Biz & IT —

Hackers set off Dallas’ 156 emergency sirens over a dozen times

Twice the normal volume of 911 calls came into the system early Saturday morning.

The Dallas skyline.
Enlarge / The Dallas skyline.

Late Friday night and early Saturday morning, hackers set off 156 emergency sirens in and around the city of Dallas, Texas. According to The Dallas Morning News, the sirens began blaring shortly before midnight on Friday and were shut off and reactivated "more than a dozen times" before emergency workers shut the system down entirely at around 1:20am on Saturday morning, after confirming that there was no actual emergency and that it wasn't the result of some benign malfunction.

The city tried to tell residents that there was no emergency and not to call 911, but the system was nevertheless flooded with calls. The 911 line received more than 4,400 calls between 11:30pm Friday and 3am Saturday, double the number received between 11pm and 7am on a typical night. At its peak, the call volume and a short-staffed call center pushed wait times as high as six minutes—the city's goal is to answer most 911 calls within 10 seconds.

City officials have discovered how the system was compromised and are working to keep it from happening again—as of around noon on Saturday, the system had apparently been reactivated, and the city was working to implement "more safeguards" over the weekend. They aren't disclosing how the system was compromised or who may be responsible, but Dallas Office of Emergency Management directory Rocky Vaz told the Dallas Morning News that it was likely "someone outside our system" but still in the Dallas area.

City officials are taking the hacking incident seriously, and the city's Public Safety Committee will reportedly move the emergency system to the top of its agenda.

"If it's hacking, it's extremely concerning," said Jennifer Staubach Gates, a city councilperson who serves on the Public Safety Committee. "If someone's messing with our emergency system, we've got an issue. We need to get to the bottom of it—what kind of vulnerabilities do we have?"

Channel Ars Technica