Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Kevin Mitnick figured out how to get around police radio encryption in the 90's. From 'Ghost in the Wires': "Whenever I heard any hiss of communication, I’d hold down my Transmit button. That would send out a radio signal on the same exact frequency, which would jam the signal. Then the second agent wouldn’t be able to hear the first agent’s transmission. After two or three tries back and forth, the agents would get frustrated with the radio. I could imagine one of them saying something like, “Something’s wrong with the radio. Let’s go in the clear.” They’d throw a switch on their radios to take them out of encryption mode, and I’d be able to hear both sides of the conversation! Even today I’m amused to remember how easy it was to work around that encryption without even cracking the code."


That is the most 90s story I've heard. Nowadays you'd be shot.


Mitnick's hack probably wouldn't work today but I don't know the specifics of who he was listening into nor with which gear he was using. Most P25 networks these days are set up with trunking, so the conversations hop around a bunch of frequencies at random. Holding down the transmit button would do nothing to interfere with the conversation taking place. Even with sophisticated gear you wouldn't be able to who was transmitting at any given time so you'd have to be willing to jam all the frequencies in a group.

Of course, P25 systems are still sometimes set up without trunking so in some situations it might work.


It's an odd story, since until pretty recently most North American police radio was plaintext to begin with.


The first P25 standards came out in 1989, so encrypted police radios were certainly starting to be deployed in the early 90s. Obviously, adoption rate depended on the department budget, with many rural departments taking until the 2010s to finally switch.


I should have said FBI radio encryption. I wonder if the technique would still work today...


If the user can fallback to not using encryption and that solves a problem they think they have, enough annoyance will make them do so. It's the entire reason HSTS exists.


afaik military and likely police radios dont talk to a central server or anything like in the world of internet. hence some things logical on the internet ate very impractical if not impossible or too risky (single points of failure).

its an interesting domain but hard to get solid info on unless you are working on these types of projects or for some MoD somewhere. most info out there on the net is about old tech.

as far as i know preshared keys are common. hard to rekey ofc in case of compromise so likely they have some tricks up their sleeves to make sure if for instance a unit is overtaken by enemy not all coms are compromised by this key in the device. (guesswork here ofc..) dont think much of this stuff uses priv/pub keys and https or vpn like auth schemes etc.


Pre-shared, static keys are unfortunately quite common. However, the P25 standard does provide for re-keying over they air through a process known as OTAR (Over The Air Re-keying).

To put it very simply, radios communicate with a central Key Management Facility (KMF) using a special key (UKEK, Unique Key Encryption Key) to securely transport the new key material. There's more to it than that, of course, but these features are heavily used by the feds and also by larger state and local systems -- because manually re-keying each radio is a huge pain.


HSTS is not practical and marginally useful.

First you need to make darn triple check extra sure that when you deploy it, you won't change it. It is a one-shot switch and whoever gets to your site is stuck with the configuration for days, weeeks, months. And you cannot tell them "my bad, try again".

Then if you have a sensible setup, you would redirect immediately to HTTPS anyway.

Sure, it protects you from some marginal risks (such as you not setting your cookies to secure mode) but then you have other problems and HSTS will bite you when you prod the security settings without a good plan.


> hiss of communication

Allow me to speculate massively. Hiss sounds more like weak signal acquisition. Perhaps in this case, Mitnick was interfering but not defeating encryption.


A bit more from the book (which is a great read, and available in it's entirety on archive.org): "To enable its agents to communicate over greater distances, the government had installed “repeaters” at high elevations to relay the signals. The agents’ radios transmitted on one frequency and received on another; the repeaters had an input frequency to receive the agents’ transmissions, and an output frequency that the agents listened on. When I wanted to know if an agent was nearby, I simply monitored the signal strength on the repeater’s input frequency. That setup enabled me to play a little game. Whenever I heard any hiss of communication..."


Properly encrypted data is indistinguishable from random noise - aka ‘hiss’. If really good encrytion, it will be white noise (generally). Albeit will have more power.

If there is a clear pattern to it, then that’s either unencrypted framing, or bad encryption. (Think 90’s cable TV ‘scrambling’).


Not really true on modern digital radio systems. They are AES-256, but the voice frames are encrypted right after the vocoder does its thing, then the voice data is dropped into the stream just as if it were clear voice. It's all wrapped in the same same digital protocol (like P25 or numerous others), so the signal is very distinct in that encrypted and clear communications both sound the same to someone listening to the raw audio.


aka framing. which is literally why I wrote that.


Yes, but the interference was exactly the point. He didn't have to break the encryption in the sense of cryptanalysis or finding the key, he just had to make them think it was malfunctioning so they'd switch it off and he could listen at will


Not IA


What's IA?


Internal Affairs? But I'm not sure why that's relevant to encryption or Mitnick.


I have heard of them having stricter radio protocols which strikes me as sensible


Intelligence Agencies


There's the entertaining bit in the film The Imitation Game (the breaking of Enigma code by Alan Turing) where they realised that a weakness was the daily weather report always containing the words "weatherreport" and "heil bloody hitler" (with obvious addition!) https://www.youtube.com/shorts/fAsSNjedZWI or longer version: https://www.youtube.com/watch?v=SkETN-xENAM

Also a more proper explanation: https://www.youtube.com/watch?v=V4V2bpZlqx8


IIRC this is relatively close to what happened in real life. Enigma wasn't safe against chosen ciphertext attacks.


It's a perfect example of why security is never just about the algorithm


"Ghost in the Wires" was an amazing book. Everyone with an interest in technology should definitely read it




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: