Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Federal Public Safety Radios Have Security Flaws

Encrypted transmissions were often sent in the clear and university researchers were able to intercept sensitive traffic sent by law-enforcement officials, study finds.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
Portable radios federal law enforcement officials use to communicate with one another have security flaws that allowed researchers to intercept sensitive traffic on them, including information that could identify confidential informants and undercover agents, according to a new study.

Government public-safety personnel use VHF and UHF short-range handheld radios to speak to one another that are based on a series of protocols that include the security of the devices, according to a study by University of Pennsylvania researchers.

However, that protocol--called APCO Project 25, or P25--has "a number of limitations and weaknesses" that allow what is meant to be encrypted traffic to be intercepted by third parties, researchers found.

The Wall Street Journal first published the results of the study and also posted a link to it online.

University researchers Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman and Kevin Xu authored the study, called "Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System." They said they have contacted the federal government about their findings.

The researchers said they analyzed over-the-air P25 traffic being sent on the two-way radio systems and found that "a significant fraction" of sensitive data that was meant to be encrypted was actually sent in the clear, a fact that was undetected by other users.

To conduct the study, researchers built a P25 traffic interception system for federal frequency bands and operated it in two U.S. metropolitan areas over a two-year period. During that period, researchers noticed three scenarios in which sensitive traffic that was meant to be encrypted was sent in the clear: through individual error, group error or a keying failure.

In the first instance, at least one user would be transmitting in the clear but others were encrypted. However, the user or users in the clear would still receive encrypted traffic without it being detected, according to the study.

In the second instance, all of the users communicating on the devices were in the clear but believed they were operating in encrypted mode. In the third instance, one of the users didn't have the correct encryption key for a transmission and asked other users to switch to clear mode to communicate effectively.

In addition to information that could compromise undercover agents and confidential informants, researchers intercepted sensitive traffic during the study that included: names and locations of criminal investigative targets, including those involved in organized crime; locations and description of surveillance operatives and their vehicles; and plans for forthcoming arrest, raids and other confidential operations, according to the study.

The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15113
PUBLISHED: 2019-08-16
The companion-sitemap-generator plugin before 3.7.0 for WordPress has CSRF.
CVE-2019-15114
PUBLISHED: 2019-08-16
The formcraft-form-builder plugin before 1.2.2 for WordPress has CSRF.
CVE-2019-15115
PUBLISHED: 2019-08-16
The peters-login-redirect plugin before 2.9.2 for WordPress has CSRF.
CVE-2019-15116
PUBLISHED: 2019-08-16
The easy-digital-downloads plugin before 2.9.16 for WordPress has XSS related to IP address logging.
CVE-2017-18547
PUBLISHED: 2019-08-16
The nelio-ab-testing plugin before 4.6.4 for WordPress has CSRF in experiment forms.