Feeds

US 911 service needs emergency upgrade and some basic security against scumbags

12-year-old spoofs system to try and get Justin Bieber shot

Beginner's guide to SSL certificates

Defcon 22 The US emergency response system is in urgent need of better security as it’s surprisingly easy to disable or spoof 911 calls.

In a talk at Defcon 22 two doctors (who are also hackers) and a security consultant presented research into the emergency response system and how calls via fixed line, mobile phones and VoIP are routed. There’s still considerable variation in how different states set up their 911 systems,. but all are vulnerable.

You might ask why anyone would want to hack the emergency services system, since it’s not a financially rewarding target but it’s a growing problem the team said. Some people do it for mischief, but it’s also used to disrupt businesses, could be used to divert police away from a crime in progress, and there’s also been a huge rise in swatting.

Swatting is the practice of calling the emergency services and reporting a serious crime involving firearms in the hope of getting a heavily armed SWAT (special weapons and tactics) team to a target’s house, which could result in an accidental fatality.

It has been used against security journalist Brian Krebs, but also against celebrities. A 12-year-old boy successfull got SWAT teams dispatched to the houses of actor and tech investor Ashton Kutcher and pop star Justin Bieber - and however annoying Baby is it’s not worth trying to kill him for.

When calls are made to the emergency services the telecommunications provider routs them to the local 911 team, along with as much information as possible about where the call is located. With wired systems that’s limited to what subscriber information they have on file, but some mobile calls can also include GPS and all include data on which cell tower the caller is using.

In the case of the preteen swatter, the child used a text telephone (TTY) used by the disabled, to call in the false report. These terminals are transferred to an operator, who will the call the emergency services and relay the information, thus circumventing much of the location and user information usually included in calls.

The three researchers found that spoofing this information to obscure the caller’s true location is actually quite difficult, but not impossible. It is possible to strip some identifying information from a fixed line call, doing so sends a red flag to the operator, as would spoofing a GPS location.

A bigger problem is the emergency call centers themselves. These used to be airgapped from a hospital’s administrative systems but increasingly they are merged to save on money and network maintenance and are therefore much more susceptible to a denial of service attack against the telephone or computer systems.

Physical security in such centers is also usually lax and penetration testing, both digital and physical, is seldom carried out on the calls centers and staff get almost no training on social engineering techniques.

There are some quick and cheap fixes, the team said. A unified security testing structure for networks and phones would be a big help they said, and adding an extra step in phone calls - such as asking a caller to press one for English and two for Spanish - which would stop or slow an automated attack.

But the chief palliative for the system is budget - the more advanced a network the less susceptible it is to an attack. Most emergency services setups are very tight on funds and security against the faint chance of an attack isn't as much of a priority as saving people's lives on a daily basis. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
SMASH the Bash bug! Red Hat, Apple scramble for patch batches
'Applying multiple security updates is extremely difficult'
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
Desperate VXers enslave FREEZERS in DDoS bot
Updated Spike malware targets Asia
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.