SlideShare a Scribd company logo
1 of 51
Hacking 911:
Adventures in Disruption,
Destruction, and Death
quaddi, r3plicant & Peter Hefley
August 2014
Jeff Tully
Christian Dameff
Peter Hefley
Physician, MD
Emergency Medicine
Physician, MD
Pediatrics
IT Security, MSM, C|CISO, CISA, CISSP, CCNP, QSA
Senior Manager, Sunera
Jeff Tully
Christian Dameff
Peter Hefley
Open CTF champion sudoers- Defcon 16
Speaker, Defcon 20
Wrote a program for his TI-83
graphing calculator in middle school
Speaker, Defcon 20
Gun hacker, SBR aficianado
This talk is neither sponsored,
endorsed, or affiliated with any of our
respective professional institutions or
companies.
No unethical or illegal practices were
used in researching, acquiring, or
presenting the information contained in
this talk.
Do not attempt the theoretical or
practical attack concepts outlined in
this talk.
Disclaimer
Outline
- Why This Matters (Pt. 1)
- 911 Overview
- Methodology
- Attacks
- Why This Matters (Pt. 2)
Why This Matters (Pt. 1)
4/26/2003 9:57pm
Emergency Medical Services (EMS)
Research Aims
• Investigate potential vulnerabilities
across the entire 911 system
• Detail current attacks being carried out on
the 911 system
• Propose solutions for existing
vulnerabilities and anticipate potential
vectors for future infrastructure
modifications
Methodology
• Interviews
• Regional surveys
• Process observations
• Practical experimentation
• Solution development
Wired Telephone Call
End
Office
Selective
Router
PSAP
ALI Database
Voice Only
Voice and Data
Data
Voice Voice + ANI Voice + ANI
ANI ALI
Wireless Phase 1 Telephone Call
Mobile
Switching
Center
Selective
Router
PSAP
ALI Database
Voice Only
Voice and Data
Data
Voice
Voice + pANI/ESRK
Voice + pANI/ESRK
pANI/ESRK
ALI
Cell Tower
Voice
Callback#(CBN)
CellTowerLocation
CellTowerSector
pANI/ESRK
CBN, Cell Tower Location,
Cell Tower Sector, pANI / ESRKMobile
Positioning
Center
Wireless Phase 1 Data
Wireless Phase 2 Telephone Call
Mobile
Switching
Center
Selective
Router
PSAP
ALI Database
Voice Only
Voice and Data
Data
Voice + pANI/ESRK Voice + pANI/ESRK
pANI/ESRK
ALI
Cell Tower
Voice
Callback#
CellTowerLocation
CellTowerSector
pANI/ESRK
Latitude and Longitude,
Callback #, Cell Tower Location,
Cell Tower Sector, pANI / ESRK
Position
Determination
Equipment
Mobile
Positioning
Center
Voice
Wireless Phase 2 Data
VoIP Call
Emergency
Services
Gateway
Selective
Router
PSAP
ALI Database
Voice Only
Voice and Data
Data
VoIP +
CBN Voice + ESQK Voice + ESQK
ESQK
ALI
VoIP
Service
Provider
CBN
ESN#,ESQK
CBN, Location, ESQK
VoIP +
CBN
VSP
Database
The Three Goals of
Hacking 911
• Initiate inappropriate 911
response
• Interfere with an
appropriate 911 response
• 911 system surveillance
Wired – End Office Control
End
Office
Selective
Router
PSAP
ALI Database
Voice Only
Voice and Data
Data
Voice Voice + !%$# Voice + !%$#
!%$# ALI??
ALI Database
NSI Emergency Calls
Mobile
Switching
Center
Selective
Router
PSAP
ALI Database
Voice Only
Voice and Data
Data
Voice +
pANI/ESRK
Voice +
pANI/ESRK
pANI/ESRK
ALI
Cell Tower
CBN?
CellTowerLocation
CellTowerSector
pANI/ESRK
CBN, Cell Tower Location,
Cell Tower Sector, pANI / ESRK
CBN = 911 + last 7 of
ESN/IMEI
Voice Voice
Mobile
Positioning
Center
Wireless Location Modification
Mobile
Switching
Center
Selective
Router
PSAP
ALI Database
Voice Only
Voice and Data
Data
Voice
Voice +
pANI/ESRK
Voice +
pANI/ESRK
pANI/ESRK
ALI
Cell Tower Callback#
CellTowerLocation
CellTowerSector
pANI/ESRK
!@#Lat/Long%%$,
Callback #, Cell Tower Location,
Cell Tower Sector, pANI / ESRK
Position
Determination
Equipment
Mobile
Positioning
Center
Voice
VSP Modification
Emergency
Services
Gateway
Selective
Router
PSAP
ALI Database
Voice Only
Voice and Data
Data
VoIP +
CBN
Voice + ESQK
Voice + ESQK
ESQK
#ALI@
VoIP
Service
Provider CBN
ESN#,ESQK
VSP
Database
CBN, #%Location$@, ESQK
VoIP +
CBN
Swatting Call
VoIP Service Providers
Service disruption attacks
• Line-cutting
• Cell phone jamming
• ALI database editing
• TDoS
• PSAP targeting
Resource exhaustion
(virtual/personnel)
Outdated system
architectures
Lack of air-gapping
Privacy
Health
Impacts
Bystander CCO CPR Improves Chance of
Survival from Cardiac Arrest
100%
80%
60%
40%
20%
0%
Time between collapse and defibrillation (min)
0 1 2 3 4 5 6 7 8 9
Survival(%)
Nagao, K Current Opinions in Critical Care 2009
EMS Arrival Time based on TFD 90% Code 3 Response in FY2008. Standards of Response Coverage 2008.
EMS Arrival
No CPR
Traditional
CPR
CCO CPR
Strategic Threat Agents
• 6000 PSAPs taking a combined
660,000 calls per day
• Fundamental building block of
our collective security
• Potential damage extends beyond
individual people not being able
to talk to 911
Reverse 911
Solutions
• Call-routing red flags
• Call “captchas”
• PSAP security
standardizations
• Increased budgets for
security services
• Open the Black Box
Q&A

More Related Content

Viewers also liked

Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesPriyanka Aash
 
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-mainDefcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-mainPriyanka Aash
 
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillDefcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillPriyanka Aash
 
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fiDefcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fiPriyanka Aash
 
Defcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networksDefcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networksPriyanka Aash
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwarePriyanka Aash
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliPriyanka Aash
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsPriyanka Aash
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
 
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-withDefcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-withPriyanka Aash
 
Web Security: SQL Injection
Web Security: SQL InjectionWeb Security: SQL Injection
Web Security: SQL InjectionVortana Say
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisPriyanka Aash
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Priyanka Aash
 
Management vs. Leadership - Linked 2 Leadership
Management vs. Leadership  - Linked 2 LeadershipManagement vs. Leadership  - Linked 2 Leadership
Management vs. Leadership - Linked 2 LeadershipLinked 2 Leadership
 
Professional basic selling skills
Professional basic selling skillsProfessional basic selling skills
Professional basic selling skillsshehzad Chohan
 
Optical fiber communiction system
Optical fiber communiction systemOptical fiber communiction system
Optical fiber communiction systemrahulohlan14
 
Keynote Session : The Non - Evolution of Security
Keynote Session : The Non - Evolution of SecurityKeynote Session : The Non - Evolution of Security
Keynote Session : The Non - Evolution of SecurityPriyanka Aash
 
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security ImpactKeynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security ImpactPriyanka Aash
 
Communication progress ltd Startup Grind Tirana Albania
Communication progress ltd Startup Grind Tirana AlbaniaCommunication progress ltd Startup Grind Tirana Albania
Communication progress ltd Startup Grind Tirana AlbaniaCommunication Progress
 

Viewers also liked (20)

Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
 
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-mainDefcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
 
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillDefcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveill
 
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fiDefcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
 
Defcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networksDefcon 22-gregory-pickett-abusing-software-defined-networks
Defcon 22-gregory-pickett-abusing-software-defined-networks
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
 
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfDEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
DEFCON17 - Your Mind: Legal Status, Rights and Securing Yourself
 
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-withDefcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
 
Web Security: SQL Injection
Web Security: SQL InjectionWeb Security: SQL Injection
Web Security: SQL Injection
 
Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
 
16 Tenses In English
16 Tenses In English16 Tenses In English
16 Tenses In English
 
Management vs. Leadership - Linked 2 Leadership
Management vs. Leadership  - Linked 2 LeadershipManagement vs. Leadership  - Linked 2 Leadership
Management vs. Leadership - Linked 2 Leadership
 
Professional basic selling skills
Professional basic selling skillsProfessional basic selling skills
Professional basic selling skills
 
Optical fiber communiction system
Optical fiber communiction systemOptical fiber communiction system
Optical fiber communiction system
 
Keynote Session : The Non - Evolution of Security
Keynote Session : The Non - Evolution of SecurityKeynote Session : The Non - Evolution of Security
Keynote Session : The Non - Evolution of Security
 
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security ImpactKeynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security Impact
 
Communication progress ltd Startup Grind Tirana Albania
Communication progress ltd Startup Grind Tirana AlbaniaCommunication progress ltd Startup Grind Tirana Albania
Communication progress ltd Startup Grind Tirana Albania
 

Similar to Hacking 911: Adventures in Disruption, Destruction, and Death

E911 Presentation to Boston Consortium 3-4-14
E911 Presentation to Boston Consortium 3-4-14E911 Presentation to Boston Consortium 3-4-14
E911 Presentation to Boston Consortium 3-4-14Mark Fletcher, ENP
 
What you need to know about E911 as presented to the WAUG March 14
What you need to know about E911 as presented to the WAUG March 14What you need to know about E911 as presented to the WAUG March 14
What you need to know about E911 as presented to the WAUG March 14Mark Fletcher, ENP
 
New York City 'Tech Share' on Enterprise E911 with Fletch and Hank Hunt
New York City 'Tech Share' on Enterprise E911 with Fletch and Hank HuntNew York City 'Tech Share' on Enterprise E911 with Fletch and Hank Hunt
New York City 'Tech Share' on Enterprise E911 with Fletch and Hank HuntMark Fletcher, ENP
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to knowEric Klein
 
WebRTC and Emergency Services
WebRTC and Emergency Services WebRTC and Emergency Services
WebRTC and Emergency Services Mark Fletcher, ENP
 
Kari's Law Update & Making MLTS PBX E911 Work Presentation
Kari's Law Update & Making MLTS PBX E911 Work Presentation Kari's Law Update & Making MLTS PBX E911 Work Presentation
Kari's Law Update & Making MLTS PBX E911 Work Presentation Mark Fletcher, ENP
 
Kari's Law - Baby Steps in the Right Direction
Kari's Law - Baby Steps in the Right DirectionKari's Law - Baby Steps in the Right Direction
Kari's Law - Baby Steps in the Right DirectionMark Fletcher, ENP
 
Avaya Presentation to Colorado PUC on Karis's Law Sept. 4
Avaya Presentation to Colorado PUC on Karis's Law Sept. 4Avaya Presentation to Colorado PUC on Karis's Law Sept. 4
Avaya Presentation to Colorado PUC on Karis's Law Sept. 4Mark Fletcher, ENP
 
Enterprise 9-1-1: Kari's Law
Enterprise 9-1-1:  Kari's LawEnterprise 9-1-1:  Kari's Law
Enterprise 9-1-1: Kari's LawAvaya Inc.
 
ENP Study Group - Denver Colorado
ENP Study Group - Denver ColoradoENP Study Group - Denver Colorado
ENP Study Group - Denver ColoradoMark Fletcher, ENP
 
Brian ferrell resume
Brian ferrell resumeBrian ferrell resume
Brian ferrell resumeBrian Ferrell
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Barry Greene
 
My presentation to iCERT in Orlando Florida 10/26/14
My presentation to iCERT in Orlando Florida 10/26/14My presentation to iCERT in Orlando Florida 10/26/14
My presentation to iCERT in Orlando Florida 10/26/14Mark Fletcher, ENP
 
Simplesignalbusinessvoip(Power Point)
Simplesignalbusinessvoip(Power Point)Simplesignalbusinessvoip(Power Point)
Simplesignalbusinessvoip(Power Point)SimpleSignal
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 
NYSCATE 2015 Avaya Smart Campus Solutions
NYSCATE 2015 Avaya Smart Campus SolutionsNYSCATE 2015 Avaya Smart Campus Solutions
NYSCATE 2015 Avaya Smart Campus SolutionsMark Fletcher, ENP
 
WebRTC and E9-1-1: Impact on Public Safety Communications
WebRTC and E9-1-1: Impact on Public Safety CommunicationsWebRTC and E9-1-1: Impact on Public Safety Communications
WebRTC and E9-1-1: Impact on Public Safety CommunicationsAvaya Inc.
 
Cisco Connect Ottawa 2018 sixty to zero
Cisco Connect Ottawa 2018 sixty to zeroCisco Connect Ottawa 2018 sixty to zero
Cisco Connect Ottawa 2018 sixty to zeroCisco Canada
 

Similar to Hacking 911: Adventures in Disruption, Destruction, and Death (20)

E911 Presentation to Boston Consortium 3-4-14
E911 Presentation to Boston Consortium 3-4-14E911 Presentation to Boston Consortium 3-4-14
E911 Presentation to Boston Consortium 3-4-14
 
What you need to know about E911 as presented to the WAUG March 14
What you need to know about E911 as presented to the WAUG March 14What you need to know about E911 as presented to the WAUG March 14
What you need to know about E911 as presented to the WAUG March 14
 
New York City 'Tech Share' on Enterprise E911 with Fletch and Hank Hunt
New York City 'Tech Share' on Enterprise E911 with Fletch and Hank HuntNew York City 'Tech Share' on Enterprise E911 with Fletch and Hank Hunt
New York City 'Tech Share' on Enterprise E911 with Fletch and Hank Hunt
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Communication Dispatch Centers
Communication Dispatch CentersCommunication Dispatch Centers
Communication Dispatch Centers
 
WebRTC and Emergency Services
WebRTC and Emergency Services WebRTC and Emergency Services
WebRTC and Emergency Services
 
Kari's Law Update & Making MLTS PBX E911 Work Presentation
Kari's Law Update & Making MLTS PBX E911 Work Presentation Kari's Law Update & Making MLTS PBX E911 Work Presentation
Kari's Law Update & Making MLTS PBX E911 Work Presentation
 
Kari's Law - Baby Steps in the Right Direction
Kari's Law - Baby Steps in the Right DirectionKari's Law - Baby Steps in the Right Direction
Kari's Law - Baby Steps in the Right Direction
 
Avaya Presentation to Colorado PUC on Karis's Law Sept. 4
Avaya Presentation to Colorado PUC on Karis's Law Sept. 4Avaya Presentation to Colorado PUC on Karis's Law Sept. 4
Avaya Presentation to Colorado PUC on Karis's Law Sept. 4
 
Enterprise 9-1-1: Kari's Law
Enterprise 9-1-1:  Kari's LawEnterprise 9-1-1:  Kari's Law
Enterprise 9-1-1: Kari's Law
 
ENP Study Group - Denver Colorado
ENP Study Group - Denver ColoradoENP Study Group - Denver Colorado
ENP Study Group - Denver Colorado
 
Brian ferrell resume
Brian ferrell resumeBrian ferrell resume
Brian ferrell resume
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1
 
My presentation to iCERT in Orlando Florida 10/26/14
My presentation to iCERT in Orlando Florida 10/26/14My presentation to iCERT in Orlando Florida 10/26/14
My presentation to iCERT in Orlando Florida 10/26/14
 
Simplesignalbusinessvoip(Power Point)
Simplesignalbusinessvoip(Power Point)Simplesignalbusinessvoip(Power Point)
Simplesignalbusinessvoip(Power Point)
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 
NYSCATE 2015 Avaya Smart Campus Solutions
NYSCATE 2015 Avaya Smart Campus SolutionsNYSCATE 2015 Avaya Smart Campus Solutions
NYSCATE 2015 Avaya Smart Campus Solutions
 
WebRTC and E9-1-1: Impact on Public Safety Communications
WebRTC and E9-1-1: Impact on Public Safety CommunicationsWebRTC and E9-1-1: Impact on Public Safety Communications
WebRTC and E9-1-1: Impact on Public Safety Communications
 
IETF-73 SIP Derive
IETF-73 SIP DeriveIETF-73 SIP Derive
IETF-73 SIP Derive
 
Cisco Connect Ottawa 2018 sixty to zero
Cisco Connect Ottawa 2018 sixty to zeroCisco Connect Ottawa 2018 sixty to zero
Cisco Connect Ottawa 2018 sixty to zero
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Hacking 911: Adventures in Disruption, Destruction, and Death

  • 1. Hacking 911: Adventures in Disruption, Destruction, and Death quaddi, r3plicant & Peter Hefley August 2014
  • 2. Jeff Tully Christian Dameff Peter Hefley Physician, MD Emergency Medicine Physician, MD Pediatrics IT Security, MSM, C|CISO, CISA, CISSP, CCNP, QSA Senior Manager, Sunera
  • 3. Jeff Tully Christian Dameff Peter Hefley Open CTF champion sudoers- Defcon 16 Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle school Speaker, Defcon 20 Gun hacker, SBR aficianado
  • 4.
  • 5. This talk is neither sponsored, endorsed, or affiliated with any of our respective professional institutions or companies. No unethical or illegal practices were used in researching, acquiring, or presenting the information contained in this talk. Do not attempt the theoretical or practical attack concepts outlined in this talk. Disclaimer
  • 6. Outline - Why This Matters (Pt. 1) - 911 Overview - Methodology - Attacks - Why This Matters (Pt. 2)
  • 7. Why This Matters (Pt. 1) 4/26/2003 9:57pm
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Research Aims • Investigate potential vulnerabilities across the entire 911 system • Detail current attacks being carried out on the 911 system • Propose solutions for existing vulnerabilities and anticipate potential vectors for future infrastructure modifications
  • 17. Methodology • Interviews • Regional surveys • Process observations • Practical experimentation • Solution development
  • 18. Wired Telephone Call End Office Selective Router PSAP ALI Database Voice Only Voice and Data Data Voice Voice + ANI Voice + ANI ANI ALI
  • 19. Wireless Phase 1 Telephone Call Mobile Switching Center Selective Router PSAP ALI Database Voice Only Voice and Data Data Voice Voice + pANI/ESRK Voice + pANI/ESRK pANI/ESRK ALI Cell Tower Voice Callback#(CBN) CellTowerLocation CellTowerSector pANI/ESRK CBN, Cell Tower Location, Cell Tower Sector, pANI / ESRKMobile Positioning Center
  • 21. Wireless Phase 2 Telephone Call Mobile Switching Center Selective Router PSAP ALI Database Voice Only Voice and Data Data Voice + pANI/ESRK Voice + pANI/ESRK pANI/ESRK ALI Cell Tower Voice Callback# CellTowerLocation CellTowerSector pANI/ESRK Latitude and Longitude, Callback #, Cell Tower Location, Cell Tower Sector, pANI / ESRK Position Determination Equipment Mobile Positioning Center Voice
  • 23. VoIP Call Emergency Services Gateway Selective Router PSAP ALI Database Voice Only Voice and Data Data VoIP + CBN Voice + ESQK Voice + ESQK ESQK ALI VoIP Service Provider CBN ESN#,ESQK CBN, Location, ESQK VoIP + CBN VSP Database
  • 24.
  • 25. The Three Goals of Hacking 911 • Initiate inappropriate 911 response • Interfere with an appropriate 911 response • 911 system surveillance
  • 26. Wired – End Office Control End Office Selective Router PSAP ALI Database Voice Only Voice and Data Data Voice Voice + !%$# Voice + !%$# !%$# ALI??
  • 28. NSI Emergency Calls Mobile Switching Center Selective Router PSAP ALI Database Voice Only Voice and Data Data Voice + pANI/ESRK Voice + pANI/ESRK pANI/ESRK ALI Cell Tower CBN? CellTowerLocation CellTowerSector pANI/ESRK CBN, Cell Tower Location, Cell Tower Sector, pANI / ESRK CBN = 911 + last 7 of ESN/IMEI Voice Voice Mobile Positioning Center
  • 29. Wireless Location Modification Mobile Switching Center Selective Router PSAP ALI Database Voice Only Voice and Data Data Voice Voice + pANI/ESRK Voice + pANI/ESRK pANI/ESRK ALI Cell Tower Callback# CellTowerLocation CellTowerSector pANI/ESRK !@#Lat/Long%%$, Callback #, Cell Tower Location, Cell Tower Sector, pANI / ESRK Position Determination Equipment Mobile Positioning Center Voice
  • 30. VSP Modification Emergency Services Gateway Selective Router PSAP ALI Database Voice Only Voice and Data Data VoIP + CBN Voice + ESQK Voice + ESQK ESQK #ALI@ VoIP Service Provider CBN ESN#,ESQK VSP Database CBN, #%Location$@, ESQK VoIP + CBN
  • 31.
  • 32.
  • 34.
  • 35.
  • 36.
  • 37.
  • 39. Service disruption attacks • Line-cutting • Cell phone jamming • ALI database editing • TDoS • PSAP targeting
  • 40.
  • 42.
  • 43.
  • 45. Bystander CCO CPR Improves Chance of Survival from Cardiac Arrest 100% 80% 60% 40% 20% 0% Time between collapse and defibrillation (min) 0 1 2 3 4 5 6 7 8 9 Survival(%) Nagao, K Current Opinions in Critical Care 2009 EMS Arrival Time based on TFD 90% Code 3 Response in FY2008. Standards of Response Coverage 2008. EMS Arrival No CPR Traditional CPR CCO CPR
  • 46.
  • 47. Strategic Threat Agents • 6000 PSAPs taking a combined 660,000 calls per day • Fundamental building block of our collective security • Potential damage extends beyond individual people not being able to talk to 911
  • 49. Solutions • Call-routing red flags • Call “captchas” • PSAP security standardizations • Increased budgets for security services • Open the Black Box
  • 50.
  • 51. Q&A