Narrow your search

Library

Vlaams Parlement (2)


Resource type

book (2)


Language

English (2)


Year
From To Submit

2022 (1)

2020 (1)

Listing 1 - 2 of 2
Sort by

Book
Securing 5G: A Way Forward in the U.S. and China Security Competition
Authors: --- --- ---
Year: 2022 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Fifth-generation (5G) networks are being deployed in the United States and globally and, one day, will replace many older, third- and fourth-generation cellular networks. 5G will provide much higher data rates and lower message latency than older cellular networks. 5G could also provide or support a variety of new applications, such as holographic communications, autonomous vehicles, and internet-of-things communications. However, security concerns have been raised about 5G networks built using Chinese equipment and 5G phones made by some Chinese companies. The United States is reliant on foreign suppliers for 5G infrastructure and key microchips that go into every 5G phone. This report describes 5G security issues, the 5G supply chain, and the competitive landscape in 5G equipment and mobile device markets. It describes where U.S. and Chinese companies have technology or market advantages in the emerging 5G security competition between the United States and China. The report provides recommendations for securing U.S. 5G networks and mobile devices and those used by U.S. allies and foreign partner nations.

Keywords


Book
North Korean Conventional Artillery: A Means to Retaliate, Coerce, Deter, or Terrorize Populations
Authors: --- --- --- --- --- et al.
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

North Korea maintains nearly 6,000 artillery systems within range of major South Korean population centers, which it could use to kill many thousands in just an hour, even without resorting to chemical or nuclear weapons. Researchers assessed the magnitude of this threat across five attack scenarios, using estimates of the number of North Korean artillery systems, the population densities of potential target areas, and assumptions about the locations of people at the time of the attacks (outdoors, indoors, and below ground). The strike scenarios assessed were (1) five minutes against a major industrial target, (2) one minute along the DMZ, (3) one minute against downtown Seoul, (4) one hour along the DMZ, and (5) one hour against downtown Seoul. Estimated total casualties from the attacks ranged from about 4,500 to more than 200,000. The authors conclude that because so much harm could be done so quickly, the United States and South Korea should try to avoid military provocation cycles that could lead to these attacks. This document presents a series of visualizations that helps bring into sharp relief the danger posed by this threat, providing a useful tool for defense leaders, policymakers, and the public in understanding this important aspect of the complex situation on the Korean peninsula.

Keywords

Listing 1 - 2 of 2
Sort by