The expert warns that the satellites could be pirated and used as & # 039; radio frequency weapons & # 039;

Thousands of ethical hackers and security researchers have gathered in Las Vegas this week to address some of the biggest potential threats to cybersecurity.

At the Black Hat information security conference, researchers have revealed how satellite communications could be used by hackers to launch "cyber attacks", essentially turning their antennas into massive microwave ovens, according to The Guardian.

And Def Con, one of the largest hacker conventions in the world, will serve as a laboratory to break into voting machines, extending its efforts to identify possible security flaws in technology that can be used in the November elections in the United States. .

Scroll down to watch the video

According to security expert Ruben Santamarta, hackers could use satellite communications to launch "cyber attacks", turning their antennas into massive microwave ovens. Stock Photo

According to security expert Ruben Santamarta, hackers could use satellite communications to launch "cyber attacks", turning their antennas into massive microwave ovens. Stock Photo

In a presentation that emerged from previous investigations, Rubén Santamarta, of the security firm IOActive, warned that communications used by ships, planes and the military are vulnerable to hackers.

"The consequences of these vulnerabilities are shocking," Santamarta said, according to The Guardian.

"Basically, the theoretical cases that I developed four years ago are no longer theoretical.

"Basically we are converting Satcom devices into radio frequency weapons," said Santamarta. "It's more or less the same principle behind the microwave oven."

Satellite systems could also be used to filter information, the expert said.

In Def Con, a & # 39; Voting Village & # 39; Three days ago, it opened on Friday in an effort to expose vulnerabilities in devices such as digital survey books and memory card readers.

Def Con held its first voting village last year after the US intelligence agencies. UU They concluded that the Russian government used hacking in its attempt to support Donald Trump's candidacy for president in 2016. Moscow has denied the allegations.

Def Con, one of the largest hacker conventions in the world, will serve as a laboratory to break into the voting machines, extending its efforts to identify possible security flaws in the technology that can be used in the November elections in the United States.

Def Con, one of the largest hacker conventions in the world, will serve as a laboratory to break into the voting machines, extending its efforts to identify possible security flaws in the technology that can be used in the November elections in the United States.

WHAT IS THE COMMAND OF CYBERNETIC WAR OF EE. UU.?

President Donald Trump ordered the US military in August 2017 to elevate its cyber war operations to a separate command.

The command center, called US Cyber ​​Command or Cybercom, focuses on cyber warfare, like government piracy campaigns.

Protect the United States from hostile forces online and help the US UU To pursue their own objectives of cyber warfare.

According to The New York Times, Cybercom previously placed "implants". in networks of Islamic State groups that allow experts to monitor the behavior of the group and finally imitate or alter the messages of the commanders so that they involuntarily direct the combatants to areas that could be reached by drones or airplanes. .

The president of the United States, Donald Trump, ordered the US Army. UU Raise your cyber war operations to a separate command, indicating a new emphasis on electronic offensive and defensive operations.

The president of the United States, Donald Trump, ordered the US Army. UU Raise your cyber war operations to a separate command, indicating a new emphasis on electronic offensive and defensive operations.

Another technique that is probably employed is a common type of cyber attack known as denial of service.

The move was a response to several recent major cybersecurity incidents, such as attacks by Russian hackers during the 2016 elections.

Cyber ​​Command is now in the process of recruiting hundreds of trained cyber operators to help with defensive and offensive operations.

It is headquartered in Fort Meade, Maryland, and will eventually comprise nearly 6,200 people organized into 133 teams.

These teams & # 39; Cyber ​​Mission Force & # 39; They are already actively carrying out operations and will reach full operational capacity by the end of fiscal year 2018.

The cyber war operations had previously been carried out under the umbrella of the National Security Agency, the country's leading electronic spy agency.

The organizers have returned before the November elections, in which the Democrats hope to take control of the US House of Representatives.

Trump's national security team warned last week that Russia had launched "ubiquitous" efforts to interfere in the elections.

"These vulnerabilities that will be identified over the course of the next three days would cause massive chaos in a real election," said Jake Braun, one of the village organizers.

& # 39; They should be identified and addressed, regardless of the environment they are in & # 39;.

Participants will have the opportunity to hack more than five types of voting machines from manufacturers, including Elections Systems & Software and Dominion Voting.

Last year, a Danish researcher discovered how to take control of a touch-screen voting system used until 2014 in a remote hack that organizers say could operate from a distance of up to 1,000 feet.

A group representing US secretaries of state praised the goal of strengthening electoral security, but cautioned that the findings could be biased.

In Def Con, a & # 39; Voting Village & # 39; Three days ago, it opened on Friday in an effort to expose vulnerabilities in devices such as digital survey books and memory card readers.

In Def Con, a & # 39; Voting Village & # 39; Three days ago, it opened on Friday in an effort to expose vulnerabilities in devices such as digital survey books and memory card readers.

THE CONCRETE THAT I COULD HEAR AGAINST THE EMP EMPHASES

The concrete with EMP shielding could be applied in a spraying technique that would allow a profitable adaptation

The concrete with EMP shielding could be applied in a spraying technique that would allow a profitable adaptation

Engineers at the University of Nebraska-Lincoln have developed a type of concrete that could act as a shield against the electromagnetic pulse attacks of "doomsday."

The conductive concrete absorbs and reflects the electromagnetic waves to protect the internal electronics, and the creators say that it could be used in new structures or applied through a spraying method to retrofit existing buildings.

The researchers created a concrete that conducts electricity, replacing some of the standard concrete materials with magnetite.

The concrete also includes carbon and metal components, improving its absorption capabilities and allowing it to be reflected as well.

The new concrete is now available for commercialization, and the team has joined the ABC Group in a research agreement for a new patent pending product that would work with a method of construction of sprayed concrete, a spraying technique that would allow a good cost-benefit ratio reconditioning.

"It uses a pseudo environment that in no way replicates state electoral systems, networks or physical security," the National Association of Secretaries of State said in a statement.

To provide conference attendees unlimited physical access to voting machines, most of which are no longer used, do not replicate the precise physical and cyber protections established by the state and local government before and on the day of the Choice, "the group said.

Verified Voting, a defense group that helped organize the hacking village, said that some of the voting machine models being tested are still used to count votes across the United States.

One system, the Dominion Premier / Diebold AccuVote TSx system, is used in 20 states and 23,784 precincts, according to Verified Voting.

.