5G cell tower

New Government Strategy for 5G Security Sets Stage for Domestic Rollout

Franco Zaro of Valid breaks down new government efforts to establish a 5G security strategy and public paranoia about the wireless infrastructure.

Amid the constant stream of coronavirus updates, you may have missed some important developments in fifth-generation wireless infrastructure last month.

On March 23, President Donald Trump signed The Secure 5G and Beyond Act of 2020 – legislation which requires his administration to produce a 5G security strategy within 180 days of the law’s enactment.

That same week, the White House published the “National Strategy to Secure 5G of the United States,” a 7-page policy document addressing the administration’s plans to facilitate the domestic deployment of 5G, assess security risks and promote global development of the technology.

To understand more about government efforts to ensure secure 5G development and what it might mean for the burgeoning number of at-home workers during the COVID-19 pandemic, Security Today spoke with Franco Zaro, the director of business development for global technology provider Valid. Zaro also discussed public paranoia about the technology that has grown during the coronavirus crisis.

What is the importance of the new Secure 5G and Beyond Act? Why should Americans care about its enactment?

Although this enactment is about two years too late – as technology often evolves faster than political action – the 5G and Beyond Act will define how the U.S. builds the framework to implement the powerful omnipresent communication multichannel that is 5G. It will also lead how the U.S. implements upcoming technologies that will change the way we interact as a social ecosystem composed of both humans and machines.

What impact do you anticipate the law will have on the development and integration of 5G into American lives?

I believe that as it stands, having a bipartisan commission supported by leaders of different sectors (security, technology, science, transportation, etc.) will establish diverse participation, which will ensure 5G’s impact on American lives is implemented in a controlled manner. If both Republican and Democratic leaders are in agreement on the law, I think many misconceptions about the use of 5G can be changed. Particularly, American’s understanding of privacy and how 5G will create security while enabling systems to use Identity as the main entity.

How does the implementation of 5G affect the growing number of at-home workers and their use of IoT devices?

In the past five weeks, we have experienced an overwhelming necessity from several industries for a system that allows them to remotely monitor their production chain. Companies that have been resistant to change in the past are being forced to leave their comfort and adapt their way of production. As a result, these companies are realizing that big corporate offices are no longer a necessity as a remote office is far less expensive to maintain, along with several additional benefits.

According to BuzzFeed News, there has been a growing paranoia about 5G and even a conspiracy theory that the technology could "secretly be causing the COVID-19 outbreak." How do cybersecurity and technology experts combat the general public's misconceptions about 5G?

We are facing ‘times of change’ at many levels. Consider: new technology will be the driver of a connected and integrated world, giving people the ability to receive real-time data to support decisions or statements and the possibility to be efficient with our energy.

With the integration of 5G, I assume some areas of our society may look to keep the status quo in an effort to protect their own interests, and ‘fear of change’ will always generate paranoia or resistance. The same initial resistance happened with every step of the industrial revolution with steamers, mass production lines, automation and now with digital convergence. However, I am positive that our natural capacity to adapt as a society will prevail as it always has.

What are the security measures that you believe must be put in place for 5G's development and implementation? What policies do you hope government and private sector experts will keep in mind throughout that process?

Secure access to data is the main concern for how new technologies such as blockchain or biometrics will be able to help us. That being said, global guidelines are trying to explore the concept of privacy to ensure it is taken into serious consideration. It will be important for the U.S. to adopt an education system that ensures future generations are equipped to make the most of this new world and not dependent on more visionary countries – which is what is happening right now.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3