Satellites leak the secrets of the world: calls, texts, military data and companies
This shows that anyone can adjust the same hardware elsewhere in the world and probably get their sensitive information set. In addition, the researchers restricted their experiments to satellite hardware outside the shelf: a $ 185 satellite container, a $ 140 ceiling ride with a $ 195 engine and a $ 230 card, less than $ 800.
“These sources were not NSA levels,” said Matt Blas, a computer and cryptography scientist at George Town University and a law professor at Jerg. Town. “Until next week, we will have hundreds or maybe thousands of people, many of whom don’t tell us what they are doing, repeat it, and see what they can find in the sky.”
Researchers say one of the only obstacles to repeating their work is probably hundreds of hours to set up their satellite on the roof. In the case of deep analysis, the highly technical data protocols they have obtained, which may now be easier to repetition: Researchers publish their open source software tools for interpreting satellite data, as well as “do not search” in Github.
They acknowledge that the work of researchers may enable others with less benevolent purposes to pull the same sensitive data out of space. But they argue that most of its owners lead satellite communication data to encrypt these data to protect themselves and their customers. “We are very good at it as long as we find things that are insecure and supply them,” says Scholman.
They say there is little doubt that intelligence agencies with the superior satellite hardware have been analyzing the same encrypted data for years. In fact, they pointed out that the US National Security Agency has warned in a 2022 security consultation about the lack of encryption for satellite communications. At the same time, they assume that the NSA – and any other intelligence agency from Russia to China – has set up satellite foods around the world to exploit the same lack of support. (NSA did not respond to Wired request for comment).
“If they do not do it,” then, “then,” where is my tax dollar going? “
Haninger Makhsheh compares his study – the full scale of unprotected satellite data available to get – to some Edward Snowden disclosures that show that the NSA and GCHQ British gain telecommunications and Internet data on a large scale, often using directly to communications infrastructure.
“The threat pattern that everyone had in mind was that we had to encrypt everything, because there are governments that affect the following fiber cables or force telecommunications companies to allow them to access data,” says Heninger. “And now what we see is, the same type of data is only broadcast to a large part of the planet.”