$185 Spy Dish: How Researchers Intercepted Satellite Data
October 14, 2025 | 4:54 PM MST
Researchers from the University of California San Diego and the University of Maryland have conducted a study, presented at the 32nd ACM Conference on Computer and Communications Security in Taipei, examining the interception of unencrypted signals from geosynchronous satellites. Using a $185 satellite dish and a $800 setup over three years, the team intercepted data from a rooftop in La Jolla, accessing 15% of global satellite transponders.
Data Collected
Personal communications: The researchers captured phone numbers and messages from over 2,700 T-Mobile users in nine hours.
Corporate information: Unencrypted emails from Walmart’s Mexican subsidiary and ATM transaction data from Santander Mexico and Banorte were accessed.
Infrastructure details: Work orders from Mexico’s Comisión Federal de Electricidad, including customer names and equipment failure reports, were obtained.
Military communications: U.S. and Mexican military transmissions revealed personnel locations, equipment details, and tracking data for Mil Mi-17 and UH-60 Black Hawk helicopters.
Technical Context
The study notes that many satellite operators do not use encryption due to bandwidth constraints, hardware costs, and operational challenges, particularly in remote areas. The equipment used was commercially available, similar to that used for satellite television reception.
Subsequent Actions
Following the study, the researchers released an open-source tool called “Don’t Look Up.” T-Mobile implemented encryption for its data after notification. Other entities, such as Banorte, stated their infrastructure was secure despite the findings. The researchers informed affected parties, including Mexico’s CERT-MX, with varying responses.
Implications
The study suggests that the intercepted data could be accessed by others with similar equipment. It raises questions about the security of satellite communications, which cover 40% of the Earth’s surface, and the potential for surveillance or tampering. The findings are available for further review.