Tech

Are Satellite Communications at Risk? Unencrypted Data Exposes Global Security Flaw

AI-generated, human-reviewed.

Critical satellite communications—between governments, airlines, and individuals—remain widely unencrypted, leaving sensitive data vulnerable to anyone with inexpensive equipment. On This Week in Tech episode 1054, host Leo Laporte and a panel of experts including Jacob Ward, Abrar Al-Heeti, and Harper Reed unpacked a new study showing just how easy it is to eavesdrop on private satellite transmissions, and discussed why persistent security oversights put everyone at risk.

Why Satellite Data Is Still Shockingly Exposed

Millions of people and organizations rely on satellites for internet, telephony, and private communication. But, as researchers from UC San Diego and University of Maryland discovered, much of this information is sent across satellites without basic encryption. Anyone with $750 in hardware (a basic satellite dish and software-defined radio) can intercept critical infrastructure data, government and corporate communications, passenger Wi-Fi traffic, and even personal calls and messages.

On This Week in Tech, Leo Laporte noted this vulnerability isn’t new; similar weaknesses (like the infamous SS7 bug in cellular networks) have been known and mostly ignored in tech circles for decades. Despite repeated warnings, neither satellite providers nor regulatory bodies have made encryption mandatory across the industry.

Understanding the Stakes: Why Fixes Are Slow or Ignored

The panel discussed several reasons why satellite companies aren’t rushing to encrypt communications:

  • Lack of perceived incentive: Jacob Ward explained that companies rarely invest in security unless customer backlash, financial risk, or regulation forces their hand.
  • Government preference for surveillance: There’s a tacit benefit for law enforcement and intelligence agencies if satellite signals remain exposed; it makes bulk data collection easier for authorities.
  • Security Through Obscurity: As Harper Reed noted, many engineers simply assumed that no one would bother pointing antennas at satellites, relying more on the difficulty of interception than on true encryption.

But as inexpensive hardware and open-source tools spread, the barrier to snooping is rapidly dropping, transforming what was once theoretical into an immediate, practical risk.

Encryption: Global Pressure Points and the Ongoing Battle

Strong encryption is the main solution to these vulnerabilities. But, as the panel discussed, governments in the US, UK, and beyond continue to pressure companies and standards bodies to include weaknesses, or even ban end-to-end encrypted messaging entirely.

Harper Reed and Leo Laporte highlighted real-world cases where agencies have previously demanded weakened standards (such as intentionally compromised random number generators or shortened key lengths), often justified as a means of public safety. Yet, security experts and privacy advocates warn that backdoors weaken trust and expose everyone—including companies, governments, and individuals—to significant danger.

As discussed on This Week in Tech, modern tools like Apple’s Advanced Data Protection and Google’s Enhanced Safe Browsing offer real end-to-end encryption, but their rollout is threatened by political pressure and uneven regulations worldwide.

What This Means for Digital Privacy and Safety

  • Nation-state threats: Sophisticated cyber attackers, including foreign governments, can exploit these weaknesses to conduct espionage, interfere with operations, or blackmail organizations.
  • Personal risks: Everyday users—air travelers, remote workers, and businesses—risk having their calls, emails, and data packets hijacked without warning.
  • Limited accountability: Without regulation or serious consumer demand, tech providers face little pressure to change until a major breach occurs.
  • A call to action: The consensus among the panel is clear: encryption by default must be the standard and not an afterthought or optional feature.

The View From Orbit

  • Huge swaths of satellite data are still transmitted without encryption as of 2025, exposing critical systems to cheap surveillance tools.
  • Companies haven’t acted because risks are hidden, customers are unaware, and governments benefit from easy data access.
  • Strengthening encryption is essential, but faces ongoing resistance from law enforcement and intelligence agencies.
  • Personal security, including at the corporate and infrastructure level, now depends on end-to-end encryption and user vigilance.
  • Major changes will likely require government regulation, public pressure, or, an unfortunate high-profile attack or breach.

Satellite communications and many other core tech systems remain wide open to eavesdropping and exploitation due to a lack of encryption and industry inertia. Until either governments demand higher standards or the public pushes back, the safest course for individuals and organizations is to use encrypted apps and services (and remain skeptical of technologies that treat privacy as optional).

Don’t miss the full discussion and expert analysis on This Week in Tech episode 1054. For tech decision-makers and anyone concerned with digital privacy, this is a wake-up call as we head toward a more connected—and more vulnerable—future.

Listen and subscribe: https://twit.tv/shows/this-week-in-tech/episodes/1054

All Tech posts