19.08.2013 Views

Space Security Index

Space Security Index

Space Security Index

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Space</strong> <strong>Security</strong> 2011<br />

152<br />

revealed that, whilst the equipment could be used for satellite jamming, this would be<br />

technically dicult.” 33<br />

North Korea demonstrated a more sophisticated capability when it intermittently jammed<br />

GPS signals over the course of three days in August. Commenting on a potentially dangerous<br />

problem in an already volatile region, U.S. military ocials said they were not surprised by<br />

this example of the North Korean “culture of military creativity.” 34<br />

<strong>Space</strong> <strong>Security</strong> Impact<br />

e technologies used to hack into computer networks and jam satellite communications<br />

links are widely available; the relative ease with which such attacks are carried out has a<br />

negative impact on space security. Paradoxically, more incidents of jamming and the<br />

proliferation of jamming capabilities may also have a positive eect on space security, as<br />

they seem to be creating some impetus for more assertive action from the ITU. e proven<br />

ability of even minor powers to jam satellite transmissions, including ones used by the U.S.<br />

military, should generate increased interest in protecting communications from interference.<br />

Trend 8.2: Ongoing proliferation of ground-based capabilities<br />

to attack satellites<br />

A series of U.S. and Soviet/Russian programs during the Cold War and into the 1990s<br />

sought to develop ground-based weapons that employed conventional, nuclear, or directed<br />

energy capabilities against satellites. As well, recent incidents involving the use of ASATs<br />

underscore the detrimental eect they have for space security, in particular should these<br />

weapons be used for hostile purposes against an adversary.<br />

Conventional (kinetic intercept) weapons<br />

Launching a payload to coincide with the passage of a satellite in orbit is the fundamental<br />

requirement for a conventional anti-satellite capability. To date, nine nations have conrmed<br />

autonomous orbital launch capabilities, as discussed in chapter 4. Tracking capabilities<br />

would allow a payload of metal pellets or gravel to be launched into the path of a satellite by<br />

rockets or missiles (such as a SCUD missile). 35 Kinetic hit-to-kill technology requires more<br />

advanced sensors to reach the target. Targeting satellites from the ground using any of these<br />

methods would likely be more cost-eective and reliable than space-based options. 36<br />

USAF Counterspace Operations Document 2-2.1 outlines a set of “counterspace operations”<br />

designed to “preclude an adversary from exploiting space to their advantage…using a<br />

variety of permanent and/or reversible means.” 37 Among the tools for oensive counterspace<br />

operations, the document lists direct ascent and co-orbital ASATs, directed energy weapons,<br />

and electronic warfare weapons. e U.S. Army invested in ground-based kinetic energy<br />

ASAT technology in the late 1980s and early 1990s. e small, longstanding Kinetic<br />

Energy ASAT program was terminated in 1993 but was later granted funding by Congress<br />

from FY1996 through FY2005. 38 For FY2005 Congress appropriated $14-million for the<br />

KE-ASAT program through the MDA Ballistic Missile Defense Products budget. 39 e<br />

KE-ASAT program was part of the Army Counterspace Technology testbed at Redstone<br />

Arsenal. 40 e U.S. has also deployed a limited number of ground-based exoatmospheric<br />

kill vehicle (EKV) interceptors, including the Aegis (Sea-Based Midcourse) and Ground-<br />

Based Midcourse Defense Systems, for ballistic missile defense purposes. 41 EKVs use infrared<br />

sensors to detect ballistic missiles in midcourse and maneuver into the trajectory of the<br />

missile to ensure a hit to kill. 42 With limited modication, the EKV could be used against

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!