SirenJack Explainer Videos


It all started when…

Balint Seeber, Director of Vulnerability Research at Bastille noticed that the emergency alerting system in San Francisco used RF communications and that its signals were not encrypted. Balint monitored the radio spectrum to find the frequency used by the city’s Outdoor Public Warning System. Once the frequency was found, analysis of the radio protocol quickly showed that commands were not encrypted and therefore vulnerable to forgery, rendering the system susceptible to malicious activations.

How I discovered SirenJack


What is SirenJack?


How the SirenJack vulnerability works


SirenJack Whiteboarded