• Pan0wski@infosec.pub
    link
    fedilink
    English
    arrow-up
    9
    ·
    1 year ago

    I find it fascinating how in the United States police radio communications aren’t encrypted and therefore anyone can listen to them. In my European country all emergency service communications are TETRA encrypted.

      • barsoap@lemm.ee
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        1 year ago

        EU security forces didn’t really care as TEA2 wasn’t backdoored. It’s a mid-90s standard with different encryption levels for different actors, it should be blindingly obvious that whatever is publicly available is backdoored. You may not like it, I do not like it, but it should’ve been obvious.

        The actual own goal was that while all EU security forces always had access to the secure stuff plenty of operators of critical infrastructure (think energy suppliers etc) used TEA1 as that’s what they were given. Also some EU forces bought TEA1 equipment presumably because they didn’t know what they were doing, with or without help from manufactures with an overstock of TEA1 radios.

        Here’s a 37c3 talk about the whole thing, from the people actually breaching the protocol.

        Aside from those encryption issues (which are finally getting addressed btw) TETRA is a great protocol, though. By now a bit dated so bandwidth isn’t exactly stellar (forget video streaming or such) but devices can talk directly to another just as in olden times, setting up a base station simply increases range, radio channels are now virtual, it’s all very sweet. Basically TETRA is to radio what GSM is to rotary phones. Which, as GSM phones don’t tend to be wired, makes a hell a lot more sense.