Pentagon Considers Turning Cell Phones Into Walkie-Talkies During Emergencies

The government is strategizing how to maintain the integrity of emergency communications in an increasingly wireless world.

A Pentagon sign is seen during a press briefing at the Pentagon Briefing Room August 29, 2014 in Arlington, Virginia.
National Journal
Aliya Sternstein, Nextgov
Add to Briefcase
Aliya Sternstein, NextGov
May 8, 2015, 6:03 a.m.

Let’s say it’s 2016 and the government has a message to get out to the public—ISIS is believed to be waging an attack on cell-phone towers in the United States. How can the feds communicate that to a population of cord-cutters when the towers are down?

That hypothetical scenario is one of the problems the government and telecommunications providers are grappling with, as they strategize how to maintain the integrity of emergency communications in an increasingly wireless world.

There are some solutions floating around in the Defense Department. That smartphone may not be as inert as most would expect when towers go kaput.

“At the base level, electronics that people have in their pockets are radio transceivers, and they can not only talk to cell towers; they can talk to each other,” Defense Chief Information Officer Terry Halvorsen said Wednesday.

“Should we mesh these together” if towers are unavailable “to propagate a broadcast signal to replace the old civil-defense broadcast?” he posited, referring to a Cold War-era arrangement for discreetly repeating messages from one radio station to another across the country.

Halvorsen was bouncing ideas off members of the President’s National Security Telecommunications Advisory Committee, a panel that compiles recommendations on critical national security and emergency preparedness issues.

“It would be unimaginable 50 years ago to talk about a situation where every citizen has a UHF transceiver in their pocket, but that’s what we have today and we should think out of the box in how to leverage that in emergency situations,” Halvorson said.

The advisory council has long warned the government about the difficulty of pushing out Wi-Fi and broadband communications to the masses during disasters.

“A router placed at the edge of the network to connect various types of residential, cellular, satellite, or enterprise clients to the core network may experience congestion at peak traffic times or during network events,” panel members wrote in a 2008 report, “National Security and Emergency Preparedness Internet Protocol-Based Traffic.”

A federal government colleague of Halvorsen’s from the Homeland Security Department pointed out one hiccup with harnessing the distributed-cellular power of crowds to get out a message.

“In a world where everybody can broadcast, the ability to spoof, or fake, a government broadcast is obviously increased,” said Andy Ozment, assistant secretary of the DHS Office of Cybersecurity and Communications.

Whereas now, “the likelihood that somebody will fake a government broadcast that overrides all the TV channels in the nation is relatively low; the likelihood that somebody will fake a government broadcast that appears on one stream of some commercial service is not as low at all,” Ozment cautioned.

There have, in fact, been instances of hackers interrupting regular programming to issue false warnings.

In 2013, a Montana TV station broadcast was disrupted by news of a zombie apocalypse, the Associated Press reported at the time. Unauthorized users broke into the Emergency Alert System of KRTV and its CW channel. According to the New York Daily News, a computerized voice advised: the “bodies of the dead are rising from their graves. Follow the messages on screen that will be updated as information becomes available. Do not attempt to approach or apprehend these bodies as they are considered extremely dangerous.”

The government should make it harder for pranksters or terrorists to log into emergency-communications systems, Halvorsen acknowledged.

“You don’t want some teenager thinking—’Oh, this is Super Twitter,’” he said. “It comes down to, Who has the keys that authorize such a transmission so that kind of design has to be thought about up front to make sure that this is a secure mechanism?”

What We're Following See More »
TEXAS AND ARKANSAS BASES COULD ACCOMMODATE KIDS
U.S. May House 20K Immigrants on Military Bases
23 hours ago
THE LATEST

"The United States is preparing to shelter as many as 20,000 migrant children on four American military bases" in Texas and Arkansas, "as federal officials struggled to carry out President Trump’s order to keep immigrant families together after they are apprehended at the border."

Source:
CONFERENCE ASKS FOR FURTHER CHANGES
Vote on Compromise Immigration Bill Gets Bumped to Next Week
1 days ago
THE LATEST

"House Republican leaders are further delaying a vote on a compromise immigration bill, planning to make changes to the legislation for a vote next week. The news comes after a two-hour Republican Conference meeting Thursday, in which authors of the bill walked through its contents and members raised concerns about issues the bill doesn’t address, multiple GOP lawmakers said. Many members requested the addition of a provision to require employers to use the E-Verify database to cheek the legal status of their employees."

Source:
COMPROMISE BILL TO GET VOTE TOMORROW
Conservative Immigration Bill Goes Down to Defeat
1 days ago
THE LATEST

After a conservative-backed immigration bill failed in the House, 193-231, leaders "postponed a vote on a 'compromise' immigration proposal until Friday. ... GOP leaders, however, are under no impression that they'll be able to secure the 218 votes needed in the next 24 hours to pass the text. Rather, the delay is to give members more time to read the bill."

Source:
CONFUSION REIGNS
Immigration Votes May Get Delayed Until Friday
1 days ago
THE LATEST
FOLLOW-UP TO YESTERDAY’S EXEC ORDER
Prosecutions of Families with Children at Border to Cease
1 days ago
THE LATEST
×
×

Welcome to National Journal!

You are currently accessing National Journal from IP access. Please login to access this feature. If you have any questions, please contact your Dedicated Advisor.

Login