https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2022 Winter Showcase
    • IWCE 2023 Pre-event Guide
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2023 Pre-event Guide
    • IWCE 2022 Winter Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Urgent Matters


Commentary

Regarding 911 abuses, let’s swat the swatters

Regarding 911 abuses, let’s swat the swatters

Laws penalizing those who abuse the 911 system by making non-emergency calls are needed to discourage such actions, which use valuable first-responder resources and potentially can endanger lives.
  • Written by
  • 2nd May 2013

Just about every week, we hear of instances where people call 911 because they’re lonely, they didn’t get the right sandwich with their fast food order or some other such nonsense. Such calls take up precious time and resources, and they are unwanted burdens to telecommunicators, who already are under intense pressure given the rigors of their jobs—rigors that are exacerbating in many areas of the country, as the aforementioned resources dwindle.

As if that wasn’t enough, now public-safety answering points are being targeted by a scam that uses the threat of denial-of-service (DOS) attacks as the fulcrum. From what I understand, the larceny goes something like this: Hackers infiltrate the computer network of a financial institution and gain access to customer records. They sift through those records to ferret out those that involve a recent loan of some kind, e.g., mortgages, home equity loans, car loans or payday loans. Then, they call the employer, explaining that the employee has fallen behind on payments. The final step is to ask the employer to make restitution on behalf of the employee. If they refuse, the DOS attacks begin.

“These attacks can be lengthy and can be repeated,” said Brian Fontes, CEO of the National Emergency Number Association (NENA). “It’s an issue that has been brought to the attention of a number of federal and state agencies, who are working cooperatively to try to remedy the situation.”

It’s difficult to imagine that anyone would fall for something like this. It smacks of Nigeria’s finance minister contacting you because he has a few million dollars laying around that he’d like to give you—if you’d only be so kind as to provide your bank-account number.

But Fontes said that it’s apparent that people do fall for it.

“Obviously, they have been successful, or they wouldn’t keep doing it,” he said. “So, they may have had some success—in this country or elsewhere—when attempts like these have been made.”

Fontes didn’t want to quantify just how pervasive the problem is, only saying that it’s “bigger than a bread basket.” He added that it’s not just PSAPs that have been targeted—the scam also has hit fire departments and hospitals.

So far, the DOS attacks only have targeted the 10-digit telephone lines used in PSAPs for administrative purposes and not the 911 system itself, Fontes said. That’s the good news. But it’s easy to imagine that the next step is to unleash a DOS attack on the 911 infrastructure, a scary prospect that could create havoc and put lives at risk.

As authorities work to track down the perpetrators, Fontes would like to see a parallel effort that would result in lawmakers imposing harsh criminal penalties for such actions.

“Heavy fines, jail time, whatever it takes to discourage people from engaging in these activities, within the law” Fontes said. “Let’s try to ensure that anyone who wishes to do this fully understands that there are legal consequences. We need to create disincentives.”

I couldn’t agree more. I would extend this thinking to the aforementioned abuses that seem to occur on a daily basis, where people dial 911 in non-emergency situations, usually for an incredibly dumb reason.

“There have to be examples made of people who engage in this activity, so that they begin to understand that there are consequences,” Fontes said. “Spending some time in jail, or paying a penalty equal to the cost of the police involvement in that 911 call, might make them ask, ‘Is it worth making that 911 call over a sandwich?’”

As if that wasn’t enough, there has been a spate of 911 calls over the last several months that have reported fake emergencies at the homes of celebrities—a practice known as “swatting.” It also burns up precious public-safety resources in the PSAP that fields the call, as well as in local police, fire and EMS departments.

But it’s the effect on 911 center operations that most concerns Alan Tilles, chair of the telecommunications department at Shulman, Rogers, Pordy, Gandal & Ecker.  

“I can’t tell you how worried I am about all of this, because coordinated attacks of this type have the potential of bringing the 911 dispatch system to its knees,” said Tilles, a regular contributor to Urgent Communications. “When you have to figure out which calls are real and which calls are not, that’s a tremendous additional burden on dispatchers who already are heavily overburdened.”

While he generally agrees with the notion that those who abuse the 911 system should be punished, Tilles said that it might be easier said than done, because great care must be taken to protect those who innocently dial 911 for what turns out to be a non-emergency. We talked about the hypothetical case of a parent who has locked his child inside his car with the motor running, miles from home.

“The line needs to be drawn between that and the guy who calls 911 because he didn’t get the right sandwich from Jimmy John’s—and we need to figure out where that line is very quickly,” Tilles said.

Determining intent would be the big challenge in writing laws that would be fair and balanced, and which would stand up to legal review, according to Tilles.

“Any time you have something like this, you have to figure out how much intent will play into it—or, is it a no-fault crime?” he said.

It makes sense that any laws drafted to stop this nonsense would consider the circumstances of the incident. But I can’t imagine that it would be all that difficult to discern who should get tossed in the slammer—there doesn’t seem to be a lot of gray area here. Call 911 because you can’t find your car keys, you’re going to jail; call 911 because you can’t find your kid—because he thought it would be fun to hide in a closet, but didn’t let you in on it—you’re getting a warning.

As the Supreme Court Justice Potter Stewart said in the 1964 obscenity case Jacobellis v. Ohio, regarding the difficulty in defining hardcore pornography, “I know it when I see it.” I believe it would work the same way in 911 abuse cases. Let’s find out.     

Tags: Legislation PSAP Commentary NENA Policy Public Safety Urgent Matters Commentary

Most Recent


  • CMA plans to release Airwave price-control order by end of July, impacting Motorola Solutions
    An order that would set price controls on the Airwave TETRA network that would cost Motorola Solutions more than $1 billion is expected to take effect within the next two month, although Motorola Solutions has indicated that its appeals likely will delay the effective date until next year. Last month, the UK Competition and Markets […]
  • Why antivirus cannot protect your car
    In July last year, BMW announced its intention to make heated seats an $18-per-month subscription service. A week later, a group of hackers called Easy Bimmer Coding claimed they were prepared to help any BMW owner to unlock the subscription-only feature. The majority of today’s cyber-threats are more like the one described above, relatively low-profile […]
  • ChatGPT hallucinations open developers to supply-chain malware attacks
    Attackers can exploit ChatGPT’s penchant for returning false information to spread malicious code packages, researchers have found. This poses a significant risk for the software supply chain, as it can allow malicious code and trojans to slide into legitimate applications and code repositories like npm, PyPI, GitHub and others. By leveraging so-called “AI package hallucinations,” threat actors can create ChatGPT-recommended, […]
  • What Amazon’s privacy breaches say about smart-device cybersecurity
    Amazon was recently fined more than $30 million for customer privacy breaches, demonstrating the rising need for cybersecurity and data protection at a time where smart devices are becoming increasingly common. While there is some legislation in place accommodating smart devices, the sheer volume of devices coming online is still proving an industry bottleneck, and a […]

Related Content

Commentary


Updated: How ‘sidelink’ peer-to-peer communications can enhance public-safety operations

  • 1
27th February 2023

NG911 needed to secure our communities and nation

24th February 2023

How 5G is making cities safer, smarter, and more efficient

26th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.