SlideShare a Scribd company logo
1 of 18
How to get the message out, when
“someone” shuts down the internet
Pavel Táborský
Credentials
• ~10+ years in IT, GSM networks before that
• HAM License ~1 year
• And that’s about it…
Credits...
• Bruce Sutherland, KO4IN
• How To Get Your Message Out When Your
Government Turns Off The Internet
– @DEFCON19
HAM Radio
• Old tech since about 1900
• Usually two skilled operators needed, one at
each end
• Ionospheric conditions…
• (Moon, Aircraft, Satellites)
Gear
• Wet dream HF/SSB station
– HF radio 40k+
– Mast + yagi dir antenna array ~100k
– Power amplifier(s) etc.
• Or on Budget:
– Yaesu FT-897 ~20k
– Longwire antena ~the cost of the wire
– Essentially what WW2 operators did
We will use
• HAM radio license…
• APRS capable handheld radio ~5k
• Yagi antenna made of tape measure and PVC
pipe ~200
• VHF Band (145.825/144.800)
• HAM radio satellite (OSCAR)
– ISS
– PC-SAT (Navy OSCAR – 44)
• Twitter
We will use
Alternatively going cheap(er)
APRS
• Developed in mid ‘80s by Bob Bruninga
(WB4APR)
• Originally position reporting system
• Then Messages and WX reports
• X.25 for HAMs
– 1200baud
– AFSK modulation
• APRS is a retronym of WB4APR
– Automatic Packet/Position Reporting System
APRS cont’d
• The network consists of radio stations
operating entirely with broadcasted packets
• Digipeaters retransmit packets with store and
forward approach and follow DIGIPATH
• Packets are picked up by internet gateways
(iGate) and handed over to the the APRS-IS to
plot on a map
• Allows for sending variety of packet types
(position, object, telemetry, weather etc.)
APRS cont’d
Infrastructure needed
• APRS iGate (preferably in another country)
• APRS Digipeater (orbiting)
• APRS -> Twitter gateway
• Twitter
ISS Footprint
APRS via Satellite
• Set radio transmit to 145.825
• ARISS on the 1st position in the digipath
• Compose an APRS message to TWITR
• Wait for the satellite to be over the horizon
– And chosen iGate in the footprint
• Send the message
• Message gets digipeated back to ground iGate
• And picked by the APRS-IS network
• Subsequently by the APRS -> twitter gateway
APRS -> twitter gateway
• Runs under hamradiotweets.com atm
• Interfaces to the aprs.fi (APRS-IS) API to pull
the messages
• Tweets…
OSCAR
• Stands for Orbital Satellite Carrying Amateur
Radio
• ISS
• PC-SAT (Navy OSCAR-44)
• OSCAR status:
– http://oscar.dcarr.org/
Satellite pass prediction
• Web Based
– http://www.heavens-above.com/
– http://www.n2yo.com/
• Offline
– Satscape
Not foolproof
• The system can be jammed
• You can be triangulated
• Twitter fail whale

More Related Content

Similar to Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský

Satellite Communication
Satellite CommunicationSatellite Communication
Satellite CommunicationAhmed Ayman
 
Satellite communication
Satellite   communicationSatellite   communication
Satellite communicationSatyajit Das
 
Satellite communication by abhishek mahajan
Satellite communication by abhishek mahajanSatellite communication by abhishek mahajan
Satellite communication by abhishek mahajanAbhishek Mahajan
 
Satellite Communication || Wireless Communication
Satellite Communication || Wireless CommunicationSatellite Communication || Wireless Communication
Satellite Communication || Wireless CommunicationZain Abid
 
SUMMER TRAINING ON DOORDARSHAN {PPT]
SUMMER TRAINING ON DOORDARSHAN {PPT]SUMMER TRAINING ON DOORDARSHAN {PPT]
SUMMER TRAINING ON DOORDARSHAN {PPT]ashray kumar
 
Tranimission Media
Tranimission MediaTranimission Media
Tranimission MediaRamasubbu .P
 
Telecom lect 8
Telecom lect 8Telecom lect 8
Telecom lect 8Shiraz316
 
Wireless Solutions for Expansion of Kappa Industries
Wireless Solutions for Expansion of Kappa IndustriesWireless Solutions for Expansion of Kappa Industries
Wireless Solutions for Expansion of Kappa IndustriesSean Cornilliac
 
Vsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorialVsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorialOrit Fredkof
 
Open hack2011 hackinghamwithfoss
Open hack2011 hackinghamwithfossOpen hack2011 hackinghamwithfoss
Open hack2011 hackinghamwithfossDebansu Saha
 
Transmission Technology Session
Transmission Technology SessionTransmission Technology Session
Transmission Technology SessionMuhammad Yahya
 

Similar to Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský (20)

Satellite Communication
Satellite CommunicationSatellite Communication
Satellite Communication
 
Satellite Sys
Satellite SysSatellite Sys
Satellite Sys
 
GPS
GPSGPS
GPS
 
Vsat basic
Vsat basicVsat basic
Vsat basic
 
Satellite communication
Satellite   communicationSatellite   communication
Satellite communication
 
Satellite communication by abhishek mahajan
Satellite communication by abhishek mahajanSatellite communication by abhishek mahajan
Satellite communication by abhishek mahajan
 
Satellite Communication || Wireless Communication
Satellite Communication || Wireless CommunicationSatellite Communication || Wireless Communication
Satellite Communication || Wireless Communication
 
Packet Radio Overview
Packet Radio OverviewPacket Radio Overview
Packet Radio Overview
 
SUMMER TRAINING ON DOORDARSHAN {PPT]
SUMMER TRAINING ON DOORDARSHAN {PPT]SUMMER TRAINING ON DOORDARSHAN {PPT]
SUMMER TRAINING ON DOORDARSHAN {PPT]
 
Satellite systems
Satellite systemsSatellite systems
Satellite systems
 
Tranimission Media
Tranimission MediaTranimission Media
Tranimission Media
 
Telecom lect 8
Telecom lect 8Telecom lect 8
Telecom lect 8
 
Satellite network
Satellite networkSatellite network
Satellite network
 
Intd to Sat Commn
Intd to Sat CommnIntd to Sat Commn
Intd to Sat Commn
 
Wireless Solutions for Expansion of Kappa Industries
Wireless Solutions for Expansion of Kappa IndustriesWireless Solutions for Expansion of Kappa Industries
Wireless Solutions for Expansion of Kappa Industries
 
Satellite communication
Satellite communicationSatellite communication
Satellite communication
 
Vsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorialVsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorial
 
Lan
LanLan
Lan
 
Open hack2011 hackinghamwithfoss
Open hack2011 hackinghamwithfossOpen hack2011 hackinghamwithfoss
Open hack2011 hackinghamwithfoss
 
Transmission Technology Session
Transmission Technology SessionTransmission Technology Session
Transmission Technology Session
 

More from Security Session

Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Security Session
 
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...Security Session
 
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...Security Session
 
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Security Session
 
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]Security Session
 
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...Security Session
 
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...Security Session
 
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]Security Session
 
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...Security Session
 
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]Security Session
 
Exploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan KopeckýExploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan KopeckýSecurity Session
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýSecurity Session
 
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan ČernockýDolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan ČernockýSecurity Session
 
Two Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal AmbrožTwo Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal AmbrožSecurity Session
 
Falsifikace biometricke charakteristiky a detekce zivosti
Falsifikace biometricke charakteristiky a detekce zivostiFalsifikace biometricke charakteristiky a detekce zivosti
Falsifikace biometricke charakteristiky a detekce zivostiSecurity Session
 
Detekcia kompromitacie z pohladu pracovnika bezpecnosti
Detekcia kompromitacie z pohladu pracovnika bezpecnostiDetekcia kompromitacie z pohladu pracovnika bezpecnosti
Detekcia kompromitacie z pohladu pracovnika bezpecnostiSecurity Session
 

More from Security Session (20)

Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
Getting your hands dirty: How to Analyze the Behavior of Malware Traffic / SE...
 
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
Základy reverse engineeringu a assembleru / KAREL LEJSKA, MILAN BARTOŠ [DEFEN...
 
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
Zabezpečení nejen SSH na serveru pomocí Fail2Ban a jednoduchého honeypotu. / ...
 
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
 
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
Softwarove protektory / KAREL LEJSKA, MILAN BARTOŠ [DEFENDIO]
 
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
Wintel Hell: průvodce devíti kruhy Dantova technologického pekla / MARTIN HRO...
 
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
Robots against robots: How a Machine Learning IDS detected a novel Linux Botn...
 
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
#ochranadat pred sebou samotným / MATEJ ZACHAR [SAFETICA TECHNOLOGIES S.R.O.]
 
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
Co vše skrývá síťový provoz a jak detekovat kybernetické hrozby? / MARTIN ŠKO...
 
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
Bezpečnější pošta díky protokolu DANE / ONDŘEJ CALETKA [CESNET]
 
Prezentace brno
Prezentace brnoPrezentace brno
Prezentace brno
 
OSINT and beyond
OSINT and beyondOSINT and beyond
OSINT and beyond
 
Exploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan KopeckýExploitace – od minulosti po současnost - Jan Kopecký
Exploitace – od minulosti po současnost - Jan Kopecký
 
Research in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin DrahanskýResearch in Liveness Detection - Martin Drahanský
Research in Liveness Detection - Martin Drahanský
 
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan ČernockýDolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
Dolování dat z řeči pro bezpečnostní aplikace - Jan Černocký
 
Turris - Robert Šefr
Turris - Robert ŠefrTurris - Robert Šefr
Turris - Robert Šefr
 
Two Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal AmbrožTwo Years with botnet Asprox - Michal Ambrož
Two Years with botnet Asprox - Michal Ambrož
 
Falsifikace biometricke charakteristiky a detekce zivosti
Falsifikace biometricke charakteristiky a detekce zivostiFalsifikace biometricke charakteristiky a detekce zivosti
Falsifikace biometricke charakteristiky a detekce zivosti
 
Nehacknutelny web
Nehacknutelny webNehacknutelny web
Nehacknutelny web
 
Detekcia kompromitacie z pohladu pracovnika bezpecnosti
Detekcia kompromitacie z pohladu pracovnika bezpecnostiDetekcia kompromitacie z pohladu pracovnika bezpecnosti
Detekcia kompromitacie z pohladu pracovnika bezpecnosti
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Jak odesílat zprávy, když někdo vypne Internet - Pavel Táborský

  • 1. How to get the message out, when “someone” shuts down the internet Pavel Táborský
  • 2. Credentials • ~10+ years in IT, GSM networks before that • HAM License ~1 year • And that’s about it…
  • 3. Credits... • Bruce Sutherland, KO4IN • How To Get Your Message Out When Your Government Turns Off The Internet – @DEFCON19
  • 4. HAM Radio • Old tech since about 1900 • Usually two skilled operators needed, one at each end • Ionospheric conditions… • (Moon, Aircraft, Satellites)
  • 5. Gear • Wet dream HF/SSB station – HF radio 40k+ – Mast + yagi dir antenna array ~100k – Power amplifier(s) etc. • Or on Budget: – Yaesu FT-897 ~20k – Longwire antena ~the cost of the wire – Essentially what WW2 operators did
  • 6. We will use • HAM radio license… • APRS capable handheld radio ~5k • Yagi antenna made of tape measure and PVC pipe ~200 • VHF Band (145.825/144.800) • HAM radio satellite (OSCAR) – ISS – PC-SAT (Navy OSCAR – 44) • Twitter
  • 9. APRS • Developed in mid ‘80s by Bob Bruninga (WB4APR) • Originally position reporting system • Then Messages and WX reports • X.25 for HAMs – 1200baud – AFSK modulation • APRS is a retronym of WB4APR – Automatic Packet/Position Reporting System
  • 10. APRS cont’d • The network consists of radio stations operating entirely with broadcasted packets • Digipeaters retransmit packets with store and forward approach and follow DIGIPATH • Packets are picked up by internet gateways (iGate) and handed over to the the APRS-IS to plot on a map • Allows for sending variety of packet types (position, object, telemetry, weather etc.)
  • 12. Infrastructure needed • APRS iGate (preferably in another country) • APRS Digipeater (orbiting) • APRS -> Twitter gateway • Twitter
  • 14. APRS via Satellite • Set radio transmit to 145.825 • ARISS on the 1st position in the digipath • Compose an APRS message to TWITR • Wait for the satellite to be over the horizon – And chosen iGate in the footprint • Send the message • Message gets digipeated back to ground iGate • And picked by the APRS-IS network • Subsequently by the APRS -> twitter gateway
  • 15. APRS -> twitter gateway • Runs under hamradiotweets.com atm • Interfaces to the aprs.fi (APRS-IS) API to pull the messages • Tweets…
  • 16. OSCAR • Stands for Orbital Satellite Carrying Amateur Radio • ISS • PC-SAT (Navy OSCAR-44) • OSCAR status: – http://oscar.dcarr.org/
  • 17. Satellite pass prediction • Web Based – http://www.heavens-above.com/ – http://www.n2yo.com/ • Offline – Satscape
  • 18. Not foolproof • The system can be jammed • You can be triangulated • Twitter fail whale