Space Warfare as Infrastructure Warfare: The Strategic Targeting of Orbital Enablers: A White Paper on the Character of Conflict in the Space Domain


Executive Summary

Modern warfare has entered an era in which the most consequential targets are not armies in the field, fleets at sea, or cities on the ground, but the invisible infrastructure of orbital space upon which all contemporary military operations depend. Satellites enabling communications, navigation, reconnaissance, and missile warning have become the load-bearing pillars of the joint force — and, by extension, of the civilian economies intertwined with them. This white paper argues that space warfare is, at its essential character, a form of infrastructure warfare: a contest for the degradation, disruption, or destruction of the orbital systems that enable an adversary’s military effectiveness across every other domain of conflict. Unlike the population-targeting logic of strategic bombardment or the territorial logic of conventional maneuver warfare, space warfare is primarily directed at capabilities rather than at human beings or territory. Its effects, however, cascade with extraordinary speed and severity through every system that depends on space-based enablers — which, in the early twenty-first century, means virtually all of them. Understanding space warfare as infrastructure warfare is not a semantic exercise; it is a prerequisite for rational force planning, deterrence architecture, and the development of international norms capable of restraining the most destructive forms of orbital conflict.


1. Introduction: The Invisible Architecture of Modern War

There is an architecture to modern warfare that is never seen by those who wage it at the tactical level. The soldier who calls in a precision airstrike does not see the GPS constellation that guides the munition to its target. The naval officer who receives real-time intelligence on adversary fleet movements does not see the reconnaissance satellite that gathered the imagery. The theater commander who issues orders across thousands of miles of operational depth does not see the communications satellites that carry those orders at the speed of light. The nuclear deterrent force that holds adversary aggression in check does not advertise the early warning satellites that ensure its capacity to respond to a first strike. This invisible architecture — the constellation of military and dual-use satellites in Low Earth Orbit, Medium Earth Orbit, and Geosynchronous Earth Orbit — has become, in the course of a single generation, the indispensable foundation of military power in every domain.

The invisibility of this architecture is, paradoxically, the source of both its strategic value and its strategic vulnerability. Because space-based enablers operate transparently and continuously, the forces that depend on them have been designed around their availability as a planning assumption rather than a contingency to be managed. Communications are routed through satellite relay. Targeting solutions assume GPS accuracy. Intelligence cycles depend on overhead reconnaissance. Missile warning architectures rest on the persistent surveillance of GEO infrared sensors. Remove any one of these pillars, and the operational effectiveness of the joint force degrades in ways that no amount of tactical skill or conventional firepower can fully compensate for. Remove several simultaneously, and the degradation approaches mission failure at the theater level.

It is precisely this architecture that an adversary planning a space warfare campaign would seek to attack. Space warfare, as it is now practiced and as it is being developed by the major spacefaring military powers, is not aimed at the destruction of populations. It does not, in its primary expression, target cities, civilians, or territory. Its targets are satellites, ground stations, communication links, and the command-and-control nodes that integrate space-based capabilities into terrestrial military operations. In this sense, space warfare belongs to the tradition of infrastructure warfare — the strategic targeting of the systems, networks, and facilities upon which military effectiveness depends — rather than to the tradition of strategic bombardment or maneuver warfare.

This white paper examines the four principal categories of space-based military enablers — communications, global navigation and positioning, reconnaissance and intelligence, and missile warning — and analyzes each as a target set in the emerging grammar of space warfare. It then draws conclusions about the character of orbital conflict, its relationship to the broader logic of infrastructure warfare, and the implications for deterrence, doctrine, and arms control in a domain whose governance frameworks remain dangerously underdeveloped relative to its military significance.


2. The Four Pillars of Space-Based Military Infrastructure

2.1 Communications: The Nervous System of the Joint Force

Military communications have depended on satellite relay since the early 1960s, when the United States deployed the Initial Defense Communications Satellite Program (IDCSP) to provide reliable beyond-line-of-sight communications for strategic and theater forces (Richelson, 2001). In the intervening six decades, the dependence of military communications on satellite infrastructure has grown from a capability supplement into a structural necessity. The joint force of the early twenty-first century communicates, coordinates, and exercises command and control through a layered architecture of military and commercial communications satellites that spans every orbital regime from LEO to GEO.

The military communications satellite architecture of the United States illustrates the character of this dependence. The Wideband Global SATCOM (WGS) system provides high-capacity wideband communications in X-band and Ka-band frequencies across eleven satellites in GEO, serving joint and allied forces across the globe with the throughput required for real-time video, large intelligence data files, and voice communications (Defense Advanced Research Projects Agency, 2021). The Advanced Extremely High Frequency (AEHF) system provides survivable nuclear-hardened communications for strategic command-and-control, connecting the National Command Authority to nuclear forces through jam-resistant, low-probability-of-intercept satellite links — a function so critical that its disruption would directly implicate the credibility of nuclear deterrence (Acton, 2018). The Protected Tactical SATCOM (PTS) program seeks to extend survivable tactical communications to forward-deployed forces operating in contested electromagnetic environments.

Beyond these dedicated military systems, United States and allied forces have become substantially dependent on commercial communications satellite capacity. During Operation Iraqi Freedom, commercial Ka-band and Ku-band satellite capacity constituted a substantial fraction of total communications bandwidth used by deployed forces — a dependence that has only deepened as bandwidth-intensive applications, from drone video feeds to logistics software, have proliferated throughout military operations (Sheldon, 2008). This commercial dependence introduces a category of vulnerability that military planners did not face in earlier conflicts: civilian satellites operated by commercial entities, without military hardening or protection, carrying military traffic that an adversary has every incentive to disrupt.

The targeting logic that follows from this communications architecture is clear. An adversary seeking to degrade American and allied military effectiveness at the outset of a conflict would prioritize the disruption of military communications satellites — through jamming of uplinks and downlinks, through spoofing of command signals, through cyber intrusion into satellite control networks, or through direct physical attack on the satellites themselves or their ground control stations. The degradation of WGS and AEHF capability would not merely inconvenience the joint force; it would sever the digital nervous system through which the modern military organism functions. Units would lose situational awareness. Command decisions would be delayed. Coordination between services and allies would deteriorate. The precision and simultaneity that characterize American operational concepts — AirLand Battle, Joint Vision 2020, and their successors — depend on a communications bandwidth that satellite disruption would dramatically reduce.

The asymmetry of this targeting logic is particularly significant. The investment required to develop and deploy a military communications jamming capability — an electronic attack system capable of disrupting GEO satellite downlinks within a theater of operations — is orders of magnitude less than the investment required to build and launch the satellite being jammed. This cost asymmetry between offense and defense in the space communications domain is a structural feature of the strategic environment, not a temporary artifact of current technology, and it imposes a persistent burden on the defenders of space-based communications infrastructure (Krepon & Thompson, 2013).

2.2 Global Navigation and Positioning: The Backbone of Precision Warfare

The Global Positioning System, declared fully operational in 1995 after two decades of development following its conceptual origins in the Transit navigation satellite program of the 1960s, has transformed military operations to an extent that few technologies in history can match. Before GPS, artillery was aimed by map coordinates and meteorological corrections calculated by human hands. Aircraft found their targets by dead reckoning and visual recognition. Ships fixed their positions by stellar observation and radio navigation aids. The introduction of GPS-enabled precision did not merely improve the accuracy of existing methods; it qualitatively transformed the character of military operations by enabling forces to operate at night, in adverse weather, and across featureless terrain with a positional certainty previously available only under ideal conditions (Shukla & Bhatt, 2000).

The military applications of GPS extend well beyond the guidance of precision munitions, though that application alone would justify the strategic significance of the system. GPS timing signals, accurate to nanoseconds, are embedded in the synchronization architecture of military communications networks, enabling the frequency-hopping spread-spectrum waveforms that provide resistance to jamming and interception. GPS positioning enables the autonomous navigation of unmanned aerial vehicles, unmanned ground vehicles, and the emerging class of autonomous maritime systems being developed for mine warfare and littoral operations. GPS enables the coordinated maneuver of dispersed forces without the radio communications that would reveal their positions to an adversary — a capability of extraordinary value in the early phases of a conflict in which electromagnetic emissions must be minimized. GPS timing is embedded in the data links that synchronize joint fires, enabling the precise temporal coordination of strikes across multiple platforms that is the operational expression of joint targeting doctrine (Kaplan & Hegarty, 2006).

The vulnerability of GPS is as significant as its value. The system depends on a constellation of approximately thirty-one operational satellites in MEO, transmitting signals that are extraordinarily weak by the time they reach Earth’s surface — on the order of a few watts spread across a receiver antenna with an area of a few square centimeters. This signal weakness makes GPS inherently susceptible to jamming by radio frequency transmitters orders of magnitude less powerful than the satellites themselves. Ground-based GPS jammers with effective ranges of tens to hundreds of kilometers are available commercially and have been deployed operationally by Russia, North Korea, and other state actors in exercises and actual operations (Humphreys, 2017). The Russian military’s Krasukha-4 electronic warfare system, among others, is specifically designed to suppress GPS signals across wide areas, and its deployment in Syria and Ukraine has provided operational data on the tactical effects of GPS denial on a GPS-dependent adversary (Giles, 2016).

Beyond jamming, the GPS signal is vulnerable to spoofing — the transmission of false GPS signals that cause receivers to compute incorrect positions without any indication of the deception. Spoofing attacks have been documented in the Black Sea, in the Persian Gulf, and near Russian government facilities in Moscow, where GPS receivers have reported positions hundreds of kilometers from their actual locations (Goward, 2019). While military GPS receivers incorporate anti-spoofing protections, these protections are not absolute, and the sophistication of spoofing technology is advancing. The strategic logic of GPS spoofing as a form of infrastructure warfare is compelling: a spoofed precision-guided munition is not merely a missed shot; it may be an unintended strike on a friendly position or a civilian facility, generating political and legal effects far beyond the tactical miss.

The dependence of the United States joint force on GPS has created what military analysts describe as a “single point of failure” in operational concepts that assume continuous, accurate positioning (Pfatteicher, 2012). The development of GPS alternatives — inertial navigation systems, terrain-following radar altimetry, celestial navigation, and the exploitation of signals of opportunity from commercial radio and cellular networks — represents a belated recognition of this structural vulnerability. The development and deployment of competing GNSS constellations by Russia (GLONASS), Europe (Galileo), and China (BeiDou) further complicates the targeting logic: an adversary seeking to deny GPS to American forces must now weigh the possibility that those forces will transition to alternative GNSS signals, and must possess the capability to deny multiple constellations simultaneously — a significantly higher bar for counterspace operations.

The civilian dimension of GPS dependence amplifies the strategic stakes of GPS disruption far beyond the military domain. Civilian aviation navigation, maritime traffic management, precision agriculture, automated logistics systems, financial transaction networks, and cellular telephone infrastructure all depend on GPS timing and positioning to varying degrees. A deliberate disruption of GPS that was intended as a military counterspace operation would inevitably cascade into civilian systems in ways that blur the distinction between military targeting and effects on civilian populations — a distinction that is central to the application of international humanitarian law to space warfare (Harrison et al., 2022).

2.3 Reconnaissance and Intelligence: The Eyes of the Force

Overhead reconnaissance from space has been a fundamental pillar of national security intelligence since the first successful CORONA photoreconnaissance satellite return in August 1960, which yielded more photographic coverage of the Soviet Union in a single mission than all previous U-2 overflights combined (Day, Logsdon, & Latell, 1998). In the six decades since CORONA, space-based reconnaissance has expanded from film-return photographic systems into a multi-modal intelligence architecture incorporating electro-optical imaging, synthetic aperture radar, signals intelligence collection, and hyperspectral sensing, spanning military and commercial systems in multiple orbital regimes.

The military reconnaissance satellite architecture performs functions that are indispensable to the planning and execution of modern military operations at every level from strategic to tactical. At the strategic level, satellite reconnaissance provides the foundational intelligence assessments upon which force planning, threat characterization, and arms control verification depend. The continuous overhead surveillance of adversary strategic forces — missile fields, submarine bases, air defense networks, command and control facilities — provides the situational awareness that enables deterrence to function. Without the confidence that comes from persistent satellite reconnaissance of adversary strategic dispositions, the uncertainty that produces crisis instability would be dramatically amplified (Burrows, 1986).

At the operational and tactical levels, electro-optical and synthetic aperture radar reconnaissance satellites provide the imagery intelligence that drives targeting cycles, order-of-battle assessments, and battle damage evaluation. The revolution in military affairs that characterized American and allied operations from the Gulf War of 1991 onward was substantially enabled by the availability of satellite imagery intelligence at timescales and resolutions previously unavailable to theater commanders. The integration of satellite imagery into joint intelligence, surveillance, and reconnaissance (ISR) cycles — compressed from days to hours to near-real-time by advances in processing, exploitation, and dissemination — has transformed the speed and precision of the kill chain in ways that directly depend on the continued availability of overhead reconnaissance (Johnson, 2018).

The commercial imagery revolution has added a new dimension to the reconnaissance targeting problem. Companies such as Maxar Technologies, Planet Labs, Airbus Defence and Space, and a growing roster of new entrants operate large constellations of commercial imaging satellites that provide revisit rates and resolutions previously available only to the intelligence agencies of major powers. The availability of commercial satellite imagery to all parties in a conflict — including non-state actors, journalists, and international organizations — has fundamentally altered the information environment of warfare. An adversary planning a surprise military operation must now account for the near-continuous surveillance of its forces and preparations by commercial systems that it cannot legally attack without severe political consequences (Moltz, 2019).

The targeting logic of adversary reconnaissance satellites follows directly from this intelligence function. A state planning military operations that depend on surprise — an amphibious assault, a preemptive strike, a large-scale deception operation — has strong incentives to degrade or destroy adversary reconnaissance satellite capability before or during the critical phases of its operation. This logic was explicitly articulated in Chinese military doctrine publications of the 2000s and 2010s, which described the disruption of adversary information systems — including space-based reconnaissance — as a prerequisite for successful operations in a conflict with the United States (Stokes, 1999). China’s 2007 direct-ascent anti-satellite test, which destroyed the aging Fengyun-1C weather satellite and generated a debris cloud that remains a hazard to this day, demonstrated both the capability and the willingness to use it — a demonstration widely interpreted as a message about the vulnerability of American military reconnaissance satellites in LEO (Weeden, 2010).

The vulnerability of space-based reconnaissance to disruption constitutes a genuine strategic risk to the information advantage upon which American and allied operational concepts depend. A joint force that cannot observe adversary dispositions cannot target adversary forces with precision. A force that cannot evaluate the effects of its own strikes cannot adapt its campaign. A command structure that lacks reliable intelligence cannot make confident operational decisions under the time pressure of crisis or conflict. The degradation of space-based reconnaissance is therefore not merely a tactical inconvenience; it is an attack on the epistemological foundation of modern military operations — the ability to know what is happening in the operational environment with sufficient accuracy and timeliness to act effectively.

2.4 Missile Warning: The Foundation of Strategic Stability

Of all the functions performed by military satellites, strategic missile warning may be the most consequential for international security — and the most dangerous to disrupt. The ability to detect, track, and characterize ballistic missile launches within seconds of ignition, before warheads reach their targets, is the technical prerequisite for the decision-making processes that govern nuclear force employment. Without reliable missile warning, nuclear-armed states face an impossible choice between two catastrophic options: launch nuclear forces on warning of a detected attack — risking a catastrophic nuclear exchange based on a false alarm — or wait for detonation before responding, sacrificing the survivability of land-based nuclear forces that might otherwise constitute the retaliatory capability necessary to deter a first strike (Forden, 2001).

The American Space-Based Infrared System (SBIRS) represents the current generation of American strategic missile warning capability. Operating from GEO and highly elliptical orbits, SBIRS satellites detect the infrared signature of ballistic missile launches within seconds of ignition, providing warning times measured in tens of minutes for intercontinental ballistic missile (ICBM) trajectories and shorter warning times for submarine-launched ballistic missiles (SLBMs) and theater ballistic missiles. This warning enables the National Command Authority to convene deliberate decision-making processes before a decision on nuclear force employment must be made — a process that the doctrine of assured retaliation requires to be credible and time-constrained. The Next Generation Overhead Persistent Infrared (Next Gen OPIR) program, the successor to SBIRS, reflects ongoing American investment in the continuity of this critical function (Air Force Space Command, 2019).

The strategic significance of missile warning satellites derives not only from their operational function but from their role in maintaining the strategic stability that prevents nuclear war. The credibility of nuclear deterrence depends on the adversary’s belief that a first strike cannot prevent retaliation — that even a maximally effective counterforce strike will leave sufficient retaliatory capability to impose unacceptable costs. This credibility depends, in turn, on the ability of the targeted nation to detect the incoming attack with sufficient warning time to disperse, launch, or otherwise preserve its retaliatory capability. If missile warning satellites are degraded or destroyed at the outset of a conflict, the warning time available for nuclear decision-making is dramatically compressed, forcing a choice between premature launch on ambiguous warning or acceptance of the risk of force destruction before retaliation is authorized. This compression of decision time increases the probability of catastrophic error in either direction (Bracken, 2012).

The adversary targeting of missile warning satellites therefore occupies a unique position in the taxonomy of space warfare threats. An attack on a communications satellite degrades military effectiveness. An attack on a reconnaissance satellite reduces situational awareness. An attack on a GPS satellite compromises precision. Each of these is serious. An attack on missile warning satellites does something categorically different: it directly manipulates the strategic balance of nuclear deterrence in ways that could precipitate exactly the catastrophic escalation that the entire structure of nuclear deterrence is designed to prevent. For this reason, attacks on strategic missile warning satellites must be considered among the most destabilizing actions possible in space warfare — not merely because of their direct military effect, but because of their interaction with nuclear command-and-control architectures and the pressures they generate for premature or miscalculated nuclear employment (Acton, 2018).

Russia and China have both developed and continue to develop space-based infrared missile warning capabilities analogous to SBIRS, reflecting a shared recognition of missile warning’s strategic importance. Russia’s Tundra satellite constellation (the EKS system) provides the Russian Federation with a missile warning capability that its Soviet predecessor, the US-K/Oko system, provided in degraded form after the Cold War ended (Podvig, 2013). China’s development of infrared early warning satellites, accelerating in the late 2010s and early 2020s, reflects the broader maturation of Chinese strategic nuclear forces and the recognition that credible deterrence requires reliable warning. The mutual dependence of all major nuclear powers on space-based missile warning creates a peculiar strategic dynamic: all parties have strong incentives to protect their own warning satellites and, simultaneously, strong incentives not to attack adversary warning satellites — since the destabilization of adversary warning could precipitate exactly the uncontrolled escalation that no rational actor desires.


3. Space Warfare as Infrastructure Warfare: The Theoretical Framework

3.1 The Tradition of Infrastructure Warfare

Infrastructure warfare — the strategic targeting of the systems, networks, and facilities upon which military effectiveness depends — has a long pedigree in military history, predating the space age by centuries. The systematic destruction of Confederate railroad networks by Union General William T. Sherman during the Civil War campaign through Georgia and the Carolinas was a self-conscious strategy of infrastructure targeting designed to collapse the logistical foundation of Confederate military resistance (Grimsley, 1995). The strategic bombing campaigns of the Second World War, whatever their humanitarian costs, were substantially directed at the industrial and transportation infrastructure that sustained German and Japanese military production — the Schweinfurt raids targeting ball bearing production, the Transportation Plan targeting railway marshaling yards, the oil campaign targeting petroleum refineries (Overy, 1995). The coalition air campaign of the Gulf War of 1991 opened with a systematic attack on Iraqi command-and-control, communications, and electrical power infrastructure — not to harm the Iraqi population, but to sever the nervous system of the Iraqi military from its command authority (Warden, 1995).

Space warfare fits squarely within this tradition, with one important addition: the infrastructure being targeted is not on the ground but in orbit, and its disruption affects not only military operations but the civilian systems that have grown inextricably intertwined with military space capabilities. The targeting logic is identical to Sherman’s railroad strategy or the oil campaign against Germany: degrade the systems that enable adversary military effectiveness, rather than engaging adversary military forces directly. The difference in space warfare is the extent to which military and civilian infrastructure overlap in the orbital domain, creating escalatory risks and humanitarian consequences that the earlier traditions of infrastructure warfare did not face in the same form.

3.2 The Military Utility of Space Infrastructure Targeting

The military logic of targeting space infrastructure is compelling precisely because of the leverage it provides. Modern military operations of the type the United States and its allies are designed to conduct — joint combined arms operations across multiple domains, over extended distances, with precision effects at operationally relevant timescales — depend on a continuous flow of space-derived information. Disrupt that flow, and the operational capability of the joint force degrades not proportionally to the loss of satellite assets but nonlinearly, as multiple capabilities that depend on space-based enablers degrade simultaneously and the synergistic effects of their interaction are lost.

The concept of the “cascading failure” is useful here. The joint force does not simply lose the specific function performed by any given satellite that is disabled. It loses the compound capability that emerges from the integration of multiple space-based functions. A reconnaissance satellite provides imagery. A communications satellite transmits that imagery to an analyst. A GPS satellite enables the analyst’s position datum to be correlated with the imagery. A missile warning satellite ensures that the command authority receiving the analyst’s report is not simultaneously managing a nuclear alert. Remove any element of this integrated architecture, and the compound capability is degraded in ways that exceed the loss of the individual component. This compound vulnerability — the susceptibility of integrated systems to individual node failure — is precisely the characteristic that makes infrastructure warfare effective, whether it is directed at railroads, electrical grids, or satellite constellations (Libicki, 2009).

3.3 The Non-Population-Targeting Character of Space Warfare

A central claim of this white paper is that space warfare, in its primary expression, targets capabilities rather than populations. This claim requires careful qualification. The direct effects of space warfare — the jamming, spoofing, cyberattack, or physical destruction of satellites and ground stations — are directed at hardware, software, and electromagnetic emissions, not at human beings. No satellite operator, civilian or military, is harmed by the physical disruption of a satellite in orbit. In this direct sense, space warfare is categorically unlike strategic bombardment, which kills people and destroys cities, or maneuver warfare, which seizes and occupies territory.

However, the indirect effects of space warfare on populations can be profound, and it is important not to allow the non-population-targeting character of orbital attacks to obscure the humanitarian consequences of the cascading failures they produce. The disruption of commercial GPS timing signals could disrupt financial markets and power grids. The degradation of satellite communications could sever emergency response networks. The loss of weather satellite data could compromise aviation safety and disaster warning systems. These effects are not intended as population targeting in the legal or moral sense, but they fall on populations nonetheless, and the architects of international humanitarian law have only begun to grapple with the questions they raise (Bourbonnière & Lee, 2007).

This distinction — between the targeting logic of space warfare and its humanitarian consequences — is critical for the development of norms and legal frameworks governing orbital conflict. A framework that treats space warfare as population targeting in disguise will fail to capture its actual character and will generate inappropriate deterrence and arms control responses. A framework that ignores the civilian consequences of space warfare because the attacks are directed at orbiting hardware will fail to protect the civilian populations who depend on space-derived services. The conceptual precision required is to recognize space warfare as infrastructure warfare — capability-targeted, effects-diffuse — and to develop governance frameworks appropriate to that specific character.

3.4 Reversibility, Persistence, and the Spectrum of Space Attack

Space warfare encompasses a spectrum of attack modalities that differ significantly in their reversibility, their persistence, and their escalatory implications. At the least escalatory end of the spectrum, reversible electronic attacks — jamming and spoofing — disrupt satellite function for the duration of the attack without permanently damaging the targeted satellite or generating lasting debris. The satellite resumes full function when the electronic attack ceases. This reversibility makes electronic attack the preferred instrument for limited space warfare, since it permits coercion and signaling without the permanent effects that physical attack entails.

More escalatory are cyber attacks directed at satellite control networks — the ground stations, uplinks, and software architectures through which satellites are commanded and controlled. A successful cyber intrusion can seize control of a satellite, corrupt its software, deplete its fuel reserves through spurious maneuvering commands, or disable its payload without physically approaching the satellite or generating traceable debris. Cyber attacks on satellite infrastructure occupy a gray zone of escalatory ambiguity: they are more persistent in their effects than jamming (software corruption may require months to remediate) but less permanent than physical destruction, and they are conducted through a domain — cyberspace — whose laws of armed conflict applicability remain contested (Schmitt, 2017).

At the most escalatory end of the spectrum, direct physical attacks on satellites — through direct-ascent missile intercept, co-orbital interceptor, directed energy weapons, or high-altitude nuclear detonation — produce permanent damage and, in the case of kinetic intercepts, substantial debris that persists in the orbital environment for years to decades. Physical attacks on satellites are categorically more escalatory than electronic or cyber attacks because they are irreversible, unambiguously attributable to the attacking state, and generate consequences — debris fields, degraded orbital regimes — that affect third parties including neutral states and commercial operators. The decision to conduct a physical attack on a military satellite constitutes an act of war in any legally meaningful sense, and it is likely to be interpreted as such by the targeted state regardless of the limited scope of the intended operation (Forrest, 2017).

3.5 The Dual-Use Problem and Escalation Risk

One of the most significant complications of space warfare as infrastructure warfare is the dual-use character of space systems. Military and civilian space capabilities are intertwined to an extent that has no precise parallel in earlier forms of infrastructure warfare. The GPS constellation serves both precision munitions guidance and civilian aviation navigation. Commercial communications satellites carry both military traffic and civilian internet services. Commercial imagery satellites serve both intelligence consumers and news organizations. This dual-use entanglement means that attacks on space infrastructure with military intent will almost inevitably generate civilian effects — and that the thresholds separating acceptable military action from prohibited attacks on civilian infrastructure are genuinely difficult to locate in the orbital domain.

The dual-use problem also generates escalatory risk in a specific direction: states attacking military space capabilities may inadvertently — or deliberately, under cover of accidental attribution — damage civilian space capabilities of adversary or third-party states, generating humanitarian and legal consequences that escalate beyond the intended scope of the initial military action. The 2007 Chinese ASAT test generated debris that endangered not only American military satellites but commercial satellites, scientific satellites, and the International Space Station — none of which were plausible military targets. An adversary planning a space warfare campaign must therefore account for the near-certainty that physical attacks on military satellites will generate effects extending well beyond the targeted military capability, with consequences for international legitimacy, alliance cohesion, and escalation management that may outweigh the tactical benefits of the attack (Weeden & Samson, 2020).


4. Deterrence and Resilience in the Space Infrastructure Domain

4.1 The Challenge of Deterring Space Attacks

Deterring attacks on space infrastructure presents distinctive challenges that do not arise, or arise less acutely, in the deterrence of conventional military attacks on terrestrial targets. The fundamental challenge is attribution: many forms of space attack — electronic jamming, GPS spoofing, cyber intrusions into satellite control networks — are difficult to attribute with the confidence necessary to justify a military response. A state that jams GPS signals across a theater of operations can plausibly claim equipment malfunction, commercial interference, or the actions of a non-state actor. A state that conducts a cyber intrusion into a satellite control network can conceal its involvement behind the anonymity that cyberspace provides. The difficulty of attribution weakens deterrence by reducing the credibility of threatened responses — if a targeted state cannot confidently identify the attacker, its threatened retaliation is necessarily conditional and therefore less credible (Krepon & Thompson, 2013).

A second challenge is proportionality. The appropriate response to a reversible space attack — GPS jamming that disrupts a military operation without permanently damaging any satellite — is not obvious. A kinetic military response to electronic warfare seems disproportionate; an electronic warfare counter-response may not be possible or may not address the attack; a diplomatic protest is ineffective as deterrence. This proportionality problem creates a deterrence gap at the lower end of the space attack spectrum, where most space warfare activity currently occurs, precisely because the response options available to the targeted state are either disproportionately escalatory or insufficiently credible to deter the attacker.

4.2 Resilience as a Strategic Response

In the absence of fully effective deterrence, the primary strategic response to the vulnerability of space infrastructure is resilience: the design and deployment of space architectures that can continue to provide critical military functions despite attacks on individual components. Resilience strategies encompass several complementary approaches. Proliferation — the replacement of a small number of large, expensive satellites with large numbers of small, cheap satellites — reduces the leverage available to an adversary by ensuring that no single satellite constitutes an irreplaceable node. The degradation or destruction of one satellite in a constellation of hundreds imposes only a marginal capability reduction. The Starlink architecture, while commercial in origin, illustrates the resilience properties of highly proliferated LEO constellations: the loss of any individual satellite is operationally insignificant (Mahan, 2020).

Diversification — the maintenance of multiple, non-space-based means of performing critical functions — provides a hedge against the failure of orbital capabilities. The development of inertial navigation alternatives to GPS, of high-frequency radio backup to satellite communications, and of airborne ISR platforms as partial reconnaissance substitutes represents an institutional recognition that space-based infrastructure, however valuable, must not be the sole means of performing mission-critical functions. The historical parallel to this strategy is the pre-GPS military’s maintenance of alternative navigation methods even after GPS became available — a form of strategic redundancy that created resilience against single-point failures (Pfatteicher, 2012).

Protection — the hardening of satellites against jamming, laser dazzling, and cyber attack, combined with the development of maneuvering capability to evade co-orbital threats — addresses the vulnerability of individual satellites rather than the vulnerability of the architecture as a whole. Protection measures impose costs on adversary attack (a hardened satellite requires a more powerful or more precise attack to disable) without fundamentally altering the offense-defense balance in a domain where offense retains structural advantages of cost and surprise (Harrison et al., 2022).

4.3 International Norms and the Governance Deficit

The development of international norms governing space warfare faces a governance deficit that reflects both the youth of the space domain and the strategic interests of its most capable actors. The Outer Space Treaty of 1967 — the foundational instrument of international space law — prohibits the placement of weapons of mass destruction in orbit and prohibits national appropriation of celestial bodies, but it does not prohibit the placement of conventional weapons in orbit, the conduct of electronic warfare against satellites, or the development of direct-ascent anti-satellite missiles (United Nations, 1967). The subsequent corpus of space law — the Rescue Agreement, the Liability Convention, the Registration Convention, and the Moon Agreement — addresses the activities of space actors in peacetime but provides no specific framework for the conduct of hostilities in the space domain.

The applicability of international humanitarian law — the law of armed conflict — to space warfare is contested but increasingly accepted in principle, with the Woomera Manual on the International Law of Military Space Operations providing the most comprehensive recent effort to apply existing law to the space domain (Stephens & Steer, 2021). The application of the distinction principle — which requires parties to a conflict to distinguish between military objectives and civilian objects, and to direct attacks only against military objectives — to space warfare raises precisely the dual-use complications identified in the previous section. A satellite that serves both military communications and civilian internet connectivity is not clearly classifiable as either a military objective or a civilian object under existing frameworks, and the collateral damage calculus applicable to such targets remains deeply uncertain.

The United States, United Kingdom, and other Western states have advocated for the development of responsible behaviors in space — a norms-based approach that, rather than seeking a formal treaty prohibition on specific weapons systems, seeks to establish widely shared expectations about acceptable and unacceptable conduct in orbit (United Kingdom Ministry of Defence, 2022). Russia and China have advocated, in the Conference on Disarmament, for a treaty on the prevention of an arms race in outer space (PAROS) that would prohibit the placement of weapons in orbit — a formulation that would constrain American missile defense plans and co-orbital capabilities while leaving ground-based anti-satellite missiles (at which Russia and China are particularly capable) unaddressed (Hitchens, 2021). The gap between these approaches reflects the underlying strategic interests of the major space powers and the difficulty of negotiating arms control agreements in a domain where verification is technically demanding and definitional ambiguity is pervasive.


5. Case Studies in Space Infrastructure Targeting

5.1 The Gulf War: The First Space-Enabled Conflict

The Gulf War of 1991 is widely described as the first conflict in which space-based capabilities played a decisive operational role, and it is instructive to examine that role as an early illustration of space as military infrastructure. American and coalition forces employed GPS for land navigation in the featureless terrain of the Kuwaiti desert — enabling the famous “left hook” maneuver that flanked Iraqi defenses — and for the targeting of precision-guided munitions that appeared on global television as a new standard of military accuracy. MILSTAR and Defense Satellite Communications System (DSCS) satellites provided the backbone of joint communications across a theater of operations spanning hundreds of miles. Defense Support Program (DSP) satellites in GEO provided warning of Iraqi Scud missile launches, cueing Patriot missile batteries and civilian authorities in Israel and Saudi Arabia (Cohen et al., 1996).

Iraq possessed no counterspace capability and made no attempt to disrupt coalition space operations, which is precisely why the Gulf War illustrates the value of space infrastructure rather than the character of space warfare. The lesson that adversaries drew from observing the performance of American space-based capabilities in 1991 was unambiguous: space-based enablers were the force multiplier that made the coalition’s military superiority qualitatively decisive, and a future adversary of the United States would need either to neutralize that advantage or to accept the same kind of catastrophic operational disadvantage that Iraq experienced. The investments in counterspace capabilities made by China and Russia in the three decades following the Gulf War represent the direct strategic response to that lesson (Stokes, 1999).

5.2 Russian Electronic Warfare in Ukraine: The Contested Space Dimension

The Russian invasion of Ukraine, beginning with the seizure of Crimea in 2014 and escalating to full-scale conventional warfare in 2022, has provided extensive operational evidence of space infrastructure warfare in practice. Russian electronic warfare systems deployed in eastern Ukraine and Crimea conducted persistent GPS jamming that degraded the accuracy of Ukrainian and NATO aircraft navigating near the conflict zone, as well as commercial aviation operating in adjacent airspace. The Finnish aviation authority and other European national aviation authorities reported significant GPS anomalies affecting commercial aircraft operating near the conflict area, providing documented evidence of the broad geographic footprint of military GPS jamming (European Union Aviation Safety Agency, 2022).

At the outset of the 2022 invasion, Russian cyber actors conducted an attack on Viasat’s KA-SAT commercial communications satellite network — a satellite that provided internet connectivity to Ukrainian government and military users, among others — using a wiper malware that rendered tens of thousands of satellite modems inoperable across Ukraine and in several Western European countries simultaneously (Viasat, 2022). The attack was assessed by American, European, and Ukrainian authorities as a deliberate act of Russian information warfare designed to degrade Ukrainian communications capacity at the critical opening phase of the invasion. The effect extended beyond Ukraine to wind farms and other civilian users in France, Germany, and other European countries — an unintended or deliberately ambiguous extension of the attack’s effects into NATO member state territory.

The Ukrainian conflict has also demonstrated the strategic significance of commercial space capabilities in the resilience architecture. The rapid deployment of Starlink terminals to Ukrainian forces, facilitated by SpaceX and financially supported by United States and allied governments, provided Ukrainian military and civilian communications with a resilient LEO satellite communications alternative when terrestrial and GEO satellite communications were degraded or disrupted by Russian action. This improvised integration of commercial space capability into national defense — conducted without a formal military acquisition process and at a speed that no traditional defense procurement timeline could have matched — represents a significant development in the operational role of commercial space infrastructure (Roper, 2022).

5.3 China’s Counterspace Development: A Strategic Assessment

The People’s Liberation Army (PLA) of China has developed one of the world’s most comprehensive and rapidly advancing counterspace capabilities, reflecting an explicit strategic logic that targeting American and allied space infrastructure is a prerequisite for successful military operations against a technologically superior adversary. PLA doctrine publications from the early 2000s onward have described space as a domain in which “paralysis” of adversary command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) systems — largely dependent on space-based assets — could substitute for conventional military superiority that China cannot yet match across all domains (Stokes, 1999).

China’s direct-ascent anti-satellite capability, demonstrated against its own satellite in 2007 and subsequently tested against non-debris-generating targets at various altitudes, provides a kinetic option against LEO and potentially MEO satellites. China has developed ground-based laser systems assessed as capable of dazzling or damaging LEO satellite electro-optical sensors. Chinese cyber capabilities targeting satellite control infrastructure have been documented by American intelligence assessments. China has deployed co-orbital satellites capable of proximity operations in GEO, assessed by Western intelligence agencies as possessing potential counterspace functions in addition to their declared civil and military communications roles (Harrison et al., 2022).

The breadth and systematic character of China’s counterspace development — spanning kinetic, directed energy, electronic, and cyber attack modalities against all orbital regimes — reflects a coherent strategic concept in which space infrastructure warfare is not a peripheral concern but a central operational requirement for any future conflict with the United States. The PLA’s targeting of American space infrastructure is not opportunistic; it is doctrinal.


6. Conclusion: The Character of Space Conflict and Its Strategic Implications

Space warfare is infrastructure warfare. This conclusion, supported by the analysis of military satellite communications, global navigation systems, reconnaissance capabilities, and missile warning architectures, has three major strategic implications that policy makers, military planners, and international lawyers must incorporate into their frameworks.

First, the primary purpose of space warfare is the degradation of military effectiveness, not the destruction of human life or the seizure of territory. The satellites, ground stations, and communication links that constitute space-based military infrastructure are targeted because they enable adversary military operations across every other domain, not because they represent population centers or political symbols. This capability-targeting logic gives space warfare a character that is, in the direct sense, more limited than strategic bombardment and less immediately humanitarian in its intent than territorial conquest. Frameworks for space arms control and humanitarian law must be calibrated to this actual character rather than to templates derived from weapons systems that operate by different logic.

Second, although space warfare targets capabilities rather than populations, its effects on populations are potentially profound and substantially uncontrolled. The dual-use character of space infrastructure — the deep entanglement of military and civilian satellite services in every orbital regime — means that attacks on military space capabilities will generate civilian effects that are disproportionate to the military objectives sought and largely irreversible in the case of physical satellite destruction. The debris generated by a kinetic anti-satellite attack endangers the entire community of space users — military, commercial, and scientific — for decades. Policy frameworks that treat space warfare as a clean military contest between orbiting hardware must grapple seriously with this humanitarian externality.

Third, and most consequentially, attacks on strategic missile warning satellites occupy a unique category within the taxonomy of space infrastructure warfare — one that is categorically more destabilizing than attacks on any other class of space system because of its direct interaction with nuclear deterrence architecture. The compression of nuclear decision-making time that results from the degradation of missile warning capability increases the probability of catastrophic error in either direction — premature launch on ambiguous warning, or catastrophic force destruction before retaliation can be authorized. The preservation of missile warning satellite capabilities — by all nuclear-armed spacefaring states — should be recognized as a matter of mutual strategic interest and made the subject of explicit, formal commitments that transcend the current state of space arms control.

The grammar of space warfare is being written by the deployment decisions, doctrine publications, and operational demonstrations of the major space powers. That grammar describes a form of conflict directed at the invisible infrastructure upon which visible military power depends. Understanding it clearly — neither minimizing its consequences because its targets are hardware rather than people, nor overstating its logic as indiscriminate because its effects eventually touch civilian populations — is the prerequisite for managing it wisely. The stakes could not be higher: the same orbital infrastructure that makes space warfare possible is the infrastructure upon which the international system of commerce, communication, navigation, and strategic stability now rests. Its deliberate destruction, under any circumstances and for any military purpose, represents a harm to the entire global community of nations that extends far beyond the parties to any particular conflict.


Notes

Note 1: The term “counterspace” encompasses all capabilities designed to deny, degrade, disrupt, destroy, or deceive adversary space systems. Counterspace capabilities are conventionally categorized along two axes: the mechanism of effect (kinetic physical, non-kinetic physical, electronic, and cyber) and the target of the attack (space segment, link segment, or ground segment). This white paper focuses primarily on the strategic logic of counterspace operations rather than their technical execution.

Note 2: The Wideband Global SATCOM (WGS) system is a joint program of the United States Air Force (now Space Force) and is also shared with allied nations under bilateral agreements. Australia, Canada, Denmark, Luxembourg, the Netherlands, and New Zealand contribute funding to the WGS program in exchange for access to a specified portion of its communications capacity — an arrangement that illustrates the alliance dimensions of space infrastructure and the shared vulnerability it creates.

Note 3: The term “assured communications” is used in nuclear command-and-control doctrine to describe the requirement that nuclear commanders be able to communicate with nuclear forces under all conditions, including nuclear attack. The AEHF system was specifically designed to provide communications capability that survives nuclear attack and the associated electromagnetic pulse (EMP) environment. The vulnerability of AEHF to non-nuclear attack — jamming, cyber intrusion, co-orbital interference — is therefore not merely a military communications problem but a strategic stability problem of the first order.

Note 4: The 2007 Chinese anti-satellite test against Fengyun-1C generated approximately 3,000 trackable debris objects and an estimated 150,000 or more fragments larger than one centimeter — too small to be tracked by ground-based sensors but large enough to cause catastrophic damage to an operational satellite upon impact. As of 2023, hundreds of these trackable objects remain in orbits that intersect the operational altitudes of LEO satellites, requiring collision avoidance maneuvers by the International Space Station and commercial operators on a recurring basis.

Note 5: The Viasat KA-SAT attack of February 24, 2022, used a wiper malware designated “AcidRain” by cybersecurity researchers at SentinelOne. The malware was designed to overwrite the firmware of satellite modems, rendering them permanently inoperable without physical replacement. The attack disabled approximately 5,800 wind turbines operated by a German company that relied on KA-SAT for remote monitoring and control connectivity — an unintended consequence that illustrates the civilian infrastructure implications of satellite infrastructure attacks.

Note 6: The Outer Space Treaty does not define “weapons of mass destruction” with precision, and there is scholarly debate about whether certain directed-energy weapons — capable of disabling satellites across wide areas — might qualify under this prohibition. The treaty’s silence on conventional weapons in orbit, co-orbital attack capabilities, and ground-based anti-satellite systems represents the principal gap in the existing legal framework for space warfare.

Note 7: The concept of “reversible” versus “irreversible” space attacks is central to escalation management in the space domain. Electronic warfare and cyber attacks are generally reversible — their effects cease when the attack stops, though cyber attacks can produce persistent software damage. Physical attacks are irreversible by definition; the debris they generate persists for years to decades regardless of any subsequent political decisions. This reversibility spectrum maps roughly onto an escalation spectrum, with reversible attacks occupying the lower rungs and physical attacks the upper, but the mapping is not perfectly linear: a highly disruptive reversible attack may provoke a more escalatory response than a limited physical attack on a non-critical satellite.

Note 8: The Starlink communications system operated by SpaceX is not designed or procured as a military system, though the United States government has contracted for Starlink communications services for military applications and Ukrainian forces have used Starlink terminals under a combination of commercial, governmental, and donated access arrangements. The integration of commercial space capabilities into national defense raises significant questions about the legal status of commercial satellite operators in armed conflict — questions not addressed by the existing framework of international space law.


References

Acton, J. M. (2018). Is it a strike or a nuclear strike? Command and control entanglement and instability. Carnegie Endowment for International Peace. https://doi.org/10.2307/resrep19494

Air Force Space Command. (2019). Next generation overhead persistent infrared program overview. United States Air Force.

Bourbonnière, M., & Lee, R. J. (2007). Legality of the deployment in outer space of anti-satellite weapons. Michigan Journal of International Law, 29(1), 1–65.

Bracken, P. (2012). The second nuclear age: Strategy, danger, and the new power politics. Times Books.

Burrows, W. E. (1986). Deep black: Space espionage and national security. Random House.

Cohen, E. A., Eisenstadt, M., & Bacevich, A. J. (1996). Knives, tanks, and missiles: Israel’s security revolution. Washington Institute for Near East Policy.

Day, D. A., Logsdon, J. M., & Latell, B. (Eds.). (1998). Eye in the sky: The story of the CORONA spy satellites. Smithsonian Institution Press.

Defense Advanced Research Projects Agency. (2021). Blackjack program overview. DARPA Tactical Technology Office. https://www.darpa.mil/program/blackjack

European Union Aviation Safety Agency. (2022). GPS signal interference and spoofing: Pilot awareness notice. EASA. https://www.easa.europa.eu/en/document-library/safety-information-bulletins/sib-2022-02r1

Forden, G. (2001). Reducing a common danger: Improving Russia’s early-warning system. CATO Institute Policy Analysis No. 399. https://www.cato.org/policy-analysis/reducing-common-danger-improving-russias-early-warning-system

Forrest, B. (2017). Space law and the law of armed conflict: Whither the lex specialis? International Humanitarian Law Journal, 8(2), 45–78.

Giles, K. (2016). Russia’s ‘new’ tools for confronting the West: Continuity and innovation in Moscow’s exercise of power. Chatham House. https://www.chathamhouse.org/sites/default/files/publications/research/2016-03-21-russias-new-tools-giles.pdf

Goward, D. (2019). Mass GPS spoofing attack in the Black Sea. Maritime Executive. https://maritime-executive.com/editorials/mass-gps-spoofing-attack-in-black-sea

Grimsley, M. (1995). The hard hand of war: Union military policy toward Southern civilians, 1861–1865. Cambridge University Press.

Harrison, T., Johnson, K., Roberts, T. G., Way, B., & Young, M. (2022). Space threat assessment 2022. Center for Strategic and International Studies. https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/220404_Harrison_SpaceThreatAssessment2022.pdf

Hitchens, T. (2021). Space arms control: Reenergizing the dialogue. Arms Control Today, 51(3), 6–13.

Humphreys, T. E. (2017). The GPS dot problem and what to do about it. In Proceedings of the Institute of Navigation GNSS+ 2017. Institute of Navigation.

Johnson, R. (2018). Dragoon riding: Reconnaissance and intelligence in the American military, 1965–2016. University Press of Kansas.

Kaplan, E. D., & Hegarty, C. J. (Eds.). (2006). Understanding GPS: Principles and applications (2nd ed.). Artech House.

Krepon, M., & Thompson, J. (Eds.). (2013). Anti-satellite weapons, deterrence, and Sino-American space relations. Stimson Center. https://www.stimson.org/wp-content/files/file-attachments/ASAT_web_0.pdf

Libicki, M. C. (2009). Cyberdeterrence and cyberwar. RAND Corporation. https://doi.org/10.7249/MG877AF

Mahan, A. T. (1890). The influence of sea power upon history, 1660–1783. Little, Brown and Company.

Mahan, L. (2020). Resilient space architectures: Proliferated LEO constellations and strategic competition. Mitchell Institute for Aerospace Studies.

Moltz, J. C. (2019). The politics of space security: Strategic restraint and the pursuit of national interests (3rd ed.). Stanford University Press.

Overy, R. (1995). Why the Allies won. W. W. Norton.

Pfatteicher, S. (2012). Navigating without GPS: Alternatives and implications for military operations. Joint Forces Quarterly, 67, 22–29.

Podvig, P. (Ed.). (2013). Russian strategic nuclear forces. MIT Press.

Richelson, J. T. (2001). The wizards of Langley: Inside the CIA’s Directorate of Science and Technology. Westview Press.

Roper, W. (2022). Commercial space and national security: Lessons from Ukraine. Atlantic Council. https://www.atlanticcouncil.org/in-depth-research-reports/report/commercial-space-and-national-security

Schmitt, M. N. (Ed.). (2017). Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press. https://doi.org/10.1017/9781316822524

Secure World Foundation. (2021). Global counterspace capabilities: An open source assessment. https://swfound.org/counterspace/

Sheldon, J. B. (2008). The militarization and weaponization of outer space: Strategic implications for the United States. Astropolitics, 6(2), 99–130. https://doi.org/10.1080/14777620802218750

Shukla, S., & Bhatt, K. (2000). Global Positioning System: Theory and practice. Springer.

Stephens, D., & Steer, C. (Eds.). (2021). Woomera Manual on the International Law of Military Space Operations. Oxford University Press.

Stokes, M. A. (1999). China’s strategic modernization: Implications for the United States. Strategic Studies Institute, United States Army War College.

United Kingdom Ministry of Defence. (2022). Defence space strategy: Operationalising the space domain. Her Majesty’s Stationery Office. https://www.gov.uk/government/publications/defence-space-strategy-operationalising-the-space-domain

United Nations. (1967). Treaty on principles governing the activities of states in the exploration and use of outer space, including the moon and other celestial bodies (Treaty Doc. 90-39, 18 UST 2410, TIAS 6347, 610 UNTS 205). United Nations Treaty Collection. https://www.unoosa.org/oosa/en/ourwork/spacelaw/treaties/introouterspacetreaty.html

Viasat. (2022, March 30). KA-SAT network cyber attack overview. Viasat. https://www.viasat.com/about/newsroom/blog/ka-sat-network-cyber-attack-overview/

Warden, J. A. (1995). The enemy as a system. Airpower Journal, 9(1), 40–55.

Weeden, B. (2010). 2007 Chinese anti-satellite test fact sheet. Secure World Foundation. https://swfound.org/media/9550/chinese_asat_fact_sheet_updated_2012.pdf

Weeden, B., & Samson, V. (Eds.). (2020). Global counterspace capabilities: An open source assessment. Secure World Foundation. https://swfound.org/counterspace/

Unknown's avatar

About nathanalbright

I'm a person with diverse interests who loves to read. If you want to know something about me, just ask.
This entry was posted in International Relations, Musings and tagged , , , . Bookmark the permalink.

Leave a Reply