top of page
Search

Why Are Critical Infrastructure Radio Systems Still Unsecured?

  • spotcom
  • Aug 4, 2025
  • 3 min read

Updated: Jan 19

When cyber threats are discussed, attention often focuses on internet-connected systems: firewalls, exposed services, phishing attacks, and network intrusions.


However, across the UK and internationally, many essential services — including water, energy, transport, and industrial operations — continue to rely on radio communications that were not originally designed with modern cybersecurity threats in mind.


In some cases, these radio systems carry control commands and telemetry without cryptographic protection or message authentication.


So why, in 2025, are radio-based control systems still operating in this way?


A Legacy That Predates Today’s Threat Landscape


Industrial radio systems have been deployed for decades to support reliable, long-range communication with remote or unmanned sites. Their original design priorities were availability, simplicity, and determinism — not cybersecurity.


Many operate in licensed and licence-exempt bands such as 400–470 MHz or sub-GHz ISM allocations, using protocols optimised for serial communications (for example RS-232 or RS-485), low power consumption, and predictable behaviour.


At the time these systems were designed:

  • Cyber-physical attacks were not widely anticipated

  • Security-by-design was not an explicit requirement

  • Radio links were often treated as trusted infrastructure


Instead, vendors and operators prioritised:

  • Signal robustness over long distances

  • Battery efficiency and longevity

  • Straightforward integration with PLCs and SCADA systems

  • Minimal configuration and operational complexity


Many of these characteristics contributed to the long service life of industrial radio systems. However, they can also present challenges when assessed against modern security expectations.


When Communications Lack Cryptographic Protection


In some legacy deployments, radio communications may:

  • Transmit control messages without encryption

  • Execute received commands without strong authentication

  • Provide limited protection against message replay or manipulation


In practical terms, this can mean that a radio receiver cannot always distinguish between an authorised command and a message that has been retransmitted or altered.


With widely available radio hardware and software tools, it is now relatively straightforward to observe, record, and retransmit radio signals — even without detailed knowledge of the underlying protocol.


This does not imply that all radio systems are vulnerable, nor that exploitation is inevitable. It does, however, highlight the importance of understanding what protections are present — and which are not.


Why Haven’t These Systems Been Replaced?


There are several reasons why legacy radio systems remain widely deployed.


1. Proven Operational Reliability

Many radio installations have operated reliably for decades. Where systems perform a stable, predictable role, there is often little operational incentive to change them.


2. Investment Prioritisation

Infrastructure investment is typically driven by visible risk and regulatory pressure. Radio links can be difficult to assess and are often out of scope for conventional IT or network security reviews.


3. Lack of Clear Assurance Criteria

Until recently, there has been no widely recognised framework defining what appropriate security and resilience look like specifically for industrial radio communications.


This has made it difficult for operators, engineers, and risk owners to assess radio systems consistently or to justify proportionate upgrades.


Real-World Impact of Radio Communications Risk


Radio communications often form part of an operational or safety-related control loop. Where this is the case, loss of integrity or unintended operation can have physical consequences.


Depending on the application, this could include:

  • Incorrect operation of pumps or valves

  • Disruption to treatment or dosing processes

  • Unintended shutdowns or starts of equipment

  • Erroneous signalling within transport or industrial systems


In environments where radio messages are not strongly protected, it may be difficult to determine whether anomalous behaviour is the result of fault, interference, or malicious action.


Raising the Bar Without Forcing Replacement


Improving assurance of radio communications does not necessarily require wholesale system replacement. However, it does require clear, measurable expectations for how radio systems should behave and what protections they should support.


SIR Certification was introduced to address this gap by providing a vendor-neutral, tiered assurance framework for industrial radio communications. It is intended to help organisations:

  • Understand the security and resilience characteristics of their radio systems

  • Assess risk in proportion to operational impact

  • Document assumptions, boundaries, and limitations

  • Support informed decision-making about mitigation or upgrade


SIR Certification focuses on assurance, not prescription. It does not mandate specific products or technologies, and it does not replace existing cybersecurity or safety frameworks.


Final Thoughts


Radio remains a powerful and resilient communications technology within operational technology environments. Its continued use is not inherently problematic.


What matters is whether radio systems are understood, assessed, and governed with the same level of care applied to other elements of critical infrastructure.


As OT environments evolve and cyber risks increasingly have physical consequences, radio communications can no longer remain an implicit assumption. They must become an explicit part of operational assurance.

 
 
 

Comments


+44 (0)1329 448161

 

© 2025 Spotcom Ltd. All rights reserved.
SIR Certified™ and its associated certification levels are trademarks of Spotcom Ltd.
The name, logo, and certification marks are protected under UK intellectual property law.
Unauthorised use, reproduction, or distribution of these marks is strictly prohibited.
You are welcome to share or reference this content for awareness or educational purposes, provided attribution to Spotcom Ltd. is maintained and the material is not altered or misrepresented.

 

bottom of page