• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

 | 

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 

Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

 | 

MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

 | 

U.S. CISA urges to immediately patch Microsoft SharePoint flaw adding it to its Known Exploited Vulnerabilities catalog

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Hacking
  • Security
  • A Distributed Satellite Ground Station Network for internet freedom

A Distributed Satellite Ground Station Network for internet freedom

Pierluigi Paganini January 02, 2012

The news that I desire to discuss with you is the will to put into orbit a satellite system to combat new forms of censorship.

The project is certainly ambitious and effective, an hacker group has decided to launch a series of satellites for the composition of an alternative communication platform that would be used in case of censorship.

Along the launching of satellites, the hacker group promises to deliver a complex system of ground stations capable of using communications satellites to the implementations of alternative channels of communication. A new era is beginning, the era of free communication. The project, called “Global Grid Hackerspace“, was presented in Berlin at the Chaos Communication Congress in Berlin. It is considered the reply to any consorship action, any dangerous regulamentation like SOPA and PIPA are considered.

The project aim is to develop a modular antenna grid for satellite communication, because the hacker community needs a fallback infrastructure in case of natural and economic disaster to stay connected. The solution have to be developed on open-source hard- and software as well as open standards.

The short term goal is to gain insight into the nature, protocols and security features of satellite <> earth communication, building a working prototype of a modular receiver station with networking capabilities.

The midterm goals for Constellation & HGG are:

  • Telemetry and Tracking
  • Receiving and Broadcasting of data
  • Alternative infrastructure for and driven by community
  • Collaboration with active community
Among the ultimate goals so that a network  designed could perform:

  • Atmospheric measurements
  • GPS accuracy measurements
  • Environmental monitoring by wireless communication nets
  • Thunderstorm Strikes & cells
  • Nuclear detonation detection

The hacker activist Nick Farr and his group are working on the project with the collaboration of the Constellation,a German aerospace platform for research projects that use Internet-connected computers to do research in various aerospace related sciences and engineering. The hacker group message is:

“Therefore world domination is achieved by sharing information and making fast, cheap, secure, reliable network connections accesible.”

The team seem to have no doubt on the possibility to launch its satellites into space although having to compare with the restricted available economic resources. Innovation and ingenuity must be the driver concepts of the project, for example for satellites localizzation the German hacker group came up with the idea of a sort of reverse GPS that uses a distributed network of low-cost ground stations that can be bought or built by individuals,each individuals is itself part of the computing grig, being able in this way to pinpoint satellites at any given time improving the transmission of data from the satellites to Earth.

One of the main technology problems to be solved in terms of technology is that of Timing & Synchronization. The synchronization of communications in this specific context is crucial. The group aims to have suggested the use of GPS technology as a source to be used for synchronization and spatial referencing of components. The choice was largely dictated by the prevalence of low-cost devices that allow the use of technology, the possibility to quickly and easily locate any point on the earth’s crust and availability of an accurate pulse-per-second (PPS) signal that can be used to discipline the local clock oscillator to a high degree of precision.

The project is undoubtedly laudable and ambitious but it is easy to understand how dissentcan meet by the various states of the earth. Which government would like to have a satellite on his head without being able to exercise any control? Discounted at this point would havebeen offensive actions against each of the champions of digital freedom. Just the placement of satellites into space would in my opinion the main issue to be addressed and which undoubtedly poses many constraints in the choice of technological solutions to be adopted. In addition to these considerations of a purely technological issue we must consider the approach in terms of information security. Who would ensure secure operation of these satellites? Let us realize that this kind of infrastructure can make the throat to groups of criminals, to government agencies for intelligence operations and other hacker groups in conflict with the owners of the project. Too many, too many risks to be run without any guarantee.

Another objection might be related to the management mode of terrestrial communications and from the satellites. Who will ensure that they are not themselves the subject of espionage or censorship? Remember that to handle the infrastructure will be researchers and scientists, in any case far from any governmental unit groups with intelligence capabilities.

Personally, I am enthusiastic about the idea because I’m profoundly opposed to censorship, but I find it really hard the path to follow. Certainly not be the technological difficulties to put limitations, the group has the necessary skills, but their confidence in an infrastructure whose management is substantially not “guaranteed” due a project choice.

Pierluigi Paganini

References

http://events.ccc.de/congress/2011/Fahrplan/events/4699.en.html

http://www.youtube.com/watch?v=iuwkzNjaPwc&feature=player_embedded


facebook linkedin twitter

Censorship CIA Communication Content filtering Critical infrastructures cyber Cyber Crime freedom Hacktivism Intelligence Internet Large scale infiltration Satellite

you might also like

Pierluigi Paganini July 26, 2025
Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme
Read more
Pierluigi Paganini July 25, 2025
Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

    Intelligence / July 26, 2025

    Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

    Intelligence / July 25, 2025

    Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

    Security / July 25, 2025

    Koske, a new AI-Generated Linux malware appears in the threat landscape

    Malware / July 25, 2025

    Mitel patches critical MiVoice MX-ONE Auth bypass flaw

    Security / July 25, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT