As an Amazon Associate we earn from qualifying purchases.

- Key Takeaways
- Introduction
- A Short History of Signals, Satellites, and Interference
- The Anatomy of an Electronic Attack on Satellites
- GPS: The Most Jammed Signal in the Sky
- What Russia and China Have Built
- Directed Energy: Satellites in the Crosshairs of Lasers and Microwaves
- Satellite Communications Warfare
- The Viasat Attack and the Cyber Dimension
- Major Electronic Space Warfare Capabilities by Country
- Operation Epic Fury and the First Publicly Acknowledged Space EW Campaign
- Space Delta 3 and the Meadowlands Upgrade
- Commercial Constellations as Targets and Tools
- Electronic Intelligence from Orbit
- Nuclear Command and the Electronic Threat
- Building Resilience Into Space Architecture
- The Governance Gap and the Law of Conflict in Space
- What Artificial Intelligence Is Changing
- Books That Illuminate the Domain
- Summary
- Appendix: Top 10 Questions Answered in This Article
Key Takeaways
- GPS jamming, satellite spoofing, and uplink interference are now routine tools of active conflict
- The U.S. Space Force deployed electronic warfare against Iranian satellites in Operation Epic Fury, February 2026
- Twelve countries are actively researching or deploying counterspace electronic warfare capabilities
Introduction
Satellites have no armor. They carry no weapons in the traditional sense, and most of them can’t maneuver to avoid an attack. Yet they are the central nervous system of every modern military, and the electromagnetic signals they transmit and receive are among the most contested terrain on Earth. Electronic space warfare is the practice of attacking, disrupting, degrading, or denying those signals, or defending them against someone trying to do the same.
The discipline spans a wide range: jamming satellite uplinks and downlinks, spoofing navigation signals, intercepting communications intelligence, blinding sensors with directed energy, and using cyber intrusion to manipulate satellite systems without any physical contact at all. These attacks don’t leave craters. They leave confusion, severed communications, and precision-guided munitions that miss. Understanding them requires looking at what satellites actually do, who is attacking them, and how the world’s military powers are scrambling to build systems that survive in an environment that has become genuinely hostile.
A Short History of Signals, Satellites, and Interference
The military implications of satellite electronics became apparent almost immediately after Sputnik launched in October 1957. Both the United States and Soviet Union quickly understood that tracking, intercepting, and interfering with each other’s satellites carried enormous strategic value, and both countries invested heavily in electronic intelligence collection from orbit throughout the 1960s and 1970s.
The CORONA reconnaissance program, declassified in 1995, was the first successful American satellite imagery operation. It used film return capsules rather than electronic transmission partly because Soviet signals interception capabilities were already mature enough to make electronic downlinks a vulnerability. That cat-and-mouse dynamic, one side pushing capability and the other developing countermeasures, has never stopped.
By the 1980s, Soviet ground-based jammers were targeting U.S. military satellite communications with increasing sophistication. The U.S. responded with frequency-hopping, encryption, and spread-spectrum techniques designed to make signals harder to intercept or jam. The 1991 Gulf War then changed the calculus for everyone. GPS-guided munitions were used in large-scale combat for the first time, and the strategic dependency on satellite navigation became visible to every military planner worldwide. What followed was not just a race to deploy satellite capabilities but an equally urgent race to develop the tools needed to attack them.
The Anatomy of an Electronic Attack on Satellites
Every satellite operation involves electromagnetic signals. A satellite receives commands from the ground, called the uplink. It transmits data back down, called the downlink. It may relay communications between ground stations. Each of these links is a potential attack surface, and the methods used against them differ significantly.
Jamming works by flooding a receiver with noise or interfering signals at the same frequency as the legitimate transmission. Uplink jamming targets the signal sent from a ground station to the satellite, cutting off the ability to send commands to the spacecraft. Downlink jamming targets the signal from the satellite to the ground receivers, which is the more commonly employed technique in practice because it requires less transmission power and can be conducted from a ground station close to the intended victim rather than from near the satellite itself.
Spoofing is fundamentally different and, in many operational contexts, more dangerous than jamming. Rather than blocking a signal, a spoofer generates a false but convincing one. GPS spoofing transmits fake navigation signals that receivers mistake for genuine satellite transmissions. The receiver doesn’t know it’s been deceived. It calculates a position, and that position is wrong. Military aircraft, naval vessels, and precision-guided munitions can be directed off course with no visible indicator that anything has gone wrong. This quality, the invisibility of the attack until its consequences materialize, makes spoofing particularly attractive to adversaries who want tactical advantage with plausible deniability.
Uplink hijacking, where a sufficiently powerful transmitter overwhelms a satellite’s legitimate ground control signal to take partial or full control of a transponder, represents a further escalation. The satellite continues operating, but its output has been commandeered. These aren’t theoretical vulnerabilities. They’ve been exploited operationally in multiple conflicts.
GPS: The Most Jammed Signal in the Sky
The Global Positioning System, operated by the U.S. Space Force, broadcasts navigation signals from 31 operational satellites in medium Earth orbit. Those signals are used by more than four billion devices worldwide. The civilian signal, known as L1 C/A, is deliberately broadcast at low power to be widely accessible, which also makes it straightforward to jam or spoof compared to higher-power alternatives.
The military-grade M-Code signal uses spread-spectrum techniques and higher power to resist jamming. The M-Code GPS signal reached full operational capability across the entire GPS constellation in 2025, providing encrypted navigation accurate to within centimeters even in contested electromagnetic environments. But the receivers capable of using M-Code have not yet been fielded across the full U.S. military force structure, meaning large portions of allied and partner forces continue to operate on legacy GPS signals that are more vulnerable to interference.
Russia operates the GLONASS navigation system, China operates BeiDou, and the European Union operates Galileo. Using multiple satellite navigation constellations simultaneously reduces the effectiveness of spoofing attacks against any single system. But most commercial devices and many military platforms have not been upgraded to use multi-constellation receivers, leaving them reliant on GPS alone.
The Center for Advanced Defense Studies documented thousands of GPS spoofing incidents between 2018 and 2024, concentrated around Russia, the Middle East, and China’s border regions. Ships in the Black Sea reported ghost positions hundreds of kilometers from their actual locations. Aircraft near Moscow’s Vnukovo Airport consistently displayed false position data. The International Federation of Air Line Pilots’ Associations issued warnings to pilots in 2023 about Chinese warships engaged in GPS jamming over the South China Sea, the Philippine Sea, and the eastern Indian Ocean. The International Telecommunication Union‘s Radio Regulations Board issued a rare public statement in July 2024 expressing grave concern about intentional harmful interference with satellite navigation signals, a rebuke directed explicitly at Russia. By 2025, the CSIS Aerospace Security Program was tracking GPS jamming and spoofing as daily occurrences in the Baltic Sea, the Middle East, and parts of South Asia. This is the operational environment that forces now plan around.
What Russia and China Have Built
Russia’s electronic warfare units, coordinated through the Russian Aerospace Forces, have demonstrated not just capability but willingness to use it in active conflicts with cascading effects on third parties. Since the full-scale invasion of Ukraine in February 2022, Russian electronic warfare operations have included GPS jamming that spilled over into Baltic airspace, affecting civil aviation over Finland, Estonia, and Sweden. The Finnish Transport and Communications Agency documented these outages repeatedly. The systems responsible include the Krasukha-4 and Moskva platforms, ground-based jammers capable of disrupting satellite communications and navigation across multiple frequency bands simultaneously, with deployments documented near Kaliningrad, the Kola Peninsula, and throughout eastern Ukraine.
Russia has also demonstrated co-orbital electronic capabilities. The Luch/Olymp satellite, launched in September 2014, maneuvered within 10 kilometers of multiple commercial communications satellites operated by Intelsat and Eutelsat. No official explanation was ever offered, but the satellite exhibits the characteristics of an electronic intelligence or interference platform, positioned to intercept or disrupt communications traffic at close range.
China’s approach has been institutional rather than purely tactical. The People’s Liberation Army Strategic Support Force, established in December 2015, consolidated space, cyber, and electronic warfare under a single command. That organizational choice isn’t just administrative: it signals how Beijing understands information warfare as a unified domain rather than a set of separate disciplines. The PLASSF operates ground-based satellite jamming systems across multiple frequency bands. Secure World Foundation‘s 2025 Global Counterspace Capabilities report cited internal PLA documents suggesting China has deployed a satellite in geosynchronous orbit specifically to test jamming capabilities, a move that would give Beijing an orbital platform capable of disrupting communications satellites that share that orbital regime. The Shijian-21 satellite, launched in October 2021, demonstrated the ability to capture and reposition another satellite, a capability with direct implications for proximity electronic attack.
Twelve countries are now assessed by the Secure World Foundation as actively researching counterspace capabilities, a number that has grown steadily since 2018 and includes states that weren’t previously considered space powers at all. The bar for entry is lower than it might seem, because basic ground-based jamming equipment requires no space launch capability and no advanced industrial base to acquire and operate.
Directed Energy: Satellites in the Crosshairs of Lasers and Microwaves
A ground-based laser can blind an imaging satellite’s optical sensors, either temporarily, a technique called dazzling, or permanently, called blinding. The satellite doesn’t announce that it’s been attacked. The imagery simply stops being usable. China tested a ground-based laser against a U.S. satellite in 2006, according to reporting by Aviation Week & Space Technology at the time, and the U.S. government acknowledged the event without attributing it to an act of war.
High-powered microwave weapons can potentially destroy or degrade the electronics of a satellite without leaving any trace that would distinguish the event from a natural component failure, radiation damage from solar activity, or a manufacturing defect. This attribution difficulty is strategically valuable to an attacker and deeply problematic for deterrence: if an adversary can’t be confidently identified as responsible, the threatened retaliation that underpins deterrence loses credibility.
Russia’s Peresvet directed energy system, publicly announced by President Putin in March 2018, is assessed by U.S. intelligence as a laser weapon designed to blind or damage optical sensors on reconnaissance satellites. Its deployment alongside road-mobile intercontinental ballistic missiles points to a specific operational purpose: preventing adversary satellites from tracking those missiles. France, for its part, is developing the FLAMHE program to place on-board lasers on its own satellites, with the stated objective of neutralizing unfriendly satellites without creating orbital debris. The YODA patrol nanosatellite, expected to launch to geosynchronous orbit in 2026 or 2027, is the experimental predecessor to what France plans to field operationally as EGIDE by approximately 2030.
The Air Force Research Laboratory has acknowledged research into high-energy laser systems for space domain awareness and counter-space applications. Specific deployed capabilities remain classified, but the trajectory of these programs across multiple major military powers points toward a future where directed energy attacks on satellites are not exotic but routine.
Satellite Communications Warfare
Military satellite communications, or SATCOM, represent one of the highest-value targets in any major conflict. The Advanced Extremely High Frequency constellation, which replaced the Milstar system, was designed specifically to survive nuclear war and resist jamming. Its signals use frequency hopping, advanced encryption, and high directional gain antennas that make jamming it from a distance extremely difficult. But the AEHF constellation has limited bandwidth, and it covers only the highest-priority communications.
The bulk of U.S. military communications traffic runs over commercial satellite bandwidth leased from commercial operators, and commercial satellites are built to civilian specifications without hardening or anti-jam features. This creates a vulnerability that’s well understood by adversaries. During operations in Afghanistan and Iraq in the 2000s and 2010s, commercial satellites carried a substantial share of U.S. forces’ communications load. Jamming a commercial satellite’s transponder is technically within the reach of any reasonably well-equipped military.
North Korea demonstrated this in multiple incidents targeting South Korea in 2012 and 2016, using ground-based jammers to disrupt GPS signals in ways that affected civil aviation and shipping. These were not exotic capabilities. The jammers were relatively inexpensive, deployed from trucks, and the threshold of technical sophistication required to operate them was low. The Secure World Foundation noted that GPS signals can be jammed and civilian ones spoofed with cheap, commercially available hardware, a point that David Zurn of the Georgia Tech Research Institute made explicitly at a 2024 symposium: non-state actors and smaller nations without space launch capability can participate in electronic space warfare using off-the-shelf equipment.
The U.S. Space Force approved new satellite jammers called Remote Modular Terminals for deployment in late 2024, adding to the existing Counter Communications System inventory and addressing some of its predecessor’s range and frequency limitations.
The Viasat Attack and the Cyber Dimension
On February 24, 2022, the same morning Russia launched its full-scale invasion of Ukraine, a cyberattack struck the Viasat KA-SAT satellite network, knocking tens of thousands of modems offline across Europe. The attack used a wiper malware payload, later named AcidRain and attributed to Russian military intelligence by the U.S. and European governments. It wasn’t a jamming attack. It was an intrusion through ground segment infrastructure that cascaded up to affect satellite service across the continent. Wind turbines in Germany that depended on Viasat’s network for remote monitoring went dark. Emergency services in Ukraine lost connectivity at the moment the invasion began.
Cybersecurity researchers at SentinelOne published a detailed analysis of the AcidRain malware in March 2022, confirming its architecture and purpose. The incident did something important: it demonstrated that attacking satellite systems doesn’t require exotic weapons aimed at space. The ground segment, the terrestrial networks that control, communicate with, and receive data from satellites, is often the path of least resistance, and it is among the least secured essential infrastructure in existence.
The boundary between electronic warfare and cyber warfare blurs substantially when the target is a satellite’s command and control system. A ground station connected to a corporate network is connected, in effect, to the internet. A successful intrusion into a satellite operator’s systems could allow an adversary to intercept telemetry, upload malicious commands, or disable the spacecraft entirely. The Viasat attack was the clearest demonstration yet that this isn’t theoretical.
Major Electronic Space Warfare Capabilities by Country
| Country | Capability Type | Known System or Program | Status as of 2026 |
|---|---|---|---|
| United States | SATCOM Uplink Jamming | Counter Communications System (CCS); Meadowlands follow-on | CCS operational; Meadowlands in operational testing |
| Russia | GPS/GNSS Jamming | Krasukha-4; Moskva system | Operational (deployed Ukraine, Syria, Kaliningrad) |
| China | Multi-band Jamming; Co-orbital EW | PLA Strategic Support Force platforms; GEO test satellite | Operational ground systems; GEO platform under test |
| Russia | Directed Energy (Laser) | Peresvet | Operational (co-deployed with road-mobile ICBMs) |
| France | Patrol Satellite; On-board Laser | YODA; FLAMHE; EGIDE (planned) | YODA launch expected 2026-2027; EGIDE by 2030 |
| United States | Space Domain Awareness | Space Fence S-band radar (Marshall Islands) | Operational |
| China | Co-orbital Rendezvous | Shijian-21 | Demonstrated (captured and repositioned another satellite) |
Operation Epic Fury and the First Publicly Acknowledged Space EW Campaign
On February 28, 2026, the United States and Israel launched coordinated strikes against Iranian military infrastructure under the codename Operation Epic Fury. Within days, senior U.S. commanders were publicly crediting space operations with a decisive enabling role. Admiral Brad Cooper, commander of U.S. Central Command, stated in a video address that the Space Force was “degrading Iranian capability” and “protecting American forces” in ways he declined to describe in detail.
Experts who spoke with Breaking Defense and other outlets were less reticent. The consensus assessment was that Space Force’s electronic warfare units were jamming Iranian satellite communications, preventing the Iranian military from using satellite links to coordinate forces, share targeting data, and transmit kill chain information. The 4th Electromagnetic Warfare Squadron, part of Mission Delta 3 at Peterson Space Force Base, operates the Counter Communications System specifically for missions of this type. Uplink jamming, the CCS’s primary function, blocks signals from Iranian ground stations from reaching whatever satellites Iran was using for communications, effectively silencing those relay paths.
GPS interference was documented within the first 48 hours of the operation, consistent with Iranian jamming capabilities that had been demonstrated previously, including during the January 2020 ballistic missile strikes on Al-Asad Air Base in Iraq. The jamming environment extended from Iranian territory across portions of the Persian Gulf, the Gulf of Oman, and the Strait of Hormuz, affecting commercial aviation and maritime navigation in the region. The U.S. military’s response drew on procedures specifically developed to maintain operations in a GPS-denied environment, leveraging the M-Code signal and alternative navigation methods.
EA-18G Growler electronic attack aircraft from Electronic Attack Squadron 142, operating from the USS Gerald R. Ford, flew suppression of enemy air defense missions that included jamming Iranian ground-based radar systems in coordination with space-based electronic warfare operations. The combination of airborne and space-based EW represents a new level of integration that had been planned and exercised but hadn’t been employed at this scale in actual combat before Operation Epic Fury.
What makes this episode historically significant is the public acknowledgment. Space-based electronic warfare had been conducted before, presumably including in previous Middle East conflicts, but with far greater operational security around the details. The degree of transparency in March 2026 reflected a deliberate deterrence posture: demonstrating to adversaries that the capability exists and has been used effectively.
Space Delta 3 and the Meadowlands Upgrade
The U.S. Space Force, established December 20, 2019, created a dedicated electromagnetic warfare command structure that didn’t exist before. Mission Delta 3, its electromagnetic warfare unit at Peterson Space Force Base in Colorado, is responsible for organizing, training, and equipping forces for both offensive and defensive electronic warfare operations in the space domain. Space Delta 3 operates the Counter Communications System and trains Guardians on the tactics, techniques, and procedures for SATCOM jamming.
The CCS follow-on system, known as Meadowlands and developed by L3Harris Technologies, entered operational testing with the Space Force in 2025. Meadowlands addresses several limitations of its predecessor: it’s lighter and more mobile than the CCS, capable of jamming across multiple frequency bands including S-band and X-band, and can be operated remotely without a crewed command post collocated with the antenna. A November 2024 Bloomberg report indicated the Space Force intended to procure as many as 32 units, a scale of deployment that would represent a substantial expansion of the U.S. offensive electronic warfare posture in space.
Space Force Chief of Space Operations General Chance Saltzman announced in February 2026 that the service was sharing its 15-year force structure roadmap with industry and allied officials, focused on three primary mission areas: navigation warfare, space domain awareness, and satellite communications. The explicit inclusion of navigation warfare, which encompasses both the protection of GPS signals and offensive navigation denial operations, signals how prominently electronic warfare features in the Space Force’s conception of its own core mission.
Mission Delta 9, the Space Force’s orbital warfare unit, received a significant training upgrade in February 2026 in the form of a live satellite dedicated to practicing offensive and defensive orbital maneuver operations. The combination of orbital and electronic warfare capabilities, developing in parallel, points toward a future where attacking or defending satellites involves not just signal manipulation but physical proximity operations enabled by electronic intelligence.
Commercial Constellations as Targets and Tools
SpaceX‘s Starlink constellation provided Starshield military communications services during Operation Epic Fury, and the JNS reporting from March 2026 characterized the low Earth orbit network as offering high-bandwidth, highly resilient communications for coordinating drone swarms in a contested electromagnetic environment. This wasn’t the first time Starlink had been used in active combat. Ukrainian forces began using Starlink terminals in early 2022, and Russia immediately attempted to jam them. SpaceX engineers responded with software updates that defeated the jamming attempts within hours, as Elon Musk acknowledged publicly in February 2022.
The resilience Starlink demonstrated came from its architecture. A constellation of several thousand satellites in low Earth orbit is simply too distributed for existing ground-based jamming systems to suppress comprehensively. Jamming one satellite, or one ground terminal, doesn’t affect the thousands of others. The network routes around the interference automatically. This architectural reality has influenced how military planners think about the relationship between constellation size and electronic warfare resilience.
Planet Labs, with approximately 200 earth observation satellites, and Capella Space, operating a synthetic aperture radar constellation capable of all-weather imaging at sub-meter resolution, both tasked their assets against Iranian targets within hours of Operation Epic Fury’s opening strikes. Commercial imagery of Natanz’s surface structures was in public distribution by the morning of March 1, 2026. This is a fundamental change in the information environment of modern warfare: adversaries can no longer assume that satellite reconnaissance is a capability limited to nations with their own government-operated imagery programs.
Amazon’s Project Kuiper, which began initial satellite deployments in 2024, represents the next large commercial broadband constellation that will face the same electronic warfare pressures that Starlink encountered. The industry is watching closely how these systems perform in contested environments, and the DoD is watching too, with the Space Development Agency awarding a $30 million contract to AST SpaceMobile in February 2026 to explore using commercial satellite networks for tactical military communications.
Electronic Intelligence from Orbit
Not all space-based electronic warfare is offensive. A large and strategically valuable part involves collecting signals intelligence from orbit, the disciplines known as SIGINT, ELINT, and COMINT. ELINT satellites monitor the electromagnetic emissions of ground-based radar systems, missile defense installations, naval vessels, and military communication networks. By characterizing these signals, including their frequencies, pulse rates, and modulation patterns, intelligence analysts can map an adversary’s entire defense architecture and identify how to defeat or avoid those systems in a conflict.
The National Reconnaissance Office, whose budget remains classified but is estimated in the several-billion-dollar range annually, operates a range of signals intelligence satellites. The Mentor series, also known as Advanced Orion, consists of geosynchronous satellites with enormous deployable antenna arrays designed to collect signals from wide areas. They’re not jamming platforms. They’re listening posts, gathering the electromagnetic signature of military activity worldwide.
China and Russia operate equivalent programs. Russia’s co-orbital Luch/Olymp satellite, maneuvering to within 10 kilometers of other satellites, is an ELINT platform as much as a potential interference system. The intelligence collected from that proximity goes beyond what ground-based interception could gather. Understanding an adversary’s satellite signal architecture in precise detail is the prerequisite for effective electronic attack, which is why SIGINT collection and offensive electronic warfare are so tightly integrated organizationally in all three major space powers.
Nuclear Command and the Electronic Threat
One aspect of electronic space warfare that receives less public attention than GPS jamming and commercial satellite disruption is its intersection with nuclear command and control. U.S. nuclear forces depend on satellite communications for the transmission of Emergency Action Messages, the authenticated commands that authorize nuclear weapons use. The AEHF constellation was designed specifically to ensure these communications survive in a degraded electromagnetic environment, including nuclear detonations that generate electromagnetic pulses across wide areas.
The concern is direct: an adversary who could jam or spoof nuclear command communications at a moment of crisis could, in theory, complicate a retaliatory response, create confusion during escalation management, or generate false signals that trigger an unintended reaction. The mere possibility of these scenarios changes the strategic calculus in ways that don’t require any of them to actually occur. Uncertainty about the reliability of command communications in crisis increases the pressure to use nuclear weapons before they’re neutralized, a dynamic that arms control theorists call “use it or lose it.”
Russia’s Peresvet laser system’s co-deployment with road-mobile ICBMs makes most sense when understood in this context. It’s not primarily an anti-satellite weapon in the general sense. It’s a tool for protecting the survivability leg of Russia’s nuclear deterrent by preventing reconnaissance satellites from tracking those missiles before they’ve been launched. Electronic warfare and nuclear strategy are intertwined in ways that rarely surface in public discussion.
Building Resilience Into Space Architecture
The dominant strategic response to electronic space warfare threats in U.S. defense planning has shifted away from hardening individual satellites toward building resilience across the entire architecture. Rather than making any single satellite invulnerable to jamming or directed energy attack, the goal is to ensure that the loss of individual nodes doesn’t collapse the overall capability.
The Defense Advanced Research Projects Agency has funded research into disaggregated satellite architectures for more than a decade, based on exactly this logic. If a single geosynchronous communications satellite gets jammed, the entire region dependent on that satellite goes dark. If the same function is distributed across 50 satellites in multiple orbital regimes, jamming any one of them is an inconvenience rather than a decisive blow. Disaggregation reduces the electronic warfare target value of any individual spacecraft.
The Space Force’s Proliferated Warfighter Space Architecture represents this philosophy at operational scale. Rather than fielding a small number of large, expensive military satellites, the program envisions hundreds of smaller satellites in low Earth orbit providing communications, surveillance, and navigation services with no single point of failure. The Space Development Agency has already launched several tranches of satellites as part of this program, with the constellation intended to grow substantially over the coming years.
Adaptive nulling antennas represent another layer of technical defense. These antennas can identify the direction from which jamming signals are arriving and null out that direction, preserving signal quality from legitimate satellite directions while rejecting interference. Combined with frequency-hopping techniques that switch transmission frequencies thousands of times per second, they make sustained jamming of military satellite links substantially harder than it was with legacy systems.
The Governance Gap and the Law of Conflict in Space
The legal framework governing electronic space warfare has not kept pace with the operational reality. The Outer Space Treaty of 1967 prohibits placing weapons of mass destruction in space but says nothing specific about electronic warfare. The ITU Radio Regulations govern radio frequency interference and prohibit harmful interference, but were designed for peacetime commercial disputes, not wartime operations by state militaries.
Operation Epic Fury brought this governance gap into sharp relief. As the SatNews analysis published in March 2026 observed, RF jamming and cyber disruptions are temporary and reversible operations that cause no permanent hardware damage. They arguably never cross the threshold of an “armed attack” under the UN Charter’s Article 51, even when they achieve effects equivalent to destroying communications infrastructure. This creates a zone of activity where states can achieve strategic military objectives through electronic means without triggering the legal responses that kinetic attacks would provoke.
NATO designated space as an operational domain in December 2019, but what constitutes an Article 5 attack in the space domain has never been formally defined. If Russia jams GPS signals over the Baltic states for several hours, affecting civil aviation and disrupting military operations, is that an Article 5 event? The ambiguity is almost certainly deliberate. Russia’s willingness to use electronic space warfare tactics against NATO-adjacent territories without triggering a collective defense response suggests it has calculated, correctly so far, that the threshold hasn’t been reached.
The Woomera Manual on the International Law of Military Space Operations, published by Oxford in 2024, represents the most serious recent effort to apply existing international humanitarian law to space warfare scenarios. Its conclusions are objectiveing: the orbital domain severely lacks established state practice, and military legal scholars are frequently forced to extrapolate from maritime law analogies that fit imperfectly.
What Artificial Intelligence Is Changing
Artificial intelligence is altering both sides of the electronic space warfare equation simultaneously. On the offensive side, AI-enabled systems can probe, characterize, and exploit electromagnetic vulnerabilities faster than any human operator, adapting jamming waveforms in real time to counter countermeasures and identifying the optimal frequency and power configuration to disrupt a specific satellite link.
On the defensive side, machine learning algorithms are being applied to satellite telemetry analysis to identify anomalies indicating jamming or spoofing attempts. The U.S. Space Force has stated publicly that AI has reduced false alarm rates in its space situational awareness systems by 75% while accelerating response times to genuine threats. Space Force electronic warfare leaders have described wanting to automate processes that are currently manual, using computing power to disrupt adversary SATCOM or to detect, identify, and geolocate interference sources faster than current systems allow.
The Space Surveillance Network, comprising ground-based radars, optical telescopes, and space-based sensors, tracks over 30,000 objects in orbit. Applying AI to the electromagnetic intelligence gathered by those assets, correlating signal anomalies with orbital objects and historical behavioral patterns, is the direction the field is moving. The adversary is doing the same thing. Electronic space warfare is evolving from a relatively static, hardware-centric capability toward a software-defined, AI-accelerated contest that can be updated and adapted at the speed of software rather than the speed of satellite procurement.
Books That Illuminate the Domain
Two books stand out as useful background for understanding how electronic warfare and space intelligence capabilities developed. The Wizards of Langley by Jeffrey Richelson examines the CIA’s science and technology directorate and its role in developing early reconnaissance satellites, providing essential context for how signals intelligence from space became embedded in U.S. military strategy from the very beginning. War in Space by Leonard David covers the militarization of space and the development of anti-satellite and electronic warfare capabilities across multiple nations.
Summary
The 2026 Iran conflict marked the first time a major military operation publicly acknowledged the operational use of space-based electronic warfare as a decisive enabler. That acknowledgment matters beyond its immediate tactical context. It establishes a precedent that space electronic warfare is not a future concern to be addressed through arms control negotiations but a present operational capability that shapes military outcomes now.
What hasn’t been established, and what no major military power has invested seriously in building, is a governance architecture adequate to manage these capabilities before they produce an unintended escalation. The current state, where electronic attacks on satellites can be conducted without clear legal accountability, where the threshold between electronic warfare and an act of war remains undefined, and where commercial satellite infrastructure used by billions of civilians can be targeted with impunity, is not sustainable indefinitely. The next serious crisis between major space powers will test that absence of architecture in ways that electronic warfare tacticians are already planning for but diplomats have barely begun to address.
Appendix: Top 10 Questions Answered in This Article
What is electronic space warfare?
Electronic space warfare is the use of the electromagnetic spectrum to attack, disrupt, deny, or degrade an adversary’s satellite-based capabilities while protecting one’s own. It includes jamming satellite uplinks and downlinks, spoofing navigation signals, intercepting communications intelligence, and using directed energy or cyber intrusion to disable or manipulate space systems.
How is GPS jamming different from GPS spoofing?
GPS jamming floods receivers with noise to block the legitimate navigation signal entirely, causing receivers to lose position fix. GPS spoofing generates a convincing false signal that receivers mistake for an authentic satellite transmission, producing incorrect position data without any visible indication of interference. Spoofing is considered more dangerous in many military contexts because the deception can go undetected until consequences materialize.
Which countries have operational satellite jamming capabilities?
As of 2026, the United States, Russia, and China have confirmed or assessed operational satellite jamming capabilities. Russia has deployed its Krasukha-4 and Moskva systems in Ukraine, Syria, and near Kaliningrad. China’s PLA Strategic Support Force operates ground-based multi-band jamming systems. The U.S. Space Force’s Counter Communications System and its Meadowlands follow-on are designed for SATCOM uplink jamming. The Secure World Foundation’s 2025 report assessed 12 countries as researching counterspace capabilities.
What happened to the Viasat satellite network at the start of Russia’s invasion of Ukraine in 2022?
On February 24, 2022, a cyberattack using wiper malware called AcidRain struck the Viasat KA-SAT network, disabling tens of thousands of satellite modems across Europe. The attack was attributed to Russian military intelligence and worked through ground segment infrastructure rather than directly attacking the satellite. Wind turbines in Germany and Ukrainian communications systems were among those affected.
What role did the Space Force play in Operation Epic Fury in 2026?
During Operation Epic Fury, which began February 28, 2026, U.S. Space Force units assigned to Mission Delta 3 are assessed to have conducted SATCOM uplink jamming of Iranian satellite communications, degrading Iran’s ability to command forces and coordinate operations. CENTCOM commander Admiral Brad Cooper publicly credited the Space Force with degrading Iranian capability, while experts identified jamming and spoofing as the most likely specific activities.
What is the Meadowlands system and why does it matter?
Meadowlands is a next-generation satellite communications jamming system developed by L3Harris Technologies for the U.S. Space Force, currently in operational testing as of 2025. It improves on its predecessor, the Counter Communications System, by being lighter, more mobile, capable of jamming multiple frequency bands including S-band and X-band, and operable remotely without a crewed command post. The Space Force has indicated intent to procure up to 32 units.
How does Starlink resist electronic jamming?
Starlink’s resilience against jamming derives primarily from the size and distribution of the constellation rather than from any single technical anti-jam feature. With thousands of satellites in low Earth orbit, no ground-based jamming system can suppress the entire network simultaneously. When Russia attempted to jam Ukrainian Starlink terminals in 2022, SpaceX responded with software updates that adapted the system’s operation to defeat the jamming within hours.
What is the Peresvet laser system and what is its strategic purpose?
Peresvet is a Russian ground-based directed energy weapon, publicly announced by President Putin in March 2018 and assessed by U.S. intelligence as a laser capable of blinding or damaging the optical sensors of reconnaissance satellites. Its co-deployment alongside road-mobile intercontinental ballistic missiles suggests its primary purpose is to prevent adversary satellites from tracking and targeting those missiles before launch, linking it directly to Russia’s nuclear deterrence strategy.
What is France developing for space electronic warfare?
France is developing the YODA patrol nanosatellite, expected to reach geosynchronous orbit in 2026 or 2027, which will test on-orbit inspection and maneuvering capabilities. The FLAMHE program is developing on-board laser systems for satellites intended to neutralize hostile satellites without creating orbital debris. The operational version of these capabilities, called EGIDE, is targeted for development by approximately 2030.
Why is the legal framework governing electronic space warfare inadequate?
The Outer Space Treaty of 1967 prohibits weapons of mass destruction in orbit but says nothing specific about electronic warfare. The ITU Radio Regulations prohibit harmful interference but were designed for peacetime commercial disputes. Because RF jamming and cyber disruptions are temporary and reversible, they arguably fall below the threshold of an armed attack under the UN Charter, allowing states to achieve significant military objectives through electronic means without triggering the legal responses that kinetic attacks would provoke. No binding international framework currently addresses wartime satellite jamming by state actors.