SlideShare a Scribd company logo
1 of 18
How to get the message out, when
“someone” shuts down the internet
Pavel Táborský
Credentials
• ~10+ years in IT, GSM networks before that
• HAM License ~1 year
• And that’s about it…
Credits...
• Bruce Sutherland, KO4IN
• How To Get Your Message Out When Your
Government Turns Off The Internet
– @DEFCON19
HAM Radio
• Old tech since about 1900
• Usually two skilled operators needed, one at
each end
• Ionospheric conditions…
• (Moon, Aircraft, Satellites)
Gear
• Wet dream HF/SSB station
– HF radio 40k+
– Mast + yagi dir antenna array ~100k
– Power amplifier(s) etc.
• Or on Budget:
– Yaesu FT-897 ~20k
– Longwire antena ~the cost of the wire
– Essentially what WW2 operators did
We will use
• HAM radio license…
• APRS capable handheld radio ~5k
• Yagi antenna made of tape measure and PVC
pipe ~200
• VHF Band (145.825/144.800)
• HAM radio satellite (OSCAR)
– ISS
– PC-SAT (Navy OSCAR – 44)
• Twitter
We will use
Alternatively going cheap(er)
APRS
• Developed in mid ‘80s by Bob Bruninga
(WB4APR)
• Originally position reporting system
• Then Messages and WX reports
• X.25 for HAMs
– 1200baud
– AFSK modulation
• APRS is a retronym of WB4APR
– Automatic Packet/Position Reporting System
APRS cont’d
• The network consists of radio stations
operating entirely with broadcasted packets
• Digipeaters retransmit packets with store and
forward approach and follow DIGIPATH
• Packets are picked up by internet gateways
(iGate) and handed over to the the APRS-IS to
plot on a map
• Allows for sending variety of packet types
(position, object, telemetry, weather etc.)
APRS cont’d
Infrastructure needed
• APRS iGate (preferably in another country)
• APRS Digipeater (orbiting)
• APRS -> Twitter gateway
• Twitter
ISS Footprint
APRS via Satellite
• Set radio transmit to 145.825
• ARISS on the 1st position in the digipath
• Compose an APRS message to TWITR
• Wait for the satellite to be over the horizon
– And chosen iGate in the footprint
• Send the message
• Message gets digipeated back to ground iGate
• And picked by the APRS-IS network
• Subsequently by the APRS -> twitter gateway
APRS -> twitter gateway
• Runs under hamradiotweets.com atm
• Interfaces to the aprs.fi (APRS-IS) API to pull
the messages
• Tweets…
OSCAR
• Stands for Orbital Satellite Carrying Amateur
Radio
• ISS
• PC-SAT (Navy OSCAR-44)
• OSCAR status:
– http://oscar.dcarr.org/
Satellite pass prediction
• Web Based
– http://www.heavens-above.com/
– http://www.n2yo.com/
• Offline
– Satscape
Not foolproof
• The system can be jammed
• You can be triangulated
• Twitter fail whale

More Related Content

Similar to Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský

Satellite Communication
Satellite CommunicationSatellite Communication
Satellite CommunicationAhmed Ayman
 
Satellite communication
Satellite   communicationSatellite   communication
Satellite communicationSatyajit Das
 
Satellite communication by abhishek mahajan
Satellite communication by abhishek mahajanSatellite communication by abhishek mahajan
Satellite communication by abhishek mahajanAbhishek Mahajan
 
Satellite Communication || Wireless Communication
Satellite Communication || Wireless CommunicationSatellite Communication || Wireless Communication
Satellite Communication || Wireless CommunicationZain Abid
 
SUMMER TRAINING ON DOORDARSHAN {PPT]
SUMMER TRAINING ON DOORDARSHAN {PPT]SUMMER TRAINING ON DOORDARSHAN {PPT]
SUMMER TRAINING ON DOORDARSHAN {PPT]ashray kumar
 
Tranimission Media
Tranimission MediaTranimission Media
Tranimission MediaRamasubbu .P
 
Telecom lect 8
Telecom lect 8Telecom lect 8
Telecom lect 8Shiraz316
 
Wireless Solutions for Expansion of Kappa Industries
Wireless Solutions for Expansion of Kappa IndustriesWireless Solutions for Expansion of Kappa Industries
Wireless Solutions for Expansion of Kappa IndustriesSean Cornilliac
 
Vsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorialVsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorialOrit Fredkof
 
Open hack2011 hackinghamwithfoss
Open hack2011 hackinghamwithfossOpen hack2011 hackinghamwithfoss
Open hack2011 hackinghamwithfossDebansu Saha
 
Transmission Technology Session
Transmission Technology SessionTransmission Technology Session
Transmission Technology SessionMuhammad Yahya
 

Similar to Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský (20)

Satellite Communication
Satellite CommunicationSatellite Communication
Satellite Communication
 
Satellite Sys
Satellite SysSatellite Sys
Satellite Sys
 
GPS
GPSGPS
GPS
 
Vsat basic
Vsat basicVsat basic
Vsat basic
 
Satellite communication
Satellite   communicationSatellite   communication
Satellite communication
 
Satellite communication by abhishek mahajan
Satellite communication by abhishek mahajanSatellite communication by abhishek mahajan
Satellite communication by abhishek mahajan
 
Satellite Communication || Wireless Communication
Satellite Communication || Wireless CommunicationSatellite Communication || Wireless Communication
Satellite Communication || Wireless Communication
 
Packet Radio Overview
Packet Radio OverviewPacket Radio Overview
Packet Radio Overview
 
SUMMER TRAINING ON DOORDARSHAN {PPT]
SUMMER TRAINING ON DOORDARSHAN {PPT]SUMMER TRAINING ON DOORDARSHAN {PPT]
SUMMER TRAINING ON DOORDARSHAN {PPT]
 
Satellite systems
Satellite systemsSatellite systems
Satellite systems
 
Tranimission Media
Tranimission MediaTranimission Media
Tranimission Media
 
Telecom lect 8
Telecom lect 8Telecom lect 8
Telecom lect 8
 
Satellite network
Satellite networkSatellite network
Satellite network
 
Intd to Sat Commn
Intd to Sat CommnIntd to Sat Commn
Intd to Sat Commn
 
Wireless Solutions for Expansion of Kappa Industries
Wireless Solutions for Expansion of Kappa IndustriesWireless Solutions for Expansion of Kappa Industries
Wireless Solutions for Expansion of Kappa Industries
 
Satellite communication
Satellite communicationSatellite communication
Satellite communication
 
Vsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorialVsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorial
 
Lan
LanLan
Lan
 
Open hack2011 hackinghamwithfoss
Open hack2011 hackinghamwithfossOpen hack2011 hackinghamwithfoss
Open hack2011 hackinghamwithfoss
 
Transmission Technology Session
Transmission Technology SessionTransmission Technology Session
Transmission Technology Session
 

More from Security Session

Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Security Session
 
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...Security Session
 
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...Security Session
 
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Security Session
 
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]Security Session
 
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...Security Session
 
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...Security Session
 
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]Security Session
 
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...Security Session
 
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]Security Session
 
Exploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan KopeckýExploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan KopeckýSecurity Session
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýSecurity Session
 
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan ČernockýDolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan ČernockýSecurity Session
 
Two Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal AmbrožTwo Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal AmbrožSecurity Session
 
Falsifikace biometricke charakteristiky a detekce zivosti
Falsifikace biometricke charakteristiky a detekce zivostiFalsifikace biometricke charakteristiky a detekce zivosti
Falsifikace biometricke charakteristiky a detekce zivostiSecurity Session
 
Detekcia kompromitacie z pohladu pracovnika bezpecnosti
Detekcia kompromitacie z pohladu pracovnika bezpecnostiDetekcia kompromitacie z pohladu pracovnika bezpecnosti
Detekcia kompromitacie z pohladu pracovnika bezpecnostiSecurity Session
 

More from Security Session (20)

Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
 
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
 
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
 
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
 
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
 
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
 
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
 
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
 
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
 
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
 
Prezentace brno
Prezentace brnoPrezentace brno
Prezentace brno
 
OSINT and beyond
OSINT and beyondOSINT and beyond
OSINT and beyond
 
Exploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan KopeckýExploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan Kopecký
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin Drahanský
 
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan ČernockýDolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
 
Turris - Robert Šefr
Turris - Robert ŠefrTurris - Robert Šefr
Turris - Robert Šefr
 
Two Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal AmbrožTwo Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal Ambrož
 
Falsifikace biometricke charakteristiky a detekce zivosti
Falsifikace biometricke charakteristiky a detekce zivostiFalsifikace biometricke charakteristiky a detekce zivosti
Falsifikace biometricke charakteristiky a detekce zivosti
 
Nehacknutelny web
Nehacknutelny webNehacknutelny web
Nehacknutelny web
 
Detekcia kompromitacie z pohladu pracovnika bezpecnosti
Detekcia kompromitacie z pohladu pracovnika bezpecnostiDetekcia kompromitacie z pohladu pracovnika bezpecnosti
Detekcia kompromitacie z pohladu pracovnika bezpecnosti
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský

  • 1. How to get the message out, when “someone” shuts down the internet Pavel Táborský
  • 2. Credentials • ~10+ years in IT, GSM networks before that • HAM License ~1 year • And that’s about it…
  • 3. Credits... • Bruce Sutherland, KO4IN • How To Get Your Message Out When Your Government Turns Off The Internet – @DEFCON19
  • 4. HAM Radio • Old tech since about 1900 • Usually two skilled operators needed, one at each end • Ionospheric conditions… • (Moon, Aircraft, Satellites)
  • 5. Gear • Wet dream HF/SSB station – HF radio 40k+ – Mast + yagi dir antenna array ~100k – Power amplifier(s) etc. • Or on Budget: – Yaesu FT-897 ~20k – Longwire antena ~the cost of the wire – Essentially what WW2 operators did
  • 6. We will use • HAM radio license… • APRS capable handheld radio ~5k • Yagi antenna made of tape measure and PVC pipe ~200 • VHF Band (145.825/144.800) • HAM radio satellite (OSCAR) – ISS – PC-SAT (Navy OSCAR – 44) • Twitter
  • 9. APRS • Developed in mid ‘80s by Bob Bruninga (WB4APR) • Originally position reporting system • Then Messages and WX reports • X.25 for HAMs – 1200baud – AFSK modulation • APRS is a retronym of WB4APR – Automatic Packet/Position Reporting System
  • 10. APRS cont’d • The network consists of radio stations operating entirely with broadcasted packets • Digipeaters retransmit packets with store and forward approach and follow DIGIPATH • Packets are picked up by internet gateways (iGate) and handed over to the the APRS-IS to plot on a map • Allows for sending variety of packet types (position, object, telemetry, weather etc.)
  • 12. Infrastructure needed • APRS iGate (preferably in another country) • APRS Digipeater (orbiting) • APRS -> Twitter gateway • Twitter
  • 14. APRS via Satellite • Set radio transmit to 145.825 • ARISS on the 1st position in the digipath • Compose an APRS message to TWITR • Wait for the satellite to be over the horizon – And chosen iGate in the footprint • Send the message • Message gets digipeated back to ground iGate • And picked by the APRS-IS network • Subsequently by the APRS -> twitter gateway
  • 15. APRS -> twitter gateway • Runs under hamradiotweets.com atm • Interfaces to the aprs.fi (APRS-IS) API to pull the messages • Tweets…
  • 16. OSCAR • Stands for Orbital Satellite Carrying Amateur Radio • ISS • PC-SAT (Navy OSCAR-44) • OSCAR status: – http://oscar.dcarr.org/
  • 17. Satellite pass prediction • Web Based – http://www.heavens-above.com/ – http://www.n2yo.com/ • Offline – Satscape
  • 18. Not foolproof • The system can be jammed • You can be triangulated • Twitter fail whale