John Scott-Railton Profile picture
Feb 27, 2022 15 tweets 8 min read Read on X
Re: @elonmusk's starlink donation.

Good to see.

But remember: if #Putin controls the air above #Ukraine, users' uplink transmissions become beacons... for airstrikes.

Some background 1/
2/ #Russia has decades of experience hitting people by targeting their satellite communications.

In 1996, Chechen president Dzhokhar Dudayev was careful, but Russian aircraft reportedly found his satphone call & killed him with a missile strike.

rferl.org/a/1067831.html
3/ Satellite phones tend to send signals out in all directions.

Making them easy targets.

The technology for locating & intercepting them is well-honed.

This is different from starlink...
4/ In more recent years, other kids of tech has entered the conflict-zone game. Like VSATs.

In Syria, Libya, etc etc. VSATs have played a pivotal role in communications. Everyone uses them.

They have a more *directional* signal & typically provide broadband data.
5/ Still, here are various ways to spot, geolocate, & drop a missile on VSAT satellite internet terminals...

...and #Russia has recent battle-tested experience doing just this in Syria, where ISIS, FSA and everyone else has used them.

Pic: random .ru airstrike.
6/In Syria, ISIS reportedly came up w/ various tactics to avoid being killed by strikes against their satellite internet terminals.

E.g. Distancing dishes from their installations, covertly taking a connection from civilian internet cafes' VSATs, etc..

Deadly cat & mouse.
7/ Takeaway: early in a conflict w/disrupted internet, satellite internet feels like a savior.

But it quickly introduces *very real, deadly new vulnerabilities*

If you don't understand them, people die needlessly until they learn & adapt.

This has happened again. And again.
8/ I've skipped some tech like BGANs, but why should you take anything I say seriously?

Well: I've researched the role & risks of internet & satellite communications during armed conflicts...for a decade.

I'm writing this thread because I see a familiar mistake looming. Again.
9/ Want to read more about connectivity risks in armed conflict?

I wrote this case study to persuade policymakers & militaries to not encourage brave people to paint targets on their backs without knowing the risks.
LINK: digital-commons.usnwc.edu/cgi/viewconten…
10/ A well-resourced military tracks a massive variety of radio emissions during a war.

Even if capabilities are not initially specced out for a novel new communications protocol, if the transmission is interesting enough / the users worth killing, it will be worked on...
11/ People asking about tracking cellphones.

Cellphones are a giant-blinking-risk in a conflict zone. They emit a powerful signal that spills in every direction.

Most countries' militaries have suites of capabilities for them, from things in the air...to things in backpacks.
12/ Every tech should be considered & evaluated.

But if well-meaning people rush an untested-in-war new tech into an active conflict zone like #Ukraine & promote it as "safer"...

They may get people killed.

Russia has big electronic ears.
13/ Remember: encryption doesn't prevent GEOLOCATION based on radio emissions.

A smartphone or satcom user can be on encrypted call, using a VPN, etc. etc. correctly believing that nobody is LISTENING to them... right up until the instant they are nabbed.
14/ Connectivity in #Ukraine is necessary.

Now that Starlink devices are headed into an active conflict zone, though, *possible* risks are about to get battle tested.

I hope that OPSEC is front of mind as decisions are made about terminal distribution, use & placement,
15/ Speaking of... many correspondents in #Ukraine probably have the usual clutch of satphones & BGANs with them.

Many surely remember the tragic death of Marie Colvin & Rémi Ochlik.

I hope everyone is taking great care.

By @JillianYork & @trevortimm
eff.org/deeplinks/2012…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with John Scott-Railton

John Scott-Railton Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jsrailton

May 6
BREAKING: jury awards massive $167 million in punitive damages against spyware company NSO Group.

Precedent-setting win against the notorious #Pegasus spyware maker.

Congratulations to @WhatsApp on sticking this case through since 2019. Some thoughts 1/
2/ After years of every trick & delay tactic it only took a California jury one days deliberation to the heart of the matter:

NSO makes millions hacking mostly-🇺🇸American tech companies... so that dictators can hack dissidents.

Their conduct deserved to be punished.
3/ NSO Group emerges from the trial severely damaged.

The verdict ($167,256,000 punitive, $440K+ compensatory) is big enough to make your eyes water.

The case is ALSO a huge blow to NSO's secrecy, with their business splashed all over a courtroom.

This will scare customers...
Read 14 tweets
May 1
Friends don't let friends get their eyeballs scanned to buy a coffee.

Sam Altman's Orwellian "Tools for Humanity" says this dystopia machine could help distinguish between #AI agents & humans... or verify at Point of Sale..or..?

Looks to me like a big biometric data grab 1/ Image
2/ Surely they didn't just start with the idea of invasively harvesting eyeball scans...and then look around for potential justifications.

And then add in some AI hype.

Right? Image
3/ Throwback to Tools for Humanity's previous (but non-portable, guys!) eye-scanning thing: WorldCoin.

Remember that? A global biometric data grab rife with documented exploitation in Africa & Latin America.

Still not clear what real value it delivered to the ppl who gave up their biometrics.Image
Image
Image
Read 4 tweets
Apr 28
Fear is dictatorship glue.

You can't imprison everyone with a dissenting thought.

Or inconvenient factual observation.

But fear teaches self censorship. It's a scalable system of control.

The autocrat's challenge is to keep the fear going. 1/ A detention center’s interrogation rooms — Untersuchungshaftanstalt Hohenschönhausen, Vernehmungstrakt (2004) (© Daniel & Geo Fuchs) Image source: https://hyperallergic.com/151019/mundane-horror-in-abandoned-stasi-spaces/
2/ In the 20th century, keeping fear alive required massive human investment.

Informants... archives...exemplary punishments... information control.

Looked like a linear scale.

A post-cold war school of thought said: once everyone is connected, these systems won't work. Hohenschönhausen investigation prison: monitoring room Daniel & Geo Fuchs  Via https://www.ibtimes.co.uk/stasi-secret-rooms-communist-east-germanys-eerie-interrogation-cells-haunted-prisons-1467734
BStU Zentralarchiv Berlin archives (2004) (© Daniel & Geo Fuchs)  URL: https://hyperallergic.com/151019/mundane-horror-in-abandoned-stasi-spaces/
"There are several images of staged Stasi arrests carried out for training purposes. Dissidents, in some case already serving long prison terms, were sometimes made to re-enact their own arrest for the camera.  " Simon Menner BSTU Source: https://www.bbc.com/news/world-europe-23986385
3/ But tech isn't, by nature, a dictatorship antidote.

It can be an expedient.

Just ask China.

In 20 years the CCP empirically developed technologies & private sector partnerships for scaling fear and self censorship to >1.4 billion ppl.

Log scale. A display shows surveillance technology capable of analyzing body motion for specific actions like fighting, theft or fall during Security China 2018 in Beijing, China, Tuesday, Oct. 23, 2018.  Photo/Ng Han Guan
Surveillance cameras are mounted on a post at Tiananmen Square as snow falls in Beijing, China, on Thursday, Feb. 14, 2019. Qilai Shen  https://www.cnbc.com/2021/01/15/huawei-ai-firms-filed-to-patent-tech-that-could-identify-uighurs-report-says.html
Read 6 tweets
Mar 19
🚨NEW REPORT: first forensic confirmation of #Paragon mercenary spyware infections in #Italy...

Known targets: Activists & journalists.

We also found deployments around the world. Including ...Canada?

And a lot more... Thread on our @citizenlab investigation 1/Image
Image
2/ So #Paragon makes zero-click spyware marketed as better than NSO's Pegasus...

Harder to find...

...And more ethical too!

This caught our attention @citizenlab & we were skeptical.

By @iblametom forbes.com/sites/thomasbr…Image
Image
Image
3/ We got a tip about a single bit of #Paragon infrastructure & my brilliant colleague @billmarczak developed a technique to fingerprint some of the mercenary spyware infrastructure (both victim-facing & customer side) globally.

So much for invisibility.

What we found startled us.

citizenlab.ca/2025/03/a-firs…Image
Image
Image
Image
Read 18 tweets
Feb 6
BREAKING: #Paragon reportedly terminates spyware contract with #Italy.

Right on heels of reported targeting of journalist & activists in Italy.

BIG DEAL: puts Italian government in the hot seat, since they denied knowing about it only hours ago.👇
Image
2/ Read this slowly.

The implication is clear: the Italian government was a #Paragon customer & had their contract terminated...

Even as @GiorgiaMeloni's office was issuing denials.

Likely to make the scandal worse.

Exceptional reporting from The Guardian
theguardian.com/technology/202…Image
Image
3/ Big picture:

#Paragon's carefully constructed image of being a clean mercenary spyware company that wasn't susceptible to abuses has been replaced by a more familiar tale of...

Abuses...

And #Italy is now saddled with an unfolding crisis around spyware abuse.
Read 7 tweets
Feb 1
NEW: @WhatsApp says Israeli mercenary spyware company #Paragon targeted scores of users around world.

The infection happened with no interaction. No link to click or attachment to open.

This is called a "zero-click" attack.

WA says targets included journalists & members of civil society.

They dismantled the attack vector & notified users.

Good.

We at @citizenlab shared some info instrumental to their investigation of the vector.

This is a BIG deal. Here's why 1/Image
Image
Image
Image
2/ For a few years the only source of information about #Paragon... has been Paragon.

They marketed themselves as the anti-NSO.

(NSO makes the notorious #Pegasus spyware)

It's easier to frame yourself as virtuous in the spyware game if nobody can look over your shoulder.

By @iblametom
forbes.com/sites/thomasbr…

By @RonanFarrow
newyorker.com/magazine/2022/…Image
Image
Image
Image
3/ Late last year, partly on the strength of their promised virtue #Paragon seemed closer than ever to landing the industrys juiciest of prices.

Market access into the USA.

This is the goal of a lot of spyware companies & their investors...

At the time, there simply were no pesky reports on Paragon that showed anything might be other than rosy.

Story @criticalvas
wired.com/story/ice-para…Image
Read 12 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(