivity, and cannoy risk having China involved in building out American infrastructure using Chinese-made tech from the likes of Huawei.

Although there are plenty of companies from around the world that are building 5G mobile networks (Nokia, Samsung, Ericsson, to name but three), a seriously big player across the world is Huawei and the Five Eyes intelligence operation believes Huawei to be run by the Chinese Government. 

TechRadar:        Council On Foreign Relations:        I-HLS:       Wired

You Might Also Read: 

Cyber Effects Of Industry 4.0 On Warfare:

Is Widespread Suspicion Of Huawei Justified?:

 

 

 

« The US & Britain Edge Closer To An Agreement On Huawei
Coronavirus And Your Phone »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

CyberCrowd

CyberCrowd

CyberCrowd is a cyber security specialist offering technical services, cyber security assessments, guidance and security thought leadership.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

Ross & Baruzzini

Ross & Baruzzini

Ross & Baruzzini delivers integrated technology, consulting, and engineering solutions for safe, sustainable, and resilient facilities.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

Oxeye

Oxeye

Oxeye fills the gap between cloud and code to show exploitable vulnerabilities, and their path from API to code. More visibility. Less noise. More time to build.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.