How to hijack a television broadcast signal.

Broadcast signal hijacking—also known as broadcast signal intrusion—is the unauthorized takeover of television (or radio) signals, allowing attackers to inject their own content into a broadcast. Over the years, several methods have been used to achieve this, ranging from physical tampering to sophisticated cyberattacks.

Common Methods of Hijacking

Overpowering the Broadcast Signal

This method is the one we think of most commonly. Hackers can use a powerful transmitter and a directional antenna to send a stronger signal to a broadcast tower than the legitimate station’s own feed. This technique, known as the capture effect, allows the pirate signal to override the original broadcast. The infamous 1987 “Max Headroom” incident in Chicago used this method (see details below), with the attackers transmitting from a location in line of sight of the TV towers, overpowering the legitimate signal.

Physical Access to Transmission Equipment

In some cases, attackers have physically broken into transmission sites and directly spliced their own audio or video into the broadcast feed. This approach requires access to secure facilities, but can be effective if security is lax.

Satellite Uplink Hijacking

For satellite broadcasts, attackers can overpower the uplink frequency used to send content to the satellite. For example, the 1986 “Captain Midnight” incident involved a pirate transmission that overpowered HBO’s satellite signal, replacing it with a protest message.

Cyberattacks on Broadcast Infrastructure

As broadcasting equipment becomes increasingly internet-connected, cyberattacks have emerged as a new threat. Hackers may exploit vulnerabilities in connected systems to take over or disrupt broadcasts remotely, as seen in the 2015 TV5Monde hack, where attackers broadcast pro-ISIS material by compromising the station’s IT systems.

Smart TV Exploits

In recent years, researchers have demonstrated attacks where malicious code is embedded into digital broadcast signals (such as DVB-T), which can compromise smart TVs. This allows hackers to gain remote access to the device, potentially spying on users or displaying unauthorized content, all without physical access to the TV.

Notable Incidents

Max Headroom Incident (1987)

On November 22, 1987, two Chicago TV stations—WGN-TV and WTTW—had their signals hijacked by an unidentified person wearing a Max Headroom mask. The first intrusion occurred during WGN-TV’s 9:00 p.m. news sports segment, lasting about 25–30 seconds with only a buzzing sound and the masked figure swaying in front of a corrugated metal panel. The second, more elaborate intrusion happened about two hours later during WTTW’s broadcast of Doctor Who, lasting about 90 seconds and featuring distorted speech, local references, and bizarre antics, including the masked figure being spanked with a flyswatter.

How It Was Done

The hijacker(s) overpowered the stations’ microwave transmission signals by broadcasting a stronger signal to the stations’ broadcast towers, likely from a location within line of sight of the antennas atop tall Chicago buildings. This required technical expertise, specialized equipment, and knowledge of broadcast systems.

Content of the Broadcasts

The first interruption was mostly visual, with no discernible audio except buzzing. The second included references to local personalities, commercials, and ended with a surreal scene involving the masked figure and a flyswatter.

Investigation and Aftermath

The FCC and FBI investigated but never identified the perpetrators. Theories have ranged from an inside job by someone with broadcast experience to members of Chicago’s underground hacker community. Despite tips and some leads, no arrests were made, and the case remains unsolved decades later.

Captain Midnight (1986)

On April 27, 1986, John R. MacDougall, an electrical engineer and satellite dish dealer, hijacked HBO’s satellite signal under the pseudonym “Captain Midnight.” During a late-night broadcast of The Falcon and the Snowman, viewers across the eastern United States saw a color-bar screen with the message:
“GOODEVENING HBO. FROM CAPTAIN MIDNIGHT $12.95/MONTH ? NO WAY SHOWTIME/MOVIE CHANNEL BEWARE!”.

Motivation

MacDougall’s protest targeted HBO’s recent increase in subscription fees for satellite dish owners, which he believed was unfair and damaging to small satellite businesses.

Technical Method

While working at Central Florida Teleport, MacDougall used the facility’s powerful uplink dish to transmit his own signal to the Galaxy 1 satellite, which HBO used for distribution. By overpowering HBO’s legitimate signal, he was able to replace the broadcast with his protest message for about four and a half minutes.

Immediate Response

HBO technicians noticed the intrusion and attempted to counteract it by increasing their uplink power, but MacDougall matched their efforts, resulting in a brief “tug-of-war” before HBO relented to avoid damaging the satellite. The incident caused alarm at HBO and among satellite operators, raising concerns about the vulnerability of satellite communications.

Investigation and Aftermath

The FCC and FBI launched an investigation, eventually tracing the intrusion to MacDougall after a tourist overheard him discussing the event and reported his license plate. MacDougall surrendered, pleaded guilty, and received a $5,000 fine, one year of unsupervised probation, and a one-year suspension of his amateur radio license.

TV5Monde Hack (2015)

In April 2015, French broadcaster TV5Monde suffered a major cyberattack that knocked 12 of its television channels off the air for up to 18 hours and hijacked its website and social media accounts, which were used to post jihadist propaganda. The attack was initially attributed to a group calling itself the “CyberCaliphate,” claiming allegiance to ISIS. However, subsequent investigations linked the operation to the Russian hacking group APT28 (also known as Fancy Bear), suggesting the “CyberCaliphate” was a false flag to disguise the attackers’ true identity.

How the Attack Unfolded

The attackers first breached TV5Monde’s network on January 23, 2015, and remained undetected for about 10 weeks, conducting extensive reconnaissance to understand the broadcaster’s operations. They exploited multiple points of entry, including compromised third-party accounts and vulnerabilities in remote-controlled cameras supplied by a company in the Netherlands.

After gaining access, the attackers escalated privileges by creating an admin-level account in Active Directory and overwrote firmware on routers and switches, which blacked out the TV channels. Just before the main sabotage, they also compromised TV5Monde’s social media accounts, posting propaganda messages and further amplifying the disruption.

The attackers used bespoke malware specifically designed to corrupt and destroy the internet-connected hardware that controlled TV5Monde’s broadcast encoder systems.

Impact and Response

The attack nearly destroyed the network; TV5Monde’s director-general stated they were “a couple of hours from having the whole station gone for good”. Quick action by on-site engineers, who identified and disconnected the compromised machine, prevented total destruction. The incident response involved French national cybersecurity agency ANSSI, police, and other partners, and highlighted the importance of hardened IT practices, restricted access, and robust incident response planning.

Modern Context

With the switch to digital broadcasting, traditional signal hijacking has become more difficult due to encryption and improved security protocols. However, cyberattacks and vulnerabilities in smart TVs and internet-connected broadcast systems present new avenues for broadcast hijacking.
“Other methods that have been used in North America to intrude on legal broadcasts include using a directional antenna to overpower the uplink frequency of a broadcast relay station, breaking into the transmitter area and splicing audio directly into the feed, and cyberattacks on internet-connected broadcasting equipment.”