{"id":1279,"date":"2021-05-10T11:02:57","date_gmt":"2021-05-10T09:02:57","guid":{"rendered":"https:\/\/www.spacesecurity.info\/?page_id=1279"},"modified":"2021-05-17T13:43:41","modified_gmt":"2021-05-17T11:43:41","slug":"space-attacks-open-database","status":"publish","type":"page","link":"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/","title":{"rendered":"Space Attacks Open Database Project"},"content":{"rendered":"<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1279\" class=\"pvc_stats all  \" data-element-id=\"1279\" style=\"\"><i class=\"pvc-stats-icon small\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-1309 aligncenter\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database-1024x666.jpg\" alt=\"\" width=\"696\" height=\"453\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database-1024x666.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database-300x195.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database-768x500.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database-696x453.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database-1068x695.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database.jpg 1228w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>In part of the Space Cybersecurity Open Project, we publish below a Space Attacks Open Database. This first version is the result of the work of several researchers :<\/p>\n<ul>\n<li><strong>Jason Fritz<\/strong>, author of &#8220;<a href=\"http:\/\/lib.21h.io\/library\/VXXL38VZ\/download\/W86SK85Q\/2013_Satellite_Hacking_-_A_Guide_for_the_Perplexed_30p_.pdf\">SATELLITE HACKING: A Guide for the Perplexed<\/a>&#8220;.<\/li>\n<li><strong>Mark Manulis, R. Harrison &amp; Venkkatesh Sekar<\/strong> (Surrey Centre for Cyber Security, University of Surrey, Guildford, UK), <strong>Christopher P. Bridges<\/strong> (Surrey Space Centre, University of Surrey, Guildford, UK) and <strong>Andy Davis<\/strong> (NCC Group, Manchester, UK), authors of &#8220;<a href=\"https:\/\/doi.org\/10.1007\/s10207-020-00503-w\">Cyber Security in New Space<\/a>&#8220;, within which we can find a link to an electronic supplementary material that contains <a href=\"https:\/\/static-content.springer.com\/esm\/art%3A10.1007%2Fs10207-020-00503-w\/MediaObjects\/10207_2020_503_MOESM1_ESM.pdf\">a list of Space Attacks<\/a>.<\/li>\n<\/ul>\n<p>I have to mention <strong>Prof. Gregory Falco <\/strong>(Cybersecurity Research Fellow, Harvard University; Research Scholar, Stanford University; Research Affiliate, MIT) and one of his student but also <strong><span class=\"c-message__sender c-message_kit__sender\" data-qa=\"message_sender\" data-stringify-type=\"replace\" data-stringify-text=\"Harrison Caudill\">Harrison Caudill<\/span><\/strong> and <strong>Jim Volp<\/strong> from <strong>OSA<\/strong> (<a href=\"https:\/\/www.orbitalsecurity.space\/\">Orbital Security Alliance<\/a>)\u00a0who are working hard on a such Database.<\/p>\n<p>Our goal is to reference the latest known Space Attacks in order to maintain an up to date Database with the contribution of the Community.<\/p>\n<p>If you want to contribute to this project or if you want to inform us about new space attacks, contact us with the following <a href=\"https:\/\/www.spacesecurity.info\/contact\/\">form<\/a>.<\/p>\n<p><strong>Some terms explanation<\/strong><\/p>\n<ul>\n<li>Computer network exploitation (CNE) is a technique through which computer networks are used to infiltrate target computers&#8217; networks to extract and gather intelligence data. It enables the exploitation of the individual computers and computer networks of an external organization or country in order to collect any sensitive or confidential data, which is typically kept hidden and protected from the general public.<\/li>\n<li>Hijack attack, in communication, is a form of active wiretapping in which the attacker seizes control of a previously established communication association.<\/li>\n<li>Jamming is a form of electronic anti-satellite (ASAT) attack that interferes with communications traveling to and from a satellite by emitting noise of the same radio frequency (RF) within the field of view of the satellite\u2019s antennas<\/li>\n<li>The term &#8220;eavesdropping&#8221; is used to refer to the interception of communication between two parties by a malicious third party.<\/li>\n<\/ul>\n\n<table id=\"tablepress-3\" class=\"tablepress tablepress-id-3\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Date<\/th><th class=\"column-2\">Type of Attack<\/th><th class=\"column-3\">Segment<\/th><th class=\"column-4\">Target<\/th><th class=\"column-5\">Type of Target<\/th><th class=\"column-6\">Origin<\/th><th class=\"column-7\">Impact<\/th><th class=\"column-8\">Intent<\/th><th class=\"column-9\">References<\/th><td class=\"column-10\"><\/td>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1977<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">ITM new broadcast (audio)<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">Audio was replaced by one which warned humankind\u2019s current path would lead to a bad future<\/td><td class=\"column-8\">Warning<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">1985<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">State-run television broadcasts in Torun<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Academics<\/td><td class=\"column-7\">Superimposed political messages onto TV broadcasts<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[2]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">1986<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">Home Box Office (HBO) satellite TV network - Galaxy 1 satellite<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Single insider<\/td><td class=\"column-7\">Disrupted uplink and displayed messages for 4 to 5 minutes of HBO on US East coast<\/td><td class=\"column-8\">Warning<\/td><td class=\"column-9\">[3]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">1987<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">PlayBoy Channel<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Insider from Christian Broadcasting Network<\/td><td class=\"column-7\">Signal was hijacked\/jammed \u2013 character generator and transmitter at CBN matched the tape recording of the jamming<\/td><td class=\"column-8\">Warning<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">1987<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Chicago-based TV broadcasts<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">Max Headroom impersonator hijacked TV signals for two chicago-based stations.<\/td><td class=\"column-8\">Unknown<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">1995<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Kurdish satellite TV channel MED-TV<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Turkey<\/td><td class=\"column-7\">Transmissions of MED-TV from the Eutelsat satellite were jammed intentionally as it was believed to be a ``mouthpiece\" for terrorist groups.<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">1997<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Communication satellite APSTAR-1A<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Indonesia<\/td><td class=\"column-7\">Indonesian satellite transmitted interference to jam APSTAR-1A due to its use of a disputed orbital slot cite<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[1,4]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">1997<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">NASA<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">Cyber attack on NASA\u2019s Goddard Space Flight Centre \u2013 able to control computers which  designed and tested command and control codes, and then transferred information overseas<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">1998<\/td><td class=\"column-2\">Control<\/td><td class=\"column-3\">Space Segment<\/td><td class=\"column-4\">US-German ROSAT satellite<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Russia (allegedly)<\/td><td class=\"column-7\">Satellite turned towards the sun, damaging itself and rendering itself useless. Linked (tenuously) to a intrusion at the Goddard Space Flight Centre. Could have also been a malfunction?<\/td><td class=\"column-8\">Unknown<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">1998<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">Pentagon network<\/td><td class=\"column-5\">Government, Military<\/td><td class=\"column-6\">Hacking Group Masters of Downloading<\/td><td class=\"column-7\">Hacking group claimed to have stolen satellite control software from Pentagon network \u2013 Pentagon denies this but revealed that a less secure network containing sensitive information had been breached. Also the group was considering \u201cselling the information to international terrorist groups or foreign governments\u201d<\/td><td class=\"column-8\">Criminal- selling information on for esp\/terrorism<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">1998<\/td><td class=\"column-2\">Denial of Service (Accidental)<\/td><td class=\"column-3\">Space Segment<\/td><td class=\"column-4\">PANAMSAT Galaxy 4 sat<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">N\/A Accidental<\/td><td class=\"column-7\">On-board processor anomaly disabled 80-90% of pagers across US for 2-4 days, blocked credit card transactions.<\/td><td class=\"column-8\">Accident<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">2000<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">British and US military tanks<\/td><td class=\"column-5\">Military<\/td><td class=\"column-6\">French Security Agency<\/td><td class=\"column-7\">GPS navigation signals used in British and US military tanks were jammed in tank trial for the Greek army. intended to make US and British tanks look inferior to others so that Grecian military chose other tanks.<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[1,5]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">2001<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">NASA facilities<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">British Hacker Gary Mckinnon<\/td><td class=\"column-7\">Exploited default credentials to gain access to networks at five NASA facilities<\/td><td class=\"column-8\">Hack and Leak<\/td><td class=\"column-9\">[6]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">2002<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Chinese satellite TV broadcasts<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Falun Gong cult<\/td><td class=\"column-7\">\u201cTelevision signals illegally broadcast by the Falun Gong cult cut into transmissions using the Sino Satellite (SINOSAT) from June 23 to 30, blocking the World Cup finals for viewers in some rural and remote areas in China.\u201d<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[7]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">2002<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">Marshall Space Flight Center<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">China (suspected)<\/td><td class=\"column-7\">Intruder was able to penetrate into the network and steal design of rocket engines<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">2002<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Accidental- civilian GPS<\/td><td class=\"column-5\">Civilian<\/td><td class=\"column-6\">Poorly installed CCTV camera by man from Douglas<\/td><td class=\"column-7\">Accidental interference from poorly installed CCTV camera blocked GPS signals within a kilometre.<\/td><td class=\"column-8\">Accident<\/td><td class=\"column-9\">[8]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">2002<\/td><td class=\"column-2\">Eavesdropping<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">NATO surveillance<\/td><td class=\"column-5\">Military<\/td><td class=\"column-6\">Radio Amateur<\/td><td class=\"column-7\">Radio Amateur from England was able to eavesdrop on satellite signals from NATO surveillance flights<\/td><td class=\"column-8\">Research<\/td><td class=\"column-9\">[9]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">2003<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Telstar 12 satellite TV transmissions<\/td><td class=\"column-5\">Civilian<\/td><td class=\"column-6\">Iran and Cuba<\/td><td class=\"column-7\">US-sponsered news transmissions by the Telstar 12 satellite into Iran were disrupted by a Cuban electronic-intelligence facility<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[10]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">2004<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Chinese satellite TV broadcasts<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Falun Gong cult<\/td><td class=\"column-7\">\u201cOn Saturday evening, television programmes promoting Falun Gong appeared on the feed beamed into China from a satellite owned by the Hong Kong company AsiaSat.\u201d<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[11]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">2005<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Satellite radio station ``Sout Libya\" uplinks to the Eutelsat HotBird and Telstar 12 satellites<\/td><td class=\"column-5\">Civilian<\/td><td class=\"column-6\">Libyan Government<\/td><td class=\"column-7\">Within minutes of the Sout Libya radio station broadcasting,  the Libyan government jammed the radio station's signal with a high-powered one. This jamming also affected many British and European TV and radio station and is alleged to have disrupted American communications as well. Same behaviour observed when Sout Libya changed satellite provider cite.<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[12]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">2005<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">Kennedy Space Center\u2019s Vehicle Assembly Building, NASA satellite control complex in Maryland, Johnson Space Center in Houston<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Taiwan (suspected)<\/td><td class=\"column-7\">Malware gathered data from computers in the VAB, then spread to other networks in Maryland and Houston. 20 GB of compressed data was sent to Taiwan<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">2005<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Telecom satellites<\/td><td class=\"column-5\">Commercial, Government, Military<\/td><td class=\"column-6\">Libyan Government<\/td><td class=\"column-7\">Disrupted signal for several TV and radio stations which served Britain and Europe and American diplomatic, military and FBI comms<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">2006<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Al Manar TV station<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Israel (state-sponsored)<\/td><td class=\"column-7\">Disrupted transmission to broadcast ant-Hezbollah propaganda<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-25\">\n\t<td class=\"column-1\">2006<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Thuraya mobile sat comms<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Libyan nationals<\/td><td class=\"column-7\">Signals jammed for six months, in an attempt to disrupt smuggling operations which used the Thuraya sat phones<\/td><td class=\"column-8\">Stop criminal activity<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-26\">\n\t<td class=\"column-1\">2006<\/td><td class=\"column-2\">Phishing\/CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">NASA employees<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">NASA officials opened an email and clicked on a link which then infected and compromised workstations at their Washington headquarters. This allowed access to files containing cutting-edge satellite research<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-27\">\n\t<td class=\"column-1\">2007<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Satellite TV broadcast(Intelsat satellite vacant Ku-band transponder)<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Liberation Tigers of Tamil Eelam (LTTE)<\/td><td class=\"column-7\">Illegal broadcast of Tamil Tigers (LTTE) propaganda<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-28\">\n\t<td class=\"column-1\">2007<\/td><td class=\"column-2\">Internet Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">End users of government, military, research and pharmaceutical organizations<\/td><td class=\"column-5\">Military, Civilian, Government, Commercial<\/td><td class=\"column-6\">Russsian Turla Hacking group<\/td><td class=\"column-7\">\u201cexploiting the vulnerability of asynchronous satellite internet connections to sniff traffic, distilling the IP addresses of satellite subscribers. All the attackers need then is to set up their servers with the same IPs, configure these addresses into their malware and, after a successful infection,wait for its call for C&amp;C\u201d<\/td><td class=\"column-8\">Criminal<\/td><td class=\"column-9\">[13]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-29\">\n\t<td class=\"column-1\">2007<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">Czech TV programme<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">Camera;s which usually show imagery of Prague and other locations, one had a feed tampered with onsite and video stream was replaced.(Video showed CGI of small nuclear explosion and white noise)<\/td><td class=\"column-8\">Warning<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-30\">\n\t<td class=\"column-1\">2007<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">WJLA\u2019s digital\/HD signals<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">N\/A Accidental<\/td><td class=\"column-7\">Grainy photo interrupted signals for two hours. Originally thought to be signal intrusion, was confirmed to be result of a malfunctioning HDTV encoder<\/td><td class=\"column-8\">Accident<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-31\">\n\t<td class=\"column-1\">2007<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">Goddard Space Flight Center<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">Attack affected networks which processed data from the Earth Observing system<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-32\">\n\t<td class=\"column-1\">2007<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Space Segment<\/td><td class=\"column-4\">Landsat-7<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">Satellite \u201cexperienced 12 or more minutes of interference\u201d<\/td><td class=\"column-8\">Unknown<\/td><td class=\"column-9\">[14]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-33\">\n\t<td class=\"column-1\">2007<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Space Segment<\/td><td class=\"column-4\">ISS computers<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Compromised laptop brought on by Russian astronaut<\/td><td class=\"column-7\">Unknown- virus was designed to steal credentials for popular games and send back to central server. SpaceRef:\u201dVirus was never a threat to any of the computers used for cmd and cntl and no adverse effect on ISS Ops.\u201d Also brought to light than no AV measures were present and that windows XP was still in use in the systems, which prompted use of Linux.<\/td><td class=\"column-8\">Accident<\/td><td class=\"column-9\">[15,16]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-34\">\n\t<td class=\"column-1\">2007<\/td><td class=\"column-2\">ASAT Incident<\/td><td class=\"column-3\">Space Segment<\/td><td class=\"column-4\">Chinese weather satellite<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">China<\/td><td class=\"column-7\">Anti-satellite test with kinetic kill weapon destroyed defunct chinese weather satellite and created vast amounts of space debris<\/td><td class=\"column-8\">Satellite destruction<\/td><td class=\"column-9\">[17,18]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-35\">\n\t<td class=\"column-1\">2008<\/td><td class=\"column-2\">Control<\/td><td class=\"column-3\">Unknown (but Ground is hypothesised)<\/td><td class=\"column-4\">Terra EOS AM-1 satellite<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">Satellite experienced several minutes of interference and the capability for the attacker to command was achieved but no commands were given. This occurred twice in 2008, in June,  then again in October.  Report states that commercially operated ground stations may have been weak point, however KSAT deny this<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[1,14]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-36\">\n\t<td class=\"column-1\">2008<\/td><td class=\"column-2\">Control<\/td><td class=\"column-3\">Unknown (but Ground is hypothesised)<\/td><td class=\"column-4\">Terra EOS AM-1 satellite<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">Satellite experienced several minutes of interference and the capability for the attacker to command was achieved but no commands were given. This occurred twice in 2008, in June,  then again in October.<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[1,14]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-37\">\n\t<td class=\"column-1\">2008<\/td><td class=\"column-2\">Control<\/td><td class=\"column-3\">Space Segment, Ground Segment<\/td><td class=\"column-4\">International Space Station<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">A trojan horse infected the Johnson Space Centre's computers which provide an uplink to the ISS to attackers,  disrupting several systems on board. This was aided by the out-of-date software in use onboard the ISS<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-38\">\n\t<td class=\"column-1\">2008<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Landsat-7<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">Satellite \u201cexperienced 12 or more minutes of interference. The responsible party did not achieve all steps required to command the satellite\u201d<\/td><td class=\"column-8\">Unknown<\/td><td class=\"column-9\">[1,14]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-39\">\n\t<td class=\"column-1\">2008<\/td><td class=\"column-2\">ASAT Incident<\/td><td class=\"column-3\">Space Segment<\/td><td class=\"column-4\">USA-193 recon satellite<\/td><td class=\"column-5\">Military<\/td><td class=\"column-6\">USA<\/td><td class=\"column-7\">USA-193 satellite failed shortly after launch in 2006. US military confirmed they had shot it down with a missile to destroy it<\/td><td class=\"column-8\">Satellite destruction<\/td><td class=\"column-9\">[19]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-40\">\n\t<td class=\"column-1\">2009<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">US Navy communication satellite frequencies<\/td><td class=\"column-5\">Military<\/td><td class=\"column-6\">Various- university professors,  electricians, truckers and farmers<\/td><td class=\"column-7\">Hijack of frequencies for personal CB radio use<\/td><td class=\"column-8\">Personal use<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-41\">\n\t<td class=\"column-1\">2009<\/td><td class=\"column-2\">Eavesdropping<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">US Military Predator Drones<\/td><td class=\"column-5\">Military<\/td><td class=\"column-6\">Iraqi Shi'a militia group<\/td><td class=\"column-7\">Insurgents captured unencrypted live video feeds from US military unmanned aircraft using a commercial software tool named SkyGrabber<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-42\">\n\t<td class=\"column-1\">2010<\/td><td class=\"column-2\">Denial of Service (Accidental)<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">Accidental \u2013 GPS receivers<\/td><td class=\"column-5\">Civilian, Military<\/td><td class=\"column-6\">GPS software update<\/td><td class=\"column-7\">software update to gps ground segment caused a denial of service , impacting several thousand receivers<\/td><td class=\"column-8\">Accident<\/td><td class=\"column-9\">[8,20]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-43\">\n\t<td class=\"column-1\">2010<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Persian-language satellite broadcasts<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Iranian source<\/td><td class=\"column-7\">Intentional jamming of broadcasts of BBC, Deutsche Welle and Eutelsat<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-44\">\n\t<td class=\"column-1\">2011<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">LuaLua TV (Bahrani current affairs network)<\/td><td class=\"column-5\">Commercial, Civilian, Government<\/td><td class=\"column-6\">Within Bahrain<\/td><td class=\"column-7\">Jammed for four hours after first transmission<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[1,21]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-45\">\n\t<td class=\"column-1\">2011<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Thuraya satellites<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Libyan nationals<\/td><td class=\"column-7\">Signals jammed for six months, in an attempt to disrupt smuggling operations which used the Thuraya sat phones<\/td><td class=\"column-8\">Stop criminal activity<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-46\">\n\t<td class=\"column-1\">2011<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Ethiopian Sat TV (ESAT)<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Ethiopian &amp; Chinese Governments<\/td><td class=\"column-7\">Jammed ESAT signals by 2 governments<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-47\">\n\t<td class=\"column-1\">2011<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">JPL<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Chinese IPs<\/td><td class=\"column-7\">Attack on JPL network, compromising credentials of employees, able to modify, add, delete files and users, full control over these networks. Another 46 APT attacks were reported, with 13 successfully compromising agency computers.<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[22]<\/td><td class=\"column-10\">This plus another 13 successful attacks for NASA systems in 2011.<\/td>\n<\/tr>\n<tr class=\"row-48\">\n\t<td class=\"column-1\">2011<\/td><td class=\"column-2\">Theft\/Loss<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">NASA unencrypted laptops<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">Disclosure of algorithms used to command ISS. Another 47 mobile computing devices reported lost or stolen between 2009 and 2011.<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[22]<\/td><td class=\"column-10\">This plus another 47 incidents between 2009 and 2011<\/td>\n<\/tr>\n<tr class=\"row-49\">\n\t<td class=\"column-1\">2011<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">European Space Agency<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Hacker TinKode<\/td><td class=\"column-7\">Posted screenshots of admin, FTP, network management credentials on internet mailing list<\/td><td class=\"column-8\">Hack and Leak<\/td><td class=\"column-9\">[23]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-50\">\n\t<td class=\"column-1\">2012<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Eritrean state-run sat TV<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Ethiopian Government (accused)<\/td><td class=\"column-7\">Blocked transmissions<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[1]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-51\">\n\t<td class=\"column-1\">2012<\/td><td class=\"column-2\">Denial of Service<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">BBC Persia satellite feeds and phone lines<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Iran (suspected)<\/td><td class=\"column-7\">\u201csuffered attempts to jam BBC Persian phone lines in London and a \"sophisticated cyber-attack\" on its systems.\u201d<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[24]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-52\">\n\t<td class=\"column-1\">2013<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">GPS receiver in Limo (civilian GPS)<\/td><td class=\"column-5\">Civilian<\/td><td class=\"column-6\">American Limo driver<\/td><td class=\"column-7\">Driver installed an illegal GPS jammer in his car to thwart the tracker in his car. Ended up jamming signals in s GPS-guidance system at Newark Airport<\/td><td class=\"column-8\">Personal use<\/td><td class=\"column-9\">[25]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-53\">\n\t<td class=\"column-1\">2013<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Al-Jazeera Egyptian broadcasts<\/td><td class=\"column-5\">Government (state-run media outlet)<\/td><td class=\"column-6\">Unknown but reported to have originated from outside Cairo<\/td><td class=\"column-7\">Jamming of Al-Jezeera egyptian TV signals<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[26]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-54\">\n\t<td class=\"column-1\">2013<\/td><td class=\"column-2\">Spoofing<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">GPS navigtaion system in a yacht<\/td><td class=\"column-5\">Civilian<\/td><td class=\"column-6\">Researchers<\/td><td class=\"column-7\">\u201c \"proof-of-concept\" attack was successfully performed in June, 2013, when the luxury yacht White Rose of Drachs was misdirected with spoofed GPS signals...which altered the course of the yacht\u201d.<\/td><td class=\"column-8\">Research<\/td><td class=\"column-9\">[27]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-55\">\n\t<td class=\"column-1\">2014<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">ARABSAT TV downlinks<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Ethiopian Source<\/td><td class=\"column-7\">Jammed signals which disturbed many TV channels- Arabsat speculated that it may be accidental and jammers were targeting nearby satellites as Arabsat doesn\u2019t broadcast in Ethopia or Eritrea.<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[28]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-56\">\n\t<td class=\"column-1\">2014<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">Germany\u2019s space research centre in Cologne<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Unknown but state-level cyber actors<\/td><td class=\"column-7\">Suffered an intrusion, \u201cmalware on machines used by researchers and sysadmins\u201d<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[29]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-57\">\n\t<td class=\"column-1\">2014<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">National Oceanic and Atmospheric Administration<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">China (suspected)<\/td><td class=\"column-7\">Four websites were hacked, government was forced to shut down services, however purpose\/impact of the attack was not made public<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[30,31]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-58\">\n\t<td class=\"column-1\">2014<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Isreali Channel 10 broadcasts<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Al-Qassam Brigades (Hamas)<\/td><td class=\"column-7\">Took over satellite feed to broadcast propaganda<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[32]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-59\">\n\t<td class=\"column-1\">2015<\/td><td class=\"column-2\">Eavesdropping<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Iridium communications constellation<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Security Researchers<\/td><td class=\"column-7\">Iridium satellite constellation communications were analysed and decoded to reveal clear text pager information<\/td><td class=\"column-8\">Research<\/td><td class=\"column-9\">[33]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-60\">\n\t<td class=\"column-1\">2015<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">ESA website and users<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Hacking group Anonymous<\/td><td class=\"column-7\">Published database schema of ESA website, with info relating to users, collaboraters and subscribers<\/td><td class=\"column-8\">Hack and Leak<\/td><td class=\"column-9\">[34]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-61\">\n\t<td class=\"column-1\">2015<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">NASA<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Hacking collective Anonsec<\/td><td class=\"column-7\">Anonsec \u201cbought access to an agency computer from another hacker.\u201d and then used it to pivot into network. Published 250 GB dump of data.<\/td><td class=\"column-8\">Hack and Leak<\/td><td class=\"column-9\">[35]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-62\">\n\t<td class=\"column-1\">2016<\/td><td class=\"column-2\">Phishing\/CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">Aerospace companies<\/td><td class=\"column-5\">Commercial, Government<\/td><td class=\"column-6\">APT28 hacking group (sponsored by Russian intelligence<\/td><td class=\"column-7\">attackers used \u201ca phishing email to lure the user into downloading a file that looks like a PDF but instead is malicious executable code\u201d. Contained trojan.<\/td><td class=\"column-8\">State Espionage &amp; Corporate Espionage<\/td><td class=\"column-9\">[36,37]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-63\">\n\t<td class=\"column-1\">2016<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Israeli Channel 2 broadcast<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Hamas<\/td><td class=\"column-7\">broadcast was \u201csuddenly interrupted, and TV screens filled instead with images and messages of incitement from Hamas, which warned of fresh terror attacks.\u201d<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[38]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-64\">\n\t<td class=\"column-1\">2017<\/td><td class=\"column-2\">Spoofing<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Ships in Black Sea<\/td><td class=\"column-5\">Civilian<\/td><td class=\"column-6\">Russia (allegedly)<\/td><td class=\"column-7\">Maritime navigation systems onboard several vessels reported incorrect ship locations from false GPS signals. \u201c\u201ctrying to trigger UAV geo-fencing, which prevents UAVs from flying near airports\u201d<\/td><td class=\"column-8\">Geo-fencing<\/td><td class=\"column-9\">[39]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-65\">\n\t<td class=\"column-1\">2017<\/td><td class=\"column-2\">Jamming<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Accidental- civilian GPS<\/td><td class=\"column-5\">Civilian<\/td><td class=\"column-6\">GPS jammer in parked car<\/td><td class=\"column-7\">Driver in France left an operational GPS jammer in his car which was parked at Nantes airport \u2013 interfered with aircraft tracking systems<\/td><td class=\"column-8\">Personal use<\/td><td class=\"column-9\">[40]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-66\">\n\t<td class=\"column-1\">2017<\/td><td class=\"column-2\">CNE\/Phishing<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">Aerospace companies<\/td><td class=\"column-5\">Commercial, Military<\/td><td class=\"column-6\">APT33 group (iran)<\/td><td class=\"column-7\">Phishing emails sent into aerospace companies to download trojan backdoor.<\/td><td class=\"column-8\">State Espionage &amp; Corporate Espionage<\/td><td class=\"column-9\">[41]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-67\">\n\t<td class=\"column-1\">2017<\/td><td class=\"column-2\">Hijacking<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">Libyan Television broadcats<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Gaddafists<\/td><td class=\"column-7\">Broadcasts were interrupted by Gaddafists<\/td><td class=\"column-8\">Political<\/td><td class=\"column-9\">[42]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-68\">\n\t<td class=\"column-1\">2017<\/td><td class=\"column-2\">Spoofing<\/td><td class=\"column-3\">Data Comms<\/td><td class=\"column-4\">GPS time spoofing for TOTP authentication method<\/td><td class=\"column-5\">Civilian<\/td><td class=\"column-6\">Researchers<\/td><td class=\"column-7\">Able to spoof GPS timing in an air-gapped network to bypass TOTP authentication<\/td><td class=\"column-8\">Research<\/td><td class=\"column-9\">[43]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-69\">\n\t<td class=\"column-1\">2018<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">Satellite Operator<\/td><td class=\"column-5\">Commercial<\/td><td class=\"column-6\">Computers in China, Thrip group<\/td><td class=\"column-7\">\u201clooking for and infecting computers running software that monitors and controls satellites\u201d to potentially disrupt satellite operations<\/td><td class=\"column-8\">Corporate Espionage<\/td><td class=\"column-9\">[44]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-70\">\n\t<td class=\"column-1\">2018<\/td><td class=\"column-2\">CNE<\/td><td class=\"column-3\">Ground Segment<\/td><td class=\"column-4\">NASA<\/td><td class=\"column-5\">Government<\/td><td class=\"column-6\">Unknown<\/td><td class=\"column-7\">\u201cAccording to an internal memo circulated among staff on Tuesday, in mid-October the US space agency investigated whether or not two of its machines holding employee records had been compromised, and discovered one of them may have been infiltrated by miscreants. It was further feared that this sensitive personal data had been siphoned from the hijacked server.\u201d<\/td><td class=\"column-8\">State Espionage<\/td><td class=\"column-9\">[45,46]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<tr class=\"row-71\">\n\t<td class=\"column-1\">2019<\/td><td class=\"column-2\">ASAT Incident<\/td><td class=\"column-3\">Space Segment<\/td><td class=\"column-4\">Microsat-R military satellite<\/td><td class=\"column-5\">Military<\/td><td class=\"column-6\">India<\/td><td class=\"column-7\">Microsat-R test satellite was destroyed in LEO by ASAT weapon<\/td><td class=\"column-8\">Satellite destruction<\/td><td class=\"column-9\">[47]<\/td><td class=\"column-10\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-3 from cache -->\n<p><strong>Find below all references<\/strong><\/p>\n<table width=\"1736\">\n<tbody>\n<tr>\n<td width=\"81\"><\/td>\n<td width=\"1655\">Author<\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td><a href=\"http:\/\/lib.21h.io\/library\/VXXL38VZ\/download\/W86SK85Q\/2013_Satellite_Hacking_-_A_Guide_for_the_Perplexed_30p_.pdf\">Fritz, J.: Satellite Hacking: A Guide for the Perplexed. In: Culture Mandala: Bulletin of the Centre for East-West Cultural and Economic Studies, Vol. 10, No. 1, December 2012-May 2013, pp21-50<\/a><\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20091206064447\/http:\/\/w.icm.edu.pl\/tvS\/tvs.htm\">Hanasz, J.: Telewizja ,,Solidarno\u015b\u0107&#8221; Toru\u0144 1985 r. Url:https:\/\/web.archive.org\/web\/20091206064447\/http:\/\/w.icm.edu.pl\/tvS\/tvs.htm (archive) Accessed: 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20070128101239\/http:\/www.signaltonoise.net\/library\/captmidn.htm\">SiGNaLToNoiSe.Net: The Story of Captain Midnight. Url: https:\/\/web.archive.org\/web\/20070128101239\/http:\/\/www.signaltonoise.net\/library\/captmidn.htm (archive) Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td><a href=\"https:\/\/www.gao.gov\/products\/gao-02-781\">United States General Accounting Office: Critical Infrastructure Protection Commercial Satellite Security Should Be More Fully Addressed. In: Report to the Ranking Minority Member, Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. 2002<\/a><\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td><a href=\"http:\/\/www.c4i.org\/gps-adams.html\">\u00a0Lt. Col. Adams, T. K.: 10 GPS Vulnerabilities Url: http:\/\/www.c4i.org\/gps-adams.html Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td><a href=\"https:\/\/www.telegraph.co.uk\/news\/worldnews\/northamerica\/usa\/4320901\/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html\">Telegraph.co.uk: Gary McKinnon profile: Autistic &#8216;hacker&#8217; who started writing computer programs at 14 Url: https:\/\/www.telegraph.co.uk\/news\/worldnews\/northamerica\/usa\/4320901\/Gary-McKinnon-profile-Autistic-hacker-who-started-writing-computer-programs-at-14.html Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td><a href=\"http:\/\/www.china-embassy.org\/eng\/zt\/ppflg\/t36611.htm\">Embassy of the People\u2019s Republic of China in the United States of America: Chinese satellite TV hijacked by Falun Gong cult (07\/08\/02) Url: http:\/\/www.china-embassy.org\/eng\/zt\/ppflg\/t36611.htm Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td><a href=\"https:\/\/www.raeng.org.uk\/publications\/reports\/global-navigation-space-systems\">The Royal Academy of Engineering: Global NavigationSpace Systems:reliance and vulnerabilities Url: https:\/\/www.raeng.org.uk\/publications\/reports\/global-navigation-space-systems. March 2011 Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>9<\/td>\n<td><a href=\"http:\/\/news.bbc.co.uk\/1\/hi\/programmes\/newsnight\/2041754.stm\">Urban, M.: Enthusiast watches Nato spy pictures Url: http:\/\/news.bbc.co.uk\/1\/hi\/programmes\/newsnight\/2041754.stm June 2002 Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>10<\/td>\n<td><a href=\"http:\/\/jmichaelwaller.com\/wp-content\/uploads\/2016\/08\/IM-Telstar-Aug2003.pdf\">Waller J. M.: Iran and Cuba Zap U.S. Satellites In: Insight Magazine Url: http:\/\/jmichaelwaller.com\/wp-content\/uploads\/2016\/08\/IM-Telstar-Aug2003.pdf August 2003 Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>11<\/td>\n<td><a href=\"http:\/\/news.bbc.co.uk\/1\/hi\/world\/asia-pacific\/4034209.stm\">Hogg, C.:HK probes Falun Gong &#8216;hacking&#8217;\u00a0 Url:http:\/\/news.bbc.co.uk\/1\/hi\/world\/asia-pacific\/4034209.stm November 2004 Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>12<\/td>\n<td><a href=\"http:\/\/news.bbc.co.uk\/1\/hi\/sci\/tech\/4602674.stm\">BBC News: Libya jamming &#8216;exposed vulnerability&#8217; Url: http:\/\/news.bbc.co.uk\/1\/hi\/sci\/tech\/4602674.stm January 2006 Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>13<\/td>\n<td><a href=\"https:\/\/media.kaspersky.com\/pdf\/SatTurla_Solution_Paper.pdf\">Kaspersky: Turla Hiding in the Sky Threat Announcement Url: https:\/\/media.kaspersky.com\/pdf\/SatTurla_Solution_Paper.pdf Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>14<\/td>\n<td><a href=\"https:\/\/www.uscc.gov\/sites\/default\/files\/annual_reports\/annual_report_full_11.pdf\">2011 Report to Congress of the U.S.-CHINA Economic and Security Review Url: https:\/\/www.uscc.gov\/sites\/default\/files\/annual_reports\/annual_report_full_11.pdf Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>15<\/td>\n<td><a href=\"http:\/\/news.bbc.co.uk\/1\/hi\/technology\/7583805.stm\">BBC News: Computer viruses make it to orbit Url: http:\/\/news.bbc.co.uk\/1\/hi\/technology\/7583805.stm August 2008 Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>16<\/td>\n<td><a href=\"http:\/\/www.spaceref.com\/news\/viewnews.html?id=1305\">Cowing, K.: NASA Discovers Computer Virus Aboard the International Space Station Url: http:\/\/www.spaceref.com\/news\/viewnews.html?id=1305 Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>17<\/td>\n<td><a href=\"https:\/\/www.theage.com.au\/national\/world-fury-at-satellite-destruction-20070120-ge416d.html\">Nicholson, B.: World fury at satellite destruction Url: https:\/\/www.theage.com.au\/national\/world-fury-at-satellite-destruction-20070120-ge416d.html Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>18<\/td>\n<td><a href=\"https:\/\/aerospace.org\/sites\/default\/files\/2018-05\/SpaceTrafficMgmt_0.pdf\">Center for Space Policy and Strategy: Space Traffic Management in the Age of New Space Url: https:\/\/aerospace.org\/sites\/default\/files\/2018-05\/SpaceTrafficMgmt_0.pdf Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>19<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20080222154922\/http:\/www.news24.com\/News24\/World\/News\/0,,2-10-1462_2274693,00.html\">News24.com: US shoots down rogue satellite Url: https:\/\/web.archive.org\/web\/20080222154922\/http:\/\/www.news24.com\/News24\/World\/News\/0,,2-10-1462_2274693,00.html (archive) Feb 2008 Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>20<\/td>\n<td><a href=\"http:\/\/www.eu-space.eu\/images\/2018\/document\/Slides\/Slides-Ferrazzani-Zilioli.pdf\">Ferrazzani, M. and Zilioli, I.: ESA facing Cyber Security Concerns In: EUSpace Jean Monnet Module 2018 Url: http:\/\/www.eu-space.eu\/images\/2018\/document\/Slides\/Slides-Ferrazzani-Zilioli.pdf Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>21<\/td>\n<td><a href=\"https:\/\/www.bbc.co.uk\/news\/business-15699332\">Atkinson, S.:Bahrain TV station struggles as signal blocked Url: https:\/\/www.bbc.co.uk\/news\/business-15699332 November 2011 Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>22<\/td>\n<td><a href=\"https:\/\/oig.nasa.gov\/docs\/FINAL_written_statement_for_%20IT_%20hearing_February_26_edit_v2.pdf\">Martin, P. K.:NASA Cybersecurity:\u00a0 An Examination of the Agency\u2019s Information Security In: Testimony before the Subcommittee on Investigations and Oversight,\u00a0 House Committee on Science, Space, and Technology February 2012 Url:https:\/\/oig.nasa.gov\/docs\/FINAL_written_statement_for_%20IT_%20hearing_February_26_edit_v2.pdf Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>23<\/td>\n<td><a href=\"https:\/\/www.theregister.co.uk\/2011\/04\/18\/esa_website_hack\/\">Leyden, J.: Royal Navy hacker claims to have broken into space agency site Url: https:\/\/www.theregister.co.uk\/2011\/04\/18\/esa_website_hack\/ Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>24<\/td>\n<td><a href=\"https:\/\/www.theguardian.com\/media\/2012\/mar\/14\/bbc-fears-iran-cyber-attack-persian\">Halliday, J.: BBC fears Iranian cyber-attack over its Persian TV service Url: https:\/\/www.theguardian.com\/media\/2012\/mar\/14\/bbc-fears-iran-cyber-attack-persian March 2012 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>25<\/td>\n<td><a href=\"https:\/\/newyork.cbslocal.com\/2013\/08\/09\/n-j-man-in-a-jam-after-illegal-gps-device-interferes-with-newark-liberty-operations\/\">CBE New York: N.J. Man In A Jam, After Illegal GPS Device Interferes With Newark Liberty Operations Url: https:\/\/newyork.cbslocal.com\/2013\/08\/09\/n-j-man-in-a-jam-after-illegal-gps-device-interferes-with-newark-liberty-operations\/ August 2013 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>26<\/td>\n<td><a href=\"https:\/\/www.theguardian.com\/media\/2013\/sep\/03\/al-jazeera-jamming-traced-egyptian-military\">O\u2019Carroll, L.: Al-Jazeera: jamming traced to sites near Egyptian military bases Url: https:\/\/www.theguardian.com\/media\/2013\/sep\/03\/al-jazeera-jamming-traced-egyptian-military September 2013 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>27<\/td>\n<td><a href=\"http:\/\/www.engr.utexas.edu\/news\/archive\/7649-superyacht-gps-spoofing\">The University of Texas at Austin: UT Austin Researchers Spoof Superyacht at Sea Url: http:\/\/www.engr.utexas.edu\/news\/archive\/7649-superyacht-gps-spoofing July 2013 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>28<\/td>\n<td><a href=\"https:\/\/www.arabsat.com\/NewsDetails.aspx?pageid=428&amp;lang=2\">Arabsat.com: Arabsat is subject to Jamming and its Engineers succeed in locating its source Url: https:\/\/www.arabsat.com\/NewsDetails.aspx?pageid=428&amp;lang=2 May 2014 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>29<\/td>\n<td><a href=\"https:\/\/www.theregister.co.uk\/2014\/04\/15\/dlr_attacked_china_apt_trojans\/\">Muncaster, P.:German space centre endures cyber attack Url: https:\/\/www.theregister.co.uk\/2014\/04\/15\/dlr_attacked_china_apt_trojans\/ April 2014 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>30<\/td>\n<td><a href=\"https:\/\/money.cnn.com\/2014\/11\/12\/technology\/security\/weather-system-hacked\/index.html\">Pagliery, J.: U.S. weather system hacked, affecting satellites Url: https:\/\/money.cnn.com\/2014\/11\/12\/technology\/security\/weather-system-hacked\/index.html December 2014 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>31<\/td>\n<td><a href=\"https:\/\/www.washingtonpost.com\/local\/chinese-hack-us-weather-systems-satellite-network\/2014\/11\/12\/bef1206a-68e9-11e4-b053-65cea7903f2e_story.html?utm_term=.19171e40af67\">Flaherty, M.P. and Samenow, J. and Rein, L.: Chinese hack U.S. weather systems, satellite network Url: https:\/\/www.washingtonpost.com\/local\/chinese-hack-us-weather-systems-satellite-network\/2014\/11\/12\/bef1206a-68e9-11e4-b053-65cea7903f2e_story.html?utm_term=.19171e40af67 November 2014 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>32<\/td>\n<td><a href=\"https:\/\/www.theregister.co.uk\/2014\/07\/15\/hamas_hack_israeli_sat_tv\/\">Leyden, J.: Hamas hacks Israeli TV sat channel to broadcast pics of Gaza wounded Url: https:\/\/www.theregister.co.uk\/2014\/07\/15\/hamas_hack_israeli_sat_tv\/ July 2014 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>33<\/td>\n<td><a href=\"https:\/\/av.tib.eu\/media\/38121\">Sec and schneider:Iridium Hacking: please don&#8217;t sue us In:Chaos Communication Camp 2015<\/a><\/td>\n<\/tr>\n<tr>\n<td>34<\/td>\n<td><a href=\"https:\/\/www.computerworld.com\/article\/3014539\/attackers-hack-european-space-agency-leak-thousands-of-credentials-for-the-lulz.html\">Storm, D.:Attackers hack European Space Agency, leak thousands of credentials &#8216;for the lulz&#8217; Url: https:\/\/www.computerworld.com\/article\/3014539\/attackers-hack-european-space-agency-leak-thousands-of-credentials-for-the-lulz.html December 2014 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>35<\/td>\n<td><a href=\"https:\/\/www.theregister.co.uk\/2016\/02\/01\/250gb_nasa_data_hacked\/\">Thomson, I.:Hackers mirror 250GB of NASA files on the web Url: https:\/\/www.theregister.co.uk\/2016\/02\/01\/250gb_nasa_data_hacked\/ February 2016 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>36<\/td>\n<td><a href=\"https:\/\/www.cyberdefensemagazine.com\/fancy-bear-hackers-use-a-new-mac-trojan-against-aerospace-industry\/\">Cyber Defence Magazine: Fancy Bear Hackers use a new Mac Trojan against aerospace industry Url: https:\/\/www.cyberdefensemagazine.com\/fancy-bear-hackers-use-a-new-mac-trojan-against-aerospace-industry\/ September 2016 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>37<\/td>\n<td><a href=\"https:\/\/www.darkreading.com\/operations\/russian-fancy-bear-hackers-hit-mac-os-x-with-new-trojan\/d\/d-id\/1327016\">Jackson Higgins, A.:Russian &#8216;Fancy Bear&#8217; Hackers Hit Mac OS X With New Trojan Url:https:\/\/www.darkreading.com\/operations\/russian-fancy-bear-hackers-hit-mac-os-x-with-new-trojan\/d\/d-id\/1327016 September 2016 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>38<\/td>\n<td><a href=\"https:\/\/www.timesofisrael.com\/hamas-hacks-israeli-tv-the-terror-will-never-end\/\">The Times of Israel: Hamas hacks into Israeli TV and threatens: \u2018Terror will never end\u2019 Url: https:\/\/www.timesofisrael.com\/hamas-hacks-israeli-tv-the-terror-will-never-end\/ March 2016 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>39<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20170925202637\/https:\/nrkbeta.no\/2017\/09\/18\/gps-freaking-out-maybe-youre-too-close-to-putin\/\">Leid, H.:GPS freaking out? Maybe you\u2019re too close to Putin Url:https:\/\/web.archive.org\/web\/20170925202637\/https:\/\/nrkbeta.no\/2017\/09\/18\/gps-freaking-out-maybe-youre-too-close-to-putin\/ September 2017 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>40<\/td>\n<td><a href=\"https:\/\/rntfnd.org\/2017\/09\/15\/gps-jammer-delays-flights-in-france\/\">Resilient Navigation and Timing Foundation: GPS Jammer Delays Flights in France Url: https:\/\/rntfnd.org\/2017\/09\/15\/gps-jammer-delays-flights-in-france\/ September 2017 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>41<\/td>\n<td><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/09\/apt33-insights-into-iranian-cyber-espionage.html\">O\u2019Leary,J. and Kimble, J. and Vanderlee, K. and Fraser, N.:Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware Url: https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/09\/apt33-insights-into-iranian-cyber-espionage.html September 2017 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>42<\/td>\n<td><a href=\"https:\/\/www.youtube.com\/watch?v=QwjAZGoGjPo&amp;app=desktop\">The American Gaddafist: Gaddafists Hack Libyan TV Signal March 5, 2017: https:\/\/www.youtube.com\/watch?v=QwjAZGoGjPo&amp;app=desktop Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>43<\/td>\n<td><a href=\"https:\/\/www.youtube.com\/watch?v=isiuTNh5P34\">Robinson, D.: Using GPS Spoofing to control time In: DEFCON 25 July 2017 Url: https:\/\/www.youtube.com\/watch?v=isiuTNh5P34 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>44<\/td>\n<td><a href=\"https:\/\/www.symantec.com\/blogs\/threat-intelligence\/thrip-hits-satellite-telecoms-defense-targets\">Symantec.com: Thrip: Espionage Group Hits Satellite, Telecoms, and Defense Companies Url: https:\/\/www.symantec.com\/blogs\/threat-intelligence\/thrip-hits-satellite-telecoms-defense-targets June 2018 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>45<\/td>\n<td><a href=\"https:\/\/www.theregister.co.uk\/2018\/12\/18\/nasa_server_hack\/\">Williams, C: Houston, we&#8217;ve had a problem: NASA fears internal server hacked, staff personal info swiped by miscreants Url: https:\/\/www.theregister.co.uk\/2018\/12\/18\/nasa_server_hack\/ December 2018 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>46<\/td>\n<td><a href=\"http:\/\/spaceref.com\/news\/viewsr.html?pid=52074\">spaceref.com: Potential Personally Identifiable Information (PII ) Compromise of NASA Servers Url: http:\/\/spaceref.com\/news\/viewsr.html?pid=52074 December 2018 Accessed 09\/07\/2019<\/a><\/td>\n<\/tr>\n<tr>\n<td>47<\/td>\n<td><a href=\"https:\/\/english.manoramaonline.com\/news\/nation\/2019\/03\/27\/mission-shakti-drdo-asat-missile-hit-microsat-r-isro.html\">Anantha Krishnan M:Explained Mission Shakti Url:https:\/\/english.manoramaonline.com\/news\/nation\/2019\/03\/27\/mission-shakti-drdo-asat-missile-hit-microsat-r-isro.html March 2019 Accessed 08\/07\/2019<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>In part of the Space Cybersecurity Open Project, we publish below a Space Attacks Open Database. This first version is the result of the work of several researchers : Jason Fritz, author of &#8220;SATELLITE HACKING: A Guide for the Perplexed&#8220;. Mark Manulis, R. Harrison &amp; Venkkatesh Sekar (Surrey Centre for Cyber Security, University of Surrey, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1310,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1279","page","type-page","status-publish","has-post-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Space Attacks Open Database Project - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Space Attacks Open Database Project - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"In part of the Space Cybersecurity Open Project, we publish below a Space Attacks Open Database. This first version is the result of the work of several researchers : Jason Fritz, author of &#8220;SATELLITE HACKING: A Guide for the Perplexed&#8220;. Mark Manulis, R. Harrison &amp; Venkkatesh Sekar (Surrey Centre for Cyber Security, University of Surrey, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-17T11:43:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1228\" \/>\n\t<meta property=\"og:image:height\" content=\"799\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-attacks-open-database\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-attacks-open-database\\\/\",\"name\":\"Space Attacks Open Database Project - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-attacks-open-database\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-attacks-open-database\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Space-Attacks-Open-Database.jpg\",\"datePublished\":\"2021-05-10T09:02:57+00:00\",\"dateModified\":\"2021-05-17T11:43:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-attacks-open-database\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-attacks-open-database\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-attacks-open-database\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Space-Attacks-Open-Database.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Space-Attacks-Open-Database.jpg\",\"width\":1228,\"height\":799},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/space-attacks-open-database\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Space Attacks Open Database Project\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Space Attacks Open Database Project - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/","og_locale":"en_US","og_type":"article","og_title":"Space Attacks Open Database Project - Space &amp; Cybersecurity Info","og_description":"In part of the Space Cybersecurity Open Project, we publish below a Space Attacks Open Database. This first version is the result of the work of several researchers : Jason Fritz, author of &#8220;SATELLITE HACKING: A Guide for the Perplexed&#8220;. Mark Manulis, R. Harrison &amp; Venkkatesh Sekar (Surrey Centre for Cyber Security, University of Surrey, [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/","og_site_name":"Space &amp; Cybersecurity Info","article_modified_time":"2021-05-17T11:43:41+00:00","og_image":[{"width":1228,"height":799,"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/","url":"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/","name":"Space Attacks Open Database Project - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database.jpg","datePublished":"2021-05-10T09:02:57+00:00","dateModified":"2021-05-17T11:43:41+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/05\/Space-Attacks-Open-Database.jpg","width":1228,"height":799},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/space-attacks-open-database\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"Space Attacks Open Database Project"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/pages\/1279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=1279"}],"version-history":[{"count":29,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/pages\/1279\/revisions"}],"predecessor-version":[{"id":1365,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/pages\/1279\/revisions\/1365"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/1310"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=1279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}