Space War
Space War
Space War
resolved the benefits of offensive cyber operations by the united States Federal
Government outweigh the harms
Our sole contention is spacewar
Translated report reveals high-tech plans for cyber attacks, anti-satellite strikes”, ¶ China’s military is preparing for war in cyberspace
involving space attacks on satellites and the use of both military and civilian personnel for a digital
“people’s war,” according to an internal Chinese defense report. ¶ “As cyber technology continues to
develop, cyber warfare has quietly begun,” the report concludes, noting that the ability to wage cyber war in
space is vital for China’s military modernization .¶ According to the report, strategic warfare in the past was built on nuclear weapons.
“But strategic warfare in the information age is cyber warfare,” the report said.¶ “With the reliance of information warfare on
space, cyberspace will surely become a hot spot in the struggle for cyberspace control,” the report said. ¶ The new details of Chinese plans for cyber and
space warfare were revealed in a report “Study on Space Cyber Warfare” by four engineers working at a Chinese
defense research center in Shanghai.¶ The report presents a rare inside look of one of Beijing’s most secret military programs: Cyber warfare
plans against the United States in a future conflict.¶ “Cyber warfare is not limited to military personnel. All personnel with special knowledge and skills on
information system may participate in the execution of cyber warfare. Cyber warfare may truly be called a people’s warfare,” the report says. ¶ People’s War was
first developed by China’s Communist founder Mao Zedong as a Marxist-Leninist insurgency and guerrilla warfare concept. The article provides evidence that
Chinese military theorists are adapting Mao’s peasant uprising stratagem for a future conflict with the United States. ¶ A defense official said the report was recently
circulated in military and intelligence circles. Its publication came as a surprise to many in the Pentagon because in the past, U.S. translations of Chinese military
documents on similar warfighting capabilities were not translated under a directive from policy officials seeking to prevent disclosure of Chinese military writings
the officials feared could upset U.S.-China relations.¶ A Chinese government spokesman could not be reached for comment. However, Chinese spokesmen in the
past have denied reports that China engages in cyber attacks. ¶ The study links China’s
space warfare development programs with its
extensive cyber warfare capabilities. Both programs are considered “trump card” weapons that would allow a
weaker China to defeat a militarily stronger United States in a conflict.¶ “Cyber warfare is an act of war that utilizes space
technology; it combines space technology and cyber technology and maintains and seizes the control of cyberspace,” the study says. ¶ Because cyberspace relies on
satellites, “space will surely be the main battlefield of cyber warfare ,” the report said.¶ Satellites and space vehicles are
considered the “outer nodes” of cyber space and “are clear targets for attack and may be approached directly,” the report said, adding that ground-based
cyberspace nodes are more concealed and thus more difficult to attack. ¶ Additionally, satellites have limited defenses and anti-jamming capabilities, leaving them
very vulnerable to attack.¶ The report reveals that China’s
military, which controls the country’s rapidly growing space program, is preparing to
conduct space-based cyber warfare—“cyber reconnaissance, jamming, and attack”—from space vehicles.¶ Space-based cyber warfare will
include three categories: space cyber attack, space cyber defense, and space cyber support. The space cyber support involves reconnaissance, targeting, and
intelligence gathering.¶ “A space cyber-attack is carried
out using space technology and methods of hard kill and soft
kill,” the report said. “It ensures its own control at will while at the same time uses cyberspace to disable,
weaken, disrupt, and destroy the enemy’s cyber actions or cyber installations.”
We have passed the point of no return- China has no incentive to halt Cyber attacks
Chang 13 (Gordon G. Chang, 6-6-13, JD Cornell law and Author of many books about China, “Cyber
Détente with China”, World Affairs)
The ultimate goal is to arrive at understandings with the Chinese. As a “senior American official involved in the negotiations” told
the paper, “We need to get some norms and rules.”¶ Actually, we have long passed that stage. What we need
to do at this point is stop Chinese cyber intrusions, cyber attacks, and cyber espionage, all part of what many suspect to be the
most extensive cyber campaign conducted by one country against another¶ Administration officials, according to the Times,
say they do not expect the talks will result in an immediate and significant reduction in Chinese attacks .
And as Stanford University’s Tim Junio told the AP, “China benefits too much by stealing intellectual property from the
US, so it’s really hard to imagine anyone convincing them to slow down.”¶ So what is the purpose of further talks?
It’s not as if the Obama administration has not already broached the subject with Beijing. The president and various officials had numerous
conversations with the Chinese during the first term, but the attacks increased dramatically in the middle of last year. This
year,
Treasury Secretary Jack Lew, Secretary of State John Kerry, and Joint Chiefs Chairman Martin Dempsey
have all trooped to Beijing to discuss the issue with no apparent result. Despite the persistent effort to
establish a cooperative relationship, the People’s Liberation Army reportedly ramped up its cyber attacks
sometime around the beginning of April.
First is preemption —we can prevent foreign attacks while new tech prevents miscalc
Austin 2012(Greg, professorial fellow at the East West Institute, senior visiting fellow at King’s
College, October 15, "America's Challenging Cyber Defense Policy",
http://www.internationalpolicydigest.org/2012/10/15/americas-challenging-cyber-defense-policy/)
United States Pre-emptive and Deterrent Capability? Panetta talked of some amazing and hitherto unrevealed capabilities. He said that US
agencies could now “hunt down the malicious code before it harms our systems .” The statement has surprised
specialists in the United Kingdom. If true, and perhaps we should not doubt it, this gives the United States some useful
capability and should impact the net assessment of U.S. and Chinese military cyber capability . In a similar
vein, and equally surprising to some analysts, he said that the United States has made “significant advances” in solving
the attribution problem. He said that this made it “far less likely” that adversaries of the United States
would attack it: “Potential aggressors should be aware that the United States has the capacity to locate
them and to hold them accountable for their actions”. Pre-emptive Capability and Nuclear Deterrence?
Panetta specifically talked of the need to be able to pre-empt “an imminent threat of attack that will
cause significant, physical destruction in the United States or kill American citizens.” He said that DoD has
“developed that capability to conduct effective operations to counter threats to our national interests in
cyberspace.” Since cyber operations include the full gamut of digital command and control arrangements for strategic nuclear forces, we
probably could use some explanation form Panetta whether this pre-emptive capacity and policy affects the nuclear deterrence calculation of
potential adversaries of the United States, such as China, or a country like Russia, which while less likely to be an adversary, still maintains a
large military nuclear force. China will be looking to Panetta to offer some clarifications on this in the talks he discussed in his speech. Panetta
said he “underscored the need to increase communication and transparency” on both sides.
Second is deterrence – only OCO’s can solve
Jari Rantapelkonen & Mirva Salminen, ’13 (“THE FOG OF CYBER DEFENCE”, National Defence
University Department of Leadership and Military Pedagogy Publication Series 2 Article Collection n:o
10)
Even if we would like to think so, success in the cyber domain is not only a question of defense – at least, not for the
nation states. Defence capabilities have to be as preventive as possible in order to reduce the effectiveness of the adversary ́s – whoever it may be –
cyber attack. However, despite the best defensive efforts, intrusions will occur . Therefore, one also has to be resilient in the cyber
domain, that is, one has to have the ability to withstand attacks and failures, as well as to mitigate harm more than in other domains. The creation of
cyber defense capabilities and resilience are pretty easy for the public to accept. Yet, these acts are [is]
not enough. Deterrence is also needed, that is, the capabilities and policies to convince the others not to
launch a cyber attack against one. Deterrence will only be effective if one can build and demonstrate
offensive cyber capabilities. To put this in a clear manner: offensive cyber capabilities are an essential element for
the nation-states to succeed in their current and future international and security policies.3 Defence, resilience
and offense all contribute to the country’s overall ability to protect herself – one needs them all.
Within the next couple of years the world will experience more intentionally executed and demonstrated
cyberattacks while the development of offensive cyberweapons will become fiercer and publicly more acceptable.¶ Today, cyber capabilities are
essential for nation-states and armed forces that want to be treated as credible players. Cyberspace, the fifth dimension of
warfare, has already become an important arena of world politics, especially since we are living in a time in which the lines between war and peace have blurred.
The digital world has become a domain where strategic advantage can be either lost or won. ¶ To
succeed in the cyber domain is not merely a question of defense , even if we would like to think of it that way – at least not for
the nation-states. Naturally, defense capabilities have to be as preventive as possible in order to reduce the effectiveness of the adversary´s – whoever it might be –
cyber attack. However, despite the best defensive efforts, intrusions will occur. In the cyber domain, you must also be resilient, i.e. have the ability to withstand
attacks and failures, to mitigate harm, more so than what is needed in other domains. Creating cyber defense capabilities and resilience
are fairly easy for the public to accept. But they are not enough. Deterrence is also needed, that is, the
capabilities and policies to convince others not to launch a cyber attack against you. Deterrence will only
be effective if you can build and demonstrate offensive cyber capabilities. To put it clearly: cyber offensive
capabilities are an essential element for nation-states to succeed in the current and future reality of
both international and security policies. Defense, resilience, and offense contribute to a country’s
overall ability to protect itself. You need them all.¶ From nuclear to cyber deterrence¶ Deterrence theory was developed in the
1950s, primarily to address the new strategic challenges posed by nuclear weapons. During the Cold War, nuclear deterrence was able to keep the United States
and the Soviet Union in check. Nuclear deterrence was the art of convincing an enemy not to take a specific action
by threatening it with intolerable punishment or unacceptable failure. The theory worked well. ¶ Based on that logic, cyber deterrence
should play a similar role in the digitalized world . However, the anonymity, the advantage of attacks, and the global reach and
interconnectedness greatly reduce the efficiency of cyber deterrence. At the same time, there are suspicion and rumors surrounding the kind of capabilities others
have and how they are already using those capabilities.¶ In the kinetic world, it is much simpler to evaluate an opponent’s capabilities. It is typically quite easy to
accurately estimate how many tanks, interceptors, or submarines a given country possesses. Countries also openly expose their arsenal, in military parades for
example, or their operational skills, by organizing large military exercises. In
the logic of deterrence, even more important than
having the actual capability is the perception of having that capability.
Third is threat demonstration
Martin C. Libicki, 2013- “Brandishing Cyberattack Capabilities”. RAND.
http://www.rand.org/content/dam/rand/pubs/research_reports/RR100/RR175/RAND_RR175.pdf
Any state that would discourage other states from aggression in the physical or cyber world by brandishing cyberattack capabilities should first
ask itself whether the point of doing so is to look powerful or to make others look powerless. Although both aims are useful, the need to
concentrate on one message in a strategic communications campaign suggests the usefulness of making a choice. Emphasizing one’s
power has the advantage of inducing caution in all actual or potential opponents and deflects predators to easier
prey. It may also reflect well on other sources of national power. But trumpeting the weaknesses of others deters
troublesome states by reminding them of their vulnerabilities . It also deflects the accusations of self-promotion by
turning the focus toward potential victims. A bigger challenge is how to demonstrate cyberwar capabilities. The most obvious way to
demonstrate the ability to hack into an enemy’s system is to actually do it, leave a calling card, and hope
it is passed forward to national decisionmakers. If the attack can be repeated at will or if the penetration can be made
persistent, the target will be forced to believe in the attacker’s ability to pop into his system at any time. This should force the target to
recalculate its correlation of forces against the attacker. But as with many things in cyberspace, it sounds simpler than it is. Hinting at outright
success is difficult without conceding one’s participation in mischief in the first place and hence cyberwar’s legitimacy as a tool of statecraft,
something countries only started acknowledging in mid-2012. Targets of little value tend to be easy, but penetrating them is unimpressive.
Targets of some value are, for that reason, much harder, often because they are electronically isolated. Finally, the ability to penetrate a system
does not necessarily prove the ability to break a system. The latter requires not only breaking into sufficiently privileged levels but also figuring
out how to induce a system to fail and keep on failing. But penetration may be sufficiently scary in itself if the target leadership cannot discern
the difference between breaking into and breaking. Breaking a system is more hostile and more difficult than breaking into one. It requires an
understanding of what makes the system fail. Getting the desired results also requires shaping the attack so that those who administer the
system cannot detect the attack and repair the damage quickly .
Conveying to others the ability to bring their systems
down and keep them down is not easy. Intended audiences of such demonstrations may subsequently
identify the flaw that would allow such an attack and fix it. If so, for brandishing to work, cyberattack capabilities may
require repeated demonstration. Alternatively, a less hostile demonstration could be to manipulate the system but not to the point of harming
it, a fine line. Can brandishing help dissuade other states from pursuing a network-centric high-technology force to counter U.S. military
capabilities? The
best way to demonstrate the risk of network-centricity is to hack into military systems to
show their fragility (claiming responsibility is unnecessary; the point is to emphasize not U.S. power but
the vulnerability of the enemy’s network-centric systems). In other circumstances, making what is vulnerable clear may
be unnecessary, perhaps unwise. Every hack leads to fixes that make the next exploitation much harder. But the hint of an attack that leaves no
specific trace leaves nothing specific to fix. The
point is to convince others that they cannot protect their systems
even after paying close attention to their security. The vulnerability of less sophisticated states to
unseen manipulation maybe higher when the target does not really understand the technology behind
its own weapon systems. Often, the target’s lack of access to others’ source code and not having built
any of its own complicates figuring out what went wrong and how to fix it.
When China acts to coerce or deter, its actions may be misperceived by the United States as possible
preparation for regional or even global war. Consequently, an understanding of Chinese military actions
and signaling activities is necessary to determine, to the extent feasible, the purpose behind apparently
aggressive action.220 On the one hand, Chinese leaders might talk aggressively and act cautiously.221
On the other hand, Chinese deterrence strategy towards the United States might involve the
employment of counter-space weapons, which would be seen by the United States as aggression.
Chinese strategists believe that China must display the use of force or show its determination to use
force to compel the enemy to submit or refrain from taking hostile actions. In China’s view, warfighting
would follow the failure of coercive or deterrence efforts.222 These Chinese viewpoints should be the
basis for forming a sound U.S. space deterrence strategy against China. Words, policies, and threats
mean little to the Chinese leaders compared to the capabilities that they see arrayed against them and
the actions the United States may take in other domains to enforce deterrence. Actions and capabilities
will talk unambiguously. It is what China understands, and it is what U.S. leaders should understand can
be effective.
For U.S. space deterrence strategy to work, Beijing must care greatly about the threat the United States
poses and believe that Washington would be willing to execute it. As we read in Chapter 1, this is the
heart of deterrence. “A deterrence threat that misses what an opponent uniquely cares about most, or a
deterrent threat that an opponent does not believe because of its unique circumstances will not deter
much, whatever the threat or domain.”223 The challenge for U.S. defense planners is to understand
why China’s leaders might believe they are free to interfere with U.S. space systems and then design and
execute a deterrence strategy to change Beijing’s calculations. To create a credible threat, the United
States must develop and have on hand the means to cripple or destroy those high-value assets.
The High Cost of a War in Space Increased competition in space is reviving fears of a war there, one with
devastating consequences. Humanity depends on space systems for communication, exploration,
navigation and a host of other functions integral to modern life. Moreover, future breakthroughs may
await in space, including solar energy improvements, nuclear waste disposal and extraterrestrial mining.
A war in space would disable a number of key satellites, and the resulting debris would place vital orbital
regions at risk. The damage to the world economy could also be disastrous. In severity, the
consequences of space warfare could be comparable to those of nuclear war. What's more, disabling
key constellations that give early launch warnings could be seen as the opening salvo in a nuclear attack,
driving the threat of a wider conflagration. While the United States and other nations are taking measures to better prepare
for a potential war in space, their emphasis will likely remain on deterrence. This is an important notion to understand, not only for potential
U.S. enemies but also for the United States itself. For instance, it is conceivable that technological advancements in the coming decades could
allow the United States to recover militarily from a space clash more quickly than the ever-more space dependent China or Russia. In such a
scenario, the costs that a space war would have for the world as a whole might be enough to dissuade Washington from launching its own
space attack.
What's in Space
Since the beginning of the space age there have been some 4,500 space launches worldwide, and today there are 860 active
satellites in orbit, supporting a wide range of civil and military uses. The United States owns and operates roughly half of
those satellites. This space activity has resulted in millions of pieces of orbiting debris (see table ). There are two main sources of
orbital debris: (1) Routine space activity and the accidental breakup of satellites and stages placed in
orbit by such activity; (2) The testing or use of destructive anti-satellite (ASAT) weapons that physically
collide with satellites at high speed (also known as "kinetic energy ASATs"). The international community
is attempting to reduce the first category by developing strict guidelines to limit the debris created as a result of
routine space activities. These guidelines appear to be working and can, with strict adherence, significantly reduce the growth of this type of
debris. The destruction of satellites by ASAT
weapons can produce tremendous amounts of orbital debris: the
destruction of a single large satellite such as a U.S. spy satellite could by itself double the total amount
of large debris currently in low earth orbit (LEO), where nearly half of current satellites reside. There are currently
no international restrictions on the testing or use of military systems intended to destroy satellites .
n83 In LEO, a
marble-sized debris fragment can collide with satellites "with about the
exceeding just one centimeter can be disastrous.
same energy as a one ton safe dropped from the top of a five story building." n84 When these fragments
collide, the quantity of debris increases. This prospect is compounded if each nation, in the long-term future, rationally takes
advantage of the space commons and introduces its own weapons systems. Ultimately, these collisions could lead to a chain
reaction, creating a halo of debris and making space virtually unusable for peaceful purposes, such as
communications and GPS satellites. n85 Furthermore, space debris could harm or destroy current military space
applications and thus actually compromise the use of space for national security purposes. Steven Mirmina, a
senior attorney with NASA, asserts, "Maintaining the environment of outer space for future use may also be considered an issue of national
security. If certain orbits in outer space become so laden with debris that they are no longer usable, the U.S. may encounter difficulty in
achieving some of its national security goals." n86 In addition to irreparably damaging the space environment and inhibiting peaceful [*70]
space activities, damage to space will also likely cause
harm to Earth's environment because Earth and outer space are
intricately connected. n87 Eventually, collisions
of debris could produce so much dust that a lasting twilight will
cast over the Earth, shrouding the planet in a haze of metallic pollution. n88 Moreover, the mere existence of space
weapons increases the potential for their use in space in the future. Warfare in space could entomb the Earth, creating a hazardous space
environment. n89 One pair of scholars remarks that "scientists need to emphasize that a war in space could create a battlefield that will last
forever, encasing
our entire planet in a shell of whizzing debris that will thereafter make[s] space near the
Earth highly hazardous for peaceful as well as military purposes." n90