3/ Satellite phones tend to send signals out in all directions.
Making them easy targets.
The technology for locating & intercepting them is well-honed.
This is different from starlink...
4/ In more recent years, other kids of tech has entered the conflict-zone game. Like VSATs.
In Syria, Libya, etc etc. VSATs have played a pivotal role in communications. Everyone uses them.
They have a more *directional* signal & typically provide broadband data.
5/ Still, here are various ways to spot, geolocate, & drop a missile on VSAT satellite internet terminals...
...and #Russia has recent battle-tested experience doing just this in Syria, where ISIS, FSA and everyone else has used them.
Pic: random .ru airstrike.
6/In Syria, ISIS reportedly came up w/ various tactics to avoid being killed by strikes against their satellite internet terminals.
E.g. Distancing dishes from their installations, covertly taking a connection from civilian internet cafes' VSATs, etc..
Deadly cat & mouse.
7/ Takeaway: early in a conflict w/disrupted internet, satellite internet feels like a savior.
But it quickly introduces *very real, deadly new vulnerabilities*
If you don't understand them, people die needlessly until they learn & adapt.
This has happened again. And again.
8/ I've skipped some tech like BGANs, but why should you take anything I say seriously?
Well: I've researched the role & risks of internet & satellite communications during armed conflicts...for a decade.
I'm writing this thread because I see a familiar mistake looming. Again.
9/ Want to read more about connectivity risks in armed conflict?
I wrote this case study to persuade policymakers & militaries to not encourage brave people to paint targets on their backs without knowing the risks.
LINK: digital-commons.usnwc.edu/cgi/viewconten…
10/ A well-resourced military tracks a massive variety of radio emissions during a war.
Even if capabilities are not initially specced out for a novel new communications protocol, if the transmission is interesting enough / the users worth killing, it will be worked on...
11/ People asking about tracking cellphones.
Cellphones are a giant-blinking-risk in a conflict zone. They emit a powerful signal that spills in every direction.
Most countries' militaries have suites of capabilities for them, from things in the air...to things in backpacks.
12/ Every tech should be considered & evaluated.
But if well-meaning people rush an untested-in-war new tech into an active conflict zone like #Ukraine & promote it as "safer"...
They may get people killed.
Russia has big electronic ears.
13/ Remember: encryption doesn't prevent GEOLOCATION based on radio emissions.
A smartphone or satcom user can be on encrypted call, using a VPN, etc. etc. correctly believing that nobody is LISTENING to them... right up until the instant they are nabbed.
UPDATE: @Plaid for AI happened faster than I warned.
We are in a historic transformation around AI agents.
Disruption will extend to the core of your privacy.
Companies know the appeal of agentic AI & are working to lock consumers into ecosystems designed to maximize data extraction.
It's not too late, but it might be soon.
But the thing about transformative moments is that new possibilities often open simultaneously with the risks.
We need to build, experiment with & use good private + open AI tools, local models that respect privacy by default & confidential inference that prevents companies from mining the data they process.
Do that & give us a fighting chance for future that respects our freedom, and our boundaries.
Sleep on the challenge of building openly & we relinquish the playing field to the same companies and dynamics that already degrade our autonomy...only faster & everywhere.
2/ What's the deal with @Plaid?
I find people are dimly aware about something involving connecting banking accounts.
I bet you don't know that Plaid helps themselves to mountains of your financial data in exchange for the convenience.
3/ Basically, by providing 'rails' @Plaid has managed to get an absolutely gods-eye-view on peoples financial behavior.
In real time.
That data is available to other companies. And governments.
YIKES: @perplexity_ai is flexing that they have OS-level access to 100M+ Samsung S26s.
Zero mention of:
Privacy
Security
Encryption
What will Perplexity do with this growing stash of personal data from deep inside Samsung phones? What jurisdictions will it live in? Who will it get shared with?
Here's the thing: Android's current security & privacy model involves sandboxing 3rd party apps from each other. TikTok can't read your private notes, for example.
Sandboxing is good & it narrows the attack surface against your private stuff.
But this #Perplexity integration breaks that baseline sandbox model, making a kernel-adjacent data bridge for Perplexity into your personal stuff.
Will users understand the structural shift in privacy?
Meanwhile, the risk of prompt injection & other attacks against an agentic AI that has OS-level access to personal stuff is also real.
Lots of speed, no signs of caution.
2/ Multiple agents & flows each with their own distinct security & privacy issues and levels of OS-level access to private stuff.
I doubt users have the cognitive spare room to parse privacy & security downsides each time they want to ask a question.
NEW: When Kenyan cops arrested activist & presidential candidate @bonifacemwangi they took his devices.
When he got his personal phone back, the password was gone.
We @citizenlab found they'd abused @cellebrite to break into it.
Here's why this abuse matters 1/
2/ Your phone holds the keys to your life, and governments shouldn’t be able to help themselves to the contents just because they don’t like what you are saying.
But everywhere you look, cops are getting phone cracking technology from companies like @cellebrite.
Many abuse it.
3/ @Cellebrite's abuse potential is clear.
Now, Cellebrite says that they have a human rights committee & do due diligence...
Because even Cellebrite knows that if you sell phone cracking tech to security services with bad oversight, you have a problem.
So why are there so many sales to questionable security services?