12.07.2015 Views

2011 report to congress - U.S.-China Economic and Security Review ...

2011 report to congress - U.S.-China Economic and Security Review ...

2011 report to congress - U.S.-China Economic and Security Review ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

215weapons or coorbital satellite weapons. Such ‘‘hard’’ kill attacks,while effective, are immediately evident, easy <strong>to</strong> attribute, <strong>and</strong> createharmful debris. Therefore, the text identifies a preference fordirected energy attacks, including various laser, microwave, particlebeam, <strong>and</strong> low-power electromagnetic pulse weapons. 317 Theseattacks could take the form of either ‘‘hard’’ or ‘‘soft’’ kill, dependingon the attack method <strong>and</strong> target. Key targets include powersources (e.g., batteries <strong>and</strong> solar panels), communications systems(e.g., transmission antennae), <strong>and</strong> sensors. 318Communications links: Critical information passes betweenground- <strong>and</strong> space-based systems through electronic links, whichare subject <strong>to</strong> electronic manipulation. This could take the form ofeither jamming or deception. Jamming includes different types ofelectronic interference or signals that flood communications channels,whereas deception involves the interception or forgery oftransmissions <strong>to</strong> or from adversary space systems. Most of these attackswould fall in<strong>to</strong> the ‘‘soft’’ kill category. However, deception allowsthe possibility for ‘‘hard’’ kills through self-destruction comm<strong>and</strong>sor measures designed <strong>to</strong> cause terminal loss of control. 319Key targets for communications link attacks are the satelliteuplink (which transmits information from ground stations <strong>to</strong> thesatellite) <strong>and</strong>, more importantly from the Chinese perspective, thesatellite downlink (which transmits information from the satellite<strong>to</strong> the ground station). 320Malicious Cyber ActivitiesDirected Against U.S. SatellitesMalicious ac<strong>to</strong>rs can use cyber activities <strong>to</strong> compromise, disrupt,deny, degrade, deceive, or destroy space systems. Exploitationsor attacks could target ground-based infrastructure,space-based systems, or the communications links between thetwo.* As noted above, authoritative Chinese military writingsadvocate for such activities, particularly as they relate <strong>to</strong> groundbasedspace infrastructure, such as satellite control facilities.Satellites from several U.S. government space programs utilizecommercially operated satellite ground stations outside theUnited States, some of which rely on the public Internet for‘‘data access <strong>and</strong> file transfers,’’ according <strong>to</strong> a 2008 NationalAeronautics <strong>and</strong> Space Administration quarterly <strong>report</strong>.† Theuse of the Internet <strong>to</strong> perform certain communications functionspresents potential opportunities for malicious ac<strong>to</strong>rs <strong>to</strong> gain access<strong>to</strong> restricted networks.dkrause on DSKHT7XVN1PROD with $$_JOB* For an informed description of several potential vulnerabilities in space-related networks,see Stephen Farrell <strong>and</strong> Vinny Cahill, ‘‘<strong>Security</strong> Considerations in Space <strong>and</strong> Delay TolerantNetworks’’ (paper presented <strong>to</strong> the 2nd IEEE [Institute of Integrated Electrical Engineers) InternationalConference on Space Mission Challenges for Information Technology, 2006, esp. sec. 5).† Sunny Tsiao, ‘‘The Enduring Legacy of the ‘Invisible Network’ ’’ (Washing<strong>to</strong>n, DC: NASA His<strong>to</strong>ryDivision, News <strong>and</strong> Notes, August 2008), p. 4. http://his<strong>to</strong>ry.nasa.gov/nltr25–3.pdf.VerDate Nov 24 2008 13:46 Nov 10, <strong>2011</strong> Jkt 067464 PO 00000 Frm 00227 Fmt 6601 Sfmt 6601 G:\GSDD\USCC\<strong>2011</strong>\067464.XXX 067464

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!