Published: June 20, 2019 By
Image of a presidential emergency alert displayed on a cell phone

Credit: FEMA

On October 3, 2018, cell phones across the United States received a text message labeled 鈥淧residential Alert.鈥 The message read: 鈥淭HIS IS A TEST of the National Wireless Emergency Alert System. No action is needed.鈥

It was the first trial run for a new national alert system, developed by several U.S. government agencies as a way to warn as many people across the United States as possible if a disaster was imminent.听

Now, a raises a red flag around these alerts鈥攏amely, that such emergency alerts听authorized by the President of the United States can, theoretically, be spoofed.

Key takeaways
  • Cell phone users can't opt out of presidential alerts, text messages sent to phones in the U.S. in emergencies.
  • Researchers have discovered that hackers could, theoretically, spoof such alerts, blasting false messages to phones in a confined space like a sports stadium.
  • The team is currently working with cell carriers and government agencies to develop ways to thwart such attacks.

The team, including faculty from CU Engineering鈥檚 Department of Computer Science (CS), Department of Electrical, Computer and Energy Engineering (ECEE) and the Technology, Cybersecurity and Policy (TCP) program discovered a back door through which hackers might mimic those alerts, blasting fake messages to people in a confined area, such as a sports arena or a dense city block.

The researchers, who have already reported their results to U.S. Government officials, say that the goal of their study is to work with relevant authorities to prevent such an attack in the future.

鈥淲e think this is something the public should be aware of to encourage cell carriers and standards bodies to correct this problem,鈥 said Eric Wustrow, a co-author of the study and an assistant professor in ECEE. 鈥淚n the meantime, people should probably still trust the emergency alerts they see on their phones.鈥

The researchers reported their results at the 2019 International Conference on Mobile Systems, Applications and Services (MobiSys) in Seoul, South Korea, where their study won the award for 鈥渂est paper.鈥

False alarm

Wustrow said that he and colleagues Sangtae Ha and Dirk Grunwald decided to pursue the project, in part, because of a real-life event.

In January 2018, months before the first presidential alert test went out, millions of Hawaiians received a similar, but seemingly genuine, message on their phones: someone had launched a ballistic missile attack on the state.

It was, of course, a mistake, but that event made the 兔子先生传媒文化作品 team wonder: How secure are such emergency alerts?

The answer, at least for presidentially-authorized alerts, hinges on where you look.

鈥淪ending the emergency alert from the government to the cell towers is reasonably secure,鈥 said co-author Sangtae Ha, an assistant professor in the Department of Computer Science. 鈥淏ut there are huge vulnerabilities between the cell tower and the users.鈥

Ha explained that because the government wants presidential alerts to reach as many cell phones as possible, it takes a broad approach to broadcasting these alerts鈥攕ending messages through a distinct channel to every device in range of a cell tower.听

Fake messages

He and his colleagues discovered that hackers could exploit that loophole by creating their own, black market cell towers. First, the team, working in a secured lab, developed software that could mimic the format of a presidential alert.听

鈥淲e only need to broadcast that message into the right channel, and the smartphone will pick it up and display it,鈥 Ha said.

And, he said, the team found that such messages could be sent out using commercially-available wireless transmitters with a high success rate鈥攐r roughly hitting 90 percent of phones in an area the size of 兔子先生传媒文化作品鈥檚 Folsom Field, potentially sending malicious warnings to tens of thousands of people.

It鈥檚 a potentially major threat to public safety, said Grunwald, a professor in computer science.

鈥淲e think it is concerning, which is why we went through a responsible disclosure process with different government agencies and carriers,鈥 he said.

The team has already come up with a few ways to thwart such an attack and is working with partners in industry and government to determine which mechanisms are most effective.听

Other co-authors on the new study include 兔子先生传媒文化作品 graduate students and researchers Gyuhong Lee, Jihoon Lee, Jinsung Lee, Youngbin Im and Max Hollingsworth.