The repeater, having receiving the packets, in turn transmits the packets over a licensed frequency to the sirens, each of which contains a modem for demodulating the packets. Anyone who may intercept them, purposefully or by accident, will likely only hear what sounds like seemingly random tones firing in short bursts—a binary code unchanging week to week and the key to the siren’s annoying song.

Advertisement

A person who understands this technology as Seeber does should be able to decipher the flow of ones and zeros and, if they’re an asshole, wake up the entire city. (Oh, and they need that $30 radio, too.)

These signals can be scrambled, randomized, or in other words, encrypted, to stave off this type of malicious attacks. But according to Bastille, a firm that specializes in analyzing RF-based attacks—for banks, tech companies, as well as the government—many companies believe that merely developing their own radio protocol is security enough.

Advertisement

Having confidence that you’re secure simply because no one knows what the hell you’re doing is sometime called “security through obscurity.” Picture a safe with a locking mechanism that no one has ever seen—does that make it unbreakable? As Seeber deftly demonstrated, the obscurity trick doesn’t always work so well.

“What we find in our work in general is that in IoT and critical infrastructure and industrial control systems, a lot of companies decide that they’re going to implement a proprietary RF protocol—a radio frequency protocol—to communicate, and they may or may not add security to that,” Bastille’s chief revenue officer, Ivan O’Sullivan, told Gizmodo.

Advertisement

Seeber’s research, which was conducted passively—meaning, he never actually attempted to trigger the alarms himself—demonstrated that ATI had not attempted to encrypt its activation sequence, likely because it assumed anyone who happened to find it would have no idea what it was for.

Advertisement

According to its website, ATI has a host of featured clients one might recognize, among them One World Trade Center and West Point Academy. But it’s unclear which systems at which locations are similarly affected by the vulnerability. Bastille was, however, able to test Seeber’s discovery at one other location. The problem, it seems, is not San Francisco’s alone.

“[Seeber] went to the Midwest and proved it at a second location,” O’Sullivan said. “We know of at least two confirmed locations, and that’s what we’ve done so far, but we haven’t been able to travel to each of the locations.” The second location, Seeber informed Gizmodo, was in Sedgwick County, Kansas. Authorities there, he said, confirmed to Bastille that they’d been working with ATI to fix their problems as well.

Advertisement

“What we want now is to make sure that ATI’s other customers are made aware of the vulnerability, communicate with ATI, and work with them to take—and, if necessary, customize—the patch and get it out there,” added O’Sullivan said.

In a public statement Tuesday, ATI did not contest with Bastille’s findings. It did, however, urged its customers not to panic... too much.

Advertisement

“Bastille Networks, a company that offers visibility into known and unknown mobile, wireless and IoT devices within an enterprise’s corporate airspace, reported that by monitoring one of our systems for months, they have largely deduced the command format of our packets,” ATI wrote, adding: “This is likely true.”

It continued: “However, we wish to point out these are technically sophisticated people who have devoted significant time and effort to this task. Before customers panic too much, please understand that this is not a trivially easy thing that just anyone can do. Spoofing our current protocol is still several orders of magnitude harder than spoofing a DTMF-based siren system.” (DTMF tones, such as those used on old landlines telephones, have been used in the past to activate emergency systems.)

Advertisement

ATI confirmed that indeed it was issuing a patch to further safeguard its systems, at least ones not already protected from the vulnerability, which Seeber has named “Siren Jack.”

The sirens deployed by ATI on military bases, for instance, already use encrypted signals. The military’s equipment is considerably more expensive, however, and not every local government will be able to justify the expense, ATI said.

Advertisement

Thanks to Bastille, a patch created by ATI against Siren Jack is now currently being tested, and the company plan to roll it out soon. Unfortunately, it’s not as easy as it sounds. The sirens, ATI said, “are not mass market consumer items connected to the internet where you simply download a patch.”

San Francisco, at least, may be able to rest easy. Changes have been apparent, says Seeber, who continues to monitor ATI’s protocols from his home with his laptop and Amazon-bought radio. “I do see now various forms of new packets that do look more random,” he says. “And that makes me optimistic.”