Photo via Fast Company
Multiple technology firms have developed software capable of locating and identifying Starlink terminals, according to recently uncovered sales documents. Companies including TechTarget, Rayzone, and Shoghi are marketing these identification services primarily to government clients, though the tools don't directly access SpaceX systems. Instead, they aggregate data from various sources to pinpoint where satellite terminals are operating—a capability that has sparked concerns among federal agencies increasingly dependent on Starlink for communications.
The revelation highlights a double-edged sword for U.S. government operations: while such tracking tools could help authorities monitor criminal activity and terrorism, they simultaneously expose potential vulnerabilities in government networks using the same Starlink infrastructure. The U.S. Space Force Space Systems Command acknowledged the concern in a statement to Fast Company, noting that it "continuously monitor[s] all integrated commercial systems" and works with SpaceX to identify and mitigate risks, though it declined to discuss specific security measures due to operational concerns.
Government adoption of Starlink and its military counterpart, Starshield, has accelerated across multiple agencies including the State Department and Department of Defense. However, the interconnected nature of these systems has proven problematic—a Starlink outage last year simultaneously knocked offline Starshield services and disrupted Navy drone operations. This growing reliance on commercial satellite infrastructure raises questions about whether federal cybersecurity standards adequately account for third-party tracking capabilities that may already exist in the commercial market.
The situation underscores a broader challenge facing Dallas-area defense and technology contractors: as companies and government entities increasingly adopt commercial satellite solutions for operational resilience, they must grapple with surveillance risks that accompany these systems. According to Penn State researcher Sascha Meinrath, the existence of tracking firms is unsurprising but raises critical questions about why Starlink terminals remain vulnerable to misuse despite governments' apparent knowledge of their locations.



