• Tackling 5G-Based Mobile, Cloud Computing Security Concerns

    The sheer number and wide variety of devices connected via 5G mobile networks demand differentiated security solutions. SMU Professor Robert Deng points to the need to ask the right questions, and a multiparty approach to create effective solutions.

  • U.K.: Tory MPs Rebel against Government’s Huawei’s Plan

    The U.K. government has launched an all-hands-on-deck effort to contain a growing rebellion by Tory MPs who want to ban the use of Huawei’s equipment in the U.K. 5G telecoms network, arguing that allowing the Chinese company, with its close ties to China’s intelligence and military establishments, any access to the country’s communication infrastructure would be like inviting a fox to guard the hen house.

  • Novel Cybersecurity Approach to Protect Army Systems

    Networked devices and infrastructure are becoming increasingly complex, making it nearly impossible to verify an entire system, and new attacks are continuously being developed. Researchers have identified an approach to network security that will enhance the effectiveness and timeliness of protection against adversarial intrusion and evasion strategies.

  • Custom Circuits to Make IoT Systems 14,000 Times Harder to Crack than Current Tech

    The “internet of things” (IoT) allows devices — kitchen appliances, security systems, wearable technologies and many other applications — to communicate with each other through networks. With the world on the verge of adopting them by the billions, the best possible security is paramount. Engineers have one-upped their own technique to increase security for the “internet of things.” In truth, their upping is far greater than one.

  • Tool Identifies Source of Errors Caused by Software Updates

    We’ve all shared the frustration — software updates that are intended to make our applications run faster inadvertently end up doing just the opposite. These bugs, dubbed in the computer science field as performance regressions, are time-consuming to fix since locating software errors normally requires substantial human intervention. Researchers and computer scientists have designed a tool to identify the source of errors caused by software updates.

  • Britain Knows It’s Selling Out Its National Security to Huawei

    Allowing Chinese telecom company Huawei access to a country’s 5G infrastructure makes that country vulnerable to espionage, sabotage, and blackmail. Yet, last Tuesday, in defiance of sustained U.S. pressure, Britain said it would allow Huawei to be involved in rolling out the U.K. 5G mobile network. “Upon closer inspection, the British government’s reasoning, and the basic assumptions underlying it, are eerily lightweight and sometimes openly self-contradictory.” Thorsten Benner writes. “London’s justification for cooperating with the Chinese telecommunications company is riddled with obvious contradictions.”

  • Huawei and 5G: U.K. Had Little Choice but Say Yes to Chinese – Here’s Why

    For the time being, the British government can hardly be enjoying the fallout from its Huawei decision. To date, much focus has been on the confidentiality of communications over mobile networks, and risks of spying. A bigger issue is the need to keep the mobile phone network running. We are in an era where everything from Uber and Deliveroo to most credit card machines cannot function without it. The nightmare scenario is a hostile state-affiliated actor shutting down or damaging the mobile networks. It may have effectively been impossible for the U.K. to say no to Huawei, but the current compromise is far from ideal.

  • Lawmakers Raising Alarm over Huawei’s Risk to National Security – in the U.S. and Abroad

    Huawei is heavily subsidized by the Chinese government, so its products are much cheaper than the equipment produced by the company’s Western competitors – thus allowing the Chinese company to insinuate itself into a the communication infrastructure of countries where the Chinese intelligence agencies are interested in augmenting their information-gathering capabilities. U.S. lawmakers are angry at the Pentagon’s objections to Commerce Department regulations which would have made it more difficult for U.S. companies to sell to Huawei. “Huawei is an arm of the Chinese Communist Party and should be treated as such,” the senators write to the secretary of defense. “It is difficult to imagine that, at the height of the Cold War, the Department of Defense would condone American companies contracting with KGB subsidiaries because Moscow offered a discount.”

  • Closing a Critical Gap in Cybersecurity

    Last year, following the rising threats in cyberspace, Congress established the U.S. first civilian cybersecurity agency—the Cybersecurity and Infrastructure Security Agency (CISA). Christopher Krebs, who serves as the first director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), writes that “Unfortunately, too often we come across cybersecurity vulnerabilities sitting on the public internet and are unable to act because we cannot identify the owner of the vulnerable system.”

  • Telefonica Deutschland Chooses Huawei to Build Its German 5G Network

    Rebuffing U.S. pressure, German mobile provider Telefonica Deutschland announced Wednesday that it has chosen Finland’s Nokia and China’s Huawei to build its 5G network in Germany, the company. Huawei is a global leader in constructing equipment and infrastructure for ultra-high-speed 5G data networks, but the intelligence services of leading Western countries have argue that Huawei is a security threat because of its close ties with the Chinese military and intelligence establishments. 

  • Is It Time for a U.S. Cyber Academy?

    Cybersecurity is a critical threat to national security. American is one of the most technologically advanced, and technologically dependent, nations on Earth. Gregory Conti writes that our adversaries know and exploit this. “To change the tide, we need to create a service academy dedicated to cybersecurity and cyber operations. This idea isn’t new, but the need is critical,” he writes.

  • FCC Bans Use of Federal Funds in Purchases of Chinese Telecom

    The Federal Communications Commission (FCC) on 22 November blocked U.S. telecommunications providers from using an $8.5 billion subsidy fund – the FCC’s Universal Service Fund (USF) — to buy Chinese-made telecommunications gear deemed a national security threat to critical infrastructure. The U.S. said that given Huawei and ZTE’s close relationship and legal obligations to the Chinese government, their gear poses a threat to telecommunications critical infrastructure, as well as to national security.

  • The Case That Could Hand the Future to China

    What would the future look like if China leads 5G technology? We should contemplate this question because, as Mercy Kuo writes, fifth-generation cellular network technology, or 5G, will transform our daily lives with such inventions as autonomous-driving vehicles, artificial intelligence, the Internet of Things, and smart cities. If we want to maintain U.S. technology leadership and protect our values, we should be clear-eyed about the perilous consequences that could come with losing our unique lead.”

  • Secure Data Transmission with Ultrasound

    Due to the Internet of Things (IoT), an increasing number of devices have learned to communicate with each other. Ultrasound communication is an entirely new method for data exchange between IoT devices and mobile phones. Researchers have now developed a first open communication protocol including an open-source development kit for ultrasound communication which makes near-field communication safer.

  • UAH to Offer H4Di Cybersecurity Course

    The University of Alabama in Huntsville (UAH) says it will be the first in the state to offer the Hacking for Defense (H4Di) cybersecurity class beginning in spring semester 2020. H4Di teaches students to work with the defense and intelligence communities to rapidly address the nation’s emerging threats and security challenges.