Professional Documents
Culture Documents
Defense Against The Dark Arts in Space
Defense Against The Dark Arts in Space
DEFENSE
AGAINST
THE DARK
ARTS IN
SPACE
Protecting Space Systems from Counterspace Weapons
FEBRUARY 2021
DEFENSE AGAINST
THE DARK ARTS
IN SPACE
Protecting Space Systems from Counterspace Weapons
FOREWORD | Doug Loverro
Thomas J. Pritzker was named chairman of the CSIS Board of Trustees in 2015, suc-
ceeding former U.S. senator Sam Nunn (D-GA). Founded in 1962, CSIS is led by John
J. Hamre, who has served as president and chief executive officer since 2000.
CSIS’s purpose is to define the future of national security. We are guided by a dis-
tinct set of values—nonpartisanship, independent thought, innovative thinking,
cross-disciplinary scholarship, integrity and professionalism, and talent develop-
ment. CSIS’s values work in concert toward the goal of making real-world impact.
CSIS scholars bring their policy expertise, judgment, and robust networks to their
research, analysis, and recommendations. We organize conferences, publish, lec-
ture, and make media appearances that aim to increase the knowledge, awareness,
and salience of policy issues with relevant stakeholders and the interested public.
CSIS has impact when our research helps to inform the decisionmaking of key poli-
cymakers and the thinking of key influencers. We work toward a vision of a safer and
more prosperous world.
CSIS does not take specific policy positions; accordingly, all views expressed herein
should be understood to be solely those of the author(s).
© 2021 by the Center for Strategic and International Studies. All rights reserved.
This study was made possible by the generous support of the Smith Richardson
Foundation and general support to CSIS.
The Aerospace Security Project would also like to recognize J.K. Rowling’s Harry
Potter series, which has greatly inspired our overall design concept, including the
incorporation of its iconography and quotes.
While this report borrows the story and imagery of Harry Potter, we do not share
the author’s discriminatory views. The Aerospace Security Project team and CSIS
support equality and representation for all, including the trans community, and
we strive to create an environment where people of all backgrounds are heard
and included. With the Harry Potter theme, we want to reaffirm some of the values
the characters and stories taught us: friendship, courage, selflessness, and being
true to oneself.
ACKNOWLEDGMENTS
TABLE OF CONTENTS
Foreword..........................................................................................................................................vi
Active Defenses.......................................................................................................................18
Space-Based Defenses.................................................................................................................. 18
Terrestrial-Based Defenses........................................................................................................... 20
TABLE OF CONTENTS
both a crucial advantage of U.S. mili- fare. The “art of war” did not change,
“All armies prefer tary strength and a critical chink in the but its application needed to be amend-
high ground to low, United States’ military armor. The re- ed. So too for space—the philosophical
emergence of antisatellite activities underpinnings are the same as they
and sunny places to around the world, and more specifical- were 2,500 years ago—but applying
dark . . . With regard ly in Russia and China, was not due to those concepts to space conflict re-
sudden technological change but rath- quires the ability to see beyond the
to precipitous er to the rising recognition of the grand concepts and into operational
heights, if you are changing strategic calculus of “what is strategies and capabilities. That work
I
t is hard to imagine that Sun Tzu ever tions of land conflict and the lessons formative and surprising. Conventional
conceived of as “precipitous” a from wars won and lost. Clausewitz wisdom about secrecy and the use of
“height” or as “sunny” a “spot” as and Mahan were similarly able to draw in-space kinetic force to repel attacks
Earth orbit. But it is fascinating to won- upon centuries of battle-tested plans gives way to more nuanced uses of in-
der, if he had, would it have changed his and experiences to derive their own formational methods (domain aware-
perception of how battles would be theories of land and sea strategy and to ness), diplomatic approaches (norms of
use those lessons to advance the state- behavior), cyber intrusion, and the need
fought and how wars could be won. Mil-
of-the-art of doctrine, weapons, and for greater, more thoughtful, and uni-
itary theorists (and science fiction
employment of armed force. Unfortu- versally known resilience methods as
screenwriters) have often resorted to
nately, we have no experience in space superior ways in which to resist attacks.
pronouncements taken from Sun Tzu to
warfare to rely upon—no grand lessons Also of note is that, while the predomi-
explain the basis of their decisions or to
of how force was applied nor even use- nance of discussion around space at-
justify the boldness of their approach.
ful exercises to extend into actual com- tack seems to focus on what would be
But perhaps the true import of Sun Tzu’s
bat. The slate is blank. traditionally termed Phase 2 and 3 hos-
words is to operational commanders on
tilities, the tools that might require
how to best disposition forces and, Certainly, the philosophical elements of
more thought are those that can be em-
more critically, how to identify the route war captured by Sun Tzu, Clausewitz,
ployed below the level and before the
to victory. If that is true, then clearly Mahan, and many others translate from
start of all-out conflict, in the more am-
Russian and Chinese space strategists domain to domain, but often that trans-
biguous and less acute situations that
learned from a different Sun Tzu ad- lation is fuzzy and subject to strategic
are likely to be the rule rather than the
monishment: “So in war, the way is to surprise, especially when technology
exception in space conflict.1
avoid what is strong and to strike at outpaces the application of derived
what is weak.” concepts. The creation of the Maginot It is clear we are in the very early stages
Line can be traced back to the writings of developing the correct application of
CLICK TO
FLY BACK TO
Since the turn of the century, the dou- of Sun Tzu on the superiority of the de- Sun Tzu’s tenets to space combat. And
THE CONTENTS
ble-edged sword that space represents fense but was made technologically ir- since such conflict is unlikely to be a
for U.S. forces has been apparent—it is relevant by the introduction of air war- common occurrence in the foreseeable
CLICK TO
FLY BACK TO
THE CONTENTS
SPACE IS NO
SANCTUARY
T
he United States is increasingly ning of the space age, when early satel- that an attack on these space systems
dependent on space systems for lites began to provide nascent military would be regarded as a prelude to a
economic and military security. capabilities, nations started develop- nuclear attack. The foundation of de-
The expansion of government and ing ways to deny others the military terrence in space was nuclear deter-
commercial space capabilities has benefits of space. In 1959, just two rence on Earth.4
opened markets and made possible years after the launch of Sputnik, the
whole new industries within the United What is different today is that the abili-
United States tested the first anti-satel-
States and around the world. Ride-shar- ty of the United States to deter attacks
lite (ASAT) weapon—a Bold Orion mis-
ing apps such as Uber and Lyft, the ul- in space is in doubt. National security
sile launched from a B-47 bomber.2 The
tra-efficient supply chains of business- space systems are not just used to sup-
Soviets soon followed, beginning tests
es, and the grocery delivery services port nuclear forces, and the U.S. mili-
of a space-based co-orbital ASAT weap-
many depended on during the Covid-19 tary is increasingly dependent on
on system in 1963 and declaring the
pandemic would not be possible with- space systems across the full spectrum
system fully operational by 1973.3
out the U.S. military-operated Global of military operations. Counterterror-
Space was never really a sanctuary.
Positioning System (GPS). Moreover, ism operations in the Middle East use
the global economy depends not just Although space was a contested do- drones enabled by GPS and satellite
on the weather, communications, navi- main from nearly the beginning, none communications (SATCOM) systems to
gation, timing, and remote sensing of the kinetic ASAT weapons developed track and strike high-value targets.
data from space systems but also on by the United States and the Soviet Space-based imagery, signals intelli-
the global reach and power projection Union were ever used in conflict. While gence, and other surveillance systems
capabilities of U.S. and allied militaries the threat of attack was ever present provide real-time global monitoring of
that protect the global commons and during the Cold War, a stable deter- adversary forces that otherwise would
the free flow of global commerce. rence posture developed between the not be possible. And nuclear forces
two superpowers because both U.S. stand watch day and night using many
Space, however, is not a sanctuary. and Soviet national security space sys- of the same satellites to quickly detect
While this pronouncement has become tems were primarily used to support missile launches and ensure the na-
CLICK TO
FLY BACK TO
somewhat cliché among policy ana- nuclear forces. Multiple agreements tional command authority remains
lysts, the history behind this statement
THE CONTENTS
and treaties between the two nations connected before, during, and after a
is often overlooked. Since the begin- formalized a mutual understanding nuclear attack.
THE STATE
economic and mili- and radio frequency (RF) monitoring.
and neglect SpaceX, for example, has disrupted the
tary advantage to the
often do much United States that is launch market with its partially reusable
OF SPACE
more damage not easily replicated Falcon 9 rocket and is now attempting to
than outright by other nations or by disrupt the communications market with
dislike.” its Starlink constellation of satellites. The
TODAY
capabilities in other
domains. In the three Starlink constellation alone now has more
ALBUS DUMBLEDORE,
HARRY POTTER AND THE decades since the operational satellites in orbit than China.7
ORDER OF THE PHOENIX
end of the Cold War,
These disruptions throw into sharp relief
adversaries have tak-
T
the increasingly disordered environment
en note of these advantages. Rather he current space environment is sig- space has become. In many cases, nation-
than fight the U.S. military symmetri- nificantly different than it was during al laws and regulatory frameworks do not
cally, they have invested heavily in the Cold War. Space systems can no fully account for some of the new com-
counterspace weapons designed to longer hide behind the cloak of nuclear mercial space missions being pursued.
degrade, disrupt, and destroy U.S. and deterrence, and the defenses needed for And with few legally binding or enforce-
allied space systems. These counter- space systems must account for how the able international treaties governing
space weapons can hold satellites at space environment is changing. Space is space, some nations and private entities
risk in a crisis and, in conflict, could more diverse, disruptive, disordered, and are pushing the limits on what others may
greatly increase the risks to U.S. forces dangerous than in the past. Space is more see as acceptable behavior in space.
and interests around the world. As diverse because it is no longer dominated Space is also becoming increasingly dan-
Chief of Space Operations General by the United States and Soviet Union. gerous as more nations develop and pro-
John Raymond has made clear, “space While 93 percent of all space launches liferate counterspace capabilities. Recent
is a vital national interest and freedom during the Cold War were by the two su- reports by CSIS, the Secure World Foun-
of action must be preserved. No one perpowers, the majority of launches to- dation, and the Defense Intelligence
wants a conflict in space and deter-
day are by other nations. Moreover, Agency provide an aggregation of publicly
rence is a top priority . . . however, if
roughly 90 percent of satellites launched available information on the develop-
deterrence fails, we must be prepared
in 2020 were commercial rather than gov- ment, testing, and use of counterspace
to fight and win.”5
ernment.6 Space is more disruptive be- weapons by other nations.8 These reports
With the growing U.S. dependence on cause many private companies are pursu- show that while Russia and China contin-
space and the proliferation of coun- ing new space missions, such as on-orbit ue to develop and test a wide range of
terspace capabilities, the natural servicing of satellites and in-space mining counterspace weapons, even some
question for strategists and policy- and manufacturing. Other private firms friendly countries, such as India and
makers is how can space assets be are venturing into space missions that France, are developing their own counter-
protected against such threats? This previously were the exclusive domain of space capabilities in response.
report provides an overview of the
range of protections that can be used
MILITARIZATION VERSUS
to defend space systems from differ-
ent forms of attack and the impact
these defenses can have on deter-
WEAPONIZATION OF SPACE
rence and escalation dynamics. For
space to remain a source of economic
T
and military advantage, the United
States must be able to defend its criti- he increased development and prolifera-
tion of counterspace weapons has led to a
“Always use the proper name for
cal space infrastructure and have inte-
greater focus on space policy issues, specif- things. Fear of a name increases
grated space strategy, doctrine, and
CLICK TO
operational concepts for how to use ically the militarization and weaponization of fear of the thing itself.”
FLY BACK TO
THE CONTENTS
these defenses across the full spec- space. The term “militarization of space” is gen- ALBUS DUMBLEDORE, HARRY POTTER AND THE
SORCERER’S STONE
trum of conflict. erally used to denote the passive use of space
EARTH-TO-SPACE
position, navigation, and timing (PNT); satellites or the sensors they carry, without
WHAT ARE THE EFFECTS?
and other functions to allow terrestrial making physical contact.
A kinetic Earth-to-space weapon produces
forces to operate more effectively and ef- space debris that can affect the safe operation WHAT ARE THE EFFECTS?
ficiently. Space is already militarized and of other satellites in affected orbits. Nuclear Non-kinetic weapons disrupt or degrade the
detonations in space increase the radiation ability of satellites to function properly. They
will remain militarized for the foresee- exposure of other satellites and can significantly can have temporary or permanent effects, but
able future. shorten their lifespan. they do not generally produce orbital debris or
other collateral damage.
HAVE THEY BEEN DEMONSTRATED?
The weaponization of space, in contrast, Earth-to-space kinetic weapons have been HAVE THEY BEEN DEMONSTRATED?
is generally defined as going a step be- tested by the United States, Russia, China, and Multiple nations have demonstrated these
India. The United States and Soviet Union tested capabilities, including Russia, China, Iran, and
yond the mere passive use of space for nuclear weapons in space in the 1960s. others.
military purposes. In Space as a Strate-
EXAMPLES EXAMPLES
gic Asset, Dr. Joan Johnson-Freese notes Co-orbital ASAT, Space-Based Missile Defense Co-orbital Crosslink Jammer,
that “force application is the overt wea- Interceptors Co-orbital High-Powered Microwave
ponization of space, as compared with HOW DO THEY WORK? HOW DO THEY WORK?
A satellite is placed into orbit and maneuvers A satellite is placed into orbit and uses
the de facto weaponization that has oc-
to intercept its target by striking it directly or non-kinetic means (such as a high-powered
curred under the guise of space con- detonating a conventional or nuclear warhead in microwave or jammer) to disrupt the operation
SPACE-TO-SPACE
trol.”9 In 2004, U.S. Air Force doctrine its vicinity. of another satellite.
defined space force application as WHAT ARE THEIR EFFECTS? WHAT ARE THEIR EFFECTS?
A kinetic space-to-space weapon would produce They can degrade, disrupt, or destroy a target
“those forces that deliver kinetic effects space debris that can affect the safe operation satellite without making physical contact,
to, from, or through space,” though this of other satellites in similar orbits. A nuclear producing orbital debris or otherwise affecting
detonation in space would increase the radiation other satellites. The effects can be temporary
definition was removed from the De-
exposure of other satellites and significantly or permanent depending on the form of attack
partment of Defense’s (DoD) dictionary shorten their lifespan. used and the protections on the target
in 2018.10 The U.S. military defines space satellite.
HAVE THEY BEEN DEMONSTRATED?
control to include both offensive and The Soviet Union tested co-orbital kinetic ASAT HAVE THEY BEEN DEMONSTRATED?
weapons repeatedly during the Cold War. No open-source examples could be found of
defensive operations that “ensure free- such a system being demonstrated, although
dom of action in space for the US and its such tests could look like remote proximity
operations to outside observers.
allies and, when directed, to deny an
adversary freedom of action in space.”11 EXAMPLE EXAMPLES
Space-Based Global Strike (e.g., “Rods from God”) Space-Based Downlink Jammer,
Space-Based High-Powered Laser
A variety of other nations and interna- HOW DO THEY WORK?
Weapons are placed in orbit and, when HOW DO THEY WORK?
tional organizations have attempted commanded, deorbit and reenter the atmosphere A satellite equipped with a non-kinetic weapon
to define what constitutes a space to strike a target on the Earth. Damage can be could target forces on Earth, such as a laser
weapon, without much success in inflicted using the kinetic energy of the weapon used to intercept missiles or aircraft in-flight
SPACE-TO-EARTH
itself, or a warhead can be deployed from the or a jammer used to interfere with radars or
reaching a broad consensus. It is use- reentry vehicle (either conventional or nuclear). satellite ground stations.
ful, however, to have a framework for WHAT ARE THEIR EFFECTS? WHAT ARE THEIR EFFECTS?
understanding the types of systems The effects depend greatly on the type of When used, the effects would be localized
warhead used (conventional or nuclear) but to the target area, but such a system could
that could potentially be considered would be like terrestrial-based ballistic missiles theoretically strike anywhere without warning.
space weapons. A prior CSIS report in terms of their ability to hit targets anywhere
HAVE THEY BEEN DEMONSTRATED?
on Earth with little warning.
proposed such a framework for weap- While the U.S. military has contemplated
ons that are either based in space or HAVE THEY BEEN DEMONSTRATED? space-based lasers for boost-phase missile
While the idea of using space-based weapons defense, there are no open-source examples of
CLICK TO
FLY BACK TO are designed to have effects in space.12 for prompt global strike has been contemplated such a system being tested.
THE CONTENTS
SPACE ORGANIZATIONS
based assets, monitoring space ob-
jects, and identifying potential attacks
T
against the Russian homeland from
he organization of national security space capabilities by nations provides space.”18 Russian ASAT capabilities are
insight into how they view this domain from a security perspective. For ex- scattered throughout the military, to
ample, the United States has long maintained a division between military include housing direct-ascent ASAT
space missions conducted by DoD and national intelligence space missions con- programs within the Russian missile
ducted mainly by the National Reconnaissance Office (NRO). Within the U.S. mili- forces and space-based co-orbital
tary, the organization of space forces recently changed with the re-establishment ASAT systems within the Russian
of United States Space Command (USSPACECOM) as a separate unified combatant Space Force.19
command and the creation of the United States Space Force as a new military
service. Like the other military services, the U.S. Space Force is responsible for France has the world’s third-oldest
organizing, training, and equipping space forces for the U.S. military.13 And like space program and a long history in
the other combatant commands, USSPACECOM is charged with using these space space exploration. France’s national
forces to carry out joint space missions and operations and support operations in space agency, Centre National
other domains.14 This reorganization is itself a reflection of how the United States d’Études Spatiales (CNES), manages
has changed its perception of the space domain and the threats posed by other all national civil space programs, and
nations in space. France is a key member in the Europe-
an Space Agency (ESA). While CNES
Like the United States, countries such as China, Russia, France, Japan, and India focuses on civil space programs, the
have changed the way they organize their national security space capabilities. French military contains separate
China’s national security space organizations are part of the People’s Liberation space organizations for national secu-
Army (PLA). Two divisions within the PLA focus on space and counterspace capa- rity. France recently renamed the
bilities: the Strategic Support Force (SSF) and the PLA Rocket Force (PLARF). Cre- French Air Force to the French Air and
ated in 2015, the SSF is responsible for developing and employing China’s military Space Force and announced plans to
space systems as well as its cyber and electronic warfare systems. As one PLA offi- create a Space Command within this
cer noted, the SSF combines into one organization cyber forces for network attack newly renamed organization. France’s
and defense; space forces responsible for communications, reconnaissance, and recent Space Defense Strategy, re-
navigation satellites; and electronic warfare units used for countering adversary leased in 2019, calls for “renewed
radar and communications. This indicates that the PLA views the space domain as analysis of the space environment and
primarily an information domain and a key element of the PLA’s information war- its threats, risks and opportunities”
fare forces.15 and notes that threats in the space do-
main “force our country to revisit its
The primary space focus of China’s SSF appears to be the development, launch,
model in order to remain a leading
and operation of China’s space-based command and control, PNT, and ISR capa-
space power.”20
bilities. The SSF also appears to be leading the development and deployment of
many Chinese counterspace capabilities, but it is unclear if all counterspace capa- While Japan does not yet have signifi-
bilities have been transferred to this organization. It is possible that Chinese di- cant military space capabilities, it is be-
rect-ascent ASAT weapons remain under the control of the PLA Rocket Force, ginning to organize itself for military
CLICK TO
FLY BACK TO which is also responsible for its missile programs.16 However, reports in 2019 indi- space operations. In 2019, Japan creat-
THE CONTENTS
cated that the SSF began training with direct-ascent ASAT missiles capable of tar- ed its Space Domain Mission Unit, a mil-
geting satellites in low Earth orbit (LEO).17 itary organization dedicated to protect-
T
(JAXA), and its U.S. counterparts in cused space organizations—including
his report builds on pri-
USSPACECOM and the U.S. Space Force. the Defence Imagery Processing and “I solemnly
or work of the CSIS
Security swear that
The Space Domain Mission Unit plans to Analysis Centre and the Defence Satel-
Aerospace
Project and expands into I am up to
be fully operational by 2022. Beyond lite Control Centre—will become a part
space technology development and of the DSA. The DSA’s objective is to co- several new areas. Chapter 2 no good.”
planning, the unit will be responsible ordinate among the space assets of the provides a summary of the GEORGE
for operating the satellite ground sta- Indian Air Force, Army, and Navy. Addi- threats to space systems and WEASLEY, HARRY
tions that are critical for Japan’s self-de- tionally, the DSA will be responsible for a taxonomy for discussing POTTER AND THE
PRISONER OF
fense missions. Reports also indicate developing national security space as- different types of counter- AZKABAN
that the Japanese government is con- sets and defending Indian space infra- space weapons. Chapter 3
sidering investing in some combination structure through a new sub-organiza- catalogs the range of active and pas-
of passive and active defenses to pro- tion entitled the Defense Space sive defenses that are theoretically
tect its space assets.21 Research Organization.22 possible and discusses the advantages
and limitations of each. Chapter 4 ana-
lyzes how the defensive capabilities
described in Chapter 3 can be applied
THE NEED FOR SPACE DEFENSES to the different types of counterspace
T
weapons discussed in Chapter 2. Chap-
he recent reorganization and elevation of national security space capabili-
ter 5 explores a range of plausible sce-
ties by each of the world’s major space powers is an indication of the increas-
narios in which defenses may be need-
ing importance these nations place on the use of space for military purposes.
ed, concepts for employing different
In many ways, the 2007 Chinese anti-satellite test served as a wake-up call for
types of defenses, and how defensive
policymakers by highlighting the vulnerabilities of space systems. But since that
actions in space may be perceived by
time, improvements in the defenses of U.S. space systems to the types of counter-
others. The final chapter summarizes
space weapons adversary nations are developing and operationally deploying
conclusions drawn from the analysis,
has been slow and uneven. While U.S. space capabilities remain far ahead of other
actionable recommendations for poli-
nations, some adversaries, namely China and Russia, are arguably making ad-
cymakers, and additional research top-
vances in counterspace weapons faster than the United States is making advances
ics to be explored in future work.
in protections against these threats.
Part of the methodology behind this
Since the 2007 Chinese ASAT test, a variety of studies, exercises, and events have
study is the use of workshops with
highlighted the vulnerabilities of space systems, the far-reaching effects of “a day
space and policy experts to test space
without space,” and the fact that space is a contested warfighting domain. Howev-
crisis scenarios and operational con-
er, the lack of public discourse about how to defend against space threats has led
cepts for space defenses. The CSIS study
some to conclude that space is not defendable and should not be relied upon by
team developed several candidate sce-
the military, with one scholar writing that, “space is an inherently vulnerable and
narios, which are documented in Chap-
offense-dominant domain . . . There simply aren’t many good options for space
ter 5, and presented them to a group of
hardening/defenses.” This scholar goes on to conclude that “the reality is that sat-
experts during two separate half-day
ellites are vulnerable to attack—through both kinetic and non-kinetic means from
online workshops in September 2020.
lasers, electronic warfare, and cyber—and there is no good way to fix this.”23
The workshop participants were asked
The fact that space is contested does not mean that space is undefendable. Rath- to explore the range of defensive space
er, it means that the United States will have to fight to protect its ability to operate capabilities they would consider using
in this domain, just as it does in the air, land, and maritime domains. What is given the situation described in each of
CLICK TO
FLY BACK TO
needed are strategy, doctrine, operational concepts, and technical capabilities the scenarios. The findings from these
THE CONTENTS
that focus on protecting space systems, the services they provide, and the space workshops were used to refine the sce-
environment itself. narios themselves as well as the frame-
CLICK TO
FLY BACK TO
THE CONTENTS
THE DARK
“The Dark Arts are many, varied,
ever-changing and eternal.
Fighting them is like fighting a
many-headed monster, which,
ARTS IN
each time a neck is severed,
sprouts a head even fiercer and
cleverer than before. You are
fighting that which is unfixed,
mutating, indestructible.”
SEVERUS SNAPE, HARRY POTTER AND THE HALF-
BLOOD PRINCE
SPACE
attack are direct-ascent ASAT weap-
ons, co-orbital ASAT weapons, and
ground station attacks. Direct-ascent
ASAT weapons are launched on a
sub-orbital trajectory to strike a satel-
lite in orbit, while co-orbital ASAT
weapons are first placed into orbit
and then later maneuvered into their
intended target. Attacks on ground
A
prerequisite to understanding stations are targeted at the terrestrial
space defenses is understanding sites responsible for command and
what they are intended to de- control of satellites or the relay of sat-
fend against. This chapter provides an ellite mission data to users.
overview and taxonomy for counter-
Kinetic physical attacks tend to cause
space weapons. The high stakes at
irreversible damage to the systems af-
play in the space domain have incen-
fected and demonstrate a strong show
tivized nations to build arsenals of
of force that would likely be attribut-
counterspace weapons to disrupt, de-
able and publicly visible. A successful
grade, or destroy space systems.
kinetic physical attack in space will
Counterspace weapons vary signifi- produce orbital debris, which can in-
cantly in the types of effects they cre- discriminately affect other satellites in
ate, how they are deployed, how easy similar orbits. These types of attacks
they are to detect and attribute, and are one of the only counterspace ac-
the level of technology and resources tions that carries the potential for the
K
needed to develop and field them. inetic physical counterspace loss of human life if targeted at crewed
They can be categorized into four weapons attempt to strike direct- ground stations or at satellites in or-
CLICK TO
FLY BACK TO
broad groups of capabilities: kinetic ly or detonate a warhead near a bits where humans are present, such
THE CONTENTS
physical, non-kinetic physical, elec- satellite or ground station. The three as the International Space Station in
tronic, and cyber. main types of kinetic physical forms of LEO. To date, no country has conduct-
N
ble indicators.25
on-kinetic physical counter-
space weapons have physical ef- The use of a nuclear weapon in space
E
fects on satellites or ground sys- would have large-scale, indiscrimi- lectronic counterspace weapons
tems without making physical contact. nate effects that would be attributable target the electromagnetic spec-
Lasers can be used to temporarily daz- and publicly visible. A nuclear detona- trum through which space sys-
zle or permanently blind the sensors tion in space would immediately af- tems transmit and receive data. Jam-
on satellites, and higher-powered la- fect satellites within range of its elec- ming devices interfere with the
sers can cause components to over- tromagnetic pulse, and it would also
communications to or from satellites
heat. High-powered microwave (HPM) create a high radiation environment
by generating noise in the same radio
weapons can disrupt a satellite’s elec- that would accelerate the degradation
frequency band. An uplink jammer in-
tronics or cause permanent damage of satellite components over the long
terferes with the signal going from
to electrical circuits and processors in term for unshielded satellites in the
Earth to a satellite, such as the com-
a satellite. A nuclear device detonated affected orbital regime. The detona-
mand-and-control uplink. Downlink
in space can create a high radiation tion of nuclear weapons in space is
jammers target the signal from a satel-
environment that has indiscriminate banned under the Partial Test Ban
lite as it propagates down to users on
effects on satellites in all affected or- Treaty of 1963, which has more than
the Earth. Spoofing is a form of elec-
bits. These attacks operate at the 100 signatories, although China and
tronic attack where the attacker tricks
speed of light and, in some cases, can North Korea are not included.26
a receiver into believing a fake signal,
be less visible to third-party observers
Among U.S. competitors, China and produced by the attacker, is the real
and more difficult to attribute.24
Russia appear to have the most devel- signal it is trying to receive. A spoofer
Satellites can be targeted with lasers oped non-kinetic physical ASAT capa- can be used to inject false information
and HPM weapons from ground- or bilities. For example, China has been into a data stream or, in extremis, to is-
ship-based sites, airborne platforms, working on a satellite lasing system sue false commands to a satellite to
CLICK TO
FLY BACK TO
or other satellites. A satellite lasing since at least 2006 when it illuminated disrupt its operations. User terminals
THE CONTENTS
system requires high beam quality, a U.S. government satellite flying over with omnidirectional antennas, such
adaptive optics (if being used through Chinese territory without causing any as many GPS receivers and satellite
W
the GPS encryption because it merely each time.33 In June and October 2008,
hile electronic forms of attack
rebroadcasts a time-delayed copy of hackers also believed to be from China
attempt to interfere with the
the original signal without decrypting attacked NASA’s Earth observation sat-
transmission of RF signals, cy-
it or altering the data.30 The technology ellite, Terra, and this time they “achieved
berattacks target the data itself and the
needed to jam and spoof many types of all steps required to command the sat-
systems that use, transmit, and control
satellite signals is commercially avail- ellite but did not issue commands.”34
the flow of data. Cyberattacks on satel-
able and inexpensive, making them And in September 2014, Chinese hack-
lites can be used to monitor data traffic
relatively easy to proliferate among ers attacked the National Oceanograph-
patterns, intercept data, or insert false
state and non-state actors. ic and Atmospheric Administration’s
or corrupted data in a system. These (NOAA) satellite information and weath-
While Russia and China have advanced attacks can target ground stations, er systems, forcing NOAA to take down
electronic counterspace capabilities, end-user equipment, or the satellites the system and stop transmitting satel-
nations such as Iran and North Korea themselves. While cyberattacks require lite images to the National Weather Ser-
are also developing and using jam- a high degree of understanding of the vice for two days.35
ming and spoofing systems. North Ko- systems being targeted, they do not
rea likely acquired much of its elec- necessarily require significant resourc-
tronic counterspace systems from es to conduct. The barrier to entry is
Russia, and it appears to be gaining relatively low, and cyberattacks can be
operational experience using these contracted out to private groups or in-
systems in peacetime. For example, it dividuals. Even if a state or non-state
frequently uses GPS jamming to inter- actor lacks internal cyber capabilities,
fere with U.S.-South Korean military it may still pose a cyber threat.
exercises and disrupt air and maritime
A cyberattack on space systems can re-
traffic along the border with South Ko-
sult in the loss of data or services being
rea.31 Likewise, the U.S. Department of
provided by a satellite, which could
Transportation issued a warning in
have widespread systemic effects if
2019 about Iranian GPS jamming and
used against a system such as GPS. Cy-
communications spoofing in the Strait
berattacks could have permanent ef-
of Hormuz. Iran is believed to have
fects if, for example, an adversary seizes
placed GPS jammers on an island near control of a satellite through its com-
the entrance to the strait to interfere mand-and-control system. An attacker
with civilian aircraft and ships so that could shut down all communications
CLICK TO
FLY BACK TO they might mistakenly navigate into and permanently damage the satellite
THE CONTENTS
SPACE
“Your defences must therefore be
as flexible and inventive as the
arts you seek to undo.”
SEVERUS SNAPE, HARRY POTTER AND THE HALF-
BLOOD PRINCE
DEFENSES
military systems that the United States
or its allies rely upon. In contrast, the
objective of offensive counterspace op-
erations is to prevent an adversary’s
use of space capabilities and counter-
DEFINED
space weapons to threaten friendly
forces or support its own forces on
Earth.38 These operations can include
reversible or irreversible attacks
against an adversary’s satellites,
ground control systems, communica-
tion links, or the space services provid-
ed by third parties.
COUNTERSPACE
space capabilities against the aggres- degrade, or destroy adversary space
sive space activities of others.36 systems. A gray area that can be inter-
G
is when one nation’s counterspace ca-
iven the wide range of threats and portant start, much work remains to be
pabilities are used to attack an adver-
the proliferation of counterspace done to develop the operational con-
sary’s counterspace capabilities.
capabilities outlined in the previ- cepts and technical capabilities neces-
French minister of armed forces Flor-
ous chapter, the United States and oth- sary to make defensive counterspace ence Parly provided an example of
ers are necessarily placing a greater fo- operations credible and effective. Ex- this in a speech announcing the na-
cus on the ability to identify threats and isting space doctrine and planning tion’s new Space Defense Strategy in
defend space systems from attack. In
guidance state that the objective of de- 2019: “If our satellites are threatened,
2018, the Joint Chiefs of Staff published
fensive counterspace operations is to we will consider dazzling those of our
an update to its space operations doc-
protect friendly space systems from opponents. We reserve the time and
trine, the first update since 2013, which
“attack, interference, and unintention- means of the response: this may in-
noted that:
al hazards” and that these operations volve the use of high-power lasers de-
CLICK TO
FLY BACK TO Whereas earlier space operations inte- can occur “before, during, or after an ployed from our satellites or from our
THE CONTENTS
gration efforts focused primarily on pro- attack.”37 Friendly space systems can patrol nano-satellites.” She went on to
viding capability from space to support include civil, commercial, and foreign make the case that this use of coun-
PASSIVE DEFENSES
international law.”39 Moreover, U.S.
military joint doctrine on space opera-
tions states that “active measures to
P
deceive, degrade, or destroy targeting assive counterspace defenses are measures that can be used to minimize the
systems are examples of defensive op- effectiveness of attacks on friendly space systems by making them harder to
erations.”40 But to neutral third-party target or better capable of withstanding attacks. The passive defenses dis-
observers that do not have access to cussed in this section are divided into three rough categories—architectural, techni-
the same intelligence as the nations in cal, and operational—although it should be noted that some passive defenses could
conflict, a defensive counterspace at- arguably belong in more than one category. Architectural defenses are those that
tack may be indistinguishable from an rely primarily on satellite constellation and ground station architectures that are
offensive counterspace attack. This is more difficult for an adversary to attack. Technical defenses rely primarily on tech-
especially true in a pre-conflict envi- nologies that can be incorporated into satellites, ground stations, and user equip-
ronment where one nation may feel ment that makes the system more difficult to attack. Operational defenses rely pri-
compelled to act preemptively or be- marily on changes in the way satellites are operated to make them more difficult to
fore evidence of an attack has been target, more resistant to attacks, or easier to restore after an attack.
disclosed.
ties, it is intended to provide an over- make attacking the tactical system in a conventional conflict more attractive if the
view of the range of options available risk of strategic escalation is reduced.
Distributed constellations can use dedi- they increase the number of satellites facilities themselves and the local in-
cated satellites that are smaller and less an adversary must successfully attack frastructure on which they depend.
Missile
Warning Radars
Joint Space
International
Operations
Partner Data
Commercial Center
Optical Tracking
Commercial
RF Tracking
Orbit Outlook
difficult trying to characterize what hap- including covert capabilities, based on making the space environment more
pens thousands of miles away, all how these satellites are maneuvered transparent to all users.58
the cause was “almost always self-jam- liberate attacks from HPM and
Space-Based Radio
ming.”59 Commercial firms can play a electromagnetic pulse weapons. The
Frequency Mapping
role in RF mapping and determining the effects can include data corruption on
Space-based RF mapping is the ability sources of interference. For example, memory chips, processor resets, and
to monitor and analyze the RF environ- the private firm HawkEye360 is launch- short circuits that permanently dam-
ment that affects space systems both in ing a constellation of satellites that can age components. One of the first in-
space and on Earth. Similar to exquisite detect and geolocate RF transmis- stances of an on-orbit failure due to
SDA, space-based RF mapping provides sions.60 A key aspect of RF mapping is
space operators with a more complete these effects was the Telstar-1 satellite
timeliness—the faster a threat can be
picture of the space environment, the in 1962, which succumbed to the inten-
detected, identified, and characterized,
ability to quickly distinguish between sified radiation environment in space
the more valuable this information be-
intentional and unintentional interfer- created by a U.S. high-altitude nuclear
comes as an enabler for other defensive
ence, and the ability to detect and geo- test.61 Surrounding the electronics and
capabilities. And like exquisite SDA data,
locate electronic attacks. RF mapping the ability to release information pub- cables within a satellite with shielding
can allow operators to better character- licly or privately on the sources, loca- and adding surge protection devices
ize jamming and spoofing attacks from tions, and nature of jamming incidents throughout the RF and electrical sys-
Earth or from other satellites so that can act as a deterrent to adversaries tem can protect against the effects of
other defenses can be more effectively that would prefer to operate covertly or radiation, high-powered microwave at-
employed. in a more ambiguous or less attribut- tacks, and electromagnetic pulse
Without timely data, it can be difficult to able manner. weapons. However, these protections
distinguish between accidental and in- add weight and complexity to satel-
tentional RF interference. For example, Electromagnetic Shielding lites, and the effectiveness of shielding
CLICK TO
FLY BACK TO the U.S. military experienced an aver- Satellite components can be vulnera- depends on precise manufacturing
THE CONTENTS
age of 23 satellite communications jam- ble to the effects of background radia- processes that must be carefully and
ming incidents per month in 2015, and tion in the space environment and de- laboriously tested and validated.
lites or satellites that are intended for launch; the availability of a AND THE GOBLET tegration with a suitable launch
OF FIRE
commercial use. launch window to the desired vehicle and the weather, range,
ACTIVE DEFENSES
once. A challenge for off-board systems
is that they may not be within the field
of view of the sensors on an incoming
ASAT warhead when and where they are
W
hile passive defenses seek to protect space systems from threats needed. For both onboard and off-
by making them harder to target or better capable of withstand- board systems, their effective operation
ing attacks, active defenses target the threats themselves. As U.S. depends to a certain extent on an accu-
Space Force doctrine notes, active defenses are intended to “destroy, nul- rate characterization and understand-
lify, or reduce the effectiveness of threats holding friendly space capabili- ing of the technical capabilities of the
ties at risk. Although this may entail reactive operations after an adversary has initiat- radar and communication systems on
ed an attack, active defense also includes proactive efforts to seize the initiative once threats before an attack commences.
an attack is imminent.”77 Active defenses can be divided into two broad categories
based on where these defensive systems are based. Space-based defenses include Laser Dazzling or Blinding
onboard systems that are integrated into the satellites they protect and off-board sys- Laser systems can be used
tems that are hosted on separate satellites. Off-board defenses can be used to provide to dazzle or blind the opti-
“zone defense” of multiple satellites or to act as defensive patrols that roam within cal or infrared sensors on
orbital regimes in response to threats. Terrestrial defenses are cross-domain systems an incoming ASAT weapon
based on Earth that target counterspace systems and the systems that support them in the terminal phase of
either on Earth or in space.78 flight. This is similar to the laser infra-
SPACE-BASED DEFENSES
Jamming and Spoofing
A jammer or spoofer can be used to disrupt sensors on an incoming kinetic ASAT
weapon so that it cannot steer itself effectively in the terminal phase of flight. When
used in conjunction with maneuver, this
could allow a satellite to effectively
“dodge” a kinetic attack. Similar systems
could also be used to de-
ceive SDA sensors by altering
the reflected radar signal to change the
location, velocity, and number of satel-
lites detected, much like digital radio fre-
quency memory (DRFM) jammers used
on many military aircraft today. A space-
based jammer can also be used to dis-
rupt an adversary’s ability to communi-
cate with an ASAT weapon.
CLICK TO
FLY BACK TO
THE CONTENTS Bodyguard satellites jam the sensors on an incoming warhead while the target satellite ma-
An onboard jamming and spoofing sys- neuvers to safety.
tem would add weight and power re-
Shoot-Back
Satellites can be equipped with systems
that either fire a physical projectile at an
incoming ASAT weapon or use a
high-powered laser or microwave sys-
tem to have physically destructive ef-
fects, such as overheating or causing
short circuits, on an incoming ASAT
weapon. The number of shots would be
limited by the number of physical pro-
jectiles that could be stored on the sat-
ellite or the power capacity of the satel-
CLICK TO
lite to generate the large amounts of
FLY BACK TO
THE CONTENTS Bodyguard satellites fire projectiles at an incoming warhead while the target satellite ma-
energy needed for successive high-pow- neuvers to safety.
ered laser or microwave bursts. A draw-
MICROSAT-R
ASAT
at highest
altitiude
INDIA
BAY OF BENGAL
CLICK TO
FLY BACK TO
THE CONTENTS
CLICK TO
FLY BACK TO
THE CONTENTS
SPACE
actions and capabilities that are suitable
for a particular situation. While the first
two questions of if and which are mainly
questions of strategy, the question of
how is more a matter of technology and
tactics. How to apply space defenses
against counterspace weapons depends
on many factors, including the type of
DEFENSES
counterspace weapons being used and
the objectives of both the attacker and
the defender—what they hope to achieve
or deny the other side.
APPLIED
This chapter explores a range of objec-
tives the attacker and defender each may
have in a conflict that begins or extends
into space and the suitability of different
types of space defenses in pursuing or
foiling these objectives. The focus in this
discussion is on the space objectives in a
conflict, which are a subset of the overall
objectives each side may have. Impor-
T
hree fundamental questions arise tantly, both the attacker and defender
dependencies are more critical than oth-
when determining how to apply may have multiple objectives in space,
ers. Space defenses could be extended to
space defenses in a conflict. The first and these objectives may evolve over the
non-U.S. government systems to help
question is if defenses should be em- course of a conflict. As objectives change,
reassure allies and commercial firms in a
ployed at all. Using defenses can expose the desirability of different types of space
crisis and deter threats. However, it could
capabilities, tactics, and thresholds for defenses will also shift. This chapter clos-
also lead to the United States being
employment that an adversary can use to es with a summary table showing the po-
drawn in to intervene in a situation that it
its advantage in further engagements. In tential application of the types of space
otherwise might want to avoid.
cases of minor threats or attacks that are defense capabilities discussed in Chap-
reversible and have low consequences, A third key question is how space sys- ter 3 to the types of counterspace threats
the best response may be no response. tems should be defended in terms of the discussed in Chapter 2.
On the other hand, a lack of response may
set precedent, lead to unfavorable norms
for what is acceptable behavior, and con-
strain future decisions about whether a OBJECTIVES OF THE ATTACKER IN SPACE
F
response is warranted.
or the foreseeable future, conflict in space will ultimately be
A second question is which systems about achieving economic and political effects on the ground—
should be defended and the relative pri- just as it is in the air and maritime domains.85 But nations may
orities among them. The U.S. military de- make the decision to begin or extend a conflict into space for many reasons. For
CLICK TO
FLY BACK TO pends on many commercial and allied the purposes of this discussion, the attacker is the actor that initiates the part of a
THE CONTENTS
space systems as well as U.S. govern- conflict that extends to space. The objectives of an attacker in initiating conflict in
ment space systems, and some of these space can include, but are not limited to: inflicting economic harm, signaling re-
OBJECTIVES OF THE
that degrade gracefully, such as distrib-
uted and diversified architectures, and
many types of passive technical defens-
DEFENDER IN SPACE
es that make systems more resistant to
attacks. The defender may want a re-
constitution capability to replace sys-
T
tems during a conflict even if the re-
he way one defends against an attack in space depends in part on
placements may also be lost. It may also
what the defender is trying to achieve or prevent. As in the case of
be desirable to have a rapid deployment
an attacker, a defender’s main concern in a conflict that begins or
capability to bring new capabilities on-
extends into space will likely remain rooted on the ground for the foreseeable fu-
line during the conflict that an adver-
ture. But a nation may have a variety of objectives when it comes to how it chooses
sary may not be expecting, to further
to defend its space capabilities. For the purposes of this discussion, the defender is
complicate its targeting calculus and
defined as the actor that is the target of a potential attack in space. The objectives
supplement systems that are being de-
of a defender can include but are not limited to: deterring conflict in space, buying
graded.
time for operations in other domains to succeed, defeating an attack and restoring
the status quo in space, and permanently degrading an adversary’s space and coun- The defender’s objective could also be
terspace capabilities. Many other variations or combinations of these objectives are to defeat an attack and quickly restore
possible, but these four represent a broad range of objectives that elucidate how space capabilities to full operations. For
different types of defenses may be preferred depending on what a defender hopes example, a defender could attempt to
to accomplish. seize the initiative once an attack ex-
tends into space by quickly degrading
One of the main objectives in building space defenses can be deterrence. An oppo-
the counterspace capabilities of the at-
nent may be deterred from extending a conflict into space if space systems are less
tacker to limit or halt any further at-
vulnerable and the opponent believes it is not likely to achieve its objectives through tacks, potentially using offensive ac-
counterspace attacks. Improved defenses for some space systems could incentivize tions for defensive purposes. In addition
an opponent to attack less protected systems in space or in other domains. An op- to the defensive capabilities previously
ponent is likely to be deterred when the expected costs of a successful attack exceed discussed that are preferred to buy time
the expected benefits. Space defenses can both raise the expected costs and reduce in a conflict, a space counterattack
the expected benefits of beginning or extending conflict into space. But for space could also require a mix of active de-
defenses to act as a deterrent, an opponent must believe that such defenses exist fenses, such as non-kinetic space-based
and that they are effective—even if the opponent does not fully understand what shoot-back systems and terrestrial ki-
they are or how effective they may be. Defenses that rely on secrecy and that cannot netic attacks, to target an adversary’s
be revealed without compromising their operation, such as stealth or the rapid de- counterspace weapons directly. Return-
ployment of previously undisclosed capabilities, are not likely to contribute effec- ing space systems to full operations
tively to deterrence. Some architectural defenses, such as distributed or proliferat- may also require a reconstitution capa-
ed constellations, raise the costs of attacking because many more satellites must be bility to replace systems that experi-
targeted, increasing the time and number of weapons required and the risks of col- enced permanent damage, but recon-
lateral damage and escalation. Diversified systems, many types of technical defens- stitution operations would likely not
es, demonstrated ability to reconstitute, and some active defenses can reduce an begin until the attacker’s counterspace
attacker’s expected benefits for different forms of attack by making their counter- capabilities are neutralized. Kinetic
space weapons less effective. space-based shoot-back systems may
not be desirable because orbital debris
Another objective for space defenses can be to buy time for operations in other do-
could make a return to the status quo in
mains to be effective in determining the outcome of a conflict. For this objective, the
space more difficult if not impossible.
defender will want to focus on limiting disruptions and degradation in space ser-
vices (i.e., space domain mission assurance) as long as possible and may be willing A more ambitious objective for a de-
CLICK TO
FLY BACK TO to accept some losses if they occur gradually.88 The defender could use this time to fender is to permanently shift the bal-
THE CONTENTS
mount offensive attacks in other domains, which could themselves be dependent ance of power in space, ensuring that
on space capabilities. If the objective is to buy time and weather an attack, the de- when a conflict subsides the aggressor
Another complicating factor in space, which arises in the cyber domain and in the
use of remotely piloted aircraft, is that proportionality, including when certain de-
fensive measures are warranted, can be difficult to ascertain when human lives are
not directly at risk. Proportionality is highly dependent on the context of a situation,
and that context can be difficult to understand in a timely manner in a remote envi-
ronment such as space. At present, all military space systems are remotely operated
and an attack on a satellite does not risk the direct loss of human life, with few ex-
ceptions. But some of the defensive options available, particularly kinetic attacks
on terrestrial counterspace facilities, could put humans lives at risk. It is difficult to
weigh proportionality when the risks for one side involve loss of property or critical
infrastructure and the risks for the other side involve loss of life.
It can also be difficult to discern the intent of an attack in space from the effects
created. For example, a defender may not be able to tell if a lasing event that blind-
ed an imagery satellite was only intended to temporarily dazzle its sensors. And it
may not be clear if an attack against a satellite used for both nuclear and conven-
tional missions is a prelude to nuclear escalation. Policymakers therefore need a
range of defensive options available to provide decision space as a crisis evolves
rather than singular or formulaic solutions.
The following table is a crosswalk between the different types of defenses discussed
in Chapter 3 and the different categories of threats presented in Chapter 2. It pro-
vides a brief description of the desired effects from each type of defensive capability
(if it is used successfully) and indicates the categories of threats for which it is poten-
tially applicable. Importantly, a particular type of defense may only be applicable to
a subset of the threats possible within a given category. For example, filtering and
shuttering would help protect an imagery satellite against laser dazzling and
blinding, but it would not protect against other types of non-kinetic physical threats,
CLICK TO
FLY BACK TO such as high-powered microwave weapons.
THE CONTENTS
Increases the number of satellites that must be successfully attacked to achieve the same effects and
Distributed Constellations
makes the system less dependent on any one satellite.
Increases the number of satellites that must be successfully attacked to achieve the same effects and
Proliferated Constellations
provides extra capacity in case systems are degraded.
Reduces the incentive to attack space systems because missions are supported by systems in other orbital
Diversified Architectures
regimes/domains that can be used to compensate.
Redundant, Mobile, or
Makes space systems less vulnerable to attacks on any single ground site.
Hardened Ground Stations
Exquisite Space Domain Improves the effectiveness of other defenses and potentially dissuades an adversary from attacking through
Awareness attribution and the potential for public disclosure.
Space-Based Radio Improves ability to detect, attribute, and respond to electronic and high-powered microwave attacks, poten-
PASSIVE DEFENSES
Frequency Mapping tially dissuades an adversary from attacking through attribution and the potential for public disclosure.
Electromagnetic Shielding Hardens satellites against high-powered microwave and electromagnetic pulse weapons.
TECHNICAL
Filtering and Shuttering Protects against high-powered lasers that can blind or dazzle the sensors on satellites.
Jam-Resistant Waveforms Improves the resistance of radio frequency signals to jamming and spoofing.
Reconstitution Reduces the amount of time a system may be offline after an irreversible attack.
Maneuver Enables satellites to move out of the trajectory and sensor range of direct-ascent or co-orbital ASAT weapons.
Stealth Makes satellites difficult to detect and track for kinetic and non-kinetic forms of attack.
Disrupts the radar on an incoming ASAT weapon or on adversary SDA systems to prevent accurate targeting
Jamming and Spoofing
of space systems, can also disrupt downlink communications from adversary space systems.
SPACE-BASED
Blinds the optical or infrared sensors on an incoming ASAT weapon or on SDA systems to prevent accurate
Laser Dazzling/Blinding
targeting of space systems.
ACTIVE DEFENSES
Shoot-Back Fires a projectile or directed energy weapon to physically disable an incoming ASAT weapon.
Physical Seizure Physically grabs a threatening space object to disable or move it.
TERRESTRIAL-BASED
Cyberattacks Targets the terrestrial systems and SDA networks that support counterspace weapons.
Jamming and Spoofing Disrupts adversary command and control of counterspace weapons.
Air, Sea, and Physically damages or destroys counterspace systems and support infrastructure on Earth.
Land Kinetic Attacks
SCENARIO 1
in crisis situations, the study team de- scenarios themselves. The sections be-
veloped four hypothetical scenarios. low provide a description of the scenari-
The scenarios range from outright ag- os, the questions asked of the partici-
gression in space to the perhaps more pants, and some of the key findings from
the expert discussions that followed
RUSSIAN INCURSION
likely yet uncertain scenarios with low
attribution or reversible effects.
each scenario. The scenarios are inten-
tionally openended and designed to pro-
INTO THE BALTICS
The scenarios were presented to a voke discussion about how best to re- PART A:
group of space and national security ex- spond and whether certain defensive
ESCALATING TENSIONS
A
perts in a series of workshops to under- capabilities would be useful as part of a
mid renewed concerns about the
stand how policymakers might use response. They are set in the near future
North Atlantic Treaty Organiza-
space defenses in different situations. to allow for some changes in the world,
tion (NATO) moving to create per-
The workshops were conducted on a but not so far in the future as to allow
not-for-attribution basis. During the great leaps in technology. Scenarios 1 manent bases for the Enhanced For-
workshops, participants were present- and 3 are divided into two parts, where ward Presence (EFP) forces in the
ed with questions at the end of each the second part builds on the informa- Baltics, Russian president Vladimir Pu-
scenario or part of a scenario to assess tion provided in the first part. Otherwise, tin decides he must push back against
their interpretation of the events posit- the four scenarios are assumed to occur further NATO consolidation. Unlike in
CLICK TO
FLY BACK TO ed and possible actions to defend independent of one another. While the the case of Crimea, Putin recognizes
THE CONTENTS
against perceived attacks. Participants scenarios are designed to be realistic, the that the Baltic states are part of NATO
were also asked to assess options to es- specific events, locations, capabilities, and that all NATO states have a treaty
After claiming the Lithuanian blockade AEHF 5 and in a position where it inter- Questions for Participants:
is an act of aggression, Russia begins a mittently physically blocks the AEHF
cyberattack on the Lithuanian terrestri- crosslink to other satellites. This sig- • Is the Russian SATCOM jamming or
al telecommunications networks, effec- nificantly degrades the ability of AEHF 5 the positioning of the AM7 satellite to
tively bringing them down. Russia also to perform its missions because of the block AEHF crosslinks in this scenar-
jams all satellite communications (SAT- time it takes for the network ring io an act of aggression, a use of force,
COM) into the country, including all mil- among satellites to be reestablished or an armed attack?
itary and NATO communications other each time it is disrupted. The impact to
than the protected Advanced Extremely • What are your diplomatic and informa-
nuclear command and control is not
High Frequency (AEHF) SATCOM. The tional options (public and private), and
publicly disclosed. U.S. DoD and intelli-
United States and NATO grow more what are the pros and cons of each?
gence analysts conclude this was an
alarmed, and leaders call a formal meet-
intentional act, but the Russians claim • What are the pros and cons of differ-
ing of the North Atlantic Council.
they had no control of the satellite. ent responses in space?
As these discussions begin, the Russian ◊ Maneuver the AEHF 5 satellite un-
To respond, U.S. controllers could repo-
Federal Communications Agency der the guise of using an “abun-
sition AEHF 5 away from the Russian sat-
(Rossvyaz) announces the movement dance of caution” to protect
ellite so that the crosslinks to other sat-
of one of its civilian communications against a possible in-space colli-
ellites are no longer blocked, but leaders
satellites in GEO, Ekspress AM7, from its sion, though this will break the
slot at 40°E to a new slot at 53°E, re- are concerned that this would affirm for
the Russians (and others) that the nu- nuclear command and control
placing Ekspress AM6.89 During transit,
clear command and control network is link for several additional days.
Rossvyaz announces that it has lost
control of the satellite, which is now being disrupted. U.S. leadership is con- ◊ Coordinate with the AM7 satellite
continuing its eastward drift directly cerned that the Russian action is an im- manufacturer to surreptitiously
into the path of the United States’ AEHF plicit warning that the United States has gain control of the satellite in a
CLICK TO
FLY BACK TO 5 satellite at 54°E. Rossvyaz is finally much to lose in space and in other do- collaboration between USSPACE-
THE CONTENTS
able to stop the satellite’s drift, but by mains if it actively opposes Russia’s COM and U.S. Cyber Command
that time it is dangerously close to moves in the Baltics. (USCYBERCOM).
what happened, since no other na- all GPS satellites away from the function properly).
tions or private firms actively monitor space mines but recognize that ◊ Others?
SCENARIO 2
west out of control. The U.S. Combined
Space Operations Center (CSpOC) cal-
culates that it will pass close to SBIRS
GEO-1, a U.S. military missile warning
satellite, although the likelihood of col-
T
board SupremeSat-2 will begin to inter-
he United States and its allies are increasingly concerned that more nations,
fere with the SBIRS communications
especially those in Asia, are turning to China as their supplier of choice for
payload as it drifts closer. The likely con-
space systems. In many cases, the Chinese have provided a complete turn-key
sequence is that SBIRS GEO-1 will be un-
system along with financing that is extremely attractive to less affluent nations. As a
able to conduct its mission reliably for
result, some 10 percent of all GEO satellites in operation are now Chinese made. In
up to a week as SupremeSAT-2 passes.
line with these trends, Sri Lanka recently replaced its first satellite, SupremeSAT-1,
This week happens to fall near the peak
with the Chinese-built SupremeSAT-2, a very high-powered C, Ku, and Ka- band
of the planned Chinese military exercise
communication satellite located at 87.5°E longitude.
in the region covered by SBIRS GEO-1.
In the last six months, two different Chinese-built satellites experienced uncon- The annual Chinese strategic forces ex-
trolled commanding events. Despite their best efforts, the satellite operators have ercise involves the launch of multiple
CLICK TO
FLY BACK TO not been able to regain control of these satellites. Both were communication satel- missiles and other strategic military sys-
THE CONTENTS
lites launched in the last five years, and both are now drifting relatively harmlessly tems the SBIRS satellite would normally
around the GEO belt. The communications payloads on the satellites are active and observe.
SCENARIO 3
satellite.
◊ Maneuver two other SBIRS satel-
lites into new positions to “pinch”
the hole between them to recover
coverage of most of the area that
ESCALATING TENSIONS IN
will be affected.
◊ Do nothing so as not to admit that
J
wish you had? ust years after China declared its BeiDou navigation system fully operational, Bei-
◊ Laser crosslinks or other backup Dou has now been adopted by dozens of neighboring Asian nations as their pre-
communications channels for mis- ferred navigation system, due in no small part to Chinese Belt and Road Initiative
sile warning capabilities to provide incentives. After years of high-profile U.S. sanctions on Chinese technology companies
diverse communications options. and the repeated refusal of the U.S. Federal Communications Commission (FCC) to ap-
prove BeiDou use in the United States, the Chinese have reached a breaking point.
CLICK TO
FLY BACK TO ◊ More distributed and proliferated
THE CONTENTS
missile warning capabilities such as China declares that GPS navigation products are tools of the U.S. military and can no
commercially hosted payloads and longer be used within Chinese territory, including its disputed maritime and air space
As tensions further escalate, U.S. space tracking of U.S. GEO satellites. as Galileo, BeiDou, and GLONASS,
surveillance systems detect several ◊ Prepare maneuver plans for all would have been useful in this situa-
SCENARIO 4
within close proximity to the first DirecTV
satellite, it begins to experience signifi-
cant interference. Over the course of the
next few days, DirecTV loses all contact
with the satellite. Telemetry streams in-
COMMERCIAL SPACE
dicate that the front-end low noise am-
plifier on the receiver side was highly sat-
urated (overloaded) as one of the
SYSTEM PROTECTION
Shamshir satellites approached, and it
eventually burned out the amplifier.
H
ostilities between the United States and Iran have once again been flaring lites in this orbital slot are non-opera-
up over Iran’s nuclear program. New, more onerous sanctions are taking tional. DirecTV maintains robust on-or-
their toll on the Iranian economy, and Iran has promised strong retaliation. bit spares, with a second set of 3
Iran is now a player in the space domain as well, and it succeeds in launching two satellites at 102.8°W, but the loss of
small satellites into GEO with the help of Russia and China. Iran claims these sat- their fleet at 99.2°W significantly im-
ellites are for experimental purposes. A close inspection by U.S. GSSAP inspector pacts DirecTV customers. As the Sham-
satellites reveals two large, high- shir satellites begin a second drift to-
Field of View ly directional antenna dishes on ward the 102.8°W orbital slot, Iran
100° W the satellites, which seem more informs the United States that it will
consistent with a co-orbital jam- continue to attack U.S. commercial
ming capability. broadcast satellites unless the U.S.
sanctions are lifted. The Super Bowl is
Uplink In recent months U.S.
next week, and the loss of these last
Footprint broadcasts of Radio
three satellites will impact millions of
Shamshir-1 Farda, the Iranian branch of Ra-
North American customers.
dio Free Europe, has suffered
country-wide outages in Iran. Current intelligence indicates that the
USSPACECOM and the U.S. Intel- satellites are being controlled from a
CLICK TO
FLY BACK TO ligence Community suspect that high-powered base station in Venezue-
THE CONTENTS
the Iranian satellites, nicknamed la. The United States judges that it could
“Shamshir” (after a type of Per- likely jam the uplink, but this would re-
◊ Request assistance from USSO- KEY TAKEAWAYS tempting to breach the perimeter of a
Throughout the workshops, several dif- military base is an appropriate and jus-
COM to deploy a team to physical-
ferent operational concepts were con- tifiable use of military force. But it is not
ly sabotage the ground station in
sidered and discussed among experts widely accepted that similar capabili-
Venezuela.
on how best to protect U.S. assets from ties in space, such as a kinetic shoot-
◊ Assist DirectTV in tracking the back system, can be used to stop anoth-
counterspace attacks. It was widely
Shamshir satellites, and provide er nation’s satellite from closely
agreed that no single defensive concept
maneuver and antenna pointing would be sufficient to protect against all approaching a military satellite. While
options that would prevent dam- counterspace attacks. Therefore, the close approaches occur in the air do-
age but would also take the Di- U.S. government needs multiple con- main, such as aircraft from one nation
CLICK TO recTV satellites out of service cepts of operation and defensive capa- flying dangerously close to U.S. aircraft
FLY BACK TO
THE CONTENTS
while the actions are underway. bilities to provide a wide range of op- operating in international airspace, a
◊ Other options? tions to decisionmakers in a crisis. key difference is that in the air domain
CONCLUSIONS AND
RECOMMENDATIONS
T “Numbing of modernizing many of its key
he United States maintains a between satellites intended for different
distinct strategic advantage satellite constellations. The deci- missions or may not trust this distinc-
the pain
in space. While China and sions made over the coming tion. Disaggregation of strategic and tac-
Russia have significant space ca-
for a months and years about what tical missions may also make attacking a
pabilities of their own, the main while will types of space architectures to tactical system more attractive because
security challenge they pose in make it field and which defenses to incor- it reduces the risk of strategic escalation.
space is the wide array of counter- worse porate will have repercussions for
Technical types of passive defenses,
space weapons they continue to when you the life of these systems. As this
such as electromagnetic shielding,
develop, test, and proliferate. Rus- finally report demonstrates, a wide
jam-resistant waveforms, and antenna
sia and China are arguably making feel it.” range of active and passive de-
nulling, can make systems more diffi-
advances in counterspace weap- fenses are available to protect
ALBUS cult to attack and can limit the degra-
ons faster than the United States is DUMBLEDORE, space systems and the ground in-
dation in capabilities that occurs
improving its defenses against HARRY POTTER frastructure they depend upon
during an attack. The main downside
these threats. While the public dis- AND THE from different types of threats.
GOBLET OF for technical defenses is that they can
course about the threats to space FIRE
Space defenses can be organized add cost, weight, and complexity to
systems—not just from Russia and systems. Space domain awareness,
into three categories of passive defenses
China but also from lesser powers such particularly from space-based systems,
(architectural, technical, and operation-
as North Korea and Iran—has become stands out as particularly important
al) and two categories of active defenses
more prominent in recent years, the lack because it is helpful across a wide vari-
(space-based and terrestrial-based).
of a concurrent discussion about how to ety of scenarios and is a key enabler
Among the architectural passive defens-
defend space systems against these that makes many other types of space
es explored in this study, one of the key
threats has left some to incorrectly con- defenses more effective. The need to
takeaways is that distributed, diversified,
clude that space is not defendable. improve space domain awareness ca-
and proliferated constellations can all be
pabilities was a consistent theme
Given the myriad of defensive options used in various combinations to compli-
throughout the workshops conducted
available, the question facing policy- cate the targeting calculus of an adver-
as part of this study.
makers is not whether space is defend- sary and reduce the benefits of attacking
able but rather which defenses the mili- any single satellite. Disaggregating space Operational passive defenses, such as
tary should be investing in and how missions to separate platforms may re- satellite maneuver, stealth, deception,
CLICK TO
FLY BACK TO they should be employed. This conver- duce the risks of miscalculation and in- and decoys, can be used to make satel-
THE CONTENTS
sation is especially important now be- advertent escalation in a conflict, but an lites difficult to find, track, and target.
cause the U.S. military is in the process adversary may not be able to distinguish Rapid deployment can be used to
where he was a senior fellow for defense budget studies. He previously worked at
Booz Allen Hamilton, where he consulted for the U.S. Air Force on satellite commu-
nications systems and supported a variety of other clients evaluating the perfor-
mance of acquisition programs. Prior to Booz Allen, he worked for AeroAstro Inc.
developing advanced space technologies and as a management consultant at Dia-
mond Cluster International. Mr. Harrison served as a captain in the U.S. Air Force
Reserves. He is a graduate of the Massachusetts Institute of Technology with both a
BS and an MS in aeronautics and astronautics. Mr. Harrison is a proud member of
Gryffindor House.
Kaitlyn Johnson is deputy director and fellow of the Aerospace Security Proj-
ect at the Center for Strategic and International Studies. Ms. Johnson manages
the team’s strategic planning and research agenda. Her research specializes in
topics such as space security, military space systems, commercial space policy,
and U.S. air dominance. Previously, Ms. Johnson has written on national security
space reorganization, threats against space assets, the commercialization of
space, escalation and deterrence dynamics, and defense acquisition trends. Ms.
Johnson holds an MA from American University in U.S. foreign policy and national
security studies, with a concentration in defense and space security, and a BS
from the Georgia Institute of Technology in international affairs. Ms. Johnson is a
proud member of Slytherin House.
Makena Young is a research associate with the Aerospace Security Project at the
Center for Strategic and International Studies (CSIS). Her research interests include
international collaboration, space security, and orbital debris. Prior to joining CSIS,
Ms. Young worked for the Federal Aviation Administration as an aerospace engineer,
focusing on automatic dependent surveillance-broadcast certification and integra-
tion in small aircraft. She holds a BS in aeronautical and astronautical engineering
from Purdue University with minors in international relations and environmental
engineering. Ms. Young is a proud member of Hufflepuff house.
CLICK TO
FLY BACK TO
THE CONTENTS
CLICK TO
17 Harrison et, al., Space Threat Assessment 2020, 11.
FLY BACK TO
THE CONTENTS
18 Ibid., 25.
19 There is not one perfect source for determining where Russian counterspace
CLICK TO
FLY BACK TO
THE CONTENTS