Pentagon Considers Turning Cell Phones Into Walkie-Talkies During Emergencies

The government is strategizing how to maintain the integrity of emergency communications in an increasingly wireless world.

A Pentagon sign is seen during a press briefing at the Pentagon Briefing Room August 29, 2014 in Arlington, Virginia.
National Journal
May 8, 2015, 6:03 a.m.

Let’s say it’s 2016 and the government has a message to get out to the public—ISIS is believed to be waging an attack on cell-phone towers in the United States. How can the feds communicate that to a population of cord-cutters when the towers are down?

That hypothetical scenario is one of the problems the government and telecommunications providers are grappling with, as they strategize how to maintain the integrity of emergency communications in an increasingly wireless world.

There are some solutions floating around in the Defense Department. That smartphone may not be as inert as most would expect when towers go kaput.

“At the base level, electronics that people have in their pockets are radio transceivers, and they can not only talk to cell towers; they can talk to each other,” Defense Chief Information Officer Terry Halvorsen said Wednesday.

“Should we mesh these together” if towers are unavailable “to propagate a broadcast signal to replace the old civil-defense broadcast?” he posited, referring to a Cold War-era arrangement for discreetly repeating messages from one radio station to another across the country.

Halvorsen was bouncing ideas off members of the President’s National Security Telecommunications Advisory Committee, a panel that compiles recommendations on critical national security and emergency preparedness issues.

“It would be unimaginable 50 years ago to talk about a situation where every citizen has a UHF transceiver in their pocket, but that’s what we have today and we should think out of the box in how to leverage that in emergency situations,” Halvorson said.

The advisory council has long warned the government about the difficulty of pushing out Wi-Fi and broadband communications to the masses during disasters.

“A router placed at the edge of the network to connect various types of residential, cellular, satellite, or enterprise clients to the core network may experience congestion at peak traffic times or during network events,” panel members wrote in a 2008 report, “National Security and Emergency Preparedness Internet Protocol-Based Traffic.”

A federal government colleague of Halvorsen’s from the Homeland Security Department pointed out one hiccup with harnessing the distributed-cellular power of crowds to get out a message.

“In a world where everybody can broadcast, the ability to spoof, or fake, a government broadcast is obviously increased,” said Andy Ozment, assistant secretary of the DHS Office of Cybersecurity and Communications.

Whereas now, “the likelihood that somebody will fake a government broadcast that overrides all the TV channels in the nation is relatively low; the likelihood that somebody will fake a government broadcast that appears on one stream of some commercial service is not as low at all,” Ozment cautioned.

There have, in fact, been instances of hackers interrupting regular programming to issue false warnings.

In 2013, a Montana TV station broadcast was disrupted by news of a zombie apocalypse, the Associated Press reported at the time. Unauthorized users broke into the Emergency Alert System of KRTV and its CW channel. According to the New York Daily News, a computerized voice advised: the “bodies of the dead are rising from their graves. Follow the messages on screen that will be updated as information becomes available. Do not attempt to approach or apprehend these bodies as they are considered extremely dangerous.”

The government should make it harder for pranksters or terrorists to log into emergency-communications systems, Halvorsen acknowledged.

“You don’t want some teenager thinking—’Oh, this is Super Twitter,’” he said. “It comes down to, Who has the keys that authorize such a transmission so that kind of design has to be thought about up front to make sure that this is a secure mechanism?”

What We're Following See More »
HOUSE TO VOTE LATER THIS WEEK
Criminal Justice Reform Bill Clears Senate
10 hours ago
THE LATEST

"The Senate passed a bipartisan criminal justice reform bill on Tuesday night, handing a significant victory to President Trump and senators who lobbied to advance the legislation before the end of the year. Senators voted 87-12 on the legislation, which merges a House-passed prison reform bill aimed at reducing recidivism with a handful of changes to sentencing laws and mandatory minimum prison sentences." The House aims to vote on the measure when it reconvenes later this week.

Source:
"EKE OUT" MORE COOPERATION
Judge Delays Flynn Sentencing
16 hours ago
THE LATEST

Federal Judge Emmet Sullivan "agreed Tuesday to postpone Michael Flynn’s sentencing after a hearing to decide the punishment for President Donald Trump’s former national security adviser went awry." Sullivan gave Flynn a chance to reconsider his decision to plead guilty, adding that he could not "guarantee a sentence without prison time, even after the special counsel’s office recommended that Flynn not be incarcerated. After a brief recess, Sullivan and prosecutors agreed to delay sentencing so that Flynn could "eke out the last modicum of cooperation."

Source:
VOTE IS 82-12
Senate Advances Criminal Justice Reform
19 hours ago
THE LATEST
TRIED TO LINK HIM TO "RADICAL ISLAMIC GROUPS"
Russia Targeting Mueller with Cyber Ops
21 hours ago
THE LATEST
RELEASED ON BAIL
Partner of Flynn Charged in Turkey Case
1 days ago
THE LATEST
×
×

Welcome to National Journal!

You are currently accessing National Journal from IP access. Please login to access this feature. If you have any questions, please contact your Dedicated Advisor.

Login