https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Call Center/Command


Racial slurs prompt radio overhaul

Racial slurs prompt radio overhaul

Chicago Fire Department reprograms 1400-plus radios; city speeds digital migration
  • Written by Urgent Communications Administrator
  • 1st May 2004

The Chicago Fire Department lately has experienced a series of incidents that many emergency services experts agree is rather unusual: a hacker, apparently using a non-official radio, has been spewing racial epithets over the fire band.

To solve the problem, the city has reprogrammed all 1400-plus of its fire radios to identify them as city property, which ostensibly will prevent the transmission of rogue broadcasts. It also has begun a previously announced migration to a new $180 million citywide digital trunking system. The $10 million first phase, to be executed later this year, will cover the fire department and make this kind of activity a near impossibility, according to sources.

The headache began in February when a firefighter on the way to an emergency situation used a racial epithet to describe a driver who was impeding traffic. The remark was unintentionally broadcast and the firefighter was disciplined, but the incident sparked what the CFD believes is at least one copycat who has spewed racial remarks over the air on several subsequent occasions.

“We’re 99% sure [this is coming from outside the 5000-member fire department] but we don’t know who’s operating the radios,” said Larry Langford, a spokesman for Emergency Management and Communications who also happens to be a radio frequency engineer.

When it was first deployed, Chicago’s emergency communications system was “not designed for security, it was designed for efficiency,” Langford said, and didn’t have private line continuous tone squelch [PL] detection. When the city eventually added PL, it was to block out drift from radios in places such as Milwaukee and Indianapolis; it wasn’t a security measure.

The addition of PL created a breach point, according to Langford.

“You can get in if you have the PL and the frequency of the input,” said Langford. “The PL tone, you can get that off the air and figure out what it is; it’s not any form of encryption, it’s just a way to manage the channel a little better in congestion situations.”

While it’s possible that someone has cracked that code, it’s also possible, say industry experts, that someone simply is using a stolen or discarded radio.

“That’s not uncommon,” said Garry Briese, executive director of the International Association of Fire Chiefs. “To intentionally hack into the frequency is uncommon; in fact, it’s the very first time I’ve heard about it happening.”

Harlin McEwen, chairman of the International Association of Chiefs of Police [IACP] Communications & Technology Committee, agreed it is unlikely an outsider had learned the codes and set up a radio to break into the airwaves.

“It takes a bit of an effort. You can’t just go to the store and buy a radio that will do this,” he said. “In all my years it has been my experience that we’ve had hardly any problem with outside people getting into the system and causing interference intentionally.” However, McEwen acknowledged the older analog technology prevents anyone from being sure where the signals are emanating.

The nonsense will certainly stop later this year when the department migrates to the digital trunked system, said Chuck Jackson, vice president and director of system operations for Motorola, which builds the Chicago equipment. While the legacy analog system resembles a telephone party line — everyone can join the conversation — the new system recognizes the caller and assigns a trunked channel, according to Jackson.

“As soon as you key your radio, it comes up on a computer screen as exactly what radio it is — the actual handset or the actual mobile radio — each has a unique identifier,” he said.

Jackson added the digital trunked system wouldn’t complete a transmission unless all users along the communications path are authorized.

“You push a button and in less than a quarter of a second the digital messages go back and check to make sure that you’re authorized in the database,” he said.

That would make it nearly impossible for a rogue radio to disrupt communications. “We don’t even talk about this with the new technology; [the security is] just built in, part of the technology,” Jackson said.

McEwen agreed the digital trunked system would provide the ultimate solution. “It will give them the tools to be able to control and manage this kind of problem,” he said.

In the meantime, the recently completed analog radio reprogramming represents a bridge strategy that will enable the system to reject any radio that doesn’t have the proper ID. “We’re changing it around so the system will ask the radio if it has an ID and if the radio does not present an ID, the system will not respond to it,” said Langford.

Considering the technology at hand, that’s about as good as it’s going to get for the moment, he added.

“It’s not some super encryption or anything; it’s just what we can do with the system as it stands now,” he said. “When we migrate the system off VFH to T [trunked] band, each radio will be addressable, and if somebody steals a radio we can turn it off and make the system blind to it.”

Accidents Do Happen

While deliberate acts such as spewing racial epithets over the Chicago Fire Department airwaves are unusual, accidental interference with emergency radio operations does happen.

Vincent Stile, president of the Association of Public-Safety Communications Officials International [APCO] and director of radio communications for the Suffolk County, N.Y., police department, recalled an incident several years ago in the New York City suburbs where “one of the police departments was being interfered with or somebody was getting into them illegally.”

Turned out it was a taxi company. Stile, with the help of a local radio shop that listened in on the interference, winnowed down the possibilities and alerted law enforcement agencies.

“I don’t think the interference was done intentionally, it was an accident. They were on the frequency and didn’t realize it,” Stile said.

Nevertheless, what was going on was “illegal as hell” and the police took measures to make sure it stopped.

“Nassau County police and Garden City (N.Y.) police went in and found these guys,” he said. “It must have been interesting. They went in and confiscated all the equipment. I wish I could have been there.”
— Jim Barthold

Tags: Call Center/Command content Wireless Networks

Most Recent


  • Intelsat, OneWeb team on in-flight connectivity
    UK-government backed OneWeb and US-based Intelsat are joining forces to offer in-flight connectivity services to airlines, combining the former’s low-Earth-orbit (LEO) satellite service with the latter’s geostationary (GEO) satellites to “harness the power of multi-orbit capabilities.” The companies said they expect the multi-orbit solution to be in service by 2024. Inflight connectivity is certainly an […]
  • Black Hat 2022: Adapting to the growing cyberthreat landscape
    The nation’s first cybersecurity chief is warning that the growing threat landscape will get worse as society and businesses become more digitized. At the Black Hat USA 2022 conference, Chris Krebs, the first director of the U.S. Cybersecurity and Infrastructure Security Agency, said he spent the last 18 months gathering information. He spoke to people […]
  • Diffusing the connected car's ticking data-privacy timebomb
    Connected and autonomous vehicles (CAVs) collate a significant amount of data to ensure vehicle safety, requiring an always-on internet connection and hundreds of sensors. An entire industry has been developed around monitoring, logging, analyzing and monetizing it. Yet, the danger is, particularly with increasing cyber-attacks, that this data could end up being leaked and stolen. […]
  • Patch madness: Vendor bug advisories are broken, so broken
    BLACK HAT USA – Las Vegas – Keeping up with security-vulnerability patching is challenging at best, but prioritizing which bugs to focus on has become more difficult than ever before, thanks to context-lacking CVSS scores, muddy vendor advisories, and incomplete fixes that leave admins with a false sense of security. That’s the argument that Brian […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Cyber is the new Cold War, and AI is the arms race
  • Private wireless networks in the US start going public
  • Microsoft patches 6 zero-day vulnerabilities under active attack
  • IoT connectivity spending climbs as COVID-19 cases decline

Commentary


LTE and liability: Why the fire service must move forward with digital incident command

  • 2
6th May 2022

Partnership and collaboration must be the foundation for emergency communications

18th April 2022

FirstNet success means no hypothetical ‘shots’ need to be fired, Swenson says

22nd February 2022
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Intelsat, OneWeb team on in-flight connectivity dlvr.it/SWgYb2

15th August 2022
UrgentComm

Black Hat 2022: Adapting to the growing cyberthreat landscape dlvr.it/SWgF3Y

15th August 2022
UrgentComm

Diffusing the connected car’s ticking data-privacy timebomb dlvr.it/SWdCw2

14th August 2022
UrgentComm

Patch madness: Vendor bug advisories are broken, so broken dlvr.it/SWcvFR

14th August 2022
UrgentComm

What the 6 GHz band might mean to fixed-wireless access dlvr.it/SWctfk

14th August 2022
UrgentComm

FirstNet PTT technical progress highlighted by AT&T at APCO 2022 dlvr.it/SWZtNJ

13th August 2022
UrgentComm

Newscan: D.C. appeals court upholds FCC decision to share 5.9 GHz V2V spectrum with Wi-Fi dlvr.it/SWZQpx

13th August 2022
UrgentComm

Cisco confirms data breach, hacked files leaked dlvr.it/SWV8l9

12th August 2022

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X