
- Key Takeaways
- Arms Control Stalled as Orbit Grows More Dangerous
- Why a Cyber Doctrine Matters to Space Security
- What Persistent Engagement in Orbit Would Look Like
- Signs That States Are Already Moving in That Direction
- Why Governments May Still Accept the Risks
- Continuous Orbital Contestation Would Carry Heavy Costs
- Summary
- Appendix: Useful Books Available on Amazon
- Appendix: Top Questions Answered in This Article
- Appendix: Glossary of Key Terms
Key Takeaways
- The paper argues that stalled space arms control could push states toward constant orbital contestation
- It maps a cyber doctrine onto space and shows how inspection, shadowing, and disruption could expand
- The strongest warning is political, operational, and environmental risk rather than cinematic war in space
Arms Control Stalled as Orbit Grows More Dangerous
In March 2018, U.S. Cyber Command gave formal shape to the idea of persistent engagement in cyberspace. The draft paper Persistent Engagement in Orbit: The Dark Future of Space Security Without Arms Control by Clémence Poirier asks what happens if that same strategic logic migrates into outer space. Its answer is stark. If diplomatic restraint keeps weakening, the future of space security may look less like treaty-based order and more like a domain of routine contact, routine disruption, and routine coercive signaling.
That argument begins with the long failure of multilateral space arms control to move beyond broad principles. The Outer Space Treaty remains the foundational legal instrument, and it still matters because it bars weapons of mass destruction in orbit and preserves freedom of exploration and use. Yet the treaty never produced a full operating code for close approaches, intrusive inspections, cyber operations against satellites, or electronic interference. Later efforts through the United Nations Office for Outer Space Affairs treaty framework and related diplomatic processes have not closed that gap.
Poirier’s paper treats this failure as more than institutional frustration. It is the political setting that allows strategic behavior to harden. States have kept proposing rules, moratoria, codes of conduct, and confidence-building measures, but the paper argues that they have not shown the level of political compromise needed to make those proposals binding or enforceable. That distinction matters. A domain can have plenty of discussion and still drift toward danger if states keep investing in coercive capability faster than they invest in restraint.
The paper also frames orbital security as a problem of density and proximity. Space systems sit inside an environment where interference can be hard to classify quickly and where physical movement carries strategic meaning. A close approach can be an inspection, a signal, a rehearsal, or the first stage of an attack. A software intrusion against a ground segment can be espionage, preparation, or sabotage. In that sense, the paper treats orbit as a place where intent is often contested and where ambiguity itself becomes a weapon.
Public reporting from the Secure World Foundation’s 2026 Global Counterspace Capabilities Report supports the paper’s larger point that states are expanding counterspace tools across co-orbital, direct-ascent, electronic warfare, directed energy, and cyber categories. The paper’s contribution is not to claim that open warfare in space is imminent. Its contribution is to show that a slower change may be more plausible and more destabilizing: constant competitive pressure below the threshold of overt war, normalized over time until it starts to look ordinary.
Why a Cyber Doctrine Matters to Space Security
The paper’s central move is conceptual. It borrows the doctrine of persistent engagement from cyberspace and tests whether the same strategic habit could emerge in orbit. That comparison works because the paper does not claim that cyberspace and outer space are physically alike. It argues instead that both domains reward initiative, exploit ambiguity, and make it hard to separate defense from offense in day-to-day operations.
In U.S. cyber doctrine, persistent engagement means operating as close as possible to the source of malicious activity, contesting adversaries continuously, and disrupting threats before they land on domestic targets. The 2018 Department of Defense Cyber Strategy paired that approach with defend forward. Together, those ideas shifted cyber operations away from a model built mainly on absorbing blows and responding later. The aim, in plain operational terms, was to stay present, stay active, and force adversaries onto less favorable ground.
Poirier argues that the appeal of this model grows when deterrence by punishment looks weak. In cyberspace, attribution is often contested, thresholds are blurry, and hostile activity occurs all the time below the level of armed conflict. The paper sees similar features in the non-kinetic side of space conflict. Jamming, spoofing, cyber intrusion, suspicious maneuvering, inspection missions, and release events can all pressure an opponent without producing the kind of unmistakable violence that triggers immediate escalation. That is why the cyber analogy matters. It offers a logic for competition in domains where states believe they are already under pressure but do not yet see full war as the most likely mode of confrontation.
The paper also ties the rise of cyber persistent engagement to institutional change. U.S. Cyber Command’s history shows the growing autonomy and status that made more active operations possible. Poirier then points to the military reorganization of space as an analogous development. The creation of the U.S. Space Force in December 2019 and the spread of dedicated space commands elsewhere did more than create new uniforms and command charts. Those moves signaled that governments now treat space as an operational military domain, with standing responsibilities for defense, mission assurance, and competitive advantage.
Another part of the analogy rests on legal incompleteness. Cyberspace never received a robust arms control regime with settled verification rules. Space has older legal foundations, yet it still lacks accepted, detailed limits on many of the behaviors now causing concern. The paper argues that when rules remain vague and threats stay active, institutions begin to favor continuous operational shaping over patient legal settlement. That does not make the shift inevitable, but it does make it easier to understand.
The paper’s use of cyber doctrine is important because it turns a familiar space-security conversation in a different direction. Many discussions still focus on big events such as destructive anti-satellite tests. Poirier instead highlights the possibility that the more important change may lie in regular, repeated, low-visibility operations that shape expectations long before any openly acknowledged conflict begins.
What Persistent Engagement in Orbit Would Look Like
Poirier’s paper does not imagine a science-fiction battlefield full of exploding spacecraft. It sketches a harder and more believable pattern. Persistent engagement in orbit would consist of repeated military or quasi-military operations below the threshold of armed conflict, designed to detect, preempt, disrupt, and signal against adversarial behavior before a rival degrades important space-based services.
The paper places a great deal of weight on proximity and tempo. In this model, states would not wait passively behind their own constellations. They would patrol, inspect, shadow, monitor, interfere, and sometimes publicize what they found. Rendezvous and proximity operations would gain strategic value because they allow one actor to place itself close enough to gather intelligence, show resolve, or impose caution on another. Inspection missions, bodyguard satellites, maneuverable spacecraft, and highly responsive ground segments would all fit this pattern.
Poirier adapts two well-known cyber ideas to space. The first is defend forward. In orbit, defend forward would mean operating near likely sources of danger rather than only reacting after interference occurs. A government might patrol around an important military satellite, investigate an unfamiliar object moving nearby, or expose a suspicious approach through public space domain awareness data. It could also use cyber or electronic action against hostile support systems on the ground if those systems were tied to pressure against space assets. The operating principle would be simple: force the adversary to cope with friction early, rather than accept pressure and answer later.
The second idea is hunt forward. In cyber practice, hunt forward missions often occur with a partner’s invitation. The space analogue in the paper involves collaboration with allies to inspect a spacecraft, assess suspected interference, or place sensors and analytic capacity where a partner lacks them. That concept turns alliance support into a day-to-day operational behavior instead of leaving it at the level of declarations and communiqués. In other words, a partner’s satellite becomes part of a shared security perimeter.
This proposed doctrine still differs from cyber operations in one important respect. Physical damage in orbit can be hard to reverse and debris can harm everyone. The paper therefore treats non-destructive means as the most plausible instruments of persistent engagement in space. That includes close inspections, maneuver warfare, electronic interference, cyber operations, deception, and selective public disclosure. It leaves room for forceful behavior without assuming that states will rush toward debris-producing attacks whenever they face pressure.
The paper is also attentive to information operations. A state engaged in persistent engagement may reveal enough about an opponent’s methods to impose cost. In cyberspace, public disclosure of malware can burn an adversary’s tools. In orbit, publication of tracking data, inspection patterns, or suspicious maneuver records could serve a similar function by making covert pressure harder to sustain. That would blur the line between intelligence, deterrence, and diplomacy.
Seen together, these examples show why the paper’s argument matters. Persistent engagement in orbit is not a single weapon or a single mission type. It is a governing habit of competition. Once adopted, it would encourage states to remain close, remain active, and remain ready to impose small costs constantly.
Signs That States Are Already Moving in That Direction
One of the paper’s strongest sections asks whether persistent engagement in orbit is still hypothetical. Poirier’s answer is cautious but unmistakable. No major government has publicly announced a formal doctrine under that name for space, yet many of the enabling behaviors already exist. The pattern matters more than the label.
A first sign lies in institutional and cultural change. The paper notes that space organizations once hesitant to address defense now do so openly. ESA Strategy 2040 shows how security language has moved closer to the center of European space planning. The U.S. Space Force was established as a dedicated military service focused on operations in, from, and to space. These shifts do not prove a doctrine of persistent engagement on their own. They do show that important actors now organize, budget, and plan for a domain where routine competition is expected.
A second sign appears in maneuver capability. Persistent engagement requires the ability to move, inspect, approach, separate, and re-approach with precision. The paper points to India’s SpaDeX mission, which was built to demonstrate rendezvous and docking technology. ISRO later reported successful repeat docking and power transfer in April 2025. Those achievements were civilian demonstrations, yet the paper stresses the dual-use reality. The same families of skills that enable servicing, assembly, and docking can also support inspection, protection, and coercive positioning.
The paper also emphasizes observed cases of shadowing and close operations. Open-source reporting and defense commentary have highlighted suspicious or closely watched orbital behavior by multiple states over the past decade. Poirier does not rely on spectacle. The point is less about any single headline and more about the normalization of conduct once treated as exceptional. When repeated approach behavior, subsatellite releases, or on-orbit maneuver practice become familiar topics, the operational threshold for more regular contestation drops.
Alliance activity offers another sign. In September 2025, the Royal Air Force described a U.S. satellite maneuvering near the British military satellite Skynet 5A under the Operation Olympic Defender framework. Poirier reads such missions as the kind of allied cooperation that could support a hunt-forward style of space security. Once partners accept close operational support around sensitive assets, the alliance relationship in orbit becomes more intimate and more strategically consequential.
The Secure World Foundation report reinforces the paper’s claim that many states now pursue counterspace tools for access assurance, deterrence, and military advantage. That report does not use Poirier’s doctrinal framing. Still, its findings help explain why the paper’s scenario feels credible. States are buying the means for persistent contestation even when they describe those means in defensive terms.
Poirier’s paper is careful here, and that restraint adds force to the argument. It does not say that orbit has already become the space equivalent of nonstop cyber combat. It says the ingredients are present: organizations built for military competition, technologies suited to proximity and interference, alliances willing to coordinate operationally, and a legal setting that leaves too much room for strategic experimentation.
Why Governments May Still Accept the Risks
Poirier does not depict states as reckless for the sake of drama. The paper treats persistent engagement as a choice that may look rational to governments operating under pressure. Understanding that motive is important because many dangerous security shifts do not begin with an appetite for chaos. They begin with a belief that passivity leaves one side exposed.
One reason governments may accept the move is that day-to-day dependence on space has become deeper across military and civilian systems. Navigation, timing, intelligence, communications, missile warning, weather support, and data transport all lean heavily on orbital infrastructure. A government that believes an adversary is probing those systems through close approaches, electronic interference, or cyber intrusion may conclude that staying still invites strategic disadvantage. Active presence then becomes attractive because it promises early warning and room for initiative.
Another reason is that operational access often matters as much as formal legal position. The paper suggests that a state able to dominate repeated interactions in orbit may shape expectations before negotiators ever agree on new rules. This idea echoes cyber scholarship that links operational presence to later norm formation. If one actor spends years testing boundaries, exposing vulnerabilities, and building partner dependence, it may enter future negotiations from a stronger position. That possibility gives persistent engagement a political value beyond immediate defense.
Alliance management also plays a role. A government that can inspect, monitor, or help defend a partner’s spacecraft may strengthen military ties and deepen dependence on its own services, sensors, and analytic infrastructure. Poirier’s paper hints that such behavior may become an alliance tool as much as a national defense tool. Operational support can turn into political influence, particularly in a domain where not every state can afford high-end independent space security capacity.
The paper further suggests that persistent engagement may appeal because it offers action below the threshold of open war. Leaders often want instruments that impose cost without forcing immediate large-scale escalation. Orbital shadowing, selective interference, or public exposure of hostile behavior can serve that function. Those acts create pressure, shape perceptions, and test reactions. From a decision-maker’s standpoint, they may look more usable than destructive attacks and more effective than patient diplomatic protest.
Poirier also highlights a psychological and organizational shift. Once military planners begin to treat attacks on satellites as standard elements in war planning, a more active pre-conflict posture becomes easier to justify. Bureaucracies tend to train for the kinds of missions they expect to matter. When inspection, maneuver, and interference become normal exercises rather than exceptional contingencies, doctrine often follows.
None of this means the path is wise. The paper’s point is narrower and more unsettling. A doctrine can spread because it solves immediate political and military problems for the actors adopting it, even if it makes the domain as a whole more dangerous. That is what makes the paper persuasive. It does not rely on villainy. It relies on incentives.
Continuous Orbital Contestation Would Carry Heavy Costs
The paper’s warning becomes sharpest when it turns from possibility to consequence. Persistent engagement in orbit may offer initiative, but Poirier argues that it would also intensify escalation danger, misperception, alliance strain, diplomatic backlash, and operating burden. Those are not abstract costs. They would affect how governments interpret routine events and how operators manage already crowded orbital conditions.
Escalation risk stands first. The paper notes that many hostile acts in space today remain below the threshold of overt violence. That partial restraint could erode if states begin to contest one another continuously. A routine close approach might prompt counter-shadowing. A suspicious inspection could trigger electronic interference. A public accusation supported by tracking data might invite retaliatory cyber action against a ground network. None of these steps requires a dramatic first strike. Action and reaction could pile up through repeated smaller moves.
Misperception may be even more dangerous because orbit is an environment where intent is often read from movement. A collision-avoidance burn, an end-of-life maneuver, or an inspection flight can look different depending on the observer’s assumptions. The paper argues that persistent engagement would increase the number of ambiguous interactions and make every one of them harder to interpret calmly. Once operators expect adversarial pressure as a normal condition, even routine activity can acquire a threatening meaning.
Alliance politics would also grow harder. A hunt-forward model in space presumes trust, access, and shared judgment. Yet close support around allied spacecraft could create friction if one partner believes the other has become too intrusive or too eager to act. Poirier is especially strong on this point. Security cooperation in orbit may reinforce alliances, but it can also produce resentment if assistance begins to resemble supervision.
Diplomatic cost would follow. Governments that publicly defend the peaceful uses of outer space may find it hard to reconcile that language with daily military patrol, inspection, and interference missions. UNOOSA’s treaty frameworkstill anchors the legal order, and many states retain a strong political attachment to restraint in outer space. A doctrine of continuous contestation would not erase that attachment. It would widen the gap between declared principle and operational practice.
Environmental and operational burdens complete the picture. Every additional maneuver demands tracking, analysis, fuel budgeting, and decision support. Satellite operators already process conjunction data and mission assurance concerns at a demanding pace. Persistent engagement would add another layer of pressure by making hostile interpretation a routine part of orbital traffic management. The Secure World Foundation’s counterspace work and the broader debate over debris underscore why that matters. Even non-destructive competition can raise the chance of accident, interference, or long-term contamination of the domain.
Poirier’s most important point here is that persistent engagement may look stabilizing from inside a single command structure yet destabilizing from the standpoint of the domain as a whole. Each side may believe it is preserving freedom of action. Collectively, they may be building a system of permanent suspicion in the very environment on which all depend.
Summary
Poirier’s paper offers a disciplined way to think about the next stage of space security. Its value lies in moving the debate away from a narrow focus on spectacular attacks and toward the more plausible prospect of routine orbital contestation. By borrowing the cyber doctrine of persistent engagement, the paper shows how space competition could shift from reactive defense to constant preemptive presence built on proximity, maneuver, inspection, cyber activity, and selective disclosure.
That argument gains force because the paper does not treat the shift as fantasy or inevitability. It identifies the conditions that make the doctrine plausible: stalled arms control, weak agreement on behavioral limits, military organizations structured for space operations, maturing proximity technologies, and a growing belief among governments that they must stay active to stay secure. Evidence from official doctrine, public mission reporting, and counterspace assessments fits that pattern.
The paper’s final judgment is not that space war must follow. It is that absent stronger political restraint, orbit may become a place where contact itself turns into strategy. In that future, the most important change would be normalization. States would come to accept continuous contestation as ordinary business, and once that happens, rebuilding restraint becomes far harder than preserving it in the first place.
Appendix: Useful Books Available on Amazon
- War in Space
- Understanding Space Strategy
- Space Warfare and Defense
- Military Space Power
- Space Warfare in the 21st Century
Appendix: Top Questions Answered in This Article
What does persistent engagement mean in the space domain?
It refers to continuous operations below the threshold of armed conflict aimed at detecting, preempting, and disrupting adversarial behavior in and around orbital systems. In practice, that could include close inspection, shadowing, cyber activity, electronic interference, and public exposure of suspicious conduct. The emphasis falls on sustained presence rather than one-off retaliation.
Why does the paper compare outer space with cyberspace?
The comparison rests on strategic logic rather than physical similarity. Both domains reward initiative, contain many dual-use tools, and often involve ambiguity over attribution and intent. That makes a doctrine built around continuous contestation more plausible in each domain than in traditional military settings with brighter red lines.
How is this different from a classic anti-satellite attack?
A classic anti-satellite attack usually implies a direct, recognizable strike against a spacecraft or its support systems. Persistent engagement focuses on repeated lower-level pressure that may remain reversible or deniable. Its power comes from shaping behavior over time rather than from a single destructive event.
Why does stalled arms control matter so much in the paper’s argument?
Without detailed and widely accepted rules, states gain more room to test boundaries in orbit. Legal ambiguity does not cause conflict by itself, but it reduces shared expectations about what conduct is acceptable. That makes routine coercive behavior easier to justify and harder to punish collectively.
What kinds of technology make this doctrine feasible?
Rendezvous and proximity operations, on-orbit inspection, responsive maneuvering, electronic warfare, cyber capability, and strong space domain awareness all support the concept. None of these technologies is inherently unlawful or inherently offensive. Their strategic meaning depends on intent, context, and the pattern of use.
Does the paper say persistent engagement in orbit already exists?
It stops short of saying a fully formed doctrine is already in place. Instead, it argues that many preconditions already exist, including military reorganization, alliance cooperation, maneuver practice, and the spread of counterspace capability. The paper treats the present moment as a transition rather than a completed transformation.
Why might governments find this approach attractive despite the risks?
A government may see continuous activity as a way to preserve initiative, protect high-value systems, reassure allies, and impose small costs without crossing into open war. The doctrine can appear rational in a setting where leaders believe rivals are already probing their weaknesses. That is part of what makes it politically tempting.
How could alliances be affected by this kind of doctrine?
Allies might gain stronger operational support, especially if one partner helps inspect or protect another partner’s spacecraft. At the same time, close operational involvement can produce friction over access, authority, and acceptable risk. Security cooperation in orbit can deepen trust or create unease, depending on how it is managed.
What is the biggest danger identified by the paper?
The largest danger is normalization of constant contestation in a domain that depends on restraint and shared environmental stability. Once states begin to expect persistent pressure as routine behavior, every maneuver can look more threatening. That can raise the chance of escalation, miscalculation, and lasting damage to the orbital environment.
What policy lesson emerges from the paper?
The paper points toward a simple lesson: waiting for a major space conflict before building stronger rules would be a poor strategy. Restraint becomes much harder to rebuild after competitive habits harden into doctrine. Preventive diplomacy, clearer behavioral standards, and political compromise remain far less costly than managing a normalized cycle of orbital coercion.
Appendix: Glossary of Key Terms
Persistent Engagement
Rather than relying on occasional responses after an incident, this concept describes a security approach based on continuous operational contact with an adversary. In the context used here, it means keeping pressure on rivals through repeated actions meant to detect threats early and disrupt them before they become more damaging.
Counterspace Capabilities
Used in this discussion to describe tools and methods designed to interfere with, degrade, deny, or threaten space systems and the services they support. The category includes physical, electronic, and cyber methods, and it often covers both destructive and non-destructive means.
Rendezvous and Proximity Operations
Applied here to the controlled movement of one spacecraft near another spacecraft. Such operations can support benign missions such as servicing or docking, but they can also support inspection, shadowing, intelligence collection, or coercive positioning when used in a military setting.
Defend Forward
Borrowed from cyber doctrine, this phrase refers to acting close to the source of a threat instead of waiting for an attack to reach domestic systems. In orbital terms, the idea points toward early disruption, close monitoring, and preemptive interference around hostile activity.
Hunt Forward
In the usage relevant here, the phrase describes cooperative operations conducted with a partner to identify hostile activity before it produces larger harm. The space version could involve inspection support, sensor sharing, or technical assistance focused on suspicious behavior around allied spacecraft.
Space Domain Awareness
This term refers to the ability to track objects, understand their behavior, and interpret activity in orbit with enough fidelity to support safe and secure decisions. It covers observation, analysis, attribution, and warning functions relevant to both civilian operations and military planning.
Electronic Interference
As used here, the phrase means intentional disruption of signals that satellites or users depend on for communication, navigation, or control. Jamming and spoofing are common examples. Effects can range from nuisance and confusion to operational denial of a service.
Kessler Syndrome
This concept describes a cascading debris problem in orbit where collisions create fragments that raise the likelihood of more collisions. In the context of space security, the term serves as a reminder that destructive conflict can impose long-lived consequences on all operators, including those not involved in the original confrontation.