Russian-Linked Spy Ring Who Used Advanced Wireless Arsenal Against US-Ukrainian Personnel at Stuttgart Army Airfield Sentenced
Joseph Salazar - May 20, 2025
Investigation reveals sophisticated surveillance technology targeted at U.S.-Ukraine missile training activities.
Spy Ring’s Operation Against Stuttgart Army Air Field Highlights New Normal of Critical Wireless Security Vulnerabilities
This week, prosecutors have secured convictions against members of a Russian-directed spy network that conducted surveillance operations across Europe, including a sophisticated operation targeting a U.S. military base in Stuttgart, Germany. Documents released by the Crown Prosecution Service reveal the Stuttgart base was under surveillance from late 2022 until February 2023, with intelligence efforts specifically focused on Ukrainian forces receiving training on surface-to-air missile systems.
The operation employed multiple layers of wireless surveillance technology to gather intelligence on military personnel that authorities believe was intended to track Ukrainian soldiers upon their return to Ukraine. Investigators documented a modified vehicle near the base perimeter that housed IMSI catchers, other specialized equipment for wireless data interception, and tools for planting advanced technical surveillance devices outside the base.
Piggybacked on soldiers’ mobile phones.
Investigators say that by spoofing legitimate carriers, the spy ring’s IMSI catchers harvested unique IMSI/IMEI identifiers to allow Russian forces to target the locations of Ukrainian Surface-to-Air weapons, once these newly trained soldiers returned to the frontlines. The tools also allowed the spy ring to potentially force downgrades to 2 G, and funnel call data and location beacons back to Moscow.
An Inventory To Attack A Wireless Airspace
Following raids on multiple properties, investigators cataloged an extensive collection of surveillance technology:
Category | Quantity | Tactical Use |
IMSI catchers / “grabbers” | 3 | Rogue base‑station, subscriber tracking, SMS interception |
Pineapple Wi‑Fi access‑point emulators | 4 | Credential theft, man‑in‑the‑middle, lateral movement |
SIM cards | 495 | Remote access over cellular data, Mesh relays, Spoofed device personas |
Smartphones | 221 | Inconspicuous recording equipment, close access wireless attacks via Kali Nethunter, Burner infrastructure |
Audio / visual bugs | 88 | Covert capture and remote streaming |
Drones | 11 | Above‑roof reconnaissance, spectrum survey, payload drop |
Jammers, spoofers, and “hacking equipment” | 110 (misc.) | Obscure friendly traffic, force‑connect to malicious beacons, network infiltration & device takeover |
Editorial note: The sheer volume of prepaid SIM cards strongly suggests many of the above devices were remotely accessible or pushed video/audio over cellular data links: no Wi‑Fi credentials required to exfiltrate information out of a secure facility.
Wi-Fi Pineapple: Advanced Network Exploitation Tool
The four Wi-Fi Pineapple devices recovered represent particularly sophisticated wireless threats. Developed by Hak5, penetration testers use these commercially available devices to audit wireless network security, but malicious actors can repurpose them for intelligence-gathering operations.
They function by exploiting how devices automatically connect to previously trusted networks. When a target device, such as a smartphone or laptop, searches for familiar networks, the Pineapple responds by impersonating those networks. This “man-in-the-middle” capability allows operators to:
- Intercept unencrypted web traffic
- Capture authentication credentials
- Monitor communications
- Deploy targeted exploits against connected devices
- Create detailed profiles of network usage patterns
Why the Spy-ring’s Toolkit Matters
- Near‑peer actors no longer need to breach the firewall; they can sit in the car park and set up an ersatz cell tower.
- Standard defensive radios are blind to non‑networked emitters. IMSI catchers, jammers, and Wi‑Fi Pineapples live outside the wired infrastructure the SIEM already watches.
- Multi‑protocol blending defeats single‑sensor point tools. A Pineapple forces a smartphone off WPA2 within the fence line; an IMSI catcher follows the same handset on leave two hours later. These tools effectively create a surveillance bubble that can capture virtually all wireless communications within range.
Operational Lessons for Government, Critical Industry, and Enterprise Cybersecurity Planners:
- Treat cellular, Bluetooth LE, Zigbee, and Wi‑Fi as a single, contiguous attack plane. If they emit, they’re part of the risk surface.
- Baseline first, hunt second. Stuttgart’s sensors would have flagged three sudden rogue LTE eNodeBs lighting up outside the perimeter if a continuous spectrum fingerprint had been in place.
- Correlate location with identity. Knowing which handset crossed the geo‑fence is only helpful if one also knows whose handset it is and whether it just paired with a Pineapple.
Where Bastille Fits
Bastille’s enterprise and government sensor arrays were purpose‑built for exactly this blend of cellular and Wi‑Fi tradecraft:
- Detect hidden transmitting devices and Wi-fi Pineapples in real time across 25 MHz – 7.125 GHz.
- In real time, locate every emitting component within one to three meters of accuracy. Then, replay its historical movement on a facility floor plan or field.
- Stream enriched alerts to XDR, SOAR, and camera systems, letting security forces auto-slew-to-cue PTZ cameras or track down a rogue network device in seconds.
Bottom Line
The Stuttgart case isn’t an outlier, but the new normal for blended physical‑cyber actors and espionage. Whether defending a missile‑training range, a classified SCIF, or an OT plant, organizations need continuous, protocol‑agnostic visibility into every device that talks over the air. Bastille delivers that visibility, the 3‑D location to act on it, and the integrations to fold wireless risk into the rest of a Zero‑Trust stack.
Ready to see what’s really transmitting outside the perimeter? Contact us for a demo at https://bastille.net/contact-us/.
Source: https://bastille.net/russian-spy-ring-uses-advanced-wireless-arsenal-against-us-ukrainian-personnel
Join us to get updates!
The Power of Continuous RF Monitoring with Bastille Networks
Joseph Salazar - May 20, 2025
Rapid and accurate threat detection is crucial in today’s dynamic RF security landscape. Bastille Networks, a leader in RF security, stands out by providing continuous RF monitoring that ensures comprehensive protection against wireless threats. This capability is vital for maintaining a high Probability of Detection (POD) and securing critical environments.
Understanding Continuous RF Monitoring
Continuous RF monitoring involves constant surveillance of the radio frequency spectrum to detect, identify, and neutralize potential threats in real-time. Unlike periodic scanning, which may leave gaps in coverage, continuous monitoring offers 24/7 observation of RF activities. This proactive approach allows for identifying and responding to threats as they occur, minimizing the risk of delayed action.
The Importance of Probability of Detection (POD)
Probability of Detection (POD) measures the likelihood that a security system will detect a specific threat or signal within its environment. A high POD is critical in RF security, ensuring that even the most subtle or hidden signals are detected and analyzed for potential risks. Continuous monitoring significantly enhances POD by preventing signals from going unnoticed.
Factors Influencing POD in RF Security
Several key factors impact the POD in RF security systems:
- Signal Strength and Quality: Detecting weak or low-power signals is essential in RF environments. High-quality RF detection systems excel at identifying these signals despite surrounding noise.
- Frequency Range: Wide frequency coverage increases the chances of detecting various RF threats, from Wi-Fi to rogue cell devices.
- Environmental Complexity: Factors such as building materials and layouts can obstruct signals. Advanced systems overcome these challenges with sophisticated detection technologies.
- Technological Sophistication: Machine learning and advanced algorithms help systems differentiate between benign and malicious signals, improving accuracy and reducing false positives.
Bastille Networks: Maximizing POD with Continuous RF Monitoring
Bastille Networks’ cutting-edge technology maximizes the Probability of Detection through continuous RF monitoring. Key features include:
- Advanced Software-Defined Radio (SDR) Technology: Bastille’s SDR technology scans across a broad spectrum, detecting signals other systems may miss. This adaptability allows it to capture even obscure or low-power transmissions.
- Machine Learning Algorithms: Bastille leverages machine learning to enhance its detection capabilities. These algorithms continuously learn from patterns and anomalies, increasing accuracy and reliability.
- Real-Time Monitoring and Analysis: Bastille’s real-time monitoring ensures immediate detection and response to emerging threats, which is crucial for maintaining a high POD.
- Comprehensive Coverage: Bastille’s solutions cover large and complex environments, ensuring no area goes unmonitored, thereby significantly enhancing overall detection capabilities.
Practical Applications and Case Studies
Securing Enterprise Environments
Due to the high density of wireless devices, enterprise environments are particularly vulnerable to RF threats. Bastille’s continuous monitoring solutions are deployed in these settings to provide constant oversight and high detection accuracy, allowing for the swift identification and mitigation of unauthorized devices and potential threats.
Protecting Government Facilities
Government facilities face more sophisticated RF threats. Through continuous monitoring, Bastille Networks has demonstrated its ability to maintain a high POD in these sensitive environments, safeguarding critical communications and data. Real-time detection ensures that these facilities can detect potential breaches before they can cause harm.
Tackling Covert Threats: The Case of Listening Devices
Not all RF threats are constant. Some listening devices, for instance, only transmit when triggered by sound or motion, making them difficult to detect with periodic scanning. Continuous RF monitoring, as provided by Bastille Networks, excels at identifying these intermittent signals, ensuring that even covert threats are detected and mitigated.
Paul D. Turner, an expert in technical surveillance countermeasures, emphasizes the importance of maintaining a high POD in RF security. His work underscores how continuous monitoring systems like those from Bastille Networks are essential for securing critical infrastructure and sensitive information.
The Numbers Behind POD: A Statistical Reality
According to Paul D. Turner’s “Technical Surveillance Countermeasures” (2023), traditional RF detection systems exhibit a POD ranging from 60% to 80%. However, advanced systems like those developed by Bastille Networks can achieve a POD exceeding 95%. This significant difference highlights the superiority of Bastille’s technology in detecting and neutralizing RF threats.
A breakdown of detection times further illustrates the importance of continuous monitoring:
- 24/7 Monitoring (8,760 hours/year): 100% coverage
- Daily, 12 hours/day: 50% coverage
- Daily, 8 hours/day: 33% coverage
- Weekly, 8 hours/week: 21% coverage
- Monthly, 8 hours/month: 1.1% coverage
- Quarterly, 8 hours/quarter: 0.37% coverage
- Twice Annually, 8 hours/session: 0.18% coverage
- Annually, 8 hours/year: 0.09% coverage
These statistics reveal the vulnerabilities inherent in anything less than continuous monitoring.
Conclusion
In RF security, continuous RF monitoring is essential for maintaining a high Probability of Detection and defending against a wide range of wireless threats. Bastille Networks excels in this area, offering advanced technology, real-time monitoring, and comprehensive coverage to ensure robust and reliable RF security.
To learn more about how Bastille Networks can enhance your RF security and maximize your POD, visit their website and explore their innovative solutions.
Sources
Join us to get updates!
Investigators Discover Hidden Communications Devices in US Solar Grid Inverters and Batteries
Luke Whiting - May 15, 2025
U.S. energy‑sector forensic teams have begun disassembling Chinese‑manufactured solar inverters and grid‑scale batteries after discovering undocumented 4G/LTE modules and other wireless communication transceivers buried on the circuit boards, according to two people involved in the tear‑downs. The covert hardware, absent from published schematics, creates an out‑of‑band path that can tunnel straight through utility firewalls, potentially granting offshore operators the ability to reconfigure or even turn off power‑conversion equipment at will.
“There is clearly strategic value in seeding core infrastructure with components that can be flipped off like a light switch”
Former National Security Agency director Mike Rogers tells Reuters.
What investigators found
- Over the past nine months, forensic security teams have logged multiple brands of Chinese solar inverters containing hidden wireless communication equipment.
- Investigators have also discovered hidden cellular radios in grid‑attached lithium‑ion battery cabinets from several vendors.
- According to three people briefed on the incident, in November 2024, China remotely shut down commercial‑scale inverters in the U.S. and other countries.
While the Department of Energy (DOE) has not publicly commented on the November outage, officials confirmed they are “continually reassessing the risk of undocumented functionality” and are pressing suppliers for a complete Software Bill of Materials.
Why Power Utilities are worried
Modern distribution grids lean heavily on inverters to translate DC from solar, storage, heat‑pump drives, and EV chargers into AC usable by the network. Because inverters operate in millisecond feedback loops with grid‑control systems, mass manipulation of their set‑points can destabilise frequency and voltage in seconds, far faster than conventional protective relays can respond. “That effectively means there is a built-in way to physically destroy the grid,” one source familiar with the discoveries reported to Reuters.
A March 2025 report by Forescout researchers documented critical vulnerabilities from several solar inverter wireless communication dongle manufacturers. The researchers demonstrated how malicious actors could remotely access these 4G/Wi-Fi/GPRS-enabled devices via the cloud and then send signals to destabilize nearby or connected solar infrastructure. Additionally, compromised dongles could allow attackers to move laterally into other sensitive equipment on protected networks, echoing warnings given by NIST in December of last year.
Forescout also reported three additional cybersecurity incidents involving solar power monitoring devices in 2024:
- Chinese threat actor Flax Typhoon used botnets to exploit solar devices to pivot their attacks into secure targeted networks abroad.
- Attackers hijacked 800 Contec SolarView Compact devices in Japan.
- The Just Evil hacktivist group accessed the power monitoring dashboard of 22 clients of Lithuania’s Ignitis Group, including two hospitals, by obtaining valid credentials through a Trojan on customer devices.
A widening policy response
Congress is already weighing proposed bans on federal purchases of Chinese batteries beginning in 2027, and utilities from Florida to the Pacific Northwest are racing to qualify “trusted” inverter lines amid warnings from NATO and the Baltic states that energy blackmail via remote disconnection is now a realistic scenario.
An April 2025 risk assessment from SolarPower Europe and DNV warns that seven inverter makers control more than 10 GW of connected capacity each across the continent. “A compromise of just one of these players could destabilise the European electricity grid,” the report states, adding that sensitive operational data remains exposed when vendors host management servers outside the EU.
However, visibility, not sourcing, remains the immediate pain point of these risks. As critical US and EU industries continue to modernize their infrastructure, energy, and manufacturing, they are introducing more and more “smart” equipment into their previously isolated facilities. Wireless chips, which are increasingly smaller and harder to spot, can be overlooked, or deliberately hidden, in any new component, not just inverters.
Bastille: Seeing the Wireless Attack Surface Others Miss
Bastille Networks provides a Wireless Airspace Defense platform to detect these rogue wireless radios. Bastille’s passive sensor arrays detect cellular, Wi‑Fi, Bluetooth, Zigbee, Z‑Wave, and other protocols across 25 MHz–7.125 GHz, locate each transmitter to within one to three meters accuracy, and stream AI‑driven intelligent event reporting and risk analytics into existing XDR and SIEM workflows.
Unlike network‑centric tools that watch only IP traffic, Bastille surveils the physical‑layer wireless emissions of every component, whether documented or not, continuously comparing behaviour against baseline models for OT environments.
- Pinpoint hidden modems, fallback radios, and wireless debug interfaces the moment they power on.
- Alert to anomalous live wireless connections between rogue wireless transmitters and critical assets
- Issue real‑time, high‑fidelity alerts that empower SOC and grid‑control teams to isolate, remediate, and forensically prove tampering before kilowatts become blackouts.
Before a contract dispute or nation‑state play turns distributed energy resources into a remote kill‑switch, make sure Bastille is by the breaker panel.
Source: https://bastille.net/hidden-devices-found-solar-grid-inverters-batteries
Join us to get updates!
Revisiting a Milestone:
Trusted Network Alliance Global Launch Event
Last year, the world witnessed a landmark event in the realm of digital trust, cybersecurity, and collaborative innovation — the Global Launch of the Trusted Network Alliance (TNA). As we reflect on this powerful moment, we celebrate not only the birth of a bold vision but also the wisdom shared by some of the most distinguished minds in technology, governance, and social impact. Held at Shangri-la The Fort, Bonifacio Global City Taguig Philippines last May 22, 2024, the global launch brought together leaders and pioneers across sectors to ignite a movement dedicated to building secure, inclusive, and trusted digital ecosystems. From thought-provoking keynotes to action-driven panels, the event laid the groundwork for what the TNA is set to become — a beacon of trust in a digitally interconnected world.
Let’s continue to build a world where trust is not the exception — but the expectation.
#TrustedNetworkAlliance
#DigitalTrust
#ZeroTrust
#TNAGlobalLaunch
#Cybersecurity
#O-RAN
#5G
#Mobile
#Broadband
#Connectivity
#Collaboration
#CleanNetwork
#NOW
WATCH
Mel V. Velarde, Chairman of NOW Group
Sharad Sriwastawa, Co-CEO of Rakuten Mobile and President of Rakuten Symphony
Eric R. Handa, CEO and Founder of APTelecom
Join us to get updates!
Teaser
MEDIA RELEASE
Immediate Release
May 20, 2025
Critical Advisory Issued for BPOs and U.S.-Affiliated Companies Operating in the Philippines
NOW Corporation (PSE-listed), holder of a significant 24.3% stake in NOW Telecom Company, Inc., draws attention to a critical Public Advisory recently disclosed to the Philippine Stock Exchange, originally issued by the Trusted Network Alliance—an initiative spearheaded by NOW Telecom in collaboration with U.S. government-supported cybersecurity and digital infrastructure programs.
This advisory underscores significant business continuity and legal risks emerging from recent regulatory actions by the Philippine National Telecommunications Commission (NTC), specifically its sudden and unexplained cancellation of NOW Telecom’s license despite its status as the sole U.S.-certified “clean network” provider in the country.
The Trusted Network Alliance strongly advises all Business Process Outsourcing (BPO) organizations and U.S.-affiliated businesses operating within the Philippines to immediately conduct a comprehensive review of their telecommunications and IT infrastructure contracts. The advisory highlights:
- Potential exposure to U.S. federal and state regulatory compliance violations due to utilization of non-compliant or banned network equipment.
- NOW Telecom’s status as a grantee under the U.S. Trade and Development Agency (USTDA) for 5G and nationwide broadband infrastructure.
- NOW Telecom’s strategic role as a supplier to U.S. military logistics contractors, thus impacting operational integrity and compliance with international standards.
Given the significant financial stakes, with the Philippine BPO sector generating over $38 billion annually, immediate action is crucial to mitigate risks of enforcement actions from U.S. regulatory bodies.
Recommended Actions:
- Thorough review of current telecom and IT service agreements.
- Identification and assessment of all network equipment and infrastructure for compliance with U.S. regulations.
- Immediate consultation with legal advisors to understand and mitigate any potential regulatory and legal exposures.
NOW Corporation remains committed to transparency, good governance, and the protection of stakeholder interests. Further disclosures will be made available as developments warrant.
References:
- Philippine Stock Exchange Disclosure https://edge.pse.com.ph/openDiscViewer.do?edge_no=c709c194c148fa64ec6e1601ccee8f59
- NOW Telecom Company, Inc. “Motion for Reconsideration of the NTC Order dated 19 March 2025,” filed 15 April 2025. (Attached)
- NOW Telecom Company, Inc. “Motion to Admit the Attached Amplified Motion for Reconsideration (of the NTC Order dated 19 March 2025),” filed 9 May 2025. (Attached)
Contact for Further Information:
Trusted Network Alliance Communications Office
Email: joel@trustednetworkalliance.com; Website: trustednetworkalliance.com
Join us to get updates!
Teaser
MEDIA RELEASE
Immediate Release
May 20, 2025
Critical Advisory Issued for BPOs and U.S.-Affiliated Companies Operating in the Philippines
NOW Corporation (PSE-listed), holder of a significant 24.3% stake in NOW Telecom Company, Inc., draws attention to a critical Public Advisory recently disclosed to the Philippine Stock Exchange, originally issued by the Trusted Network Alliance—an initiative spearheaded by NOW Telecom in collaboration with U.S. government-supported cybersecurity and digital infrastructure programs.
This advisory underscores significant business continuity and legal risks emerging from recent regulatory actions by the Philippine National Telecommunications Commission (NTC), specifically its sudden and unexplained cancellation of NOW Telecom’s license despite its status as the sole U.S.-certified “clean network” provider in the country.
The Trusted Network Alliance strongly advises all Business Process Outsourcing (BPO) organizations and U.S.-affiliated businesses operating within the Philippines to immediately conduct a comprehensive review of their telecommunications and IT infrastructure contracts. The advisory highlights:
- Potential exposure to U.S. federal and state regulatory compliance violations due to utilization of non-compliant or banned network equipment.
- NOW Telecom’s status as a grantee under the U.S. Trade and Development Agency (USTDA) for 5G and nationwide broadband infrastructure.
- NOW Telecom’s strategic role as a supplier to U.S. military logistics contractors, thus impacting operational integrity and compliance with international standards.
Given the significant financial stakes, with the Philippine BPO sector generating over $38 billion annually, immediate action is crucial to mitigate risks of enforcement actions from U.S. regulatory bodies.
Recommended Actions:
- Thorough review of current telecom and IT service agreements.
- Identification and assessment of all network equipment and infrastructure for compliance with U.S. regulations.
- Immediate consultation with legal advisors to understand and mitigate any potential regulatory and legal exposures.
NOW Corporation remains committed to transparency, good governance, and the protection of stakeholder interests. Further disclosures will be made available as developments warrant.
References:
- Philippine Stock Exchange Disclosure https://edge.pse.com.ph/openDiscViewer.do?edge_no=c709c194c148fa64ec6e1601ccee8f59
- NOW Telecom Company, Inc. “Motion for Reconsideration of the NTC Order dated 19 March 2025,” filed 15 April 2025. (Attached)
- NOW Telecom Company, Inc. “Motion to Admit the Attached Amplified Motion for Reconsideration (of the NTC Order dated 19 March 2025),” filed 9 May 2025. (Attached)
Contact for Further Information:
Trusted Network Alliance Communications Office
Email: hello@trustednetworkalliance.com; Website: www.trustednetworkalliance.com
On 19 May 2025, NOW Corporation was officially notified by its associate NOW Telecom Company, Inc.
regarding a Public Advisory issued by the Trusted Network Alliance (an initiative led by NOW Telecom in
partnership with U.S. government-backed cybersecurity and digital infrastructure programs) pertaining to
emerging regulatory developments with material implications for the telecommunications, business process
outsourcing (BPO), and U.S.-affiliated business sectors operating in the Philippines.
The advisory, which is publicly issued and herein quoted in full below, is part of the Company’s continuing
disclosure obligations and in accordance with good governance and transparency practices. The Company
is currently evaluating any impact this may have on its operations, investments, and compliance posture,
and shall provide additional disclosures as warranted.
“Public Advisory
To All BPOs and U.S.-Affiliated Companies Operating in the Philippines
Issued by the Trusted Network Alliance, Led by NOW Telecom
May 2025
In light of recent regulatory developments, all BPOs and U.S.-affiliated companies operating in the
Philippines are strongly advised to conduct an immediate review of their telecom and IT infrastructure
contracts — particularly those involving third-party suppliers utilizing banned or non-compliant equipment
and technologies under U.S. federal and state regulations.
This advisory is issued following the sudden and unexplained cancellation of NOW Telecom’s license by
the Philippine National Telecommunications Commission (NTC), despite its 25-year franchise and status
as the only U.S.-certified “clean network” provider in the country. This action has triggered escalating
concerns over violations of U.S. compliance rules and is expected to lead to formal federal and state
investigations.
NOW Telecom is a U.S. taxpayer-funded grantee under the U.S. Trade and Development Agency for 5G
and National Broadband infrastructure and serves as a supplier to a U.S. military logistics contractor. This
unexpected disruption to our operations underscores the real and imminent business continuity and legal
exposure risk that will likely extend to BPOs and U.S. companies dependent on non-compliant network
infrastructure.
The Philippine BPO sector, which contributes over $38 billion in annual revenue, is now at heightened risk
of being drawn into U.S. enforcement and prosecution proceedings unless immediate compliance measures
are taken.
We urge all affected entities to:
• Review all supplier agreements and third-party service contracts for telecom and IT infrastructure
• Identify any use of non-compliant or unverified equipment or networks
• Seek immediate legal counsel to evaluate and mitigate any exposure under U.S. federal and state
law”
The Company’s core operations are not directly affected by the regulatory action against NOW Telecom
subject of the TNA Advisory. It Company operates independently across various ICT, digital media, and
enterprise solutions verticals, and maintains partnerships with multiple telecom service providers beyond
NOW Telecom.
Nonetheless, as the Company holds a material equity interest in NOW Telecom, regulatory or legal
developments that impact the latter may affect the valuation, growth trajectory, and strategic contribution
of this association to the Company Corporation. Specifically:
• – Short-Term Impact: Potential disruption to NOW Telecom’s ability to deliver services may cause shortterm financial effects on the value of NOW Corporation’s investment.
• – Long-Term Impact: The regulatory uncertainty may affect NOW Telecom’s future performance, which
could influence NOW Corporation’s long-term strategic planning and investor outlook.
• – Legal and Reputational Considerations: The issues raised may attract scrutiny from foreign regulatory
agencies, particularly those in the United States, where NOW Telecom is a grantee of the USTDA and is
engaged in cybersecurity-aligned initiatives.
Join us to get updates!
Being Mindful: Digital Security Tips Everyone Should Know
Posting from a restaurant or tagging your location while on vacation—it’s fun to keep friends and family updated on your activities and whereabouts. It might seem harmless, but sharing your location in real time can put you at risk, as it makes it easier for people with bad intentions to track your movements, know when you’re not home, or plan activities that could jeopardize your safety.
This was one of the pointers shared

Join the Alliance
We value your interest in joining us. Whether you have questions about our services, need support, or are interested in learning more about our strategic partnerships, we are here to assist you.
For New Inquiries:

The Role of AI in Enhancing Fact-Checking Efficiency
Back in 2022, the Philippines earned the rather daunting title of “patient zero” in the global fight against disinformation. This was largely due to the country’s struggle with misinformation and the growing concern about how generative AI could be used to spread false information.
In the past year, there’s been a notable shift…

Join the Alliance
We value your interest in joining us. Whether you have questions about our services, need support, or are interested in learning more about our strategic partnerships, we are here to assist you.
For New Inquiries:

Happened: August 21, 2024 – Wednesday
Time: 10:00 AM – 11:30 AM
- Defining Trusted Devices
- Introduction to Unified Connectivity
- Introduction to Zero Trust Security
- Key Components of a Zero Trust Architecture
- Developing a Zero Trust Solution Roadmap for Users and Devices
- Real-World Applications and Case Studies
Hosted By:

Joseph John Yuzon

Adan Flloyd Quitiol
Defining Trusted Devices:
Trusted devices refer to those authenticated and authorized to access specific network resources. These devices meet strict security standards, ensuring they are safe from unauthorized access or malware.
Introduction to Unified Connectivity:
Unified connectivity aims to seamlessly integrate various networks and devices, providing consistent, secure access across all platforms. It ensures that users can connect to necessary resources without compromising security.
Introduction to Zero Trust Security:
Zero Trust Security is a model that assumes no device or user, inside or outside the network, is trusted by default. Every access request is verified continuously to prevent unauthorized access.
Key Components of a Zero Trust Architecture:
- Continuous Authentication: Constantly verifying the identity of users and devices.
- Microsegmentation: Dividing the network into smaller, isolated segments to limit access.
- Least Privilege Access: Granting users the minimal level of access necessary for their tasks.
- Visibility and Analytics: Monitoring all network traffic to detect and respond to threats.
Developing a Zero Trust Solution Roadmap for Users and Devices:
- Assessment: Identify current security gaps and assess the network’s readiness for Zero Trust.
- Planning: Develop a step-by-step plan to implement Zero Trust principles across the network.
- Implementation: Gradually integrate Zero Trust policies, starting with the most critical areas.
- Ongoing Management: Continuously monitor and adjust the Zero Trust framework as the network evolves.
Real-World Applications and Case Studies:
Real-world examples demonstrate the effectiveness of Zero Trust in various industries, highlighting successful implementations and lessons learned. These case studies provide insights into how organizations have improved security and reduced breaches through Zero Trust.

Join the Alliance
We value your interest in joining us. Whether you have questions about our services, need support, or are interested in learning more about our strategic partnerships, we are here to assist you.
For New Inquiries:

Teaser
Ms. Diane Rinaldo is the Executive Director of the Open RAN Policy Coalition, where she leads efforts to promote policies advancing the adoption of open and interoperable solutions in the Radio Access Network (RAN), fostering innovation, competition, and a diverse supply chain for wireless technologies like 5G. Previously, she served as the Acting Administrator of the National Telecommunications and Information Administration (NTIA) and Acting Assistant Secretary of Commerce for Communications and Information during the administration of President Donald Trump , directing initiatives on privacy, advising the White House and Congress on 5G and supply chain security, and testifying before Congress on Internet security issues.


Photo taken last 2023