Hijacking the Emergency Alert System

turkeydance

Well-Known Member
Life Member
Supporting Member
Joined
Jul 17, 2017
Messages
4,506
Location
nc
Rating - 100%
4   0   0
only ATI systems, so far....
quotes:
1. The vulnerability stems from the fact that the radio protocol used to control the sirens is not secure: activation commands are sent “in the clear,” i.e. no encryption is used.
2. The public relies on emergency warning systems for notification of legitimate threats: natural disasters, man-made disasters and public emergencies. False alarms can result in needless panic and chaos, as witnessed last year in Dallas and more recently in Hawaii.
3. ATI features customers on its website around the US including One World Trade Center, WestPoint Military Academy and Entergy Nuclear Indian Point which are all in New York State, UMASS Amherst in Massachusetts, Eastern Arizona College, University of South Carolina and Eglin Air Force Base in Florida, amongst others.
link:
https://www.helpnetsecurity.com/2018/04/10/emergency-alert-systems/
 
And their solution? Buy a whole new system from the same supplier!
 
Time and again, companies have developed and deployed unsecured systems, only to face others exploiting them later. Let’s face it, in s day and age of 30 day business cycles and profit today over future viability there should be no surprise that this happens. R&D is expensive and there is going to be tremendous pressure to ship products. Ready or not, here we go.

The car industry certainly has been learning this lesson.
 
Last edited:
This system has never been activated, except to test it.
Never used during the 9/11 Terrorist Attacks.
 
Back
Top Bottom