Spy Satellites Just Became Much Smaller

Future spy satellites may unfold like origami birds, collecting image data along long, flat sensor arrays that weigh almost nothing. By replacing the bulky telescopic lenses that make today’s spy satellites among the biggest and most expensive things in space, light-sensitive microchips promise far cheaper access to orbital imagery.

In August, Lockheed Martin released the first images from its experimental Segmented Planar Imaging Detector for Electro-Optical Reconnaissance, or SPIDER, program.

Funded by the Defense Advanced Research Projects Agency, or DARPA, SPIDER is basically a telescope on a microchip. But it collects light data very differently from a conventional telescope.

A regular telescope, of the sort you might find in the Hubble Space Telescope or a Keyhole satellite pointed at North Korea, is fundamentally modeled on a human eye. The eye collects data on light intensity, or sees, by filtering the light through its lens and iris to the retina.

Similarly, conventional telescopes and cameras collect light through lenses and pass it to detectors. In old cameras, that detector was film. In new digital cameras, the detector is a bed of capacitors. The number of photons that hits the detectors over a certain period of time gives you the light intensity. As that intensity varies across the area that you are trying to take a picture of, you see shapes and objects.

To get a decent image with a conventional telescope, your detector needs to be a surface at a reasonable distance from the lens. Shorten the telescope too much and you get images too small to be useful. And everything must be aligned to tiny tolerances. With a space-based telescope, that’s difficult and power-intensive to do.

The SPIDER chip works differently. Instead of measuring light’s intensity, it collects data wavelength and amplitude, since intensity is really just amplitude squared. A computer then calculates what the intensity would be based on the amplitude and phase data. That removes much of the size, power requirements, and complexity of telescopes modeled after eyes.

“You’re measuring a more fundamental characteristic of the light that’s carrying the information that you want when you measure amplitude and phase. That gives you the ability to manipulate that information in algorithms and software that you don’t have if you only measure intensity somewhere,” said Alan Duncan, a senior fellow at Lockheed Martin.

While the raw SPIDER images don’t look like much, they show that the basic approach is sound, that you can, in fact, teach a microchip to see by having it detect different information than what the eye sees. “The exciting thing about these images is it proves the physics works,” said Duncan.

The next step will be layering more features and channels onto the surface of these photonic circuits, advances that may vastly improve computer vision systems for self-driving vehicles, and of course, enable the production of much smaller spy satellites.

But there’s a limit to how small the satellites can get. “You can never work around physics. The physics constraint for an imaging system is that resolution is limited by diffraction, which means the resolution is always determined by the size of the aperture,” said Duncan.

“So if you need a one-meter aperture to get enough resolution to see a certain size object, however far away it is, then you will still need a one-meter SPIDER. But, it will be a one-meter aperture that’s an inch thick as opposed to a meter and a half thick and carrying a lot of glass.”

Shrinking the size of satellites will create new winners and losers in the private space race. On the winning side may be little startups like New Zealand-based Rocket Labs, which hopes to be able to put very small, lightweight payloads into Low Earth Orbit for $5 million per launch.

Among the possible losers is Lockheed Martin itself, which, along with its United Launch Alliance partner Boeing, specialises in putting very large satellites into GEO at more than $200 million a pop.

DefenseOne:   SPIDER Infographic: Lockheed Martin

You Might Also Read: 

Hacker Cracks Satellite Communications Network:

China’s Quantum Satellite Changes Cryptography:

 

« British NHS Sure To Be Hit By More Cyber Attacks
Why Cyber Attacks Could Be War Crimes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

Anxinsec

Anxinsec

Anxinsec Technology is a security solution and service provider with a focus on new technology and innovations in cybersecurity.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

HackersEra

HackersEra

HackersEra is a leading offensive cybersecurity service provider. We enable our clients to operate in a more secure environment efficiently and produce more value.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

Centre for Cyber Security Research & Innovation

Centre for Cyber Security Research & Innovation

The Centre for Cyber Security Research & Innovation is Nepal's First Academic Research Institute to focus on understanding the overall Information Security of Nepalese Organizations.

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

Iron EagleX

Iron EagleX

Iron EagleX deliver engineering solutions in cloud computing, big data, cyber, and machine learning technologies to US Government customers.

Nicos AG

Nicos AG

Nicos AG specializes in secure, global data communication.