Overview Electric power utilities rely on complex Industrial Control Systems (ICS) across all areas of power generation, transmission, and distribution to maintain grid stability and reliability. These systems form the foundation of modern energy delivery, supporting seamless interconnectivity across Supervisory Control and Data Acquisition (SCADA) systems and enabling the resilience of the North American power grid with complex Energy Management Systems (EMS). In recent years, wireless technologies have appeared in utility operations, some of which are not authorized to be…
Category: Uncategorized
The New York SIM Farm Incident: Updates and Strategic Implications
New Developments In the days since the U.S. Secret Service announced its dismantling of a clandestine telecommunications threat in New York, additional reporting has clarified both the scale of the operation and the range of risks that were present. The seizure occurred during the United Nations General Assembly, when more than 150 world leaders and senior U.S. officials were in New York. The over 300 SIM servers and 100,000 SIM cards, concentrated within a 35-mile radius of the UN complex,…
Wireless in SCI Environments: Risks, Exceptions, and How Bastille Can Help
Wireless technologies are everywhere. Our phones, IoT devices, and even building systems rely on them. But in Sensitive Compartmented Information (SCI) environments, wireless presents unique risks to the confidentiality of classified information. Regulations clearly and broadly prohibit wireless use unless the device receives a specific waiver. Bastille works with government and defense organizations to help them understand these risks, implement required controls, and maintain visibility into the airspace. Why SCI Environments Prohibit Wireless Devices SCI facilities (SCIFs) exist to protect…
Wireless Threats at the UN: What the Secret Service Raids Reveal
September 23, 2025 The U.S. Secret Service announced the takedown of a significant wireless communications threat in the New York tristate area. The discovery came during one of the most sensitive weeks of the year: the United Nations General Assembly. Heads of state, foreign ministers, and senior government officials from across the world gathered in New York for diplomacy and negotiations. While security focused on physical protection and cyber defense, attackers had positioned a massive wireless infrastructure within striking distance…
Wireless Blind Spots: The Hidden Risk to AI Data
The Unseen Threat to AI Security AI infrastructure has become a high-value target. From autonomous vehicle R&D labs to corporate AI clusters processing privileged, sensitive, or proprietary datasets, adversaries recognize the value in gaining access to AI models, training data, and inference processes. Organizations spend millions on firewalls, endpoint detection, encryption, and zero-trust architectures to secure digital entry points. Yet one attack surface remains routinely overlooked: the wireless spectrum beyond Wi-Fi. These detection gaps, referred to as wireless blind spots,…
Who Owns Wireless Security: The CISO or the CSO?
Wireless security has moved from being a niche concern to a core enterprise risk. Organizations today operate in an environment where nearly every asset, from laptops and smartphones to IoT devices and building control systems, transmits over wireless frequencies. Estimates put the number of wireless devices globally in the several 10s of billions. Over 5.5 billion people use mobile phones globally. There are over 19 billion connected IoT devices globally. Many of these wireless devices are now in the workplace.…
The Air Gap Is an Illusion: Securing AI Data Centers from Wireless Threats
The Persistent Myth of the Air Gap The “air gap” has long been considered an effective solution to protect sensitive environments. By physically separating critical systems from corporate and public networks, operators believed they had closed off the most dangerous attack vectors. This confidence, however, rests on an outdated assumption: that attackers only operate through wired networks or internet connections. Modern adversaries no longer need to penetrate traditional networks to reach their targets. With the widespread use of wireless technologies…
Unpatched Air Keyboard iOS App Lets Attackers Perform 0-Click Keystroke Injection Over Wi‑Fi
By Luke Whiting — 18 July 2025 A security flaw disclosed last month in Air Keyboard, an iOS app that turns iPhones into wireless keyboards & mice for computers, remains unresolved on Apple’s App Store. The vulnerability allows anyone connected to the same Wi-Fi network to inject keystrokes onto a victim’s device without a password prompt, according to a technical advisory published on 13 June by the vulnerability archive CXSecurity. The persistence of the vulnerability was confirmed this week by the mobile security…
The AI Data Center’s New Perimeter: Wireless Security
Introduction AI data centers are becoming the backbone of modern innovation, powering everything from generative AI applications to high-performance analytics and data processing. These facilities process massive volumes of sensitive data and operate with strict requirements for uptime and security. Historically, operators relied on physical barriers, wired firewalls, and endpoint controls to protect infrastructure. But in an AI-driven environment, the traditional perimeter is no longer enough. Wireless devices, from IoT sensors to unauthorized hotspots, create an invisible layer of risk…
Researchers Discover a Cyber-Physical Bank Heist Powered by A 4G Raspberry Pi Implant
When responders opened an innocuous cabinet at a regional branch of an international bank this spring, they found a Raspberry Pi single‑board computer that should never have been there. LightBasin operators had slipped the board into place, paired it with a 4G USB modem, and plugged its USB‑C power lead into the nearest outlet. The improvised kit offered a clean cellular path straight into the bank’s internal network, quietly sidestepping every perimeter firewall and NAC control the institution relied on…