6G AND 7G CELLULAR NETWORKS AS MERCENARY CYBER TERRORISM ENABLERS

  • Vladimir Tomašević Faculty of Engineering Management
  • Luka Latinović Faculty of engineering management
Keywords: cyber operations, cyber mercenaries, cyber-attacks, global threat, computational speed, ICT price

Abstract

Research Paper

DOI: https://doi.org/10.37458/ssj.5.3.11

As cyberspace became a new arena in geopolitics, state actors nurtured cyber mercenaries as a novel covert weapon. At the same time, technologies that required significant real-time information flows, such as unmanned aircraft systems, were available to a few entities that state actors could hardly overlook. With the advent of cellular network internet speeds, available to citizens, such as 5G and in the future 6G, and 7G, almost anyone with Internet access will be able to handle a tool that can be a dangerous weapon in the hands of mercenary cyber terrorists, not only in the lease of state but also non-state actors. This paper provides a correlation analysis between ICT price trends and the number of cyber-attacks. It was found that there is a strong positive correlation between the Internet access speed and the number of cyber-attacks, as well as that there is a strong positive correlation between the CPU computing power and the number of cyber-attacks. Although no causal relationship has been established, there is evidence to suggest that the number of cyber mercenary attacks will rise with the continuation of cellular network speed rise and ICT price decline.

References

AI Impacts. Current FLOPS prices, (n.d). Accessed June 19, 2021. https://aiimpacts.org/current-flops-prices/

An, Xueli, Jianjun Wu, Wen Tong, Peiying Zhu, and Yan Chen. “6G Network Architecture Vision.” 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2021. https://doi.org/10.1109/eucnc/6gsummit51104.2021.9482439.

Basford, Philip J., Steven J. Johnston, Colin S. Perkins, Tony Garnock-Jones, Fung Po Tso, Dimitrios Pezaros, Robert D. Mullins, Eiko Yoneki, Jeremy Singer, and Simon J. Cox. “Performance Analysis of Single Board Computer Clusters.” Future Generation Computer Systems 102 (2020): 278–91. https://doi.org/10.1016/j.future.2019.07.040.

Bhat, Jagadeesha R., and Salman A. Alqahtani. “6G Ecosystem: Current Status and Future Perspective.” IEEE Access 9 (2021): 43134–67. https://doi.org/10.1109/access.2021.3054833.

Chen, Shanzhi, Shaohui Sun, Guixian Xu, Xin Su, and Yuemin Cai. “Beam-Space Multiplexing: Practice, Theory, and Trends, from 4G TD-LTE, 5G, to 6G and Beyond.” IEEE Wireless Communications 27, no. 2 (2020): 162–72. https://doi.org/10.1109/mwc.001.1900307.

Di Carlo, Stefano, Alessandro Savino, Gianfranco Michele Maria Politano, Alberto Scionti, and Alfredo Benso. “GPU Cards as a Low-Cost Solution for Efficient and Fast Classification of High Dimensional Gene Expression Datasets.” Control Engineering and Applied Informatics 12, no. 3 (2010): 34–40.

Estifanos Tilahun Mihret and Getamesay Haile. “Future Generations of Mobile Communication Networks.” American Journal of Computer Science and Information Technology 9, no. 2 (2021).

Giordani, Marco, and Michele Zorzi. “Non-Terrestrial Networks in the 6G Era: Challenges and Opportunities.” IEEE Network 35, no. 2 (2021): 244–51. https://doi.org/10.1109/mnet.011.2000493.

Hoschek, Miloslav. " Quantum Security and 6theseG Critical Infrastructure." Serbian Journal of Engineering Management 6, no. 1 (2021): 1-8. https://doi.org/10.5937/SJEM2101001H.

Ilić, Damir, and Tomašević, Vladimir. "The impact of the Nagorno-Karabakh conflict in 2020 on the perception of combat drones." Serbian Journal of Engineering Management 6, no. 1 (2021): 9-21. https://doi.org/10.5937/SJEM2101009I.

Johnston, Steven, and Simon Cox. “The Raspberry Pi: A Technology Disrupter, and The Enabler of Dreams.” Electronics 6, no. 3 (2017): 51. https://doi.org/10.3390/electronics6030051.

Manavski, Svetlin A, and Giorgio Valle. “Cuda Compatible GPU Cards as Efficient Hardware Accelerators for Smith-Waterman Sequence Alignment.” BMC Bioinformatics 9, no. S2 (2008). https://doi.org/10.1186/1471-2105-9-s2-s10.

Maurer, Tim. Cyber Mercenaries: The State, Hackers, and Power. Cambridge, United Kingdom: Cambridge University Press, (2018).

McCallum, John C. “John C. McCallum Information Technology.” Disk Drive prices 1955+, (2021). Accessed September 4, 2021. https://jcmit.net/diskprice.htm.

Mozaffari, Mohammad, Ali Taleb Zadeh Kasgari, Walid Saad, Mehdi Bennis, and Merouane Debbah. “Beyond 5G with Uavs: Foundations of a 3D Wireless Cellular Network.” IEEE Transactions on Wireless Communications 18, no. 1 (2019): 357–72. https://doi.org/10.1109/twc.2018.2879940.

Nielsen, Jakob. “Nielsen Norman Group.” Nielsen's Law of Internet Bandwidth, (2019). Accessed June 7, 2021. https://www.nngroup.com/articles/law-of-bandwidth/

Nye, Joseph S. Soft Power: The Means to Success in World Politics. Knowledge World, 2012.

Porambage, Pawani, Gurkan Gur, Diana Pamela Moya Osorio, Madhusanka Livanage, and Mika Ylianttila. “6G Security Challenges and Potential Solutions.” 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), 2021. https://doi.org/10.1109/eucnc/6gsummit51104.2021.9482609.

Saad, Walid, Mehdi Bennis, and Mingzhe Chen. “A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems.” IEEE Network 34, no. 3 (2020): 134–42. https://doi.org/10.1109/mnet.001.1900287.

Slominski, Aleksander, Vinod Muthusamy, and Vatche Isahagian. “The Future of Computing Is Boring (and That Is Exciting!).” 2019 IEEE International Conference on Cloud Engineering (IC2E), 2019. https://doi.org/10.1109/ic2e.2019.00023.

Sodhro, Ali Hassan, Sandeep Pirbhulal, Zongwei Luo, Khan Muhammad, and Noman Zahid Zahid. “Toward 6G Architecture for Energy-Efficient Communication in IOT-Enabled Smart Automation Systems.” IEEE Internet of Things Journal 8, no. 7 (2021): 5141–48. https://doi.org/10.1109/jiot.2020.3024715.

Zong, Baiqing, Chen Fan, Xiyu Wang, Xiangyang Duan, Baojie Wang, and Jianwei Wang. “6G Technologies: Key Drivers, Core Requirements, System Architectures, and Enabling Technologies.” IEEE Vehicular Technology Magazine 14, no. 3 (2019): 18–27. https://doi.org/10.1109/mvt.2019.2921398.

Zong, Baiqing, Xiangyang Duan, Chen Fan, and Ke Guan. “6G Technologies - Opportunities and Challenges.” 2020 IEEE International Conference on Integrated Circuits, Technologies and Applications (ICTA), 2020. https://doi.org/10.1109/icta50426.2020.9332024.

Chodorek, Agnieszka, Robert R. Chodorek, and Krzysztof Wajda. “Media and Non-Media Webrtc Communication between a Terrestrial Station and a Drone: The Case of a Flying IOT System to Monitor Parking.” 2019 IEEE/ACM 23rd International Symposium on Distributed Simulation and Real Time Applications (DS-RT), 2019. https://doi.org/10.1109/ds-rt47707.2019.8958706.

Widiatmaja, Aji, and Fajria Hasta Rizqi. “The Rise of Non-State Actors in Globalization and Democratization Era: Terrorist Group Versus State Actors.” Jurnal Sentris 2, no. 2 (2020): 47–62. https://doi.org/10.26593/sentris.v2i2.4180.47-62.

Topor, Lev. “Bytes, Bombs and Spies: The Strategic Dimensions of Offensive Cyber Operations.” The RUSI Journal 165, no. 1 (2020): 145–47. https://doi.org/10.1080/03071847.2020.1731150.

Published
2025-01-04