{"id":1303,"date":"2021-07-27T11:49:53","date_gmt":"2021-07-27T11:49:53","guid":{"rendered":"https:\/\/www.theirmindia.org\/blog\/?p=1303"},"modified":"2026-01-27T12:29:20","modified_gmt":"2026-01-27T12:29:20","slug":"risk-of-5g","status":"publish","type":"post","link":"https:\/\/www.theirmindia.org\/blog\/risk-of-5g\/","title":{"rendered":"Risk of 5G"},"content":{"rendered":"<p><a href=\"https:\/\/www.theirmindia.org\/certification-track\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-5040\" src=\"https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2025\/11\/blog-image-300x74.png\" alt=\"Getting India Risk Ready\" width=\"668\" height=\"166\" srcset=\"https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2025\/11\/blog-image-300x74.png 300w, https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2025\/11\/blog-image-768x191.png 768w, https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2025\/11\/blog-image.png 1024w\" sizes=\"auto, (max-width: 668px) 100vw, 668px\" \/><\/a><\/p>\n<p>&#8220;Starting to run fast, only to reach an end&#8221;<\/p>\n<p>5G or Fifth Generation, is the latest and fastest wireless mobile device technology being initiated in 2019. Today, 5G is expected to enhance the performance, durability, and efficiency of mobile devices with a wide range of new applications and software with build-up of e-services as well.<\/p>\n<p><strong>What is 5G? <\/strong><\/p>\n<p>5G or the <strong>fifth-generation technology<\/strong> communication for broadband cellular networks is the fastest network and communication technology for 21st-century people succeeding the 4G network.<\/p>\n<p>5G possesses greater speed but could easily take us to our end. Although it represents an unfathomable standard in the telecommunication and digital sector, the hesitancy of data privacy is a huge concern as the data exodus could be accessed with one hand and in seconds. Every revolution always brings stress and hurdles with itself. Till 4G, the network had minimal changes but the new changes with technological advancement is a mirage of easiness to people as it has many more repercussions than the previous conglomerates.<\/p>\n<p>The USA is currently leading the way on 5G as it imposes great risks to an individual as well as to the government of a country and thus the security threat to the pan world out there.<\/p>\n<p><strong>Implementation of 5G network will introduce risks in mainly two areas: Health and Cyber<\/strong><\/p>\n<p><strong>Cybersecurity Risks<\/strong><\/p>\n<p><em>Probability of exposure or loss resulting from a cyber-attack or data breach on your organization.<\/em><\/p>\n<ul>\n<li><strong><em>Data Sharing: <\/em><\/strong>The significant key area of risk under 5G is the data compromise that has the huge possibility to steal data of innocent people by third parties with easy access to their device. It is due to the increased spread of intermediaries in this network as well as the software involved to get access to the data network. This poses a large threat to the privacy of the individuals as well as of the nation&#8217;s own government.<\/li>\n<li><strong style=\"font-size: 1.1429rem;\"><em>The Connectivity Compromise: <\/em><\/strong>The connectivity compromise also referred to as availability compromise is a platform where an attack shifts a network offline. Governments always fear threats of availability compromise, as if they are targeted at energy or defense infrastructure, it could lead to significant implications on national security.<\/li>\n<li><strong style=\"font-size: 1.1429rem;\"><em>Speed is a two-edged sword: <\/em><\/strong><span style=\"font-size: 1.1429rem;\">Speed could be an irony. It can cut for us as well as against us. 5G is as fast as a bullet but this also means that stealing the data from a device will take the hacker far less time. After thorough scrutinization, data compromise can occur through a truly high-speed without monitoring being initiated due to high traffic at hands of cyber terrorists.<\/span><\/li>\n<li><strong style=\"font-size: 1.1429rem;\"><em>Internet Of Things(IoT): <\/em><\/strong><span style=\"font-size: 1.1429rem;\">Increasing the number of online and integrated objects in a single network would naturally increase the potential threats and vulnerabilities, as unauthorized users would now have far more points of accessible entry into the network. In addition, the types of devices like smartphones, tablets, and laptops are inter-connected with one another and thus, can be integrated into the same system. This would further complex the task of ensuring cybersecurity on each device.<\/span><\/li>\n<li><strong style=\"font-size: 1.1429rem;\">Lack of end-to-end encryption: <\/strong><span style=\"font-size: 1.1429rem;\">A lack of end-to-end encryption in the presence of multi communication channels connecting 5G\/4G and Wi-Fi will get attackers a step forward to intercept data. As such, 5G must integrate end-to-end encryption. This would create a communication timeline where only devices that exchange information together can access the messages.<\/span><\/li>\n<li><strong style=\"font-size: 1.1429rem;\">Short Range Towers: <\/strong><span style=\"font-size: 1.1429rem;\">The 5G network would require the infrastructure of a high number of short-range physical cell towers. These towers will then become a new deployment of physical targets that hackers can exploit. They will have dynamic spectrum sharing (DSS), which allows specific layers of the network to be accessed for data transmission. This would mean that each can be attacked independently and will require a dynamic cybersecurity solution.<\/span><\/li>\n<li><strong>Unaddressed past inefficacies: <\/strong>The main issues already affecting previous generations of mobile technology, such as LTE, have not been addressed in 5G standards. One, in particular, is the ability to intercept pre-authenticated messages between the user&#8217;s base station and the cell tower which is still part of the 5G specifications, and proposed technicians would allow attackers to intercept unencrypted messages<strong>.<\/strong><\/li>\n<\/ul>\n<p>The graph below shows the cybersecurity growth in past years and the possible 2021 data breach that could increase up to 10% and more if 5G technology is initiated.<\/p>\n<p><a href=\"https:\/\/www.theirmindia.org\/level1\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-1304\" src=\"https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2021\/07\/blog-2-graph-300x168.png\" alt=\"\" width=\"300\" height=\"168\" srcset=\"https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2021\/07\/blog-2-graph-300x168.png 300w, https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2021\/07\/blog-2-graph-400x225.png 400w, https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2021\/07\/blog-2-graph-600x338.png 600w, https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2021\/07\/blog-2-graph-20x10.png 20w, https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2021\/07\/blog-2-graph-30x17.png 30w, https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2021\/07\/blog-2-graph.png 739w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Source: Canalys Forecasts, 2021 January<\/p>\n<p>Cybersecurity vulnerabilities could give a free hand to attacks and thus could invite a disaster.<\/p>\n<p><strong><em>Botnet<\/em> Attacks<\/strong> allow inter-connected devices to get controlled in order to launch a massive cyber-attack. There&#8217;s another, known as <strong>Man-in-the-Middle<\/strong> (MiTM) attack that disingenuously intercepts and alters communications between two parties.<\/p>\n<p><strong>Health and Environmental Risks<\/strong><\/p>\n<p>5G could act as a multi-way threat by not only impacting privacy but also the health and lifestyle of an individual. Millions of studies link low-level wireless radio frequency of 5G radiation exposures to a long list of adverse biological effects.<\/p>\n<p><strong><em>The World Health Organisation(WHO) <\/em><\/strong>in 2011, classified low radiofrequency radiation as a 2B carcinogen and thus a threat to the world.<\/p>\n<p>Recently, the <strong>National Toxicology Program<\/strong>, the whopping $25 million program also concluded that radiofrequency radiation(currently used by cell phones) can cause cancer.<\/p>\n<p>As 5G falls into the category of utilizing the middle of above and below frequency bands and its capacity utilization of high frequencies has its own implications.<\/p>\n<p>Here is the review of 5G radiation could impact Health and the Environment:<\/p>\n<p><strong><em>Electrosmog<\/em><\/strong> also called electro-magnetic fields (EMF) or microwave radiation or electromagnetic radiation(EMR) refers to human-made radiation which is a pollutant.<\/p>\n<p>People cannot see it or smell it and therefore, it poses a great threat. The high frequencies with short-range intensities create a more intensified denser soup of electrosmog, as shown below:<\/p>\n<table style=\"font-size: 1.1429rem;\" width=\"624\">\n<tbody>\n<tr>\n<td width=\"216\"><strong>Layer<\/strong><\/td>\n<td width=\"200\"><strong>Frequencies<\/strong><\/td>\n<td width=\"208\"><\/td>\n<\/tr>\n<tr>\n<td width=\"216\">Coverage<\/td>\n<td width=\"200\">MHz: 600,700,800,900<\/p>\n<p>GHz: 1.5, 2.1, 2.3, 2.6<\/td>\n<td width=\"208\"><\/td>\n<\/tr>\n<tr>\n<td width=\"216\">Capacity<\/td>\n<td width=\"200\">Europe: 3400-3800(MHz)<\/p>\n<p>China:\u00a0\u00a0 3300-3600(MHz)<\/p>\n<p>USA:\u00a0\u00a0\u00a0\u00a0 3100-3550(MHz)<\/p>\n<p>Japan:\u00a0\u00a0 3600-4200(MHz)<\/td>\n<td width=\"208\"><\/td>\n<\/tr>\n<tr>\n<td width=\"216\">High Throughput<\/td>\n<td width=\"200\">\n<p style=\"text-align: left;\">Europe:\u00a0 24.25-27.5GHz<\/p>\n<p>China:\u00a0\u00a0\u00a0 24.25-27.5GHz<\/p>\n<p>USA :\u00a0\u00a0\u00a0\u00a0 27.5-28.35GHz<\/p>\n<p>Japan:\u00a0\u00a0 27.5-28.28 GHz<\/td>\n<td width=\"208\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Source: Latest on 5G spectrum EMFields<\/p>\n<p><strong>Securing 5G infrastructure<\/strong><\/p>\n<p><strong>\u00a0<\/strong>With the accessibility of connectivity between trillions of <strong>Internet of Things (IoT)<\/strong> devices, it is crucial that government and industry coordinate to ensure that cybersecurity is prioritized within the development of 5G technology. The White House developed the National Strategy to Secure 5G and outlined how the Nation will safeguard 5G infrastructure domestically as well as abroad.<\/p>\n<p>Regardless, the kind of improvements made to encryption and authentication of data in the recent versions of the <strong>Third Generation Partnership Project (3GPP)<\/strong>, many of the cybersecurity threats from the 4G era will persist. A good initiative could occur only when institutions and individuals join hands and work as a collaboration to prevent and mitigate these risks.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>With faster connectivity, ultra-low intensity, 5G will redefine the operations of critical infrastructure activities from the plant floor to the cloud. It will enable large-scale connections and services that can pave the way for smart cities, autonomous vehicles, and other emergent technologies. But these capabilities also make 5G networks an easy target for criminals and foreign diplomats to exploit for valuable information and intelligence and even global disruption and can even raise cold war between the nations. 5G technology is a great achievement to feel grateful until risks associated with it are mitigated and people and organisations feel secure and satisfied. In the end, social benefit matters and not technological advancement.<\/p>\n<p><strong>References<\/strong><\/p>\n<ol>\n<li><a href=\"https:\/\/www.google.com\/url?sa=t&amp;source=web&amp;rct=j&amp;url=https:\/\/www.lexology.com\/library\/detail.aspx%3Fg%3Dbc361bbb-1573-4577-9930-786f625e85eb&amp;ved=2ahUKEwicjY24tPfxAhVeILcAHeYBBfUQFjAKegQIDRAC&amp;usg=AOvVaw1t-f9paNxCxQGUpXxX_PsC\">https:\/\/www.google.com\/url?sa=t&amp;source=web&amp;rct=j&amp;url=https:\/\/www.lexology.com\/library\/detail.aspx%3Fg%3Dbc361bbb-1573-4577-9930-786f625e85eb&amp;ved=2ahUKEwicjY24tPfxAhVeILcAHeYBBfUQFjAKegQIDRAC&amp;usg=AOvVaw1t-f9paNxCxQGUpXxX_PsC<\/a><\/li>\n<li><a style=\"font-size: 1.1429rem;\" href=\"https:\/\/www.google.com\/url?sa=t&amp;source=web&amp;rct=j&amp;url=https:\/\/www.howtogeek.com\/423720\/how-worried-should-you-be-about-the-health-risks-of-5g\/amp\/&amp;ved=2ahUKEwis3fbTtPfxAhWND94KHfHECbs4ChAWMAZ6BAgREAI&amp;usg=AOvVaw2AI46pklGw0TrB9W34ZBUV\">https:\/\/www.google.com\/url?sa=t&amp;source=web&amp;rct=j&amp;url=https:\/\/www.howtogeek.com\/423720\/how-worried-should-you-be-about-the-health-risks-of-5g\/amp\/&amp;ved=2ahUKEwis3fbTtPfxAhWND94KHfHECbs4ChAWMAZ6BAgREAI&amp;usg=AOvVaw2AI46pklGw0TrB9W34ZBUV<\/a><\/li>\n<li><a style=\"font-size: 1.1429rem;\" href=\"https:\/\/www.google.com\/url?sa=t&amp;source=web&amp;rct=j&amp;url=https:\/\/www.bbc.com\/news\/world-europe-48616174.amp&amp;ved=2ahUKEwicjY24tPfxAhVeILcAHeYBBfUQFjADegQIDxAC&amp;usg=AOvVaw3rPQvFqFg7CUEO4W4nbuYw&amp;ampcf=1\">https:\/\/www.google.com\/url?sa=t&amp;source=web&amp;rct=j&amp;url=https:\/\/www.bbc.com\/news\/world-europe-48616174.amp&amp;ved=2ahUKEwicjY24tPfxAhVeILcAHeYBBfUQFjADegQIDxAC&amp;usg=AOvVaw3rPQvFqFg7CUEO4W4nbuYw&amp;ampcf=1<\/a><\/li>\n<li><a style=\"font-size: 1.1429rem;\" href=\"https:\/\/www.google.com\/url?sa=t&amp;source=web&amp;rct=j&amp;url=https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC7405337\/&amp;ved=2ahUKEwicjY24tPfxAhVeILcAHeYBBfUQFjAFegQIHRAC&amp;usg=AOvVaw3Oe4wGWk48NCkYSq0Nnw85\">https:\/\/www.google.com\/url?sa=t&amp;source=web&amp;rct=j&amp;url=https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC7405337\/&amp;ved=2ahUKEwicjY24tPfxAhVeILcAHeYBBfUQFjAFegQIHRAC&amp;usg=AOvVaw3Oe4wGWk48NCkYSq0Nnw85<\/a><\/li>\n<\/ol>\n<p><strong>Blog Posted By: Vaibhav Aggarwal, Student Risk Committee Member\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Starting to run fast, only to reach an end&#8221; 5G or Fifth Generation, is the latest and fastest wireless mobile device technology being initiated in 2019. Today, 5G is expected to enhance the performance, durability, and efficiency of mobile devices with a wide range of new applications and software with build-up of e-services as well. What is 5G? 5G or the fifth-generation technology communication for broadband cellular networks is the fastest network and communication technology for 21st-century people succeeding the 4G network. 5G possesses greater speed but could easily take us to our end. Although it represents an unfathomable standard [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1305,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[44],"tags":[],"class_list":["post-1303","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sector-risks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Risk of 5G - IRM India Affiliate<\/title>\n<meta name=\"description\" content=\"Explore the hidden implications of 5G adoption and why risk mitigation is critical before large-scale deployment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.theirmindia.org\/blog\/risk-of-5g\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk of 5G - IRM India Affiliate\" \/>\n<meta property=\"og:description\" content=\"Explore the hidden implications of 5G adoption and why risk mitigation is critical before large-scale deployment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.theirmindia.org\/blog\/risk-of-5g\/\" \/>\n<meta property=\"og:site_name\" content=\"IRM India Affiliate\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-27T11:49:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-27T12:29:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2021\/07\/5GG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"5 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.theirmindia.org\/blog\/#website\",\"url\":\"https:\/\/www.theirmindia.org\/blog\/\",\"name\":\"IRM India Affiliate\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.theirmindia.org\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.theirmindia.org\/blog\/risk-of-5g\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.theirmindia.org\/blog\/wp-content\/uploads\/2021\/07\/5GG.jpg\",\"width\":612,\"height\":408,\"caption\":\"Risk of 5G\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.theirmindia.org\/blog\/risk-of-5g\/#webpage\",\"url\":\"https:\/\/www.theirmindia.org\/blog\/risk-of-5g\/\",\"name\":\"Risk of 5G - IRM India Affiliate\",\"isPartOf\":{\"@id\":\"https:\/\/www.theirmindia.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.theirmindia.org\/blog\/risk-of-5g\/#primaryimage\"},\"datePublished\":\"2021-07-27T11:49:53+00:00\",\"dateModified\":\"2026-01-27T12:29:20+00:00\",\"author\":{\"@id\":\"https:\/\/www.theirmindia.org\/blog\/#\/schema\/person\/e2c7c644f5ba4e6cd8025627f87412cf\"},\"description\":\"Explore the hidden implications of 5G adoption and why risk mitigation is critical before large-scale deployment.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.theirmindia.org\/blog\/risk-of-5g\/\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.theirmindia.org\/blog\/#\/schema\/person\/e2c7c644f5ba4e6cd8025627f87412cf\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.theirmindia.org\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae9be992eb4ae7b97cc78b5d1c9e2f232db61cbdd191d14a1ee7639e2c4ba1fa?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/www.theirmindia.org\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.theirmindia.org\/blog\/wp-json\/wp\/v2\/posts\/1303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theirmindia.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theirmindia.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theirmindia.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theirmindia.org\/blog\/wp-json\/wp\/v2\/comments?post=1303"}],"version-history":[{"count":3,"href":"https:\/\/www.theirmindia.org\/blog\/wp-json\/wp\/v2\/posts\/1303\/revisions"}],"predecessor-version":[{"id":6036,"href":"https:\/\/www.theirmindia.org\/blog\/wp-json\/wp\/v2\/posts\/1303\/revisions\/6036"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.theirmindia.org\/blog\/wp-json\/wp\/v2\/media\/1305"}],"wp:attachment":[{"href":"https:\/\/www.theirmindia.org\/blog\/wp-json\/wp\/v2\/media?parent=1303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theirmindia.org\/blog\/wp-json\/wp\/v2\/categories?post=1303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theirmindia.org\/blog\/wp-json\/wp\/v2\/tags?post=1303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}