Space Threat Assessment 2025

Clayton Swope, et al. | 2025.04.25
The 2025 Space Threat Assessment covers the growing counterspace capabilities of China, Russia, Iran, North Korea, and others. It also features analysis on GPS jamming and spoofing, satellite rendezvous and proximity operations, unintentional debris creation, and other counterspace topics.
INTRODUCTION
Welcome to the 2025 Space Threat Assessment by the Aerospace Security Project at the Center for Strategic and International Studies (CSIS). This resource for policymakers and the public leverages open-source information to assess key developments in foreign counterspace weapons. Drawing on eight years of collected data and analyses, this series describes trends in the development, testing, and use of counterspace weapons and enables readers to develop a deeper understanding of threats to U.S. national security interests in space.
Since the publication of the 2024 Space Threat Assessment, there have been few headline-grabbing counterspace developments. No nation was known to have tested or used kinetic anti-satellite missiles, commonly called direct ascent anti-satellite (DA ASAT) weapons. There was no public indication that any nation tested or used counterspace weapons such as laser dazzlers or directed energy weapons. While Russia’s pursuit of a nuclear anti-satellite capability topped the news last year, no information has publicly surfaced revealing how close Russia might be to launching this system, though the United States and its international partners remain concerned that Russia could decide to deploy such a weapon.
But a closer look reveals that the past year, from the perspective of counterspace developments, has been anything but uneventful. Rather than entirely new developments, the past year mostly witnessed a continuation of the worrisome trends discussed in prior reports, notably widespread jamming and spoofing of GPS signals in and around conflict zones, including near and in Russia and throughout the Middle East. Chinese and Russian satellites in both low Earth orbit (LEO) and geostationary Earth orbit (GEO) continue to display more and more advanced maneuvering capabilities, demonstrating operator proficiency and tactics, techniques, and procedures that can be used for space warfighting and alarming U.S. and allied officials. Finally, U.S. companies providing a commercial space service to government users, particularly defense and military ones, remain squarely in the crosshairs of nation states, with Russia in particular vocal about its intention to consider commercial assets used by the U.S. military as legitimate targets.
This past year also saw the growth of commercial and military dual-use technologies that could be modified to serve a counterspace purpose. Companies working on in-space servicing and debris removal reached important milestones, demonstrating their ability to conduct rendezvous, proximity, and docking operations, techniques that could be used by anti-satellite weapons. The behaviors of commercial satellites pursuing in-space servicing, inspection, debris removal, and other business use cases could easily be confused for counterspace operations, creating risks of misunderstandings and possibly unintended escalations in a crisis.
Though this report has not historically covered U.S. counterspace capabilities, it would be difficult to assess the global counterspace landscape without noting the evolving U.S. posture toward counterspace weapons and operations. In response to China’s rapid buildup of military space capabilities in all orbital regimes, U.S. Space Force senior leaders have repeatedly emphasized over the last year that the United States is prepared to conduct offensive and defensive space operations and intends to field more counterspace capabilities. This report also does not typically address unintentional debris creation in orbit, but this year the assessment includes a discussion on the latent risks to space operations posed by accidental debris-causing events.
Finally, a common thread throughout this year’s report is how space fits into the future of warfare. The normalization of space as a military operational domain and its integral role in joint operations mean that space is fair game during conflict. Warfighting will happen in, through, and from space, meaning that a future peer-on-peer conflict may very well bring disruption and destruction to space on the same scale that it would bring to other places closer to Earth. Counterspace threats should be viewed within the broader context of efforts by adversaries to degrade the ability of the United States and its allies to fight and win a war and disrupt the economy and day-to-day life on Earth, not merely as efforts to degrade a space capability. Overall, space is likely becoming a more dangerous place and woven ever more into both peacetime and wartime activities.
COUNTERSPACE WEAPONS
This chapter provides an overview of different types of counterspace weapons and a useful taxonomy to classify and differentiate them. Counterspace weapons vary significantly in the technical methods they use to create effects against space systems, in how they are deployed, and in the level of technology and resources needed for their development and fielding. For the purposes of this report, counterspace weapons are organized into four main categories: kinetic, non-kinetic, and electronic weapons and cyber operations.
Kinetic weapons are defined here as those using physical, material means such as bombs, bullets, missiles, and other munitions. All kinetic weapons are considered as meant to destroy or damage. This category includes weapons that target spacecraft, such as DA ASAT missiles outfitted with conventional warheads, and projectile attacks launched from one on-orbit satellite to another. It also includes weapons that target terrestrial space infrastructure, such as ground stations, launch sites, rocket and satellite factories, and space monitoring infrastructure. Orbital grappling satellites are another form of kinetic weapon. Such a grappler physically handles a target spacecraft to do it harm or attaches itself to a spacecraft and maneuvers it to another location.
Non-kinetic weapons are defined as those that use radiated energy to destroy, damage, or interfere with space systems. This energy can be directed, such as with laser or microwave energy, or distributed through nuclear detonations or electromagnetic pulse (EMP) events. High-powered lasers and dazzlers and high-powered microwave ASAT systems are included in this category.
▲ Table 1: COUNTERSPACE WEAPONS OF CHINA, RUSSIA, IRAN, AND NORTH KOREA AS OF MARCH 2025
Dazzlers are intended to temporarily blind an optical satellite, although they may also unintentionally damage targeted satellites. Nuclear detonations in the upper atmosphere or space are included in this category because these attacks primarily damage electronics through the resulting EMP and lingering radiation that gets trapped by Earth’s magnetic field. Other nonnuclear weapons that create EMP events in space would also be included in this category.
Electronic weapons use the electromagnetic spectrum to deny or interfere with a target’s ability to use space services and capabilities. These weapons cannot destroy; they only impart temporary effects for as long as the electronic system engages its target. This category includes jamming and spoofing of global navigation satellite system (GNSS) and satellite communications (SATCOM) signals. Spoofing, sometimes also called signal hijacking, is a form of electronic attack where an attacker tricks a receiver into believing a fake signal produced by the attacker is the real signal it is trying to receive. Also included in this category are any electronic attacks to jam space-based radar and the reception of radio frequency (RF) signals by the user of a satellite service on Earth, the satellite itself, or the ground station of a space system.
The final category, cyber operations, includes any offensive activity in cyberspace that targets space systems, including ground infrastructure, satellite terminals, spaceports, and spacecraft. Cyber operations can destroy or permanently disable a targeted system, although they can also be used to temporarily disrupt it or to conduct espionage, including gaining access to proprietary or sensitive technical information on a target network. A network exploitation can be a beachhead for any of these purposes, as a cyber operation’s intent is often ambiguous.
Many of these counterspace capabilities depend on robust space situational awareness (SSA) and intelligence information from both terrestrial and space-based platforms to target space systems and verify attack success. In order to attack a satellite on-orbit, an aggressor would need to know its precise location and where it is moving. The aggressor will also want accurate battle damage assessments. For example, if a satellite is targeted through a cyberattack that allows the attacker to disable its controls, SSA or intelligence insights will be necessary to determine if the attack was successful by monitoring the satellite’s movements and network activity. Although this report tracks counterspace weapons trends, it is important to acknowledge the critical data needed to develop and employ many of these weapons against their targets.
▲ Table 2: TYPES OF COUNTERSPACE WEAPONS
CHINA
Beijing’s actions over the last year point to an ever-increasing emphasis by the People’s Republic of China (PRC) on the military use of space. Since the publication of the last threat report, continuing past trends, China demonstrated dual-use, highly maneuverable satellites in orbit and the tendency to maneuver and use fuel seemingly without regret. These activities point to growing operator proficiency and maturing space tactics, techniques, and procedures. Beijing also reorganized its armed forces, creating a specific force oriented around space operations. Though China has continued its aggressive cyber operations, few seem to specifically target space systems. Additionally, PRC officials and academics are more willing to publicly criticize U.S. behaviors in space, pointing to examples of where they claim the United States engages in the same space activities for which it criticizes China.
Over the last year, the most concerning development to U.S. observers should be the launch and operation of increasingly advanced Chinese satellites. China continues to launch and operate highly maneuverable satellites, demonstrating an advanced level of technological and operational acumen that, if not already deployed for such purposes, could enable a formidable on-orbit counterspace arsenal. Through the use of these satellites, Chinese operators are gaining experience in developing tactics and procedures that can be used for space warfighting, to include both defensive and offensive advanced space operations. Additionally, China is dramatically increasing its space launch capability, with several commercial providers coming online in the next few years. Each year, the PRC is launching more and more satellites, making characterization of those satellites more challenging year after year.
CHINA CONTINUES TO LAUNCH AND OPERATE HIGHLY MANEUVERABLE SATELLITES, [WHICH] COULD ENABLE A FORMIDABLE ON-ORBIT COUNTERSPACE ARSENAL.
▲ Table 3: CHINESE SATELLITE SERIES THAT OFTEN EXHIBIT RPOS
Continuing trends described in prior editions of Space Threat Assessment, U.S. experts and military officials expressed concerns in December 2024 about unusual and potentially threatening behaviors of Chinese satellites in GEO. According to an expert at ExoAnalytic, these behaviors demonstrate China’s proficiency in conducting sophisticated satellite maneuvering and willingness to expend fuel to conduct rapid maneuvers. To emphasize these points, the expert also noted that the Chinese satellite TJS-2 was tracked during the last year maneuvering at 44 meters per second, which is unusually high and uses significantly more fuel than the more standard range of 0.5–1 meters per second for repositioning satellites in GEO. The expert further described how another satellite, TJS-4, maneuvered to position itself between a U.S. space surveillance satellite and the Sun, creating a disadvantageous geometry for imaging the Chinese satellite.
The following three Chinese satellite programs usually feature prominently in each edition of Space Threat Assessment, and this year is no exception. There is often little public information about these spacecraft capabilities or specific missions, outside of official Chinese government statements, which are almost certainly designed to conceal the true purposes of military satellites. Most public information about the activities of Chinese satellites in GEO, documenting the sophistication and frequency of Chinese satellite maneuvers, was provided by SSA companies sharing their observations on social media platforms. Integrity ISR, a space and intelligence, surveillance, and reconnaissance (ISR) training company, and LSAS Tec, a company providing support services for space operations, released a video on YouTube documenting several TJS-10 maneuvers in May 2024 that eventually brought the satellite to within 25 kilometers (km) of another Chinese satellite in GEO, TJS-3, on May 16, 2024.
In January 2025, China launched SJ-25, which official sources claim will be used for testing satellite fuel replenishment and life extension service technologies. After launch, according to analysis from COMSPOC and Integrity ISR, SJ-25 entered a coplanar orbit with SJ-21, a satellite which in 2022 attached to and moved a defunct Beidou satellite from its position in GEO to a graveyard orbit, suggesting SJ-25 may intend to refuel SJ-21. Additionally, in January 2025, suspected Chinese GEO inspector satellite TJS-3 moved to within one degree latitude of SJ-21, possibly suggesting a supporting role for TJS-3 in an upcoming refueling attempt.
On two occasions in the last year, Integrity ISR published an analysis on the behaviors of SY-12-01 and SY-12-02, a pair of satellites launched in December 2021 whose purpose is described by Chinese media as “spatial environment exploration and related technical tests.” At the time of publication for last year’s Space Threat Assessment, these satellites had been drifting in opposite directions across the entire GEO belt. They continued to drift this year. According to the Integrity ISR assessments, in November 2024, SY-12-02 reached its turnaround point of 17.3 degrees east (over central Europe) and began a new eastward journey. In September 2024, SY-12-01 reached its turnaround point of 178.9 degrees east (over the Pacific Ocean) and began a new westward journey.
In addition to its progress in GEO, over the last year China has demonstrated the ability to execute increasingly complicated spacecraft maneuvering in LEO. In May 2024, the Shenlong space plane released, maneuvered with, and possibly captured an object before returning to Earth in September 2024, after having been in orbit for over 260 days, according to analysis by Slingshot Aerospace. The space plane had previously released six other space objects soon after it launched in December 2023. In January 2024, three satellites believed to be technology demonstrators—SY-24C-01, SY-24C-02, and SY-24C-03—conducted corkscrew maneuvers around SJ-6-05B, believed to be another technology demonstrator with potential signals collection capability, as described in an analysis by Integrity ISR. Additionally, in March and April 2024, SY-24C-03 and SJ-6-05A conducted rendezvous and proximity operations (RPO), with each satellite maneuvering and the closest approach distance less than 1 km—essentially face-to-face for satellites traveling at around 17,000 mph—on April 22, 2024, according to analysis by s2a solutions, a Swiss company. In March 2025, a senior Space Force official characterized these behaviors as “dogfighting” in space.
While continuing to advance its abilities to conduct sophisticated maneuvering in both LEO and GEO, according to a study released by the China Aerospace Studies Institute (CASI) in September 2024, China is also monitoring and assessing U.S. space-based SSA capabilities and is more willing to publicize the results of its assessments. The CASI report details the increasing number of Chinese academic publications that analyze the patterns of life of U.S. Geosynchronous Space Situational Awareness Program (GSSAP) satellites, including publicly naming the satellites most visited by GSSAP. China likely obtains data on close approaches from its own sensors, the Russian-led International Scientific Optical Network (ISON), and publicly available information from U.S. and European SSA databases. The PRC’s SSA capabilities rely on domestic ground-based infrastructure, foreign datasets, and at least 10 spacecraft.
From an operational standpoint, China’s attention to the patterns of life of U.S. spacecraft has likely influenced how Chinese satellites respond when approached by suspected U.S. space surveillance satellites. Notable examples of such behavior in GEO include how SY-12-01 and SY-12-02 responded to the approach of USA 270 in late 2023 and TJS-4 behaviors described by ExoAnalytic and noted earlier in this section. Integrity ISR and LSAS Tec published information about maneuvers over several months in late 2024 by LDPE-3A, a U.S. satellite characterized as a “freight train” for experiments to GEO, that placed it about 25 km from and with favorable lighting conditions for viewing Chinese satellite SJ-23, which in this case did not maneuver in response. China is likely increasingly willing to publicly discuss observed GSSAP behaviors to influence international opinions, probably aiming to portray the United States as having a double standard—engaging in the same activities for which it criticizes China as being unsafe and unprofessional.
There is little public information on new Chinese cyber or electronic warfare activities since the last Space Threat Assessment. During the last year, experts expressed concerns about the impacts of Chinese-attributed Salt Typhoon cyber operations on space infrastructure. More detailed information was officially released on another PRC state-sponsored cyber group targeting satellite services and other sectors, Volt Typhoon, including descriptions of the actor’s techniques and recommended remedies. Additionally, public threat reporting from September 2024 indicated that an unknown cyber threat actor tied to Chinese-speaking groups has focused on supply chains for defense-related industries, with a particular focus on drone manufacturers, in Taiwan. It would be reasonable to assume these Chinese-speaking groups were affiliated in some way with China. It has been mostly quiet on the electronic warfare front, as there were only sporadic reports of Chinese jamming or spoofing of GPS or other satellite signals over the last year. Though there is not much cyber or jamming news this past year, based on findings presented in prior editions of Space Threat Assessment, China undoubtedly maintains advanced cyber and electronic warfare capabilities that can affect space systems.
CHINA IS LIKELY INCREASINGLY WILLING TO PUBLICLY DISCUSS OBSERVED GSSAP BEHAVIORS TO INFLUENCE INTERNATIONAL OPINIONS.
A reorganization of China’s armed forces during the last year points to a focus on warfighting in space, as well as in cyberspace and the information operations domain, that cuts across and supports the service branches. Specifically, in April 2024, China announced the reorganization of the People’s Liberation Army (PLA) into four services—the PLA Ground Force, Navy, Air Force, and Rocket Force—and four cross-cutting arms—the PLA Aerospace Force, Cyberspace Force, Information Support Force, and Joint Logistics Support Force. Though the Joint Logistics Support Force has existed since 2016, the Aerospace Force, Cyberspace Force, and Information Support Force are new organizations, created by dividing up the responsibilities of the now defunct Strategic Support Force, which had previously handled space-based intelligence, reconnaissance, electronic countermeasures, signals intelligence, information warfare, and communications. The Aerospace Force is responsible for managing all PLA space-based capabilities, including counterspace weapons, and PLA space launch facilities.
Throughout the last year, Chinese scientists published several research papers on military technologies, including high-powered microwave and laser technologies, that—though not described as counterspace weapons in the papers—could be applied to counterspace weapons developments. However, there is no new publicly available information on specific military programs aimed at developing or testing these technologies. As noted in Space Threat Assessment 2024, the PRC has already fielded ground-based laser weapons capable of blinding or damaging satellites and conducted research on mobile high-powered microwave weapons for general military applications. China also maintains the same wide range of both fixed and mobile electronic warfare systems that can interfere with satellite communications links, GNSS signals, and synthetic aperture radar (SAR) intelligence-gathering satellites, as described in the 2024 report.
Over the past year, it has also become clear that Beijing assesses a military threat posed by LEO systems like Starlink. Researchers at East China Normal University and the PLA-affiliated National University of Defense Technology have written about the military and strategic implications of Starlink satellites, arguing that SpaceX’s relationship with the U.S. government may have lasting security implications. Three articles, published in Chinese journals focused on intelligence and international security studies, outline concerns of broad deployment of Starlink satellites by the United States and Starlink’s ability to transmit data that may be used for new combat styles, citing the impact Starlink had on the battlefield in Ukraine. Importantly, these assessments overstate the capabilities of Starlink and assume the satellites have been integrated into U.S. Department of Defense (DOD) architectures and intelligence missions. Further, as one U.S. scholar observes, a “clear PRC concern that emerges from these articles is that China’s counterspace capabilities will be less effective against a U.S. satellite constellation composed of a mix of proliferated constellations.”
In early 2025 it was reported that Chinese scientists have run artificial intelligence-created simulations of targeted attacks on Starlink satellites to disrupt services. A Nanjing University of Aeronautics and Astronautics team published a study that alleges 99 Chinese satellites could disrupt 1,400 Starlink satellites within a 12-hour period, targeting not individual satellites, but large sections of the Starlink constellation. Inspired by how whales hunt in teams and direct large swaths of fish into their mouths in open water, the study describes Chinese satellites “hunting” Starlink satellites by using directed-energy weapons, such as lasers and microwaves. Notably, Nanjing University has been called one of the “seven sons” of China’s national defense, founded by the Chinese Ministry of National Defense and sanctioned by the United States and Taiwan for its involvement in developing military technologies.
RUSSIA
Throughout the past year, Russia has engaged in several provocative counterspace activities, in addition to allegedly working on a nuclear space-based anti-satellite weapon, according to revelations that first surfaced in February 2024. In May 2024, the United States accused Russia of launching a counterspace weapon, assessing it had “characteristics resembling previously deployed counterspace payloads” in 2019 and 2022. Not long after launch, the Russian satellite, designated Cosmos 2576, proceeded to enter into a coplanar orbit with a U.S. government satellite, USA 314, maneuvers the U.S. government justifiably viewed with concern, as such actions could signal the positioning of a counterspace weapon.
As of late February 2025, Cosmos 2576 was no longer operating in a synchronized orbit with USA 314, having begun maneuvers to raise its orbit in mid-February 2025, possibly coinciding with the thaw in U.S.-Russian relations. In February 2025, Russia launched Cosmos 2581, Cosmos 2582, and Cosmos 2583, acknowledged by Moscow as belonging to the Ministry of Defense, but little else is publicly known about their mission. Since then, Cosmos 2581 and Cosmos 2582 have moved in formation, coming as close as 100 meters apart on March 5, 2025—by any measure, a very close approach for two satellites. Though Cosmos 2583 has yet to maneuver since reaching orbit, it did pass as close as 0.5 km to Cosmos 2581 and Cosmos 2582 on March 7, 2025. Additionally, as it has done since its launch in August 2022, Cosmos 2558—a satellite that the U.S. Space Force asserts is also a counterspace weapon—remained in a coplanar orbit with USA 326.
AS OF LATE FEBRUARY 2025, COSMOS 2576 WAS NO LONGER OPERATING IN A SYNCHRONIZED ORBIT WITH USA 314.
Meanwhile, Russia’s Luch (Olymp) satellites have continued to prowl the GEO belt. Since the publication of the last Space Threat Assessment, Luch (Olymp) 2 has spent time near Eutelsat Konnect, RASCOM-QAF 1, Astra 4A (originally Sirius 4), Thor 7, SES 5, Intelsat 3-F7, Thor 6, and Intelsat 10-02, according to data from Slingshot Aerospace. These satellites provide communications and broadcast services to a wide range of areas, including Africa, Europe, the Middle East, and South America. Some analysts assess that Luch (Olymp) 2 may have come as close as 5 km to Thor 7 in July 2024 and less than 1 km from Intelsat 10-02 in January 2025. Believed to be a signals collection satellite, it is not surprising that Luch (Olymp) 2 loitered near satellites providing data and broadcast services over Europe, consistent with past Luch behavior. Prior to the arrival of Luch (Olymp) 2 near Astra 4A in March 2024 (providing internet services across Europe), Astra 4A signals were jammed—likely by ground-based Russian jammers—interfering with Ukrainian broadcasts. Though unlikely mere coincidence, the specific relationship between the two events is not clear. Since 2023, Luch (Olymp) 1 had been parked near Intelsat 37e at 342 degrees East latitude, though in March 2025 it moved slightly lower than the geostationary belt, starting an eastward drift of about half a degree per day.
Though revelations that Moscow is developing a space-based nuclear anti-satellite weapon were covered in last year’s assessment, this issue continued to develop throughout last year and remained a significant counterspace headline in 2024. Not long after the first reports surfaced in February 2024, U.S. officials publicly addressed their concerns that Russia was developing a “troubling” anti-satellite counterspace weapon with alleged nuclear capabilities. A breach of the 1967 Outer Space Treaty (OST), which prohibits signatory nations from stationing nuclear weapons in space, such a weapon would disable or destroy hundreds—if not thousands—of satellites in LEO through radiation effects or the resulting EMP. The United States not only publicly condemned the development of this new weapon but also sought to apply international pressure through the United Nations. To date, Russian officials continue to deny accusations that Russia is even pursuing such a weapon.
On March 14, 2024, the United States and Japan introduced a draft resolution to reaffirm states’ obligations under Article IV of the OST, calling on nations not to develop nuclear weapons specifically designed to be placed in orbit around the Earth. The draft resolution underwent a series of negotiations and redrafts leading to a vote on April 24, 2024. While 65 member states cosponsored the draft resolution, Russia cast a veto, and the draft resolution failed to be adopted. China abstained from the vote. The United States and Japan released a joint statement expressing their disappointment and continued commitment to ensuring countries cannot deploy nuclear weapons in space. Soon after, Russia and China circulated their own resolution calling on broad international prohibitions on space weapons. As it has done when Russia and China raised such language in the past, the United States opposed this resolution, previously calling the Russian and Chinese proposal fundamentally flawed and noting that it lacks a verification mechanism and does not address ground-based ASAT weapons.
Piecing together statements from U.S. officials and other publicly available sources, it appears that Russia has not yet launched an anti-satellite weapon with a nuclear payload. However, it was disclosed that Moscow’s efforts have been years in the making, with a senior U.S. official shedding light on the intended orbital regime for such a counterspace weapon and connecting a “scientific” satellite currently in-orbit “in a region not used by any other spacecraft . . . of higher radiation than normal lower-Earth orbits” to the effort. Satellite trackers deduced that the satellite is likely Cosmos-2553, a satellite launched in February 2022 into a 2,000 km orbit that the Russian ministry of defense stated was a “technological spacecraft . . . equipped with newly developed onboard instruments and systems for testing them under the influence of radiation and heavy charged particles.”
While reports claim this satellite carries a “dummy warhead,” U.S. officials stress that, should a nuclear weapon be detonated at a 2,000 km altitude, the effects would be “indiscriminate” and render LEO unusable “for some period of time,” perhaps a year. The only other satellites in orbits near Cosmos-2553 are one nonoperational Russian satellite and 10 nonoperational U.S. satellites. According to one expert, if the satellite is testing new technologies, it may have been placed in such a remote orbit because there would be less risk of affecting other satellites and it would be difficult to monitor. Based upon persistent radar monitoring by LeoLabs of Cosmos-2553, there is high confidence it has been tumbling since mid-November 2024. This observation strongly suggests the satellite is no longer operational.
In addition to its counterspace efforts in space, Russia engages in jamming and spoofing GPS signals on Earth. Russian efforts to interfere with GPS signals stretch from the Baltic and Nordic nations, through Ukraine and Russia itself, to countries in the Black Sea region. Though efforts to jam and spoof GPS in Ukraine, including around Crimea in the Black Sea, have been ongoing since the start of the war, those efforts mushroomed to include many other regions in mid-2024.
▲ Figure 1: TIMELINE OF RUSSIAN NUCLEAR ASAT THREAT AND RESULTING DEVELOPMENTS
RUSSIAN EFFORTS TO INTERFERE WITH GPS SIGNALS STRETCH FROM THE BALTIC AND NORDIC NATIONS . . . TO COUNTRIES IN THE BLACK SEA REGION.
GPS interference in the Nordic and Baltic regions is not new. For example, in the fall of 2018, Norway accused the Russian military of jamming GPS signals in the Kola Peninsula during NATO’s largest military exercise since the Cold War. However, the past two years have seen a surge in reports of GPS interference in these regions, as noted by the Finnish transport and communications agency Traficom, which saw roughly 2,000 reports filed in 2024 compared to 239 reports in 2023. While it is difficult to point to a clear explanation for Russia’s interest in jamming and spoofing GPS signals across these regions, the growth of GPS interference in Russia itself is a response to Ukrainian attacks on Russia using GPS-guided drones and missiles as point defense.
Russia has also tried to interfere with Ukrainian television broadcasts from satellites, including attempting to jam signals from one of the Amos satellites in August 2024. Additionally, television signal jamming and hijacking affected Ukrainian broadcasts on Eutelsat’s Hotbird in March and April 2024. In response to increased jamming over the last year, a number of European countries lodged complaints with the International Telecommunication Union in June 2024, which then condemned Russian interference with GPS and television signals. Russia has on at least one occasion during the last year employed electronic warfare activities outside of Ukraine that affected more than GPS and television signals. In March 2024, when flying near Kaliningrad, a UK military aircraft returning a senior official to the United Kingdom from a visit to Poland experienced GPS and communications interference for about 30 minutes. It remains unclear whether the official’s flight was the specific target of the jamming attack, with UK officials publicly noting that it is not uncommon for aircraft to experience GPS interference near Kaliningrad. Russia also continues to pursue capabilities designed to defeat Starlink, having announced in December 2024 the development of a new monitoring system called Kalinka that can identify and locate Starlink terminals.
As it has done in prior years, Russia threatened the private sector for supporting the U.S. national security mission in space. In March 2024, a spokesperson for Russia’s Ministry of Foreign Affairs said that Russia is “aware of Washington’s efforts to attract the private sector to serve its military space ambitions,” and that such systems “become a legitimate target for retaliatory measures, including military ones.” Russia also complained during the UN General Assembly in October 2024 that the United States and its allies use civilian and commercial space infrastructure for military purposes, arguing that such activities jeopardize the peaceful use of space.
OTHERS
IRAN
Since the beginning of last year, Iran has continued to increase its proficiency in space launch, successfully launching satellites in January 2024, September 2024, and December 2024 from Iranian launch sites. The December 2024 launch placed three satellites into orbit. Iran claimed one of those three satellites was a space tug, called Saman-1, that could reposition other satellites in orbit, a capability with obvious counterspace uses. In November 2024, Russia launched two Iranian remote sensing satellites, called Kowsar and Hodhod, which Iran claims are the first two satellites operated by its private sector. Russia has launched other Iranian satellites before, including Iran’s first satellite, Khayyam, in August 2022.
Iran has pursued cyberattacks against aerospace and satellite infrastructure, among other targets, over the last year. Microsoft and Palo Alto Networks published reports in March and August 2024, respectively, that provided more details on the Peach Sandstorm incidents. Both reports assessed that this cyber campaign was directed by the Iranian Islamic Revolutionary Guard Corps as part of ongoing efforts to gather intelligence and conduct social engineering attacks. According to Microsoft, this same Iranian cyber threat actor has conducted prior attacks targeting the aerospace, construction, defense, education, energy, financial services, healthcare, government, satellite, and communications sectors in multiple countries. In February 2024, Mandiant reported on malicious cyber activity, aimed at espionage, linked to Iran’s Islamic Revolutionary Guard Corps that targeted the aerospace and defense sectors in the Middle East and possibly Turkey, India, and Albania.
NORTH KOREA
North Korea’s only space launch attempt in 2024 ended in failure when a rocket carrying the country’s second reconnaissance satellite exploded after liftoff in May 2024. North Korea continues to operate its Mallygyong-1 satellite, which was launched in November 2023, and executed maneuvers to raise the satellite’s altitude in February and June 2024. It was reported that North Korea successfully tested a new ballistic missile in October 2024 and new intermediate-range hypersonic missile in January 2025, which followed a prior test in April 2024. Though none of these developments specifically relate to counterspace weapons, they demonstrate increasing North Korean proficiency with space, missile, and rocket technologies.
During the past year, South Korea repeatedly raised concerns about North Korean efforts to jam GPS signals around the Korean Peninsula and near the border between North and South Korea. Without providing more specific information, in January 2025, then–U.S. Secretary of State Antony Blinken warned that Russia was close to sharing “advanced space and satellite technology” with North Korea.
In July 2024, the FBI and other partners issued a joint cybersecurity advisory warning of North Korean cyber espionage activities targeting defense, aerospace, nuclear, and engineering entities around the globe with the goal of advancing North Korea’s military and nuclear capabilities. Mandiant identified a cyber threat group in June 2024 with probable ties to North Korea that conducted phishing attacks pretending to be from an energy company and aerospace industry entity while targeting other entities in those sectors.
INDIA
In January 2025, the Indian Space Research Organisation’s Space Docking Experiment (SpaDeX) mission successfully demonstrated India’s ability to conduct rendezvous and proximity operations and docking activities. Though not publicly associated with a military program, such capabilities have clear counterspace uses. As of December 2024, India may be in talks with Russia to acquire a ballistic missile early warning and space surveillance radar with a 6,000-km range for placement in southern India. Such a system may be intended for monitoring missile launches from Pakistan, though it could also play a role in monitoring satellites and space objects.
ISRAEL
Though Israel has not featured prominently in past editions of Space Threat Assessment, it is hard to ignore this year due to its efforts to interfere with GPS in the eastern part of the Mediterranean Sea, Syria, Lebanon, parts of Egypt, and Israel itself. No doubt aiming to protect itself from missile and drone threats launched by Iran, Hamas, Hezbollah, and the Houthis, Israel conducted markedly more widespread, persistent GPS jamming and spoofing, specifically around April 2024, when it was expecting Iranian retaliation to an Israeli strike in Syria that killed two senior Iranian officials.
Israel continues to develop and refine directed-energy weapons, such as Iron Beam, for use in missile defense. While it does not appear that Israel intends to use these weapons for a counterspace purpose, Israel effectively maintains a latent anti-satellite capability, particularly when paired with its satellite detection and tracking knowledge. Israel likely conducted an exoatmospheric missile intercept in November 2024 when it shot down a Houthi ballistic missile.
EUROPE
Only two countries in Europe made counterspace news over the last year—France and Germany—with both countries publicly describing new counterspace initiatives. These would involve deploying satellites capable of performing inspection and space domain awareness (SDA) missions, as well as roles protecting other satellites from attack, possibly using lasers or other non-kinetic weapons. The new French program, called Toutatis, would include two LEO satellites: Lisa-1, performing an SDA mission, and Splinter LEO, a highly maneuverable satellite capable of tracking hostile satellites and potentially positioning itself between a hostile satellite and the target satellite. Germany plans to launch the German Inspector Satellite for Multiple Operations. The satellite, publicly revealed in 2024, would be equipped with robotic arms and be capable of inspecting other satellites.
FEATURED ANALYSIS
GPS JAMMING AND SPOOFING
Last year’s space threat assessment noted that GPS jamming and spoofing were becoming ubiquitous across parts of the world, particularly in areas of active military conflict. This past year saw a continuation and growth of that same trend. Many regions of the world, from the Arctic through Eastern Europe, to the Middle East and parts of South Asia, have been affected by GPS jamming and spoofing nearly every day since the publication of last year’s report.
Though difficult to measure, the societal and economic impacts of such long-term disruptions to GPS service are significant, and no doubt compounded by ongoing conflict and political strife affecting many of these same areas. Qualitatively, however, GPS interference disrupts the lives and work of millions of people and in some cases (such as civil and commercial aviation) poses significant risks to public safety. Several UN agencies have also emphasized the harms of jamming and spoofing, noting that interference with satellite navigation signals is a threat to air and maritime safety and security.
▲ Figure 2: NORMAL GPS RECEPTION VS GPS JAMMING AND SPOOFING
But GPS jamming and spoofing have produced—at least in part—the desired military effect, as munitions and drones that rely on GPS to find their targets have been made significantly less effective in GPS-denied environments. That said, there is no sign that GPS interference is an air defense magic bullet. It is the many layers of modern integrated air defense systems, including jamming and spoofing, that have demonstrated effectiveness at blunting, for example, air threats to Israel and Russian drone and missile attacks on Ukraine. Likewise, the United States and European countries are implementing technical measures and operational techniques to mitigate such effects on their weapon systems. Employing such GNSS jamming and spoofing systems to protect military and other critical infrastructure from attack—whether in Israel, Ukraine, or Russia—demonstrates the increasing tactical battlefield utility of counterspace weapons, and it is a trend that is expected to continue.
The most complete public picture of GPS interference around the globe at any point in time comes from maritime automatic identification system (AIS) and Automatic Dependent Surveillance-Broadcast (ADS-B) aircraft transponder signals. Aircraft pilots and drone operators have also been able to report instances of GPS jamming and spoofing through the Federal Aviation Administration’s (FAA) Aviation Safety Reporting System and through a dedicated portal for reporting GPS anomalies.
The International Air Transport Association also operates databases containing information about instances of GPS interference: the Incident Data eXchange, a tool for reporting flight security and safety concerns, and the Flight Data eXchange, a global flight data repository. NOTAMs (originally called Notices to Airmen), issued by national aviation authorities to warn pilots about possible GPS interference, can also provide clues about the location and timing of GPS anomalies.
Until the last five years, though not entirely uncommon, GPS jamming did not have a widespread or persistent impact on global aviation. Although other instances undoubtedly went unreported, between 2013 and 2017, only 90 reports of GPS jamming worldwide were logged in the Aviation Safety Reporting System. On the whole, these reports describe localized, ephemeral events. For example, in 2015, one of these incidents involved intermittent GPS interference near a regional airport in Philadelphia that Federal Communications Commission agents attributed to a jammer being used by a driver to disable the tracking feature on his truck. Several other reports in 2014 and 2015 related to GPS disruptions near a Mexico City airport that could have been caused by jamming.
Until 2017, when several ships reported GPS spoofing in the Black Sea, documented incidents of spoofing were still rare and mostly corresponded to transient events, such as the protection of traveling high-level government officials in Russia. As recently as the start of Russia’s invasion of Ukraine in February 2022, widespread reports of GPS spoofing were mainly confined to the Middle East. But Ukrainian drone attacks into Russia provoked an increase in spoofing by Russian forces not just in Ukraine, but also across western Russia. Russian spoofing of GPS in the Baltic Region is harder to explain as a Russian force-protection measure due to its distance from Ukraine. It is instead likely an example of Russian use of hybrid warfare directed at NATO’s newest members, as the rise in spoofing responds to the timing of their ascension to the alliance in spring of 2024.
Today, Russian efforts to spoof GPS signals extend from the Black Sea to the Arctic, with impacts to several NATO members, and include many major cities and regions in Russia itself. Additionally, the start of Israel’s war in Gaza in October 2023 coincided with a massive increase in GPS spoofing incidents in the eastern Mediterranean Sea and Middle East. At the time of this report’s publication, over twenty countries experienced endemic GPS interference over all or parts of their territories. That interference can include both GPS jamming and spoofing, as jamming a real GPS signal can make spoofing more effective.
▲ Figure 3: TIMELINE OF NOTABLE GPS SPOOFING AND JAMMING ATTACKS
Specifically, a jamming signal is broadcast at sufficient strength to overpower legitimate GPS signals, alongside a spoofing signal slightly more powerful than the jamming one, leading a GPS receiver to lock onto the spoofed signal. A spoofing signal is meant to appear like a legitimate GPS signal, but the spoofing signal transmits incorrect positional information. Though criminals, terrorists, and other nonstate actors may still find it easier to acquire and use GPS jammers, nation states that have access to powerful long-range electronic warfare capabilities have clearly found that spoofing can be more effective than jamming alone because GPS receivers often do not realize they are being spoofed but easily recognize when a GPS signal is blocked.
▲ Figure 4: LOCATIONS OF SIGNIFICANT GPS INTERFERENCE EVENTS BETWEEN APRIL 2024 AND MARCH 2025
According to publicly available data, estimates for the number of worldwide commercial flights experiencing spoofing increased from 500 or fewer per day between January and mid-March 2024 to a peak of nearly 3,000 flights in April 2024, before leveling off at between 1,000 and 1,500 affected flights per day for the following several months. Most of these spoofing incidents occurred in the Middle East and were likely attributable to Israel as part of its efforts to combat threats from Hamas, Hezbollah, and Iran. The greatest spike in spoofing incidents over the last year, in mid-April 2024, followed Israel’s airstrike on April 1, 2024, targeting senior Iranian commanders in Syria, while Israel awaited possible Iranian retaliation, which ultimately came on April 13, 2024.
Also, around April 2024, the Black Sea region and Russia experienced a surge in the number of flights daily reporting GPS spoofing, with these activities plausibly attributed to Russian efforts to defend against missiles and drones launched from Ukraine. This time frame coincides with a drone attack deep into Russia from Ukraine, a major drone attack on a Russian airbase, and stepped-up drone attacks on other important targets inside Russia. Over the next several months, Ukraine continued to launch drone attacks on Russia, executing one of its largest drone strikes on Moscow in August 2024. Up until early 2025, Ukraine had maintained a steady cadence of drone attacks on targets in Russia, likely prompting Russia to continue GPS jamming and spoofing as part of an integrated air defense campaign to defeat drones. In August 2024, Ukraine destroyed an abandoned offshore gas platform in the Black Sea that Russia had been using for GPS spoofing operations, though it is not clear how the rig’s destruction impacted Russia’s spoofing capabilities.
Outside of the Middle East, Russia, and Baltic and Black Sea regions, several other regions experienced significant GPS interference from January 2024 to April 2025, when this report was published. These areas include the region between Lahore, Pakistan, and New Delhi, India, particularly along the countries’ shared border, and Myanmar. In Myanmar, GPS interference is a response by Myanmar’s military to the rise in drone attacks carried out by armed groups affiliated with the opposition party in the country’s ongoing civil war. Some GPS spoofing was observed near the border between North Korea and South Korea throughout 2024, peaking around June. There were also some reports of sporadic spoofing in Beijing in May 2024.
▲ Figure 5: DAILY NUMBER OF AFFECTED FLIGHTS PER SPOOFED-TO AREA
To date, there are no indications that diplomatic pressure or condemnation has discouraged any nation state from deploying GPS jamming and spoofing systems in and around conflict zones or within their own national territories. Neither broad warnings from the International Telecommunication Union, the UN agency charged with facilitating international coordination on spectrum use, nor directed complaints from affected countries have altered Russia’s behaviors. Even though the International Civil Aviation Organization, the United Nations’ civil aviation agency, admonished North Korea for repeatedly jamming GPS signals near its border with South Korea in May and June 2024, GPS interference was still being reported around the Korean Peninsula as of February 2025. In spite of complaints about its efforts to disrupt GPS, Israel continues to spoof signals throughout the region, with the eastern Mediterranean region widely affected during the past year.
THE DRIP-DRIP OF CYBERATTACKS
Continuing trends noted in past reports, there has been no shortage over the last year of cyberattacks targeting government, critical infrastructure, and other sectors, including space. But developing a way to accurately tally and characterize certain key aspects of cyberattacks, such as attacker motivations and objectives, is a challenge. The presence of a persistent cyber threat actor on a network may be discovered without revealing the hackers’ aims, leaving questions about the actual target of the attack. For the authors of this report, this ambiguity makes it difficult to determine which cyberattacks qualify as attacks on space systems and related infrastructure and, thus, deserve attention in this report. For example, a threat actor might be detected on the servers of an academic research institute with an aerospace engineering department. Was this attacker targeting space systems (i.e., worth mentioning in a report on counterspace threats)?
Additionally, because some cyberattacks are only made public by the attackers with no confirmation from the victim organization, it can be difficult to understand the full impact of hacks or even know for certain whether an attack took place. Frequently, hackers publicly post screenshots or other evidence of a successful cyber exploit, to demonstrate data theft, to claim credit for the hack, or in the case of ransomware attacks, to pressure victims to comply with financial demands. But hackers, particularly ones motivated by geopolitical or ideological aims, could also theoretically claim credit for attacks that never took place or exaggerate the scope of their exploits for propaganda purposes.
IT CAN BE DIFFICULT TO UNDERSTAND THE FULL IMPACT OF HACKS OR EVEN KNOW FOR CERTAIN WHETHER AN ATTACK TOOK PLACE.
▲ Table 4: REPORTED CYBER INCIDENTS IN 2024 IMPACTING THE SPACE SECTOR
Beyond the challenges in understanding hacker goals, positively identifying the physical location of hacker groups can be difficult. For example, experts do not yet know who is behind the IntelBroker hacker group, which has targeted aerospace related entities in the last year, with some indications it may be a lone-wolf actor from Serbia, and others that it might be affiliated with Iran. This lack of clarity on affiliation and physical location of a hacker group complicates attribution, making it hard for the United States and other victims of attacks to calibrate their response to hacks. It also makes it difficult to predict where such hackers may strike next and who should be particularly on guard for attacks from mysterious groups like IntelBroker.
For all these reasons, the authors of this report have found it hard to count year-by-year the number of cyberattacks targeting space systems. Though their numbers differ, some organizations try to keep tallies of cyberattacks by the type of entity and sector targeted, among other criteria. According to the European Repository of Cyber Incidents (ERCI), a free database containing reports of worldwide cyberattacks, there were about 720 reported incidents across all sectors in 2024, with roughly 57 percent of incidents targeting critical infrastructure. Of that total number, the database lists five attacks as specifically targeting the space sector in 2024, approximately the same number of attacks that targeted the space sector in 2023, according to ERCI.
The cyberattack documented by ERCI targeting Maxar Space Systems in October 2024 provides few insights into the motives or aim of the attackers. At the time of discovery, hackers had only gained access to employee data on Maxar’s networks. There is no public indication of whether personal information was the goal of the hack or whether gaining this limited access was the first step in a broader effort to breach operational or other systems specific to Maxar’s satellites or space systems. The hackers may very well have been targeting Maxar because it is a space company, but it is equally plausible that Maxar’s servers were just one IP address on a long list of unrelated entities, ones for which they merely found an exploitable vulnerability. That there were only five reported cyber incidents affecting the space sector in 2024 according to the ERCI dataset may leave some readers of this report scratching their heads, as there is a widespread perception that space systems face constant cyber threats. In June 2024, the head of the Space Information Sharing and Analysis Center (Space ISAC)—a nonprofit organization set up in 2019 to improve threat sharing and mitigation for space systems and comprised of over 100 members across the public and private sectors within the United States and internationally—said that the organization records over 100 instances of cyberattacks targeting “infrastructure related to space systems” each week. Though on the surface these numbers are clearly at odds with the rather low number of cyber incidents targeting the space sector according to the ERCI figures, the Space ISAC figures include attempted intrusions and hack claims made by attackers and not only, as the ERCI records report, successful attacks publicly acknowledged by hack victims. Additionally, the Space ISAC statistic speaks to the number of attacks targeting infrastructure related to space systems, which seems to include more types of networks than are included in the term “space sector” used by ERCI.
▲ Table 5: CYBERATTACKS IN 2024 IMPACTING THE SPACE SECTOR
In yet another attempt to tally cyberattacks targeting space systems, ETH Zurich, a Swiss university, published a report in October 2024 that documented over 120 publicly known cyber operations, between February 2022 and September 2024, targeting the space sector in the context of the war in Ukraine. The report identified 12 pro-Ukrainian and 19 pro-Russian cyber threat actors who made claims to have targeted space systems. Of the attacks assessed in the report, the vast majority—65 percent—were distributed denial of service attacks, with 11 percent identified as network intrusions and 9 percent listed as leak operations. A further nine categories of hack types were specified in the report, including credential theft, data breach, malware, software cracking, and data breach extortion, among others.
One final observation is that, though the available data points to attempted and successful cyberattacks targeting systems associated with the space sector, there are no public reports in the last year that these cyberattacks have specifically targeted spacecraft or satellites in space. References to satellite hacking usually relate to attacks on ground infrastructure, the user terminal only, or the companies and institutions involved in satellite development and operations. This does not mean that cyber threat actors have not compromised satellites in space, only that there is no open-source indication of such efforts in the last year.
RPOS: BENEVOLENT OR CRUEL INTENTIONS
Though space has never been a static environment—relative to the center of the Earth, the orbital speed of GEO satellites is 7,000 miles per hour and LEO satellites around 17,500 miles per hour—most spacecraft have generally tended to stay away from other space vehicles to avoid potential collisions. However, government-owned and commercial satellites are becoming more maneuverable and flying closer together, conducting rendezvous and proximity operations, or RPOs, and docking with other spacecraft on an increasingly regular basis. In 2024, there was strong private sector interest in developing satellites to perform maintenance, repair, assembly, manufacturing, and inspection missions. Government agencies continue to work on systems that use orbital maneuvering, RPO, and docking capabilities, such as space planes, crewed spacecraft, and scientific missions. Additionally, no matter a satellite’s specific function, it may need to maneuver to avoid collision with another satellite or a piece of space debris.
Given the variety of use cases for maneuvering one spacecraft around another, it can be difficult to characterize a spacecraft’s purpose using only data about its behaviors in space. Some spacecraft exhibiting RPO behaviors may be counterspace weapons or testing technologies for use on such weapons. Other spacecraft may have peaceful reasons—or, at least, reasons that do not involve the use of a weapon—to move closer to another active satellite. A spacecraft may even have a non-hostile reason to conduct RPO and docking operations near a noncooperative space object, such as a defunct satellite or piece of space debris—this is the business case for companies like Astroscale and Clearspace. But a U.S. observer noting a Chinese or Russian satellite shadowing or moving closer to one of its own satellites would reasonably view that behavior as threatening. Chinese or Russian observers probably have the same reaction when a GSSAP satellite approaches their spacecraft.
The issue is that the United States and its allies rightly do not take Russian or Chinese statements about the purposes of maneuvering spacecraft at face value and find little assurances from Russian or Chinese assertions of peaceful intentions in space. But analyzing behaviors alone does little to clarify what their spacecraft are actually doing. Knowledge about a satellite’s capabilities and context—for example, that it has a grabber arm or device capable of latching onto another satellite or that it “birthed” a smaller object in proximity to a U.S. government satellite—can help more fully assess the purpose of a satellite exhibiting RPO behaviors. Some of these satellites displaying RPO behaviors are probably designed as counterspace weapons, meaning they have capabilities intended to blind, jam, damage, or destroy other satellites. Other satellites are possibly performing a space surveillance mission or are testing on-orbit satellite servicing technologies.
Coincidentally, the U.S. government and U.S. companies are fielding more space systems aimed at some of these purposes. Broadly speaking, the U.S. Space Command (USSPACECOM) is increasingly focused on using satellites that are designed for frequent orbital maneuvering. The Space Force operates GSSAP, whose purpose is to collect SSA data. The Space Force is also investigating a next-generation constellation of scout satellites in GEO. U.S. company True Anomaly is planning to operate its own satellites carrying out inspection operations, having launched its first and second missions in 2024. Another company, HEO, is using sensors on satellites to collect data about other space objects in LEO, though HEO’s approach is to use naturally occurring flybys rather than active maneuvering to obtain data. Beyond near Earth, the Air Force Research Laboratory is developing two satellites designed to obtain SSA data from cislunar space.
There are no indications that any of the aforementioned U.S. satellites are weapons, though their maneuvering signatures and behaviors may mirror those of on-orbit counterspace weapons. The perception that satellites like these are weapons could increase the risk of miscalculation, a risk compounded as more and more satellites are launched with missions that include orbital maneuvering. But some maneuverable satellites, including those operated by U.S. allies and some planned by the United States itself, are intended as counterspace weapons. France, for example, publicly stated in 2024 that it plans on building LEO satellites that can actively defend against attacks in space, having already announced plans for a similar GEO capability, called YODA, in 2021. The Trump administration’s January 2025 executive order on “The Iron Dome for America” (now Golden Dome) includes direction to develop and deploy space-based interceptors to defend the U.S. homeland against advanced missile attacks.
Based on satellite behaviors alone, there is hardly a way to distinguish between a surveillance tool and a weapon, though arguably, the same satellite could perform both roles. Though the United States should view attempts to surveil its satellites by Russia and China with concern, it would undoubtedly respond with considerably more restraint to a surveillance satellite approaching one of its own satellites than a counterspace weapon exhibiting the same behaviors. Greater transparency and awareness about specific satellite capabilities is a possible way to delineate between a weapon and surveillance capability. But a lack of trust between the United States and its allies on one side and Russia and China on the other would impede efforts to increase transparency, since both sides likely mistrust each other’s ability to be truthful about the purpose of their satellites. The U.S. Space Force is building up its space intelligence collection, analysis, and targeting to enable a deeper understanding of foreign capabilities and to support commanders’ operational needs. Meanwhile, researchers from LeoLabs, the University of Bern, and Maxar are developing characterization methods that combine radar measurements, information from ground-based optical telescopes, and non-Earth imagery data to provide new insights that can be used for assessing a spacecraft’s purpose.
Such a distinction between surveillance assets and weapons aids the United States and its allies in calling out unsafe, irresponsible, and escalatory behaviors, especially when adversaries target surveillance assets as they have done in other domains. For example, in 2019, Iran shot down an unarmed, unmanned U.S. Global Hawk surveillance aircraft operating over international waters, and both China and Russia continue to harass U.S. and allied airborne ISR assets operating in international airspace over the South China Sea and Black Sea, respectively.
There is further danger in this lack of distinction and transparency. Given that the U.S. government and private sector, as well as allied nations and geopolitical competitors, operate satellites with space surveillance and SSA missions, considering maneuverable surveillance satellites as threats akin to counterspace weapons could expose U.S. satellites doing those missions to increased Russian and Chinese counterspace risks. In addition, grouping satellites with counterspace weapons into the same category as surveillance satellites will make it more difficult for spacecraft operators to identify and calibrate responses to real threats that could damage, degrade, or destroy their space systems. Grouping both types of space systems together also increases the risk of misunderstanding and miscalculation between geopolitical competitors in space.
At the same time, satellites conducting RPOs can still pose a security threat and safety hazard to others. For example, the revelation in March 2025 that PRC satellites had practiced “dogfighting” maneuvers in space should be concerning. The authors could imagine scenarios where adversary satellites maneuver against a target (like a U.S. government satellite) as to force it to move, expend fuel, and degrade its mission.
For these reasons, the authors of this report assert that satellites designed solely for obtaining SSA data or performing space surveillance roles should not be considered counterspace weapons but, understandably, satellites conducting RPOs without a clear understanding of capability and intent may still be viewed as threats depending on the circumstances. As in other domains, the United States, Russia, China, and other countries should eye warily but expect their adversaries and geopolitical competitors to conduct surveillance and intelligence collection against their space assets. Surveillance activities in space should not provoke the same reaction as deployment and use of actual counterspace weapons. Creating a public expectation that inspector or surveillance satellites are a hostile threat to be treated as weapons puts U.S. companies with business plans around doing those very same things more into the crosshairs of U.S. adversaries than they would likely already be.
There is no doubt that satellites conducting surveillance on other satellites to understand their purpose and capabilities serve a military and intelligence purpose. But they can also help to prevent misunderstandings, ensuring that deci- sionmakers can better discriminate between satellites that are weapons (i.e., threats) and ones that are not. They also can play an important role in space safety for both government and commercial space operators, helping to build a comprehensive picture of what is happening in the space environment and understand which satellites are truly counterspace weapons threats.
▲ Table 6: CHINESE AND RUSSIAN SATELLITES EXHIBITING UNUSUAL BEHAVIORS BETWEEN JANUARY 2024 AND MARCH 2025
POINTS OF INSTABILITY: UNINTENTIONAL SPACE DEBRIS GENERATION
Several debris-fragment-generating events in space have taken place since the publication of the last Space Threat Assessment, though there is no indication that any of these were intentional or caused by counterspace weapons. Previous editions of this threat assessment have not specifically addressed accidental debris-causing incidents; however, this report will discuss them, as they have the potential to create geopolitical complications and instability. Catalogued and tracked debris fragments pose risks to space safety and, should debris produced by a satellite of one nation cause harm to satellites operated by other nations, can lead to increased international tensions. Debris-producing events that generate no public alarms, uncatalogued debris fragments, and inadequately characterized debris clouds create even more risks, adding an unnecessary and avoidable element of surprise to the calculus.
For inexplicable reasons, certain debris-causing incidents are widely covered in the media, while others go entirely under the radar, without widespread public coverage. Though USSPACECOM often makes public announcements of debris-generating events, it did not issue statements for all events in the last year. However, commercial SSA entities often make public announcements of such events, as will the Office of Space Commerce once its Traffic Coordination System for Space (TraCSS) is operational. Additionally, it can sometimes take weeks if not months before the Space Force enters new debris fragments into Space-Track. In many cases, private sector SSA organizations announce they are tracking far more pieces of debris than are either announced by USSPACECOM or logged by Space Force in Space-Track. Especially when the debris-generating incident is caused by a spacecraft associated with the U.S. government, Russia’s Vimpel space object catalog is sometimes updated to reflect new debris fragments quicker than Space-Track.
DEBRIS-PRODUCING EVENTS THAT GENERATE NO PUBLIC ALARMS . . . CREATE EVEN MORE RISKS.
During the last year, USSPACECOM only publicly announced five debris-causing breakup events, yet this section describes eight such events. Furthermore, for each event acknowledged by USSPACECOM, this report highlights the differences between the official Space-Track numbers of cataloged debris fragments, as well as the timeliness of their cataloging, and other space-object-tracking options. One reason for the discrepancies may relate to the Space-Track fidelity standards, which relate to how well an object is understood before it is or is not cataloged. But no matter the cause, delays and inconsistencies in adding debris fragments resulting from spacecraft breakups and energetic events to Space-Track create avoidable space safety risks and may affect the credibility of the United States in the eyes of other international partners during discussions on norms of behaviors and rules of the road for space activities.
Resurs-P1 (Russia): Russia’s Resurs-P1 broke up on June 26, 2024. Launched in 2013, Resurs-P1 was a commercial remote sensing satellite in LEO that operated until 2021, when it was deactivated upon its replacement by Resurs-DK1. USSPACECOM noted that the breakup generated over 100 trackable debris fragments, while LeoLabs stated that it was tracking about 180 pieces of debris immediately after the event. Though not confirmed, experts speculate the breakup was caused by improper or incomplete passivation efforts upon the retirement of the satellite in 2021. As of early March 2025, 18 pieces of debris were included in Space-Track. Due to the low altitude of the breakup, all other fragments have likely already decayed and burned up in the atmosphere.
Upper Stage, Long March 6A (China): Most likely caused by residual propellant, the upper stage of a Long March 6A broke up in LEO, creating several hundred pieces of trackable debris—according to LeoLabs, potentially as many as 900 debris fragments—on August 6, 2024. By early March 2025, over 650 fragments were logged in Space-Track. This rocket had been launched by China on that same day carrying satellites for the Qianfan (“Thousand Sails”) LEO broadband satellite constellation. This was not the first time that the upper stage of a Long March 6A rocket broke up in orbit.
Centaur Upper Stage, Atlas V (United States): On September 6, 2024, the Centaur upper stage of an Atlas V rocket broke up in a geotransfer orbit. The upper stage had been passivated after launching a U.S. government weather satellite in March 2018. As of early March 2025, Space-Track contained no debris fragments associated with this breakup, though an outside expert identified over 950 debris fragments by that time. This is the fourth breakup of a Centaur upper stage, with two other breakups in 2018 and another in 2019. The cause of all four breakups is not known.
Intelsat IS-33e (United States): Intelsat IS-33e broke up on October 19, 2024, due to unknown reasons. Prior to the breakup, the satellite had been a telecommunications satellite in GEO, launched in 2016 with a planned service life of 15 years. Immediately following the breakup, USSPACECOM announced that it was tracking around 20 pieces of debris. The number of debris fragments eventually reached at least 500, according to ExoAnalytic. Space-Track, however, only listed 18 pieces of debris associated with this breakup event by early March 2025.
Defense Meteorological Satellite Program (DMSP) F-14 (United States): Probably due to a battery explosion, a defunct DMSP F-14 weather satellite in LEO generated a number of fragments on December 19, 2024. Space-Track did not list any debris associated with this event by the end of December 2024, but both LeoLabs and Slingshot Aerospace were tracking debris fragments resulting from this event. Since 2004, three other DMSP and two NOAA satellites using a similar design have all experienced similar malfunctions attributed to battery explosions. In early March 2025, Space-Track started listing debris from this satellite, with 19 fragments cataloged by March 10, 2025.
Blue Ring Pathfinder/Upper Stage, New Glenn (United States): Though not publicly reported by USSPACECOM, Blue Origin’s New Glenn upper stage, to which the Blue Ring Pathfinder mission is attached, probably experienced a debris-generating event upon passivation in HEO on January 16, 2025. Though originally thought to be ice and other effluent, which should have naturally dissipated, the debris fragments are probably a combination of thermal control materials and other unknown objects. As of early February 2025, over 50 pieces of debris remained in orbit, with about 67 logged in Russia’s space object catalog. As of March 2025, there are no debris fragments associated with this event in Space-Track.
Garpun 11L (Cosmos 2473) (Russia): On May 28, 2024, a nonoperational Russian military communications satellite in GEO, Garpun 11L (Cosmos 2473), experienced some kind of energetic event that raised the satellite 5 km and produced at least one new space object, identified in Russia’s space object catalog. Launched in September 2011, Garpun 11L has not been operational since experiencing an on-orbit malfunction in June 2020. USSPACECOM did not make any public announcements about this event and there is no indication of debris from this event in Space-Track as of April 2025.
Fregat RB/Cluster 2 Upper Stage, Soyuz-U (Russia): An experimental Russian upper stage, called Fregat RB/Cluster 2, of a Soyuz-U rocket launched in March 2000, experienced an energetic event on April 8, 2024, resulting in a 3-km change in the object altitude and some kind of residual propellant outgassing. Though USSPACECOM has not provided a public notification of this event or listed any resulting debris fragments in Space-Track, the Russian space object catalog lists more than 300 pieces of debris generated by this event. There is no indication of debris from this event in Space-Track as of April 2025.
THE COMING COLLISION OF COMMERCIAL AND COUNTERSPACE
Over the last decade, space has become increasingly commercial, and the past approach of sectioning space off into different military, civil, and commercial segments has become much more difficult. While space has traditionally been dominated by government activity and specialized defense contractors, the last decade has witnessed the growth of a diverse commercial space sector. Today, commercial companies act independently, with goals and actions to implement separate from government strategies or contracts.
In the rapidly advancing domain of space exploration and satellite technology, commercial space companies have become integral players, providing services ranging from satellite communication and Earth observation to space tourism and lunar exploration. As these companies expand their activities in LEO and beyond, they face an increasing risk of being caught in the crossfire of geopolitical tensions and the growing arms race in space. The impact of commercial space capabilities has been well documented in the war in Ukraine, where commercial services such as imagery and broadband communications were widely distributed in the early days and weeks of the conflict and largely continue today.
THE IMPACT OF COMMERCIAL SPACE CAPABILITIES HAS BEEN WELL DOCUMENTED IN THE WAR IN UKRAINE.
Governments around the globe have seen the impact that a space industrial base has on programs and economic bolstering, so commercial companies are being encouraged in most spacefaring nations to innovate alongside or outside of government priorities. The U.S. Department of Defense and Space Force have each released commercial integration strategies, and other nations around the globe are investing heavily in a commercial space sector, hoping to integrate innovative technologies into all facets of government capabilities. Multilateral organizations are also noting the importance of commercial capabilities, and NATO will reportedly publish a commercial space strategy in 2025.
The rise of satellite companies offering critical services to governments, businesses, and individuals means that these private sector players are now directly in the crosshairs of geopolitical competitors and adversaries. As noted earlier in the report, in 2024, a Russian official indicated Russia would consider companies supporting U.S. “military space ambitions” as legitimate targets for retaliation.
Beyond current capabilities such as communications or Earth imaging, commercial companies around the globe are testing technologies that could have counterspace applications. French company Dark plans to “forge the space armory” by building advanced defense systems to place on orbit to protect other satellites from being targeted. Further, the Dark website states that space has already become a battlefield. The company is developing a platform called Interceptor, launched from a plane that would travel to LEO to move or deorbit satellites or pieces of debris. The company’s CEO has described Dark as aiming to be the “S.W.A.T. team of space,” and the Interceptor capability as ready to operate on call, akin to air defense missiles.
Other technology developments are not as blunt, but could be considered a counterspace technology. Commercial companies are developing on-orbit servicing capabilities that are designed to extend an assets’ life on orbit. But with capabilities like robotic arms and grapplers, these technologies have the potential for nefarious use. For example, Japanese company Astroscale is partnering with BAE Systems to test in-orbit servicing technology, in a contract funded by the European Space Agency to service a test satellite. The Astroscale satellite would do this servicing by conducting proximity operations to get close to the test satellite, then using a robotic arm to take a part off of the test satellite and replace it with a new part. European space company Airbus, through its Surrey Satellite Technology Limited subsidiary, demonstrated a debris removal concept releasing a net and pencil-sized harpoon to capture space debris. While the objective of these test missions is civil in nature, similar technologies could be used in the future for harming or disabling an adversary satellite.
The development of dual-use technologies, with both commercial and potential counterspace applications, underscores the delicate balance between actors in the space domain today. In an arena traditionally dominated by government agencies, private enterprises are now not only shaping the future of space exploration but also becoming entangled in geopolitical and security concerns. As these companies expand their capabilities and develop technologies that could have both peaceful and defensive applications, the lines between civilian, commercial, and military activities in space are becoming increasingly blurred.
WHAT TO WATCH
DISTINGUISHING BETWEEN PEACETIME NORMS AND WARTIME ACTIONS
Senior administration and Pentagon officials have repeatedly made clear that the U.S. military intends to be a responsible, good neighbor in space. To meet that goal, the secretary of defense published a memo in 2021 outlining DOD tenets of responsible behavior in space. Those tenets specify that DOD will operate in, from, to, and through space with due regard to others and in a professional manner; limit the generation of long-lived debris; avoid the creation of harmful interference; maintain safe separation and safe trajectory; and communicate and make notifications to enhance the safety and stability of the domain.
In February 2023, USSPACECOM proposed eight specific behaviors, which map to the five tenets, for DOD space operations, which USSPACECOM notes complement broader U.S. efforts to establish space norms and best practices. Additionally, the United States has tried to discourage the testing of destructive DA ASAT weapons, which have the potential to generate space debris. In April 2022, the United States declared a moratorium on its testing of DA ASAT weapons. And in December 2022, along with several other nations, it introduced a UN resolution calling nations not to conduct destructive DA ASAT testing. The resolution was supported by over 150 countries.
The tenets and eight behaviors are clearly applicable to day-to-day space operations and establish sensible norms for peacetime space activities, which apply to military space operations just the same as civilian and commercial ones. The moratorium on debris-generating destructive DA ASAT testing is a de facto peacetime restriction, as the preponderance of weapons testing would surely happen prior to a war or conflict. What is less clear is how these rules apply to wartime actions, though they have probably influenced the apparent U.S. emphasis on low-debris-causing and non-kinetic counterspace weapons, and how efforts oriented around space sustainability and safety, like the tenets, relate to the law of armed conflict.
The general aims of the universal laws of war, including international humanitarian law, are to protect those not fighting and those no longer able to fight, which includes avoiding harm to civilians or things that are essential to their survival. Though certainly open to interpretation, the operation of satellites in space is undeniably less essential than, and several steps removed from, the provision of things like food, water, medicine, and clothing to noncombatants. Except for humans on the International Space Station or China’s Tiangong station, operations in space are unlikely to directly harm civilians. Operations on land, sea, and air are far more likely than those in space to harm people or cause disruptions to the delivery of the essentials of life. Yet the United States assigns the space domain a special set of tenets—though one-sided, since neither China nor Russia have agreed to these restrictions—for responsible behaviors that do not directly correlate to the expectations placed on combatants by the laws of war.
Rather than self-imposed tenets, applicable to one side and not the other, a better approach to space operations, particularly U.S. operations vis-à-vis China and Russia, could be one modeled on the 1971 agreement between the United States and Soviet Union on incidents on and over the high seas. The goal of this agreement was not to cover wartime actions, but to prevent peacetime incidents from becoming more serious. The lessons from this approach for space operations are twofold. First, it could help establish norms of behavior for space that could improve overall space safety for military, civilian, and commercial operators. Second, it could help reduce the risk of misunderstanding between the United States, China, and Russia for space activities such as RPOs and other on-orbit behaviors.
This model also implicitly acknowledges that wartime actions are entirely different from peacetime behaviors, with guardrails placed around wartime behaviors established by the law of armed conflict, which is domain agnostic. Given the frequency of both Chinese and Russian RPOs and U.S. emphasis on space norms, a concerted U.S.-led effort over the next year to establish a space equivalent to the 1972 U.S.-Soviet agreement on incidents on and over the high seas would be beneficial both to U.S. interests and to the overall chances of success for the growth of the space economy.
MAKING MORE COUNTERSPACE WEAPONS PUBLIC
Historically, U.S. officials have shared little publicly about U.S. counterspace capabilities and operations. To date, the only publicly acknowledged counterspace weapons operated by the Space Force are the Counter Communications System and the Remote Modular Terminal, both electronic warfare capabilities. The United States has emphasized these are defensive capabilities—not dissimilar from the use of GPS jammers and spoofers for force protection in Ukraine, Russia, and Israel described earlier—drawing a distinction between offensive and defensive space and emphasizing the U.S. intention to use space for deterrence and not aggression.
In the next year, the United States may want to consider publicly revealing more, though not all, of its counterspace capabilities—as France and Germany are already doing—because acknowledging some U.S. counterspace weapons, beyond just jammers, can be used to deter hostile action in space or other domains. Additionally, talking more publicly about counterspace weapons means the U.S. military can more easily partner with space companies already working on commercial technologies, such as servicing, debris removal, hypersonics, and atmospheric reentry, that could be transformed into new military space capabilities. For classified projects, the military also cannot tap into innovative space startups, as these companies often do not have the right security clearances to even know what the government wants to buy, let alone bid on the work.
THE UNITED STATES MAY WANT TO CONSIDER PUBLICLY REVEALING MORE, THOUGH NOT ALL, OF ITS COUNTERSPACE CAPABILITIES.
DEVELOPMENT OF BODYGUARD SATELLITES
As noted in this report, China has demonstrated it can operate highly maneuverable satellites in both LEO and GEO and track and synchronize orbits with U.S. government satellites. China also remains the only country to conduct a noncooperative capture of one satellite by another in GEO, when SJ-21 moved a defunct Beidou satellite into a graveyard orbit in 2022. These capabilities should be seen as ominous signs of the potential for China to develop, if it has not already done so, sophisticated on-orbit counterspace weapons against which U.S. satellites have limited, if any, defenses.
To date, France is the only country that has consistently talked about building and deploying on-orbit satellite systems designed to guard, defend, and protect high-value satellites. However, in May 2024, the European Commission announced that the European Defense Fund included €6.5 million ($7 million) for an “Autonomous SSA Bodyguard Onboard Satellite” that would perform SSA and threat detection, but also “counteract [threats] with a robot or laser.” It remains to be seen how the public acknowledgment of such initiatives will influence counterspace weapons trends, though one likely response from countries like China and Russia would be to develop new counterspace systems. This cat-and-mouse game between offensive and defense space capabilities will likely make space operations more expensive for both government and commercial operators, as space operators will likely want to invest in systems and methods that protect their space assets. It will also raise questions about what commercial operators are legally allowed to do to protect their satellites, similar to the issues raised in cyberspace about whether cyberattack victims can “hack back” against their attackers.
Looking to the future, the United States and its allies, beyond just France, will want new on-orbit technologies—like bodyguard satellites—to protect against on-orbit counterspace threats. Such systems could employ non-kinetic weapons, such as jammers and lasers, or kinetic weapons, such as projectiles or grappling capabilities, to disable attacking satellites. There is no reason to delay efforts to develop such capabilities and no reason to make such efforts secret.
GENERATION OF DEBRIS FRAGMENTS
Though experts frequently warn of increased risks of collisions and creation of space debris resulting from the deployment of large satellite constellations, most debris-generating incidents over the past year have nothing to do with operating satellite constellations. Of the eight debris-causing events described earlier in this report, only one involves an active satellite (e.g., Intelsat IS-33e). Further, while concern has focused on the risk of collisions in congested LEO orbits, only one related to LEO constellations, and even that connection is tangential because the event relates to the launch vehicle, the Long March 6A upper stage, and not the satellites themselves. Additionally, most of these events were caused by defunct spacecraft that were at least 10 years old, or rocket bodies.
Just as the operation of large satellite constellations to date has not caused a commensurate rise in space debris, neither has testing or use of kinetic counterspace weapons. Most debris from the U.S. military’s shoot down of a defunct U.S. satellite in 2008, called Operation Burnt Frost, deorbited within days. Additionally, the Russian ASAT test in 2021 created around 1,800 catalogued debris fragments, yet only around 9 tracked pieces remained in orbit by March 24, 2025, according to Space-Track. The glaring exception is China’s test of a DA ASAT in 2007. Because of the altitude of that test, around 800 km, nearly 70 percent of resulting debris remains in orbit.
Though not directly related to the operation of large constellations, one trend to watch is China’s tendency to date of leaving the upper stages of Long March 6A and 8 rockets used to launch its LEO broadband constellations at altitudes near 800 km. At that altitude, the rocket bodies could remain in orbit for more than 100 years, creating increased collision risks and the potential for debris-generating collisions or other events. With plans to launch thousands of satellites for these constellations, unless China takes a different tack in the future, the risks from these rocket bodies will grow.
The fact is that most space debris fragmentation events result from breakups involving old satellites and incidents involving spent rocket bodies. These objects are ticking time bombs, which have a tendency to regularly and spectacularly go off, creating the vast majority of debris-generating incidents since the publication of last year’s threat assessment. But so far, little is being done by the United States or other countries, including China and Russia, to address these main causes of increasing space debris. Though most breakup events are not caused by nefarious acts, debris-generating breakups pose just as much risk to the space environment as the counterspace weapons regularly chronicled in this report, and debris-generating breakups will continue to do so in the future.
MOST DEBRIS-GENERATING INCIDENTS OVER THE PAST YEAR HAVE NOTHING TO DO WITH OPERATING SATELLITE CONSTELLATIONS.
COUNTERING PROLIFERATED SATELLITE CONSTELLATIONS
The alarming news of 2024—that Russia is pursuing a space-based nuclear anti-satellite weapon—brought the first signs of active development, including on-orbit testing, of a counterspace weapon believed to be designed to counter proliferated LEO (pLEO) constellations en masse.
Governments and commercial operators alike have embraced pLEO constellations: from first-mover Starlink, to the U.S. government through its investment in hundreds of satellites for ISR and missile detection and tracking, to China and its ISR and SATCOM system expansion. These architectures offer clear advantages: enhanced persistence, higher technology refresh rates, lower per unit costs, and greater resilience. Russian efforts to interfere with Starlink in Ukraine have been largely stymied by the sheer number of satellites still able to connect with ground terminals and SpaceX’s ability to rapidly update its systems.
However, no advantage is permanent and, as previous editions of this report have cautioned, adversaries will seek new methods to erode it. Both this report and previous ones have drawn attention to PLA-affiliated research into attack simulations that could wipe out planes of LEO satellites, cyber penetrations of satellite networks and infrastructure that could impact satellite command and control, and high-altitude nuclear detonation (HAND) effects on satellites. Further, Moscow is signaling new redlines with threats that commercial satellites, like Starlink, supporting military operations are legitimate targets.
The authors fully expect to see more counter-pLEO threats in the years to come, a reminder that proliferation is but one means of enhancing resilience. The United States must figure out how to deter and defend against such attacks and minimize their catastrophic potential. At the same time, as countries like China utilize pLEO constellations to close their own “space-enabled kill chains,” the United States will also seek ways to erode their capabilities. The distinction for Washington will be to do so in ways that do not lay waste to orbits for all who use them to advance commerce, science, and security in contrast to Moscow’s approach and even those hinted by Beijing.
SPACE AND MISSILE DEFENSE NEXUS
While this report does not describe U.S. counterspace weapons, it is impossible to ignore the counterspace implications of the “Golden Dome” missile defense initiative announced by the White House in January 2025. Specific details remain scarce, but the executive order points to the centrality of space for missile defense—encompassing space-based sensors for missile detection and tracking, data relay networks, and renewed interest in space-based interceptors (SBIs).
Historical analyses suggest that thousands of SBIs in low Earth orbit would be necessary to intercept ballistic missiles in their boost phase, before countermeasures or maneuverable reentry vehicles are released. These SBIs are certain to become high value counterspace targets. Russian officials have already accused the United States of undermining “Russian and Chinese strategic deterrence capabilities” with its Golden Dome plans. Adversaries may well gravitate to nuclear ASATs or other wide area-effects weapons to neutralize such orbiting systems at scale.
Furthermore, though intended as a missile defense system, SBIs also have utility as counterspace weapons. An SBI equipped with a kinetic payload, laser, or microwave device could be used as a bodyguard satellite or to degrade an adversary’s space systems. It also could be used to entirely cut off access to space, as it could be capable of destroying any attempted space launch withing minutes of a rocket leaving the launch pad, challenging an adversary’s ability to reconstitute satellite systems damaged in a conflict. Taking a step further, SBIs may very well open the door to a broader conversation among policymakers on how to unlock the full military potential of the space domain for warfighting, including capabilities that operate “in, from, and through” space.
CONCLUSION
“The years teach much which the days never know.”
— RALPH WALDO EMERSON FROM ESSAYS: SECOND SERIES, 1844
That this report chronicles no new spectacular counterspace developments does not mean nothing interesting or noteworthy happened. To understand the events, and the significance, of this past year, one must look at the trends over a wider time horizon. Doing so reveals patterns that illuminate the direction of U.S. adversaries, as well as of the United States and its allies in space. China and Russia, as well as, to a lesser degree, Iran and North Korea, are actively working to test new technologies and concepts of operations in space that have clear applicability and use for counterspace weapons capabilities. Meanwhile, building on trends noted in past years, jamming and spoofing GPS signals has become ubiquitous in certain regions of the world, and cyber operations targeting space systems continue to take place and are uncovered on a regular basis.
To date, the United States has not publicly revealed its own counterspace-specific capabilities beyond two electronic warfare capabilities. Of its allies, only France has routinely acknowledged its intent to develop on-orbit counterspace capabilities that could perform defensive and offensive missions. From what is publicly known, the United States and its allies appear to be developing a much narrower range of counterspace weapons than their potential adversaries. This imbalance is possibly attributed to the commonly held assumption that the use of kinetic counterspace weapons in conflict is incompatible with maintaining a usable space environment for military space operations and somehow in conflict with the law of war. But the United States is reevaluating these assumptions, talking about kinetic counterspace weapons and space-based missile interceptors as part of the Golden Dome initiative.
Ultimately, Russia and particularly China are demonstrating sophisticated counterspace capabilities in orbit, as well as deploying cyber and electronic warfare capabilities targeting space systems. Iran is growing more capable in space, deploying more satellites and having greater success with indigenous space launch capabilities. The United States has, to date, constrained its counterspace emphasis to non-kinetic capabilities and publicly expressed no interest in developing bodyguard satellites or other systems to defend against attacking satellites in space. But the United States is shedding those restraints. Additionally, the secrecy that surrounds U.S. counterspace capabilities has to date limited its usefulness for deterrence purposes. In this complicated and increasingly threatening space environment, to retain its edge in space, the United States will need all the counterspace tools it can get its hands on, including bodyguard-style satellites. It should also be more public about the U.S. arsenal, ensuring that these systems can be used to the maximum extent for deterrence as well as warfighting.
Clayton Swope is the deputy director of the Aerospace Security Project and a senior fellow in the Defense and Security Department at the Center for Strategic and International Studies (CSIS).
Kari A. Bingen is the director of the Aerospace Security Project and a senior fellow in the the Defense and Security Department at CSIS.
Makena Young is a fellow with the Aerospace Security Project at CSIS. Her research interests include international collaboration, space security, and orbital debris.
Kendra Lafave is a program coordinator and research assistant with the Aerospace Security Project at CSIS.