HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED 12 MINUTES AGO.
You are here: Home / Network Security / Emergency Broadcast System Hackable
Barium Ferrite (BaFe):
Higher Capacity, Superior Performance, Longer Archival Life
www.thefutureoftape.com
'Zombie' Alert Shows Emergency Broadcasts Can Be Hacked
'Zombie' Alert Shows Emergency Broadcasts Can Be Hacked
By Barry Levine / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
JULY
09
2013


A recent zombie apocalypse showed the vulnerability of the United States' emergency broadcasting system. In February, hackers interrupted Montana TV with reports of a zombie apocalypse, using the Emergency Alerting System (EAS), and this week a security firm, citing the zombie attack, has recommended that the system be re-engineered.

Seattle-based IOActive has said that the zombie news bulletin showed the system's weaknesses. IOActive principal research scientist Mike Davis told news media that, "although there was no zombie apocalypse, it did highlight just how vulnerable the system is."

The zombie bulletin also played on a Michigan radio station, and it said that civil authorities "have reported that the bodies of the dead are rising from their graves and attacking the living." It added the suggestion that witnesses not "attempt to approach or apprehend these bodies as they are considered extremely dangerous."

10 Minutes to POTUS

IOActive said it has uncovered vulnerabilities in the digital alerting application servers, or DASDEC, which receive and authenticate EAS messages. When a message has been received and authenticated, DASDEC interrupts a broadcast with the well-known alert tone and the message.

Davis said in a statement that DASDEC application servers "are currently shipped with their root privileged SSH key as part of the firmware update package." The key enables a remote logon, and can let the holder manipulate any system function, including disrupting a station's transmission.

Among other functions, the EAS is intended to allow the President of the United States to speak to the country's citizens in as little as 10 minutes from when a disaster or other event occurs. The Federal Emergency Management Agency (FEMA) oversees the EAS.

'Potential Security Vulnerability'

The DASDEC systems are made by Monroe Electronics in New York, which released in April a software update that it said resolved the "potential security vulnerability" and improved several operational features. The changes included removal of default SSH keys and a simplification of the process to load new SSH keys.

The U.S. Department of Homeland Security (DHS) reported last week that, while IOActive has reported "that the administrative web server uses a predictable, monotonically increasing session ID," based on running the web server in a test environment, Monroe Electronics "could not reproduce this finding" in the factory or in the field. It is not currently clear if the vulnerabilities reported by IOActive have been resolved.

The first nationwide test of the EAS was conducted by the Federal Communications Commission and FEMA at 2pm ET on November 9, 2011, when a 30-second test interruption with sample messaging broke into most TV and radio broadcasts in the country. While EAS has been tested and used on previous occasions, this was its first transmission nationwide, and a key goal was to find any glitches. In that sense, it was successful, in that it turned out some stations didn't air the test and some interruptions exceeded 30 seconds.

Editorial note: Please see additional information in the Comments section below, provided by Monroe Electronics about security updates they have provided to resolve potential vulnerability of the system.

Tell Us What You Think
Comment:

Name:

Editor:
Posted: 2013-07-25 @ 9:22am PT
Thank you Ed Czarnecki. We appreciate the additional information and clarifications provided below for our readers about Monroe Electronic's efforts to address the security concerns discussed.

Ed Czarnecki:
Posted: 2013-07-25 @ 9:17am PT
A very critical omission in the article and the researcher's report is that **several months ago**, Monroe Electronics issued a software release with a cumulative security update that addressed these reported concerns. The software update was actually issued in a soft release in March 2013, and then in a general release in April 2013. Our understanding is that most users had already implemented this update.

To excerpt from the actual ICS-CERT report from the US goverment:

"On April 24, 2013, Monroe Electronics and Digital Alert Systems released firmware version 2.0-2 that disables the compromised SSH key, provides a simplified user option to install new unique keys, and enforces a new password policy. Monroe Electronics has taken considerable effort to provide update information to DASDEC and One-NetSE users."

Also, please see our April 24th statement on the matter here: http://www.digitalalertsystems.com/pdf/130604-Monroe-Security-PR.pdf

I also would note a recent statement from Dan Watson, a spokesman for the Federal Emergency Management Agency (FEMA), which handles oversight of the EAS, who confirmed that the issue was fixed via a software update.

We undertook great efforts to provide a cumulative security update that removed all SSH keys, addressed password policy, and made other security enhancements. We also made a committed effort to contact our users directly with information about the nature of the concern, and the software mitigation, and the need to adhere to accepted network security practices.

I hope you appreciate the importance of clarifying this omission in the article.

Yours very respectfully,
Ed Czarnecki
Senior Director - Strategy and Regulatory Affairs
Monroe Electronics/Digital Alert Systems

Richard Roberts III:
Posted: 2013-07-15 @ 1:35pm PT
Who's to say the zombie's aren't real. that it didn't happen. and now they are just covering it up.

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
Forrester study shows 187% ROI with Druva Endpoint Backup: In a commissioned study conducted by Forrester Consulting on behalf of Druva, Forrester found that the costs and benefits for a composite organization with 3,000 inSync users, based on customer interviews, are: 1) 187% return on investment, and 2) Total cost savings and benefits of $3.8 million. Click here to access the study now.
MORE IN NETWORK SECURITY
Product Information and Resources for Technology You Can Use To Boost Your Business

NETWORK SECURITY SPOTLIGHT
The FBI is pointing the finger of blame for the Sony Pictures cyberattack directly at North Korea. The hackers stole confidential data and caused the movie giant to can its new comic film, "The Interview."

ENTERPRISE HARDWARE SPOTLIGHT
Almost half of consumer, industry and life sciences manufacturers are expected to be using 3D printers within three years and now 3D printing services are aiming to help companies experiment.

© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.