Taiwan student pwns rail comms, halts high-speed trains
Jump to main content
Search
REG AD
Cyber-crime
Taiwan cops say student's radio kit brought bullet trains to a standstill
Investigators spent weeks unravelling enthusiast's bedroom project
Connor Jones
Connor<br>Jones
Cybersecurity reporter
Published<br>wed 6 May 2026 // 12:13 UTC
A university student in Taiwan is out on bail after being accused of interfering with signals sent to the country's high-speed rail network, bringing trains to a halt.<br>In a statement issued to local media, Taiwan High Speed Rail (THSR) confirmed that a 48-minute disruption to three trains on April 5 was caused by a rogue General Alarm signal of the kind triggered by specialized equipment used by train station staff.<br>This General Alarm signal was sent via a terrestrial trunked radio (TETRA) handset at Taichung Station. Staff followed protocol and engaged their emergency response plans, which in turn instructed trains to manually stop.
REG AD
These devices are not the kind commuters usually carry around. Functioning much like walkie-talkies, they are typically used by station staff to communicate with one another and train drivers.
REG AD
Given that these devices are most commonly used by station staff, officials initially assumed it was an inside job.<br>Rail police and telecommunications investigators probed the case after station control room staff ruled out the possibility of official equipment having been stolen or misused by staff.<br>Taiwan's Major Criminal Cases Unit joined the investigation on April 13 after chief prosecutor Chang Chun-hui deemed the case a threat to transportation safety.
MORE CONTEXT
Britain seeks views before it drops the hammer on signal jammers
Mind the gap – in mobile coverage: UK train signal to stay patchy till 2030
Taiwan tells Uncle Sam its chip ecosystem ain't going anywhere
Deutsche Bahn train hits 405 km/h without falling to bits
Over the course of two weeks, detectives concluded that the attack was likely carried out by the 23-year-old student, identified only by his surname Lin, who was described as a radio enthusiast.<br>According to statements reported by UDN, officials believe Lin exploited a vulnerability in the TETRA communication network and remotely triggered the General Alarm signal using unspecified electromagnetic equipment, which police said they found while searching his residence and workplace.<br>Following the raids, police seized seven radio devices, a laptop, two smartphones, and what appeared to be a software-defined radio (SDR) filter.<br>Officials said they believe the way Lin allegedly triggered the General Alarm was rudimentary and involved cloning signals using equipment he bought online.<br>Lin allegedly connected a radio to his laptop via an SDR filter, which captured the radio signal used by THSR, and configured his radio device to transmit the same signal, allowing him to trigger the General Alarm in a way that appeared to come from a station employee.
REG AD
Police arrested Lin on April 28, and after questioning on April 29, concluded he was most likely behind the disruption. They released Lin on bail, convinced there was no need for further detention, setting the value at NT$100,000 ($3,183). ®
cyber-crime
REG AD
Cyber-crime
Dutch cops’ shame game works wonders as most wanted scammers now turned in
Game Over?! gamified the identification of scammers who sought thrills from terrorising the elderly
Hardening open source projects may deter contributions
TanStack weighs invitation-only pull requests after supply chain attack
Shai-Hulud worm exploited GitHub Actions misconfiguration to poison shared cache, now project weighing nuclear option on unsolicited contributions
ZTE showcases at GSMA M360 LATAM 2026, driving future business model restructuring - AI & network two-way integration
AI-integrated networks can cut costs, boost 5G efficiency, and help regional telcos shift beyond basic connectivity
Personal Tech
Microsoft remembers that taskbars used to move
Experimental Windows 11 build restores some old favorites, though the rough edges are still showing
Columnists
Utah tells porn sites to take the P out of VPNs, and it's their fault that they can't
Governments can't touch VPNs technically or commercially. The mess they'll make if they try will be off the scale
Security
NGINX Rift attackers waste no time targeting exposed servers
Researchers say 18-year-old flaw already being probed and exploited just days after disclosure
MOST POPULAR
AI + ML
Google users fight for refunds as unauthorized API usage bills soar
Security
Linus Torvalds says AI-powered bug hunters have made Linux security mailing list ‘almost entirely unmanageable’
Systems
Europe built sovereign clouds to escape US control. Then forgot about the processors
Security
Anthropic’s bug-hunting Mythos was greatest marketing stunt ever, says cURL creator
Networks
Veteran network architect proposes IPv8 – to improve IPv4, not...