Normal view
PODCAST: This Week in Amateur Radio Edition #1323 โ Full Version
-
This Week in Amateur Radio
- PODCAST: This Week in Amateur Radio Edition #1323 โ Truncated 1-hour version
PODCAST: This Week in Amateur Radio Edition #1323 โ Truncated 1-hour version
Via the ARRL: ARRL Logbook of The World Returns to Service
PODCAST: This Week in Amateur Radio Edition #1321 โ Full Version
-
This Week in Amateur Radio
- PODCAST: This Week in Amateur Radio Edition #1321 โ Truncated 1-hour version
PODCAST: This Week in Amateur Radio Edition #1321 โ Truncated 1-hour version
PODCAST: This Week in Amateur Radio Edition #1319 โ Full Version
-
This Week in Amateur Radio
- PODCAST: This Week in Amateur Radio Edition #1318 โ Truncated 1-hour version
PODCAST: This Week in Amateur Radio Edition #1318 โ Truncated 1-hour version
SBE Website Recovered After Malware Attack
Via the ARRL: ARRL Member Bulletin for June 6, 2024
-
This Week in Amateur Radio
- ARRL Systems Service Disruption (UPDATE 4 June 2024, confirms cyberattack)
ARRL Systems Service Disruption (UPDATE 4 June 2024, confirms cyberattack)
Cyberattack disrupts American Radio Relay League
-
This Week in Amateur Radio
- Amateur ham radio club continues to see success in Upshur County (West Virginia)
Amateur ham radio club continues to see success in Upshur County (West Virginia)
-
This Week in Amateur Radio
- Via the ARRL: Focus on Public Safety Relationship Building at the 2024 ARRL National Convention
Via the ARRL: Focus on Public Safety Relationship Building at the 2024 ARRL National Convention
Scott Manley Explains GPS Jamming & Spoofing and Why & Who is Causing It
In recent years GPS spoofing and jamming have become quite commonplace. Recently popular YouTuber Scott Manley uploaded a video explaining exactly what GPS spoofing and jamming is and explains a bit about who is doing it and why.
In the video Scott explains how aircraft now routinely use GPS as a dominant navigational sensor and how some commercial flights have been suspended due to GPS jamming. Scott explains how ADS-B data can be used to determine the source of GPS jamming (via gpsjam.org) and shows hotspots stemming from Russia. He goes on to show how drone shows have also failed in China either due to GPS jamming by rival companies or due to Chinese military warship jamming. Scott then explains a bit about GPS and how jamming and spoofing work.
![YouTube Video](../themes/icons/grey.gif)
-
rtl-sdr.com
- YouTube Video Series on Iridium Satellite Decoding with an Airspy, RTL-SDR Blog Patch Antenna and DragonOS
YouTube Video Series on Iridium Satellite Decoding with an Airspy, RTL-SDR Blog Patch Antenna and DragonOS
Over on his YouTube channel, Rob VK8FOES has started a new video series about Iridium Satellite Decoding. Iridium is a constellation of low-earth orbiting satellites that provide voice and data services. Iridium was first decoded with low cost hardware by security researchers back in 2016 as mentioned in this previous post. Being unencrypted it is possible to intercept private text and voice communications.
Rob's video is part of a series, and so far only part one has been uploaded. The first video outlines the hardware and software requirements for Iridium decoding and demonstrates the gr-iridium software. An Airspy and RTL-SDR Blog Patch Antenna are used for the hardware, and the software runs on DragonOS.
Rob writes that in part two he will demonstrate the use of iridium-toolkit, which can be used to extract data and recordings from the Iridium data provided from gr-iridium.
Be sure to subscribe to his YouTube channel so that you are notified when part two is released.
![YouTube Video](../themes/icons/grey.gif)
-
This Week in Amateur Radio
- FCC fines big three carriers $196M for selling usersโ real-time location data
FCC fines big three carriers $196M for selling usersโ real-time location data
Kobold Letters โ HTML Transformer Emails
WarDragon: Testing EMEye/TempestSDR with Wyze Cam Pan V2 Cameras and a USRP B210
Last week we posted about University researchers who found that it was possible to recover live video images from the EM leakage emanating from various IoT security cameras. The 'EMEye' software to do this was released as open-source on GitHub.
Recently Aaron, who created DragonOS and WarDragon, has uploaded a video showing EMEye working on WarDragon. In the video, Aaron shows how to install and use the EMEye software on WarDragon, and demonstrates it working with a Wyze Cam Pan V2 that he purchased for this test.
In this video, I guide you through a practical demonstration of Tempest-based camera eavesdropping attack research. I'll be focusing on the EM Eye project, a tool derived from TempestSDR with some added features.
I'll show you how to construct the EM Eye project, step by step, and how to use it to tune into the EMI emitted by the Wyze Cam Pan v2 using an Ettus B210. By processing this EMI/RF signal, we're able to reconstruct the video stream using the algorithms provided by EM Eye and TempestSDR.
Additionally, I'll demonstrate how DragonOS FocalX and the WarDragon kit offer a cost-effective alternative by including a prebuilt version of TempestSDR that works with the Airspy R2. This allows for similar functionality at a lower cost.
If you're interested we reviewed WarDragon in a recent post as well.
![YouTube Video](../themes/icons/grey.gif)