DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) launched FiGHT (5G Hierarchy of Threats), an adversarial threat model for 5G systems that empower organizations to reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) announced today the launch of the FiGHT (5G Hierarchy of Threats) adversarial threat model for 5G systems. Freely available at fight.mitre.org, FiGHT empowers organizations to, for the first time, reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.

“We’re honored to join the Department of Defense in equipping the 5G community with a collaborative, open-source tool against cyber threats,” said Charles Clancy, Ph.D., senior vice president, general manager, MITRE Labs, and chief futurist. “FiGHT helps stakeholders assess where cyber investments should be made to achieve the highest impact as they build, configure, and deploy secure and resilient 5G systems.” 

“With an engaged 5G stakeholder community populating the threat framework,” said Amanda Toman, director, 5G Transition Office and CFT (Cross Functional Team), Office of the Under Secretary of Defense (Research & Engineering). “FiGHT will serve as a pivotal tool to the DoD’s ability to deploy secure and resilient 5G systems.”


FiGHT’s adversarial threat model for 5G systems is derived from MITRE ATT&CK®, a knowledge base of cyber adversary behaviors, and assessments of academic research and other frameworks. FiGHT is a purpose-built model of observed adversary behaviors in telecommunications environments.

“We identified an industry need for a structured understanding of 5G threats because even though 5G represents the most secure cellular standard to date, it can be implemented and deployed in ways that still have risks and vulnerabilities,” continued Clancy. “FiGHT fills that gap for telecommunication providers, manufacturers, and cybersecurity researchers.”

FiGHT serves as a foundation to 5G security research and can be operationalized in various ways, such as to conduct threat assessments, enable adversarial emulation, identify coverage gaps, and inform cyber investment planning.


Recent Content

Virgin Media O2’s multi-year transformation redefines UK telecoms with digitalization, AI, and customer-first thinking. From legacy network upgrades and automation to AI tools like Daisy and Digital Twins, the operator’s strategy focuses on trust, reliability, and sustainable growth.
Tampnet has rolled out the world’s first fully autonomous private 5G network with Edge Compute offshore for Aker BP’s Edvard Grieg platform. This digital backbone provides real-time data processing, robust wireless coverage, and supports advanced offshore operations like autonomous drones, robotics, and predictive maintenance, setting a new standard for offshore oil and gas connectivity.
Ericsson has overhauled its Enterprise Wireless Solutions Partner Program, introducing a flexible structure that boosts deal registration benefits, streamlines partner tiers, expands the Mountaineer Program for technical and sales enablement, and adds the Partner View tool for clear performance tracking.
India’s Department of Telecommunications (DoT) has relaunched its plan to directly allocate spectrum for private 5G networks. The new demand study invites large enterprises and system integrators to signal interest in dedicated spectrum for captive 5G setups. If approved, this policy could enable Indian industries to run secure, high-speed networks without fully relying on telecom operators.
2025 has seen major telecom and tech M&A activity, including billion-dollar deals in fiber, AI, cloud, and cybersecurity. This monthly tracker details key acquisitions, like AT&T buying Lumen’s fiber assets and Google’s $32B move for Wiz, highlighting how consolidation is shaping the competitive landscape.
GFiber Labs and Nokia are partnering to shape the future of home internet with network slicing. Network Slicing lets customers customize bandwidth for gaming, work, and secure tasks. GFiber’s successful demo with Nokia shows how slices can create smoother gameplay, better video calls, and safer online banking – all while putting real-time control in users’ hands.
Whitepaper
As VoLTE becomes the standard for voice communication, its rapid deployment exposes telecom networks to new security risks, especially in roaming scenarios. SecurityGen’s research uncovers key vulnerabilities like unauthorized access to IMS, SIP protocol threats, and lack of encryption. Learn how to strengthen VoLTE security with proactive measures such as...
Whitepaper
Dive into the comprehensive analysis of GTPu within 5G networks in our whitepaper, offering insights into its operational mechanics, strategic importance, and adaptation to the evolving landscape of cellular technologies....

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top