大象传媒

Hackers get chance to target US satellite

  • Published
Full moonImage source, PA Media
Image caption,

If hackers can get the satellite to take a picture of the moon they will get paid a bounty

Ethical hackers are getting the chance to see if they can crack the security on an orbiting US Defense Department satellite, reports Wired.

at the 2020 Def Con hacker conference.

The demonstration follows a session at Def Con 2019 that let researchers tackle an F-15 fighter jet computer.

The Air Force said Def Con demos were part of efforts to expose military systems to better security checks.

"We have to get over our fear of embracing external experts to help us be secure," Will Roper, assistant secretary of the US Air Force for acquisition, technology and logistics, told the tech news magazine.

He said that before now, the US military had kept its technology to itself and assumed that this meant it was secure.

In a separate interview, Mr Roper told military news site C4ISR that but was now outdated.

"Now technology changes so rapidly and most of it is driven by software," he said. "The idea that closed can make you more secure is a hypothesis we need to question."

Live challenge

The satellite hacking stunt will have a testing phase that will see the USAF advertise for and then vet security researchers for the challenge.

Eligible ethical hackers will try their skills on components used in military satellite systems in a series of trials. The best performers in these challenges will be invited to Def Con in Las Vegas for a "live" event at which they will try to compromise the working satellite.

Mr Roper said hackers would be trying to take over the camera on the satellite and use it to take a photograph of the Moon. Successful hackers or teams will get paid a "bug bounty" for their work.

The Def Con events have grown out of a separate initiative called Hack the Air Force that sees ethical hackers look for bugs in various USAF systems. . The USAF paid hackers more than $130,000 (拢103,000) in bounties for finding the bugs.