b'HHow does your agency envision balancing the requirement of isolated private 5G networks and the need for connecting devices to commercial networks while roaming? Little:5G was intended to be able to take care of all these open devices that carriers have. Thats why we have the standards. How do I take advantage of using those systems? If theyre following the standards, and we deploy our zero trust and our encryptions, it should technically work on any system. For example, getting authorization to operate a DOD network with critical data on a network in an African nation thats been put in by a foreign manufacturer from China is something thats still evolving. A lot of the focus has been on running private networks, connecting to the government private clouds and extending to MECs [multi-access edge computing]. Youre going to have that in a lot of places because of the mission. For day-to-day base operations, network slicing becomes important. I can set up a slice that carries the military traffic and leave other slices open for the commercial traffic. Right now, you have to tunnel through, and you may not have the capacity. But 5G will provide that.Slicing, encryption, and all these other cybersecurity features that are available will support that capability, but it still remains a work in progress. Ideally there are applications at different levels that you would like to run securely. Wed like to be able to go to a host nation and operate over the same system as we have here in the States. Thats where interoperability comes upnot We like to think aboutonly being able to interconnect, but to do it securely.deploying 5G bubbles There are a lot of functions in edge computing that secure bubbles that areyou can accelerate, while keeping the backhaul smaller. We like to think about deploying 5G bubblessecure supporting the UE and canbubbles that are supporting the UE and can move with the troops. Then my backhaul can be done other ways, move with the troops.whether its through satellite, a commercial line or some other means. You can connect your base station - Jody Little to fiber optic somewhere. For tactical purposes, you have to allow for different contingencies.Duchak: The 5G ecosystem runs the risk of exposing DOD systems and networks to malicious security vulnerabilities just as every other new technology weve embraced. It can, however, also offer enhanced services, everything from improved wireless speeds to sharing large amounts of data in real time. With that risk and reward understood, we are looking into several mitigation strategies, including how we can architect topologies based on the two deployment formats. We also envision balancing the requirement through service-level agreements signed between private 5G networks and commercial 5G networks, so that devices will be able to roam between the private and commercial networks based on the Securing the Nations Network|Page 10'