Satellites found exposing unencrypted data
One of the largest security scandals of the decade may be unfolding this week following the shocking discoveries published by researchers from the University of Maryland and the University of California, San Diego. The paper, entitled “Don’t Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites,” covered a year-long study of network traffic from geosynchronous (GEO) satellites. These GEO networks are used for a wide variety of purposes, including satellite TV, in-flight wi-fi, cellular call and text traffic, and more sensitive data such as military asset tracking and retail inventory management. The researchers expected much of this data to be encrypted, given that open-source satellite tracking has been available to the public for many years, and significant resources have been poured into transmission interception for pirating satellite TV signals. However, their survey of GEO network traffic, conducted using basic tools, revealed surprising findings: in their words, "a shockingly large amount of sensitive traffic is being broadcast unencrypted, including critical infrastructure, internal corporate and government communications, private citizens' voice calls and SMS, and consumer internet traffic from in-flight Wi-Fi and mobile networks."
The tools the researchers used to conduct this survey are those that were publicly available to threat actors: a motorized satellite dish, a universal Ku-band downconverter, and a tuner card. The total cost was less than 600 USD, and all the parts were available on the open market. Using the free Easy BlindScan Pro software, the researchers swept the full Ku-band frequency and automatically captured raw data using the tuner card. The researchers estimated they received IP traffic from 14.3 percent of all global Ku-band satellites from a single location with high signal quality and low error rate. They then developed a general GEO traffic parser with which they were able to decode IP packets from multiple different protocol stacks. This was what led to the discovery of unencrypted voice and SMS communication in the transmissions.
The discoveries underline how many users, both ordinary individuals and high-level corporate and military personnel, expect privacy where in fact no privacy exists. The researchers have made it clear that if threat actors intended to, it would take a relatively small investment of only a few hundred dollars to intercept massive quantities of unencrypted private data. The researchers called on network providers to deliver more protective mechanisms, and at least one, T-Mobile, claims to have implemented nationwide SIP encryption for all customers to improve security. We can hope that other providers using GEO networks may follow suit in the future. The researchers will be presenting their paper this week at the Annual Computer Security Applications Conference, where we may receive further information on the issue.