Home Tags CYBERSECURITY

Tag: CYBERSECURITY

Huawei ERNW 5G Source Code Analysis
No, no it doesn’t. Huawei's code might as well be extremely secure. Their code is certainly the most scrutinized. But the recent UDG source code review is not an evidence of security. ERNW, an independent IT security service provider in Germany, recently performed a technical review / audit of Huawei’s Unified Distributed Gateway (UDG) source code. Huawei made the summary report available here . The review focused on the quality of the source code and the source code management practices. The report is overall positive and showed that Huawei has significantly improved its software engineering processes. At least for the UDG...
S.3469 NETWORK Act
A bipartisan group of U.S. lawmakers today introduced in Senate a bill aimed "To impose sanctions with respect to foreign telecommunications companies engaged in economic or industrial espionage against United States persons, and for other purposes." Officially called Neutralizing Emerging Threats from Wireless OEMs Receiving direction from Kleptocracies and Surveillance states Act or the NETWORKS Act, the bill would require the President to block and prohibit significant transactions and interests in property of a foreign individual or entity that (1) produces fifth- or future-generation telecommunications technology; and (2) engages in economic or industrial espionage, or other related illicit activities, involving...
The Next Gen Future 5G Australia
Australian government's committee - The House of Representatives Standing Committee on Communications and the Arts - has issued a new report on adoption of 5G in Australia. The report titled "The Next Gen Future - Inquiry into the deployment, adoption and application of 5G in Australia" lists 14 recommendations including these few related to technology independence and cybersecurity: The Committee recommends that the Australian Government investigate ways to encourage the manufacture of 5G infrastructure within Australia. To help enable this, the Australian Government should establish a 5G R&D Innovation Fund to fast track the development and scale-up of alternative manufacturing...
UK 5G Huawei
The U.K. government greenlit Huawei for a limited role in the U.K.'s fifth-generation telecommunications networks. This is a blow for American efforts of the last few years to get its allies to boycott the Chinese telecom-equipment vendor. The U.S. has been campaigning against Huawei ostensibly over spying fears. However, the real reasons are much more complicated. See Geopolitics of 5G and 5G-Connected Massive & Critical IoT for my analysis of the 5G-related geopolitical spat. The underlying question really being about who would take the lead in the nascent "Society 5.0" / "Everything Connected" era and who gets left behind. The U.K....
5G Opportunity and Cybersecurity
The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the last 350 years, in particular, representing staggering technological progress. The first industrial revolution mechanized production using natural elements like water. The second revolution used electricity to enable mass production; the third used electronics and information technology to automate production. The fourth industrial revolution unfolding all around us is characterized by an exponential growth in data production and the merging of the physical and digital. Cyber-physical systems (CSPs) like the internet of things (IoT) and industrial control systems (ICS) are capable of...
5G Threat Landscape
ENISA, the EU's always excellent cybersecurity watchdog, published "Threat Landscape of 5G Networks", a report on threats relating to 5G networks. The report presents an overview of the challenges in the security of 5G networks. It also presents a comprehensive generic 5G architecture, the identification of key assets, the assessment of threats affecting 5G (threat taxonomy), the identification of asset exposure (threats – assets mapping) and an initial assessment of threat agent motives. I don't fully agree with the report's mapping of relevance of asset groups to the maintenance of CIA properties, but, as the authors state "...the asset...
Huawei Position Paper Cybersecurity 5G
Today Huawei released its position paper on cyber security. The paper is an excellent summary of 5G security risks, latest standards and industry developments related to 5G security. Some of the 5G security approaches Huawei claims to follow and how their cybersecurity organized all have some interesting and applicable nuggets. Once some of the self-serving statements are filtered out, this paper together with included references could serve as a good 5G security primer. The paper, however, is coming somewhat short of addressing the key security concern with Huawei - namely the risk of the Chinese state gathering sensitive data and/or...
Canada Huawei 5G
According to a recent media report, Canadian key intelligence agencies - the Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE) - are divided over whether Ottawa should block Chinese telecom giant Huawei Technologies Co. Ltd. from supplying equipment for this country’s next-generation 5G wireless networks. CSE and CSIS were tasked with conducting a cybersecurity review to evaluate the risks as well as the economic costs to Canadian telecoms and consumers of blacklisting the equipment supplier. The Americans and Australians -- who are partners with Canada, Britain and New Zealand in the Five Eyes intelligence-sharing network -- have...
Quantum Computer 5G Security
Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would be practically impossible for a classical machine. This quantum computing breakthrough brings us closer to the arrival of functional quantum systems which will have a profound effect on today's security infrastructure. How will quantum computing affect the security of 5G technologies currently being developed and deployed? Last spring we suggested that the emergence of quantum internet connectivity and computation, expected sometime in the next decade, poses numerous new cryptography and cybersecurity challenges for 5G security. MIT offers...
IIoT 5G Trust Security
When microwave ovens first arrived on the market in 1967 they were met with public skepticism. Perhaps it was because, not long before, the same technology now promising to safely cook consumers’ evening meals was the backbone of a military radar. Perhaps it was the $495 price tag (more than $3,700 in today’s money). Whatever the reason, in the early 1970s the percentage of Americans owning a microwave was tiny. By 2011, it was 97%. What changed? Trust and convenience. When microwave technology was first released, it was difficult to trust. Cooking without using heat? It was simply too alien. In 1973,...
5G Connectivity Security
The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine, electricity, the telephone, the internet: each of these breakthroughs precipitated tectonic shifts in how people lived and worked. Now, in the early part of the 21st century, we stand witness to the birth of a new industrial revolution built on 5th generation cellular technology - 5G network. As the name implies, 5G network follows a developmental chain. First came 1G, the first generation of cellular communication that freed us to make voice calls without being tethered...
Canada 5G AI
Canada has been investing in machine learning and artificial intelligence (AI) for longer than most of the industrialized world. Dr. Geoff Hinton of Google helped ignite the field of graphics processing unit (GPU) deep learning at the University of Toronto. Then he became chief scientific advisor to the Vector Institute, which in collaboration with the University, aims to produce the largest number of deep learning AI graduates and innovators globally. Meanwhile, Montreal, Quebec prides itself as the birthplace of AI. It’s the home of computer scientist Yoshua Bengio, who is another pioneer of AI technology. Hundreds of AI researchers...
AI and 5G Double-edged Sword
If you've ever been to an expensive restaurant and ordered a familiar dish like, say, lasagna, but received a plate with five different elements arranged in a way that does not at all resemble what you know as lasagna, then you have probably tasted deconstructionism. This approach to cuisine aims to challenge the way our brain makes associations, to break existing patterns of interpretation and, in so doing, to release unrealized potential. If the different elements work together harmoniously, it should be the best lasagna you've ever tasted. So it is with 5G. In principle, the 5th Generation network is deconstructed. Firstly,...
Risks of AI
In 1956, at a workshop on the campus of Dartmouth College, in Hanover, New Hampshire, the field of artificial intelligence (AI) was born. Attendants were buoyant. MIT cognitive scientist Marvin Minsky was quoted as saying, "Within a generation  the problem of creating 'artificial intelligence' will substantially be solved." This prediction turned out to be over zealous, but Minsky and his colleagues believed it wholeheartedly. What, then, is different today? What makes the current dialogue about AI more relevant and believable? How do we know that this is not another case of humans over estimating the development of technology? For one thing,...
AI and 5G
In 2013, George F. Young and colleagues completed a fascinating study into the science behind starling murmurations. These breathtaking displays of thousands – sometimes hundreds of thousands – of birds in a single flock swooping and diving around each other, look from a distance like a single organism organically shape-shifting before the viewer’s eyes. In their research article, Young et al reference the starling’s remarkable ability to “maintain cohesion as a group in highly uncertain environments and with limited, noisy information." The team discovered that the birds’ secret lay in paying attention to a fixed number of their neighbors –...