Workshop Description
Emergency response infrastructure operates under a zero-tolerance reliability constraint. Computer Aided Dispatch (CAD) systems handle every emergency call and resource assignment. Automatic Vehicle Location (AVL) platforms track every responding unit. Next-generation emergency calling (NG112 in Europe, NG9-1-1 in North America) routes calls over IP with SIP signalling and RTP media streams. Each of these systems depends on cryptographic protocols for authentication, integrity, and confidentiality. A quantum compromise of dispatch infrastructure does not result in data loss. It results in misdirected emergency responses, spoofed caller locations, and compromised officer safety.
This workshop maps the cryptographic attack surface of critical response infrastructure: CAD-to-CAD interoperability encryption, AVL data authentication and anti-spoofing, NG112/NG9-1-1 SIP signalling security (TLS for SIP, SRTP for media), PIDF-LO (Presence Information Data Format Location Object) integrity for caller positioning, ECRF (Emergency Call Routing Function) and LVF (Location Validation Function) authentication, and body-worn video evidence chain integrity. For each system, we identify the specific quantum vulnerabilities, assess the threat timeline, and design PQC migration paths that meet NENA i3 and ETSI ES 203 178 security requirements. Participants leave with a prioritised migration plan for their response infrastructure.
What participants cover
- CAD system cryptographic dependencies: database encryption, operator authentication, CAD-to-CAD interoperability (CAP, DE protocol), and mobile data terminal secure communication
- AVL platform security: GPS/GNSS data authentication, vehicle tracking data integrity, anti-spoofing for real-time fleet position, and PQC migration for AVL communication channels
- NG112/NG9-1-1 SIP and RTP security: TLS for SIP signalling, SRTP for voice media, certificate-based SRTP key exchange, and PQC implications for call routing infrastructure
- PIDF-LO location integrity: signed location objects for caller positioning, ECRF routing function authentication, and LVF validation function certificate chains under PQC
- Body-worn video chain of custody: cryptographic integrity for BWV evidence, timestamp signing, and ensuring PQC migration maintains IOPC/CPS evidence admissibility
- Standards compliance: NENA i3 security requirements, ETSI ES 203 178 (NG112 security), FIPS 203/204/205 algorithm selection for emergency response infrastructure