SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : 2026 TeoTwawKi ... 2032 Darkest Interregnum -- Ignore unavailable to you. Want to Upgrade?


To: James Seagrove who wrote (145799)2/2/2019 7:47:35 PM
From: TobagoJack1 Recommendation

Recommended By
James Seagrove

  Respond to of 217651
 
nothing political

turns out to be life & death

What is at burning stake

For any society teeing up 5G late, may matter, especially for such that be Germany and such

For any society teeing up expensive 5G, also matter, especially for such that be India

Especially if early 5G leads faster onset of 6G, and hooked to quantum-assisted encryption and AI-enhanced Internet-of-Things

I suppose wrong map coordinates dispensed by hacked 5G can lead to bad outcomes, depending on point of view

Very exciting, certainly digital, and potentially binary, no pun :0)

scmp.com

Why 5G, a battleground for US and China, is also a fight for military supremacy
Apart from its tremendous commercial benefits, 5G – the fifth generation of mobile communication – is revolutionising military and security technology, which is partly why it has become a focal point in the United States’ efforts to contain China’s rise as a tech power and its allegations against Chinese companies.

The future landscape of warfare and cybersecurity could be fundamentally changed by 5G. But experts say 5G is more susceptible to hacking than previous networks, at a time of rising security concerns and US-China tensions on various interconnected fronts that include trade, influence in the Asia-Pacific region and technological rivalry.

These tensions provide the backdrop to controversy surrounding Huawei, the world’s largest telecoms equipment supplier.

Long before the Chinese company was indicted in the US this week on multiple charges including stealing trade secrets and violating US sanctions – charges it denies – US intelligence voiced concerns that Huawei’s telecommunications equipment could contain “back doors” for Chinese espionage.

US lawmakers seek to ban chip sales to China’s Huawei and ZTE for ‘violating American sanctions’

Huawei has repeatedly denied these allegations, but the controversies have underlined 5G’s growing importance and stepped up the technological arms race between China and the US.

To most people, the next-generation networks, which will be at least 20 times faster than the most advanced networks today, may just mean faster downloads of movies or smoother streaming. But they have much bigger potential than that.

Whereas existing networks connect people to people, the next generation will connect a vast network of sensors, robots and autonomous vehicles through sophisticated artificial intelligence.

The so-called internet of things will allow objects to “communicate” with each other by exchanging vast volumes of data in real time, and without human intervention.

5G explainer: how new network is different and how it will change the mobile web experience

Autonomous factories, long-distance surgery or robots preparing your breakfast – things that previously existed only in science fiction – will be made possible.

Meanwhile, though, it is being identified by many military experts as the cornerstone of future military technology.

Imagine a group of skirmishers in a jungle. They are moving forward speedily with a distance from one another of a few hundred metres. Each of them wears a wristwatch that displays fellow members’ positions. This is not satellite positioning, because reception in the tropical forest is unstable; it’s machine-to-machine communication.

China could ‘weaponise cities’ if it controlled 5G networks, retired US general says

Suddenly one soldier, ambushed by an enemy combatant, is shot and loses consciousness. His smart wearable device detects his condition via sensors, immediately tightens a belt around his wounded thigh, injects an adrenaline shot and sends an emergency alert to the field hospital as well as the entire team.

Having received the signal on their wristwatches, the team switch to a coordinated combat formation and encircle the enemy. An ambulance helicopter arrives to evacuate the injured soldier while auto-driven armoured vehicles come to reinforce – guided by devices on each soldier and antenna arrays nearby.

Or, imagine a street battle with a group of terrorists in a city. There is a power blackout and terrorists hide in an empty office building. A counterterrorism technician hacks into the building’s audio control system and collects high-sensitivity soundwaves using the microphones on surveillance cameras – the system is still running thanks to the devices’ low power consumption and long endurance.

China says it will fast-track 5G commercial licences amid push back on Huawei’s overseas expansion

After the acoustic data is sent back, artificial intelligence (AI) analysis determines the locations of the terrorists. A drone is called from nearby, enters through a window and fires a mini-gun at them.

These are not movie plots, but technologies already or about to be developed, as the internet of things – built on 5G and AI technologies – reshapes warfare.

“The 5G network and the internet of things enlarge and deepen the cognition of situations in the battlefield by several orders of magnitude and produce gigantic amounts of data, requiring AI to analyse and even issue commands,” said Dr Clark Shu, an AI and telecommunication researcher at the University of Electronic Science and Technology of China.

With the ability to carry much more data, much lower network latency (network response time) and energy consumption and much better stability than the previous generation of technologies, 5G is expected to transform digital communication.

Using 5G, data can be transmitted at up to 10 gigabytes per second, much faster than using a 4G network, and the latency is reduced to under a millisecond, or 1 per cent that of 4G.

Such features enhance connectivity in remote locations, connect sensors and robots, and will enable vehicles, traffic control, factories and construction to become more autonomous. In particular, 5G will enhance the connectivity of the internet of things (IoT).

2019 China tech look ahead: trade war likely to cast a shadow as AI, e-commerce, smartphone progress continues

“Internet of things involves close-range telecommunications technology to connect and exchange information between two devices, and 5G is the fastest data transmission method to realise it,” said Zhou Zhaoxiong, a senior engineer at China Mobile IoT Company, a subsidiary of China Mobile.

Military equipment embedded with communication devices can also form the internet of things, he added. The communication can take place from device to device, without satellites or early-warning planes, saving those limited resources for other uses and significantly lowering the cost of a military operation, according to a 2017 report in China Defence News, a mouthpiece of China’s People’s Liberation Army (PLA).

China has been one of the powerhouses in research and development of 5G technologies. Its telecoms operators have said they will begin to introduce commercial 5G networks from 2020, although Zhou said this would involve only regional pilot schemes because 5G devices are still quite expensive for mass commercial use.

US charges Chinese telecoms giant Huawei with conspiracy, money laundering

Last week, Huawei launched a chip that it claimed to be the world’s most powerful 5G modem.

Then came the US Justice Department’s 13-count indictment on Monday against the Chinese company, its affiliates and its chief financial officer Sabrina Meng Wanzhou, following the arrest of Meng in Canada on December 1 at the US’ request.

But questions over the 5G technology made by Huawei and other Chinese firms date back further. In 2012, the US House Intelligence Committee released a report alleging Chinese telecoms equipment makers posed a threat to national security because of their relationship with the Chinese government. China’s 2017 National Intelligence Law asks Chinese companies to cooperate for national intelligence purposes when necessary.

The US has lobbied its allies to ban Huawei from building their next generation of mobile phone networks, and countries such as Britain, Germany, Australia, New Zealand and Canada have either banned Huawei or are reviewing whether to do so.

Huawei’s founder Ren Zhengfei – Meng’s father – is a former PLA engineer, which has further fuelled questions in the West about Huawei’s ties to the Chinese army and government.

Huawei’s troubles grow in Europe as more countries follow the US in shunning it over security concerns

But Huawei executives have asked repeatedly, in vain, for evidence of “back doors” in its equipment. BIS, the German internet security watchdog, inspected Huawei labs in Germany and found no evidence, and The New York Times last week quoted American officials as saying that the case against the company had “no smoking gun – just a heightened concern about the firm’s rising technological dominance”.

Moves by the US and its allies to block Huawei from 5G networks on national security grounds were last month described as a “concerted strategy” by Kevin Allison, of US-headquartered political risk consultancy Eurasia Group, talking to US broadcaster CNBC.

A report last year to the White House by the US’ National Security Council called for action and strategy to “protect US technology leadership” and prevent China challenging US dominance in tech.

Song Zhongping, a Hong Kong-based military commentator, said China has commissioned research institutions and state-owned companies, not Huawei, for its military 5G development.

Huawei’s founder Ren Zhengfei breaks years of silence amid continued US attacks on Chinese tech giant

“For example, branches of the China Electronics Technology Group Corporation, which makes military radars and other electronic systems, are focused in this area,” said Song.

The US, too, has been investing in military use of 5G, while prototype 5G networks for civilian use have been launched in some cities.

In a recent interview with military technologies publication C4ISRNET, Brent Upson, a director at American aerospace and security company Lockheed Martin, predicted machine-to-machine communication, using information from several sources to form a unified picture of battlespaces, and AI-assisted decision-making would be among the trends in 2019.

US indictments against Huawei a step towards splitting the world’s telecoms industry in two

Todd Wieser, chief technology officer of the US Air Force’s Special Operations Command, has said 5G tech will enhance his forces’ mobile communications and geospatial functionality.

But commercial 5G networks are regarded by the US government as easy prey for foreign intelligence agents and hackers, and such concerns are heightened where a military network is subject to hacking and intrusion attempts by adversaries.

“The biggest disadvantage of a 5G network in the battlefield is the vulnerability to electromagnetic interference – and hacking and intrusion,” said Shu.

“The significant increase in sensors and data nodes means an increase of exposure, and an increased risk of being attacked.”



To: James Seagrove who wrote (145799)2/2/2019 7:53:07 PM
From: TobagoJack2 Recommendations

Recommended By
dvdw©
James Seagrove

  Respond to of 217651
 
nothing political

just a cast of thousands of usual suspects w/ good intentions and no blemish :0)

one should either fear hacking and surveillance by own authorities or by other authorities, and make a choice

very difficult choice

toronto.citynews.ca

Israeli cyberexpert detects China hack in Ottawa, warns against using Huawei 5G
by Mike Blanchfield, The Canadian Press

Posted Jan 31, 2019 4:26 pm EST


OTTAWA — A Chinese telecommunication company secretly diverted Canadian internet traffic to China, particularly from Rogers subscribers in the Ottawa area, says an Israeli cybersecurity specialist.

The 2016 incident involved the surreptitious rerouting of the internet data of Rogers customers in and around Canada’s capital by China Telecom, a state-owned internet service provider that has two legally operating “points of presence” on Canadian soil, said Yuval Shavitt, an electrical-engineering expert at Tel Aviv University.

Shavitt told The Canadian Press that the China Telecom example should serve as a caution to the Canadian government not to do business with another Chinese telecommunications giant: Huawei Technologies, which is vying to build Canada’s next-generation 5G wireless communications networks.

“It’s too dangerous to let them in,” Shavitt said. “You can just imagine how Chinese companies are co-operating with the Chinese government.”

The Trudeau government is still deciding whether Huawei will be permitted to supply equipment and services to Canadian companies seeking to build the networks expected to serve everything from smartphones to autonomous cars.

That has become a politically charged decision with massive geopolitical implications since Canada arrested Huawei’s chief financial officer last month at the request of the U.S. It sparked a diplomatic crisis with the People’s Republic that has seen the jailing of two Canadian men working in China, and a death sentence imposed on a third man previously convicted of drug charges.

Shavitt’s warning comes as the U.S. Justice Department this week revealed the scope of its fraud and theft case against Huawei’s Meng Wanzhou. On Monday, the department unsealed 13 criminal counts of conspiracy, fraud and obstruction against Meng, while her company’s U.S. branch was accused of stealing trade secrets and equipment from cellphone provider T-Mobile USA.

Huawei has denied that it co-operates with Chinese intelligence or ever would, saying that could be fatal to the company.

The 2016 Ottawa area incident that included Rogers was part of an attack in which Canadian internet data bound for South Korea was rerouted to China over a six-month period. The diversion of the South Korean data was first documented in a report last fall co-authored by Shavitt and Chris C. Demchak of the U.S. Naval War College.

The report described how China Telecom uses two points of presence in Canada and eight in the United States to take “information-rich” internet traffic crossing its network — part of the ordinary working of the internet, in which packets of data pass through numerous servers on the way to their destinations — and reroute it through China with no noticeable effect on customers.

China Telecom did not respond to a request for comment.

Rogers declined comment and referred the matter to the Public Safety Department.

Public Safety and Global Affairs Canada did not respond to requests for comment.

The Shavitt-Demchak report called internet points of presence the “perfect scenario for long-term espionage” because local alarm bells won’t be raised “about the long-term traffic detours.”

The Canada-South Korea diversion was discovered by a company Shavitt co-founded called BGProtect that monitors internet routing infrastructure and sells services to protect countries and corporations from internet hacks. He said he used some of his company’s data to write the academic paper with Demchak.

Shavitt described how hundreds of his company’s agents around the world monitor movements in the digital world. He said that could involve focusing on “a certain installation, an IP or server. We pick up locations around the world, and monitor the traffic and look for anomalies.

“In this case the anomaly was from Canada.”

In a followup email, Shavitt provided further details: “Our software agent was indeed at Ottawa, but the attack had affected the entire Rogers network (at least) and its customers in the entire region.”

Shavitt said his company’s monitoring of Canada “was not dense enough” at the time of the attack to assess its full scope.

In the case of national network like Rogers’ in a large country such as Canada, the attack might affect only a “portion of the network, (but) usually still quite large ones — it depends how routing is configured. For example in our case, it may affect only Ontario and Quebec, but not the western regions of Canada,” Shavitt explained.

“I should say that the effect of the hijack is not only on Rogers’s direct customers (home and businesses) but also smaller networks in the affected regions that depend on Rogers for transit.”

A hijack attack can be used in many ways, including for espionage by “extracting important information from communication,” said Shavitt.

The attack can also be part of what is known as man-in-the-middle attacks, he said.

A man-in-the-middle attack can neutralize an organization’s internet security measures because it involves the insertion of a “bad actor” between a sender and the desired recipient, says the Shavitt-Demchak report.

When the internet traffic is rerouted into an adversary’s hands, “the attacker can learn enough to impersonate trusted sources” and “can allow the malicious attacker to harvest passwords,” the report says.

“With those keys to the victim’s network in hand, attackers can distort, disconnect or destroy any part of the company’s network accessible from the internet, increasingly to include critical financial and physical systems and their backups.”

The Chinese government steadfastly denies engaging in cyberattacks.

In 2014, the federal government blamed a sophisticated state-sponsored Chinese entity for a breach that caused a shutdown of the National Research Council’s systems in Ottawa. China called that accusation reckless.

In 2016, the Canadian Security Intelligence Service, or CSIS, warned that China and Russia were targeting Canadian government officials and information systems as well as classified information and advanced technology.

Without naming any countries, David Vigneault, CSIS’s new director, said in a December speech that “hostile foreign intelligence services” were targeting the “corporate secrets” and “intellectual property” of Canadian companies.

Vigneault said those state actors posed a greater threat to national security than terrorists do.

“It’s not that the Chinese are bad, or doing bad things in the U.S.,” Shavitt noted. “I’m sure that the U.S. and Canada are trying to do the same also to China. It’s a spying game that everybody’s trying to play.”

Mike Blanchfield, The Canadian Press