Starlink Is Now a Weapon of War: Iran Jammed It Nationwide, Ukraine Used It to Stop Russian Strikes — What Developers Need to Know
Quick summary
In January 2026, Iran deployed military-grade electronic warfare to jam Starlink across the entire country. In February 2026, Ukraine weaponised Starlink to cut off Russian frontline communications and halt strikes. Satellite internet is no longer civilian infrastructure.
Starlink launched in 2019 as a consumer internet product for rural areas with poor broadband access. By 2026 it has become something very different: a dual-use military-civilian communications layer that Iran has jammed nationwide with military-grade electronic warfare, that Ukraine has weaponised to cut off Russian frontline coordination, and that the US military is using as the basis for a classified satellite internet network called MILNET.
If you are building any application that depends on satellite internet connectivity, or if you are serving users in conflict zones, or if you simply want to understand the infrastructure risks of the next decade of internet development, the Starlink story in early 2026 is required reading.
January 2026: Iran Jams Starlink Nationwide
In January 2026, simultaneous with protests and political unrest, Iran deployed what digital rights researchers described as an unprecedented event: a nationwide jamming operation that combined Iran's domestic internet kill switch (the National Information Network) with military-grade electronic warfare systems specifically targeting Starlink terminals.
Iranian military jammers were deployed across the country targeting the Ku-band frequencies used by Starlink ground terminals. The effect: Starlink signal was "largely disrupted" nationwide. One Iranian digital rights expert with 20 years of monitoring Iranian internet access stated: "I have never seen such a thing in my life" — indicating the scale and sophistication of what Iran achieved exceeded everything previously documented.
Why this is technically significant:
Jamming satellite internet is not trivial. Starlink uses phased-array antennas that can dynamically steer beams and shift frequencies to resist interference. SpaceX has hardened Starlink's jamming resistance over multiple generations specifically because of military use cases. Iran succeeding in "largely disrupting" the signal nationwide demonstrates that:
- Dedicated military jamming resources can overcome Starlink's commercial jamming resistance at scale
- Nation-states have prioritised investment in counter-Starlink capabilities faster than public reporting had suggested
- Starlink is not a reliable backup communications channel in countries with advanced electronic warfare capability
The January 2026 jamming is the most sophisticated documented state-level interference with a commercial satellite internet system. Previously, Russia had attempted Starlink jamming in Ukraine with limited success against the consumer-grade system. Iran's achievement represents a step change.
February 2026: Ukraine Weaponises Starlink to Stop Russian Strikes
One month after Iran jammed Starlink, Ukraine demonstrated the flip side: using Starlink as an offensive tool. In February 2026, Starlink in Ukraine was reconfigured to restrict service to registered users only — effectively cutting off Russian military units that had been relying on commercial Starlink terminals for frontline communications.
The result was documented and significant: planned Russian strikes against Ukraine were halted. Russian troops on the frontline lost their primary communications infrastructure. The disruption created a crisis in Russian military coordination described by Ukrainian military sources as one of the most effective non-kinetic operations of the conflict.
This is the first documented case of satellite internet access being weaponised to directly halt offensive military operations — not by disrupting the satellite network, but by restricting access at the account level to cut off an adversary that had been exploiting the commercial system.
The dual-use problem it reveals:
The situation exposed a fundamental ambiguity that civilian satellite internet operators now face. SpaceX's Starlink Terms of Service prohibit use "for purposes that facilitate armed conflict." Russia was violating those terms. Ukraine was SpaceX's ally. SpaceX restricted Russian access.
But the precedent is troubling for any developer building on satellite internet infrastructure: access can be terminated, throttled, or restricted by the operator for geopolitical reasons — with little notice and regardless of whether the restricted party is a civilian user or a bad actor. Starlink is not neutral infrastructure. It is subject to the geopolitical alignment of the company that operates it.
The Viasat Baseline: What Military-Grade Attacks on Satellite Internet Look Like
To understand the trajectory, it helps to look at what Russia did to Viasat in 2022. On February 23, 2022 — one day before the invasion of Ukraine — Russian attackers deployed malware called AcidRain against Viasat's KA-SAT network.
The attack rendered 40,000 to 45,000 satellite modems inoperable — not temporarily; the firmware was overwritten with malicious code that bricked the devices. The disruption affected not just Ukrainian users but also wind farms in Germany and emergency services in France whose satellite connections ran through the same network.
The scale (tens of thousands of devices bricked in hours) and the collateral damage (European infrastructure) established what a sophisticated state-level attack on satellite internet infrastructure looks like. It is not a denial-of-service attack that recovers when traffic stops. It is permanent physical destruction of endpoint hardware, requiring physical replacement of devices.
In 2024-2025, Viasat disclosed that China-backed Salt Typhoon had breached its systems in a broad espionage campaign targeting US telecommunications infrastructure. Salt Typhoon was the same APT group responsible for breaching AT&T, Verizon, T-Mobile, and other US telecoms. Viasat confirmed the breach was part of the same campaign.
The progression from Russia bricking 45,000 modems in 2022 to China establishing persistent espionage access in 2024-2025 to Iran jamming Starlink nationwide in 2026 represents a clear escalation: satellite internet is being treated by state actors as a legitimate military target.
MILNET: The US Military's Response
The US government has not been passive. US Space Force, working with SpaceX and overseen by the National Reconnaissance Office (NRO), has developed a classified military satellite communications network internally referred to as MILNET.
MILNET uses Low-Earth Orbit satellites equipped with Optical Inter-Satellite Links (OISL) — laser-based communication links between satellites that operate outside the radio frequency spectrum that conventional jammers target. Laser communications between satellites are significantly harder to jam than RF ground links, because the beam is narrow and directional.
China is developing competing laser communications satellite technology. The intersection of military satellite networks with commercial LEO constellations is the next major contested space in literal and figurative terms.
For civilian developers and commercial infrastructure operators, MILNET matters because: SpaceX is simultaneously operating the world's largest commercial satellite internet network and building classified military communications infrastructure for the US government. These are not separate companies. They share orbital infrastructure, ground stations, and organisational resources. The distinction between Starlink (commercial) and MILNET (military) is corporate, not physical.
What This Means for Infrastructure Depending on Satellite Internet
Reliability in conflict zones is zero:
If your application or infrastructure depends on Starlink connectivity in or near a conflict zone, you now have documented evidence that military jamming can disrupt or eliminate that connectivity with no warning. This was theoretical before January 2026. It is now confirmed.
Account-level termination is possible:
Ukraine/Russia demonstrated that access can be cut at the account level based on geopolitical decisions by SpaceX. If your infrastructure uses Starlink in a region where the geopolitical alignment of SpaceX and the local government are misaligned, your access could be restricted.
Alternative constellations have the same problem:
OneWeb (backed by the UK government and Bharti Airtel), Amazon Kuiper (Amazon, US company), and China's Guowang constellation are all government-aligned. There is no politically neutral LEO satellite internet provider. Whoever owns your satellite connectivity has a geopolitical position.
Ground station concentration:
Starlink's ground infrastructure — the gateway stations that connect the satellite network to terrestrial internet — is concentrated in politically stable regions. In conflict zones, the ground station infrastructure is itself a target. Losing ground station access degrades or eliminates service even if satellites are operational.
Frequency band vulnerabilities:
Starlink uses Ku-band (12-18 GHz) for consumer terminals and Ka-band (26.5-40 GHz) for higher-throughput links. Both bands are subject to jamming by sufficiently powerful and technically sophisticated actors. The laser inter-satellite links that MILNET is developing would be more resistant, but those are military, not commercial.
For Developers: The Practical Risk Assessment
Satellite internet connectivity should be evaluated using a different risk framework than fibre or terrestrial wireless. Specifically:
Do not use Starlink as a sole connectivity dependency for production systems in:
- Any country where the government has advanced electronic warfare capability (Russia, China, Iran, North Korea — and increasingly any NATO ally in a conflict-adjacent situation)
- Any region where the geopolitical relationship between the operator country (US) and the host country is adversarial
Do use satellite internet for:
- Last-mile connectivity where no terrestrial alternative exists, with explicit understanding of the reliability constraints
- Disaster recovery scenarios in conflict-free regions
- Remote operations where some connectivity degradation is acceptable
Multi-layer connectivity architecture:
The organisations that maintained connectivity during Iran's January 2026 blackout were not using a single connectivity provider. They used layered connectivity: terrestrial fibre (primary), 4G/5G cellular (secondary), and satellite (tertiary). When one layer failed, others maintained service. Single-provider satellite connectivity is a single point of failure that geopolitical events can activate.
---
Starlink in 2019 was a civilian internet service. Starlink in 2026 is contested infrastructure at the intersection of commercial technology, military communications, and active geopolitical conflict. The transition happened faster than most infrastructure architects planned for. If your systems depend on satellite connectivity — directly or as a backup — the events of January and February 2026 should be a forcing function for a serious architecture review.
More on Security
All posts →Iran, Israel, USA and Tech in 2026: The Complete Developer Guide to Geopolitical Conflict and Its Impact on Global Infrastructure
Everything developers and tech professionals need to know about the Iran-Israel-USA conflict in 2026 — cyberattacks, internet blackouts, AI in warfare, GPS jamming, sanctions, the splinternet, and what it means for global infrastructure. All 11 deep-dives in one place.
Iranian Developers Are Losing Access to GitHub, npm, and the Cloud — What US Sanctions Actually Block
As USA-Iran conflict escalates in 2026, Iranian developers are losing access to GitHub, npm, VS Code, cloud platforms, and payment systems. What is blocked, who is affected, and what the open source world is doing about it.
DOGE Got Inside America's Most Critical Databases — The Technical Reality Is Worse Than the Headlines
DOGE transferred a live copy of the entire US Social Security database to an unsecured cloud server, accessed Treasury payment systems, and disabled security tracking at the NLRB. Here is what actually happened technically and what it means for everyone who builds systems.
The Global Undersea Cable Attack Map: Baltic Sea Sabotage, Taiwan Blackout Risk, and Why 10 Cables Have Been Cut in 2 Years
Ten undersea cables cut in the Baltic Sea since 2022. Five incidents near Taiwan in 2024-2025. A Taiwan cable blackout would cost $55 million per day. NATO Baltic Sentry operation has launched. Here is the complete picture of undersea cable attacks beyond the Middle East in 2026.
Free Tool
Will AI replace your job?
4 questions. Get a personalised developer risk score based on your stack, role, and what you actually build day to day.
Check Your AI Risk Score →Written by
Abhishek Gautam
Full Stack Developer & Software Engineer based in Delhi, India. Building web applications and SaaS products with React, Next.js, Node.js, and TypeScript. 8+ projects deployed across 7+ countries.
Free Weekly Briefing
The AI & Dev Briefing
One honest email a week — what actually matters in AI and software engineering. No noise, no sponsored content. Read by developers across 30+ countries.
No spam. Unsubscribe anytime.