Hacking

Slovenian hacker who reported issues in Tetra Protocol gets prison sentence

A Slovenian student who reported configuration errors in the Tetra protocol used by the local Police gets a prison sentence.

Ethical hacking could be very risky, this is the experience of a 26-year-old Slovenian student, Dejan Ornig, that had serious problems after the discovery of flaws in the Police Communications Protocol.

It is incredible, but authorities have given him a prison sentence.

Ornig has found security vulnerabilities in the implementation of the TETRA encrypted communications protocol used by national authorities.

Ornig judgment is charged attack on the information system, falsification of documents and undue audio recording.” reported the Slovenian news  website Pod Crto.

The TETRA protocol is utilized by the Slovenian police, the Slovenian Intelligence and Safety Company (SOVA), the military, and also the jail administration.

The facts are dated back to 2012, when Ornig alongside with 25 colleagues started working on the TETRA implementation in the country, as part of a school project.

In September 2013, he discovered that the Slovenian authorities had misconfigured the TETRA protocol used in the country.

The expert discovered that the Tetra implementation used in the country was not encrypting data in transmission for around 70 percent of the time, which obvious consequences.

Ornig ethically reported his discovery to the authorities, but he did not see any action from the government so he decided to publicly disclose the issues in March 2015.

Only after the public disclosure of the flaw, the authorities fixed the problems in the TETRA implementation but then started the problems for the young student. Ornig has been accused of trying to hack the Government network on three separate occasions in February, March and December 2014.

In April 2015, the authorities raided the house of the student and seized the computer and a $25 custom device with which he was able to interrupt TETRA communications. The police also discovered a fake police badge, then the situation became more complex.

The analysis of the Ornig’s computer revealed the presence of illegitimately recording his former employer, as a result, the police filed a third charge against the youngster.

According to the Slovenian authorities, Ornig should have obtained official permission to perform the tests that allowed him to discover the issue in the Tetra protocol.

The young student this week received a suspended jail sentence of 15 months, the authorities suspended the prison sentence under the condition that the hacker will not repeat the same crime in the next three years.

If you appreciate my effort in spreading cyber security awareness, please vote for Security Affairs as best European Security Blog. Vote SecurityAffairs in every section it is reported. I’m one of the finalists and I want to demonstrate that the Security Affairs community a great reality.

https://www.surveymonkey.com/r/secbloggerwards2016

Thank you

Pierluigi

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – hacking, Tetra)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Reynolds ransomware uses BYOVD to disable security before encryption

Researchers discovered Reynolds ransomware, which uses BYOVD technique to disable security tools and evade detection…

5 hours ago

SSHStalker botnet targets Linux servers with legacy exploits and SSH scanning

A new Linux botnet, SSHStalker, has infected about 7,000 systems using old 2009-era exploits, IRC…

10 hours ago

U.S. CISA adds Microsoft Office and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display: none; background-color: transparent;"></gwmw>

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Office and Microsoft Windows flaws to…

12 hours ago

Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-days

Microsoft Patch Tuesday security updates for February 2026 fix six actively exploited zero-day vulnerabilities. Microsoft…

22 hours ago

ZeroDayRAT spyware grants attackers total access to mobile devices

ZeroDayRAT is a commercial mobile spyware that grants full remote access to Android and iOS…

1 day ago

This website uses cookies.