system security (Titima Ongkantong/


DHS S&T focuses on future mobile threats

The Department of Homeland Security's Science and Technology Directorate is looking to develop cybersecurity tools for existing and emerging wireless protocols. The Secure and Resilient Mobile Network Infrastructure solicitation was posted on April 22.

DHS is looking for solutions to potential security gaps in air interfaces between mobile devices and the radio access network, between cell towers and base stations, virtualized segments of the radio network and core network that supports it. The announcement also mentions the side-channel network telecommunications use to send network information called Signaling System 7 (SS7).

SS7 is used by 2G, 3G and wireline telecommunications networks to carry information that back services such as call forwarding, telephone number portability, as well as calling party number display and three-way calling. The danger for SS7, it said, is that it does not have authentication between networks for traffic traversing multiple individual carriers. The vulnerability has been exploited by hackers to track and intercept calls and texts, deny service to users and commit financial fraud.

DHS will convene an industry day on May 16 in Washington D.C. to discuss next steps.

The Secure and Resilient Mobile Network Infrastructure solicitation is also looking to address gaps in encryption in existing 4G networks, in which user traffic is not "necessarily" encrypted as it moves through wireline backhaul networks. "This potential lack of encryption leaves user data at risk of eavesdropping and user systems susceptible to man-in-the-middle attacks," the notice states.

The program is also looking to improve visibility into government mobile devices that are outside federal firewalls and Trusted Internet Connection networks and to help guarantee that emerging 5G network security architecture takes government needs into account. One specific threat cited is the proliferation of internet of things devices operating on unprotected small cells in urban areas.

Multiple awards are expected across various aspects of the solicitation maxing out at $2.75 million according to contracting documents.

This article was first posted to FCW, a sibling site to GCN.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at [email protected] or follow him on Twitter at @MRockwell4.


  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected