US Must Prepare For Cyber Warfare In Space

The developing stage for warfare is in cyberspace, but the next stage could well grow in a familiar frontier, space. 

The modern world is not merely using outer space, it’s utterly reliant on it. From GPS to communication satellites, we use space to relay messages, gather intel, control sophisticated machinery from across the globe – and knocking these targets out can be a very attractive prospect for a rogue actor.

A recent report from the Center for a New American Security highlights precisely these vulnerabilities and calls on the Pentagon to change its strategy with it comes to safeguarding space-bound strategic resources. The report warns that China, Russia, and other rivals to the West have noticed our reliance on space and are plotting ways to exploit it.

Space is “becoming a domain like any other, air, sea, land, and electromagnetic, in which the United States will have to compete and fight the ability to access and exploit the domain rather than assume safe and uncontested passage within and use of it,” the report reads.

Satellites, the reports states, are threatened not only by missiles, but by cyberwarfare and electronic attacks. as well. Speaking with The Washington Post, the report’s author, Elbridge Colby (former adviser to Mitt Romney), said that even if adversaries don’t shoot down satellites, they will look for ways to disable them.

The US must consider not only how to protect its assets in space, the report advises, but what to do if and when these assets are destroyed. A possible solution could come from a return to Cold War doctrine. 

Back then, the threat was that in the case of an attack in space, the US would reply with a major attack outside it. Colby suggests a return to such a policy to prevent disaster.

I-HLS:  http://bit.ly/22r2pCG

« Open Access To The Snowden Archive
How ISIS Uses The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

Devo Technology

Devo Technology

Devo Security Operations is a next-gen cloud SIEM that enables you to gain complete visibility, reduce noise, and focus on the threats that matter most to the business.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Raxis

Raxis

Raxis is a cybersecurity company that hacks into computer networks and physical structures to perform penetration tests, assessing corporate vulnerability to real-world threats.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

Parablu

Parablu

Parablu is a leading provider of data security and resiliency solutions for the digital enterprise.

Cybastion

Cybastion

Cybastion develops robust world-class cybersecurity solutions tailored to suit the needs of different businesses, governments and public sector entities.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.