[EAS] Next Generation
Bill Ruck
ruck at lns.com
Tue Nov 11 16:45:05 CST 2014
There are several points that I'd like to add to the discussion.
1. A friend and colleague, who is not longer with us, Tom Croda,
used to say "Nothing is fool-proof. At best you can make it fool-resistant."
2. The EAS and EAN protocols are public information. They're
published in FCC Part 11. A lot of information about state and local
level EAS systems is also public information. It may be hard to
enter the system at a national level but trivial to generate an EAN
and get it into local level. It is against the law but that has not
stopped a lot of other events.
3. Obscurity is not security. I have learned is that the type of
person interested in hacking tends to be un-social and has lots and
lots of free time on his (and even her) hands.
4. Good point about feature creep. One lesson I learned the hard
way in 1989 is the difference between WARNING and PUBLIC
INFORMATION. CAP / IPAWS / EAS is a WARNING system. Never confuse
it with any public information system.
5. A good example of mind set for us to follow is General Groves
during the Manhattan Project. He kept the scientists focused on
their goal. He didn't want it perfect, he just wanted it to work.
6. As a hardware kinda guy (although once upon a time I was pretty
good with Fortran and Basic) "It's only software".
7. Just like the evolving DTV standards keeping compatibility with
first generation equipment eventually becomes impossible. I've heard
that the next generation of DTV will be completely incompatible with
first generation DTV decoders. We did have to throw away our carrier
off / on / off / on / off / on EBS equipment. We may have to
consider the same with first generation EAS equipment if it isn't
smart enough to handle a more robust and secure system.
In summary, Mike McCarthy's idea of a password downloaded from the
CAP server is a very good way to provide reasonable security. All
stations now must have Internet connectivity for their EAS decoder so
all that is necessary is new software. If the message password does
not match the daily password the message gets delayed until it is
reviewed. That function can be programmed to alarm the "Chief
Operator". Because the CAP server handshake is secure and the
decoder software can make it difficult to learn the password it
raises the bar much higher for a hacker.
Bill Ruck
San Francisco
More information about the EAS
mailing list