Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Cohesive Societies
Sustainable Security
Other Resource Pages
News Releases
Speeches
Video/Audio Channel
External Podcasts
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National SecurityInstitute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Cohesive SocietiesSustainable SecurityOther Resource PagesNews ReleasesSpeechesVideo/Audio ChannelExternal Podcasts
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS

      Get in Touch

    Connect
    Search
    • RSIS
    • Publication
    • RSIS Publications
    • CO16032 | The Real Star Wars: Improving Satellite Defences
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • RSIS Commentary Series
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • Future Issues
    • IDSS Papers
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers

    CO16032 | The Real Star Wars: Improving Satellite Defences
    Michael Raska

    11 February 2016

    download pdf

    Synopsis

    Space is becoming increasingly vital to national security with space systems – satellites and spacecraft in orbit, ground stations, and communication systems – vulnerable to a range of cyber threats that may neutralise these assets.

    Commentary

    THE UNITED States, Russia, and China are currently spending billions for improving their satellite defences – primarily by building more capacity into their constellations and improving tracking abilities. In 2014, for example, Lockheed Martin was awarded a US$900 million contract to develop a radar system capable of tracking objects as small as baseballs in space in real time. Going forward, these and other countries will likely explore new ways to equip their satellites with active defences and countermeasures, such as jamming devices and the ability to evade both cyber and kinetic satellite interceptions.

    The accelerating globalisation of space activities has intensified international competition and cooperation in the development of space-based capabilities. The 2011 unclassified version of the US National Security Space Strategy – the first national security space strategy co-signed by the secretary of defence and the director of national intelligence – points to three key trends shaping the current and emerging space environment: “space is becoming increasingly congested, contested, and competitive”.

    Cyber Threats to Satellites

    According to the Union of Concerned Scientists, there are at least 1,300 satellites now orbiting the Earth, with diverse military, civilian and commercial applications. The majority – 549 – are American while Russia has 131, China has 142, and India controls 33 satellites in orbit. Over 60 countries are investing in long-term space programmes.

    In the civilian and commercial domains, nearly every cutting-edge technology adopted has strategic and operational dependencies on undefended satellites. For example, based on UK’s intelligence assessments cited in recent press reports, 67 percent of the country’s economy is dependent in some way on space-based communications. Another report produced for the US Department of Homeland Security in 2015 estimates that at least $1.6trillion of business revenues in the U.S. were “heavily influenced” by satellites.

    In 2014, a number of think-tanks, including the Council on Foreign Relations and the Chatham House, warned of diverse cyber threats to space systems. These may include using backdoors in software that would enable an undetected remote access, the prevalence of unsecured software, non-protected protocols, and the use of unencrypted channels. One of their key recommendations was to immediately remove software updates from the public websites of select companies that provide satellite services and equipment, in order to prevent hackers from reverse-engineering the source codes.

    Inherently, a loss of satellite communications would have cascading effects on the entire critical information infrastructure – from logistics land, air, and maritime traffic navigation, banking systems, media, to mobile global communications.

    Military Applications

    In the military domain, virtually every operational mission by advanced militaries relies on select space capabilities to enhance the effectiveness of the force. In the US military, the conceptual foundation is the Joint Publication (JP) 3-14, Space Operations, which details the strategic integration of military activities in the space domain with those in the traditional domains of land, sea, and air.

    The latest version of JP 3-14 (May 2013) addresses the fundamentals of military space operations, the command and control of space forces, the roles and responsibilities of Service components, and the methods of planning for space operations. Specifically, JP 3-14 identifies five major mission areas: space situational awareness; space force enhancement; space support; space control; and space force application.

    China is also substantially investing in advancing its civil and military space platforms and capabilities supported by extensive organizational infrastructure, research and development facilities, and increasingly more capable defense industrial base.

    It is not yet clear whether the PLA has promulgated a formal doctrine solely for military space operations. Rather, PLA writings emphasise a holistic perspective toward space, cyberspace, and the electromagnetic spectrum that must be defended to achieve information dominance (zhi xinxi quan) – the ability to gather, transmit, manage, analyse, and exploit information, and preventing an opponent from doing the same as a key prerequisite for allowing the PLA to seize air and naval superiority.

    To this end, the PLA recognises the importance of controlling space-based information assets as a means of achieving true information dominance, calling it the “new strategic high ground”. Consequently, establishing “zhi tian quan” (space dominance) is an essential component of achieving “information dominance”.

    According to studies by Kevin Pollpeter, China’s space programmes serve two critical missions for the PLA: (1) Force Enhancement to support combat operations and improve the effectiveness of military forces such as ISR, integrated tactical warning and attack assessment, command, control, and communications; navigation and positioning, and environmental monitoring. (2) Counter-Space Missions to protect PLA forces while denying space capabilities to the adversary. To meet the demands, the PLA envisions three main capability requirements for space operations: the ability to enter space, to exploit space, and to control space.

    Strategic Implications

    The strategic significance of space will likely increase as satellite networks provide backdoors into almost every nationally important computer network or infrastructure – civil, commercial, and military. Notwithstanding traditional ballistic missile anti-satellite kills (ASAT), launching a cyber attack on satellites has three key advantages:

    Firstly, attacks do not have to result in an uncontrollable debris cloud in outer space. Secondly, cyber attacks on satellites are also far cheaper for would-be assailants and, if done well, it can be almost anonymous. Thirdly, and perhaps most importantly, cyber attacks on satellites that disrupt or gather intelligence on other countries’ infrastructure without the ability to respond, mitigate the prospects of early warning and deterrence.

    About the Author

    Michael Raska is Assistant Professor at the Institute of Defence and Strategic Studies, a constituent unit of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

    Categories: RSIS Commentary Series / Country and Region Studies / International Politics and Security / East Asia and Asia Pacific / Southeast Asia and ASEAN

    Synopsis

    Space is becoming increasingly vital to national security with space systems – satellites and spacecraft in orbit, ground stations, and communication systems – vulnerable to a range of cyber threats that may neutralise these assets.

    Commentary

    THE UNITED States, Russia, and China are currently spending billions for improving their satellite defences – primarily by building more capacity into their constellations and improving tracking abilities. In 2014, for example, Lockheed Martin was awarded a US$900 million contract to develop a radar system capable of tracking objects as small as baseballs in space in real time. Going forward, these and other countries will likely explore new ways to equip their satellites with active defences and countermeasures, such as jamming devices and the ability to evade both cyber and kinetic satellite interceptions.

    The accelerating globalisation of space activities has intensified international competition and cooperation in the development of space-based capabilities. The 2011 unclassified version of the US National Security Space Strategy – the first national security space strategy co-signed by the secretary of defence and the director of national intelligence – points to three key trends shaping the current and emerging space environment: “space is becoming increasingly congested, contested, and competitive”.

    Cyber Threats to Satellites

    According to the Union of Concerned Scientists, there are at least 1,300 satellites now orbiting the Earth, with diverse military, civilian and commercial applications. The majority – 549 – are American while Russia has 131, China has 142, and India controls 33 satellites in orbit. Over 60 countries are investing in long-term space programmes.

    In the civilian and commercial domains, nearly every cutting-edge technology adopted has strategic and operational dependencies on undefended satellites. For example, based on UK’s intelligence assessments cited in recent press reports, 67 percent of the country’s economy is dependent in some way on space-based communications. Another report produced for the US Department of Homeland Security in 2015 estimates that at least $1.6trillion of business revenues in the U.S. were “heavily influenced” by satellites.

    In 2014, a number of think-tanks, including the Council on Foreign Relations and the Chatham House, warned of diverse cyber threats to space systems. These may include using backdoors in software that would enable an undetected remote access, the prevalence of unsecured software, non-protected protocols, and the use of unencrypted channels. One of their key recommendations was to immediately remove software updates from the public websites of select companies that provide satellite services and equipment, in order to prevent hackers from reverse-engineering the source codes.

    Inherently, a loss of satellite communications would have cascading effects on the entire critical information infrastructure – from logistics land, air, and maritime traffic navigation, banking systems, media, to mobile global communications.

    Military Applications

    In the military domain, virtually every operational mission by advanced militaries relies on select space capabilities to enhance the effectiveness of the force. In the US military, the conceptual foundation is the Joint Publication (JP) 3-14, Space Operations, which details the strategic integration of military activities in the space domain with those in the traditional domains of land, sea, and air.

    The latest version of JP 3-14 (May 2013) addresses the fundamentals of military space operations, the command and control of space forces, the roles and responsibilities of Service components, and the methods of planning for space operations. Specifically, JP 3-14 identifies five major mission areas: space situational awareness; space force enhancement; space support; space control; and space force application.

    China is also substantially investing in advancing its civil and military space platforms and capabilities supported by extensive organizational infrastructure, research and development facilities, and increasingly more capable defense industrial base.

    It is not yet clear whether the PLA has promulgated a formal doctrine solely for military space operations. Rather, PLA writings emphasise a holistic perspective toward space, cyberspace, and the electromagnetic spectrum that must be defended to achieve information dominance (zhi xinxi quan) – the ability to gather, transmit, manage, analyse, and exploit information, and preventing an opponent from doing the same as a key prerequisite for allowing the PLA to seize air and naval superiority.

    To this end, the PLA recognises the importance of controlling space-based information assets as a means of achieving true information dominance, calling it the “new strategic high ground”. Consequently, establishing “zhi tian quan” (space dominance) is an essential component of achieving “information dominance”.

    According to studies by Kevin Pollpeter, China’s space programmes serve two critical missions for the PLA: (1) Force Enhancement to support combat operations and improve the effectiveness of military forces such as ISR, integrated tactical warning and attack assessment, command, control, and communications; navigation and positioning, and environmental monitoring. (2) Counter-Space Missions to protect PLA forces while denying space capabilities to the adversary. To meet the demands, the PLA envisions three main capability requirements for space operations: the ability to enter space, to exploit space, and to control space.

    Strategic Implications

    The strategic significance of space will likely increase as satellite networks provide backdoors into almost every nationally important computer network or infrastructure – civil, commercial, and military. Notwithstanding traditional ballistic missile anti-satellite kills (ASAT), launching a cyber attack on satellites has three key advantages:

    Firstly, attacks do not have to result in an uncontrollable debris cloud in outer space. Secondly, cyber attacks on satellites are also far cheaper for would-be assailants and, if done well, it can be almost anonymous. Thirdly, and perhaps most importantly, cyber attacks on satellites that disrupt or gather intelligence on other countries’ infrastructure without the ability to respond, mitigate the prospects of early warning and deterrence.

    About the Author

    Michael Raska is Assistant Professor at the Institute of Defence and Strategic Studies, a constituent unit of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

    Categories: RSIS Commentary Series / Country and Region Studies / International Politics and Security

    Popular Links

    About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

    Connect with Us

    rsis.ntu
    rsis_ntu
    rsisntu
    rsisvideocast
    school/rsis-ntu
    rsis.sg
    rsissg
    RSIS
    RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    Getting to RSIS

    Nanyang Technological University
    Block S4, Level B3,
    50 Nanyang Avenue,
    Singapore 639798

    Click here for direction to RSIS

    Get in Touch

      Copyright © S. Rajaratnam School of International Studies. All rights reserved.
      Privacy Statement / Terms of Use
      Help us improve

        Rate your experience with this website
        123456
        Not satisfiedVery satisfied
        What did you like?
        0/255 characters
        What can be improved?
        0/255 characters
        Your email
        Please enter a valid email.
        Thank you for your feedback.
        This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
        OK
        Latest Book
        more info