Back

Israeli Firms Develop Techniques to Identify Starlink Users

Severity: High (Score: 70.5)

Sources: Haaretz, Cybernews, www.thebureauinvestigates.com

Summary

Israeli cyber intelligence firms have created methods to locate and identify users of Starlink, Elon Musk's satellite internet service. An investigation by Haaretz reveals that these firms utilize 'data fusion' techniques to analyze advertising identifiers, smartphone telemetry, and geolocation data. The companies, including Cyprus-based TargetTeam and Tel Aviv-based Rayzone, claim they can monitor nearly 1 million Starlink terminals and have already de-anonymized around 200,000 terminals. This surveillance model allows for tracking internet activity without breaching the Starlink network itself, raising concerns about user privacy. Starlink is particularly valuable in conflict zones and during internet shutdowns, leading to fears that its users may be more vulnerable to surveillance. The investigation highlights a shift in cyber intelligence from traditional spyware tools to mass data analysis techniques. Key Points: • Israeli firms can identify Starlink users through advanced data analysis techniques. • TargetTeam claims to monitor nearly 1 million Starlink terminals globally. • The surveillance methods exploit digital footprints from connected devices.

Key Entities

  • Bangladesh (country)
  • Cameroon (country)
  • India (country)
  • Israel (country)
  • Laos (country)
  • Pegasus (malware)
  • 2G (platform)
  • 3G (platform)
  • Automatic Identification System (platform)
  • SS7 (platform)
  • Starlink (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed