FCC to Focus Efforts on 5G, Software and Cloud Service Vulnerabilities

FCC to Focus Efforts on 5G, Software and Cloud Service Vulnerabilities

Former Chairman of the Federal Communications Commission (FCC), Ajit Pai, resigned on the day of President Biden’s inauguration. He was replaced by Acting Chairwoman Jessica Rosenworcel, who last month delivered her first major action by fining Texas based telemarketers a record $225 million.

Last Thursday (April 15th), Rosenworcel made a statement on future priorities by reestablishing the Communications, Security, Reliability, and Interoperability Council (CSRIC) with a focus on 5g networks and software and cloud services vulnerabilities.

“I am committed to working with our federal partners and the private sector to increase the security and resiliency of our nation’s communications networks,” she said in a statement. “That is why I am refocusing and revitalizing the FCC’s Communications, Security, Reliability, and Interoperability Council for the challenges of today and tomorrow. The damage from recent supply chain attacks, like the SolarWinds software breach, demonstrates our need for a coordinated, multifaceted, and strategic approach to protecting our networks from all threats.”

CSRIC provides recommendations to the Commission on how to improve the security, reliability, and interoperability of the nation’s communications systems.

5G is the next generation of mobile communications, and mobile phone companies began to deploy it in 2019. It has been predicted that there will be more than 1.7 billion subscribers by 2025, and that it will eventually achieve speeds of up to 10 gigabits per second. 

One inevitable effect of this increased bandwidth is that it will attract vast amounts of data onto the airwaves – both commercial data to be shared between distributed offices and IoT-collected data.

But there are huge concerns over the security of 5G. Politically, those concerns focused on Huawei and its 5G equipment – but the security issues are more systemic. 5G is not replacing 4G wholesale, but is being built on top of 4G. This means that 5G is likely to be susceptible to all the current security vulnerabilities found in 4G; and in some cases, even those found in 2G and 3G.

Related: 5G Security Flaw Allows Data Access, DoS Attacks

Related: 5G Security Risk vs. Reward

Related: Vulnerabilities in Standalone 5G Networks Expose Users to Attacks

Related: GTP Vulnerabilities Expose 4G/5G Networks to High-Impact Attacks

picture 131

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Previous Columns by Kevin Townsend:
tag iconTags:

Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here