Custom Firmware for Encryption

ofd8001

Member
Premium Subscriber
Joined
Feb 6, 2004
Messages
8,077
Location
Louisville, KY
I know Unication receivers have a firmware "add-on" that will allow encryption, so I suspect this might be along those lines.

All that you'd need is to get the agency to reveal their key. I'm sure there are many, many ways of describing the unlikelihood of that happening.
 

BinaryMode

Blondie Once Said To Call Her But Never Answerd
Joined
Jul 3, 2023
Messages
887
Location
75 parsecs away
Yes, it's real and he should be using Monero rather than moron Tether as a crypto. You can also pay via PayPal (I wouldn't) who's stock is dropping. See my post here

As far as DES, read what it can do... LOL!
 

exkalibur

Member
Premium Subscriber
Joined
Aug 15, 2006
Messages
2,929
Location
York, Ontario
I used to work for the Navy as a senior radio maintenance technician repairing Motorola encrypted radios running DES encryption. Back in the day, if you bought a Mx-360 with the DES encryption boards, Motorola told me that it would take 20 years + using a fast computer running continously to find out a encryption key (if the key you're looking for was never changed - and I was the POC who changed the encryption keys routinely). So, without an encryption key, it's not gonna happen. I wouldn't use any firmware except what is approved by the manufacturer (Uniden). Unless you want to just buy a new scanner, because chances are you will brick it.

Given modern GPU abilities, I bet DES could be cracked in a couple of days. Hashcat is a wonderful thing.
 

n1chu

Member
Premium Subscriber
Joined
Oct 18, 2002
Messages
2,943
Location
Farmington, Connecticut
Intriguing, but I can’t get over how the radios follow the access keys when they are changed. The agency using the encryption does routine “handshakes” with each radio when they are attempting a transmission, each unit being registered with the controller. If the unit in question is not registered with the controller it is not recognized and therefore does not get the key needed to communicate. Even if you found a lost or stolen portable radio belonging to the agency, if it’s reported as lost or stolen, the system will locate said radio using GPS and it is recovered, even if the radio is turned off. If they can do that it means they can disable the radio remotely in addition to locating it. So, even with a key, what do you do when the key is changed? It’s my understanding they can set up the changing of keys anytime they choose, routinely changing keys on a daily basis, up to the minute basis or only when the need arises. But I am by no means an expert where encryption techniques are concerned and accept there are sensitive and proprietary reasons for its use, where the information conveyed is not for my ears so I don’t bother programming encrypted systems period. However, I do believe there are times it’s a needed mode and time where it’s not.
 

Ubbe

Member
Joined
Sep 8, 2006
Messages
9,769
Location
Stockholm, Sweden
The experimental firmware can only do static keys and any system that use dynamic keys, that gets sent out over the air to each radio and can be changed every day, are not supported. The system admin can probably set an encryption type to each TG and user so that dispatch calls only use a static key but swat teams also needs to use the dynamic key that doubles the key length.

/Ubbe
 

n1chu

Member
Premium Subscriber
Joined
Oct 18, 2002
Messages
2,943
Location
Farmington, Connecticut
The experimental firmware can only do static keys and any system that use dynamic keys, that gets sent out over the air to each radio and can be changed every day, are not supported. The system admin can probably set an encryption type to each TG and user so that dispatch calls only use a static key but swat teams also needs to use the dynamic key that doubles the key length.

/Ubbe
Thanks, that supports my rudimentary understanding of encryption.
 

dave3825

* * * * * * * * * * * *
Premium Subscriber
Joined
Feb 17, 2003
Messages
8,765
Location
Suffolk County NY
Don’t remember exactly its purpose but there was custom firmware in one of the fakebook uniden groups.

So it may have been this project by the same author @pb_lonny posted


openscanner​

Purpose of Custom Firmware​

The main purpose at the current stage is to support decryption of encrypted voice channels in the presence of an encryption key.

Additionally, the firmware has minor tweaks that make using the scanner more convenient:

  • Zip, F-Zip, Range key mapping
  • No band gaps
  • Show extended Net/System/Site/TG info for any custom search name
  • Extended Debug Logs
  • Unmute encripted voice traffic (optional)
  • Show Encryption Algo and Key ID
  • Show RSSI for BCD models
 

exkalibur

Member
Premium Subscriber
Joined
Aug 15, 2006
Messages
2,929
Location
York, Ontario
Intriguing, but I can’t get over how the radios follow the access keys when they are changed. The agency using the encryption does routine “handshakes” with each radio when they are attempting a transmission, each unit being registered with the controller. If the unit in question is not registered with the controller it is not recognized and therefore does not get the key needed to communicate. Even if you found a lost or stolen portable radio belonging to the agency, if it’s reported as lost or stolen, the system will locate said radio using GPS and it is recovered, even if the radio is turned off.

I think you'd be surprised how many agencies use static keys. If a radio is loaded with a key, and they aren't using OTAR, there is no handshake done; If the radio has the key, it will unmute. If a radio is stolen, they can inhibit the radio but it can't necessarily be located.
 

a727469

Active Member
Premium Subscriber
Joined
Jul 15, 2003
Messages
527
Location
Maine
It's not illegal on it's own, nor is it illegal to decrypt things you have legal access to. FUD
My post is not addressed directly to redbeard but to everyone…and I have very little knowledge in this area so pardon my stupidity and this is not to find fault with anyone’s interpretation, but I have gone back and read most past posts on decryption and frankly I have not seen a definitive explanation as to the true legality in the real world. Many theories and quotes of FCC docs etc., but none that actually address this.

Fortunately at this point I have no need in my area for decrypting, so this is strictly an interest, but I would love to see a legal, clear statement on this, not just interpreting what someone thinks it means. I assume there have been no test cases in court etc. Not sure what “legal access” means and how one judges.

As a final example, when voice inversion was being used, I do not believe anyone was convicted of a crime for “decrypting” this. I know I did it then. I am sure someone will say today is different but again just curious as to why.
Please criticize, flame me a bit and prove I am wrong as I really would like to learn something! Thanks.
 
Top