DEFCON 20: SIGINT and traffic analysis for the rest of us
At last Summer’s DEFCON 20 conference Sandy Clark and Matt Blaze from the University of Pennsylvania discussed their research into the security of the P25 (APCO Project 25) digital radio protocol. Here they explain the basics of the P25 protocol and examine some of the problems and flaws they uncovered in its security. They highlight passive attacks, where all the attacker needs to do is listen, exploiting usability and key management errors when they occur. They also explain their multi-city networked P25 interception infrastructure which they used to investigate the P25 security protocols in practice.This entry was posted in digital radio data, RF, security, Videos and tagged DEFCON 20, SIGINT.