Sky Hacking: From Predator Drones to Satellite Internet

Recently, America found out that terrorists backed by Iran have figured out how to intercept predator drone feeds. The problem was that these signals weren’t encrypted. Well according to Leonardo Nve, of the security company S21Sec, predator feeds aren’t the only signals from the sky that are unencrypted.

It just blows my mind that the military would use any unencrypted communications. But that is what they did with the predator UAV. Terrorists were able to receive live feeds from the drones, and it only cost them around $25 to do so.

With around $30 worth of equipment,  Leonardo Nve says that the same thing can be done to many satellite internet services. Digital Video Broadcast (DVB) signals are usually unencrypted and can be exploited. Leonardo says that he has impersonated satellite users, hijacking their sessions and even impersonated web sites by intercepting DNS requests.

“What’s interesting about this is that it’s very, very easy,” says Nve. “Anyone can do it: phishers or Chinese hackers … it’s like a very big Wi-Fi network that’s easy to access.”

This adds a whole new degree of difficulty in tracking back hacking attempts. Read the full story at


5 thoughts on “Sky Hacking: From Predator Drones to Satellite Internet”

  1. i was starting to presume i may possibly be the only human being who thought about this, at the least at present i know i’m not ridiculous 🙂 i will be sure to look into a couple of various blogposts soon after i get a little caffeine in me, adios for now 🙂

    1. Well, like they say, great minds think alike! 🙂

      With the great rush to get everything wired and online, security is really taking a back seat. I can somewhat understand this in the corporate world, everyone wants network access from their smart phones, but the military has no excuse.

      Thanks for visiting!

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.