Unencrypted Satellite Backhaul Exposes Data

Updated: 2025.12.02 4D ago 2 sources
UC San Diego and University of Maryland researchers intercepted unencrypted geostationary satellite backhaul with an $800 receiver, capturing T‑Mobile users’ calls/texts, in‑flight Wi‑Fi traffic, utility and oil‑platform comms, and even US/Mexican military information. They estimate roughly half of GEO links they sampled lacked encryption and they only examined about 15% of global transponders. Some operators have since encrypted, but parts of US critical infrastructure still have not. — This reveals a widespread, cheap‑to‑exploit security hole that demands standards, oversight, and rapid remediation across telecoms and critical infrastructure.

Sources

Russia Still Using Black Market Starlink Terminals On Its Drones
BeauHD 2025.12.02 45% relevant
While that existing item focused on backhaul encryption, both pieces speak to satellite communications' operational security limits—this story shows the supply‑chain/market side (terminals reaching adversaries) complementing prior technical attack surfaces discussed in the existing idea.
Satellites Are Leaking the World's Secrets: Calls, Texts, Military and Corporate Data
msmash 2025.10.14 100% relevant
The study’s ACM presentation reporting 2,700 T‑Mobile users’ calls/texts captured in nine hours and other sensitive traffic from utilities and militaries via unencrypted GEO links.
← Back to All Ideas