FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Unencrypted Satellite Traffic Contains Sensitive Information

Gregory Zuckerman
Last updated: October 14, 2025 7:12 pm
By Gregory Zuckerman
Technology
7 Min Read
SHARE

Noisy, flawed communication in space is now a thing. A significant portion of the data orbiting Earth is being zapped around in the clear, beamed to and from geostationary satellites over North America—all those mobile carrier backhauls, corporate networks, and even military logistics operations are left wide open for interception with off-the-shelf hardware, academic researchers say.

How Researchers Demonstrated the Satellite Data Leak

Researchers from the University of California San Diego and University of Maryland tracked traffic to 39 geostationary satellites from a location in La Jolla, Calif. With an ordinary dish and software-defined radio equipment that costs around $800, they captured downlink signals to determine if IP traffic was encrypted.

Table of Contents
  • How Researchers Demonstrated the Satellite Data Leak
  • Who Was Exposed, and What Investigators Saw in Data
  • Why So Much of Satellite Traffic Is Unencrypted
  • What’s Changed, and What Hasn’t in Satellite Security
  • The Broader Security Context for Space Communications
  • What Needs to Happen Next to Secure Satellite Links
Unencrypted satellite traffic exposing sensitive data

The results were stark: roughly 50% of observed GEO links transmitted cleartext IP. Within just nine hours of one capture, the team had pulled metadata that revealed 2,711 phone numbers as well as call and message content. Outside of telecom, they saw exposed data streams related to in-flight Wi-Fi systems, job scheduling systems, inventory management, and industrial control operations.

The researchers released a peer-reviewed paper chronicling their method and results, adding that the weakness is based in how legacy satellite networks are built and monitored. And independent reporting has reinforced that the gap is so glaring that sophisticated adversaries could already be taking advantage of it.

Who Was Exposed, and What Investigators Saw in Data

The researchers found unencrypted cellular backhaul to several carriers, including traffic from T-Mobile and AT&T’s Mexican operations. The data exposed may have included user SMS and voice content in some cases, as well as web browsing, and information relating to the computing devices used on the carrier’s network.

The researchers also found traffic associated with sea vessels of the US military and several entities of the Mexican government and military. And plenty of retail and logistics data on big commercial systems in Mexico were also online, such as asset tracking and inventory updates that had never been secured in transit.

Some of the notified organizations have activated encryption since then, but not all affected networks have been shored up, the researchers said. The split reaction highlights how decentralized satcom supply chains can keep responsibility for service delivery fragmented across carriers, satellite operators, ground-station providers, and equipment vendors.

Why So Much of Satellite Traffic Is Unencrypted

Geostationary links continue to serve as the backbone for remote connectivity—backhauling cell sites, linking ships and aircraft, and connecting rural facilities. Most of these networks have long-lived terminals and DVB-S/DVB-S2 modems that were developed many years ago, at a time when radio-frequency obscurity and the cost of cryptographic overhead were used as an excuse for not implementing end-to-end encryption.

That calculus no longer holds. Software-defined radios, improved low-noise amplifiers, and open-source tooling have made high-quality interception much more accessible. The cleartext protocols like GTP (mobile backhaul) and plain web services in the enterprise, in addition to older industrial interfaces, continue to flow over shared satellite transponders, resulting in something of a perfect storm for exposure.

Satellite over Earth transmits unencrypted traffic, exposing sensitive data in transit

The end result is a security-by-default fail: operators imagine heaven as an umbrella, and all modern eavesdroppers know it as just another channel.

What’s Changed, and What Hasn’t in Satellite Security

Some carriers enabled encryption on these paths after responsible disclosures. The others are still in the process but struggle under aging equipment, complicated key management, and performance on high-latency GEO links. The researchers made the measurement tools available to the public in order to spur wider adoption and independent confirmation.

Of particular note, low Earth orbit systems including SpaceX’s direct-to-cell system and its Starlink broadband were not implicated. SpaceX references ISO/IEC 27001-mandated processes and cryptographic controls for data in transit. That dichotomy illustrates the gulf between modern architectures that essentially bake in crypto and legacy GEO ecosystems where encryption is still an afterthought at best.

The Broader Security Context for Space Communications

Governments have issued satellite communication warnings before. CISA released joint advisories following the 2022 KA-SAT incident in Europe, urging providers and customers there to harden terminals, segment networks, and monitor for anomalies. Telecommunications standards organizations have been advocating the use of IPsec for mobile backhaul services, but the adoption rate varies, especially on low-cost links.

The new findings provide hard evidence at scale: this is not an isolated misconfiguration but a systemic failing. The value for adversaries is clear—intercept intelligence, map critical infrastructure, and collect credentials without touching a target’s network.

What Needs to Happen Next to Secure Satellite Links

The fix is no mystery. Operators must turn on link-layer encryption on DVB-S2/S2X when possible, utilize IPsec/MACsec as a backhaul solution, require mutual authentication, and move away from cleartext services while rotating keys frequently. Ground stations require RF and protocol-layer monitoring to discover unprotected flows and rogue endpoints.

Enterprises and governments that use satcom need to make encryption part of their procurement requirements, keeping the vendor honest through audits instead of assumptions. Regulators and standards bodies—from the FCC and NTIA to ETSI and the ITU—can also provide an impetus by crystallizing expectations for safeguarding data in transit over shared space-based infrastructure.

At its core, it is a simple and long-overdue message: if data matters on the ground, then it matters in the sky. Encrypt it.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
Most EVs Now Have Access to 23,500 Tesla Superchargers
YouTube Explores AI Lip-Syncing for Auto Dubbing
You Now Can Hide Ads in Google Search After You’ve Seen Them
Instagram Rolls Out PG-13 Rules for Teen Accounts
Last Week To Save On Disrupt 2025 Passes
DIY satellite kit rigged T-Mobile’s network to pull data and calls
Therabody’s Budget ‘Mask Glo’ to Soften TheraFace
California Becomes First State to Regulate AI Companions
Samsung Halts One UI 8 For Galaxy S22 Series
Last Call to Buy Your Disrupt 2025 Exhibit Table Now
Google Calendar and Gmail get Gemini scheduling help
Facebook Revives Job Listings in the U.S.
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.