Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(1.54MB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Satellite Network Hacking & Security Analysis
Adam Ali Zare Hudaib
Pages - 8 - 55     |    Revised - 31-03-2016     |    Published - 30-04-2016
Volume - 10   Issue - 1    |    Publication Date - April 2016  Table of Contents
MORE INFORMATION
KEYWORDS
Satellite Network, Satellite Communications, Satellite Network Security, Satellite Network Treats, Satellite Network Vulnerabilities, Satellite Security Analysis, Satellite Hacking.
ABSTRACT
Satellites play a significant role in communication, early warning systems, global broadcasting, meteorology, navigation, reconnaissance, remote sensing, and surveillance.Satellite services cover practically every sector, from mobile cellular communication to telemedicine, so any interference with them could have a serious effect. Satellites are a strategic asset for any country and are considered as “critical infrastructure,” therefore they are considerable as privileged targets for a possible cyber attack.
CITED BY (0)  
1 Google Scholar
2 CiteSeerX
3 refSeek
4 Scribd
5 SlideShare
6 PdfSR
1 Wong, Wilson WS; and Fergusson, James. Military Space Power. Santa Barbara, California: Praeger, 2010.
2 GAO Critical Infrastructure Protection Commercial Satellite Security Should Be More Fully Addressed. Internet: http://www.gao.gov/assets/240/235485.pdf. 2002 [Feb. 12, 2013].
3 Space Security Index 2012. Internet: http://swfound.org/media/93632/SSI_FullReport_2012.pdf, 2012 [Feb.14, 2013].
4 Laurie, Adam. Satellite Hacking for Fun and Profit. Internet: http://www.securitytube.net/video/263, 2009 [Feb.14, 2013].
5 Electromagnetic Spectrum. Internet: http://en.wikipedia.org/wiki/File:Electromagnetic-Spectrum.png, 2012 [Feb.14, 2013].
6 Gordon, Steven. Talking to Martians: Communications with Mars Curiosity Rover. Internet: http://sandilands.info/sgordon/communications-with-mars-curiosity, 2012 [Feb.27, 2012].
7 Thompson, Cynthia. ABC 10 victim of hackers. Internet: http://abc10up.com/abc-10-victimof-hackers, 2013, [Feb. 20, 2013].
8 Sri Lankan Terrorists Hack Satellite. Internet: http://it.slashdot.org/story/07/04/13/068222/sri-lankan-terrorists-hack-satellite, 2007 [Feb.14, 2013].
9 Gutteberg, Odd. Telektronikk 4.92 Satellite Communications. Internet: http://www.telenor.com/wp-content/uploads/2012/05/T92_4.pdf , 1993 [March 26, 2013].
10 Edition, The Comsys VSAT Report, VSAT Statistics. Internet: http://defensesystems.com/articles/2012/03/28/c4isr-2-military-vsat-technologyadvances.aspx, [March 26, 2013].
11 Voll, Liv Oddrun and Klungsoyr, Gunn Kristin. Very Small Aperture Terminal (VSAT) Systems Basic Principles and Design. Internet: http://www.telektronikk.com/volumes/pdf/4.1992/Side_39_45.pdf, 1993 [March 26, 2013].
12 BGAN: Global voice and broadband data. 2013, Internet: http://www.inmarsat.com/cs/groups/inmarsat/documents/document/019403.pdf, 2009 [March 28, 2013].
13 Geovedi, Jim; Iryandi, Raditya; and Zboralski, Anthony. Hacking A Bird inthe Sky 2.0. Internet: http://www.youtube.com/watch?v=dLbRuJikb1U, 2008 [Feb. 10, 2013].
14 Davies, Roger. New satellite uplink trends. Internet: http://broadcastengineering.com/mag/new-satellite-uplink-trends, 2006 [March 26, 2013].
15 Dennis, Louise , Fisher, Michael and Hindriks, Koen . A Semantic Framework for Socially Adaptive Agents: Towards strong norm compliance. Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems, 2015, pp. 423-432.
16 Messmer, Ellen. Researchers crack satellite encryption. Internet: http://www.networkworld.com/news/2012/020812-satellite-encryption-255893.html, 2003 [Feb. 26, 2013].
17 UCS Satellite Database. Database, official names only. Internet: http://www.ucsusa.org/nuclear_weapons_and_global_security/space_weapons/technical_issues/ucssatellite-database.html, 2012 [Feb. 26, 2013].
18 Prime: Cybersecurity Risk Management Strategies For SATCOM Networks. Internet: http://www.milsatmagazine.com/cgi-bin/display_article.cgi?number=1142237172, 2012 [Feb. 14, 2013].
19 Jonathan. Unmanned X-47B aircraft completes sea trial. Internet: http://news.cnet.com/8301-11386_3-57560226-76/unmanned-x-47b-aircraft-completes-seatrial/, 2012 [Feb. 26, 2013].
20 Col James G. Lee, “Counterspace Operations for Information Dominance,” in Beyond the Paths of Heaven: The Emergence of Space Power Thought, ed. Col Bruce M. DeBlois, Maxwell AFB, AL: Air University Press, 1999, p. 281.
21 Wilson, “Threats to United States Space Capabilities.” Internet: https://fas.org/spp/eprint/article05.html, 2010 [Feb. 26, 2016].
22 Satellite Network Security. Internet: http://www.irma-international.org/viewtitle/14070/, 2003 [Feb. 26, 2015].
23 Hacking Satellites — The New Frontier In Security Breaches. Internet: http://satmagazine.com/story.php?number=1794004708, 2010 [Feb. 26, 2015].
24 Ruben Santamarta Principal Security Consultant. Wake-up Call for SATCOM Security Internet: http://www.ioactive.com/pdfs/IOActive_SATCOM_Security_WhitePaper.pdf, 2012 [Feb. 26, 2013].
25 Greenberg, Andy. How To Hack The Sky.Internet: http://www.forbes.com/2010/02/02/hackers-cybercrime-cryptography-technology-securitysatellite.html, 2010 [Feb. 16, 2013].
26 Szczys, Mike. Grab your own images from NOAA weather satellites. Internet: http://hackaday.com/2011/10/20/grab-your-own-images-from-noaa-weather-satellites/, 2011 [Feb. 16, 2013].
27 Norris, Pat. Watching Earth from Space. Chichester, UK: Praxis Publishing, 2010.
28 Shachtman, Noah. (2008). How China Loses the Coming Space War (Pt. 2). Internet: http://www.wired.com/dangerroom/2008/01/inside-the-ch-1/, 2008 [March 20, 2013].
29 USCC. Report to Congress of the US-China Economic and Security Review Commission. Internet: http://origin.www.uscc.gov/sites/default/files/annual_reports/annual_report_full_11.pdf, 2011 [March 24, 2013].
30 Benson, Mark. Australia angers China over broadband contract. Internet: http://www.australiaforum.com/information/general/australia-angers-china-over-broadbandcontract. html, 2012 [Feb. 20, 2013].
31 Satellite Tracker. Internet: https://itunes.apple.com/us/app/satellitetracker/id306260378?mt=8, 2009 [Feb. 28, 2013].
32 GAO Unmanned Aircraft Systems. Internet: http://www.gao.gov/assets/660/652223.pdf, 2013 [Feb. 26, 2013].
33 Swann, Phillip. Washington DC TV Station 'Hijacked' By Mystery Photo. Internet: http://web.archive.org/web/20070716163040/http://www.tvpredictions.com/wjla071307.htm, 2007 [Feb. 20, 2013].
34 Hacking Satellites … Look Up to the Sky. Internet: http://resources.infosecinstitute.com/hacking-satellite-look-up-to-the-sky/, 2013 [Oct. 2, 2015].
35 Jason Fritz, SATELLITE HACKING: A Guide for the Perplexed, Culture Mandala: Bulletin of the Centre for East-West Cultural and Economic Studies, Vol. 10, No. 1, pp. 21-50, Dec. 2012 - May 2013.
36 Hacking Drones … Overview of the Main Threats Internet: http://resources.infosecinstitute.com/hacking-drones-overview-of-the-main-threats/
37 Greenberg, Andy. How To Hack The Sky. Internet: http://www.forbes.com/2010/02/02/hackers-cybercrime-cryptography-technology-securitysatellite.html, 2010 [Feb. 20, 2013].
38 Waller, J. Michael. Iran, Cuba Zap US Satellites.Internet: http://www.wnd.com/2003/08/20157/, 2003 [Feb. 16, 2013].
39 Hencke, David and Gibson, Owen. Protest to Libya after satellites jammed. Internet: http://www.guardian.co.uk/uk/2005/dec/03/politics.libya, 2005 [Feb. 6, 2013].
40 Thuraya Telecom Services Affected by Intentional Jamming in Libya. Internet: from http://www.thuraya.com/about/profile/media-releases/thuraya-telecom-services-affectedbyintentional-jamming-in-libya, 2011 [Feb.16, 2013].
41 Bellows, Alan. Remember, Remember the 22nd of November. Internet: http://www.damninteresting.com/remember-remember-the-22nd-of-november/, 2007 [Feb. 19, 2013].
42 British Viewers Hear Message. Ellensburg Daily Record. Internet: http://news.google.com/newspapers?id=KgkQAAAAIBAJ&sjid=YY8DAAAAIBAJ&dq=&pg=5086%2C3662230, 1977 [Feb. 20, 2013].
43 Jan Hanasz: The Polish TV Pirate. Internet: http://w.icm.edu.pl/tvS/pirat.htm, 1990 [Feb.19, 2013].
44 The Story of Captain Midnight. Internet: http://web.archive.org/web/20070128101239/http://www.signaltonoise.net/library/captmidn.htm, 2007 [Feb.17, 2013].
45 Rooker, J.W. Satellite Vulnerabilities. Internet: http://www.dtic.mil/cibin/GetTRDoc?AD=ADA507952, 2008 [Feb. 16, 2013].
46 Morrill, Dan. (2007). Hack a Satellite while it is in orbit. Internet: http://it.toolbox.com/blogs/managing-infosec/hack-a-satellite-while-it-is-in-orbit-15690, 2007 [Feb. 16, 2013].
47 Soares, Marcelo. The Great Brazilian Sat-Hack Crackdown. Internet: http://www.wired.com/politics/security/news/2009/04/fleetcom?currentPage=all, 2009 [Feb. 16, 2013].
48 Thompson, Cynthia. ABC 10 victim of hackers. Internet: http://abc10up.com/abc-10-victimof-hackers/, 2013 [Feb. 20, 2013].
49 Friedman, Herbert. (2006). Psychological Operations during the Israel-Lebanon War 2006. Internet: http://www.psywar.org/israellebanon.php, 2006 [Feb. 20, 2013].
50 Wohlmuth, Radek. Umelci napadli vysílání CT 2. Podívejte se jak. Internet: http://aktualne.centrum.cz/kultura/umeni/clanek.phtml?id=448450, 2007 [Feb. 20, 2013].
51 Zombies? Emergency Broadcast System hacked. (2013). Internet: http://www.uppermichiganssource.com/news/story.aspx?id=859352#.URnFMDvfLHR, 2013 [Feb. 20, 2013].
52 Campbell, Duncan. (1999). Cyber Sillies. Internet: http://www.guardian.co.uk/uk/1999/may/20/military.defence, 1999 [Feb. 27, 2013].
53 Here’s the scary new target hackers are going after. Internet: http://fortune.com/2015/08/04/globalstar-gps-satellite-network-hackers, 2010 [Feb. 2, 2013]
54 It's Surprisingly Simple to Hack a Satellite. Internet: http://motherboard.vice.com/read/itssurprisingly- simple-to-hack-a-satellite Space: Another frontier under threat. Internet: http://www.euractiv.com/sections/innovation-industry/space-another-frontier-under-threat- 321609, 2008 [Feb. 10, 2013].
Mr. Adam Ali Zare Hudaib
Information & Cyber Security Expert - Ukraine
adamhudaib@gmail.com