hacking 911: adventures in disruption, destruction, and death con 22/def con 22...

51
Hacking 911: Adventures in Disruption, Destruction, and Death quaddi, r3plicant & Peter Hefley August 2014

Upload: others

Post on 07-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Hacking 911: Adventures in Disruption, Destruction, and Death

quaddi, r3plicant & Peter Hefley

August 2014

Page 2: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Jeff Tully

Christian Dameff

Peter Hefley

Physician, MD Emergency Medicine

Physician, MD Pediatrics

IT Security, MSM, C|CISO, CISA, CISSP, CCNP, QSA Senior Manager, Sunera

Page 3: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Jeff Tully

Christian Dameff

Peter Hefley

Open CTF champion sudoers- Defcon 16 Speaker, Defcon 20

Wrote a program for his TI-83 graphing calculator in middle school Speaker, Defcon 20

Gun hacker, SBR aficianado

Page 4: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 5: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

This talk is neither sponsored, endorsed, or affiliated with any of our respective professional institutions or companies. No unethical or illegal practices were used in researching, acquiring, or presenting the information contained in this talk. Do not attempt the theoretical or practical attack concepts outlined in this talk.

Disclaimer

Page 6: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Outline

- Why This Matters (Pt. 1) - 911 Overview

- Methodology

- Attacks

- Why This Matters (Pt. 2)

Page 7: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Why This Matters (Pt. 1)

4/26/2003 9:57pm

Page 8: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Emergency Medical Services (EMS)

Page 9: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 10: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 11: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 12: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 13: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 14: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 15: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 16: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Research Aims

• Investigate potential vulnerabilities across the entire 911 system

• Detail current attacks being carried out on the 911 system

• Propose solutions for existing vulnerabilities and anticipate potential vectors for future infrastructure modifications

Page 17: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Methodology

• Interviews

• Regional surveys

• Process observations

• Practical experimentation

• Solution development

Page 18: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Wired Telephone Call

End Office

Selective Router

PSAP

ALI Database

Voice Only

Voice and Data

Data

Voice Voice + ANI Voice + ANI

ANI ALI

Page 19: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Wireless Phase 1 Telephone Call

Mobile Switching

Center

Selective Router

PSAP

ALI Database

Voice Only

Voice and Data

Data

Voice Voice + pANI/ESRK

Voice + pANI/ESRK

pANI / ESRK

ALI

Cell Tower

Voice

Callback # (CBN)

Cell Tower Location

Cell Tower Sector

pAN

I / E

SRK

CBN, Cell Tower Location, Cell Tower Sector, pANI / ESRK Mobile

Positioning Center

Page 20: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Wireless Phase 1 Data

Page 21: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Wireless Phase 2 Telephone Call

Mobile Switching

Center

Selective Router

PSAP

ALI Database

Voice Only

Voice and Data

Data

Voice + pANI/ESRK Voice + pANI/ESRK

pANI / ESRK

ALI

Cell Tower

Voice

Callback # Cell Tow

er Location Cell Tow

er Sector

pAN

I / E

SRK

Latitude and Longitude, Callback #, Cell Tower Location, Cell Tower Sector, pANI / ESRK

Position Determination

Equipment

Mobile Positioning Center

Voice

Page 22: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Wireless Phase 2 Data

Page 23: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

VoIP Call

Emergency Services Gateway

Selective Router

PSAP

ALI Database

Voice Only

Voice and Data

Data

VoIP + CBN Voice + ESQK Voice + ESQK

ESQK ALI

VoIP Service

Provider

CBN

ESN

#, E

SQK

CBN, Location, ESQK

VoIP + CBN

VSP Database

Page 24: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 25: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

The Three Goals of Hacking 911

• Initiate inappropriate 911 response

• Interfere with an appropriate 911 response

• 911 system surveillance

Page 26: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Wired – End Office Control

End Office

Selective Router

PSAP

ALI Database

Voice Only

Voice and Data

Data

Voice Voice + !%$# Voice + !%$#

!%$# ALI??

Page 27: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

ALI Database

Page 28: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

NSI Emergency Calls

Mobile Switching

Center Selective Router

PSAP

ALI Database

Voice Only

Voice and Data

Data

Voice + pANI/ESRK

Voice + pANI/ESRK

pANI / ESRK

ALI

Cell Tower

CBN?

Cell Tower Location

Cell Tower Sector

pAN

I / E

SRK

CBN, Cell Tower Location, Cell Tower Sector, pANI / ESRK

CBN = 911 + last 7 of ESN/IMEI

Voice Voice

Mobile Positioning Center

Page 29: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Wireless Location Modification

Mobile Switching

Center

Selective Router

PSAP

ALI Database

Voice Only

Voice and Data

Data

Voice Voice + pANI/ESRK

Voice + pANI/ESRK

pANI / ESRK

ALI

Cell Tower

Callback # Cell Tow

er Location Cell Tow

er Sector

pAN

I / E

SRK

!@#Lat/Long%%$, Callback #, Cell Tower Location, Cell Tower Sector, pANI / ESRK

Position Determination

Equipment Mobile Positioning Center

Voice

Page 30: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

VSP Modification

Emergency Services Gateway

Selective Router

PSAP

ALI Database

Voice Only

Voice and Data

Data

VoIP + CBN

Voice + ESQK Voice + ESQK

ESQK #ALI@

VoIP Service

Provider

CBN

ESN

#, E

SQK

VSP Database

CBN, #%Location$@, ESQK

VoIP + CBN

Page 31: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 32: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 33: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Swatting Call

Page 34: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 35: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 36: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 37: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 38: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

VoIP Service Providers

Page 39: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Service disruption attacks

• Line-cutting

• Cell phone jamming

• ALI database editing

• TDoS

• PSAP targeting

Page 40: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 41: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Resource exhaustion (virtual/personnel) Outdated system architectures Lack of air-gapping Privacy

Page 42: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 43: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 44: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Health Impacts

Page 45: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Bystander CCO CPR Improves Chance of Survival from Cardiac Arrest

100% 80% 60% 40% 20% 0%

Time between collapse and defibrillation (min) 0 1 2 3 4 5 6 7 8 9

Surv

ival

(%)

Nagao, K Current Opinions in Critical Care 2009 EMS Arrival Time based on TFD 90% Code 3 Response in FY2008. Standards of Response Coverage 2008.

EMS Arrival No CPR

Traditional CPR

CCO CPR

Page 46: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 47: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Strategic Threat Agents

• 6000 PSAPs taking a combined 660,000 calls per day

• Fundamental building block of our collective security

• Potential damage extends beyond individual people not being able to talk to 911

Page 48: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Reverse 911

Page 49: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Solutions

• Call-routing red flags • Call “captchas” • PSAP security

standardizations • Increased budgets for

security services • Open the Black Box

Page 50: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle
Page 51: Hacking 911: Adventures in Disruption, Destruction, and Death CON 22/DEF CON 22 presentations/DE… · Speaker, Defcon 20 Wrote a program for his TI-83 graphing calculator in middle

Q&A