https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Commentary Newsletters


Public safety can benefit when bad hackers go good

Public safety can benefit when bad hackers go good

Should the threat of cyber war be an issue that should be addressed before we build out a nationwide public-safety network? If we put all our eggs into that basket, does it leave us open to an attack that potentially could shut down emergency communications for police, fire and federal first-responder agencies?
  • Written by Urgent Communications Administrator
  • 17th August 2011

Leading computer security firm McAfee recently released a report on the hacking allegedly originating in China of corporations and government organizations. Targets included corporate networks, the International Olympic Committee, the U.N. secretariat, a U.S. Energy Department lab and a dozen U.S. defense firms. The report, “Revealed: Operation Shady RAT,” is an investigation of targeted intrusions during the last five years.



Cyber attacks are real. And it’s not major U.S. targets that are vulnerable. Small- and medium-sized first-responder agencies are as well. Last weekend, the Cape Girardeau (Mo.) County Sheriff’s Department found itself among the more than 70 law-enforcement agencies that were cyber-attacked by an infamous global group of hackers known as Anonymous. The group stole massive amounts of confidential information, according to reports.



To learn more about the threat of cyber attacks on government agencies, I spoke with Gregory Evans, who claims that the FBI put him on their Top 10 list for computer hackers in 1996 after hacking into law-firm and phone-company records, such as AT&T’s.

Evans is a mercurial figure in the world of cybersecurity. Since going legit, he has been used as a source by numerous respected news organizations, including CNN, the New York Daily News, Bloomberg News and United Press International. His firm claimed it was the cybersecurity consultant for the Atlanta Hawks and Atlanta Thrashers*. But he also has been accused by the hacker community of allegedly plagiarizing material that appears in several books that he has authored.

Evans is the founder of LIGATT Security, which offers hackers-for-hire to discover weaknesses in computer networks. Cyber attacks are a huge threat “to the world,” he said, pointing to a Symantec report that claimed such crime has surpassed drug trafficking as a criminal money-maker. For example, in April, Rogelio Hackett Jr. of Lithonia, Ga., pleaded guilty to having made more than $36 million in fraudulent charges on stolen credit cards via hacking major retail outlets.



Evans knows all about hacking high-profile targets. When he got “in trouble for hacking,” he had hacked AT&T and MCI/Sprint, hitting them up for more than $1 million a week. “They never knew because, the bigger the company, the easier it is to hide inside their networks,” Evans said.



Most domestic hackers target companies, while rouge countries focus their efforts on national security by targeting public facilities — from transit systems to the smart grid. We don’t hear much about it, though, “because the government isn’t reporting it is because they don’t want the mass media to turn around and say we aren’t safe,” Evans said.



Indeed, there are numerous liabilities. From air-traffic control to transportation systems, hackers can hide in networks and practice their mischief in simple ways, like changing street lights from red to green or manipulation digital road sign to read “Zombies Ahead,” because governments are running programs over unsecured or vulnerable wireless networks, Evans said.



However, those groups who attack U.S. government networks more likely are from foreign nations, as domestic hackers do it mostly for fun or money, Evans said. And the attacks can be sophisticated. He used as an example the alleged U.S.- and Israeli-built Stuxnet computer virus, a sophisticated cyber attack that shut down an Iranian nuclear facility’s entire network and now is known as a super weapon.



“What’s stopping someone from doing that to us,” Evans warned, specifically mentioning China’s attacks on U.S. targets as well as on Google in December 2009 — which allegedly was done by Chinese high-school students.



One way to fight the cyber war is to hire real hackers to look into public-safety networks to determine vulnerabilities. Evans said instead of throwing hackers in jail, the U.S. should recruit them to ensure networks are secured from foreign attacks — especially in light of the smart-grid evolution and the potential for a public-safety broadband network. An IT administrator can’t do the job, he said.



“The government needs to give hackers jobs instead of having them working in the kitchen,” Evans said. “We need to give them a laptop and monitor them and have them try to hack into our transportation and energy facilities. We need to tap into that great talent.”



My conversation with Evans was a bit unnerving. In the government’s defense, agents are recruiting at hacker events like the DEF CON conference, where kids learn to hack. But should the threat of cyber war be an issue that should be addressed before we build out a nationwide public-safety network? If we put all our eggs into that basket, does it leave us open to an attack that potentially could shut down emergency communications for police, fire and federal first-responder agencies? 
It’s a scary thought. But it is a real threat.



What do you think? Tell us in the comment box below.

*Updated 8/23/2010

Editor’s note: According to Tracy White, senior vice president of sales and marketing, and chief sales officer for the Hawks and the Thrashers: “In 2009, we entered into a marketing partnership agreement with Liggatt Security. Part of the agreement called for Liggatt to provide services to our IT department. Shortly after the agreement was signed, we mutually agreed to dissolve the agreement and as a result, Liggatt Security never actually provided any services to our IT department.”

Tags: Commentary Newsletters Networks & Systems Commentary

Most Recent


  • How 5G is making cities safer, smarter, and more efficient
    It’s a scenario we’ve all experienced: an ambulance with a blaring siren racing against time to get a person in medical distress to a hospital through traffic. What we don’t see is 5G connectivity enabling paramedics to communicate with hospital staff via video conference and coordinate care in real-time before arriving at the emergency room. […]
  • 3GPP moves Release 18 freeze date to March 2024
    The latest set of 3GPP Plenary electronic meetings (e-meetings) concluded on Dec. 19, 2022. The meetings focused on the Release 18 (R18) feature progress and schedule. It was decided to extend the R18 freeze date (specifications complete for all R18 features) by three months to March 2024 to ensure the quality of the R18 3GPP […]
  • Do smart cities make safer cities?
    According to the United Nations, two out of three people will live in urban areas by 2050. This increase in city populations will undoubtedly put an even greater strain on government service providers.  Faced with the growing demand of residents for increasingly agile and efficient public services, cities must be able to adapt quickly and […]
  • Swatting has serious implications and shouldn’t be ignored
    A rash of “swatting” incidents occurred across the country in September. Swatting is the practice of falsely reporting an emergency to elicit a law-enforcement response, ideally one involving the SWAT (special weapons and tactics) team.  As an example, Cincinnati-area high school was placed on lockdown when a 911 call was made to report an active-shooter […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Unlocking the power of ESInets: Different NG911 provisioning approaches exist; level of control is key differentiator
  • Ransomware? Let's call it what it really is: extortionware
  • Redefining communications for today’s mobile workforces
  • Hi-tech sewer can help safeguard public health, environment and economies

Commentary


How 5G is making cities safer, smarter, and more efficient

26th January 2023

3GPP moves Release 18 freeze date to March 2024

18th January 2023

Do smart cities make safer cities?

  • 1
6th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Phishers trick Microsoft into granting them ‘verified’ Cloud Partner status dlvr.it/Shqngn

2nd February 2023
UrgentComm

Shapeshifting robot can morph from a liquid to a solid dlvr.it/Shqk9K

2nd February 2023
UrgentComm

Automakers against stampede to BEV dominance dlvr.it/ShpX08

2nd February 2023
UrgentComm

FCC nominee Gigi Sohn headed for third Senate hearing dlvr.it/ShpDcZ

1st February 2023
UrgentComm

Sign up to learn how to successfully manage your Motorola ASTRO® 25 System: spr.ly/60143j8fp https://t.co/XcxiUwzN27

1st February 2023
UrgentComm

Hytera parent cites financial health, but unable to make royalty payment to Motorola Solutions dlvr.it/ShlrlM

1st February 2023
UrgentComm

NATE: Todd Schlekeway highlights organization’s safety, legislative initiatives dlvr.it/ShljHj

1st February 2023
UrgentComm

Cybercrime ecosystem spawns lucrative underground Gig Economy dlvr.it/ShkKbf

31st January 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.