skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 113312 Find in a Library
Title: Captain Midnight and the Space Hackers
Journal: Security Management  Volume:32  Issue:7  Dated:(July 1988)  Pages:77-79,82
Author(s): J J B Bloombecker
Date Published: 1988
Page Count: 4
Type: Issue Overview
Format: Article
Language: English
Country: United States of America
Annotation: In 1986, a disgruntled satellite dish dealer demonstrated the vulnerability of the satellite communications network to intentional interference by disrupting a cable television transmission to viewers east of the Mississippi.
Abstract: Because the same system is used to transmit commercial computer data, military information, and a variety of other sensitive electronic messages, the Federal Communications Commission launched an investigation to apprehend the perpetrator and broadcasters and satellite operators started to tighten their security. While much has been done to protect against such interference, the transmission stations (uplinks) that send signals to the satellites remain vulnerable to interference. To respond to this threat, the Electronic Communications Privacy Act contains a provision making it a felony to interfere intentionally or maliciously with the authorized operation of a satellite or to hinder any satellite transmission. The Act also expands the investigative jurisdiction to the Federal Bureau of Investigation. In the television case, the offender eventually was identified by identifying the character generator at the uplink used to disrupt the transmission. Since then, an automatic transmitter identification system has been proposed to aid investigation of similar cases. In addition, traditional security procedures have been enhanced at uplinks including better access control and logging and monitoring procedures.
Main Term(s): Transmission security
Index Term(s): Security management
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=113312

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.