Encryption made for police and military radios may be easily cracked
Scope: TETRA vs. U.S. Systems
- Thread clarifies the Wired piece is about European TETRA; U.S. public safety mostly uses P25 (STARCOM, etc.).
- Commenters note P25 has its own issues (slow rollout of link-layer encryption, key management, active-tracking vulnerabilities), but is not “as crazy” as TETRA’s proprietary stack.
- Some regions run P25 with encryption mostly off, plus analog repeaters, partly for compatibility and simpler key handling; analog audio is often easier to understand at the edge of coverage.
Transparency vs. Operational Security
- Many residents value open scanners as real‑time oversight of police, seeing encryption as creating “secret police.”
- Others argue real‑time openness can help criminals evade police and that delayed public feeds (e.g., 30‑minute lag on decrypted audio) are a reasonable compromise.
- There’s disagreement on how often criminals practically use scanners; some see it as largely a police talking point, others think sophisticated actors absolutely will exploit any available tech.
- Strong undercurrent: in U.S. contexts with abusive or corrupt departments, people fear encryption primarily protects misbehaving officers, not the public.
RF Tracking, SDR, and Side Channels
- Several comments explore using SDR, ML, and direction-finding (e.g., KrakenRF-style arrays) to:
- Detect police presence via signal strength, trunked radio control traffic, or device beacons.
- Fingerprint individual transmitters or Bluetooth / body-cam MAC addresses.
- Examples include:
- Detecting police taser/bodycam OUIs via BLE scanners to spot unmarked cars.
- Using Wi‑Fi/Bluetooth MACs from in-car laptops or printers to detect nearby enforcement.
- Consensus: even with strong encryption, traffic analysis and RF emissions still leak useful information.
Security Design Failures & “Oldthink”
- Commenters criticize:
- Proprietary, secret crypto (ETSI blocking scrutiny for decades).
- Effective 56‑bit keying in 2020s‑era systems, which GPU clusters can brute-force cheaply.
- Treating encryption as a checkbox rather than a core requirement.
- Some note this reflects legacy military/telco mindset that assumed interception was hard, underestimating modern SDR and compute.
Related Vulnerabilities & Human Factors
- Replay and signaling issues: unencrypted or poorly protected control signals (e.g., tornado sirens, EAS tones) can be recorded and replayed; even encryption won’t help without anti‑replay.
- Historical anecdote: jamming or degrading encrypted radio can push operators to switch to clear mode, showing how procedures can defeat technical protections.
- Several point out that security isn’t just algorithms; behavior, key rotation, and deployment practices matter as much.