[EAS] ALERT: EAS Device passwords
Don Heppelmann
DHeppelmann at tpt.org
Tue Feb 12 11:54:08 CST 2013
It would be interesting knowing how the 'hacker' got the audio portion into the EAS encoder as well. If this alert was triggered via IP, as opposed to an incoming decoded signal, then another path for the audio was needed.
Don Heppelmann, MN SECC
-------------------
Barry Mishkind wrote:
The initial investigation thus far apparently shows that the perpetrator
penetrated the station's LAN and then entered the EAS machine via
the default password.
There is also, now, a report that at least one station broadcast the
alert as a "funny story" ... except they included the data bursts and
another innocent station ended up playing this fake alert in a
third station.
That is -by the way- completely against the FCC Rules... and a
fine could develop there. No station should *ever* use data
bursts in a "news" or "funny" story.
This is definitely causing a scramble in many parts of the
country today. While we wait for more facts ... not
speculation ... this is a good time to ensure your EAS
box is not operating on a default password.
__________________________________________________________
The EAS Forum Discussion List is hosted by the BWWG (Broadcast Warning Working Group). http://eas.radiolists.net Please invite your friends to join our Forum! The sign up is at: http://lists.radiolists.net/mailman/listinfo/eas
___________________________________________________________
More information about the EAS
mailing list