HomeMarket SegmentCommunications MarketSpace-Dependent Military Doctrine: Vulnerabilities and the Weapons That Exploit Them

Space-Dependent Military Doctrine: Vulnerabilities and the Weapons That Exploit Them

Key Takeaways

  • GPS jamming and spoofing degrade precision weapons in every active conflict zone
  • Four nations have destroyed satellites in orbit, and more can threaten them
  • Resilience programs are maturing but lag years behind the operational threat

When Every Target Depends on a Signal From Space

The last thirty years of Western military planning rest on an assumption that has never been tested at full scale: that satellites will keep working when they’re needed most. That assumption produced the most capable precision strike force in history. It also built a structural fragility that adversaries identified decades ago and have spent those same decades learning to exploit.

Precision navigation, satellite communications, overhead reconnaissance, early warning, and weather data from orbit aren’t supplemental capabilities that enhance an otherwise functional military force. For the United States and most of its allies, they’re the connective tissue that holds modern military operations together. Remove them, or degrade them selectively, and command-and-control cycles slow, weapons miss, logistics break down, and commanders make decisions on stale or incomplete intelligence. This is what adversary planners in Beijing and Moscow have been studying since at least the Gulf War of 1991, and it’s why the counter-space investments both nations have made represent some of the most deliberate strategic competition in the post-Cold War era.

The US Space Force , formally established on December 20, 2019, as the sixth branch of the United States Armed Forces, exists partly as an institutional acknowledgment of this problem. The creation of a dedicated military service for space operations signaled that the United States no longer treats space as a permissive environment where assets can operate without serious threat. That shift in institutional posture, however significant symbolically, hasn’t yet closed the gap between the depth of space dependency built up over three decades and the resilience that would be needed to fight effectively when that dependency is attacked.

What follows is an examination of where the vulnerabilities actually are, how serious they are in operational terms, and what weapons and tactics have been developed to exploit them.

The Navigation Layer and Its Enemies

Satellites operate far enough above Earth’s atmosphere that destroying them requires considerable effort. Disrupting the signals they broadcast is far easier, because those signals are physically weak by the time they reach a user on the ground. GPS satellites orbit at approximately 20,200 kilometers altitude. The signal broadcast from each satellite, powerful enough when it leaves the spacecraft, spreads across an enormous volume of space during that descent and arrives at a receiver with power levels comparable to detecting the light of a 60-watt bulb from several thousand miles away. Overcoming that signal with ground-based noise requires relatively modest hardware. The physics haven’t changed, and no amount of satellite development can change them without abandoning the fundamental GPS architecture.

Jamming at Scale

A GPS jammer doesn’t need to be sophisticated. Truck-mounted systems can deny GPS service over areas of hundreds of square kilometers. Russia understood this early and invested accordingly. The Krasukha-4 electronic warfare system, produced by Concern Radio-Electronic Technologies, is designed both to suppress airborne radar systems and to degrade the utility of low Earth orbit radar reconnaissance satellites through directed high-power emissions. Russia deployed Krasukha-4 systems to Syria from September 2015, where US military pilots flying over the conflict zone reported GPS signal anomalies consistent with active jamming. The system has since been documented extensively in Ukraine through commercial satellite imagery and open-source analysis, with multiple units identified near front-line positions.

The scale of GPS disruption in and around Ukraine during 2023 and 2024 was extensive enough to affect civilian aviation far from the combat zone. Monitoring data aggregated by the GPSJAM.org system, which compiles GPS anomaly reports from commercial aircraft transponders, showed daily disruption events in the Ukrainian theater with affected areas sometimes exceeding 500,000 square kilometers. Pilots approaching airports in Helsinki, Tallinn, and Riga reported GPS anomalies consistent with jamming originating from Russian-controlled territory, disruptions severe enough to prompt formal advisories from aviation authorities in Finland, Poland, and the Baltic states.

Weapons systems caught in this environment suffer direct effects. JDAM-ER extended-range GPS-guided bombs supplied to Ukraine by the United States in 2023 reportedly experienced degraded accuracy in the heavily jammed environment of eastern Ukraine, according to statements from US defense officials to defense publications and assessments by Ukrainian military sources. The weapons didn’t fail completely, but the precision that the entire targeting process is calibrated around became unreliable, forcing adaptations that slow operational tempo and reduce the confidence commanders place in planned effects. This is an important distinction: GPS jamming doesn’t necessarily eliminate a weapon’s effectiveness, but it introduces enough uncertainty to degrade the operational calculus and create pressure to use more munitions to achieve the same level of destruction.

North Korea demonstrated that even states with modest technological resources can execute GPS jamming operations at scale. Between 2010 and 2016, North Korea conducted multiple documented jamming campaigns against South Korea, disrupting aircraft navigation, shipping systems, and ground vehicle navigation in the Seoul metropolitan area. South Korean authorities tracked the jamming to mobile transmitters operating near Kaesong and in North Hwanghae province. The campaigns didn’t produce strategic military effect in isolation, but they established clearly that GPS attacks aren’t confined to technologically sophisticated adversaries with expensive dedicated electronic warfare programs.

Spoofing: The Invisible Edit

GPS spoofing is more technically demanding than jamming but operationally more dangerous for certain applications. Rather than overwhelming a receiver with noise, spoofing broadcasts a false but coherent GPS signal that convinces the receiver it has a legitimate position fix at the wrong location. Aircraft navigate to wrong waypoints. Munitions fly to wrong coordinates. Ships hold course toward the wrong position. None of the instruments show anything obviously wrong. The receiver believes it’s functioning correctly because it’s receiving a signal with all the right characteristics, just not from where it claims to originate.

The first large-scale documented spoofing incident in a strategic context occurred in June 2017 in the Black Sea near the Russian port of Novorossiysk. Ship tracking data compiled and analyzed by the Center for Advanced Defense Studies and published in July 2017 showed more than 20 vessels simultaneously reporting GPS positions placing them at Gelendzhik Airport, roughly 25 miles inland from their actual positions in open water. The ships were stationary relative to each other. Their GPS receivers had been fed a false signal strong enough to override the authentic one. Every captain looking at his bridge instruments would have seen a confident position fix, pointing to somewhere he definitely wasn’t.

Spoofing incidents have since been documented with much greater frequency and across a far wider geographic area. The Eastern Mediterranean, the Persian Gulf, and airspace surrounding Iranian territory have all produced verified spoofing anomalies affecting both civilian and military navigation. Israeli aviation regulators issued formal safety warnings in late 2024 regarding persistent GPS unreliability affecting instrument approaches at Ben Gurion Airport, a disruption environment with direct implications for Israeli air force operations sharing the same airspace and the same GPS signal environment.

The military implications extend well past weapons guidance. GPS timing signals synchronize military communications networks, coordinate electronic warfare systems, and provide the precise timestamps used in signals intelligence collection. Disrupting timing without disrupting navigation appears in technical literature as a distinct attack mode, and it can degrade network performance and intelligence collection while leaving GPS position displays showing apparently valid fixes.

Satellites That Can Be Seen Coming

Every satellite in low Earth orbit follows a path governed by Newton’s laws. Those paths are predictable. Low Earth orbitsatellites cycle around the planet every 90 to 100 minutes, and their ground tracks repeat on predictable schedules derived entirely from publicly available physics. Any nation with basic space surveillance capability can calculate, with high precision, when a given reconnaissance satellite will pass over a given point on the ground. The satellite might be technically capable of imaging a facility or tracking a convoy, but if the target knows when it’s coming, it can schedule activities accordingly, cover what needs covering, or simply wait.

This orbital predictability problem affects intelligence, surveillance, and reconnaissance satellites most directly. The United States has operated a classified reconnaissance satellite fleet under the National Reconnaissance Office since 1961. The technical capabilities of current NRO systems aren’t publicly disclosed in detail, but are broadly understood to include sub-meter-resolution optical imaging, synthetic aperture radar that penetrates clouds and darkness, and signals intelligence collection across a wide frequency range. These are extraordinary capabilities fielded on a limited number of expensive platforms whose orbital positions, while classified, can often be inferred through careful analysis of the public two-line element dataset published by US Space Command through Space-Track.org.

China has observed this orbital predictability dynamic and built its own reconnaissance constellation partly to understand US coverage patterns. The Yaogan program, which launched its first satellite in 2006, had grown to more than 40 operational satellites across multiple orbital regimes by early 2026, carrying optical, synthetic aperture radar, and electronic intelligence payloads. Chinese military planners use Yaogan data to track US carrier strike group movements in the Pacific, according to assessments by the RAND Corporation and the National Defense University based on published PLA doctrine. The same orbital mechanics that limit US ISR coverage of Chinese military activities apply symmetrically, and both sides can predict when the other’s surveillance windows open and close.

Commercial satellite imagery has deepened military dependency on overhead reconnaissance while introducing new supply chain vulnerabilities. Vantor and Planet Labs both supply imagery to US military and intelligence consumers under contracts with the National Geospatial-Intelligence Agency . Planet’s constellation of several hundred small satellites provides daily global coverage at three-meter resolution. This commercial architecture makes broad coverage affordable and keeps individual satellite losses from being catastrophic. However, Planet communicates with ground stations worldwide, and each node in that network, hosting both uplink capability and processed data, presents a potential compromise point for a sophisticated adversary who can’t easily reach the satellites themselves.

The temporal vulnerability also shapes how ISR satellites are used operationally. Targeting cycles built around continuous satellite coverage run on planning assumptions calibrated to the expectation that imagery and signals intelligence are continuously available. When coverage gaps appear, whether through satellite failures, jamming, or successful physical attacks, those planning cycles don’t automatically adapt. The institutional habits built around continuous coverage are hard to break quickly, and commanders who’ve spent careers operating with overhead ISR available on demand find it difficult to revert to planning frameworks designed for environments where overhead information is intermittent or absent.

The Communications Architecture and Where It Breaks

Military communication has run increasingly through space for thirty years. The logistics data, targeting packages, intelligence products, command orders, and administrative traffic that sustain modern military operations travel overwhelmingly via satellite link, because terrestrial systems can’t bridge the oceanic distances involved in the global force projection model the United States has practiced since the Cold War. This dependency runs so deep that many headquarters lack the trained personnel and functional equipment needed to maintain effective command when satellite links are disrupted, because the legacy high-frequency radio procedures that pre-date satellite communications fell out of routine practice during two decades of uncontested high-bandwidth connectivity. The units haven’t forgotten how HF radio works in theory. They’ve simply stopped practicing it regularly enough to be competent under pressure.

The Viasat Lesson

On February 24, 2022, within minutes of Russian armored formations crossing into Ukraine, Viasat ‘s KA-SAT satellite internet service suffered a cyberattack that the United States, United Kingdom, and European Union authorities subsequently attributed to Russia’s GRU military intelligence directorate. The attack deployed a piece of malware called AcidRain through vulnerable modem management infrastructure, permanently disabling approximately 50,000 satellite modems across Europe. Ukrainian military units relying on KA-SAT connectivity lost communications at the moment they needed them most. Emergency services were disrupted. Approximately 5,800 wind turbines in Germany lost remote monitoring capability because their control systems ran on the same satellite internet service.

The KA-SAT satellites themselves kept operating throughout the attack. The spacecraft in geostationary orbit, approximately 35,786 kilometers above Earth’s equator, were never touched. What failed was the ground infrastructure connecting users to those satellites, and that failure was achieved through malware deployed against commercial network management systems never designed to meet military security standards. The attack succeeded not despite the satellite being intact, but because the satellite being intact was irrelevant once the modems connecting users to it had been bricked.

SpaceX ‘s Starlink terminal network provided a partial alternative for Ukrainian forces in the weeks following the Viasat attack, with terminals supplied beginning in late February 2022. The Starlink experience introduced its own complications almost immediately. Russian electronic warfare units subjected Starlink terminals to jamming attempts shortly after their deployment. Elon Musk stated publicly in February 2022 that Russian jamming was powerful enough to affect standard Starlink service, though SpaceX responded with software updates within days. Ukrainian military sources reported in 2022 and 2023 that Russian signals intelligence located Ukrainian military positions partly by detecting Starlink terminal transmissions. The terminals, in active use, broadcast on detectable frequencies, and those frequencies became targeting cues for Russian artillery.

Jamming the Uplink

Geostationary communications satellites occupy fixed positions above the equator and are visible from roughly one-third of Earth’s surface simultaneously. An adversary wanting to disrupt satellite communications doesn’t need physical access to the satellite or proximity to the ground station it’s communicating with. A jammer positioned anywhere within the satellite’s coverage footprint can direct high-power emissions at the satellite’s receive antenna, disrupting the uplink from the legitimate ground station without being anywhere near it. That coverage footprint can span millions of square kilometers, giving the attacker an enormous amount of territory from which to operate.

Iran has demonstrated uplink jamming of communications satellites broadcasting into Iranian territory on multiple documented occasions, disrupting programming from Persian-language broadcasters using Eutelsat and Intelsat spacecraft. These episodes were documented by satellite operators and broadcast monitoring organizations and represent a capability applied for information control that could equally target military communications satellites. Russia has used uplink jamming against tactical communications satellites in the Ukrainian theater, with activity documented in reporting from the Institute for the Study of War and open-source analysis organizations monitoring electronic warfare through multiple data streams.

The Advanced Extremely High Frequency satellite constellation operated by the US Space Force provides meaningful protection against jamming for nuclear command and control and other high-priority communications traffic. The first AEHF satellite launched on August 14, 2010, and the constellation reached five operational satellites by 2020, with all satellites built by Northrop Grumman . AEHF uses frequency hopping, high-gain spot beams, and satellite crosslinks to make jamming extremely difficult. These protections are real and meaningful. They also serve a narrow set of users at the highest levels of command. The vast majority of military communications traffic, including operational coordination, logistics, and lower-classification intelligence traffic that makes large-scale military operations function in practice, runs over commercial satellite infrastructure with no comparable protection.

The Weapons Designed to Kill Satellites

Electronic warfare degrades space capabilities without producing visible debris or generating irrefutable evidence of hostile action. Kinetic anti-satellite weapons don’t have that ambiguity. A satellite hit by a missile produces radar returns, a debris field, and an immediate orbital anomaly, all attributable with reasonable confidence to hostile action. Kinetic ASAT weapons are the most dramatic threat to space systems, and they’re also the most politically costly to use, which is precisely why they remain a deterrent tool and a capability demonstration rather than a routine operational instrument.

Kinetic Direct-Ascent Systems

Four countries have now destroyed satellites in orbit using direct-ascent kinetic interceptors. The sequence of tests spans more than a decade and represents a deliberate escalation of counter-space capability development that has fundamentally altered the strategic environment in which space assets operate.

China was the first to demonstrate a modern kinetic ASAT capability in the current era. On January 11, 2007, a missile launched from Xichang Space Center intercepted and destroyed the Fengyun-1C weather satellite at approximately 865 kilometers altitude. The impact generated roughly 2,000 trackable debris pieces and an estimated 35,000 fragments larger than one centimeter in diameter, spreading through one of the most heavily trafficked orbital bands and creating the largest single addition to the orbital debris environment in history at that point. Portions of that debris field will remain in orbit for decades, presenting a collision risk to operational satellites in similar orbital regimes.

China’s test wasn’t conducted without an understanding of the debris consequences. Choosing to test at 865 kilometers, within the band most densely populated with operational satellites, was a strategic choice. Its message was received clearly: China possessed the capability to destroy satellites at operationally relevant altitudes and was prepared to demonstrate that capability despite the lasting environmental costs.

The United States conducted its own intercept on February 21, 2008. USS Lake Erie , a guided-missile cruiser, launched a modified SM-3 interceptor that destroyed the failing National Reconnaissance Office satellite USA-193 at approximately 247 kilometers altitude, in an operation designated Operation Burnt Frost. The US government’s stated justification was preventing a tank of hazardous hydrazine propellant from surviving reentry over a populated area. That justification was accepted in some quarters and viewed with deep skepticism in others. Chinese and Russian officials publicly characterized the operation as a counter-space capability demonstration timed directly in response to the 2007 Chinese test. At 247 kilometers altitude, the resulting debris decayed rapidly through atmospheric drag, which the US government cited as evidence of responsible behavior relative to China’s test at a far higher orbit.

India’s Mission Shakti on March 27, 2019, used a modified Prithvi Defence Vehicle interceptor to destroy the Microsat-R satellite at approximately 300 kilometers altitude. Prime Minister Narendra Modi announced the test in a nationally televised address, explicitly placing India in the same category as the United States, Russia, and China as a space power with demonstrated anti-satellite capability. US Space Force tracked more than 400 debris fragments in the immediate aftermath, though the low test altitude helped accelerate debris decay relative to China’s 2007 test.

Russia’s test on November 15, 2021, was the most operationally provocative of the four. The PL-19 Nudol direct-ascent interceptor destroyed Cosmos 1408 , a defunct Soviet-era Tselina-D signals intelligence satellite, at approximately 480 kilometers altitude. The resulting debris field threatened the International Space Station severely enough that its crew of seven, including four NASA astronauts, two Russian cosmonauts, and a German ESA astronaut, were directed to shelter in their Soyuz MS-19 and Crew Dragon Endurance capsules while ground controllers assessed proximity risk from the expanding debris cloud. The United States, United Kingdom, and multiple allies condemned the test. Russia dismissed the condemnations. The strategic calculus Russia applied was transparent: demonstrating this capability in a way that caused immediate, visible danger to a shared international scientific installation sent a message about how far Russia was prepared to go in the space domain.

The Orbital Maneuvering Problem

Direct-ascent weapons destroy satellites. Co-orbital systems are subtler, and in some ways more operationally concerning. A satellite that maneuvers in orbit to approach another satellite can disable it, capture it, monitor it at close range, or interfere with its communications, potentially without leaving clear evidence of hostile action until the damage is already done. The attacker’s intent is deniable until the moment it isn’t, which creates significant attribution difficulties for any response.

Russia’s Luch satellite , also designated Olymp-K, launched in September 2014 and has since become one of the most closely watched spacecraft in the geostationary belt. It has maneuvered repeatedly to park itself adjacent to commercial communications satellites operated by Intelsat and Eutelsat, approaching close enough that satellite operators filed formal protests. It has also parked in positions adjacent to US military communications satellites. The satellite is assessed to carry a signals intelligence payload capable of intercepting communications at close range, though the intelligence it has actually collected remains classified. Russian officials have provided characteristically sparse commentary on the satellite’s purpose.

China’s Shijian-21 demonstrated something more operationally significant than close observation. In January 2022, tracking data analyzed by Western space surveillance organizations showed Shijian-21 physically grappling and relocating a defunct Beidou-2 navigation satellite, towing it to a graveyard orbit above the geostationary belt. Chinese official channels framed this as a debris removal demonstration. Western defense analysts noted without ambiguity that the same grapple-and-tow capability applied to an adversary’s operational satellite would constitute a form of attack: seizing, relocating, or tumbling an adversary’s spacecraft without kinetic destruction, and doing so without the dramatic debris signature that a kinetic impact would produce as immediate evidence of hostile action.

The United States operates the X-37B orbital space plane, built by Boeing and operated by the Space Force. Six missions have been completed, including one that lasted more than 908 days on orbit. The Space Force doesn’t publicly describe X-37B payloads or mission specifics. The vehicle’s maneuvering capability, long mission endurance, and reusability make it technically suited for proximity operations, payload deployment near adversary satellites, and on-orbit inspection activities. No official acknowledgment of such activities exists, but the operational profile is consistent with capabilities that the Space Force would logically pursue in its co-orbital toolkit given the documented activities of Luch and Shijian-21.

Directed Energy Reaches Orbit

Lasers can degrade or destroy satellite sensors from the ground without launching anything into orbit, without creating debris, and potentially without leaving attributable physical evidence. A ground-based laser directed at a reconnaissance satellite’s optical aperture can temporarily blind the sensor with relatively low power density. Higher power levels damage the sensor permanently. The threshold between temporary blinding and permanent destruction is a function of laser power level and dwell time, and the attacking operator controls both variables moment by moment. What looks like a sensor anomaly from the ground could be either a component failure or a deliberate attack, and distinguishing between the two in real time is technically challenging.

The United States assessed in 2022 that China had deployed ground-based lasers capable of dazzling low Earth orbit reconnaissance satellites and was developing higher-power systems capable of causing permanent sensor damage. The US State Department made this assessment public in a declassified report that year, an unusual transparency reflecting a judgment about the value of signaling awareness of the capability. Chinese military publications analyzed by the RAND Corporation describe sensor denial of reconnaissance satellites as an established planning tool for conflicts involving US forces, suggesting directed-energy satellite denial has been incorporated into PLA doctrine rather than remaining at the experimental or developmental stage.

Russia’s Peresvet combat laser system was described by President Vladimir Putin during an address in March 2018 as one of several new Russian strategic weapons. Russian defense officials announced in December 2019 that Peresvet had reached preliminary operational capability and that multiple units had been deployed at Russian strategic missile bases. The combination of characteristics, a laser system positioned at strategic nuclear missile installations, has produced competing interpretations among defense analysts. Some assess Peresvet as primarily serving air defense or drone defeat functions. Others interpret the deployment context, nuclear missile bases requiring protection from satellite surveillance, as suggesting a counter-space mission. The publicly available evidence doesn’t definitively resolve this question.

Russia’s Kalina directed energy system, reported in Russian state media in 2017, is described as a ground-based laser designed specifically to suppress optical reconnaissance satellites by saturating their sensors. Whether Kalina has reached operational status or remains a development program can’t be confirmed from open-source evidence, and Western defense assessments treat its current status with appropriate uncertainty. The broader Russian investment in directed energy counter-space capabilities, taken alongside its documented electronic warfare systems and the Nudol kinetic interceptor, reflects a deliberate multi-layered approach to degrading space-based military capabilities across the full range of attack options rather than concentrating on any single method.

Cyber Operations Against Space Infrastructure

Space systems are software-defined from end to end. Satellites carry processors running flight software, attitude control algorithms, and payload management code. Ground stations run operating systems, communications protocols, and data management software with documented vulnerabilities in many cases. Networks distributing satellite data products share IP protocol stacks, authentication systems, and hardware with civilian commercial infrastructure. Every one of these layers presents a cyber attack surface with varying accessibility to adversaries of different capabilities.

The documented history of cyber operations against space infrastructure begins with incidents that remain partly unresolved in the public record. In 2011, NASA reported to the Defense Science Board that two of its satellites, Landsat-7 and Terra AM-1, had experienced command link interference events between 2007 and 2008 consistent with unauthorized access. Landsat-7 experienced anomalous interference on October 22, 2007 and July 29, 2008. Terra AM-1 was affected on June 20, 2008 and October 22, 2008. A subsequent annual Defense Department report on Chinese military power referenced these events as potentially linked to Chinese actors, without establishing definitive attribution. The incidents haven’t been publicly resolved.

The Viasat KA-SAT attack in February 2022 is the most significant confirmed case of cyber operations against space infrastructure in the public record. The GRU-attributed AcidRain malware demonstrated that disabling a satellite communications network serving military users doesn’t require touching the satellite. It requires accessing the modem management infrastructure on the ground, an environment considerably more accessible to a sophisticated cyber attacker than anything operating in orbit. The attack’s timing, within minutes of the Russian invasion, confirmed that Russian military planning had incorporated this capability as an operational instrument to support ground force operations rather than treating it as a reserve or last-resort option.

CISA issued an advisory in April 2022 specifically warning satellite communications operators of heightened risk from Russian state-sponsored attacks. The advisory explicitly acknowledged that satellite communication networks supporting Ukraine or functions Russia might view as adversarial should be treated as high-risk targets, and it recommended that operators assume compromise was possible even of systems they considered secure. The advisory implicitly acknowledged a limitation of federal authority: the government could warn commercial satellite operators about elevated threat levels, but it couldn’t directly defend them.

GPS ground control infrastructure presents a particularly sensitive cyber target. The GPS Operational Control Segment, modernized through the OCX program with Raytheon Technologies as prime contractor under a contract originally valued at approximately $870 million that grew substantially before delivery, provides the command and control architecture for the GPS constellation. OCX’s design included specific cyber resilience requirements reflecting institutional recognition of the ground segment’s vulnerability. Control facilities are operated by the Space Force at Schriever Space Force Base in Colorado and Vandenberg Space Force Base in California. Compromising GPS ground control wouldn’t allow an attacker to destroy the satellites, but it could potentially allow manipulation of navigation signals or disruption of satellite management in ways that degrade GPS service across entire regions.

Space Delta 6 , the Space Force component responsible for space-focused cyber operations, is tasked with protecting Space Force networks, satellite command and control systems, and mission data systems. What Space Delta 6 cannot do is extend its authority and resources to the commercial satellite networks that the military increasingly depends on. Those networks defend themselves with resources calibrated to commercial threats from criminal actors and opportunistic attackers, not state-sponsored military operations backed by the full intelligence apparatus of Russia’s SVR or China’s APT40. This gap between military cyber defense capability and commercial satellite operator security posture remains one of the most significant and least publicly addressed vulnerabilities in the current space architecture.

Ground Stations and the Overlooked Attack Surface

Satellites are hard to destroy physically. Ground stations aren’t. Every military satellite system connects to the operational environment through a network of control facilities, relay stations, and data processing centers, and every one of those facilities can be physically attacked, electronically disrupted, or cyber-compromised. The satellite can be fully operational and its capability completely unavailable if the ground segment connecting it to users is incapacitated. This is not a theoretical edge case. The Viasat attack demonstrated it operationally.

Physical attack on ground stations has been a planning consideration since the earliest military satellites entered orbit. US GPS satellite control facilities at Schriever Space Force Base are hardened military installations with substantial physical security. Military satellite communications ground stations are similarly protected. Commercial ground stations serving military communications needs are not comparably hardened, and the increasing military reliance on commercial satellite capabilities means that a growing share of militarily significant space capability routes through infrastructure built to civilian standards.

The geometry of geostationary uplink jamming illustrates how the ground attack problem extends geographically. A geostationary satellite at 35,786 kilometers altitude is visible from approximately one-third of Earth’s surface at any moment. An adversary wanting to disrupt the uplink between a ground station and a geostationary satellite doesn’t need to be near the ground station. A jammer positioned anywhere within the satellite’s visible coverage footprint can direct emissions at the satellite’s receive antenna. That footprint can span tens of millions of square kilometers, giving the attacker an enormous range of potential operating locations from which the satellite’s legitimate users may have no practical way to locate and suppress the jamming source.

The Space Force has responded to ground segment vulnerability by distributing control functions across multiple hardened facilities, so that disabling a single site doesn’t eliminate the capability. The Multi-Mission Satellite Operations Center at Schriever Space Force Base is one node in a distributed architecture designed to spread risk across multiple locations. This raises the cost of a successful attack against the ground segment, requiring an adversary to engage multiple hardened targets rather than one. Against a sophisticated adversary with both cyber and physical means, this creates a more demanding attack requirement. It shifts rather than eliminates the exposure.

The Nuclear Electromagnetic Pulse Scenario

The most extreme scenario for space system degradation doesn’t involve attacking individual satellites or ground control facilities. A nuclear detonation at high altitude produces an electromagnetic pulse propagating across a continental-scale geographic area that can permanently destroy the electronic systems of every unshielded satellite in the affected orbital region simultaneously.

The Starfish Prime nuclear test, conducted by the United States on July 9, 1962, at approximately 400 kilometers altitude over the Pacific Ocean, immediately destroyed or severely damaged at least six satellites in orbit, including the British Ariel 1 science satellite. The 1.4 megaton detonation injected artificial radiation belts into near-Earth orbit that degraded the solar panels of numerous subsequent satellites and rendered certain orbital altitudes temporarily unusable for new missions. That was a test in 1962, when fewer than 50 satellites occupied Earth orbit. A comparable detonation today, with thousands of satellites operating across the affected orbital regimes, would disable enormous portions of commercial and military space infrastructure essentially simultaneously.

The military utility of high-altitude nuclear EMP as a space denial weapon is constrained by the same threshold that limits all nuclear use: employing it creates escalation dynamics that essentially no strategic planner is willing to accept outside the most extreme scenarios. Neither Russia nor China is assessed to have standing operational plans to use nuclear weapons specifically for space denial in a non-nuclear conflict. The vulnerability exists nevertheless, and Space Force investments in hardened satellites and survivable ground architecture reflect in part an effort to ensure that nuclear EMP doesn’t represent a clean first strike against US space architecture with limited risk to the attacker.

Doctrinal Brittleness: The Deepest Vulnerability

There’s a type of institutional fragility that’s harder to discuss than equipment vulnerability because it resists simple remedies and doesn’t show up in procurement budgets. Military organizations develop their planning processes, training cycles, staffing models, and leadership cultures around the capabilities they use continuously. When those capabilities work reliably for decades, the ability to operate effectively without them atrophies. This isn’t negligence; it’s rational adaptation to a stable operating environment. The operating environment for space-dependent military forces is no longer stable.

General James McConville, serving as US Army Chief of Staff, stated publicly in 2020 that the Army had identified GPS dependency as a significant vulnerability and was actively working to develop assured positioning, navigation, and timing capabilities that don’t rely exclusively on GPS. The fact that this institutional acknowledgment came in 2020, nearly three years after the Black Sea spoofing event of 2017 and thirteen years after the Chinese ASAT test of 2007, suggests that recognition of the problem lagged considerably behind the evidence for it.

The Army’s Mounted Assured Positioning, Navigation, and Timing System integrates GPS with inertial navigation, celestial navigation references, and other positioning aids to maintain location accuracy in GPS-denied or GPS-degraded environments. Initial fielding began in 2021, but the program hadn’t reached every platform that would need it in a conflict against a peer adversary using electronic warfare at scale. The gap between initiating a program and fielding it across an entire force structure is a recurring feature of military modernization, and it leaves formations equipped with old assumptions about GPS availability even after newer solutions exist.

Communications-dependent doctrine presents the same problem. Units operating in high-bandwidth satellite-connected environments for two decades lose proficiency in lower-bandwidth methods available in contested space environments. High-frequency radio procedures, visual signaling, and courier-based information sharing require regular practice to maintain. They haven’t received that practice in most Western military formations for many years, because satellite communications have been consistently available when needed. Restoring proficiency at scale is a training challenge that modernization strategy documents can acknowledge more easily than field training schedules can solve.

Chinese military doctrine has structured itself explicitly around exploiting this institutional brittleness. The PLA’s concept of “system confrontation,” described in PLA strategic documents analyzed by the RAND Corporation and the National Defense University , treats space-enabled capabilities as the integrating layer that makes US military power function as a coherent system rather than a collection of isolated capabilities. The doctrinal objective isn’t to destroy individual satellites or deny specific weapons their guidance signals. It’s to disrupt the flow of information through the system as a whole, causing command-and-control delays, targeting failures, logistics disruptions, and coordination breakdowns that accumulate into operational paralysis. This is a systems-level attack concept that has been a PLA planning priority for more than two decades, and its strategic sophistication is proportionate to how deeply space dependency has actually penetrated US military operations.

Allied dependencies add another dimension. The UK Space Command , established in April 2021, and France’s military space organization, formalized as the French Air and Space Force Space Command in 2019, represent allies that have recognized both the depth of their space dependency and the strategic risk of depending primarily on US systems that are themselves under threat. France’s defense space posture includes plans for nano-satellites capable of escorting and providing situational awareness around French assets in geostationary orbit. This is an explicit acknowledgment that defensive counter-space operations require dedicated orbital capabilities, not just ground-based reactions.

NationKinetic ASAT (Direct-Ascent)Co-orbital CapabilityDirected EnergyElectronic Warfare (Space)Cyber (Space Systems)
United StatesDemonstrated (SM-3, 2008)Assessed (X-37B)Assessed (ground-based)ExtensiveExtensive
ChinaDemonstrated (SC-19, 2007)Demonstrated (Shijian-21, 2022)Assessed (ground-based)ExtensiveExtensive
RussiaDemonstrated (Nudol, 2021)Assessed (Luch/Olymp-K)Assessed (Peresvet, Kalina)ExtensiveExtensive
IndiaDemonstrated (PDV, 2019)Not assessedNot assessedLimitedLimited
IranNot assessedNot assessedNot assessedDocumented (uplink jamming)Assessed
North KoreaNot assessedNot assessedNot assessedDocumented (GPS jamming)Assessed

Current Responses and Their Limits

The United States and its allies have not been passive in the face of documented counter-space threats. Multiple programs are underway to reduce vulnerability, and the Space Force has grown substantially since its establishment in December 2019. The question isn’t whether resilience investments are being made. It’s whether they’re sufficient, fast enough, and matched to the most operationally pressing threats rather than primarily to the most dramatic ones.

The most visible resilience investment has been the shift toward proliferated low Earth orbit constellations. SpaceX ‘s Starlink constellation reached approximately 7,000 operational satellites by early 2026, providing an architecture fundamentally different in its resilience profile from the small number of large, expensive geostationary communications satellites that defined the previous generation of military SATCOM. Destroying enough of a proliferated constellation to degrade service requires attacking hundreds or thousands of satellites, raising the cost and physical consequences of kinetic attack beyond any reasonable calculus for anything short of open war between major powers. The Space Force formalized its partnership with SpaceX through Project Starshield , announced in December 2022, integrating classified payloads and encryption capabilities with the Starlink architecture for national security applications.

DARPA ‘s Blackjack program explored distributed military satellite architecture using commercial satellite buses with modular classified payloads, awarding development contracts to both Lockheed Martin and Northrop Grumman . The program informed the Space Force’s Proliferated Warfighter Space Architecture, pursuing similar redundancy-through-distribution objectives at program-of-record scale. L3Harris Technologies holds the contract for the PWSA transport layer, with demonstration satellites launched in 2023 and full operational capability expected in the late 2020s.

GPS resilience has received substantial investment. GPS Block III satellites, beginning with the first launch on December 23, 2018, aboard a SpaceX Falcon 9 rocket, carry improved anti-jam capabilities including higher-power spot beams that can increase effective signal strength over a specific geographic area when active jamming is detected. Block III satellites also carry the L1C civil signal compatible with Galileo and other international navigation systems, enabling receiver-level cross-constellation integrity checking that improves spoofing detection. Anti-jam phased array antenna systems, which electronically null jammer signals while continuing to receive legitimate satellite signals from correct directions, are being fielded for high-priority military platforms. These are meaningful improvements. They don’t change the underlying physics of GPS signal propagation.

The Space Fence radar network operated by Lockheed Martin from Kwajalein Atoll in the Marshall Islands, which declared initial operating capability on March 27, 2020, dramatically improved space domain awareness by tracking far more objects in orbit with greater precision than the legacy system it replaced. Better tracking supports attribution of hostile actions in space. An adversary considering co-orbital operations against a US satellite faces a higher probability of being observed and identified with Space Fence operational than with earlier capabilities. Detection isn’t deterrence, but it’s the necessary foundation for deterrence to function.

The cyber security gap between military and commercial space systems hasn’t been closed. CISA’s 2022 advisory acknowledged the problem and provided guidance. Partnership frameworks between the government and commercial operators have expanded. Direct funding for commercial satellite cyber security improvements has been limited relative to the scale of the vulnerability. The regulatory environment doesn’t compel commercial satellite operators serving military customers to meet military cyber security standards, and the contractual relationships governing those service arrangements typically don’t transfer full security responsibility to the government customer. This is the area where policy frameworks have most clearly failed to keep pace with operational reality.

The proliferated LEO constellation approach, while effective against kinetic ASAT threats, introduces new vulnerability dimensions. More terminals mean more radio frequency emissions that can be detected and geolocated by signals intelligence. A larger constellation requires more ground control infrastructure, more update pipelines, and more diverse hardware configurations, each representing potential attack surfaces that don’t exist in tightly controlled small fleets. Managing security across thousands of dynamically evolving commercial satellites is a different and in some ways harder problem than securing a small number of purpose-built military platforms where every configuration is known and controlled. Starlink’s resilience to kinetic attack comes at a real cost in other vulnerability dimensions, and that tradeoff isn’t always acknowledged in discussions that treat proliferation as an unambiguous solution.

Space Domain Awareness and the Attribution Problem

Deterring attacks on space assets requires being able to identify attackers with enough confidence to justify a response. This creates a challenge that doesn’t exist for attacks on terrestrial military assets in the same way, because the signatures of many counter-space operations are genuinely ambiguous even with good space domain awareness.

A kinetic direct-ascent ASAT test produces clear evidence: debris, a tracking anomaly, and radar signatures of the interceptor allowing attribution with high confidence. Uplink jamming is harder to attribute definitively because the jammer might be anywhere in the satellite’s coverage footprint, spanning millions of square kilometers. GPS spoofing is harder still, because the spoofing signal mimics legitimate navigation transmissions and its source requires triangulation from multiple monitoring stations. A directed-energy dazzling event affecting a reconnaissance satellite looks from the satellite’s telemetry exactly like a random sensor anomaly or component failure, because no physical damage is left to examine and no debris is created.

The United States has invested in space domain awareness precisely because deterrence without attribution capability is incomplete. The Space Fence system improved tracking of small objects in low Earth orbit substantially. US Space Command maintains the Space Track catalog and shares orbital data with allied nations through agreements supporting collective space domain awareness. The Space Force’s Space Delta 2 is responsible for maintaining custody of tracked objects and detecting anomalies consistent with hostile action.

What space domain awareness can’t fully resolve is the category of attacks producing ambiguous or absent physical signatures. Directed-energy dazzling that permanently damages a sensor looks like sensor failure until pattern analysis across multiple similar events suggests hostile intent. Co-orbital approach operations by a satellite that never makes physical contact leave no trace beyond the approach trajectory, which is observable but consistent with benign interpretations. Cyber attacks against satellite ground control systems may not produce observable anomalies in satellite behavior at all, depending on what the attacker does with the access gained.

This attribution ambiguity is a deliberate feature of sophisticated counter-space operations. It creates a deterrence environment where the confident “if you attack our satellites we will respond” posture that deters kinetic attacks becomes harder to maintain for a full range of counter-space methods. The 2020 Defense Space Strategy and subsequent Space Force doctrine have tried to address this by broadening signaled response options to include responses in, from, and through space as well as in other domains. Whether that signaling deters adversaries who believe they can conduct deniable counter-space operations successfully is a question no open-source analysis can answer with confidence, and it’s among the most consequential unresolved questions in the current space security environment.

The International Governance Gap

No binding international treaty governs the testing or use of anti-satellite weapons in any form. The Outer Space Treaty of 1967 prohibits placing weapons of mass destruction in orbit and bars national appropriation of celestial bodies, but says nothing about conventional weapons directed against satellites. Multiple counter-space arms control proposals have been discussed in international forums, including the Conference on Disarmament in Geneva, without producing binding agreements that any major space power has accepted.

The United States unilaterally pledged in April 2022 not to conduct destructive direct-ascent ASAT tests. Vice President Kamala Harris announced the commitment at Vandenberg Space Force Base on April 18, 2022, framing it explicitly as a call for other nations to adopt comparable restraint. The UN General Assembly passed a non-binding resolution in December 2022 calling on states to refrain from destructive direct-ascent ASAT testing, passing with 155 votes in favor, 9 against, and 9 abstentions. Russia and China both voted against. Neither country has made any commitment comparable to the US unilateral pledge, and neither has shown any indication of doing so.

China and Russia have proposed their own framework at the Conference on Disarmament through the Prevention of an Arms Race in Outer Space initiative and the associated draft Treaty on the Prevention of the Placement of Weapons in Outer Space. Western nations have declined to negotiate on this framework, partly because it addresses only weapons permanently placed in orbit rather than ground-based kinetic interceptors or directed-energy systems, and partly because verifying compliance would be essentially impossible given current space domain awareness capabilities. The practical outcome is that no binding legal framework constrains the development or use of any counter-space weapon other than nuclear weapons in orbit.

The debris environment created by existing tests already affects the shared orbital environment. Tracking data maintained by US Space Command shows thousands of debris objects from the 2007 Chinese test still in orbit or only recently decayed, alongside hundreds from the 2021 Russian test. If a conflict involving major space powers were to produce sustained kinetic counter-space operations, the resulting debris could render key orbital regimes unusable for years, affecting not just military communications and navigation but weather forecasting, financial system timing, civilian communications, and the internet infrastructure increasingly dependent on satellite connectivity. The shared nature of that consequence doesn’t appear to have generated sufficient mutual restraint to produce binding agreements, and the lack of any legal framework governing counter-space operations remains a significant gap in the international architecture that has otherwise managed to constrain some categories of destabilizing military competition.

Summary

Space-dependent military doctrine has created capabilities that no previous military force has matched and vulnerabilities that no previous military force has had to defend against simultaneously. The response to those vulnerabilities, across the United States and its allies, has been to pursue resilience rather than reduce dependency, which reflects a realistic assessment that three decades of dependency can’t be walked back on any near-term timeline without accepting operational degradation that no military commander would accept voluntarily.

The resilience programs underway are genuine and in some areas significant. Proliferated LEO architectures change the cost calculus for kinetic counter-space attack. GPS Block III satellites improve resistance to jamming. The Army’s MAPS program and similar positioning alternatives reduce the most catastrophic failure modes of GPS denial for platforms equipped with them. Space domain awareness improvements make some hostile actions more attributable. Space Delta 6 provides dedicated cyber defense for Space Force systems.

What the resilience programs haven’t fully addressed is the observation that the counter-space operations which have actually degraded military capabilities in recent conflicts were accomplished through accessible and relatively inexpensive means. GPS jamming with truck-mounted commercial-derived hardware. Malware deployed against commercial network management infrastructure. Spoofing transmitters operated from mobile platforms. Terminal location through standard signals intelligence collection. These attacks didn’t require exotic technology or decades of classified development programs. They required adversaries who understood the dependencies built into Western military operations and chose the cheapest available path to exploit them.

The part of this problem receiving the least proportional attention is the commercial-military interface: the boundary where military space dependency runs through commercial satellite operators, commercial ground infrastructure, and commercial software supply chains calibrated to their own business environments rather than to state-sponsored military adversary threat models. Strengthening that interface through regulatory requirements, contractual security standards, and direct funding for commercial operator cyber resilience would address vulnerabilities that have demonstrably been exploited in recent operational contexts. Whether the policy frameworks needed to accomplish this can be developed as quickly as the threat continues to evolve remains the question whose answer matters most and whose answer no analyst can predict with confidence.

Appendix: Top 10 Questions Answered in This Article

Why are GPS signals vulnerable to jamming by adversaries?

GPS satellites orbit at approximately 20,200 kilometers altitude, and by the time their signals reach Earth, the power density is extremely low. Any ground-based transmitter broadcasting a stronger signal on the same frequency can overwhelm a GPS receiver within its coverage area. Military-grade jamming systems like Russia’s Krasukha-4 can deny GPS service over areas of hundreds of square kilometers using mobile truck-mounted hardware, making GPS jamming accessible to a wide range of state and paramilitary actors.

How did China demonstrate its kinetic anti-satellite capability?

On January 11, 2007, China launched a missile from Xichang Space Center that destroyed its own Fengyun-1C weather satellite at approximately 865 kilometers altitude. The impact created roughly 2,000 trackable debris pieces and an estimated 35,000 fragments larger than one centimeter in diameter. The resulting debris spread through some of the most heavily used orbital bands and will remain a collision hazard for operational satellites for decades.

What was the Viasat KA-SAT cyberattack and what did it affect?

Russia’s GRU military intelligence directorate deployed AcidRain malware against Viasat’s KA-SAT satellite internet service on February 24, 2022, permanently disabling approximately 50,000 satellite modems across Europe. The attack disrupted Ukrainian military and emergency service communications at the start of the Russian invasion, and also knocked out remote monitoring for approximately 5,800 wind turbines in Germany. The KA-SAT satellites continued functioning normally; the damage was entirely to ground-based modem hardware.

Which nations have demonstrated the ability to destroy satellites in orbit?

Four nations have destroyed satellites using direct-ascent kinetic interceptors: the United States in February 2008 using a modified SM-3 during Operation Burnt Frost, China in January 2007 using an SC-19 missile to destroy Fengyun-1C, Russia in November 2021 using a PL-19 Nudol to destroy Cosmos 1408, and India in March 2019 using a Prithvi Defence Vehicle interceptor during Mission Shakti. The United States unilaterally pledged in April 2022 not to conduct further destructive direct-ascent ASAT tests.

What is GPS spoofing and how has it affected real operations?

GPS spoofing broadcasts a false but coherent navigation signal that tricks receivers into computing an incorrect position while displaying a valid fix, with no instrument alarm indicating anything is wrong. In June 2017, analysis by the Center for Advanced Defense Studies documented more than 20 ships near Novorossiysk in the Black Sea simultaneously showing GPS positions at an airport 25 miles inland from their actual locations in open water. Spoofing incidents have since been documented across the Eastern Mediterranean, Persian Gulf, and near Israeli airspace, with formal aviation safety warnings issued about Ben Gurion Airport in late 2024.

Why is China’s Shijian-21 satellite considered a counter-space threat?

China’s Shijian-21, launched October 23, 2021, demonstrated the ability to physically grapple and relocate another satellite in orbit, towing a defunct Beidou-2 spacecraft to a graveyard orbit above the geostationary belt in January 2022. China described the operation as debris removal. Western defense analysts noted that the same grapple-and-tow capability applied to an adversary’s operational satellite would constitute a form of attack capable of capturing, repositioning, or destabilizing a target without the debris signature that a kinetic impact would immediately produce.

What has Russia’s Luch satellite done to concern Western space operators?

Russia’s Luch satellite, also designated Olymp-K and launched in September 2014, has repeatedly maneuvered in the geostationary belt to park adjacent to commercial communications satellites operated by Intelsat and Eutelsat, and also adjacent to US military communications satellites. Commercial satellite operators filed formal protests over its proximity operations. The satellite is assessed to carry a signals intelligence payload capable of intercepting communications at close range, and its behavior has drawn public warnings from Western defense officials about Russian co-orbital counter-space activities.

What is the Proliferated Warfighter Space Architecture?

The Proliferated Warfighter Space Architecture is a US Space Force program building a distributed military communications and data relay constellation in low Earth orbit, designed to maintain operational capability through satellite redundancy rather than hardening individual platforms. L3Harris Technologies holds the transport layer contract. Demonstration satellites began launching in 2023, with full operational capability expected in the late 2020s.

Why is space-dependent military doctrine fragile even when all satellites are functioning?

Three decades of uncontested satellite coverage have eroded proficiency in navigation, communications, and targeting procedures that don’t depend on satellites. Units have largely lost regular practice with high-frequency radio, inertial navigation, and low-bandwidth coordination methods. Targeting cycles are calibrated to assume continuous overhead imagery. When space capabilities are degraded, formations struggle to adapt because the doctrine, training, and equipment for operating without satellites have atrophied from disuse.

Is there an international treaty that prohibits anti-satellite weapons?

No binding international treaty prohibits the development, testing, or use of anti-satellite weapons of any kind. The Outer Space Treaty of 1967 bans weapons of mass destruction in orbit but contains no provisions governing conventional counter-space weapons. The United States pledged unilaterally in April 2022 not to conduct destructive direct-ascent ASAT tests, and a non-binding UN General Assembly resolution in December 2022 called on states to refrain from such tests, but Russia and China both voted against that resolution and have made no comparable commitments.

YOU MIGHT LIKE

WEEKLY NEWSLETTER

Subscribe to our weekly newsletter. Sent every Monday morning. Quickly scan summaries of all articles published in the previous week.

Most Popular

Featured

FAST FACTS