TCS Partners with Now Corporation to Power Philippines’ Sovereign Data Cloud and Financial Inclusivity
With this Memorandum of Understanding (MoU) in place, the release said, TCS will support the company with capabilities to expand trusted networks, provide sovereign cloud technology and a cyber-defence suite, alongside creating citizen-centric services in areas such as healthcare and digital banking, promoting financial inclusivity.
New Delhi: Tata Consultancy Services (TCS) on Monday said it has partnered with NOW Corporation’s telecom arm to boost digital infrastructure and enable financial inclusivity in the Philippines.
Now telecom is a public sector telecommunications company in the Philippines offering services across mobile networks and fixed wireless.
“Tata Consultancy Services (TCS), a global leader in IT services, consulting, and business solutions, has partnered with NOW Corporation’s telecom arm – Now Telecom, a public sector telecommunications company, to bolster national digital sovereignty, enable financial inclusivity, and build a clean network for the Philippines,” according to a release.
With this Memorandum of Understanding (MoU) in place, the release said, TCS will support the company with capabilities to expand trusted networks, provide sovereign cloud technology and a cyber-defence suite, alongside creating citizen-centric services in areas such as healthcare and digital banking, promoting financial inclusivity.
“…TCS will help in strengthening the national digital infrastructure of the Philippines and establishing new avenues for economic growth and citizen empowerment,” the release added.
Both TCS and NOW Telecom are members of the Trusted Network Alliance under the Trusted Network Initiative (TNI), a global initiative to promote the development and deployment of secure and reliable telecom networks.
Join us to get updates!
TCS Partners with Now Corporation to Power Philippines’ Sovereign Data Cloud and Financial Inclusivity
NOW Corporation and TCS will collaborate in designing, developing, and deploying scalable and secure digital infrastructure, aligned with Philippines government’s Department of Information and Communications Technology and clean network principles.
As on Aug 12, 2025 4:00 PM
India’s largest IT services provider, Tata Consultancy Services (TCS), on Monday, August 11, announced a partnership with Philippines-based NOW Corporation’s telecom arm, NOW Telecom.
Under the agreement, TCS will help NOW Corporation strengthen its ability to safeguard data from external threats, build resilient infrastructure against evolving cyber risks, and maintain sovereign control over critical systems during crises.
The two companies will work together to design, develop, and deploy scalable and secure digital infrastructure, aligned with the Philippines government’s Department of Information and Communications Technology and clean network principles.
TCS SovereignSecure Cloud will be deployed to create a cloud infrastructure that ensures local data control, supports AI infrastructure development, and enables operational continuity and local capability-building.
TCS and NOW Telecom are both members of the Trusted Network Alliance under the Trusted Network Initiative (TNI), a global programme promoting the development and deployment of secure and reliable telecommunications networks.
Shiju Varghese, Country Head, TCS Philippines, said, “By leveraging our expertise and innovative services, we aim to support the Philippines in building a resilient and secure digital ecosystem. We look forward to contributing to the country’s digital transformation journey.”
Last month, TCS announced plans to reduce its global workforce by approximately 2% over the next year as part of a broader transformation aimed at becoming a “Future-Ready” organisation. The company said the move is part of a strategic shift involving multiple initiatives, including investments in emerging technologies, expansion into new markets, large-scale AI deployment, and a revamp of its infrastructure and workforce model.
Join us to get updates!
TCS Partners with Now Corporation to Power Philippines’ Sovereign Data Cloud and Financial Inclusivity
Through this partnership, TCS will help in strengthening the country’s national digital infrastructure and establishing new avenues for economic growth and citizen empowerment
PRESS RELEASE
MUMBAI, August 11, 2025: Tata Consultancy Services (TCS) (BSE: 532540, NSE: TCS), a global leader in IT services, consulting, and business solutions, has partnered with NOW Corporation’s telecom arm – Now Telecom, a public sector telecommunications company, to bolster national digital sovereignty, enable financial inclusivity, and build a clean network for the Philippines. Through this Memorandum of Understanding (MoU), TCS commits itself to support the company with capabilities to expand trusted networks, provide sovereign cloud technology and a cyber-defense suite, along with creating robust citizen-centric services.
As the technology partner of choice for the telecommunications, media, and technology company, TCS will help in strengthening the national digital infrastructure of Philippines and establishing new avenues for economic growth and citizen empowerment. TCS and NOW Telecom are both members of the Trusted Network Alliance under the Trusted Network Initiative (TNI) which is a global initiative to promote the development and deployment of secure and reliable telecommunications networks. With this partnership, TCS is reaffirming its commitment to advancing cyber-digital cooperation across the Indo-Pacific in adherence to the framework laid down by the TNI. TCS will contribute its expertise and the proven success of its partnerships—especially with the Indian government—to this regional framework.
Mel Velarde, Chairman of the NOW Group, said, “The NOW Group warmly welcomes the partnership with TCS in building the Sovereign Data Cloud Infrastructure for both the public and private sectors in the Indo-Pacific region. This partnership with TCS, a global market giant, marks a significant step towards enhancing our national digital sovereignty and reducing reliance on foreign technologies. NOW’s and TCS’ expertise and innovative services will contribute to our nation’s data sovereignty by defending against risks and threats while creating a scalable, secure, and robust data infrastructure. The partnership between NOW and TCS exemplifies the technological aspirations of both India and the Philippines, heralding a new dawn of critical digital transformation for the Philippines.”
As part of the partnership TCS will deliver services to enhance technology initiatives for:
- Data Sovereignty: Safeguard national data from external threats
- Operational Interoperability: Enable cross-agency collaboration during complex scenarios
- Resilience: Build robust infrastructure against evolving cyber threats
- Reduced Foreign Dependency: Ensure sovereign control over critical systems during crises
Shiju Varghese, Country Head, TCS Philippines, said, “We are thrilled to partner with NOW Group to advance the digital infrastructure of the Philippines. This collaboration underscores our commitment to enhancing national digital sovereignty and cybersecurity. By leveraging our expertise and innovative services, we aim to support the Philippines in building a resilient and secure digital ecosystem. We look forward to contributing to the country’s digital transformation journey.”
NOW Corp and TCS will collaborate to co-design, develop, and deploy scalable and secure digital infrastructure that is aligned with the country’s Department of Information and Communications Technology and clean network principles. TCS SovereignSecure CloudTM will be deployed to develop a cloud infrastructure that will ensure local data control, AI infrastructure development, and enable operational continuity and local capability-building. As part of protecting the country’s networks against cyber threats, TCS will help in developing advanced security protocols to protect critical infrastructure and leverage the TCS Cyber Defense Suite offering cyber intelligence, resilience, vendor risk management, and identity security. The citizen-centric services will include services in areas such as digital private infrastructure, healthcare, and digital banking promoting financial inclusivity.
This strategic partnership highlights TCS’ growing presence in the Philippines, where it has been operational since 2008. It supports customers across diverse sectors including, telecom, banking and finance, real estate, and airlines, driving their growth and transformation from the Philippines. Its longstanding focus on innovation, sustainability, and workforce development aligns with the Philippines’ push toward a future-ready digital economy.

A delegation from the Philippines Government led by President Ferdinand R. Marcos including Mel Velarde – Chairman, Now Group met with leaders from Tata Consultancy Services led by Shiju Varghese, Country Head, TCS Philippines to sign the MoU.
Join us to get updates!
Russian-Linked Spy Ring Who Used Advanced Wireless Arsenal Against US-Ukrainian Personnel at Stuttgart Army Airfield Sentenced
Joseph Salazar - May 20, 2025
Investigation reveals sophisticated surveillance technology targeted at U.S.-Ukraine missile training activities.
Spy Ring’s Operation Against Stuttgart Army Air Field Highlights New Normal of Critical Wireless Security Vulnerabilities
This week, prosecutors have secured convictions against members of a Russian-directed spy network that conducted surveillance operations across Europe, including a sophisticated operation targeting a U.S. military base in Stuttgart, Germany. Documents released by the Crown Prosecution Service reveal the Stuttgart base was under surveillance from late 2022 until February 2023, with intelligence efforts specifically focused on Ukrainian forces receiving training on surface-to-air missile systems.
The operation employed multiple layers of wireless surveillance technology to gather intelligence on military personnel that authorities believe was intended to track Ukrainian soldiers upon their return to Ukraine. Investigators documented a modified vehicle near the base perimeter that housed IMSI catchers, other specialized equipment for wireless data interception, and tools for planting advanced technical surveillance devices outside the base.
Piggybacked on soldiers’ mobile phones.
Investigators say that by spoofing legitimate carriers, the spy ring’s IMSI catchers harvested unique IMSI/IMEI identifiers to allow Russian forces to target the locations of Ukrainian Surface-to-Air weapons, once these newly trained soldiers returned to the frontlines. The tools also allowed the spy ring to potentially force downgrades to 2 G, and funnel call data and location beacons back to Moscow.
An Inventory To Attack A Wireless Airspace
Following raids on multiple properties, investigators cataloged an extensive collection of surveillance technology:
Category | Quantity | Tactical Use |
IMSI catchers / “grabbers” | 3 | Rogue base‑station, subscriber tracking, SMS interception |
Pineapple Wi‑Fi access‑point emulators | 4 | Credential theft, man‑in‑the‑middle, lateral movement |
SIM cards | 495 | Remote access over cellular data, Mesh relays, Spoofed device personas |
Smartphones | 221 | Inconspicuous recording equipment, close access wireless attacks via Kali Nethunter, Burner infrastructure |
Audio / visual bugs | 88 | Covert capture and remote streaming |
Drones | 11 | Above‑roof reconnaissance, spectrum survey, payload drop |
Jammers, spoofers, and “hacking equipment” | 110 (misc.) | Obscure friendly traffic, force‑connect to malicious beacons, network infiltration & device takeover |
Editorial note: The sheer volume of prepaid SIM cards strongly suggests many of the above devices were remotely accessible or pushed video/audio over cellular data links: no Wi‑Fi credentials required to exfiltrate information out of a secure facility.
Wi-Fi Pineapple: Advanced Network Exploitation Tool
The four Wi-Fi Pineapple devices recovered represent particularly sophisticated wireless threats. Developed by Hak5, penetration testers use these commercially available devices to audit wireless network security, but malicious actors can repurpose them for intelligence-gathering operations.
They function by exploiting how devices automatically connect to previously trusted networks. When a target device, such as a smartphone or laptop, searches for familiar networks, the Pineapple responds by impersonating those networks. This “man-in-the-middle” capability allows operators to:
- Intercept unencrypted web traffic
- Capture authentication credentials
- Monitor communications
- Deploy targeted exploits against connected devices
- Create detailed profiles of network usage patterns
Why the Spy-ring’s Toolkit Matters
- Near‑peer actors no longer need to breach the firewall; they can sit in the car park and set up an ersatz cell tower.
- Standard defensive radios are blind to non‑networked emitters. IMSI catchers, jammers, and Wi‑Fi Pineapples live outside the wired infrastructure the SIEM already watches.
- Multi‑protocol blending defeats single‑sensor point tools. A Pineapple forces a smartphone off WPA2 within the fence line; an IMSI catcher follows the same handset on leave two hours later. These tools effectively create a surveillance bubble that can capture virtually all wireless communications within range.
Operational Lessons for Government, Critical Industry, and Enterprise Cybersecurity Planners:
- Treat cellular, Bluetooth LE, Zigbee, and Wi‑Fi as a single, contiguous attack plane. If they emit, they’re part of the risk surface.
- Baseline first, hunt second. Stuttgart’s sensors would have flagged three sudden rogue LTE eNodeBs lighting up outside the perimeter if a continuous spectrum fingerprint had been in place.
- Correlate location with identity. Knowing which handset crossed the geo‑fence is only helpful if one also knows whose handset it is and whether it just paired with a Pineapple.
Where Bastille Fits
Bastille’s enterprise and government sensor arrays were purpose‑built for exactly this blend of cellular and Wi‑Fi tradecraft:
- Detect hidden transmitting devices and Wi-fi Pineapples in real time across 25 MHz – 7.125 GHz.
- In real time, locate every emitting component within one to three meters of accuracy. Then, replay its historical movement on a facility floor plan or field.
- Stream enriched alerts to XDR, SOAR, and camera systems, letting security forces auto-slew-to-cue PTZ cameras or track down a rogue network device in seconds.
Bottom Line
The Stuttgart case isn’t an outlier, but the new normal for blended physical‑cyber actors and espionage. Whether defending a missile‑training range, a classified SCIF, or an OT plant, organizations need continuous, protocol‑agnostic visibility into every device that talks over the air. Bastille delivers that visibility, the 3‑D location to act on it, and the integrations to fold wireless risk into the rest of a Zero‑Trust stack.
Ready to see what’s really transmitting outside the perimeter? Contact us for a demo at https://bastille.net/contact-us/.
Source: https://bastille.net/russian-spy-ring-uses-advanced-wireless-arsenal-against-us-ukrainian-personnel
Join us to get updates!
The Power of Continuous RF Monitoring with Bastille Networks
Joseph Salazar - May 20, 2025
Rapid and accurate threat detection is crucial in today’s dynamic RF security landscape. Bastille Networks, a leader in RF security, stands out by providing continuous RF monitoring that ensures comprehensive protection against wireless threats. This capability is vital for maintaining a high Probability of Detection (POD) and securing critical environments.
Understanding Continuous RF Monitoring
Continuous RF monitoring involves constant surveillance of the radio frequency spectrum to detect, identify, and neutralize potential threats in real-time. Unlike periodic scanning, which may leave gaps in coverage, continuous monitoring offers 24/7 observation of RF activities. This proactive approach allows for identifying and responding to threats as they occur, minimizing the risk of delayed action.
The Importance of Probability of Detection (POD)
Probability of Detection (POD) measures the likelihood that a security system will detect a specific threat or signal within its environment. A high POD is critical in RF security, ensuring that even the most subtle or hidden signals are detected and analyzed for potential risks. Continuous monitoring significantly enhances POD by preventing signals from going unnoticed.
Factors Influencing POD in RF Security
Several key factors impact the POD in RF security systems:
- Signal Strength and Quality: Detecting weak or low-power signals is essential in RF environments. High-quality RF detection systems excel at identifying these signals despite surrounding noise.
- Frequency Range: Wide frequency coverage increases the chances of detecting various RF threats, from Wi-Fi to rogue cell devices.
- Environmental Complexity: Factors such as building materials and layouts can obstruct signals. Advanced systems overcome these challenges with sophisticated detection technologies.
- Technological Sophistication: Machine learning and advanced algorithms help systems differentiate between benign and malicious signals, improving accuracy and reducing false positives.
Bastille Networks: Maximizing POD with Continuous RF Monitoring
Bastille Networks’ cutting-edge technology maximizes the Probability of Detection through continuous RF monitoring. Key features include:
- Advanced Software-Defined Radio (SDR) Technology: Bastille’s SDR technology scans across a broad spectrum, detecting signals other systems may miss. This adaptability allows it to capture even obscure or low-power transmissions.
- Machine Learning Algorithms: Bastille leverages machine learning to enhance its detection capabilities. These algorithms continuously learn from patterns and anomalies, increasing accuracy and reliability.
- Real-Time Monitoring and Analysis: Bastille’s real-time monitoring ensures immediate detection and response to emerging threats, which is crucial for maintaining a high POD.
- Comprehensive Coverage: Bastille’s solutions cover large and complex environments, ensuring no area goes unmonitored, thereby significantly enhancing overall detection capabilities.
Practical Applications and Case Studies
Securing Enterprise Environments
Due to the high density of wireless devices, enterprise environments are particularly vulnerable to RF threats. Bastille’s continuous monitoring solutions are deployed in these settings to provide constant oversight and high detection accuracy, allowing for the swift identification and mitigation of unauthorized devices and potential threats.
Protecting Government Facilities
Government facilities face more sophisticated RF threats. Through continuous monitoring, Bastille Networks has demonstrated its ability to maintain a high POD in these sensitive environments, safeguarding critical communications and data. Real-time detection ensures that these facilities can detect potential breaches before they can cause harm.
Tackling Covert Threats: The Case of Listening Devices
Not all RF threats are constant. Some listening devices, for instance, only transmit when triggered by sound or motion, making them difficult to detect with periodic scanning. Continuous RF monitoring, as provided by Bastille Networks, excels at identifying these intermittent signals, ensuring that even covert threats are detected and mitigated.
Paul D. Turner, an expert in technical surveillance countermeasures, emphasizes the importance of maintaining a high POD in RF security. His work underscores how continuous monitoring systems like those from Bastille Networks are essential for securing critical infrastructure and sensitive information.
The Numbers Behind POD: A Statistical Reality
According to Paul D. Turner’s “Technical Surveillance Countermeasures” (2023), traditional RF detection systems exhibit a POD ranging from 60% to 80%. However, advanced systems like those developed by Bastille Networks can achieve a POD exceeding 95%. This significant difference highlights the superiority of Bastille’s technology in detecting and neutralizing RF threats.
A breakdown of detection times further illustrates the importance of continuous monitoring:
- 24/7 Monitoring (8,760 hours/year): 100% coverage
- Daily, 12 hours/day: 50% coverage
- Daily, 8 hours/day: 33% coverage
- Weekly, 8 hours/week: 21% coverage
- Monthly, 8 hours/month: 1.1% coverage
- Quarterly, 8 hours/quarter: 0.37% coverage
- Twice Annually, 8 hours/session: 0.18% coverage
- Annually, 8 hours/year: 0.09% coverage
These statistics reveal the vulnerabilities inherent in anything less than continuous monitoring.
Conclusion
In RF security, continuous RF monitoring is essential for maintaining a high Probability of Detection and defending against a wide range of wireless threats. Bastille Networks excels in this area, offering advanced technology, real-time monitoring, and comprehensive coverage to ensure robust and reliable RF security.
To learn more about how Bastille Networks can enhance your RF security and maximize your POD, visit their website and explore their innovative solutions.
Sources
Join us to get updates!
Investigators Discover Hidden Communications Devices in US Solar Grid Inverters and Batteries
Luke Whiting - May 15, 2025
U.S. energy‑sector forensic teams have begun disassembling Chinese‑manufactured solar inverters and grid‑scale batteries after discovering undocumented 4G/LTE modules and other wireless communication transceivers buried on the circuit boards, according to two people involved in the tear‑downs. The covert hardware, absent from published schematics, creates an out‑of‑band path that can tunnel straight through utility firewalls, potentially granting offshore operators the ability to reconfigure or even turn off power‑conversion equipment at will.
“There is clearly strategic value in seeding core infrastructure with components that can be flipped off like a light switch”
Former National Security Agency director Mike Rogers tells Reuters.
What investigators found
- Over the past nine months, forensic security teams have logged multiple brands of Chinese solar inverters containing hidden wireless communication equipment.
- Investigators have also discovered hidden cellular radios in grid‑attached lithium‑ion battery cabinets from several vendors.
- According to three people briefed on the incident, in November 2024, China remotely shut down commercial‑scale inverters in the U.S. and other countries.
While the Department of Energy (DOE) has not publicly commented on the November outage, officials confirmed they are “continually reassessing the risk of undocumented functionality” and are pressing suppliers for a complete Software Bill of Materials.
Why Power Utilities are worried
Modern distribution grids lean heavily on inverters to translate DC from solar, storage, heat‑pump drives, and EV chargers into AC usable by the network. Because inverters operate in millisecond feedback loops with grid‑control systems, mass manipulation of their set‑points can destabilise frequency and voltage in seconds, far faster than conventional protective relays can respond. “That effectively means there is a built-in way to physically destroy the grid,” one source familiar with the discoveries reported to Reuters.
A March 2025 report by Forescout researchers documented critical vulnerabilities from several solar inverter wireless communication dongle manufacturers. The researchers demonstrated how malicious actors could remotely access these 4G/Wi-Fi/GPRS-enabled devices via the cloud and then send signals to destabilize nearby or connected solar infrastructure. Additionally, compromised dongles could allow attackers to move laterally into other sensitive equipment on protected networks, echoing warnings given by NIST in December of last year.
Forescout also reported three additional cybersecurity incidents involving solar power monitoring devices in 2024:
- Chinese threat actor Flax Typhoon used botnets to exploit solar devices to pivot their attacks into secure targeted networks abroad.
- Attackers hijacked 800 Contec SolarView Compact devices in Japan.
- The Just Evil hacktivist group accessed the power monitoring dashboard of 22 clients of Lithuania’s Ignitis Group, including two hospitals, by obtaining valid credentials through a Trojan on customer devices.
A widening policy response
Congress is already weighing proposed bans on federal purchases of Chinese batteries beginning in 2027, and utilities from Florida to the Pacific Northwest are racing to qualify “trusted” inverter lines amid warnings from NATO and the Baltic states that energy blackmail via remote disconnection is now a realistic scenario.
An April 2025 risk assessment from SolarPower Europe and DNV warns that seven inverter makers control more than 10 GW of connected capacity each across the continent. “A compromise of just one of these players could destabilise the European electricity grid,” the report states, adding that sensitive operational data remains exposed when vendors host management servers outside the EU.
However, visibility, not sourcing, remains the immediate pain point of these risks. As critical US and EU industries continue to modernize their infrastructure, energy, and manufacturing, they are introducing more and more “smart” equipment into their previously isolated facilities. Wireless chips, which are increasingly smaller and harder to spot, can be overlooked, or deliberately hidden, in any new component, not just inverters.
Bastille: Seeing the Wireless Attack Surface Others Miss
Bastille Networks provides a Wireless Airspace Defense platform to detect these rogue wireless radios. Bastille’s passive sensor arrays detect cellular, Wi‑Fi, Bluetooth, Zigbee, Z‑Wave, and other protocols across 25 MHz–7.125 GHz, locate each transmitter to within one to three meters accuracy, and stream AI‑driven intelligent event reporting and risk analytics into existing XDR and SIEM workflows.
Unlike network‑centric tools that watch only IP traffic, Bastille surveils the physical‑layer wireless emissions of every component, whether documented or not, continuously comparing behaviour against baseline models for OT environments.
- Pinpoint hidden modems, fallback radios, and wireless debug interfaces the moment they power on.
- Alert to anomalous live wireless connections between rogue wireless transmitters and critical assets
- Issue real‑time, high‑fidelity alerts that empower SOC and grid‑control teams to isolate, remediate, and forensically prove tampering before kilowatts become blackouts.
Before a contract dispute or nation‑state play turns distributed energy resources into a remote kill‑switch, make sure Bastille is by the breaker panel.
Source: https://bastille.net/hidden-devices-found-solar-grid-inverters-batteries
Join us to get updates!
Revisiting a Milestone:
Trusted Network Alliance Global Launch Event
Last year, the world witnessed a landmark event in the realm of digital trust, cybersecurity, and collaborative innovation — the Global Launch of the Trusted Network Alliance (TNA). As we reflect on this powerful moment, we celebrate not only the birth of a bold vision but also the wisdom shared by some of the most distinguished minds in technology, governance, and social impact. Held at Shangri-la The Fort, Bonifacio Global City Taguig Philippines last May 22, 2024, the global launch brought together leaders and pioneers across sectors to ignite a movement dedicated to building secure, inclusive, and trusted digital ecosystems. From thought-provoking keynotes to action-driven panels, the event laid the groundwork for what the TNA is set to become — a beacon of trust in a digitally interconnected world.
Let’s continue to build a world where trust is not the exception — but the expectation.
#TrustedNetworkAlliance
#DigitalTrust
#ZeroTrust
#TNAGlobalLaunch
#Cybersecurity
#O-RAN
#5G
#Mobile
#Broadband
#Connectivity
#Collaboration
#CleanNetwork
#NOW
WATCH
Mel V. Velarde, Chairman of NOW Group
Sharad Sriwastawa, Co-CEO of Rakuten Mobile and President of Rakuten Symphony
Eric R. Handa, CEO and Founder of APTelecom
Join us to get updates!
Highlights from the TNA Knowledge Networks Event!
Watch as IT leaders and tech visionaries from top industries gathered to explore groundbreaking cybersecurity solutions, including FortiSASE and Dell Backup in the recently concluded TNA Knowledge Networks event last October 24, 2024 at the Ascott Makati. Dive into expert insights on safeguarding data and protecting remote workforces with zero-trust frameworks.
Thank you to everyone who joined us on this journey to secure the future of digital enterprise!
TNA 1st Global Conference
The 1st Trusted Network Alliance Conference happened on May 22, 2024, at the Shangri-La The Fort Grand Ballroom. With the theme of “Bound by Trust: Trusted Network Alliance Drives Indo-Pacific Security & Prosperity Forward”, the conference was attended by over 200 participants including international embassy representatives, local government units; US Government agencies, and leaders from mission-critical enterprises. We were able to engage in strategic dialogues to advance trusted technologies within telecom and ICT networks across the country.