Global 6G
Global 6G
Paul Timmers
T
he security of the fifth generation civil society need to urgently address this Digital layers Cybersecurity measures
(5G) of wireless communication challenge. People Awareness, skills,
is currently making headlines. Apps self-regulation
Governments, including those in the US and 5G security challenges Services Regulation for
across Europe, are worried about control The security of 5G has a wide range of resilience, privacy,
Data sustainability
of the 5G infrastructure and the impact it issues, including various technical ones, but
Devices/IoT Standards, hard certification,
could have on the longer-term sovereignty also those at an organizational, behavioural, architectures
of their countries; some have decided to ban and governance level. As security analysts Network/5G
imposed on suppliers of 5G. Some countries, When states are challenged to strengthen
including Australia and the Netherlands, their strategic autonomy, they have three
mandated the potential exclusion of suppliers options (Fig. 2)8: risk management, strategic
from third countries7. In other cases, telecom partnerships and global common good. The Risk
operators proceeded carefully by limiting US and China could have another option — management
certain suppliers to the RAN part of the namely, absolute digital sovereignty — by
networks and by working with multiple pursuing full independence. This, however,
suppliers to avoid single-supplier control and is not a realistic choice for other countries. Strategic Promoting
lock-in. The implication is that suppliers need A risk-management approach recognizes partnerships common
to be able to interoperate, which may well that the larger part of critical infrastructures good
come with additional costs and needs is run by private sector service providers,
for security assurance. with their technology coming from
international suppliers. In many parts of Norms and values
seem to deliver sufficient guarantees for and energy. Second, money spent on a work of the Future Society initiative and the
sovereignty. Therefore, there is strong technology arms race could instead be OpenAI consortium.
pressure for a strategic-partnership spent on other priorities such as climate What is certainly needed is for the
approach to be pursued in the further change, education or other public services. industry to give governments a seat at the
development of 5G. This could lead to Third, strategic partnerships risk evolving discussion table to engage early with real
fragmentation in the development of 5G, into anti-historical and counter-productive or imagined sovereignty concerns, and
possibly leading to a split into two blocks friend-and-foe thinking. Fourth, strategic to correct the current misallocation of
centred around China and the EU/US, partnerships require governments to be much sovereignty. Industry-driven standardization
which has been feared by the 3GPP10. If more involved in setting specifications for in 5G, 6G and IoT (notably the IoT
this happens, we must anticipate the risk of research and development, standards, and standardization consortium oneM2M), as
5G work breaking up and perhaps even the procurement. To keep up with the rapid pace well as in major global industries that are
demise of 3GPP. of technological development, administrations going digital (such as the automotive and
The same debate will likely affect 6G, for must act and adapt quickly, which may not energy industries), should not wait until
which technical and business modelling work be feasible. Finally, the political focus on governments impose state-centric governance
has already begun in Finland11 and recently strategic partnerships risks proper reflection upon them and define the agenda from a
in China by a government-led initiative12. on the merits of the risk-management and the strategic partnership sovereignty perspective.
This time, governments will not delegate global-common-good approaches being lost. Industry should urgently reflect on renewing
sovereignty decisions to industry. And other the dialogue with governments across the
technologies — IoT in particular — might be Recommendations world, and do so in an inclusive way to
similarly affected. IoT devices will be used in Strategic partnerships between governments avoid planting the seeds for future trade
critical parts of economies and societies, from and industry have their merits and are barriers. They may be able to learn from past
manufacturing to health to public spaces. The becoming the go-to approach. However, in experiences (such as SWIFT in international
expectation is that there will be billions of the interest of global business, and to counter financial transactions13) but will likely need
such internet-connected devices, increasing the downsides of strategic partnerships, to come up with new governance models.
the cyber-attack risk. risk-management and global-common- Without such pro-active engagement, it is
The past risk-management and global- good approaches should also be pursued. likely that there will be no global 6G. ❐
common-good approaches were primarily For example, risk management should be
in the interests of industry because the feasible for the higher layers of the digital Paul Timmers 1,2
sovereignty threats of 5G (or IoT) were not stack through approaches such as sharing 1
Centre for Technology and Global Affairs,
yet clear. Governments are now acting faster of security threat information, joint cyber Department of Politics and International Relations,
than industry or civil society to formulate exercises, and mutual assistance in response University of Oxford, Oxford, UK.
a response to these threats: they are already and recovery. Similarly, there are several areas 2
Rijeka University, Rijeka, Croatia.
taking back control. It is likely that, at least where a global-common-good approach e-mail: paul.timmers@politics.ox.ac.uk
for now, governments will first consider a is preferable, such as for the protection of Published online: 24 January 2020
strategic-partnership approach because it the public core of the internet, a globally https://doi.org/10.1038/s41928-020-0366-3
appears to deliver ‘technological sovereignty’, standardized security architecture for IoT,
which has become a catchphrase for and open AI and distributed security control References
1. Alleven, M. Huawei maintains seat at standards table despite
politicians and policy-makers. Technological (blockchain based, for example) to protect geopolitical woes. Fierce Wireless https://go.nature.com/2QE9UZE
or digital sovereignty measures that are critical infrastructures. (28 February 2019).
already being drawn up refer to common Paradoxically, the global-common- 2. Emmanuel Macron in his own words (English). The Economist
https://go.nature.com/39Y3FYo (7 November 2019).
values and shared views on economy and good approach may actually strengthen 3. Yang, Y., Kynge, J., Wong, S.-L. & Liu, N. Huawei founder predicts
democracy: that is, working with likeminded sovereignty, because it would allow internet of things is next US battle. Financial Times https://
partners. A recent example is the German governments to concentrate scarce go.nature.com/2T9RQrZ (4 July 2019).
4. A guide to 5G network security https://go.nature.com/36GUd9T
(and French-supported) GAIA-X cloud resources on areas where sovereignty (Ericsson, 2018).
initiative. matters a great deal, but where a global 5. EU coordinated risk assessment of the cybersecurity of 5G networks
Strategic partnerships are certainly an common good does not exist, such as https://go.nature.com/39WCWLR (European Commission, 2019).
6. Oversight board of Huawei cyber security evaluation centre https://
important approach and respond to the in defence or at the core of government, go.nature.com/2RmXYdQ (UK Government Cabinet Office, 2019).
trend of geopolitics today. They will bring judiciary and parliament. 7. Besluit van 28 november 2019, houdende nadere regels
enhanced sovereignty, which is projected We should not be naive and believe betreffende de veiligheid en integriteit van openbare elektronische
communicatienetwerken en -diensten (Besluit veiligheid en
externally in order to be respected by other that there are many areas for a global- integriteit telecommunicatie). https://go.nature.com/2tIlcmJ
states (that is, external legitimacy of the common-good approach, given the (Government of the Netherlands, 2019).
state). They will also lead to an increased geopolitical behaviour of the large powers 8. Timmers, P. Mind. Mach. 29, 635–645 (2019).
sense of identity and national pride in the world. Nevertheless, the global 9. Directive (EU) 2016/1148 of the European Parliament and of the
Council of 6 July 2016 Concerning Measures for a High Common
and loyalty, which strengthens internal technology community, civil societies, Level of Security of Network and Information Systems across the
legitimacy, the other important dimension academia and industry play an important Union https://go.nature.com/2Tbwrik (European Union, 2016).
of sovereignty. Still, while strategic role in formulating and advocating global 10. Lucas, L., Standards body warns on US blacklisting of Huawei.
Financial Times https://go.nature.com/2R89IRH (9 June 2019).
partnerships may be possible for certain values and providing the meeting place 11. 6G Flagship https://go.nature.com/37SCGLT (Univ. of Oulu, 2018).
technologies (perhaps for 6G) and can give for exploring the possibilities for global 12. Meiping, G., China launches research and development of 6G
some degree of reassurance on sovereignty, common good in the digital world. technology. CGTN https://go.nature.com/3a7iTKO (6 Nov 2019).
13. Cowhey, P. F. & Aronson, J. D. Digital DNA (Oxford Univ. Press,
the approach has downsides. Examples of where such an approach has 2017).
First, it may become too costly to pursue been applied include the internet, such as
Acknowledgements
strategic partnerships in all key technologies the work of the Global Commission on Opinions expressed are the author’s and should not be
and sectors: 5G, 6G, IoT, quantum computing the Stability of Cyberspace and the World taken to represent the views of the University of Oxford or
and AI, as well as sectors such as defence Wide Web Foundation, and AI, such as the Rijeka University.