SPECIAL OPERATIONS IN A 5G WORLD: CAN WE STILL HIDE IN THE SHADOWS?
Authors
Jones, Mason P.
McCaslin, Erica L.
Advisors
Blanken, Leo J.
Second Readers
Davis, Justin P.
Subjects
5G
Special Operations Forces
signature management
operational security
deception
emerging technology
advertising technology
technical surveillance
China
Huawei
Special Operations Forces
signature management
operational security
deception
emerging technology
advertising technology
technical surveillance
China
Huawei
Date of Issue
2020-06
Date
Publisher
Monterey, CA; Naval Postgraduate School
Language
Abstract
The arrival of “fifth generation” (5G) telecommunications technology is poised to fundamentally alter societies in numerous ways. Changes to telecommunications technologies and infrastructure will enable 5G networks to integrate information and collaborate at unprecedented levels, enabling leaps in artificial intelligence, human-machine teaming, and other data-based technologies. However, the thrill of emerging technologies and associated capabilities comes at a cost in terms of security vulnerabilities. Just as 5G will alter our daily lives, it will also modify our approach to Special Operations Forces (SOF) missions; bolstered by artificial intelligence, there is great potential for an adversary to aggregate and exploit data on a massive scale. Using qualitative evidence and deducing operational implications, this thesis develops a holistic framework of 5G networks, explores how this changing technological reality impacts signature management, and identifies the threats and opportunities within this domain. Ultimately, special operations forces will be forced to operate within high-risk telecommunications network environments, threatening their ability to sufficiently maintain operational security and manage their signatures. Near-term recommendations—data reduction and protection, force education, and network analysis during mission planning—and long-term research efforts—trusted communications, signature reduction, and deception techniques—may help mitigate these risks.
Type
Thesis
Description
Series/Report No
Department
Defense Analysis (DA)
Defense Analysis (DA)
Organization
Identifiers
NPS Report Number
Sponsors
Asymmetric Warfare Group
Funding
Format
Citation
Distribution Statement
Approved for public release. distribution is unlimited
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
