A U.S. Navy chief who wanted the internet so she and other enlisted officers could scroll social media, check sports scores and watch movies while deployed had an unauthorized Starlink satellite dish installed on a warship and lied to her commanding officer to keep it secret, according to investigators.

Internet access is restricted while a ship is underway to maintain bandwidth for military operations and to protect against cybersecurity threats.

The Navy quietly relieved Grisel Marrero, a command senior chief of the littoral combat ship USS Manchester, in August or September 2023, and released information on parts of the investigation this week.

  • DominusOfMegadeus
    link
    fedilink
    English
    -18 days ago

    I was assuming they had their own hidden network going. I can’t imagine they would be dumb enough to mess with the existing ship network.

    • TimeSquirrel
      link
      fedilink
      128 days ago

      There are regular unprotected Internet channels, and then there are secure networks like SIPRNet. Devices must not arbitrarily cross from one to the other. That’s where a leak can happen. That’s one thing I learned working for a company with an Army contract 20 years ago. Once a device was set up for secure access on the military network, our policy was to never have it touch the civilian Internet again. It had to be 100% verified destroyed at the end of its lifetime. I don’t know details of how they handle it these days with mobile devices everywhere.

      • @[email protected]
        link
        fedilink
        English
        2
        edit-2
        8 days ago

        Doesn’t really change much.

        You NEVER connect to sensitive resources via wifi. Different orgs and levels have different rules about whether a device capable of wifi can even be in the same room, but the key is to not connect it to the secure network. This is commonly referred to as “an airgap”. And if you are wondering how different ships can communicate with each other and The US? Don’t ask questions!

        For less sensitive resources? YOLO that shit. But it is also incredibly trivial to set up a security model where users cannot connect to arbitrary networks.

        So StinkyNet would, presumably, only be usable by personal devices. Which should have absolutely nothing sensitive on them to begin with. And if anything on any of the ship’s sensitive networks was even able to connect to StinkyNet then… the Navy done fucked up.

        Which… might explain the rapid action to punish those who violated policy.

    • @[email protected]
      link
      fedilink
      English
      48 days ago

      I don’t know the exact details of their setup but I would imagine if they have phones on the ship there’s a network they can connect to on the ship that’s not their starlink internet.

      Aside from being able to possibly identify the starlink waveforms with passive RF surveillance or being able to identify the location of the ship through hacking spacex or their satellites, if they went back and forth between being connected on their phones to the ship network and the internet, their phones could have been compromised, leaving the possibility also of them being a perfect pivot point for hackers interested in exfilling important government secrets.

      Overall just very bad opsec for a ship and definitely not a good idea.

      • @[email protected]
        link
        fedilink
        English
        48 days ago

        Important government secrets will be strictly separated from personal/civilian devices. The only classified information being transmitted by personal devices is the location and human knowledge of the owners.

    • @[email protected]
      link
      fedilink
      English
      28 days ago

      It was on its own hidden network, if it was on the existing network it would have been discovered a LOT sooner