My latest opinion articles

Securing Society 5.0 Introduction

Securing Society 5.0 – Overcoming the hidden threats in society’s greatest evolutionary leap

A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical space." The fifth evolution of the society, enabled by the fifth generation of cellular networking and...
5G Cybersecurity Safety

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to...
Edge Computing Fog

Will Telcos Lose the Edge Computing Battle as Well?

For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as a formless abstraction "up there" when, in fact, the cloud is rooted in the ground. Or the seabed. Despite rapid advances in satellite connection, almost all...
5G COVID-19

What COVID-19 Taught Us About the Need for 5G

There are many adjectives that could be used to describe the global outbreak of COVID-19, but perhaps the simplest might be: fast. The disease has spread quicker than most people can mentally digest. By nature, humans process linearly. This pandemic has been a lesson in exponential thinking for the common...
5G Virtualization

Unlocking the Future – Why Virtualization Is the Key to 5G

Depending on who you speak to, 5G is either humankind’s greatest imminent blessing or its greatest imminent curse. Still in its infancy, and not yet commercially standardized, this technology has already been the most polarizing advancement we have ever seen in communication. Consumers worldwide are captivated by promises of super-fast...

My latest technology articles

Open RAN Security

Open RAN May Be the Future of 5G, but Can We Keep It Secure?

It's been a year of contradictions for the telecommunications industry. Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic, with a slowdown in global 5G roll-outs being a notable result. Geopolitical conflicts have continued to muddy the market, with governments playing a more active...
5G TSN Manufacturing

5G in Manufacturing – 5G and Time Sensitive Networking (TSN) for Industrial Automation

In the recent report by IHS Markit - "The 5G Economy - How 5G will contribute to the global economy" - researchers claimed that manufacturing will garner almost $4.7 trillion in sales enablement by 2035. Or 36% of the $13.2 trillion total opportunity of 5G by 2035. Manufacturing will...
5G Cybersecurity Safety

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to...
5G SBA IMS MEC Architecture

Introduction to 5G Core Service-Based Architecture (SBA) Components

The interest in 5G and mIoT is exploding. It's exciting to see so many IT and cybersecurity professionals in my network trying to learn more about 5G and related technologies. In addition to my usual articles about the societal impacts of these innovations, I'll start a series of articles introducing...
LoRaWAN IoT Security

LoRaWAN Security 101 (Non-5G IoT Connectivity Options)

I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G will revolutionize our society, become the most critical of critical infrastructures and about security threats with 5G. I see 5G, with its low latency, high...
5G Critical Infrastructure

5G Critical Infrastructure – the Most Critical of All

Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new one, a technology Cold War between the United States and China. This time, instead of a ‘red under the bed’, the US government has declared there is one at the back door. It accuses Chinese technology companies of deliberately building vulnerabilities into their tech, allowing the Chinese to access and control the 5G critical infrastructure, and through it the connected devices and machinery at will. Headlines are dominated by the case against Huawei, and debate continues to rage about the legitimacy of the US’s claims. Are these well-founded or part of a more comprehensive assault on China’s growing global technology dominance? Regardless, the battle lines are...
AI and 5G

Digital Double Helix: Why the Fates of 5G and AI are Intertwined

In 2013, George F. Young and colleagues completed a fascinating study into the science behind...
5G Network Slicing

5G Network Slicing Technology: A Primer

Hyped as the technology that will transform the world, 5G is moving past the buzzword...
5G 3GPP Release Timeline

Introduction to 3GPP and 3GPP 5G Releases 15, 16 and 17

In a major milestone for 5G, 3GPP finalized the Release 16 in July - its...
5G Health Concerns

5G Health Risks – Health, Wealth and Tin Foil Hats

The rollout of 5G is one of the most anticipated events in humanity’s technological history....
NFC Cybersecurity

NFC Security 101 (Non-5G IoT Connectivity Options)

NFC is a short range two-way wireless communication technology that enables simple and secure communication...
5G World Economy Society

How 5G Will Transform Economy and Society

Since the dawn of the 21st Century, the ways in which people and organizations that...
Leadership AI Book

The Future of Leadership in the Age of AI – Preface

Today’s business leadership face a conundrum. Artificial Intelligence (AI) unquestionably will play an enormous role in the future of their organizations and the business environment in which they operate, but what effects will it have? Prognosticators have wildly different visions of the future it will create, ranging from causing the extinction of humanity to ushering in a Golden Age in which machines provide all humanity’s needs and free us to focus on altruistic service to one another and the advancement of human culture. Both of these most commonly heard predictions are based on assumptions that lead to wild speculation that piques the interest of media. Dramatic visions of the future draw eyeballs to websites and sell magazines and newspapers. What little analysis we have seen on the issue that doesn’t rush...
AI Future Workforce

AI and The Great Workforce Skill Set Shift

Whether AI and the technologies it enables will reach their full potential depends on the...
Leadership AI Book

The Future of Leadership in the Age of AI – Preface

Today’s business leadership face a conundrum. Artificial Intelligence (AI) unquestionably will play an enormous role...
Canada 5G AI

5G and AI – Getting Smart About 5G and AI in Canada

Canada has been investing in machine learning and artificial intelligence (AI) for longer than most...
Innovation in Canada

Innovation in Canada – What’s Not Working and What Is

Canada’s rankings in innovation has lagged that of other peer nations for decades despite government...
AI and 5G Double-edged Sword

AI and 5G: AI at the 5G Core – A Double-Edged Sword

If you've ever been to an expensive restaurant and ordered a familiar dish like, say,...
AI Future

AI Is Neither the End of Civilization nor the Beginning of Nirvana

Where AI, robots, IoT and the so-called Fourth Industrial Revolution are taking us, and how...
Society 5.0 and 5G

Will 5G and Society 5.0 Mark a New Era in Human...

In their outstanding book, Wicked and Wise, Alan Watkins and Ken Wilber look at some of the most pressing ‘wicked problems’ facing the human race. ‘Wicked problems,’ they suggest, are difficult to define, but they are essentially unsolvable in the usual scientific sense. The authors go on: wicked problems, such as climate change, are multi-dimensional, have multiple causes, multiple stakeholders, multiple symptoms and multiple solutions. They are by definition complex and difficult to process. Crucially, they are created or exacerbated by people. Our species has proved capable of producing challenges of unfathomable difficulty. We may, however, also prove capable of developing the novel thinking and technology required to overcome them. Society 5.0 is the vision of such a future, in which humans and machines “co-create” the solutions to societal problems by integrating cyberspace...
Canada Critical Infrastructure

Canadian Critical Infrastructure Cyber Protection

Targeted cyberattacks against critical infrastructure (CI) are increasing on a global scale. Critical systems are...
5G World Economy Society

How 5G Will Transform Economy and Society

Since the dawn of the 21st Century, the ways in which people and organizations that...
AI Three Futures

Three Views of Artificial Intelligence (AI) Future

If you’ve read the many predictions about the future of AI, you’ve likely found them...
Cyber-Kinetic Security Railway

Growing Cyber-Kinetic Threats to Railway Systems

Cybersecuring railway systems from potential attackers must become paramount in the digitization that those systems...
Smart Cities Privacy

A Smarter Privacy – The Future of Privacy in our Smart Cities – 1

Part One: A Tale of Smart Cities There has been a lot of talk about 5G...
Cyber-Kinetic Attacks History

History of Cyber-Kinetic Incidents and Research

The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen....
Cyber-Kinetic Security, IoT Security, OT Security

The World of Cyber-Physical Systems & Rising Cyber-Kinetic Risks

We live in a world in which the way we observe and control it is radically changing. Increasingly, we interact with physical objects through the filter of what computational systems embedded in them tell us, and we adjust them based on what those systems relate. We do this on our phones, in our cars, in our homes, in our factories and, increasingly, in our cities. Physical objects are so interconnected that we simply take those connections for granted, as if being able to unlock your car by pushing a button on your key fob, unlocking it with your phone or even by walking toward it is the way car locks always worked. This interconnectedness offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations....
IEMI

Intentional Electromagnetic Interference (IEMI) IoT Threat

As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks...
5G Security Privacy

5G Security & Privacy Challenges

Don’t let the “5G” in the title confuse you. This post is not only about...
Cyber-Kinetic Timeline

Timeline of Key Cyber-Kinetic Attacks, Incidents & Research

Below is a timeline of key historic cyber-kinetic attacks, system malfunctions and key researcher demos...
Security Standards Regulations Guidelines

Emerging Tech Security Guidelines, Frameworks, Standards

Below is my attempt to list of all published 5G, IoT and "Smart Everything"-related security...
Smart Home Wireless Connectivity

Smart Home / Smart Building Connectivity Options and Their Cybersecurity

In a recent session on smart building cybersecurity, a student cheekily asked me "How did...
Cyber-Kinetic Threat

Our Smart Future and the Threat of Cyber-Kinetic Attacks

A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems...
Blockchain Security

Blockchain Security

Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global economy and financial services FinTech and Decentralized Finance (DeFi) solutions. Blockchain is a set of technologies that through distributed computing and mathematics can now deliver Trust to an enterprise, consumer or financial institution remotely and without human intervention. Blockchain continues to improve at a torrid pace, driven first by Moore’s law and second by extraordinary advances in software and connectivity. As technology advances, the rapidly increasing number of use cases being developed on top of blockchain are illustrating the transformative potential of the technology to financial services, broader business, economy, and even society. Blockchain application in the financial services industry has the potential to transform the way value is transferred, information is shared and business logic...
Security Standards Regulations Guidelines

Emerging Tech Security Guidelines, Frameworks, Standards

Below is my attempt to list of all published 5G, IoT and "Smart Everything"-related security...
Hong Kong Fintech

How Hong Kong’s FinTech sector is developing

The global financial services sector is accelerating its transformation in response to changing values and...
Blockchain Security

Blockchain Security

Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global...
Smart City Chip

Technology Trends for 2019 – More Amazing Than Flying Cars

Technologies that could change the world have been a popular topic for the past half...
Blockchain Cybersecurity

Cybersecurity of Blockchain & Blockchain for Cybersecurity

You may have heard, over the last year or two, about the new technological miracle...
Diversity Uncomfortable

Diversity – The Benefits of Being Uncomfortable

The topic of diversity is not one that most people find in their comfort zone. As I wrote in a previous article on diversity, increasing diversity often engenders frustration in those tasked with accomplishing it, and inspires eye rolls among diversity-fatigued employees who have heard countless reports on management’s diversity goals, but remain unconvinced of diversity’s value. Can anything be done to make diversity less of an uncomfortable topic? The answer is no. Nothing about diversity will ever make it into the general business population’s comfort zone. I say that not out of cynicism, but out of practicality. At its root, diversity is uncomfortable. But, surprisingly, the discomfort it creates is what makes it so valuable. Implicit biases, perceptions and reality A 2016 Harvard Business Review article that brought together some of the most advanced research...
Diversity Failings

Can we Rescue Diversity from its own Failings?

Don’t expect this to be either of the typical articles about diversity. I’m here not...
5G COVID-19

What COVID-19 Taught Us About the Need for 5G

There are many adjectives that could be used to describe the global outbreak of COVID-19,...
AI Future

AI Is Neither the End of Civilization nor the Beginning of Nirvana

Where AI, robots, IoT and the so-called Fourth Industrial Revolution are taking us, and how...
Interim Manager

How can you get the Most out of Interim Managers?

Are you hiring and using interim managers wisely? Why is it that some companies attain...
Being Interim Manager

Do you Have What it Takes to be an Interim Manager?

Businesses, facing an ever-increasing variety of complex problems, are in desperate need of good interim...
What is interim management

What is Interim Management?

When crisis strikes your business, what can you do? As you try to pick up...
AI Fake News

AI-Exacerbated Disinformation and Cyber Threats to Democracy

Recent events have confirmed that the cyber realm can be used to disrupt democracies as surely as it can destabilize dictatorships. Weaponization of information and malicious dissemination through social media pushes citizens into polarized echo chambers and pull at the social fabric of a country. Present technologies enhanced by current and upcoming Artificial Intelligence (AI) capabilities, could greatly exacerbate disinformation and other cyber threats to democracy. Robert Kagan in his recent Post essay, “The strongmen strike back,” insightfully states: What we used to regard as the inevitable progress toward democracy, driven by economics and science, is being turned on its head. In non-liberal societies, economics and science are leading toward the perfection of dictatorship. Kagan refers to state surveillance and social media control and manipulation as technological mechanisms of social control....
AI Fake News

AI-Exacerbated Disinformation and Cyber Threats to Democracy

Recent events have confirmed that the cyber realm can be used to disrupt democracies as...
Social Engineering

Social Engineering – Greatest Information Security Risk

Social engineering doesn't have to be just a supporting process to obtain system access; it...
Zombification Cybersecurity Social Engineering

Human Zombification as an Information Security Threat

Human Zombification as an Information Security Threat – Differences in Information Security Concepts Between Euro-Atlantic...
5G Health Concerns

5G Health Risks – Health, Wealth and Tin Foil Hats

The rollout of 5G is one of the most anticipated events in humanity’s technological history....
FinCrime Cyber

Why Financial Crime and Cybersecurity Need to Team up

The worlds of financial crime and cybercrime are colliding, converging into one. The biggest threat to businesses globally is the new cyber-enabled financial crime. Yet businesses and even financial institutions tasked with protecting our money continue to fight this combined threat with multiple separate defense systems and multiple separate defense teams. The situation is like a military leader trying to fight different enemies on different fronts. While those enemies remain in different fronts, it makes sense to send separate defense forces against them, each focused on fighting only the enemy assigned to it. But what if those enemies merge and launch joint attacks? A smart military leader would merge his forces against the joint attacks. That’s not happening in financial institutions, though. Rather than having financial crime and cybercrime teams work...
AML CTF Value

Value of Anti-Money Laundering & Counter-Terrorism Financing

(Updated 2016) Anti–Money Laundering (AML) and Counter Terrorism Funding (CTF) are not the most popular subjects...
Money Laundering

Fighting Money Laundering at the Placement Stage

One key to fighting money laundering is understanding its process and the vulnerabilities in each...
Money Laundering Terrorism Financing

Money Laundering and Terrorism Financing processes

Money laundering and terrorism funding both have devastating effects. While acts of terrorism are more...
FinCrime Cyber

Why Financial Crime and Cybersecurity Need to Team up

The worlds of financial crime and cybercrime are colliding, converging into one. The biggest threat...
Money Laundering

Combatting Money Laundering & Terrorist Financing

Terrorist funding detection has been practiced the same way as money laundering detection ever since...
AML KYC CDD

Understanding Know Your Customer & Customer Due Diligence

Anti–Money Laundering (AML) and Counter Terrorist Funding (CTF) efforts involve the little-known world of Know...
Innovation in Canada

Innovation in Canada – What’s Not Working and What Is

Canada’s rankings in innovation has lagged that of other peer nations for decades despite government efforts to address this issue. Considering its success in developing research programs at its universities, its mediocre rankings overall in technology development is disappointing. Those programs alone have not been enough to translate into entrepreneurial innovation. A 2017 C.D. Howe Institute study points out that, even though Canadians have been at the forefront of breakthroughs in emerging technologies, in many cases, the chief beneficiaries of those breakthroughs have been other nations’ economies. Canada needs to take a stronger role in building an environment in which Canadian know-how spurs Canadian business growth. Causes for concern According to a 2017 PwC global survey, Canadian companies stand significantly ahead of their global counterparts in having a dedicated team for digital...
Canada 5G CA5G

Collaboration: The Unexpected Key to Success in Canada’s 5G

In 1967, Lynn Margulis, a young biologist, published a paper that challenged more than a...
Innovation in Canada

Innovation in Canada – What’s Not Working and What Is

Canada’s rankings in innovation has lagged that of other peer nations for decades despite government...
Canada 5G AI

5G and AI – Getting Smart About 5G and AI in Canada

Canada has been investing in machine learning and artificial intelligence (AI) for longer than most...
Canada Innovation Zones AI 5G

5G Innovation Zones in Canada for Launching AI and 5G in Tandem

In my previous post I argued that if Canada wants to succeed with its AI-focused...
Canada Critical Infrastructure

Canadian Critical Infrastructure Cyber Protection

Targeted cyberattacks against critical infrastructure (CI) are increasing on a global scale. Critical systems are...
smart cities privacy

Importance of Privacy for Smart Cities and IoT

From The Jetsons to Blade Runner, to Back to the Future, to A.I. to The 5th Element, popular culture has long been fascinated by what the future would look like for ordinary people. In these films and countless others, humans of the future are shown engaging with technology that speaks to them, cooks for them, asks them how their day was and connects them with the outside world in a seamless and intuitive way. These are all examples of what we now regard as smart homes and smart cities – living spaces optimized by devices connected through the Internet of Things (IoT), intelligently responding to our needs. These homes are a natural extension of the smart capabilities that most of us are already carrying around with us in our wearables...
Smart City Privacy

Is Open Living, Smart Living? – Future of Privacy in Smart Cities 2

In part one of this short series on smart cities and privacy, I looked at...
Smart Cities

Whispering Buildings and Things That Listen to Us in the Night

How important privacy is for building smart cities and embracing the IoT In the 60s cartoon...
Smart Cities Privacy

A Smarter Privacy – The Future of Privacy in our Smart Cities – 1

Part One: A Tale of Smart Cities There has been a lot of talk about 5G...
5G Cybersecurity Safety

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would...
5G Connectivity Security

5G Network: A Quantum Leap in Connectivity – and Cyber Threats

The timeline of human history is marked by inflection points of major technological advancement. The...
Smart City Privacy

Getting Street Smart – The Inherent Privacy Risks of Smart Cities

Humans are moving to cities at an unprecedented rate. Today 55% of the world’s population...
5G Cybersecurity Safety

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to grant him access to a life of greater meaning and satisfaction. As technological evolution leads to concomitant advances in medical science, we are seeing more and more examples of humans who are integrating devices and sensors into their biological makeup. For some, like those part of the growing "transhumanist" movement, this is a means of artistic expression or exploration of human potential. For others, it is a solution to a medical problem. Either way, it represents the most vivid and personal...
Cyber-Kinetic Attacks History

History of Cyber-Kinetic Incidents and Research

The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen....
NFC Cybersecurity

NFC Security 101 (Non-5G IoT Connectivity Options)

NFC is a short range two-way wireless communication technology that enables simple and secure communication...
Huawei ERNW 5G Source Code Analysis

Does the positive review of Huawei UDG source code quality mean that Huawei 5G is secure and reliable?

No, no it doesn’t. Huawei's code might as well be extremely secure. Their code is...
IoT Cybersecurity Framework Government

5G Making It More Important for Governments to Lead IoT Security

The human brain is programmed to keep us safe and secure. Yes, we are separated...
Cyber-Kinetic

When Hackers Threaten your Life – Cyber-Kinetic Attacks Intro

The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful...
5G Critical Infrastructure

5G Critical Infrastructure – the Most Critical of All

Not even 30 years separate us from the end of the Cold War. Yet, we...
Edge Computing Fog

Will Telcos Lose the Edge Computing Battle as Well?

For many end-users of today's communications technology, the cloud is a somewhat mystical concept, a digital equivalent of aether. Most think of it as a formless abstraction "up there" when, in fact, the cloud is rooted in the ground. Or the seabed. Despite rapid advances in satellite connection, almost all intercontinental data transfer that takes place every second of the day occurs via hundreds of thousands of miles of underwater cables. Reading a map of these submarine cables is like viewing a tapestry of international telecommunication. It is perhaps strange to think that the email you just sent to your colleague in Africa traveled below the Atlantic Ocean. It's an oddly analogue image in an online world. Yet, the digital capability that those cables unleash is increasingly the stuff of science...
fog iot security telcos

How Telecom Operators Can Strike Back with IoT, Fog & Cyber

Telecom operators sat back as the new over-the-top (OTT) service providers, internet and tech companies...
5G SBA IMS MEC Architecture

Introduction to 5G Core Service-Based Architecture (SBA) Components

The interest in 5G and mIoT is exploding. It's exciting to see so many IT...
oran lexicon

The Open RAN Lexicon You Need

The telecoms and digital technologies sectors are notoriously jargonised. Eavesdrop on any conversation at an...
5G Cell Tower

5G Policy and Regulatory Checklist

Ultra high speed, high quality 5G networks are expected to provide the connectivity required for...
5G Business

Telcos Should Take Risks to Jumpstart the 5G Ecosystem

5G connectivity burst onto the world stage at last year’s Winter Olympics in Seoul, South...
5G Network Slicing

5G Network Slicing Technology: A Primer

Hyped as the technology that will transform the world, 5G is moving past the buzzword...
Copy link
Powered by Social Snap