COMMENTARY: Nate Snyder – “Drastic Action” Needed to Secure 5G Networks

Speaking on The Hill TV’s Rising on May 20, 2019, former counterintelligence official Nate Snyder stressed the urgency of addressing the security risks associated with emerging 5G technology. While the promise of faster speeds sparks excitement among consumers, it also prompts privacy concerns as well as consideration of how bad actors may exploit these gains. Snyder notes that malicious actors will always search for vulnerabilities within our systems. In this case, the greatest vulnerability stems from the debated presence of Chinese-owned and -operated Huawei components in our 5G infrastructure. In this scenario, US intelligence agencies face a serious risk of Read More

PERSPECTIVE: 5G risk is about more than simply securing competitive advantage

This piece, by Nate Snyder, originally appeared in The Hill on May 17, 2019.

The dawning of 5G network capabilities will revolutionize telecommunications and online networks. Data transport speeds will increase to 10 times faster than what they are with 4G. As countries across the globe discover and develop new 5G innovations, so too will terrorist organizations, non-state actors, and lone offenders. If there is a new breakthrough with the public at-large, it will also be leveraged by bad-actors; they will develop and discover their own insidious innovations and exploitations.

While working on counterterrorism efforts at the Department of Homeland … Read More

PERSPECTIVE: Post-9/11 Counterterrorism Is Right Model for Infrastructure Cybersecurity

This piece, by Gen. Francis X. Taylor, originally appeared on Homeland Security Today on April 2, 2019.

Nearly 18 years ago, we were blindsided when terrorists attacked the World Trade Center in New York City on Sept. 11, 2001. We now know that if there had been better information sharing between U.S. law enforcement and intelligence organizations that we may have been able to foil the plot. In the years since that devastating attack, the U.S. national security establishment has revamped its approach to information sharing for the purpose of counterterrorism. That new approach involves the systematic sharing of threat … Read More