Trustwave SpiderLabs Uncovers Unique Cybersecurity Risks in Today's Tech Landscape. Learn More

Trustwave SpiderLabs Uncovers Unique Cybersecurity Risks in Today's Tech Landscape. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Auto-BAHN: Using Smart phones to create emergency, ad hoc networks

Thomas Wilhelm, Sr. Security Consultant at Trustwave SpiderLabs, revealed a proof of concept this weekend at the DefCon 19 conference that demonstrated how ad hoc networks could be created using smart phones. These ad hoc networks could provide a method for citizens - impacted by natural or man-made disasters - to communicate with emergency responders without the use of telecommunication infrastructures.

In times of emergencies, cellular and phone systems are often destroyed or severely damaged, which prevents civilians from communicating with fire, police, or medical services. By creating broadcast, ad hoc networks using smart phones, it is possible to allow messages requesting help to pass between phones until they are intercepted by emergency services. To facilitate the communication between smart phones, Thomas decided to create an open source project called "Auto-BAHN" (Automated Broadcast Ad Hoc Network), which uses an application that can be quickly installed on smart phones.

Once cellular infrastructures are taken off-line for whatever reason, the Auto-BAHN software can reach out to other phones, installed with the same software, to pass messages between each other, including calls for help. Because of the inherent design of broadcast networks, all messages find the shortest path to their intended target, allowing responders to act accordingly in a timely manner.

The proof of concept presented by Thomas at DefCon will be developed for multiple platforms, including Android, iPhones and Blackberry phones. The long range goal of the Auto-BAHN project is to encourage Operating System developers of smart phone technologies to deploy Auto-BAHN on all systems; thus ensuring wide deployment of an alternative method of communication during disasters.

Latest SpiderLabs Blogs

Why We Should Probably Stop Visually Verifying Checksums

Hello there! Thanks for stopping by. Let me get straight into it and start things off with what a checksum is to be inclusive of all audiences here, from Wikipedia [1]:

Read More

Agent Tesla's New Ride: The Rise of a Novel Loader

Malware loaders, critical for deploying malware, enable threat actors to deliver and execute malicious payloads, facilitating criminal activities like data theft and ransomware. Utilizing advanced...

Read More

Evaluating Your Security Posture: Security Assessment Basics

This is Part 4 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here.

Read More