https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Urgent Matters


Latest attacks underscore need for cybersecurity in next-generation critical communications

  • Written by Donny Jackson
  • 18th February 2016
During the past week, more examples of hackers compromising high-profile networks have hit the news. These scenarios should serve as a reminder how important it is that critical-communications systems like FirstNet, next-generation 911 and smart grids have appropriate cybersecurity solutions in place.

What is in this article?

  • Latest attacks underscore need for cybersecurity in next-generation critical communications
  • Latest attacks underscore need for cybersecurity in next-generation critical communications
  • Latest attacks underscore need for cybersecurity in next-generation critical communications

Latest attacks underscore need for cybersecurity in next-generation critical communications

One the great things about my job is that I get to talk with a bunch of really smart people about some of the things that technology will enable us to do in the near future. I’m always amazed by the engineering wonders that continue to squeeze more efficient use from each slice of spectrum and pack more processing power into tinier packages.

As stated in this column space before, there is no doubt in my mind that the next generation of critical-communications systems—leveraging IP-based architectures—eventually will deliver much greater performance, functionality, flexibility and convenience of use. In addition, automated IP rerouting schemes and increasingly dense networks should make these critical systems more resilient to man-made and natural physical attacks.

But as we plunge headlong into becoming more and more dependent on key IP-based systems—be it FirstNet, next-generation 911 (NG911) or smart grids for utilities and other critical-infrastructure entities—the one nagging concern is the ability to secure these crucial assets from cyberattacks.

Just in the past few days, we’ve seen hackers shut down a massive commercial enterprise (Xbox Live) for several hours, hold a Los Angeles hospital’s computer system hostage for ransom, and learned of U.S. plans to launch a cyberattack that would have crippled Iran’s power grid.

Of course, these are just the latest in a long line of episodes involving data breaches and cyberattacks on myriad systems. In the commercial sector, industry giants like Apple, Sony, Target and Home Depot—not to mention the Ashley Madison website scandal—have all been victimized. Hackers reportedly have demonstrated the ability to hack into airplane engine controls and automotive vehicle controls, and we have barely scratched the surface of potential issues regarding aerial drone and self-driving cars.

In the Ukraine, a cyberattack caused a significant power outage.

Public-safety and government entities have suffered from significant attacks, as well. Multiple public-safety agencies have paid hackers after having their computer systems rendered useless by ransomware, as happened at the Los Angeles hospital. The Office of Personnel Management (OPM) last year acknowledged that more than 20 million personnel records were stolen.

Even the National Security Administration (NSA)—an international master of computer espionage—suffered a major black eye in this regard with the ongoing revelations from former contractor Edward Snowden. Whether you consider Snowden to be a heinous traitor or a modern-day civil-rights leader, the bottom line is that he took a treasure trove of classified information out of the most secure organization in the world—and NSA officials reportedly did not realize he had done it, even months after Snowden executed his plan.

As one source said, “If the NSA can’t secure its stuff—or at least realize that Snowden had done something after the fact—what chance do the rest of us have?”

This is especially true for the Internet of Things (IoT), an exciting technological initiative that is expected to result in 50 billion devices being deployed by 2020, according to some estimates. But the only way those astronomical figures will become reality is if IoT devices are relatively inexpensive, and inexpensive devices typically have little, if any, security integrated (and even devices with security functionality may not be safe, if users simply leave default passwords in place).

Hackers already have stolen millions of records via VTech children’s toys, and even Mattel’s Hello Barbie dolls have been shown to be vulnerable. Reports that a refrigerator was used to send spam e-mail may not have been true, but there is little argument among industry experts that IoT proliferation promises to greatly expand the “attack surface” that hackers can exploit.

1 | 2 | 3 |
Latest attacks underscore need for cybersecurity in next-generation critical communications
Tags: Security Commentary Critical Infrastructure Cybersecurity Federal Government/Military NTIA/FirstNet Public Safety Public-Safety Broadband/FirstNet Security Software State & Local Government Tracking, Monitoring & Control Urgent Matters Commentary

Related Content

Commentary


How 5G is making cities safer, smarter, and more efficient

26th January 2023

3GPP moves Release 18 freeze date to March 2024

18th January 2023

Do smart cities make safer cities?

  • 1
6th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Report: Remote work causing offices to empty, but walkable cities still in high demand dlvr.it/ShXM7Z

27th January 2023
UrgentComm

AT&T FirstNet unleashes robotic dogs for emergency services dlvr.it/ShW7p8

27th January 2023
UrgentComm

Federal agencies infested by cyberattackers via legit remote-management systems dlvr.it/ShVhn3

26th January 2023
UrgentComm

How 5G is making cities safer, smarter, and more efficient dlvr.it/ShVS1h

26th January 2023
UrgentComm

MCPTT interworking for critical communications dlvr.it/ShTm3P

26th January 2023
UrgentComm

Self-driving cars present terrorism risk, FBI director says dlvr.it/ShTTHx

26th January 2023
UrgentComm

UK Home Office officially will cut ESN ties with Motorola Solutions in December dlvr.it/ShNjfN

24th January 2023
UrgentComm

Newscan: Police software vendor breach exposes personal data, raid plans dlvr.it/ShN0q2

24th January 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.