ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

911: “What is Your Emergency?” You: “I’ve Been Hacked!”

b2ap3_thumbnail_rescue_911_from_hackers_400.jpgBelieve it or not, there are horror stories told of innocent people being abandoned by 911 dispatchers when they need help the most. This mainly isn’t due to incompetence on the dispatchers’ part, but because there are malicious forces that aren’t taken into consideration. Often, victims of 911 mishaps are misled by the odd hacker.

According to WIRED magazine, not even the 911 address database is that secure from hackers. Unfortunately, keeping the system safe wasn’t at the top of the priority list when figuring out how to best provide emergency medical assistance to those who called the hotline. Instead, more focus was put on training 911 operators to coach those on the other end of the line how to perform CPR. The phone line might be advertised as 24/7, but what happens when, say, someone hacks into the database and messes with the addresses on file?

rescue 911

Chaos ensues. The emergency call system works two different ways, depending on what type of phone is used:

  • Landline Phones: In order to find the caller’s location, first responders need to use a database of addresses tied to phone numbers.
  • Wireless phones: these send out coordinations via a GPS chip, and a cell phone tower processes the call.

Christian Dameff and Jeff Tully, an emergency room physician and pediatric doctor, respectively, both sought to better improve the security of 911’s network. The two were also heavily involved in streamlining the 911 system. Together with IT security manager Peter Hefley, they decided to hack the system and discover where vulnerabilities existed. Like many others researching how to keep the world safe from hackers, they presented their findings at the DefCon hacker conference in Las Vegas.

Unlike other types of data breaches, a 911 hack isn’t going to result in someone stealing your identity. They won’t open bank accounts under your name and ruin your credit history. They won’t charge money to your credit cards. What hackers will do is edit the databases and make addresses difficult to find. They can even launch denial-of-service attacks, preventing calls from even reaching the emergency call center. Even though the operators are trained to ask callers for their address, some callers don’t know where they are. Even an outdated database can be the reason that people die from hacking attacks.

Swatters with Landlines
One method which hackers can use to interfere with emergency deployment is “swatting.” This is done by calling a 911 operator under the guise of a fake or stolen phone number or caller ID. These are often fake reports of home invasions or even hostage threats, and are so easy that a 12-year-old kid can pull them off. If a swatter calls their local public safety hotline, they don’t even need to go through 911, and can instead just provide the address of their target. These attacks, to say the least, are disruptive and annoying. Generally, the numbers for these public safety hotlines aren’t available to the general public, but a hacker can find them easily enough by listening in on recorded 911 calls and using a tone extraction technique.

Mobile Swatting
Similar to the landline, a 911 operator needs an address in order to find where the caller is located. However, with a mobile device, the location is provided with a GPS chip, and is given in latitude and longitude, rather than the owner’s billing address. This information is stored temporarily in the address database, and then the call is switched over to the public security phone line.

It has been proven that callers can even fool this system by using a prepaid phone that isn’t connected to an account, the reason being that phones are required by law to be able to call 911. No number is given to track the phone or the user, so it is difficult to find out who is calling and where they are.

VoIP Swatting
Even Voice over Internet Protocol (VoIP) users can potentially have trouble getting through in the event of an emergency. If a VoIP user wants to call 911, they have to go through a long process. VoIP users must manually place their address in a database provided by their VoIP system. They must then configure it to route their calls from 911 to a local the public safety number. And, if the user has access to the database, you can bet that hackers can find a way to access it, too.

As seen by these examples, poor security can lead to poor communication, and even deadly consequences. If your clients cannot reach you when they need you most, you’ll have either an angry customer on your hands or no customer at all. This is why we at ClearView IT value security above all else. We can outfit your business with security solutions designed to keep you safe from outside threats. With a Unified Threat Management solution, you can be sure that your network is as secure as can be.

If your IT is in distress, give ClearView IT a call at 866-326-7214. We’ll resolve your problems quickly and efficiently with minimal incident.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Small Business Microsoft Office Upgrade Smartphones Network Mobile Devices Communication Data Recovery Managed IT Services Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Windows 10 Managed Service Apps IT Support Browser Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Internet of Things Managed Service Provider Government Saving Money Operating System Gadgets Workplace Strategy Artificial Intelligence Managed IT services Networking Windows Virtualization Mobile Device Management Information Spam Business Technology Remote Bandwidth Server Encryption Blockchain WiFi App Office Two-factor Authentication Office 365 Apple History Information Technology Employee/Employer Relationship Gmail Budget BDR Health Cybercrime Analytics Access Control Data Security Wi-Fi Big Data Conferencing Hacking Remote Monitoring Cost Management Vendor IT Management Hacker Employer-Employee Relationship Training Document Management Compliance Save Money Remote Computing Voice over Internet Protocol Patch Management Help Desk Project Management Computing Vendor Management Hard Drive Applications Search... Best Practice Money Vulnerabilities Customer Service Legal Retail Unified Threat Management Alert Firewall Data storage Augmented Reality Hiring/Firing Word Outlook Password IBM Data loss Website Mobile Office Managed Services BYOD YouTube How To Mobile Computing Data Breach Websites Marketing Laptop Running Cable Meetings Mobility Twitter Google Maps Storage Law Enforcement Scam End of Support Social Printer Monitoring Sports SaaS DDoS Healthcare VPN Windows 11 User iPhone Update Education Cortana Travel Content Filtering Virtual Reality Social Engineering Cryptocurrency Black Market Remote Workers Chrome Paperless Office Router Antivirus Cleaning Windows 7 Robot Free Resource Maintenance The Internet of Things Administration Current Events Virtual Assistant Solid State Drive Presentation Specifications Solutions Start Menu IT Consultant Computer Care Wireless Technology Downloads eWaste Images 101 Integration Vulnerability Chromebook Drones Processor Customer Relationship Management Display Co-Managed IT Automobile Software as a Service Downtime Entertainment Safety Data Protection How To Employees Virtual Desktop Avoiding Downtime Microchip Flexibility Experience Holidays Multi-factor Authentication Hack Cooperation Identity Theft Saving Time Video Conferencing Tech Terms Notifications Unified Communications HIPAA Disaster Virtual Machines Managed IT Digital Google Docs Computer Repair Computers Bitcoin Bluetooth Distributed Denial of Service Professional Services Lithium-ion battery Telephone Office Tips Taxes Private Cloud Memory Processors Excel Managed Services Provider Physical Security Virtual Private Network Politics Machine Learning Settings PowerPoint Smartwatch Telephone System Communitications Regulations Microsoft 365 Banking Google Wallet Deep Learning Electronic Payment Directions CCTV Procurement Backup and Disaster Recovery Point of Sale Printing Messenger Desktop Public Speaking Touchscreen FinTech Content CES Electronic Medical Records Streaming Media Computer Malfunction IT Assessment Accountants Shortcuts Emergency Business Metrics Hosted Solution Vendor Mangement Supply Chain Management Phone System Database Value Keyboard Books Cyber security Hard Drives Language Samsung Society Organization Health IT Webcam Smart Devices Equifax Be Proactive intranet Uninterrupted Power Supply Business Mangement Monitors Visible Light Communication Remote Working Tactics Wireless Hard Drive Disposal Shortcut Reading Trend Micro Heating/Cooling Environment Tablets Windows 8 AI Username Digital Security Cameras Windows XP Electronic Health Records Computer Accessories Startup Workplace Strategies Transportation Freedom of Information Social Networking Google Calendar Relocation Displays Navigation Supercomputer Advertising Addiction Wasting Time email scam eCommerce Mobile Security Modem Virus Work/Life Balance Tech Support Videos User Tip Motion Sickness Surveillance Legislation News Comparison Google Drive Evernote Network Management Managing Costs In Internet of Things SSID Corporate Profile Network Congestion Media Proxy Server Development Emails Smart Technology Employer/Employee Relationships Fake News Knowledge Hacks Television Reliable Computing Telephony Writing Employer Employee Relationship Service Level Agreement Staffing Virtual Machine Computing Infrastructure Optimization Device security IP Address Cabling Reviews Troubleshooting Management Tablet 2FA G Suite Wireless Headphones Teamwork Microsoft Excel Mouse Scalability VoIP Tech Tracking Data Storage Going Green Hypervisor Business Cards Administrator Medical IT Text Messaging Proactive IT Shopping Error Paperless Bookmark Web Server Supply Chain SQL Server Bring Your Own Device SharePoint Term Digital Payment PCI DSS Download Recovery Licensing Piracy Competition Humor HTML Worker Music Gig Economy Business Owner Access Business Communications Browsers LiFi Internet Service Provider Nanotechnology Workplace Azure Entrepreneur Application Time Management Google Play Public Cloud Regulations Compliance Upload Documents Managed IT Service Software License Social Network Memes Botnet Business Intelligence Spyware Micrsooft Human Resources Data Analysis Net Neutrality Screen Reader Scams Audit Rental Service Mobile Technology Flash Security Cameras File Sharing Financial Data Trends Securty Risk Management Inbound Marketing Customer Resource management IT Devices Domains Redundancy Telephone Systems Business Growth Cache Google Apps Fileless Malware Cables Tip of the week Company Culture Unified Threat Management Workers Telework Gamification

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?