The format of the next-generation cellular networks, which is commonly known as 5G, is considered by a vast majority of experts as one of the “key technologies in the decades to come.” It is seen as a major element in ensuring the leading positions of a country at a new stage of the race for the most favorable national development status. What are the political features of this phase of technology rivalry?
The International Telecommunication Union (ITU) plans to approve the final version of the 5G standard by early next year. However, experts throughout the globe have been developing the “general principles and properties” of the fifth-generation cellular communication technologies for more than five years. The current fourth-generation technology guarantees maximum data transfer rate at about 150 Mbit/s. 5G promises speeds of more than 1 Gbit / s. By the middle of this year, “China, South Korea, Japan, and most EU countries had chosen the frequency spectrum that will be used in fifth-generation networks.” A heated debate has been under way in the United States, which has already held several frequency auctions for 5G .According to Deputy Prime Minister Maxim Akimov, who oversees the development of digital technologies in the Russian Federation, the launch of 5G is “a matter of survival if we do not want to lose technological leadership”.
Experts have no doubt that the fifth generation mobile networks will lead to “drastic changes” in many areas of life. While the present-day cellular communication standards are designed to exchange voice traffic and exchanges between terminal communication devices, the 5G technology is intended to create an environment in which billions of different devices interact with each other in real time. Moreover, the speed and reliability of connection should boost many times. The 5G environment should become a kind of communicative digital “ocean” into which an overwhelming majority of people and economic entities will plunge in the coming decades. This will fundamentally change the industry, global supply chains, defense tecnology, agriculture, transport, medicine, approaches to managing national infrastructure, and in general, the quality of life of billions of people, by becoming part and parcel of everyday life.
One of the most promising and at the same time, conflicting areas, which will, undoubtedly, get good impetus following the introduction of 5G, will be the so-called “Internet of Things”. Microchips will be installed in almost all industrial and consumer products, transmitting all kinds of information and capable of receiving control commands from the outside. Critics fear that the world is moving in the direction of “surveillance capitalism”. The government and business are to address many issues, The Economist points out, including digital ownership, big data, surveillance, competition monitoring, and security. The standards of receiving, transmitting, processing and storing data promise to become a battlefield of both private companies and government organizations . Those who will control their development and implementation will enjoy significant, if not crucial, advantages.
“When an invention becomes part of infrastructure, it also becomes part of political relations and undergoes both engineering and political changes”. Therefore, the main political battles are currently unfolding over the choice of frequency bands for building 5G networks, and over the suppliers. Pessimists, including in Russia, fear that, in case of the worst scenario, the priorities of maintaining sovereignty and security may lead to further fragmentation of not only the Internet, but also the cellular communications space. Differences in the frequency bands used for the development of 5G networks may cause conflicts between telecom operators and refusals to conclude agreements on international roaming. According to optimists, in the absence of universally approved 5G standards, manufacturers of client equipment, from terminals to smart phones, are forced to envisage the possibility of operating in the widest possible frequency range.
At present, the observer attention is focused on two conflicting approaches to the implementation of 5G technologies, the American one, on the one hand, and the Chinese one, on the other. US President Donald Trump regularly makes high-profile statements about the need to ensure America’s top position in promoting 5G technologies. Trump has come out strongly against the purchase of Chinese-made 5G technologies by the United States. Washington is urging other countries to refrain from doing so as well. Otherwise, it said it may wrap up cooperation with its close allies in the field of telecommunications, including the exchange of intelligence data. Given the situation, the US government agencies that deal with technology development have, on the one hand, already managed to distribute the bulk of frequency modulations for the introduction of 5G, compared to other countries. On the other hand, Leonid Kovachich of the Carnegie Moscow Center says, “the United States is working to create networks in the ultra-high frequency range.” Such frequencies – above 6 GHz, provide “the most tangible capacity growth against the existing ones.” However, due to specific technological characteristics, they require an extremely high density of transceiver infrastructure. Thus, America has picked the most expensive option, which, according to critics, including specialists from the US Federal Communications Commission (FCC), is “extremely prodigal”. In addition, this approach “will further accentuate the technological and, as a result, social gap between large cities and sparsely populated regions in the United States”, and will also significantly weaken the ability of American cellular manufacturers and mobile operators to successfully compete with China in other countries of the world.
China’s authorities have been trying to follow major global trends, including the choice of frequencies for 5G. Meanwhile, as experts at Oxford Information Labs claim, China is operating in several areas at once, for the purpose of at least significantly downsizing the competitive edge of Western companies in implementing 5G projects. The Chinese companies are stimulated by the fact that they already control “more than a third of all 5G patents in the world” and also a fairly limited number of potential developers and manufacturers of 5G technology. The West suspects official Beijing of striving to create a de facto corporate-technological “vertical”, with non-governmental organizations pursuing a policywhich is determined by the country’s political and military leadership. What speaks of such a policy is the pragmatic readiness of the Chinese authorities to provide substantial government loans and subsidies for an early launch of domestically developed technologies, including abroad, through resorting to political, diplomatic, financial and economic influence amidst the international community.
Amid the growing confrontation between the United States and China, European countries voice different views. The German government, Die Zeit wrote in November, still expresses its readiness to “use the key technology of the coming decades – data transmission through the new 5G standard – using the technology of the Chinese company Huawei.” However, according to French President Emmanuel Macron, such an approach “is naive.” Macron is convinced that the infrastructure of the future, which is represented by 5G, should consolidate the sovereignty of Europe, not weaken it. What is meant is data security, without which, Europeans say, it makes no sense to talk about security policy asn such. In his opinion, “it is necessary to abandon” the Chinese-manufactured technologies “in favor of European analogues”.
Russia is balancing between fears of alarmists over the “cumbersome nature” of regulators and controllers that “jeopardize” the country’s technological development under the pretext of concern “for national security”, on the one hand, and on the other, the belief of optimists who remind them that the 4G and LTE standards of cellular communication were introduced in a similarly protracted and “bureaucratic” way. A number of representatives of the Russian telecommunications industry have expressed concern that “transition to unconventional frequencies or even an isolated Russian 5G system will delay the creation of modern networks for 5-7 years”. Their opponents are confident that domestic operators will need a few more years to launch 5G networks that cover vast areas. “There are no economic scenarios for 5G yet, no one in the world knows how to earn money on such networks, the existing networks all but prove this in practice. It makes no sense to strive to launch 5G networks at any cost. Just as there is no need to clear the frequencies now – nobody will use them ”.
Whatever the case, the undisguised attempts to halt the development of Chinese high-tech companies or even ruin them which have been made by the United States in recent years “have demonstrated to most countries that independence in IT technology is crucial.” A possible scenario envisages prohibition or restriction of services, products or services provided by American companies in other countries; or at least in such a vital sector as public procurement. For many states it becomes critical to create and develop the domestic IT sector, IT services and software. All this may culminate in the “process of disintegration” of the global IT market, the division of countries into blocks and coalitions focused on “their own” manufacturers of software and their own technological standards.
The problem is to ensure sovereignty without having to face technological or informational isolation. “Information isolationism in the era of digital communication is usually a characteristic of rogue states.” While easing the burden of confronting external pressure, this approach deprives the country of the opportunity to form its own international agenda, believes Dmitry Evstafiev from the Higher School of Economics . On his part, Igor Ashmanov, CEO of Ashmanov & Partners, remarks: “Absence of information sovereignty is an absolutely toxic thing. Speaking about digital sovereignty from a technological point of view, it is necessary to underscore the importance of creating domestic technologies and companies. Borrowing something without giving it any thought is not the right thing to do. ” In his turn, Ilya Massukh, Director of the Autonomous Non-Profit Organization “ Center for Import Substitution in ICT”, says that technological development may result in the loss of identity. Consequently, nations that are striving to maintain sovereignty cannot afford to be completely dependent on foreign “suppliers of technological products”.
Russia, like most countries of the world, has yet to strike the so-called “golden middle,” which would enable it to use the advantages of the new technological reality to maximum efficiency in terms of national development. However, it should do so without turning the process of adopting new technologies into the driving force of self-isolation, which may easily reduce to zero a significant chunk of benefits supplied by the next- generation communication technologies.
From our partner International Affairs
Is your security compromised due to “Spy software” know how
Spy software is often referred to as spyware is a set of programs that gives access to user/ administrators to track or monitor anyone’s smart devices (such as desktop, laptop, or smart phone) from anywhere across the globe.
Spyware is a threat, not only to businesses but individual users as well, since it can steal sensitive information and harm anyone’s network. It is controversial due to its frequent violation to end user’s privacy. It can attack user’s device, steal sensitive data (such as bank account or credit card information, or personal identity) or web data and share it with data firms, advertisers, or external users.
There are numerous online spyware designed for almost no cost, whose ultimate goal is to track and sell users data. Some spy software can install additional software and change the settings on user’s device, which could be difficult to identify.
Below are four main types of spyware, each has its unique features to track and record users activity:
Tracking cookies: These are the most common type of trackers, these monitor the user’s internet usage activities, such as searches, downloads, and history, for advertising and selling purposes.
System monitors: These spy software records everything on your device from emails, keystrokes, visited websites, chat-room dialogues, and much more.
Adware: This spyware is used for marketing purpose, it tracks users downloads and browser history, and suggests or displays the same or related products, this can often lead to slow device.
Trojan: This spyware is the most malicious software. It can be used to track sensitive information such as bank information or identification numbers.
Spyware can attack any operating system such as windows, android, or Apple. Windows operating systems are more prone to attack, but in past few years Apple’s operating systems are also becoming vulnerable to attacks.
According to a recent investigation by the Guardian and 16 other media organizations, found that there is a widespread and continuous abuse of NSO’s hacking spyware Pegasus, on Government officials, human rights activists, lawyers and journalists worldwide which was only intended to use against terrorists and criminals.
The research, conducted by the Pegasus technical partner Amnesty’s Security Lab, found traces of the Pegasus activity on 37 out of the 67 examined phones. Out of 37 phones, 34 were iPhones, and 23 showed signs of a Pegasus infection, while remaining 11 showed signs of attempted infection. However, only three out of 15 Android phones were infected by Pegasus software.
Attacks like the Pegasus might have a short shelf life, and are used to target specific individuals. But evidences from past have proved that attackers target large group of people and are often successful.
Below are the most common ways devices can become infected with spyware:
- Downloading software or apps from unreliable sources or unofficial app publishers
- Accepting cookies or pop-up without reading
- Downloading or watching online pirated media content
- Opening attachments from unfamiliar senders
Spyware can be extremely unsafe if you have been infected. Its damage can range from short term device issue (such as slow system, system crashing, or overheating device) to long-term financial threat.
Here’s what you can do protect your devices from spyware:
Reliable antivirus software: Firstly look for security solutions available on internet (some are available for free) and enable the antivirus software. If your system or device is already infected with virus, check out for security providers offering spyware identification and removal.
-For instance, you can install a toolkit (the Mobile Verification Tool or the MVT) provided by Amnesty International. This toolkit will alert you with presence of the Pegasus Spyware on your device.
-The toolkit scans the backup file of your device for any evidence of infection. It works on both Apple and Android operating systems, but is more accurate for Apple operating system.
-You can also download and run Norton Power Eraser a free virus removal tool.
Update your system regularly: Set up an update which runs automatically. Such automatic updates can not only block hackers from viewing your web or device activity, but can also eliminate software errors.
Be vigilant of cookies compliance: Cookies that records/ tracks users browsing habits and personally identifiable information (PII) are commonly known as adware spyware. Accept cookies only from reliable sites or download a cookie blocker.
Strong authentication passwords: Try to enable Multi-factor Authentication (MFA) wherever possible, or if not possible create different password for all accounts. Change your password for each account after a certain period of time.
-Password breaches can still occur with these precautions. In such case change your password immediately.
Be cautious of free software: Read the terms and conditions on software licenses, before accepting. Free software might be unlimited but, your data could be recorded with those free software’s.
Do not open any files from unknown or suspicious account: Do not open any email attachments or text on mobile from a suspicious, unknown, or untrustworthy source/number.
Spyware could be extremely dangerous, however it can be prevented and removed by being precautious and using a trustworthy antivirus tool. Next gen technologies can also help in checking and removing malicious content. For instance, Artificial intelligence could aid the organizations identify malicious software, and frequently update its algorithms of patterns similar to predict future malware attacks.
Implementation of virtual reality and the effects in cognitive warfare
With the increasing use of new technologies in warfare situations, virtual reality presents an opportunity for the domain of cognitive warfare. Nowadays, cognitive skills are treated equally as their physical counterparts, seeking to standardize new innovative techniques. Virtual reality (VR) can be used as a tool that can increase the cognitive capabilities of soldiers. As it is understandable in today’s terms, VR impacts the brain directly. That means that our visual organs (eyes) see one object or one surrounding area, but brain cells perceive and react to that differently. VR has been used extensively in new teaching methods because of the increased probability of improving the memory and learning capabilities of students.
Besides its theoretical teaching approach and improvement of learning, VR can be used systematically towards more practical skills. In medicine for example students can have a full medicine lesson on a virtual human being seeing the body projected in 3D, revolutionizing the whole field of medicine. If that can be used in the medical field, theoretically it will be possible to be used in combat situations, projecting a specific battlefield in VR, increasing the chances of successful engagement, and reducing the chance of casualties. Knowing your terrain is equally important as knowing your adversary.
The use of VR will also allow us to experience new domains relating to the physical health of a person. It is argued that VR might provide us with the ability to effectively control pain management. Since VR can stimulate visual senses, then it would be safe to say that this approach can have higher effectiveness in treating chronic pain, depression, or even PTSD. The idea behind this usage is that the brain itself is already powerful enough, yet sometimes when pain overwhelms us we tend to lose effectiveness on some of our senses, such as the visual sense. An agonizing pain can blurry our vision, something that we cannot control; unless of course theoretically, we use VR. The process can consist of different sounds and visual aids that can trick the mind into thinking that it is somewhere that might be the polar opposite of where it is. Technically speaking, the mind would be able to do that simply because it works as a powerful computer, where our pain receptors can override and actually make us think that we are not in such terrible pain.
Although the benefits of VR could be useful for our health we would still need to deal with problems that concern our health when we use a VR set. It is possible that the brain can get overloaded with new information and the new virtual environments. VR poses some problems to some people, regarding the loss of the real environment and creating feelings of nausea or extreme headaches. As a result, new techniques from cognitive psychologists have emerged to provide a solution to the problem. New technologies have appeared that can desaturate colors towards the edge of the headset in order to limit the probability of visual confusion. Besides that, research shows that even the implementation of a virtual nose when someone wears a VR headset can prevent motion sickness, something that our brain does already in reality.
However, when it comes to combatants and the implementation of VR in soldiers, one must think of maybe more effective and fast solutions to eliminate the problems that concern the confusion of the brain. Usage of specific pharmaceuticals might be the key. One example could be Modafinil which has been prescribed in the U.S. since 1998 to treat sleep-related conditions. Researchers believe it can produce the same effects as caffeine. With that being said, the University of Oxford analyzed 24 studies, where participants were asked to complete complex assignments after taking Modafinil and found out that those who took the drug were more accurate, which suggests that it may affect higher cognitive functions.
Although some of its long-term effects are yet to be studied, Modafinil is by far the safest drug that can be used in cognitive situations. Theoretically speaking, if a long exposure to VR can cause headaches and an inability to concentrate, then an appropriate dose of Modafinil can counter the effects of VR. It can be more suitable and useful to use on soldiers, whose cognitive skills are better than civilians, to test the full effect of a mix of virtual technology and pharmaceuticals. VR can be a significant military component and a simulation training program. It can provide new cognitive experiences based on foreign and unknown terrains that might be difficult to be approached in real life. New opportunities arise every day with the technologies, and if anyone wanted to take a significant advantage over adversaries in the cognitive warfare field, then VR would provide a useful tool for military decision-making.
Vaccine Equity and Beyond: Intellectual Property Rights Face a Crucial Test
The debate over intellectual property rights (IPRs), particularly patents, and access to medicine is not new. IPRs are considered to drive innovation by protecting the results of investment-intensive R&D, yet arguably also foster inequitable access to affordable medicines.
In a global public health emergency such as the COVID-19 pandemic, where countries face acute shortages of life-saving vaccines, should public health be prioritized over economic gain and the international trade rules designed to protect IPRs?
The Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPs), to which all 164 member states of the World Trade Organization (WTO) are a party, establish minimum standards for protecting different forms of IPRs.
In October 2020, India and South Africa – countries with strong generic drug manufacturing infrastructure – invoked WTO rules to seek a temporary waiver of IPRs (patents, copyrights, trade secrets, and industrial designs) on equipment, drugs, and vaccines related to the “prevention, containment or treatment of COVID-19.” A waiver would mean that countries could locally produce equipment and vaccines without permission from holders of IPRs. This step would serve to eliminate the monopolistic nature of IPRs that give exclusive rights to the holder of IPRs and enable them to impose procedural licensing constraints.
Brazil, Japan, the European Union (EU), and the United States (US) initially rejected the waiver proposal. That stance changed with the rise of new COVID-19 mutations and the associated increase in deaths, with several countries facing a public health crisis due to vaccine supply shortages. The position of many states began shifting in favor of the India-South Africa proposal, which now has the backing of 62 WTO members, with the US declaring support for the intent of the temporary waiver to secure “better access, more manufacturing capability, more shots in arms.” Several international bodies, the World Health Organization (WHO), and the UN Committee on Economic, Social and Cultural Rights have voiced support.
Some countries disagree about the specific IPRs to be waived or the mechanisms by which IPRs should be made available. The EU submitted a proposal to use TRIPS flexibilities such as compulsory licensing, while others advocate for voluntary licensing. The TRIPS Council is conducting meetings to prepare an amended proposal to the General Council (the WTO’s highest-level decision-making body in Geneva) by the end of July 2021.
The crisis in India illustrates the urgency of the situation. India produces and supplies Covishield, licensed by AstraZeneca; and Covaxin, which is yet to be included on the WHO’s Emergency Use Listing (EUL). Due to the devastating public health crisis, India halted its export of vaccines and caused a disruption in the global vaccine supply, even to the COVID-19 Vaccines Global Access (COVAX) program. In the meantime, the world’s poorest nations lack sufficient, critical vaccine supplies.
International law recognizes some flexibility in public health emergencies. An example would be the Doha Declaration on TRIPS and Public Health in 2001, which, while maintaining the commitments, stresses the need for TRIPS to be part of the wider national and international action to address public health problems. Consistent with that, the body of international human rights law, including the International Covenant on Economic, Social and Cultural Rights (ICESCR), protects the right to the highest attainable standard of health.
But as we race against time, the current IPR framework may not allow for the swift response required. It is the rigorous requirements before a vaccine is considered safe to use under Emergency Use Authorizations and procedural delays which illuminate why IPR waivers on already approved vaccines are needed. Capitalizing on the EUL’s approved vaccines that have proven efficacy to date and easing IPR restrictions will aid in the timely supply and access of vaccines.
A TRIPS waiver may not solve the global vaccine shortage. In fact, some argue that the shortages are not an inherent flaw in the IP regime, considering other supply chain disruptions that persist, such as the ones disrupting microchips, pipette tips, and furniture. However, given that patent licensing gives a company a monopoly on vaccine commercialization, other companies with manufacturing capacity cannot produce the vaccine to scale up production and meet supply demands.
Neither does a temporary waiver mean that pharmaceutical companies cannot monetize their work. States should work with pharmaceuticals in setting up compensation and insurance schemes to ensure adequate remuneration.
At the College of Law at Hamad Bin Khalifa University, our aim is to address today’s legal challenges with a future-oriented view. We see COVID-19 as a case study in how we respond to imminent and existential threats. As global warming alters the balance of our ecosystem, threats will cascade in a way that is hard to predict. When unpredictable health emergencies emerge, it will be human ingenuity that helps us overcome them. Even the global IP regime, as a legal system that regulates ideas, is being tested, and should be agile enough to respond in time, like the scientists who sprang into action and worked tirelessly to develop the vaccines that will soon bring back a semblance of normal life as we know it.
To the Beat of its Own Drum: On Internal Logic of Events in Tunisia
Once every five years or so, Tunisia finds itself in the headlines around the world. Last time, in 2015, it...
What Does NATO Withdrawal from Afghanistan Mean for Regional Actors?
By September 11, 2021, NATO’s 20-year operation in Afghanistan will come to a close. That date marks the 20th anniversary...
Afghanistan may be a bellwether for Saudi-Iranian rivalry
Boasting an almost 1,000-kilometer border with Iran and a history of troubled relations between the Iranians and Sunni Muslim militants,...
The various ways you can buy gold
Gold is usually valued as a commodity, currency, and investment for many years. This is why it’s still popular nowadays...
Passing the Test of the Covid Pandemic
For love of domination we must substitute equality; for love of victory we must substitute justice; for brutality we must...
How to ensure your Canadian public documents will be recognized in the EU?
If you are moving to the EU for work or educational purposes, or you want to live there for a...
Drones in the Hands of Terrorists: What Happens Then?
Ardian is a counter-terrorism researcher, lecturer and security analyst, with a field research experience in Syria, Iraq, Jordan, Western Europe,...
South Asia3 days ago
Why Strategies of Stakeholders in Afghanistan Failing Against Taliban?
East Asia2 days ago
Belt & Road ABCs: Analysis of “One Belt – One Road” initiative
Health & Wellness3 days ago
Delta variant, a warning the COVID-19 virus is getting ‘fitter and faster’
Economy2 days ago
The Politico-Economic Crisis of Lebanon
Green Planet3 days ago
Sink or swim: Can island states survive the climate crisis?
East Asia3 days ago
Behind the Rise of China is the Centenary Aspiration of the CPC for a Great China
Human Rights3 days ago
COVID-19: Education replaced by shuttered schools, violence, teenage pregnancy
Human Rights3 days ago
Six months after coup, Myanmar’s political, rights and aid crisis is worsening