The abrupt shutdown of a city’s primary emergency notification system, a digital lifeline for a quarter of a million residents, serves as a jarring illustration of modern municipal vulnerability in an increasingly interconnected world. For nearly a month, Long Beach has been operating without its “Alert Long Beach” system, a critical tool silenced not by an internal failure but by a cyberattack on a third-party vendor that has sent ripples across North America. The incident has thrust the city into a challenging position, forcing it to navigate the immediate aftermath of a significant data breach while simultaneously grappling with the long-term implications for its emergency preparedness and the trust it holds with its citizens. This breach highlights the complex and often hidden dependencies that modern cities have on external service providers, where a single point of failure in a distant server room can compromise the security and safety of an entire community, raising urgent questions about how public services can be safeguarded in an era of pervasive digital threats.
The Anatomy of a Third Party Breach
The Ripple Effect of a Single Point of Failure
The security incident that crippled Long Beach’s communication network was a classic example of a supply chain attack, demonstrating how vulnerabilities in one organization can cascade to impact thousands of others. The breach did not originate within the city’s own servers but targeted Crisis24, the operator of the “OnSolve CodeRED” platform that powers Alert Long Beach and similar systems for over 10,000 other local governments throughout the United States and Canada. This widespread platform became a single, high-value target for what the company suspects was an organized cybercriminal group. By compromising the central provider, the attackers gained access to a vast trove of data from a multitude of jurisdictions. This method is increasingly common and highly efficient for threat actors, as it allows them to bypass the individual defenses of numerous smaller entities by striking at their common, and often more complex, service provider. The event underscores a critical lesson for public sector IT management: a city’s cybersecurity posture is not defined solely by its own defenses but is inextricably linked to the security practices of every vendor in its digital ecosystem, making rigorous third-party risk assessment an indispensable component of modern governance and public safety.
The personal data of approximately 25,000 local users was exposed in the attack, creating a significant privacy concern for the residents who had entrusted their information to the city for emergency notifications. The compromised data included sensitive personal identifiers such as home addresses, phone numbers, and email addresses—information that, in the wrong hands, can be used for a variety of malicious purposes, including sophisticated phishing campaigns, social engineering, and identity theft. For a subset of 9,000 of these users, the situation was even more precarious, as their account passwords were also placed at risk. While officials were quick to confirm that highly sensitive financial information and Social Security numbers were not part of the breach, the exposed data is far from harmless. This type of information is a valuable commodity on the dark web, where it can be bundled and sold to other criminals. The breach serves as a potent reminder that even non-financial data has immense value and that its protection is paramount for maintaining public trust and safety in an increasingly data-driven society. The incident forces a re-evaluation of what constitutes “sensitive” data and the security measures required to protect it.
Long Beach’s Immediate Containment Strategy
In the face of a rapidly unfolding cyber crisis, the city of Long Beach’s response was characterized by decisive and swift action intended to stanch the bleeding and prevent further harm. Officials took the “Alert Long Beach” system completely offline on November 11, the very same day they received the initial notification from Crisis24 about a potential security issue. This immediate shutdown, which occurred ten days before the full scope of the breach was officially confirmed, represented a proactive and precautionary measure. By disabling the system, the city effectively severed the connection to the compromised platform, ensuring that no further data could be exfiltrated and that the system could not be leveraged by the attackers to send out false or malicious alerts to residents. This rapid response highlights a crucial aspect of effective incident management: the willingness to accept a temporary loss of service to guarantee the integrity of the system and the security of user data. It reflects an understanding that in a cybersecurity event, hesitation can lead to exponentially greater damage, and prioritizing containment is often the most responsible course of action, even if it creates immediate operational challenges for emergency communications.
Following the system shutdown, city officials pivoted to clear and direct public communication, aiming to empower residents to protect themselves from the potential fallout of the breach. Reggie Harrison, the city’s Director of Disaster Preparedness & Emergency Communications, issued a strong advisory that went beyond a simple notification of the event. He specifically urged any user who had reused their Alert Long Beach password on other online accounts to change those passwords immediately. This guidance addressed the pervasive and dangerous practice of password recycling, where a single compromised password can provide a skeleton key for cybercriminals to access a victim’s other, more sensitive accounts, such as email, banking, or social media. By focusing on this actionable advice, the city moved from merely reporting a problem to providing a tangible solution to mitigate its impact. This educational component of the response is critical, as it helps to foster a more security-conscious public and reinforces the idea of shared responsibility in cybersecurity. The city’s guidance acknowledged the reality of user behavior and aimed to minimize the cascading effects of the vendor’s security failure on the personal digital lives of its residents.
Navigating a Future Without a Key Communication Tool
The Operational Void and Interim Solutions
The indefinite suspension of the Alert Long Beach system has created a significant operational void in the city’s emergency management infrastructure, a gap made more pronounced by the system’s decade-long history as a reliable communication backbone. Over the years, it had become an instrumental tool for disseminating critical information during a wide range of events, from public health updates throughout the COVID-19 pandemic to urgent warnings about inclement weather and time-sensitive evacuation orders during natural disasters. Its deactivation has forced the city to revert to a patchwork of alternative methods to ensure public alerts can still be issued. These interim solutions include the federal Wireless Emergency Alerts (WEA) system, which can broadcast messages to all mobile phones in a specific geographic area, as well as disseminating information through social media channels, using helicopter-mounted public address systems, and activating traditional city-wide sirens. While each of these methods has its utility, they collectively lack the targeted precision and detailed messaging capabilities of the dedicated Alert Long Beach platform. The reliance on this fragmented approach introduces new complexities and potential points of failure into the city’s emergency response protocol.
The challenge with this multi-pronged, ad-hoc communication strategy lies in its inherent limitations and lack of a unified, user-centric platform. The WEA system, for instance, is a powerful tool for broad, immediate warnings but is not designed for nuanced, ongoing updates or for reaching individuals who may not have a mobile phone. Social media platforms, while popular, rely on algorithms that do not guarantee timely delivery of information to all followers, and they fail to reach residents who are not active online. Similarly, helicopter announcements and sirens are highly effective for localized, imminent threats but are geographically limited and cannot convey complex instructions or detailed information. This fragmentation risks creating information inequality, where certain segments of the population may be slower to receive or may miss critical alerts altogether. The absence of a centralized, opt-in system like Alert Long Beach removes a vital layer of communication redundancy and specificity, placing a greater strain on emergency personnel to manage multiple channels and ensuring that every resident, regardless of their technological access or location, receives the information they need to stay safe during a crisis.
Reassessing Vendor Relationships and a Path Forward
The fallout from the Crisis24 breach has compelled Long Beach to undertake a comprehensive and critical re-evaluation of its relationship with the third-party vendor, a process that will likely influence how municipalities nationwide approach the procurement of critical digital services. The decision to keep the Alert Long Beach system offline indefinitely is not merely a technical precaution but a clear signal of a profound loss of trust in the provider’s ability to secure resident data. This incident serves as a powerful case study in the dangers of third-party risk, where the cybersecurity posture of an external partner becomes a direct extension of the city’s own. For public entities, the due diligence process for selecting vendors must now extend far beyond cost and features to include a rigorous assessment of their security architecture, incident response plans, data protection policies, and history of security events. The breach has made it painfully clear that contractual agreements must include explicit and robust clauses regarding security responsibilities, breach notification timelines, and liability, ensuring that the public’s data is afforded the highest level of protection.
Ultimately, the cyberattack served as an unavoidable catalyst for change, forcing Long Beach to confront the vulnerabilities inherent in its outsourced digital infrastructure. The city’s swift containment and transparent communication with the public became pivotal elements in managing the crisis, but the incident’s true legacy lies in the broader re-evaluation of cybersecurity protocols it prompted. It underscored the fundamental principle that a city’s digital defenses are only as robust as their weakest link, which in this case was an external partner responsible for a critical public safety function. This realization has initiated a necessary and overdue conversation about vendor accountability and the need for more stringent security standards for any company providing services to the public sector. The lessons learned in Long Beach have resonated across the country, highlighting a shared vulnerability and prompting other municipalities to scrutinize their own third-party dependencies to prevent a similar crisis within their own communities.


