{"id":301394,"date":"2025-10-14T01:39:10","date_gmt":"2025-10-14T01:39:10","guid":{"rendered":"https:\/\/www.europesays.com\/us\/301394\/"},"modified":"2025-10-14T01:39:10","modified_gmt":"2025-10-14T01:39:10","slug":"satellites-are-leaking-the-worlds-secrets-calls-texts-military-and-corporate-data","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/301394\/","title":{"rendered":"Satellites Are Leaking the World\u2019s Secrets: Calls, Texts, Military and Corporate Data"},"content":{"rendered":"<p class=\"paywall\">That suggests anyone could set up similar hardware somewhere else in the world and likely obtain their own collection of sensitive information. After all, the researchers restricted their experiment to only off-the-shelf satellite hardware: a $185 satellite dish, a $140 roof mount with a $195 motor, and a $230 tuner card, totaling less than $800.<\/p>\n<p class=\"paywall\">\u201cThis was not NSA-level resources. This was DirecTV-user-level resources. The barrier to entry for this sort of attack is extremely low,\u201d says Matt Blaze, a computer scientist and cryptographer at Georgetown University and law professor at Georgetown Law. \u201cBy the week after next, we will have hundreds or perhaps thousands of people, many of whom won\u2019t tell us what they\u2019re doing, replicating this work and seeing what they can find up there in the sky.\u201d<\/p>\n<p class=\"paywall\">One of the only barriers to replicating their work, the researchers say, would likely be the hundreds of hours they spent on the roof adjusting their satellite. As for the in-depth, highly technical analysis of obscure data protocols they obtained, that may now be easier to replicate, too: The researchers are releasing their own open-source software tool for interpreting satellite data, also titled \u201cDon\u2019t Look Up,\u201d on Github.<\/p>\n<p class=\"paywall\">The researchers\u2019 work may, they acknowledge, enable others with less benevolent intentions to pull the same highly sensitive data from space. But they argue it will also push more of the owners of that satellite communications data to encrypt that data, to protect themselves and their customers. \u201cAs long as we\u2019re on the side of finding things that are insecure and securing them, we feel very good about it,\u201d says Schulman.<\/p>\n<p class=\"paywall\">There\u2019s little doubt, they say, that intelligence agencies with vastly superior satellite receiver hardware have been analyzing the same unencrypted data for years. In fact, they point out that the US National Security Agency warned in a <a data-offer-url=\"https:\/\/www.nsa.gov\/Press-Room\/News-Highlights\/Article\/Article\/2910409\/nsa-issues-recommendations-to-protect-vsat-communications\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nsa.gov\/Press-Room\/News-Highlights\/Article\/Article\/2910409\/nsa-issues-recommendations-to-protect-vsat-communications\/&quot;}\" href=\"https:\/\/www.nsa.gov\/Press-Room\/News-Highlights\/Article\/Article\/2910409\/nsa-issues-recommendations-to-protect-vsat-communications\/\" rel=\"nofollow noopener\" target=\"_blank\">2022 security advisory<\/a> about the lack of encryption for satellite communications. At the same time, they assume that the NSA\u2014and every other intelligence agency from Russia to China\u2014has set up satellite dishes around the world to exploit that same lack of protection. (The NSA did not respond to WIRED\u2019s request for comment).<\/p>\n<p class=\"paywall\">\u201cIf they aren&#8217;t already doing this,\u201d jokes UCSD cryptography professor Nadia Heninger, who co-led the study, \u201cthen where are my tax dollars going?\u201d<\/p>\n<p class=\"paywall\">Heninger compares their study\u2019s revelation\u2014the sheer scale of the unprotected satellite data available for the taking\u2014to some of the revelations of <a href=\"https:\/\/www.wired.com\/2014\/08\/edward-snowden\/\" target=\"_blank\" rel=\"noopener\">Edward Snowden<\/a> that showed how the NSA and Britain\u2019s <a data-offer-url=\"https:\/\/www.theguardian.com\/uk\/2013\/jun\/21\/gchq-cables-secret-world-communications-nsa\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theguardian.com\/uk\/2013\/jun\/21\/gchq-cables-secret-world-communications-nsa&quot;}\" href=\"https:\/\/www.theguardian.com\/uk\/2013\/jun\/21\/gchq-cables-secret-world-communications-nsa\" rel=\"nofollow noopener\" target=\"_blank\">GCHQ<\/a> were obtaining telecom and internet data on an enormous scale, often by secretly tapping directly into communications infrastructure.<\/p>\n<p class=\"paywall\">\u201cThe threat model that everybody had in mind was that we need to be encrypting everything, because there are governments that are tapping undersea fiber optic cables or coercing telecom companies into letting them have access to the data,\u201d Heninger says. \u201cAnd now what we&#8217;re seeing is, this same kind of data is just being broadcast to a large fraction of the planet.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"That suggests anyone could set up similar hardware somewhere else in the world and likely obtain their own&hellip;\n","protected":false},"author":3,"featured_media":301395,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24],"tags":[24340,734,1802,25914,153204,27016,2540,159,4995,783,22269,4521,67,132,68,11588],"class_list":{"0":"post-301394","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-space","8":"tag-att","9":"tag-cybersecurity","10":"tag-military","11":"tag-military-tech","12":"tag-nsa","13":"tag-privacy","14":"tag-satellites","15":"tag-science","16":"tag-security","17":"tag-space","18":"tag-surveillance","19":"tag-t-mobile","20":"tag-united-states","21":"tag-unitedstates","22":"tag-us","23":"tag-walmart"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115369971825949927","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/301394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=301394"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/301394\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/301395"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=301394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=301394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=301394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}