Security

Securing the Earth-to-Orbit AI Data Pipeline

Orbital compute introduces attack surfaces that terrestrial security models don't account for. Here's what breaks and how to think about fixing it.

Companies like Lumen Orbit, Axiom Space, and multiple defense contractors are building compute infrastructure in orbit. Orbital data centers promise lower cooling costs, access to solar power, and physical isolation from terrestrial threats. But moving AI training data and model weights between Earth and orbit creates security challenges that most teams haven't thought through.

This post covers the specific attack surfaces, quantifies the risks where possible, and argues that end-to-end encryption is the minimum viable security posture for any earth-to-orbit data pipeline.

Attack Surface 1: RF Link Interception

All earth-to-orbit communication travels via radio frequency. Unlike fiber optic cables, RF signals propagate in all directions. Anyone with a sufficiently sensitive receiver and line-of-sight to the satellite can capture the signal.

In LEO, a satellite at 550 km altitude has a ground footprint roughly 2,500 km in diameter during a pass. Every ground station, amateur radio operator, and signals intelligence facility within that footprint can potentially receive the downlink.

The practical barrier is link budget: commercial Ka-band downlinks at 26.5–40 GHz use directional antennas that concentrate the signal toward the intended ground station. But sidelobes exist, and a state-level adversary with a 3–5 meter dish can intercept commercial LEO downlinks from within the footprint. The U.S. National Reconnaissance Office demonstrated this capability decades ago for intelligence satellites; the physics applies equally to commercial data links.

Without encryption, intercepted data is plaintext. Training datasets, model weights, inference results — all readable by anyone who captures the RF signal.

Attack Surface 2: Ground Stations

Ground stations are the physical bridge between terrestrial networks and orbital assets. They concentrate risk in ways that are easy to underestimate:

  • Shared infrastructure: Most operators use ground-station-as-a-service providers (AWS Ground Station, KSAT, SSC). Your data transits equipment shared with other customers.
  • Physical access: Ground stations in remote locations (Svalbard, Antarctica, desert sites) may have limited physical security staff. A compromised antenna feed or network switch exposes all traffic.
  • Network egress: After demodulation, data typically enters terrestrial internet for the final hop to the customer. That network segment uses standard internet routing with all its associated vulnerabilities.

AWS Ground Station, for example, delivers data into your VPC via an EC2 instance. The data is decrypted at the ground station before entering AWS infrastructure. If the link-layer encryption terminates at the ground station, the operator of that ground station has access to plaintext data.

Attack Surface 3: Satellite Handoffs

LEO satellites in a sun-synchronous orbit at 550 km have a pass duration of roughly 7–10 minutes over a given ground station. For transfers larger than what fits in a single pass, data must be queued and resumed across multiple passes — or handed off between satellites via inter-satellite links (ISLs).

Each handoff is a security boundary crossing. ISLs between satellites use optical or Ka-band links that must be authenticated and encrypted independently. A spoofed satellite that inserts itself into the ISL chain could perform a man-in-the-middle attack on the entire data pipeline.

Starlink's constellation uses laser ISLs, but the authentication protocols are proprietary and unaudited. For anyone building on third-party constellation infrastructure, the ISL security posture is a black box.

Attack Surface 4: Radiation-Induced Bit Flips

LEO environments experience roughly 100x the radiation flux of Earth's surface. Single-event upsets (SEUs) — bit flips caused by high-energy particles striking memory cells — occur at measurable rates in orbital hardware.

For standard compute, ECC memory corrects single-bit errors and detects double-bit errors. But AI model weights are particularly sensitive to bit-level corruption: a single flipped bit in a weight tensor can cause catastrophic inference failures, and unlike random data corruption, the failure may not be immediately obvious. A subtly corrupted model produces subtly wrong results.

This matters for transfer security because integrity verification must be end-to-end. Checking a hash at the ground station doesn't help if the corruption occurred after the data left the ground station and before it reached orbital storage. Hash verification must happen at both endpoints, not just the relay points.

The Integrity Problem

In terrestrial transfers, bit errors are rare enough to ignore. In orbital environments, they're expected. Transfer protocols must include per-block integrity checks that survive radiation events, not just network errors.

Attack Surface 5: Physical Security of Space Assets

Terrestrial data centers can be physically secured with fences, guards, and access controls. Orbital assets cannot. Once a satellite is in orbit, physical access is effectively impossible for the operator — but not necessarily for an adversary.

Co-orbital inspection and proximity operations (RPO) are well-documented. Russia's Luch/Olymp satellite has maneuvered within kilometers of Western communication satellites. China has demonstrated robotic arm capture of debris (and potentially other satellites). While physical tampering with a satellite is not trivial, RF eavesdropping from a co-orbital asset at close range is significantly easier than from the ground.

The implication: you cannot rely on physical security for orbital data. Encryption is not optional. It's the only security control that works when the physical perimeter does not exist.

E2E Encryption as Minimum Viable Security

The consistent lesson across all five attack surfaces is the same: if encryption terminates at any intermediate point (ground station, relay satellite, network edge), that point becomes a single point of compromise.

End-to-end encryption means the data is encrypted at the source (your terrestrial machine) and decrypted only at the destination (the orbital compute node, or vice versa). Every intermediate link — ground station uplink, ISL relay, terrestrial backhaul — sees only ciphertext.

  • RF interception yields ciphertext — useless without keys
  • Compromised ground stations see ciphertext — no plaintext exposure
  • Spoofed ISL nodes see ciphertext — MITM yields nothing readable
  • Integrity checks at both endpoints detect radiation-induced corruption
  • Co-orbital eavesdropping captures ciphertext — same result

Key Exchange Over High-Latency Links

LEO round-trip latency is 4–20 ms depending on orbit altitude and path. That's manageable for standard TLS handshakes. But GEO links at 600+ ms RTT, or deep-space links measured in seconds to minutes, stress conventional key exchange protocols.

The bandwidth-delay product of a 1 Gbps GEO link is approximately 75 MB. A TLS 1.3 handshake requires 1 RTT (0-RTT with resumption), but post-quantum key exchange algorithms like ML-KEM-768 add kilobytes to the handshake. On a bandwidth-constrained link, key exchange overhead matters.

Practical approaches include pre-provisioned session keys (uploaded before deployment), key hierarchy schemes where a master key is exchanged infrequently and session keys are derived locally, and hybrid classical/post-quantum schemes that provide defense-in-depth without doubling handshake latency.

What This Means for AI Data Center Operators

If you're planning to use orbital or terrestrial AI data center infrastructure, the security posture of your data pipeline matters more than the security of any individual component. A hardened satellite with an unencrypted ground station link is a hardened satellite with an open front door.

The minimum viable security architecture for earth-to-orbit AI data movement is: E2E encryption from source to destination, per-block integrity verification, authenticated key exchange that tolerates the latency profile of your specific link, and transfer protocols that resume correctly after pass interruptions without re-exposing previously verified data.


Further Reading

E2E Encryption, No Relay Servers

Handrive transfers data directly between endpoints with end-to-end encryption. No ground station plaintext exposure. No intermediate servers.

Download Handrive