Back to news

July 31, 2019 | International, Aerospace, Security

The next cybersecurity concern for NATO? Space

By: Kelsey Reichmann

A new report warns that the cybersecurity vulnerabilities related to military space systems, specifically terminals and command-and-control systems, deserves renewed attention from NATO countries.

The report, titled “Cybersecurity of NATO's Spaced-based Strategic Assets,” was produced by Chatham House, which is part of the Royal Institute of International Affairs, a policy institute in London. The paper, by Beyza Unal, was released July 1.

“There is an urgent need to study and address cyber-related challenges to strategic assets within NATO and its key member countries, particularly the cyberthreat to space-based command and control systems,” the report read. “The increasing vulnerability of space-based assets, ground stations, associated command and control systems, and the personnel who manage the systems, has not yet received the attention it deserves.”

The report highlights cybersecurity vulnerabilities to space systems used by countries in the NATO alliance, notably singling out commercial products used in military operations as a particular risk. These vulnerabilities can come from back-door encryption, supply chain security, and personnel and procedural practices, according to the report. NATO uses space assets to defend territory, peacekeeping missions, humanitarian assistance and disaster relief, counterterrorism, and conflict prevention.

“There is an increasing need to apply higher-grade military hardening and cyber protection specifications to civilian capabilities that have the potential to be used in support of military applications,” the report read. “If military standards are not met, items procured from commercial industry with design flaws may expose NATO's systems to additional vulnerabilities."

The report also points to the importance of securing satellite terminals.

“Terminals located in ground stations constitute a critical vulnerability, as a terminal is an access point to a satellite and is usually not protected by authentication in order not to hinder operational actions,” the report said. “Terminals house software systems that can be compromised and require patching and upgrading.”

Data flowing between satellites, especially ground stations, can become vulnerable, according to the report.

“Adversaries infiltrating ground- or space-based systems could exploit weak software implementation, or the incompatibility of network or data transfer protocols in the chain,” the report read. “While the absence of data is easy to detect, the manipulation of data or erosion of confidentiality at such an interface is potentially more difficult to discern.”

Among the report's recommendations is that NATO strengthen its cyber defense through increased collaboration between the public and private sector. This would allow for more timely information sharing of cyberthreats.

The report also urges NATO to emphasize that commercial manufacturers meet basic cybersecurity standards and possibly more stringent military protection standards.

“In the future, military systems will be increasingly connected to non-military systems,” the report stated. “This has important implications for the laws of armed conflict, as the combination of civilian, commercial and military capabilities in the cyber domain and space raises the risk that civilian capabilities used for military purposes qualify as legitimate military targets.”

https://www.fifthdomain.com/international/2019/07/30/the-next-cybersecurity-concern-for-nato-space/

On the same subject

  • Leidos wins $631M sensor contract from US Army

    May 8, 2024 | International, Land

    Leidos wins $631M sensor contract from US Army

    The Development, Integration, Acquisitions, Bridging to Logistics & Operations (DIABLO) program positions the company as a leading mission equipment provider to the Army for the next 10 years.

  • Pentagon wins brief waiver from government’s Huawei ban

    August 17, 2020 | International, C4ISR

    Pentagon wins brief waiver from government’s Huawei ban

    WASHINGTON ― The Trump administration is granting the Pentagon a temporary waiver of government-wide ban on contractors using Huawei and other Chinese-made telecommunications equipment, according to a memo obtained by Defense News. The move offers a weeks-long reprieve, until Sept. 30, for firms doing business with the Department of Defense. The firms are among those still reeling from the economic effects of the coronavirus pandemic and who lobbied for more time to comply with new far-reaching regulations. The original provision was to take effect Aug. 13. The administration had been finalizing regulations that would prohibit government contracting with companies whose supply chains contain products from five Chinese companies including Huawei, as mandated under of Section 889 of the 2019 National Defense Authorization Act. The administration, confronting China on trade and a host of issues, has deemed Huawei an espionage threat. Citing U.S. national security interests, Director of National Intelligence John Ratcliffe granted the Pentagon a temporary waiver to further assess a broader waiver request from DoD. The action came in a memo to Under Secretary of Defense for Acquisition and Sustainment Ellen Lord.

  • Pentagon strategy urges faster tech transition, more collaboration

    May 9, 2023 | International, Other Defence

    Pentagon strategy urges faster tech transition, more collaboration

    The 11-page strategy, which the department released May 9, also emphasizes the need for more investment in lab and test infrastructure.

All news