Home   >   CSC-OpenAccess Library   >    Manuscript Information
Satellite Network Hacking & Security Analysis
Adam Ali Zare Hudaib
Pages - 8 - 55     |    Revised - 31-03-2016     |    Published - 30-04-2016
Volume - 10   Issue - 1    |    Publication Date - April 2016  Table of Contents
MORE INFORMATION
KEYWORDS
Satellite Network, Satellite Communications, Satellite Network Security, Satellite Network Treats, Satellite Network Vulnerabilities, Satellite Security Analysis, Satellite Hacking.
ABSTRACT
Satellites play a significant role in communication, early warning systems, global broadcasting, meteorology, navigation, reconnaissance, remote sensing, and surveillance.Satellite services cover practically every sector, from mobile cellular communication to telemedicine, so any interference with them could have a serious effect. Satellites are a strategic asset for any country and are considered as “critical infrastructure,” therefore they are considerable as privileged targets for a possible cyber attack.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
Bellows, Alan. Remember, Remember the 22nd of November. Internet: http://www.damninteresting.com/remember-remember-the-22nd-of-november/, 2007 [Feb. 19, 2013].
Benson, Mark. Australia angers China over broadband contract. Internet: http://www.australiaforum.com/information/general/australia-angers-china-over-broadbandcontract. html, 2012 [Feb. 20, 2013].
BGAN: Global voice and broadband data. 2013, Internet: http://www.inmarsat.com/cs/groups/inmarsat/documents/document/019403.pdf, 2009 [March 28, 2013].
British Viewers Hear Message. Ellensburg Daily Record. Internet: http://news.google.com/newspapers?id=KgkQAAAAIBAJ&sjid=YY8DAAAAIBAJ&dq=&pg=5086%2C3662230, 1977 [Feb. 20, 2013].
Campbell, Duncan. (1999). Cyber Sillies. Internet: http://www.guardian.co.uk/uk/1999/may/20/military.defence, 1999 [Feb. 27, 2013].
Col James G. Lee, “Counterspace Operations for Information Dominance,” in Beyond the Paths of Heaven: The Emergence of Space Power Thought, ed. Col Bruce M. DeBlois, Maxwell AFB, AL: Air University Press, 1999, p. 281.
Davies, Roger. New satellite uplink trends. Internet: http://broadcastengineering.com/mag/new-satellite-uplink-trends, 2006 [March 26, 2013].
Dennis, Louise , Fisher, Michael and Hindriks, Koen . A Semantic Framework for Socially Adaptive Agents: Towards strong norm compliance. Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems, 2015, pp. 423-432.
Edition, The Comsys VSAT Report, VSAT Statistics. Internet: http://defensesystems.com/articles/2012/03/28/c4isr-2-military-vsat-technologyadvances.aspx, [March 26, 2013].
Electromagnetic Spectrum. Internet: http://en.wikipedia.org/wiki/File:Electromagnetic-Spectrum.png, 2012 [Feb.14, 2013].
Friedman, Herbert. (2006). Psychological Operations during the Israel-Lebanon War 2006. Internet: http://www.psywar.org/israellebanon.php, 2006 [Feb. 20, 2013].
GAO Critical Infrastructure Protection Commercial Satellite Security Should Be More Fully Addressed. Internet: http://www.gao.gov/assets/240/235485.pdf. 2002 [Feb. 12, 2013].
GAO Unmanned Aircraft Systems. Internet: http://www.gao.gov/assets/660/652223.pdf, 2013 [Feb. 26, 2013].
Geovedi, Jim; Iryandi, Raditya; and Zboralski, Anthony. Hacking A Bird inthe Sky 2.0. Internet: http://www.youtube.com/watch?v=dLbRuJikb1U, 2008 [Feb. 10, 2013].
Gordon, Steven. Talking to Martians: Communications with Mars Curiosity Rover. Internet: http://sandilands.info/sgordon/communications-with-mars-curiosity, 2012 [Feb.27, 2012].
Greenberg, Andy. How To Hack The Sky. Internet: http://www.forbes.com/2010/02/02/hackers-cybercrime-cryptography-technology-securitysatellite.html, 2010 [Feb. 20, 2013].
Greenberg, Andy. How To Hack The Sky.Internet: http://www.forbes.com/2010/02/02/hackers-cybercrime-cryptography-technology-securitysatellite.html, 2010 [Feb. 16, 2013].
Gutteberg, Odd. Telektronikk 4.92 Satellite Communications. Internet: http://www.telenor.com/wp-content/uploads/2012/05/T92_4.pdf , 1993 [March 26, 2013].
Hacking Drones … Overview of the Main Threats Internet: http://resources.infosecinstitute.com/hacking-drones-overview-of-the-main-threats/
Hacking Satellites — The New Frontier In Security Breaches. Internet: http://satmagazine.com/story.php?number=1794004708, 2010 [Feb. 26, 2015].
Hacking Satellites … Look Up to the Sky. Internet: http://resources.infosecinstitute.com/hacking-satellite-look-up-to-the-sky/, 2013 [Oct. 2, 2015].
Hencke, David and Gibson, Owen. Protest to Libya after satellites jammed. Internet: http://www.guardian.co.uk/uk/2005/dec/03/politics.libya, 2005 [Feb. 6, 2013].
Here’s the scary new target hackers are going after. Internet: http://fortune.com/2015/08/04/globalstar-gps-satellite-network-hackers, 2010 [Feb. 2, 2013]
It's Surprisingly Simple to Hack a Satellite. Internet: http://motherboard.vice.com/read/itssurprisingly- simple-to-hack-a-satellite Space: Another frontier under threat. Internet: http://www.euractiv.com/sections/innovation-industry/space-another-frontier-under-threat- 321609, 2008 [Feb. 10, 2013].
Jan Hanasz: The Polish TV Pirate. Internet: http://w.icm.edu.pl/tvS/pirat.htm, 1990 [Feb.19, 2013].
Jason Fritz, SATELLITE HACKING: A Guide for the Perplexed, Culture Mandala: Bulletin of the Centre for East-West Cultural and Economic Studies, Vol. 10, No. 1, pp. 21-50, Dec. 2012 - May 2013.
Jonathan. Unmanned X-47B aircraft completes sea trial. Internet: http://news.cnet.com/8301-11386_3-57560226-76/unmanned-x-47b-aircraft-completes-seatrial/, 2012 [Feb. 26, 2013].
Laurie, Adam. Satellite Hacking for Fun and Profit. Internet: http://www.securitytube.net/video/263, 2009 [Feb.14, 2013].
Messmer, Ellen. Researchers crack satellite encryption. Internet: http://www.networkworld.com/news/2012/020812-satellite-encryption-255893.html, 2003 [Feb. 26, 2013].
Morrill, Dan. (2007). Hack a Satellite while it is in orbit. Internet: http://it.toolbox.com/blogs/managing-infosec/hack-a-satellite-while-it-is-in-orbit-15690, 2007 [Feb. 16, 2013].
Norris, Pat. Watching Earth from Space. Chichester, UK: Praxis Publishing, 2010.
Prime: Cybersecurity Risk Management Strategies For SATCOM Networks. Internet: http://www.milsatmagazine.com/cgi-bin/display_article.cgi?number=1142237172, 2012 [Feb. 14, 2013].
Rooker, J.W. Satellite Vulnerabilities. Internet: http://www.dtic.mil/cibin/GetTRDoc?AD=ADA507952, 2008 [Feb. 16, 2013].
Ruben Santamarta Principal Security Consultant. Wake-up Call for SATCOM Security Internet: http://www.ioactive.com/pdfs/IOActive_SATCOM_Security_WhitePaper.pdf, 2012 [Feb. 26, 2013].
Satellite Network Security. Internet: http://www.irma-international.org/viewtitle/14070/, 2003 [Feb. 26, 2015].
Satellite Tracker. Internet: https://itunes.apple.com/us/app/satellitetracker/id306260378?mt=8, 2009 [Feb. 28, 2013].
Shachtman, Noah. (2008). How China Loses the Coming Space War (Pt. 2). Internet: http://www.wired.com/dangerroom/2008/01/inside-the-ch-1/, 2008 [March 20, 2013].
Soares, Marcelo. The Great Brazilian Sat-Hack Crackdown. Internet: http://www.wired.com/politics/security/news/2009/04/fleetcom?currentPage=all, 2009 [Feb. 16, 2013].
Space Security Index 2012. Internet: http://swfound.org/media/93632/SSI_FullReport_2012.pdf, 2012 [Feb.14, 2013].
Sri Lankan Terrorists Hack Satellite. Internet: http://it.slashdot.org/story/07/04/13/068222/sri-lankan-terrorists-hack-satellite, 2007 [Feb.14, 2013].
Swann, Phillip. Washington DC TV Station 'Hijacked' By Mystery Photo. Internet: http://web.archive.org/web/20070716163040/http://www.tvpredictions.com/wjla071307.htm, 2007 [Feb. 20, 2013].
Szczys, Mike. Grab your own images from NOAA weather satellites. Internet: http://hackaday.com/2011/10/20/grab-your-own-images-from-noaa-weather-satellites/, 2011 [Feb. 16, 2013].
The Story of Captain Midnight. Internet: http://web.archive.org/web/20070128101239/http://www.signaltonoise.net/library/captmidn.htm, 2007 [Feb.17, 2013].
Thompson, Cynthia. ABC 10 victim of hackers. Internet: http://abc10up.com/abc-10-victimof-hackers, 2013, [Feb. 20, 2013].
Thompson, Cynthia. ABC 10 victim of hackers. Internet: http://abc10up.com/abc-10-victimof-hackers/, 2013 [Feb. 20, 2013].
Thuraya Telecom Services Affected by Intentional Jamming in Libya. Internet: from http://www.thuraya.com/about/profile/media-releases/thuraya-telecom-services-affectedbyintentional-jamming-in-libya, 2011 [Feb.16, 2013].
UCS Satellite Database. Database, official names only. Internet: http://www.ucsusa.org/nuclear_weapons_and_global_security/space_weapons/technical_issues/ucssatellite-database.html, 2012 [Feb. 26, 2013].
USCC. Report to Congress of the US-China Economic and Security Review Commission. Internet: http://origin.www.uscc.gov/sites/default/files/annual_reports/annual_report_full_11.pdf, 2011 [March 24, 2013].
Voll, Liv Oddrun and Klungsoyr, Gunn Kristin. Very Small Aperture Terminal (VSAT) Systems Basic Principles and Design. Internet: http://www.telektronikk.com/volumes/pdf/4.1992/Side_39_45.pdf, 1993 [March 26, 2013].
Waller, J. Michael. Iran, Cuba Zap US Satellites.Internet: http://www.wnd.com/2003/08/20157/, 2003 [Feb. 16, 2013].
Wilson, “Threats to United States Space Capabilities.” Internet: https://fas.org/spp/eprint/article05.html, 2010 [Feb. 26, 2016].
Wohlmuth, Radek. Umelci napadli vysílání CT 2. Podívejte se jak. Internet: http://aktualne.centrum.cz/kultura/umeni/clanek.phtml?id=448450, 2007 [Feb. 20, 2013].
Wong, Wilson WS; and Fergusson, James. Military Space Power. Santa Barbara, California: Praeger, 2010.
Zombies? Emergency Broadcast System hacked. (2013). Internet: http://www.uppermichiganssource.com/news/story.aspx?id=859352#.URnFMDvfLHR, 2013 [Feb. 20, 2013].
Mr. Adam Ali Zare Hudaib
Information & Cyber Security Expert - Ukraine
adamhudaib@gmail.com


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS