Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot
    Samsung’s new 27-inch portable display has a three-hour battery life

    Samsung’s new 27-inch portable display has a three-hour battery life

    November 12, 2025
    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    November 12, 2025
    Google is trying to take down a group sending you all those spammy texts

    Google is trying to take down a group sending you all those spammy texts

    November 12, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
    Security

    Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    News RoomBy News RoomOctober 14, 20253 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
    Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    That suggests anyone could set up similar hardware somewhere else in the world and likely obtain their own collection of sensitive information. After all, the researchers restricted their experiment to only off-the-shelf satellite hardware: a $185 satellite dish, a $140 roof mount with a $195 motor, and a $230 tuner card, totaling less than $800.

    “This was not NSA-level resources. This was DirecTV-user-level resources. The barrier to entry for this sort of attack is extremely low,” says Matt Blaze, a computer scientist and cryptographer at Georgetown University and law professor at Georgetown Law. “By the week after next, we will have hundreds or perhaps thousands of people, many of whom won’t tell us what they’re doing, replicating this work and seeing what they can find up there in the sky.”

    One of the only barriers to replicating their work, the researchers say, would likely be the hundreds of hours they spent on the roof adjusting their satellite. As for the in-depth, highly technical analysis of obscure data protocols they obtained, that may now be easier to replicate, too: The researchers are releasing their own open-source software tool for interpreting satellite data, also titled “Don’t Look Up,” on Github.

    The researchers’ work may, they acknowledge, enable others with less benevolent intentions to pull the same highly sensitive data from space. But they argue it will also push more of the owners of that satellite communications data to encrypt that data, to protect themselves and their customers. “As long as we’re on the side of finding things that are insecure and securing them, we feel very good about it,” says Schulman.

    There’s little doubt, they say, that intelligence agencies with vastly superior satellite receiver hardware have been analyzing the same unencrypted data for years. In fact, they point out that the US National Security Agency warned in a 2022 security advisory about the lack of encryption for satellite communications. At the same time, they assume that the NSA—and every other intelligence agency from Russia to China—has set up satellite dishes around the world to exploit that same lack of protection. (The NSA did not respond to WIRED’s request for comment).

    “If they aren’t already doing this,” jokes UCSD cryptography professor Nadia Heninger, who co-led the study, “then where are my tax dollars going?”

    Heninger compares their study’s revelation—the sheer scale of the unprotected satellite data available for the taking—to some of the revelations of Edward Snowden that showed how the NSA and Britain’s GCHQ were obtaining telecom and internet data on an enormous scale, often by secretly tapping directly into communications infrastructure.

    “The threat model that everybody had in mind was that we need to be encrypting everything, because there are governments that are tapping undersea fiber optic cables or coercing telecom companies into letting them have access to the data,” Heninger says. “And now what we’re seeing is, this same kind of data is just being broadcast to a large fraction of the planet.”

    Updated 1pm ET, October 14, 2025: Added additional information from T-Mobile about the encryption the company added to its cell network following the researchers’ discoveries.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleFacebook removes ICE-tracking page after US government ‘outreach’
    Next Article Google gadgets, ranked

    Related Posts

    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    November 12, 2025
    FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

    FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

    November 7, 2025
    CBP Searched a Record Number of Phones at the US Border Over the Past Year

    CBP Searched a Record Number of Phones at the US Border Over the Past Year

    November 7, 2025
    ICE Wants to Build a Shadow Deportation Network in Texas

    ICE Wants to Build a Shadow Deportation Network in Texas

    November 6, 2025
    Hack Exposes Kansas City’s Secret Police Misconduct List

    Hack Exposes Kansas City’s Secret Police Misconduct List

    November 5, 2025
    How to Hack a Poker Game

    How to Hack a Poker Game

    November 4, 2025
    Our Picks
    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    An Anarchist’s Conviction Offers a Grim Foreshadowing of Trump’s War on the ‘Left’

    November 12, 2025
    Google is trying to take down a group sending you all those spammy texts

    Google is trying to take down a group sending you all those spammy texts

    November 12, 2025
    Extreme smart home makeover

    Extreme smart home makeover

    November 11, 2025
    The 30 best gift ideas for mom this holiday season

    The 30 best gift ideas for mom this holiday season

    November 11, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Amazon’s like-new Kindle Paperwhite Signature Edition is on sale for just 7 News

    Amazon’s like-new Kindle Paperwhite Signature Edition is on sale for just $127

    By News RoomNovember 11, 2025

    If you didn’t get around to reading more this year, now’s a great time to…

    Google Photos lets iPhone users edit images by describing changes

    Google Photos lets iPhone users edit images by describing changes

    November 11, 2025
    Pixel phones are getting notification summaries

    Pixel phones are getting notification summaries

    November 11, 2025
    Google is introducing its own version of Apple’s private AI cloud compute

    Google is introducing its own version of Apple’s private AI cloud compute

    November 11, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.