viralamo

Menu
  • Technology
  • Science
  • Money
  • Culturs
  • Trending
  • Video

Subscribe To Our Website To Receive The Last Stories

Join Us Now For Free
Home
Technology
Researchers used a decommissioned satellite to broadcast hacker TV
Technology

Researchers used a decommissioned satellite to broadcast hacker TV

31/03/2022

Researchers used a decommissioned satellite to broadcast hacker TV

Darryl Fonseka | Getty Images

Independent researchers and the United States military have become increasingly focused on orbiting satellites’ potential security vulnerabilities in recent years. These devices, which are built primarily with durability, reliability, and longevity in mind, were largely never intended to be ultra-secure. But at the ShmooCon security conference in Washington, DC, on Friday, embedded device security researcher Karl Koscher raised questions about a different phase of a satellite’s life cycle: What happens when an old satellite is being decommissioned and transitioning to a “graveyard orbit”?

Koscher and his colleagues received permission last year to access and broadcast from a Canadian satellite known as Anik F1R, launched to support Canadian broadcasters in 2005 and designed for 15 years of use. The satellite’s coverage extends below the US southern border and out to Hawaii and the easternmost part of Russia. The satellite will move to its graveyard orbit soon, and nearly all other services that use it have already migrated to a new satellite. But while the researchers could still talk to the satellite using special access to an uplink license and transponder slot lease, Koscher had the opportunity to take over and broadcast to the Northern Hemisphere.

“My favorite thing was actually seeing it work!” Koscher tells WIRED. “It’s kind of unreal to go from making a video stream to having it broadcast across all of North America.”

Koscher and his colleagues from the Shadytel telecommunications and embedded device hacking group broadcast a livestream from another security conference, ToorCon San Diego, in October. At ShmooCon last week, he explained the tools they used to turn an unidentified commercial uplink facility (a station with a special powered dish to communicate with satellites) into a command center for broadcasting from the satellite.

Advertisement

In this case, the researchers had permission to access both the uplink facility and the satellite, but the experiment highlights the interesting gray area when a defunct satellite is not being used but has not yet moved father away from Earth to its final resting orbit.

“Technically, there are no controls on this satellite or most satellites—if you can generate a strong enough signal to make it there, the satellite will send it back down to the Earth,” Koscher explains. “People would need a big dish and a powerful amplifier and knowledge of what they were doing. And if a satellite were fully utilized, they would need to overpower whoever else was using that particular transponder spot or frequency.”

In other words, whoever yells loudest into a (geosynchronous orbiting) microphone will have their voice amplified the most, but it’s difficult to overpower established broadcasting giants—although not unprecedented. In 1986, for example, a hacker who called himself Captain Midnight broke into an HBO broadcast of The Falcon and the Snowman by hijacking the Galaxy 1 satellite signal.

More recently, hackers have taken advantage of underutilized satellites for their own purposes. In 2009, Brazilian Federal Police arrested 39 suspects on suspicion of hijacking US Navy satellites using high-powered antennas and other ad hoc gear for their own CB (citizens band) short-distance radio communications.

Beyond independent hackers, Koscher points out that the lack of authentication and controls on satellites could allow countries to hijack each others’ equipment. “One implication is that states who want to broadcast propaganda could do it without launching their own satellite; they could use another satellite if they have the ground equipment,” he says.

Ang Cui, an embedded device security researcher who launched the NyanSat open source ground station project in 2020, notes that decommissioned satellites aren’t the only ones that could be hijacked. “One could take over even newish satellites,” he says. But thinking about those in the end-of-life stages, he adds, “There definitely are things that are just hanging out up there.”

One of Koscher’s colleagues, Falcon, notes that from a pluralistic, freedom-of-information perspective, satellite uplink capabilities could be reimagined as plentiful and available rather than exclusive and scarce. “What if this was just a universal utility,” Falcon says with a faraway look.

This story originally appeared on wired.com.

Source link

Share
Tweet
Pinterest
Linkedin
Stumble
Google+
Email
Prev Article
Next Article

Related Articles

2020 will be a big year for online childcare — here are 7 startups to watch
TechCrunch ist Teil von Verizon Media. Klicken Sie auf ‘Ich …

TechCrunch is postponing Early Stage SF and Sessions: Mobility

AppOnboard launches free version of mobile game dev suite Buildbox
AppOnboard is launching a free version of Buildbox, a suite …

AppOnboard launches free version of mobile game dev suite Buildbox

Leave a Reply Cancel reply

Find us on Facebook

Related Posts

  • How Whisk is using its food genome to turn recipes into smart shopping lists
    How Whisk is using its food genome …
    18/12/2019
  • Frontier files for bankruptcy, says its broadband service won’t get any worse
    Frontier files for bankruptcy, says its broadband …
    15/04/2020
  • Google fixes Android flaws that allow code execution with high system rights
    Google fixes Android flaws that allow code …
    02/06/2020
  • Russia wages “relentless and destructive” cyberattacks to bolster Ukraine invasion
    Russia hammered by pro-Ukrainian hackers following invasion
    06/05/2022
  • Xbox Games Showcase: Microsoft comes out in force
    Xbox Games Showcase: Microsoft comes out in …
    23/07/2020

Popular Posts

  • Omnipotent BMCs from QCT remain vulnerable to critical Pantsdown threat
    Omnipotent BMCs from QCT remain vulnerable to …
    26/05/2022 0
  • Russia wages “relentless and destructive” cyberattacks to bolster Ukraine invasion
    Russia wages “relentless and destructive” cyberattacks to …
    27/04/2022 0
  • 10 of the Most Random Reality Shows …
    28/04/2022 0
  • 10 More Modern Conveniences That Met with …
    28/04/2022 0
  • One of the most powerful DDoSes ever targets cryptocurrency platform
    One of the most powerful DDoSes ever …
    28/04/2022 0

viralamo

Pages

  • Contact Us
  • Privacy Policy
Copyright © 2022 viralamo
Theme by MyThemeShop.com

Ad Blocker Detected

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by disabling your ad blocker.

Refresh