<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community:  IntSpired®</title>
    <description>The latest articles on DEV Community by  IntSpired® (@intspired).</description>
    <link>https://dev.to/intspired</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3885928%2Fc1a97114-c97b-407a-aa58-a259c0b82bdf.PNG</url>
      <title>DEV Community:  IntSpired®</title>
      <link>https://dev.to/intspired</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/intspired"/>
    <language>en</language>
    <item>
      <title>IMSI Catchers Don’t Break Encryption — They Exploit the Network</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Fri, 01 May 2026 16:25:51 +0000</pubDate>
      <link>https://dev.to/intspired/imsi-catchers-dont-break-encryption-they-exploit-the-network-5hc2</link>
      <guid>https://dev.to/intspired/imsi-catchers-dont-break-encryption-they-exploit-the-network-5hc2</guid>
      <description>&lt;p&gt;Most mobile devices will connect to any base station that appears legitimate.&lt;/p&gt;

&lt;p&gt;That behaviour is what makes IMSI catchers possible.&lt;/p&gt;

&lt;p&gt;Mobile devices use International Mobile Subscriber Identifiers (IMSI) to authenticate and communicate across cellular networks. IMSI catchers exploit this by impersonating legitimate base stations, causing nearby phones to connect to them instead of the real network.&lt;/p&gt;

&lt;p&gt;In doing so, they collect SIM and device identifiers (such as IMSI or IMEI), along with signalling metadata that can be used to estimate presence and rough location. This does not require breaking applications or accessing encrypted content. It relies entirely on standard network behaviour.&lt;/p&gt;

&lt;p&gt;These techniques exploit trust within the network itself, sometimes forcing devices onto older or less secure protocols. Although heavily regulated and detectable, their effectiveness highlights how much signalling information mobile networks already expose by design.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What to keep in mind when interpreting this data&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Mobile network data reflects connectivity, not people. It describes devices and sessions, not identity or human behaviour.
&lt;/li&gt;
&lt;li&gt;Convenience signals are often over-trusted. Networks prioritise availability and usability, not verification or assurance.
&lt;/li&gt;
&lt;li&gt;Risk increases in sensitive contexts. Meetings, travel, and safety-critical situations raise the cost of misinterpretation.
&lt;/li&gt;
&lt;li&gt;Continuous connectivity is not always necessary. Many activities do not require phones to remain connected at all times.
&lt;/li&gt;
&lt;li&gt;Decisions are more reliable when they do not depend entirely on phone location or connectivity data.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Illustrative examples of GSM signalling exposure&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqq2pc6ad6b3s5a1qhp5w.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqq2pc6ad6b3s5a1qhp5w.PNG" alt="GSM Downlink Signal Activity" width="748" height="710"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; GSM Downlink Signal Activity. &lt;br&gt;
Live cellular spectrum showing active network presence within range.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0bmtoed9a14w0ekphj2.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0bmtoed9a14w0ekphj2.PNG" alt="GSM signalling metadata output" width="743" height="657"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; GSM Signalling Metadata. &lt;br&gt;
Decoded broadcast data showing network identifiers and signalling information transmitted continuously by the network.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzv9f5jvhixxf4coz60az.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzv9f5jvhixxf4coz60az.PNG" alt="GSM data exposure table showing IMSI and network parameters" width="800" height="594"&gt;&lt;/a&gt;&lt;strong&gt;Image 3:&lt;/strong&gt; Associated GSM Data Exposure. &lt;br&gt;
Structured dataset linking identifiers (IMSI/TMSI) with network parameters and timestamps, enabling pattern and presence analysis over time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final point&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This isn’t about breaking encryption or accessing content. It’s about what is already exposed through normal network operation.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Understanding the signal is one thing. Interpreting the risk is another.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If it’s there, it’s observable.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;INTSPIRED®&lt;br&gt;
OFFENSIVE BY DESIGN. INTELLIGENT BY NATURE.&lt;/p&gt;

&lt;p&gt;Stay informed.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>wirelesssecurity</category>
      <category>rf</category>
      <category>threatintelligence</category>
    </item>
    <item>
      <title>RF Intelligence: The Attack Surface Your SIEM Can't See</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Thu, 30 Apr 2026 08:14:31 +0000</pubDate>
      <link>https://dev.to/intspired/rf-intelligence-the-attack-surface-your-siem-cant-see-4ij0</link>
      <guid>https://dev.to/intspired/rf-intelligence-the-attack-surface-your-siem-cant-see-4ij0</guid>
      <description>&lt;p&gt;RF signals don’t appear in logs.&lt;/p&gt;

&lt;p&gt;They pass through walls, bypass controls, and leave no trace.&lt;/p&gt;

&lt;p&gt;This article shows how RF activity can be detected and analysed outside of traditional security controls using a GNU Radio setup with a HackRF One. &lt;/p&gt;

&lt;p&gt;Most organisations monitor their networks extensively. Firewalls, SIEM platforms, EDR tools and intrusion detection systems continuously observe the digital perimeter. However, one attack surface is rarely monitored: the radio frequency spectrum inside the physical environment. &lt;/p&gt;

&lt;p&gt;A compromised device transmitting over RF, a covert hardware implant beaconing on a schedule, or a receiver positioned just outside a facility will not appear in traditional monitoring systems. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;If RF is not being monitored, there is a blind spot.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What This Setup Provides&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;• Wideband RF monitoring across the local environment &lt;br&gt;
• Identification of signal frequencies and behaviour &lt;br&gt;
• Power measurement for consistent analysis&lt;br&gt;
• Detection and investigation of unusual transmissions&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;RF Anomaly Detection Interface&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The setup uses a dual-panel interface for monitoring and inspection.&lt;/p&gt;

&lt;p&gt;The left panel provides wideband visibility across the monitored spectrum, allowing all active signals to be seen at a glance.&lt;/p&gt;

&lt;p&gt;The right panel provides focused inspection. Any signal identified in the wideband view can be selected and analysed in more detail, including centre frequency, bandwidth, signal structure and power relative to the noise floor.&lt;/p&gt;

&lt;p&gt;This creates a simple workflow: detect across the spectrum, then isolate and investigate. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Real Signal Detection&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx5ywp2ttdhxnt39oobk1.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx5ywp2ttdhxnt39oobk1.webp" alt="Wideband RF spectrum and selected signal" width="800" height="478"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; Wideband spectrum (left) and selected signal (right). A narrowband signal at 440 MHz is highlighted for closer inspection. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Signal 1 — 440.000 MHz&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This frequency sits outside the 433 MHz ISM allocation and within the 70 centimetre amateur radio band, subject to verification of local licensed activity.&lt;/p&gt;

&lt;p&gt;This is where RF monitoring moves into analysis.&lt;/p&gt;

&lt;p&gt;Key questions include whether the transmission is expected in the environment, whether there is a known licensed source, whether the signal aligns with known device behaviour, and whether it could represent unauthorised or anomalous activity.&lt;/p&gt;

&lt;p&gt;Initial capture indicated a strong local transmission. After gain adjustment, the signal resolved at approximately -72 dBFS, with a noise floor around -88 dBFS. &lt;/p&gt;

&lt;p&gt;No immediate indication of malicious behaviour was observed during initial analysis. However, the same process would apply when assessing unauthorised or covert transmissions.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffmbpgd04yaxiu2ncrqrk.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffmbpgd04yaxiu2ncrqrk.webp" alt="Narrowband RF signal at 433 MHz" width="800" height="477"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Narrowband RF signal at 433 MHz observed during monitoring.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Signal 2 — 433.000 MHz&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A second signal was observed, consistent with strong local transmission relative to the observed noise floor. &lt;/p&gt;

&lt;p&gt;This aligns with expected ISM band activity such as sensors, weather stations and consumer wireless devices, and was treated as part of the baseline RF environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Engineering the Setup&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxw9ui06snla44m0qu43a.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxw9ui06snla44m0qu43a.webp" alt="GNU Radio flowgraph for RF signal processing" width="800" height="367"&gt;&lt;/a&gt;&lt;strong&gt;Image 3:&lt;/strong&gt; GNU Radio flowgraph developed for RF signal processing.&lt;/p&gt;

&lt;p&gt;The underlying processing is implemented in GNU Radio Companion on DragonOS, using a HackRF One with a Diamond SRH789 antenna. &lt;/p&gt;

&lt;p&gt;Raw IQ data is captured from the HackRF and processed through an FFT-based processing chain. &lt;/p&gt;

&lt;p&gt;A 4096-point FFT converts the signal into the frequency domain, with Blackman-Harris windowing used to improve visibility of weaker signals near stronger ones.&lt;/p&gt;

&lt;p&gt;Signal power is calculated using magnitude squared conversion and normalised into dBFS, allowing measurements to be compared consistently.&lt;/p&gt;

&lt;p&gt;The system runs at a 20 Msps sample rate, covering roughly 20 MHz of bandwidth from 423 MHz to 443 MHz.&lt;/p&gt;

&lt;p&gt;This allows signals to be detected and analysed clearly rather than just observed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;RF Detection Compared to Traditional Sweepers&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Traditional RF sweepers indicate the presence of a signal but provide limited detail. &lt;/p&gt;

&lt;p&gt;This setup allows signals to be identified by frequency, measured, visualised across the spectrum and analysed in context. &lt;/p&gt;

&lt;p&gt;Rather than simply detecting activity, it makes it possible to assess whether a signal is expected or unusual.   &lt;/p&gt;

&lt;p&gt;This distinction is what separates intelligence from detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why RF Monitoring Matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most security programmes focus on networks, applications and endpoints.&lt;/p&gt;

&lt;p&gt;RF is rarely included, which creates an opportunity for activity that does not generate logs or alerts.&lt;/p&gt;

&lt;p&gt;Data can be transmitted out of a secure environment without touching the network. Devices can operate silently over RF for long periods. &lt;/p&gt;

&lt;p&gt;Signals can exist outside commonly monitored bands such as WiFi and Bluetooth.&lt;/p&gt;

&lt;p&gt;The RF environment inside a facility is an attack surface that traditional monitoring does not cover.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Field Collection Capability&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For on-site work away from the DragonOS setup, a PortaPack HM4 with an integrated HackRF One can be used for standalone field capture. &lt;/p&gt;

&lt;p&gt;This allows RF data to be collected without a laptop and stored for later analysis.&lt;/p&gt;

&lt;p&gt;Captured data can then be replayed through the same processing setup, keeping analysis consistent between live monitoring and post-capture review.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Future Development&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The current setup provides monitoring, detection and basic analysis.&lt;/p&gt;

&lt;p&gt;Future work will focus on building a baseline of expected RF activity and identifying deviations over time.&lt;/p&gt;

&lt;p&gt;This would allow more structured detection of unusual or unexpected signals.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If RF is not part of your security approach, it is worth considering.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;For organisations looking to better understand RF exposure and wireless risk, assessment beyond traditional controls may be required.&lt;/p&gt;

&lt;p&gt;Contact:&lt;br&gt;
&lt;a href="mailto:info@intspired.co.uk"&gt;info@intspired.co.uk&lt;/a&gt;&lt;br&gt;
&lt;a href="https://intspired.co.uk" rel="noopener noreferrer"&gt;https://intspired.co.uk&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IntSpired®&lt;/strong&gt;&lt;br&gt;
Offensive by Design. Intelligent by Nature.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>rfsecurity</category>
      <category>infosec</category>
      <category>wireless</category>
    </item>
    <item>
      <title>RF Exposure via Digital Speech Decoders</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Mon, 27 Apr 2026 06:41:45 +0000</pubDate>
      <link>https://dev.to/intspired/rf-exposure-via-digital-speech-decoders-213i</link>
      <guid>https://dev.to/intspired/rf-exposure-via-digital-speech-decoders-213i</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is intended to raise awareness of RF exposure and visibility, not to promote or enable misuse.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Software-defined radio is a genuine intelligence capability when used correctly.&lt;/p&gt;

&lt;p&gt;With tools like DSDPlus and low-cost SDR hardware, monitoring and interpreting unencrypted digital radio systems is now widely accessible across the UK and internationally.&lt;/p&gt;

&lt;p&gt;What was once specialist capability is now accessible with minimal experience.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjx2i0osu1xl1uwvxas5r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjx2i0osu1xl1uwvxas5r.png" alt="UHF Spectrum Survey — Automated Scanning Across Active Frequencies" width="800" height="386"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; UHF Spectrum Survey — Automated Scanning Across Active Frequencies.&lt;/p&gt;

&lt;p&gt;In practice, exposure goes beyond audio. It reveals talkgroup activity, device presence, and communication patterns over time.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7saick9qltpvnxmhcp1b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7saick9qltpvnxmhcp1b.png" alt="Real-Time Group Call Decoded — Radio ID Automatically Identified by DSDPlus" width="800" height="473"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Real-Time Group Call Decoded — Radio ID Automatically Identified by DSDPlus. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The UK RF Reality&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the UK, the most relevant and observable systems include:&lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;DMR (Digital Mobile Radio)&lt;/strong&gt; — widely used across security, logistics, construction, events, and commercial operations &lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;NXDN and digital PMR networks&lt;/strong&gt; — used across rail, industrial environments, and private deployments &lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;Amateur digital voice systems&lt;/strong&gt; — active, open, and often overlooked&lt;/p&gt;

&lt;p&gt;Public safety communications operate on Airwave (TETRA). The long-delayed transition to the Emergency Services Network (ESN) continues, with full migration still incomplete. While Airwave is designed with strong encryption, RF systems are only as secure as their configuration and operational use, and exposure is more commonly observed across less protected commercial systems.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Global Context&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Across other regions, the landscape shifts:&lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;P25 Phase 1 &amp;amp; 2&lt;/strong&gt; — widely used for public safety in the United States, Canada, and Australia &lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;DMR and NXDN&lt;/strong&gt; — widely deployed across commercial and private networks in Europe and parts of Asia &lt;/p&gt;

&lt;p&gt;What’s observable depends on the local RF environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Actually Matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is not about listening. It is about exposure.&lt;/p&gt;

&lt;p&gt;Whether in the public or private sector, unencrypted RF communications create a layer of visibility that is often overlooked.&lt;/p&gt;

&lt;p&gt;Even without focusing on voice, consistent monitoring allows patterns to be built around:&lt;/p&gt;

&lt;p&gt;• Talkgroup usage and communication structures &lt;br&gt;
• Device activity and presence over time &lt;br&gt;
• Shifts in operational tempo &lt;br&gt;
• Encrypted versus unencrypted behaviour&lt;/p&gt;

&lt;p&gt;These insights are not provided directly by the tools. They emerge through analysis of what is already being transmitted in the clear.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IntSpired Assessment&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As technology and threat actor capability evolve, RF is no longer just radio. It is an intelligence layer, and one that can be used against you.&lt;/p&gt;

&lt;p&gt;Most organisations focus on securing networks, not what those networks transmit.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If it is transmitting, it is detectable, analysable, and increasingly accessible to those who know where to look.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>rfexposure</category>
      <category>wirelesssecurity</category>
      <category>sdr</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Codename: TEMPEST — The real magnitude of an 80-year-old threat</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Fri, 24 Apr 2026 07:30:02 +0000</pubDate>
      <link>https://dev.to/intspired/codename-tempest-the-real-magnitude-of-an-80-year-old-threat-cjo</link>
      <guid>https://dev.to/intspired/codename-tempest-the-real-magnitude-of-an-80-year-old-threat-cjo</guid>
      <description>&lt;p&gt;&lt;em&gt;Most security focuses on networks and endpoints.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Very little attention is given to what devices emit into the physical environment.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This isn’t a dormant risk. It’s an unaddressed one.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In March 2026, U.S. lawmakers formally requested a renewed investigation into TEMPEST-related threats, citing:&lt;br&gt;
• Lack of public awareness&lt;br&gt;
• Absence of modern regulatory requirements for consumer devices&lt;br&gt;
• Potential exploitation by criminals, private investigators, and non-state actors&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsfpy640tvg2a2l0h9q5b.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsfpy640tvg2a2l0h9q5b.webp" alt="Highlighted excerpt from a U.S. Congressional letter referencing TEMPEST as a national security threat" width="727" height="128"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; Extract from Congressional letter (March 4, 2026) describing TEMPEST as a “serious national security threat”. &lt;/p&gt;

&lt;p&gt;The request highlights a critical point:&lt;br&gt;
The U.S. government has not conducted a follow-up review of this threat since 1986, despite the risk being known for over 80 years.&lt;br&gt;
The accompanying Congressional Research Service memorandum reinforces this, outlining:&lt;br&gt;
• The ability to reconstruct data from electromagnetic, acoustic, and RF emissions&lt;br&gt;
• That these techniques have been repeatedly rediscovered in academic research&lt;br&gt;
• That the equipment required to observe these emissions is now easily obtainable&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What TEMPEST is&lt;/strong&gt;&lt;br&gt;
TEMPEST refers to the unintentional electromagnetic emissions generated by electronic devices during operation.&lt;/p&gt;

&lt;p&gt;These emissions are not just noise.&lt;br&gt;
They can carry structured information.&lt;/p&gt;

&lt;p&gt;Under the right conditions, it is sometimes possible to reconstruct elements of what a system is processing, including screen content, signals, or data flows, from emitted RF energy.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This is a physical side-channel. It exists whether it is monitored or not.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu53tckl0k3i4oigi9c3b.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu53tckl0k3i4oigi9c3b.webp" alt="Reconstructed screen image generated from electromagnetic emissions using GNU Radio" width="800" height="438"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Simulated TEMPEST reconstruction using GNU Radio (gr-tempest open-source implementation)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The setup&lt;/strong&gt;&lt;br&gt;
From a practical standpoint, observing these emissions does not require exotic infrastructure.&lt;/p&gt;

&lt;p&gt;A typical research setup may include:&lt;br&gt;
• Software-defined radio platforms (e.g. HackRF class devices)&lt;br&gt;
• Near-field or directional antennas&lt;br&gt;
• Signal processing via tools such as GNU Radio&lt;/p&gt;

&lt;p&gt;With correct tuning and filtering, emissions from monitors, video cables, power lines, and internal components can be captured and analysed.&lt;/p&gt;

&lt;p&gt;Importantly:&lt;br&gt;
No network interaction is required.&lt;br&gt;
No system access is required.&lt;br&gt;
This is passive collection from the electromagnetic environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Beyond policy and classification, the underlying reality is simpler:&lt;/strong&gt;&lt;br&gt;
TEMPEST is often framed within classified programmes, hardened environments, and military-grade shielding.&lt;/p&gt;

&lt;p&gt;What determines the risk are three factors:&lt;br&gt;
• how detectable the emissions are&lt;br&gt;
• how far they travel&lt;br&gt;
• how much information they expose&lt;br&gt;
This shifts TEMPEST from a classified concern to a physical reality with direct operational implications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What the documents explicitly confirm&lt;/strong&gt;&lt;br&gt;
The CRS memo is very direct about how this works in practice:&lt;br&gt;
• &lt;strong&gt;Acoustic&lt;/strong&gt; — keystrokes can be derived from recorded typing sounds&lt;br&gt;
• &lt;strong&gt;RF&lt;/strong&gt; — emissions may be observable at distance under favourable conditions&lt;br&gt;
• &lt;strong&gt;Electromagnetic&lt;/strong&gt; — signals generated by internal currents can be measured and analysed&lt;br&gt;
It also confirms something often missed:&lt;br&gt;
These attacks rely on observing unintended signals generated during operation. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What has not changed&lt;/strong&gt;&lt;br&gt;
The same memorandum highlights a structural gap:&lt;br&gt;
• No uniform TEMPEST mitigation policy across U.S. government systems&lt;br&gt;
• No requirement for consumer device manufacturers to implement countermeasures&lt;br&gt;
• Limited public guidance despite long-standing awareness&lt;br&gt;
At the same time:&lt;br&gt;
• Techniques have been publicly demonstrated (2009–2022 research examples)&lt;br&gt;
• Methods now fall under what is broadly called side-channel attacks&lt;br&gt;
• The barrier to entry is no longer restricted to state actors&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threat level — low, but specific&lt;/strong&gt;&lt;br&gt;
For most organisations, TEMPEST does not present an immediate or scalable risk.&lt;br&gt;
Constraints remain significant:&lt;br&gt;
• Effective range is limited&lt;br&gt;
• Signal clarity degrades rapidly&lt;br&gt;
• Environmental RF noise introduces distortion&lt;br&gt;
• Skill and interpretation barriers are non-trivial&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;However, context matters.&lt;/strong&gt;&lt;br&gt;
In environments where:&lt;br&gt;
• systems are air-gapped&lt;br&gt;
• data sensitivity is high&lt;br&gt;
• physical proximity can be achieved&lt;br&gt;
TEMPEST becomes a relevant niche collection method.&lt;br&gt;
Not widespread.&lt;br&gt;
But not theoretical.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Closing note&lt;/strong&gt;&lt;br&gt;
Most organisations monitor networks, endpoints, and cloud environments.&lt;br&gt;
Very few consider what their systems emit into the physical environment. &lt;/p&gt;

&lt;p&gt;INTSPIRED®&lt;br&gt;
OFFENSIVE BY DESIGN. INTELLIGENT BY NATURE.&lt;/p&gt;

&lt;p&gt;Full references and further detail available in the article.&lt;/p&gt;

&lt;p&gt;• U.S. Congressional letter (March 2026)&lt;br&gt;
&lt;a href="https://www.wyden.senate.gov/imo/media/doc/wyden_gao_tempest_letter.pdf" rel="noopener noreferrer"&gt;https://www.wyden.senate.gov/imo/media/doc/wyden_gao_tempest_letter.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;• Congressional Research Service memorandum&lt;br&gt;
&lt;a href="https://www.wyden.senate.gov/imo/media/doc/memo_-_tempest.pdf" rel="noopener noreferrer"&gt;https://www.wyden.senate.gov/imo/media/doc/memo_-_tempest.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;• GNU Radio TEMPEST implementation (gr-tempest)&lt;br&gt;
&lt;a href="https://github.com/git-artes/gr-tempest" rel="noopener noreferrer"&gt;https://github.com/git-artes/gr-tempest&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>news</category>
      <category>security</category>
    </item>
    <item>
      <title>Wi-Fi Hacking Hype vs Reality</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Thu, 23 Apr 2026 07:00:46 +0000</pubDate>
      <link>https://dev.to/intspired/wi-fi-hacking-hype-vs-reality-148j</link>
      <guid>https://dev.to/intspired/wi-fi-hacking-hype-vs-reality-148j</guid>
      <description>&lt;p&gt;There is constant noise around “new” Wi-Fi hacking tools and techniques.&lt;/p&gt;

&lt;p&gt;Established reconnaissance platforms are presented as breakthrough capabilities.&lt;br&gt;
Handshake capture devices are often interpreted as automatically retrieving passwords.&lt;br&gt;
Deauthentication attacks are portrayed as systemic compromise events.&lt;/p&gt;

&lt;p&gt;Much of this reflects misunderstanding rather than cryptographic reality.&lt;/p&gt;

&lt;p&gt;To reset the narrative, we must separate RF visibility from real compromise and examine the capabilities and limitations of a select set of commonly referenced tools. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sparrow WiFi: An Example of Wireless Reconnaissance and Telemetry Analysis&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fij6ll52i2jup9ugd2sx4.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fij6ll52i2jup9ugd2sx4.webp" alt="Sparrow WiFi interface showing wireless network discovery, signal strength telemetry, and channel utilisation across 2.4 GHz and 5 GHz bands" width="800" height="346"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; Sparrow WiFi interface displaying wireless network discovery, signal strength telemetry, and channel utilisation across 2.4 GHz and 5 GHz bands.&lt;/p&gt;

&lt;p&gt;Sparrow WiFi is one example of a wireless reconnaissance and telemetry analysis tool used for site surveys and RF assessment.&lt;/p&gt;

&lt;p&gt;Tools in this category provide:&lt;/p&gt;

&lt;p&gt;• Network discovery&lt;br&gt;
• Signal strength analysis&lt;br&gt;
• Channel utilisation metrics&lt;br&gt;
• Security mode identification&lt;br&gt;
• GPS telemetry&lt;br&gt;
• SSID and BSSID mapping&lt;/p&gt;

&lt;p&gt;Their purpose is RF visibility and environmental analysis.&lt;br&gt;
They do not perform cryptographic attacks, bypass WPA3, or recover passwords.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;RF visibility does not by itself constitute network compromise.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pwnagotchi and “Password Catching&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcpt74eadn9ncpmli50oh.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcpt74eadn9ncpmli50oh.webp" alt="Folder containing captured WPA and WPA2 handshake packet capture files for offline analysis" width="800" height="331"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Captured WPA/WPA2 handshake packet files (.pcap) prepared for offline analysis in a controlled lab environment.&lt;/p&gt;

&lt;p&gt;Pwnagotchi automates the capture of WPA/WPA2 4-way authentication handshakes when a client associates with a network.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;It does not capture plaintext passwords.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;A captured handshake only enables offline password testing; it does not reveal the network key unless the passphrase can be correctly guessed.&lt;/p&gt;

&lt;p&gt;Recovering a passphrase therefore requires testing candidate passwords against authentication material derived from the 4-way handshake. Common approaches include:&lt;/p&gt;

&lt;p&gt;• GPU-accelerated password guessing&lt;br&gt;
• Dictionary attacks&lt;br&gt;
• Rule-based mutations&lt;br&gt;
• Hybrid attacks&lt;br&gt;
• Testing known breached credentials&lt;/p&gt;

&lt;p&gt;There is currently no known practical method to directly decrypt traffic from properly configured WPA2-AES or WPA3-SAE networks without knowledge of the network credential.&lt;/p&gt;

&lt;p&gt;This process does not break AES encryption. It simply tests candidate passwords against the captured handshake. If the passphrase is long, unique, and high entropy, the attack fails.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Strong credential hygiene defeats this class of attack.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Deauthentication Attacks Do Not Break Encryption&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Deauthentication attacks:&lt;/p&gt;

&lt;p&gt;• Force clients to disconnect&lt;br&gt;
• Trigger reauthentication attempts&lt;br&gt;
• May enable handshake capture in certain scenarios&lt;/p&gt;

&lt;p&gt;They do not:&lt;/p&gt;

&lt;p&gt;• Reveal passwords&lt;br&gt;
• Decrypt traffic&lt;br&gt;
• Break AES encryption&lt;/p&gt;

&lt;p&gt;Deauthentication is a disruption technique, not a cryptographic attack.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Networks using Management Frame Protection, defined in IEEE 802.11w, significantly reduce exposure to spoofed deauthentication and disassociation frames.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Even without Management Frame Protection, deauthentication creates an opportunity for capture, not automatic compromise.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Rainbow Tables and “Decryption” Claims&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Rainbow tables are precomputed lookup tables used to reverse hashes.&lt;/p&gt;

&lt;p&gt;In modern wireless assessments, they are rarely the primary method.&lt;/p&gt;

&lt;p&gt;In WPA2-PSK, the SSID is used as the salt in the PBKDF2 key derivation process. This means rainbow tables must be generated for a specific network name, which significantly limits practicality.&lt;/p&gt;

&lt;p&gt;In real-world assessments, GPU-accelerated offline password guessing is still far more common than maintaining large precomputed rainbow tables.&lt;/p&gt;

&lt;p&gt;Rainbow tables are effective only when:&lt;/p&gt;

&lt;p&gt;• Passwords are short&lt;br&gt;
• Passwords are common&lt;br&gt;
• Credentials are reused&lt;br&gt;
• The SSID is predictable and widely reused&lt;/p&gt;

&lt;p&gt;They do not defeat strong, high-entropy passphrases.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;There is no practical real-time decryption of properly configured WPA3-SAE networks.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AirSnitch and Client Isolation Research&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Research such as AirSnitch highlights weaknesses in certain implementations of client isolation on consumer routers.&lt;/p&gt;

&lt;p&gt;This is valuable work.&lt;/p&gt;

&lt;p&gt;However, it demonstrates configuration and architectural flaws in specific devices. It does not represent a universal break of Wi-Fi encryption.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The issue is implementation, not cryptography.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Channel Hopping: What It Actually Means&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Channel hopping is a scanning technique in which a wireless adapter cycles through Wi-Fi channels to observe activity.&lt;/p&gt;

&lt;p&gt;It does not refer to an access point changing its operating channel, which may occur automatically due to &lt;em&gt;interference or optimisation&lt;/em&gt; policies.&lt;/p&gt;

&lt;p&gt;It is also different from client roaming, where a device reassociates between access points or frequency bands.&lt;/p&gt;

&lt;p&gt;Because a single wireless radio can observe only one channel at a time, scanning tools rotate across channels to build broader visibility. Multi-radio monitoring systems can observe multiple channels simultaneously.&lt;/p&gt;

&lt;p&gt;This behaviour is common in:&lt;/p&gt;

&lt;p&gt;• Passive scanning&lt;br&gt;
• Wireless intrusion detection systems&lt;br&gt;
• Spectrum analysis&lt;br&gt;
• Site surveys&lt;br&gt;
• Security research&lt;/p&gt;

&lt;p&gt;The same physical limitation applies to attackers. To transmit deauthentication frames or conduct other active attacks, the radio must be tuned to the target’s channel. A single radio cannot transmit on multiple channels simultaneously.&lt;/p&gt;

&lt;p&gt;Channel hopping does not:&lt;/p&gt;

&lt;p&gt;• Bypass encryption&lt;br&gt;
• Defeat WPA2-AES&lt;br&gt;
• Defeat WPA3-SAE&lt;br&gt;
• Decrypt traffic&lt;br&gt;
• Grant network access&lt;/p&gt;

&lt;p&gt;It increases visibility. It does not create compromise.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Where Wi-Fi Actually Fails&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Wi-Fi compromise rarely occurs because encryption is broken. It more often results from operational and configuration weaknesses, including:&lt;/p&gt;

&lt;p&gt;• Weak or predictable passphrases&lt;br&gt;
• Reused credentials across networks or services&lt;br&gt;
• WPS enabled&lt;br&gt;
• Misconfigured wireless security settings&lt;br&gt;
• Flat network architecture with no segmentation&lt;br&gt;
• Poor monitoring or visibility of wireless activity&lt;br&gt;
• Exposed internal services accessible from the network&lt;br&gt;
• Weak authentication controls once network access is obtained&lt;br&gt;
• Unpatched access points or outdated firmware&lt;/p&gt;

&lt;p&gt;Once network access is gained, attackers often move laterally within the environment. The access point is rarely the final objective.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final Point&lt;/strong&gt;&lt;br&gt;
When modern Wi-Fi is properly configured, including:&lt;/p&gt;

&lt;p&gt;• WPA2-AES with strong, unique passphrases&lt;br&gt;
• WPA3-SAE&lt;br&gt;
• Management Frame Protection enabled (802.11w / PMF)&lt;br&gt;
• WPS disabled&lt;/p&gt;

&lt;p&gt;there is currently no known practical method for directly breaking the encryption in real-world conditions.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Modern Wi-Fi cryptography is rarely the weak link. Configuration and operational discipline are.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;INTSPIRED®&lt;br&gt;
Offensive by Design. Intelligent by Nature.&lt;br&gt;
&lt;/p&gt;
&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
        &lt;div class="c-embed__cover"&gt;
          &lt;a href="https://intspired.co.uk/" class="c-link align-middle" rel="noopener noreferrer"&gt;
            &lt;img alt="" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Fblob-715408b.png" height="1030" class="m-0" width="800"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="c-embed__body"&gt;
        &lt;h2 class="fs-xl lh-tight"&gt;
          &lt;a href="https://intspired.co.uk/" rel="noopener noreferrer" class="c-link"&gt;
            Home
          &lt;/a&gt;
        &lt;/h2&gt;
          &lt;p class="truncate-at-3"&gt;
            We apply intelligence-led methods to identify cyber and wireless risks before they can be exploited. 
          &lt;/p&gt;
        &lt;div class="color-secondary fs-s flex items-center"&gt;
            &lt;img alt="favicon" class="c-embed__favicon m-0 mr-2 radius-0" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Ffavicon%2Fc78cc70b-20d1-436d-a400-bc4aced9fc8d%2F17678838-ae76-4779-8645-6f8b4bcebf07.PNG%2F%3A%2Frs%3Dw%3A16%2Ch%3A16%2Cm" width="18" height="16"&gt;
          intspired.co.uk
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
      <category>cybersecurity</category>
      <category>wifipentesting</category>
      <category>wireless</category>
      <category>infosec</category>
    </item>
  </channel>
</rss>
