DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) launched FiGHT (5G Hierarchy of Threats), an adversarial threat model for 5G systems that empower organizations to reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem
DoD and MITRE announce FiGHT™ Framework to Protect 5G Ecosystem

MITRE and the Department of Defense (DoD) announced today the launch of the FiGHT (5G Hierarchy of Threats) adversarial threat model for 5G systems. Freely available at fight.mitre.org, FiGHT empowers organizations to, for the first time, reliably assess the confidentiality, integrity, and availability of 5G networks, as well as the devices and applications using them.

“We’re honored to join the Department of Defense in equipping the 5G community with a collaborative, open-source tool against cyber threats,” said Charles Clancy, Ph.D., senior vice president, general manager, MITRE Labs, and chief futurist. “FiGHT helps stakeholders assess where cyber investments should be made to achieve the highest impact as they build, configure, and deploy secure and resilient 5G systems.” 

“With an engaged 5G stakeholder community populating the threat framework,” said Amanda Toman, director, 5G Transition Office and CFT (Cross Functional Team), Office of the Under Secretary of Defense (Research & Engineering). “FiGHT will serve as a pivotal tool to the DoD’s ability to deploy secure and resilient 5G systems.”


FiGHT’s adversarial threat model for 5G systems is derived from MITRE ATT&CK®, a knowledge base of cyber adversary behaviors, and assessments of academic research and other frameworks. FiGHT is a purpose-built model of observed adversary behaviors in telecommunications environments.

“We identified an industry need for a structured understanding of 5G threats because even though 5G represents the most secure cellular standard to date, it can be implemented and deployed in ways that still have risks and vulnerabilities,” continued Clancy. “FiGHT fills that gap for telecommunication providers, manufacturers, and cybersecurity researchers.”

FiGHT serves as a foundation to 5G security research and can be operationalized in various ways, such as to conduct threat assessments, enable adversarial emulation, identify coverage gaps, and inform cyber investment planning.


Recent Content

Connectivity convergence is redefining the Internet of Things by integrating legacy systems, cellular, Wi-Fi, LoRaWAN, BLE, and satellite networks. From agriculture to logistics, IoT ecosystems are evolving to prioritize seamless communication, modular hardware, and intelligent data handling with edge AI. This article explores how convergence is shifting the focus from hype to practical, scalable deployment—unlocking the true potential of IoT everywhere.
This articles explores how AI, quantum computing, and next-gen connectivity are shaping the future of innovation. From ethical AI and quantum-safe cryptography to 6G-enabled access to education and healthcare, these converging technologies are redefining what’s possible across industries. The key: inclusive, sustainable, and collaborative development.
With AI shifting from the cloud to the device, on-device AI is transforming privacy, speed, and user experience. Experts from Honor, Broadcom, and Orange explore the challenges and innovations shaping this future, from AI chips to offline capabilities and ethical implications. Is it time to go all-in?
Smartphones are no longer just communication tools—they’re data hubs, wallets, and identity carriers. As mobile usage expands, so do digital threats. This article explores why the future of mobile protection must go beyond physical coverage to include AI-powered threat detection, data security, and digital identity safeguards.
As billionaires like Elon Musk and Jeff Bezos dominate headlines, the evolving space race raises crucial questions: is access to space limited to the ultra-wealthy, or is the sector finally opening up to startups, academia, and public-private partnerships? This article examines the commercial space boom, emerging technologies, and the ethics of an increasingly privatized cosmos.
Telecom Communication Service Providers (CSPs) are embracing a digital-first strategy to remain competitive in a rapidly evolving industry. This article outlines how CSPs are integrating AI for operational efficiency, shifting towards personalized customer experiences, building scalable monetization strategies, and overcoming legacy challenges to drive long-term digital transformation and enterprise value.

Download Magazine

With Subscription
Whitepaper
Dive deep into how Radisys Corporation is navigating the dynamic landscape of Open RAN and 5G technologies. With their innovative strategies, they are making monumental strides in advancing the deployment and implementation of scalable, flexible, and efficient solutions. Get insights into how they're leveraging small cells, private networks, and strategic...
Whitepaper
This whitepaper explores seven compelling use cases of AI-infused automated service assurance solutions, encompassing anomaly detection, automated root cause analysis, service quality enhancement, customer experience improvement, network capacity planning, network monetization, and self-healing networks. Each use case explains how AI, when embedded in a tailored assurance solution powered by extensive...
Radcom Logo

It seems we can't find what you're looking for.

Subscribe To Our Newsletter

Scroll to Top