My latest opinion articles

Securing Society 5.0 Introduction

Securing Society 5.0 – Overcoming the hidden threats in society’s greatest evolutionary leap

A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical space." The fifth evolution of the society, enabled by the fifth generation of cellular networking and...
Open RAN Security

Open RAN May Be the Future of 5G, but Can We Keep It Secure?

It's been a year of contradictions for the telecommunications industry. Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic, with a slowdown in global 5G roll-outs being a notable result. Geopolitical conflicts have continued to muddy the market, with governments playing a more active...
5G Cybersecurity Safety

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to...
Edge Computing Fog

Will Telcos Lose the Edge Computing Battle as Well?

For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as a formless abstraction "up there" when, in fact, the cloud is rooted in the ground. Or the seabed. Despite rapid advances in satellite connection, almost all...
5G COVID-19

What COVID-19 Taught Us About the Need for 5G

There are many adjectives that could be used to describe the global outbreak of COVID-19, but perhaps the simplest might be: fast. The disease has spread quicker than most people can mentally digest. By nature, humans process linearly. This pandemic has been a lesson in exponential thinking for the common...

My latest technology articles

oran lexicon

The Open RAN Lexicon You Need

The telecoms and digital technologies sectors are notoriously jargonised. Eavesdrop on any conversation at an industry conference (remember those?) and you’d be treated to a parade of acronyms, initialisms and technical terms that would sound like ancient Greek to an outsider. However, with new technologies being developed and deployed at...
5G TSN Manufacturing

5G in Manufacturing – 5G and Time Sensitive Networking (TSN) for Industrial Automation

In the recent report by IHS Markit - "The 5G Economy - How 5G will contribute to the global economy" - researchers claimed that manufacturing will garner almost $4.7 trillion in sales enablement by 2035. Or 36% of the $13.2 trillion total opportunity of 5G by 2035. Manufacturing will...
5G SBA IMS MEC Architecture

Introduction to 5G Core Service-Based Architecture (SBA) Components

The interest in 5G and mIoT is exploding. It's exciting to see so many IT and cybersecurity professionals in my network trying to learn more about 5G and related technologies. In addition to my usual articles about the societal impacts of these innovations, I'll start a series of articles introducing...
LoRaWAN IoT Security

LoRaWAN Security 101 (Non-5G IoT Connectivity Options)

I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G will revolutionize our society, become the most critical of critical infrastructures and about security threats with 5G. I see 5G, with its low latency, high...
Zigbee Security

Zigbee Security 101 (Non-5G IoT Connectivity Options)

Zigbee technology introduction Zigbee is wireless PAN (Personal Area Network) technology developed to support automation, machine-to-machine communication, remote control and monitoring of IoT devices. It evolved from IEEE 802.15.4 wireless standard and supported by the ZigBee Alliance. IEEE 802.15.4 standard determines specifications for the physical and data link layer and Zigbee...
5G World Economy Society

How 5G Will Transform Economy and Society

Since the dawn of the 21st Century, the ways in which people and organizations that use the Internet experience, perceive and act in the world is radically changing. We interact with physical objects and systems well beyond our sight and comprehension. Our cars, homes, factories and public transportation are controlled increasingly by computer chips and sensors. This interconnectedness already exceeds much of last century’s science fiction imaginings, but is poised to accelerate even more dramatically with the advent of 5G. Popular telecom carrier driven expectations about the speed and capacity of 5G consumer mobile service tend to obscure the broader reality that 5G network infrastructure will also connect billions of sensors, devices, vehicles, machinery and other things besides smartphones. People will be connected to things too, not just their favorite...
Regulation IoT 5G Cybersecurity

Regulating the Security of the Internet of Things (IoT) in a 5G World

In one of those strange inversions of reason, The Internet of Things (IoT) arguably began...
Huawei ERNW 5G Source Code Analysis

Does the positive review of Huawei UDG source code quality mean that Huawei 5G is secure and reliable?

No, no it doesn’t. Huawei's code might as well be extremely secure. Their code is...
5G Critical Infrastructure

5G Critical Infrastructure – the Most Critical of All

Not even 30 years separate us from the end of the Cold War. Yet, we...
IoT Protocols Speed Range

IoT Wireless Protocols – Speed & Range – Comparison Chart

IoT Wireless Protocols data rate and range comparison in a chart.
Cyber Risk Management

“Zero Tolerance” to “80-20” – Lazy Approaches to Cyber Risk

There is a new danger lurking in the information assets of countless organizations around the...
Canada Critical Infrastructure

Canadian Critical Infrastructure Cyber Protection

Targeted cyberattacks against critical infrastructure (CI) are increasing on a global scale. Critical systems are...
5G Connectivity Security

5G Network: A Quantum Leap in Connectivity – and Cyber Threats

The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine, electricity, the telephone, the internet: each of these breakthroughs precipitated tectonic shifts in how people lived and worked. Now, in the early part of the 21st century, we stand witness to the birth of a new industrial revolution built on 5th generation cellular technology - 5G network. As the name implies, 5G network follows a developmental chain. First came 1G, the first generation of cellular communication that freed us to make voice calls without being tethered to a physical phone connection. Then 2G augmented this by adding data services like SMS and MMS. 3G gave us access to mobile internet, video calling and other data-heavy services....
Cybersecurity IoT 5G Cyber-Kinetic Risks

Cyber-Kinetic Risk – Unintended Consequence of IoT in a 5G World

Getting smart about security in smart systems Smart used to be something we called people or...
Smart City Chip

Technology Trends for 2019 – More Amazing Than Flying Cars

Technologies that could change the world have been a popular topic for the past half...
NFC Cybersecurity

NFC Security 101 (Non-5G IoT Connectivity Options)

NFC is a short range two-way wireless communication technology that enables simple and secure communication...
IEMI

Intentional Electromagnetic Interference (IEMI) IoT Threat

As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks...
IoT Bomb Stuxnet

Stuxnet: The Father of Cyber-Kinetic Weapons

While Stuxnet is gone, the world now knows what can be accomplished through cyber-kinetic attacks. As...
5G COVID-19

What COVID-19 Taught Us About the Need for 5G

There are many adjectives that could be used to describe the global outbreak of COVID-19,...
US vs China 5G

Geopolitics of 5G and 5G-Connected Massive & Critical IoT

Emerging Technology and Geopolitics of 5G There are several reasons emerging technology is a highly competitive industry, notwithstanding the race for intellectual property that can be licensed by burgeoning markets for revenue. A first-mover advantage is often a way to lock in relationships that can lead to long-term infrastructure commitments, integration support services, and service delivery platform development. As the adage goes, “Whoever owns the platform, owns the customer.” This race to be the first to establish technological platforms and lock-in their customers is increasingly becoming politicized. And 5G, the next generation of cellular mobile communications technology, is the best example of how geopolitics is getting involved in emerging tech decisions and how technology discussions are influencing geopolitics. The potential economic gains from 5G development and deployment, the civilization’s likely future...
Cyber-Kinetic Timeline

Timeline of Key Cyber-Kinetic Attacks, Incidents & Research

Below is a timeline of key historic cyber-kinetic attacks, system malfunctions and key researcher demos...
Quantum Computer 5G Security

The Quantum Computing Threat to Cybersecurity and 5G Security

Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer...
Society 5.0 and 5G

Will 5G and Society 5.0 Mark a New Era in Human Evolution?

In their outstanding book, Wicked and Wise, Alan Watkins and Ken Wilber look at some...
Cyber-Kinetic Attacks History

History of Cyber-Kinetic Incidents and Research

The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen....
AI Fake News

AI-Exacerbated Disinformation and Cyber Threats to Democracy

Recent events have confirmed that the cyber realm can be used to disrupt democracies as...
Cyber-War

Cyber War – scaremongering or reality?

“Cyber war” is a term that is in recent days used so liberally that people...
Cybersecurity IoT 5G Cyber-Kinetic Risks

Cyber-Kinetic Risk – Unintended Consequence of IoT in a 5G World

Getting smart about security in smart systems Smart used to be something we called people or pets. It wasn't a term one would use to describe one's hairbrush. That is changing, of course, in an era of accelerating digital transformation. Now we have smart homes, smart cities, smart grids, smart refrigerators and, yes, even smart hairbrushes. What's not so smart, though, is the way the cybersecurity and cyber-kinetic security risks of these systems are often overlooked, and with new horizon technologies like 5G, these problems are set to grow exponentially. Cyber-physical systems and the smartification of our world Cyber-connected objects have become ubiquitous. They are so prevalent that we are already beginning to take their existence for granted, even though this was the stuff of science fiction only a few years ago....
Wi-Fi Cybersecurity

Wi-Fi Security 101 (Non-5G IoT Connectivity Options)

The Wi-Fi represents wireless technology that includes the IEEE 802.11 family of standards (IEEE 802.11a,...
Smart Home Wireless Connectivity

Smart Home / Smart Building Connectivity Options and Their Cybersecurity

In a recent session on smart building cybersecurity, a student cheekily asked me "How did...
Cyber-Kinetic

When Hackers Threaten your Life – Cyber-Kinetic Attacks Intro

The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful...
IIoT 5G Trust Security

IIoT and Trust and Convenience: A Potentially Deadly Combination

When microwave ovens first arrived on the market in 1967 they were met with public...
IEMI

IEMI – Threat of Intentional Electromagnetic Interference

As our cities, our transportation, our energy and manufacturing – our everything – increasingly embrace...
5G Connectivity Security

5G Network: A Quantum Leap in Connectivity – and Cyber Threats

The timeline of human history is marked by inflection points of major technological advancement. The...
Smart City 5G Privacy

Cyber-Kinetic Security and Privacy Threats in Smart Cities

More than half of the world’s population lives in cities. The UN estimates that by 2050 that proportion will be 68% - more than 6 billion people living in high-density conditions. This raises significant challenges. What is the best way to ensure that human needs are met in a fair and equitable way? How will we face challenges like resource strain, waste and pollution management, traffic congestion and connectivity? In response to these wicked problems, cities are increasingly relying on smart technologies to foster greater efficiency and sustainable growth. These interventions do not, however, come without their own complications. Just like any digital tool, smart systems are vulnerable to cyber-kinetic attacks, but what makes them unique is their high degree of integration. Because these systems are by their nature embedded...
Chinese cybercrime

Cybercrime in China – a Growing Threat for the Chinese Economy

Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s...
Future of AI

The Future of Artificial Intelligence (AI)

If you’ve read the many predictions about the future of AI, you’ve likely found them...
Cyber-Kinetic Timeline

Timeline of Key Cyber-Kinetic Attacks, Incidents & Research

Below is a timeline of key historic cyber-kinetic attacks, system malfunctions and key researcher demos...
NFC Cybersecurity

NFC Security 101 (Non-5G IoT Connectivity Options)

NFC is a short range two-way wireless communication technology that enables simple and secure communication...
Smart City Privacy

Getting Street Smart – The Inherent Privacy Risks of Smart Cities

Humans are moving to cities at an unprecedented rate. Today 55% of the world’s population...
Tangible threat of cyber kinetic attacks

Tangible Threat of Cyber-Kinetic Attacks

Connecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed...
AI Three Futures

Three Views of Artificial Intelligence (AI) Future

If you’ve read the many predictions about the future of AI, you’ve likely found them to be wildly different. They range from AI spelling doom for humanity, to AI ushering in Golden Age of peace, harmony and culture, to AI producing barely a blip on society’s path toward ever-greater technological achievement. Those three views – dystopian, utopian and organic – present issues we need to consider as we move deeper toward an AI-integrated future. Yet they also contain exaggerations and false assumptions that we need to separate from reality. The Dystopian View of AI Future Those with a dystopian view of emerging technologies point to studies such as the often-quoted 2013 Oxford report on the susceptibility of more than 700 job categories to automation. This report predicts that 47% of jobs are under...
Innovation in Canada

Innovation in Canada – What’s Not Working and What Is

Canada’s rankings in innovation has lagged that of other peer nations for decades despite government...
Canada Innovation Zones AI 5G

5G Innovation Zones in Canada for Launching AI and 5G in Tandem

In my previous post I argued that if Canada wants to succeed with its AI-focused...
AI Assimilators

Driving Change as Assimilators in the Age of AI

AI leaders must adapt to the changing culture as young workers enter the job market...
Risks of AI

Risks of AI – Meeting the Ghost in the Machine

In 1956, at a workshop on the campus of Dartmouth College, in Hanover, New Hampshire,...
AI Interpersonal

Those with Interpersonal Skills Have Least to Worry About the AI

Artificial Intelligence (AI) is becoming ever more important, and not just in automating repetitive, manual...
Society 5.0 and 5G

Will 5G and Society 5.0 Mark a New Era in Human Evolution?

In their outstanding book, Wicked and Wise, Alan Watkins and Ken Wilber look at some...
Canada 5G CA5G

Collaboration: The Unexpected Key to Success in Canada’s 5G

In 1967, Lynn Margulis, a young biologist, published a paper that challenged more than a hundred years of evolutionary theory. It proposed that millions of years ago, the eukaryotes emerged not from competition, as neo-Darwinism asserts, but from collaboration. Margulis’ research showed how single-celled lifeforms working together created an entirely new organism that became the foundation of all advanced life on earth. This was an inflection point in the development of evolutionary biology, shifting the scientific and cultural narrative away from “survival of the fittest” towards “survival of the most cooperative.” Though competition contributes to better individual or organizational performance, it can have the opposite effect on larger systems. In building a world-leading 5G ecosystem in Canada we need to appreciate that success will depend on all stakeholders contributing in a collaborative...
Canada 5G AI

5G and AI – Getting Smart About 5G and AI in Canada

Canada has been investing in machine learning and artificial intelligence (AI) for longer than most...
Canada Innovation Zones AI 5G

5G Innovation Zones in Canada for Launching AI and 5G in Tandem

In my previous post I argued that if Canada wants to succeed with its AI-focused...
5G World Economy Society

How 5G Will Transform Economy and Society

Since the dawn of the 21st Century, the ways in which people and organizations that...
Canada 5G CA5G

Collaboration: The Unexpected Key to Success in Canada’s 5G

In 1967, Lynn Margulis, a young biologist, published a paper that challenged more than a...
US vs China 5G

Geopolitics of 5G and 5G-Connected Massive & Critical IoT

Emerging Technology and Geopolitics of 5G There are several reasons emerging technology is a highly competitive...
Innovation in Canada

Innovation in Canada – What’s Not Working and What Is

Canada’s rankings in innovation has lagged that of other peer nations for decades despite government...
5G SBA IMS MEC Architecture

Introduction to 5G Core Service-Based Architecture (SBA) Components

The interest in 5G and mIoT is exploding. It's exciting to see so many IT and cybersecurity professionals in my network trying to learn more about 5G and related technologies. In addition to my usual articles about the societal impacts of these innovations, I'll start a series of articles introducing key 5G and mIoT technology concepts. Before we move on to technical aspects of 5G security. Let's get started with reviewing the 5G core service-based architecture and learning the first few dozen acronyms, out of approximately a gazillion. The cellular industry loves acronyms. Even more than the cybersecurity industry. 5G architecture is an evolution of current 4G architectures but based on a Service-Based Architecture (SBA). The 3GPP defines the SBA for a 5G core network as delivered by a set of interconnected...
5G TSN Manufacturing

5G in Manufacturing – 5G and Time Sensitive Networking (TSN) for Industrial Automation

In the recent report by IHS Markit - "The 5G Economy - How 5G will...
RFID Cybersecurity

RFID Security 101 (Non-5G IoT Connectivity Options)

Radio-Frequency Identification (RFID) is a technology commonly used for identification, status administration and management of...
LoRaWAN IoT Security

LoRaWAN Security 101 (Non-5G IoT Connectivity Options)

I get accused of focusing too much on 5G as the only future IoT connectivity...
Wi-Fi Cybersecurity

Wi-Fi Security 101 (Non-5G IoT Connectivity Options)

The Wi-Fi represents wireless technology that includes the IEEE 802.11 family of standards (IEEE 802.11a,...
Zigbee Security

Zigbee Security 101 (Non-5G IoT Connectivity Options)

Zigbee technology introduction Zigbee is wireless PAN (Personal Area Network) technology developed to support automation, machine-to-machine...
Bluetooth Cybersecurity

Bluetooth Security 101 (Non-5G IoT Connectivity Options)

Bluetooth is short-range wireless communications technology based on the IEEE 802.15.1 protocol. It works in...
Quantum Computer 5G Security

The Quantum Computing Threat to Cybersecurity and 5G Security

Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would be practically impossible for a classical machine. This quantum computing breakthrough brings us closer to the arrival of functional quantum systems which will have a profound effect on today's security infrastructure. How will quantum computing affect the security of 5G technologies currently being developed and deployed? Last spring we suggested that the emergence of quantum internet connectivity and computation, expected sometime in the next decade, poses numerous new cryptography and cybersecurity challenges for 5G security. MIT offers an explainer on the nascent status of powerful quantum computers, how they work, and where they might provide practical value first. While quantum computers are not expected to replace classical...
Diversity Failings

Can we Rescue Diversity from its own Failings?

Don’t expect this to be either of the typical articles about diversity. I’m here not...
Money Laundering

Fighting Money Laundering at the Placement Stage

One key to fighting money laundering is understanding its process and the vulnerabilities in each...
AI Future Workforce

AI and The Great Workforce Skill Set Shift

Whether AI and the technologies it enables will reach their full potential depends on the...
Being Interim Manager

Do you Have What it Takes to be an Interim Manager?

Businesses, facing an ever-increasing variety of complex problems, are in desperate need of good interim...
Cyber-War

Cyber War – scaremongering or reality?

“Cyber war” is a term that is in recent days used so liberally that people...
Interim Manager

How can you get the Most out of Interim Managers?

Are you hiring and using interim managers wisely? Why is it that some companies attain...
Marin Ivezic 5G & mIoT Cybersecurity
Copy link