{"id":18630,"date":"2022-03-30T10:45:02","date_gmt":"2022-03-30T18:45:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/03\/30\/news-12363\/"},"modified":"2022-03-30T10:45:02","modified_gmt":"2022-03-30T18:45:02","slug":"news-12363","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/30\/news-12363\/","title":{"rendered":"Researchers Used a Decommissioned Satellite to Broadcast Hacker TV"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6243b4727942145182a3e7d1\/master\/pass\/Canadian-Satellite-Hack-1248873601.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 30 Mar 2022 13:01:24 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Independent researchers and<\/span> the United State military have become <a href=\"https:\/\/www.wired.com\/story\/nyansat-open-source-satellite-tracker\/\">increasingly focused<\/a> on orbiting satellites&#x27; <a href=\"https:\/\/www.wired.com\/story\/the-feds-want-these-teams-to-hack-a-satellite-from-home\/\">potential security vulnerabilities<\/a> in recent years. These devices, which are built primarily with durability, reliability, and longevity in mind, were largely never intended to be ultra-secure. But at the ShmooCon security conference in Washington, DC on Friday, embedded device security researcher Karl Koscher raised questions about a different phase of a satellite&#x27;s life cycle: What happens when an old satellite is being decommissioned and transitioning to a \u201c<a data-offer-url=\"https:\/\/spaceplace.nasa.gov\/spacecraft-graveyard\/en\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/spaceplace.nasa.gov\/spacecraft-graveyard\/en\/&quot;}\" href=\"https:\/\/spaceplace.nasa.gov\/spacecraft-graveyard\/en\/\" rel=\"nofollow noopener\" target=\"_blank\">graveyard orbit<\/a>\u201d?<\/p>\n<p class=\"paywall\">Koscher and his colleagues received permission last year to <a data-offer-url=\"https:\/\/www.telesat.com\/wp-content\/uploads\/2020\/12\/Anik-F1R.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.telesat.com\/wp-content\/uploads\/2020\/12\/Anik-F1R.pdf&quot;}\" href=\"https:\/\/www.telesat.com\/wp-content\/uploads\/2020\/12\/Anik-F1R.pdf\" rel=\"nofollow noopener\" target=\"_blank\">access and broadcast<\/a> from a Canadian satellite known as Anik F1R, launched to support Canadian broadcasters in 2005 and designed for 15 years of use. The satellite&#x27;s coverage extends below the US southern border and out to Hawaii and the easternmost part of Russia. The satellite will move to its graveyard orbit soon, and nearly all other services that use it have already migrated to a new satellite. But while Anik F1R still had its uplink license and transponder slot lease, Koscher had the opportunity to take over and broadcast to the northern hemisphere.<\/p>\n<p class=\"paywall\">\u201cMy favorite thing was actually seeing it work!\u201d Koscher tells WIRED. \u00a0\u201cIt&#x27;s kind of unreal to go from making a video stream to having it broadcast across all of North America.\u201d<\/p>\n<p class=\"paywall\">Koscher and his colleagues from the Shadytel telecommunications and embedded device hacking group broadcast a livestream from another security conference, ToorCon San Diego, in October. At ShmooCon last week, he explained the tools they used to turn an unidentified commercial uplink facility (a station with a special powered dish to communicate with satellites) into a command center for broadcasting from the satellite.<\/p>\n<p class=\"paywall\">In this case, the researchers had permission to access both the uplink facility and the satellite, but the experiment highlights the interesting gray area when a defunct satellite is not being used but has not yet moved father away from Earth to its final resting orbit.\u00a0<\/p>\n<p class=\"paywall\">\u201cTechnically, there are no controls on this satellite or most satellites\u2014if you can generate a strong enough signal to make it there, the satellite will send it back down to the Earth,\u201d Koscher explains. \u201cPeople would need a big dish and a powerful amplifier and knowledge of what they were doing. And if a satellite were fully utilized, they would need to overpower whoever else was using that particular transponder spot or frequency.\u201d<\/p>\n<p class=\"paywall\">In other words, whoever yells loudest into a (geosynchronous orbiting) microphone will have their voice amplified the most, but it&#x27;s difficult to overpower established broadcasting giants\u2014although not unprecedented. In 1986, for example, a hacker who called himself Captain Midnight <a data-offer-url=\"https:\/\/www.nytimes.com\/1986\/04\/28\/arts\/video-pirate-interrupts-hbo.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nytimes.com\/1986\/04\/28\/arts\/video-pirate-interrupts-hbo.html&quot;}\" href=\"https:\/\/www.nytimes.com\/1986\/04\/28\/arts\/video-pirate-interrupts-hbo.html\" rel=\"nofollow noopener\" target=\"_blank\">broke into an HBO broadcast<\/a> of <em>The Falcon and the Snowman<\/em> by hijacking the Galaxy 1 satellite signal.<\/p>\n<p class=\"paywall\">More recently, hackers have taken advantage of underutilized satellites for their own purposes. In 2009, Brazilian Federal Police arrested 39 suspects on suspicion of \u00a0<a href=\"https:\/\/www.wired.com\/2009\/04\/fleetcom\/\">hijacking US Navy satellites<\/a> using high-powered antennas and other ad hoc gear for their own CB (citizens band) short-distance radio communications.<\/p>\n<p class=\"paywall\">Beyond independent hackers, Koscher points out that the lack of authentication and controls on satellites could allow countries to hijack each others&#x27; equipment. \u201cOne implication is that states who want to broadcast propaganda could do it without launching their own satellite, they could use another satellite if they have the ground equipment,\u201d he says.<\/p>\n<p class=\"paywall\">Ang Cui, an embedded device security researcher who launched the NyanSat open source ground station project in 2020, notes that decommissioned satellites aren\u2019t the only ones that could be hijacked. \u201cOne could take over even newish satellites,\u201d he says. But thinking about those in the end-of-life stages, he adds, \u201cThere definitely are things that are just hanging out up there.\u201d<\/p>\n<p class=\"paywall\">One of Koscher&#x27;s colleagues, who goes by the hacker name Falcon, notes that from a pluralistic, freedom-of-information perspective, satellite uplink capabilities could be reimagined as plentiful and available rather than exclusive and scarce. \u201cWhat if this was just a universal utility,\u201d Falcon says with a faraway look.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/satellite-hacking-anit-f1r-shadytel\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6243b4727942145182a3e7d1\/master\/pass\/Canadian-Satellite-Hack-1248873601.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 30 Mar 2022 13:01:24 +0000<\/strong><\/p>\n<p>What happens when an old satellite is no longer in use but can still broadcast? Hacker shenanigans, that&#8217;s what.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-18630","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18630"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18630\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18630"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}