This blog post was created based on the transcript from episode 254 of the Exploring Information Security podcast. First draft by Gemini; edited by a human.
For decades, the concept of space security was relegated to science fiction or the classified halls of government agencies. Today, however, our entire way of life—from the synchronization of power grids to global financial transactions—is predicated on data traversing the stars.
In a live recording of the Exploring Information Security podcast, I sat down with Tim Fowler, CEO and founder of Ethos Labs LLC, to discuss why space is the ultimate culmination of all security specializations.
The "Veil of Obscurity" is Lifting
Historically, space systems relied on a "veil of obscurity" or technological supremacy for protection. Because it was so difficult and expensive to communicate with an orbiting satellite, security was often deprioritized in favor of pure operations.
Fowler notes that this obscurity is now gone. With the rapid commercialization of space, the technological barriers to entry have plummeted. The focus on security is still well behind and is likely too be a repeat of history where organizations will have to scramble to bolt on security.
Why Terrestrial Life Depends on Space Security
One of the most sobering points of the discussion was the real-world impact of a space-based security event. While many associate GPS only with navigation, it is actually the primary timing source for critical terrestrial infrastructure.
Financial Systems: Stock exchanges rely on GPS timing for transaction synchronization.
Power Grids: America’s "just-in-time" grid uses space-based timing to desynchronize or ramp production.
Pipelines: Crucial infrastructure synchronization is often tethered to orbital data.
A disruption in space doesn't just stay in orbit; it can cause rolling blackouts or freeze ATMs right here on the ground.
The Encryption Gap and Integrity Risks
A persistent challenge in the field is the lack of basic encryption. Fowler reported being surprised if even 50% of current space signals are encrypted, often due to the operational complexities of managing keys in orbit.
Furthermore, encryption only solves for confidentiality, not integrity. Even an encrypted signal can be captured and "replayed" by an attacker, leading a satellite to process potentially malicious commands because it lacks the layers to verify the signal's integrity.
Integrating Security with Development
Fowler argued that the most effective way to secure the "Final Frontier" is by moving security closer to operations.
Security Involved Early: The best model involves physically placing security testers (like penetration testers) directly within development teams.
Offensive Education: Teaching developers how to attack their own software is one of the most effective proactive measures to stop vulnerabilities before they launch.
The Future of Space Security and Ethos Labs
Despite the challenges, the industry is seeing an uptick in security engineering roles. For those looking to get involved, resources like the Aerospace Village and specialized training platforms are becoming more accessible.
Fowler also teased exciting developments for Ethos Labs in early 2026, including:
"Fun Size" Hardware: A new, smaller hardware platform that is easier to manufacture and ship.
On-Demand Classes: For the first time, hardware classes will be available in a guided, drop-shipped on-demand format.
Centralized Repository: A new brand under Ethos Labs aimed at being a one-stop-shop for space security videos, blog posts, and training.
Final Thoughts: AI and the Human in the Loop
Our discussion concluded with AI’s role in space. While AI is excellent for anomaly detection and "busy work" like high-speed sensor analysis, Fowler insists that mission-critical decisions must always have a human in the loop. In space, a misunderstood data point can rapidly escalate into a hostile international incident.
Want to dive deeper? Check out ethoslabs.space for more information on the upcoming hardware kits and space security training.
