Cyber Operators Course (Op) – Module 6

Communication equipment and security – VPN (Virtual Private Network)

VPN’s are sometimes regarded as an ‘anti-system’ program, but it depends what you use it for. Some use VPN’s to browse illegal websites. Others just use it to watch videos as if they were based in different countries. So a Virtual Private Network works by using encryption and other security measures, a VPN can scramble all the data sent through the wide area network, so the network is “virtually” private.

Businesses often use VPNs to communicate across multiple locations. For example, a large company that has offices in several cities may need to send Information to the different locations via the Internet and make sure it’s done securely so it can’t be hacked. To keep the information secure, the company might set up a VPN with an encrypted connection.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – VPN (Virtual Private Network)

Virtual Private Network enables you to send and receive data across networks as if their device was somewhere else. It hides your identity even from your network provider.

VPN use is good practice for any user. It provides privacy. How the crew use a VPN is another matter, but it’s on the crew network, so can be reasonably ignored so long as good segregation is present. VPNs will also be present on board for business use.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – VOIP (Voice over Internet Protocol)

VoIP is basically a telephone connection over the Internet. The data is sent digitally, using the Internet Protocol (IP) instead of analogue telephone lines. In order to use VoIP, you need a computer, an Internet connection, and VoIP software. You also need a microphone, analogue telephone adapter, or VoIP telephone.  Many VoIP programs like skype and TeamSpeak allow you to use a basic microphone and speaker setup. Others require VoIP phones, which are like regular telephone handsets, but typically connect to your computer via USB. Analogue telephone adapters allow you to use regular phones with your computer. IP phones are another option that connect directly to a router via Ethernet or wirelessly. These phones have all the necessary software for VoIP built in and therefore do not require a computer.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – SATCOM cabinet security

Ask to inspect the location of the below-deck satellite terminal equipment on the vessel. This should be located in a locked cabinet to which only authorised, senior personnel have access.

Whilst the risk of a direct, physical attack to terminal is much lower than one exposed on the public internet, it still important to check that the terminal is locked away.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Is the software running on the satcom system kept up to date?

Next, check the current version of the software against the vendors product support web pages. Updates contain fixes for security flaws, so it is imperative that these updates are applied quickly.

Manufacturer support pages often change, but currently the relevant page on the Cobham web site is here: https://sync.cobham.com/satcom/support/downloads/?type=2502&article=7399

From this, one can see that the current version of software 1.60 Build 15, which means the software in the Cobham image above is indeed current.

Use a search engine to find the vendors current software update pages, or navigate through the vendors web site looking for the update pages.

Ask for written evidence of the procedure used for monitoring for updates and subsequent installation of upgraded software.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Example 2: KVH Commbox

Example 2: KVH Commbox

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Example 1: Cobham Sailor 900

Example 1: Cobham Sailor 900

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Is the software running on the satcom system kept up to date?

Make sure the terminal is at the latest version and ensure it is updated every time the manufacturer publishes an update. Updates usually include fixes for security flaws, so the more out of date the software is, the more vulnerable it is.

If out of date software is present, a hacker may be able to bypass the login and access the terminal even if the passwords are of a high quality.

Who is responsible for updating the satellite terminal software?

Ask when the software was last updated. Is there a written log showing this?

Check the version of software: ask the crew member responsible to show you the ‘web interface’ of the satcom terminal. In many cases the version number is shown on this interface.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – How to Hack your on-board WIFI

Ask if you can connect your laptop or smartphone to the crew Wi-Fi network. If this is permitted, connect and use a web browser. If you search using Google for ‘whats my ip’ then this will be displayed thus:

Then copy and paste the IP address you see in to a web browser address bar, e.g.

If you see a page that displays a satellite terminal interface, then make a note of this. Look for common terminal vendor names (e.g. Cobham, Intellian, KVH, Inmarsat etc)

It is likely in this case that the terminal is available to all on the public internet, a bad idea.

If instead the web page does not load or a generic error message is displayed, it is likely that the operator or airtime provider has correctly protected access to the terminal from the public internet.

This is still not a guarantee of security; a hacker that had successfully compromised the operator’s HQ network may still be able to access the terminal, but the risk is much reduced.

Cyber Operators Course (Op) – Module 6

Communication equipment and security – Check all on-board Wi-Fi networks

Terminals should NOT be available on the public internet. If they are, an attacker anywhere in the world can connect to the terminal and attempt to compromise it

Most satellite airtime providers offer a private IP address space, so hackers can’t reach your satcom system as easily over the internet. Many operators will have a VPN in place so that only the IT staff from HQ can access the terminal.

There are several methods to find out if vessel satcom terminals are on the public internet or not