China, the United States, and Next Generation Connectivity - 5th Generation Wireless Technology (5G), Internet of Things (IOT) Standards and Technology Development, Huawei and ZTE Security Controversy China, the United States, and Next Generation Connectivity - 5th Generation Wireless Technology (5G), Internet of Things (IOT) Standards and Technology Development, Huawei and ZTE Security Controversy

China, the United States, and Next Generation Connectivity - 5th Generation Wireless Technology (5G), Internet of Things (IOT) Standards and Technology Development, Huawei and ZTE Security Controversy

    • 8,49 €
    • 8,49 €

Publisher Description

This is an important report compilation of testimony at a 2018 hearing which compared and contrasted U.S. and Chinese pursuit of next generation connected devices and networks and the implications for U.S. economic competitiveness and national security. The hearing focused on U.S. and Chinese 5th generation wireless technology (5G) and Internet of Things standards and technology development, U.S. usage of Chinese Internet of Things technologies and 5G networks, and the ability of Chinese firms to collect and utilize data from U.S. consumers through Internet of Things technologies.

This compilation includes a reproduction of the 2019 Worldwide Threat Assessment of the U.S. Intelligence Community.

Panel I: Economic Implications of U.S. and Chinese 5G and IoT Standards and Technology Development * 1. Chuck Benson, Assistant Director for IT in Facilities Services, University of Washington * 2. Doug Brake, Director of Telecommunications Policy, ITIF * Panel II: U.S. and Chinese Policies to Address 5G, IoT, and Data Privacy and Security Challenges * 3. Jennifer Bisceglie, President and CEO, Interos Solutions * 4. Anthony Ferrante, Senior Managing Director, FTI Consulting * 5. James Mulvenon, Ph.D., Special Programs Division, SOS International LLC * 6. Dr. Heath Tarbert, Assistant Secretary for International Markets and Investment Policy, U.S. Department of Treasury.

The hearing examined China's pursuit of next generation connected devices, or the Internet of Things, future networks, and the implications for U.S. competitiveness, national security, and data privacy. We are on the verge of an interconnected world with near real-time, high capacity networks that will affect industry, economies, society, the military and warfare. The Internet of Things means the connection of computing devices embedded in everyday objects, enabling them to send and receive data as well as responding to commands. The capacity to link devices, control them and have them communicate with each other applies to industrial control systems and connected military weapon systems. However, there is some danger involved because the technology of these inter-connected things can be hacked, monitored, manipulated, or otherwise exploited by malicious actors. At the same time, on the Internet, the United States and China are competing to lead the transition to a 5th generation wireless technology, or a "network of networks," that will deliver higher capacity bandwidth more quickly than ever before to increase the capacity to use or manage this Internet of Things.

The Chinese government has dedicated enormous resources to attaining leadership in these technologies and to penetrating the U.S. market. This hearing explored the security risks of the increasing integration of Chinese-made or designed devices and 5th Generation cellular network equipment into the United States. The hearing also will explore how the integration of Chinese technology into U.S. systems could provide means to conduct espionage or sabotage. The panelists also explored what role the United States government should play in securing its own networks and to protect the Internet of Things, how to maintain U.S. global competitiveness, and ways to protect U.S. data privacy and security.

GENRE
History
RELEASED
2019
14 July
LANGUAGE
EN
English
LENGTH
277
Pages
PUBLISHER
Progressive Management
SIZE
621.9
KB

More Books by Progressive Management

Baltic COIN: Using a Counterinsurgency Model to Counter Russian Hybrid Warfare in the Baltics - NATO Response to Putin's Aggression, Protection for Eastern Europe, Estonia, Latvia and Lithuania Baltic COIN: Using a Counterinsurgency Model to Counter Russian Hybrid Warfare in the Baltics - NATO Response to Putin's Aggression, Protection for Eastern Europe, Estonia, Latvia and Lithuania
2017
Maskirovka 2.0: Hybrid Threat, Hybrid Response - Putin and Russian Assaults on Georgia, Ukraine and Syria, Advancing Regional Hegemony with Proxy Forces, Outline of a Campaign to Combat Aggression Maskirovka 2.0: Hybrid Threat, Hybrid Response - Putin and Russian Assaults on Georgia, Ukraine and Syria, Advancing Regional Hegemony with Proxy Forces, Outline of a Campaign to Combat Aggression
2017
Deliberate Force: A Case Study in Effective Air Campaigning - Final Report of the Air University Balkans Air Campaign Study - Demise of Yugoslavia, Destruction of Bosnia, Tactics, Aircraft, Weapons Deliberate Force: A Case Study in Effective Air Campaigning - Final Report of the Air University Balkans Air Campaign Study - Demise of Yugoslavia, Destruction of Bosnia, Tactics, Aircraft, Weapons
2016
Hybrid Warfare: Israel-Hezbollah War, World War II Eastern Front, American Experience in Vietnam, Operation Iraqi Freedom, Operational Approaches to Hybrid Warfare Hybrid Warfare: Israel-Hezbollah War, World War II Eastern Front, American Experience in Vietnam, Operation Iraqi Freedom, Operational Approaches to Hybrid Warfare
2015
Certain Victory: The United States Army in the Gulf War - General Scales Tells the Story of Desert Shield and Desert Storm, Liberating Kuwait from Iraq - Plotting the Campaign, The Great Wheel Certain Victory: The United States Army in the Gulf War - General Scales Tells the Story of Desert Shield and Desert Storm, Liberating Kuwait from Iraq - Plotting the Campaign, The Great Wheel
2015
Back to Basics: A Study of the Second Lebanon War and Operation CAST LEAD - Israeli IDF Incursions into Lebanon and Gaza 2006 and 2008 Against Hezbollah and Hamas, Tactics, Hard Lessons Learned Back to Basics: A Study of the Second Lebanon War and Operation CAST LEAD - Israeli IDF Incursions into Lebanon and Gaza 2006 and 2008 Against Hezbollah and Hamas, Tactics, Hard Lessons Learned
2014