Security & Infrastructure Tools
Student hacked Taiwan high-speed rail to trigger emergency brakes
Taiwanese university student arrested for hacking the Taiwan High-Speed Rail’s TETRA system by using software-defined radios and handheld radios to transmit a high-priority alarm, causing four THSR trains to halt for 48 minutes on April 5; an accomplice aided the plot; the 23-year-old faces up to 10 years’ imprisonment and was released on NT$100,000 bail.

STUDENT HACKED TAIWAN HIGH-SPEED RAIL TO TRIGGER EMERGENCY BRAKES
Overview
- A 23-year-old university student in Taiwan was arrested for interfering with the THSR’s TETRA-based communications system.
- By using a combination of software-defined radio (SDR) equipment and handheld radios, the student transmitted a high-priority General Alarm, which activated emergency braking procedures on multiple trains.
- The incident raised questions about the security of critical rail infrastructure and the safeguards surrounding radio-based control systems.
Incident at a Glance
- Location: Taiwan’s high-speed railway network (THSR), which runs a single 350 km (217 miles) two-way line along the western coast.
- Method: The student intercepted and decoded TETRA radio parameters with SDR gear bought online, then programmed them into handheld devices to impersonate legitimate beacons.
- Impact: Four trains were halted for approximately 48 minutes on April 5, 2026, while emergency braking protocols were engaged.
Key Players
- Suspect: A 23-year-old university student identified by the surname Lin.
- Accomplice: A 21-year-old individual who provided crucial THSR parameters that aided the attack.
- Authorities focused on the possibility of unauthorized cloning and signaled that the involved device did not appear to be officially assigned for duty.
Technical Details and Vulnerabilities
- System in Question: THSR’s radio communications rely on TETRA (Trans-European Trunked Radio) for operational signaling.
- Exploited Gap: The TETRA parameters had reportedly remained unchanged for about 19 years, which helped bypass several layered verification steps.
- Attack Vector: The attacker used SDR to decode and replicate radio beacons, enabling the unauthorized transmission of a high-priority alarm signal.
- Security Concerns: The incident points to potential weaknesses in long-standing radio parameters, device assignment controls, and the verification layers that are supposed to prevent impersonation.
Investigation and Evidence
- Authorities traced the alarm transmission to a radio beacon that had not been assigned for active duty, raising the possibility of cloning or misuse.
- Logs and footage were reviewed to reconstruct the sequence of events, including TETRA network logs and CCTV footage.
- Ballistics of the case included a seizure of 11 handheld radios, an SDR device, and a laptop from Lin’s residence.
- The investigation also examined whether the hardware used could have been remotely compromised or misused to trigger the alarm signal.
Legal Proceedings and Bail
- Charges: Lin faces penalties under Article 184 of the Criminal Law, which can carry up to 10 years in prison.
- Bail: Lin is currently released on NT$100,000 bail (approximately US$3,280).
- Defense stance: Lin’s lawyer contends that the emergency signal transmission on April 5 was accidental, though authorities have not found this assertion convincing.
Public and Political Response
- The incident has drawn criticism from several Taiwanese politicians who criticized the oversight bodies responsible for the security and maintenance of critical infrastructure.
- The THSR in the aftermath reviewed its logs and confirmed that the triggering signal originated from a node not officially assigned to its duty roster, prompting discussions about governance and security practices surrounding the rail network’s communication systems.
What We Know About the System and Its Operation
- THSR is a vital transportation artery with high annual ridership and substantial state support, underscoring the importance of robust safety and security measures for its signaling and control networks.
- The use of TETRA in rail operations indicates a reliance on legacy or long-duration parameter settings in critical systems, highlighting the need for ongoing review and rotation of credentials and verification processes to prevent impersonation.
Current Status and Next Steps
- The case remains active as prosecutors move through the legal process, with the defense contesting aspects of the transmission’s intent.
- The investigation continues to assess how best to strengthen monitoring, authentication, and verification across all THSR signaling channels to prevent repeated or similar incidents.
- Officials are expected to publish further findings on the security posture of THSR’s radio networks and any policy changes aimed at mitigating such risks in the future.


