What To Know About Space Security

Space is increasingly important to the planet’s infrastructure – but it is also a potential battleground.

Space is a vital part of national and international infrastructures. Since the launch of Sputnik in 1957, humanity has been using space for the purposes of communications, monitoring our environment, tracking the planets in the solar system and the stars in the galaxies, proving data for global positioning, navigation and timing, and conducting vital scientific experiments. We are increasingly dependent on the global space-based satellite constellations for the workings of the national and international infrastructure such as the piloting of aircrafts, navigation at sea, military manoeuvres, financial transactions and internet and phone communications.

Two recent developments in China – the launch of a ‘quantum satellite’ designed to transmit hack-proof keys from space and its loss of control of the space station Tiangong-1 – highlight the security challenges, and dangers, space presents. What are the key vulnerabilities, and how can the international community create a secure a peaceful space environment?

Space is ‘congested, contested and competed’. Almost every country has either their own satellites or a stake in space, through meteorological and communications space-based assets. There are approximately 1,100 satellites in orbit and space debris – the results of collisions and defunct satellites – is a serious problem. Throughout the Cold War, the US and the USSR developed anti-satellite weaponry and tested them against their own satellites, creating debris that remains in space today.
 
Space is becoming more accessible (at least for satellites). Light, mini satellites (500 kg), micro-satellites (10-100 kg), nano-satellites (1-10 kg), pico-satellites (0.1 and 1 kg) and femto-satellites (10 and 100 g) are all in development. Launched in multiple satellite payloads and deployed in formations with larger ‘mother’ satellites and ‘satellite swarms’, these new satellites will transform the accessibility of space.  They can be used by the military, commercial operations and by ordinary citizens for communications, signals intelligence, environmental monitoring, geo-positioning, observation and targeting. They could also be used as weapons in themselves. They will have all the capabilities of the current satellites but they will be cheaper to make and easier to launch – and harder to track.
 
Space weaponry is a serious problem. In 2007, China used a ground-launched missile to destroy an old weather satellite, and a year later, the US shot down a low-orbit defunct spy satellite, using a missile launched from a warship in the Pacific. Earlier this year, Russia carried out successful flight test of the A–235 Nudol direct ascent anti-satellite missile. Without an international legal framework to prevent the weaponization of outer space, the destabilization of the space environment is continuing apace and the placement of weapons in space seems likely in the coming years.
 
Communications and navigation systems are highly vulnerable to cyber attacks.  Cyber attacks on satellites are already a reality. Global navigational satellite systems such as the US GPS and the European Galileo provide highly accurate positional and timing signals that are vital for the planet’s communications networks that can be affected by jamming and spoofing attacks. Our recent research paper ‘Space, the Final Frontier for Cybersecurity?’ considers the risks associated with cyber attacks, including  taking physical control of satellites, such as manoeuvring a satellite so that it collides with another satellite, ‘decaying’ or lowering its orbit so that it re-enters the Earth’s atmosphere and burns up or deliberately overexposing a satellite’s solar panels to highly energetic ionizing solar radiation, causing irreparable damage.
 
Creating a secure, peaceful space environment is possible. Although there has been no progress on space security issues at the Conference on Disarmament in Geneva since 1994, there have been a number of recent international efforts. Space debris mitigation guidelines have been developed at the UN in Vienna, a UN group of governmental experts on outer space transparency and confidence-building in outer space activities reported in 2013, and the European Union has established an initiative for an International Code of Conduct for Outer Space Activities. A light-touch, international, multi-stakeholder response is required for the cyber security challenges of space – a meeting next year to mark the 50th anniversary of the global Outer Space Treaty would be a good start.

Chatham House: The Royal Institute of International Affairs 
 

Dr Patricia Lewis
Research Director, International Security

David Livingstone MBE DSC
Associate Fellow, International Security

 

« More Questions About The Yahoo Breach
Cyber Warfare TV Series »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

Athena Forensics

Athena Forensics

Athena Forensics is one of the UK's leading providers of Computer Forensics, Mobile Phone Forensics, Cell Site Analysis and Expert Witness Services.

SecureWorks

SecureWorks

SecureWorks provides intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

NICE Systems

NICE Systems

NICE Systems provide software solutions to ensure compliance, fight financial crime, and safeguard people and assets.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

Assured Information Security (AIS)

Assured Information Security (AIS)

AIS is committed to providing our customers with critical information security products, services, and training. We support diverse needs throughout business and industry.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

Belden

Belden

Belden is a global leader in signal transmission and security solutions for mission-critical applications in enterprise and industrial markets. Belden brands include Hirschmann and Tofino Security.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

DDLS

DDLS

DDLS is Australia's largest provider of corporate IT, process training and cybersecurity training courses and certification programs.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

Mode

Mode

Mode is an out-of-band communication and crisis collaboration platform. One platform to manage your cyber crisis response. Stay connected when it's needed most.