03:47 PM

911 Services Can't Handle Advanced Wireless Devices, Services

The 911 Industry Alliance says there is a problem because most call centers are analog and digital data isn't delivered.

As more advanced wireless devices are put into use, the nation's 40-year-old 911 emergency system is becoming increasingly antiquated and unable to function properly for users of the new devices, according to the 911 Industry Alliance.

Jeff Robertson, executive director of the industry group, said in an interview Wednesday that the issue is reaching crisis proportions. "The problem is that consumer technology has surpassed the 911 technology," he said. "Ninety-five percent of 911 call centers are analog (-based). Emergency data gets stripped out."

Robertson said the issue has caught the attention of two Ohio state representatives, Larry Flowers and Steven Driehaus, who have taken note of the problem and are seeking a solution in legislation they have filed in the Ohio House of Representatives. In addition to the challenge presented by incompatible connections between newer wireless devices and older analog 911 centers, the effort to fix the problem with improved 911 products and services has been slowed because wireline 911 funding is decreasing.

Robertson noted that it's difficult and often impossible to send text from cell phones and make it understandable at 911 centers. The problem surfaced in painful reality in the recent tragic Virginia Tech shootings.

"Many students expected that they could text message the 911 dispatch center with vital information, only to find out that the 911 network does not support text messaging, photos, or multimedia messages," Robertson said quoting from a new 911 Alliance report.

Robertson added that the situation is likely to get worse as cell phone and VoIP usage grows. "The biggest problem (with a VoIP call) is trying to figure out where the call is coming from," said Robertson, who added that the tragedy of the situation is that the technology to fix it is there, but the funding isn't.

The 911 Industry Alliance views the Ohio legislation as a model for other states to follow to fix the 911 problem.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.