Securing Embedded Starlink Satcom Terminals for Military Communications

Authors

  • Cattleya Delmaire
  • Settapong Malisuwan
  • Soemsak Yooyen

Keywords:

Embedded system security, Jamming mitigation, LEO satellite communication, Military communications, Starlink

Abstract

The rapid adoption of low earth orbit (LEO) satellite communication systems, particularly Starlink, has revolutionized real-time broadband access in both civilian and military domains. As embedded user terminals become widely deployed in contested environments, ensuring their security has become a critical concern. This paper presents a comprehensive review of the embedded system security architecture of Starlink user terminals, with a focus on military use cases. We examine core security features such as secure boot, encrypted communications, hardware-based identity, zero-trust networking, and frequent firmware updates. Real-world incidents—including successful jamming attempts, modchip-based hardware attacks, and cyber espionage targeting connected devices—highlight both the system’s resilience and its evolving threat landscape. Unique challenges stemming from the dynamic LEO topology, embedded resource constraints, and military operational requirements are analyzed. Furthermore, we explore emerging research directions, including cross-layer security frameworks, post-quantum cryptography, tamper-resistant VLSI design, and AI-driven anomaly detection. By synthesizing technical documentation, academic literature, and field reports, this paper identifies critical vulnerabilities, mitigation strategies, and future pathways for enhancing the security of embedded Satcom terminals in next-generation LEO constellations. The findings aim to guide the development of secure, resilient, and scalable satellite communication systems for defense and high-assurance applications.

References

M. Burgess, “The hacking of Starlink terminals has begun,” Wired, Aug. 10, 2022. Available: https://www.wired.com/story/starlink-internet-dish-hack/

Starlink, “Starlink Welcomes Security Researchers: Bring on the Bugs,” Starlink, 2022. Available: https://api.starlink.com/public files/StarlinkWelcomesSecurityResearchersBringOnTheBugs.pdf

S. Losey, “SpaceX shut down a Russian electromagnetic warfare attack in Ukraine last month—and the Pentagon is taking notes,” Defense News, Apr. 20, 2022. Available: https://www.defensenews.com/air/2022/04/20/spacex-shut-down-a-russian-electromagnetic-warfare-attack-in-ukraine-last-month-and-the-pentagon-is-taking-notes/

Microsoft Threat Intelligence, “Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine | Microsoft Security Blog,” Microsoft Security Blog, Dec. 11, 2024. Available: https://www.microsoft.com/en-us/security/blog/2024/12/11/frequent-freeloader-part-ii-russian-actor-secret-blizzard-using-tools-of-other-groups-to-attack-ukraine/

A. Cornelius, “Unveiling the cyber security of Starlink—virtualetos.com,” virtualetos.com, Jul. 03, 2023. Available: https://virtualetos.com/unveiling-the-network-security-of-starlink/

F. Beltzer (@FBeltzer), “Starlink’s security protocols: A comprehensive overview,” X, Jun. 10, 2025.Available: https://x.com/FBeltzer/status/1901254505238307163

D. Antoniuk, “Uncovering potential vulnerabilities in Starlink: Russian Hackers’ Persistent Attempts,” The Sign, Jun. 13, 2025. Available: https://www.thesign.media/blog/uncovering-potential-vulnerabilities-in-starlink-russian-hackers-persistent-attempts

M. Abdrabou et al., “Advanced security framework for low Earth orbit satellites in space information network,” EURASIP Journal on Wireless Communications and Networking, vol. 2024, no. 1, Nov. 2024, doi: https://doi.org/10.1186/s13638-024-02417-w

N. Abdelsalam, Saif Al‐Kuwari, and Aiman Erbad, “Physical layer security in satellite communication: State‐of‐the‐art and open problems,” IET Communications, vol. 19, no. 1, Jan. 2025, doi: https://doi.org/10.1049/cmu2.12830

W. O’Donnell, “What if Starlink goes dark over Ukraine? —Wes O’Donnell—Medium,” Medium, Mar. 16, 2025. Available: https://wesodonnell.medium.com/what-if-starlink-goes-dark-over-ukraine-4e40b0737c36

C. Ramponi, “Diving into Starlink’s user terminal firmware—Quarkslab’s blog,” Quarkslab.com, 2023. Available: https://blog.quarkslab.com/starlink.html

Published

2025-06-24

Issue

Section

Articles