Jump to content

Will Syria be able to crack SINCGARS?


Recommended Posts

I saw that article in my local paper. Interestingly the Hezbollah source admitted that they weren't able to listen in "around the clock". There's a suggestion that several units didn't enable their encryption. I'm guessing that the Iranians (or potentially the Syrians, but I'd guess Iranians) have got comm intercept gear that can match/guess the frequency hopping of SINCGARS, but if it is encrypted, they won't be getting real-time info from those intercepts.

The other half of it was Israeli troops using cell phones. Despite orders not to communicate important info over the phones its possible that certain bits of information did go out over the cell traffic and some Hezbollah intelligence units were able to piece together the info they needed to react accordingly (i.e. - potential unit location, unit type such as armor, etc.).

Link to comment
Share on other sites

I agree Steve, without the encryption key there is no way they could match the freq changing order being used by a SINCGARS radio.

Even if they were recording individually every potential frequency and then combining the intercept into coherent conversations via some advanced computer programming (troublesome that as there would be very many micro pieces of audio, not all of which would be from the same source), then as Schrullenhaft says, the intelligence being tactical, is very perishable and would not be able to be analyzed in real time... as perishable intelligence it would be worthless (tactically) unless the enemy force was very static.

Even when I was in Intelligence we could intercept SINCGARS traffic, but only if the target unit was not using encrytion but was broadcasting in the clear.. which back then was not unusual for tactical units.

Bil

Link to comment
Share on other sites

Originally posted by Bil Hardenberger:

target unit was not using encrytion but was broadcasting in the clear.. which back then was not unusual for tactical units.

I think that is the catch. I'd be shocked if they managed to intercept SINCGARS when used properly. But, it's certainly possible, even probable, that it wasn't used correctly.

The article specifically mentions cell phone traffic being intercepted, I wonder if the IDF uses the "talkabout" style radios as well?

Link to comment
Share on other sites

Finnius Mack,

The article specifically mentions cell phone traffic being intercepted, I wonder if the IDF uses the "talkabout" style radios as well?
Well, the US has been using them in large numbers ever since the war began. There are many reasons for this. The assumption was that the enemy likely wouldn't be listening or able to understand what they heard. The latter is pretty interesting. How many of us native English speakers have problems understanding people within our own countries? Trying to understand a Scottsman or a Cajun gives most fellow countrymen a headache, so I can only imagine what this would do to a half assed English as a third language guy listening in on radio traffic.

Steve

Link to comment
Share on other sites

The Dutch (in Afghanistan) are forbidden to use cell phones. The tell-com used can tell where the cell phones are used (by triangulating from the send-towers used, the police uses this often enough). There is some fear those tell-coms are infiltrated.

It is pretty probable that any cell-phone use in Libanon would be handled by the Libanese tell-com covering the area...

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...