• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

New Batavia spyware targets Russian industrial enterprises

 | 

Taiwan flags security risks in popular Chinese apps after official probe

 | 

U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

 | 

Hunters International ransomware gang shuts down and offers free decryption keys to all victims

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

 | 

Security Affairs newsletter Round 531 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

North Korea-linked threat actors spread macOS NimDoor malware via fake Zoom updates

 | 

Critical Sudo bugs expose major Linux distros to local Root exploits

 | 

Google fined $314M for misusing idle Android users' data

 | 

A flaw in Catwatchful spyware exposed logins of +62,000 users

 | 

China-linked group Houken hit French organizations using zero-days

 | 

Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

 | 

Europol shuts down Archetyp Market, longest-running dark web drug marketplace

 | 

Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

 | 

Cisco removed the backdoor account from its Unified Communications Manager

 | 

U.S. Sanctions Russia's Aeza Group for aiding crooks with bulletproof hosting

 | 

Qantas confirms customer data breach amid Scattered Spider attacks

 | 

CVE-2025-6554 is the fourth Chrome zero-day patched by Google in 2025

 | 

U.S. CISA adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog

 | 

A sophisticated cyberattack hit the International Criminal Court

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Hacking
  • Security
  • A Distributed Satellite Ground Station Network for internet freedom

A Distributed Satellite Ground Station Network for internet freedom

Pierluigi Paganini January 02, 2012

The news that I desire to discuss with you is the will to put into orbit a satellite system to combat new forms of censorship.

The project is certainly ambitious and effective, an hacker group has decided to launch a series of satellites for the composition of an alternative communication platform that would be used in case of censorship.

Along the launching of satellites, the hacker group promises to deliver a complex system of ground stations capable of using communications satellites to the implementations of alternative channels of communication. A new era is beginning, the era of free communication. The project, called “Global Grid Hackerspace“, was presented in Berlin at the Chaos Communication Congress in Berlin. It is considered the reply to any consorship action, any dangerous regulamentation like SOPA and PIPA are considered.

The project aim is to develop a modular antenna grid for satellite communication, because the hacker community needs a fallback infrastructure in case of natural and economic disaster to stay connected. The solution have to be developed on open-source hard- and software as well as open standards.

The short term goal is to gain insight into the nature, protocols and security features of satellite <> earth communication, building a working prototype of a modular receiver station with networking capabilities.

The midterm goals for Constellation & HGG are:

  • Telemetry and Tracking
  • Receiving and Broadcasting of data
  • Alternative infrastructure for and driven by community
  • Collaboration with active community
Among the ultimate goals so that a network  designed could perform:

  • Atmospheric measurements
  • GPS accuracy measurements
  • Environmental monitoring by wireless communication nets
  • Thunderstorm Strikes & cells
  • Nuclear detonation detection

The hacker activist Nick Farr and his group are working on the project with the collaboration of the Constellation,a German aerospace platform for research projects that use Internet-connected computers to do research in various aerospace related sciences and engineering. The hacker group message is:

“Therefore world domination is achieved by sharing information and making fast, cheap, secure, reliable network connections accesible.”

The team seem to have no doubt on the possibility to launch its satellites into space although having to compare with the restricted available economic resources. Innovation and ingenuity must be the driver concepts of the project, for example for satellites localizzation the German hacker group came up with the idea of a sort of reverse GPS that uses a distributed network of low-cost ground stations that can be bought or built by individuals,each individuals is itself part of the computing grig, being able in this way to pinpoint satellites at any given time improving the transmission of data from the satellites to Earth.

One of the main technology problems to be solved in terms of technology is that of Timing & Synchronization. The synchronization of communications in this specific context is crucial. The group aims to have suggested the use of GPS technology as a source to be used for synchronization and spatial referencing of components. The choice was largely dictated by the prevalence of low-cost devices that allow the use of technology, the possibility to quickly and easily locate any point on the earth’s crust and availability of an accurate pulse-per-second (PPS) signal that can be used to discipline the local clock oscillator to a high degree of precision.

The project is undoubtedly laudable and ambitious but it is easy to understand how dissentcan meet by the various states of the earth. Which government would like to have a satellite on his head without being able to exercise any control? Discounted at this point would havebeen offensive actions against each of the champions of digital freedom. Just the placement of satellites into space would in my opinion the main issue to be addressed and which undoubtedly poses many constraints in the choice of technological solutions to be adopted. In addition to these considerations of a purely technological issue we must consider the approach in terms of information security. Who would ensure secure operation of these satellites? Let us realize that this kind of infrastructure can make the throat to groups of criminals, to government agencies for intelligence operations and other hacker groups in conflict with the owners of the project. Too many, too many risks to be run without any guarantee.

Another objection might be related to the management mode of terrestrial communications and from the satellites. Who will ensure that they are not themselves the subject of espionage or censorship? Remember that to handle the infrastructure will be researchers and scientists, in any case far from any governmental unit groups with intelligence capabilities.

Personally, I am enthusiastic about the idea because I’m profoundly opposed to censorship, but I find it really hard the path to follow. Certainly not be the technological difficulties to put limitations, the group has the necessary skills, but their confidence in an infrastructure whose management is substantially not “guaranteed” due a project choice.

Pierluigi Paganini

References

http://events.ccc.de/congress/2011/Fahrplan/events/4699.en.html

http://www.youtube.com/watch?v=iuwkzNjaPwc&feature=player_embedded


facebook linkedin twitter

Censorship CIA Communication Content filtering Critical infrastructures cyber Cyber Crime freedom Hacktivism Intelligence Internet Large scale infiltration Satellite

you might also like

Pierluigi Paganini July 07, 2025
Taiwan flags security risks in popular Chinese apps after official probe
Read more
Pierluigi Paganini July 07, 2025
U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    New Batavia spyware targets Russian industrial enterprises

    Uncategorized / July 07, 2025

    Taiwan flags security risks in popular Chinese apps after official probe

    Security / July 07, 2025

    U.S. CISA adds Google Chromium V8 flaw to its Known Exploited Vulnerabilities catalog

    Hacking / July 07, 2025

    Hunters International ransomware gang shuts down and offers free decryption keys to all victims

    Cyber Crime / July 06, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 52

    Security / July 06, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT