The 5G Supply Chain Blind Spot: A more concerted effort to assess risk from the services supplied by our adversaries is required
Winning the worldwide “race to 5G” is a top priority for the United States. As the global competition unfolds, we have continued to hear about the technological and economic benefits associated with leadership in the wireless domain. Earlier this year, CTIA, a trade association representing the wireless communications industry, released a report that said, “America’s telecommunications operators plan to invest $275 billion to deploy 5G networks, creating 3 million new jobs and adding $500 billion to our economy.” Even though the benefits are undeniable, the U.S. has not relented on the critical security risks that must also be accounted for prior to large-scale nationwide investments in 5G infrastructure.
Even though the US Secretary of Energy has the authority to ban nuclear tech vendors that “present a significant supply chain risk,” the Energy Department has not blacklisted a single risky vendor since it was granted this authority by Congress in 2013. An audit by the Government Accountability Office (GAO)
The Department of Defense is establishing a new approach they expect their contractors, and sub-contractors to leverage. This is meant to help reduce risk and mitigate many challenges observed in implementing existing security/compliance regulations in the defense industrial base. Our review of this approach leaves us optimistic that this new approach is a positive change. Here is what you need to know.
It is a truism that every society is only a few meals away from revolution, proven not for the first time when high food prices initiated the Arab Spring, and yet food security is a woefully neglected national security concern. America lacks a national food policy, even though we are headed towards a crisis.
Studies have uncovered that several individuals used front organizations to purchase drones and equipment in Western Europe for shipment to ISIS. In one instance, two Bangladeshi brothers used their business activities in the UK, Bangladesh, Spain, Australia, the US, and Denmark to supply IT services and drones to ISIS. Elsewhere,
U.S. intelligence officials have warned of increased attempts by hackers to exploit supply chain vulnerabilities. “Hackers are infecting a wide range of users through official software distribution channels…users do not expect malicious code to be introduced by updated from trusted software vendors,” said one intel community CIO. A recent report
A new bipartisan bill would require federal agencies to conduct more extensive and thorough background checks on contractors’ and suppliers’ cyber security supply chains. The current system is described as “extremely complex,” but “ill-equipped” to deal with twice and three-times removed security risks like those in the recent Kaspersky and