HomeCurrent NewsAsymmetric Warfare and the Space-Enabled Battlefield

Asymmetric Warfare and the Space-Enabled Battlefield

Key Takeaways

  • Space assets now determine battlefield outcomes in ways once thought impossible
  • Cheap jamming and cyber tools can degrade billion-dollar satellite systems
  • Weaker adversaries are closing the gap by targeting space infrastructure

The New Geometry of War

Space changed the terms of military competition not by making war fairer, but by concentrating extraordinary power in a layer of infrastructure that advanced militaries can’t live without and can’t fully defend. The most powerful armed forces in history have become structurally dependent on satellites for navigation, communications, intelligence, and the precise timing that precision munitions require. That dependency is both a force multiplier and a vulnerability, and the combination of those two facts sits at the heart of how asymmetric warfare plays out in the twenty-first century.

Asymmetric warfare describes conflict between parties whose capabilities differ dramatically in scale, technology, or doctrine. The term usually conjures images of guerrilla fighters and improvised explosives. The concept extends into orbit, though, where a single well-placed anti-satellite weapon, a burst of radio interference, or a carefully designed piece of malware can degrade systems that cost billions of dollars to build and decades of institutional will to deploy. The asymmetry isn’t simply about hardware. A military that has concentrated a vast share of its combat power in a domain it can’t fully protect has created opportunities for adversaries who couldn’t win a conventional arms race but can afford to be disruptive.

What Space Actually Does for Modern Militaries

GPS, the Global Positioning System, provides the timing and location data that precision-guided munitions require. Communications satellites link commanders in Washington or Beijing with forces operating in remote theaters. Reconnaissance satellites produce imagery that informs strategic planning and targeting. Early warning satellites detect ballistic missile launches within seconds. None of these functions are marginal; they’re load-bearing pillars of how advanced militaries fight.

The United States military is the most space-dependent fighting force in history. Every branch of service relies on satellite-derived data for routine operations. The U.S. Space Force, established on December 20, 2019, exists because decision-makers recognized that protecting these assets requires specialized focus and dedicated resources, not just a responsibility split among existing service branches. Other nations, including China, Russia, France, India, and Japan, have moved to build their own space-based military capabilities, and their own means of threatening those of competitors.

The result is a strategic environment where the most powerful conventional military in the world is simultaneously vulnerable in the domain it depends on most. That structural reality is the starting point for understanding why space has become a theater of asymmetric competition rather than simply a force multiplier for whoever can afford to reach orbit.

Kinetic Threats: Missiles, Satellites, and Debris

The most direct expression of anti-satellite capability is the kinetic kill vehicle, a missile or maneuvering spacecraft designed to physically destroy a satellite. China demonstrated this capability on January 11, 2007, using a ground-launched ballistic missile to destroy its own Fengyun-1C weather satellite in low Earth orbit. The test created more than 3,000 pieces of trackable debris and an estimated 150,000 fragments too small to track, most of which remained in orbit for years. The strategic signal was unmistakable: Beijing could blind U.S. military reconnaissance and communications systems if it chose to act.

Russia conducted a comparable test on November 15, 2021, destroying Cosmos 1408 with a direct-ascent anti-satellite missile. The resulting debris cloud forced astronauts aboard the International Space Station to shelter in their docked Soyuz and Crew Dragon capsules. The U.S. Department of State condemned the test as reckless and dangerous. Russia offered denials and deflections, a pattern by then familiar to Western governments tracking its behavior in the space domain.

India joined this group on March 27, 2019, when Prime Minister Narendra Modi announced that the country had successfully destroyed an Indian satellite in low Earth orbit at approximately 300 kilometers altitude under Mission Shakti. The debris was designed to decay quickly at that altitude, a choice that reflected awareness of the international criticism China had absorbed twelve years earlier. The United States had conducted its own test, Operation Burnt Frost, in February 2008, destroying a malfunctioning reconnaissance satellite and framing the action as a public safety measure rather than a weapons demonstration.

These tests represent the high end of space-based coercion. They’re expensive, visible, and generate considerable political fallout. For a weaker power trying to deter a technologically superior adversary, though, even the credible threat of kinetic strikes on satellites changes how the opponent calculates its own vulnerabilities.

The co-orbital variant of anti-satellite capability is quieter and, by several assessments, more dangerous for long-term stability. Russia’s Cosmos 2543 satellite reportedly released a projectile in space in July 2020, an act that U.S. Space Force officials described publicly as a weapons test. Co-orbital proximity operations are harder to attribute, harder to counter, and don’t generate the political firestorm that a direct-ascent missile test creates. China’s Shijian-17 satellite has conducted proximity operations at geostationary orbit, a significantly harder technical problem than low Earth orbit maneuvers, suggesting Beijing is developing tools for interfering with satellites in the highest commercially and militarily active orbital region.

Electronic Warfare: The Preferred Tool of the Underdog

Kinetic attacks are the loud end of counter-space operations. Electronic warfare is where the asymmetric advantage truly lives. Jamming, spoofing, and signal interference can achieve many of the same effects as a kinetic strike, including degraded navigation, disrupted communications, and confused targeting, at a fraction of the cost and without crossing the threshold of an obvious act of war.

GPS jamming is now a routine feature of conflict zones. Russian military forces have used it extensively in eastern Ukraine and around the Baltic states since at least 2017, according to assessments by the Finnish Transport and Communications Agency and the Nordic Institute for Interoperability Solutions. Norwegian authorities documented widespread GPS disruptions affecting civilian aviation near the Russian border during military exercises. Commercial pilots reported cockpit alerts and navigation failures across dozens of kilometers of airspace adjacent to Russian military activity.

GPS spoofing is more sophisticated and, by many assessments, more dangerous. Rather than blocking a signal, spoofing broadcasts a false one that tricks a receiver into calculating a wrong position. Spoofing incidents in the Black Sea region in 2017 caused ships’ navigation systems to report positions dozens of miles from their actual locations. A widely cited analysis by the Center for Advanced Defense Studies documented hundreds of anomalous AIS vessel tracks in that area consistent with coordinated spoofing operations. Separately, in 2019, dozens of ships operating near Shanghai’s Huangpu River reported GPS positions placing them miles inland, at the coordinates of Shanghai Pudong International Airport. Neither incident required the spoofing party to come anywhere near the affected vessels.

Iran’s approach to electronic warfare illustrates how a relatively weak power can score significant victories against a technologically superior adversary. In December 2011, Iran claimed to have captured a Lockheed Martin RQ-170 Sentinel stealth drone by exploiting its navigation systems and forcing it to land in Iranian territory. U.S. officials initially denied the claim but subsequently confirmed the aircraft was missing. Whether Iran accomplished this through GPS spoofing or exploited a different vulnerability remains disputed in the public record, but the incident demonstrated that electronic interference could neutralize a sophisticated, expensive unmanned platform.

The cost comparison here is instructive. An RQ-170 Sentinel costs an estimated $6 million per unit. Iran’s claimed capability, if accurate, required electronic equipment costing a small fraction of that. The underlying logic of asymmetric warfare, finding a cheap counter to an expensive capability, applies with particular force when the expensive capability depends on signals traveling through open, unguarded space.

The Viasat Attack: Cyber War Reaches Orbit

The most consequential cyberattack on space infrastructure in recent memory began in the early hours of February 24, 2022, approximately one hour before Russian ground forces crossed into Ukraine. The attack targeted Viasat ‘s KA-SAT satellite broadband network using malware that researchers at SentinelOne later named AcidRain. The malware wiped the firmware of tens of thousands of satellite modems across Europe, severing communications for Ukrainian military units and government offices while also cutting service for tens of thousands of civilian customers across Germany, France, Hungary, Greece, Italy, and Poland.

The KA-SAT network had been used by Ukrainian military forces for command-and-control communications, and the precise timing of the attack left no ambiguity about its strategic purpose. German wind turbine operator Enercon reported that approximately 5,800 of its turbines were knocked offline because their remote monitoring systems relied on the same network. The attack required no missile, no spacecraft, and no direct physical access to the satellite itself. Attackers exploited a misconfigured VPN appliance at a Turin management center operated by Eutelsat’s Skylogic subsidiary to gain access to the trusted management segment of the KA-SAT network, then issued legitimate management commands that overwrote key data in modem flash memory at massive scale.

The United States, European Union, United Kingdom, Canada, Australia, and New Zealand jointly attributed the attack to Russia’s military intelligence service, the GRU, on May 10, 2022. SentinelOne had earlier noted developmental similarities between AcidRain and VPNFilter, a 2018 malware campaign widely attributed to the Russian-government-linked Sandworm hacking group. The attribution was one of the few times Western governments had publicly named a state actor for a cyberattack on space infrastructure, and the breadth of international support for it, with nearly twenty countries aligning with the attribution, reflected how seriously the incident was taken.

The KA-SAT attack’s significance extends well beyond its immediate effects. It demonstrated that adversaries view satellite ground segments and the terrestrial network infrastructure connecting them as legitimate first-strike targets. It also revealed the deep interdependence between commercial space services and military operations, an interdependence that neither the military customers nor the commercial operators had fully planned around.

Starlink and the Commercial Satellite Revolution in Warfare

Ukraine’s Vice Prime Minister Mykhailo Fedorov publicly asked Elon Musk to activate Starlink over Ukraine on February 26, 2022, two days after the invasion began. Musk replied that service was active the same day. Within hours, terminals began arriving. By 2023, approximately 42,000 Starlink terminals were in operation across Ukraine’s military, hospitals, businesses, and aid organizations, according to Ukrainian government figures, with Poland alone contributing 19,500 out of more than 47,000 terminals delivered by December of that year. Ukrainian drone operators, infantry units, artillery spotters, and intelligence teams all came to depend on the constellation for real-time data links and communications that were faster and more resilient than anything the Ukrainian military had fielded before.

Russia responded with jamming. SpaceX responded to that jamming not by shipping new hardware but by pushing software updates, a process Musk publicly described in March 2022 as ongoing and effective. The Pentagon’s director for electromagnetic warfare, Dave Tremper, described watching SpaceX update its way past Russian jamming attempts as “eyewatering,” adding that the speed and agility of SpaceX’s software response represented a model the U.S. military needed to study and adopt. The back-and-forth between Russian electronic warfare teams and SpaceX engineers played out in near real time over weeks, a running operational contest between a private technology company and a state military’s specialized units.

What the Starlink case represents is genuinely new in the history of space and warfare. A private company, not a government, deployed the communications backbone for a nation’s military operations in a major land war in Europe. The strategic implications of that arrangement are still being worked through by governments that assumed they had control over their space communications infrastructure and now must reckon with commercial dependencies they didn’t design and can’t fully control. The constellation’s low Earth orbit architecture, its more than 6,000 satellites as of early 2026, and its software-defined design make it far more resilient against jamming and kinetic attack than geostationary alternatives. Russia couldn’t destroy the network the way it crippled KA-SAT, because there was no single firmware to overwrite and no single satellite to destroy. At the same time, Starlink’s dependence on gateway stations and SpaceX’s own network operations centers creates chokepoints that a sophisticated adversary can identify, study, and target.

State vs. Non-State Actors in the Space Domain

Most counter-space analysis focuses on great-power competition between the United States, China, and Russia. That framing misses an important and growing dimension of the problem: non-state actors and smaller states are gaining access to space-enabled military capabilities that were, until recently, the exclusive province of superpowers.

Commercial satellite imagery is the clearest example. Planet Labs, a San Francisco-based company founded in 2010, operates the world’s largest Earth-observation satellite constellation, with more than 200 Dove satellites providing daily global coverage and its SkySat satellites offering resolutions down to 50 centimeters per pixel as of 2024. This imagery is available to governments, journalists, NGOs, and commercial customers alike. During the Russian military buildup before the February 2022 invasion, both Planet Labs and Maxar Technologies published commercial satellite imagery showing Russian armored vehicles, field hospitals, and fuel depots massing near the Ukrainian border. The imagery was widely shared, informed Western government assessments of Russian intent, and shaped public debate in a way that state-controlled imagery programs never could have achieved.

Non-state actors and smaller militaries can now monitor troop movements, track naval vessels, and assess battle damage using imagery that requires no space program of their own. The Houthi movement in Yemen has used satellite imagery for target planning. Hezbollah has used commercially available imagery for target development. These aren’t state actors with established space programs; they’re sub-state military organizations with access to a global commercial market.

The spread of GPS-guided munitions follows a similar pattern. Small drones equipped with GPS guidance are now standard equipment in conflict zones from Ukraine to Syria to Yemen. The technology is cheap, commercially available, and lethal when combined with even modest explosive payloads. A drone costing a few hundred dollars, guided by GPS, can strike a target with accuracy that would have required a precision munition costing tens of thousands of dollars a generation ago. The democratization of space-enabled precision is one of the defining military developments of the 2020s, and its implications for force structure and deterrence are still being absorbed by defense establishments that built their strategies around the assumption that precision was exclusive to wealthy, technologically sophisticated states.

Directed Energy: The Quiet Escalation

Laser systems and high-powered microwave weapons represent a category of counter-space capability that fits the asymmetric calculus in several important ways. They don’t create debris, they operate at the speed of light, and their effects can range from temporarily dazzling a satellite’s sensor to permanently disabling its electronics.

China has developed ground-based laser systems capable of dazzling low Earth orbit imagery satellites, temporarily blinding their sensors during passes over areas of strategic interest. The U.S. Defense Intelligence Agency ‘s 2019 report on threats to U.S. space systems assessed that China was developing laser weapons to damage or destroy satellites, with low-power dazzling systems potentially already operational and higher-power systems expected to follow. Russia has its own directed energy programs. The Peresvet laser system, publicly revealed in 2018, is described by Russian sources as an air defense asset but has been assessed by Western analysts as potentially capable of blinding satellite sensors during orbital passes.

The appeal for any actor seeking to counter a stronger opponent is straightforward. A laser system costs far less than the satellites it threatens, generates no debris, and is difficult to attribute when its effects are temporary. A satellite that goes briefly blind over a sensitive target doesn’t necessarily prove hostile action; sensor anomalies and equipment failures happen routinely in space. That ambiguity is a feature of the adversary’s plan, not an accidental byproduct. It allows a state to degrade an opponent’s reconnaissance capability without providing the kind of evidence that typically triggers a formal diplomatic or military response.

Counter-Space Methods at a Glance

Counter-Space MethodRelative CostPrimary TargetCreates Debris?
Direct-ascent ASAT missileHighLEO and MEO satellitesYes
Co-orbital ASAT spacecraftVery highAny orbital regimePotentially
GPS jammingLow to moderateNavigation-dependent systemsNo
GPS spoofingLow to moderateNavigation receivers and guided platformsNo
Cyber attack on ground segmentVariableModems, network management, ground stationsNo
Directed energy (laser or HPM)HighSatellite sensors and electronicsNo
Communications satellite jammingLow to moderateSatellite communications linksNo

The Commercial Satellite Vulnerability

Commercial satellites weren’t designed with warfare in mind. They were built to minimize cost and maximize signal throughput, with security treated as a secondary concern. The systems that manage them, ground control stations, network operations centers, and user terminals, were designed for commercial reliability, not for resisting electronic attack, surviving proximity operations, or maintaining service through a targeted cyberattack.

The problem is structural. Western militaries, and the United States military in particular, have become heavily dependent on commercial satellite services to supplement government-owned military communications systems. During the peak of U.S. operations in Iraq and Afghanistan, the Department of Defense was leasing an estimated 80 percent of its satellite bandwidth from commercial providers, a figure cited across multiple program assessments and analyses from the Defense Advanced Research Projects Agency and related offices. Commercial services were cheaper, faster to deploy, and offered higher bandwidth than military systems could provide alone.

That reliance has not diminished. Commercial Earth observation, commercial communications, and commercial positioning services are woven into the operational fabric of modern military activity. The difficulty is that commercial operators have different priorities than military planners. They’re optimized for cost, coverage, and regulatory compliance, not for hardened security. Some commercial operators have invested meaningfully in security posture. Viasat was not operating an unprotected system; the KA-SAT attack exploited access to the network’s management infrastructure that required sophisticated knowledge of the system’s architecture. The broader commercial sector remains uneven. Many smaller satellite operators and ground station providers have security practices more characteristic of consumer technology companies than defense contractors.

The U.S. Space Force has recognized this and launched initiatives to assess and improve the security posture of commercial systems that military operations rely upon. The Commercial Satellite Communications Office manages the relationship between military requirements and commercial providers, working to bridge the gap between what military planners need and what commercial operators are currently designed to provide.

China’s Integrated Counter-Space Approach

China’s counter-space strategy doesn’t fit neatly into any single category. The People’s Liberation Army has developed what analysts describe as an integrated set of capabilities spanning kinetic, electronic, cyber, and directed energy domains, designed to deny U.S. military forces the space-enabled advantages they depend on in any conflict over Taiwan or in the broader Western Pacific.

The PLA Strategic Support Force, established in December 2015, was specifically created to integrate space, cyberspace, and electronic warfare operations under a unified command. A reorganization of the PLA in 2024 redistributed some of its functions across newly created service branches, but the integration mandate remained. Chinese military doctrine explicitly identifies space as a new “commanding height of strategic competition,” language that appears in PLA strategic documents and in the writings of senior PLA officers. The doctrine of “system destruction warfare” holds that defeating an adversary requires dismantling the command, communications, intelligence, and navigation systems that enable its military to function. Space systems sit near the top of that target list.

China’s January 2007 ASAT test was the kinetic demonstration of this doctrine. The co-orbital capabilities demonstrated by Shijian-17 and other Chinese satellites, which have conducted proximity operations at geostationary orbit, represent the quieter, persistent expression of it. What makes China’s approach distinctly asymmetric, even given its status as a major space power, is the degree to which it targets U.S. space dependency rather than trying to replicate U.S. capabilities in kind. China has built BeiDou for its own forces; what it needs for a Pacific conflict is the ability to degrade U.S. GPS precision in a theater of operations, not to win a satellite procurement race. The asymmetry operates at the system level, not the satellite level, and that distinction shapes how China invests in its counter-space programs.

Russia’s Doctrine of Space Disruption

Russia’s assessment of the 1991 Gulf War shaped its approach to counter-space operations in fundamental ways. Russian military theorists concluded that U.S. space superiority was the decisive factor in Desert Storm’s rapid outcome and spent the following decades developing means to deny that superiority to future adversaries.

The Krasukha family of ground-based electronic warfare systems is one result. These mobile systems are designed to suppress airborne radar, disrupt satellite communications, and jam signals across multiple frequency bands simultaneously. Russia deployed Krasukha systems in Syria and has used them extensively in Ukraine, where their effects on Ukrainian and NATO communications have been documented in open-source reporting and official assessments. Russia’s Tirada-2S satellite jamming system, deployed on mobile platforms, is designed to suppress communications satellites, reportedly with the ability to target specific transponders on geostationary satellites and selectively degrade communications for particular users without affecting others sharing the same satellite. That selectivity is operationally significant because it allows Russia to disrupt military communications while maintaining ambiguity about the scope and intent of the interference.

The Sandworm hacking group, attributed by multiple Western governments to Russia’s GRU military intelligence directorate, has targeted Ukrainian energy infrastructure, financial systems, and government networks since at least 2015, well before the full-scale invasion. The same group’s fingerprints appeared on the KA-SAT attack. The capacity to combine electronic warfare, cyber operations, and kinetic threats gives Russia a layered approach to space disruption that no non-state actor can currently replicate but that a growing number of smaller states are watching carefully, studying, and adapting to their own contexts.

The Legal Vacuum and the Norms Problem

The Outer Space Treaty of 1967 prohibits the placement of nuclear weapons or other weapons of mass destruction in space and bars the militarization of celestial bodies, but says almost nothing about conventional weapons, electronic warfare, or cyberattacks targeting space systems. The treaty was written when only two nations had space programs and the concept of a satellite cyberattack didn’t exist.

Subsequent treaties and guidelines, including the Moon Agreement ratified by only 18 states as of 2024, the Registration Convention, and voluntary guidelines from the UN Committee on the Peaceful Uses of Outer Space, have not filled the gaps. No binding international agreement prohibits direct-ascent ASAT tests, no agreed-upon definition exists for what constitutes an act of war in space, and no enforcement mechanism governs the norms that do exist.

The UN General Assembly passed a non-binding resolution in December 2022 calling for a norm against destructive anti-satellite tests, with 155 votes in favor. Only Russia, China, Belarus, Iran, Nicaragua, North Korea, and Syria voted against it. A non-binding resolution, adopted over the objections of the states most likely to conduct further tests, is precisely that. The legal vacuum is itself an asymmetric advantage. A state willing to use counter-space capabilities despite international disapproval faces few concrete consequences beyond diplomatic protests. A state whose space systems are attacked faces the challenges of attribution, proportionality, and the risk of escalation if it responds. The attacker, in most current scenarios, simply has more options than the defender.

Proliferation Beyond the Major Powers

Beyond the great powers, a growing number of states are pursuing counter-space capabilities appropriate to their resources and strategic situations. North Korea has demonstrated persistent GPS jamming capability, with documented incidents affecting South Korean civilian and military navigation systems across multiple incidents. South Korean authorities documented a jamming campaign in May 2012 that affected more than 1,000 aircraft and hundreds of ships. North Korea repeated the behavior in 2016, disrupting navigation across a broad swath of South Korean territory with effects extending to commercial aviation operating in and around Seoul.

Iran has invested steadily in both electronic warfare and satellite capabilities. The Islamic Revolutionary Guard Corps operates Noor military satellites and has claimed multiple times to have jammed or spoofed foreign drones and intelligence aircraft operating in or near Iranian territory. Iran launched Noor-1, its first military satellite, into orbit on April 22, 2020, using a ground-based ballistic missile as the launch vehicle, demonstrating the same dual-use technology that underlies a direct-ascent ASAT capability.

Pakistan and India, nuclear-armed neighbors with a history of military conflict, are both developing space capabilities with meaningful military applications. India’s Mission Shakti in 2019 demonstrated a direct-ascent ASAT capability. Strategic analysts in both countries have written extensively about the implications of space-based intelligence, surveillance, and reconnaissance for their respective military planning. The spread of these capabilities represents a proliferation problem without a clean historical analogy. Nuclear proliferation was controlled, imperfectly but meaningfully, through treaty regimes, export controls, and high technical barriers to entry. Counter-space capabilities, particularly electronic warfare tools and cyber capabilities targeting space ground infrastructure, have no meaningful barrier to entry for states with competent engineering communities and modest defense budgets.

The Defender’s Dilemma

Space systems take years to design, procure, launch, and operate. Counter-space capabilities can be developed and deployed much faster. A satellite constellation that took fifteen years and tens of billions of dollars to build can’t be defended the way a ground installation can. It can’t be reinforced overnight. It can’t shoot back in any conventional sense.

Resilience is the strategic answer most analysts have settled on: build more satellites, reduce dependence on any single asset, distribute the architecture so that losing any one satellite or ground station doesn’t degrade the overall mission. The Space Development Agency ‘s Proliferated Warfighter Space Architecture pursues exactly this approach. The program envisions a large constellation of smaller, cheaper, interconnected satellites in low Earth orbit providing military communications, tracking, and data transport with resilience built in through redundancy rather than through hardening individual satellites. The architecture is a direct response to the recognized vulnerability of small numbers of large geostationary systems.

The GPS Block III satellite program, with Lockheed Martin as prime contractor, incorporates anti-jamming capabilities and improved signal strength that make the satellites significantly harder to disrupt than earlier generations. The Air Force Research Laboratory has pursued studies in satellite self-defense and electronic countermeasures. None of these are solutions in any complete sense; they’re adaptations. Whether the adaptations are keeping pace with the development of threats is a question that doesn’t resolve cleanly against the available evidence, and the honest answer is that no one outside the classified intelligence community has enough information to give a confident verdict.

Economic Warfare Through Space Disruption

GPS is not only a military system. It’s the backbone of global timing infrastructure that financial networks, telecommunications systems, and power grids depend on. The Federal Aviation Administration estimates that GPS interference events cost commercial aviation tens of millions of dollars annually in rerouting, fuel consumption, and delays. A sustained GPS jamming campaign in a major commercial shipping lane could disrupt global trade at a scale far exceeding its military effect.

The KA-SAT attack demonstrated this interdependency in practice. Enercon’s 5,800 disabled wind turbines were not military targets. The emergency responders whose communications were disrupted in parts of Europe were not combatants. These were collateral effects of an attack that began as a military operation against Ukrainian command-and-control infrastructure. As militaries become more dependent on commercial space services, and as civilian infrastructure becomes more dependent on the same satellite systems that militaries use, the boundary between military and civilian targets in space-enabled conflict becomes increasingly difficult to maintain and, from the perspective of international humanitarian law, increasingly difficult to define and enforce.

The economic dimension of space-based coercion is underappreciated in strategic discussions that focus on satellite kill vehicles and jamming transmitters. An adversary that wanted to maximize disruption to a technologically dependent society without triggering a military response might find that sustained, deniable interference with GPS timing signals, or a carefully targeted attack on a single commercial ground station handling traffic for multiple satellite constellations, accomplishes more strategic damage at lower escalatory risk than any kinetic action could.

Small Satellites and the Proliferation of Capability

A CubeSat, a standardized small satellite format with a basic unit measuring 10 x 10 x 10 centimeters, can be launched as a rideshare payload for a few hundred thousand dollars. Universities, small companies, military research agencies, and even high schools have launched CubeSats. The dual-use potential is substantial. A CubeSat with a software-defined radio payload can conduct signals intelligence from orbit, collecting communications, detecting radar emissions, and monitoring electronic warfare activity across a wide area. A maneuverable CubeSat can conduct proximity operations near other satellites. The technology exists. The question of who is using it for what purpose isn’t always visible to outside observers.

Rocket Lab, a New Zealand-American launch company, built its business specifically around small satellite launch, with its Electron rocket completing more than 50 missions as of early 2026. SpaceX ‘s Transporter rideshare program has carried payloads for more than 100 customers on single launches, including government, commercial, and research payloads from dozens of countries. The accessibility of orbital delivery has lowered the threshold for space capability in ways that continue to outpace the regulatory and strategic frameworks designed for a world where reaching orbit was the exclusive domain of major space-faring states with large, visible space programs.

The small satellite market has also changed what surveillance and signals intelligence look like for states that previously couldn’t afford dedicated reconnaissance assets. A country with a few hundred million dollars for a space program can now deploy a constellation of small satellites that provides regional surveillance coverage, something that would have required the resources of a superpower twenty years ago.

Why Norms Aren’t Enough

The conventional analytical view treats counter-space capabilities as inherently destabilizing and advocates for international norms and confidence-building measures as the primary response. That view deserves direct scrutiny. The argument that voluntary norms will meaningfully constrain adversaries who view space disruption as a viable and relatively low-cost means of coercion rests on an optimistic assessment of state behavior that recent history doesn’t support.

Russia’s Cosmos 1408 test in November 2021 came after years of diplomatic engagement on space norms and specific U.S. proposals for responsible space behavior. China’s development of co-orbital capabilities has continued regardless of international criticism and calls for restraint. The position that emerges from examining this record is that the primary response to the asymmetric threat in space must be technical and operational resilience, not diplomatic norm-setting. Norms matter at the margins; they shape behavior among actors already inclined toward cooperation. They don’t stop an actor that has decided space disruption serves its strategic interests and has calculated that the consequences of such disruption won’t significantly outweigh the benefits.

This doesn’t mean diplomacy is worthless. A binding agreement on destructive anti-satellite tests that create debris would be genuinely valuable, because debris is an uncontrolled hazard threatening every space actor including those creating it. The narrow case for debris-specific norms rests on demonstrable self-interest, not goodwill, and is more likely to generate real compliance over time. The broader case for norms against jamming, spoofing, and cyber attacks on space systems is much harder to make stick, because these methods are deniable, reversible, and difficult to attribute with the certainty that international law typically requires before a state can lawfully claim the right of self-defense.

The Human Dimension of Space Disruption

Ukrainian soldiers in eastern Ukraine who lost Starlink connectivity during Russian jamming campaigns reported being cut off from intelligence updates, unable to coordinate with other units, and falling back on commercial cellphones or older radio equipment that provided neither the bandwidth nor the security of satellite communications. The tactical effect of space disruption isn’t abstract; it shows up in firefights where one side has better situational awareness than the other, in artillery coordination that fails to close the loop between sensor and shooter, in command decisions made without current intelligence.

The September 14, 2019, strikes on the Abqaiq-Khurais oil processing complex in Saudi Arabia temporarily cut Saudi oil production by roughly 50 percent, a staggering economic shock achieved by a combination of cruise missiles and drones whose guidance systems were publicly described as far more sophisticated than what a Houthi-resourced force would be expected to possess independently. Whether Iran supplied the guidance technology or Houthi forces developed their own capability remains contested in the public record. What isn’t contested is that GPS-guided munitions allowed either a non-state actor or its state sponsor to strike a strategic economic target with simultaneous precision that would have been unachievable without space-based navigation.

Space-enabled precision has changed what small forces can accomplish. A non-state actor with access to GPS guidance, commercial imagery for targeting, and commercially sourced drones has offensive capabilities that, twenty years ago, only a major military could field. The asymmetry of space-enabled warfare runs in both directions: it amplifies the advantages of the technologically dependent, and it hands new offensive tools to those who previously had almost no reach beyond their immediate surroundings.

Summary

The defining characteristic of space-enabled asymmetric warfare is that the attacker doesn’t have to win in space to achieve military effect. The attacker only needs to make the defender uncertain about whether its space systems will work when needed most. Jamming that degrades GPS navigation for a few hours, a cyberattack that severs satellite communications at the start of a campaign, spoofing that sends a drone to the wrong location: none of these require destroying a satellite. They require generating doubt in the mind of a commander who built an entire operational concept around the assumption that space systems would be available and reliable.

That uncertainty is a strategic weapon in its own right, and relatively cheap counter-space capabilities can create it against adversaries with far more expensive architectures. The KA-SAT attack cost Russia far less to execute than it cost Ukraine, Viasat, and European commercial customers. Russia’s GPS jamming campaigns have cost far less than the Starlink terminals, software updates, and operational workarounds they forced. The economic and tactical math of space-enabled asymmetric conflict consistently favors the disruptor over the dependent.

What remains genuinely unresolved, and not in a way that more time or analysis will easily settle, is whether any combination of technical resilience, operational adaptation, international norms, and commercial security investment can meaningfully shift that structural balance. The evidence from Ukraine, from the Viasat attack, from North Korea’s GPS jamming campaigns, and from China’s methodical development of co-orbital capabilities suggests that the attacker’s structural advantage is durable. The emerging response from the Space Development Agency’s proliferated constellation programs, from Starlink’s demonstrated software-defined resilience, and from GPS Block III’s improved anti-jamming capability offers a plausible counter-argument. Whether distributed, software-defined, redundant architectures can absorb the full weight of integrated counter-space operations from a peer adversary is the most important unanswered question in contemporary strategic competition. The answer will likely come not from an academic exercise but from a conflict nobody wants to see happen.

Appendix: Top 10 Questions Answered in This Article

What is asymmetric warfare in the context of space-enabled conflict?

Asymmetric space warfare describes conflict between parties with significantly different military resources, where a weaker adversary exploits the space dependency of a stronger one through jamming, cyberattacks, spoofing, or anti-satellite weapons. The weaker party doesn’t need to match the stronger party’s space capabilities; it only needs to degrade or disrupt them enough to generate operational uncertainty. This approach allows resource-limited actors to generate strategic effects against technologically superior opponents at a fraction of the cost of conventional military competition.

Which countries have demonstrated anti-satellite weapon capabilities?

China, Russia, the United States, and India have all demonstrated direct-ascent kinetic anti-satellite capability through actual satellite destruction tests. China’s test occurred in January 2007, Russia’s in November 2021, the United States conducted Operation Burnt Frost in February 2008, and India demonstrated Mission Shakti in March 2019. Several other nations are assessed to be developing co-orbital or directed energy counter-space capabilities that avoid creating debris and are harder to attribute.

What was the Viasat KA-SAT attack and why does it matter strategically?

On February 24, 2022, approximately one hour before Russia’s invasion of Ukraine, attackers used malware named AcidRain to wipe the firmware of tens of thousands of Viasat KA-SAT satellite modems across Europe, severing Ukrainian military communications and disabling approximately 5,800 wind turbines belonging to German operator Enercon. The United States and its allies attributed the attack to Russia’s GRU military intelligence service in May 2022. The incident demonstrated that satellite ground infrastructure is a viable first-strike target and that commercial space systems create military vulnerabilities their operators and military customers hadn’t fully anticipated.

How did Starlink change military communications in Ukraine?

SpaceX’s Starlink constellation became the primary communications backbone for Ukrainian military forces after the Viasat attack, with approximately 42,000 terminals in operation across Ukraine’s military, hospitals, and aid organizations by 2023. Russian forces responded with electronic jamming, prompting SpaceX to deploy software-based anti-jamming updates in March 2022, a response the Pentagon’s director for electromagnetic warfare described as “eyewatering.” The episode marked the first major real-world demonstration of a private company’s commercial satellite constellation serving as a nation’s military communications system during large-scale combat operations.

What is GPS spoofing and how has it been used in conflict?

GPS spoofing broadcasts a false GPS signal that causes a receiver to calculate an incorrect position, potentially redirecting drones, ships, or other GPS-guided systems to unintended locations. Widespread spoofing incidents documented in the Black Sea region in 2017 caused ships to report false positions dozens of miles from their actual locations. Iran reportedly used GPS signal manipulation to capture a U.S. RQ-170 Sentinel drone in December 2011, and coordinated spoofing campaigns near Shanghai in 2019 sent ships’ navigation systems to airport coordinates miles inland.

How do non-state actors benefit from space-enabled military capabilities?

Non-state actors use commercially available satellite imagery for target development and battle damage assessment, GPS-guided drones for precision strikes, and satellite communications for coordination across dispersed forces. The September 2019 strikes on Saudi Arabia’s Abqaiq-Khurais oil complex temporarily cut Saudi oil production by roughly 50 percent, demonstrating that GPS-guided munitions allow non-state actors or their sponsors to achieve strategic economic effects that previously required a state military’s precision strike capability.

What is the current international legal framework governing conflict in space?

The 1967 Outer Space Treaty prohibits weapons of mass destruction in space and bars militarization of celestial bodies but says almost nothing about conventional weapons, electronic warfare, or cyberattacks targeting space systems. No binding international agreement prohibits direct-ascent anti-satellite tests or electronic interference with satellites. A non-binding UN General Assembly resolution calling for a norm against destructive ASAT tests passed in December 2022 with 155 votes in favor but carries no enforcement mechanism and was opposed by Russia and China.

Why is commercial satellite infrastructure considered a military vulnerability?

Commercial satellites and their ground systems were designed for commercial reliability rather than military-grade hardening against electronic attack or cyberattack. Western militaries, including the United States, have become heavily dependent on commercial satellite services for communications bandwidth, imagery, and navigation support. Because commercial operators prioritize cost and throughput over security hardening, this dependence creates exploitable vulnerabilities that adversaries actively identify and prepare to target, as demonstrated by the KA-SAT attack in February 2022.

What makes China’s approach to counter-space operations distinctive?

China’s counter-space strategy integrates kinetic, electronic, cyber, and directed energy capabilities under a doctrine focused on denying U.S. military forces the space-enabled advantages they depend on in any Pacific theater conflict. Rather than matching U.S. satellite capabilities in kind, China focuses on the ability to disrupt GPS, communications, and reconnaissance systems that U.S. forces rely on. The People’s Liberation Army treats space disruption as a component of a broader campaign to disable the command-and-control architecture of a technologically superior adversary before and during a conflict.

What is the Proliferated Warfighter Space Architecture?

The Proliferated Warfighter Space Architecture is a U.S. Space Development Agency program designed to build a large constellation of smaller, cheaper, interconnected satellites in low Earth orbit providing military communications, tracking, and data transport. The architecture addresses the vulnerability of small numbers of large, expensive geostationary satellites by distributing the mission across hundreds of smaller satellites, building resilience through redundancy rather than hardening individual assets. It represents the U.S. military’s primary structural response to the asymmetric threat that makes concentrated, high-value space assets attractive targets.

YOU MIGHT LIKE

WEEKLY NEWSLETTER

Subscribe to our weekly newsletter. Sent every Monday morning. Quickly scan summaries of all articles published in the previous week.

Most Popular

Featured

FAST FACTS