• apcointl.org
  • Subscribe
  • Advertise
  • Buyer’s Guide
  • PSC Magazine
  • Submit Press Release
  • Contact Us
Public Safety Communications
Show Menu

Dual Dangers: Physical and Digital Risks Inside and Out of the ECC

APCO International December 30, 2020 APCO, Operations

[Originally published in the January/February 2021 PSC magazine.]

By Jessica Lohr

Adaptation. It’s not just the name of the game in telecommunications; it’s the arena and the whole rulebook. Every part of the system — from hardware to software, from personnel to infrastructure — must bend before it breaks. It must be designed or trained or built with that single purpose in mind: adapt and then overcome.

But adaptation isn’t easy or simple. It’s encompassing and, for the human element, often exhausting. Ensuring that technology complies with thousands of standards and requirements takes time and dedication. Information safety requires vigilance and preparation. Physical and digital security demands a mixture of everything else, as well as a fair bit of foresight.

The special challenges that emergency communications centers are facing in this day and age run the gamut, and it is only by working together and planning ahead that they can be anticipated and properly handled.

Whether you’re in an existing ECC or excitedly awaiting the completion of a new communications complex, you’ve likely been drilled on safety and security since day one in your agency. But complacency and a sort of “alarm fatigue” can set in, even here.

Try to Find the Mistakes in the Situation Below.

Imagine pulling up for your shift. You turn at your building and weave around the parking control arm because you’re running late and forgot your key fob. A landscaper cleaning the outer flowerbeds waves, and you wave back. You punch in your door code by muscle memory while video chatting with your friend. You head through the building, holding the door open for a janitor, because their hands are full. Finishing your call, you tap into the Wi-Fi and quickly download that email from an ex-coworker; swiping away the warning box that pops up is second nature. When the message opens, you forward it to your shift mate because the meme isn’t one you’ve seen before.

And in the length of time it took you to arrive and sit at your console, you’ve violated a dozen safety and security protocols.

With the number of hours many of us work on the floor, it can be easy to forget that we don’t live in dispatch. While we may spend an inordinate amount of time with our work family, it isn’t where we lay our heads. But many times, we treat our workplace too casually. Considering the amount of personal and secure data that runs through any ECC on a given day, the nonchalant attitude many of us may have can border on dangerous.

Let’s start at the beginning.

Parking security at ECCs has become more concerning lately. There have been news stories of telecommunicators being attacked on their way to or from work — even in the building itself. So ensuring that parking areas are safe and secure is quickly becoming a priority. Existing ECCs may have to work around site restrictions, but new construction can address this immediately. Parking control arms are exactly what they sound like: a single arm barrier to discourage drivers from moving forward. Rolling gates are more secure and can also be difficult to climb, which means better security in the lot. Using call boxes that require fobs or RFID badges are especially effective when paired with high metal gates. If the control arm is the only answer for your parking issues, try to make sure there is a significant barrier that prevents driving around it. While relations shouldn’t suffer needlessly from it, a certain amount of information about the access methods into the building should be withheld from the general public. Blatantly violating those security systems in full view of citizens is not just against most policy and common sense, it’s also irresponsible and can cause massive liability.

Door codes mean numbers, which means memorization. When an employee leaves or is terminated, who is responsible for making sure that code is immediately deactivated? If that falls to human resources staff, can anyone do it or just one particular employee? What if that person is on vacation? It can take time to address, and that means the security of the center is compromised. If someone accidentally or purposefully films a code being used, that’s even more dangerous. Replacing all access points with RFID badges that can be blocked instead of codes that have to be scrubbed from the system can help mitigate that situation.

Many agencies are trying to find ways to combat tailgating, the security breach when more than one person passes through a secured doorway on a single authorization. Most of this prevention depends on the personnel themselves. When those secured doorways cannot be manned, having employees understand the risk of tailgating is the next best thing. Monitor your access points with live feed cameras at all times.

“Wireless and Wi-Fi are the wild, wild west compared to landline networks,” Larry Clement, IT Director of Orange County, Virginia, said in a phone interview, “Mainly because of the inherent way they work.” They’re made to connect to everything, to be open and trust all devices. Phones downloading data from questionable sources can be touching the same networks used by the consoles in dispatch or the report storage database for the sheriff’s office next door. Since there’s no such thing as a truly hidden wireless network — if it exists, it broadcasts a detectable signature — then separate carriers and firewalls can be used to better secure those data access points. Of course, landlines are the best option for any network connection when it’s available; landline traffic can be isolated much more effectively.

“Considering the amount of personal and secure data that runs through any emergency communications center on a given day, the nonchalant attitude many of us may have can border on dangerous.”

And How Did You Fare at the End of Our Scenario?

Thankfully, your IT department has just sent out some new quarter training on best security practices within the agency, and you realize your errors immediately. A few emails and phone calls ensure the system is free of malevolent programs and your security code is reset. There is some headshaking about driving around the arm, but it’s already in the budget to replace it with a gate in the future. You set an alert on your phone to ensure you check for your fob before each shift. All in all, no harm really done.

When asked about how best to prevent the scenario put forth, Clement advised, “Monitoring is important. You have to know you’ve been compromised in order to do anything about it.”

It’s likely that you’ve been trained on many of the concerns in the previous scenario. Some potential security breaches may be easily overlooked, however. Whether physical or digital, there are always areas where we, as an industry, can do better.

There are some physical security considerations that may not have made the top 10 concerns a few years ago, but now are crowning that list. “Doors,” Director Chris Cord, of Orange County (Virginia) Emergency Communications Center, said with a smile. “At Lexington, in our first center, we had glass doors to get into the secured hallway. There was a second glass door leading to communications. Glass doors are not secured entries. They rectified that [issue] at the new center. Granted, the entry to the building was glass, but the doors to communications were solid.”

Clement had another take on the physical security issue: generator yards, or similar work areas outside of ECCs, are often not gated or fenced adequately. “A malicious person could easily go out and chop off the cable,” he warned. Such an act could bring the entire agency down during a weather event, or it could be a part of an organized attack on the public safety presence in that jurisdiction.

That is one of Cord’s particular aggravations with government buildings. Looking over a blueprint of his agency’s wing in a new consolidated public safety building, he said, “Signage is an issue. Don’t put signs on the building. Don’t broadcast the purpose of the agency. It just highlights the building as a target.” He referenced a recent situation in Louisville, Kentucky, where protesters marched on the local ECC and attempted to burn the employees out. “It’s a good example of why there should be no identifying marks.”

Clement pointed to cameras as a potential security weakness. Poor technologies are often embedded within the cameras, he explained, things that seem dated and don’t use best-practice protocols, such as default passwords. Identifying those issues before they cause problems can be difficult. And while the core software may be updated, its system could have been built on a version of Java or similar program that is now out of date. Closing that gap can be impossible.

Virtual private networks are another security system that may not be as safe as you think.

“Make sure you follow your agency’s social media policies, your IT department’s guidelines and, of course, common sense.”

“VPNs are always a compromise between security and business,” Clement said. “They need to be encrypted and set up properly, especially when you’re talking about a CJIS environment. You have to come up with a solution that meets those requirements but is also easy on the end user.”

The COVID-19 pandemic has generated a special type of challenge that many agencies have never faced or maybe even planned for. Security of the actual ECC is a continuing concern. But what about the new hurdles COVID has created with at-home access and communications? “We can offer a portable 9-1-1 console for off-site work, which includes a laptop, SAM box [sound arbitration module] for the headset, the ability to remote into programs, and a hand-held radio. But there are issues with that, too,” Cord said. Clement agreed. “Network isolation — maintaining the integrity of the data — is the biggest concern in security for new and existing ECCs. Zero trust networks are the new thing; it isolates everything on the network, and the network can only talk to specific devices.” Many agencies are struggling to find a compromise between the two imperatives.

COVID has also unveiled a new twist on an old danger: social media. The pandemic is opening up public safety to more digital scrutiny. So many people use online programs to have conversations, to maintain that needed human connection, that too little digital presence can be as dangerous as too much. Hacktivists don’t just pay attention to which government employees are online, they also build profiles of those who aren’t. As a good preventative measure, personnel who choose not to use social media should still create accounts under their email addresses to control that base account. Maintaining awareness of who in your agency does and does not use Facebook, Pinterest, Instagram and the like is vital. If you get a social media message from a coworker asking why the audio recorder program isn’t letting them log in, and to verify the password, go directly to that person instead of replying. It may be an attack. Either way, Clement says, “The best way to deal with it is not to feed the animal.” Make sure you follow your agency’s social media policies, your IT department’s guidelines and, of course, common sense.

Overall, what does this all mean to the telecommunicators in the ECC? At a glance, it can feel like the industry is under constant barrage from both internal and external factors. Some fixes can take long enough to move from concept to reality that it seems like they’ll never come at all. But those fixes are the heart of the adaptation that identifies ECCs and similar agencies. Yes, it takes time to correct problems, but it sometimes takes longer to even identify them. According to a Verizon data breach report, it can be up to 18 months before a system breach is even found.

That is where the human element comes into full play.

Employees need to be aware of their actions and vigilant in their personal and professional defenses, and they need to follow and take their security awareness training seriously. Agency IT and management need to work together to create a targeted program and have an incident response plan set up for both digital and physical assault. Deficiencies and weaknesses need to be identified and repaired before they can be exploited. “It’s not a matter of if you’re going to [be compromised],” Clement stated.

When it happens, we can all do our part to be prepared.

Jessica Lohr is Communications Supervisor at Orange County (Virginia) E911 Emergency Communications Center.

Tags cybersecuritySecurity
Share Facebook 0 Twitter 0 Google+ 0 LinkedIn 0
Previous article APCO Seeks Comments on Candidate National Standard Crisis Intervention Techniques and Call Handling Procedures for Public Safety Telecommunicators
Next article Charlotte-Mecklenburg Police Department Receives APCO Agency Training Program Certification

Follow @apcointl

Follow @APCOIntl
Back to top

Current Issue

PSC Magazine

  • About PSC Magazine
  • Advertise
  • Buyer’s Guide
  • Subscribe
  • Submit an Article
  • Contact the Editor
  • Privacy Policy

Inside APCO

  • About APCO
  • Membership
  • Events
  • Training
  • Technology
  • Advocacy
  • Services
  • Contact APCO

Follow Us

Copyright 2025 APCO International

Close Window

Loading, Please Wait!

This may take a second or two. Loading, Please Wait!