zlacker

[return to "Thousands are monitoring police scanners during the George Floyd protests"]
1. Simula+s7[view] [source] 2020-06-02 14:10:50
>>eloran+(OP)
Most of our local departments use encrypted radios.

"Over the past few years, an increasing number of municipalities and police departments, including the District’s, have begun encrypting their radioed communications.."[1.]

https://www.washingtonpost.com/local/social-issues/last-of-t...

◧◩
2. cwkoss+lv2[view] [source] 2020-06-03 06:03:44
>>Simula+s7
Does anyone have information about how frequently keys are rotated or exchanged? Seems like keeping 100 radios on the same channel could be hard to do without the potential for human error to leak some data - cops aren't typically very tech savvy.
◧◩◪
3. sneak+iN2[view] [source] 2020-06-03 09:03:35
>>cwkoss+lv2
The radios are re-keyed periodically over the air, or at least they can be. Not sure how often it happens in practice.

There’s also a capability, mandated by the federal interoperability standards (compliance with which federal free money to upgrade local PD radios hinges upon) to zeroize (erase/disable) encryption keys in a radio remotely, for example if one is lost or stolen, to prevent rogue network access.

Misuse of the rekeying admin keys to remotely disable police radios in bulk is a very interesting DoS, and one that should be noted well by (usually civilian outsourced) police radio maintenance admins presently reading this comment if cops or other users of these encrypted radio systems start being deployed to mass murder civilians.

As I understand it, the same interoperability protocols also can interrogate the radios for their locations if GPS equipped. (I have not personally read the spec docs yet.) I’d love to see the mashup made of that data, or an oversight organization using it to track criminal cops and parallel construction efforts.

[go to top]