Feeds

US military satellite to get attack-warning equipment

Guarding against mysterious inopportune accidents

The essential guide to IT transformation

A US military satellite is to be fitted with equipment which will enable it to detect hostile action and inform ground controllers what's going on, according to reports.

US military graphic showing catalogued objects in Earth orbit

In space, nobody can hear your victim scream ... yet

Lieutenant General Ellen Pawlikowski of the US Air Force told reporters including those of Aviation Week on Wednesday that a classified satellite is now planned to go into space equipped with a Self-Awareness Space Situational Awareness (SASSA) package, kit which the Pentagon has been working on for some time.

The US military and intelligence agencies operate a mighty fleet of spacecraft, with missions ranging from navigation and timing like the well-known GPS constellation – which makes almost all satnavs and a surprising amount of other Earthbound civilian electronics work, as well as guiding missiles etc – to blacker-than-black top secret spying and surveillance.

Most of these satellites, while in touch with ground control stations some or all of the time, have no sensors which would let them know if they were being meddled with or attacked – and this is a real possibility as more nations acquire space capabilities or groundbased gear such as jammers or lasers which can reach into space. As things stand, a satellite could simply go offline for a while or permanently, and its controllers would never know what happened to it.

That's where SASSA and various other US military space hardware comes in. SASSA itself would let a satellite know if it was being jammed, blinded or scrambled: other, dedicated spacecraft would be able to watch events in Earth orbit and perhaps detect or monitor sneaky anti-satellite operations involving actual intercepts and collisions.

It would seem the idea is not so much to mount any particular defence or retaliation against hostile anti-satellite efforts, but rather to establish clearly who is behind them. As action against another nation's spacecraft is a massive no-no under international convention, it is usually only worth doing if one can be sure that nobody will be sure who did it (or even sure that any action took place, perhaps).

SASSA and such efforts would seem to mean that attacks on US satellites will soon be much less deniable: which is, perhaps, why we are being told about them in advance. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.