DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) launched FiGHT (5G Hierarchy of Threats), an adversarial threat model for 5G systems that empower organizations to reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) announced today the launch of the FiGHT (5G Hierarchy of Threats) adversarial threat model for 5G systems. Freely available at fight.mitre.org, FiGHT empowers organizations to, for the first time, reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.

“We’re honored to join the Department of Defense in equipping the 5G community with a collaborative, open-source tool against cyber threats,” said Charles Clancy, Ph.D., senior vice president, general manager, MITRE Labs, and chief futurist. “FiGHT helps stakeholders assess where cyber investments should be made to achieve the highest impact as they build, configure, and deploy secure and resilient 5G systems.” 

“With an engaged 5G stakeholder community populating the threat framework,” said Amanda Toman, director, 5G Transition Office and CFT (Cross Functional Team), Office of the Under Secretary of Defense (Research & Engineering). “FiGHT will serve as a pivotal tool to the DoD’s ability to deploy secure and resilient 5G systems.”


FiGHT’s adversarial threat model for 5G systems is derived from MITRE ATT&CK®, a knowledge base of cyber adversary behaviors, and assessments of academic research and other frameworks. FiGHT is a purpose-built model of observed adversary behaviors in telecommunications environments.

“We identified an industry need for a structured understanding of 5G threats because even though 5G represents the most secure cellular standard to date, it can be implemented and deployed in ways that still have risks and vulnerabilities,” continued Clancy. “FiGHT fills that gap for telecommunication providers, manufacturers, and cybersecurity researchers.”

FiGHT serves as a foundation to 5G security research and can be operationalized in various ways, such as to conduct threat assessments, enable adversarial emulation, identify coverage gaps, and inform cyber investment planning.


Recent Content

Alcatel-Lucent Enterprise has launched its first Private 5G solution in partnership with Celona. This new offering enhances secure, low-latency connectivity across enterprise environments like manufacturing plants, ports, and campuses. Integrated with ALE’s OmniVista, OmniSwitch, and OmniAccess Stellar platforms, the network supports ultra-reliable industrial IoT applications and introduces advanced features like MicroSlicing, Aerloc, and Zero Trust Network Access.
Observe.AI has unveiled VoiceAI agents—intelligent, realistic voice-powered AI tools designed to automate contact center operations. These AI agents manage routine customer interactions using advanced voice technology, reduce support costs by up to 80%, and integrate easily with tools like Salesforce and Zendesk. With features like interruption detection and robust data security, VoiceAI agents mark a leap forward in contact center automation.
At the ETTelecom 5G Congress 2025, top Indian telecom players shared strategies for 5G growth, AI integration, and future tech like 6G. Bharti Airtel emphasized Fixed Wireless Access (FWA), Jio highlighted AI and its 6G roadmap, while Vodafone Idea focused on delivering high-quality 5G user experiences. With 84% population 5G coverage and India targeting 1 billion users by 2030, the telecom industry is at a pivotal moment.
The emergence of “vibe coding,” a term representing AI-driven software development, presents both opportunities and risks to the industry. This approach, emphasizing prompt engineering and AI-generated code, can potentially increase productivity and democratize development, but it also introduces concerns about code reliability, skill degradation, and dependence on AI. To harness the benefits of AI while mitigating these risks, developers must prioritize robust testing, clear coding standards, and a balance between intuitive insights and rigorous technical practices, ensuring that the fundamentals of software development are not lost.
Nokia, Honeywell Aerospace Technologies, and Numana have teamed up to develop quantum-safe networks, a pivotal move for global cybersecurity. This partnership leverages technology from each entity to secure data communications against future threats. Learn about their strategic roles and the potential impacts on both private and national security frameworks.

Download Magazine

With Subscription

It seems we can't find what you're looking for.

Subscribe To Our Newsletter

Scroll to Top