Spy Satellites Just Became Much Smaller

Future spy satellites may unfold like origami birds, collecting image data along long, flat sensor arrays that weigh almost nothing. By replacing the bulky telescopic lenses that make today’s spy satellites among the biggest and most expensive things in space, light-sensitive microchips promise far cheaper access to orbital imagery.

In August, Lockheed Martin released the first images from its experimental Segmented Planar Imaging Detector for Electro-Optical Reconnaissance, or SPIDER, program.

Funded by the Defense Advanced Research Projects Agency, or DARPA, SPIDER is basically a telescope on a microchip. But it collects light data very differently from a conventional telescope.

A regular telescope, of the sort you might find in the Hubble Space Telescope or a Keyhole satellite pointed at North Korea, is fundamentally modeled on a human eye. The eye collects data on light intensity, or sees, by filtering the light through its lens and iris to the retina.

Similarly, conventional telescopes and cameras collect light through lenses and pass it to detectors. In old cameras, that detector was film. In new digital cameras, the detector is a bed of capacitors. The number of photons that hits the detectors over a certain period of time gives you the light intensity. As that intensity varies across the area that you are trying to take a picture of, you see shapes and objects.

To get a decent image with a conventional telescope, your detector needs to be a surface at a reasonable distance from the lens. Shorten the telescope too much and you get images too small to be useful. And everything must be aligned to tiny tolerances. With a space-based telescope, that’s difficult and power-intensive to do.

The SPIDER chip works differently. Instead of measuring light’s intensity, it collects data wavelength and amplitude, since intensity is really just amplitude squared. A computer then calculates what the intensity would be based on the amplitude and phase data. That removes much of the size, power requirements, and complexity of telescopes modeled after eyes.

“You’re measuring a more fundamental characteristic of the light that’s carrying the information that you want when you measure amplitude and phase. That gives you the ability to manipulate that information in algorithms and software that you don’t have if you only measure intensity somewhere,” said Alan Duncan, a senior fellow at Lockheed Martin.

While the raw SPIDER images don’t look like much, they show that the basic approach is sound, that you can, in fact, teach a microchip to see by having it detect different information than what the eye sees. “The exciting thing about these images is it proves the physics works,” said Duncan.

The next step will be layering more features and channels onto the surface of these photonic circuits, advances that may vastly improve computer vision systems for self-driving vehicles, and of course, enable the production of much smaller spy satellites.

But there’s a limit to how small the satellites can get. “You can never work around physics. The physics constraint for an imaging system is that resolution is limited by diffraction, which means the resolution is always determined by the size of the aperture,” said Duncan.

“So if you need a one-meter aperture to get enough resolution to see a certain size object, however far away it is, then you will still need a one-meter SPIDER. But, it will be a one-meter aperture that’s an inch thick as opposed to a meter and a half thick and carrying a lot of glass.”

Shrinking the size of satellites will create new winners and losers in the private space race. On the winning side may be little startups like New Zealand-based Rocket Labs, which hopes to be able to put very small, lightweight payloads into Low Earth Orbit for $5 million per launch.

Among the possible losers is Lockheed Martin itself, which, along with its United Launch Alliance partner Boeing, specialises in putting very large satellites into GEO at more than $200 million a pop.

DefenseOne:   SPIDER Infographic: Lockheed Martin

You Might Also Read: 

Hacker Cracks Satellite Communications Network:

China’s Quantum Satellite Changes Cryptography:

 

« British NHS Sure To Be Hit By More Cyber Attacks
Why Cyber Attacks Could Be War Crimes »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Westminster eForum

Westminster eForum

Wesrtminster eForum runs a series of conferences on matters relating to the UKs Digital Strategy. Topics include Smart Cities and Cyber Security.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

Cyxtera Technologies

Cyxtera Technologies

Cyxtera offers powerful, secure IT infrastructure capabilities paired with agile, dynamic software-defined security.

Coalition

Coalition

Coalition combines comprehensive insurance and proprietary security tools to help businesses manage and mitigate cyber risk.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

Avantra

Avantra

Avantra Enterprise is an end to end platform for AIOps and ITSecOps scenarios - with best practices configuration, security vulnerability patching, system refreshes and anomaly detection automations.