December 18, 2009:
A big story recently has been the revelation that pro-Iranian terrorists in Iraq were using a $26 program (SkyGrabber) that enables someone with a satellite dish and a laptop to intercept and capture video being sent to the ground. Normally, this is used by people to hijack Internet data being sent down via a satellite link. The idea for adapting this to grabbing Predator video transmissions apparently came from Iran, where satellite dishes are illegal. Iranians have responded by hiding small dishes, and doing whatever they can (often illegally) to obtain satellite based broadcasts. The electronic media in Iran is state controlled and censored by a bunch of Islamic conservative clerics. The Iranian secret police have thus come to learn all about stuff like SkyGrabber, and tipped off their brethren in the Quds organization (which takes care of support for foreign terrorists). U.S. troops discovered the terrorist use of SkyGrabber about a year ago.
As for why the Predator video was liable to this kind of capture. Well, sometimes, you take a chance. And then you get caught. For years, the video from UAV was unencrypted. This was to save communications capacity ("bandwidth"), which was always in short supply. To encrypt the video would require more bandwidth, and specialized equipment on the UAVs and ground receivers. There would also be a slight delay for the guys on the ground using the video. For all these reasons, the video remained unencrypted. This was not a secret, it was known to people in the business. Now everyone knows, and encryption, and all its costs, will be added to UAV video broadcasts.