Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Federal Public Safety Radios Have Security Flaws

Encrypted transmissions were often sent in the clear and university researchers were able to intercept sensitive traffic sent by law-enforcement officials, study finds.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
Portable radios federal law enforcement officials use to communicate with one another have security flaws that allowed researchers to intercept sensitive traffic on them, including information that could identify confidential informants and undercover agents, according to a new study.

Government public-safety personnel use VHF and UHF short-range handheld radios to speak to one another that are based on a series of protocols that include the security of the devices, according to a study by University of Pennsylvania researchers.

However, that protocol--called APCO Project 25, or P25--has "a number of limitations and weaknesses" that allow what is meant to be encrypted traffic to be intercepted by third parties, researchers found.

The Wall Street Journal first published the results of the study and also posted a link to it online.

University researchers Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman and Kevin Xu authored the study, called "Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System." They said they have contacted the federal government about their findings.

The researchers said they analyzed over-the-air P25 traffic being sent on the two-way radio systems and found that "a significant fraction" of sensitive data that was meant to be encrypted was actually sent in the clear, a fact that was undetected by other users.

To conduct the study, researchers built a P25 traffic interception system for federal frequency bands and operated it in two U.S. metropolitan areas over a two-year period. During that period, researchers noticed three scenarios in which sensitive traffic that was meant to be encrypted was sent in the clear: through individual error, group error or a keying failure.

In the first instance, at least one user would be transmitting in the clear but others were encrypted. However, the user or users in the clear would still receive encrypted traffic without it being detected, according to the study.

In the second instance, all of the users communicating on the devices were in the clear but believed they were operating in encrypted mode. In the third instance, one of the users didn't have the correct encryption key for a transmission and asked other users to switch to clear mode to communicate effectively.

In addition to information that could compromise undercover agents and confidential informants, researchers intercepted sensitive traffic during the study that included: names and locations of criminal investigative targets, including those involved in organized crime; locations and description of surveillance operatives and their vehicles; and plans for forthcoming arrest, raids and other confidential operations, according to the study.

The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this threat in check. Also in the new, all-digital issue of Dark Reading: Why focusing solely on your own company's security ignores the bigger picture. Download it now. (Free registration required.)


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.