Wednesday, November 23, 2011

Chinese hackers took control of NASA satellite for 11 minutes - Geek.com

Chinese hackers took control of NASA satellite for 11 minutes | Geek.com .wp-polls .pollbar {margin: 1px;font-size: 6px;line-height: 8px;height: 8px;background-image: url('http://www.geek.com/wp-content/plugins/wp-polls/images/default/pollbg.gif');border: 1px solid #c8c8c8;}  HomeGeek.com Home AppleApple Reviews GadgetsGadget Reviews MobileMobile Phone Reviews GamesVideo Game Reviews ChipsComputer Processors Technology ForumsForumsTechnology Forums Technology ShopShopTechnology Shop Tech Support Chips Apple Mobile Games Gadgets Software The Lounge Geek.com Stuff Cameras Cell Phones Computers Electronics Laptops Memory Monitors PDAs Software Storage Devices Video Games All Products Search: All Articles Products Glossary Forums Username: Password: Cancel Forgot Username / Password? Back to Geek-Cetera Print Chinese hackers took control of NASA satellite for 11 minutes Nov. 19, 2011 (11:05 am) By: Matthew Humphries


Landsat-7 and Terra EOS satellites

Hacking is becoming a growing problem on Earth. It may seem strange to mention Earth, as there’s not much to hack outside of our planet’s atmosphere unless you count satellites. Even then, how feasible would it be to gain access to the systems running such devices?

Well, China not only has people working on such things, it has been discovered they actually managed to take control of two NASA satellites for more than 11 minutes.

The successful attacks occurred in 2007 and 2008. The more serious of the two happened in ’08 when NASA had control of the Terra EOS earth observation system satellite disrupted for 2 minutes in June, and then a further 9 minutes in October. During that time, whoever took control had full access to the satellites’ systems, but chose to do nothing with it.

The second hack affected the Landsat-7 satellite on two occasions, one in October of ’07, the other in July of ’08. Unlike the Terra OS incident, this hack did not see control taken away, but access was gained.


Washington D.C. captured by Landsat-7 in 2005

We only know about these hacks because of a report becoming available this month. It is entitled the 2011 Report to Congress of the U.S.-China Economic and Security Review Commission and made available online at the USCC website (link below). The specific details can be found on page 216 of the document, which is actually page 224 of the PDF.

It is suggested such malicious cyber activity in relation to satellites can be carried out to either destroy the system rendering it useless, or to exploit it to see what the “enemy” sees and gain intelligence on “ground-based infrastructure.”

Interestingly, the report points to the use of ground stations outside of the U.S. to control satellites as weak points. The reason being they use the Internet for data access and communication, not a closed link. We don’t know if that is still the case, but we’d hope not, or at least hope that the communication link is using better encryption and security checks.

Read the report online at the USCC website (PDF), via ITWorld

Tags: 2007, 2008, 2011 Report to Congress of the U.S.-China Economic and Security Review Commission, China, control, hack, hacking, internet, Landsat-7, NASA, satellite, Terra EOS DiggDigg redditReddit FacebookFacebook StumbleUponStumble TwitterTwitter Email To Email Address:
To Name:
Your Name:
Your Email Address

Popular Geek Pick Articles Chinese hackers took control of NASA satellite for 11 minutes Pure Google? Verizon sneaks two bloatware apps onto the Galaxy Nexus Analyst predicts Amazon smartphone in 2012 Kindle Fire hacked to access Android Market Google and Facebook, it’s time to take the kid gloves off about SOPA Geek Pick Archives November 2011October 2011September 2011August 2011July 2011June 2011May 2011April 2011March 2011February 2011January 2011December 2010November 2010October 2010September 2010August 2010July 2010June 2010 Search: All Articles Products Glossary Forums Previous
World’s first Galaxy Nexus owner finds developer ROM on his phone
Is George Clooney being considered for the role of Steve Jobs?
Kindle Fire hacked to access Android Market
Google’s Nyan cat obsession spills onto Google+
Analyst predicts Amazon smartphone in 2012
Google Music exits beta, Music Store coming to Android Market
Google and Facebook, it’s time to take the kid gloves off about SOPA
Chinese hackers took control of NASA satellite for 11 minutes
FXI Cotton Candy is an ARM PC in a USB stick
Pure Google? Verizon sneaks two bloatware apps onto the Galaxy Nexus Next Recent Geek Pick Activity Popular Article CommentsForum Talk artyiom

there are many ideas a man can think but if he thinks it twice he thought about another idea which makes his idea non...

Posted In: Geek.com Stuff Read More » ExpertOnCoolers

The break in the case came when investigators focused on a grainy surveillance video that showed the boy, wearing his...

Posted In: Geek.com Stuff Read More » davidross

One of the most attracting features of Mac OSX Lion is auto save for documents. And Autosave would not save the modi...

Posted In: Apple Read More » View All Forum Talk » Prachi Desai

I am a big fab of Windows. Windows 8 Developer Edition is now available for download, I have installed it on PC. I must ...

Posted In: Download a preview build of Windows 8 tonight Prachi Desai

I am a big fab of Windows. Windows 8 Developer Edition is now available for download, I have installed it on PC. I must ...

Posted In: Download a preview build of Windows 8 tonight Georgecarlinjr

Apparently that also takes away the neat new task manager and explorer, which is a shame.Of course you can have the bes...

Posted In: How to get a Windows 7 start menu in Windows 8 Chinese hackers took control of NASA satellite for 11 minutes

Pure Google? Verizon sneaks two bloatware apps onto the Galaxy Nexus

Analyst predicts Amazon smartphone in 2012

Kindle Fire hacked to access Android Market

Google and Facebook, it’s time to take the kid gloves off about SOPA

.contentBox { clear: both; } @import url(http://www.geek.com/wp-content/themes/geek5a/styles/price-grabber.css); Geek Shop Categories Cameras Cell Phones Computers Electronics Laptops Memory Monitors PDAs Software Storage Devices Video Games All Products Geek.com Buyer's Guides Desktop Computer Buyer's GuideDigital Camera Buyer's GuideHDTV Buyer's GuideLaptop Buyer's GuideNetbook Buyer's GuideSmartphone Buyer's Guide Geek Feeds Geek Feeds Apple Gadgets Mobile Games Chips More Geek Goes Social Geek on Facebook Geek on Youtube Geek on Twitter Geek.com Archives This Month Last Month All Archives Reviews Newsletters Features Glossary © 1996-2011 Ziff Davis, Inc. AdChoices (function(){var e=document,b,a=(e.location.protocol=="https:"?"https":"http"),c=(a=="https"?"https://info.betteradvertising.com/c/betrad/pub/":"http://cdn.betrad.com/pub/");e.getElementById("_bapw-icon").src=c+"icon1.png";e.getElementById("_bapw-link").onclick=function(){var f=this;function d(i,l){var j=e.getElementsByTagName("head")[0]||e.documentElement,h=false,g=e.createElement("script");function k(){g.onload=g.onreadystatechange=null;j.removeChild(g);l()}g.src=i;g.onreadystatechange=function(){if(!h&&(this.readyState=="loaded"||this.readyState=="complete")){h=true;k()}};g.onload=k;j.insertBefore(g,j.firstChild)}this.onclick="return false";d(a+"://ajax.googleapis.com/ajax/libs/jquery/1.4.4/jquery.min.js",function(){d(c+"pub1.js",function(){BAPW.i(f,{pid:8,ocid:660},false)})});return false};b=e.createElement("img");b.src=a+"://l.betrad.com/pub/p.gif?pid=8&ocid=660&ii=1&r="+Math.random();b.height="1";b.width="1";e.body.appendChild(b)}()); About Contact Us Advertise Posting Guidelines Privacy Statement Terms of Use Glossary document.write(unescape("%3Cscript src='" + (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js' %3E%3C/script%3E")); COMSCORE.beacon({ c1:2, c2:6035546, c3:"", c4:"", c5:"", c6:"", c15:"" });

View the original article here