
In episode 426 of the “Smashing Security” podcast, Graham reveals how you can hijack a train’s brakes from 150 miles away using kit cheaper than a second-hand PlayStation.
Meanwhile, Carole investigates how Grok went berserk, which didn’t stop the Department of Defense signing a contract with Elon’s AI chatbot. So who is responsible when your chatbot becomes a bigot?
Plus: Email headaches, SPF rage, and a glowing review for… Taskmaster SuperMax Plus?
All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
Coming up on today's show, Graham, what do you got?
Way back in 2008, a 14-year-old boy in Poland got himself into a spot of bother because he hacked into— actually, it was a tram system rather than trains, but he began to use it as a giant train set.
He hacked into the trams.
He was gathering information. And he took an old TV remote control and he adapted it so it can change the track points, which meant that he was able to cause chaos.
So there was one particular Tuesday afternoon when a city tram driver tried to steer his vehicle to the right, but found himself swerving to the left instead.
12 people were injured. And the spokesman for the police, they nabbed this boy. They said he took his TV control and made it capable to control the tram line. Trains.
And he'd written in the pages of his school exercise book where the best junctions were to move trams around. So he was really enthusiastic about this.
And he treated it like a giant train set.
Because four years later, in 2012, a security researcher called Neil Smith, he was taking an interest in the locomotives crossing America.
Have you seen these enormous trains, these mega trains they have in America?
And when you've got a train that long, communicating from one end of the train, which can be three miles away from the other end, that becomes a challenge.
Because imagine there's this blooming long three-mile train. Imagine it's parked up somewhere and you are a train maintenance man at the back of the train.
You won't necessarily know if the front of the train has started moving again. Because the carriages, or whatever they're called, they might all be shunted up together.
And if you're doing work at the back, that could be a real problem. It could be a squish situation, couldn't it?
Or you might want to know, as the driver at the front of the train, what the heck the brakes are doing at the back of the train, because maybe you're going up a slope, maybe going down a slope.
Maybe you need your brakes to engage or disengage. Maybe you want to know that the pressure is right, because this is an enormous train.
Are you familiar with the caboose?
It's got sleeping and cooking facilities. I imagine a lady's bottom wouldn't have that.
It's used for observing problems at the back of a train or providing a supplementary braking system. I don't know how they — do they throw out an anchor? I don't know.
But there used to be people on the end of a train, right? And you'd see it in old movies. In your Charlie Chaplin style movies, you don't really see cabooses anymore.
You're more likely to find a caboose up for rental on Airbnb. So there may be someone's done up a caboose, put it in their back garden, and made it available for rent.
Anyway, the way in which this is done these days without a caboose on these flipping long trains is with what is known as an end of train device, an EOT, or a flashing rear end device, a FRED, F-R-E-D.
And these collect data regarding a train's brake line pressure, and they send that information to the front of the train via a radio signal.
And that essentially acts as though they were rear-end crew members communicating with the front-end crew via radio, allowing —
But Neil Smith, this researcher, in 2012, he was looking at train security and specifically these end-of-train devices, and he realised that the system was open to being hacked.
It was vulnerable.
Now, when I first heard that you could hack a train, I was thinking sort of Mission: Impossible-style stunts, leaping from train to train, wanting to be within Bluetooth range.
You need to be really close. But that isn't the case. That isn't the case at all. You can be a ridiculously long distance away. You could be, for instance, 150 miles away.
It costs less than $500 to send a bogus message that could issue commands to the end-of-train device to, I don't know, something like suddenly slam on its brakes.
Which isn't a good thing. Derailment, danger, danger. These end-of-train devices, they use weak authentication.
All they really seem to have is a checksum to verify that any messages they send or receive haven't been corrupted or that no bits have been dropped during the radio transmission.
That's all they have. They don't have any more security than that.
And this has been the case for well over 10 years.
His avatar, by the way, is of a Thomas the Tank Engine, which I think is very, very cute. And he wrote, so how bad is this?
He says, you could remotely take control over a train's brake controller from a very long distance away using hardware that costs less than $500.
You can induce brake failure leading to derailments, or you could shut down the entire National Railway System.
The American Association of Railways, they played it down. They said, oh, this is theoretical, they said. This hasn't happened in real life.
We're only going to take notice of this, they said, if you can demonstrate it in real life. And so Neil Smith said, okay, I'll demonstrate it.
And the American Association of Railway said, go on then. And he said, well, he said, I need to do it in a safe way. Can I use your test track facility?
And they said, no bloody way are you coming on our test track facility. And so he reckons they blocked all security-related testing if they knew it would cause them problems.
And there was a complete lack of progress. He got annoyed about this. Took a few years. He got annoyed about it. He wrote an article for the Boston Review revealing his findings.
They replied. They wrote an article in Fortune magazine debunking it. Complete stalemate. However, I can reveal that last year the American Association of Railways had new management.
And Neil Smith thought, maybe I'll have a bit more luck now dealing with them.
And CISA, the American cyber defense agency, has just published an advisory in the last few days all about what they call the weak authentication in the end-of-train and head-of-train remote linking protocol.
So that's all right then. It's all fixed. Happy days.
Which have to be physically replaced. And the anticipation is that it's going to take years to accomplish, and it's going to cost millions to do it. And put new technology in place.
Which may explain why they weren't so keen to listen to the vulnerability and hear about the problems in the first place.
Maybe at the time, I don't know, I can't remember what the laws were or what their responsibilities were having been told this information.
So I think over time, the noise has begun to get louder and now is being listened to a bit more.
But although at the moment we don't know that this has ever been done maliciously, now, of course, it's become better known, unfortunately, as a result of this disclosure.
But it's not as though no one is interested in messing with trains.
A couple of years ago, some 20 trains in Poland were brought to a standstill, again, by unauthorized radio signal hackers.
Reportedly interspersed the stop commands which they sent in Poland with renditions of the Russian national anthem and parts of a speech by Vladimir Putin.
So, there are people out there who would love to mess around with trains and cause all kinds of mayhem. Carole, what have you got for us this week?
There's the Gemini from Google, ChatGPT, Meta's AI, Alexa, Siri, Claude, Grok, just to name a few. And these AI assistants are already pretty ubiquitous.
I mean, they're basically the next search tool, wouldn't you agree?
I mean, a search engine will give you maybe 100 results of dubious usefulness, whereas an AI, if it's programmed correctly, if it's working properly, will just give you one response, which hopefully with the information you need without having to click on a link.
They ask a specific question and they get a specific response. They don't have to trawl. They don't have to work around sponsored ads at the moment.
It's fairly simple and straightforward.
Anyway, so currently countries around the world are kind of wrestling with how to apply regulations to this digital genie that was maybe perhaps let out of the bottle a little too early.
Of course you should. Have copyright of your own face, voice, and body, in my opinion.
But meanwhile, while this is happening, the US, as part of the one big beautiful bill, just recently tried but failed to pass a 10-year moratorium to prevent individual states from regulating AI stuff.
Now, Grok is a free AI assistant designed by xAI.
That's the main way in which people will be interacting with it.
And he expressed concern that ChatGPT was being trained to be politically correct.
The US Department of Defense said this past Monday it would begin using Grok after awarding the tech company a multimillion-dollar contract.
Because last Tuesday, throughout the day, Grok seemed to go rogue, even for a maximum truth seeker.
The chatbot ranted for hours about a second Holocaust and spread antisemitic tropes and conspiracy theories.
According to The Washington Post, it even claimed that people with Jewish-sounding names were disproportionately linked, quote, "every damn time," unquote, to hate, radicalism, and deceitfulness.
I think this has resulted in Turkey thinking of actually blocking Twitter entirely in their country.
A whole heap of hate vomit from Grok seemed to be the result of a code update, which The Washington Post said included instructions such as, "You tell it like it is," and, "You're not afraid to offend people who are politically correct." And it was also instructed to not blindly defer to mainstream authority or media.
And it looks like Grok certainly took its instructions seriously, doesn't it?
All of the knowledge which it's been scooping up has been on Twitter. So because it's seen bile and hatred there, it thinks, well, let's just go with this then. Amazing.
XAI did eventually roll the code back and said it was actively working to remove the inappropriate posts. And here's my problem, right? Here's my beef.
If a company employee went on a similar antisemitic violent tirade like XAI's Grok chatbot did—
Maybe she was just there drunkenly at the keyboard, "And another thing." She's going to tap it out, "I don't know about this as well." Oh, it's all her fault.
Because I'm sure some of these people were paying to have their whatever VIP X treatment or whatever it is.
That in the last couple of years, Twitter has become so overrun with bots, there are actually very few humans up there who are getting offended.
So it's mostly bots who are getting offended or bots who are getting offended on other bots' behalf.
After all, if a tree falls over in the forest, and no one's there to see it, did it really fall? What was the phrase? Or is it a bear in the woods? Or is the Pope Catholic?
I can't remember. Anyway, that's the counterargument.
And I think there is the tech race to hurry to get it out the door means that we as customers have become beta users. We're beta testers.
This episode of Smashing Security is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI.
Their AI-native platform simulates cutting-edge deepfake threats, trains your team with expert-vetted modules, and even triages real-time phishing reports.
To help your team not only get compliant, but stay compliant.
Head to vanta.com/smashing to learn more. That's vanta, V-A-N-T-A,.com/smashing. And thanks to Vanta, for sponsoring Smashing Security.
If you're a security or IT professional, you've got a mountain of assets to protect: devices, identities, and applications.
It's a lot, and it can create a mountain of security risks. Fortunately, you can conquer that mountain with 1Password Extended Access Management.
Thankfully, Trelica by 1Password can discover and secure access to all of your apps.
Then, pre-populated app profiles assess SaaS risks, letting you manage access, optimise spend, and enforce Smashing Security best practice across every app your employees use.
That's 1password.com/smashing. And welcome back, and you join us at our favorite part of the show, the part of the show that we to call Pick of the Week.
Whatever they. It doesn't have to be security-related necessarily.
I know how to have a good time in the wee small hours of the morning.
Anyone who's ever tried to sort out their company's email knows what a pain in the neck it is to deal with SPF and DKIM and DMARC. It's an absolute minefield.
What you want to do, of course, is you want to prevent your emails being mistaken for phishing emails or spoofed messages.
And the way in which many companies protect against phishing emails, ransomware and spoof messages coming in is they put protections in place, they will be looking at the email headers to make sure that they're all right.
Yeah.
It sends you and me emails when people fill in the form, our contact form on the website. So that's from one server.
And you and I, Carole, we receive emails from people that contact us at , and either of us can reply to them.
And just because we reply doesn't mean that people will necessarily see our responses.
So if we've got our email headers wrong, there is the potential, it doesn't mean it necessarily will always happen, but it's the potential that our emails will bump into their defences, end up in their spam folder or treated as junk, or in the worst case, be completely rejected entirely if we haven't set up our DNS correctly our entries which handle SPF and DKIM and DMARC.
I'm sorry, it's a very nerdy pick of the week. Anyway.
And so I was up until about 1:30 in the morning fixing it. And that is what led me to this website called Learn DMARC.com. So DMARC is D-M-A-R-C, learndmarc.com.
That gave me an email address that I could send a message to, and then I could see on their web page what its mail server thought about my email headers, the emails I just sent it.
So it would tell me if my SPF and DKIM headers weren't in alignment.
It could tell me if emails I sent to Smashing Security had the right digital signature, which would reassure people they were from our podcast, etc.
It's a bloody nightmare handling these things. But with learndmarc.com, I could see what was going wrong. I could fix it.
And I felt that for those 8 people who are still listening to this part of the show, I thought they might hear about that as well.
So I wanted to share the resource in case it helped someone else. learndmarc.com is my pick of the week.
It's like the computer's talking to you, saying, "Hello, I've just received this. I've just received that." To be honest, made it even more fun to use. Well, learnedmarc.com.
Knock yourself out, Carole. You know how to have a good time.
And it is still going to this day, and it's a fantabulous way to unwind after a stressful day, for example. And so my pick of the week is a show called Taskmaster.
Just to recap quickly, Taskmaster is a British comedy panel game show created by the wonderful Alex Horne. And it's presented by the ginormous Greg Davies.
And in each series of the program, a group of 5 celebrities attempt a series of challenges or tasks, and the Taskmaster then reviews the contestants' attempts and awards points based on performance, interpretation, or other arbitrary comedic factors.
It's very fun. I think it's the only show that I consistently, laugh-cry.
Once again, you're giving me a show that I can't watch because I live in a non-supported place." Because, you know, it's on Netflix at the moment, but that's not available everywhere.
But wait!
We want to create a channel where fans can watch all episodes ad-free.
The complete global home for all things Taskmaster." Everything is up to the very latest season in the UK, and it's streaming now.
And there's even special treats and special end-of-year championships. So—
A lot of these things would love you to stay on forever, but you could just dive in for a month, watch as much as you wanted, and then, you know, wait till Christmas when you're at the in-laws.
And get another season, you know? Anyway, I think it's great. I think it's worth the $6 or whatever it is.
And don't forget, to ensure you never miss another episode, follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
It's their support that helps us give you this show for free.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 425 episodes, check out smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Episode links:
- Schoolboy hacks into city’s tram system – The Telegraph.
- Caboose – Wikipedia.
- Neil Smith discusses his findings – Twitter thread.
- End-of-Train and Head-of-Train Remote Linking Protocol – CISA.
- The Cheap Radio Hack That Disrupted Poland’s Railway System – Wired.
- Grok, Elon Musk’s AI Chatbot, Shares Antisemitic Posts on X – The New York Times.
- X ordered its Grok chatbot to ‘tell like it is.’ Then the Nazi tirade began – Washington Post.
- Hacker uses Elmo’s X account to post antisemitic rant and demand release of Epstein files – ABC News.
- Elon Musk Announces Sensuous Grok AI Companion – Mashable.
- Grok Rolls Out Pornographic Anime Companion, Lands Department of Defense Contract – The Rolling Stone.
- Learn DMARC.
- TASKMASTER SUPERMAX+.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Sponsored by:
- Adaptive Security – request a custom demo featuring a real CEO deepfake simulation today from adaptivesecurity.com.
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- Trelica by 1Password – Access Governance for every SaaS app. Discover, manage, and optimize access for any of your SaaS apps – whether managed or unmanaged.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

