Kazuto Suzuki Hokkaido University

Slides:



Advertisements
Similar presentations
The Military Challenge of Cyber AOC Talk on Cyber, EW and IO Dr Gary Waters, 17 April 2012.
Advertisements

1 Denial of Service in Sensor Networks Authors: Anthony D. Wood, John A. Stankovic Presented by: Aiyaz Amin Paniwala.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Denial of Service in Sensor Networks Anthony D. Wood and John A. Stankovic.
1 The NIAG - “Supporting Alliance Capability Development and Enhancing Interoperability” AFCEA Europe – June 2010 “Interoperability Revisited” “NATO Industrial.
Space Power Delivering Space & Missile capabilities to America and its warfighting commands.
Space Security  Ways forward  SETI Institute, CA, USA Will Marshall.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
U.S. PERSPECTIVES ON SPACE SECURITY* Joan Johnson-Freese Naval War College Newport, RI April 23, 2007 * The views expressed in this article are the author’s.
CYBER CRIME AND SECURITY TRENDS
How Global Positioning Devices (GPS) work
DRAFT Space Code of Conduct: Principles, Policies, Options
Submitted by: Abhashree Pradhan CA (1)
Space Systems as Critical Infrastructure Iulia-Elena Jivanescu 1st Space Retreat, Tenerife, Spain, 8-22 January, 2013.
Promoting Cooperative Solutions for Space Security 1 UNIDIR Space Security Conference, March 2010 Space Weapons from.
National Council for Research and Development Ministry of Science, Technology and Space Yuval Ne’eman Workshop for Science, Technology and Security, Tel.
Cyber crime & Security Prepared by : Rughani Zarana.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
RRF Spectrum, The Global Commons & Planetary Defense McGill University-World Economic Forum Session on the Economic Benefits of Space Joseph N. Pelton.
Collective Security in Space: Asian Perspective Chinese Society of Astronautics To Develop Space Peacefully for Benefits of Human beings Yang Junhua Vice.
1. 2 SSI Introduction Purpose of the SSI Working definition of space security “The secure and sustainable access to and use of space, and freedom from.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Manpreet Sethi, Ph.D Senior Fellow
"Health Care in Danger" Protecting health care personnel and infrastructure in armed conflict and other situations of violence Robin Coupland International.
Norway’s strategic challenges in a multipolar world Ståle Ulriksen Norwegian Naval College & The Norwegian Institute of International Affairs.
Space and security relationships issues from a political and technological point of view Florence Gaillard-Sborowsky Fondation pour la Recherche Stratégique.
Promoting Cooperative Solutions for Space Sustainability UNIDIR 2016 ©2016 Secure World Foundation. Used with Permission The Role of Space.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Principles Identified - UK DfT -
4TH MANFRED LACHS INTERNATIONAL Montreal, Quebec, Canada
The vulnerability of economic markets to crime in 2015
Preventative Measures
The Outer Space Treaty Article III
WHAT IS A NON-STATE ACTOR?
MONITORING OF USE RADIO FREQUENCY SPECTRUM AND METHODS OF MEASUREMENT.
U.S. Nuclear Strategy toward China
Securing Things RIPE-74 Eliot Lear.
PLACEHOLDER SLIDE ON SIPR!
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Understanding the Threats of and Defenses Against Cyber Warfare
Panel Discussion: C4I Solutions for Combating
Modern world today There are a lot of internal and international conflicts all over the world. Force methods are often used and have high effectiveness.
WHAT IS A NON-STATE ACTOR?
RADIATION SOURCES: OUTPUT POWER vs. FREQUENCY
Multi-domain Command & Control
Cloud Testing Shilpi Chugh.
CIO G-6 Signal Conference
Cyber Security Why You Should Care.
Perspectives on Space and Cyber Yadunath Zambre, Ph. D
An Urgent National Imperative
Richard A. Clarke warned America once before about the havoc terrorism would wreak on our national security -- and he was right. Now he.
Nuclear entanglement:
Assessing Deterrence Options for Cyberweapons
Specification of Countermeasures for CYRAIL
DISN Evolution Mr. Charles Osborn
How to Mitigate the Consequences What are the Countermeasures?
Cyber security Policy development and implementation
Faculty of Science IT Department By Raz Dara MA.
Preventing Information Technology Crimes
Deterring the “Remote” Adversary
Chapter VII Article 2.4 All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or.
Harmful Interference from the Netherlands Radio Agency perspective
CONTRACTS AND (HARMFUL) INTERFERENCE PROFESSOR LESLEY JANE SMITH, LEUPHANA UNIVERSITY OF LÜNEBURG/ WEBER-STEINHAUS & SMITH BREMEN 3rd Luxembourg Workshop.
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
AJ 001 Introduction to AJ Terrorism.
Global Positioning System
Technician License Course.
MicroToken Exchange Data Security Solutions
Presentation transcript:

Kazuto Suzuki Hokkaido University kazutos@juris.hokudai.ac.jp A Japanese Perspective on Space Deterrence and the Role of the US-Japan Alliance Kazuto Suzuki Hokkaido University kazutos@juris.hokudai.ac.jp

Space systems are… Critical for socio-economic welfare Indispensable for modern military systems Vulnerable to intentional and unintentional damage Difficult to defend; difficult to deter attacks upon Most effectively defended through use of non-space means to increase the costs of attack

Vulnerabilities in Space Domain constraints do not permit substantially meaningful physical protection High velocity due to orbital speeds of approximately 28,000 kilometers per hour mean virtually any impact can kill a satellite Space objects, human-origin debris, intentional attacks Solar flares, electromagnetic pulses also threats

Anti-Satellite (ASAT) Attacks Incentives to attack may be substantial: Space assets are valuable, scarce, vulnerable Attacks are non-lethal (hence possibly seen as less escalatory), difficult to attribute, and could accord big first-mover advantages Attribution can be difficult due to blind spots Kinetic ASATs: create large debris clouds International condemnation of China after 2007 test

Non-Kinetic ASAT Attacks: Cyber Attacks on Space Systems Taking over satellites via hacking is possible Command and control systems for commercial and civilian satellites are relatively vulnerable Taking over a satellite can make it a space weapon Radio-frequency problem: Not enough bandwidth for encrypted transmission leads to use of open frequencies which are more vulnerable

Non-Kinetic, Non-Cyber ASAT Attacks Methods include: Jamming: Interferes with up-link/down-link communications by overpowering the signals through radiofrequency interference so as to prevent transmissions from getting through Spoofing: Intentionally feeds false information to devices or ground-based receivers by intercepting and overriding weak signals traveling between space and earth Dazzling: Temporarily or permanently damages functions of reconnaissance satellites using directed energy (lasers) Rendezvous and docking technology (also known as: killer satellites)

Deterrence in Space is Very Difficult Tit-for-tat is not an attractive option: Different degree of dependency on space for various actors Creation of space debris if kinetic attacks employed is also unappealing Deterrence by denial is difficult: Shooting down all the ground-based kinetic attacks—costly, hard Protecting all radio transmissions—very hard Protecting all sensors—very hard

Deterrence in Space? Life expectancy of satellites is long, posing challenges for modernizing space asset architectures Space-based assets can be decades-old Upgrading hardware to meet new challenges almost impossible Software upgrades often limited by hardware capacity Attribution problem: Knowing the real motivations for actions in space extremely difficult Satellite failure could be caused by malfunction, debris

A Tallinn Manual for Space? A non-binding set of rules drafted by experts from around the world for use in applying international laws of armed conflict to cyberspace Tallinn Manual 2.0: Updated version suggests military retaliation to cyber-attack is not legitimate unless authorized by United Nations If attack perpetrated by non-state actor, victim requires consent of state where non-state actor is based to retaliate MILAMOS: Tallinn Manual for space is now being drafted

The Role of the U.S. – Japan Alliance in Space Deterrence Increasing transparency and shaping norms: Space Situational Awareness (SSA) Information sharing with international community International rule-making Resilience/deterrence through (a measure of) denial: Increasing interoperability for replacing and recovering assets Deterrence through punishment: Prepare and plan for military actions to convince adversaries not to take actions against our space assets

Conclusions Importance and vulnerability of space assets needs to be better understood Especially in Japan Alliance plays key roles for: Transparency Resilience Deterrence through punishment Space attacks cannot be deterred by space means alone Deterrence in space requires cross-domain deterrence