10,500 Accounts Down - 8 Weeks To Fix

By: John Honovich, Published on Feb 09, 2017

At the Barnes Buchanan Conference, Alarms Detections Systems explained that 10,500 of their accounts, consisting of half of their RMR, went down and took 8 weeks to fix.

This chart shows the start of the outage:

** ********* ******** **********,****** ********** **************** **** **,*** ** their ********, ********** ** half ** ***** ***, went **** *** **** 8 ***** ** ***.

**** ***** ***** *** start ** *** ******:

[***************]

** *** * ************ ************** problem **** ***** *** be ***** ********. *******, and ******* *********, *** to ** ** **** of *** **,*** ******** down:

*** ********* **** ******** schools, ********, ******* *****, etc. *** **** ******** fire ******. **** *** the ********* *** *** that.

Product ******

*** **** *** **** need ** ** ** site, **** ****** ** replace *** ******* / transceiver. *****, *** ****** products **** ********* **** the ************ ** *** got *,*** ** *** devices ******* **** ***** dealers ** ****.

****, ** *** ********, antennas **** ******** ****** the ****** ** * temporary ********.

** *** *****, *,*** of *** ***** **** from *** ************ *** not **** ******, ** the ****** ***** ***** a ***** *** ******* to **** ***** ** the ******:

*******, * ***** *****, in ********, **** **** done.

****

** ******** *** **** just *** ****** **** to ** * *** hundred ********* ** *******, given *** * ***** of * *** ********* of ~** *********** ** to ** ***** * day, ********* ********. *** that ** **** ******* the ***** **** ** lost ******** *** ********** of ******* ** *** accounts, ***.

Manufacturer ******** ***********

*** ******** ** ********* who *** ************ *** citing ******* **** **** that ************. *******, ***** ****** ********** ***-**********, ****** * ****** from *** ************:

* ****** *********, ***** transmits ** *** **** 465.9875 *** ********* ** our ********’* ***-*****************, ******* *** *****’* surface ** **** ******** area ** ******** **** un-decodable **** *******. ** we **** **** **** satellite *** **** ************ over **** **** ********* all **** *** ***** since ****, ** ******* those ************* ***** **** highly ******** ** **** caused *** ******** **** occurred.

**** **** **** ***** unique *** * ************ incident ** ******, ******-***** radio ********* ************ (***) in *** **** ******* area ** ********. ***** have **** ******* ******* RFI ****** ***** ** the **** ******* **** over ****** ******. **** had **** ********** ** penetrate ** ***-*****************. ******* *** *** our ********* ** *** area **** ********** *** concerns ** *** **** from *** ** ***** RFI ****** ***** **** most ****** ***** *****.

** **** ** *********** to *** **** ********** or ************ *** ************ will make ** *** *** this.

Comments (18)

2G dialer no-longer-supported issue?

It was an AES-Intellinet issue. I'm trying to find some related articles about it now and we'll update.

Just found an article in SSI from a few months ago confirming AES. Given that, strange that ADS would not disclose the manufacturer.

Exactly what I was thinking, AES had to be them.Only long range wireless that I considered worth a hoot in hell, but now??

Very interested in hearing more background on this .....

Seems to be caused by a rogue French satellite. 

no it was totally the Russians, they made the French satellite go rouge

What wen wrong with the radio frequency, is it the alarm communicator with central station , or the wireless alarm system?

AES-Intellinet is an alternative to telephone, cellular, or IP dialers. It uses spread spectrum, 450-470 Mhz radios, which act as a mesh. So if you have customers clustered in one area, they all act as transmitter and receiver, til the signal riches an uplink, which is usually IP to the central station.

That frequency is licensed in the United States, so nothing else should have been transmitting on it, but according the AES' investigation, a satellite malfunctioned and sent a packet which was received and rebroadcast by the network. Instead of ignoring it, essentially the radios just didn't know what to do with it, so they kept trying to rebroadcast it until they finally went down. 

SSI has a followup article with AES in which they talk about what happened/how they're preventing it from happening again, etc.

I wonder why the network wasn't encrypted? How could a external packet drop into the network and what's the stop anyone land based doing this? 

According to AES, it was a combination of that rogue packet and some ground based interference. 

I'm not an RF genius and I'm not that well versed on AES' product, but...I'd tend to agree with you. I don't get a lot of warm fuzzies about it not being possible.

You cannot even imagen how much stuff, that is "certified" by various manufacturers and agencies who is using ISM band (433 MHz), for instance burglar alarms that are totally B.S, so many of these system that can easily be "disabled" by using using one simple handheld radio and transmitting on the right (or near) frequency...

The french satellite? http://www.hydrowise.com.cn/images/images/Argos3PMT-KHD.pdf

AES-IntelliNet Data Radio: https://fccid.io/L9N-7085UE5

I tend to believe it was a combination (or only #1)

#1. Satellite blocked the Data Radios receiver (when passing over).

#2. "Ground station" made reverse engineering of the traffic (most likely clear text), injected an "packet" that caused "broadcast storm" and overloaded the [low speed] network. (I assume it is Mesh as it says here, otherwise this will can go out from this hypothesis)

 

#2. "Ground station" made reverse engineering of the traffic (most likely clear text), injected an "packet" that caused "broadcast storm" and overloaded the [low speed] network.

So do you think this was malicious then or?

Frankly speaking, no.

I did only take the "report" in consideration, and besides, I have no clue how the "network" works, could be "Mesh" AKA repeating of packets - I have no idea how the protocol they are using works. (would be interesting to know tough)

The Radio is simple analogue stuff (as can been seen on FCC site), nothing special, this leave me personally to believe they has interference from the Satellite alone, and there was no "packet" was entered into their "network". And that would also make sense with their "temporary" vehicles all around, only to pickup the radio traffic from the customers and relay in. (with 3G / GSM?)

(Depending what's behind the radios (on the serial port), it could be possible to relay packets (most probably not even IP), but personally I don't think so)

Anyhow, that's the price to pay when using license free frequencies AKA ISM band for pretty serious applications. - Maybe embarrassing enough to make up a story to justify the change... 

 

The issues raised are well known in the Central Station Community. There were actually two different situations. Issue 1 was from a few years ago: The discussion about the satellite interference was related to tracking of marine life fitted with communicators that happened to be on the same frequency as the one FCC granted to ADS. The french satellite did not have approval to use the frequency. 

Issue #2 is a recent incident that occurred around Sept of last year. This is what I have heard was the cause - there was a faulty packet of data introduced by one of the radios that was being distributed throughout the network that caused the receivers to not respond or rebroadcast. The network was very large and should have been isolated onto a few different frequencies, also a number of the radios were very old and did not have up to date firmware.

#1

"The french satellite did not have approval to use the frequency."

Well, the frequency seems to me (to what I have been reading) is free frequency to use for anyone, i.e. license to use this frequency are not required.

#2

I have been thinking about the "faulty packet", and personally i cannot find out how the "faulty packet" can enter one another "network" to be "rouge" packet that would put the "legal" network in faulty state.

What I can only think of, is simply "RF choke" of the central receiver, since this is listening on the frequency that the "rouge" french satellite transmitting on.

My personal conclusion

 Very good example on how manufactures think they can use free frequencies for implementing pretty serious applications without any drawbacks. The frequency is free to use for anyone, and anyone who will implement anything on these frequencies must be aware of the highly risk to have another applications on same frequency.

I personally know several cases when "the only legal" application is disturbed by a nearby hamradio repeater, who is transmitting 50 watt on near frequency and locking out AFSK/FSK receivers with totally lacking of any input filters. (of course, the "legal" application is the hamradio repeater and the ISM stuff, but there is absolutely nothing that can be said "I have priority of this frequency" - but the power of 50watt of registered repeater beats easily all other ISM stuff with lack of proper bandpass filter) 

As I said before, this is the price to pay to use free frequencies for pretty serious applications...

 

"The frequency is free to use for anyone, and anyone who will implement anything on these frequencies must be aware of the highly risk to have another applications on same frequency."

This is not a Wi-Fi frequency. The frequencies in these bands are not free, it is regulated, meaning it is assigned to users. Users of the AES-Intellinet system have to get approval from the FCC or Industry Canada (or both if near the border) and pay annually for the band requested and then assigned to them and the assigned geographical area they can operate their transmitters by the regulators. 

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Intrusion

Wyze AI Analytics Tested - Beats Axis and Hikvision, Now Improved, Now Being Terminated on Nov 25, 2019
When we originally tested Wyze's free person detection deep learning analytics in July 2019, they performed well, with few false alarms, but a long...
Hikvision Acusense Analytics Tested on Sep 23, 2019
Hikvision touts "The Magic Behind It All" in their new Acusense line are 'deep learning algorithms' inside these cameras and recorders. But how...
Interlogix Shutting Down on Sep 20, 2019
Interlogix is shutting down, as UTC has confirmed to IPVM in a statement about their "plans to wind down" the once leading brand. Inside this...
Dahua Analytics+ Tested on Aug 07, 2019
Dahua's analytics have performed poorly in past shootouts. But now, they claim their new Analytics+ "algorithms significantly improve accuracy and...
Hikvision 4K Camera Shootout on Aug 02, 2019
With their latest Smart Series 5 cameras, Hikvision is claiming cameras "fully loaded" with "state-of-the-art technology for high performance and...
Repositionable Multi-Imager Camera Shootout - Avigilon, Axis, Dahua, Hanwha, Hikvision, Panasonic, Vivotek on Jun 19, 2019
Repositionable multi-imager cameras are one of the fastest growing segments in video surveillance, with a slew of new offerings being recently...
ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
Hikvision DeepinMind 2019 Test on Jun 06, 2019
In 2018, Hikvision's DeepinMind AI NVR performed terribly, recognizing vehicles, animals, and other objects as humans, misclassifying demographics,...
Vidsys New President Interviewed on May 31, 2019
A decade ago, PSIM was hot with projections then of a billion dollar market by now. This has not come close to happening. However, Vidsys, one of...

Most Recent Industry Reports

IP Camera Installability Shootout 2019 - Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision, Uniview, Vivotek on Dec 09, 2019
What are the best and worst cameras to install? Which manufacturers make it the hardest or easiest to install their cameras? We tested 35 total...
Viisights Raises $10 Million, Behavior Analytics Company Profile on Dec 09, 2019
Viisights, an Israeli AI analytics startup marketing "Behavioral Understanding Systems", announced $10 million Series A funding. We spoke to...
Disruptor Wyze Releases Undisruptive Smartlock on Dec 06, 2019
While Wyze has disrupted the consumer IP camera market with ~$20 cameras, its entrance into smart locks is entirely undisruptive. We have...
Bosch Budget 3000i Cameras Tested on Dec 05, 2019
Bosch has long had a hole in its lineup for, as it describes, "competitively-priced cameras". Now, Bosch has released its 3000i series cameras...
Anixter Resisting Takeover From Competitor on Dec 05, 2019
Mega distributor Anixter is going to be acquired but by whom? Initially, Anixter planned to go private, being bought by a private equity firm....
Security Sales Course 2020 - Last Chance Save $50 on Dec 05, 2019
This sales course is customized for the current needs and challenges specific to professionals selling video surveillance and access control...
Ireland National Children's Hospital Chooses Hikvision End-to-End With Facial Recognition on Dec 05, 2019
The world's most expensive hospital project ever, the New Children's Hospital in Ireland, has chosen an all-Hikvision surveillance system including...
AVTech ~$70 IP Cameras Tested Vs Dahua and Hikvision on Dec 04, 2019
Taiwanese manufacturer Avtech is taking direct aim at low cost leaders Dahua and Hikvision with ~$70 starlight and white light illuminator...
Ultinous European Analytics Startup Company Profile on Dec 04, 2019
European analytics-startup Ultinous pitches customers to "Have your own video analysis service!" We spoke to Ultinous to better understand their...
Access Startup Multi-Mount Aims To Streamline Reader Installs on Dec 03, 2019
Startup Multi-Mount claims it makes installing access readers 'Fast', 'Secure,' and fit 'any size frame.' The company states its bracket 'fits most...