About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

1 1 (March 14, 2023)

handle is hein.crs/govekwz0001 and id is 1 raw text is: Congressional Research Service
informing the legislative debate since 1914

0

Updated March 14, 2023
National Security Implications of Fifth Generation (5G)
Mobile Technologies

The fifth generation (5G) of mobile technologies will
increase the speed of data transfer and improve bandwidth
over existing fourth generation (4G) technologies, in turn
enabling new military and commercial applications. 5G
technologies are expected to support interconnected or
autonomous devices, such as smart homes, self-driving
vehicles, precision agriculture systems, industrial
machinery, and advanced robotics. 5G for the military
could additionally improve intelligence, surveillance, and
reconnaissance (ISR) systems and processing; enable new
methods of command and control (C2); and streamline
logistics systems for increased efficiency, among other
uses. As 5G technologies are developed and deployed,
Congress may consider policies for spectrum management
and national security, as well as implications for U.S.
military operations.
Spectrum     Managerent
5G technologies plan to use three segments of the
electromagnetic spectrum (the spectrum): high band (also
called millimeter wave, or MMW), which operates between
around 24 and 300 GHz; mid band, which operates between
1 GHz and 6 GHz; and low band, which operates below 1
GHz. Mid band and low band are often collectively referred
to as sub-6 (see Figure 1).
Figure I. 5G Proposed Spectrum
Source: https://media.defense.gov/20 19/Apr/03/2002109302/-I/-I/0/
DIB_5G_STUDY_04.03.19.PDF.
Millimeter waves allow faster data transfer rates, which
some telecommunications companies argue is required for
autonomous vehicles, virtual reality, and other data-
intensive applications like smart cities; however, MMW
travel comparatively short distances and can be absorbed by
rain or disrupted by physical objects such as buildings and
vehicles. As a result, 5G MMW technologies require
installing a higher number of cell sites-at much higher
cost and on a much slower deployment timeline than the
sub-6 approach. 5G deployment thus relies on MMW for
high-speed, high-bandwidth communications and on sub-6
waves for nationwide coverage.
Telecommunication companies around the world are
deploying 5G in different ways. Chinese

telecommunications companies are focusing on the less
expensive sub-6 approach, while some U.S.
telecommunication providers are focused on MMW
deployments and others on sub-6.
The Department of Defense (DOD), however, holds large
portions of the usable spectrum. Although DOD uses
certain MMW frequencies for high-profile military
applications such as Advanced Extremely High Frequency
satellites that provide assured global communications for
U.S. forces, it extensively uses sub-6 frequencies-leaving
less sub-6 availability in the United States than in other
countries. The Defense Innovation Board (DIB) advised
DOD to consider sharing sub-6 spectrum to facilitate the
build-out of 5G networks and the development of 5G
technologies used in the sub-6 band. While DOD has been
moving toward greater spectrum sharing, it has expressed
concern that sharing presents operational, interference, and
security issues for DOD users. As an alternative to
spectrum sharing, some analysts have argued that portions
of the sub-6 spectrum should be reserved for commercial
use. This would require DOD to relocate certain
applications to other parts of the spectrum. DOD has argued
that moving out of the 3.1-3.45 GHz band alone could cost
at least $120 billion and take decades.
National Security Concerns
According to a DIB assessment, China is the current leader
in sub-6 technologies and is likely to deploy the world's
first 5G wide-area network. Chinese companies, which
often receive government subsidies (e.g., subsidized land
for facilities, R&D grants), are therefore well-positioned as
global 5G suppliers. Huawei has signed contracts for the
construction of 5G infrastructure in around 30 countries,
including Iceland, Turkey, and Hungary.
Some experts are concerned that vulnerabilities in Chinese
equipment could be used to conduct cyberattacks or
military/industrial espionage. These experts claim
vulnerabilities were introduced through the poor business
practices of many Chinese companies. However, they note
that vulnerabilities could also be intentionally introduced
for malicious purposes. China's National Intelligence Law,
enacted in June 2017, declares that any organization and
citizen shall, in accordance with the law, support, provide
assistance, and cooperate in national intelligence work, and
guard the secrecy of any national intelligence work that
they are aware of. Some analysts interpret this law as
requiring Chinese companies to cooperate with intelligence
services, including compelling installation of backdoors to
provide private data to the government.

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Already a HeinOnline Subscriber?

profiles profiles most