Trouble viewing this email?  View in web browser ›

The Wall Street Journal ProThe Wall Street Journal Pro

CybersecurityCybersecurity

Sponsored by NetscoutNetscout

Cyber Daily: 5G and Air Safety: What We Know So Far

By Kim S. Nash

 

Welcome back. Does fifth-generation wireless service endanger air travel? Early signs from tests outside the U.S. suggest there may not be a problem. But engineers say the scientific record is still too sparse to make a definitive judgment.

In the U.S., the Federal Aviation Administration this year started flying specially outfitted airplanes over Michigan and Southern California that measure 5G signals in the air. And a U.S. Defense Department-funded program has aircraft circling test ranges in Colorado and Utah to measure how in-flight instruments respond to those signals.

We take a look at findings so far. 

Continued below. 

CONTENT FROM OUR SPONSOR: Netscout

Poor Communication Can Leave Your Business Vulnerable

While reporting structures, budgetary conflicts, and issues with compliance can make effective collaboration a challenge, aligning IT and security has never been more important.

Learn More

A helicopter takes part in a Pentagon-funded study of 5G signals’ potential effects on aviation safety. PHOTO: CHET STRANGE FOR THE WALL STREET JOURNAL

The parallel experiments in the U.S. address worries that certain 5G signals could confuse flight instruments, called radar altimeters, that feed real-time altitude data to cockpit safety systems.

“We are working really hard to obtain solid engineering data so that we will either know that there is or isn’t a problem rather than guessing,” says Frank Sanders, a senior researcher at the Institute for Telecommunication Sciences, a federal lab running tests for the Pentagon program.

Such knowledge has been a long time coming. FAA officials flagged concerns as early as 2015 that radar altimeters could pick up unwanted wireless signals, but the scientific record was limited.

Experts from the aviation and telecom industries could have started holding deeper “engineer to engineer” discussions of the available research two years ago, but pertinent information didn’t start flowing between the two until recently, according to Dave Redman, director of the Aerospace Vehicle Systems Institute, a research cooperative of aerospace companies and government organizations, based at Texas A&M University.

Read the full story. 

 
Share this email with a friend.
Forward ›
Forwarded this email by a friend?
Sign Up Here ›
 

More Cyber News

The German unit of Russian energy company Rosneft disclosed a cybersecurity incident on Saturday to Germany's top cyber agency. PHOTO: MAXIM SHEMETOV/REUTERS

Hack at Russian oil company: The German unit of Rosneft, the energy giant controlled by the Russian government, disclosed a cyber incident on Saturday to Germany's Federal Office for Information Security, die Welt reported. Rosneft Deutschland GmbH has been refining and marketing in Germany since 2017, according to its website. The company didn't respond to a request for comment.

Toyota supplier Denso hit with ransomware. Japan's Denso Corp., a key provider of auto parts to Toyota Motor Corp., said Sunday that its German offices detected ransomware in their networks last Thursday. On Sunday, the Pandora hacking group claimed it had more than 1.4 terabytes of data from Denso, including purchase orders and sketches. Denso said its operations haven't been affected by the attack. (Reuters) 

  • Toyota shut down production at its 14 factories in Japan on March 1 after a different supplier, Kojima Industries Corp., was hit by an unspecified computer virus. 

PHOTO: PASCAL GUYOT

/AGENCE FRANCE-PRESSE/GETTY IMAGES

Game maker Ubisoft confirms cyber incident. Gaming and other systems of Ubisoft Entertainment SA were disrupted by a "cyber security incident," the French company said. Ubisoft said it reset passwords across the company, adding "there is no evidence any player personal information was accessed or exposed as a by-product of this incident." (Bleeping Computer) 

Resources for wartime cyber defense: Training organization SANS Institute is offering recommendations for protecting data and systems from nation-state attackers, as well as for vetting information on social media, as Russia's invasion of Ukraine escalates. 

 
Advertisement
‏‏‎ ‎
 

Privacy

PHOTO: ALEXANDER ERMOCHENKO/REUTERS

Facial recognition in battle: Ukraine's defense ministry is using Clearview AI facial recognition technology to help identify individuals at checkpoints and those killed during fighting with Russian troops, among other users. Clearview offered its services for free to the Ukrainian government. (Reuters) 

 

Careers

There's a talent shortage among privacy professionals, too. Dovetailing a dearth of candidates for cybersecurity posts, privacy technology specialists are hard to find, according to ISACA, a professional group for people in tech governance. 

  • Among 832 ISACA members surveyed, 31% said they had technical privacy roles open and 25% had unfilled slots for privacy pros who focus on legal and compliance issues. About 46% of respondents said their privacy organizations are understaffed. 

PHOTO: MAXIM SHEMETOV

/REUTERS

The new starting salary for some graduates is $100,000—and not everyone is thrilled. 

Certain white-collar professions have always paid well, but 70-plus hour workweeks and intense performance reviews traditionally served as bouncers outside the six-figure club. People who spent years proving themselves worthy of entry bristle at seeing junior colleagues getting VIP treatment from day one.

“You got these kids that are coming out, graduating to a hundred thousand and all these stock options—they’re ridiculous,” says Joe Garner, an Atlanta-based cybersecurity specialist who made about $60,000 in his first job in 2014.

It took Mr. Garner several years to break the $100,000 mark. He realizes the labor market has changed but says he can’t help feeling that some newly minted computer scientists might be spoiled by fast financial success.

“It’s going to be, like, ‘Why is that kid driving a Tesla ?’” he says.

 

About Us

Write to the WSJ Pro Cybersecurity Team: Kim S. Nash, James Rundle, Catherine Stupp and David Uberti.

Follow us on Twitter: @knash99, @catstupp and @DavidUberti. 

Contact Enterprise Technology Editor Steve Rosenbush at steven.rosenbush@wsj.com or follow him on Twitter: @Steve_Rosenbush.

 
Desktop, tablet and mobile. Desktop, tablet and mobile.
Access WSJ‌.com and our mobile apps. Subscribe
Apple app store icon. Google app store icon.
Unsubscribe   |    Newsletters & Alerts   |    Contact Us   |    Privacy Notice   |    Cookie Notice
Dow Jones & Company, Inc. 4300 U.S. Ro‌ute 1 No‌rth Monm‌outh Junc‌tion, N‌J 088‌52
You are currently subscribed as [email address suppressed]. For further assistance, please contact Customer Service at pro‌newsletter@dowjones.com or 1-87‌7-975-6246.
Copyright 2022 Dow Jones & Company, Inc.   |   All Rights Reserved.
Unsubscribe