<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem:  IntSpired®</title>
    <description>The latest articles on Forem by  IntSpired® (@intspired).</description>
    <link>https://forem.com/intspired</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3885928%2Fc1a97114-c97b-407a-aa58-a259c0b82bdf.PNG</url>
      <title>Forem:  IntSpired®</title>
      <link>https://forem.com/intspired</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/intspired"/>
    <language>en</language>
    <item>
      <title>Satellite Signals Are Easier to Observe Than Many Realise</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Thu, 21 May 2026 17:31:34 +0000</pubDate>
      <link>https://forem.com/intspired/satellite-signals-are-easier-to-observe-than-many-realise-1pno</link>
      <guid>https://forem.com/intspired/satellite-signals-are-easier-to-observe-than-many-realise-1pno</guid>
      <description>&lt;p&gt;&lt;strong&gt;Satellite communications underpin much of the world’s connectivity.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Recent research, including a 2025 academic study, has shown that some GEO satellite links still carry clear-text IP traffic, exposing voice calls, SMS messages and operational data.&lt;/p&gt;

&lt;p&gt;These systems support cellular networks, aviation, maritime operations and remote infrastructure across vast regions.&lt;/p&gt;

&lt;p&gt;When transmissions are not properly encrypted, sensitive information can become observable to anyone capable of monitoring the RF spectrum.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Satellite Signal Observation&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo9sz20fufx94f2p5onix.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo9sz20fufx94f2p5onix.webp" alt="SDR monitoring setup used to observe satellite activity in real time" width="800" height="871"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; SDR monitoring setup used to observe satellite activity in real time.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffs71mkwahlhn831gagxc.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffs71mkwahlhn831gagxc.webp" alt="RF activity captured during a satellite pass, visible in the spectrum waterfall." width="800" height="526"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Signal activity captured during a satellite pass, visible in the spectrum waterfall.&lt;/p&gt;

&lt;p&gt;Much of this activity sits in a layer many organisations rarely monitor: the RF signals their systems depend on.&lt;/p&gt;

&lt;p&gt;As reliance on wireless and satellite-connected systems grows, understanding how signals behave across this space becomes increasingly important for modern security, resilience and intelligence work.&lt;/p&gt;

&lt;p&gt;At IntSpired, we analyse signal environments like these to help identify emerging exposure risks before they become operational problems.&lt;/p&gt;

&lt;p&gt;Research paper:&lt;br&gt;
&lt;a href="https://satcom.sysnet.ucsd.edu/docs/dontlookup_ccs25_fullpaper.pdf" rel="noopener noreferrer"&gt;https://satcom.sysnet.ucsd.edu/docs/dontlookup_ccs25_fullpaper.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;INTSPIRED®&lt;br&gt;
&lt;strong&gt;OFFENSIVE BY DESIGN. INTELLIGENT BY NATURE.&lt;/strong&gt;&lt;/p&gt;


&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
        &lt;div class="c-embed__cover"&gt;
          &lt;a href="https://intspired.co.uk/" class="c-link align-middle" rel="noopener noreferrer"&gt;
            &lt;img alt="" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Fblob-715408b.png" height="1030" class="m-0" width="800"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="c-embed__body"&gt;
        &lt;h2 class="fs-xl lh-tight"&gt;
          &lt;a href="https://intspired.co.uk/" rel="noopener noreferrer" class="c-link"&gt;
            IntSpired® | Offensive Cyber &amp;amp; Wireless Security | UK
          &lt;/a&gt;
        &lt;/h2&gt;
          &lt;p class="truncate-at-3"&gt;
             We test your defences the way adversaries would, under formal authorisation, to uncover what is actually exploitable. 
          &lt;/p&gt;
        &lt;div class="color-secondary fs-s flex items-center"&gt;
            &lt;img alt="favicon" class="c-embed__favicon m-0 mr-2 radius-0" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Ffavicon%2Fc78cc70b-20d1-436d-a400-bc4aced9fc8d%2F17678838-ae76-4779-8645-6f8b4bcebf07.PNG%2F%3A%2Frs%3Dw%3A16%2Ch%3A16%2Cm" width="18" height="16"&gt;
          intspired.co.uk
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
      <category>offensivesecurity</category>
      <category>wirelesssecurity</category>
      <category>rf</category>
      <category>sdr</category>
    </item>
    <item>
      <title>Bluetooth Exposure – Part 3</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Tue, 19 May 2026 05:53:20 +0000</pubDate>
      <link>https://forem.com/intspired/bluetooth-exposure-part-3-d06</link>
      <guid>https://forem.com/intspired/bluetooth-exposure-part-3-d06</guid>
      <description>&lt;p&gt;&lt;strong&gt;The Silent Signals You Never Realise You’re Broadcasting&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Long before digital navigation, reconnaissance teams relied on fieldcraft. Location was confirmed through resection: bearings plotted against known landmarks to determine position with precision.&lt;/p&gt;

&lt;p&gt;Today, devices perform those bearings automatically.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feyovrw3f8bgrrq5rut8r.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feyovrw3f8bgrrq5rut8r.webp" alt="traditional navigation to Wi-Fi probing and finally to BLE mesh networks" width="800" height="533"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; illustrates the shift from traditional navigation to Wi-Fi probing and finally to BLE mesh networks that quietly map presence and proximity through everyday devices.&lt;/p&gt;

&lt;p&gt;Modern phones broadcast continuously. Wi-Fi probes and Bluetooth Low Energy (BLE) signals reveal device presence the moment a device wakes, often long before any connection is made.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BLE takes this further&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Major technology ecosystems operate large-scale BLE mesh frameworks embedded into consumer devices. Phones, watches, earbuds, vehicles, trackers, and IoT products emit low-power beacons every few seconds. Nearby devices receive and relay them, extending the mesh.&lt;/p&gt;

&lt;p&gt;The result is ambient visibility.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fctw772jlwow6wxgjymme.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fctw772jlwow6wxgjymme.webp" alt="two BLE detection interfaces side by side" width="635" height="462"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; shows two BLE detection interfaces side by side. Together, they demonstrate how BLE broadcasts can be observed externally and used to assess presence, proximity, and movement patterns.&lt;/p&gt;

&lt;p&gt;No pairing.&lt;br&gt;
No password.&lt;br&gt;
No exploitation.&lt;/p&gt;

&lt;p&gt;This is simply how BLE operates.&lt;/p&gt;

&lt;p&gt;Over time, broadcast patterns can reveal behavioural rhythm: arrival times, devices that move together, and devices that separate. The exposure is not technical compromise, it is ambient metadata.&lt;/p&gt;

&lt;p&gt;The same radio landscape that exposes also protects.&lt;/p&gt;

&lt;p&gt;Understanding your own emissions helps identify anomalies, detect unknown trackers, and recognise unusual activity in your environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A simple starting point:&lt;/strong&gt;&lt;br&gt;
• Disable Bluetooth when not required&lt;br&gt;
• Review device privacy settings&lt;br&gt;
• Understand what your devices broadcast by default&lt;/p&gt;

&lt;p&gt;In a shared spectrum world, awareness is no longer optional.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If you do not understand your own emissions, someone else eventually will.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a class="mentioned-user" href="https://dev.to/intspired"&gt;@intspired&lt;/a&gt;® - Protecting your brand, your business, and your operations.&lt;/p&gt;


&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
        &lt;div class="c-embed__cover"&gt;
          &lt;a href="https://intspired.co.uk/home" class="c-link align-middle" rel="noopener noreferrer"&gt;
            &lt;img alt="" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Fblob-715408b.png" height="1030" class="m-0" width="800"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="c-embed__body"&gt;
        &lt;h2 class="fs-xl lh-tight"&gt;
          &lt;a href="https://intspired.co.uk/home" rel="noopener noreferrer" class="c-link"&gt;
            IntSpired® | Offensive Cyber &amp;amp; Wireless Security | UK
          &lt;/a&gt;
        &lt;/h2&gt;
          &lt;p class="truncate-at-3"&gt;
             We test your defences the way adversaries would, under formal authorisation, to uncover what is actually exploitable. 
          &lt;/p&gt;
        &lt;div class="color-secondary fs-s flex items-center"&gt;
            &lt;img alt="favicon" class="c-embed__favicon m-0 mr-2 radius-0" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Ffavicon%2Fc78cc70b-20d1-436d-a400-bc4aced9fc8d%2F17678838-ae76-4779-8645-6f8b4bcebf07.PNG%2F%3A%2Frs%3Dw%3A16%2Ch%3A16%2Cm" width="18" height="16"&gt;
          intspired.co.uk
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
      <category>bluetooth</category>
      <category>cybersecurity</category>
      <category>wirelesssecurity</category>
      <category>countersurveillance</category>
    </item>
    <item>
      <title>Bluetooth Exposure – Part 2</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Thu, 14 May 2026 07:11:07 +0000</pubDate>
      <link>https://forem.com/intspired/bluetooth-exposure-part-2-3k3b</link>
      <guid>https://forem.com/intspired/bluetooth-exposure-part-2-3k3b</guid>
      <description>&lt;p&gt;&lt;strong&gt;Understanding BLE Through Simple Threat Modelling&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most people do not realise how much their devices broadcast. Constantly. Passively. Often in plaintext. BLE may be low power, but from an attacker’s perspective it is highly informative.&lt;/p&gt;

&lt;p&gt;Last week we explored why Bluetooth remains an overlooked attack surface. This week we go deeper by applying simple threat modelling to show what an attacker actually sees and where the real exposures sit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Everyday BLE Ecosystem&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is the environment most people carry with them every day. A silent network of identifiers, telemetry and behavioural signals leaking into the air around you.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx9btrpfhwjc36bab9l08.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx9btrpfhwjc36bab9l08.webp" alt="BLE Device Ecosystem" width="800" height="442"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; BLE Device Ecosystem.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Smartwatch (Peripheral)&lt;/strong&gt; Continuously advertises identifiers, sensor values, motion events and sync activity. This alone is enough to build behavioural profiles.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bluetooth Earbuds (Peripheral)&lt;/strong&gt; Many models broadcast even while inside the charging case. They reveal identifiers, battery levels and reconnection attempts. This exposes presence, movement and proximity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Smart Lock (Peripheral)&lt;/strong&gt; Reveals device type, activity timing, connection attempts and lock state patterns.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Smartphone (Central)&lt;/strong&gt; Acts as the BLE hub. Constant scanning, pairing, reconnecting and exchanging data through OS services and installed apps.&lt;br&gt;
&lt;strong&gt;Cloud Services&lt;/strong&gt; Telemetry, identifiers and behavioural analytics flow upstream from associated apps. Once correlated, this becomes highly identifiable and highly valuable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why this ecosystem creates risk&lt;/strong&gt;&lt;br&gt;
Attackers do not need pairing. They do not need exploits. They only need to listen. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdlsvrv1k76p9ycrhrj0m.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdlsvrv1k76p9ycrhrj0m.webp" alt="ubertooth spectrum analyzer" width="708" height="427"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; shows the full 2.4 gigahertz environment: channel spikes, BLE bursts and hopping patterns, revealing activity density and where signals originate.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiqvppyitbte09vjchdhz.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fiqvppyitbte09vjchdhz.webp" alt="BLE MAC addresses, advertising data, service identifiers and device presence in real time" width="765" height="520"&gt;&lt;/a&gt;&lt;strong&gt;Image 3:&lt;/strong&gt; illustrates live BLE MAC addresses, advertising data, service identifiers and device presence in real time. This allows attackers to map devices, movement patterns, proximity and relationships. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0m5kfdbhzcmhxxltj89u.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0m5kfdbhzcmhxxltj89u.webp" alt="password sent from phone, intercepted via BLE UART, captured by Nordic Sniffer, shown in plaintext in Wireshark" width="800" height="532"&gt;&lt;/a&gt;&lt;strong&gt;Image 4:&lt;/strong&gt; password sent from phone, intercepted via BLE UART, captured by Nordic Sniffer, shown in plaintext in Wireshark.&lt;/p&gt;

&lt;p&gt;This is BLE without encryption or authentication. And many consumer IoT devices still work exactly like this.&lt;/p&gt;

&lt;p&gt;Plaintext BLE write operations may include: • passwords • PIN codes • actuator commands such as unlock or open • configuration values • sensor and status payloads&lt;/p&gt;

&lt;p&gt;If it is unencrypted, anyone in range can intercept it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Takeaway&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If a BLE device does not enforce encryption and authenticated pairing, everything it transmits is visible and can be captured by anyone in range.&lt;/p&gt;

&lt;p&gt;For red teams this is a powerful source of passive intelligence. For attackers it is trivial interception. For defenders it remains a major blind spot.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Next Week in Part 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Part 1&lt;/strong&gt; explored why Bluetooth remains a high-value vector and how attackers use BLE at the reconnaissance stage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Part 2&lt;/strong&gt; showed what an attacker can actually see, including live identifiers and plaintext BLE traffic.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Part 3&lt;/strong&gt; will move into the defensive and counter-surveillance side.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;We will look at:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;• Quick methods to reduce your BLE attack surface &lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;Surveillance and counter-surveillance&lt;/strong&gt; considerations&lt;/p&gt;

&lt;p&gt;• What attackers silently collect from BLE Radar-type tools • How to detect or disrupt unwanted BLE tracking &lt;/p&gt;

&lt;p&gt;• How attackers use signal strength and directional antennas to track BLE devices in the real world&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If you rely on BLE devices every day, Part 3 is the one you’ll want to read.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a class="mentioned-user" href="https://dev.to/intspired"&gt;@intspired&lt;/a&gt;®&lt;/strong&gt; - Protecting your brand, your business, and your operations.&lt;/p&gt;


&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
        &lt;div class="c-embed__cover"&gt;
          &lt;a href="https://intspired.co.uk/home" class="c-link align-middle" rel="noopener noreferrer"&gt;
            &lt;img alt="" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Fblob-715408b.png" height="1030" class="m-0" width="800"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="c-embed__body"&gt;
        &lt;h2 class="fs-xl lh-tight"&gt;
          &lt;a href="https://intspired.co.uk/home" rel="noopener noreferrer" class="c-link"&gt;
            IntSpired® | Offensive Cyber &amp;amp; Wireless Security | UK
          &lt;/a&gt;
        &lt;/h2&gt;
          &lt;p class="truncate-at-3"&gt;
             We test your defences the way adversaries would, under formal authorisation, to uncover what is actually exploitable. 
          &lt;/p&gt;
        &lt;div class="color-secondary fs-s flex items-center"&gt;
            &lt;img alt="favicon" class="c-embed__favicon m-0 mr-2 radius-0" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Ffavicon%2Fc78cc70b-20d1-436d-a400-bc4aced9fc8d%2F17678838-ae76-4779-8645-6f8b4bcebf07.PNG%2F%3A%2Frs%3Dw%3A16%2Ch%3A16%2Cm" width="18" height="16"&gt;
          intspired.co.uk
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
      <category>bluetooth</category>
      <category>cybersecurity</category>
      <category>pentesting</category>
      <category>wirelesssecurity</category>
    </item>
    <item>
      <title>Bluetooth Exposure – Part 1</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Sun, 10 May 2026 06:43:23 +0000</pubDate>
      <link>https://forem.com/intspired/bluetooth-exposure-part-1-34oe</link>
      <guid>https://forem.com/intspired/bluetooth-exposure-part-1-34oe</guid>
      <description>&lt;p&gt;&lt;strong&gt;Real-World Weaknesses | Awareness Series: Part 1 of 3&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Over the next few posts, I will explore the real cybersecurity risks behind Bluetooth and why individuals, homeowners and businesses routinely overlook this attack surface.&lt;/p&gt;

&lt;p&gt;Bluetooth is often treated as harmless background technology. In reality, it can reveal device presence, proximity, movement patterns and, in some cases, weak implementation choices that increase exposure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Classic Bluetooth vs BLE&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Classic Bluetooth is typically used for audio devices and higher-bandwidth data transfer.&lt;/p&gt;

&lt;p&gt;Bluetooth Low Energy, or BLE, is commonly used by beacons, trackers, wearables, IoT devices, smart locks and sensors.&lt;/p&gt;

&lt;p&gt;Both operate in the crowded 2.4 GHz ISM band. Both can broadcast information into the surrounding environment. That means both can create exposure, often without the user realising.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bluetooth Research Tools&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7xj5klg4oauhqj7s6qil.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7xj5klg4oauhqj7s6qil.webp" alt="a selection of tools commonly used to explore Bluetooth and BLE weaknesses" width="800" height="1046"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; shows a selection of tools commonly used to explore Bluetooth and BLE weaknesses.&lt;/p&gt;

&lt;p&gt;Highlighted is the Ubertooth One, a well-known device within the Bluetooth security research community. However, research and field experience show that it can be unreliable, and it is not usually the first tool I would reach for during practical assessments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bluetooth Exposure in the Real World&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu3e9l2uu7tzna5wzqmie.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu3e9l2uu7tzna5wzqmie.webp" alt="mobile apps can reveal Bluetooth devices nearby" width="508" height="461"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; demonstrates how easily freely available mobile apps can reveal Bluetooth devices nearby.&lt;/p&gt;

&lt;p&gt;Many of these apps are designed for legitimate diagnostics and device management. However, they also show why individuals and organisations should take Bluetooth exposure seriously.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Even without specialist knowledge, it is possible to identify:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;• Nearby devices currently broadcasting&lt;br&gt;
• Devices left in discoverable or pairable modes&lt;br&gt;
• Device names that unintentionally leak information&lt;br&gt;
• Signal strength, or RSSI, which can indicate proximity&lt;br&gt;
• Wearables, trackers, earbuds, speakers, locks and IoT equipment&lt;/p&gt;

&lt;p&gt;Some devices may also accept a connection without being bonded or paired, allowing applications to read or write characteristics. This is not advanced exploitation. It is usually a sign of weak device security and poor implementation.&lt;/p&gt;

&lt;p&gt;The same visibility that supports diagnostics can also allow environments to be passively mapped. Over time, this can reveal device presence, routines and behavioural patterns.&lt;/p&gt;

&lt;p&gt;Despite this, Bluetooth exposure remains widely underestimated. In certain conditions, it can contribute to privacy compromise, tracking, surveillance, or become part of a broader attack chain.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Simple Defensive Step&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before going deeper into the series, one simple defensive step everyone should follow is:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Turn Bluetooth off when you are not using it.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This significantly reduces exposure and prevents your device from broadcasting unnecessarily.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What This Series Will Cover&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This series will provide a high-level overview of:&lt;/p&gt;

&lt;p&gt;• Why Bluetooth remains a valuable vector for threat actors&lt;br&gt;
• How attackers use BLE during reconnaissance&lt;br&gt;
• What nearby devices can reveal without pairing&lt;br&gt;
• What your phone may broadcast without your knowledge&lt;br&gt;
• Tools defenders should understand&lt;br&gt;
• Quick ways to reduce Bluetooth exposure&lt;br&gt;
• Surveillance and counter-surveillance considerations&lt;/p&gt;

&lt;p&gt;Bluetooth may feel harmless, but it is not invisible. &lt;em&gt;Most people have no idea how much they are broadcasting until it is demonstrated to them.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;INTSPIRED® | Offensive by Design. Intelligent by Nature.&lt;/strong&gt;&lt;/p&gt;


&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
        &lt;div class="c-embed__cover"&gt;
          &lt;a href="https://intspired.co.uk/home" class="c-link align-middle" rel="noopener noreferrer"&gt;
            &lt;img alt="" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Fblob-715408b.png" height="1030" class="m-0" width="800"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="c-embed__body"&gt;
        &lt;h2 class="fs-xl lh-tight"&gt;
          &lt;a href="https://intspired.co.uk/home" rel="noopener noreferrer" class="c-link"&gt;
            IntSpired® | Offensive Cyber &amp;amp; Wireless Security | UK
          &lt;/a&gt;
        &lt;/h2&gt;
          &lt;p class="truncate-at-3"&gt;
             We test your defences the way adversaries would, under formal authorisation, to uncover what is actually exploitable. 
          &lt;/p&gt;
        &lt;div class="color-secondary fs-s flex items-center"&gt;
            &lt;img alt="favicon" class="c-embed__favicon m-0 mr-2 radius-0" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Ffavicon%2Fc78cc70b-20d1-436d-a400-bc4aced9fc8d%2F17678838-ae76-4779-8645-6f8b4bcebf07.PNG%2F%3A%2Frs%3Dw%3A16%2Ch%3A16%2Cm" width="18" height="16"&gt;
          intspired.co.uk
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
      <category>pentesting</category>
      <category>wirelesssecurity</category>
      <category>bluetooth</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>When a Radio Signal Stops a Train</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Thu, 07 May 2026 07:41:34 +0000</pubDate>
      <link>https://forem.com/intspired/when-a-radio-signal-stops-a-train-9d3</link>
      <guid>https://forem.com/intspired/when-a-radio-signal-stops-a-train-9d3</guid>
      <description>&lt;p&gt;A Taiwan high-speed rail incident from earlier this week is a sharp reminder that RF security is not a niche issue. It is part of critical infrastructure resilience.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr1v5ctgwtvv05q62k5p1.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr1v5ctgwtvv05q62k5p1.jpg" alt="Taiwan High Speed Rail — THSR 700T train on the Taipei–Kaohsiung line" width="800" height="520"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; Taiwan High Speed Rail — THSR 700T train on the Taipei–Kaohsiung line. Source: Wikimedia Commons&lt;/p&gt;

&lt;p&gt;Reports confirm a university student used consumer-grade SDR equipment to intercept, decode and clone TETRA radio parameters, then triggered a General Alarm signal that brought four high-speed trains to an emergency stop for 48 minutes. A 23-year-old student has since been arrested and is currently out on bail.&lt;/p&gt;

&lt;p&gt;The technical takeaway is clear. Parameters were cloned. Authentication was bypassed. And the equipment used was bought online.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpzu6k30urcarltyzsxns.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpzu6k30urcarltyzsxns.PNG" alt="Seized equipment" width="570" height="430"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Seized equipment. Source: Taoyuan District Prosecutors Office via CNA/Newtalk, 2026. &lt;a href="https://newtalk.tw/news/view/2026-04-30/1032591" rel="noopener noreferrer"&gt;https://newtalk.tw/news/view/2026-04-30/1032591&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;What this incident tells us is not just that the system was vulnerable. It tells us that the vulnerability had likely existed for years, undetected and untested. A radio enthusiast with off-the-shelf equipment, no insider access, and no advanced technical background was able to clone operational parameters and trigger the highest-priority alert in a national rail network.&lt;/p&gt;

&lt;p&gt;That is not a sophisticated attack. That is a gap that should have been identified in a security assessment long before it was exploited this way.&lt;/p&gt;

&lt;p&gt;The questions every critical infrastructure operator should be asking right now are simple. When did you last rotate your radio parameters? Have you ever tested whether your authentication can be bypassed from outside the network? Do you have any detection capability for rogue transmissions? Do you know where a rogue signal is coming from and how fast you can locate it? And if someone triggered a false alarm today, would your response procedures hold up?&lt;/p&gt;

&lt;p&gt;If any of those answers are uncertain, that is where to start.&lt;/p&gt;

&lt;p&gt;What good RF security looks like in these environments is not complicated in principle, but it is rarely done well in practice. It means treating radio as an attack surface from day one. Regular parameter rotation. Strong authentication on every device. Encryption that is actually tested, not just assumed. Logging and alerting on anomalous transmissions. Direction-finding capability so you can locate a rogue signal when it appears. And response procedures that have actually been exercised, not just written down.&lt;/p&gt;

&lt;p&gt;This is not about SDR being dangerous. SDR is a tool. The real issue is whether safety-critical communications have strong authentication, encryption, parameter rotation, logging, detection, direction-finding, and response processes around them.&lt;/p&gt;

&lt;p&gt;For rail, ports, airports, utilities, emergency services and other critical environments, RF should be treated as an attack surface, not background noise.&lt;/p&gt;

&lt;p&gt;Test it like it matters. Because it does.&lt;/p&gt;

&lt;p&gt;Further insights - Taipei Times: &lt;a href="https://www.taipeitimes.com/News/taiwan/archives/2026/05/05/2003856781" rel="noopener noreferrer"&gt;https://www.taipeitimes.com/News/taiwan/archives/2026/05/05/2003856781&lt;/a&gt;&lt;br&gt;
The Register: &lt;a href="https://www.theregister.com/cyber-crime/2026/05/06/taiwan-student-pwns-rail-comms-halts-high-speed-trains/5230489" rel="noopener noreferrer"&gt;https://www.theregister.com/cyber-crime/2026/05/06/taiwan-student-pwns-rail-comms-halts-high-speed-trains/5230489&lt;/a&gt;&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/keith-intspired" rel="noopener noreferrer"&gt;https://www.linkedin.com/in/keith-intspired&lt;/a&gt;&lt;br&gt;
IntSpired®: &lt;a href="https://www.intspired.co.uk" rel="noopener noreferrer"&gt;https://www.intspired.co.uk&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Cover image: Handheld radios seized during the investigation. Source: CTWANT/Weekly King via PChome News. &lt;a href="https://news.pchome.com.tw/society/crwant/20260501/index-77760091156668316002.html" rel="noopener noreferrer"&gt;https://news.pchome.com.tw/society/crwant/20260501/index-77760091156668316002.html&lt;/a&gt;&lt;/p&gt;

</description>
      <category>securityawareness</category>
      <category>criticalinfrastructure</category>
      <category>cybersecurity</category>
      <category>rfsecurity</category>
    </item>
    <item>
      <title>Femtocell Security Risks: Why Legacy Devices Are Still a Threat</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Tue, 05 May 2026 07:23:17 +0000</pubDate>
      <link>https://forem.com/intspired/femtocell-security-risks-why-legacy-devices-are-still-a-threat-10lg</link>
      <guid>https://forem.com/intspired/femtocell-security-risks-why-legacy-devices-are-still-a-threat-10lg</guid>
      <description>&lt;p&gt;Femtocells are low-power cellular base stations used in homes and small offices to improve indoor mobile coverage. They connect to the operator’s core network over broadband and broadcast a local cellular signal, typically covering 10 to 50 metres.&lt;br&gt;&lt;br&gt;
They operate within standard mobile infrastructure, using licensed spectrum such as:&lt;br&gt;
• 3G UMTS bands (Band 1 2100 MHz in the UK) &lt;br&gt;
• Some later units support LTE bands depending on deployment &lt;br&gt;
Unlike signal boosters, femtocells do not amplify an existing signal. They create a new one, and devices will automatically connect if it presents the strongest signal.        &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo39kw0efsocg71ua8yn6.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo39kw0efsocg71ua8yn6.webp" alt="A legacy femtocell device" width="800" height="433"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; Legacy femtocell device originally deployed by mobile networks, now circulating in secondary markets despite being phased out. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The issue&lt;/strong&gt;&lt;br&gt;
Femtocells extend the cellular network directly into private environments.&lt;br&gt;
• Traffic is routed through broadband&lt;br&gt;
• Devices connect based on signal strength, not trust&lt;br&gt;
• The cellular layer becomes localised and harder to monitor&lt;br&gt;
This creates a gap between:&lt;br&gt;
• What is visible on the IP network&lt;br&gt;
• What is happening over the air interface&lt;br&gt;
This is where visibility breaks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq4bysd9qdgthfs8g6hko.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq4bysd9qdgthfs8g6hko.webp" alt="Femtocell architecture highlighting the visibility gap between IP network monitoring and the air interface" width="800" height="403"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Femtocell architecture highlighting the visibility gap between IP network monitoring and the air interface.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to identify them&lt;/strong&gt;&lt;br&gt;
Femtocells are not visible through traditional network scanning.&lt;br&gt;
They are identified through signal behaviour.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Using mobile apps such as Network Cell Info Lite or NetMonster, look for:&lt;/em&gt;&lt;br&gt;
• Very strong signal indoors &lt;br&gt;
• Rapid signal drop when leaving the building &lt;br&gt;
• Unusual or isolated Cell ID&lt;br&gt;
• Cell location appearing extremely close or inaccurate&lt;br&gt;
If the cell is not mapped, it may indicate a small cell or femtocell. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw9q2kurbxg7o1513x4qc.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw9q2kurbxg7o1513x4qc.webp" alt="Analysing cellular signals using Network Cell Info Lite (left) and CellMapper (right) to identify signal strength, band, and local cell infrastructure." width="800" height="701"&gt;&lt;/a&gt;&lt;strong&gt;Image 3:&lt;/strong&gt; Analysing cellular signals using Network Cell Info Lite (left) and CellMapper (right) to identify signal strength, band, and local cell infrastructure.&lt;br&gt;
These are not just indicators. They reflect how femtocells operate at the network edge. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security implications&lt;/strong&gt;&lt;br&gt;
While modern units are more secure, historically femtocells have presented:&lt;br&gt;
• Firmware attack surface &lt;br&gt;
• Potential interception if compromised &lt;br&gt;
• Reliance on broadband&lt;br&gt;
• Single operator dependency &lt;br&gt;
They are trusted by design but deployed in uncontrolled environments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Still in circulation&lt;/strong&gt;&lt;br&gt;
Consumer femtocells have been phased out in the UK following 3G shutdowns.&lt;br&gt;
However:&lt;br&gt;
• Legacy devices remain active &lt;br&gt;
• Units are still being sold on secondary markets &lt;br&gt;
• Small cell technology continues in enterprise environments  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to reduce risk&lt;/strong&gt;&lt;br&gt;
• Use Wi-Fi Calling instead of legacy femtocell hardware &lt;br&gt;
• Avoid unsupported or second hand telecom devices&lt;br&gt;
• Monitor RF environments in sensitive locations&lt;br&gt;
• Validate unexpected strong indoor cellular signals&lt;br&gt;
• Treat local cellular infrastructure as part of the attack surface &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Takeaway&lt;/strong&gt;&lt;br&gt;
Femtocells highlight a fundamental issue.&lt;br&gt;
Security monitoring focuses on networks and endpoints.&lt;br&gt;
Cellular operates in RF. &lt;strong&gt;If you are not looking at the spectrum, you are not seeing the full environment.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;For more insight on wireless weaknesses, visit intspired.co.uk/blog&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;INTSPIRED®&lt;br&gt;
OFFENSIVE BY DESIGN. INTELLIGENT BY NATURE.&lt;/p&gt;

</description>
      <category>wirelesspentesting</category>
      <category>wirelesssecurity</category>
      <category>penetrationtesting</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Accessible, Documented, and Off Most Security Radars</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Sun, 03 May 2026 10:26:47 +0000</pubDate>
      <link>https://forem.com/intspired/accessible-documented-and-off-most-security-radars-5gj7</link>
      <guid>https://forem.com/intspired/accessible-documented-and-off-most-security-radars-5gj7</guid>
      <description>&lt;p&gt;Back in January, I wrote about how tools can be modified beyond their intended use. Not always with bad intent, but not always with good either. &lt;a href="https://intspired.co.uk/blog/f/beyond-the-surface" rel="noopener noreferrer"&gt;https://intspired.co.uk/blog/f/beyond-the-surface&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Since then, a few things caught my attention. Unrelated on the surface, but all wireless, all open, and all sitting just outside where most security teams are looking.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;A general-purpose device transmitting amateur radio&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7l5ri8wd79c9nkhgb41l.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7l5ri8wd79c9nkhgb41l.PNG" alt="Flipper Zero transmitting APRS signal demonstration setup" width="800" height="449"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; Amateur Radio Meets General-Purpose Hardware (Flipper Zero APRS setup).&lt;/p&gt;

&lt;p&gt;As a ham radio user, I came across a GitHub project by Richard YO3GND demonstrating a Flipper Zero transmitting APRS, a protocol typically associated with dedicated amateur radio equipment.&lt;/p&gt;

&lt;p&gt;It's experimental. Imperfect. Not something you'd stake your comms on.&lt;/p&gt;

&lt;p&gt;But that's not the point. The point is that a low cost, general-purpose device is now capable of emulating a specialised radio function simply by implementing the protocol in software. The hardware didn't change. The capability did.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Computer vision that sets up in minutes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx29om593oda605a5a23l.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx29om593oda605a5a23l.PNG" alt="Real-time face detection using OpenCV with bounding boxes on detected faces" width="639" height="480"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Real-Time Face Detection Using OpenCV — Accessible Computer Vision in Practice.&lt;/p&gt;

&lt;p&gt;Computer vision tools and the development solutions that support them aren't new. What's changed is the accessibility. Detection capability is no longer the barrier. Frameworks have been simplified to the point where a working setup can be running in minutes, on commodity hardware.&lt;/p&gt;

&lt;p&gt;The specialisation required has dropped dramatically. The output hasn't.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Passive detection at scale&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8c3mirsh5l4qcu0y1pi8.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8c3mirsh5l4qcu0y1pi8.PNG" alt="Seeed Studio XIAO ESP32S3 BLE detection device and map interface showing aggregated ALPR camera locations" width="800" height="258"&gt;&lt;/a&gt;&lt;strong&gt;Image 3:&lt;/strong&gt; From Detection Hardware to Crowdsourced Surveillance — Seeed Studio XIAO ESP32S3 and DeFlock Maps.&lt;/p&gt;

&lt;p&gt;Tools like OUI-SPY, built on hardware such as the Seeed Studio XIAO ESP32S3, can passively detect nearby Bluetooth and BLE broadcasts, flag recognised identifiers, and alert on known signal patterns without active probing. These tools aren't single-purpose, and the same understanding that enables detection can be used to avoid it.&lt;/p&gt;

&lt;p&gt;What happens when that detection is contributed at scale is a different question entirely. Platforms like DeFlock Maps illustrate it clearly. A crowdsourced ALPR surveillance map, DeFlock currently shows over 75,000 cameras in view across the US alone. Individual observations, aggregated, become infrastructure-level intelligence.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Transmit. See. Detect.&lt;/strong&gt; Three capabilities, three communities, all moving in the same direction: accessible, affordable, and functional enough to matter. Not theory. Right now.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why security teams should care&lt;/strong&gt;&lt;br&gt;
Most of these developments aren't appearing in threat intelligence feeds. They're appearing in radio groups, maker communities, and computer vision forums. The people building them aren't adversaries. They're curious, technically capable, and sharing their work openly.&lt;/p&gt;

&lt;p&gt;That openness is exactly what makes it relevant. Capability that's documented, reproducible, and discussable in public is already in play. The gap between innovation and risk is narrower than most organisations assume.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Awareness won't close that gap. But without it, you won't even know it exists.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If it's there, it's observable.&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;INTSPIRED®&lt;br&gt;
Offensive by design. Intelligent by nature&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>wireless</category>
      <category>opensource</category>
      <category>hardware</category>
    </item>
    <item>
      <title>IMSI Catchers Don’t Break Encryption — They Exploit the Network</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Fri, 01 May 2026 16:25:51 +0000</pubDate>
      <link>https://forem.com/intspired/imsi-catchers-dont-break-encryption-they-exploit-the-network-5hc2</link>
      <guid>https://forem.com/intspired/imsi-catchers-dont-break-encryption-they-exploit-the-network-5hc2</guid>
      <description>&lt;p&gt;Most mobile devices will connect to any base station that appears legitimate.&lt;/p&gt;

&lt;p&gt;That behaviour is what makes IMSI catchers possible.&lt;/p&gt;

&lt;p&gt;Mobile devices use International Mobile Subscriber Identifiers (IMSI) to authenticate and communicate across cellular networks. IMSI catchers exploit this by impersonating legitimate base stations, causing nearby phones to connect to them instead of the real network.&lt;/p&gt;

&lt;p&gt;In doing so, they collect SIM and device identifiers (such as IMSI or IMEI), along with signalling metadata that can be used to estimate presence and rough location. This does not require breaking applications or accessing encrypted content. It relies entirely on standard network behaviour.&lt;/p&gt;

&lt;p&gt;These techniques exploit trust within the network itself, sometimes forcing devices onto older or less secure protocols. Although heavily regulated and detectable, their effectiveness highlights how much signalling information mobile networks already expose by design.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What to keep in mind when interpreting this data&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Mobile network data reflects connectivity, not people. It describes devices and sessions, not identity or human behaviour.
&lt;/li&gt;
&lt;li&gt;Convenience signals are often over-trusted. Networks prioritise availability and usability, not verification or assurance.
&lt;/li&gt;
&lt;li&gt;Risk increases in sensitive contexts. Meetings, travel, and safety-critical situations raise the cost of misinterpretation.
&lt;/li&gt;
&lt;li&gt;Continuous connectivity is not always necessary. Many activities do not require phones to remain connected at all times.
&lt;/li&gt;
&lt;li&gt;Decisions are more reliable when they do not depend entirely on phone location or connectivity data.
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Illustrative examples of GSM signalling exposure&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqq2pc6ad6b3s5a1qhp5w.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqq2pc6ad6b3s5a1qhp5w.PNG" alt="GSM Downlink Signal Activity" width="748" height="710"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; GSM Downlink Signal Activity. &lt;br&gt;
Live cellular spectrum showing active network presence within range.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0bmtoed9a14w0ekphj2.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb0bmtoed9a14w0ekphj2.PNG" alt="GSM signalling metadata output" width="743" height="657"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; GSM Signalling Metadata. &lt;br&gt;
Decoded broadcast data showing network identifiers and signalling information transmitted continuously by the network.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzv9f5jvhixxf4coz60az.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzv9f5jvhixxf4coz60az.PNG" alt="GSM data exposure table showing IMSI and network parameters" width="800" height="594"&gt;&lt;/a&gt;&lt;strong&gt;Image 3:&lt;/strong&gt; Associated GSM Data Exposure. &lt;br&gt;
Structured dataset linking identifiers (IMSI/TMSI) with network parameters and timestamps, enabling pattern and presence analysis over time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final point&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This isn’t about breaking encryption or accessing content. It’s about what is already exposed through normal network operation.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Understanding the signal is one thing. Interpreting the risk is another.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If it’s there, it’s observable.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;INTSPIRED®&lt;br&gt;
OFFENSIVE BY DESIGN. INTELLIGENT BY NATURE.&lt;/p&gt;

&lt;p&gt;Stay informed.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>wirelesssecurity</category>
      <category>rf</category>
      <category>threatintelligence</category>
    </item>
    <item>
      <title>RF Intelligence: The Attack Surface Your SIEM Can't See</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Thu, 30 Apr 2026 08:14:31 +0000</pubDate>
      <link>https://forem.com/intspired/rf-intelligence-the-attack-surface-your-siem-cant-see-4ij0</link>
      <guid>https://forem.com/intspired/rf-intelligence-the-attack-surface-your-siem-cant-see-4ij0</guid>
      <description>&lt;p&gt;RF signals don’t appear in logs.&lt;/p&gt;

&lt;p&gt;They pass through walls, bypass controls, and leave no trace.&lt;/p&gt;

&lt;p&gt;This article shows how RF activity can be detected and analysed outside of traditional security controls using a GNU Radio setup with a HackRF One. &lt;/p&gt;

&lt;p&gt;Most organisations monitor their networks extensively. Firewalls, SIEM platforms, EDR tools and intrusion detection systems continuously observe the digital perimeter. However, one attack surface is rarely monitored: the radio frequency spectrum inside the physical environment. &lt;/p&gt;

&lt;p&gt;A compromised device transmitting over RF, a covert hardware implant beaconing on a schedule, or a receiver positioned just outside a facility will not appear in traditional monitoring systems. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;If RF is not being monitored, there is a blind spot.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What This Setup Provides&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;• Wideband RF monitoring across the local environment &lt;br&gt;
• Identification of signal frequencies and behaviour &lt;br&gt;
• Power measurement for consistent analysis&lt;br&gt;
• Detection and investigation of unusual transmissions&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;RF Anomaly Detection Interface&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The setup uses a dual-panel interface for monitoring and inspection.&lt;/p&gt;

&lt;p&gt;The left panel provides wideband visibility across the monitored spectrum, allowing all active signals to be seen at a glance.&lt;/p&gt;

&lt;p&gt;The right panel provides focused inspection. Any signal identified in the wideband view can be selected and analysed in more detail, including centre frequency, bandwidth, signal structure and power relative to the noise floor.&lt;/p&gt;

&lt;p&gt;This creates a simple workflow: detect across the spectrum, then isolate and investigate. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Real Signal Detection&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx5ywp2ttdhxnt39oobk1.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fx5ywp2ttdhxnt39oobk1.webp" alt="Wideband RF spectrum and selected signal" width="800" height="478"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; Wideband spectrum (left) and selected signal (right). A narrowband signal at 440 MHz is highlighted for closer inspection. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Signal 1 — 440.000 MHz&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This frequency sits outside the 433 MHz ISM allocation and within the 70 centimetre amateur radio band, subject to verification of local licensed activity.&lt;/p&gt;

&lt;p&gt;This is where RF monitoring moves into analysis.&lt;/p&gt;

&lt;p&gt;Key questions include whether the transmission is expected in the environment, whether there is a known licensed source, whether the signal aligns with known device behaviour, and whether it could represent unauthorised or anomalous activity.&lt;/p&gt;

&lt;p&gt;Initial capture indicated a strong local transmission. After gain adjustment, the signal resolved at approximately -72 dBFS, with a noise floor around -88 dBFS. &lt;/p&gt;

&lt;p&gt;No immediate indication of malicious behaviour was observed during initial analysis. However, the same process would apply when assessing unauthorised or covert transmissions.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffmbpgd04yaxiu2ncrqrk.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffmbpgd04yaxiu2ncrqrk.webp" alt="Narrowband RF signal at 433 MHz" width="800" height="477"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Narrowband RF signal at 433 MHz observed during monitoring.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Signal 2 — 433.000 MHz&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A second signal was observed, consistent with strong local transmission relative to the observed noise floor. &lt;/p&gt;

&lt;p&gt;This aligns with expected ISM band activity such as sensors, weather stations and consumer wireless devices, and was treated as part of the baseline RF environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Engineering the Setup&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxw9ui06snla44m0qu43a.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxw9ui06snla44m0qu43a.webp" alt="GNU Radio flowgraph for RF signal processing" width="800" height="367"&gt;&lt;/a&gt;&lt;strong&gt;Image 3:&lt;/strong&gt; GNU Radio flowgraph developed for RF signal processing.&lt;/p&gt;

&lt;p&gt;The underlying processing is implemented in GNU Radio Companion on DragonOS, using a HackRF One with a Diamond SRH789 antenna. &lt;/p&gt;

&lt;p&gt;Raw IQ data is captured from the HackRF and processed through an FFT-based processing chain. &lt;/p&gt;

&lt;p&gt;A 4096-point FFT converts the signal into the frequency domain, with Blackman-Harris windowing used to improve visibility of weaker signals near stronger ones.&lt;/p&gt;

&lt;p&gt;Signal power is calculated using magnitude squared conversion and normalised into dBFS, allowing measurements to be compared consistently.&lt;/p&gt;

&lt;p&gt;The system runs at a 20 Msps sample rate, covering roughly 20 MHz of bandwidth from 423 MHz to 443 MHz.&lt;/p&gt;

&lt;p&gt;This allows signals to be detected and analysed clearly rather than just observed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;RF Detection Compared to Traditional Sweepers&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Traditional RF sweepers indicate the presence of a signal but provide limited detail. &lt;/p&gt;

&lt;p&gt;This setup allows signals to be identified by frequency, measured, visualised across the spectrum and analysed in context. &lt;/p&gt;

&lt;p&gt;Rather than simply detecting activity, it makes it possible to assess whether a signal is expected or unusual.   &lt;/p&gt;

&lt;p&gt;This distinction is what separates intelligence from detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why RF Monitoring Matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most security programmes focus on networks, applications and endpoints.&lt;/p&gt;

&lt;p&gt;RF is rarely included, which creates an opportunity for activity that does not generate logs or alerts.&lt;/p&gt;

&lt;p&gt;Data can be transmitted out of a secure environment without touching the network. Devices can operate silently over RF for long periods. &lt;/p&gt;

&lt;p&gt;Signals can exist outside commonly monitored bands such as WiFi and Bluetooth.&lt;/p&gt;

&lt;p&gt;The RF environment inside a facility is an attack surface that traditional monitoring does not cover.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Field Collection Capability&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For on-site work away from the DragonOS setup, a PortaPack HM4 with an integrated HackRF One can be used for standalone field capture. &lt;/p&gt;

&lt;p&gt;This allows RF data to be collected without a laptop and stored for later analysis.&lt;/p&gt;

&lt;p&gt;Captured data can then be replayed through the same processing setup, keeping analysis consistent between live monitoring and post-capture review.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Future Development&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The current setup provides monitoring, detection and basic analysis.&lt;/p&gt;

&lt;p&gt;Future work will focus on building a baseline of expected RF activity and identifying deviations over time.&lt;/p&gt;

&lt;p&gt;This would allow more structured detection of unusual or unexpected signals.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If RF is not part of your security approach, it is worth considering.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;For organisations looking to better understand RF exposure and wireless risk, assessment beyond traditional controls may be required.&lt;/p&gt;

&lt;p&gt;Contact:&lt;br&gt;
&lt;a href="mailto:info@intspired.co.uk"&gt;info@intspired.co.uk&lt;/a&gt;&lt;br&gt;
&lt;a href="https://intspired.co.uk" rel="noopener noreferrer"&gt;https://intspired.co.uk&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IntSpired®&lt;/strong&gt;&lt;br&gt;
Offensive by Design. Intelligent by Nature.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>rfsecurity</category>
      <category>infosec</category>
      <category>wireless</category>
    </item>
    <item>
      <title>RF Exposure via Digital Speech Decoders</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Mon, 27 Apr 2026 06:41:45 +0000</pubDate>
      <link>https://forem.com/intspired/rf-exposure-via-digital-speech-decoders-213i</link>
      <guid>https://forem.com/intspired/rf-exposure-via-digital-speech-decoders-213i</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is intended to raise awareness of RF exposure and visibility, not to promote or enable misuse.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Software-defined radio is a genuine intelligence capability when used correctly.&lt;/p&gt;

&lt;p&gt;With tools like DSDPlus and low-cost SDR hardware, monitoring and interpreting unencrypted digital radio systems is now widely accessible across the UK and internationally.&lt;/p&gt;

&lt;p&gt;What was once specialist capability is now accessible with minimal experience.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjx2i0osu1xl1uwvxas5r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjx2i0osu1xl1uwvxas5r.png" alt="UHF Spectrum Survey — Automated Scanning Across Active Frequencies" width="800" height="386"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; UHF Spectrum Survey — Automated Scanning Across Active Frequencies.&lt;/p&gt;

&lt;p&gt;In practice, exposure goes beyond audio. It reveals talkgroup activity, device presence, and communication patterns over time.  &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7saick9qltpvnxmhcp1b.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7saick9qltpvnxmhcp1b.png" alt="Real-Time Group Call Decoded — Radio ID Automatically Identified by DSDPlus" width="800" height="473"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Real-Time Group Call Decoded — Radio ID Automatically Identified by DSDPlus. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The UK RF Reality&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In the UK, the most relevant and observable systems include:&lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;DMR (Digital Mobile Radio)&lt;/strong&gt; — widely used across security, logistics, construction, events, and commercial operations &lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;NXDN and digital PMR networks&lt;/strong&gt; — used across rail, industrial environments, and private deployments &lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;Amateur digital voice systems&lt;/strong&gt; — active, open, and often overlooked&lt;/p&gt;

&lt;p&gt;Public safety communications operate on Airwave (TETRA). The long-delayed transition to the Emergency Services Network (ESN) continues, with full migration still incomplete. While Airwave is designed with strong encryption, RF systems are only as secure as their configuration and operational use, and exposure is more commonly observed across less protected commercial systems.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Global Context&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Across other regions, the landscape shifts:&lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;P25 Phase 1 &amp;amp; 2&lt;/strong&gt; — widely used for public safety in the United States, Canada, and Australia &lt;/p&gt;

&lt;p&gt;• &lt;strong&gt;DMR and NXDN&lt;/strong&gt; — widely deployed across commercial and private networks in Europe and parts of Asia &lt;/p&gt;

&lt;p&gt;What’s observable depends on the local RF environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Actually Matters&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is not about listening. It is about exposure.&lt;/p&gt;

&lt;p&gt;Whether in the public or private sector, unencrypted RF communications create a layer of visibility that is often overlooked.&lt;/p&gt;

&lt;p&gt;Even without focusing on voice, consistent monitoring allows patterns to be built around:&lt;/p&gt;

&lt;p&gt;• Talkgroup usage and communication structures &lt;br&gt;
• Device activity and presence over time &lt;br&gt;
• Shifts in operational tempo &lt;br&gt;
• Encrypted versus unencrypted behaviour&lt;/p&gt;

&lt;p&gt;These insights are not provided directly by the tools. They emerge through analysis of what is already being transmitted in the clear.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IntSpired Assessment&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As technology and threat actor capability evolve, RF is no longer just radio. It is an intelligence layer, and one that can be used against you.&lt;/p&gt;

&lt;p&gt;Most organisations focus on securing networks, not what those networks transmit.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If it is transmitting, it is detectable, analysable, and increasingly accessible to those who know where to look.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>rfexposure</category>
      <category>wirelesssecurity</category>
      <category>sdr</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Codename: TEMPEST — The real magnitude of an 80-year-old threat</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Fri, 24 Apr 2026 07:30:02 +0000</pubDate>
      <link>https://forem.com/intspired/codename-tempest-the-real-magnitude-of-an-80-year-old-threat-cjo</link>
      <guid>https://forem.com/intspired/codename-tempest-the-real-magnitude-of-an-80-year-old-threat-cjo</guid>
      <description>&lt;p&gt;&lt;em&gt;Most security focuses on networks and endpoints.&lt;/em&gt;&lt;br&gt;
&lt;em&gt;Very little attention is given to what devices emit into the physical environment.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This isn’t a dormant risk. It’s an unaddressed one.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In March 2026, U.S. lawmakers formally requested a renewed investigation into TEMPEST-related threats, citing:&lt;br&gt;
• Lack of public awareness&lt;br&gt;
• Absence of modern regulatory requirements for consumer devices&lt;br&gt;
• Potential exploitation by criminals, private investigators, and non-state actors&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsfpy640tvg2a2l0h9q5b.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsfpy640tvg2a2l0h9q5b.webp" alt="Highlighted excerpt from a U.S. Congressional letter referencing TEMPEST as a national security threat" width="727" height="128"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; Extract from Congressional letter (March 4, 2026) describing TEMPEST as a “serious national security threat”. &lt;/p&gt;

&lt;p&gt;The request highlights a critical point:&lt;br&gt;
The U.S. government has not conducted a follow-up review of this threat since 1986, despite the risk being known for over 80 years.&lt;br&gt;
The accompanying Congressional Research Service memorandum reinforces this, outlining:&lt;br&gt;
• The ability to reconstruct data from electromagnetic, acoustic, and RF emissions&lt;br&gt;
• That these techniques have been repeatedly rediscovered in academic research&lt;br&gt;
• That the equipment required to observe these emissions is now easily obtainable&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What TEMPEST is&lt;/strong&gt;&lt;br&gt;
TEMPEST refers to the unintentional electromagnetic emissions generated by electronic devices during operation.&lt;/p&gt;

&lt;p&gt;These emissions are not just noise.&lt;br&gt;
They can carry structured information.&lt;/p&gt;

&lt;p&gt;Under the right conditions, it is sometimes possible to reconstruct elements of what a system is processing, including screen content, signals, or data flows, from emitted RF energy.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This is a physical side-channel. It exists whether it is monitored or not.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu53tckl0k3i4oigi9c3b.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu53tckl0k3i4oigi9c3b.webp" alt="Reconstructed screen image generated from electromagnetic emissions using GNU Radio" width="800" height="438"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Simulated TEMPEST reconstruction using GNU Radio (gr-tempest open-source implementation)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The setup&lt;/strong&gt;&lt;br&gt;
From a practical standpoint, observing these emissions does not require exotic infrastructure.&lt;/p&gt;

&lt;p&gt;A typical research setup may include:&lt;br&gt;
• Software-defined radio platforms (e.g. HackRF class devices)&lt;br&gt;
• Near-field or directional antennas&lt;br&gt;
• Signal processing via tools such as GNU Radio&lt;/p&gt;

&lt;p&gt;With correct tuning and filtering, emissions from monitors, video cables, power lines, and internal components can be captured and analysed.&lt;/p&gt;

&lt;p&gt;Importantly:&lt;br&gt;
No network interaction is required.&lt;br&gt;
No system access is required.&lt;br&gt;
This is passive collection from the electromagnetic environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Beyond policy and classification, the underlying reality is simpler:&lt;/strong&gt;&lt;br&gt;
TEMPEST is often framed within classified programmes, hardened environments, and military-grade shielding.&lt;/p&gt;

&lt;p&gt;What determines the risk are three factors:&lt;br&gt;
• how detectable the emissions are&lt;br&gt;
• how far they travel&lt;br&gt;
• how much information they expose&lt;br&gt;
This shifts TEMPEST from a classified concern to a physical reality with direct operational implications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What the documents explicitly confirm&lt;/strong&gt;&lt;br&gt;
The CRS memo is very direct about how this works in practice:&lt;br&gt;
• &lt;strong&gt;Acoustic&lt;/strong&gt; — keystrokes can be derived from recorded typing sounds&lt;br&gt;
• &lt;strong&gt;RF&lt;/strong&gt; — emissions may be observable at distance under favourable conditions&lt;br&gt;
• &lt;strong&gt;Electromagnetic&lt;/strong&gt; — signals generated by internal currents can be measured and analysed&lt;br&gt;
It also confirms something often missed:&lt;br&gt;
These attacks rely on observing unintended signals generated during operation. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What has not changed&lt;/strong&gt;&lt;br&gt;
The same memorandum highlights a structural gap:&lt;br&gt;
• No uniform TEMPEST mitigation policy across U.S. government systems&lt;br&gt;
• No requirement for consumer device manufacturers to implement countermeasures&lt;br&gt;
• Limited public guidance despite long-standing awareness&lt;br&gt;
At the same time:&lt;br&gt;
• Techniques have been publicly demonstrated (2009–2022 research examples)&lt;br&gt;
• Methods now fall under what is broadly called side-channel attacks&lt;br&gt;
• The barrier to entry is no longer restricted to state actors&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threat level — low, but specific&lt;/strong&gt;&lt;br&gt;
For most organisations, TEMPEST does not present an immediate or scalable risk.&lt;br&gt;
Constraints remain significant:&lt;br&gt;
• Effective range is limited&lt;br&gt;
• Signal clarity degrades rapidly&lt;br&gt;
• Environmental RF noise introduces distortion&lt;br&gt;
• Skill and interpretation barriers are non-trivial&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;However, context matters.&lt;/strong&gt;&lt;br&gt;
In environments where:&lt;br&gt;
• systems are air-gapped&lt;br&gt;
• data sensitivity is high&lt;br&gt;
• physical proximity can be achieved&lt;br&gt;
TEMPEST becomes a relevant niche collection method.&lt;br&gt;
Not widespread.&lt;br&gt;
But not theoretical.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Closing note&lt;/strong&gt;&lt;br&gt;
Most organisations monitor networks, endpoints, and cloud environments.&lt;br&gt;
Very few consider what their systems emit into the physical environment. &lt;/p&gt;

&lt;p&gt;INTSPIRED®&lt;br&gt;
OFFENSIVE BY DESIGN. INTELLIGENT BY NATURE.&lt;/p&gt;

&lt;p&gt;Full references and further detail available in the article.&lt;/p&gt;

&lt;p&gt;• U.S. Congressional letter (March 2026)&lt;br&gt;
&lt;a href="https://www.wyden.senate.gov/imo/media/doc/wyden_gao_tempest_letter.pdf" rel="noopener noreferrer"&gt;https://www.wyden.senate.gov/imo/media/doc/wyden_gao_tempest_letter.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;• Congressional Research Service memorandum&lt;br&gt;
&lt;a href="https://www.wyden.senate.gov/imo/media/doc/memo_-_tempest.pdf" rel="noopener noreferrer"&gt;https://www.wyden.senate.gov/imo/media/doc/memo_-_tempest.pdf&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;• GNU Radio TEMPEST implementation (gr-tempest)&lt;br&gt;
&lt;a href="https://github.com/git-artes/gr-tempest" rel="noopener noreferrer"&gt;https://github.com/git-artes/gr-tempest&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>news</category>
      <category>security</category>
    </item>
    <item>
      <title>Wi-Fi Hacking Hype vs Reality</title>
      <dc:creator> IntSpired®</dc:creator>
      <pubDate>Thu, 23 Apr 2026 07:00:46 +0000</pubDate>
      <link>https://forem.com/intspired/wi-fi-hacking-hype-vs-reality-148j</link>
      <guid>https://forem.com/intspired/wi-fi-hacking-hype-vs-reality-148j</guid>
      <description>&lt;p&gt;There is constant noise around “new” Wi-Fi hacking tools and techniques.&lt;/p&gt;

&lt;p&gt;Established reconnaissance platforms are presented as breakthrough capabilities.&lt;br&gt;
Handshake capture devices are often interpreted as automatically retrieving passwords.&lt;br&gt;
Deauthentication attacks are portrayed as systemic compromise events.&lt;/p&gt;

&lt;p&gt;Much of this reflects misunderstanding rather than cryptographic reality.&lt;/p&gt;

&lt;p&gt;To reset the narrative, we must separate RF visibility from real compromise and examine the capabilities and limitations of a select set of commonly referenced tools. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sparrow WiFi: An Example of Wireless Reconnaissance and Telemetry Analysis&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fij6ll52i2jup9ugd2sx4.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fij6ll52i2jup9ugd2sx4.webp" alt="Sparrow WiFi interface showing wireless network discovery, signal strength telemetry, and channel utilisation across 2.4 GHz and 5 GHz bands" width="800" height="346"&gt;&lt;/a&gt;&lt;strong&gt;Image 1:&lt;/strong&gt; Sparrow WiFi interface displaying wireless network discovery, signal strength telemetry, and channel utilisation across 2.4 GHz and 5 GHz bands.&lt;/p&gt;

&lt;p&gt;Sparrow WiFi is one example of a wireless reconnaissance and telemetry analysis tool used for site surveys and RF assessment.&lt;/p&gt;

&lt;p&gt;Tools in this category provide:&lt;/p&gt;

&lt;p&gt;• Network discovery&lt;br&gt;
• Signal strength analysis&lt;br&gt;
• Channel utilisation metrics&lt;br&gt;
• Security mode identification&lt;br&gt;
• GPS telemetry&lt;br&gt;
• SSID and BSSID mapping&lt;/p&gt;

&lt;p&gt;Their purpose is RF visibility and environmental analysis.&lt;br&gt;
They do not perform cryptographic attacks, bypass WPA3, or recover passwords.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;RF visibility does not by itself constitute network compromise.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pwnagotchi and “Password Catching&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcpt74eadn9ncpmli50oh.webp" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcpt74eadn9ncpmli50oh.webp" alt="Folder containing captured WPA and WPA2 handshake packet capture files for offline analysis" width="800" height="331"&gt;&lt;/a&gt;&lt;strong&gt;Image 2:&lt;/strong&gt; Captured WPA/WPA2 handshake packet files (.pcap) prepared for offline analysis in a controlled lab environment.&lt;/p&gt;

&lt;p&gt;Pwnagotchi automates the capture of WPA/WPA2 4-way authentication handshakes when a client associates with a network.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;It does not capture plaintext passwords.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;A captured handshake only enables offline password testing; it does not reveal the network key unless the passphrase can be correctly guessed.&lt;/p&gt;

&lt;p&gt;Recovering a passphrase therefore requires testing candidate passwords against authentication material derived from the 4-way handshake. Common approaches include:&lt;/p&gt;

&lt;p&gt;• GPU-accelerated password guessing&lt;br&gt;
• Dictionary attacks&lt;br&gt;
• Rule-based mutations&lt;br&gt;
• Hybrid attacks&lt;br&gt;
• Testing known breached credentials&lt;/p&gt;

&lt;p&gt;There is currently no known practical method to directly decrypt traffic from properly configured WPA2-AES or WPA3-SAE networks without knowledge of the network credential.&lt;/p&gt;

&lt;p&gt;This process does not break AES encryption. It simply tests candidate passwords against the captured handshake. If the passphrase is long, unique, and high entropy, the attack fails.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Strong credential hygiene defeats this class of attack.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Deauthentication Attacks Do Not Break Encryption&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Deauthentication attacks:&lt;/p&gt;

&lt;p&gt;• Force clients to disconnect&lt;br&gt;
• Trigger reauthentication attempts&lt;br&gt;
• May enable handshake capture in certain scenarios&lt;/p&gt;

&lt;p&gt;They do not:&lt;/p&gt;

&lt;p&gt;• Reveal passwords&lt;br&gt;
• Decrypt traffic&lt;br&gt;
• Break AES encryption&lt;/p&gt;

&lt;p&gt;Deauthentication is a disruption technique, not a cryptographic attack.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Networks using Management Frame Protection, defined in IEEE 802.11w, significantly reduce exposure to spoofed deauthentication and disassociation frames.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Even without Management Frame Protection, deauthentication creates an opportunity for capture, not automatic compromise.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Rainbow Tables and “Decryption” Claims&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Rainbow tables are precomputed lookup tables used to reverse hashes.&lt;/p&gt;

&lt;p&gt;In modern wireless assessments, they are rarely the primary method.&lt;/p&gt;

&lt;p&gt;In WPA2-PSK, the SSID is used as the salt in the PBKDF2 key derivation process. This means rainbow tables must be generated for a specific network name, which significantly limits practicality.&lt;/p&gt;

&lt;p&gt;In real-world assessments, GPU-accelerated offline password guessing is still far more common than maintaining large precomputed rainbow tables.&lt;/p&gt;

&lt;p&gt;Rainbow tables are effective only when:&lt;/p&gt;

&lt;p&gt;• Passwords are short&lt;br&gt;
• Passwords are common&lt;br&gt;
• Credentials are reused&lt;br&gt;
• The SSID is predictable and widely reused&lt;/p&gt;

&lt;p&gt;They do not defeat strong, high-entropy passphrases.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;There is no practical real-time decryption of properly configured WPA3-SAE networks.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;AirSnitch and Client Isolation Research&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Research such as AirSnitch highlights weaknesses in certain implementations of client isolation on consumer routers.&lt;/p&gt;

&lt;p&gt;This is valuable work.&lt;/p&gt;

&lt;p&gt;However, it demonstrates configuration and architectural flaws in specific devices. It does not represent a universal break of Wi-Fi encryption.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The issue is implementation, not cryptography.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Channel Hopping: What It Actually Means&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Channel hopping is a scanning technique in which a wireless adapter cycles through Wi-Fi channels to observe activity.&lt;/p&gt;

&lt;p&gt;It does not refer to an access point changing its operating channel, which may occur automatically due to &lt;em&gt;interference or optimisation&lt;/em&gt; policies.&lt;/p&gt;

&lt;p&gt;It is also different from client roaming, where a device reassociates between access points or frequency bands.&lt;/p&gt;

&lt;p&gt;Because a single wireless radio can observe only one channel at a time, scanning tools rotate across channels to build broader visibility. Multi-radio monitoring systems can observe multiple channels simultaneously.&lt;/p&gt;

&lt;p&gt;This behaviour is common in:&lt;/p&gt;

&lt;p&gt;• Passive scanning&lt;br&gt;
• Wireless intrusion detection systems&lt;br&gt;
• Spectrum analysis&lt;br&gt;
• Site surveys&lt;br&gt;
• Security research&lt;/p&gt;

&lt;p&gt;The same physical limitation applies to attackers. To transmit deauthentication frames or conduct other active attacks, the radio must be tuned to the target’s channel. A single radio cannot transmit on multiple channels simultaneously.&lt;/p&gt;

&lt;p&gt;Channel hopping does not:&lt;/p&gt;

&lt;p&gt;• Bypass encryption&lt;br&gt;
• Defeat WPA2-AES&lt;br&gt;
• Defeat WPA3-SAE&lt;br&gt;
• Decrypt traffic&lt;br&gt;
• Grant network access&lt;/p&gt;

&lt;p&gt;It increases visibility. It does not create compromise.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Where Wi-Fi Actually Fails&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Wi-Fi compromise rarely occurs because encryption is broken. It more often results from operational and configuration weaknesses, including:&lt;/p&gt;

&lt;p&gt;• Weak or predictable passphrases&lt;br&gt;
• Reused credentials across networks or services&lt;br&gt;
• WPS enabled&lt;br&gt;
• Misconfigured wireless security settings&lt;br&gt;
• Flat network architecture with no segmentation&lt;br&gt;
• Poor monitoring or visibility of wireless activity&lt;br&gt;
• Exposed internal services accessible from the network&lt;br&gt;
• Weak authentication controls once network access is obtained&lt;br&gt;
• Unpatched access points or outdated firmware&lt;/p&gt;

&lt;p&gt;Once network access is gained, attackers often move laterally within the environment. The access point is rarely the final objective.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Final Point&lt;/strong&gt;&lt;br&gt;
When modern Wi-Fi is properly configured, including:&lt;/p&gt;

&lt;p&gt;• WPA2-AES with strong, unique passphrases&lt;br&gt;
• WPA3-SAE&lt;br&gt;
• Management Frame Protection enabled (802.11w / PMF)&lt;br&gt;
• WPS disabled&lt;/p&gt;

&lt;p&gt;there is currently no known practical method for directly breaking the encryption in real-world conditions.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Modern Wi-Fi cryptography is rarely the weak link. Configuration and operational discipline are.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;INTSPIRED®&lt;br&gt;
Offensive by Design. Intelligent by Nature.&lt;br&gt;
&lt;/p&gt;
&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
        &lt;div class="c-embed__cover"&gt;
          &lt;a href="https://intspired.co.uk/" class="c-link align-middle" rel="noopener noreferrer"&gt;
            &lt;img alt="" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Fblob-715408b.png" height="1030" class="m-0" width="800"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="c-embed__body"&gt;
        &lt;h2 class="fs-xl lh-tight"&gt;
          &lt;a href="https://intspired.co.uk/" rel="noopener noreferrer" class="c-link"&gt;
            Home | IntSpired® | Offensive Cyber &amp;amp; Wireless Security | UK
          &lt;/a&gt;
        &lt;/h2&gt;
          &lt;p class="truncate-at-3"&gt;
             We test your defences the way adversaries would, under formal authorisation, to uncover what is actually exploitable. 
          &lt;/p&gt;
        &lt;div class="color-secondary fs-s flex items-center"&gt;
            &lt;img alt="favicon" class="c-embed__favicon m-0 mr-2 radius-0" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fimg1.wsimg.com%2Fisteam%2Fip%2F8244b478-330f-49fe-a31f-4cecc83f3ff2%2Ffavicon%2Fc78cc70b-20d1-436d-a400-bc4aced9fc8d%2F17678838-ae76-4779-8645-6f8b4bcebf07.PNG%2F%3A%2Frs%3Dw%3A16%2Ch%3A16%2Cm" width="18" height="16"&gt;
          intspired.co.uk
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
      <category>cybersecurity</category>
      <category>wifipentesting</category>
      <category>wireless</category>
      <category>infosec</category>
    </item>
  </channel>
</rss>
