Pentagon Considers Turning Cell Phones Into Walkie-Talkies During Emergencies

The government is strategizing how to maintain the integrity of emergency communications in an increasingly wireless world.

A Pentagon sign is seen during a press briefing at the Pentagon Briefing Room August 29, 2014 in Arlington, Virginia.
National Journal
May 8, 2015, 6:03 a.m.

Let’s say it’s 2016 and the government has a message to get out to the public—ISIS is believed to be waging an attack on cell-phone towers in the United States. How can the feds communicate that to a population of cord-cutters when the towers are down?

That hypothetical scenario is one of the problems the government and telecommunications providers are grappling with, as they strategize how to maintain the integrity of emergency communications in an increasingly wireless world.

There are some solutions floating around in the Defense Department. That smartphone may not be as inert as most would expect when towers go kaput.

“At the base level, electronics that people have in their pockets are radio transceivers, and they can not only talk to cell towers; they can talk to each other,” Defense Chief Information Officer Terry Halvorsen said Wednesday.

“Should we mesh these together” if towers are unavailable “to propagate a broadcast signal to replace the old civil-defense broadcast?” he posited, referring to a Cold War-era arrangement for discreetly repeating messages from one radio station to another across the country.

Halvorsen was bouncing ideas off members of the President’s National Security Telecommunications Advisory Committee, a panel that compiles recommendations on critical national security and emergency preparedness issues.

“It would be unimaginable 50 years ago to talk about a situation where every citizen has a UHF transceiver in their pocket, but that’s what we have today and we should think out of the box in how to leverage that in emergency situations,” Halvorson said.

The advisory council has long warned the government about the difficulty of pushing out Wi-Fi and broadband communications to the masses during disasters.

“A router placed at the edge of the network to connect various types of residential, cellular, satellite, or enterprise clients to the core network may experience congestion at peak traffic times or during network events,” panel members wrote in a 2008 report, “National Security and Emergency Preparedness Internet Protocol-Based Traffic.”

A federal government colleague of Halvorsen’s from the Homeland Security Department pointed out one hiccup with harnessing the distributed-cellular power of crowds to get out a message.

“In a world where everybody can broadcast, the ability to spoof, or fake, a government broadcast is obviously increased,” said Andy Ozment, assistant secretary of the DHS Office of Cybersecurity and Communications.

Whereas now, “the likelihood that somebody will fake a government broadcast that overrides all the TV channels in the nation is relatively low; the likelihood that somebody will fake a government broadcast that appears on one stream of some commercial service is not as low at all,” Ozment cautioned.

There have, in fact, been instances of hackers interrupting regular programming to issue false warnings.

In 2013, a Montana TV station broadcast was disrupted by news of a zombie apocalypse, the Associated Press reported at the time. Unauthorized users broke into the Emergency Alert System of KRTV and its CW channel. According to the New York Daily News, a computerized voice advised: the “bodies of the dead are rising from their graves. Follow the messages on screen that will be updated as information becomes available. Do not attempt to approach or apprehend these bodies as they are considered extremely dangerous.”

The government should make it harder for pranksters or terrorists to log into emergency-communications systems, Halvorsen acknowledged.

“You don’t want some teenager thinking—’Oh, this is Super Twitter,’” he said. “It comes down to, Who has the keys that authorize such a transmission so that kind of design has to be thought about up front to make sure that this is a secure mechanism?”

What We're Following See More »
REPLACEMENT TO BE ANNOUNCED NEXT WEEK
Zinke Resigns
11 hours ago
THE LATEST
FOR IMPROPER SPENDING, INFLUENCE
Trump Inauguration Spending Now Under Investigation
2 days ago
THE LATEST

"Federal prosecutors in Manhattan are investigating whether President Trump’s 2017 inaugural committee misspent some of the record $107 million it raised from donations, people familiar with the matter said. The criminal probe by the Manhattan U.S. attorney’s office, which is in its early stages, also is examining whether some of the committee’s top donors gave money in exchange for access to the incoming Trump administration, policy concessions or to influence official administration positions."

Source:
PINS KHASHOGGI KILLING ON MBS
Senate Moves to End Support for Saudi War
2 days ago
WHY WE CARE
FACES UP TO FIVE YEARS
Butina Pleads Guilty to Conspiracy
2 days ago
THE LATEST

"Alleged Russian spy Maria Butina pleaded guilty in federal court Thursday for conspiracy to act as an illegal foreign agent in the United States. Butina, 30, was accused of working to infiltrate Republican political circles through groups such as the National Rifle Association to bolster Russian interests." She admitted to acting "under direction of" Alexander Torshin. "She faces a maximum of five years in prison and will likely be deported after serving any time."

Source:
HIS LAWYERS ASKED FOR LENIENCY
Cohen Sentenced to 36 Months in Prison
3 days ago
THE LATEST
×
×

Welcome to National Journal!

You are currently accessing National Journal from IP access. Please login to access this feature. If you have any questions, please contact your Dedicated Advisor.

Login