SlideShare a Scribd company logo
1 of 10
Communication in an insecure world 
Harold Giddings 
KRØSIV
 Amateur radio operators are unable to utilize encryption. 
 This is almost entirely the fault of the old ham generation. 
 This generation is not interested in encryption or innovation. 
 Proposals for encryption were shutdown by HAMS not the FCC. 
 The State of Radio Data 
 Clear text 
 Location data 
 Hospital data 
 Personal data 
 Phone numbers 
 etc
 We simply are not authorized to encrypt data on the 
amateur radio bands. 
 There is little to nothing (without this) that can be 
done to secure data ‘in the air’ 
 However… 
 We can secure the data on our internet backlinks. 
and we should.
 Automated Packet Reporting System.. 
 Transmits location data as well as messages, weather, etc. 
 The APRS-IS Network is a back-end to the RF APRS Network. 
 APRS.fi 
 Website allows tracking of ALL APRS network users in real-time. 
 Website allows viewing of RAW data. 
 Findu.com 
 Website allows you to message anyone using unverified callsigns. 
 Website allows snooping. Ie: View messages between operators. 
 APRSMail 
 Winlink to aprs gateway. More on Winlink later.
 Winlink 
 The email to RF network bridge 
 Telnet backend 
 100% clear text 
 No Authentication or passwords 
 Very Exploitable 
 With a little scripting knowledge you can dump the emails of ALL 
winlink users. 
 Send emails from anyone's callsign email address
 I get it, we can’t encrypt over the radio right now. 
 What can we do? 
 Limit access to data over the internet 
 Encrypt the back-ends 
 Force password protection schemes 
 Provide documentation to allow developers to securely work with 
these networks.
 Fully encrypt the APRS-IS backend 
 Preventing users from blindly monitoring the network 
 Developers should have API keys where access is needed 
 APRS-fi 
 Hide ALL message data 
 Hide locations by default unless a user specifies public tracking 
 Findu.com 
 Shut this thing down –or 
 Validate ALL callsigns 
 Require registration and require a password 
 Do NOT allow blind monitoring of messages (encrypted backend)
 Force registration with a password 
 Validate the user with a callsign lookup 
 Encrypt your back-end 
 Shutdown your Telnet links
 Data within the APRS-IS networks can be gated to RF 
 A single attack could flood the APRS-IS network world-wide. 
 This flood could be spoofed to gate it to RF. 
 RF gated floods would lock up networks, air space, and cause FCC 
violations. 
 Email to APRS networks could allow dumping off user details. 
 Data within the Winlink system can be obtained 
 A single attacker with enough time could copy all user emails. 
 An attacker could send email using any hams callsign/address.
 It doesn’t have to be. 
 You now know what’s wrong, let’s see if anyone tries to 
fix it. 
 Before someone tries to attack these networks on a 
global scale.

More Related Content

What's hot

Bluetooth & Fiat
Bluetooth & FiatBluetooth & Fiat
Bluetooth & Fiatguest09f636
 
Building Cloud Applications Based On Zero Trust
Building Cloud Applications Based On Zero TrustBuilding Cloud Applications Based On Zero Trust
Building Cloud Applications Based On Zero TrustMahesh Patil
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
7.6.1
7.6.17.6.1
7.6.1UNAD
 
Economical wireless ip mesh radio shenzhen safe guard
Economical wireless ip mesh radio shenzhen safe guardEconomical wireless ip mesh radio shenzhen safe guard
Economical wireless ip mesh radio shenzhen safe guardErin Qiu
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaHanaysha
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAli Habeeb
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeleyjoebeone
 
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...Mike Maurer
 
Wireless penetration testing
Wireless penetration testingWireless penetration testing
Wireless penetration testingKamlesh Dhanwani
 
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh Ghodela
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh GhodelaDDoS in cloud computing | Distributed Denial of Service | Chandan Singh Ghodela
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh GhodelaChandan Singh Ghodela
 

What's hot (19)

Bluetooth & Fiat
Bluetooth & FiatBluetooth & Fiat
Bluetooth & Fiat
 
Building Cloud Applications Based On Zero Trust
Building Cloud Applications Based On Zero TrustBuilding Cloud Applications Based On Zero Trust
Building Cloud Applications Based On Zero Trust
 
Design a Network
Design a NetworkDesign a Network
Design a Network
 
Sub redes 2 practica
Sub redes 2 practicaSub redes 2 practica
Sub redes 2 practica
 
Ccna 1 8
Ccna 1  8Ccna 1  8
Ccna 1 8
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Data Manager 2.0
Data Manager 2.0Data Manager 2.0
Data Manager 2.0
 
7.6.1
7.6.17.6.1
7.6.1
 
Economical wireless ip mesh radio shenzhen safe guard
Economical wireless ip mesh radio shenzhen safe guardEconomical wireless ip mesh radio shenzhen safe guard
Economical wireless ip mesh radio shenzhen safe guard
 
Firewall arch by Tareq Hanaysha
Firewall arch by Tareq HanayshaFirewall arch by Tareq Hanaysha
Firewall arch by Tareq Hanaysha
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
 
Barriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC BerkeleyBarriers to TOR Research at UC Berkeley
Barriers to TOR Research at UC Berkeley
 
Bao cao vpn
Bao cao vpnBao cao vpn
Bao cao vpn
 
Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
 
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
VA National RTLS Conf Presentation 2 - SecurTRAK 433 vs WIFI & Zigbee by MGM ...
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Wireless penetration testing
Wireless penetration testingWireless penetration testing
Wireless penetration testing
 
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh Ghodela
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh GhodelaDDoS in cloud computing | Distributed Denial of Service | Chandan Singh Ghodela
DDoS in cloud computing | Distributed Denial of Service | Chandan Singh Ghodela
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 

Similar to Amateur Radio Security

Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
story 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdfstory 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdfANJANEYAINTERIOURGAL
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network securityRishabh Mehan
 
Air Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAir Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAirTight Networks
 
2600 v01 n06 (june 1984)
2600 v01 n06 (june 1984)2600 v01 n06 (june 1984)
2600 v01 n06 (june 1984)Felipe Prado
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSystem ID Warehouse
 
Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2Chema Alonso
 
IP For Broadcast Engineers
IP For Broadcast EngineersIP For Broadcast Engineers
IP For Broadcast EngineersKit Peters
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005Bill Drew
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 

Similar to Amateur Radio Security (20)

Askozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, EnglishAskozia VoIP Security white paper - 2017, English
Askozia VoIP Security white paper - 2017, English
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
ARP Spoofing.pptx
ARP Spoofing.pptxARP Spoofing.pptx
ARP Spoofing.pptx
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Wiretapping
WiretappingWiretapping
Wiretapping
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
story 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdfstory 1what is fiber opticFiber optic refers to the medium and.pdf
story 1what is fiber opticFiber optic refers to the medium and.pdf
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Oss web application and network security
Oss   web application and network securityOss   web application and network security
Oss web application and network security
 
Air Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan AnalysisAir Tight Airport Wi Fi Scan Analysis
Air Tight Airport Wi Fi Scan Analysis
 
2600 v01 n06 (june 1984)
2600 v01 n06 (june 1984)2600 v01 n06 (june 1984)
2600 v01 n06 (june 1984)
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 
Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2Asegúr@IT 7: Playing with Satellites 1.2
Asegúr@IT 7: Playing with Satellites 1.2
 
IP For Broadcast Engineers
IP For Broadcast EngineersIP For Broadcast Engineers
IP For Broadcast Engineers
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
LTEcloudSecurityIssuesTakeaways-GP
LTEcloudSecurityIssuesTakeaways-GPLTEcloudSecurityIssuesTakeaways-GP
LTEcloudSecurityIssuesTakeaways-GP
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Amateur Radio Security

  • 1. Communication in an insecure world Harold Giddings KRØSIV
  • 2.  Amateur radio operators are unable to utilize encryption.  This is almost entirely the fault of the old ham generation.  This generation is not interested in encryption or innovation.  Proposals for encryption were shutdown by HAMS not the FCC.  The State of Radio Data  Clear text  Location data  Hospital data  Personal data  Phone numbers  etc
  • 3.  We simply are not authorized to encrypt data on the amateur radio bands.  There is little to nothing (without this) that can be done to secure data ‘in the air’  However…  We can secure the data on our internet backlinks. and we should.
  • 4.  Automated Packet Reporting System..  Transmits location data as well as messages, weather, etc.  The APRS-IS Network is a back-end to the RF APRS Network.  APRS.fi  Website allows tracking of ALL APRS network users in real-time.  Website allows viewing of RAW data.  Findu.com  Website allows you to message anyone using unverified callsigns.  Website allows snooping. Ie: View messages between operators.  APRSMail  Winlink to aprs gateway. More on Winlink later.
  • 5.  Winlink  The email to RF network bridge  Telnet backend  100% clear text  No Authentication or passwords  Very Exploitable  With a little scripting knowledge you can dump the emails of ALL winlink users.  Send emails from anyone's callsign email address
  • 6.  I get it, we can’t encrypt over the radio right now.  What can we do?  Limit access to data over the internet  Encrypt the back-ends  Force password protection schemes  Provide documentation to allow developers to securely work with these networks.
  • 7.  Fully encrypt the APRS-IS backend  Preventing users from blindly monitoring the network  Developers should have API keys where access is needed  APRS-fi  Hide ALL message data  Hide locations by default unless a user specifies public tracking  Findu.com  Shut this thing down –or  Validate ALL callsigns  Require registration and require a password  Do NOT allow blind monitoring of messages (encrypted backend)
  • 8.  Force registration with a password  Validate the user with a callsign lookup  Encrypt your back-end  Shutdown your Telnet links
  • 9.  Data within the APRS-IS networks can be gated to RF  A single attack could flood the APRS-IS network world-wide.  This flood could be spoofed to gate it to RF.  RF gated floods would lock up networks, air space, and cause FCC violations.  Email to APRS networks could allow dumping off user details.  Data within the Winlink system can be obtained  A single attacker with enough time could copy all user emails.  An attacker could send email using any hams callsign/address.
  • 10.  It doesn’t have to be.  You now know what’s wrong, let’s see if anyone tries to fix it.  Before someone tries to attack these networks on a global scale.