Gov't Report Warns of Chinese Plans to Cripple U.S. Space Defenses
November 17, 2011 7:13 PM
Report says two U.S. satellites were hacked in 2007 and 2008, attacks resemble Chinese military literature
China appears to be taking its cyber-skirmishes with the U.S. to a new level. A recent government report reveals that attackers gained access to two U.S. satellites. Meanwhile, China -- the suspected culprit -- has internally revealed that it's developing capabilities to cripple an enemy satellite network via either outright destruction or planted misinformation.
The potential of a Chinese cyber-attack crippling U.S. defense satellites is an alarming one.
I. Foreign Nation Gains Access of Two U.S. Satellites in 2007-2008
The disturbing commentary on the satellite breaches was published by the
U.S.-China Economic and Security Review Commission
(USCC), a government panel established in 2000 by Congress for the purpose of examining how China's growing military and technological power could impact U.S. security.
[PDF] was the ninth by the panel and it offers some of the most interesting -- and frightening -- commentary yet. It describes attacks on two America orbiters, which appeared to be proof-of-concept probing infiltrations given the satellites' non-vital roles.
The first satellite attacked was
, the flagship satellite in a series of
National Aeronautics and Space Agency
orbiters, designed to
monitor the Earth's climate
. The satellite was attacked twice in 2008, with attackers gaining command-and-control access level.
NASA's Terra satellite (EOS AM-1) [Image Source: NASA]
The second satellite was a
U.S. Geological Survey
. This spacecraft is designed to take
high-resolution images of the Earth's terrain
, delivering 582 images a day. These images are publically available and are often color-balanced and enhanced by commercial entities for use in
services such as Google Maps
(at the highest zoomed-out resolution). They're also used by the USGS to create 3D maps.
The USGS Landsat-7 satellite in the lab, and during its 1999 launch. [Images Source: USGS]
Like Terra, Landsat-7 saw two compromises, each of which lasted less than a quarter of an hour. However, the Landsat-7 intrusions only gained full access to non command-and-control functionality.
The report describes (pg. 216):
On October 20, 2007, Landsat-7, a U.S. earth observation satellite jointly managed by the National Aeronautics and Space Administration and the U.S. Geological Survey, experienced 12 or more minutes of interference. This interference was only discovered following a similar event in July 2008 (see below).
On June 20, 2008, Terra EOS [earth observation system] AM–1, a National Aeronautics and Space Administration-managed program for earth observation, experienced two or more minutes of interference. The responsible party achieved all steps required to command the satellite but did not issue commands.
On July 23, 2008, Landsat-7 experienced 12 or more minutes of interference. The responsible party did not achieve all steps required to command the satellite.
On October 22, 2008, Terra EOS AM–1 experienced nine or more minutes of interference. The responsible party achieved all steps required to command the satellite but did not issue commands.
U.S. Department of Defense
(DoD) was informed of these incidents, and the systems were presumably restored.
II. China Trains Soldiers on How to Destroy American Satellites
Partial infiltration could allow the attacker to share data from the compromised satellite, though this would likely be detected given the limited bandwidth of the orbiter (likely part of how the current attacks were identified). On this type of threat, the report comments (pg. 217):
A high level of access could reveal the satellite’s capabilities or information, such as imagery, gained through its sensors. Opportunities may also exist to reconnoiter or compromise other terrestrial or space- based networks used by the satellite.
Command-and-control infilitration could give more useful capabilties, most notably the ability to trigger some sort of mechanical/electrical overdrive, which could damage critical devices like imaging lenses or the communications antenna. Or they could be used to provide equally damaging misinformation to the victim.
On the destructive potential it reads:
If executed successfully, such interference has the potential to
pose numerous threats, particularly if achieved against satellites with more sensitive functions. For example, access to a satellite’s controls could allow an attacker to damage or destroy the satellite. The attacker could also deny or degrade as well as forge or otherwise manipulate the satellite’s transmission.
correspondent Jason Ryan offers an interesting twist, claiming that his government sources have
that these attacks "had to come from a nation power."
Officially, the report is careful to clarify it does not have the evidence to pin the attacks on China, but that (pg. 217):
These events are described here not on the basis of specific attribution information but rather because the techniques appear consistent with authoritative Chinese military writings. For example, according to Military Astronautics, attacks on space systems "generate tremors in the structure of space power of the enemy, cause it to suffer from chain effects, and finally lose, or partly lose, its combat effectiveness." One tactic is "implanting computer virus and logic bombs into the enemy’s space information network so as to paralyze the enemy’s space information system."
(The report's excerpts are taken from the Chinese military training textbook
China's People's Liberation Army, during a military exercise [Image Source: Defense Today]
The important take home message, which the U.S. Military commanders are surely aware of is this: If agents of China's People's Liberation Army were able to infiltrate NASA and other U.S. agencies' satellite systems to the extent of a having command-and-control capabilities, it may have implanted "logic bombs" which it can remotely activate at any time, should the necessity rise.
III. Chinese Counterspace: Kryptonite to U.S. Military Space Edge
still weaker than the U.S.
in space logistical capabilities (communications, surveillance, etc.), according to the expert panel:
Despite pockets of considerable capabilities, China has weak or moderate military space capabilities in other areas. China has few communications satellites available for military purposes, even assuming that the PLA would appropriate Chinese government-controlled assets during a crisis.
That weakness could be lessened given its reliance on low-bandwidth devices and its strong underground internet cable network in local conflicts:
Many PLA military platforms have modest bandwidth requirements, which, when combined with the PLA’s heavy reliance on buried fiber-optic military communications networks, may offset this disadvantage in the context of a potential, near-term U.S.-China contingency on China’s periphery.
But at present, the nation would be at a disadvantage in long range conflicts with the U.S.:
However, naval forces at sea and ground forces operating outside the Chinese mainland (even as close as Taiwan) would still require secure, mobile communications for military functions such as command and control.
The report suggests China may
invest in new satellite or drone capabilities
to remedy that weakness. In the near term, though the U.S.'s advantage could be negated by China's cyberprowess and investigation into "hard" counterspace options (pg. 218):
China's counterspace programs seek the capability to compromise, disrupt, deny, degrade, deceive, or destroy U.S. space assets. These efforts could prevent the U.S. military’s use of space for functions such as communications; intelligence, surveillance, and reconnaissance; and guided weapons applications.
This opinion is reinforced with quotes from top military leaders (pg. 218):
Notwithstanding China’s increasing reliance on space for military and civil purposes, Chinese military planners still view space assets as an attractive target. Ambassador Schulte testified that with "geography the way it is, we are probably always going to find ourselves more reliant on space than [China] . . . so for the foreseeable future, that’s an asymmetry they’re going to look to exploit as they pursue an antiaccess/area denial approach." According to General Deptula, "Continued Chinese investment in the design, development, deployment and employment of space and counterspace systems will increasingly challenge our traditional space dominance and could dramatically reduce our freedom of action in the event of a conflict in the region."
The report points to China preparing a two pronged approach to attack the U.S.'s space capabilties. The first approach is to use traditional attacks
or orbitters to physically assault enemy satellites (the so-called "hard" attack). A second "soft" attack approach involves instead using cyberattacks to cripple or interfere with foreign satellites.
China could bring the U.S. "down to its level" technologically with targeted counterspace strikes.
[Image Source: U.S. Air Force]
On the hybrid hard-attack/soft-attack approach, the authors state (pg. 216):
Chinese military theorists take a holistic view of counterspace operations. They advocate for the use of both "soft" kill (i.e., informational, temporary, or reversible) attacks and "hard" kill (i.e., destructive or permanently disabling) attacks against every aspect of space power: ground-based systems, space-based systems, and communications links.
In other words, China is actively preparing redundant options to bring the U.S. down to its level in terms of space combat readiness.
The report elaborates on fascinating potential tests of hard-attack possibilites:
IV. The Danger Ahead
The USCC suggests some big and possibly extensive programs/studies to be conducted to prepare the U.S.'s defenses against counterspace activities. It suggests that:
The DoD test its logistical systems to make sure they're "secure from a cyberattack".
"Congress assess the adequacy of Department of Defense capabilities to conduct major operations in a degraded command, control, communications, computer, intelligence, surveillance, and reconnaissance environment for an extended period of time."
Provide Congressional encouragement to the administration to "work diplomatically and militarily" with region allies (e.g. Japan, South Korea) to "improve their capacity to resist China’s Area Control Strategy capabilities."
The DoD and critical commercial sector partners assess their preparedness for "Chinese counterspace activities".
The DoD institute a worst-case scenario war game, which "simulate the destruction, denial, degradation, or manipulation of U.S. space assets".
(These suggestions were cut down from a longer list on multiple topics.)
At this point China's efforts, based on what this report and past reports have stated, appear to be limited to:
Learning/infilitration activities designed to prepare the nation to cripple its adversaries in the event of conflict.
Infiltrating commercial and government systems in order to
gain a socioeconomic advantage
over its foreign
In that regard, the current cyber-skirmishes between China's PLA and the U.S. government/private sector firms appear to be designed not as an endgame move, but as a carefully played strategy aimed at putting all the cards in the growing nation's hand.
[Image Source: Radio Free Penzance]
Militarily, the biggest danger appears to be if China attacked a neighbor like South Korea or Taiwan to achieve greater financial dominance. In such a scenario China's counterspace abilities could play a key role in stifling U.S. assistance.
Commission, Martin C. Libicki, a senior management analyst at the RAND Corp. (
), describes such a scenario, commenting (pg. 194):
China takes steps to complicate and hence delay the U.S. transit of the Pacific, so that by the time the United States does arrive, the war [with Taiwan] will be over, or at least the Chinese will have a secure lodgment on the island. So, [PLA forces] carry out a full-fledged operational cyberattack on the United States military information systems with the hopes of turning data into unusable nonsense.
[The report also contains commentary on other recent Chinese military technological developments like
the J-20 stealth fighter
, making it worth a read if you have some time.]
launched its first space station module
two months ago. The new station is designed to compete with the International Space Station project, which China refused to participate in. The station is named Tiangong-1, which means "Heavenly Place-1", and is scheduled for completion sometime between 2020 and 2022 completion.
"When an individual makes a copy of a song for himself, I suppose we can say he stole a song." -- Sony BMG attorney Jennifer Pariser
Google Releases New 3D Helicopter View for Google Maps
October 3, 2011, 10:17 AM
China's First Space Station Module Reaches Orbit
September 30, 2011, 1:02 PM
U.S.: China's Military to be "Modern" by 2020
August 26, 2011, 7:56 AM
War 2.0: China Suspected in Massive Cyberattack on U.N., U.S. Gov't, and More
August 3, 2011, 3:50 PM
Chinese Defense Minister Claims PLA is 20 Years Behind U.S. Military Tech
June 8, 2011, 1:04 PM
PIQ ROBOTTM reveals its new artificial intelligence software
November 29, 2016, 12:59 AM
One more time - Happy Thanksgiving to Everyone Around the World
November 24, 2016, 4:00 AM
Google’s Smart Contact Lens Project gets halted for 2016
November 20, 2016, 7:00 AM
Cell Research Study shows African Americans have greater immune response to infection
November 10, 2016, 1:00 AM
UTHealth Clinical Trial Shows Progress Using Stem Cells to Treat Traumatic Brain Injury
November 8, 2016, 1:00 AM
Uber Partners with Circulation to Pilot Program Connecting Transportation and Digital Health Care
November 6, 2016, 5:00 AM
Most Popular Articles
How Apple watch Series 2 differ from the S1
February 18, 2017, 5:37 AM
Comparison: NuVision vs Kindle Fire HD
February 18, 2017, 6:25 AM
What do you or do not know about Apple iPhone 7 &7+
February 8, 2017, 9:27 AM
ROG Maximus VIII – Gaming Motherboard with integrated RGB Headers
February 7, 2017, 7:59 AM
This Can / May Satisfy the Movie lovers
February 19, 2017, 9:52 AM
Latest Blog Posts
Interesting News of the Day
Feb 25, 2017, 7:37 AM
AMD and More
Feb 24, 2017, 5:55 AM
Feb 23, 2017, 6:30 AM
Feb 21, 2017, 6:12 AM
Here is how startups are helping new parents in raising children
Feb 20, 2017, 6:45 AM
Around the World
Feb 18, 2017, 5:48 AM
News of Future
Feb 17, 2017, 6:30 AM
Amazon parachutes May Float Packages to Customers
Feb 16, 2017, 8:00 AM
Now you Can Watch Facebook on Your TV
Feb 15, 2017, 7:42 AM
Feb 14, 2017, 5:36 AM
Razer Blade Stealth – Little Kaby Lake Powerhouse
Feb 13, 2017, 7:50 AM
Android 7.0 Nougat 7.0 Update Bring Less Battery Life for Samsung Galaxy S7 & S7 Edge
Feb 12, 2017, 7:45 AM
Apple iPhone 8 – OLED Display & Wireless Charging
Feb 11, 2017, 8:09 AM
Feb 10, 2017, 6:15 AM
Feb 9, 2017, 6:00 AM
Eye catching news
Feb 8, 2017, 6:16 AM
Some World News
Feb 7, 2017, 6:15 AM
Feb 6, 2017, 10:11 AM
Feb 5, 2017, 7:27 AM
Notes and News
Feb 4, 2017, 5:53 AM
Feb 3, 2017, 5:30 AM
Feb 2, 2017, 7:00 AM
More Blog Posts
Copyright 2017 DailyTech LLC. -
Terms, Conditions & Privacy Information