skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Communicating Next-Generation 911 with local 911 professionals: Preliminary recommendations
Next-Generation 911 (NG911) infrastructure will replace analog systems designed to support voice services for landline 911 callers with digital, IP-based systems that will allow smartphone users to “call” 911 via voice, text, image, and streaming video. This brief paper reports findings from a workshop conducted at the 2019 911 Early Adopters’ Summit, during which local 911 professionals from across the United States reflected on strengths, weaknesses, opportunities, and threats associated with the adoption of NG911 infrastructure and, in particular, multimedia 911 services. Workshop participants pointed to long-standing issues NG911 stands to exacerbate, including high non-emergency call volumes, poor staff retention, and inadequate psychological support which the influx of multimedia 911 calls, including those with graphic imagery, may worsen. At the same time, participants looked to local, existing resources to mitigate these issues and exploit new opportunities afforded through NG911 infrastructure. Using these findings, preliminary recommendations are offered to improve information resources available to local 911 professionals adopting NG911 systems for effective and efficient multimedia 911 services.  more » « less
Award ID(s):
1951917
PAR ID:
10281186
Author(s) / Creator(s):
;
Date Published:
Journal Name:
2020 IEEE International Professional Communication Conference (ProComm
Page Range / eLocation ID:
110 to 114
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Cellular networks that offer ubiquitous connectivity have been the major medium for delivering emergency services. In the U.S., mobile users can dial an emergency call with 911 for emergency uses in cellular networks, and the call can be forwarded to public safety answer points (PSAPs), which deal with emergency service requests. According to regulatory authority requirements for the cellular emergency services, anonymous user equipment (UE), which does not have a SIM (Subscriber Identity Module) card or a valid mobile subscription, is allowed to access them. Such support of emergency services for anonymous UEs requires different operations from conventional cellular services, and can therefore increase the attack surface of the cellular infrastructure. In this work, we are thus motivated to study the insecurity of the cellular emergency services and then discover four security vulnerabilities from them. Threateningly, they can be exploited to launch not only free data service attacks against cellular carriers, but also data DoS/overcharge and denial of cellular emergency service (DoCES) attacks against mobile users. All vulnerabilities and attacks have been validated experimentally as practical security issues in the networks of three major U.S. carriers. We finally propose and prototype standard-compliant remedies to mitigate the vulnerabilities. 
    more » « less
  2. The cellular network offers a ubiquitous emergency call service with its pervasive coverage. In the United States, it can be consumed by dialing 911 for cellular users, and the emergency call is forwarded to the public safety answer point (PSAP), which handles emergency service requests. According to regulatory authority requirements [1,2,3] for cellular emergency services, anonymous user equipment (UE) is allowed to access them without a SIM (Subscriber Identity Module) card, a valid mobile subscription, or a roaming agreement with the visited cellular network. Such support of the cellular emergency services requires different operations from conventional cellular services, thereby increasing the attack surface of the cellular infrastructure. 
    more » « less
  3. null (Ed.)
    Public education programs improve public safety by teaching citizens how to mitigate risks and respond to emergencies. To improve these efforts, studies in the fields of risk communication and emergency management have examined the design and communication of public education information. However, few studies examine the diversity of information officials communicate to the public when state and national-level public education programs are decentralized and administered by local government agencies. This study reports findings from a content analysis of text-to-911 information published on the websites of local 911 service entities across the state of Texas. Overall, these websites communicate sparse, uneven, and sometimes inconsistent information to citizens across the state regarding the availability of text-to-911 service, when and for whom texting 911 is appropriate, and instructions and warnings for texting 911 during an emergency. These findings suggest the need for public education resources that help local governments communicate with local audiences and coordinate communications across jurisdictions working to accomplish state and national public-safety objectives. 
    more » « less
  4. Public-Safety Answering Points (PSAPs) coordinate emergency response by gathering critical information from 911 callers for dispatch to first responders. However, PSAPs fail to gather this information if 911 callers are unable, unwilling, or unavailable to report key details about an emergency. To address this problem, early-adopter PSAPs employ communication specialists to gather multimedia information from multiple sensing tools, including automated alarms, cameras, government databases, location systems, open-source websites, social media, and alternative communication channels such as text-to-911. Using preliminary usage data from an early adopter PSAP, this study identifies 11 breakdowns in 911 call taking that create opportunities for multisensor integration. This study then characterizes use cases for multisensor tools based on usage patterns observed across five incident types. These findings highlight multisensor integration as a critical area for crisis informatics research. 
    more » « less
  5. Coming to suspect that someone has engaged in wrongdoing based on their unexpected behavior is a common phenomenon—yet, little is known about what triggers initial suspicion. We investigated how violating expectations for high emotionality during a traumatic event can trigger suspicion that one has engaged in immoral—or even criminal—activity through moral typecasting. Five studies demonstrate this theory in a criminal context with dire real-world consequences: 911 callers reporting violent crimes generating suspicion by exhibiting unexpected behavior, which could trigger confirmation bias in investigations leading to wrongful convictions. Using both real and tightly controlled simulated 911 calls, we demonstrated that failing to express the expected level of emotion on a 911 call reporting a violent crime led laypeople and police to morally typecast the caller as more of a moral agent capable of perpetrating immoral acts and less of a moral patient capable of being the victim of immoral acts—ultimately increasing suspicion that they were involved in the crime and support for treating them as a suspect. We advance moral psychological theory by demonstrating that failing to express expected levels of emotion about a moral violation can shape moral inferences about someone’s capacity to commit versus be the victim of moral wrongs, thereby generating suspicion that they might have engaged in wrongdoing. We demonstrated this theory in criminal settings to explain how one tragedy can become two: altruistic witnesses calling 911 to plead for help on behalf of another person becoming suspects of the crime they reported because they failed to exhibit the expected emotional demeanor. (PsycInfo Database Record (c) 2025 APA, all rights reserved) 
    more » « less