Latest news with #militaryforces


LBCI
17 hours ago
- Business
- LBCI
Lebanon's finance minister calls for exclusive army control of weapons, stronger sovereignty
Finance Minister Yassine Jaber on Sunday extended condolences to the Lebanese army's leadership, officers, soldiers, and their families, speaking from Nabatieh during the inauguration of the 'Beit El Moughtareb Al Loubnani.' 'I reaffirm, as a minister in the government, the position I have held since day one: our priority is to build the state, strengthen all its institutions, and bolster their role — foremost among them the Lebanese army and all military forces — with weapons held exclusively in their hands,' Jaber said. He said his work at the Finance Ministry, particularly in modernizing systems, curbing tax evasion, and increasing revenues, is aimed at building a state that is protective, inclusive, and just. The goal, he added, is to strengthen state authority and raise the military's capabilities so it can fully uphold sovereignty, protect all citizens, and attract expatriates and investors seeking a safe, productive environment. 'The responsibility today is greater than ever,' Jaber said, urging all Lebanese to act with sincerity, good intentions, and a belief in shared living and a common destiny. 'When the ship sinks, it takes down everyone on board,' he warned.


WIRED
4 days ago
- WIRED
Encryption Made for Police and Military Radios May Be Easily Cracked
Aug 7, 2025 2:09 PM Researchers found that an encryption algorithm likely used by law enforcement and special forces can have weaknesses that could allow an attacker to listen in. Photo-Illustration:Two years ago, researchers in the Netherlands discovered an intentional backdoor in an encryption algorithm baked into radios used by critical infrastructure–as well as police, intelligence agencies, and military forces around the world–that made any communication secured with the algorithm vulnerable to eavesdropping. When the researchers publicly disclosed the issue in 2023, the European Telecommunications Standards Institute (ETSI), which developed the algorithm, advised anyone using it for sensitive communication to deploy an end-to-end encryption solution on top of the flawed algorithm to bolster the security of their communications. But now the same researchers have found that at least one implementation of the end-to-end encryption solution endorsed by ETSI has a similar issue that makes it equally vulnerable to eavesdropping. The encryption algorithm used for the device they examined starts with a 128-bit key, but this gets compressed to 56 bits before it encrypts traffic, making it easier to crack. It's not clear who is using this implementation of the end-to-end encryption algorithm, nor if anyone using devices with the end-to-end encryption is aware of the security vulnerability in them. The end-to-end encryption the researchers examined, which is expensive to deploy, is most commonly used in radios for law enforcement agencies, special forces, and covert military and intelligence teams that are involved in national security work and therefore need an extra layer of security. But ETSI's endorsement of the algorithm two years ago to mitigate flaws found in its lower-level encryption algorithm suggests it may be used more widely now than at the time. In 2023, Carlo Meijer, Wouter Bokslag, and Jos Wetzels of security firm Midnight Blue, based in the Netherlands, discovered vulnerabilities in encryption algorithms that are part of a European radio standard created by ETSI called TETRA (Terrestrial Trunked Radio), which has been baked into radio systems made by Motorola, Damm, Sepura, and others since the '90s. The flaws remained unknown publicly until their disclosure, because ETSI refused for decades to let anyone examine the proprietary algorithms. The end-to-end encryption the researchers examined recently is designed to run on top of TETRA encryption algorithms. The researchers found the issue with the end-to-end encryption (E2EE) only after extracting and reverse-engineering the E2EE algorithm used in a radio made by Sepura. The researchers plan to present their findings today at the BlackHat security conference in Las Vegas. ETSI, when contacted about the issue, noted that the end-to-end encryption used with TETRA-based radios is not part of the ETSI standard, nor was it created by the organization. Instead it was produced by The Critical Communications Association's (TCCA) security and fraud prevention group (SFPG). But ETSI and TCCA work closely with one another, and the two organizations include many of the same people. Brian Murgatroyd, former chair of the technical body at ETSI responsible for the TETRA standard as well as the TCCA group that developed the E2EE solution, wrote in an email on behalf of ETSI and the TCCA that end-to-end encryption was not included in the ETSI standard 'because at the time it was considered that E2EE would only be used by government groups where national security concerns were involved, and these groups often have special security needs. For this reason, Murgatroyd noted that purchasers of TETRA-based radios are free to deploy other solutions for end-to-end encryption on their radios, but he acknowledges that the one produced by the TCCA and endorsed by ETSI 'is widely used as far as we can tell.' Although TETRA-based radio devices are not used by police and military in the US, the majority of police forces around the world do use them. These include police forces in Belgium and Scandinavian countries, as well as East European countries like Serbia, Moldova, Bulgaria, and Macedonia, and in the Middle East in Iran, Iraq, Lebanon, and Syria. The Ministries of Defense in Bulgaria, Kazakhstan, and Syria also use them, as do the Polish military counterintelligence agency, the Finnish defense forces, and Lebanon and Saudi Arabia's intelligence services. It's not clear, however, how many of these also deploy end-to-end decryption with their radios. The TETRA standard includes four encryption algorithms—TEA1, TEA2, TEA3 and TEA4—that can be used by radio manufacturers in different products, depending on the intended customer and usage. The algorithms have different levels of security based on whether the radios will be sold in or outside Europe. TEA2, for example, is restricted for use in radios used by police, emergency services, military, and intelligence agencies in Europe. TEA3 is available for police and emergency services radios used outside Europe but only in countries deemed 'friendly' to the EU. Only TEA1 is available for radios used by public safety agencies, police agencies, and militaries in countries deemed not friendly to Europe, such as Iran. But it's also used in critical infrastructure in the US and other countries for machine-to-machine communication in industrial control settings such as pipelines, railways, and electric grids. All four TETRA encryption algorithms use 80-bit keys to secure communication. But the Dutch researchers revealed in 2023 that TEA1 has a feature that causes its key to get reduced to just 32 bits, which allowed the researchers to crack it in less than a minute. In the case of the E2EE, the researchers found that the implementation they examined starts with a key that is more secure than ones used in the TETRA algorithms, but it gets reduced to 56 bits, which would potentially let someone decrypt voice and data communications. They also found a second vulnerability that would let someone send fraudulent messages or replay legitimate ones to spread misinformation or confusion to personnel using the radios. The ability to inject voice traffic and replay messages affects all users of the TCCA end-to-end encryption scheme, according to the researchers. They say this is the result of flaws in the TCCA E2EE protocol design rather than a particular implementation. They also say that 'law enforcement end users' have confirmed to them that this flaw is in radios produced by vendors other than Sepura. But the researchers say only a subset of end-to-end encryption users are likely affected by the reduced-key vulnerability because it depends how the encryption was implemented in radios sold to various countries. ETSI's Murgatroyd said in 2023 that the TEA1 key was reduced to meet export controls for encryption sold to customers outside Europe. He said when the algorithm was created, a key with 32 bits of entropy was considered secure for most uses. Advances in computing power make it less secure now, so when the Dutch researchers exposed the reduced key two years ago, ETSI recommended that customers using TEA1 deploy TCCA's end-to-end encryption solution on top of it. But Murgatroyd said the end-to-end encryption algorithm designed by TCCA is different. It doesn't specify the key length the radios should use because governments using the end-to-end encryption have their own 'specific and often proprietary security rules' for the devices they use. Therefore they are able to customize the TCCA encryption algorithm in their devices by working with their radio supplier to select the 'encryption algorithm, key management and so on' that is right for them—but only to a degree. 'The choice of encryption algorithm and key is made between supplier and customer organisation, and ETSI has no input to this selection—nor knowledge of which algorithms and key lengths are in use in any system,' he said. But he added that radio manufacturers and customers 'will always have to abide by export control regulations.' The researchers say they cannot verify that the TCCA E2EE doesn't specify a key length because the TCCA documentation describing the solution is protected by non-disclosure agreement and provided only to radio vendors. But they note that the E2EE system calls out an 'algorithm identifier" number, which means it calls out the specific algorithm it's using for the end-to-end encryption. These identifiers are not vendor specific, the researchers say, which suggests the identifiers refer to different key variants produced by TCCA—meaning TCCA provides specifications for algorithms that use a 126 bit key or 56 bit key, and radio vendors can configure their devices to use either of these variants, depending on the export controls in place for the purchasing country. Whether users know their radios could have this vulnerability is unclear. The researchers found a confidential 2006 Sepura product bulletin that someone leaked online, which mentions that 'the length of the traffic key … is subject to export control regulations and hence the [encryption system in the device] will be factory configured to support 128, 64, or 56 bit key lengths.' But it's not clear what Sepura customers receive or if other manufacturers whose radios use a reduced key disclose to customers if their radios use a reduced-key algorithm. 'Some manufacturers have this in brochures; others only mention this in internal communications, and others don't mention it at all,' says Wetzels. He says they did extensive open-source research to examine vendor documentation and ' found no clear sign of weakening being communicated to end users. So while … there are 'some' mentions of the algorithm being weakened, it is not fully transparent at all.' Sepura did not respond to an inquiry from WIRED. But Murgatroyd says that because government customers who have opted to use TCCA's E2EE solution need to know the security of their devices, they are likely to be aware if their systems are using a reduced key. 'As end-to-end encryption is primarily used for government communications, we would expect that the relevant government National Security agencies are fully aware of the capabilities of their end-to-end encryption systems and can advise their users appropriately,' Murgatroyd wrote in his email. Wetzels is skeptical of this, however. 'We consider it highly unlikely non-Western governments are willing to spend literally millions of dollars if they know they're only getting 56 bits of security,' he says.
Yahoo
18-07-2025
- Business
- Yahoo
Military Connectors Market worth $2.28 billion by 2030 - Exclusive Report by MarketsandMarkets™
DELRAY BEACH, Fla., July 18, 2025 /PRNewswire/ -- The military connectors market is expected to reach USD 2.28 billion by 2030, from USD 2.05 billion in 2025, with a CAGR of 2.1% according to a new report by MarketsandMarkets™. The growth of the military connectors market is primarily driven by the need for rugged connectors that support electronic systems in mission-critical and tactical environments, such as in combat platforms, aircraft, and ships. Additionally, military forces are facing more asymmetric threats, which necessitates reliable communication. As a result, high-performance connectors are increasingly used in communications and surveillance systems. Military modernization initiatives are also being implemented worldwide, emphasizing the need for stable interconnects in command centers, electronic warfare, and unmanned systems. Download PDF Brochure: Browse in-depth TOC on "Military Connectors Market" 130 – Tables60 – Figures250 – Pages Military Connectors Market Report Scope: Report Coverage Details Market Revenue in 2025 $ 2.05 billion Estimated Value by 2030 $ 2.28 billion Growth Rate Poised to grow at a CAGR of 2.1% Market Size Available for 2020–2030 Forecast Period 2025–2030 Forecast Units Value (USD Million/Billion) Report Coverage Revenue Forecast, Competitive Landscape, Growth Factors, and Trends Segments Covered By Shape, Type, Platform, and Point of Sale and Region Geographies Covered North America, Europe, Asia Pacific, and Rest of World Key Market Challenge Strict export control regulations Key Market Opportunities Emergence of high-speed data and power hybrid connectors Key Market Drivers Ongoing defense modernization programs Based on shape, the rectangular segment is expected to grow the fastest during the forecast period. The military connectors market in the rectangular segment is expanding at the highest rate due to its greater contact density, modularity, and compact size. Rectangular connectors are used in advanced military systems because they combine multiple signals, power, and data lines into a single unit, reducing cable and system complexity. These connectors are especially suitable for avionics, radar, ground vehicles, and deployable communications equipment. Their flat profile and stacked design allow for better packaging in limited spaces. Newer rectangular connectors are designed with improved sealing, EMI shielding, and lighter weight to meet evolving battlefield needs. As militaries adopt smaller and smarter electronics, rectangular connectors are becoming more popular among system integrators and OEMs due to their flexibility, scalability, and durability in tough environments. Based on the point of sale, the aftermarket segment is expected to be the largest during the forecast period. The aftermarket segment is expected to lead the military connectors industry due to increasing demand for maintenance, upgrades, and replacement parts for existing defense platforms. Connectors exposed to harsh environments like extreme temperatures, vibration, and humidity tend to wear out over time and need reliable aftermarket support. As most countries extend the operational lives of their aircraft, navy vessels, and vehicles, there is a higher demand for rugged replacement connectors that meet evolving defense standards. This industry also supports retrofit projects where older platforms are being upgraded with new electronics that require updated interfaces. Inquiry Before Buying: Asia Pacific is expected to be the second-largest market for military connectors during the forecast period. The Asia Pacific region is expected to become the second-largest market for military connectors, driven by increasing defense budgets, ongoing fleet modernization, and a growing demand for rugged interconnects. Countries such as India, Japan, and South Korea are actively upgrading their ground vehicles, aircraft, naval systems, and unmanned platforms, relying on high-speed connectors for power, signal, and data transmission. The region is also investing heavily in radar technology and autonomous systems. Local governments are promoting domestic manufacturing and collaboration to develop military-grade connectors. Moreover, Asia Pacific's rugged environment and climate necessitate durable connectors with effective sealing and electromagnetic interference (EMI) protection. Additionally, there is a rising demand for defense-related dual-use applications, including aerospace and industrial robotics, fueling market growth. ITT Inc. (US), Smiths Group Plc (US), Weald Electronics Ltd (England), Fischer Connectors SA (Switzerland), Allied Connectors (India), Ray Service, a.s. (Czech Republic), Rojone Pty Ltd (Australia), Omnetics Connector Corp. (US), Conesys (US), Milnec Interconnect Systems (US), Eaton (Ireland), Turck, Inc. (Germany), Glenair, Inc (US), and Winchester Interconnect (US) are the key players in the military connectors companies. These companies have strong distribution networks across North America, Europe, Asia Pacific, the Middle East & Africa, and Latin America. Get 10% Free Customization on this Report: Browse Adjacent Market: Aerospace and Defence Market Research Reports & Consulting See More Latest Aerospace and Defence Reports: Artificial Intelligence (AI) in Aviation Market by Solution (Infrastructure, Software, Services), Business Function (Flight Operations, Maintenance & Safety, Airport Operation, R&D), End User (Airlines, Airports, OEM, MRO), Technology and Region – Global Forecast to 2030 Artificial Intelligence (AI) in Drones Market by Solution (Infrastructure, Software, Services), Function (Flight Operations, Maintenance, Ground Control, Asset Health, Simulation, Revenue Optimization), End User, Technology - Global Forecast to 2030 About MarketsandMarkets™ MarketsandMarkets™ has been recognized as one of America's Best Management Consulting Firms by Forbes, as per their recent report. MarketsandMarkets™ is a blue ocean alternative in growth consulting and program management, leveraging a man-machine offering to drive supernormal growth for progressive organizations in the B2B space. With the widest lens on emerging technologies, we are proficient in co-creating supernormal growth for clients across the globe. Today, 80% of Fortune 2000 companies rely on MarketsandMarkets, and 90 of the top 100 companies in each sector trust us to accelerate their revenue growth. With a global clientele of over 13,000 organizations, we help businesses thrive in a disruptive ecosystem. The B2B economy is witnessing the emergence of $25 trillion in new revenue streams that are replacing existing ones within this decade. We work with clients on growth programs, helping them monetize this $25 trillion opportunity through our service lines – TAM Expansion, Go-to-Market (GTM) Strategy to Execution, Market Share Gain, Account Enablement, and Thought Leadership Marketing. Built on the 'GIVE Growth' principle, we collaborate with several Forbes Global 2000 B2B companies to keep them future-ready. Our insights and strategies are powered by industry experts, cutting-edge AI, and our Market Intelligence Cloud, KnowledgeStore™, which integrates research and provides ecosystem-wide visibility into revenue shifts. To find out more, visit or follow us on Twitter, LinkedIn and Facebook. Contact: Mr. Rohan SalgarkarMarketsandMarkets™ INC. 1615 South Congress 103, Delray Beach, FL 33445USA: +1-888-600-6441Email: sales@ Our Web Site: Insight: Source: Logo: View original content: SOURCE MarketsandMarkets Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data