<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Does 5G have security threats? in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Does-5G-have-security-threats/m-p/45319#M290</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does 5G technology have security threats?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to this link, there are some issues:&amp;nbsp; &lt;A href="https://news.usni.org/2021/05/05/report-to-congress-on-national-security-implications-of-5g-technology" target="_blank" rel="noopener"&gt;https://news.usni.org/2021/05/05/report-to-congress-on-national-security-implications-of-5g-technology&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="site-content"&gt;&lt;DIV&gt;&lt;DIV class="entry-content"&gt;&lt;P&gt;"National Security Concerns According to a DIB assessment, China is the current leader in sub-6 technologies and is likely to deploy the world’s first 5G wide-area network. Chinese companies, which often receive government subsidies (e.g., subsidized land for facilities, R&amp;amp;D grants), are therefore well-positioned as global 5G suppliers. Huawei has signed contracts for the construction of 5G infrastructure in around 30 countries, including Iceland, Turkey, and the United Kingdom.&lt;/P&gt;&lt;P&gt;Some experts are concerned that vulnerabilities in Chinese equipment could be used to conduct cyber-attacks or military/industrial espionage. These experts claim vulnerabilities were introduced through the poor business practices of many Chinese companies. However, they note that vulnerabilities could also be intentionally introduced for malicious purposes. China’s National Intelligence Law, enacted in June 2017, declares that “any organization and citizen shall, in accordance with the law, support, provide assistance, and cooperate in national intelligence work, and guard the secrecy of any national intelligence work that they are aware of.” Some analysts interpret this law as requiring Chinese companies to cooperate with intelligence services, including compelling installation of backdoors to provide private data to the government.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other analysts argue that the risks posed by Chinese telecommunications equipment vary depending on the equipment’s location within the cellular network architecture. Most cellular networks are broken into two groups: the core network, which provides the gateway to the internet and ensures devices meet the provider’s standards, and the radio access network, composed of the cellular towers that broadcast and receive radio signals. These analysts state that, while the risks posed by Chinese core networks are significant, the risks posed by Chinese radio access networks could be managed. Other analysts have argued that having any Chinese equipment in the network could pose potential security concerns. Such concerns have prompted some analysts to argue that the United States should limit intelligence sharing with any country operating Chinese-supplied 5G equipment"&lt;/P&gt;&lt;DIV class="jp-relatedposts"&gt;&lt;DIV class="jp-relatedposts-items jp-relatedposts-items-visual jp-relatedposts-grid "&gt;&lt;DIV class="jp-relatedposts-post jp-relatedposts-post2 jp-relatedposts-post-thumbs"&gt;&lt;BR /&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="widget-area"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 08 May 2021 04:39:17 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2021-05-08T04:39:17Z</dc:date>
    <item>
      <title>Does 5G have security threats?</title>
      <link>https://community.isc2.org/t5/Threats/Does-5G-have-security-threats/m-p/45319#M290</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does 5G technology have security threats?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to this link, there are some issues:&amp;nbsp; &lt;A href="https://news.usni.org/2021/05/05/report-to-congress-on-national-security-implications-of-5g-technology" target="_blank" rel="noopener"&gt;https://news.usni.org/2021/05/05/report-to-congress-on-national-security-implications-of-5g-technology&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="site-content"&gt;&lt;DIV&gt;&lt;DIV class="entry-content"&gt;&lt;P&gt;"National Security Concerns According to a DIB assessment, China is the current leader in sub-6 technologies and is likely to deploy the world’s first 5G wide-area network. Chinese companies, which often receive government subsidies (e.g., subsidized land for facilities, R&amp;amp;D grants), are therefore well-positioned as global 5G suppliers. Huawei has signed contracts for the construction of 5G infrastructure in around 30 countries, including Iceland, Turkey, and the United Kingdom.&lt;/P&gt;&lt;P&gt;Some experts are concerned that vulnerabilities in Chinese equipment could be used to conduct cyber-attacks or military/industrial espionage. These experts claim vulnerabilities were introduced through the poor business practices of many Chinese companies. However, they note that vulnerabilities could also be intentionally introduced for malicious purposes. China’s National Intelligence Law, enacted in June 2017, declares that “any organization and citizen shall, in accordance with the law, support, provide assistance, and cooperate in national intelligence work, and guard the secrecy of any national intelligence work that they are aware of.” Some analysts interpret this law as requiring Chinese companies to cooperate with intelligence services, including compelling installation of backdoors to provide private data to the government.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other analysts argue that the risks posed by Chinese telecommunications equipment vary depending on the equipment’s location within the cellular network architecture. Most cellular networks are broken into two groups: the core network, which provides the gateway to the internet and ensures devices meet the provider’s standards, and the radio access network, composed of the cellular towers that broadcast and receive radio signals. These analysts state that, while the risks posed by Chinese core networks are significant, the risks posed by Chinese radio access networks could be managed. Other analysts have argued that having any Chinese equipment in the network could pose potential security concerns. Such concerns have prompted some analysts to argue that the United States should limit intelligence sharing with any country operating Chinese-supplied 5G equipment"&lt;/P&gt;&lt;DIV class="jp-relatedposts"&gt;&lt;DIV class="jp-relatedposts-items jp-relatedposts-items-visual jp-relatedposts-grid "&gt;&lt;DIV class="jp-relatedposts-post jp-relatedposts-post2 jp-relatedposts-post-thumbs"&gt;&lt;BR /&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="widget-area"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 08 May 2021 04:39:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Does-5G-have-security-threats/m-p/45319#M290</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-05-08T04:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: Does 5G have security threats?</title>
      <link>https://community.isc2.org/t5/Threats/Does-5G-have-security-threats/m-p/45452#M303</link>
      <description>&lt;P&gt;The thing is, most people are freaking out over the "supply chain" (buying stuff from China) aspects of 5G.&amp;nbsp; That really doesn't have anything to do with 5G, it just has to do with freaking out over China.&amp;nbsp; And the new concern about standards developed elsewhere is just another version of that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;5G itself, the protocol, has inherent flaws.&amp;nbsp; It's &lt;A href="https://community.isc2.org/t5/Industry-News/5G-is-not-the-be-all-and-end-all/m-p/19525#M2298" target="_blank" rel="noopener"&gt;easier to track you&lt;/A&gt;, it's easier to deny you service, and it's easier to send you fake notifications.&amp;nbsp; Its weird virtual LAN system allows people to &lt;A href="https://thehackernews.com/2021/03/new-5g-flaw-exposes-priority-networks.html" target="_blank" rel="noopener"&gt;attack segments and extract user data&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's going to give us problems for years to come ...&lt;/P&gt;</description>
      <pubDate>Wed, 12 May 2021 23:26:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Does-5G-have-security-threats/m-p/45452#M303</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2021-05-12T23:26:03Z</dc:date>
    </item>
  </channel>
</rss>

