ENERGY TODAY
  • Members Login >>
    • Energy Today Archive >
      • Leading Change
      • Zero Emissions
      • Interactive Map
      • Floating Wind
      • Quick Hits
      • Steven Chu
      • Dan Poneman
      • Melanie Kenderdine
      • Chris Gould
      • UNSDSN
      • Data as a Tool
      • Change Through Organizing
      • MK Dorsey
      • Social Impact Start-Ups
      • Social Impact Entrepreneurs
      • A Network for the Heartland
      • Ecosystem Maps
      • Clean Energy By 2035
      • Bioremediation
      • Energy Storage-Video
      • Geothermal Energy
      • Commodity Chemical
      • PM Careers In Cleantech
      • Critical Breakthroughs
      • Losing Our Way
      • The Third Rail
      • Mapping the Seas
      • Low-Carbon Midwest
      • Smart Grid
      • Decarbonization
      • Getting to Zero
      • Climate Risk and Response
      • Our Infrastructure Is Being Built For a Climate That's Already Gone
      • Energy History
      • Battery Recycling
      • Quantum Waves
      • Coal REE
      • Fueling Big Rigs
      • Sandia Initiatives
      • Natural Gas Revolution
      • Duck Chart
      • Carbon Crossroads
      • Electric Cars
      • Energy Jobs Coalition
      • Indispensable Electricity
      • Post-Pandemic Predictions
      • Building Infrastructure
      • De-Prioritizing Cars
      • Vicki Hollub
      • Emily Kirsch
      • Lise Meitner
      • Lets Listen
      • COVID-19 and China Air
      • COVID-19 and Oil
      • COVID-19 and Solar
      • COVID-19 and Storage
      • Immorality of Waste
      • Rethinking "Disposable"
      • Second Life of Wind Turbines
      • Rare Earth Elements
      • Coal: Ashes to REM
      • Platinum and Cobalt
      • Geoengineering the Planet
      • An Atmospheric Industry
      • L.A. Hydrogen Plant
      • Pebbles, Sponges and Fans
      • CO2 Into Fuel
      • Superpower
      • The Fate of Food
      • Power Trip
      • Signs on the Earth
      • The Dreamt Land
      • Double Jeopardy
      • 7 Trends In Mineral Mining
      • The Prize - an excerpt
      • REM From Coal
      • The Deep Sea - The Next Gold Rush
      • Geothermal - Salvation or Earthquakes
      • The Myth of the Sustainabie City
      • The Emerging Circular Economy
      • How Cities Can Become More Resilient
      • Prosperity for One, Disaster for Another
      • The Real Energy Revolution
      • Carbon Loophole
      • Op-Ed: CO2 Reduction Thru Biofuels
      • The Sun Also Accelerates
      • Blowing Past the Zettabyte Era
      • Jack Voltaic: A Cyber Simulation Wargame
      • Managing Risk
      • From Russia, With Love
      • Ukraine: The Cyber-War Test Bed
      • 5G Requires A New Approach
      • Climate Change or Just Weather
      • Gone
      • Surge Flooding - Houston
      • Tug of War: Pollution Masks Impact of Climate Change
      • Climate Change Needs the Humanities
      • Nuclear Power: A Dilemma for Climate Change Philanthropy
      • Did California Trump the Clean Air Rollback
      • A Redundancy Dilemma
      • Double Jeopardy - a bonus excerpt
      • The War of the Currents
      • There Will Be Buyouts
      • Space Research Can Save the Planet
      • California's Oil Hypocrisy
      • Robert Merton
      • Africa: The New O&G Frontier
      • Why Oil Markets Aren't Reacting
      • Capitalism and Climate Change
      • The Frackers
      • Double Jeopardy
      • The Grid
      • Designing Climate Solutions
      • Making Tech Miracles
      • Best In Snow
      • Plastic Do-Over
      • The New Nuclear
      • Global Energy Insecurity
      • Renewable Energy and Geopolitics
      • The Myth of Energy Security
      • Residential Storage Security
      • An Insecure GND
      • Water, Food and Energy Security
      • The Transformation of the O&G Sector
      • Wild Fire
      • Ocean Pollution At High-Tide
      • CC's Fuzzy Math
      • A Climate Casualty of a Different Kind
      • Plants Store CO2 Too
      • 45Q for CarbonTech
      • CC's Potential Pitfalls
      • Klaus’s wacky idea
      • Permitting Geological Sequestration
      • A New Era of Energy Innovation
      • Investment in O&G Set to Soar
      • Old Capital Strategies, New Thinking
      • BofA Builds Green Revolution
      • We'd Rather Quit OPEC...
      • One Belt, One Road, No Plan
      • Coal fight turns ugly
      • As the World Warms
      • Oil Diplomacy
      • George Mitchell
      • Nicole Poindexter
      • Dan Kammen
      • Regina Mayor
      • Jessica Matthews
      • Bonus: Refining Reducing
      • Bonus: Energy Investment Trends
      • Bonus: The US has lost the rare earths
      • Bonus: Fossil-tech survey results
      • Bonus article: The New Age of Electricity
      • Bonus - Plan B: Geoengineering
      • Bonus: EXECUTIVE SUMMARY - Fossil-Tech
      • Bonus: Cyber Attack Timeline
      • Bonus: Employees - Cyber Threats and Assets
      • Bonus: Transportation, Jetson's Style
      • Bonus Article for Members
      • Bonus article - Infrastructure Failure
      • Bonus: Hydrogen Fuel From Coal
      • Bonus: Cities Not Meeting Targets
      • Bonus: Carbon Sequestering Fungi
      • Bonus: The Earthshot Prize
      • Bonus: A Radioactive Discovery

5g requires new approaches
​to cybersecurity

​by Tom Wheeler and David Simpson
The race to 5G is on and America must win,” President Donald Trump said in April, 2019. For political purposes, that “race” has been defined as which nation gets 5G built first. It is the wrong measurement. We must “fire first effectively” in our deployment of 5G. Borrowing on a philosophy Admiral Arleigh Burke coined in World War II: Speed is important, but speed without a good targeting solution can be disastrous
Picture
5G will be a physical overhaul of our essential networks that will have decades-long impact. Because 5G is the conversion to a mostly all-software network, future upgrades will be software updates much like the current upgrades to your smartphone. Because of the cyber vulnerabilities of software, the tougher part of the real 5G “race” is to retool how we secure the most important network of the 21st century and the ecosystem of devices and applications that sprout from that network.
Never have the essential networks and services that define our lives, our economy, and our national security had so many participants, each reliant on the other—and none of which have the final responsibility for cybersecurity. The adage “what’s everybody’s business is nobody’s business” has never been more appropriate—and dangerous—than in the quest for 5G cybersecurity.
“As we pursue the connected future, however, we must place equivalent—if not greater—focus on the security of those connections, devices, and applications.”
The new capabilities made possible by new applications riding 5G networks hold tremendous promise. As we pursue the connected future, however, we must place equivalent—if not greater—focus on the security of those connections, devices, and applications. To build 5G on top of a weak cybersecurity foundation is to build on sand. This is not just a matter of the safety of network users, it is a matter of national security.

HYPERFOCUS ON HUAWEI

Effective progress toward achieving minimally satisfactory 5G cyber risk outcomes is compromised by a hyperfocus on legitimate concerns regarding Huawei equipment in U.S. networks. While the Trump administration has continued an Obama-era priority of keeping Huawei and ZTE out of domestic networks, it is only one of the many important 5G risk factors. The hyperbolic rhetoric surrounding the Chinese equipment issues is drowning out what should be a strong national focus on the full breadth of cybersecurity risk factors facing 5G.
​However, it is time to move beyond the Huawei infrastructure issue to review some of the issues that the furor over Huawei has masked. Policy leaders should be conducting a more balanced risk assessment, with a broader focus on vulnerabilities, threat probabilities, and impact drivers of the cyber risk equation. This should be followed by an honest evaluation of the oversight necessary to assure that the promise of 5G is not overcome by cyber vulnerabilities, which result from hasty deployments that fail to sufficiently invest in cyber risk mitigation.

​“None of this suggests that we suspend the march to the benefits of 5G. It does, however, suggest that our status quo approach to 5G should be challenged.”
Such a review of 5G cyber threat mitigation should focus on the responsibilities of both 5G businesses and government. This should include a review of whether current market-based measures and motivations can address 5G cyber risk factors and where they fall short, the proper role of targeted government intervention in an era of rapid technological change. The time to address these issues is now, before we become dependent on insecure 5G services with no plan for how we sustain cyber readiness for the larger 5G ecosystem.


5G EXPANDS CYBER RISKS

There are five ways in which 5G networks are more vulnerable to cyberattacks than their predecessors:
  1. The network has moved away from centralized, hardware-based switching to distributed, software-defined digital routing. Previous networks were hub-and-spoke designs in which everything came to hardware choke points where cyber hygiene could be practiced. In the 5G software defined network, however, that activity is pushed outward to a web of digital routers throughout the network, thus denying the potential for chokepoint inspection and control. 
  2. 5G further complicates its cyber vulnerability by virtualizing in software higher-level network functions formerly performed by physical appliances. These activities are based on the common language of Internet Protocol and well-known operating systems. Whether used by nation-states or criminal actors, these standardized building block protocols and systems have proven to be valuable tools for those seeking to do ill. 
  3. Even if it were possible to lock down the software vulnerabilities within the network, the network is also being managed by software—often early generation artificial intelligence—that itself can be vulnerable. An attacker that gains control of the software managing the networks can also control the network.  
  4. The dramatic expansion of bandwidth that makes 5G possible creates additional avenues of attack. Physically, low-cost, short range, small-cell antennas deployed throughout urban areas become new hard targets. Functionally, these cell sites will use 5G’s Dynamic Spectrum Sharing capability in which multiple streams of information share the bandwidth in so-called “slices”—each slice with its own varying degree of cyber risk. When software allows the functions of the network to shift dynamically, cyber protection must also be dynamic rather than relying on a uniform lowest common denominator solution.  
  5. Finally, of course, is the vulnerability created by attaching tens of billions of hackable smart devices (actually, little computers) to the network colloquially referred to as IoT. Plans are underway for a diverse and seemingly inexhaustible list of IoT-enabled activities, ranging from public safety things, to battlefield things, to medical things, to transportation things—all of which are both wonderful and uniquely vulnerable. In July, for instance, Microsoft reported that Russian hackers had penetrated run-of-the-mill IoT devices to gain access to networks. From there, hackers discovered further insecure IoT devices into which they could plant exploitation software.

Fifth-generation networks thus create a greatly expanded, multidimensional cyberattack vulnerability. It is this redefined nature of networks — a new network “ecosystem of ecosystems” — that requires a similarly redefined cyber strategy. The network, device, and applications companies are aware of the vulnerabilities and many are making, no doubt, what they feel are good faith efforts to resolve the issues. The purpose of this paper is to propose a basic set of steps toward cyber sufficiency. It is our assertion that “what got us here won’t get us there.”


The above excerpt is reprinted from the original article by Brookings.
Picture
We are the only professional association dedicated to the advancement of abundant, affordable and safe energy.
Our members are solving the world’s greatest energy challenges.
About
Contact us
​AES Social Contract
Become a Member
Your Membership
​Member home
2020 © American Energy Society  |  Terms of Service |  Privacy Policy
  • Members Login >>
    • Energy Today Archive >
      • Leading Change
      • Zero Emissions
      • Interactive Map
      • Floating Wind
      • Quick Hits
      • Steven Chu
      • Dan Poneman
      • Melanie Kenderdine
      • Chris Gould
      • UNSDSN
      • Data as a Tool
      • Change Through Organizing
      • MK Dorsey
      • Social Impact Start-Ups
      • Social Impact Entrepreneurs
      • A Network for the Heartland
      • Ecosystem Maps
      • Clean Energy By 2035
      • Bioremediation
      • Energy Storage-Video
      • Geothermal Energy
      • Commodity Chemical
      • PM Careers In Cleantech
      • Critical Breakthroughs
      • Losing Our Way
      • The Third Rail
      • Mapping the Seas
      • Low-Carbon Midwest
      • Smart Grid
      • Decarbonization
      • Getting to Zero
      • Climate Risk and Response
      • Our Infrastructure Is Being Built For a Climate That's Already Gone
      • Energy History
      • Battery Recycling
      • Quantum Waves
      • Coal REE
      • Fueling Big Rigs
      • Sandia Initiatives
      • Natural Gas Revolution
      • Duck Chart
      • Carbon Crossroads
      • Electric Cars
      • Energy Jobs Coalition
      • Indispensable Electricity
      • Post-Pandemic Predictions
      • Building Infrastructure
      • De-Prioritizing Cars
      • Vicki Hollub
      • Emily Kirsch
      • Lise Meitner
      • Lets Listen
      • COVID-19 and China Air
      • COVID-19 and Oil
      • COVID-19 and Solar
      • COVID-19 and Storage
      • Immorality of Waste
      • Rethinking "Disposable"
      • Second Life of Wind Turbines
      • Rare Earth Elements
      • Coal: Ashes to REM
      • Platinum and Cobalt
      • Geoengineering the Planet
      • An Atmospheric Industry
      • L.A. Hydrogen Plant
      • Pebbles, Sponges and Fans
      • CO2 Into Fuel
      • Superpower
      • The Fate of Food
      • Power Trip
      • Signs on the Earth
      • The Dreamt Land
      • Double Jeopardy
      • 7 Trends In Mineral Mining
      • The Prize - an excerpt
      • REM From Coal
      • The Deep Sea - The Next Gold Rush
      • Geothermal - Salvation or Earthquakes
      • The Myth of the Sustainabie City
      • The Emerging Circular Economy
      • How Cities Can Become More Resilient
      • Prosperity for One, Disaster for Another
      • The Real Energy Revolution
      • Carbon Loophole
      • Op-Ed: CO2 Reduction Thru Biofuels
      • The Sun Also Accelerates
      • Blowing Past the Zettabyte Era
      • Jack Voltaic: A Cyber Simulation Wargame
      • Managing Risk
      • From Russia, With Love
      • Ukraine: The Cyber-War Test Bed
      • 5G Requires A New Approach
      • Climate Change or Just Weather
      • Gone
      • Surge Flooding - Houston
      • Tug of War: Pollution Masks Impact of Climate Change
      • Climate Change Needs the Humanities
      • Nuclear Power: A Dilemma for Climate Change Philanthropy
      • Did California Trump the Clean Air Rollback
      • A Redundancy Dilemma
      • Double Jeopardy - a bonus excerpt
      • The War of the Currents
      • There Will Be Buyouts
      • Space Research Can Save the Planet
      • California's Oil Hypocrisy
      • Robert Merton
      • Africa: The New O&G Frontier
      • Why Oil Markets Aren't Reacting
      • Capitalism and Climate Change
      • The Frackers
      • Double Jeopardy
      • The Grid
      • Designing Climate Solutions
      • Making Tech Miracles
      • Best In Snow
      • Plastic Do-Over
      • The New Nuclear
      • Global Energy Insecurity
      • Renewable Energy and Geopolitics
      • The Myth of Energy Security
      • Residential Storage Security
      • An Insecure GND
      • Water, Food and Energy Security
      • The Transformation of the O&G Sector
      • Wild Fire
      • Ocean Pollution At High-Tide
      • CC's Fuzzy Math
      • A Climate Casualty of a Different Kind
      • Plants Store CO2 Too
      • 45Q for CarbonTech
      • CC's Potential Pitfalls
      • Klaus’s wacky idea
      • Permitting Geological Sequestration
      • A New Era of Energy Innovation
      • Investment in O&G Set to Soar
      • Old Capital Strategies, New Thinking
      • BofA Builds Green Revolution
      • We'd Rather Quit OPEC...
      • One Belt, One Road, No Plan
      • Coal fight turns ugly
      • As the World Warms
      • Oil Diplomacy
      • George Mitchell
      • Nicole Poindexter
      • Dan Kammen
      • Regina Mayor
      • Jessica Matthews
      • Bonus: Refining Reducing
      • Bonus: Energy Investment Trends
      • Bonus: The US has lost the rare earths
      • Bonus: Fossil-tech survey results
      • Bonus article: The New Age of Electricity
      • Bonus - Plan B: Geoengineering
      • Bonus: EXECUTIVE SUMMARY - Fossil-Tech
      • Bonus: Cyber Attack Timeline
      • Bonus: Employees - Cyber Threats and Assets
      • Bonus: Transportation, Jetson's Style
      • Bonus Article for Members
      • Bonus article - Infrastructure Failure
      • Bonus: Hydrogen Fuel From Coal
      • Bonus: Cities Not Meeting Targets
      • Bonus: Carbon Sequestering Fungi
      • Bonus: The Earthshot Prize
      • Bonus: A Radioactive Discovery