US Must Prepare For Cyber Warfare In Space

The developing stage for warfare is in cyberspace, but the next stage could well grow in a familiar frontier, space. 

The modern world is not merely using outer space, it’s utterly reliant on it. From GPS to communication satellites, we use space to relay messages, gather intel, control sophisticated machinery from across the globe – and knocking these targets out can be a very attractive prospect for a rogue actor.

A recent report from the Center for a New American Security highlights precisely these vulnerabilities and calls on the Pentagon to change its strategy with it comes to safeguarding space-bound strategic resources. The report warns that China, Russia, and other rivals to the West have noticed our reliance on space and are plotting ways to exploit it.

Space is “becoming a domain like any other, air, sea, land, and electromagnetic, in which the United States will have to compete and fight the ability to access and exploit the domain rather than assume safe and uncontested passage within and use of it,” the report reads.

Satellites, the reports states, are threatened not only by missiles, but by cyberwarfare and electronic attacks. as well. Speaking with The Washington Post, the report’s author, Elbridge Colby (former adviser to Mitt Romney), said that even if adversaries don’t shoot down satellites, they will look for ways to disable them.

The US must consider not only how to protect its assets in space, the report advises, but what to do if and when these assets are destroyed. A possible solution could come from a return to Cold War doctrine. 

Back then, the threat was that in the case of an attack in space, the US would reply with a major attack outside it. Colby suggests a return to such a policy to prevent disaster.

I-HLS:  http://bit.ly/22r2pCG

« Open Access To The Snowden Archive
How ISIS Uses The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

RSA Insurance Group

RSA Insurance Group

RSA is one of the world’s leading multinational quoted insurance groups. Commercial services include cyber risk insurance.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Cyberint

Cyberint

Cyberint, the Impactful Intelligence company, fuses open-deep-and darkweb Threat Intelligence with Attack Surface Management to deliver maximum protection from external threats.

CynergisTek

CynergisTek

CynergisTek is a top-ranked cybersecurity and information management consulting firm dedicated to serving the healthcare industry.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.