Private Network Check Readiness - TeckNexus Solutions

DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) launched FiGHT (5G Hierarchy of Threats), an adversarial threat model for 5G systems that empower organizations to reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) announced today the launch of the FiGHT (5G Hierarchy of Threats) adversarial threat model for 5G systems. Freely available at fight.mitre.org, FiGHT empowers organizations to, for the first time, reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.

“We’re honored to join the Department of Defense in equipping the 5G community with a collaborative, open-source tool against cyber threats,” said Charles Clancy, Ph.D., senior vice president, general manager, MITRE Labs, and chief futurist. “FiGHT helps stakeholders assess where cyber investments should be made to achieve the highest impact as they build, configure, and deploy secure and resilient 5G systems.” 

“With an engaged 5G stakeholder community populating the threat framework,” said Amanda Toman, director, 5G Transition Office and CFT (Cross Functional Team), Office of the Under Secretary of Defense (Research & Engineering). “FiGHT will serve as a pivotal tool to the DoD’s ability to deploy secure and resilient 5G systems.”


FiGHT’s adversarial threat model for 5G systems is derived from MITRE ATT&CK®, a knowledge base of cyber adversary behaviors, and assessments of academic research and other frameworks. FiGHT is a purpose-built model of observed adversary behaviors in telecommunications environments.

“We identified an industry need for a structured understanding of 5G threats because even though 5G represents the most secure cellular standard to date, it can be implemented and deployed in ways that still have risks and vulnerabilities,” continued Clancy. “FiGHT fills that gap for telecommunication providers, manufacturers, and cybersecurity researchers.”

FiGHT serves as a foundation to 5G security research and can be operationalized in various ways, such as to conduct threat assessments, enable adversarial emulation, identify coverage gaps, and inform cyber investment planning.


Recent Content

CELLSMART, the cellular intelligence division of SmartCIC, has launched its latest Global Cellular Performance Survey, which shows that maximum 5G download speeds available in the field have reached nearly 1 Gbps. Test results showed Norway (994 Mbps) and Spain (993.60 Mbps) topping the rankings for maximum 5G download speeds for indoors and outdoors.
T-Mobile and AWS are working together to pair T-Mobile’s 5G Advanced Network Solutions portfolio with AWS cloud-based services and scalable, pre-integrated applications, so customers can more easily discover, customize and deploy 5G edge compute
In order to maximize revenue and add more value, operators must expand their connectivity offerings beyond speed and customer experience; they need to expand their footprint into edge cloud platforms and AI-based solution stacks. Doing this will help them secure a larger share of the potential profits.
This article discusses the transformative potential of 5G technology in telecommunications and the rise of a 5G marketplace model. It highlights how 5G’s high-speed, low-latency, and reliable capabilities can enhance Internet of Things applications, virtual reality, and mission-critical business communications. The article also explores how communication service providers can leverage 5G to offer value-based pricing and new services through network slicing and multi-access edge computing. The proposed 5G marketplace model allows users to compare and choose from various service offerings, similar to established B2C and B2B marketplaces. However, it also mentions the need for robust infrastructure, complex billing mechanisms, and industry acceptance for the successful implementation of this model.
Operators face billing challenges due to limitations with legacy systems that cannot support intent-based pricing.
Geoff delves into why 5G revenues have failed to meet expectations, what customers and businesses anticipate from network operators and the potential for operators to capitalize on new monetization opportunities.

Currently, no free downloads are available for related categories. Search similar content to download:

  • Reset

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Private Network Awards 2025 - TeckNexus
Scroll to Top

Private Network Awards

Recognizing excellence in 5G, LTE, CBRS, and connected industries. Nominate your project and gain industry-wide recognition.
Early Bird Deadline: Sept 5, 2025 | Final Deadline: Sept 30, 2025