Ebook Securing 5G and Evolving Architectures 1St Edition Nair Online PDF All Chapter

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 69

Securing 5G and Evolving

Architectures 1st Edition Nair


Visit to download the full and correct content document:
https://ebookmeta.com/product/securing-5g-and-evolving-architectures-1st-edition-nai
r/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Analysis and Design of Next Generation Software


Architectures 5G IoT Blockchain and Quantum Computing
1st Edition Arthur M. Langer.

https://ebookmeta.com/product/analysis-and-design-of-next-
generation-software-architectures-5g-iot-blockchain-and-quantum-
computing-1st-edition-arthur-m-langer/

Learning by Design 1st Edition Prakash Nair

https://ebookmeta.com/product/learning-by-design-1st-edition-
prakash-nair/

5g and 6g Communication Technologies 1st Edition Zoran


Gacovski

https://ebookmeta.com/product/5g-and-6g-communication-
technologies-1st-edition-zoran-gacovski/

Securing Docker 1st Edition Scott Gallagher

https://ebookmeta.com/product/securing-docker-1st-edition-scott-
gallagher/
Calculus of one variable 2nd Edition M Thamban Nair

https://ebookmeta.com/product/calculus-of-one-variable-2nd-
edition-m-thamban-nair/

5G Mobile Communications Wei Xiang

https://ebookmeta.com/product/5g-mobile-communications-wei-xiang/

Designing Switch/Routers: Architectures and


Applications 1st Edition James Aweya

https://ebookmeta.com/product/designing-switch-routers-
architectures-and-applications-1st-edition-james-aweya/

Resilient Control Architectures and Power Systems 1st


Edition Craig Rieger

https://ebookmeta.com/product/resilient-control-architectures-
and-power-systems-1st-edition-craig-rieger/

Future Trends in 5G and 6G: Challenges, Architecture,


and Applications 1st Edition Ghonge

https://ebookmeta.com/product/future-trends-
in-5g-and-6g-challenges-architecture-and-applications-1st-
edition-ghonge/
About This eBook
ePUB is an open, industry-standard format for eBooks. However,
support of ePUB and its many features varies across reading devices
and applications. Use your device or app settings to customize the
presentation to your liking. Settings that you can customize often
include font, font size, single or double column, landscape or portrait
mode, and figures that you can click or tap to enlarge. For additional
information about the settings and features on your reading device
or app, visit the device manufacturer’s Web site.
Many titles include programming code or configuration examples. To
optimize the presentation of these elements, view the eBook in
single-column, landscape mode and adjust the font size to the
smallest setting. In addition to presenting code and configurations in
the reflowable text format, we have included images of the code
that mimic the presentation found in the print book; therefore,
where the reflowable format may compromise the presentation of
the code listing, you will see a “Click here to view code image” link.
Click the link to view the print-fidelity code image. To return to the
previous page viewed, click the Back button on your device or app.
Securing 5G and Evolving
Architectures

Pramod Nair

Boston • Columbus • New York • San Francisco • Amsterdam • Cape


Town • Dubai •
London • Madrid • Milan • Munich • Paris • Montreal • Toronto •
Delhi • Mexico City •
São Paulo • Sydney • Hong Kong • Seoul • Singapore • Taipei •
Tokyo
Many of the designations used by manufacturers and sellers to
distinguish their products are claimed as trademarks. Where those
designations appear in this book, and the publisher was aware of a
trademark claim, the designations have been printed with initial
capital letters or in all capitals.
The author and publisher have taken care in the preparation of this
book, but make no expressed or implied warranty of any kind and
assume no responsibility for errors or omissions. No liability is
assumed for incidental or consequential damages in connection with
or arising out of the use of the information or programs contained
herein.
For information about buying this title in bulk quantities, or for
special sales opportunities (which may include electronic versions;
custom cover designs; and content particular to your business,
training goals, marketing focus, or branding interests), please
contact our corporate sales department at
corpsales@pearsoned.com or (800) 382-3419.
For government sales inquiries, please contact
governmentsales@pearsoned.com.
For questions about sales outside the U.S., please contact
intlcs@pearson.com.
Visit us on the Web: informit.com/aw
Library of Congress Control Number: 2021917555
Copyright © 2022 Pearson Education, Inc.
All rights reserved. This publication is protected by copyright, and
permission must be obtained from the publisher prior to any
prohibited reproduction, storage in a retrieval system, or
transmission in any form or by any means, electronic, mechanical,
photocopying, recording, or likewise. For information regarding
permissions, request forms, and the appropriate contacts within the
Pearson Education Global Rights & Permissions Department, please
visit www.pearson.com/permissions.
No patent liability is assumed with respect to the use of the
information contained herein. Although every precaution has been
taken in the preparation of this book, the publisher and author
assume no responsibility for errors or omissions. Nor is any liability
assumed for damages resulting from the use of the information
contained herein.
ISBN-13: 978-0-13-745793-9
ISBN-10: 0-13-745793-6
ScoutAutomatedPrintCode

Vice President, Editorial


Mark Taub

Director, ITP Product Management


Brett Bartow

Executive Editor
Nancy Davis

Development Editor
Christopher A. Cleveland

Managing Editor
Sandra Schroeder

Project Editor
Mandie Frank

Copy Editor
Bart Reed

Indexer
Erika Millen

Proofreader
Donna Mulder

Technical Reviewers
Dave HucabyKeith O’Brien

Editorial Assistant
Cindy Teeters

Designer
Chuti Prasertsith

Compositor
codeMantra

Graphics
codeMantra
Pearson’s Commitment to Diversity,
Equity, and Inclusion
Pearson is dedicated to creating bias-free content that reflects the
diversity of all learners. We embrace the many dimensions of
diversity, including but not limited to race, ethnicity, gender,
socioeconomic status, ability, age, sexual orientation, and religious
or political beliefs.
Education is a powerful force for equity and change in our world. It
has the potential to deliver opportunities that improve lives and
enable economic mobility. As we work with authors to create content
for every product and service, we acknowledge our responsibility to
demonstrate inclusivity and incorporate diverse scholarship so that
everyone can achieve their potential through learning. As the world’s
leading learning company, we have a duty to help drive change and
live up to our purpose to help more people create a better life for
themselves and to create a better world.
Our ambition is to purposefully contribute to a world where:
Everyone has an equitable and lifelong opportunity to succeed
through learning.
Our educational products and services are inclusive and
represent the rich diversity of learners.
Our educational content accurately reflects the histories and
experiences of the learners we serve.
Our educational content prompts deeper discussions with
learners and motivates them to expand their own learning (and
worldview).

While we work hard to present unbiased content, we want to hear


from you about any concerns or needs with this Pearson product so
that we can investigate and address them.

Please contact us with concerns about any potential bias at


https://www.pearson.com/report-bias.html.
Credits
FIGUR CREDIT/ATTRIBUTION
E
Figure Courtesy of O-RAN Alliance e.V.
4-24
Figure Courtesy of Google Cloud
5-51a
Figure Courtesy of Amazon Web Services, Inc.
5-51b
Figure Courtesy of Microsoft Corporation
5-51c
Figure Anand R. Prasad, Alf Zugenmaier, Adrian Escott and Mirko
3-1 Cano Soveri, 3GPP 5G Security, 3GPP, August 6, 2018
Figure Anand R. Prasad, Alf Zugenmaier, Adrian Escott and Mirko
3-2 Cano Soveri, 3GPP 5G Security, 3GPP, August 6, 2018
Figure D. Hardt, Ed., The OAuth 2.0 Authorization Framework,
3-13 Internet Engineering Task Force, 2012
Figure Courtesy of Cisco Systems
10-3
Figure Courtesy of Cisco Systems
10-4
Figure Courtesy of Cisco Systems
10-11
Cover Yurchanka Siarhei/Shutterstock
Dedication

I would like to dedicate this book to my


family both near and far. Thank you all
for your unwavering support, motivation
and patience throughout the
development of this book.
Table of Contents
Foreword
Preface
Acknowledgments
About the Author
Part I Evolution of Cellular Technologies to 5G, Security
Enhancements, and Challenges
Chapter 1: Evolution from 4G to 5G
Mobile Network Evolution from 4G to 5G
5G New Radio Features
Disaggregated Architecture
Flexible Architecture
Service-Based Architecture
Adoption of Cloud-Native Technology
Multi-access Edge Computing (MEC)
Network Slicing
Key 5G Features in 3GPP Releases
Key 5G Advanced Features
Summary
Acronym Key
References

Chapter 2: Deployment Modes in 5G


5G NSA and SA Deployments
5G Non-Standalone (NSA) Deployments
5G Standalone (SA) Deployments
Network Slice as a Service (NSaaS)
5G Time-Sensitive Networks
5G Local Area Network–Type Service
Private 5G/Non-Public Networks
Standalone Non-Public Network (SNPN)
Public Network Integrated Non-Public Networks (PNI-NPN)
Summary
Acronym Key
References

Chapter 3: Securing 5G Infrastructure


3GPP 5G Security Enhancements
5G Trust Model: Non-Roaming
5G Trust Model: Roaming
Integration of Non-3GPP Network to the 5G Core Network
Other Key Security Enhancements in Release 16
Security Challenges in 5G
IoT and M2M
Perimeter-Less Deployments
Virtualized Deployments
Summary
Acronyms Key
References

Part II Securing 5G Architectures, Deployment Modes, and Use


Cases

Chapter 4: Securing RAN and Transport Deployments in 5G


5G RAN and Transport Threats
Vulnerabilities in Air Interface
Vulnerabilities in the Transport Network
Rogue/Fake Base Station Vulnerabilities
Securing 5G RAN and Transport
Securing the Air Interface
Using Trusted Transport Network Elements
Secure Deployments and Updates Using Secure ZTP
Using Security Gateway (SecGW/SEG) to Secure the RAN and
Transport Layer
Real Scenario Case Study: Examples of Threat Surfaces and Their
Mitigation
A: The Attacker Takes Control of IoT Devices with Weak
Security and Launches DDoS Attack
B: The Attacker Uses the Vulnerability in S1 and Insecure
Transport to Use Rogue eNBs and Uses MitM Attacks in the 5G
NSA Deployment
C: The Attacker Uses the Insecure Transport and Carries Out
MitM Attacks in Back Haul
Mitigation
Summary
Acronym Key
References

Chapter 5: Securing MEC Deployments in 5G


Service Provider Network-Based MEC
Enterprise Network-Based MEC
MEC Deployment Models
Distributed UPF and MEC Application Deployment
C-RAN/O-RAN/Open VRAN Deployment Enabled by MEC
Enterprise MEC Deployment
Hybrid MEC Deployment
Threat Surfaces in 5G MEC Deployments
Physical Security
Hardware and Software Vulnerabilities
5G MEC Infrastructure and Transport Vulnerabilities
Virtualization Threat Vectors
5G MEC API Vulnerabilities
DDoS Attacks
Securing 5G MEC
Physical Security
Hardening Hardware and Software
MEC Infrastructure and Transport Security
Securing Virtualized Deployments in 5G MEC
Securing API
Validating Both Read and Write Requests
DDoS Protection
Real Scenario Case Study: MEC Threats and Their Mitigation
Threats: Case Study
Mitigation Examples
Summary
Acronym Key
References

Chapter 6: Securing Virtualized 5G Core Deployments


A Brief Evolution of Virtualization in Telecommunications
Threats in Virtualized 5G Packet Core Deployments
5GC Container Vulnerabilities
Insecure Container Networking
Container Host and HW Vulnerabilities
Securing Virtualized 5G Packet Core Deployments
Secure CI/CD
Securing 5GC NFs and 5GC NF Traffic
Securing 5GC NF Orchestration and Access Controls
Securing 5GC CNF in Roaming Scenarios
Securing the Host OS and Hardware
Real Scenario Case Study: Virtualized 5GC Threats and Mitigation
Threats Case Study
Mitigation Examples
Summary
Acronym Key
References

Chapter 7: Securing Network Slice, SDN, and Orchestration


in 5G
Network Slicing and Its Enablers—SDN and Orchestration
Threat Surfaces in 5G Network Slice, SDN, and Orchestration
Deployments
Threats in the SDN Controller Layer
Threats in the SDN Data Plane
Threats in Orchestration Layer
Insufficient Slice-Level Isolation
Threats in NSaaS Deployments
Mitigation of Threats
Trusted Components
Securing Orchestration
Securing the Software-Defined Network (SDN)
Mitigating Data Exfiltration
Securing Network Slices
Securing NSaaS Deployments
Real Scenario Case Study: Threats in the 5G Network Slice, SDN,
and Orchestration Deployments and Their Mitigation
Threats: Case Study
Mitigations: Case Study
Summary
Key Acronyms
References

Chapter 8: Securing Massive IoT Deployments in 5G


Massive IoT–Based Threats in 5G
Device Vulnerabilities Due to Weak Built-in Security
Securing mIoT Deployments in 5G Networks
Built-in Hardening of the Device
Real Scenario Case Study: mIoT Threats and Their Mitigation
Threats Example
Mitigation Example
Summary
Key Acronyms
References

Chapter 9: Securing 5G Use Cases


Secure 5G Smart Factory and Manufacturing
Threats in 5G Smart Factory Deployments
Securing the 5G Smart Factory
Application-Level Security Controls
Critical Infrastructure
5G Energy Utility
Threats in the 5G-Enabled Energy Utility
Securing 5G-Enabled Energy Utility
5G Vehicle-to-Everything (5G-V2X)
Threats in 5G-V2X Deployments
Securing 5G-V2X Deployments
Standards and Associations
Summary
Key Acronyms
References

Part III End-to-End 5G Security Architecture and Prioritizing


Security Investments

Chapter 10: Building Pragmatic End-to-End 5G Security


Architecture
Foundations of 5G Security
Securing 5G and Evolving Network Deployments
Securing IT and OT
Securing Consumers of 5G and Evolving Technologies
Key Tenets of 5G Security Architecture
Supply Chain Security
Securing User and Device Access Using Zero-Trust Principles
Secure Intra/Inter-Network Connectivity
Application-Level Security
Vulnerability Management and Forensics
Enhanced Visibility, Monitoring, and Anomaly Detection
Slice-Level Security
Secure Interoperability
Summary
Acronyms Key
References

Chapter 11: Prioritizing 5G Security Investments


Method of Prioritizing Security Controls
Scenario 1
Scenario 2
Summary
Acronyms Key
References

Part IV Emerging Discussions

Chapter 12: 5G and Beyond


Adoption and Adaptability of 5G and Evolving Technologies
Convergence of Wi-Fi and Evolving Cellular Technologies
Use of AI and ML in Securing 5G and Evolving Networks
Crypto Agility in 5G and Evolving Technologies
Summary
Acronym Key
References
Index
Foreword
Society is about to embark on a digital upgrade—the next generation
of the world’s mobile communication infrastructure—5G. Along with
new and innovative capabilities, 5G also introduces new security
features, vulnerabilities, and risks. 5G does not just represent
significantly increased bandwidth and lower latency, but it is
expected to fundamentally change the mobile ecosystem with new
partnership models, network slicing, massive deployment of Internet
of Things (IoT) devices, and ultimately, an increasingly critical
dependency on the technology for society to function. Due to this,
our ability to secure 5G will directly affect the resilience of critical
infrastructure and national security.
Some of the security key risks affecting 5G confidentiality, integrity,
and availability are supply chain risks, increasing complexity leading
to new vulnerabilities, and inherent weaknesses in the standards.
The supply chain risks have reached the geopolitical center stage
due to the high societal impact of 5G, and this has led to national
and EU-level regulations, risks assessments, and GSMA’s
accreditation scheme Network Equipment Security Assurance
Scheme (NESAS). The inherent increased complexity of 5G leads to
a wide range of new potential vulnerabilities that will require
increased vigilance from product vendors, service providers, and
users alike.
In order to manage these risks, 5G is equipped with a broad range
of security features and capabilities, and GSMA has outlined a list of
critically sensitive functions—virtualization infrastructure, controller,
orchestrators, Internet gateways, network slicing, mobile edge
computing, routing and switching of IP traffic at the core, database
functions, authentication, and access control. As always, a security
by design approach following a zero-trust approach, with secure
deployments and good operational hygiene, is key to securing the
world’s 5G deployments.
In this book, Pramod Nair guides us through the evolution of cellular
technologies from a security perspective, the security architecture,
deployment modes and use cases of 5G, as well as discusses end-to-
end security architecture and prioritizing security investments. His
unique outlook as the Lead Security Architect, head of 5G security
architecture in Cisco Systems, and from more than 20 years in
security allows him to combine a theoretical and applied perspective
for the benefit of both business and technical readers.
André Årnes, PhD
Senior Vice President and Chief Security Officer at Telenor Group
Professor II at the Norwegian University of Science and Technology
Preface
5G technology will redefine the way we perceive cellular networks
and will touch almost every aspect of our lives. 5G is not about just
being faster, bigger, or better; it’s about enabling multiple services
that we’ll all consume on an everyday basis. It will give rise to a new
ecosystem of developers building applications that exploit the
openness of 5G to help you develop new use cases for consumption
by enterprises and subscribers alike. New features in 3GPP Releases
16 and 17 help further enable new use cases for non-public
deployment of 5G by industry verticals and tighter convergence of
3GPP and non-3GPP technologies, bringing in multiple deployment
methods—including on-premises, hybrid, and fully public cloud-
based deployments. The 5G ecosystem will see a breakout from
3GPP-only based architecture to an open, multi-technology, multi-
standard, polyglot ecosystem.
This evolution of the technology landscape also requires an evolution
of the security mindset. We should start thinking of security as a
foundational layer. It should be one of the primary foundations for
any planned 5G use case implementation. This requires embracing
multilayered security beyond the requirements in 3GPP
specifications.
The business operational risk, legal risk, and reputational risk exist
not only for the companies providing 5G software and hardware
infrastructure, but for all companies, nation-states, and individuals
who provide and consume 5G technology.
The time is now to evaluate the cyber risk posture and apply
innovative thoughts to how we can approach these challenges today
and build for what’s to come tomorrow.
Motivation for Writing This Book
Security in evolving cellular technologies is not an easy concept to
grasp, as the technologies have evolved rapidly and are becoming
increasingly complex and nuanced as they become more open,
especially when you add 5G to the mix.
5G will also enable enterprises and industry verticals to deploy
private 5G/non-public 5G networks (5G NPN networks) on their own,
without any integration with service providers. This necessitates
private and government sectors to fully understand the 5G threat
surfaces, develop methods to mitigate the threats, and prioritize the
investments in security.
The existing material on security and cellular technologies is
dispersed across many resources and does not cover the end-to-end
5G threat surfaces, threat mitigation, examples of real-life
deployment scenarios, and prioritization of security controls based
on use cases and deployment scenarios. The learning curve for a
person trying to understand the evolution in cellular technologies,
new architectures, multiple deployment methods, threat surfaces,
and mitigation techniques is extremely steep and sometimes
unnerving.
It is not surprising that the topic of securing cellular technologies
tends to flummox newcomers and even seasoned network security
engineers.
This book brings all the information together and arranges the key
topics in such a way that they can be easily consumed and
understood. The main purpose of this book is to enable any person
to understand the key aspects of securing 5G and evolving
technologies. This book covers a range of topics; it will take you
through the evolution of technologies from 2G to 5G, with deep
dives into specific topics, such as securing non-public 5G
networks/private 5G deployments and prioritizing security
investments.
The goal of this book is to provide pragmatic views on securing 5G
and evolving networks. The knowledge and information gathered
through numerous customer workshops, brainstorming sessions with
service providers, industry verticals, industry experts from multiple
vendors, proof of concepts, and lessons learned from actual security
deployments for 5G networks are detailed in this book. Discussions
with multiple CSOs and CTOs have enlightened me on the key data
points required for prioritizing security, which you will see highlighted
in this book. Apart from service providers, industry verticals are
expected to adopt 5G technology, and this area has been expanded
into specific use cases, threats, and mitigation techniques. This book
closes with a chapter discussing the key areas of security evolution
that will motivate you to investigate different aspects of security as
the network evolves. It is aimed at helping you create a new
mindset while securing your networks of the future.

Who Should Read This Book


I have designed this book so that you can begin without any prior
knowledge about 5G or any preceding cellular technologies. This
book is written to be suitable for multiple levels of technical
expertise, including the following:

Security experts looking to understand the history of cellular


technology evolution to 5G, key 5G security enhancements, and
security challenges
Early-in-career telecom engineers, transport design engineers,
and radio engineers looking to design and implement mobile
networks
Government departments looking at security impacts of 5G
deployment for use cases such as smart city and looking at
implementing security measures
Management consultants advising governments and service
providers on 5G security strategy
CSO and CTO teams from service providers looking at securing
5G deployments
CSO and CTO teams from enterprises deploying NPN/private 5G
Enterprise network design and implementation teams deploying
NPN/private 5G deployments
Security architects responsible for securing the mobile
infrastructure
Enterprise solution architects and enterprise security architects
working with enterprises integrated with service provider 5G
networks
Security strategy teams within service providers, enterprise and
industry verticals deploying 5G
Cloud computing and data center teams involved with 5G
strategy and deployment
Enterprise solution and security architects deploying standalone
private/NPN 5G or utilizing service providers’ 5G slice network
Audiences of varying levels of expertise from the military and
defense community
Audiences from industry verticals such as smart manufacturing,
critical infrastructure entities and vendors, and autonomous
vehicle manufacturers
Cybersecurity vendor product managers looking for use cases or
features to enhance security products to cater for secure 5G
deployments
Students who would like to get a quick understanding of cellular
technologies and a look at the new features in 5G

Throughout the book, you will see practical examples and real-life
scenarios of how you might architect a solution to mitigate threats
and improve the security posture of your network.
How This Book Is Organized
To allow technical and nontechnical audiences to consume the book
in an effective and organized way, it is split into four parts. The parts
and chapters cover specific topics.
Part I, “Evolution of Cellular Technologies to 5G, Security
Enhancements, and Challenges,” explains the evolution of cellular
technologies toward 5G as well as new security enhancements and
new security challenges brought in by 5G. It will also take the reader
through different deployment modes, including private 5G / non-
public networks (NPN). This part will mostly cater to the audience
who wants a high-level view of 5G technology and its security
aspects. It includes the following chapters:

Chapter 1, “Evolution from 4G to 5G,” covers the evolution of


cellular technologies and will provide you with a basic
understanding of the 5G technology features. It will also take
you through some of the key enhancements in 3GPP Rel-16 and
Rel-17.
Chapter 2, “Deployment Modes in 5G,” covers the different
non-standalone and standalone deployment modes and use
cases, which can be mapped to specific deployment modes.
Chapter 3, “Securing 5G Infrastructure,” covers new security
enhancements and new security challenges brought in by 5G. It
also discusses the reasons why you should have an external
layer of security controls, even though 3GPP provides some
enhancements in security.

Part II, “Securing 5G Architectures, Deployment Modes, and Use


Cases,” covers the security controls for 5G network components such
as RAN, transport, 5GC, and devices. It then takes you through
securing 5G enablers—such as multi-access edge compute (MEC),
software-defined networks (SDNs), network slicing, orchestration,
and automation—and protecting different deployment methods such
as on-premises, private and public cloud based MEC, and hybrid
cloud, including open RAN deployments. It finally covers securing
key 5G use cases such as critical infrastructure, vehicle-to-everything
(V2X), and smart factory. This part of the book will be of keen
interest to readers who would like to deep-dive into the security
aspects of 5G and its key use cases. It includes the following
chapters:
Chapter 4, “Securing RAN and Transport Deployments in 5G,”
covers the 5G RAN and transport threat surfaces and threat
mitigation for the 5G public and non-public deployments,
including open RAN. This chapter also takes you through some
real-world attacks and mechanisms to mitigate them.
Chapter 5, “Securing MEC Deployments in 5G,” covers various
MEC deployment models, network functions deployed in the
private and public cloud based MEC, its threat surfaces, and
methods to mitigate the threats. The chapter also provides
some real-world risk and risk mitigation scenarios.
Chapter 6, “Securing Virtualized 5G Core Deployments,” covers
the threats due to virtualized 5G Core deployments and new
methods of software development and deployment. This
chapter also provides some key recommendations to secure
your virtualized 5GC deployments with vendor-agnostic
approaches and includes some real-world scenarios.
Chapter 7, “Securing Network Slice, SDN, and Orchestration in
5G,” covers network slicing and enablers of network slicing such
as software-defined networks (SDNs), orchestration, and
automation. The chapter also explains the threat surfaces and
threat mitigations specific to network slicing and its enablers.
This chapter also delves into the network slice as a service
(NSaaS) offering, its threat surface, and methods to mitigate
the threats.
Chapter 8, “Securing Massive IoT Deployments in 5G,” covers
the risks related to IoT devices and related connectivity and
management. The chapter then goes on to explain different
security mechanisms and best practices to secure your network
from any IoT device-based attacks.
Chapter 9, “Securing 5G Use Cases,” covers critical
infrastructure, V2X, and smart manufacturing use cases, which
use different types of IoT devices—some smart, some semi-
smart—as well as non-smart devices. The chapter takes you
through the risks within these three use cases and methods to
mitigate the risks.
Part III, “End-to-End 5G Security Architecture and Prioritizing
Security Investments,” provides an overview of the various security
recommendations for end-to-end 5G security and discusses the
factors based on which certain security controls can be prioritized
among other security controls for 5G networks. This part will be of
keen interest to an audience who would like to have an end-to-end
view of security and understand the methods to prioritize
investments in security. It includes following chapters:

Chapter 10, “Building Pragmatic End-to-End Security 5G


Architecture,” covers the key building blocks for creating an
end-to-end security layer for 5G deployments. This chapter also
provides you with a checklist for each of the 5G domains and
includes zero-trust design principles.
Chapter 11, “Prioritizing 5G Security Investments,” covers the
considerations and recommendations for prioritizing
investments to secure your 5G network. This chapter takes two
primary scenarios—one related to a service provider providing
mobile service, and the other related to the non-public
deployment methods for industry verticals and enterprises.
Part IV, “Emerging Discussions,” takes you through the topics
aimed at new features being discussed for 5G and evolving
architectures, security enhancements using machine learning (ML)
and artificial intelligence (AI), and the method to make your network
quantum safe. This part will be of keen interest to readers who
would like to understand the key discussions in the security industry
around 5G and evolving technologies. It includes following chapter:
Chapter 12, “5G and Beyond,” covers the adoption and
adaptation of 5G standalone technology with new use cases,
convergence of non-3GPP and 3GPP technologies, application of
AI and ML in securing 5G and evolving technologies, and the
importance of deploying crypto-agile mobile networks.

Due to ongoing developments, Chapter 12 will occasionally be


updated with relevant new content and insights on the book’s
website at www.informit.com. Register your copy of Securing 5G and
Evolving Architectures on the InformIT site for convenient access to
these updates and/or corrections as they become available. To start
the registration process, go to informit.com/register and log in or
create an account. Enter the product ISBN (9780137457939) and
click Submit. Look on the Registered Products tab for an Access
Bonus Content link next to this product, and follow that link to
access any available bonus materials. If you would like to be notified
of exclusive offers on new editions and updates, please check the
box to receive email from us.
Please note that this book is written with a vendor-neutral approach,
and it does not give recommendations on what vendor should be
deployed. Each service provider or industry vertical planning to
deploy 5G can evaluate the security controls required and make
decisions based on their own criteria, circumstances, and targeted
use cases. This book covers the details of the security controls,
required features, and functions required for securing 5G and
evolving networks, allowing you to make better informed decisions.
Happy reading, and I hope you enjoy reading this book as much as I
enjoyed writing it!
Acknowledgments
I would like to acknowledge the tremendous support I received from
the Cisco staff, especially my management team and colleagues.
Similarly, I would like to thank the reviewers, Keith O’Brien and
David Hucaby, for their comments, feedback, and insights that
enriched the content of this book.
I would like to thank Dr. André Årnes, PhD, Senior Vice President and
Chief Security Officer at Telenor Group and Professor at the
Norwegian University of Science and Technology, for writing the
foreword.
I would like to extend my appreciation to the people from multiple
companies who provided constructive comments during those
numerous 5G security customer workshops and brainstorming calls.
I would like to thank executive editor, Nancy Davis, for her guidance,
feedback, and massive support. I would also like to extend my
thanks to the Pearson/Addison-Wesley team, especially to Chris
Cleveland, the development editor, for his robust guidance
throughout the editing process, and to Mandie Frank, for her support
through the production process.
Finally, I would like to thank the many standards organizations,
technologists, security experts, and industry peers who continue to
contribute to the fields of both mobile communications and security.
About the Author
Pramod Nair is a Lead Security Architect at Cisco Systems focusing
on service providers. During his 20 years of experience in the
industry, Pramod has worked in multiple areas, including research
and development, designing end-to-end mobile networks, and
technical consulting on military and defense projects.
Among other responsibilities in his current role within Cisco, Pramod
leads 5G Security Architecture, driving its adoption globally, and has
been instrumental in architecting secure next-generation networks
for customers across the globe. He is a regular speaker on the
subject at large conferences and industry events.
Pramod is an active member of the security community. His role is to
help mobile network providers, service providers, industry verticals,
the national security and defense sectors, and other agencies
dedicated to securing critical infrastructures. He is also deeply
involved with industry trade organizations, has co-chaired the 5G
security white paper within the 5GAmericas work group, and works
with the National Institute of Standards and Technology (NIST) on
5G security.
Pramod holds a patent in fraud detection and has published various
white papers and articles covering security-related topics.
Part I Evolution of Cellular
Technologies to 5G, Security
Enhancements, and
Challenges
Chapter 1

Evolution from 4G to 5G
After reading this chapter, you should have a better
understanding of the following topics:
Evolution of cellular technologies
Enhancements in 5G as compared to 4G
Key 5G features and enhancements in 3GPP Releases 15, 16,
and 17
Key 5G Advanced features and enhancements under study in
3GPP Release 18

This chapter takes you through the evolution of cellular technologies


and provides you with a basic understanding of 5G technology
features.
This chapter will be of particular interest to the following individuals
and teams from enterprise/5G service providers deploying 5GC and
cybersecurity vendors planning product developments for 5G
security use cases:

Security leaders within government organizations who would


like a quick look into the brief history of cellular communications
Teams from enterprise and industry verticals who want an
understanding of cellular technologies
Enterprise cybersecurity vendor security architects looking to
understand the evolution of cellular technologies
Cybersecurity vendor security architects and product managers
looking to understand what’s new in 3GPP Releases 15 and 16
and what’s planned in Release 17
Cybersecurity students who would like to get a brief
understanding of cellular technologies and new features in 5G
In mobile technologies, the “G” in 1G, 2G, 3G, 4G, and 5G refers to
“Generation,” where there has been a major shift in the capabilities
offered in terms of spectrum efficiency, higher throughput, making
the architecture more “flat,” and enhanced algorithms in the air
interface for providing better security. 1G was based on analog
technology, and 2G was the first digital technology to be used in
mobile cellular communication.
The foundation of 4G was set by International Telecommunications
Union–Radio communications sector (ITU-R) around 1998. In 2009,
4G was established and called Long Term Evolution before eventually
being called 4G (pure marketing), although it did not meet the
criteria of 1Gbps for low-mobility use cases (pedestrian users). In
2011, LTE-Advanced (LTE-A) fulfilled the criteria set by ITU-R and
specified in Releases 8 and 9 of Third-Generation Partnership Project
(3GPP) and was actually “true 4G.” The U.S. Defense Advanced
Research Projects Agency (DARPA) had also envisioned 4G by using
end-to-end IP networking and distributed architectures.
Figure 1-1 illustrates the evolution of cellular digital networks from
2G to 5G.
FIGURE 1-1 Evolution from 2G to 5G
Mobile technologies had come a long way from 1G in 1981, 2G in
1992, 3G in 2001, to 4G in 2009/2011(LTE-A). As shown in Figure 1-
1, 4G brought a shift in designing the mobile network, as it was
based on all Internet Protocol (IP) deployment, allowing better
throughput due to reduced latency in the back haul, better
modulation techniques, advanced dynamic channel allocation, and
adaptive traffic scheduling. Advanced antenna systems such as
Multiple Input Multiple Output (MIMO) with beamforming helped
achieve better throughput, but its use was restricted due to cost and
was aimed at specific dense clusters that required high throughput.
4G also brought in a major shift in the network design, as it moved
away from the requirement of having both circuit-switched and
packet-switched networks and enabled the simplification of network
architecture to a purely packet switched (PS) all-IP flat network
architecture with reduced latency. For example, the following
systems used separate circuit-switched networks for voice and
packet-switched networks for data:
2.5G, also called General Packet Radio Service (GPRS)
2.75G, also called Enhanced Data Rates for GSM Evolution
(EDGE)
3G systems

For a service provider, 2G and 3G systems required two separate


sets of equipment in parallel, as they had separate circuit switch
(CS) traffic for voice and packet switch (PS) traffic for packet data.
The IP-based flat network architecture in LTE helped to reduce costs
and complexity by replacing the separate circuit- and packet-
switched networks with a single Evolved Packet Core (EPC), which
also had the capability to support handovers from legacy 2G and 3G
technologies.

Mobile Network Evolution from 4G


to 5G
5G is the successor of 4G technologies, and it defines a system that
uses 5G New Radio (NR) software. The standards are set by 3GPP,
and the minimum specifications were set by the International
Telecommunications Union (ITU) International Mobile
Telecommunications–2020 (IMT-2020) standard in 2015. 5G is not
just going to be about high-speed data connections for enhanced
mobile broadband; it will enable several new capabilities that can
cater to several new enterprise use cases. 5G will not just be about
serving consumer/enterprise subscribers with high-throughput
connectivity. 5G will enable new revenue avenues and opportunities
for operators by being able to cater to requirements for several new
enterprise use cases. The first NR specification was made in 2015,
whereas the phase of 3GPP 5G specifications in Release 15 was
completed in 2019 (also referred to as “Phase 1” standardization of
5G). The initial Phase 1 deployment of 5G was based on a software
upgrade of 4G LTE infrastructure and was called Non-Standalone
(NSA) mode, which depended on an existing 4G LTE network for
control plane signaling and used 5G NR for the user plane. Phase 2
is based on Standalone (SA) mode with 5G packet core network
(5GC) providing the control plane and 5G NR providing the user
plane.
Figure 1-2 illustrates the high-level 5G architecture with comparisons
to 4G architecture.
FIGURE 1-2 Comparison of 5G and 4G Architectures
Apart from higher data rate/throughput and utilizing a new
spectrum, the key differentiators and technology evolutions in 5G as
compared to 4G are discussed in the sections that follow.

5G New Radio Features


New Radio (NR) for 5G should support the following key
requirements:
The ability to handle high data rates and a wider bandwidth
Support for ultra-reliable low-latency communications (URLLC)
with fast short bursts of data
Support for energy-efficient communications for low-powered
devices catering for Internet of things (IoT)

The requirements are met by using cyclic prefix-based orthogonal


frequency-division multiplexing (OFDM), which is the same
waveform LTE uses for downlink. For downlink, only cyclic prefix-
based OFDM (CP-OFDM) is used, while for uplink, both CP-OFDM
and Discrete Fourier transform spread OFDM (DFT-S-OFDM) can be
used. Compared to CP-OFDM, DFT-S-OFDM has the merit of a lower
peak-to-average ratio.

Dynamic Spectrum Sharing (DSS) and Flexible


NR Protocols
During the initial stages of 5G adoption, Non-Standalone (NSA)
mode is the preferred mode of deployment for service providers,
before transitioning to the full-fledged 5G Standalone mode of
deployment. The 5G NR can adapt to existing 4G deployments and
share the spectrum used exclusively by 4G today, using a
mechanism called Dynamic Spectrum Sharing (DSS). DSS allows the
service providers to share the spectrum between 4G and 5G without
having to re-farm the 4G spectrum. This method is therefore
spectrum efficient and facilitates a smooth transition to 5G SA. In
DSS, the 5G NR device, such as user equipment (UE), will have two
active radios—one for 4G and the other for 5G NR—that detect the
synchronization signal blocks (SSB) to access the network. SSB is
sent periodically by the network within the 4G multimedia broadcast
single-frequency network (MBSFN) subframes to maintain
synchronization in time and frequency.
Operating Spectrum and Bandwidth
The frequency range in which 5G NR can operate is split between
FR1 and FR2, as documented in Table 1-1.
TABLE 1-1 5G Frequency Range

Frequency Range Designation Frequency Range


FR1 410–7125 MHz
FR2 24250–52600 MHz

5G NR also supports hierarchical system bandwidth from 5 MHz to


100 MHz for FR1 and from 50 MHz to 400 MHz for FR2, respectively,
as indicated in Table 1-2.

TABLE 1-2 5G Bandwidth

Frequency Range Designation Bandwidth


FR1 5–100 MHz
FR2 50–400 MHz

Massive MIMO
One of the key enablers for 5G’s higher data rates is Multiple Input
Multiple Output (MIMO). MIMO as a technology is not new and has
been around for quite some time. The key reason MIMO is important
in 5G is due to the use of higher frequencies in 5G, which leads to
higher losses and therefore lower coverage. Massive MIMO with its
higher number of transceivers will help in improving capacity,
coverage, and spectrum efficiency as well as the user experience.
Apart from the higher number of transceivers, beamforming will also
help in identifying coverage requirements for moving users and
optimizing the offered coverage and capacity.
Disaggregated Architecture
5G introduces disaggregation of network functions in the Radio and
Packet Core domains, which is a dramatic departure from proprietary
closed hardware and software sourced from a single vendor toward
completely decoupled, open source network functions that are then
combined to provide the 5G-specified services.
Figure 1-3 illustrates the functional split of Next-Generation RAN
(NG-RAN) and 5G Core, along with their main tasks.

FIGURE 1-3 Functional Split of NG-RAN and 5GC


As shown in Figure 1-3, the next-generation NodeB (gNB), which is
the next-generation base station supporting the new 5G New Radio
(NR), performs the access node–related tasks, including radio
resource management, radio bearer, connection, scheduling, and
admission control for the UE. In the 5GC, Access and Mobility
Function (AMF) caters for control plane, Session Management
Function (SMF) caters for session establishment, and User Plane
Function (UPF) handles the user plane.
Apart from the functional split between NG-RAN and 5GC, as
illustrated in Figure 1-3, the gNB can be deployed as virtual
centralized unit (VCU) and virtual distributed unit (VDU) instances on
commercial off-the-shelf (COTS) hardware, due to the
disaggregation and decomposition introduced by 5G, as shown in
Figure 1-4, thus enabling flexible 5G deployment.

FIGURE 1-4 Disaggregation and Decomposition of gNB


The CU processes non-real-time protocols and services, and the DU
processes PHY-level protocol and real-time services. This allows you
to build an end-to-end public or non-public 5G network by employing
virtualized network functions from multiple vendors and deploying it
on COTS servers using merchant silicon.
Network disaggregation eliminates vendor lock-in and enables you to
select the best combination of hardware and software vendors based
on the offered strengths and features of their respective solutions.
The decomposition and disaggregation of 5G enables a major
architectural shift to an edge infrastructure that combines
decomposed subscriber management with access functionality. This
shift will also apply to wireline networks with increasing adoption of
the 5G Fixed Access Networks. Figure 1-4 illustrates the
disaggregation and decomposition of Radio Access Network (RAN)
functions. Disaggregation in 5G brings you lots of flexibility because
it fundamentally changes the way networks are procured, built, and
operated. Here are some of the benefits:

Efficient partitioning of network functions and resources to


support the 5G use cases such as enhanced mobile broadband
(eMBB), ultra-reliable low-latency communication (URLLC), and
Internet of Things (IoT) by using technologies such as
software-defined networking, edge computing, service function
chaining, and service orchestration.
In 5G deployment models such as Cloud RAN (C-RAN), pre-
provisioning of baseband resources network isn’t required for
the maximum capacity of the site. You can use baseband
resource pooling provisioned for the traffic profile of the entire
network. These traffic profiles can be scaled up or down during
peak-hour usage or in the case of high-traffic events.
Scalability to quickly and cost effectively adapt to various
network topologies and use cases.
Enhanced network availability and reliability already built into
NFV technologies such as OpenStack, the virtual infrastructure
manager, and service orchestrator.
Disaggregation of the hardware from the software using
commercial off-the-shelf, high-processing density hardware and
open interfaces.
Enablement of advanced algorithms such as cooperative
multipoint and inter-site carrier aggregation.

As mobile technologies evolved from one generation to the next, the


functions performed by base stations and other devices have been
distributed using cloud technologies. Cloud-RAN decouples the
baseband processing from the radio units, allowing the processing
power to be pooled at a central location, thus reducing the required
redundancy. One of the most important aspects of C-RAN
architecture is the splitting of base station functions at distributed
locations and centralized C-RAN servers. There are eight
standardized options for this split, with two (options 2 and 7) being
seen most frequently. Figure 1-5 illustrates the functional split
consideration in the 5G RAN.
FIGURE 1-5 Functional Split Options in 5G RAN
The chosen radio split option will have a direct impact on your
transport (xHaul) design and deployment because the transport
requirements vary dramatically with radio split options; therefore,
you should consider your existing transport design, its capabilities,
and future enhancements in your transport layers before you decide
on the radio split options. The 3GPP specifications 38.801 and
38.816 provide additional details about the radio split options.

Flexible Architecture
Traditional mobile networks are based on defined perimeters, where
most of the mobile packet core functions are centralized. 4G did
bring in Control Plane and User Plane Separation (CUPS), but it was
not used much due to limited use cases and advantages. 5G SA
Packet Core is inherently equipped with several new built-in
capabilities so that you have flexibility and capability to face new
challenges thrown open by the new set of requirements for varying
new use cases in 5G. The network functions in the new 5G Core are
broken down into smaller entities, such as the Session Management
Function (SMF) and User Plane Function (UPF), which can be used
on a per-service basis. Gone are the days of huge network boxes—
welcome to services that can be deployed on private cloud and
public cloud and automatically register and configure themselves
over the service-based architecture (SBA), which is built with new
functions like the Network Resource Function (NRF) that borrow
their capabilities from cloud-native technologies. This flexible
architecture will equip you with more capabilities to cater to
enterprise customer needs to support their current use cases as well
as new use cases. Enterprise and industry verticals can also deploy
their own standalone non-public network (NPN) or public network
integrated non-public network (PNI-NPN) to fulfill the use cases.

5G Non-Standalone (NSA) Solution


In Non-Standalone (NSA) architecture, the 5G RAN and its NR
interface are used in conjunction with the existing LTE and Evolved
Packet Core (EPC) infrastructure core network (respectively 4G Radio
and 4G Core), as shown in Figure 1-6, thus making the NR
technology available without network replacement.
In this configuration, only the 4G services are supported but enjoy
the capacities offered by the 5G New Radio (lower latency and so
on). The NSA is also known as E-UTRA-NR Dual Connectivity (EN-
DC). This is where you will leverage your existing EPC (4G) Packet
Core to anchor the 5G NR using the 3GPP Release 12 dual
connectivity feature. This will help you with aggressive 5G launch
needs to launch 5G in a shorter time and with less cost. The 5G NSA
solution will suffice for some initial use cases. However, 5G NSA has
limitations with regard to getting a much cleaner, truly 5G-native
solution, so you will eventually be expected to migrate to a 5G
Standalone solution. The section, “5G Non-Standalone (NSA)
Another random document with
no related content on Scribd:
Citizens of United States, not to be abridged on account of color, race, or previous
condition of servitude, (15th amendment), .. .. 20
Citizens of each State shall be entitled to the privileges and immunities of citizens in
the several States, 4 2 17
Claims, no prejudice to certain, 4 3 17
of the United States, or of the several States, not to be prejudiced by any
construction of the Constitution, 4 3 18
Coasting trade, regulations respecting, 1 9 15
Coin, Congress fix value of foreign, 1 8 15
Commerce, Congress to regulate, 1 8 15
regulations respecting, to be equal and uniform, 1 9 15
Commissions to be granted by the President, 2 3 17
Common law recognized and established, (7th amendment), .. .. 19
Congress vested with power, 1 1 13
may alter the regulations of State legislatures concerning elections of senators and
representatives, except as to place of choosing senators, 1 4 14
shall assemble once every year, 1 4 14
officers of government cannot be members of, 1 6 14
may provide for cases of removal, death, &c., of President and Vice-President, 2 1
16
may determine the time of choosing electors of President and Vice-President, 2 1
16
may invest the appointment of inferior officers in the President alone, in the
courts of law, or the heads of departments, 2 2 16
may establish courts inferior to the Supreme Court, 3 1 17
may declare the punishment of treason, 3 3 17
may prescribe the manner of proving the acts and records of each State, 4 1 17
to assent to the formation of new States, 4 3 18
may propose amendments to Constitution or call a convention, 5 1 18
to lay and collect duties, 1 8 15
to borrow money, 1 8 15
to regulate commerce, 1 8 15
to establish uniform laws of bankruptcy and naturalization, 1 8 15
to coin money, to regulate the value of coin, and fix a standard of weights and
measures, 1 8 15
to punish counterfeiting, 1 8 15
to constitute tribunals inferior to the Supreme Court, 1 8 15
to define and punish piracies, felonies on the high seas, and offenses against the
laws of nations, 1 8 15
to establish post offices and post roads, 1 8 15
to authorize patents to authors and inventors, 1 8 15
to declare war, grant letters of marque, and make rules concerning captures, 1 8
15
to raise and support armies, 1 8 15
to provide and maintain a navy, 1 8 15
to make rules for the government of the army and navy, 1 8 15
to call out the militia in certain cases, 1 8 15
to organize, arm, and discipline militia, 1 8 15
to exercise exclusive legislation over seat of government, 1 8 15
to pass laws necessary to carry the enumerated powers into effect, 1 8 15
to dispose of and make rules concerning the territory or other property of the
United States, 4 3 18
President may convene and adjourn in certain cases, 2 3 17
may enforce prohibition of slavery by appropriate legislation, (amendment), 13 2
20
Congress may, by a two-third’s vote, remove disability of persons who engaged in
rebellion, (14th amendment), 14 8 20
shall have power, by appropriate legislation, to enforce the provisions of Article
XIV, (14th amendment), 14 5 20
shall have power to enforce the provisions of Article XV, (15th amendment), 15 2
20
representation in, how apportioned, (14th amendment), .. 2 20
Constitution, how amended, 5 1 18
laws and treaties declared to be the supreme law, 6 1 18
rendered operative by the ratification of nine States, 7 1 18
Contracts, no law impairing, 1 10 16
Conventions for proposing amendments to the Constitution, 5 1 18
Counterfeiting, Congress to provide for punishment of, 1 8 15
Court, Supreme, its original and appellate jurisdiction, 3 2 17
Courts inferior to the Supreme Court may be ordained by Congress, 1 8 15
Ditto Ditto, 3 1 17
Crimes, persons accused of, fleeing from justice, may be demanded, 4 2 17
how to be tried, 3 2 17
Criminal prosecutions, proceedings in cases of, .. .. 19

Debts against the confederation to be valid, 6 1 18


Debt, public, authorized by law, shall not be questioned, (14th amendment), .. 4 20
incurred in aid of rebellion not to be assumed or paid, (14th amendment), .. 4 20
Disability of persons who engaged in rebellion (14th amendment), .. 3 20
Duties to be laid by Congress, and to be uniform, 1 8 15
further provision respecting, 1 9 15
cannot be laid by the States, 1 10 16
on exports prohibited, 1 9 15
on imports and exports imposed by States shall inure to the treasury of the United
States, 1 10 16
Elections of Senators and representative shall be prescribed by the States, 1 4 14
qualifications and returns of members of Congress to be determined by each
house, 1 5 14
Electors of President and Vice-President, how chosen, and their duties, 2 1 16
altered (see 12th amendment), .. .. 19
to vote the same day throughout the United States, 2 1 16
no senator or representative, or public officer, shall serve as, 2 1 16
Enumeration every ten years, 1 2 13
Executive power vested in the President, (see President), 2 1 16
Exports not to be taxed, 1 9 15
and imports, States prohibited from laying duties on, 1 10 16
Ex post facto law, none shall be passed, 1 9 15
prohibited to States, 1 10 16

Fines, excessive prohibited, .. .. 19


Fugitives from justice to be delivered up, 4 2 17
from service may be reclaimed, 4 2 17

Habeas corpus, writ of, can be suspended in cases of rebellion or invasion, 1 9 15


House of Representatives. (See Representatives.)

Impeachment to be brought by House of Representatives, 1 2 13


tried by the Senate, 1 3 14
Impeachment, judgment on, 1 3 14
all civil officers liable to, 2 4 17
Importation of slaves, not prohibited till 1808, 1 9 15

Judges shall hold their office during good behavior, 3 1 17


their compensation, 3 1 17
Judiciary—tribunals inferior to Supreme Court may be created, 1 8 15
Judicial power vested in a Supreme Court and courts inferior, 3 1 17
powers of the judiciary, 3 2 17
restriction as to suits against a State, .. .. 19
Judicial proceedings of each State are entitled to faith and credit in every State, 4 1
17
Jury trial secured, and shall be held in the State where the crime shall have been
committed, 3 2 17
further regulated, (6th amendment), .. .. 19
secured in suits at common law where the value of controversy shall exceed
twenty dollars, (7th amendment), .. .. 19

Law, what is declared the supreme, 6 1 18


common, recognized and established, (7th amendment), .. ..
Laws, President to see them faithfully executed, 2 3 17
Legislative powers vested in Congress. (See Congress.)
Loans, authority to make, 1 8 15

Marque and reprisal, letters of, 1 8 15


Militia to be called out, 1 8 15
to be officered by the States, 1 8 15
to be commanded by the President, 2 2 19
their right to keep and bear arms secured, (2d amendment), .. .. 19
Money shall be drawn from the treasury only by appropriation laws, 1 9 15
Congress to coin and regulate value of, 1 8 15
States cannot make, 1 10 16

Naturalization, uniform rules of, 1 8 15


Navy, Congress to provide and govern, 1 8 15
Nobility, titles of, shall not be granted by the United States, 1 9 15
nor by the States, 1 10 12

Oath of the President, 2 1 16


of the public officers, 6 1 18
Office, who prohibited from holding, (14th amendment), .. 3 20
Officers of the House of Representatives shall be chosen by the House, 1 2 13
Officers of the Senate shall be chosen by the Senate, 1 3 14
civil, may be removed by impeachment, 2 4 17
Order of one house requiring the concurrence of the other, 1 7 14

Pardons, President may grant, 2 2 16


Patents to be granted to inventors, 1 8 15
Petition, right of, .. .. 19
Persons held to service or labor, their importation or migration into the United
States may be prohibited after 1808, 1 9 15
escaping from one State to another shall be delivered up to those entitled to
service, 4 2 17
Piracy, Congress to prescribe punishment for, 1 8 15
Post offices and post roads, establishment of, 1 8 15
Powers not delegated to Congress nor prohibited to the States are reserved, (10th
amendment), .. .. 19
legislative (See Congress.)
executive (See President.)
judicial (See Judicial.)
Presents from foreign powers to public officers prohibited, 1 9 15
Press, freedom of
President of the U. S. vested with the executive power, 2 1 16
shall be chosen for four years, 2 1 16
how elected, 2 1 16
same, (12th amendment), .. .. 19
qualifications for, 2 1 16
who shall act in case of vacancy, 2 1 16
compensation of, 2 1 16
shall take an oath of office, 2 1 16
may be removed by impeachment, 2 4 17
President, commander of army, navy, and militia, 2 2 16
may require the written opinion of the heads of departments, 2 2 16
may reprieve and pardon, 2 2 16
may make treaties with consent of the Senate, 2 2 16
may appoint to office with consent of the Senate, 2 2 16
shall fill up vacancies happening during the recess of the Senate, 2 2 16
shall give information to Congress and recommend measures, 2 3 17
may convene both houses or either house, 2 3 17
may adjourn them in case of disagreement, 2 3 17
shall receive ambassadors and public ministers, 2 3 17
shall take care that the laws be faithfully executed, 2 3 17
shall commission all officers, 2 3 17
Privileges and immunities of members of Congress, 1 6 14
of citizens (See Citizens, also Rights.)
Property, Congress to provide for care of public, 4 3 18
shall not be taken for public use without just compensation, (5th amendment), .. ..
Punishments, cruel and unusual, prohibited, .. ..

Quorum for business, what shall be a, 1 5 14


of States in choosing a President by the House of Representatives, 2 1 16
Quartered, no soldier to be quartered on a citizen, .. .. 19
Rebellion, debt incurred in aid of, not to be assumed or paid, (14th amendment), .. 4
20
disability of persons who have engaged in (14th amendment), .. 3 20
Receipts and expenditures, accounts of, to be published, 1 9 15
Records, how to be authenticated, 4 1 17
Religion—no law to be made—free exercise of, .. .. 19
religious test not required, 6 .. 18
Reprieves granted by the President, 2 2
Representatives, House of, composed of members chosen every second year, 1 2 13
qualifications of voters, 1 2 13
qualifications of members, 1 2 13
apportionment of, 1 2 13
vacancies, how supplied, 1 2 13
shall choose their officers, 1 2 13
shall have the power of impeachment, 1 2 13
Representation shall be the judge of the election and qualifications of its members, 1
5 14
what shall be a quorum, 1 5 14
any number may adjourn and compel the attendance of absentees, 1 5 14
may determine the rules of proceeding, 1 5 14
may punish or expel a member, 1 5 14
shall keep a journal and publish the same, 1 5 14
shall not adjourn for more than three days nor to any other place, without the
consent of the Senate, 1 5 14
one-fifth may require the yeas and nays, 1 5 14
shall originate bills for raising revenue, 1 7 14
compensation to be ascertained by law, 1 6 14
privileged from arrest, except in certain cases, 1 6 14
Representatives shall not be questioned for speech or debate in the House, 1 6 14
shall not be appointed to office, 1 6 14
shall not serve as electors of President, 2 1 16
and direct taxes apportioned according to numbers, 1 2 13
how apportioned among the several States, (14th amendment), .. 2 20
who prohibited from being, (14th amendment), .. 3 20
of a State, vacancies in, supplied until a new election by executive authority, 1 2 13
Resolution, order, or vote, requiring the concurrence of both houses, to undergo the
formalities of bills, 1 7 14
Revenue bills to originate in the House of Representatives, 1 7 14
Rights of the citizen declared to be—
privileges of citizens of the several States, 4 2 17
liberty of conscience in matters of religion, .. .. 19
freedom of speech and of the press, .. .. 19
to assemble and petition, .. .. 19
to keep and bear arms, .. .. 19
to be exempt from the quartering of soldiers, .. .. 19
to be secure from unreasonable searches and seizures, .. .. 19
to be free from answering for a crime, unless on presentment or indictment of a
jury, .. .. 19
not to be twice jeoparded for the same offence, .. .. 19
not to be compelled to be a witness against himself, .. .. 19
not to be deprived of life, liberty, or property without due course of law, .. .. 19
private property not to be taken for public use, .. .. 19
in criminal prosecutions, shall enjoy the right of a speedy trial by jury, with all the
means necessary for his defence, .. .. 19
in civil cases trial to be by jury, and shall only be re-examined according to
common law, .. .. 19
excessive bail shall not be required, excessive fines imposed, no cruel nor unusual
punishment inflicted, .. .. 19
enumeration of certain rights shall not operate against retained rights, .. .. 19
Rules, each house shall determine its own, 1 5 14

Seat of government, exclusive legislation, 1 8 15


Searches and seizures, security against, .. .. 19
Senate, composed of two senators from each State, 1 3 14
how chosen, classed, and terms of service, 1 3 14
Senate, qualifications of senators, 1 3 14
Vice-President to be President of the, 1 3 14
shall choose their officers, 1 3 14
shall be the judge of the elections and qualifications of its members, 1 5 14
what number shall be a quorum, 1 5 14
any number may adjourn, and compel attendance of absentees, 1 5 14
may determine its rules, 1 5 14
may punish or expel a member, 1 5 14
shall keep a journal, and publish the same, except parts requiring secrecy, 1 5 14
shall not adjourn for more than three days, nor to any other place, without the
consent of the other house, 1 5 14
one-fifth may require the yeas and nays, 1 5 14
may propose amendments to bills for raising revenue, 1 7 14
shall try impeachments, 1 3 14
effect of their judgment on impeachment, 1 3 14
compensation to be ascertained by law, 1 6 14
privileged from arrest, 1 6 14
not questioned for any speech or debate, 1 6 14
shall not be appointed to office, 1 6 14
Senator, shall not be elector, 2 1 16
who prohibited from being, (14th amendment), .. 3 20
Senators and representatives, elections of, how prescribed, 1 4 14
Slaves, their importation may be prohibited after 1808, 1 9 15
escaping from one State to another may be reclaimed, 4 2 17
claims for the loss or emancipation of, to be held illegal and void, (14th
amendment), .. 4 20
Slavery, except as a punishment for crime, prohibited, amendment, 13 1 20
Congress authorized to enforce the prohibition of, (amendment), 13 2 20
Soldiers not quartered on citizens, .. .. 19
Speaker, how chosen, 1 2 13
Speech, freedom of, .. .. 19
States prohibited from—
entering into treaty, alliance, or confederation, 1 10 16
granting letters of marque, 1 10 16
coining money, 1 10 16
emitting bills of credit, 1 10 16
making anything a tender but gold and silver coin, 1 10 16
prohibited from—
passing bills of attainder, ex post facto laws, or laws impairing contracts, 1 10 16
granting titles of nobility, 1 10 16
laying duties on imports and exports, 1 10 16
laying duties on tonnage, 1 10 16
keeping troops or ships of war in time of peace, 1 10 16
entering into any agreement or contract with another State or foreign power, 1
10 16
engaging in war, 1 10 16
abridging right of United States citizens of, to vote on account of race or color,
(15th amendment), .. 1 20
States, new, may be admitted into the Union, 4 3 18
may be admitted within the jurisdiction of others, or by the junction of two or
more, with the consent of Congress and the legislatures concerned, 4 3 18
State judges bound to consider treaties, the Constitution, and the laws under it, as
supreme, 6 .. 18
State, every, guarantied a republican form of government, protected by United
States, 4 4 18
Supreme Court. (See Court and Judiciary.)
Suits at common law, proceedings in, .. .. 19

Tax, direct, according to representation, 1 2 13


shall be laid only in proportion to census, 1 9 15
Tax on exports prohibited, 1 9 15
Tender, what shall be a legal, 1 10 16
Territory or public property, Congress may make rules concerning, 4 3 18
Test, religious, shall not be required, 6 .. 18
Titles. (See Nobility.)
Title from foreign state prohibited, 1 9 15
Treason, defined, 3 3 17
two witnesses, or confession, necessary for conviction, 3 3 17
punishment of, may be prescribed by Congress, 3 3 17
Treasury, money drawn from, only by appropriation, 1 9 15
Treaties, how made, 2 2 16
the supreme law, 6 .. 18
States cannot make, 1 10 16

Vacancies happening during the recess may be filled temporarily by the President, 2
2 16
in representation in Congress, how filled, 1 2 13
Veto of the President, effect of, and proceedings on, 1 7 14
Vice-President of the U. S. to be President of the Senate, 1 3 14
how elected, 2 1 16
amendment, .. .. 19
shall, in certain cases, discharge the duties of President, 2 1 16
may be removed by impeachment, 2 4 17
Vote of one house requiring the concurrence of the other, 1 7 14
right of citizens to, not to be abridged on account of race or color, (15th
amendment), .. 1 20

War, Congress to declare, 1 8 15


Warrants for searches and seizures, when and how they shall issue (14th
amendment), .. .. 19
Witness, in criminal cases, no one compelled to be against himself (5th
amendment), .. .. 19
Weights and Measures, standard of, 1 8 15

Yeas and nays entered on journal, 1 6 14


BOOK V.
TABULATED HISTORY OF POLITICS.
Aggregate Issues of Paper Money in War Times, 5004
Ante-war Debts, 5015

Cabinet Officers of the Administrations, 5013


Chronological Politics, 1765–1892, 5025
Civil Officers, 5018
Customs Tariff of Great Britain, 5010

Electoral Votes for President and Vice-President, 5005


Electoral Votes; Number to which each State has been Entitled, 1789–1892, 5016

Gold; Highest and Lowest Prices of, 5024

Interest Laws of all the States and Territories of the United States, 5004

Length of Sessions of Congress, 1779–1881, 5018

National Commerce, per capita, 5023


National Debt, per capita, 5023
National Expenditures, per capita, 5023

Popular and Electoral Votes in Presidential Elections, 1789–1889, 5011


Presidents and Vice-Presidents,, 5010
President and Vice-President, Candidates for, 5016

Rebellion, Expenditures caused by, 5021

Signers of Declaration of Independence, 5015


Speakers of House of Representatives, 5020
States, when admitted, 5019
Supreme Courts, 5017

Territories, when Organized, 5019


Troops furnished by each State, 1861–65, 5020
Troops, number of called into service during the Rebellion, 5017

Value of United States Money in Foreign Gold and Silver Coin, 5003

1. Edwin Williams in Statesman’s Manual.


2. From the Statesman’s Manual, Vol. 1., by Edwin Williams.
3. Note.—See Constitution, Art. 3, Sec. 4, p. 5.
4. In the Ritual the words in parentheses are omitted. In the key to the Ritual, they are written in
figures—the alphabet used being the same as printed below. So throughout.

Key to Unlock Communications.

A B C D E F G H I J K L M
1 7 13 19 25 2 8 14 20 26 3 9 15
N O P Q R S T U V W X Y Z
21 4 10 16 22 5 11 17 23 6 12 18 24

5. Concerning what is said of cities, the key to the Ritual says: “Considered unnecessary to
decipher what is said in regard to cities.”
6. President Buchanan’s Inaugural Address.
7. From Mr. Buchanan’s Administration on the eve of the Rebellion, published by D. Appleton &
Co., 1866.
8. The Provisional Constitution adopted by the Seceded States differs from the Constitution of
the United States in several important particulars. The alterations and additions are as follows:

ALTERATIONS.
1st. The Provisional Constitution differs from the other in this: That the legislative powers of the
Provisional Government are vested in the Congress now assembled, and this body exercises all the
functions that are exercised by either or both branches of the United States Government.
2d. The Provisional President holds his office for one year, unless sooner superseded by the
establishment of a permanent Government.
3d. Each State is erected into a distinct judicial district, the judge having all the powers
heretofore vested in the district and circuit courts; and the several district judges together compose
the supreme bench—a majority of them constituting a quorum.
4th. Whenever the word “Union” occurs in the United States Constitution the word
“Confederacy” is substituted.

THE FOLLOWING ARE THE ADDITIONS.


1st. The President may veto any separate appropriation without vetoing the whole bill in which it
is contained.
2d. The African slave-trade is prohibited.
3d. Congress is empowered to prohibit the introduction of slaves from any State not a member of
this Confederacy.
4th. All appropriations must be upon the demand of the President or heads of departments.

OMISSIONS.
1st. There is no prohibition on members of Congress holding other offices of honor and
emolument under the Provisional Government.
2d. There is no provision for a neutral spot for the location of a seat of government, or for sites
for forts, arsenals, and dock-yards; consequently there is no reference made to the territorial powers
of the Provisional Government.
3d. The section in the old Constitution in reference to capitation and other direct tax is omitted;
also, the section providing that no tax or duty shall be laid on any exports.
4th. The prohibition on States keeping troops or ships of war in time of peace is omitted.
5th. The Constitution being provisional merely, no provision is made for its ratification.

AMENDMENTS.
1st. The fugitive slave clause of the old Constitution is so amended as to contain the word “slave,”
and to provide for full compensation in cases of abduction or forcible rescue on the part of the State
in which such abduction or rescue may take place.
2d. Congress, by a vote of two-thirds, may at any time alter or amend the Constitution.

TEMPORARY PROVISIONS.
1st. The Provisional Government is required to take immediate steps for the settlement of all
matters between the States forming it and their other late confederates of the United Slates in
relation to the public property and the public debt.
2d. Montgomery is made the temporary seat of government.
3d. This Constitution is to continue one year, unless altered by a two-thirds vote or superseded
by a permanent Government.
9. From Lalor’s Encyclopædia of Political Science, published by Rand & McNally. Chicago, Ill.
10. Official Journal of the Convention, pp. 9 and 10.
11. The text of Webster’s speech in reply to Hayne, now accepted as the greatest constitutional
exposition ever made by any American orator, will be found in our book devoted to Great Speeches
on Great Issues.
12. These were afterwards seized.
13. The attempted removal of these heavy guns from Allegheny Arsenal, late in December, 1860,
created intense excitement. A monster mass meeting assembled at the call of the Mayor of the city,
and citizens of all parties aided in the effort to prevent the shipment. Through the interposition of
Hon. J. K. Moorhead, Hon. R. McKnight, Judge Shaler, Judge Wilkins, Judge Shannon, and others
inquiry was instituted, and a revocation of the order obtained. The Secessionists in Congress bitterly
complained of the “mob law” which thus interfered with the routine of governmental affairs.—
McPherson’s History.
14. Resigned January 17th, 1861, and succeeded by Hon. Lot M. Morrill.
15. Did not attend.
16. Resigned and succeeded January 2d, 1861, by Hon. Stephen Coburn.
17. From the “History of Abraham Lincoln and the Overthrow of Slavery,” by Hon. Isaac N.
Arnold.
18. 1864, February 15—Repealed the above act, but provided for continuing organizations of
partisan rangers acting as regular cavalry and so to continue; and authorizing the Secretary of War to
provide for uniting all bands of partisan rangers with other organizations and bringing them under
the general discipline of the provisional army.
19. See memorandum at end of list.
20. This incident was related to the writer by Col. A. K. McClure of Philadelphia, who was in
Lancaster at the time.
21. Arnold’s “History of Abraham Lincoln.”
22. On the 23d of July, 1861, the Attorney-General, in answer to a letter from the United States
Marshal of Kansas, inquiring whether he should assist in the execution of the fugitive slave law,
wrote:

Attorney-General’s Office, July 23, 1861.

J. L. McDowell, U. S. Marshal, Kansas:

Your letter, of the 11th of July, received 19th, (under frank of Senator Lane, of Kansas,) asks
advice whether you should give your official services in the execution of the fugitive slave law.
It is the President’s constitutional duty to “take care that the laws be faithfully executed.” That
means all the laws. He has no right to discriminate, no right to execute the laws he likes, and leave
unexecuted those he dislikes. And of course you and I, his subordinates, can have no wider latitude of
discretion than he has. Missouri is a State in the Union. The insurrectionary disorders in Missouri are
but individual crimes, and do not change the legal status of the State, nor change its rights and
obligations as a member of the Union.
A refusal by a ministerial officer to execute any law which properly belongs to his office, is an
official misdemeanor, of which I have no doubt the President would take notice. Very respectfully

EDWARD BATES.

23. Republicans in Roman; Democrats in italics.


24. Democrats in italics.
25. Republicans in roman; Democrats in italics.
26. In 1860 a vote was had in the State of New York on a proposition to permit negro suffrage
without a property qualification. The result of the city was—yeas 1,640. nays 37,471. In the State—
yeas 197,505, nays 337,984. In 1864 a like proposition was defeated—yeas 85,406, nays 224,336.
In 1862, in August, a vote was had in the State of Illinois, on several propositions relating to
negroes and mulattoes, with this result:
For excluding them from the State 171,893
Against 71,306
100,587
Against granting them suffrage or right to office 21,920
For 35,649
176,271
For the enactment of laws to prohibit them from going to, or voting in, the
State 198,938
Against 44,414
154,524
—From McPherson’s History of the Great Rebellion.

27. December 23, 1862—Jefferson Davis issued a proclamation of outlawry against Major
General B. F. Butler, the last two clauses of which are:
Third. That all negro slaves captured in arms be at once delivered over to the executive
authorities of the respective States to which they belong, to be dealt with according to the laws of said
States.
Fourth. That the like orders be executed in all cases with respect to all commissioned officers of
the United States when found serving in company with said slaves in insurrection against the
authorities of the different States of this Confederacy.
28. McPherson’s History, page 317.
29. This act is in those words:
Be it enacted, &c., That hereafter every person elected or appointed to any office of honor or
profit under the government of the United States, either in the civil, military, or naval departments of
the public service, excepting the President of the United States, shall, before entering upon the duties
of such office, and before being entitled to any of the salary or other emoluments thereof, take and
subscribe the following oath or affirmation: “I, A B, do solemnly swear (or affirm) that I have never
voluntarily borne arms against the United States since I have been a citizen thereof; that I have
voluntarily given no aid, countenance, counsel, or encouragement to persons engaged in armed
hostility thereto; that I have never sought nor accepted nor attempted to exercise the functions of any
office whatever, under any authority or pretended authority, in hostility to the United States; that I
have not yielded a voluntary support to any pretended government, authority, power, or constitution
within the United States, hostile or inimical thereto; and I do further swear (or affirm) that, to the
best of my knowledge and ability, I will support and defend the Constitution of the United States
against all enemies, foreign and domestic; that I will bear true faith and allegiance to the same; that I
take this obligation freely, without any mental reservation or purpose of evasion, and that I will well
and faithfully discharge the duties of the office on which I am about to enter; so help me God;” which
said oath, so taken and signed, shall be preserved among the files of the Court, House of Congress, or
Department to which the said office may appertain. And any person who shall falsely take the said
oath shall be guilty of perjury, and on conviction, in addition to the penalties now prescribed for that
offense, shall be deprived of his office, and rendered incapable forever after, of holding any office or
place under the United States.
30. Compiled by Hon. Edward McPherson in his Hand-Book of Politics for 1868.
31. Unofficial.
32. From Greeley’s Recollections of a Busy Life, page 413.
33. From the Century of Independence by John Sully, Boston.
34. The following is a correct table of the ballots in the New York Democratic Convention:
Candidates. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
Horatio
Seymour 9
George H.
Pendleton 105 104 119½ 118½ 122 122½ 137½ 156½ 144 147½ 144½
Andrew
Johnson 65 52 34½ 32 24 21 12½ 6 5½ 6 5½
Winfield S.
Hancock 33½ 40½ 45½ 43½ 46 47 42½ 28 34½ 34 33½
Sanford E.
Church 33 33 33 33 33 33 33
Asa Packer 26 26 26 26 27 27 26 26 26½ 27½ 26
Joel Parker 13 15½ 13 13 13 13 7 7 7 7 7
James E.
English 16 12½ 7½ 7½ 7 6 6 6 6
James R.
Doolittle 13 1½ 12 12 15 12 12 12 12 12 12½
Reverdy
Johnson 8½ 8 11 8 9½
Thomas A.
Hendricks 2½ 2 9½ 11½ 19½ 30 39½ 75 80½ 82½ 88
F. P. Blair,
Jr. ½ 10½ 4½ 2 5 ½ ½ ½ ½ ½
Thomas
Ewing ½ 1 1
J. Q. Adams 1
George B.
McClellan
Salmon P.
Chase
Franklin
Pierce
John T.
Hoffman
Stephen J.
Field
Thomas H.
Seymour
Candidates. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22.
Horatio
Seymour 317
George H.
Pendleton 145½ 134½ 130 129½ 107½ 70½ 56½
Andrew
Johnson 4½ 4½ 5½ 5½ 6 10 5
Winfield S.
Hancock 30 48½ 56 79½ 113½ 137½ 144½ 135½ 142½ 135½
Sanford E.
Church
Asa Packer 26 26 26 22
Joel Parker 7 7 7 7 7 7 3½
James E.
English 6 16 19
James R.
Doolittle 12½ 13 13 12 12 12 12 12 12 12
Reverdy
Johnson
Thomas A.
Hendricks 89 81 84½ 82½ 70½ 80 87 107½ 121 132
F. P. Blair,
Jr. ½ ½ 13½ 13
Thomas
Ewing
J. Q. Adams
George B.
McClellan 1 ½
Salmon P.
Chase ½ ½ ½ ½ ½ 4
Franklin
Pierce 1
John T.
Hoffman 3 3
Stephen J.
Field 15 9 8
Thomas H.
Seymour 4 2
Necessary to choice 212
35. General Blair was nominated unanimously on the first ballot.
36. One Democratic elector was defeated, being cut by over 500 voters on a
local issue.
37. Commonly called “Greenbacks,” or “Legal Tender notes.”
38. Commonly called “National Bank notes.”
39. By Rand & McNally, Chicago, Ill., 1882.
40. This was partially done by the Legislature of Pennsylvania in 1881.
41. Act of March 2, 1850.
42. Act of January 19, 1866.
43. Senate doc. 181, 46th Congress.
44. Sec. 2, 258, Rev. Stat. U.S.
45. According to the affidavits of Samuel Howard and others, page 14.
46. See Report of Attorney-General United States, 1880–81.
47. Act of March 6, 1862.
48. Act of February 16, 1872.
49. Secs. 1 and 2, act of February 3, 1852.
50. See act of January 17, 1862.
51. Act of January 7, 1854, sec. 14.
52. Acts of Jan 21, 1853, and of January, 1855, sec. 29.
53. Act of February 18, 1852.
54. Act of February 18, 1852.
55. Act of January 14, 1854.
56. Sec. 106. Act March 6, 1852.
57. Enormous sums are, however, given to soldiers who were wounded during
the war, or who pretend that they were—for jobbery on an unheard of scale is
practised in connection with these pensions. It is estimated that $120,000,000
(24,000,000l.) will have to be paid during the present fiscal year, for arrears of
pension, and the number of claimants is constantly increasing, [The writer
evidently got these “facts” from sensational sources.]—Am. Pol.
58. The undeniable facts of the case were as we have briefly indicated above,
See, for example, a letter to the ‘New York Nation,’ Nov. 3, 1881.
59. Speech In New York, March 7, 1881.
60. ‘New York Tribune,’ Feb. 25, 1870.
61. Letter in New York papers, Feb. 20, 1875.
62. Mr. George William Curtis, in ‘Harper’s Magazine,’ 1870.
63. Article I. sect. vi. 2.
64. ‘Commentaries,’ I. book iii. sect. 869.
65. [These are mere traditions tinged with the spirit of some of the assaults
made in the “good old days” even against so illustrious a man as Washington.—Am.
Pol.]
66. Mr. Watterson, formerly a distinguished member of Congress, is the
author of the “tariff for revenue only” plank in the Democratic National Platform of
1880, and is now, as he has been for years, the chief editor of the Louisville Courier
Journal.
67. American, 707; scattering 989.
68. In Connecticut, the vote for Sheriff is taken. In New York, the average vote
on four of the five State officers chosen, excluding Secretary of State. In Nebraska,
Democratic and Anti-Monopoly vote combined on Judge.
69. Scattering, 106.
70. In these States the vote on Lieutenant-Governor was taken, as being from
special causes, a fairer test of party strength. In the others the principal State
officer was taken. Where State officers were not elected, the Congressional vote
was taken. In Georgia, Congressmen-at-Large was taken.
71. The vote for Chief Judge.
72. The Regular and Independent Republican vote is combined.
73. Vote of the two Democratic candidates is combined.
74. One vote lacking in each.
75. One vote lacking.
76. One vote lacking.
77. 3 votes lacking.
78. Upon the resolution of Mr. Wythe, which proposed, “That the committee
should ratify the constitution, and that whatsoever amendments might be deemed
necessary should be recommended to the consideration of the congress, which
should first assemble under the constitution, to be acted upon according to the
mode prescribed therein.”
79. In answer to an address of Governor Eustis, denouncing the conduct of the
peace party during the war, the House of Representatives of Massachusetts, in
June, 1823, say, “The change of the political sentiments evinced in the late
elections forms indeed a new era in the history of our commonwealth. It is the
triumph of reason over passion; of patriotism over party spirit. Massachusetts has
returned to her first love, and is no longer a stranger in the Union. We rejoice that
though, during the last war, such measures were adopted in this state as
occasioned double sacrifice of treasure and of life, covered the friends of the nation
with humiliation and mourning, and fixed a stain on the page of our history, a
redeeming spirit has at length arisen to take away our reproach, and restore to us
our good name, our rank among our sister states, and our just influence in the
Union.
“Though we would not renew contentions, or irritate wantonly, we believe that
there are cases when it is necessary we should ‘wound to heal.’ And we consider it
among the first duties of the friends of our national government, on this return of
power, to disavow the unwarrantable course pursued by this state, during the late
war, and to hold up the measures of that period as beacons; that the present and
succeeding generations may shun that career which must inevitably terminate in
the destruction of the individual or party who pursues it; and may learn the
important lesson, that, in all times, the path of duty is the path of safety; and that it
is never dangerous to rally around the standard of our country.”
80. 2d Dodson’s Admiralty Reports, 48. 13th Mass. Reports, 26.
81. It appears at p. 6 of the “Account” that by a vote of the House of
Representatives of Massachusetts, (260 to 290) delegates to this convention were
ordered to be appointed to consult upon the subject “of their public grievances and
concerns,” and upon “the best means of preserving their resources,” and for
procuring a revision of the constitution of the United States, “more effectually to
secure the support and attachment of all the people, by placing all upon the basis
of fair representation.”
The convention assembled at Hartford on the 15th December, 1814. On the
next day it was
Resolved, That the most inviolable secrecy shall be observed by each member
of this convention, including the secretary, as to all propositions, debates, and
proceedings thereof, until this injunction shall be suspended or altered.
On the 24th of December, the committee appointed to prepare and report a
general project of such measures as may be proper for the convention to adopt,
reported among other things,—
“1. That it was expedient to recommend to the legislatures of the states the
adoption of the most effectual and decisive measures to protect the militia of the
states from the usurpations contained in these proceedings.” [The proceedings of
Congress and the executive, in relation to the militia and the war.]
“2. That it was expedient also to prepare a statement, exhibiting the necessity
which the improvidence and inability of the general government have imposed
upon the states of providing for their own defence, and the impossibility of their
discharging this duty, and at the same time fulfilling the requisitions of the general
government, and also to recommend to the legislatures of the several states to
make provision for mutual defence, and to make an earnest application to the
government of the United States, with a view to some arrangement whereby the
state may be enabled to retain a portion of the taxes levied by Congress, for the
purpose of self-defence, and for the reimbursement of expenses already incurred
on account of the United States.
“3. That it is expedient to recommend to the several state legislatures certain
amendments to the constitution, viz.,—
“That the power to declare or make war, by the Congress of the United States,
be restricted.
“That it is expedient to attempt to make provision for restraining Congress in
the exercise of an unlimited power to make new states, and admit them into the
Union.
“That an amendment be proposed respecting slave representation and slave
taxation.”
On the 29th of December, 1814, it was proposed “that the capacity of
naturalized citizens to hold offices of trust, honor, or profit ought to be restrained,”
&c.
The subsequent proceedings are not given at large. But it seems that the report
of the committee was adopted, and also a recommendation of certain measures (of
the character of which we are not informed) to the states for their mutual defence;
and having voted that the injunction of secrecy, in regard to all the debates and
proceedings of the convention, (except so far as relates to the report finally
adopted,) be continued, the convention adjourned sine die, but as was supposed, to
meet again when circumstances should require it.
82. I refer to the authority of Chief Justice Marshall in the case of Jonathan
Robbins. I have not been able to refer to the speech, and speak from memory.
83. In this extended abstracts are given and data references omitted not
applicable to these times.
84. Speech at the Tabernacle, New York, February 10, 1843, in public debate
on this resolution:—
Resolved, That a Protective Tariff is conducive to our National Prosperity.

Affirmative: Joseph Blunt,


Horace Greeley.

Negative: Samuel J. Tilden,


Parke Godwin.

From Greeley’s “Recollections of a Busy Life.”


85. All the series were published in 1860 by Follet, Foster & Co., Columbus,
Ohio.

You might also like