Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Federal Public Safety Radios Have Security Flaws

Encrypted transmissions were often sent in the clear and university researchers were able to intercept sensitive traffic sent by law-enforcement officials, study finds.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
Portable radios federal law enforcement officials use to communicate with one another have security flaws that allowed researchers to intercept sensitive traffic on them, including information that could identify confidential informants and undercover agents, according to a new study.

Government public-safety personnel use VHF and UHF short-range handheld radios to speak to one another that are based on a series of protocols that include the security of the devices, according to a study by University of Pennsylvania researchers.

However, that protocol--called APCO Project 25, or P25--has "a number of limitations and weaknesses" that allow what is meant to be encrypted traffic to be intercepted by third parties, researchers found.

The Wall Street Journal first published the results of the study and also posted a link to it online.

University researchers Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman and Kevin Xu authored the study, called "Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System." They said they have contacted the federal government about their findings.

The researchers said they analyzed over-the-air P25 traffic being sent on the two-way radio systems and found that "a significant fraction" of sensitive data that was meant to be encrypted was actually sent in the clear, a fact that was undetected by other users.

To conduct the study, researchers built a P25 traffic interception system for federal frequency bands and operated it in two U.S. metropolitan areas over a two-year period. During that period, researchers noticed three scenarios in which sensitive traffic that was meant to be encrypted was sent in the clear: through individual error, group error or a keying failure.

In the first instance, at least one user would be transmitting in the clear but others were encrypted. However, the user or users in the clear would still receive encrypted traffic without it being detected, according to the study.

In the second instance, all of the users communicating on the devices were in the clear but believed they were operating in encrypted mode. In the third instance, one of the users didn't have the correct encryption key for a transmission and asked other users to switch to clear mode to communicate effectively.

In addition to information that could compromise undercover agents and confidential informants, researchers intercepted sensitive traffic during the study that included: names and locations of criminal investigative targets, including those involved in organized crime; locations and description of surveillance operatives and their vehicles; and plans for forthcoming arrest, raids and other confidential operations, according to the study.

The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...