Small, portable terrestrial jammers are easy to purchase and use they typically have a range of 3-5 kilometers in urban areas, while in rural areas their range can increase to up to 20 kilometers. The jamming frequencies are limited to a specific area and are able to interfere only with the frequency emanating from the satellite in a specific location. Rather than targeting the satellite itself, as is the case in orbital jamming, terrestrial jamming involves transmitting rogue frequencies in the direction of local consumer-level satellite dishes. In terrestrial jamming, the attacker transmits rogue frequencies in the direction of terrestrial targets (ground satellite dishes). The two forms of satellite jamming are “orbital” and “terrestrial”: Satellite jamming is a hacking method often used to interfere with communication for distribution of media for censorship purpose. The hackers use a directed antenna to produce the interference, usually a specifically crafted signal having enough power to override the original transmitted signal. Interference has become the primary cause of the impairment and degradation of satellite services. Jamming is probably the best-known satellite hacking technique the attacker floods or overpowers a signal, a transmitter, or a receiver, interfering with legitimate transmission. Grilling – activating all solar panels when exposed to sun, overcharging energy system.Mispositioning/Control – transponder spoofing, direct commanding, command reply, insertion after confirmation but prior to execution.Jamming – jamming well-known frequencies for satellites.Breaking – old technologies used (X.25, GRE).Scanning/attacking – anonymous proof of concept in 2010 by Leonardo Nve Egea, scanning, DoS, and spoofing possible.Interacting – protocols and authentication used, radio transmissions need official license!.Listening – listening with the right equipment, frequencies, and locations.Tracking – tracking over web data and software.In a recent presentation titled “Satellite hacking,” a popular IT security expert listed the following top 10 threats: Satellites are a strategic asset for any country and are considered as “critical infrastructure,” therefore they are considerable as privileged targets for a possible cyber attack. Satellite services cover practically every sector, from mobile cellular communication to telemedicine, so any interference with them could have a serious effect. Satellites play a significant role in communication, early warning systems, global broadcasting, meteorology, navigation, reconnaissance, remote sensing, and surveillance. The figures proposed give us an idea of the business behind the satellite industry and security issues are among primary concerns for the sector. The quantity of information daily managed by these architectures is impressive, and the capability to protect them from attacks must be improved. The industry is attracting huge investments, mainly from government entities. The data related to orders for the next months confirm the sector’s excellent status. The overall satellite industry is characterized by constant growth. More than 50 countries operate at least one satellite.įigure 1 – Global Satellite Industry Revenue – SIA These figures are impressive, especially if it is considered the global economic crisis that has decimated other industry sectors. Chinese hackers, probably state-sponsored entities, have already gained access to US satellite these incidents demonstrated the urgent need to secure both military and commercial satellites from external attacks and intrusions. Principal cyber powers such as the US and UK fear a possible offensive from foreign hostile governments, non-state actors and even single hackers, but it is it is undeniable that the main concerns are related to the aggressive behavior of China, especially in this area. Attackers are posing a growing challenge to satellite fleet operators and raising questions on the level of security to ensure also for commercial satellites, security experts are convinced that they need to be “ hardened” exactly like the secure military satellites. The wave of cyber threats has evolved rapidly in the last years in the pace of technological evolution. Unfortunately, with the diffusion of this complex system, the interest of governments and hackers also increased their security is today a pillar of the cyber security strategy of the most advanced government. Satellites have assumed a crucial role in our contemporary society they are used in both private and public sectors for numerous purposes, from communication to research.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |