Space Terrorism
PDF

Keywords

space assets
space cybersecurity threats
space hybrid threats
space security incidents
space terrorism
space weapon systems

How to Cite

Kozera, C. A., & Bernat, P. (2023). Space Terrorism. Safety & Defense, 9(2), 80-88. https://doi.org/10.37105/sd.217

Abstract

The rationale behind this article is to address a critical gap in research: the evolving threat of space terrorism. As space assets increasingly become integral components of both civilian and military security systems, their vulnerability to attacks escalates. The democratization of space weaponry, including advanced cyber technologies, signals an escalating risk to these space assets and their terrestrial infrastructure. This threat extends beyond traditional space powers to include non-state actors, such as terrorist individuals and groups or various proxy forces, who were previously considered marginal threats.

This paper aims to lay a foundational framework by providing a historical overview of terrorism and security incidents involving outer space assets, their cyber systems, and ground support structures. This compilation serves as a basis for a deeper, methodological, and systematic examination of the nature and implications of space terrorism.

In order to define the initial concept of space terrorism, this paper draws on an extensive literature review. The selection of security breach cases within the broad spectrum of the space sector was guided by their novelty, diversity, and relevance, offering insights into the emerging phenomenon of space terrorism.

https://doi.org/10.37105/sd.217
PDF

References

Anonymous TV [@YourAnonTV]. (2022, March 1). JUST IN: Hacking group 'NB65', affiliated with #Anonymous has shut down the Control Center of the Russian Space Agency 'Roscosmos'. [Post]. X. https://twitter.com/YourAnonTV/status/1498792639877074945

Bender, B. (2022, March 2). Russia’s space chief says hacking satellites “a cause for war.” Politico. https://www.politico.com/news/2022/03/02/russia-space-chief-hacking-satellites-war-00013211

Bernat, P. (2020). Orbital Satellite Constellations and the Growing Threat of Kessler Syndrome in the Lower Earth Orbit. Safety Engineering of Anthropogenic Objects, 4. 277–90. https://doi.org/10.37105/iboa.94

Bernat, P., & Posłuszna, E. (2019). The Threat of Space Terrorism in the Context of Irregular Warfare Strategies. In L. Aydemir (Ed.), Evaluation of Social Changes and Historical Events Based on Health, Economy and Communication in a Globalizing World (pp. 25–37). Dora.

Cain, J. R. (2016). Space Terrorism – A New Environment; New Causes. In C. S. Cockell (Ed.), Dissent, Revolution and Liberty Beyond Earth (pp. 93–110). Springer. https://doi.org/10.1007/978-3-319-29349-3_7

Campbell, D. (1999, May 20). Cyber Sillies. The Guardian. https://www.theguardian.com/uk/1999/may/20/military.defence

CBS News (1998, May 26). Beyond The Broadcast. CBS News. https://www.cbsnews.com/news/beyond-the-broadcast/

CBS News (2013, August 9). N.J. Man In A Jam, After Illegal GPS Device Interferes With Newark Liberty Operations. CBS News. https://www.cbsnews.com/newyork/news/n-j-man-in-a-jam-after-illegal-gps-device-interferes-with-newark-liberty-operations/

Cernan, E., & Davies, D. (1999). The Last Man on the Moon. St. Martin’s Griffin.

Chicago Tribune (1999, March 1). Hackers Reportedly Seize Control of Military Satellite. https://www.chicagotribune.com/news/ct-xpm-1999-03-01-9903010180-story.html

Cyber Defense Project. (2021). Terra Calling: Defending and Securing the Space Economy: From Science to Fiction and Back to Reality. ETH Zürich. https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2021-01-Terra-Calling.pdf

Daly, J. C. K. (2007, June 5). LTTE: Technologically innovative rebels. Energy Publisher. http://www.energypublisher.com/article.asp?id=9803

Dartnell, M. Y. (1995). Action Directe, Ultra-Left Terrorism in France, 1979–1987. Frank Cass.

Department of Justice. (2000, September 21). Juvenile computer hacker sentenced to six months in detention facility. Case marks first time a juvenile hacker sentenced to serve time. Department of Justice [U.S.A.]. https://www.justice.gov/criminal/pr/2000/09/2000_3384_JUVENILE_COMPUTER_HA.htm

Department of the Air Force. (2003). Comprehensive Strategy for the Space Force (Report to Congressional Committees). U.S. Department of the Air Force. https://www.spaceforce.mil/Portals/2/Documents/Space%20Policy/CRR-FY23-Comprehensive-Strategy-Space%20Force-15-Aug-23.pdf

Epstein, K., & Elgin, B. (2008). Network Security Breaches Plague NASA. Business Week. www.businessweek.com/print/magazine/content/08_48/b4110072404167

Ewalt, D. (2013, March 18). The Tale of Captain Midnight, TV Hacker And Folk Hero. Forbes. https://www.forbes.com/sites/davidewalt/2013/03/18/the-tale-of-captain-midnight-tv-hacker-and-folk-hero/#286308a41053

Forester, T., & Morrison, P. (2007). Hacking and Viruses. In K. E. Himma (Ed.), Internet Security: Hacking, Counterhacking and Society (pp. 3–28). Jones and Bartlett Publishers.

France24 (2023, October 5). Chinese firm sold satellites for intelligence to Russia's Wagner: contract. France24. https://www.france24.com/en/live-news/20231005-chinese-firm-sold-satellites-for-intelligence-to-russia-s-wagner-contract

Freedberg, S. J., Jr. (2015, December 2). US Jammed Own Satellites 261 Times; What If Enemy Did? Breaking Defense. https://breakingdefense.com/2015/12/us-jammed-own-satellites-261-times-in-2015-what-if-an-enemy-tried/

Gorman, S., Dreazen, Y. J., & Cole, A. (2009, December 17). Insurgents Hack U.S. Drones. The Wall Street Journal. https://www.wsj.com/articles/SB126102247889095011

Grossman, L. (1999, March 1). Did Hackers Hijack a British Military Satellite? Time. https://content.time.com/time/magazine/article/0,9171,20673,00.html

Harrison, T., Cooper, Z., Johnson, K., & Roberts, T. G. (2017). Escalation and Deterrence In the Second Space Age. Center for Strategic and International Studies. https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/171109_Harrison_EscalationDeterrenceSecondSpaceAge.pdf

Harrison, T., Johnson, K., & Roberts, T. G. (2018). Space Threat Assessment: A Report of the CSIS Aerospace Security Project 2018. Center for Strategic and International Studies. https://aerospace.csis.org/wp-content/uploads/2018/04/Harrison_SpaceThreatAssessment_FULL_WEB.pdf#page=18

IODA [@IODA_live] (2023, June 29). Follow the JSC Dozor-Teleport AS41942) outage in near realtime using IODA's dashboard. [Post]. X. https://twitter.com/IODA_live/status/1674436879046029314

Jayawardhana, W. (2007, April 13). Intelsat to turn off LTTE beam: Tigers’ satellite piracy bared. Daily News – Sri Lanka. http://www.dailynews.lk/2007/04/13/news01.asp

Jordan, J. (2020). International Competition Below the Threshold of War: Toward a Theory of Gray Zone Conflict. Journal of Strategic Security, 14(1), 1–24. https://www.jstor.org/stable/26999974

Kessler, D. J., & Cour-Palais, B. G. (1978). Collision Frequency of Artificial Satellites: The Creation of a Debris Belt. Journal of Geophysical Research, 83(A6), 2637–46.

Laqueur, W. (2003). No End to War: Terrorism in the Twenty-first Century. Continuum.

Leyden, J. (2014, July 15). Hamas hacks Israeli TV sat channel to broadcast pics of Gaza wounded. The Register. https://www.theregister.com/2014/07/15/hamas_hack_israeli_sat_tv/

Madory, D. [@DougMadory]. (2023, June 29). We can confirm that Russian satellite operator Dozor Teleport (AS41942) left the global routing table at about 02:00 UTC earlier today. [Post]. X. https://twitter.com/DougMadory/status/1674437865499947009

Manulis, M., Bridges, C. P., Harrison, R., Sekar, V., & Davis, A. (2021). Cyber security in New Space: Analysis of threats, key enabling technologies and challenges. International Journal of Information Security, 20, 287–311. https://doi.org/10.1007/s10207-020-00503-w

McCoy, J. J. (2007, April 27). Intelsat Shuts Down Transponder Hijacked By Terrorists. Satellite Today (Via Satellite). https://www.satellitetoday.com/uncategorized/2007/04/26/intelsat-shuts-down-transponder-hijacked-by-terrorists/

Mehmoodi, A., & Ahmed, S. (2021). Terrorism in Space: A Possibility. CISS Insight, 9(1), 90–109.

NATO. (2023). NATO’s Approach to Space. The North Atlantic Treaty Organization. https://www.nato.int/cps/en/natohq/topics_175419.htm

Nelson, A. J. & Epstein, G. L. (2022). The PLA’s Strategic Support Force and AI Innovation. Brookings. https://www.brookings.edu/articles/the-plas-strategic-support-force-and-ai-innovation-china-military-tech/

NetBlocks [@netblocks] (2023, June 29). Confirmed: Metrics show a disruption to satellite internet provider Dozor-Teleport which supplies Russia's FSB, Gazprom, Rosatom and military installations. [Post]. X. https://twitter.com/netblocks/status/1674447946689986561

PBS Frontline. (2000). Interview: anonymous. PBS Frontline. https://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/anon.html

Petkauskas, V. (2023, November 15). We breached Russian satellite network, say pro-Ukraine partisans. Cybernews. https://cybernews.com/cyber-war/we-breached-russian-satellite-network-say-pro-ukraine-partisans/

Rausch, H. (2006, April). Jamming Commercial Satellite Communications During Wartime: An Empirical Study. Proceedings of the Fourth IEEE International Workshop on Information Assurance. IEEE Satellite.

Reuters (2022, March 2). Russia space agency head says satellite hacking would justify war -report. Reuters. https://www.reuters.com/world/russia-space-agency-head-says-satellite-hacking-would-justify-war-report-2022-03-02/

Schlom, D. (2001). Target America 1972: When Terrorists Threatened Apollo – An Untold Story of Apollo 17. Ad Astra, (November/December 2001), 20–24.

Schwartz, N. A., Williamsen, J. E., Heagy, J. F., & Moeller, R. A. (2021). Orbital Debris and Kinetic Anti-satellite Concerns: How a “Kessler Syndrome” Threatens U.S. Use of Space Assets. Institute for Defense Analyses. http://www.jstor.org/stable/resrep30922

Stout, D. (1998, April 22). Pentagon Acknowledges Hacker Intrusion Into a Computer System. The New York Times.

Swinhoe, D. (2023, June 30). Russian satellite comms firm Dozer taken offline by Wagner-affiliated hacker group – report. Data Center Dynamics. https://www.datacenterdynamics.com/en/news/russian-satellite-comms-firm-dozer-taken-offline-by-wagner-affiliated-hacker-group-report/

Telegraph. (1999, March 4). British hackers attack MoD satellite. The Telegraph. https://web.archive.org/web/20070510032306/http://www.telegraph.co.uk/connected/main.jhtml?xml=/connected/1999/03/04/ecnhack04.xml

Yale Daily News. (1998, April 23). Hackers break into Pentagon system. The Yale Daily News.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.