https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Latest attacks underscore need for cybersecurity in next-generation critical communications

Latest attacks underscore need for cybersecurity in next-generation critical communications

  • Written by raidee
  • 1st October 2018

A 911 caller, an expert or even an off-duty officer claims to have information vital to response situation—maybe a picture/video of a perpetrator committing a crime, medical records or a diagram that clearly shows how to diffuse a bomb—but the item is flagged as not meeting security criteria. Murphy’s Law dictates this will happen when a first responder does not have much time to take action.

My guess is that everyone has opened an e-mail attachment that was said to lack some sort of security certificate or designated as a possible phishing mechanism, if it was from a trusted source who was delivering timely information (particularly something you had discussed previously). Personally, these have seemed to be harmless.

But what if the trusted source his/her device compromised by a hacker the previous day without knowing it? What if the trusted source is not a human, but some sort of sensor or surveillance device that is being accessed via the Internet of Things? What if the source is not trusted or even known to be a bad actor?

From a system-security standpoint, it could be argued that the system policies should dictate that such communications be blocked or quarantined in all circumstances. But others believe that humans associated with first-responder agencies should have the ability to override such security flags, particularly when delayed access to the information could endanger an individual or the community.

If the message is blocked and its information proves to be critical, the aftermath will not be pleasant—particularly if the security issue turns out to be something relatively minor. On the other hand, if a human overrides a security warning that results in a system being compromised—thereby jeopardizing potentially many lives—another unpleasant aftermath will transpire.

I don’t know enough about cybersecurity to pretend to know what approaches are effective and which ones are not. But Patrick Flynn, Intel Security’s director of homeland/national security program, is qualified to know the difference. With this in mind, I was encouraged by Flynn’s initial assessment of the cybersecurity language included in the FirstNet request for proposal (RFP).

“This network, it can’t fail,” Flynn said. “This is not a business-as-usual type deal. People will die, if it fails. So, it’s got to be a cut above. It’s got to be a cut above.”

“It’s not business as usual. You have to anticipate the very worst in this. I think, as you read the RFP and the 60- or 70-page cyber annex, it’s very specific about what it requires. It was something very, very close to my heart that they took all of the feedback and all of the advice that the industry gave from a security-practitioner way of doing things. It’s very, very complete.”

I hope so, and I hope that FirstNet’s cybersecurity scheme can be coordinated with other critical-infrastructure networks to which it will be linked, particularly 911 systems. Meanwhile, the difficulty of this cybersecurity task is just one more example why I’m glad that my job only entails writing about this stuff, instead of being the one responsible for making the critical network and operational policy decisions.

 

Tags:

Related Content

  • UK regulator takes first step to investigate Motorola Solutions about Airwave market power
  • IWCE: Nicole Perlroth discusses cyberthreat landscape, impact on critical infrastructure
  • Attacks on Kaseya servers led to ransomware in less than 2 hours
  • Security 101: The 'PrintNightmare' flaw

Commentary


LTE and liability: Why the fire service must move forward with digital incident command

  • 2
6th May 2022

Partnership and collaboration must be the foundation for emergency communications

18th April 2022

FirstNet success means no hypothetical ‘shots’ need to be fired, Swenson says

22nd February 2022
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Chinese APT group likely using ransomware attacks as cover for IP theft dlvr.it/SSmJNm

24th June 2022
UrgentComm

AT&T, Verizon, T-Mobile tout Z-axis support for 911 dlvr.it/SSkGxK

23rd June 2022
UrgentComm

California grants first permit to test AVs using only Lidar sensing dlvr.it/SSkG7x

23rd June 2022
UrgentComm

Buying smart solutions: Technology is now part of (almost) every government purchase dlvr.it/SSk77q

23rd June 2022
UrgentComm

France preparing to launch public-safety broadband network, official says dlvr.it/SSh12p

23rd June 2022
UrgentComm

Newscan: Law-enforcement radios failed during Uvalde school mass shooting, Texas official says dlvr.it/SSf9vM

22nd June 2022
UrgentComm

AT&T, Verizon agree to another year of C-band mitigation around airports dlvr.it/SSXHRD

20th June 2022
UrgentComm

Can we make a global agreement to halt attacks on our energy infrastructure? dlvr.it/SSWcGn

20th June 2022

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • Microwave/RF
  • T&D World
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X