Feeds

USAF plans space wars, world's space hardware gets nervous

'So what do we do if Galileo's threatening American lives?'

  • alert
  • submit to reddit

SANS - Survey on application security programs

A new US Air Force doctrine document on counterspace operations reveals that neutral, commercial and third party space hardware could be on the target list. The document, says Noah Shachtman in Wired, suggests the Air Force sees it as its duty to "slap down other countries' space efforts, should the need arise," and will be prepared to take out - in the gentlest way practicable - non-combatant systems that may be being used by the other side.

The document doesn't specifically say anything like 'we'll shoot down any neutral satellite we find being used by our adversaries.' But neither does it say, 'whatever we do we must ensure we don't shoot down any neutral satellite.' It does strongly imply throughout that destroying, disabling or interdicting non-combatant space assets is something that may have to be done, after giving due considerations to all of the consequences. So we have here the Air Force outlining the Bush doctrine* in space, alongside the extension of Article 51 of the UN Charter to extraterrestrial matters. Non-combatants who're sure they're not threatening US lives may feel safe enough (aside from collateral damage, which the Air Force comfortingly hopes to minimise), but those who don't altogether agree with the US about whether or not US lives are being threatened could be reasonably nervous.

The preface doesn't help as a scene-setter. Undersecretary of the Air Force Peter Teets is quoted saying: "What will we do five years from now when American lives are put at risk because an adversary uses space-borne imagery collectors, commercial or homegrown, to identify and target American forces? What will we do ten years from now when American lives are put at risk because an adversary chooses to leverage the global positioning system or perhaps the Galileo constellation to attack American forces with precision?"

He seems not to have answered these questions when he posed them, nor does Counterspace Operations answer them directly, but they're kind of rhetorical. And well, as the US tried mightily to persuade Europe it didn't need to build its own GPS system, ten years from now Europe may only have itself to blame, right? The Air Force is basically saying what it is going to do in order to discharge its mission of controlling the high ground, and pointing out as it goes along that there may be implications, collateral damage and blue on blue incidents.

The Air Force's difficulty regarding neutrals is understandable in that space systems, commercial and government, are used for multiple reasons and most of the world's armed forces use commercial capacity. Knowing who owns what and who's using what for what is therefore a hard one to get on top of, and figuring out how to kill one thing (or even just make it temporarily unwell) without pulling the plugs on all sorts of other stuff is possibly even harder.

The document's legal underpinnings are provided by self-defence: "To the extent allowed under international and domestic laws," it says, "national space policy allows defense- and intelligence-related activities in pursuit of national security and other goals. In general, counterspace operations are legally permitted to the extent they are conducted for national or collective self-defense under Article 51 of the United Nations Charter or when the United Nations Security Council authorizes the use of force." What constitutes self-defence can however be debatable, and the current administration's views on preemption have widened the definition considerably.

According to the document: "A planner must understand friendly space capabilities, provided by organic and/or third party assets. Identification of a friendly space COG [COG? Centre Of Gravity - perfectly clear if you think of it as something up there that's not space] is not always clear-cut, particularly when a third party provides space support. Extensive use of military, civil, and commercial space systems, and the resulting dependency on these systems, makes friendly COG identification an important step in counterspace operations." Adversary COGs are similarly difficult to nail down, but a "thorough analysis of adversary space capabilities, including insight into the owners, operators, and users of both organic and third party assets, should minimize unintended effects of counterspace operations." It's worth flagging here that the Air Force sees the development and maintenance of a detailed directory of space assets as absolutely vital, on the basis that the US needs to know what's up there and what it's doing.

All kinds of assets, right down to weather satellites, are potential targets: "When planning operations against an adversary's space-based weather capabilities, consider potential collateral impacts on friendly or neutral nations' assets or information", and while considering the cost-benefits here, bear in mind that "infrastructure supporting adversarial interests may be in third party countries."

And Blue on Blue? "Counterspace operations must be deconflicted with other friendly operations to minimize unintended effects... space situation awareness of DOD and non-DOD space systems is vital for deconfliction of counterspace operations... Counterspace operations will likely require different levels of approval authority depending on the type of operation, potential collateral effects on civilian and third party populations, ownership of the target, location of the target (space node, terrestrial node, or link), permanency of effects, and the policy regarding that type of operation... counterspace operations against adversaries using third party space capabilities may have economic, diplomatic, and political implications."

This implications could be a worry, if we didn't have somebody of Dick Cheney's calibre keeping on top of them. ®

* "Our forces will be strong enough to dissuade potential adversaries from pursuing a military build-up in hopes of surpassing or equaling the power of the United States" and "We will not hesitate to act alone, if necessary, to exercise our right of self-defense by acting pre-emptively." The possibility of compelling states to stop actions the government considers assistance to terrorists has also been mooted.

Related links


Air Force Document 2-2.1 Counterspace Operations
Some doctrines the Air Force prepared earlier
Bush National Security Policy document, September 2002
An interesting contextualisation of the Bush doctrine, hosted by the State Department

3 Big data security analytics techniques

More from The Register

next story
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
Power levels up 70 per cent as the rover keeps on truckin'
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Dragon capsule arrives at space station for Easter Sunday delivery
SpaceX reports Falcon booster made controlled touchdown in ocean
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.