Former Chairman of the Federal Communications Commission (FCC), Ajit Pai, resigned on the day of President Biden’s inauguration. He was replaced by Acting Chairwoman Jessica Rosenworcel, who last month delivered her first major action by fining Texas based telemarketers a record $225 million.
Last Thursday (April 15th), Rosenworcel made a statement on future priorities by reestablishing the Communications, Security, Reliability, and Interoperability Council (CSRIC) with a focus on 5g networks and software and cloud services vulnerabilities.
“I am committed to working with our federal partners and the private sector to increase the security and resiliency of our nation’s communications networks,” she said in a statement. “That is why I am refocusing and revitalizing the FCC’s Communications, Security, Reliability, and Interoperability Council for the challenges of today and tomorrow. The damage from recent supply chain attacks, like the SolarWinds software breach, demonstrates our need for a coordinated, multifaceted, and strategic approach to protecting our networks from all threats.”
CSRIC provides recommendations to the Commission on how to improve the security, reliability, and interoperability of the nation’s communications systems.
5G is the next generation of mobile communications, and mobile phone companies began to deploy it in 2019. It has been predicted that there will be more than 1.7 billion subscribers by 2025, and that it will eventually achieve speeds of up to 10 gigabits per second.
One inevitable effect of this increased bandwidth is that it will attract vast amounts of data onto the airwaves – both commercial data to be shared between distributed offices and IoT-collected data.
But there are huge concerns over the security of 5G. Politically, those concerns focused on Huawei and its 5G equipment – but the security issues are more systemic. 5G is not replacing 4G wholesale, but is being built on top of 4G. This means that 5G is likely to be susceptible to all the current security vulnerabilities found in 4G; and in some cases, even those found in 2G and 3G.
Related: 5G Security Risk vs. Reward