Pentagon Considers Turning Cell Phones Into Walkie-Talkies During Emergencies

The government is strategizing how to maintain the integrity of emergency communications in an increasingly wireless world.

A Pentagon sign is seen during a press briefing at the Pentagon Briefing Room August 29, 2014 in Arlington, Virginia.
National Journal
Aliya Sternstein, Nextgov
Add to Briefcase
Aliya Sternstein, NextGov
May 8, 2015, 6:03 a.m.

Let’s say it’s 2016 and the government has a message to get out to the public—ISIS is believed to be waging an attack on cell-phone towers in the United States. How can the feds communicate that to a population of cord-cutters when the towers are down?

That hypothetical scenario is one of the problems the government and telecommunications providers are grappling with, as they strategize how to maintain the integrity of emergency communications in an increasingly wireless world.

There are some solutions floating around in the Defense Department. That smartphone may not be as inert as most would expect when towers go kaput.

“At the base level, electronics that people have in their pockets are radio transceivers, and they can not only talk to cell towers; they can talk to each other,” Defense Chief Information Officer Terry Halvorsen said Wednesday.

“Should we mesh these together” if towers are unavailable “to propagate a broadcast signal to replace the old civil-defense broadcast?” he posited, referring to a Cold War-era arrangement for discreetly repeating messages from one radio station to another across the country.

Halvorsen was bouncing ideas off members of the President’s National Security Telecommunications Advisory Committee, a panel that compiles recommendations on critical national security and emergency preparedness issues.

“It would be unimaginable 50 years ago to talk about a situation where every citizen has a UHF transceiver in their pocket, but that’s what we have today and we should think out of the box in how to leverage that in emergency situations,” Halvorson said.

The advisory council has long warned the government about the difficulty of pushing out Wi-Fi and broadband communications to the masses during disasters.

“A router placed at the edge of the network to connect various types of residential, cellular, satellite, or enterprise clients to the core network may experience congestion at peak traffic times or during network events,” panel members wrote in a 2008 report, “National Security and Emergency Preparedness Internet Protocol-Based Traffic.”

A federal government colleague of Halvorsen’s from the Homeland Security Department pointed out one hiccup with harnessing the distributed-cellular power of crowds to get out a message.

“In a world where everybody can broadcast, the ability to spoof, or fake, a government broadcast is obviously increased,” said Andy Ozment, assistant secretary of the DHS Office of Cybersecurity and Communications.

Whereas now, “the likelihood that somebody will fake a government broadcast that overrides all the TV channels in the nation is relatively low; the likelihood that somebody will fake a government broadcast that appears on one stream of some commercial service is not as low at all,” Ozment cautioned.

There have, in fact, been instances of hackers interrupting regular programming to issue false warnings.

In 2013, a Montana TV station broadcast was disrupted by news of a zombie apocalypse, the Associated Press reported at the time. Unauthorized users broke into the Emergency Alert System of KRTV and its CW channel. According to the New York Daily News, a computerized voice advised: the “bodies of the dead are rising from their graves. Follow the messages on screen that will be updated as information becomes available. Do not attempt to approach or apprehend these bodies as they are considered extremely dangerous.”

The government should make it harder for pranksters or terrorists to log into emergency-communications systems, Halvorsen acknowledged.

“You don’t want some teenager thinking—’Oh, this is Super Twitter,’” he said. “It comes down to, Who has the keys that authorize such a transmission so that kind of design has to be thought about up front to make sure that this is a secure mechanism?”

What We're Following See More »
WAS LEADING COMMUNICATIONS EFFORTS
Judiciary Committee Staffer Quits Amid Harassment Claims
3 hours ago
THE LATEST

"Garrett Ventry, a communications adviser for the Senate Judiciary Committee's GOP majority who was leading the committee's response to allegations against Supreme Court nominee Brett Kavanaugh, has stepped down."

Source:
DETAILS STILL BEING NEGOTIATED
Ford Agrees to Testify on Thursday
4 hours ago
THE LATEST

"The Senate Judiciary Committee tentatively agreed to a hearing on Thursday with Christine Blasey Ford regarding her allegation that Supreme Court nominee Brett Kavanaugh sexually assaulted her while in high school, according to a person briefed on a call between the panel and her lawyers on Saturday night." Details are still being worked out, but "on Friday, the two parties agreed to limit the number of cameras in the hearing room, ensure Ford and Kavanaugh are not in the same room together, offer Ford breaks in her testimony and security from the U.S. Capitol Police."

Source:
WEDNESDAY?
Judiciary Committee Counteroffers on Ford Appearance
1 days ago
THE LATEST
THIS WILL NOT HELP
Trump Says Ford Should Have Filed Charges 36 Years Ago
1 days ago
THE LATEST
DOESN'T WANT TO BE NEAR KAVANAUGH
Ford Would Like to Testify on Thursday
2 days ago
THE LATEST

"Christine Blasey Ford, the woman accusing Supreme Court nominee Brett Kavanaugh of sexual assault in the 1980s, is reportedly willing to publicly testify in front of the Senate Judiciary Committee next Thursday. Lawyers for Ford told committee staffers during a call Thursday evening to negotiate details of a potential hearing that she wanted Kavanaugh to testify before her and she does not want to be in the same room as him, according to multiple reports."

Source:
×
×

Welcome to National Journal!

You are currently accessing National Journal from IP access. Please login to access this feature. If you have any questions, please contact your Dedicated Advisor.

Login