FinCrime Cyber
The worlds of financial crime and cybercrime are colliding, converging into one. The biggest threat to businesses globally is the new cyber-enabled financial crime. Yet businesses and even financial institutions tasked with protecting our money continue to fight this combined threat with multiple separate defense systems and multiple separate defense teams. The situation is like a military leader trying to fight different enemies on different fronts. While those enemies remain in different fronts, it makes sense to send separate defense forces against them, each focused on fighting only the enemy assigned to it. But what if those enemies merge and...
Organizational Bullshit
While I add a similar disclaimer to all of my public content, it's particularly important in this case to emphasize that the convictions I've expressed in this article are entirely my own. I've arrived at these opinions after 30 years of corporate work, but they in no way reflect the views of PwC and are in no particular way inspired by PwC. Preamble I have to admit that I am a little surprised to find myself writing a series of articles on 'organizational bullshit.' At first glance, this is not my area of specialist expertise. But the more I have reflected...
Society 5.0 and 5G
In their outstanding book, Wicked and Wise, Alan Watkins and Ken Wilber look at some of the most pressing ‘wicked problems’ facing the human race. ‘Wicked problems,’ they suggest, are difficult to define, but they are essentially unsolvable in the usual scientific sense. The authors go on: wicked problems, such as climate change, are multi-dimensional, have multiple causes, multiple stakeholders, multiple symptoms and multiple solutions. They are by definition complex and difficult to process. Crucially, they are created or exacerbated by people. Our species has proved capable of producing challenges of unfathomable difficulty. We may, however, also prove capable of developing the...
5G SBA IMS MEC Architecture
The interest in 5G and mIoT is exploding. It's exciting to see so many IT and cybersecurity professionals in my network trying to learn more about 5G and related technologies. In addition to my usual articles about the societal impacts of these innovations, I'll start a series of articles introducing key 5G and mIoT technology concepts. Before we move on to technical aspects of 5G security. Let's get started with reviewing the 5G core service-based architecture and learning the first few dozen acronyms, out of approximately a gazillion. The cellular industry loves acronyms. Even more than the cybersecurity industry. 5G architecture is...
5G Critical Infrastructure
Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new one, a technology Cold War between the United States and China. This time, instead of a ‘red under the bed’, the US government has declared there is one at the back door. It accuses Chinese technology companies of deliberately building vulnerabilities into their tech, allowing the Chinese to access and control the 5G critical infrastructure, and through it the connected devices and machinery at will. Headlines are dominated by the case against Huawei, and debate continues...
5G Cloud Architecture
The 5G Core network is a Service Based Architecture. It evolves the traditional appliance based 4G Core Network to support services. It offers more agility and flexibility. The major building blocks of this architecture include Service-Based Interface: The Service Based Interfaces rely on HTTP/2 The 5G Network Functions: As explained by Ericsson “is built using IT network principles and cloud native technology. In this new architecture each Network Function (NF) offers one or more services to other NFs via Application Programming Interfaces (API). Each Network Function (NF) is formed by a combination of small pieces of software code called as...
5G Virtualization
Depending on who you speak to, 5G is either humankind’s greatest imminent blessing or its greatest imminent curse. Still in its infancy, and not yet commercially standardized, this technology has already been the most polarizing advancement we have ever seen in communication. Consumers worldwide are captivated by promises of super-fast download speeds, split-second responsiveness and next-level mobile phone communication, but are divided on the possible sacrifices of privacy and security. Detractors continue to issue condemnations of 5G cellular’s possible health risks. Supporters continue to shake their heads in disbelief. Governments jostle for geopolitical supremacy; 5G is seen as both a proxy...
5G Cybersecurity Safety
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to grant him access to a life of greater meaning and satisfaction. As technological evolution leads to concomitant advances in medical science, we are seeing more and more examples of humans who are integrating devices and sensors into their biological makeup. For some, like those part of the growing "transhumanist" movement, this...
Introducing Society 5.0

Introducing Society 5.0

Self-help authors and politicians seem to agree on at least one thing: mindset matters. The shelves of bookstores worldwide are awash with motivational books by evangelical writers hoping to convert readers to their gospel of optimism. The central thesis is simple: success depends on approaching life, especially its challenges, with a positive outlook. Politicians and leaders have always appreciated the power of mindset, though less of the positive kind, as attested to by a history of propaganda that dates back to at least 500 BC. More recently, as Covid-19 spread across the globe, language in public discourse showed itself to...
5G COVID-19
There are many adjectives that could be used to describe the global outbreak of COVID-19, but perhaps the simplest might be: fast. The disease has spread quicker than most people can mentally digest. By nature, humans process linearly. This pandemic has been a lesson in exponential thinking for the common man. Those who don’t spend their time contemplating Moore's Law or compound interest have felt overwhelmed by infection or mortality rates that double daily. In response, governments, businesses, monetary institutions, education systems and the many other players in corporate and civil life have acted at high speed. It is easy to...
5G TSN Manufacturing
In the recent report by IHS Markit - "The 5G Economy - How 5G will contribute to the global economy" - researchers claimed that manufacturing will garner almost $4.7 trillion in sales enablement by 2035. Or 36% of the $13.2 trillion total opportunity of 5G by 2035. Manufacturing will be by far the largest industry beyond mobile to be impacted by 5G. In the manufacturing sector the adoption will benefit in the short-to-medium term from enhanced indoor wireless broadband coverage. Other early use cases include asset tracking such as visibility over incoming and outgoing components and goods in the supply...
AI and 5G
In 2013, George F. Young and colleagues completed a fascinating study into the science behind starling murmurations. These breathtaking displays of thousands – sometimes hundreds of thousands – of birds in a single flock swooping and diving around each other, look from a distance like a single organism organically shape-shifting before the viewer’s eyes. In their research article, Young et al reference the starling’s remarkable ability to “maintain cohesion as a group in highly uncertain environments and with limited, noisy information." The team discovered that the birds’ secret lay in paying attention to a fixed number of their neighbors –...
Neurodiversity Brains
The cybersecurity industry is constantly evolving, facing new threats and challenges every day. To stay ahead of the curve, protect sensitive information, and protect lives (in case of cyber-kinetic risks), the industry requires a diverse range of skills, perspectives, and innovative solutions capable of tackling complex and evolving threats. The cybersecurity sector has a unique opportunity to harness the distinctive talents of neurodivergent individuals. Neurodiversity, which encompasses individuals with cognitive differences such as autism, ADHD, dyslexia, and other neurodivergent descriptions, offers a unique and untapped talent pool for the cybersecurity sector. The benefits of diversity, especially in tech spaces, are...
Edge Computing Fog
For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as a formless abstraction "up there" when, in fact, the cloud is rooted in the ground. Or the seabed. Despite rapid advances in satellite connection, almost all intercontinental data transfer that takes place every second of the day occurs via hundreds of thousands of miles of underwater cables. Reading a map of these submarine cables is like viewing a tapestry of international telecommunication. It is perhaps strange to think that the email you just sent to your colleague...
Open RAN Security
It's been a year of contradictions for the telecommunications industry. Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic, with a slowdown in global 5G roll-outs being a notable result. Geopolitical conflicts have continued to muddy the market, with governments playing a more active role than ever in setting telecoms-centred policy. At the same time, however, the air is thick with promise and opportunity. Over the last nine months, entire organizations have transitioned to remote working and high-bandwidth video communication. Corporations have accelerated digital transformation initiatives. Online shopping has soared. The appetite for autonomous manufacturing...