Hacking the Invisible Network