‘They just really didn’t think anyone would look up’: Researchers snooped on unencrypted satellite data with basic equipment, finding private calls, text messages, and even military communications

‘They just really didn’t think anyone would look up’: Researchers snooped on unencrypted satellite data with basic equipment, finding private calls, text messages, and even military communications

15 October, 2025: T-Mobile has been in touch to provide some extra information about the encryption the researchers discovered it was using after being informed of the breach. The information is as follows:

‘This was a misconfiguration with a vendor who currently manages less than 50 backhaul cell sites… T-Mobile immediately addressed a vendor’s technical misconfiguration that affected a limited number of cell sites using geosynchronous satellite backhaul in remote, low-population areas, as identified in this research from 2024. This was not network-wide, is unrelated to our T-Satellite direct-to-cell offering, and we implemented nationwide Session Initiation Protocol (SIP) encryption for all customers to further protect signaling traffic as it travels between mobile handsets and the network core, including call set up, numbers dialed and text message content.’

A team of researchers from UC San Diego and the University of Maryland have published a study [PDF warning] detailing their attempts to pick up unsecured information from the airwaves using a basic receiver system. Over the course of three years, the team pointed their off-the-shelf residential dish at various geostationary satellites and interpreted the data, and were shocked by what they found.

link

Leave a Reply

Your email address will not be published. Required fields are marked *