[EAS] Dallas warning sirens hacked - maybe

Sean Donelan sean at donelan.com
Tue Apr 11 10:57:46 CDT 2017


On Tue, 11 Apr 2017, Alan Alsobrook wrote:
> On 4/11/2017 12:00 AM, Botterell, Arthur at CalOES wrote:
>> I'd love to know how they added "encryption" to all 150+ sirens overnight.
>
> They likely pulled cache radios on their encrypted radio system to use as the 
> site receivers.
> Of course the only problem with that is P25 Digital radio's have a hard time 
> sending a clean tone. So any audio signaling may not be reliable or work.

I found a copy of the 2007 proposal to update the Dallas outdoor warning 
system on the Internet Wayback Machine site. The equipment included 
security options in the 2007 proposal; but the statement of work required 
backwards compability with the previous siren system. I'm guessing for
backwards compatible, they (installer, city, ???) didn't enable the 
"advanced" security options.

Some theories why Dallas was able to fix it so quickly?

As part of the 2007 upgrade, Dallas may have already installed trunked 
radios which could do "encryption." It could change the talk groups for 
the trunking configuration on the existing radios without needing to visit 
each siren site.

Also as part of the 2007 upgrade, a feature of the siren controller hub is 
pushing configuration updates to all the remote units. The central hub 
could have pushed a configuration to enable "encryption" on all 156 siren 
RTUs, again without needing to visit each siren site.

Or a third option, the reporters and officials are confused by the 
technical language, e.g. encryption vs. PL tone/DPL code on the repeater. 
Its as if vendors deliberately create confusing names for features.
Dallas may have done something completely different.

Until Dallas OEM publically says what they found and fixed, its just 
speculation. Other cities may have the same vulnerabilities, but 
don't know for certain, until Dallas shares their findings.



More information about the EAS mailing list