Feeds

US military satellite to get attack-warning equipment

Guarding against mysterious inopportune accidents

The Power of One eBook: Top reasons to choose HP BladeSystem

A US military satellite is to be fitted with equipment which will enable it to detect hostile action and inform ground controllers what's going on, according to reports.

US military graphic showing catalogued objects in Earth orbit

In space, nobody can hear your victim scream ... yet

Lieutenant General Ellen Pawlikowski of the US Air Force told reporters including those of Aviation Week on Wednesday that a classified satellite is now planned to go into space equipped with a Self-Awareness Space Situational Awareness (SASSA) package, kit which the Pentagon has been working on for some time.

The US military and intelligence agencies operate a mighty fleet of spacecraft, with missions ranging from navigation and timing like the well-known GPS constellation – which makes almost all satnavs and a surprising amount of other Earthbound civilian electronics work, as well as guiding missiles etc – to blacker-than-black top secret spying and surveillance.

Most of these satellites, while in touch with ground control stations some or all of the time, have no sensors which would let them know if they were being meddled with or attacked – and this is a real possibility as more nations acquire space capabilities or groundbased gear such as jammers or lasers which can reach into space. As things stand, a satellite could simply go offline for a while or permanently, and its controllers would never know what happened to it.

That's where SASSA and various other US military space hardware comes in. SASSA itself would let a satellite know if it was being jammed, blinded or scrambled: other, dedicated spacecraft would be able to watch events in Earth orbit and perhaps detect or monitor sneaky anti-satellite operations involving actual intercepts and collisions.

It would seem the idea is not so much to mount any particular defence or retaliation against hostile anti-satellite efforts, but rather to establish clearly who is behind them. As action against another nation's spacecraft is a massive no-no under international convention, it is usually only worth doing if one can be sure that nobody will be sure who did it (or even sure that any action took place, perhaps).

SASSA and such efforts would seem to mean that attacks on US satellites will soon be much less deniable: which is, perhaps, why we are being told about them in advance. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.