DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) launched FiGHT (5G Hierarchy of Threats), an adversarial threat model for 5G systems that empower organizations to reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) announced today the launch of the FiGHT (5G Hierarchy of Threats) adversarial threat model for 5G systems. Freely available at fight.mitre.org, FiGHT empowers organizations to, for the first time, reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.

“We’re honored to join the Department of Defense in equipping the 5G community with a collaborative, open-source tool against cyber threats,” said Charles Clancy, Ph.D., senior vice president, general manager, MITRE Labs, and chief futurist. “FiGHT helps stakeholders assess where cyber investments should be made to achieve the highest impact as they build, configure, and deploy secure and resilient 5G systems.” 

“With an engaged 5G stakeholder community populating the threat framework,” said Amanda Toman, director, 5G Transition Office and CFT (Cross Functional Team), Office of the Under Secretary of Defense (Research & Engineering). “FiGHT will serve as a pivotal tool to the DoD’s ability to deploy secure and resilient 5G systems.”


FiGHT’s adversarial threat model for 5G systems is derived from MITRE ATT&CK®, a knowledge base of cyber adversary behaviors, and assessments of academic research and other frameworks. FiGHT is a purpose-built model of observed adversary behaviors in telecommunications environments.

“We identified an industry need for a structured understanding of 5G threats because even though 5G represents the most secure cellular standard to date, it can be implemented and deployed in ways that still have risks and vulnerabilities,” continued Clancy. “FiGHT fills that gap for telecommunication providers, manufacturers, and cybersecurity researchers.”

FiGHT serves as a foundation to 5G security research and can be operationalized in various ways, such as to conduct threat assessments, enable adversarial emulation, identify coverage gaps, and inform cyber investment planning.


Recent Content

OneLayer and Ericsson have partnered to launch a scalable Zero Trust Network Access (ZT-ZTNA) solution for private LTE and 5G networks. Tailored for industries like utilities and manufacturing, this solution simplifies device onboarding, eliminates manual provisioning, and enforces zero trust policies to enhance security across connected assets.
U.S. fixed wireless access (FWA) is on the rise, with over 11.5 million subscribers across T-Mobile, Verizon, and AT&T. Ookla Speedtest data reveals rising download speeds, with T-Mobile leading at 205 Mbps. Verizon manages performance via speed caps, while AT&T positions FWA as a transitional service. Latency and upload improvements further boost FWA’s appeal in 2024.
Explore the transformative potential of Open Radio Access Networks (O-RAN) as it integrates AI, enhances security, and fosters interoperability to reshape mobile network infrastructure. In this article, we explore the advancements and challenges of O-RAN, revealing how it sets the stage for future mobile communications with smarter, more secure, and highly adaptable network solutions. Dive into the strategic implications for the telecommunications industry and learn why O-RAN is critical for the next generation of digital connectivity.
Telecom providers have spent over $300 billion since 2018 on 5G, fiber, and cloud-based infrastructure—but returns are shrinking. The missing link? Network observability. Without real-time visibility, telecoms can’t optimize performance, preempt outages, or respond to security threats effectively. This article explores why observability must become a core priority for both operators and regulators, especially as networks grow more dynamic, virtualized, and AI-driven.
As Open RAN moves from trials to large-scale adoption, telecom giants like NTT Docomo, AT&T, and TELUS share their real-world deployment strategies. From multivendor interoperability to automation and security, this article explores key operational insights, ecosystem collaborations, and future directions in Open RAN architecture.
5G and AI are transforming industries, but this convergence also brings complex security challenges. This article explores how Secure Access Service Edge (SASE), zero trust models, and solutions like Prisma SASE 5G are safeguarding enterprise networks. With real-world examples from telecom and manufacturing, learn how to secure 5G infrastructure for long-term digital success.

Download Magazine

With Subscription
Whitepaper
Explore the Private Network Edition of 5G Magazine, your guide to the latest in private 5G/LTE and CBRS networks. This edition spotlights 11 award categories including private 5G/LTE leader, neutral host leader, and rising startups. It features insights from industry leaders like Jason Wallin of John Deere and an analysis...
Whitepaper
Discover the potential of mobile networks in modern warfare through our extensive whitepaper. Dive into its strategic significance, understand its security risks, and gain insights on optimizing mobile networks in critical situations. An essential guide for defense planners and cybersecurity enthusiasts....

It seems we can't find what you're looking for.

Subscribe To Our Newsletter

Scroll to Top