Categories: Indiana News

Marion County sirens did not activate during Tuesday’s statewide test

INDIANAPOLIS — On Tuesday morning, the state of Indiana underwent a state tornado drill, where residents may have heard tests of outdoor warning sirens.

However, the sirens did not activate in Marion County on Tuesday.

According to officials with the Marion County Emergency Management, they said they were aware of reports indicating that the county’s sirens did not activate during the test.

The National Weather Service said that this test was part of Severe Weather Preparedness Week throughout the state of Indiana. A statewide test of communication systems occurred at 10:15 a.m. on Tuesday.

A news release from MCEM said that they have “engaged (the department’s) vendor to investigate the cause.”

“MCEM, in conjunction with the vendor, conducted another brief test of the system at 1:59 p.m. and the system was found to be functioning normally,” a release from the department read. “At this time, the vendor is continuing to investigate (potential) causes.”

The department said that regular siren tests are conducted each week to make sure that the system functions properly. Officials said that MCEM will conduct a “full-system test” at 11 a.m. on Friday, weather permitting.

“We appreciate the community’s patience and cooperation as we work to maintain a dependable outdoor emergency warning system,” the release read.

For more information about MCEM, click here.

rssfeeds-admin

Share
Published by
rssfeeds-admin

Recent Posts

CISA Urges Firms to Secure Microsoft Intune After Stryker Breach

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a fresh alert urging organizations…

27 minutes ago

Malware Operators Hijack Network Devices For DDoS Attacks and Crypto Mining

The enterprise attack surface is rapidly shifting as threat actors increasingly target network infrastructure instead…

27 minutes ago

Claude Vulnerabilities Allow Data Exfiltration and Malicious Redirects

Security researchers have disclosed a critical multi-stage attack chain affecting Anthropic’s Claude.ai platform, demonstrating how…

27 minutes ago

Hackers Exploit OpenWebUI Servers to Deploy AI-Powered Payloads

Hackers are abusing misconfigured OpenWebUI servers to deploy AI-generated payloads that mine cryptocurrency and steal…

28 minutes ago

New SnappyClient Implant Enables Remote Access, Data Theft, and Stealth

In December 2025, security researchers at Zscaler ThreatLabz discovered a new command-and-control (C2) framework implant…

28 minutes ago

WaterPlum Launches New StoatWaffle Malware via VSCode-Themed Attack

North Korea-linked threat actor WaterPlum has introduced a highly evasive new malware strain called StoatWaffle.…

29 minutes ago

This website uses cookies.