Navy Uncovers Concealed Starlink Dish on US Warship Following Detection of Wi-Fi Network Labeled “STINKY”

Navy Uncovers Concealed Starlink Dish on US Warship Following Detection of Wi-Fi Network Labeled "STINKY"

Navy Uncovers Concealed Starlink Dish on US Warship Following Detection of Wi-Fi Network Labeled “STINKY”


### The Unauthorized Starlink Setup on the USS Manchester: A Cautionary Narrative of Government IT Blunders

In the realm of government IT, stringent regulations and security measures are standard practice. These guidelines aim to safeguard sensitive data and ensure operational integrity, particularly in high-stakes settings like military ships. However, the quest for convenience can sometimes spur individuals to act independently, leading to disastrous outcomes. This was evident aboard the USS *Manchester*, a littoral combat ship, where a group of senior enlisted crew members covertly installed a Starlink satellite terminal to circumvent the Navy’s restrictions on internet access.

#### The Incident: A Covert Starlink Installation

In early 2023, as the USS *Manchester* readied for deployment, Command Senior Chief Grisel Marrero orchestrated a secretive operation to install a Starlink terminal aboard the vessel. The rationale behind this unauthorized initiative was straightforward: the crew sought dependable internet service while at sea, something the Navy’s current systems failed to deliver. The Starlink terminal, acquired for $2,800, was quietly fastened to the ship’s O-5 level weatherdeck during a “blanket” aloft period—when responsibilities are not logged, facilitating the concealment of the installation.

The network established by this setup was humorously dubbed “STINKY,” reserved exclusively for the ship’s chiefs, excluding officers and most enlisted members. Nevertheless, the covert nature of the operation was jeopardized when the chiefs started adding more equipment to enhance Wi-Fi coverage throughout the ship. This included the purchase of signal repeaters and cables during a stop in Pearl Harbor, which inevitably aroused suspicion among the crew.

#### The Fallout: Discovery and Repercussions

As sailors began to come across the “STINKY” network, inquiries began to arise. Marrero, the architect of the operation, denied any awareness of the network when confronted, going so far as to rename it to something resembling a wireless printer—an effort to further obscure its existence. She also eliminated questions regarding the network from the commanding officer’s suggestion box to evade detection.

Despite these attempts, the unauthorized Starlink terminal was ultimately uncovered by a civilian employee from the Naval Information Warfare Center. This worker was installing a legitimate SpaceX “Starshield” device when they inadvertently found the concealed Starlink terminal. Marrero’s subsequent efforts to mask the unauthorized usage by submitting poorly altered usage reports only bolstered the evidence against her.

The Navy initiated a comprehensive investigation into the incident, resulting in administrative non-judicial punishment for all chiefs implicated in the initiative. Marrero, who was relieved of her duties, was subjected to a court-martial and entered a guilty plea in the spring of 2024.

#### Lessons Learned: The Dangers of Unauthorized IT Solutions

The incident aboard the USS *Manchester* serves as a stark warning about the perils of sidestepping established IT protocols, particularly in settings where security is crucial. While the craving for internet access is understandable, the hazards associated with unauthorized installations—spanning cybersecurity risks to the possibility of espionage—significantly overshadow any advantages.

This episode also emphasizes the necessity of following appropriate channels when seeking IT solutions within government and military environments. Unauthorized implementations, regardless of intent, can lead to dire consequences, including disciplinary measures, loss of position, and even legal repercussions.

In summary, the narrative of the USS *Manchester* and its undercover Starlink installation is a cautionary tale for government workers and military personnel alike. It highlights the fundamental importance of adhering to established protocols and the potential repercussions of taking IT matters into one’s own hands. Whether working from an embassy restroom or the deck of a naval ship, it is vital to reconsider before evading security protocols in search of convenience.