Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sources : Electronic and Cyber Warfare in Outer Space ...
- 1 For debates within India, for instance, see R.P.Rajagopalan, “India’s Changing Policy on Space Militarization: The
- Impact of China's ASAT Test”, India Review, vol. 10, no. 4, 2011, pp. 354–378.
- 2 R.P. Rajagopalan, “Having Tested its ASAT Capability, India Should Help Shape Global Space Norms ”, ORF
- Commentaries, 29 March 20
- 3 Foreword by Gen.J.P. Jumper, Chief of Staff, US Air Force, Air Force Doctrine Document 2-2.1, 2 August 2004.
- 4 J.B. Sheldon, “Threats to Security in Space from Counter-Space Technologies”,ASEAN Regional Space Security
- Workshop, Hoi An, Vietnam, 6–7 December 2012, http://aseanregionalforum.asean.org/files/Archive/20th/
- ARF%20Workshop%20on%20Space%20Security,%20Hoi%20An,%206-7December2012/Annex%205%20-
- %20Space%20Security.pdf.
- 5 Air Force Doctrine Document 1, Air Force Basic Doctrine, September 1997, p. 47.
- 6 For a good account on the US and Soviet Cold War space competition, see T.Brown, “The American and Soviet Cold
- War Space Programs”, Comparative Strategy, vol. 30, no. 2, 2011, pp. 177–185.
- 7 B. Weeden and V. Samson (eds), Global Counterspace Capabilities: An Open Source Assessment, Secure World
- Foundation, April 2018, https://swfound.org/media/206118/swf_global_counterspace_april2018.pdf.
- 8 It should be noted that India focuses more on its space race with China than China does,since China sees itself in
- competition with the United States. But there are elements of mutual competition such as undertaking Moon and
- Mars missions.
- 9 T. Harrison, K.Johnson and T.G.Roberts, Space Threat Assessment 2018, Center for International and Strategic
- Studies, April 2018, https://csis-prod.s3.amazonaws.com/s3fs-public/publication/180823_Harrison_SpaceThreat
- Assessment_FULL_WEB.pdf.
- 10 B.S. Kuplic, “The Weaponization of Outer Space: Preventing an Extraterrestrial Arms Race”,North Carolina Journal
- of International Law and Commercial Regulation, vol. 39, no. 4, 2014, https://scholarship.law.
- unc.edu/cgi/viewcontent.cgi?referer=https://www.google.co.in/&httpsredir=1&article=2011&context=ncilj.
- 11 It should be noted that a space system can come under attack in five different segments: launch, the control
- segment, the up-down link segment, the user segment and the space segment. John B. Sheldon, “Threats to Security
- in Space from Counter-Space Technologies,” ASEAN Regional Space Security Workshop, Hoi An, Vietnam, 6–7
- December 2012,
- http://aseanregionalforum.asean.org/files/Archive/20th/ARF%20Workshop%20on%20Space%20Security,%20Hoi%20
- An,%206-7December2012/Annex%205%20-%20Space%20Security.pdf
- 12 J.B. Sheldon, “Threats to Security in Space from Counter-Space Technologies”,ASEAN Regional Space Security
- Workshop, Hoi An, Vietnam, 6–7 December 2012, http://aseanregionalforum.asean.org/files/Archive/20th/
- ARF%20Workshop%20on%20Space%20Security,%20Hoi%20An,%206-7December2012/Annex%205%20-
- %20Space%20Security.pdf
- 13 US Department of Defense, “DOD Dictionary of Military and Associated Terms”,Defense Technical Information
- Center, September 2018, http://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf?ver=2018-09-28-
- 100314-687.
- 14 B. Weeden: “Two points: 1) this is all about civil GPS signals (military signals are much more robust) 2) the DOD
- could have done more to prevent spoofing of civil GPS, but has not 3) Galileo, BeiDou & QZSS will all help, but not
- prevent it completely (see #2)”, 18 December 2018, https://twitter.com/brianweeden/status/1074787323357876229.
- 15 L. Bonner, “Defending Our Satellites: The Need for Electronic Warfare Education and Training”,Air & Space Power
- Journal, November–December 2015, https://www.airuniversity.af.mil/Portals/10/ASPJ/journals/Volume-29_Issue6/SEW-Bonner.pdf.
- 16 Ibid.; T.Harrison, K.Johnson and T.G.Roberts, Space Threat Assessment 2018, Center for International and Strategic
- Studies, April 2018, https://csis-prod.s3.amazonaws.com/s3fs-public/publication/180823_Harrison_SpaceThreat
- Assessment_FULL_WEB.pdf.
- 17 Ibid.
- 18 K. Grover, A. Lim, and Q. Yang, “Jamming and Anti-Jamming Techniques in Wireless Networks: A Survey”,
- International Journal of Ad Hoc and Ubiquitous Computing, vol. 17, no. 4, http://www.cs.montana.edu/yang/
- paper/jamming.pdf
- 19 B. Sutherland, “Militarising Space”, in B. Sutherland (ed.), Modern Warfare, Intelligence and Deterrence: The
- Technologies That Are Transforming Them, 2014, pp. 142–143;P.C. Saunders and C.D. Lutes, “China’s ASAT Test
- Motivations and Implications”,National Defense University, Institute for National Strategic Studies, Washington DC,
- 2007, http://www.dtic.mil/dtic/tr/fulltext/u2/a517485.pdf; P.C. Saunders, “China’s Future in Space: Implications for
- US Security”, Space.com, 24 May2005, http://www.space.com/1116-chinasfuture-space-implications-security.html.
- 20 See R.D. Fisher Jr., “China’s Progress with Directed Energy Weapons”,testimony before the US–China Economic and
- Security Review Commission, 23 February 2017, https://www.uscc.gov/sites/default/files/Fisher_Combined.pdf.
- 21 See V. Muradian, “China Tried to Blind US Sats with Laser”,Defense News, 25 September 2006, https://www.ar15
- .com/forums/general/Chi-na_Tried_To_Blind_U_S__Sats_With_Laser/5-501978/.
- 22 See F. Harris, “Beijing Secretly Fires Lasers to Disable US Satellites”, The Telegraph, 26 September 2006,
- https://www.telegraph.co.uk/news/worldnews/1529864/Beijing-secretly-fires-lasers-to-disable-US-satellites.html
- 23 See “BBC Fears Iranian Cyber-Attack over Its Persian TV Service”, The Guardian, 14 March2012,
- http://www.theguardian.com/media/2012/mar/14/bbc-fears-iran-cyber-attack-persian; P.Horrocks, “Stop Blocking
- Now”, BBC News, 14 June2009, http://www.bbc.co.uk/blogs/theeditors/ 2009/06/stop_the_blocking_now.html.
- 24 See S. Peterson and P. Faramarzi, “Exclusive: Iran Hijacked US drone, Says Iranian Engineer”, The Christian Science
- Monitor, 15 December 2011, https://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-USdrone-says-Iranian-engineer. In another specific incident reported by Christian Science Monitor in 2011, according to
- an unnamed European intelligence source, Iran had “managed to ‘blind’ a US satellite by ‘aiming a laser burst quite
- accurately’”; see T. Harrison, K. Johnson and T.G. Roberts, Space Threat Assessment 2018, Center for International and
- Strategic Studies, April 2018, p. 32, https://csis-prod.s3.amazonaws.com/s3fspublic/publication/180823_Harrison_Space Threat Assessment_FULL_WEB.pdf.
- 25 “DPRK Jamming GPS Signals, says Seoul”,North Korea Tech, 3 May 2012, http://www.northkoreatech.org/2012/05/
- 03/dprkjamming-gps-signals-says-seoul/; “‘North Korea Jamming’ Hits South Korea Flights”,BBC News, 2 May 2012,
- http://www.bbc.com/news/world-asia-17922021; S.Waterman, “North Korean Jamming of GPS Shows System’s
- Weakness”, The Washington Times, 23 August 2012, http://www.washingtontimes.com/news/2012/aug/23/
- northkorean-jamming-gps-shows-systems-weakness/?page=all.
- 26 See T. Harrison, K. Johnson and T.G. Roberts, Space Threat Assessment 2018, Center for International and Strategic
- Studies, April 2018, https://csis-prod.s3.amazonaws.com/s3fs-public/publication/180823_Harrison_Space Threat
- Assessment_FULL_WEB.pdf; A.Mathew, “Russia Completes Development of Airborne Anti-satellite Laser Weapon”,
- DefPost, 26 February2018, https://defpost.com/russia-completes-development-airborne-anti-satellite-laserweapon/; D.Cenciotti, “Russia Has Completed Ground Tests of Its High-Energy Airborne Combat Laser System”, The
- Aviationist, 5 October 2016, https://theaviationist.com/2016/10/05/russia-has-completed-ground-tests-of-its-highenergy-airborne-combat-laser-system/; “The Russian Plane with Laser Weapons Successfully Passed the Ground
- Tests”, (Russian media), October 5, 2016 (only available in Russian),
- https://tvzvezda.ru/news/opk/content/201610051309-vplh.htm
- 27 See T. Harrison, K. Johnson and T.G. Roberts, Space Threat Assessment 2018, Center for International and Strategic
- Studies, April 2018, https://csis-prod.s3.amazonaws.com/s3fs-public/publication/180823_Harrison_Space Threat
- Assessment_FULL_WEB.pdf
- 28 See “Source Reveals Tech Details of New Russian Anti-Satellite Warfare Plane”, Sputnik, 9 July 2018,
- https://sputniknews.com/military/201807091066176858-russia-electronic-warfare-plane-satellites/.
- 29 “Cybersecurity and the New Era of Space Activities”, Council on Foreign Relations, 3 April 2018,
- https://www.cfr.org/report/cybersecurity-and-new-era-space-activities; G. Falco, “Job One for Space Force: Space
- Asset Cybersecurity”, Belfer Center for Science and International Affairs, July 2018, https://www.belfercenter.org
- /sites/default/files/files/publication/CSP%20Falco%20Space%20Asset%20-%20FINAL.pdf/.
- 30 K. Pollpeter, “Testimony Before the US-China Economic and Security Review Commission: Hearing on China’s
- Advanced Weapons”, CNA, February 2017, https://www.cna.org/CNA_files/PDF/CPP-2017-U-014906-Final.pdf;
- D. Coats, “Statement for the Record—Worldwide Threat Assessment of the US Intelligence Community”,Office of the
- Director of National Intelligence, 13 February2018, https://www.dni.gov/files/documents/Newsroom/Testimonies
- /2018-ATA---Unclassified-SSCI.pdf.
- 31 J.R. Clapper, statement before the US Senate Select Committee on Intelligence, “Worldwide Threat Assessment of
- the US Intelligence Community, Senate Select Committee on Intelligence”, 9 February 2016, https://www.dni.gov
- /files/documents/SSCI_Unclassified_2016_ATA_SFR%20_FINAL.pdf.
- 32 T. Harrison, K. Johnson and T.G. Roberts, Space Threat Assessment 2018, Center for International and Strategic
- Studies, April 2018, https://csis-prod.s3.amazonaws.com/s3fs-public/publication/180823_Harrison_Space Threat
- Assessment_FULL_WEB.pdf
- 33 A. Gini, “Cyber Crime from Cyber Space to Outer Space”, Space Safety Magazine, 14 February2014,
- http://www.spacesafetymagazine.com/aerospace-engineering/cyber-security/cyber-crime-cyber-space-outer-space/;
- T. Harrison, K. Johnson and T.G. Roberts, Space Threat Assessment 2018, Center for International and Strategic
- Studies, April 2018, https://csis-prod.s3.amazonaws.com/s3fs-public/publication/180823_Harrison_Space Threat
- Assessment_FULL_WEB.pdf.
- 34 R. Santamarta, “A Wake-up Call for SATCOM Security”, Technical White Paper, IOActive, 2014,
- http://www.ioactive.com/pdfs/IOActive_SATCOM_Security_WhitePaper.pdf.
- 35 R. Pollock, “These Are The Hacker Groups Everyone Is Watching Right Now”, The Daily Caller, 9 July 2015,
- http://dailycaller.com/2015/07/09/these-are-the-hacker-groups-everyones-watching-right-now/.
- 36 B. Weeden and V. Samson (eds), Global Counterspace Capabilities: An Open Source Assessment, Secure World
- Foundation, April 2018, https://swfound.org/media/206118/swf_global_counterspace_april2018.pdf.
- 37 A. Gini, “Cyber Crime from Cyber Space to Outer Space”, Space Safety Magazine, 14 February 2014,
- http://www.spacesafetymagazine.com/aerospace-engineering/cyber-security/cyber-crime-cyber-space-outer-space/;
- and B. Weeden and V. Samson (eds), Global Counterspace Capabilities: An Open Source Assessment, Secure World
- Foundation, April 2018, https://swfound.org/media/206118/swf_global_counterspace_april2018.pdf
- 38 J. Wolf, “China Key Suspect in U.S. Satellite Hacks: Commission”, Reuters, 28 October 2011,
- https://www.reuters.com/article/us-china-usa-satellite-idUSTRE79R4O320111028.
- 39 “Chinese Military Suspected in Hacker Attacks on US Satellites ”, Bloomberg, 27 October2011,
- http://www.bloomberg.com/news/articles/2011-10-27/chinese-military-suspected-in-hacker-attacks-on-u-ssatellites; “China Denies It Is Behind Hacking of US Satellites ”, Reuters, 31 October2011,
- http://www.reuters.com/article/ 2011/10/31/us-china-us-hacking-idUSTRE79U1YI20111031; L.Johnson, “Sky Alert:
- When Satellites Fail”, 2013, p. 37; M.P. Flaherty, J. Samenow, and L.Rein, “Chinese Hack US Weather Systems,
- Satellite Network”,Washington Post, 12 November 2014, http://www.washingtonpost.com/local/chinese-hack-usweather-systems-satellitenetwork/2014/11/12/bef1206a-68e9-11e4-b053-65cea7903f2e_story.html.
- 40 See “Turla: Spying Tool Targets Governments and Diplomats”, Symantec Security Response, 7 August 2014,
- https://www.symantec.com/connect/blogs/turla-spying-tool-targets-governments-and-diplomats.; S. Khandelwal,
- “Russian Hackers Hijack Satellite To Steal Data from Thousands of Hacked Computers”, The Hacker News,
- 10 September 2015, https://thehackernews.com/2015/09/hacking-satellite.html.
- 41 J. Bachman, “NASA Says Hackers Stole Employee Information”,Bloomberg News, 19 December 2018,
- https://www.bloomberg.com/news/articles/2018-12-19/nasa-says-hackers-stole-employee-information; M. Peterson,
- “China Charged with Hacking NASA, 45+ US Tech Firms and Govt. Agencies”, iDrop News, 21 December 2018,
- https://www.idropnews.com/news/fast-tech/china-charged-with-hacking-nasa-45-u-s-tech-firms-and-govtagencies/90222/.
- 42 B.S. Kuplic, “The Weaponization of Outer Space: Preventing an Extraterrestrial Arms Race”,North Carolina Journal
- of International Law and Commercial Regulation, vol. 39, no. 4, 2014, https://scholarship.law.unc.edu/cgi/view
- content.cgi?referer=https://www.google.co.in/&httpsredir=1&article=2011&context=ncilj.
- 43 C. Peoples (2008) “Assuming the Inevitable? Overcoming the Inevitability of Outer Space Weaponization and
- Conflict”, Contemporary Security Policy, vol. 29 no. 3, 2008.
- 44 Article 39 reads, “The Security Council shall determine the existence of any threat to the peace, breach of the
- peace, or act of aggression”.
- 45 General Assembly, “Text of UN General Assembly Resolution 3314”, 14 December 1974, http://www.un.org/ga
- /search/view_doc.asp?symbol=A/RES/3314(XXIX)&Lang=E
- 46 Y. Henri, “Long-Term Efficiency of the Space Regulatory Framework”, https://www.itu.int/net/ITUR/information/promotion/e-flash/2/article6.html.
- 47 For details, see International Telecommunication Union, “Radio Regulations”, http://life.itu.int/radioclub/rr/frr.htm.
- 48 S. Pinnagoda, “Harmful Interference and Infringements of the Radio Regulations”,Regional Radiocommunication
- Seminar for Asia–Pacific, The Philippines, 25–30 May 2015, https://www.itu.int/en/ITU-R/terrestrial/workshops/RRS15-Asia/Documents/Harmful%20Interference.pdf.
- 49 N. Jasentuliyana, “Regulatory Functions of I.T.U. in the Field of Space Telecommunications”,Journal of Air Law and
- Commerce, vol. 34, no. 1, 1968, https://scholar.smu.edu/cgi/viewcontent.cgi?article=2576&context=jalc.
- 50 B. Ba, “Harmful Interference and Infringements of the Radio Regulations”, Regional Radiocommunication Seminar
- for Africa 2013, Cameroon, 16–20 September 2013, https://www.itu.int/en/ITU-R/terrestrial/workshops/RRS-13-
- Africa/Documents/Harmful%20Interference.pdf.
- 51 “Harmful Interference to Space Services”, BR-SSD e-Learning Center, https://www.itu.int/en/ITUR/space/elearning/presentations/UIT_SSD_028.pdf.
- 52 N. Jasentuliyana, “Regulatory Functions of I.T.U. in the Field of Space Telecommunications”,Journal of Air Law and
- Commerce, vol. 34, no. 1, 1968, https://scholar.smu.edu/cgi/viewcontent.cgi?article=2576&context=jalc.
- 53 B. Weeden, “Electronic Warfare and Satellites: Challenges in Assuring Space Capabilities”, Electronic Warfare GCC,
- Abu Dhabi, 25–26 October 2016, https://swfound.org/media/205651/bw_ew_satellitesatellites-gcc_oct2016.pdf.
- 54 Even though the ITAR is a US domestic regulation, given the United States’ position both in diplomacy and in trade,
- ithas had a significant effect on high technology exchanges. For more details on the US domestic export control
- regulations including ITAR and EAR, see “The International Traffic in Arms Regulations”
- 55 General Assembly, Transparency and Confidence-building Measures in Outer Space Activities, UN document
- A/RES/65/68, 8 December2010, http://www.un.org/ga/search/view_doc.asp?symbol=A/RES/65/68
- 56 Security Council, UN document S/RES/1540, 28 April 2004, http://www.un.org/ga/search/view_doc.asp?symbol=
- S/RES/1540%20(2004)&Lang=E
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement