Page 160 - Cyber Defense eMagazine January 2024
P. 160
increased bandwidth, cybersecurity, resilience, and interoperability among the U.S. and its international
partners.
Why SATCOM cybersecurity is critical
Satellite operations are built on memory, compute and communications infrastructures. These systems
rely on microelectronics and circuitry and are increasingly connected to the internet. As a result, both in-
orbit satellites and their ground operations may contain network vulnerabilities that bad actors can exploit.
If a malicious actor successfully deployed a phishing or ransomware attack to gain control of a network
of terrestrial-based stations that are communicating commands to a satellite constellation, the attackers
could issue commands to alter a satellite’s telemetry, control, memory and content. From there, the
attackers could use their own wireless uplink to mimic command and control signals to targeted satellites
completely taking over a target satellite.
With satellites now responsible for critical functions such as military communications, national defense
systems, missile launch detection, aircraft navigation services and much more, such an attack could have
seismic consequences. It’s imperative that the U.S. government continue to invest in a system such as
PATS and prioritize international cooperation with our allies to improve global SATCOM security.
Bolstering satellite and ground system cybersecurity postures
Comprehensive SATCOM security requires diligence and dedication to ensure systems are kept up to
date; however, this investment is well worth it to avoid the potentially severe outcome of a cyberattack.
Legacy systems are a primary hurdle that engineers and IT professionals must overcome when striving
to secure satellite constellations and ground systems. Many satellites that were engineered decades ago
are still in-orbit and being used today, however, the notion of a cyberattack against a satellite was
considered impossible when those systems were developed and launched. Therefore, few safeguards
were put in place to defend against cyberattacks.
While the ability to push upgrades via software is inherent to each spacecraft’s operating system, it is
important to realize that comprehensive security is more than just a piece of software and should include
an architecture that involves authentication layers and encryption. Even the ground control data link to
the satellite can potentially be compromised with the limited encryption used in legacy SATCOM systems.
However, the ability to provide a software upgrade and add layers of security to the legacy satellite itself
is often limited when the satellite utilizes a first or second-generation microprocessor, whereas modern,
advanced cybersecurity software systems require a fifth or sixth generation processor. As such, it’s
imperative to invest in and protect the numerous servers and command controls on the ground. To defend
the ground base network and provide a more sophisticated level of security, it’s critical to ensure the
entire architecture has the authentication, encryption and different layers of protection necessary to deter
and defend against bad actors. With each of those security layers receiving updates against emerging
threats.
Cyber Defense eMagazine – January 2024 Edition 160
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.