Cargando…

Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors

9-1-1 call centers are a critical component of prehospital care: they accept emergency calls, dispatch field responders such as emergency medical services, and provide callers with emergency medical instructions before their arrival. The aim of this study was to describe the technical structure of t...

Descripción completa

Detalles Bibliográficos
Autores principales: Goebel, Mat, Dameff, Christian, Tully, Jeffrey
Formato: Online Artículo Texto
Lenguaje:English
Publicado: JMIR Publications 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6647750/
https://www.ncbi.nlm.nih.gov/pubmed/31290401
http://dx.doi.org/10.2196/14383
_version_ 1783437752612683776
author Goebel, Mat
Dameff, Christian
Tully, Jeffrey
author_facet Goebel, Mat
Dameff, Christian
Tully, Jeffrey
author_sort Goebel, Mat
collection PubMed
description 9-1-1 call centers are a critical component of prehospital care: they accept emergency calls, dispatch field responders such as emergency medical services, and provide callers with emergency medical instructions before their arrival. The aim of this study was to describe the technical structure of the 9-1-1 call-taking system and to describe its vulnerabilities that could lead to compromised patient care. 9-1-1 calls answered from mobile phones and landlines use a variety of technologies to provide information about caller location and other information. These interconnected technologies create potential cyber vulnerabilities. A variety of attacks could be carried out on 9-1-1 infrastructure to various ends. Attackers could target individuals, groups, or entire municipalities. These attacks could result in anything from a nuisance to increased loss of life in a physical attack to worse overall outcomes owing to delays in care for time-sensitive conditions. Evolving 9-1-1 systems are increasingly connected and dependent on network technology. As implications of cybersecurity vulnerabilities loom large, future research should examine methods of hardening the 9-1-1 system against attack.
format Online
Article
Text
id pubmed-6647750
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher JMIR Publications
record_format MEDLINE/PubMed
spelling pubmed-66477502019-07-30 Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors Goebel, Mat Dameff, Christian Tully, Jeffrey J Med Internet Res Viewpoint 9-1-1 call centers are a critical component of prehospital care: they accept emergency calls, dispatch field responders such as emergency medical services, and provide callers with emergency medical instructions before their arrival. The aim of this study was to describe the technical structure of the 9-1-1 call-taking system and to describe its vulnerabilities that could lead to compromised patient care. 9-1-1 calls answered from mobile phones and landlines use a variety of technologies to provide information about caller location and other information. These interconnected technologies create potential cyber vulnerabilities. A variety of attacks could be carried out on 9-1-1 infrastructure to various ends. Attackers could target individuals, groups, or entire municipalities. These attacks could result in anything from a nuisance to increased loss of life in a physical attack to worse overall outcomes owing to delays in care for time-sensitive conditions. Evolving 9-1-1 systems are increasingly connected and dependent on network technology. As implications of cybersecurity vulnerabilities loom large, future research should examine methods of hardening the 9-1-1 system against attack. JMIR Publications 2019-07-09 /pmc/articles/PMC6647750/ /pubmed/31290401 http://dx.doi.org/10.2196/14383 Text en ©Mat Goebel, Christian Dameff, Jeffrey Tully. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 09.07.2019. https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.
spellingShingle Viewpoint
Goebel, Mat
Dameff, Christian
Tully, Jeffrey
Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
title Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
title_full Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
title_fullStr Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
title_full_unstemmed Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
title_short Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
title_sort hacking 9-1-1: infrastructure vulnerabilities and attack vectors
topic Viewpoint
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6647750/
https://www.ncbi.nlm.nih.gov/pubmed/31290401
http://dx.doi.org/10.2196/14383
work_keys_str_mv AT goebelmat hacking911infrastructurevulnerabilitiesandattackvectors
AT dameffchristian hacking911infrastructurevulnerabilitiesandattackvectors
AT tullyjeffrey hacking911infrastructurevulnerabilitiesandattackvectors