About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

1 1 (June 4, 2021)

handle is hein.crs/govednw0001 and id is 1 raw text is: ssionst- Sesesvh

Updated June 4, 2021
National Security Implications of Fifth Generation (5G)
Mobile Technologies

The fifth generation (5G) of mobile technologies will
increase the speed of data transfer andimprove bandwidth
over existing fourth generation (4G) technologies, in turn
enabling new military and commercial applications. 5G
technologies are expectedto support interconnectedor
autonomous devices. such as smart homes. self-driving
vehicles, precision agriculture systems, industrial
machinery, and advancedrobotics. 5Gfor the military
could additionally improve intelligence, surveillance, and
reconnaissance (TSR) systems and nrocessing: enable new
methods of command and control (C2); and streamline
logistics systems for increased efficiency, among other
uses. As 5Gtechnoloaies are develoned and deployed.
Con res s may consider nolicies for snectrummana ement
and national security, as well as implications for U.S.
military operations.
Spectrum Management
5G technologies plan to use three segments of the
electromagnetic spectrum(the spectrum): high band (also
called millimeter wave, or MMW), which operates between
around 24 and 300 GHz; mid band, which operates between
1 GHz and 6 GHz; and low band, which operates below 1
GHz. Mid band and low band are often collectively referired
to as sub-6 (see Figure 1).
Figure 1. SG Proposed Spectrum
Source: https://media.defense.gov/201 9/Apr/03/20021 09302f-I/-1/0/
DI B_5G_STU DY_04.0 3.19.PDF.
Millimeter waves allow faster data transfer rates, which
some telecommunications companies argue is required for
autonomous vehicles, virtualreality, and otherdata-
intensive applications like smart cities; however, MMW
travel comparatively shortdistances andcanbe absoibedby
rain or disrupted by physical objects such as buildings and
vehicles. As a result, 5GMMW technologies require
installing a higher number ofcell sites-atmuch higher
cost and on a much slower deployment timeline than the
sub-6 approach. 5Gdeployment thus relies on MMW for
high-speed, high-bandwidth communications andon sub-6
waves for nationwide coverage.
Telecommunication companies around the world are
deploying 5G in different ways. Chinese

telecommunications companies are focusing on the less
expensive sub-6 approach, while some U.S.
telecommunication providers are focused on MMW
deployments and others on sub-6.
The Department of Defense (DOD), however, holds large
portions of the usable spectrum. Although DOD uses
certain MMW frequencies for high-profile military
applications such as Adv anced Extremely High Frequency
satellites that provide assured global communications for
U.S. forces, it extensively uses sub-6 frequencies-leaving
less sub-6 availability in the United States thanin other
countries. The Defense Innovation Board (DIB) advised
DOD to consider sharing sub-6 spectrumto facilitate the
build-out of 5G networks and the development of5G
technologies used in the sub-6 band. While DODhas been
moving toward greater spectrumsharing, it has expressed
concern that sharing presents operational, interference, and
security is sues for DOD users. As an alternative to
spectrumsharing, some analysts have argued that portions
of the sub-6 spectrumshould be reserved for commercial
use. This would require DOD to relocate certain
applications to other parts of the spectrum. The DIB
estimates this approach would take around 10 years to
complete, as opposedto 5 years for spectrumsharing.
National Security Concerns
Accordingto a DIB assessment, China is the currentleader
in sub-6 technologies and is likely to deploy the world's
first 5G wide-area network. Chinese companies, which
often receive government subsidies (e.g., subsidized land
for facilities, R&D grants), are therefore well-positioned as
global5G suppliers. Huaweihas signed contracts forthe
constructionof5G infrastructure in around 30 countries,
including Iceland, Turkey, and the United Kingdom.
Some experts are concerned that vulnerabilities in Chinese
equipment could be used to conduct cyberattacks or
military/industrial espionage. These experts claim
vulnerabilities were introduced through the poorbusiness
practices of many Chinese companies. However, they note
that vulnerabilities could also be intentionally introduced
for malicious purposes. China's National IntelligenceLaw,
enacted in June 2017, declares thatany organization and
citizen shall, in accordance with the law, support, provide
assistance, and cooperate in national intelligence work, and
guard the secrecy of any nationalintelligence workthat
they are aware of. Some analysts interpret this law as
requiring Chinese companies to cooperatewith intelligence
services, including compelling installationof backdoors to
provide private data to the government.

https://crsrepc

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Already a HeinOnline Subscriber?

profiles profiles most