Are these SpaceX’s Starlink satellites?

Looks like I may have found the orbital elements (TLEs) of SpaceX’s Starlink Internet satellites. I noticed on SatView’s site that three objects entered orbit on 22 February, one of which was SpaceX’s PAZ satellite. PAZ was the primary payload on SpaceX’s most recent Falcon 9 flight and the Starlink birds were the secondaries.

Starlink orbits!

Following Satview’s links takes you to the real-time tracking of 43616U and 43617U (International Designators 2018-020A & 2018-020B), two satellites that are almost certainly Starlink’s TinTin A & B (or Microsat 2A & 2B). They show up in NORAD’s catalog as the bland descriptions of “Object B” and “Object C” and were launched from Vandenberg Air Force Base on the same day as PAZ. From CelesTrak:

So now I know both what to look for and where and when to look for it. Now I need to acquire the gear to acquire the signals, which might be the biggest stumbling block of all. Well, aside from actually decoding any signals I happen to get.

Yes, folks, this actually is rocket science.

SpaceX’s Starlink satellite internet: It’s time for tough talk on cyber security in space | Science| In-depth reporting on science and technology | DW | 21.02.2018

It’s time to talk about how secure our flying Internet will be.

Imagine a cutting-edge industry that’s all about pushing boundaries, finding solutions to problems that never existed and “disrupting” absolutely everything we’ve come to rely on with a cast-iron belief in better-life-through-technology. Now, imagine them just “sitting around a big table with a lot of coffee, and talking about it.”

It’s not exactly an image of action, is it? No matter what the “it” is.

And yet that’s precisely the way Constantin Constantinides describes the satellite industry today. Constantinides is a radio frequency engineer with a satellite company in Glasgow called Alba Orbital. And the “it” refers to … cyber security.

Cyber security is one of the biggest unsolved challenges we have on Earth, and it’s about to become a far larger challenge in space.

You could say, “Well, at least they are talking about it.” At least cyber security is on the new space agenda. And it had certainly better be, because the more satellites we fire up into space, and the more those satellites form huge constellations, the more we rely on the data they accrue — the communications networks, location services, Earth Observation, shipping, flight and freak weather tracking, plus masses of unimagined stuff.

And, the more we’re putting our daily lives — human life — at risk.

Source: SpaceX?s Starlink satellite internet: It?s time for tough talk on cyber security in space | Science| In-depth reporting on science and technology | DW | 21.02.2018

Hacking and tracking SpaceX’s Starlink Internet satellites

Starlink Microsat/TinTin

Update 1 March: I found the satellites!

As my family and I strolled our neighborhood at sunset, my eagle-eyed son spotted a light in the sky sliding slowly away from us before fading. At first we thought it was the International Space Station (ISS) but it was too dim for that. We decided it was a low-earth orbit satellite and the conversation shifted to SpaceX’s recent launch of two low-earth-orbit test satellites for their proposed satellite Internet service, Starlink.

I have no idea whether the satellite we watched is a Starlink Satellite (more formally called TinTin A & B and previously known as Microsat 2A and 2B). I didn’t have my satellite tracking app fired up on my phone at the time. It did get me thinking, though, that it would be fun to track the TinTin satellites to see what I could discover.

A search on the Internet reveals very little information about these birds. I have not yet found the two-line elements (TLE) which describe their orbits. They haven’t been mentioned on my satellite-tracking email list, either.

What if I could locate them, then what? I’d like to try to collect whatever telemetry is being broadcast, even if it’s just beeps. Better yet, I could capture the data stream from the Internet side but that would be challenging to do anything with as it’s said to be encrypted. The birds do have imagery capability. What if I could tune into that and download an image snapped from orbit? Wouldn’t that be cool!
Continue reading

Taking my hacking to a new level: the serial level

I void warranties. Showing off my custom-built CarolinaCon badge last year.

I spent some time over the long President’s Day weekend hacking some of my home devices with the goal of putting new firmware on them. Up until now this has consisted mostly of flashing custom firmware through the existing upgrade channels of whatever device I was working with. Other times I would flash the devices by having them download new firmware from a fileserver.

Sometimes, though, there is no other way to bend a device to your will than to tap into the device’s serial console. This is often done by using a special adapter to convert the low-level signals into the kind that a modem would use. Then you simply use any suitable terminal program to interact with the device. Even though most embedded devices do not come with real computer screens, one can use the serial console to read messages and type commands.

My new serial cable arrives this week which should allow me to unlock nearly any device in my home. I’m looking forward to voiding some more warranties!

Radiation Will Tear Elon Musk’s Rocket Car to Bits in a Year

Plastics expert Dr. William Carroll of Indiana University says Elon Musk’s Starman Tesla is no match for the rough-and-tumble environment of space.

The real forces that will tear the car apart over hundreds of millions of years in space, Carroll said, are solid objects and — most importantly — radiation.

Even if the car avoids any major collisions, over very long time horizons, it’s unlikely the vehicle could avoid the kind of collisions with micrometeorites that leave other space junk riddled with craters over time, Carroll said.

But assuming those collisions don’t completely tear the car apart, the radiation will.

Down on Earth, a powerful magnetic field and the atmosphere largely protect human beings (and Tesla Roadsters) from the harsh radiation of the sun and cosmic rays. But spacefaring objects have no such protections.

Source: Radiation Will Tear Elon Musk’s Rocket Car to Bits in a Year

I now remember why I left DOS behind

This is harder to emulate than you think.

Because I apparently haven’t had enough technical challenges to solve, this weekend I decided to return to my little side project of getting my old DOS-based PCBoard BBS running in a virtual machine. For this project I’m using oVirt as the VM host and booting FreeDOS 1.2.

Needless to say, I’m running into some challenges. My first thought is: oh my God what a kludgy mess DOS is! It’s a half-assed solution on top of a half-assed solution on top of a half-assed solution. Device drivers up the wazoo. More than 640K memory? Gotta load EMM drivers. Want to use a CD? Load an ATAPI driver. Want USB? Hah, not available! Want networking? Find a packet driver for your specific network card and ensure you use the right interrupts. Oh, and you’ll still need to load a separate TCP/IP stack! With so many parts to the puzzle it’s a miracle anything ever worked at all!

It took me a little while but I finally did get my DOS VM networked via TCP/IP. Then when I loaded PCBoard it initially seemed to be looking for a (non-existent) modem. Subsequent runs had it complaining about “Cannot run as a child of BASIC” before exiting. I am assuming this is a problem with the way PCBoard was compiled using QuickBASIC and QuickBASIC (QB) might not be playing nicely with FreeDOS. I’ve seen others say QB works fine with FreeDOS but I don’t know if that applies to the compiled programs or not.

So, now I’m on to installing a DOS VM using MS-DOS 6.22. I can’t imagine QuickBASIC not liking MS-DOS.

The project continues. It may or may not be worth the trouble but at the very least it is a reminder of just how far we’ve come with operating systems!

Sound bite: Despite Pono’s promise, experts pan HD audio – CNET

This isn’t a new story but it’s one that I found very enlightening on the topic of digital audio formats.

Pono Music’s roaring success on Kickstarter, raising $4.3 million so far, shows that thousands of people believe better audio quality is worth paying for.

The company — backed by star musician Neil Young and selling a $400 digital audio player along with accompanying music — promises people will hear a difference between Pono Music and ordinary music that’s “surprising and dramatic.” The company’s promise is based in part on music files that can contain more data than not only conventional MP3 files, but also compact discs.

There’s no doubt that highly compressed music files, played over tinny laptop speakers or cheap earbuds, leave a lot of room for improvement. But outdoing CD quality? That’s a harder sell.

Source: Sound bite: Despite Pono’s promise, experts pan HD audio – CNET

USAF Is Jamming GPS In The Western U.S. For Largest Ever Red Flag Air War Exercise – The Drive

Interesting. Glad to see the military conducting exercises without GPS, now that Russia has shown its willingness to jam it. In war we must be prepared to go without this incredibly-useful resource.

The year’s first iteration of the USAF’s premier set of aerial war games, known commonly as Red Flag, is kicking off today at Nellis Air Force Base just outside of Las Vegas, but this exercise will be different than any in the past. Not only is it the largest of its kind in the exercise’s 42 year history, but the USAF is going to blackout GPS over the sprawling Nevada Test and Training Range to challenge aircrews and their weaponry under realistic fighting conditions. The tactic will spill over throughout the region, with warnings being posted stating inconsistent GPS service could be experienced by aircrews flying throughout the western United States.

Source: USAF Is Jamming GPS In The Western U.S. For Largest Ever Red Flag Air War Exercise – The Drive

Bonus: Read more of the Navy’s rationale for blocking GPS.

Candid camera: Dutch hacked Russians hacking DNC, including security cameras | Ars Technica

Hackers hacking hackers. Reason #47,672 why I love the Dutch!

According to a report in the Dutch newspaper de Volkskrant, the General Intelligence and Security Service of the Netherlands (AIVD)—the Netherlands’ domestic intelligence service—had hacked into the network of a building at a Russian university in Moscow some time in the summer of 2014. The building housed a group running a hacking campaign now known as “Cozy Bear,” one of the “threat groups” that would later target the Democratic National Committee.

Russia’s hack of State Department was “hand-to-hand” combatAIVD’s intrusion into the network gave them access to computers used by the group behind Cozy Bear and to the closed-circuit television cameras that watched over them, allowing them to literally witness everything that took place in the building near Red Square, according to the report. Access to the video cameras in a hallway outside the space where the Russian hacking team worked allowed the AIVD to get images of every person who entered the room and match them against known Russian intelligence agents and officials.

Based on the images, analysts at AIVD later determined that the group working in the room was operated by Russia’s Foreign Intelligence Service (SVR). An information and technology sharing arrangement with the National Security Agency and other US intelligence agencies resulted in the determination that Cozy Bear’s efforts were at least in part being driven by the Russian Federation’s leadership—including Russian President Vladimir Putin.

Source: Candid camera: Dutch hacked Russians hacking DNC, including security cameras | Ars Technica

Google (GOOG) can still use Bluetooth to track your Android phone when Bluetooth is turned off — Quartz

This seems to cross the “don’t be evil” line, Google. Tracking people after the fact? Really?

When it comes to tracking the precise location of an Android user’s phone, Google appears to use every means available—including Bluetooth-based location information transmitted to the company when the user might think they have Bluetooth turned off entirely.

A Quartz investigation found that a user can turn Bluetooth off on their smartphone running Google’s Android software, and the phone will continue to use Bluetooth to collect location-related data and transmit that data to Google. It does this by sending Google, among other things, the unique identifier codes of Bluetooth broadcasting devices it encounters. Such devices, known as beacons, are often used in stores, museums, and other public places to help phones ascertain their locations within buildings. Alphabet-owned Google does the tracking in part so advertisers can target “more useful” digital ads to users, but Quartz discovered that the company taps into an array of signals that can yield an individual’s whereabouts even when the user thinks they’ve disabled such tracking.

Source: Google (GOOG) can still use Bluetooth to track your Android phone when Bluetooth is turned off — Quartz