[EAS] Dallas warning sirens hacked - maybe
Sean Donelan
sean at donelan.com
Mon Apr 10 10:50:52 CDT 2017
On Sat, 8 Apr 2017, Ed Czarnecki wrote:
> The city is sticking to the story that it was a hacker (whether or not test
> mode was involved), and also infer that it was someone "in the Dallas area".
> In this case, the scenario involves a large 150+ siren system is managed by
> three control points (two in the same building), all of which set up to
> allow remote activation via the Internet ... Which is the interesting part
> - these may have been attacked individually, or at a central control point.
> But the central control points apparently could not shut they sirens down
> once activated.
The original Massachusetts Institute of Technology meaning of the work
"hack" is not limited to computer hacking. But I don't know if the Dallas
public information officials are being that sophisticated.
While Dallas officials aren't saying what happened, or whether other
outdoor warning systems in other jurisdictions may have the same
vulnerability; local journalists in Dallas are reporting city sources are
telling them:
1. Officials know how it was done, but not who did it
2. Was not a malfunction or operator error by insiders
3. Local, physical access to the hub controlling the sirens (not
remote/Internet hacking source)
4. Manual shutdown of the hub controlling the sirens to stop it
So it may not be a "computer hack."
The reporters or official sources may misunderstood what they've heard, so
the news reports could be incorrect. For example, last month Dallas
officials blamed T-Mobile for problems with its 9-1-1 system.
After the investigation, it turned out to be a problem with an old PBX
and under-staffing at the city's 9-1-1 center. T-Mobile was not the
source of the 9-1-1 problems.
The report it was a local/physical attack is unusual, especially
combined with the statement it wasn't an insider or operator error.
But those reports could be wrong.
More information about the EAS
mailing list