City officials claim a hack set off all emergency warning sirens for about 90 minutes Imagine it being nearly midnight and the emergency warning sirens start wailing and continue to scream for about an hour and a half.That’s what happened in Dallas on Friday at 11:42 p.m. The city’s 156 emergency sirens blasted out warnings and continued to wail until 1:17 a.m. on Saturday. Dallas officials claim the siren warning system was hacked, and it was one of the largest breaches of an emergency siren system.+ Also on Network World: The day the 911 network stood still +At first, a city spokesperson blamed the blaring sirens on a “system malfunction.” The 1.6 million people in the city were asked to stop calling 911 because there was no emergency. The normal wait time for a 911 call in Dallas is reportedly 10 seconds, but at one point the 911 system was so clogged with calls that the wait time stretched to six minutes.The Dallas FBI attempted to calm people down by tweeting that the emergency sirens were malfunctioning and there was neither severe weather nor an active emergency. Yet since it wasn’t storming, some people mistook the blaring sirens as a “warning sign of a ‘bomb or something, a missile,’” according to Sana Syed, the city’s public information officer. She told The New York Times, “I can understand the concern” and noted the recent airstrikes in Syria.Dallas fire dispatch crews had to manually shut down the sirens’ radio system and repeaters. Dallas’s Office of Emergency Management engineers worked through the night to determine what triggered the sirens. They decided to blame a hacker. “We can state at this time that the city’s siren system was hacked Friday night,” Syed said in a press statement. “For security reasons, we cannot discuss the details of how this was done, but we do believe that the hack came from the Dallas area. We have notified the FCC for assistance in identifying the source of this hack. We are putting in safeguards to ensure this type of hack does not happen again.”She added, “Every time we thought we had turned it off, the sirens would sound again, because whoever was hacking us was continuously hacking us.”City Emergency Management Director Rocky Vaz told Reuters, “The sirens went through 15 cycles of a 90-second activation before they were shut down.”He added, “This is a very, very rare event” and cited industry experts as saying “the hack was among the largest ever to affect emergency sirens.”Where the hackers got inWhile city officials don’t know who hacked the system, Vaz added that officials have a “good deal of confidence that this was someone outside our system.” According to NBC News, Vaz claimed, “We have now pinpointed it to one area where we think they were able to get into our system and activate all the sirens, and put that into a mode where they sent signals for it to be activated over 60 times.” Dallas Mayor Mike Rawlings called the hack “an attack on our emergency notification system. We will work to identify and prosecute those responsible.”Mayor Rawlings added, “This is yet another serious example of the need for us to upgrade and better safeguard our city’s technology infrastructure. It’s a costly proposition, which is why every dollar of taxpayer money must be spent with critical needs such as this in mind. Making the necessary improvements is imperative for the safety of our citizens.”Dallas News reported that the system is being “safeguarded” from another hack, but it is expected to “be restored Sunday or Monday—in time for thunderstorms that are expected to begin rolling through the area early next week.”Let’s hope there isn’t a tornado or other severe weather before the system is reactivated—and that people won’t blow off the sirens the next time they start screaming. Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe