FEBRUARY 2021 A Report of the CSIS Aerospace Security Project
FOREWORD | Doug Loverro AUTHORS | Todd Harrison, Kaitlyn Johnson, Makena Young DEFENSE AGAINST THE DARK ARTS IN SPACE Protecting Space Systems from Counterspace Weapons FEBRUARY 2021 DEFENSE AGAINST THE DARK ARTS IN SPACE Protecting Space Systems from Counterspace Weapons
FOREWORD | Doug Loverro
AUTHORS | Todd Harrison, Kaitlyn Johnson, Makena Young
A Report of the CSIS Aerospace Security Project
Lanham · Boulder · New York · London ABOUT CSIS The Center for Strategic and International Studies (CSIS) is a bipartisan, nonprofit policy research organization dedicated to advancing practical ideas to address the world’s greatest challenges.
Thomas J. Pritzker was named chairman of the CSIS Board of Trustees in 2015, suc- ceeding former U.S. senator Sam Nunn (D-GA). Founded in 1962, CSIS is led by John J. Hamre, who has served as president and chief executive officer since 2000.
CSIS’s purpose is to define the future of national security. We are guided by a dis- tinct set of values—nonpartisanship, independent thought, innovative thinking, cross-disciplinary scholarship, integrity and professionalism, and talent develop- ment. CSIS’s values work in concert toward the goal of making real-world impact.
CSIS scholars bring their policy expertise, judgment, and robust networks to their research, analysis, and recommendations. We organize conferences, publish, lec- ture, and make media appearances that aim to increase the knowledge, awareness, and salience of policy issues with relevant stakeholders and the interested public.
CSIS has impact when our research helps to inform the decisionmaking of key poli- cymakers and the thinking of key influencers. We work toward a vision of a safer and more prosperous world.
CSIS does not take specific policy positions; accordingly, all views expressed herein should be understood to be solely those of the author(s).
© 2021 by the Center for Strategic and International Studies. All rights reserved.
ISBN: 978-1-5381-4031-4 (pb); 978-1-5381-4032-1 (ebook)
Center for Strategic & International Studies 1616 Rhode Island Avenue, NW Washington, DC 20036 202-887-0200 | www.csis.org
Rowman & Littlefield 4501 Forbes Boulevard Lanham, MD 20706 301-459-3366 | www.rowman.com ACKNOWLEDGMENTS The team would like to extend our thanks to several key individuals who made this report possible. First, to Doug Loverro for his expertise, support with building the workshop scenarios, and writing of the foreword for this report. Second, to Emily Tiemeyer for her outstanding work on our Harry Potter-inspired layout, graphics, and charts. Third, to Jeeah Lee and Phillip Meylan for their expert eyes and copyedits. We would also like to thank our friend and colleague, Thomas Rob- erts, for his insight, contributions, and edits. Finally, the team would like to thank the space and national security experts who participated in the workshops that informed this study, which are discussed in Chapter 5 of this report.
This study was made possible by the generous support of the Smith Richardson Foundation and general support to CSIS.
The Aerospace Security Project would also like to recognize J.K. Rowling’s Harry Potter series, which has greatly inspired our overall design concept, including the incorporation of its iconography and quotes.
While this report borrows the story and imagery of Harry Potter, we do not share the author’s discriminatory views. The Aerospace Security Project team and CSIS support equality and representation for all, including the trans community, and we strive to create an environment where people of all backgrounds are heard and included. With the Harry Potter theme, we want to reaffirm some of the values the characters and stories taught us: friendship, courage, selflessness, and being true to oneself.
ACKNOWLEDGMENTS TABLE OF CONTENTS Foreword...... vi
CHAPTER 1: Space Is No Sanctuary...... 1 The State of Space Today...... 2 Militarization versus Weaponization of Space...... 2 Space Organizations...... 4 The Need for Space Defenses...... 5 Report Organization and Methodology...... 5
CHAPTER 2: The Dark Arts in Space...... 7 Kinetic Physical...... 7 Non-Kinetic Physical...... 8 Electronic...... 8 Cyber...... 9
CHAPTER 3: Space Defenses Defined...... 10 Defensive Counterspace Operations...... 10 Passive Defenses...... 11 Architectural Defenses...... 11 Technical Defenses...... 13 Operational Defenses...... 16 Active Defenses...... 18 Space-Based Defenses...... 18 Terrestrial-Based Defenses...... 20
CHAPTER 4: Space Defenses Applied...... 22 Objectives of the Attacker in Space...... 22 Objectives of the Defender in Space...... 24 Matching Defenses to Threats...... 25
CHAPTER 5: Scenarios for Defensive Counterspace Operations...... 27 Scenario 1: Russian Incursion into the Baltics...... 27 Scenario 2: Possible Hijacked Satellite...... 30 Scenario 3: Escalating Tensions in the South China Sea...... 31 Scenario 4: Commercial Space System Protection...... 34 Key Takeaways...... 35
CHAPTER 6: Conclusions and Recommendations...... 37
About the Authors...... 40
TABLE OF CONTENTS both a crucial advantage of U.S. mili- fare. The “art of war” did not change, “All armies prefer tary strength and a critical chink in the but its application needed to be amend- high ground to low, United States’ military armor. The re- ed. So too for space—the philosophical emergence of antisatellite activities underpinnings are the same as they and sunny places to around the world, and more specifical- were 2,500 years ago—but applying dark . . . With regard ly in Russia and China, was not due to those concepts to space conflict re- sudden technological change but rath- quires the ability to see beyond the to precipitous er to the rising recognition of the grand concepts and into operational heights, if you are changing strategic calculus of “what is strategies and capabilities. That work beforehand with your strong” and “what is weak.” More wor- has begun, but much more is required. risome, the “weakness” of U.S. space Into that fray comes this volume from adversary, you should forces is not limited to what happens in the folks at CSIS. Outlining the develop- the heavens—losses there create new occupy the raised ment and possible types of the weap- vulnerabilities on the ground, which ons of space conflict and some of the and sunny spots, and then develop new nexuses of “what is early existing strategic ideas that have there wait for him to weak” to attack. been posited for how space conflict will come up.” The ideas in The Art of War are thought evolve, they then put those ideas to the to be the compilation of generations of test. Through a series of thought exer- SUN TZU, THE ART OF WAR military learning from the experience cises, marked by far more realistic sce- of battle and that Sun Tzu, who may or narios than are often used in such en- may not have actually existed, com- deavors, they seek to enlighten that piled them into his eponymous text. He which can only truly be learned in con- FOREWORD had the advantage of those genera- flict. The results are simultaneously in- t is hard to imagine that Sun Tzu ever tions of land conflict and the lessons formative and surprising. Conventional conceived of as “precipitous” a from wars won and lost. Clausewitz wisdom about secrecy and the use of “height” or as “sunny” a “spot” as and Mahan were similarly able to draw in-space kinetic force to repel attacks I upon centuries of battle-tested plans gives way to more nuanced uses of in- Earth orbit. But it is fascinating to won- der, if he had, would it have changed his and experiences to derive their own formational methods (domain aware- perception of how battles would be theories of land and sea strategy and to ness), diplomatic approaches (norms of use those lessons to advance the state- behavior), cyber intrusion, and the need fought and how wars could be won. Mil- of-the-art of doctrine, weapons, and for greater, more thoughtful, and uni- itary theorists (and science fiction employment of armed force. Unfortu- versally known resilience methods as screenwriters) have often resorted to nately, we have no experience in space superior ways in which to resist attacks. pronouncements taken from Sun Tzu to warfare to rely upon—no grand lessons Also of note is that, while the predomi- explain the basis of their decisions or to of how force was applied nor even use- nance of discussion around space at- justify the boldness of their approach. ful exercises to extend into actual com- tack seems to focus on what would be But perhaps the true import of Sun Tzu’s bat. The slate is blank. traditionally termed Phase 2 and 3 hos- words is to operational commanders on tilities, the tools that might require Certainly, the philosophical elements of how to best disposition forces and, more thought are those that can be em- war captured by Sun Tzu, Clausewitz, more critically, how to identify the route ployed below the level and before the Mahan, and many others translate from to victory. If that is true, then clearly start of all-out conflict, in the more am- domain to domain, but often that trans- Russian and Chinese space strategists biguous and less acute situations that lation is fuzzy and subject to strategic learned from a different Sun Tzu ad- are likely to be the rule rather than the surprise, especially when technology monishment: “So in war, the way is to exception in space conflict.1 avoid what is strong and to strike at outpaces the application of derived what is weak.” concepts. The creation of the Maginot It is clear we are in the very early stages Line can be traced back to the writings of developing the correct application of
CLICK TO FLY BACK TO Since the turn of the century, the dou- of Sun Tzu on the superiority of the de- Sun Tzu’s tenets to space combat. And THE CONTENTS ble-edged sword that space represents fense but was made technologically ir- since such conflict is unlikely to be a for U.S. forces has been apparent—it is relevant by the introduction of air war- common occurrence in the foreseeable
FOREWORD vi HARRISON, JOHNSON, YOUNG future, thought pieces and exercises such as undertaken here will have an outsized role in that development. Ad- ditionally, the rate of technological change in this area is accelerating, and as mentioned earlier, that can turn well-understood operational concepts on their head if the underlying lessons are lost in the process of focusing on specific implementations.
In the interwar years between World “Harry wandered over to the War I and World War II, forward-thinking Restricted Section . . . naval officers theorized and war-gamed Unfortunately, you needed a the use of carrier-based and subma- specially signed note from one of rine-based naval power in exercises called “Fleet Problems” despite the the teachers to look in any of the dominant notion of the superiority of restricted books, and he knew the battleship. Those “problems,” prac- he’d never get one. These were ticed and played out under the title of the books containing powerful War Plan Orange, became the furnace in Dark Magic never taught at which operational experience could be Hogwarts, and only read by older forged—put crucially to the test after students studying advanced December 1941. Space needs the same forward-looking, innovative approach Defense Against the Dark Arts.” to examining strategic concepts—its HARRY POTTER AND THE SORCERER’S STONE own set of furnaces to forge its future strategy—before it has its own “space Pearl Harbor.” This study is one of the first—it won’t be the last.
Douglas L. Loverro, Colonel USAF (Ret)
Former Deputy Assistant Secretary of Defense for Space Policy
CLICK TO FLY BACK TO THE CONTENTS
FOREWORD vii HARRISON, JOHNSON, YOUNG
DEFENSE AGAINST THE CHAPTER 1 DARKS ARTS IN SPACE SPACE IS NO SANCTUARY he United States is increasingly ning of the space age, when early satel- that an attack on these space systems dependent on space systems for lites began to provide nascent military would be regarded as a prelude to a Teconomic and military security. capabilities, nations started develop- nuclear attack. The foundation of de- The expansion of government and ing ways to deny others the military terrence in space was nuclear deter- commercial space capabilities has benefits of space. In 1959, just two rence on Earth.4 opened markets and made possible years after the launch of Sputnik, the What is different today is that the abili- whole new industries within the United United States tested the first anti-satel- ty of the United States to deter attacks States and around the world. Ride-shar- lite (ASAT) weapon—a Bold Orion mis- in space is in doubt. National security ing apps such as Uber and Lyft, the ul- sile launched from a B-47 bomber.2 The space systems are not just used to sup- tra-efficient supply chains of business- Soviets soon followed, beginning tests port nuclear forces, and the U.S. mili- es, and the grocery delivery services of a space-based co-orbital ASAT weap- tary is increasingly dependent on many depended on during the Covid-19 on system in 1963 and declaring the space systems across the full spectrum pandemic would not be possible with- system fully operational by 1973.3 of military operations. Counterterror- out the U.S. military-operated Global Space was never really a sanctuary. Positioning System (GPS). Moreover, ism operations in the Middle East use the global economy depends not just Although space was a contested do- drones enabled by GPS and satellite on the weather, communications, navi- main from nearly the beginning, none communications (SATCOM) systems to gation, timing, and remote sensing of the kinetic ASAT weapons developed track and strike high-value targets. data from space systems but also on by the United States and the Soviet Space-based imagery, signals intelli- the global reach and power projection Union were ever used in conflict. While gence, and other surveillance systems capabilities of U.S. and allied militaries the threat of attack was ever present provide real-time global monitoring of that protect the global commons and during the Cold War, a stable deter- adversary forces that otherwise would the free flow of global commerce. rence posture developed between the not be possible. And nuclear forces two superpowers because both U.S. stand watch day and night using many Space, however, is not a sanctuary. and Soviet national security space sys- of the same satellites to quickly detect While this pronouncement has become tems were primarily used to support missile launches and ensure the na- CLICK TO somewhat cliché among policy ana- FLY BACK TO nuclear forces. Multiple agreements tional command authority remains THE CONTENTS lysts, the history behind this statement and treaties between the two nations connected before, during, and after a is often overlooked. Since the begin- formalized a mutual understanding nuclear attack.
SPACE IS NO SANCTUARY 1 HARRISON, JOHNSON, YOUNG nation states, such as space-based radar “Indifference Space provides an and radio frequency (RF) monitoring. and neglect economic and mili- tary advantage to the SpaceX, for example, has disrupted the often do much United States that is THE STATE launch market with its partially reusable more damage not easily replicated Falcon 9 rocket and is now attempting to than outright by other nations or by disrupt the communications market with dislike.” capabilities in other OF SPACE its Starlink constellation of satellites. The Starlink constellation alone now has more ALBUS DUMBLEDORE, domains. In the three 7 HARRY POTTER AND THE decades since the operational satellites in orbit than China. ORDER OF THE PHOENIX end of the Cold War, These disruptions throw into sharp relief adversaries have tak- the increasingly disordered environment en note of these advantages. Rather TODAY he current space environment is sig- space has become. In many cases, nation- than fight the U.S. military symmetri- nificantly different than it was during al laws and regulatory frameworks do not cally, they have invested heavily in Tthe Cold War. Space systems can no fully account for some of the new com- counterspace weapons designed to longer hide behind the cloak of nuclear mercial space missions being pursued. degrade, disrupt, and destroy U.S. and deterrence, and the defenses needed for And with few legally binding or enforce- allied space systems. These counter- space systems must account for how the able international treaties governing space weapons can hold satellites at space environment is changing. Space is space, some nations and private entities risk in a crisis and, in conflict, could more diverse, disruptive, disordered, and are pushing the limits on what others may greatly increase the risks to U.S. forces dangerous than in the past. Space is more see as acceptable behavior in space. and interests around the world. As diverse because it is no longer dominated Space is also becoming increasingly dan- Chief of Space Operations General by the United States and Soviet Union. gerous as more nations develop and pro- John Raymond has made clear, “space While 93 percent of all space launches liferate counterspace capabilities. Recent is a vital national interest and freedom during the Cold War were by the two su- reports by CSIS, the Secure World Foun- of action must be preserved. No one perpowers, the majority of launches to- dation, and the Defense Intelligence wants a conflict in space and deter- day are by other nations. Moreover, Agency provide an aggregation of publicly rence is a top priority . . . however, if roughly 90 percent of satellites launched available information on the develop- deterrence fails, we must be prepared in 2020 were commercial rather than gov- ment, testing, and use of counterspace to fight and win.”5 ernment.6 Space is more disruptive be- weapons by other nations.8 These reports With the growing U.S. dependence on cause many private companies are pursu- show that while Russia and China contin- space and the proliferation of coun- ing new space missions, such as on-orbit ue to develop and test a wide range of terspace capabilities, the natural servicing of satellites and in-space mining counterspace weapons, even some question for strategists and policy- and manufacturing. Other private firms friendly countries, such as India and makers is how can space assets be are venturing into space missions that France, are developing their own counter- protected against such threats? This previously were the exclusive domain of space capabilities in response. report provides an overview of the range of protections that can be used to defend space systems from differ- ent forms of attack and the impact these defenses can have on deter- MILITARIZATION VERSUS rence and escalation dynamics. For space to remain a source of economic and military advantage, the United WEAPONIZATION OF SPACE States must be able to defend its criti- he increased development and prolifera- tion of counterspace weapons has led to a “Always use the proper name for cal space infrastructure and have inte- things. Fear of a name increases grated space strategy, doctrine, and Tgreater focus on space policy issues, specif- CLICK TO ically the militarization and weaponization of fear of the thing itself.” FLY BACK TO operational concepts for how to use THE CONTENTS these defenses across the full spec- space. The term “militarization of space” is gen- ALBUS DUMBLEDORE, HARRY POTTER AND THE trum of conflict. erally used to denote the passive use of space SORCERER’S STONE
SPACE IS NO SANCTUARY 2 HARRISON, JOHNSON, YOUNG systems to support military planning and operations on Earth. Space has been TABLE 1: FRAMEWORK FOR TYPES OF SPACE WEAPONS used for military purposes since the be- KINETIC NON-KINETIC ginning of the space age, and it remains EXAMPLE EXAMPLES one of the main uses of space today. Mili- Direct-Ascent ASAT Uplink Jammer, Laser Dazzler/Blinder, Cyberattack taries around the world use space sys- HOW DO THEY WORK? A missile fires a warhead or projectile into HOW DO THEY WORK? tems for intelligence, surveillance, and space to directly strike or detonate near Non-kinetic counterspace weapons can be reconnaissance (ISR); communications; a target satellite. The warhead can be stationed on ground, maritime, or airborne position, navigation, and timing (PNT); conventional or nuclear. platforms and used to affect the operation of satellites or the sensors they carry, without WHAT ARE THE EFFECTS? and other functions to allow terrestrial making physical contact. A kinetic Earth-to-space weapon produces forces to operate more effectively and ef- space debris that can affect the safe operation WHAT ARE THE EFFECTS? ficiently. Space is already militarized and of other satellites in affected orbits. Nuclear Non-kinetic weapons disrupt or degrade the detonations in space increase the radiation ability of satellites to function properly. They will remain militarized for the foresee-
EARTH-TO-SPACE exposure of other satellites and can significantly can have temporary or permanent effects, but able future. shorten their lifespan. they do not generally produce orbital debris or other collateral damage. HAVE THEY BEEN DEMONSTRATED? The weaponization of space, in contrast, Earth-to-space kinetic weapons have been HAVE THEY BEEN DEMONSTRATED? is generally defined as going a step be- tested by the United States, Russia, China, and Multiple nations have demonstrated these India. The United States and Soviet Union tested capabilities, including Russia, China, Iran, and yond the mere passive use of space for nuclear weapons in space in the 1960s. others. military purposes. In Space as a Strate- EXAMPLES EXAMPLES gic Asset, Dr. Joan Johnson-Freese notes Co-orbital ASAT, Space-Based Missile Defense Co-orbital Crosslink Jammer, that “force application is the overt wea- Interceptors Co-orbital High-Powered Microwave ponization of space, as compared with HOW DO THEY WORK? HOW DO THEY WORK? the de facto weaponization that has oc- A satellite is placed into orbit and maneuvers A satellite is placed into orbit and uses to intercept its target by striking it directly or non-kinetic means (such as a high-powered curred under the guise of space con- detonating a conventional or nuclear warhead in microwave or jammer) to disrupt the operation trol.”9 In 2004, U.S. Air Force doctrine its vicinity. of another satellite. defined space force application as WHAT ARE THEIR EFFECTS? WHAT ARE THEIR EFFECTS? A kinetic space-to-space weapon would produce They can degrade, disrupt, or destroy a target “those forces that deliver kinetic effects space debris that can affect the safe operation satellite without making physical contact, to, from, or through space,” though this of other satellites in similar orbits. A nuclear producing orbital debris or otherwise affecting definition was removed from the De- detonation in space would increase the radiation other satellites. The effects can be temporary
SPACE-TO-SPACE exposure of other satellites and significantly or permanent depending on the form of attack partment of Defense’s (DoD) dictionary shorten their lifespan. used and the protections on the target 10 satellite. in 2018. The U.S. military defines space HAVE THEY BEEN DEMONSTRATED? control to include both offensive and The Soviet Union tested co-orbital kinetic ASAT HAVE THEY BEEN DEMONSTRATED? weapons repeatedly during the Cold War. No open-source examples could be found of defensive operations that “ensure free- such a system being demonstrated, although dom of action in space for the US and its such tests could look like remote proximity allies and, when directed, to deny an operations to outside observers. adversary freedom of action in space.”11 EXAMPLE EXAMPLES Space-Based Global Strike (e.g., “Rods from God”) Space-Based Downlink Jammer, Space-Based High-Powered Laser A variety of other nations and interna- HOW DO THEY WORK? Weapons are placed in orbit and, when HOW DO THEY WORK? tional organizations have attempted commanded, deorbit and reenter the atmosphere A satellite equipped with a non-kinetic weapon to define what constitutes a space to strike a target on the Earth. Damage can be could target forces on Earth, such as a laser weapon, without much success in inflicted using the kinetic energy of the weapon used to intercept missiles or aircraft in-flight itself, or a warhead can be deployed from the or a jammer used to interfere with radars or reaching a broad consensus. It is use- reentry vehicle (either conventional or nuclear). satellite ground stations. ful, however, to have a framework for WHAT ARE THEIR EFFECTS? WHAT ARE THEIR EFFECTS? understanding the types of systems The effects depend greatly on the type of When used, the effects would be localized warhead used (conventional or nuclear) but to the target area, but such a system could that could potentially be considered would be like terrestrial-based ballistic missiles theoretically strike anywhere without warning. SPACE-TO-EARTH in terms of their ability to hit targets anywhere space weapons. A prior CSIS report HAVE THEY BEEN DEMONSTRATED? on Earth with little warning. proposed such a framework for weap- While the U.S. military has contemplated ons that are either based in space or HAVE THEY BEEN DEMONSTRATED? space-based lasers for boost-phase missile While the idea of using space-based weapons defense, there are no open-source examples of CLICK TO 12 FLY BACK TO are designed to have effects in space. for prompt global strike has been contemplated such a system being tested. THE CONTENTS This framework, shown in by the U.S. military, there are no open-source examples of such a system being tested. Table 1, includes six cate-
SPACE IS NO SANCTUARY 3 HARRISON, JOHNSON, YOUNG gories of potential space weapons organized by the domain in which they origi- The Russian Aerospace Forces are a nate and have effects (Earth-to-space, space-to-space, and space-to-Earth) and military branch within the Russian the means by which these effects are achieved (kinetic and non-kinetic). As not- Armed Forces focused on the air and ed in the table, other nations have already developed and tested three of the six space domains. A sub-branch within categories of space weapons in the framework. Thus, by nearly any definition, the Russian Aerospace Forces is the space has already been weaponized. Russian Space Force, which is tasked with all military operations in the space domain, “including launching military satellites, maintaining space- based assets, monitoring space ob- jects, and identifying potential attacks SPACE ORGANIZATIONS against the Russian homeland from he organization of national security space capabilities by nations provides space.”18 Russian ASAT capabilities are insight into how they view this domain from a security perspective. For ex- scattered throughout the military, to Tample, the United States has long maintained a division between military include housing direct-ascent ASAT space missions conducted by DoD and national intelligence space missions con- programs within the Russian missile ducted mainly by the National Reconnaissance Office (NRO). Within the U.S. mili- forces and space-based co-orbital tary, the organization of space forces recently changed with the re-establishment ASAT systems within the Russian of United States Space Command (USSPACECOM) as a separate unified combatant Space Force.19 command and the creation of the United States Space Force as a new military service. Like the other military services, the U.S. Space Force is responsible for France has the world’s third-oldest organizing, training, and equipping space forces for the U.S. military.13 And like space program and a long history in the other combatant commands, USSPACECOM is charged with using these space space exploration. France’s national forces to carry out joint space missions and operations and support operations in space agency, Centre National other domains.14 This reorganization is itself a reflection of how the United States d’Études Spatiales (CNES), manages has changed its perception of the space domain and the threats posed by other all national civil space programs, and nations in space. France is a key member in the Europe- an Space Agency (ESA). While CNES Like the United States, countries such as China, Russia, France, Japan, and India focuses on civil space programs, the have changed the way they organize their national security space capabilities. French military contains separate China’s national security space organizations are part of the People’s Liberation space organizations for national secu- Army (PLA). Two divisions within the PLA focus on space and counterspace capa- rity. France recently renamed the bilities: the Strategic Support Force (SSF) and the PLA Rocket Force (PLARF). Cre- French Air Force to the French Air and ated in 2015, the SSF is responsible for developing and employing China’s military Space Force and announced plans to space systems as well as its cyber and electronic warfare systems. As one PLA offi- create a Space Command within this cer noted, the SSF combines into one organization cyber forces for network attack newly renamed organization. France’s and defense; space forces responsible for communications, reconnaissance, and recent Space Defense Strategy, re- navigation satellites; and electronic warfare units used for countering adversary leased in 2019, calls for “renewed radar and communications. This indicates that the PLA views the space domain as analysis of the space environment and primarily an information domain and a key element of the PLA’s information war- its threats, risks and opportunities” fare forces.15 and notes that threats in the space do- main “force our country to revisit its The primary space focus of China’s SSF appears to be the development, launch, model in order to remain a leading and operation of China’s space-based command and control, PNT, and ISR capa- space power.”20 bilities. The SSF also appears to be leading the development and deployment of many Chinese counterspace capabilities, but it is unclear if all counterspace capa- While Japan does not yet have signifi- bilities have been transferred to this organization. It is possible that Chinese di- cant military space capabilities, it is be- rect-ascent ASAT weapons remain under the control of the PLA Rocket Force, ginning to organize itself for military CLICK TO 16 FLY BACK TO which is also responsible for its missile programs. However, reports in 2019 indi- space operations. In 2019, Japan creat- THE CONTENTS cated that the SSF began training with direct-ascent ASAT missiles capable of tar- ed its Space Domain Mission Unit, a mil- geting satellites in low Earth orbit (LEO).17 itary organization dedicated to protect-
SPACE IS NO SANCTUARY 4 HARRISON, JOHNSON, YOUNG ing Japanese space assets. The Space In April 2019, shortly after conducting its Domain Mission Unit will coordinate first successful ASAT test, India estab- REPORT ORGANIZATION with Japan’s civil space agency, the Ja- lished its Defence Space Agency (DSA). pan Aerospace Exploration Agency India’s existing national security-fo- AND METHODOLOGY (JAXA), and its U.S. counterparts in cused space organizations—including his report builds on pri- USSPACECOM and the U.S. Space Force. the Defence Imagery Processing and “I solemnly or work of the CSIS The Space Domain Mission Unit plans to Analysis Centre and the Defence Satel- Aerospace Security swear that be fully operational by 2022. Beyond lite Control Centre—will become a part T Project and expands into I am up to space technology development and of the DSA. The DSA’s objective is to co- several new areas. Chapter 2 no good.” planning, the unit will be responsible ordinate among the space assets of the provides a summary of the GEORGE for operating the satellite ground sta- Indian Air Force, Army, and Navy. Addi- threats to space systems and WEASLEY, HARRY tions that are critical for Japan’s self-de- tionally, the DSA will be responsible for a taxonomy for discussing POTTER AND THE fense missions. Reports also indicate developing national security space as- PRISONER OF different types of counter- AZKABAN that the Japanese government is con- sets and defending Indian space infra- space weapons. Chapter 3 sidering investing in some combination structure through a new sub-organiza- catalogs the range of active and pas- of passive and active defenses to pro- tion entitled the Defense Space sive defenses that are theoretically 21 22 tect its space assets. Research Organization. possible and discusses the advantages and limitations of each. Chapter 4 ana- lyzes how the defensive capabilities described in Chapter 3 can be applied THE NEED FOR SPACE DEFENSES to the different types of counterspace weapons discussed in Chapter 2. Chap- he recent reorganization and elevation of national security space capabili- ter 5 explores a range of plausible sce- ties by each of the world’s major space powers is an indication of the increas- narios in which defenses may be need- ing importance these nations place on the use of space for military purposes. T ed, concepts for employing different In many ways, the 2007 Chinese anti-satellite test served as a wake-up call for types of defenses, and how defensive policymakers by highlighting the vulnerabilities of space systems. But since that actions in space may be perceived by time, improvements in the defenses of U.S. space systems to the types of counter- others. The final chapter summarizes space weapons adversary nations are developing and operationally deploying conclusions drawn from the analysis, has been slow and uneven. While U.S. space capabilities remain far ahead of other actionable recommendations for poli- nations, some adversaries, namely China and Russia, are arguably making ad- cymakers, and additional research top- vances in counterspace weapons faster than the United States is making advances ics to be explored in future work. in protections against these threats. Part of the methodology behind this Since the 2007 Chinese ASAT test, a variety of studies, exercises, and events have study is the use of workshops with highlighted the vulnerabilities of space systems, the far-reaching effects of “a day space and policy experts to test space without space,” and the fact that space is a contested warfighting domain. Howev- crisis scenarios and operational con- er, the lack of public discourse about how to defend against space threats has led cepts for space defenses. The CSIS study some to conclude that space is not defendable and should not be relied upon by team developed several candidate sce- the military, with one scholar writing that, “space is an inherently vulnerable and narios, which are documented in Chap- offense-dominant domain . . . There simply aren’t many good options for space ter 5, and presented them to a group of hardening/defenses.” This scholar goes on to conclude that “the reality is that sat- experts during two separate half-day ellites are vulnerable to attack—through both kinetic and non-kinetic means from online workshops in September 2020. lasers, electronic warfare, and cyber—and there is no good way to fix this.”23 The workshop participants were asked The fact that space is contested does not mean that space is undefendable. Rath- to explore the range of defensive space er, it means that the United States will have to fight to protect its ability to operate capabilities they would consider using in this domain, just as it does in the air, land, and maritime domains. What is given the situation described in each of CLICK TO FLY BACK TO the scenarios. The findings from these THE CONTENTS needed are strategy, doctrine, operational concepts, and technical capabilities that focus on protecting space systems, the services they provide, and the space workshops were used to refine the sce- environment itself. narios themselves as well as the frame-
SPACE IS NO SANCTUARY 5 HARRISON, JOHNSON, YOUNG work of defenses in Chapter 3 and the concepts for employing defenses in Chapter 4.
The ultimate objective of this study is to facilitate debate among policymakers, technical experts, and the overall na- tional security community on how best to defend space assets. This debate is especially important at this junction be- cause the U.S. military is in the process of modernizing many of its key satellite constellations. The decisions made now about what types of space architectures to field and which defenses to incorpo- rate will have repercussions for the life of these architectures. This report is in- tended to serve as a reference guide for understanding different forms of space defenses and how these defenses can be employed. While there is no easy or one-size-fits-all solution to defending U.S. space assets, the goal is to give de- cisionmakers the tools and information they need in an easily accessible format to have an informed policy debate about this complex and nuanced issue.
CLICK TO FLY BACK TO THE CONTENTS
SPACE IS NO SANCTUARY 6 HARRISON, JOHNSON, YOUNG DEFENSE AGAINST THE CHAPTER 2 DARKS ARTS IN SPACE
“The Dark Arts are many, varied, ever-changing and eternal. Fighting them is like fighting a many-headed monster, which, THE DARK each time a neck is severed, sprouts a head even fiercer and cleverer than before. You are fighting that which is unfixed, mutating, indestructible.”
SEVERUS SNAPE, HARRY POTTER AND THE HALF- ARTS IN BLOOD PRINCE attack are direct-ascent ASAT weap- ons, co-orbital ASAT weapons, and ground station attacks. Direct-ascent ASAT weapons are launched on a sub-orbital trajectory to strike a satel- lite in orbit, while co-orbital ASAT weapons are first placed into orbit SPACE and then later maneuvered into their intended target. Attacks on ground prerequisite to understanding stations are targeted at the terrestrial space defenses is understanding sites responsible for command and A what they are intended to de- control of satellites or the relay of sat- fend against. This chapter provides an ellite mission data to users. overview and taxonomy for counter- Kinetic physical attacks tend to cause space weapons. The high stakes at irreversible damage to the systems af- play in the space domain have incen- fected and demonstrate a strong show tivized nations to build arsenals of of force that would likely be attribut- counterspace weapons to disrupt, de- able and publicly visible. A successful grade, or destroy space systems. kinetic physical attack in space will Counterspace weapons vary signifi- produce orbital debris, which can in- cantly in the types of effects they cre- discriminately affect other satellites in ate, how they are deployed, how easy similar orbits. These types of attacks they are to detect and attribute, and are one of the only counterspace ac- the level of technology and resources tions that carries the potential for the needed to develop and field them. inetic physical counterspace loss of human life if targeted at crewed They can be categorized into four weapons attempt to strike direct- ground stations or at satellites in or- CLICK TO ly or detonate a warhead near a FLY BACK TO broad groups of capabilities: kinetic bits where humans are present, such THE CONTENTS K physical, non-kinetic physical, elec- satellite or ground station. The three as the International Space Station in tronic, and cyber. main types of kinetic physical forms of LEO. To date, no country has conduct-
THE DARK ARTS IN SPACE 7 HARRISON, JOHNSON, YOUNG ed a kinetic physical attack against the atmosphere), and advanced point- known damage.27 For its part, Russia another country’s satellite, but four ing control to steer the laser beam has continued to develop its non-kinet- countries—the United States, Russia, precisely—technology that is costly ic ASAT capabilities in recent years, in- China, and India—have successfully and requires a high degree of sophisti- cluding by conducting research on na- tested kinetic physical counterspace cation. An HPM weapon can be used to no-sized aerosol obscurants that can disrupt a satellite’s electronics, cor- weapons. be used in space to block RF or optical rupt data stored in memory, cause transmissions and placing satellite las- processors to restart, and, at higher ing systems on aircraft and ground ve- power levels, cause permanent dam- hicles.28 age to electrical circuits and proces- sors. A laser can be effective against a sensor on a satellite if it is within the field of view of the sensor, making it possible to attribute the attack to its approximate geographical origin. HPM attacks can be more difficult to attri- bute because the attack can come from a variety of angles, including from other satellites passing by in or- bit. For both laser and HPM weapons, the attacker may have limited ability to know if the attack was successful because it is not likely to produce visi- ble indicators.25 on-kinetic physical counter- space weapons have physical ef- The use of a nuclear weapon in space Nfects on satellites or ground sys- would have large-scale, indiscrimi- lectronic counterspace weapons tems without making physical contact. nate effects that would be attributable target the electromagnetic spec- Lasers can be used to temporarily daz- and publicly visible. A nuclear detona- trum through which space sys- zle or permanently blind the sensors tion in space would immediately af- E tems transmit and receive data. Jam- on satellites, and higher-powered la- fect satellites within range of its elec- ming devices interfere with the tromagnetic pulse, and it would also sers can cause components to over- communications to or from satellites create a high radiation environment heat. High-powered microwave (HPM) by generating noise in the same radio weapons can disrupt a satellite’s elec- that would accelerate the degradation frequency band. An uplink jammer in- tronics or cause permanent damage of satellite components over the long terferes with the signal going from to electrical circuits and processors in term for unshielded satellites in the Earth to a satellite, such as the com- a satellite. A nuclear device detonated affected orbital regime. The detona- mand-and-control uplink. Downlink in space can create a high radiation tion of nuclear weapons in space is jammers target the signal from a satel- environment that has indiscriminate banned under the Partial Test Ban lite as it propagates down to users on effects on satellites in all affected or- Treaty of 1963, which has more than the Earth. Spoofing is a form of elec- bits. These attacks operate at the 100 signatories, although China and tronic attack where the attacker tricks speed of light and, in some cases, can North Korea are not included.26 a receiver into believing a fake signal, be less visible to third-party observers produced by the attacker, is the real and more difficult to attribute.24 Among U.S. competitors, China and Russia appear to have the most devel- signal it is trying to receive. A spoofer Satellites can be targeted with lasers oped non-kinetic physical ASAT capa- can be used to inject false information and HPM weapons from ground- or bilities. For example, China has been into a data stream or, in extremis, to is- ship-based sites, airborne platforms, working on a satellite lasing system sue false commands to a satellite to
CLICK TO FLY BACK TO or other satellites. A satellite lasing since at least 2006 when it illuminated disrupt its operations. User terminals THE CONTENTS system requires high beam quality, a U.S. government satellite flying over with omnidirectional antennas, such adaptive optics (if being used through Chinese territory without causing any as many GPS receivers and satellite
THE DARK ARTS IN SPACE 8 HARRISON, JOHNSON, YOUNG phones, have a wider field of view and issuing commands that would damage thus are susceptible to downlink jam- its electronics and sensors. Accurate ming and spoofing from a wider range and timely attribution of a cyberattack of angles on the ground.29 can be difficult because attackers can use a variety of methods to conceal their Electronic forms of attack can be diffi- identity, such as using hijacked servers cult to detect or distinguish from acci- to launch an attack. dental interference, making attribution and awareness more difficult. Both China has been implicated or suspected jamming and spoofing are reversible in several cyberattacks against U.S. sat- forms of attack because once they are ellites. In October 2007 and again in July turned off, communications can return 2008, China is suspected of attacking a to normal. Through a type of spoofing remote sensing satellite operated by the called “meaconing,” even encrypted U.S. Geological Survey called Landsat-7, military GPS signals can be spoofed. causing more than 12 minutes of inter- Meaconing does not require cracking ference with ground station control the GPS encryption because it merely each time.33 In June and October 2008, hile electronic forms of attack rebroadcasts a time-delayed copy of hackers also believed to be from China attempt to interfere with the the original signal without decrypting attacked NASA’s Earth observation sat- transmission of RF signals, cy- it or altering the data.30 The technology W ellite, Terra, and this time they “achieved berattacks target the data itself and the needed to jam and spoof many types of all steps required to command the sat- systems that use, transmit, and control satellite signals is commercially avail- ellite but did not issue commands.”34 the flow of data. Cyberattacks on satel- able and inexpensive, making them And in September 2014, Chinese hack- lites can be used to monitor data traffic relatively easy to proliferate among ers attacked the National Oceanograph- patterns, intercept data, or insert false state and non-state actors. ic and Atmospheric Administration’s or corrupted data in a system. These (NOAA) satellite information and weath- attacks can target ground stations, While Russia and China have advanced er systems, forcing NOAA to take down end-user equipment, or the satellites electronic counterspace capabilities, the system and stop transmitting satel- themselves. While cyberattacks require nations such as Iran and North Korea lite images to the National Weather Ser- a high degree of understanding of the are also developing and using jam- vice for two days.35 ming and spoofing systems. North Ko- systems being targeted, they do not rea likely acquired much of its elec- necessarily require significant resourc- tronic counterspace systems from es to conduct. The barrier to entry is Russia, and it appears to be gaining relatively low, and cyberattacks can be operational experience using these contracted out to private groups or in- systems in peacetime. For example, it dividuals. Even if a state or non-state frequently uses GPS jamming to inter- actor lacks internal cyber capabilities, fere with U.S.-South Korean military it may still pose a cyber threat. exercises and disrupt air and maritime A cyberattack on space systems can re- traffic along the border with South Ko- sult in the loss of data or services being rea.31 Likewise, the U.S. Department of provided by a satellite, which could Transportation issued a warning in have widespread systemic effects if 2019 about Iranian GPS jamming and used against a system such as GPS. Cy- communications spoofing in the Strait berattacks could have permanent ef- of Hormuz. Iran is believed to have fects if, for example, an adversary seizes placed GPS jammers on an island near control of a satellite through its com- the entrance to the strait to interfere mand-and-control system. An attacker with civilian aircraft and ships so that could shut down all communications CLICK TO FLY BACK TO they might mistakenly navigate into THE CONTENTS and permanently damage the satellite Iranian waters or airspace and could by expending its propellant supply or be seized.32
THE DARK ARTS IN SPACE 9 HARRISON, JOHNSON, YOUNG DEFENSE AGAINST THE CHAPTER 3 DARKS ARTS IN SPACE
“Your defences must therefore be as flexible and inventive as the arts you seek to undo.”
SEVERUS SNAPE, HARRY POTTER AND THE HALF- BLOOD PRINCE
military systems that the United States SPACE or its allies rely upon. In contrast, the objective of offensive counterspace op- erations is to prevent an adversary’s use of space capabilities and counter- DEFENSES space weapons to threaten friendly forces or support its own forces on Earth.38 These operations can include reversible or irreversible attacks against an adversary’s satellites, ground control systems, communica- tion links, or the space services provid- DEFINED ed by third parties. In general, defensive counterspace terrestrial forces, the focus now includes operations aim to protect friendly the equally demanding and more com- space systems, while offensive coun- DEFENSIVE plex task of assuring and defending our terspace operations aim to disrupt, space capabilities against the aggres- degrade, or destroy adversary space 36 COUNTERSPACE sive space activities of others. systems. A gray area that can be inter- preted as either defensive or offen- While the inclusion of defensive space sive, depending on one’s perspective, OPERATIONS operations in joint doctrine is an im- is when one nation’s counterspace ca- iven the wide range of threats and portant start, much work remains to be pabilities are used to attack an adver- the proliferation of counterspace done to develop the operational con- sary’s counterspace capabilities. capabilities outlined in the previ- cepts and technical capabilities neces- G French minister of armed forces Flor- ous chapter, the United States and oth- sary to make defensive counterspace ence Parly provided an example of ers are necessarily placing a greater fo- operations credible and effective. Ex- this in a speech announcing the na- cus on the ability to identify threats and isting space doctrine and planning tion’s new Space Defense Strategy in defend space systems from attack. In guidance state that the objective of de- 2019: “If our satellites are threatened, 2018, the Joint Chiefs of Staff published fensive counterspace operations is to we will consider dazzling those of our an update to its space operations doc- protect friendly space systems from opponents. We reserve the time and trine, the first update since 2013, which “attack, interference, and unintention- means of the response: this may in- noted that: al hazards” and that these operations volve the use of high-power lasers de-
CLICK TO FLY BACK TO Whereas earlier space operations inte- can occur “before, during, or after an ployed from our satellites or from our THE CONTENTS gration efforts focused primarily on pro- attack.”37 Friendly space systems can patrol nano-satellites.” She went on to viding capability from space to support include civil, commercial, and foreign make the case that this use of coun-
SPACE DEFENSES DEFINED 10 HARRISON, JOHNSON, YOUNG terspace operations is not offensive, and the strengths and weaknesses of possible, examples are used to high- noting that “active defence is not an each. Importantly, many of the defens- light existing space systems that em- offensive strategy, what it is about is es discussed can be used in parallel ploy these defenses, although in self-defence. It is, when a hostile act with one another to enhance overall some cases examples may not exist or has been detected, characterized and protection of space systems. Where may not be publicly disclosed. attributed, able to respond in an ap- propriate and proportionate manner, in accordance with the principles of international law.”39 Moreover, U.S. military joint doctrine on space opera- tions states that “active measures to PASSIVE DEFENSES deceive, degrade, or destroy targeting assive counterspace defenses are measures that can be used to minimize the systems are examples of defensive op- effectiveness of attacks on friendly space systems by making them harder to erations.”40 But to neutral third-party Ptarget or better capable of withstanding attacks. The passive defenses dis- observers that do not have access to cussed in this section are divided into three rough categories—architectural, techni- the same intelligence as the nations in cal, and operational—although it should be noted that some passive defenses could conflict, a defensive counterspace at- arguably belong in more than one category. Architectural defenses are those that tack may be indistinguishable from an rely primarily on satellite constellation and ground station architectures that are offensive counterspace attack. This is more difficult for an adversary to attack. Technical defenses rely primarily on tech- especially true in a pre-conflict envi- nologies that can be incorporated into satellites, ground stations, and user equip- ronment where one nation may feel ment that makes the system more difficult to attack. Operational defenses rely pri- compelled to act preemptively or be- marily on changes in the way satellites are operated to make them more difficult to fore evidence of an attack has been target, more resistant to attacks, or easier to restore after an attack. disclosed.
Due to the unique physics of this oper- ARCHITECTURAL DEFENSES ating environment and that space re- Disaggregated Constellations mains an asymmetric advantage for the United States, actions that are like- Disaggregation is the separation of distinct missions onto different platforms or ly to result in orbital debris or trigger payloads, effectively breaking up multi-mission satellites into separate mission-spe- 41 an adversary response that would re- cific satellites that operate in parallel. For example, the U.S. Space Force currently sult in orbital debris can dispropor- plans to separate the strategic and tactical protected SATCOM missions into two tionately and adversely affect the Unit- separate next-generation systems. The Evolved Strategic SATCOM (ESS) system will ed States, its allies and partners, and support strategic users for missions such as nuclear command and control, whereas their collective long-term economic the Protected Tactical Service (PTS) system will support tactical SATCOM users that 42 and security interests in space. The need a high level of jam resistance. This could reduce the potential for uninten- United States and its allies and part- tional escalation by forcing an adversary to be explicit about the capabilities it is 43 ners therefore have an incentive to targeting in an attack. avoid using kinetic defensive counter- In a conventional conflict, if an adversary targets a dual-use (strategic and tactical) space capabilities that are likely to pro- aggregated space system such as the current Advanced EHF system, it may not be duce orbital debris if possible. clear whether the strategic or tactical missions (or both) are the intended target. This chapter provides an overview of This could lead to miscalculations and unintentional escalation. If the strategic and options available to protect space sys- tactical payloads are disaggregated into separate space systems, an adversary tems from attacks, including each of could target the tactical system only and leave the strategic system unharmed if it the four categories of counterspace does not want to risk nuclear escalation. However, an adversary may not be able to weapons discussed in the previous distinguish between satellites that are intended for different missions, and even if chapter. While the following is not an such differences are disclosed, an adversary may not trust this distinction and at-
CLICK TO FLY BACK TO exhaustive list of defensive capabili- tack both anyway. Moreover, disaggregation of strategic and tactical missions may THE CONTENTS ties, it is intended to provide an over- make attacking the tactical system in a conventional conflict more attractive if the view of the range of options available risk of strategic escalation is reduced.
SPACE DEFENSES DEFINED 11 HARRISON, JOHNSON, YOUNG Disaggregation can reduce space sys- complex because they do not have to to achieve the same effects as targeting tem complexity and potentially speed provide an entire capability on one plat- a smaller number of satellites in a acquisition timelines by decoupling re- form. They can also use hosted pay- less-proliferated architecture. quirements.44 However, disaggregated loads on other types of satellites, which systems can cost more in total because can have the benefit of further compli- Diversified Architectures separate space systems must be devel- cating targeting for an adversary by In a diversified architecture, multiple sys- oped and launched, resulting in some forcing it to attack multiple satellites, tems contribute to the same mission us- redundancies in development, testing, potentially from multiple countries and ing platforms and payloads that may be production, and launch costs. commercial firms, rather than a single operating in different orbits or in different nation’s military satellite. However, domains.52 For example, wideband com- Distributed Constellations hosted payloads can also result in more aggregated architectures since the host munications to fixed and mobile users can A distributed system uses “a number of satellite may be supporting multiple be provided by the military’s WGS system, nodes, working together, to perform the payloads and missions. commercial SATCOM systems, airborne same mission or functions as a single communication nodes, or terrestrial net- node.”45 In a distributed constellation, Proliferated Constellations works. The Chinese BeiDou system for po- the end user is not dependent on any sin- sitioning, navigation, and timing uses a gle satellite but rather uses multiple sat- Proliferated satellite con- diverse set of orbits, with satellites in geo- ellites to derive a capabili- stellations deploy a larger stationary orbit (GEO), highly inclined “We are only ty. A distributed number of the same types of GEO, and medium Earth orbit (MEO).53 Di- as strong as constellation can compli- satellites to similar orbits to versification reduces the incentive for an cate an adversary’s coun- perform the same missions. we are adversary to attack any one of these sys- terspace planning by pre- While distribution relies on placing united, as tems because the impact on the overall senting a larger number of more satellites or payloads on orbit that weak as we mission will be muted since systems in targets that must be suc- work together to provide a complete ca- are divided.” other orbits or domains can be used to cessfully attacked to pability, proliferation is simply building compensate for losses. Moreover, attack- ALBUS DUMBLEDORE, achieve the same effects as more systems (or maintaining more HARRY POTTER AND on-orbit spares) to increase the constel- ing space systems in diversified orbits THE GOBLET OF FIRE targeting just one or two 48 satellites in a less-distribut- lation size and overall capacity. Prolif- may require different capabilities for each ed architecture.46 GPS is an example of a eration can be an expensive option if orbital regime, and the collateral damage distributed constellation because the the systems being proliferated are indi- from such attacks, such as orbital debris, functioning of the system is not depen- vidually expensive, although highly pro- could have a much broader impact politi- dent on any single satellite or ground sta- liferated systems may reduce unit costs cally and economically. tion; a user can use any four satellites in production from the learning curve 49 within view to get a time and position fix. effect and economies of scale. The Redundant, Mobile, or SpaceX’s Starlink constellation is a com- U.S. military’s Wideband Global SAT- Hardened Ground Stations COM (WGS) system is an example of a mercial example of a distributed archi- Ground stations used for command proliferated system, with a constella- tecture because it uses more than 1,000 and control of a satellite or for the op- tion that has grown from three “gapfill- satellites circling in LEO to provide con- eration of the payloads on a satellite tinuous coverage over large parts of the er” satellites initially to a planned con- 50 are also at risk of attack. Having redun- Earth, with users of the system automat- stellation of 11 satellites. The Space dant or rapidly deployable mobile ically being transferred between satel- Development Agency is planning to ground stations provides a measure of lites as they pass in and out of range. Dis- develop highly proliferated constella- protection in the event of attack or nat- tributed constellations tend to degrade tions for data transport, missile warn- ural disaster, making the space system gracefully as satellites are removed from ing, missile tracking, and alternative less dependent on any single ground the system, gradually reducing the accu- position, navigation, and timing that station or location.54 Ground stations racy, coverage, and time availability of would use hundreds of satellites in 51 can also be hardened to withstand ki- the service.47 LEO. Proliferated systems can provide CLICK TO FLY BACK TO a greater degree of protection because netic and non-kinetic attacks on the THE CONTENTS Distributed constellations can use dedi- they increase the number of satellites facilities themselves and the local in- cated satellites that are smaller and less an adversary must successfully attack frastructure on which they depend.
SPACE DEFENSES DEFINED 12 HARRISON, JOHNSON, YOUNG Government Space-Based Tracking Space Object
U.S. Space Force Space Surveillance Network (multiple distributed sites)
Missile Warning Radars Joint Space International Operations Partner Data Commercial Center Optical Tracking Commercial RF Tracking Orbit Outlook
Example Space Domain Awareness (SDA) Network.
through technical means,” “The truth . . . and operated. More- TECHNICAL DEFENSES and the military needs capa- over, if one’s SDA capa- it is a beautiful bilities that allow it to “make bilities can be commu- Exquisite Space Domain and terrible Awareness a more confident call in a nicated publicly and some of faster manner.”56 thing, and the data can be released The credibility and effectiveness of should therefore when necessary, the mere ex- many other types of defenses are en- Improved SDA can cut be treated with istence of these capabilities abled or enhanced by the ability to through the “fog of war” by great caution.” can be a deterrent in some quickly detect, characterize, and attri- providing an information and situations by providing great- bute attacks against space systems. decisionmaking advantage ALBUS DUMBLEDORE, HARRY POTTER AND THE er attribution and public visi- Space domain awareness (SDA) in- over adversaries. For exam- SORCERER’S STONE bility into adversary space cludes identifying and tracking space ple, being able to track, iden- activities. objects, predicting where objects will be tify, and characterize objects in space is in the future, monitoring the space envi- critical to identifying that an attack is in SDA systems include terrestrial-based ronment and space weather, and char- progress and mounting an effective de- optical, infrared, and radar systems as acterizing the capabilities of space ob- fense against threats such as co-orbital well as space-based sensors, such as jects and how they are being used.55 kinetic ASAT weapons and space-based the U.S. military’s Geosynchronous Exquisite SDA—information that is more electronic attack. Artificial intelligence Space Situational Awareness Program timely, precise, and comprehensive (AI) can further enhance SDA capabili- (GSSAP) inspector satellites.57 Many na- than what is publicly available—can ties by tracking patterns of life in space tions have SDA systems with various help distinguish between accidental to better identify abnormal or nefarious levels of capability, and an increasing and intentional actions in space. As U.S. behaviors that human analysts may number of private companies (and ama- Space Force Major General Leah Lauder- miss. AI can also potentially be used to teur space trackers) are developing
CLICK TO FLY BACK TO back noted in public comments, “it’s better understand satellite capabilities, their own space surveillance systems, THE CONTENTS difficult trying to characterize what hap- including covert capabilities, based on making the space environment more pens thousands of miles away, all how these satellites are maneuvered transparent to all users.58
SPACE DEFENSES DEFINED 13 HARRISON, JOHNSON, YOUNG Radio frequency mapping of the Galapagos Islands in 2020. hawkeye360
Space-Based Radio the cause was “almost always self-jam- liberate attacks from HPM and 59 Frequency Mapping ming.” Commercial firms can play a electromagnetic pulse weapons. The role in RF mapping and determining the effects can include data corruption on Space-based RF mapping is the ability sources of interference. For example, memory chips, processor resets, and to monitor and analyze the RF environ- the private firm HawkEye360 is launch- short circuits that permanently dam- ment that affects space systems both in ing a constellation of satellites that can age components. One of the first in- space and on Earth. Similar to exquisite detect and geolocate RF transmis- stances of an on-orbit failure due to SDA, space-based RF mapping provides sions.60 A key aspect of RF mapping is these effects was the Telstar-1 satellite space operators with a more complete timeliness—the faster a threat can be in 1962, which succumbed to the inten- picture of the space environment, the detected, identified, and characterized, sified radiation environment in space ability to quickly distinguish between the more valuable this information be- created by a U.S. high-altitude nuclear intentional and unintentional interfer- comes as an enabler for other defensive test.61 Surrounding the electronics and ence, and the ability to detect and geo- capabilities. And like exquisite SDA data, locate electronic attacks. RF mapping the ability to release information pub- cables within a satellite with shielding can allow operators to better character- licly or privately on the sources, loca- and adding surge protection devices ize jamming and spoofing attacks from tions, and nature of jamming incidents throughout the RF and electrical sys- Earth or from other satellites so that can act as a deterrent to adversaries tem can protect against the effects of other defenses can be more effectively that would prefer to operate covertly or radiation, high-powered microwave at- employed. in a more ambiguous or less attribut- tacks, and electromagnetic pulse Without timely data, it can be difficult to able manner. weapons. However, these protections distinguish between accidental and in- add weight and complexity to satel- tentional RF interference. For example, Electromagnetic Shielding lites, and the effectiveness of shielding
CLICK TO FLY BACK TO the U.S. military experienced an aver- Satellite components can be vulnera- depends on precise manufacturing THE CONTENTS age of 23 satellite communications jam- ble to the effects of background radia- processes that must be carefully and ming incidents per month in 2015, and tion in the space environment and de- laboriously tested and validated.
SPACE DEFENSES DEFINED 14 HARRISON, JOHNSON, YOUNG Filtering and Shuttering data packet than the error correction algorithm can accommodate, the data Filters and shutters can be packet becomes corrupted. Interleaving used on remote sensing satellites to pro- reduces this risk by shuffling the order tect sensors from laser dazzling and of the data before it is transmitted and blinding. Filters can protect sensors by then reassembling it in proper order only allowing light of certain wave- when it is received but before the error correction algorithm is applied. This re- duces the chance that a burst of inter- ference will create multiple errors with- in a single data packet.65
While these techniques can make com- munications more difficult to jam, they do not make them completely jam- proof. For example, a high-powered wideband jammer can interfere with signals across a larger portion of the Shuttering against lasing attack. spectrum used for frequency hopping, which increases the odds that some of lengths to reach the sensors. Filters are it difficult for a jammer to match the fre- the frequencies in the hopping pattern not very effective against lasers operat- quency of transmission. By spreading will be jammed, especially if the jam- ing at the same wavelengths of light the the signal across a larger piece of spec- mer is near the receiver. Interleaving sensors are designed to detect because a trum, the signal also has “processing also adds latency in communications filter that blocks these wavelengths gain” that allows it to effectively boost because it takes longer for the shuffled would also block the sensor from its in- the signal-to-noise ratio and better with- data to be reassembled into the original tended mission. A shutter acts by quickly stand jamming.64 The power level of a data packets on the receiving end. blocking or diverting all light to a sensor spread spectrum signal can also be low- once an anomaly is detected or a thresh- er, making it harder for an adversary to Antenna Nulling and old is reached, which can limit damage detect or intercept without knowing the Adaptive Filtering but also temporarily interrupts the col- precise hopping pattern. Satellites can be designed 62 lection of data. Filters and shutters add with antennas that “null” Interleaving is the process of dividing weight and complexity to satellite de- or minimize signals from a particular and mixing the bits of data being trans- signs and may require a detailed under- geographic region on the surface of the mitted in a noncontiguous manner. Be- standing of the technical capabilities of Earth or locations in space where jam- cause RF interference tends to occur in adversary counterspace weapons. ming is detected.66 Nulling is useful bursts, errors often occur in ad- when jamming is from a limited number jacent bits of data in transmis- Jam-Resistant Waveforms of detectable locations, but one of the sion. If more bit errors occur in a The way data is encoded for transmis- downsides is that it can also block trans- sion on a radio wave (i.e., the waveform) is a key factor in how difficult that trans- ORIGINA ESSAGE mission is to jam or spoof. Different types A A A A C C C C E E E E G G G G of waveforms can be used to improve the INTER EA E ESSAGE resistance of communications systems A C E G A C E G A C E G A C E G to jamming and spoofing, such as using frequency hopping spread spectrum INTER EA E ESSAGE ITH URST ERROR (FHSS) and interleaving.63 FHSS involves A C E G A C E G A C E G A C E G
CLICK TO FLY BACK TO rapidly changing the transmission fre- THE CONTENTS RECIE E ESSAGE A TER EINTER EA ING quency using a pseudorandom pattern. A C E G A C E G A C E G A C E G This protects against jamming by making
SPACE DEFENSES DEFINED 15 HARRISON, JOHNSON, YOUNG missions from friendly users that fall A risk with encryption is that the encryp- orbit; and the weather and other poten- within the nulled area. If a jammer is tion keys could be compromised through tial range safety hazards that can delay sufficiently close to friendly forces, the the loss of sensitive hardware or soft- launch plans. Air-launched systems can nulling antenna may not be able to ware. The systems therefore need to be help broaden the range of launch win- block the jammer without also blocking capable of being rapidly and securely re- dows available and potentially fly legitimate users. keyed. An additional risk is that a previ- around weather or other range obstruc- ously unknown flaw in the encryption tions, but the time required to integrate Adaptive filtering, in contrast, is used to algorithm could be exploited by an ad- a satellite with a launch vehicle and pre- block specific frequency bands regard- versary. Quantum computing, for exam- pare the vehicle for launch are likely to less of where these transmissions origi- ple, could pose a risk to many existing remain limiting factors. Moreover, satel- nate. Adaptive filtering is useful when encryption methods because the higher lites and ground station components jamming is consistently within a particu- processing speed of these systems could procured for rapid deployment will be- lar range of frequencies because these allow for a brute-force attack that cracks come technologically obsolete over frequencies can be filtered out of the sig- the encryption key, leading researchers time and will need to be replaced peri- nal received on the satellite while trans- to push for the development of quan- odically even if they are never used. missions can continue around them. tum-proof encryption.67 However, a wideband jammer could in- Reconstitution terfere with a large enough portion of the spectrum being used that filtering out OPERATIONAL Reconstitution can be used to quickly the jammed frequencies would degrade DEFENSES replace existing space capabilities by overall system performance. launching more satellites or bringing Rapid Deployment online more ground stations “to restore Encryption and Air-Gapped Rapid deployment is a form of protec- functionality to an acceptable level for a Systems tion that involves the speedy launch of particular mission, operation, or contin- a new or expanded space capability gency after severe degradation.”68 Re- While the encryption of when needed. Keeping a capability on placement satellites either of a different data transmissions for the the ground until needed can protect design or copies of the operational sat- command and control of the system from pre-emptive attack ellites on orbit can be built in advance national security space sys- and limit an adversary’s knowledge of and stored on the ground in a clean tems is standard practice, this is not the system and ability to factor it into room or other controlled environment always the case for commercial opera- strategic planning. Such a system to be ready for launch when needed. tors and international partners. The RF would need to be developed, tested, Similarly, mobile ground stations can be transmissions to and from satellites and procured well in advance of need deployed or existing ground stations are inherently exposed and need so that the satellites and necessary can be brought online or repurposed to strong encryption as well as some of ground systems are ready for launch replace sites that have been damaged the jam resistance techniques dis- and initial operations. Space operators or destroyed. These actions would al- cussed previously. The ground systems would also need sufficient training and low the military to reconstitute space used to process and disseminate data simulations to understand how to op- capabilities that have been degraded or on other networks can also be a vector erate the system and take advantage of destroyed, and it is one of the approach- for cyberattacks. Air-gapped systems the capabilities it provides. es to space defense specifically that are physically separated from the “Time will mentioned in the 2018 National public internet can make attempts to The speed at which a new satel- 69 not slow Defense Strategy. infiltrate a system much more difficult lite can be launched is limited for an adversary without insider help. by several factors, including the down when Many of the limitations for how However, it is not always possible to availability of a suitable launch something quickly a satellite can be completely air-gap some space sys- vehicle; the time required to in- unpleasant launched discussed in the rapid tems because the data they produce tegrate the satellite with the lies ahead.” deployment option would ap- may be intended for public consump- launch vehicle; the time needed ply to reconstitution as well, HARRY POTTER, CLICK TO FLY BACK TO tion, such as data from weather satel- to prepare the vehicle for HARRY POTTER namely the availability and in- THE CONTENTS lites or satellites that are intended for launch; the availability of a AND THE GOBLET tegration with a suitable launch OF FIRE commercial use. launch window to the desired vehicle and the weather, range,
SPACE DEFENSES DEFINED 16 HARRISON, JOHNSON, YOUNG and launch window constraints of the head so that it cannot easily find a satel- reflected radar, optical, and infrared en- launch. However, speed may not be a lite once it has maneuvered. ergy to make themselves more difficult major factor in reconstitution because to detect and track. For example, aca- Maneuvering a satellite quickly comes an adversary could attack the replace- demic research has shown that routine at the price of disrupting its current op- ment satellites or ground stations as spacecraft maneuvers can be optimized erations and using propellant reserves long as it retains its counterspace capa- to avoid detection by known sensors.73 to maneuver out of position and then bilities. This could force the military to Adding stealthy characteristics to satel- back into a useful orbit. The amount of delay launching reconstitution satel- lites requires design trade-offs in terms propellant required for a maneuver in- lites until it is confident that an adver- of size, weight, and power, and it impos- creases significantly with the mass of sary’s counterspace capabilities have es some operational limitations on how the satellite and the speed of maneuver been sufficiently degraded, which may the satellite can be used. And like stealthy required. Maneuver can only be done a not be until near the end of major com- platforms in other domains, no satellite limited number of times, depending on bat operations. Reconstitution systems can be perfectly stealthy all of the time, the propellant available, and could ulti- would need to be tested and refreshed in all parts of the spectrum, and from all mately reduce the useful lifetime of the periodically as they age and become angles. It can also be difficult to know if a satellite if the propellant needed for technologically obsolete regardless of satellite has been discovered if others are routine station keeping is expended whether they are launched. using passive sensors to track the satel- 71 prematurely. Guided ASAT warheads lite, such as optical telescopes. Maneuver have a significant maneuver advantage because they are smaller, can accelerate Deception and Decoys Satellite maneuver is an operational faster using less propellant, and can af- Deception can be used to con- tactic that can be used by satellites fit- ford to expend all their propellant since ceal or mislead others on the ted with chemical thrusters to avoid ki- they are by definition expendable.72 netic and some directed energy ASAT “location, capability, opera- weapons. For unguided projectiles, a Stealth tional status, mission type, and/or ro- satellite can be commanded to move bustness” of a satellite.74 Public mes- Space systems can be oper- out of their trajectory to avoid impact. If saging, such as launch announcements, ated and designed in ways the threat is a guided projectile, like can limit information or actively spread that make them difficult to most direct-ascent ASAT and co-orbital disinformation about the capabilities of detect and track. Similar to platforms in ASAT weapons, maneuver becomes a satellite, and satellites can be operat- other domains, stealthy satellites can more difficult and is only likely to be ef- ed in ways that conceal some of their use a smaller size, radar-absorbing coat- fective if the satellite can move beyond capabilities. Another form of deception ings, radar-deflecting shapes, radar jam- the view of the onboard sensors on the could be changing the capabilities or ming and spoofing, unexpected or opti- guided warhead.70 Maneuver also de- payloads on satellites while in orbit. mized maneuvers, and careful control of pends on having near-real-time and Satellites with swappable payload mod- continuous tracking data for incoming ules could have on-orbit servicing vehi- warheads. Thus, maneuver is best em- cles that periodically move payloads ployed in combination with oth- from one satellite to another, further er active defenses that target the complicating the targeting calculus for sensors guiding an ASAT war- an adversary because they may not be sure which type of payload is currently on which satellite. ASAT Warhead Satellites can also use tactical decoys to confuse the sensors on ASAT weap- ons and SDA systems. A satellite decoy can consist of an inflatable device de- signed to mimic the size and radar sig-
CLICK TO FLY BACK TO nature of a satellite, and multiple de- THE CONTENTS coys can be stored on the satellite for Satellite maneuvers out a warhead’s field of view. deployment when needed. Electro-
HARRISON, JOHNSON, YOUNG SPACE DEFENSES DEFINED 17 magnetic decoys can also be used in including the use of inflatable tanks quirements to satellites, com- space that mimic the RF signature of a during the Cold War to make armored peting for resources with their satellite, similar to aircraft that use air- units appear larger to an adversary.76 mission payloads. An off- borne decoys, such as the ADM-160 Decoys can be more effective when board jamming and spoofing Miniature Air-launched Decoy (MALD).75 used in combination with other defens- system could be placed on Decoys have been an important com- es, such as stealth, maneuver, and dedicated protective satellites that orbit ponent of operations in other domains, electronic attack. near a satellite, roam among satellites as needed, or position themselves stra- tegically to protect multiple satellites at once. A challenge for off-board systems is that they may not be within the field of view of the sensors on an incoming ACTIVE DEFENSES ASAT warhead when and where they are hile passive defenses seek to protect space systems from threats needed. For both onboard and off- by making them harder to target or better capable of withstand- board systems, their effective operation Wing attacks, active defenses target the threats themselves. As U.S. depends to a certain extent on an accu- Space Force doctrine notes, active defenses are intended to “destroy, nul- rate characterization and understand- lify, or reduce the effectiveness of threats holding friendly space capabili- ing of the technical capabilities of the ties at risk. Although this may entail reactive operations after an adversary has initiat- radar and communication systems on ed an attack, active defense also includes proactive efforts to seize the initiative once threats before an attack commences. an attack is imminent.”77 Active defenses can be divided into two broad categories based on where these defensive systems are based. Space-based defenses include Laser Dazzling or Blinding onboard systems that are integrated into the satellites they protect and off-board sys- Laser systems can be used tems that are hosted on separate satellites. Off-board defenses can be used to provide to dazzle or blind the opti- “zone defense” of multiple satellites or to act as defensive patrols that roam within cal or infrared sensors on orbital regimes in response to threats. Terrestrial defenses are cross-domain systems an incoming ASAT weapon based on Earth that target counterspace systems and the systems that support them in the terminal phase of either on Earth or in space.78 flight. This is similar to the laser infra- SPACE-BASED DEFENSES Jamming and Spoofing A jammer or spoofer can be used to disrupt sensors on an incoming kinetic ASAT weapon so that it cannot steer itself effectively in the terminal phase of flight. When used in conjunction with maneuver, this could allow a satellite to effectively “dodge” a kinetic attack. Similar systems could also be used to de- ceive SDA sensors by altering the reflected radar signal to change the location, velocity, and number of satel- lites detected, much like digital radio fre- quency memory (DRFM) jammers used on many military aircraft today. A space- based jammer can also be used to dis- rupt an adversary’s ability to communi- cate with an ASAT weapon. CLICK TO FLY BACK TO THE CONTENTS Bodyguard satellites jam the sensors on an incoming warhead while the target satellite ma- An onboard jamming and spoofing sys- neuvers to safety. tem would add weight and power re-
SPACE DEFENSES DEFINED 18 HARRISON, JOHNSON, YOUNG red countermeasures used on aircraft back to using a shoot-back system, par- against a salvo attack grows much faster to defeat heat-seeking missiles.79 ticularly kinetic shoot-back, is that if it than the number of missiles in the sal- Blinding an ASAT weapon’s guidance successfully strikes an incoming ASAT vo, meaning that the attacker has a system and then maneuvering to a new warhead, it could leave orbital debris cost-imposing advantage at scale.82 position (if necessary) could allow a that affects the safe operation of other satellite to effectively “dodge” a kinetic satellites in similar orbits. Physical Seizure attack. It could also be used to dazzle A space vehicle capable or blind the optical sensors on inspec- A shoot-back system can either be locat- of docking with, manipu- tor satellites to prevent them from im- ed on the satellite it is intended to de- lating, or maneuvering aging a satellite that wants to keep its fend or on a protective satellite in a sim- other satellites or pieces capabilities concealed or to frustrate ilar orbit. An off-board shoot-back of debris can be used to thwart space- adversary SDA efforts. system could potentially protect many based attacks or mitigate the effects af- satellites in a distributed “zone defense” ter an attack has occurred. Such a sys- Onboard laser systems would add approach. A variation on this would be a tem could be used to physically seize a weight and power requirements to sat- co-orbital ASAT weapon that, instead of threatening satellite that is being used ellites, which would compete for re- firing a projectile or directed energy to attack or endanger other satellites or sources with mission payloads. An off- weapon, uses the satellite itself as a to capture a satellite that has been dis- board lasing system could be installed warhead to strike a threat. An off-board abled or hijacked for nefarious purpos- on dedicated protective satellites, pro- shoot-back or co-orbital system would es. Such a system could also be used to vided these satellites are maneuvered be similar in some ways to a space- collect and dispose of harmful orbital within the field of view of the sensors of based missile interceptor constellation, debris resulting from an attack. A key an incoming ASAT weapon when and and one constellation could in theory be limitation of a physical seizure system is where they are needed. Like space- used for both missile defense and space that each satellite would be time- and based jamming and spoofing defenses, defense. A potential weakness in this propellant-limited depending on the or- the effective operation of a space-based approach is that an adversary could bit in which it is stored. A system stored laser defense system depends on an ac- launch a salvo of ASAT weapons or de- in GEO, for example, would not be well curate characterization and under- coys to saturate defenses in a local area, positioned to capture an object in LEO standing of the technical capabilities of creating a hole in the protective layer because of the amount of propellant re- threats, such as the wavelengths of light that could then be exploited by other to which adversary sensors are sensi- ASAT weapons.81 The constellation size tive. France has publicly indicated that for an interceptor system to defend it intends to field a self-defense laser system to dazzle adversary satellites if one of its satellites is threatened.80
Shoot-Back Satellites can be equipped with systems that either fire a physical projectile at an incoming ASAT weapon or use a high-powered laser or microwave sys- tem to have physically destructive ef- fects, such as overheating or causing short circuits, on an incoming ASAT weapon. The number of shots would be limited by the number of physical pro- jectiles that could be stored on the sat- ellite or the power capacity of the satel-
CLICK TO FLY BACK TO lite to generate the large amounts of THE CONTENTS Bodyguard satellites fire projectiles at an incoming warhead while the target satellite ma- energy needed for successive high-pow- neuvers to safety. ered laser or microwave bursts. A draw-
SPACE DEFENSES DEFINED 19 HARRISON, JOHNSON, YOUNG quired to maneuver into position. Phys- advanced capabilities, such as a ro- adversary space or counterspace sys- ical seizure satellites may need to be botic arm, harpoon, deployable net, tems. As with other types of cyberat- stored on Earth and deployed once they or other device. Several countries and tacks, attribution can be difficult to de- are needed to a specific orbit to counter private companies are currently de- termine with certainty, the effectiveness a specific threat. veloping and testing active debris re- of cyber weapons may not be known moval systems that could, in theory, until they are used, and the weaknesses While several commercial companies be adapted for military uses.84 a cyber weapon exploits may become are developing capabilities for on-or- known and mitigated once it is used. bit servicing, a distinguishing feature TERRESTRIAL-BASED of a military defensive capability is the Jamming and Spoofing ability to conduct remote proximity DEFENSES and docking operations with an unco- Terrestrial systems can also be used to operative or uncontrolled space ob- Cyberattacks jam or spoof uplink communications to ject. For example, the Northrop Grum- Many forms of counterspace weapons counterspace weapons in space. If the man Mission Extension Vehicle (MEV) rely on terrestrial systems for command system is dependent on ground com- on-orbit serving satellites can attach and control or for targeting information mands for its operations, this could themselves to a cooperative host sat- derived from SDA networks. These ter- prevent an adversary from sending ellite. They use their propulsion sys- restrial systems and the data networks commands to the weapon. However, tems to maneuver the host satellite to that connect them can be targeted us- for jamming or spoofing of the uplink a new orbit and take over station ing cyberattacks to degrade adversary to be effective, the jammer or spoofer keeping—maintaining position in a space battle management systems. Cy- needs to be within the field of view of desired orbit—for the remainder of berattacks on ground control systems the antenna on the space system that the satellite’s life.83 Docking with an can include denial of service attacks; receives the uplink. This form of de- uncooperative satellite—either with- infiltration of systems for intelligence, fense may not be effective if the adver- out the operator’s consent or where data corruption, and sabotage; or sei- sary counterspace system can carry control has been lost—is more diffi- zure of command and control. These out its mission autonomously or if it cult because the satellite could make attacks can be used to achieve effects has alternative means of communica- unexpected movements, may be tum- such as disrupting communications be- tions, such as using other satellites as bling out of control, or may react to tween counterspace forces and higher communications relays. the docking in unexpected ways if its echelons of command; preventing com- automatic control system remains en- mands from being sent to ASAT weap- Direct-Ascent ASAT gaged. Docking with a satellite under ons in space; covertly degrading or cor- Direct-ascent ASAT weapons can be these conditions may require more rupting SDA data; and taking control of used in a defensive counterspace role