There are big discussions and platforms on 5G, which will have increased amounts of throughput of data up to 100 times what many countries currently have in 4G technology.
When we look at some information, we see horrifying impacts on the cyber world. The hacker attacks every 39 seconds, according to The A. James Clark School of Engineering at the University of Maryland. Hackers stole a half-billion personal records last year. There is an expectation of spending $6 trillion globally on cybersecurity by 2021.
The Trump Administration forecasts the U.S. wireless industry plans to invest $275 billion in 5G networks, creating 3 million American jobs and adding $500 billion to the U.S. economy.
Since cybersecurity and policy are a very hot topic, there was a timely briefing featuring Deputy Assistant Secretary for Cyber and International Communications Policy, Robert Strayer, at the State Department on January 9, 2020. He shared the highlights of 2019 and looked ahead to cybersecurity in 2020.
He stated that there had been tremendous growth from the Internet and connected digital technologies, and has seen an increase in the number of people having access to previously inaccessible information.
He also indicated that the Internet and being connected add trillions of dollars to the global economy every year.
He talked about how cyberspace has significant challenges, especially since the plan is to connect the next three billion people around the world. Also, he emphasized doing more substantial work in enabling cooperation and collaboration among nations in addressing these cyberspace challenges.
Becoming Top Priority: Cybersecurity and Cyber Policy
The State Department is taking cybersecurity and cyber policy seriously. There has been a lot of educational briefings and interaction with many different global actors in the past few years.
Deputy Assistant Secretary Strayer highlighted that “a country should not disrupt another nation’s critical infrastructure that is providing services to the public.”
He also briefly summarized the cyber progress accomplishments in the last year.
-Established a framework of responsible state behavior in cyberspace, which comprises developing the rules of the road for how countries should interact with one another in cyberspace.
-Had the United Nations endorse a set of 11 voluntary norms of responsible state behavior. With the leadership of the U.S., 26 other countries are responsible for enforcing state behavior in cyberspace. All endorsed the applicability of international law to cyberspace.
-A nation should not attack another nation’s major infrastructure endorsed by the UN.
-Cyber deterrence strategy: The State Department’s goal is to establish a set of consequences that are swift, costly, and transparent.
-Educate and partner with other countries about the importance and the transformational nature of 5G wireless technologies
Trust is the key to 5G.
The Deputy Assistant Secretary emphasized that there should be trust between vendors of this technology and the telecom operators and the governments where that technology would be deployed.
The European Union is an important partner.
The U.S. is working closely with Europe as they work on security measures for 5G. The U.S. welcomed the European Union’s adoption of a risk assessment last October.The European Union has a security toolbox for 5G now that addresses the security risks that they've already assessed to exist.
Worldwide Threat Assessment and 4 Countries
Deputy Assistant Secretary Strayer has identified four countries that they see as strategic competitors or adversaries in cyberspace; these are China, Russia, North Korea, and Iran. Their attacks violate norms of responsible state behavior; for example, the NotPetya attack and Iran’s activity on media platforms seeking to influence the U.S. population.
Also, the Iranian government has blocked the Internet, making it unavailable to the public, so the U.S. has sanctioned the Iranian Communications Minister to send the Iranian government a message.
Deputy Assistant Secretary Strayer said that there is no legitimate reason for disabling the Internet when doing so is an effort to interfere with people’s ability to communicate.
Big Threat from China
Deputy Assistant Secretary Strayer said that the U.S. had shared its concern about the laws in China and, especially, the sharing of data with governments that are not on the rule of law. He added that there is no appeal to an independent judiciary or a rule of law system that can be checked.There are a lot of concerns about Chinese telecom companies such as Huwaei.
$50 Million of Technical Assistance
Last year, the State Department was able to commit to $50 million of technical assistance in the form of cybersecurity capacity-building and cybersecurity training, as well as regulatory and other training assistance for regulators in countries around the world.
The State Department is also looking to expand to Latin America with at least $10 million pending approval from Congress. The State Department initiated similar support to Indo-Asia last year.
The U.S. continues to work closely with NATO to secure communications capabilities with the ability to engage in joint operations together and to enact troop mobilization.
According to NATO Secretary-General Jens Stoltenberg, “A serious cyberattack could trigger Article 5, where an attack against one ally is treated as an attack against all.” Stoltenberg wrote this in an article that was published in Prospect’s new cyber resilience supplement last year.
NATO also established a new Cyberspace Operations Centre in Mons, Belgium, in order to increase their military commanders’ cyber-situational awareness.
“With so much on the line, it’s urgent that trustworthy companies build these 21st-century information arteries. Specifically, it’s critical that European countries not give control of their critical infrastructure to Chinese tech giants like Huawei or ZTE” – Secretary of State Michael R. Pompeo, Politico Europe, December 2, 2019.
The White House also has a national cybersecurity strategy that was published in 2018 (https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf).
- Published in TOA Authors