• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Resources to stay safe and secure online

  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact
  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact

Comms Standard Used in Police and Army Radios Contains Backdoor

July 24, 2023 By Heinrich Long — 1 Comment
Comms Standard Used in Police and Army Radios Contains Backdoor

Dutch security researchers have discovered multiple vulnerabilities in TETRA (Terrestrial Trunked Radio), including a backdoor that allows attackers to easily decrypt encrypted communications.

TETRA is a radio communications standard used by police forces, government agencies, rail transportation, fire departments, and other mission-critical entities in over 100 countries worldwide since 1995. The standard relies on proprietary cryptographic algorithms named TEA (TETRA Encryption Algorithm), which are only distributed to a handful of select entities under very restrictive NDAs. Despite its omnipresence in the communication systems of vital agencies in so many countries, TETRA and its encryption have never been thoroughly scrutinized by security analysts.

A team of researchers in the Netherlands who reverse-engineered the standard and its algorithms discovered critical flaws, including one (CVE-2022-24402) in the TEA1 encryption algorithm that reduces the original 80-bit encryption key to such a small size that brute-forcing it on widely available hardware is trivial. This practically means that the TETRA contains a backdoor allowing anyone with knowledge of it to snoop into all radio communications that use the standard.

The second critical-severity flaw is CVE-2022-24401, concerning the reliance of the Air Interface Encryption (AIE) keystream generator on publicly broadcasted network times, which an attacker can easily acquire to perform decryption oracle attacks.

The researchers discovered three more flaws on TETRA, namely CVE-2022-24404, which concerns a lack of ciphertext authentication on AIE, potentially leading to malleability attacks, CVE-2022-24403, which is a weak obfuscation problem allowing user deanonymization, and CVE-2022-24400, a flaw in the authentication algorithm allows attackers to set the Derived Cypher Key (DCK) to 0.

The five flaws, collectively called ‘TETRA:BURST,’ were discovered in 2021 but were not made publicly available until now. Instead, the security researchers worked with the Dutch National Cyber Security Centre to notify impacted agencies, vendors, response teams, and other critical entities. NCSC has confirmed to the media that it informed the governments in Germany, the UK, Belgium, and Denmark, all users of the TETRA standard, that their radio communications are vulnerable to eavesdropping.

More information about TETRA:BURST and how the above flaws can be practically exploited in real-world scenarios will be disclosed in the upcoming BlackHat USA conference on August 9, 2023.

The discovery of the TETRA:BURST flaws, and especially a decryption backdoor, highlight the problem of using proprietary encryption algorithms instead of open-source tools that can be evaluated and scrutinized by a large community of researchers. The researchers underscore that similar problems were discovered in the past on other prominent standards like GSM (A5/1, A5/2), GPRS (GEA-1, GEA-2), GMR (GMR-1, GMR-2), and DECT (DSAA, DSC), which relied on closed-source design. Instead, the analysts call for adopting Kerckhoffs’s principle, which dictates that everything about a cryptographic system apart from the key should be public knowledge.

At this time, it is unknown if TETRA:BURST was exploited by malicious actors to intercept communications, how extensive or lengthy this exploitation might have been, and what secrets were stolen thanks to the weaknesses in the standard. Due to the passive way these flaws would be exploited, creating no detectable interference in the radio signals, they would leave no traces for the victims to realize the compromise.

Related Articles:

  • Signal Threatens to Leave UK Over New Law, Tutanota Pledges to Stay
  • Signal for Desktop is Vulnerable to Attachments Exposure
  • Skiff Mail Review
  • Apple iOS and macOS Impacted by New Bugs Bypassing Code Signing

About Heinrich Long

Heinrich is an associate editor for RestorePrivacy and veteran expert in the digital privacy field. He was born in a small town in the Midwest (USA) before setting sail for offshore destinations. Although he long chafed at the global loss of online privacy, after Edward Snowden’s revelations in 2013, Heinrich realized it was time to join the good fight for digital privacy rights. Heinrich enjoys traveling the world, while also keeping his location and digital tracks covered.

Reader Interactions

Comments

  1. User

    July 25, 2023

    Thanks a lot! for your post Heinrich. Very well documented.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sidebar

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

Restore Privacy Checklist

  1. Secure browser: Modified Firefox or Brave
  2. VPN: NordVPN [68% Off Coupon] or Surfshark
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure Messenger: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden

About

RestorePrivacy is a digital privacy advocacy group committed to helping people stay safe and secure online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), and sharing this information with others. See our mission here.

We’re available for Press and media inquiries here.

RestorePrivacy is also on Twitter

COPYRIGHT © 2023 RESTORE PRIVACY, LLC · PRIVACY POLICY · TERMS OF USE · CONTACT · SITEMAP