Posted on

U.S. Congressional report points out vulnerabilities of 5G

 

 

U.S. Congressional report points out vulnerabilities of 5G: cyberattack, military/industrial espionage, security concerns


 

Recent events[1][2][3][4] demonstrate how vulnerable 4G-5G wireless infrastructure is to hacking, thus proving to be a gigantic national security fail as well as an ecological disaster.[5]

 


 

June 4, 2021 | Congressional Research Service | Source

National Security Implications of Fifth Generation (5G) Mobile Technologies

[EXCERPT]

“National Security Concerns

According to a DIB assessment, China is the current leader in sub-6 technologies and is likely to deploy the world’s first 5G wide-area network. Chinese companies, which often receive government subsidies (e.g., subsidized land for facilities, R&D grants), are therefore well-positioned as global 5G suppliers. Huawei has signed contracts for the construction of 5G infrastructure in around 30 countries, including Iceland, Turkey, and the United Kingdom.

Some experts are concerned that vulnerabilities in Chinese equipment could be used to conduct cyberattacks or military/industrial espionage.These experts claim vulnerabilities were introduced through the poor business practices of many Chinese companies. However, they note that vulnerabilities could also be intentionally introduced for malicious purposes. China’s National Intelligence Law, enacted in June 2017, declares that “any organization and citizen shall, in accordance with the law, support, provide assistance, and cooperate in national intelligence work, and guard the secrecy of any national intelligence work that they are aware of.” Some analysts interpret this law as requiring Chinese companies to cooperate with intelligence services, including compelling installation of backdoors to provide private data to the government.

Other analysts argue that the risks posed by Chinese telecommunications equipment vary depending on the equipment’s location within the cellular network architecture. Most cellular networks are broken into two groups: the core network, which provides the gateway to the internet and ensures devices meet the provider’s standards, and the radio access network, composed of the cellular towers that broadcast and receive radio signals.”

 

Link To Read Full Document @ Source

 

 


 

 

Reference

[1] https://unlimitedhangout.com/2021/01/investigative-reports/another-mega-group-spy-scandal-samanage-sabotage-and-the-solarwinds-hack/

 

[2] https://www.npr.org/2021/06/07/1004075986/doj-has-reclaimed-some-of-the-ransom-paid-in-colonial-pipeline-hack

 

[3] https://fortune.com/2021/06/01/cyber-attack-jbs-meatpacking/

 

[4] https://pittsburgh.cbslocal.com/2021/05/06/lawsuit-pennsylvania-department-of-health-global-insight-contact-tracing-data-breach/

 

[5] https://zero5g.com/2021/5g-likely-to-prove-to-be-an-ecological-disaster/