<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:satellite attack &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/satellite-attack/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/satellite-attack/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Mon, 29 Jul 2024 21:05:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:satellite attack &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/satellite-attack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>There Can be No “Enduring Advantage in Space” without Space Superiority</title>
		<link>https://globalsecurityreview.com/there-can-be-no-enduring-advantage-in-space-without-space-superiority/</link>
					<comments>https://globalsecurityreview.com/there-can-be-no-enduring-advantage-in-space-without-space-superiority/#comments</comments>
		
		<dc:creator><![CDATA[Christopher Stone]]></dc:creator>
		<pubDate>Tue, 30 Jul 2024 12:00:49 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Space Deterrence & Conflict]]></category>
		<category><![CDATA[AEI]]></category>
		<category><![CDATA[air base]]></category>
		<category><![CDATA[aircraft]]></category>
		<category><![CDATA[anti-satellite]]></category>
		<category><![CDATA[ASAT]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[GOVSATCOM]]></category>
		<category><![CDATA[great-power war]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russian Space]]></category>
		<category><![CDATA[satellite]]></category>
		<category><![CDATA[satellite attack]]></category>
		<category><![CDATA[Space]]></category>
		<category><![CDATA[space infrastructure]]></category>
		<category><![CDATA[US Space Command]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=28531</guid>

					<description><![CDATA[<p>The American Enterprise Institute’s (AEI) new report, Building an Enduring Advantage in the Third Space Age, is a well-written report, authored by the well-known and respected Todd Harrison. Found in its pages are several assessments and recommendations on areas such as space launch rates and commercial expansion of the overall satellite constellation, as well as [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/there-can-be-no-enduring-advantage-in-space-without-space-superiority/">There Can be No “Enduring Advantage in Space” without Space Superiority</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The American Enterprise Institute’s (AEI) new report, <em>Building an Enduring Advantage in the Third Space Age</em>, is a well-written report, authored by the well-known and respected Todd Harrison. Found in its pages are several assessments and recommendations on areas such as space launch rates and commercial expansion of the overall satellite constellation, as well as many other items. All of these areas are of great importance and magnitude for building the nation’s space infrastructure to further American advantage on earth and in space.</p>
<p>However, one area the report does not cover is how the United States can ensure the advantages created by an expanding critical space infrastructure will remain “enduring” under direct threat of space attack without the weapons systems capable of deterring or defeating such aggression. Without a US Space Force capable of achieving measurable space superiority against a continual growth in Chinese and Russian space attack forces, new technologies and capabilities for terrestrial advantage will create more targets and vulnerabilities.</p>
<p>At present, there is much to do in space to continue to maintain what advantages and leadership the United States has managed to keep in the past twenty years of passivity and talk. At present the Space Force and its combatant command cousin US Space Command, while capable organizations for enabling terrestrial actions and providing situational awareness of space activities, are fully incapable of addressing the threat of armed aggression in and from space. Having an ability to take a hit and not proactively retaliate in and from space creates more, rather than less, vulnerability for exploitation and weakness in times of conflict. Would the nation take this type of approach with other services? Take the Air Force as an example.</p>
<p>Suppose the US was seeking to maintain its airpower advantage through the improvement of fuel efficiency, navigation routes, wing design, air traffic control modernization, and speed and distance characteristics of aircraft. Meanwhile, the enemy is building vast integrated air defense systems of missiles and fighter-interceptors, and long-range bombers, to take out the industrial and operational infrastructure of American civil and military aviation.</p>
<p>While the US has the advantage of outstanding technology in the air, the adversary fielded an ability to deny, degrade, and destroy that advantage in rapid fashion. Instead of building a US Air Force that fights, the nation responds by building an Air Force that can conduct limited electromagnetic jamming, overhead reconnaissance, and movement of equipment.</p>
<p>The Air Force’s position is that the service can take the hits and replace the airplanes in a reasonable time frame. All the while, in a great-power war, airports, air bases, and aircraft that provide an enduring advantage in economic and military support are now smoking debris. Regardless of the advantage airpower provides in this scenario, the United States possesses no means for strategic attack or air superiority.</p>
<p>This is exactly where the nation is with the Space Force. The urgency of the times is having little effect in shaping the actions of planners or political leaders.</p>
<p>At the low end, the Space Force has a very small number of electromagnetic jammers and geolocation systems. While such a small number was good for rotating them over time into a largely uncontested Middle East operating environment in the Global War on Terror, such numbers are wholly inadequate for requirements in the Indo-Pacific theater, much less the entirety of combatant command requirements worldwide.</p>
<p>The United States lacks options that are known to friends, neutrals and enemies alike with a clear declaratory policy highlighting American willingness and ability to project force in and from space to deter or win a conflict in space. Knowing what is happening in space is important, but there is no such thing as deterrence by attribution. Americans knew the Russians were amassing troops outside Ukraine and communicated that publicly, but Putin still invaded. The United States is pushing for norms of behavior and bans on destructive ASAT testing—to mitigate long-lived debris fields—but Russia and China oppose these efforts and continue to test, deploy, and use their space forces on a near daily basis, as former Vice Chief of Space Operations, General David Thompson, noted before his retirement.</p>
<p>The time has come to fix this and to do so publicly and aggressively. Passivity and resiliency alone will not defend America’s critical space infrastructure and the advantage that it provides. Only with a force projection capability that can achieve space superiority in and from space, as the Chinese and Russians both believe is key to deterrence, can the nation achieve credible deterrence in the minds of our adversaries.</p>
<p><em>Christopher Stone is Senior Fellow for Space Deterrence at the National Institute for Deterrence Studies and the former special assistant to the Deputy Assistant Secretary of Defense for Space Policy. The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense or the US Government.</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2024/07/There-Can-be-No-Enduring-Advantage-in-Space-without-Space-Superiority.pdf"><img decoding="async" class="alignnone wp-image-28497 size-medium" src="http://globalsecurityreview.com/wp-content/uploads/2024/07/Download3-300x83.png" alt="" width="300" height="83" srcset="https://globalsecurityreview.com/wp-content/uploads/2024/07/Download3-300x83.png 300w, https://globalsecurityreview.com/wp-content/uploads/2024/07/Download3.png 450w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p><a href="https://globalsecurityreview.com/there-can-be-no-enduring-advantage-in-space-without-space-superiority/">There Can be No “Enduring Advantage in Space” without Space Superiority</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/there-can-be-no-enduring-advantage-in-space-without-space-superiority/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Russia and the Growing Danger of Satellite Cyberattacks</title>
		<link>https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/</link>
		
		<dc:creator><![CDATA[Alexis Schlotterback]]></dc:creator>
		<pubDate>Sun, 19 Nov 2023 12:17:01 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Space Deterrence & Conflict]]></category>
		<category><![CDATA[cyber-attacks]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[satellite attack]]></category>
		<category><![CDATA[spacecraft]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=26327</guid>

					<description><![CDATA[<p>To prove itself a formidable competitor in space, Russia is turning to space warfare. This includes anti-satellite tactics using cyber. Even in terrestrial cyber conflicts, Russia possesses the ability to engage in advanced denial-of-service, ransomware, and other types of malware attacks. While no single agency oversees Russian cyberattacks, the amount of personnel involved in these [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/">Russia and the Growing Danger of Satellite Cyberattacks</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>To prove itself a formidable competitor in space, Russia is turning to space warfare. This includes anti-satellite tactics using cyber. Even in terrestrial cyber conflicts, Russia <a href="https://www.defenseone.com/technology/2021/05/russias-latest-hack-shows-how-useful-criminal-groups-are-kremlin/174401/">possesses the ability</a> to engage in advanced denial-of-service, ransomware, and other types of malware attacks.</p>
<p>While no single agency oversees Russian cyberattacks, the amount of personnel involved in these operations continues to increase. There is a <a href="https://crsreports.congress.gov/product/pdf/IF/IF11718">heavy reliance</a> on criminal and civilian involvement to conduct offensive measures. Combining Russian interest in cyber and outer space has led to the “proliferation of handheld Global Positioning System (GPS) jammers, deployment of road-mobile jammers, and even development and testing of space-based jammers,” as reported on by <a href="https://spacenews.com/op-ed-russian-threats-a-reminder-of-the-need-to-protect-gps/">Sarah Mineiro</a>. She also warns that Russia can hack American ground control systems for the GPS constellation.</p>
<p><strong> </strong><strong>Types of Satellite Cyberattacks</strong></p>
<p>Though electronic means of interfering with satellite signals, such as jamming or spoofing, occur at a more frequent rate, attacks using cyber may prove to be more impactful and frequent in the next decade. Cyberattacks “<a href="https://www.csis.org/analysis/space-threat-assessment-2022">target the data itself and the systems that use, transmit, and control the flow of data</a>,” potentially causing irreparable harm for military commanders and civilians reliant on communications and navigation systems for decision-making.</p>
<p>Like other cyberattacks, those on satellites and their networks require <a href="https://dsiac.org/technical-inquiries/notable/technologies-and-strategies-to-protect-satellites-from-cyber-and-electronic-warfare/">four main components</a>: “access, vulnerability, a malicious payload, and a command-and-control system.” Multiple methods and modes of attack can take out a satellite system or render it inoperable without using kinetic force. <a href="https://www.hdi.global/infocenter/insights/specialty/technical-study/">Adversaries</a> can target the networks that satellites use, individual satellites, and the supply chains that produce satellite hardware and software. <a href="https://www.csis.org/analysis/space-threat-assessment-2022">The Center for Strategic and International Studies</a> describes three main types of cyberattacks: data intercept/monitoring, data corruption, and seizure of control.</p>
<p>First, there is data interception or monitoring, which is often seen as espionage. Adversaries may find spying to be a strategically sound decision to anticipate the next moves of the United States and leverage this knowledge in diplomatic or military channels. Secure World Foundation reports that many attempts of back door installations into American satellite networks were found in “<a href="https://swfound.org/media/206118/swf_global_counterspace_april2018.pdf">Chinese electronics and Russian software packages</a>.”</p>
<p>Additionally, the communications from the ground to a satellite and a satellite to the ground often use “open (unencrypted) telecom network security protocols,” <a href="https://www.hdi.global/infocenter/insights/specialty/technical-study/">Luke Shadbolt</a> warns—making these systems vulnerable.</p>
<p>Second, data corruption, like a denial-of-service (DoS) attack, is accomplished through corrupting satellite data or even ransomware attempts to hold data hostage unless payment is received by the attackers. <a href="https://swfound.org/media/206118/swf_global_counterspace_april2018.pdf">Secure World Foundation</a> describes how a group of university students developed a DoS technique that causes GPS receivers to crash when they try to decode malicious signals. Reports in 1999 surfaced that an unknown actor hacked the United Kingdom’s Skynet satellite, requiring payment to become operational again. Though the British Minister of Defense described the claim as “<a href="https://www.cnet.com/tech/mobile/satellite-hack-raises-security-questions/">impossible</a>”  at the time, more of these instances may occur as computer systems advance and space networks fail to evolve with greater security.</p>
<p>Third, while American policymakers may focus mainly on protecting networks, defending against the seizure of a satellite remains equally important. Such seizures could result in the deliberate destruction of the spacecraft, creating considerable debris that threatens <a href="https://www.chathamhouse.org/publications/the-world-today/2016-02/satellites-floating-targets">other systems on orbit</a>.</p>
<p>Equally likely, a hacker could transfer ownership of a system, so the original user is completely locked out and the capability of a satellite is given to the adversary. <a href="https://swfound.org/media/206118/swf_global_counterspace_april2018.pdf">In 1998</a>, a German-American satellite was hacked and destroyed. Attackers fried the optics by turning the satellite towards the sun. Unfortunately, examples of hacked satellites continue into the twenty-first century. <a href="https://www.defenseone.com/technology/2019/09/nsa-studying-satellite-hacking/160009/">Bill Malik</a> reports that “there are six known examples of hackers successfully interfering with or even commanding unauthorized maneuvers of NASA satellites before 2011.”</p>
<p><strong> </strong><strong>Looking Forward: Addressing Cyber Threats</strong></p>
<p>The US currently invests in multiple avenues to combat the possibility of satellite hacking, a challenge made more difficult by the same factors that affect other industries and targets. For general satellite protection, the Air Force Research Laboratory is beginning its fourth year of sponsoring a satellite hacking challenge to involve researchers across the country. The Hack-A-Sat competition opened for registration in February with this year’s format involving the use of an on-orbit satellite for the first time.</p>
<p>“Space cybersecurity is a global issue, which is why it is so important that Hack-A-Sat is open to the global security research community,” said <a href="https://www.afmc.af.mil/News/Article-Display/Article/3342967/hack-a-sat-competition-highlights-on-orbit-hacking/">Col. Kenny Decker</a>. Across the Atlantic, the European Space Agency sponsors similar competitions with <a href="https://www.cysec.com/hack-cysat-europes-first-satellite-hack/">HackCYSAT</a>.</p>
<p>Recently, the geospatial intelligence company, Orbital Insight, won a Department of Defense contract to identify intentional global navigation system disruptions. Orbital’s platform aims to use artificial intelligence to detect spoofing operations. According to the National Security Agency’s (NSA) <a href="https://www.defenseone.com/technology/2019/09/nsa-studying-satellite-hacking/160009/">Aaron Ferguson</a>, it is a goal of NSA is to develop, “a way to characterize telemetry data so that as we deploy new satellites, we can make adjustments.” Finally, <a href="https://www.hdi.global/infocenter/insights/specialty/technical-study/">HDI Global Specialty</a> argues that “the backbone of a cyber-resilient spacecraft should be a robust Intrusion Detection System (IDS).” Encryption and authentication must become priorities for the US government to implement in satellites and satellite systems.</p>
<p><strong>Conclusion</strong></p>
<p>Russia poses a large security threat to the United States even outside the future possibility of satellite hacking. Russian aggression in Ukraine demonstrated blatant disregard for Western ideals of a rules-based international order. It is no longer possible for policymakers to secure stability and prevent conflict by relying on post–Cold War paradigms.</p>
<p>Previous engagement through international communication channels is unlikely to reduce threats to critical infrastructure. As state-sponsored groups and proxy actors continue to target American assets, it is necessary to prepare for multiple modes of attack, especially in the space and cyber domains. A whole-of-government approach to defend against this new generation of conflict can increase reactivity in the event of an attack and aims to provide a deterrent against the targeting of satellites. As the twenty-first century evolves, implementing these solutions is one of the most important challenges the nation faces.</p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2023/11/Russia-and-the-Growing-Danger-of-Satellite-Cyber-Attacks.pdf"><img decoding="async" class="alignnone wp-image-26183 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2023/11/get-the-full-article.jpg" alt="" width="150" height="43" /></a></p>
<p><a href="https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/">Russia and the Growing Danger of Satellite Cyberattacks</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
