Wednesday, September 20, 2006

Hezbolla cracked IDF radio codes

The story goes on to say IDF is using US gear. So if the story is true, then our stuff has been compromised as well. Its not much of a stretch to see Iran giving this technology to the Islamofascists in Iraq. In fact its a virtual certainty.

Hezbollah guerrillas were able to hack into Israeli radio communications during last month's battles in south Lebanon, an intelligence breakthrough that helped them thwart Israeli tank assaults, according to Hezbollah and Lebanese officials.

Using technology most likely supplied by Iran,...
H/T Snapped Shot


Wickedpinto said...

I wouldn't be surprised if it wasn't "hacked" but rather that a radio with a . . I think it's called a firefly key (we didn't use them very often, only with the trunks) or with a preset automated key exchange over a network.

So the bad guys get ahold of a radio, and there you have a compromised net. What you do, is you make the units change keys, and then adjust the updates.

I don't see how hizbollah could have succeeded in translating that much information fast enough for tactical success, maybe strategic, but I think that a key has a level of complexity with something like 16 zeros or something like that.

Oh, btw, I was a 2881, that was my job when I was in.

Purple Avenger said...

Key length is a big factor, but not the only one. There have been several apparently secure schemes that were defeated because the real world implementations were discovered to recycle much more frequently than had been presumed.

If the Hizb were making methodical recordings and relaying them back to Iran where a lot of compute power could be applied its possible this stuff was cracked.

Real time voice encryptions have to compromise complexity for the sake of not having noticible decode delays during a voice conversation.

The hope is that the enemy's computational decode time exceeds the useful shelf life of the real time data.

It should be noted that the Iranians are in posession of one of the faster super computing clusters in the world, so a hard mathematical brute force crack wouldn't necessarily be beyond their ability.