Oral Statement

Dear Congress

 In this period of political differences, the threat that Russia is controlling our Electricity grid system and China has a backchannel assess to our gas systems questions our integrity and abilities in making the appropriate legislative framework. There have also been reports that the United States can penetrate most system globally, however, the hunter has become the hunted.  

Don't use plagiarized sources. Get Your Custom Essay on
Oral Statement
Just from $13/Page
Order Essay

 I am much concerned with the 5G problem involving foreign companies Huawei and ZTE. These two companies play a crucial role in revolutionizing the development of 5G; however, this is a litmus to this house on the nature of future regulation and policies; approaches that would help in improving 5G. My engineering team notifies me that 5G is an unprecedented change given that it replaces hardware components networks virtualizing the network using the internet protocol.

 The 116th Congress is already in pursuit of S.1625 – the United States 5G Leadership Act of 2019, currently sponsored by Sen. Wicker, Roger F. R-MS (Congress.gov, 2019). However, the act might not materialize as Chinese Huawei is already laying 5 infrastructure. Other relative bills such as Secure 5G and Beyond Act (S. 893) provided by Vice Chairman Mark Warner (D-VA) and The Internet in Every Respect Act (E-Frontier Act) which prohibits nationalization of 5G networks. Meanwhile, the house needs to consider Secure 5G and Beyond Act that requires the President to accord 5G security for infrastructure and technology. 

 The house needs to consider Federal Strategy to develop American standard 5G technology, assisting allies and strategic partners towards achieving relative goals, especially those surrounding security. The security approach should be heavily considered since China and Russia would be taking advantage of hardware vulnerability. Their acts are believed to be monitoring the American people recording their data without consent. As such, implementing this bill would help improve coordination and implementation of the Federal Communications Commission, which is bettered by the Department of Homeland Security. Meanwhile, this house needs to request the senate to better the E-Frontier Act formally introduced by Senators Ted Cruz and Cortez Masto (D-NV) (Cruz.senate.gov, 2019). However, towards improving the act, the E-Frontier Act would require the Comptroller to conduct a study and submit verifications to Congress.

 Besides, in regulating and presenting a hostile free infrastructure development, this house should allow China to roll out its 5G network also buy from the network. Notwithstanding, it should change its strategy in resourcing Google and iOS resources providing standardization of resources. However, America should rebrand 5G by adding features that China did not consider or oversee. The 5G network will help in hosting critical functions for American organizations such as military, smart electric grids, autonomous vehicles, intelligent medicine, the United States should strongly consider having its 5G standards.  

 Considering the possible threats towards 5G manipulation of equipment, and possible cybersecurity issues that might arise, it is vital to continuously send updates to the equipment’s, negating fully on front end security measures, while focusing on methodologies of handling equipment vulnerabilities. This house should consider functions of the core network, improving AI complexity as well as ensuring network resource allocation. It is important to manipulate algorithms ensuring that the system is properly protected for possible incidental attacks.

 Besides, this house has never considered the essence of Front Camera, and whether the Bios system would hack this Selfie tool to capture visual appearances. Sadly, most devices are currently made in China, meaning American protection against foreign surveillance would suffer vulnerability. With the increased anti-China thoughts in the United States, the front camera should be fully regulated and devices required meeting compliance standards. Upon investigation, China is already monitoring and rating its citizens (Diamond & Mitchell, 2019). Citizens who are hypercritical of government policies are rated poorly denied some of the key government services. China interests in controlling the electronic devices market cripple the overall ability to develop United States regulation. As such, this problem should be approached in a wider angle, where United States should further research on technologies that would help in regulating the application of AI system to limit the possible monitoring of United States citizens.

 Earlier, I suggested the need for a better Operating System. Already, the United States shares most of the operating systems especially those with Unix Kernel, Windows and iOS. House, these OSs do have their security preferences, however, their vulnerability cannot be questioned, their code can easily be reverse-engineered. Project monitoring and tunnel control system should look forward towards increasing safety and efficiency while drawing the dramatic pace becoming complex and integrated into other systems. Developing a strong system requires resources, standards, applications, protocols and even devices.  

 I personally like Peter Buttigieg approach during last week Democrats Presidential Debates Klein (2019), where he called for a technology upgrades to next generations. He noticed that China is successfully triumphing over the United States given that it betters what the US has, by using the HR muscle. Nevertheless, considering Elizabeth Warren approach that corporations have sold American business to East Asia, the journey to the custom-made operating system might be challenging but it is a formidable risk. 

 Lastly, given cyber-security breaches are based fully on vulnerabilities that affect the security posture, it is vital for this house to consider the following as part of the notes in improving the 5G, Front Camera and Operating Systems regulations

  •  Increase and reinforce general cybersecurity awareness permitting sanctioned stakeholders and users to work around the system. 
  •  Operate within the IT organization infrastructure, while increasing awareness for the unique and diverse characteristics of the cyber-security, programming and network security should be taught from Grade 8 school. 
  •  Improving the relentless approach while implementing and enforcing strong password policies, this further include NIST while extending digital identity guidelines 
  •  Federal and state administration should familiarizes, and constantly monitor best practices guidelines presenting resources for foundational efforts, while ensuring that a closed-loop approach is applied towards administrating policy, risks management assurances, protecting the security culture and enhancing risks/ vulnerabilities 

 Conclusively, this country became the 20th and the 21st century giant for doing the hard things, where other nations had to follow. Currently, China is targeting its human resource potential to exploit our technology. As such, United States need to mechanize its technology to improve its manufacturing systems especially acknowledging the potentiality of future technology such as Quantum physics. The state of current and future policies and regulations depends fully on the legislative initiatives that will be engaged to enhance corporate activities and transactions. The focus should be strengthened towards stakeholders commitment for future technology. House, Quantum Technology is already in the Horizon. If China or Russia implements it is first, then it will define technologies of and the economies of the 22nd century, fully locking us out towards this migration. Either way, Buttigieg ideals that the time has come when Americans need to lead the change from digital technology makes significant knowledge. Ideas should be strengthened to allow stronger incorporation of ideas while ensuring that the legislation is engaged towards developing knowledge system.


Klein, E. (2019). Pete Buttigieg had the most important answer at the Democratic debate. Retrieved 8 August 2019, from https://www.vox.com/policy-and-politics/2019/7/30/20748078/pete-buttigieg-democratic-debate-cnn

Diamond, L., & Mitchell, A. (2019). China’s Surveillance State Should Scare Everyone. Retrieved 8 August 2019, from https://www.theatlantic.com/international/archive/2018/02/china-surveillance/552203/

Cruz.senate.gov. (2019). Sens. Cruz, Cortez Masto Reintroduce E-FRONTIER Act | Ted Cruz | U.S. Senator for Texas. Retrieved 8 August 2019, from https://www.cruz.senate.gov/?p=press_release&id=4390

Congress.gov. (2019). S.1625 – 116th Congress (2019-2020): United States 5G Leadership Act of 2019. Retrieved 8 August 2019, from https://www.congress.gov/bill/116th-congress/senate-bill/1625

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 20% with the discount code LEMONADE