What To Know About Space Security

Space is increasingly important to the planet’s infrastructure – but it is also a potential battleground.

Space is a vital part of national and international infrastructures. Since the launch of Sputnik in 1957, humanity has been using space for the purposes of communications, monitoring our environment, tracking the planets in the solar system and the stars in the galaxies, proving data for global positioning, navigation and timing, and conducting vital scientific experiments. We are increasingly dependent on the global space-based satellite constellations for the workings of the national and international infrastructure such as the piloting of aircrafts, navigation at sea, military manoeuvres, financial transactions and internet and phone communications.

Two recent developments in China – the launch of a ‘quantum satellite’ designed to transmit hack-proof keys from space and its loss of control of the space station Tiangong-1 – highlight the security challenges, and dangers, space presents. What are the key vulnerabilities, and how can the international community create a secure a peaceful space environment?

Space is ‘congested, contested and competed’. Almost every country has either their own satellites or a stake in space, through meteorological and communications space-based assets. There are approximately 1,100 satellites in orbit and space debris – the results of collisions and defunct satellites – is a serious problem. Throughout the Cold War, the US and the USSR developed anti-satellite weaponry and tested them against their own satellites, creating debris that remains in space today.
 
Space is becoming more accessible (at least for satellites). Light, mini satellites (500 kg), micro-satellites (10-100 kg), nano-satellites (1-10 kg), pico-satellites (0.1 and 1 kg) and femto-satellites (10 and 100 g) are all in development. Launched in multiple satellite payloads and deployed in formations with larger ‘mother’ satellites and ‘satellite swarms’, these new satellites will transform the accessibility of space.  They can be used by the military, commercial operations and by ordinary citizens for communications, signals intelligence, environmental monitoring, geo-positioning, observation and targeting. They could also be used as weapons in themselves. They will have all the capabilities of the current satellites but they will be cheaper to make and easier to launch – and harder to track.
 
Space weaponry is a serious problem. In 2007, China used a ground-launched missile to destroy an old weather satellite, and a year later, the US shot down a low-orbit defunct spy satellite, using a missile launched from a warship in the Pacific. Earlier this year, Russia carried out successful flight test of the A–235 Nudol direct ascent anti-satellite missile. Without an international legal framework to prevent the weaponization of outer space, the destabilization of the space environment is continuing apace and the placement of weapons in space seems likely in the coming years.
 
Communications and navigation systems are highly vulnerable to cyber attacks.  Cyber attacks on satellites are already a reality. Global navigational satellite systems such as the US GPS and the European Galileo provide highly accurate positional and timing signals that are vital for the planet’s communications networks that can be affected by jamming and spoofing attacks. Our recent research paper ‘Space, the Final Frontier for Cybersecurity?’ considers the risks associated with cyber attacks, including  taking physical control of satellites, such as manoeuvring a satellite so that it collides with another satellite, ‘decaying’ or lowering its orbit so that it re-enters the Earth’s atmosphere and burns up or deliberately overexposing a satellite’s solar panels to highly energetic ionizing solar radiation, causing irreparable damage.
 
Creating a secure, peaceful space environment is possible. Although there has been no progress on space security issues at the Conference on Disarmament in Geneva since 1994, there have been a number of recent international efforts. Space debris mitigation guidelines have been developed at the UN in Vienna, a UN group of governmental experts on outer space transparency and confidence-building in outer space activities reported in 2013, and the European Union has established an initiative for an International Code of Conduct for Outer Space Activities. A light-touch, international, multi-stakeholder response is required for the cyber security challenges of space – a meeting next year to mark the 50th anniversary of the global Outer Space Treaty would be a good start.

Chatham House: The Royal Institute of International Affairs 
 

Dr Patricia Lewis
Research Director, International Security

David Livingstone MBE DSC
Associate Fellow, International Security

 

« More Questions About The Yahoo Breach
Cyber Warfare TV Series »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Atempo

Atempo

Atempo is a leading independent European-based software vendor with a global presence. We provide solutions to protect, store, move and recover all your data.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

Viakoo

Viakoo

Viakoo is an Enterprise IoT Applications Management company providing performance, security, and compliance. Viakoo enables you to be proactive in maintaining cyber hygiene and protecting your network

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

Difenda

Difenda

Difenda Shield is a fully integrated and modular cybersecurity suite that gives your organization the agility it needs to implement a world-class cybersecurity system.

Clearvision

Clearvision

As an Atlassian Platinum Solution Partner, Clearvision works with teams in the UK and US, providing solutions for the Atlassian stack, Git and open source tooling.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.