Hot Take Don’t look up, or How to intercept satellite data

harlan4096

Super Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Forum Veteran
Apr 28, 2015
9,477
1
85,491
8,389
Researchers have discovered that 50% of data transmitted via satellites is unencrypted. This includes your mobile calls and texts, along with banking, military, government, and other sensitive information. How did this happen, and what can we do about it?

The year is 2024. A team of scientists from both the University of California San Diego and the University of Maryland, College Park, discovers an unimaginable danger looming over the world — its source hiding in space. They start sounding the alarm, but most people simply ignore them…

No, this isn’t the plot of the Netflix hit movie Don’t Look Up. This is the sudden reality in which we find ourselves following the publication of a study confirming that corporate VoIP conversations, military operation data, Mexican police records, private text messages and calls from mobile subscribers in both the U.S. and Mexico, and dozens of other types of confidential data are being broadcast unencrypted via satellites for thousands of miles. And to intercept it, all you need is equipment costing less than US$800: a simple satellite-TV receiver kit.

Today, we explore what might have caused this negligence, if it’s truly as easy to extract the data from the stream as described in a Wired article, why some data operators ignored the study and took no action, and, finally, what we can do to ensure our own data doesn’t end up on these vulnerable channels.

What happened?

Six researchers set up a standard geostationary satellite-TV antenna — the kind you can buy from any satellite provider or electronics store — on the university roof in the coastal La Jolla area of San Diego, Southern California. The researchers’ no-frills rig set them back a total of US$750: $185 for the satellite dish and receiver, $140 for the mounting hardware, $195 for the motorized actuator to rotate the antenna, and $230 for a TBS5927 USB-enabled TV tuner. It’s worth noting that in many other parts of the world, this entire kit likely would have cost them much less...
 
@harlan4096 That's a fascinating (and honestly alarming) read from Kaspersky. I've been following satellite security issues for a while, and this study really highlights how much of our data infrastructure is still stuck in the past. Let me break down my thoughts on this, based on what we know from the research and similar reports.

Why is this happening?
A lot of it boils down to legacy systems and complacency. Satellites have been beaming data for decades, and many operators haven't updated their protocols to include modern encryption. Think about it: geostationary satellites handle everything from TV broadcasts to critical comms, and for non-sensitive stuff like public TV, encryption isn't always a priority. But when sensitive data like VoIP calls, military info, or banking details gets routed through these channels without proper safeguards, it's a recipe for exposure. Cost is another factor—encrypting everything adds overhead, and some providers might cut corners assuming "space is secure" (which it's clearly not). The Wired article you linked nails it: with cheap gear, anyone can eavesdrop if the data's in the clear.

Is it really that easy to intercept?
From what the researchers demonstrated, yeah, it seems straightforward for someone with basic technical know-how. They used off-the-shelf satellite TV equipment to capture feeds over thousands of miles. No fancy hacking required—just pointing an antenna at the right bird in the sky. That said, not all data is vulnerable; the study estimates about 50% is unencrypted, so there's some progress, but it's patchy. Operators ignoring the warnings? That's frustrating—probably a mix of denial, regulatory gaps, or just slow bureaucracy.

What can we do about it?
On a personal level, if you're worried about your own calls or texts potentially routing through satellites (like in remote areas or international roaming):
  • Use end-to-end encrypted apps like Signal or WhatsApp for messaging and calls—they handle encryption at the device level, so even if the transmission is intercepted, it's gibberish.
  • For VoIP or sensitive work calls, insist on services with built-in encryption (e.g., Zoom with E2EE enabled).
  • VPNs can help mask your traffic, but they're not foolproof for satellite links—still, better than nothing.
Broader fixes? We need pressure on regulators and providers to mandate encryption for all sensitive transmissions. Studies like this are a wake-up call—hopefully, it leads to audits and upgrades. If you're in IT or security, sharing this with your network could help spread awareness.

What do you think caused the oversight here? Legacy tech, or something more systemic? I'd love to hear others' takes on this too!