Log in

View Full Version : feds radio's found easy to snoop and jam



Sasha
15th August 2011, 08:42
since it didnt fit good in any subforum i thought this one might be as good as any other, posted for informational purposes only of course, dont go jamming fed radio's, very illegal i assume:




August 10, 2011, 12:15 PM ET

Security Flaws in Feds’ Radios Make for Easy Eavesdropping





Article (http://blogs.wsj.com/digits/2011/08/10/security-flaws-in-feds-radios-make-for-easy-eavesdropping/)
Comments (33) (http://blogs.wsj.com/digits/2011/08/10/security-flaws-in-feds-radios-make-for-easy-eavesdropping/tab/comments/)


By Jennifer Valentino-DeVries

The portable radios used by many federal law enforcement agents have major security flaws that allowed researchers to intercept hundreds of hours of sensitive traffic sent without encryption over the past two years, according to a new study (http://online.wsj.com/public/resources/documents/p25sec08102011.pdf) being released today.

http://online.wsj.com/media/pinkpager_D_20110810125036.jpgTravis Goodspeed The children’s toy that can be used for jamming.
While studying the technology, researchers from the University of Pennsylvania overheard conversations that included descriptions of undercover agents and confidential informants, plans for forthcoming arrests and information on the technology used in surveillance operations.
“We monitored sensitive transmissions about operations by agents in every Federal law enforcement agency in the Department of Justice and the Department of Homeland Security,” wrote the researchers, who were led by computer science professor Matt Blaze and plan to reveal their findings Wednesday in a paper at the Usenix Security Symposium in San Francisco.
Their research also shows that the radios can be effectively jammed using a pink electronic child’s toy and that the standard used by the radios “provides a convenient means for an attacker” to continuously track the location of a radio’s user.
The authors say they are extremely concerned about the security lapses found in the radios, which are used by the FBI and Homeland Security as well as state and local law enforcement. “We strongly urge that a high priority be placed” on a “substantial top-to-bottom redesign” of the system, dubbed P25, they write.

http://online.wsj.com/media/clearradio_D_20110810125307.jpgMatt BlazeWhat a sample radio looks like when said to broadcast in unencrypted fashion
Members of the research group say they have contacted the Department of Justice, Homeland Security and other agencies. The group has created a website (http://www.crypto.com/p25/) with information law enforcement groups can use to help mitigate the problems. A paper (http://repository.upenn.edu/cgi/viewcontent.cgi?article=1990&context=cis_reports) published last year also warned about security weaknesses in the radios.
The FBI did not immediately have a comment about the group’s findings. The Association of Public-Safety Communications Officials, which coordinates the technology used in the radios, did not immediately respond to a request for comment.
The problems with the handheld or in-car radios range from the technologically complex to the unbelievably simple.

http://online.wsj.com/media/encryptedradio_D_20110810125443.jpgMatt BlazeWhat it looks like in encrypted mode
One of the difficulties: The switches and indicators on the radios may be easy to miss and may not make it clear that transmission is being sent in an unencrypted way. Sometimes, researchers found, law enforcement agents were broadcasting their messages to outsiders but believed they were operating in encrypted mode. “In some cases, this involved one user explaining to another how to set the radio to encrypted mode, but actually described the procedure for setting it to clear mode,” the researchers reported.
Another problem: The messages sent over the radios are sent in segments, and blocking just some of these segments can result in the entire message being jammed. With other systems, jammers have to expend a lot of power to block communications, but the P25 radios allow jamming at relatively low power, enabling the researchers to prevent reception using a $30 toy pager designed for pre-teens.
In studying the transmissions themselves, the researchers used $1,000 receivers marketed to radio hobbyists and operated in two metropolitan areas, which the study’s authors would not disclose.
The paper, called “Why (Special Agent) Johnny (Still) Can’t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System,” was co-authored by Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman and Kevin Xu.

ellipsis
15th August 2011, 17:40
"high tech" military technologies have been found to use open, unencrypted WI-FI networks, from surveillance drones to "lightning bomb zappers". FAIL.

RedSquare
15th August 2011, 18:53
From reading that piece, it seems to be the regular problem related to the people using the technology, rather than the technology itself.

Jamming a frequency used by an emergency service will definitely result in jail time. Although it's relatively easy to do since most radio systems are still unencrypted. As a radio hobbyist, it's frighteningly easy to block them given the right equipment and the right amount of power.

Bitter Ashes
16th August 2011, 09:44
I don't know the frequency that the UK police's TETRA system uses, but I'm sure you could find out and broadcast at that frequency to jam it. You would have great difficulty listening in though because the system is an encrypted VOIP network.

What's the effect on frequency hopping sets? Finding the transmittion security key is pretty much James Bond stuff and you can't jam tens of thousands of channels all at once surely?

I really wouldn't reccomend engadging in electronic warfare like this without a bloody good reason, which there isn't in the UK atm.

RedSquare
27th August 2011, 22:18
I don't know the frequency that the UK police's TETRA system uses, but I'm sure you could find out and broadcast at that frequency to jam it. You would have great difficulty listening in though because the system is an encrypted VOIP network.

What's the effect on frequency hopping sets? Finding the transmitting security key is pretty much James Bond stuff and you can't jam tens of thousands of channels all at once surely?

I really wouldn't recommend engaging in electronic warfare like this without a bloody good reason, which there isn't in the UK atm.

It operates from 380-385mhz and 390-395mhz in the UK and in Ireland. I imagine one frequency group is mobile and the other is the base station.

I'm not sure if it's possible to jam it, as it's a closed digital network with multiple users using different encoding. It'd also be difficult to get any transceiver to operate on those frequencies.

Even with a TETRA transceiver you still have to be authenticated to the network by a human in the police/fire/ambulance control room computer before you can operate. If you go after the key, its possible to crack with software but by the time it's done the info would be outdated.

The interesting thing for activists is the Mototrbo VHF/UHF series, and the license-free DTR, and Icom Digital PMR radio which would be ideal for use on direct action due to the inability of it to be eavesdropped on by traditional radio scanners. It's very expensive though for the handhelds, like 200 pound each.