Howard Fuhs
Howard Fuhs
Howard Fuhs
IT-Sicherheitsberater
IT-Sicherheitsberater
IT-Sicherheitsberater

A Definition of a Satellite Hacker

V. 1.0 - 21.02.2003
V. 1.1 - 05.10.2004
V. 1.2 - 10.06.2008

Copyright (C) 02/2003 by Howard Fuhs

Since the advent of computer technology in the hand of the masses the word Hacker became also wellknown outside of the hardcore hobbyist or academic computer community. Especially the media was since the 80’s dubbing everybody who was able to successfully boot a computer without breaking the power switch a Hacker. This widely and mostly incorrect use of the term Hacker led to the fact, that the word is in the public awareness always associates with something negative. Everybody who was involved with computers longer than Windows 95 is available (which is now more than 10 years) might know that beginning in the 60’s up to the mid 80’s the word Hacker was meant more positive and was a promotion for someone called so.

Thinking about the early and positive sense of the word I would like trying to give a definition of a Satellite Hacker in that sense.

A Satellite Hacker is a person which is qualified in detecting, exploring, analyzing and decoding unknown satellite signals and satellite functions without harming the explored system and without behaving with a malicious attitude.

This short definition is what I understand when the word Hacker is used in any area of modern technological life. Therfore this definition is not necessarily restricted to people messing around with satellite signals. With some minor changes this definition can also be applied to people in the field of computer software, hardware, chip reengineering, etc.

It shall also be mentioned, that this definition of a Hacker does not require him to act lawfull but only non-malicious to the infrastructure as such he is exploring. This might led to some debate but from my point of view there are a lot of laws in modern society which are at least questionable if not obsolete and unnecessary surpressing, made by people in the legislative who have mostly no idea what they are doing.

Furthermore this definition is not intented to give the word Hacker a moral background in the sense of national laws.

 

I invite your suggestions for revising this document. I plan to review and revise this document as the need arises.

Copyright (C) 02/2003 by Howard Fuhs
All Rights Reserved!

 

Fuhs Security Consultants
 
Alle Rechte
vorbehalten!

 
 Realisation:
Frank Ziemann
Home Impressum


WebCam
24h WorldTimer PCI DSS Publikationen Digital Publishing EN English
Thema 00
Hier finden Sie Information über Dinge, von denen wir jetzt noch nichts verraten wollen.
Fallbeispiele
Fallbeispiele aus der alltäglichen Datenunsicherheitspraxis.
Neues
Aktuelle Neuigkeiten und Medieninformationen.
Service
Sichern Sie Ihr Unternehmen durch unsere Dienstleistungen und Serviceangebote ab.
Fallbeispiele
Die neue 24h WorldTimer Uhrenserie mit standardisierter astronomischer Zeitangabe nach ISO 8601 für 24-Stunden-Umgebungen
PCI DSS
Dienstleistungen und Serviceangebote rund um den Payment Card Industry Data Security Standard
Publikationen
Fachartikel und Buchmanuskripte von Howard Fuhs.
Digital Publishing
Publikationen von Howard Fuhs auf CD-ROM.
EN English pages
Please find here our English pages for international visitors.
      E-Mail
Sie erreichen uns
per E-Mail unter
  info@fuhs.de
    Realisation
EDV-Beratung
Frank Ziemann
www.fz-net.com
Topics  
Topics
Hacker Definition
Malicious Intend
History
TV-Sat Revolution
Mil Sat Coms
Advtg Digi Mod
Listen 2 FDM
Mod Types
Sat Freq Bands
Satellite Hackers
Countermeasures
URL List
Further Readings
Lecture Handout
Hacker Definition
A Definition of a Satellite Hacker
Malicious Intend
Malicious Intend of Satellite Hackers
The History
The History of Satellite Monitoring and Satellite Hacking
TV Sat-Revolution
The TV Satellite Revolution
Satellite Hackers
The Satellite Hackers
Countermeasures
Countermeasures - How can a company protect their information?
Lecture Handout
Lecture Handout - 25.06.2003 - PDF File
URL List
The URLs are referring to information used at the lecture about Satellite Hacking.
Further Readings
This is a small list of examples for books and magazines covering the topic of satellite technology.
Advantages Digi Mod
A list of advantages of Digital Modulation
How to listen to FDM
A small example on how to listen to exotic modulations without the proper and expensive equipment
Modulation Types
Overview: several different modulation types (analog & digital)
Satellite Frequency Bands
Table of frequency bands used by satellites
Mil Sat Coms
A short primer on Military Satellite Communications