Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

FreepFryer

(7,086 posts)
34. 4/17: Hack of Dallas Sirens Not the First or Last on Emergency Systems, Experts Warn
Sat Jan 13, 2018, 04:44 PM
Jan 2018
Typically, a city will have just one, central computer workstation that is used to manage a city-wide deployment of civil defense horns. Hacking into that system either from the network its connected to, or by gaining physical or logical access to the actual terminal is all that’s needed to carry out the kind of attack seen in Dallas over the weekend [Steve Jung, a security researcher and penetration tester who has helped assess the security of such systems] said.

It wouldn’t be the first time. In 2013, for example software and equipment by the firm Monroe that is used to managed emergency alert systems was the target of a hack during which EAS equipment operated by broadcasters in Montana, Michigan and other states was compromised and used to issue an alert claiming that the “dead are rising from their graves,” and advising residents not to attempt to apprehend them. Researcher Mike Davis of the firm IOActive discovered those flaws and, later, in the digital alerting systems – DASDEC – application servers, which receive and authenticate EAS messages. A scan of the public Internet at the time by IOActive found 412 systems running vulnerable Monroe Electronics software. A subsequent patch by Monroe to address some security issues in its products failed to address serious security issues.

The software that controls civil defense and alerting systems like the Dallas sirens is often vulnerable to both network and application-focused attacks, experts say. “I would venture to guess that this is a relatively new frontier for that kind of software – even to think about an application focused attack,” Jung said. “In 20 years in (information security) I’ve never seen static code analysis of one of those boxes,” he said, referring to the siren systems.


https://securityledger.com/2017/04/hack-of-dallas-sirens-not-the-first-or-last-on-emergency-systems-experts-warn/

Recommendations

0 members have recommended this reply (displayed in chronological order):

Yeah, was it hacked somehow ... if so, extremely dangerous. n/t RKP5637 Jan 2018 #1
What concerns me is that we haven't heard a simple explanation MineralMan Jan 2018 #7
hmmmm, it seems they are fishing for an explanation. ... been wondering/thinking the same. n/t RKP5637 Jan 2018 #11
Perhaps some Un has the answer True Dough Jan 2018 #2
I certainly hope not. MineralMan Jan 2018 #5
Or, if you care to indulge in conspiracy theories... True Dough Jan 2018 #25
Exactly! peggysue2 Jan 2018 #3
There are mess ups and bpositive Jan 2018 #4
Apparently, during shift change, john657 Jan 2018 #6
Thanks for that! MineralMan Jan 2018 #8
And a complete review of shift change procedures, john657 Jan 2018 #9
jesus christ, pushed a wrong button, seems like that procedure is shit. sunonmars Jan 2018 #10
Yeah. john657 Jan 2018 #12
I suspect changes will be made in the procedure. MineralMan Jan 2018 #13
Yep, definitely. Next will be oops, I hit the nuclear launch button. I thought it said Lunch! n/t RKP5637 Jan 2018 #14
I believe that was the central plot device... Dave Starsky Jan 2018 #45
I wan't to see secure area access records checked against shift change schedules. LuvLoogie Jan 2018 #17
So this was a civilian initiated alert and not a military initiated alert? LuvLoogie Jan 2018 #26
Correct. john657 Jan 2018 #32
Smells like team... GeorgeGist Jan 2018 #27
They're just saying that to cover up dumbcat Jan 2018 #28
Any proof of your claim? john657 Jan 2018 #33
Proof? How about observation and experience dumbcat Jan 2018 #42
So, I'll ask you again, john657 Jan 2018 #43
What would you consider "proof"? dumbcat Jan 2018 #44
Proof would be something that's irrefutable, john657 Jan 2018 #46
If you believe that cilla4progress Jan 2018 #15
You might want to adjust your tinfoil hat. bearsfootball516 Jan 2018 #18
it just seems to easy, wrong button, if that happened, all of them need fired for that setup sunonmars Jan 2018 #19
Any proof of that? john657 Jan 2018 #24
President S***head was probably looking for a diversion.. Stellar Jan 2018 #16
Why are there no failsafe procedures to be sure "mistakes" like that The Velveteen Ocelot Jan 2018 #20
That's an excellent question, indeed. MineralMan Jan 2018 #21
its pure Homer Simpson script, isnt it? sunonmars Jan 2018 #22
More like Dr. Strangelove. The Velveteen Ocelot Jan 2018 #23
First thing I thought of was War Games. nt Ferrets are Cool Jan 2018 #36
Worse... why wasn't it immediately rescinded !!! C_U_L8R Jan 2018 #29
Yes. It was a screw-up of the first order. MineralMan Jan 2018 #31
If it is headed for Hawaii, all the folks on Oahu can chill FarCenter Jan 2018 #30
4/17: Hack of Dallas Sirens Not the First or Last on Emergency Systems, Experts Warn FreepFryer Jan 2018 #34
No doubt that's true. MineralMan Jan 2018 #35
The thing that doesn't sit with me is the latency. imho 38 mins is too long 4 human error alone. n/t FreepFryer Jan 2018 #37
I definitely agree. MineralMan Jan 2018 #41
Our steel and gun powder military is obsolete . pwb Jan 2018 #38
It could be a simple mistake. Turbineguy Jan 2018 #39
When you're on a hair trigger, like when your pResident is making insane threats against N. Korea LastLiberal in PalmSprings Jan 2018 #40
Processes and procedures... HipChick Jan 2018 #47
Latest Discussions»General Discussion»The Real Question: How Di...»Reply #34