{"id":67716,"date":"2023-07-29T02:47:19","date_gmt":"2023-07-29T07:47:19","guid":{"rendered":"https:\/\/thetacticalhermit.com\/?p=67716"},"modified":"2023-07-29T02:47:19","modified_gmt":"2023-07-29T07:47:19","slug":"comm-corner-encrypted-radio-comms-compromised","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2023\/07\/29\/comm-corner-encrypted-radio-comms-compromised\/","title":{"rendered":"Comm Corner: Encrypted Radio Comms Compromised"},"content":{"rendered":"<h2 data-testid=\"ContentHeaderHed\">H\/T <a href=\"https:\/\/westernrifleshooters.us\/2023\/07\/28\/saturday-early-edition\/\">WRSA<\/a><\/h2>\n<p>&nbsp;<\/p>\n<h1 data-testid=\"ContentHeaderHed\"><\/h1>\n<h1 data-testid=\"ContentHeaderHed\"><img decoding=\"async\" loading=\"lazy\" class=\"size-large wp-image-67717 aligncenter\" src=\"https:\/\/thetacticalhermit.com\/wp-content\/uploads\/2023\/07\/Radio-1024x684.jpg\" alt=\"\" width=\"640\" height=\"428\" srcset=\"https:\/\/thetacticalhermit.com\/wp-content\/uploads\/2023\/07\/Radio-1024x684.jpg 1024w, https:\/\/thetacticalhermit.com\/wp-content\/uploads\/2023\/07\/Radio-300x200.jpg 300w, https:\/\/thetacticalhermit.com\/wp-content\/uploads\/2023\/07\/Radio-768x513.jpg 768w, https:\/\/thetacticalhermit.com\/wp-content\/uploads\/2023\/07\/Radio-850x567.jpg 850w, https:\/\/thetacticalhermit.com\/wp-content\/uploads\/2023\/07\/Radio.jpg 1200w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/h1>\n<h1 style=\"text-align: center;\"><a href=\"https:\/\/threadreaderapp.com\/thread\/1684623084228136960.html\">An Intentional Backdoor discovered in Encrypted Radio Comms used Globally for over 25 years.<\/a><\/h1>\n<p>&nbsp;<\/p>\n<h2>Via Source Article from <a href=\"https:\/\/www.wired.com\/story\/tetra-radio-encryption-backdoor\/\">WIRED.<\/a><\/h2>\n<p>&nbsp;<\/p>\n<blockquote>\n<div id=\"tweet_4\" class=\"content-tweet allow-preview\" dir=\"auto\" style=\"box-sizing: border-box; font-family: charter, Georgia, Cambria, 'times new roman', Times, serif; font-style: normal; font-size: 1.1875rem; line-height: 1.58; letter-spacing: -0.003em; margin-bottom: 1.25rem; overflow-wrap: break-word; color: #eeeeee; cursor: pointer; transition: all 1s ease 0s; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #15202b; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\" data-controller=\"thread\" data-action=\"click-&gt;thread#showTweet\" data-screenname=\"mattjay\" data-tweet=\"1684623108680847360\">This backdoor could allow someone to snoop on communications and potentially send harmful commands.<\/div>\n<div id=\"tweet_5\" class=\"content-tweet allow-preview\" dir=\"auto\" style=\"box-sizing: border-box; font-family: charter, Georgia, Cambria, 'times new roman', Times, serif; font-style: normal; font-size: 1.1875rem; line-height: 1.58; letter-spacing: -0.003em; margin-bottom: 1.25rem; overflow-wrap: break-word; color: #eeeeee; cursor: pointer; transition: all 1s ease 0s; background: #1e2e3e; border-radius: 5px; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\" data-controller=\"thread\" data-action=\"click-&gt;thread#showTweet\" data-screenname=\"mattjay\" data-tweet=\"1684623111109451776\">\n<p>The researchers also found a second vulnerability that could let someone decrypt encrypted voice and data communications and send fraudulent messages.<\/p>\n<p>This could be used to spread misinformation or redirect personnel and forces during critical times. \ud83d\udce1<\/p>\n<\/div>\n<div id=\"tweet_6\" class=\"content-tweet allow-preview\" dir=\"auto\" style=\"box-sizing: border-box; font-family: charter, Georgia, Cambria, 'times new roman', Times, serif; font-style: normal; font-size: 1.1875rem; line-height: 1.58; letter-spacing: -0.003em; margin-bottom: 1.25rem; overflow-wrap: break-word; color: #eeeeee; cursor: pointer; transition: all 1s ease 0s; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #15202b; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;\" data-controller=\"thread\" data-action=\"click-&gt;thread#showTweet\" data-screenname=\"mattjay\" data-tweet=\"1684623121297375232\">\n<p>These vulnerabilities are not just theoretical.<\/p>\n<p>TETRA radios are used in 2+ dozen critical infrastructure systems in the US.<\/p>\n<p>&#8211; Electric Utilities<br \/>\n&#8211; A State border control agency<br \/>\n&#8211; An oil refinery<br \/>\n&#8211; Chemical plants<br \/>\n&#8211; A major mass transit system on the East Coast.<\/p>\n<\/div>\n<\/blockquote>\n<h2 dir=\"auto\" data-controller=\"thread\" data-action=\"click-&gt;thread#showTweet\" data-screenname=\"mattjay\" data-tweet=\"1684623121297375232\"><\/h2>\n<h2 dir=\"auto\" data-controller=\"thread\" data-action=\"click-&gt;thread#showTweet\" data-screenname=\"mattjay\" data-tweet=\"1684623121297375232\">Pay Attention.<\/h2>\n<h2 dir=\"auto\" data-controller=\"thread\" data-action=\"click-&gt;thread#showTweet\" data-screenname=\"mattjay\" data-tweet=\"1684623121297375232\">You Might see this Material Again.<\/h2>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>H\/T WRSA &nbsp; An Intentional Backdoor discovered in Encrypted Radio Comms used Globally for over 25 years. &nbsp; Via Source Article from WIRED. &nbsp; This backdoor could allow someone to snoop on communications and potentially send harmful commands. The researchers also found a second vulnerability that could let someone decrypt encrypted voice and data communications&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[5581,5478,2805,2122,4479,65,272,3712,10,7357],"tags":[5001,16242,3084,16243,5002,9366,16142],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/67716"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=67716"}],"version-history":[{"count":4,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/67716\/revisions"}],"predecessor-version":[{"id":67721,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/67716\/revisions\/67721"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=67716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=67716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=67716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}