Skip to Content
Computing

Military satellites are still worryingly vulnerable to cyberattack

Photo of a military satellite
Photo of a military satelliteAIR FORCE SPACE COMMAND

A new report says hackers could wreak havoc by interfering with space-based communications and navigation services that NATO armies rely on.

The threats: The study, published by the UK’s Royal Institute of International Affairs, says that military satellites face the threat of hackers using malicious code to jam battlefield communications or disrupt automated missile-defense systems. Attackers can also create fake GPS signals from satellites. Known as “spoofing,” this could be used to surreptitiously redirect everything from planes to ships and ground forces.

Security researchers have already highlighted the vulnerabilities associated with communications satellites. Hacking satellites could be a far more effective way of compromising an enemy than simply blowing them up.

Satellite dependency: During the US-led invasion of Iraq in 2003, just over two thirds of US munitions were guided via “space-based means” says the report—up from just a tenth during the first Gulf War in 1990-’91. This “critical dependency on space” makes cyber vulnerabilities all the more concerning.

Plugging the holes: The think tank has come up with a list of steps NATO countries should take to improve satellite security. These include making sure all ground control systems are properly protected with updated software and access controls, as well as ensuring greater interoperability between different countries’ satellite so that if one group is hacked, troops can rely on other satellites for backup.

Sign up here to our daily newsletter The Download to get your dose of the latest must-read news from the world of emerging tech.

Deep Dive

Computing

The future of open source is still very much in flux

Free and open software have transformed the tech industry. But we still have a lot to work out to make them healthy, equitable enterprises.

The beautiful complexity of the US radio spectrum

The United States Frequency Allocation Chart shows how the nation’s precious radio frequencies are carefully shared.

How ubiquitous keyboard software puts hundreds of millions of Chinese users at risk

Third-party keyboard apps make typing in Chinese more efficient, but they can also be a privacy nightmare.

How culture drives foul play on the internet, and how new “upcode” can protect us

Three new books explore the various scams, frauds, and hacks that plague online life.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.