<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Trevor’s Blog: Space Strategy]]></title><description><![CDATA[Info about the most recent developments in Space Strategy]]></description><link>https://trevor-barnes.com/s/space-strategy</link><image><url>https://substackcdn.com/image/fetch/$s_!4Ems!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5a60147-95d5-428a-8ced-88ab3a250b8a_608x608.png</url><title>Trevor’s Blog: Space Strategy</title><link>https://trevor-barnes.com/s/space-strategy</link></image><generator>Substack</generator><lastBuildDate>Sat, 11 Apr 2026 05:58:02 GMT</lastBuildDate><atom:link href="https://trevor-barnes.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Trevor Barnes]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[trevorbarnes91@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[trevorbarnes91@substack.com]]></itunes:email><itunes:name><![CDATA[Trevor Barnes]]></itunes:name></itunes:owner><itunes:author><![CDATA[Trevor Barnes]]></itunes:author><googleplay:owner><![CDATA[trevorbarnes91@substack.com]]></googleplay:owner><googleplay:email><![CDATA[trevorbarnes91@substack.com]]></googleplay:email><googleplay:author><![CDATA[Trevor Barnes]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Can Procurement Reform Fix the Pentagon’s “Backwards Culture”? Pete Hegseth’s Bold Bet]]></title><description><![CDATA[Why the new Defense Secretary&#8217;s commercial-first revolution might succeed where decades of reform have failed&#8212;and why it still won&#8217;t be enough]]></description><link>https://trevor-barnes.com/p/can-procurement-reform-fix-the-pentagons</link><guid isPermaLink="false">https://trevor-barnes.com/p/can-procurement-reform-fix-the-pentagons</guid><dc:creator><![CDATA[Trevor Barnes]]></dc:creator><pubDate>Wed, 26 Nov 2025 19:57:51 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="3365" height="1861" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1861,&quot;width&quot;:3365,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;flying black f14 tomcat in sky&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="flying black f14 tomcat in sky" title="flying black f14 tomcat in sky" srcset="https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1519073147904-23e655032ea3?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxfHxmMTV8ZW58MHx8fHwxNzY0MTg2OTU3fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@the_don_photography">DON JACKSON-WYATT</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>When Defense Secretary Pete Hegseth stood before a room of defense industry CEOs in November 2025, his message was blunt: &#8220;We&#8217;re going to make defense contracting competitive again. Those who are too comfortable with the status quo to compete are not going to be welcome.&#8221;</p><p>It was a declaration of war&#8212;not against America&#8217;s adversaries, but against the Pentagon&#8217;s own procurement culture. And if you&#8217;ve been following defense acquisition for any length of time, you might be forgiven for rolling your eyes. After all, we&#8217;ve heard this song before. Multiple times. For decades.</p><p>But here&#8217;s what makes Hegseth&#8217;s reform push different: it&#8217;s not just another bureaucratic reshuffling. It&#8217;s a frontal assault on what he calls the Pentagon&#8217;s &#8220;backwards culture&#8221;&#8212;one that rewards schedule overruns, prioritizes paperwork over battlefield needs, and has turned defense contractors into risk-averse partners more focused on process compliance than delivering cutting-edge capabilities.</p><p>The question isn&#8217;t whether the Pentagon&#8217;s procurement system is broken. Everyone agrees it is. The question is whether Hegseth&#8217;s commercial-first revolution can succeed where Robert McNamara, David Packard, and countless others have failed&#8212;and whether fixing procurement is even enough to solve the deeper cultural rot.</p><h2>The Backwards Culture Problem</h2><p>Let&#8217;s start with what we&#8217;re actually trying to fix. The Pentagon&#8217;s procurement culture isn&#8217;t just inefficient&#8212;it actively rewards the wrong behaviors.</p><p>Consider this stunning admission from Lockheed Martin CEO Jim Taiclet earlier this year: &#8220;We don&#8217;t have any must-win programs with Lockheed Martin anymore.&#8221; Think about that for a moment. The nation&#8217;s largest defense contractor is openly saying it won&#8217;t take on programs where failure could be catastrophic for national security, simply because the Pentagon&#8217;s contracting approach makes such programs too risky.</p><p><strong>This is the backwards culture in action.</strong> When your biggest suppliers are more concerned about protecting their margins than delivering critical capabilities, you&#8217;ve created a system that prioritizes financial security over mission success.</p><p>The root of the problem lies in decades of what experts call &#8220;pendulum swings&#8221; between different contracting philosophies. Fixed-price contracts were supposed to shift risk to contractors and save taxpayer money. But as Northrop Grumman&#8217;s CEO Kathy Warden explained in a recent earnings call, her company has &#8220;passed on some high-profile programs as a result of the risk balance that the customer put forward.&#8221; Boeing&#8217;s $7 billion in overruns on a $4.9 billion KC-46 tanker contract shows why contractors are gun-shy.</p><p>Meanwhile, cost-plus contracts&#8212;which guarantee contractors their costs plus a fee&#8212;remove the financial incentive to control expenses. It&#8217;s a classic Catch-22: fixed-price contracts drive away bidders, while cost-plus contracts eliminate cost discipline.</p><p>But the cultural problem runs deeper than contract types. As Hegseth noted in his reform memo, the current system rewards &#8220;schedule overruns and backlogs&#8221; while prioritizing &#8220;process and paperwork over the urgent and evolving needs of forces in the field.&#8221; When program managers get promoted for following procedures rather than delivering results, you&#8217;ve created a culture where compliance matters more than capability.</p><h2>Hegseth&#8217;s Commercial-First Revolution</h2><p>Enter Hegseth&#8217;s radical prescription: flip the entire incentive structure by defaulting to commercial solutions and commercial-style competition.</p><p><strong>The core insight is elegant:</strong> instead of assuming military requirements are so unique that only bespoke, defense-specific solutions will work, start with the assumption that commercial technologies can meet most needs faster and cheaper. Only deviate from commercial solutions when absolutely necessary.</p><p>This isn&#8217;t just about buying more commercial products. It&#8217;s about fundamentally changing how the Pentagon thinks about requirements and acquisition. Hegseth&#8217;s reforms include several game-changing elements:</p><p><strong>Portfolio Acquisition Executives</strong> will replace the traditional Program Executive Office structure. Instead of managing individual programs in isolation, these new executives will oversee entire capability portfolios, with authority to shift funding between programs based on performance and urgency. Their compensation will be tied to delivery speed, competition levels, and mission outcomes&#8212;not process compliance.</p><p><strong>Speed as the primary metric</strong> represents a philosophical revolution. For decades, the Pentagon has optimized for cost control, risk mitigation, and regulatory compliance. Hegseth&#8217;s approach explicitly accepts trade-offs in cost and perfection to accelerate fielding timelines. The new mantra: &#8220;good enough now&#8221; beats &#8220;perfect eventually.&#8221;</p><p><strong>Time-indexed incentives</strong> will reward contractors for early delivery and penalize delays. This creates a direct financial incentive for speed&#8212;something notably absent from traditional defense contracts.</p><p><strong>The Economic Defense Unit</strong> represents perhaps the most innovative element: a new organization designed to deploy capital through grants, loans, and investment partnerships, blurring the lines between government procurement and venture capital. This could unlock private investment in defense technologies while reducing government risk.</p><p>The early signs are promising. Even before formal implementation, the Space Force has demonstrated the potential of this approach, using fixed-price contracts and commercial competition to dramatically reduce satellite costs and delivery times.</p><h2>Space Force Leads, Congress Follows</h2><p>The Space Force has become the poster child for acquisition reform, and for good reason. Frank Calvelli, the service&#8217;s acquisition chief, has championed fixed-price contracting as a way to &#8220;add a level of discipline, prevent the constant rethinking of programs and scope changes with each yearly budget build, avoid changes from cost re-estimating, stop requirement changes and promote competition from more commercial-like/non-traditional space companies.&#8221;</p><p>The results speak for themselves. Space Force programs are consistently delivering faster and cheaper than traditional acquisition programs, largely because they embrace commercial technologies and processes from the start.</p><p><strong>Congressional alignment</strong> provides crucial political cover for Hegseth&#8217;s reforms. The bipartisan SPEED Act (Streamlining Procurement for Effective Execution and Delivery) includes provisions for requirements process overhaul, commercial technology emphasis, and efficiency over regulation. The Senate&#8217;s FORGED Act (Fostering Reform and Government Efficiency in Defense) goes even further, calling for the elimination of dozens of obsolete regulations and requiring commercial-first acquisition strategies.</p><p>This bipartisan support is significant because it addresses one of the key failure modes of past reform efforts: lack of sustained political backing when things inevitably go wrong.</p><p>Arnold Punaro, a former Senate Armed Services Committee staff director, calls Hegseth&#8217;s plan &#8220;without question, the most sweeping reforms and changes in the way the Department of Defense determines requirements, acquires those requirements, budgets for those requirements, and deals with the industrial base of any we&#8217;ve seen in 50 years.&#8221;</p><h2>The Ghost of McNamara&#8217;s Failures</h2><p>But here&#8217;s where history offers a sobering lesson. Every generation of Pentagon leaders discovers the acquisition system is broken and announces sweeping reforms to fix it. Most fail&#8212;not because their diagnoses are wrong, but because bureaucratic systems have remarkable immune responses to change.</p><p><strong>Robert McNamara&#8217;s experience</strong> is particularly instructive. In the 1960s, McNamara centralized defense management, introduced the Planning Programming and Budgeting System (PPBS), created rigorous source selection processes, and established new oversight organizations. Sound familiar?</p><p>Many of McNamara&#8217;s innovations survived&#8212;PPBS remained virtually unchanged until 2001, and the organizations he created (Defense Contract Audit Agency, Defense Contract Administration Service) persist today, albeit with different names and missions. But the reforms didn&#8217;t solve the core problems. McNamara&#8217;s own tenure saw massive overruns on programs like the C-5A and F-111.</p><p><strong>The pattern is depressingly consistent:</strong> well-intentioned reforms get &#8220;severely modified&#8221; over time until they&#8217;re &#8220;virtually unrecognizable from their original form.&#8221; McNamara&#8217;s Total Package Procurement policy, designed to control costs through fixed-price contracts, was abandoned by the Nixon administration when engineering change proposals and implementation failures made the fixed-price constraint meaningless.</p><p>The bureaucratic survival instinct is powerful. As one Pentagon veteran noted, &#8220;Only the agencies and organizations that McNamara created survived, though the latter in many cases with different names&#8212;which is a testimony to the tenaciousness of the bureaucracy when it comes to matters concerning its ongoing existence.&#8221;</p><p>This suggests that Hegseth&#8217;s reforms, however well-designed, will face the same institutional resistance that has neutered previous efforts. The question is whether the current reform push has elements that can overcome this historical pattern.</p><h2>Why Procurement Reform Isn&#8217;t Enough</h2><p>Even if Hegseth&#8217;s reforms succeed beyond all historical precedent, they won&#8217;t be sufficient to fix the Pentagon&#8217;s strategic problems. <strong>Procurement is a symptom, not the disease.</strong></p><p>The deeper issue is what defense strategist Andrew Marshall identified decades ago: &#8220;Technology makes possible the revolution, but the revolution itself takes place only when new concepts of operation develop.&#8221; In other words, buying better widgets faster doesn&#8217;t matter if you&#8217;re still thinking about warfare in outdated ways.</p><p><strong>The mismatch runs deep:</strong> The Pentagon&#8217;s structure remains &#8220;frozen in a Cold War mold&#8212;built for regional conflicts, linear escalation, conventional force-on-force fights, and prolonged procurement and modernization time horizons.&#8221; Meanwhile, today&#8217;s adversaries operate across geographic boundaries, coordinate below the threshold of war, and exploit the convergence of nuclear, cyber, space, and conventional capabilities.</p><p>Consider the current threat environment: Chinese satellites enable Russian targeting in Ukraine, Iranian drones support Russian operations, North Korean troops deploy alongside Russian forces, and all of this coordination happens in real-time across multiple domains. The U.S. response? Geographic combatant commands that can&#8217;t easily coordinate across regions, acquisition programs optimized for single-domain solutions, and decision-making processes designed for Cold War threat timelines.</p><p><strong>Strategic culture matters as much as procurement culture.</strong> As military historian Brent Ziarnick observed, &#8220;the strategic culture of the service is every bit as important as its weapons or operations.&#8221; You can&#8217;t procure your way out of conceptual obsolescence.</p><p>The Pentagon needs what some experts call &#8220;DoD 3.0&#8221;&#8212;a fundamental restructuring that goes beyond acquisition reform to address command structures, authorities, budgeting processes, and strategic concepts. Without these broader changes, even the best procurement reforms will be constrained by outdated operational concepts and institutional structures.</p><h2>The Verdict: Necessary But Not Sufficient</h2><p>So can procurement reform fix the Pentagon&#8217;s backwards culture? The answer is nuanced: <strong>it can catalyze meaningful change, but it can&#8217;t complete the transformation alone.</strong></p><p>Hegseth&#8217;s commercial-first approach has several advantages over previous reform attempts:</p><ul><li><p><strong>Clarity of vision:</strong> Commercial-first is easier to understand and implement than complex bureaucratic reorganizations</p></li><li><p><strong>Measurable outcomes:</strong> Speed and competition are concrete metrics that resist bureaucratic gaming</p></li><li><p><strong>External pressure:</strong> Market forces and commercial competition provide ongoing pressure for efficiency</p></li><li><p><strong>Congressional support:</strong> Bipartisan backing reduces political risk</p></li></ul><p><strong>But the historical record suggests three critical success factors:</strong></p><ol><li><p><strong>Sustained leadership commitment:</strong> Reforms fail when leadership changes and successors revert to old patterns</p></li><li><p><strong>Cultural reinforcement:</strong> New processes must be reinforced by training, personnel policies, and organizational incentives</p></li><li><p><strong>Operational integration:</strong> Procurement changes must be tied to new operational concepts and strategic frameworks</p></li></ol><p>The good news is that Hegseth seems to understand these requirements. The transformation of the Defense Acquisition University into the &#8220;Warfighting Acquisition University&#8221; signals attention to cultural change. The emphasis on portfolio management and operational integration shows awareness that procurement can&#8217;t be separated from strategy.</p><p><strong>The ultimate test will come when something goes wrong</strong>&#8212;and something always goes wrong in defense programs. Will senior leaders provide top cover for program managers who took smart risks that didn&#8217;t pay off? Will Congress resist the temptation to impose new oversight requirements after the first high-profile failure? Will the bureaucracy resist the urge to add &#8220;just a few more&#8221; process requirements for &#8220;better oversight&#8221;?</p><p>If Hegseth&#8217;s reforms can survive their first major crisis, they might actually stick. Combined with broader institutional changes&#8212;new operational concepts, updated command structures, and strategic culture evolution&#8212;they could represent the beginning of a genuine Pentagon transformation.</p><p>But if history is any guide, the bureaucracy is already working on ways to preserve the status quo under the guise of implementing change. The revolution in military affairs requires more than revolutionary procurement&#8212;it requires revolutionaries willing to keep fighting long after the first victory declarations.</p><p>The Pentagon&#8217;s backwards culture took decades to develop. Fixing it will require not just new processes, but new ways of thinking about warfare, competition, and institutional change. Procurement reform is a crucial first step. Whether it becomes the foundation for broader transformation or just another failed reform attempt will depend on leaders&#8217; willingness to keep pushing when the bureaucracy pushes back.</p><p><em>The stakes couldn&#8217;t be higher. With China, Russia, Iran, and North Korea increasingly coordinated in their challenges to American power, the U.S. can&#8217;t afford another generation of incremental procurement tinkering. The question isn&#8217;t whether the Pentagon needs to change&#8212;it&#8217;s whether it can change fast enough to matter.</em></p>]]></content:encoded></item><item><title><![CDATA[US-China Comparative Space Power Analysis - Tech Focused]]></title><description><![CDATA[In this report I conduct a comparative analysis of the spacepower capabilities of China and the United States, with a focus on technical prowess]]></description><link>https://trevor-barnes.com/p/us-china-comparative-space-power</link><guid isPermaLink="false">https://trevor-barnes.com/p/us-china-comparative-space-power</guid><dc:creator><![CDATA[Trevor Barnes]]></dc:creator><pubDate>Tue, 25 Nov 2025 18:38:51 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="4704" height="3136" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3136,&quot;width&quot;:4704,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;architectural photograph of lighted city sky&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="architectural photograph of lighted city sky" title="architectural photograph of lighted city sky" srcset="https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1474181487882-5abf3f0ba6c2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwyfHxjaGluYXxlbnwwfHx8fDE3NjQwNTU5Mjh8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@ly0ns">Li Yang</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p><strong>A Comparative Analysis of China and the United States Industrial Military Base</strong></p><p>There is a fictional account in the 1965 movie &#8220;Battle of the Bulge&#8221; in which a German military officer finds a chocolate cake for an American Soldier and comes to the sudden realization that the Germans have lost the war, as they will be unable to keep up with the far superior industrial base and logistic capacity of the Americans. While the Germans were starving in their own country, The US had the capacity to ship birthday cakes across the ocean to individual soldiers. This account is fictional, but it captured the mood of German soldiers during WW2 and highlighted that even the bravest and most experienced soldiers in the world cannot fight off superior logistics and supplies in a conventional war. B.H. Lidell Hart&#8217;s book &#8220;Strategy&#8221; while mainly highlighting the historical effectiveness in taking the indirect approach to warfare, could secondarily serve as an exercise and guide in attacking the &#8220;strategic heart&#8221; of the enemy, which in nearly all his examples translates to attacking supply lines and the industrial base (Hart, 2009). Whilst the underlying logic of military strategy remains consistent, the grammar has changed to fit the advancements in technology (Ziarnick, 2014, #L260). </p><p>To fully grasp the complexity of comparing the two largest space powers in the world we have to develop a framework in which to analyze them by. The United States military branches generally abide by the DIME model (Diplomatic, Informational, Military, and Economic) (Ziarnick, 2014, #L1450), which in general has been an accurate measure for judging the power base of any nation. China on the other hand has a secret methodology in which they rank countries and designate a score, whilst it is only possible to verify the algorithm used by the most elite members of the CCP, it could be assumed the rationale for their national initiatives are results of attempting to increase this number (Rolland, 2024). China has an increased focus on its manufacturing base, with Xi Jinping even stating that China will never deindustrialize (Wang &amp; Kroeber, 2025) and that a large part of that is access to space (Drozhashchikh, 2018, #176), so we can assume that industrial capacity is a large part of the power calculation.</p><p>The &#8220;Economic&#8221; pillar could arguably be the most valuable aspect of DIME, as mentioned earlier, economic power has the ability to dominate militaries, tear down political and diplomatic systems, and in conjunction with the &#8220;Informational&#8221; pillar we create an unshakeable foundation that the &#8220;Military&#8221; pillar stands on and bolsters the &#8220;Diplomatic&#8221; to have actual legitimacy. If the DIME pillars are used as a measure of power, with Economic and Informational (arguably) being the most relevant to power currently, this sets the standardized target for which a framework can start to be developed for a comparative analysis. It can now be assumed we are looking for strong indicators of optimizing for those pillars, and the most powerful technologies today have big data and AI as their backbone, which then build into &#8220;smart systems&#8221; like IoT connected sensors, devices, and manufacturing tooling. This tech then builds into advanced manufacturing concepts and capabilities such as additive manufacturing (i.e. 3D printing) and capacity to build computer chips, which flow back into the industrial base to build more smart systems. </p><p>Big Data systems are those defined as extremely large datasets that grow exponentially over time (<em>Big Data Defined: Examples and Benefits</em>) and usually are measured with the &#8220;3 V&#8217;s&#8221;; volume, variety, velocity, i.e. &#8220;how big is it?&#8221;, &#8220;how diverse is it?&#8221;, and &#8220;how fast is it being generated?&#8221; (Kleppmann, 2017, #45). The industrial foundation of big data is a &#8220;datacenter&#8221; which is a large building that houses large computer servers, either owned and wholly used by a business or can be rented out virtually such as with Amazon AWS or Microsoft Azure. Currently, the US has 53.7 Gigawatts of datacenter capacity to China&#8217;s 31.9, but the gap is rapidly closing as China has a significant amount of unused capacity (BN, 2025). McKinsey analysts predict this need to increase by 3.5x with most of the demand being driven by AI (Jean, 2025). With limitations in regards to power and environmental concerns of datacenters, businesses like Lonestar &amp; Phison have already landed a datacenter the size of a shoebox on the moon (Jean, 2025). Increasingly, the demand for datacenters will come from off world needs, too, and the US already has a head start. More importantly, datacenters are the biggest input and success criteria for the AI revolution. </p><p>AI is the next step in the technology revolution and has already caused military strategists to realize we are on the cusp of not just a Military Technical Revolution (MTR), but a Revolution in Military Affairs (RMA). Nowhere has this been more publicly prevalent than the PLA (Peoples Liberation Army) as they are starting to give over control of their satellite systems to AI for traffic management purposes (Husain, 2024). This confidence is unprecedented, as the smallest miscalculation could cause a cascading debris field to wipe out several hundred satellites and cause certain portions of orbits to be uninhabitable. Yet, China was able to successfully prove that AI can manage orbital dynamics with ease. This should cause great concern for the US military, even if we had humans capable of piloting satellites better than AI, the latency of transmission due to distance would cause a disadvantage that Chinese AI could utilize in an adversarial situation. The US has tried to stop the progress of Chinese AI by limiting exports of GPUs (Graphics Processing Unit) to China, but this has only made the Chinese more resourceful, producing AIs trained on a small number of apple computers, like DeepSeek, or AliBaba reducing GPU usage 82% with a new GPU pooling system (Chow, 2025). While China is catching up fast in the AI space and has shown to be far more resourceful than the US, it still lags in hardware and commercial prowess, but again, is catching up very quickly. </p><p>Just as there is the current &#8220;So what?&#8221;-isms about the actual impact of AI, given that Gartner in 2018 had previously estimated that 85% of AI projects would fail to produce any value by 2022 (Gartner, 2025), we are seeing poorly implemented AI get beaten out by companies that have successfully built either AI software or hardware get valued in the trillions of dollars. We are in the Edisonian phase of finding 1000 ways not to make a light bulb, and for better or worse are on the cusp of finding the correct way of doing it. </p><p>This will culminate in the digital world manipulating the physical. Digital Threads/Digital twins is a systems architecture that is more and more focused on implementing AI to manipulate and predict the creation of a digital version of the physical world. Ultimately, this will be a natural outcropping of using AI to efficiently manage real world systems. Early concepts of  &#8220;Golden Dome&#8221; will heavily utilize the MBSE (Model Based Systems Engineering) philosophy of a digital twin, being able to simulate real-time conditions digitally, analyze it, then take real-world actions based upon digital simulations (Kelly, 2025). Due to these big data and AI systems integrations, we are already seeing large-scale manufacturing changes, where companies like Relativity Space are 3D printing their rockets (<em>Terran R</em>). </p><p>A comparative analysis then comes down to what can be best summed up as Andrew Marshall&#8217;s prediction of future warfare, which is dependent on Precision Strike capabilities and &#8220;Informational&#8221; warfare (Jones, 2025, #L1833). While the US has the current upper hand with AI Hardware and Software, their constant export controls on China have made China more resilient and independent, and have not hurt them as much as both Biden and Trump have intended. China can also take advantage of the stability in their political leadership, given that Xi Jinping wholly controls the country and Chinese Communist Party. If there is a conflict between the US and China, it won&#8217;t start with a bang, but a silent destruction of defense software.</p><p><strong>References</strong></p><blockquote><p><em>Big Data Defined: Examples and Benefits</em>. (n.d.). Google Cloud. Retrieved November 23, 2025, from https://cloud.google.com/learn/what-is-big-data </p><p>BN, A. (2025, August 3). <em>U.S. and China Carry the Weight of Global Data Center Growth</em>. Digital Information World. https://www.digitalinformationworld.com/2025/08/us-and-china-carry-weight-of-global.html </p><p>Chow, V. (2025, October 18). <em>Alibaba Cloud claims to slash Nvidia GPU use by 82% with new pooling system</em>. South China Morning Post. https://www.scmp.com/business/article/3329450/alibaba-cloud-claims-slash-nvidia-gpu-use-82-new-pooling-system </p><p>Drozhashchikh, E. (2018, November 8). China&#8217;s National Space Program and the &#8220;China Dream&#8221;. <em>Astropolitics</em>, (16), 175-186. 10.1080/14777622.2018.1535207 </p><p>Gartner. (2025, February 13). <em>Gartner Says Nearly Half of CIOs Are Planning to Deploy Artificial Intelligence</em>. Gartner. https://www.gartner.com/en/newsroom/press-releases/2018-02-13-gartner-says-nearly-half-of-cios-are-planning-to-deploy-artificial-intelligence </p><p>Hart, B. H. L. (2009). <em>Strategy</em>. Editorial Benei Noaj. </p><p>Husain, A. (2024, November 14). <em>China&#8217;s Fast Growing Military Space Capabilities</em>. Forbes. https://www.forbes.com/sites/amirhusain/2024/11/14/chinas-fast-growing-military-space-capabilities/? </p><p>Jean, S. (2025, August 18). <em>The future of data storage? Look up</em>. The Space Review. https://www.thespacereview.com/article/5043/1 </p><p>Jones, S. G. (2025). <em>The American Edge: The Military Tech Nexus and the Sources of Great Power Dominance</em>. Oxford University Press, Incorporated. </p><p>Kelly, K. (2025, August 26). <em>Aerial defense 2.0: Why speed, scale and survival define the Golden Dome era</em>. SpaceNews. https://spacenews.com/aerial-defense-2-0-why-speed-scale-and-survival-define-the-golden-dome-era </p><p>Kleppmann, M. (2017). <em>Designing Data-intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems</em>. O&#8217;Reilly Media. </p><p>Rolland, N. (2024, September 12). &#8220;Positioning&#8221; China: Power and Identity. <em>Mapping China&#8217;s Strategic Space</em>. https://strategicspace.nbr.org/positioning-china-power-and-identity/ </p><p><em>Terran R</em>. (n.d.). Relativity Space. Retrieved November 23, 2025, from https://www.relativityspace.com/terran-r </p><p>Wang, D., &amp; Kroeber, A. (2025, August 19). <em>The Real China Model: Beijing&#8217;s Enduring Formula for Wealth and Power</em>. Foreign Affairs. Retrieved November 12, 2025, from https://www.foreignaffairs.com/china/real-china-model-wang-kroeber </p><p>Ziarnick, B. (2014). <em>Developing National Power in Space: A Theoretical Model</em>. McFarland, Incorporated, Publishers. </p></blockquote>]]></content:encoded></item><item><title><![CDATA[NASA is falling behind in the Race to the Moon]]></title><description><![CDATA[NASA is on track to lose the race to the moon, allowing China and India to take prime territory]]></description><link>https://trevor-barnes.com/p/nasa-is-falling-behind-in-the-race</link><guid isPermaLink="false">https://trevor-barnes.com/p/nasa-is-falling-behind-in-the-race</guid><dc:creator><![CDATA[Trevor Barnes]]></dc:creator><pubDate>Fri, 24 Oct 2025 18:33:23 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="3296" height="3809" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3809,&quot;width&quot;:3296,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;photo of moon&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="photo of moon" title="photo of moon" srcset="https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1446941611757-91d2c3bd3d45?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw1fHxtb29ufGVufDB8fHx8MTc2MTIxNDMzN3ww&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@nasa">NASA</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>NASA&#8217;s cost and schedule headwinds on Artemis&#8212;centered on SLS and Orion&#8212;are now strategic risks, not mere programmatics. Even NASA&#8217;s leadership has flagged affordability, noting that &#8220;at $4 billion a launch, it becomes very challenging to have a moon program,&#8221; a tension between politics and economics that keeps widening.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://trevor-barnes.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trevor&#8217;s Substack is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Low flight rates compound risk. NASA&#8217;s independent safety advisors have repeatedly warned that programs with infrequent launches&#8212;explicitly including SLS and Orion&#8212;carry elevated safety and schedule exposure, while commercial systems learn faster through high cadence.</p><p>Former administrator Jim Bridenstine told Congress it is &#8220;highly unlikely that we will land on the Moon before China,&#8221; pointing at Artemis complexity and timelines. Current leadership has pushed back, but the underlying economics and tempo remain unresolved.</p><p>Meanwhile, China is executing a tight, purpose-built lunar stack. The Long March 10 has completed a seven-engine static fire toward crewed lunar missions, alongside pad abort tests for the Mengzhou spacecraft and takeoff/landing trials for the Lanyue lander&#8212;hardware steps aligned to a landing before 2030.</p><p>This methodical, cost-focused approach&#8212;building lunar capability incrementally and designing a lunar rocket for the mission&#8212;contrasts with America&#8217;s politically constrained architecture choices. If the U.S. optimizes for &#8220;first,&#8221; China may still win by optimizing for &#8220;sustainable and affordable.&#8221;</p><p>Unless NASA pivots to lower-cost, higher-cadence pathways that leverage commercial innovation, Beijing&#8217;s patient, economically rational plan could put taikonauts on the surface first&#8212;and keep them there longer.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://trevor-barnes.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trevor&#8217;s Substack is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Will "Direct to Device" fuel the Commercial Space Boom?]]></title><description><![CDATA[Space Companies and Governments are starting to launch Constellation Communications Satellites at unprecedented speed]]></description><link>https://trevor-barnes.com/p/will-direct-to-device-fuel-the-commercial</link><guid isPermaLink="false">https://trevor-barnes.com/p/will-direct-to-device-fuel-the-commercial</guid><dc:creator><![CDATA[Trevor Barnes]]></dc:creator><pubDate>Fri, 17 Oct 2025 22:10:01 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="8000" height="6401" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:6401,&quot;width&quot;:8000,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a satellite in orbit with the earth in the background&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a satellite in orbit with the earth in the background" title="a satellite in orbit with the earth in the background" srcset="https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1710267224163-0ee7e0d7a7ce?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4fHxzYXRlbGxpdGV8ZW58MHx8fHwxNzYwNzM2MTE5fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@hubblespacetelescope">NASA Hubble Space Telescope</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>SpaceX recently entered into a $17B deal with EchoStar to purchase spectrum, decreasing the reliance on mobile providers to provide telecom to SpaceX customers<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>. This is a prudent business move for SpaceX and opens up the opportunity to provide 5G like speeds and services via satellite connected to terrestrial networks. From SpaceX&#8217;s humble beginnings as a reusable rocket company, we are starting to see a pattern that is matched by several other startup space companies that are building launch platforms. Not only are they going to provide launch, but also other opportunities for generating revenue from space systems, like 3D printing, manufacturing in outer space, cloud compute/storage, and space mining. These revenue opportunities are significantly more risky and complex and will have a smaller user base then communications arrays. That is why &#8220;Direct to Device&#8221; (D2D) provides the best opportunity for space companies and governments to generate revenue to explore more risky, but potentially more financially rewarding opportunities elsewhere in space.</p><p>Beside SpaceX, we are also seeing the Amazon Founder, Jeff Bezos, backed Blue Origin focus on developing a launch platform in New Glenn for Amazon&#8217;s Project Kuiper<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a>, which also promises to be a fast and reliable broadband/communications constellation and have already partnered with Jet Blue to provide free in-flight WiFi. <a href="https://substack.com/home/post/p-176450427">China</a> is also deploying their very own Guowang/Qianfan mega&#8209;constellation<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a> and will most likely start exerting more soft-power over the global south by providing free and reduced (and censored and closely monitored) internet, that will no doubt push and favor Chinese propaganda<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a>. Not to be left out, Europe has also joined the field with their IRIS<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a> (Interconnectivity and Security by Satellite) which they claim &#8220;isn&#8217;t a mega-constellation&#8221;, but will serve the same purpose as Starlink/Kuiper/Guowang with the network being shared by commercial, civil, and military applications. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://trevor-barnes.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trevor&#8217;s Substack is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>What is interesting is that Apple will be funding<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a> 48 more Globalstar satellites that underpins their SOS network. If we start to see more phone hardware providers cut more deals to fund their own infrastructure with mega-constellation providers, we could see a crash in the traditional telecom companies that continue to increase billing without increasing their underlying infrastructure or service. Rural customers are already starting to sing the praise of SpaceX&#8217;s Starlink as a way to get affordable, high-speed internet in areas that traditionally were reliant on slow and overpriced cell provider networks. </p><p>Consider also that these satellite communications providers have also clashed with the more totalitarian regimes (such as Iran, China, Russia) given that they are able to provide censored material directly to the phone user without passing through the traditional nationwide firewalls that would block them. While these regimes have non-kinetic ASAT (Anti Satellite) options, even the most stringent of regimes is not looking to risk destroying or altering the space infrastructure of other nations, especially that of the United States, but that has changed drastically in recent years as China has gained more international legitimacy. We may see a very near future in which the most damaging weapon the US can provide against a regime is secure, non-firewalled devices with unlimited internet access to an enemies disaffected population. </p><p>If space based hybrid communications networks end up only capturing 1% of the worldwide revenue from telecom companies, it would still be $15.3 billion dollars. In reality, we are looking at a much higher number as space companies build and refine more of their products and infrastructure. It is getting cheaper, easier, and more reliable to launch space systems and we should expect rapid innovation to come along with that, especially when Space companies start capturing some of the annual $1.53 trillion in telecommunications revenue<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a>.</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>https://spacenews.com/whats-next-for-direct-to-device-after-spacexs-blockbuster-spectrum-deal/</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>https://www.aboutamazon.com/what-we-do/devices-services/project-kuiper</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>https://spacenews.com/china-promotes-direct-to-device-satellite-services-with-new-guidelines-and-licensing/</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>https://www.foreignaffairs.com/china/real-china-model-wang-kroeber</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>https://spacenews.com/scaling-up-iris%C2%B2-to-meet-evolving-demands/</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>https://spacenews.com/whats-next-for-direct-to-device-after-spacexs-blockbuster-spectrum-deal/</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>https://www.deloitte.com/us/en/insights/industry/technology/technology-media-telecom-outlooks/telecommunications-industry-outlook-2025.html</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Are we in a Space Race with China?]]></title><description><![CDATA[NASA has been at the forefront of American Spacepower and exploration for decades, but there is also a retreat from funding NASA and related advisory committees of private and public sector leaders that help push forward progress in space for America (Foust, 2025).]]></description><link>https://trevor-barnes.com/p/are-we-in-a-space-race-with-china</link><guid isPermaLink="false">https://trevor-barnes.com/p/are-we-in-a-space-race-with-china</guid><dc:creator><![CDATA[Trevor Barnes]]></dc:creator><pubDate>Fri, 17 Oct 2025 20:50:40 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/543933b5-3a9e-4201-b6f5-01bfa857b299_2000x1333.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zwdF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zwdF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zwdF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zwdF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zwdF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zwdF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg" width="1456" height="970" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:970,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:253041,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://trevorbarnes91.substack.com/i/176450427?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zwdF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zwdF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zwdF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zwdF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa18589a-ae58-4904-981f-75317dbd0d0a_2000x1333.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>NASA has been at the forefront of American Spacepower and exploration for decades, but there is also a retreat from funding NASA and related advisory committees of private and public sector leaders that help push forward progress in space for America (Foust, 2025). This isn&#8217;t to say that America is not attempting to shape International Relations in its own image and hold on to its hegemon, Trump believes he can take a more &#8220;Realpolitik&#8221; approach to diplomacy (Dolman, 2002, L#3894) and is applying old school, brown water tactics to spacepower (Dolman, 2012, #82) with the advent and creation of the &#8220;Golden Dome&#8221; space defense system, but this does not, a &#8220;Space Race&#8221; make.</p><p>What about from the Chinese perspective? China has been a silent and background member of the first (and arguably only) Space Race since nearly the USA and USSR have been a part of it. China&#8217;s space program began when scientist Qian Xuesen was returned to China from the United States (Drozhaschikh, 2018, #176). One of the major differences between China and the USSR/USA was that China viewed space systems (like satellites) as a way to modernize and develop their economy, especially when it came to communications that were able to enable government operations and education and also observational satellites to monitor weather and optimize agriculture (Drozhaschikh, 2018, #178). In modern times there has been a drastic uptick in the amount of space related development in China, but it is not necessarily related to a &#8220;Space Race&#8221;. China sees these developments as a natural evolution of their earlier space objectives of increasing national prestige and power from a geographic and economic standpoint (Husain, 2024). This rapid development can also be attributed to the rise in big data and AI systems that are revolutionizing how fast complex systems can be built and integrate hardware with software and China has invested heavily in this infrastructure (Wang &amp; Kroeber, 2025). This has inevitably bled over into their military strategy and technology, and has become an integral part of how the PLA views its operations (Husain, 2024). US restrictions on China to prevent their AI technology from becoming on par with US AI technology has actually caused China to become more resourceful in developing AI, which in turn has given them an advantage in resource constrained space environments where every watt of power used counts (Wang &amp; Kroeber, 2025). America only has a 15% energy reserve while China has a 100% energy reserve that could continue to power high tech and energy hungry AI resources in the rapidly developing sector (Horowitz &amp; Kahn, 2025).</p><p>It is better to view the current competition of China vs the USA not as a &#8220;Space Race&#8221; but as the natural output of a rising power compared to a declining power, or at least one that is looking to hold onto the post Cold War 20th century power structure in which it enjoyed its hegemonic advantage (Carlson, 2020, L#131). China on the other hand has the advantage of time on its side, it is investing heavily into modernizing its infrastructure to combat future issues of energy consumption of data centers and network farms, both terrestrially and in space with Space Based Solar Power (Carlson, 2020, L#621), it is competing with GLONASS and GPS with its BeiDou constellation (Drozhaschikh, 2018, #178). These could hardly be considered elements of a &#8220;Space Race&#8221; as defined earlier, these are investments, at least on the part of China, while America&#8217;s reasons for space exploration could potentially fall within the bounds of a &#8220;Space Race&#8221;.</p><p>A main point that could define America&#8217;s space initiatives as engaging in a race is NASA acting administrator and Transportation Secretary Sean Duffy making a point of timelines being dependent on when China plans to land on the moon (Foust, 2025). America is running a short sprint alongside China&#8217;s marathon and pretending like we are ahead. China has been making these plans since 1949 and have been hitting their milestones regularly since that time (Pillsbury, 2016, #19). America has aimed to slow down Chinese progress industrially, but has ultimately accidentally done the opposite by making them more resourceful.</p><p>America does have reason to be concerned about Chinese Space Supremacy, so even if deadlines are arbitrary, they help to establish goals. Even the more innocuous technologies like communications systems and integrated networks are becoming more prevalent in the determination of great powers. China is aiming to deploy a communications array (Guowang LEO network) that could break SpaceX&#8217;s monopoly on providing global satellite based internet access and provide it at a lower cost or even for free (Jones, 2025). Bill Clinton once stated controlling the internet is like &#8220;trying to staple jello to a wall&#8221;, but China has actually found the internet to be an amazing tool for control, social manipulation, and surveillance, and building out LEO satellite networks essentially means it can take its surveillance state worldwide (Wang &amp; Kroeber, 2025).</p><p>There is a potential argument that America in certain aspects is in a Space Race against the shadow of China and is seeing ground ceded on a daily basis, but what is interesting is that this ground isn&#8217;t being ceded in the Space domain, but the domain of Software, Hardware, Cybersecurity, Big Data, AI, and advanced manufacturing. All of these are the bellwether of a dominant future world economy where space infrastructure will be like the advent of littorals to sail, coal to steam, oil to combustion, or Ford to the automobile. China is in a goal oriented holistic march towards regional dominance based on well crafted decades old plans and are slowly, but surely starting to surpass America.</p><h2>References</h2><p>Arms Race: Definition, Cold War &amp; Nuclear Arms | HISTORY. (2009, October 14). History Channel. Retrieved October 2, 2025, from https://www.history.com/articles/arms-race</p><p>Carlson, J. (2020). Spacepower Ascendant: Space Development Theory and a New Space Strategy. Independently Published.</p><p>Dolman, E. C. (2002). Astropolitik: Classical Geopolitics in the Space Age. Frank Cass.</p><p>Dolman, E. C. (2012, Spring). New Frontiers, Old Realities. Strategic Studies Quarterly, 6(1), 78-96. http://www.jstor.org/stable/26270791</p><p>Drozhaschikh, E. (2018, November 8). China&#8217;s National Space Program and the &#8220;China Dream&#8221;. Astropolitics, 16(3), 175-186. 10.1080/14777622.2018.1535207</p><p>Faulconer, W. (2025, August 22). NASA needs bold leadership &#8212; or we'll be watching on TV while Beijing lands on the moon. SpaceNews. Retrieved October 10, 2025, from https://spacenews.com/nasa-needs-bold-leadership-or-well-be-watching-on-tv-while- beijing-lands-on-the-moon/</p><p>Foust, J. (2025, August 15). FAA removes membership of space transportation advisory committee. SpaceNews. Retrieved October 1, 2025, from https://spacenews.com/faa- removes-membership-of-space-transportation-advisory-committee/</p><p>Foust, J. (2025, September 5). Duffy pushes back against testimony that NASA is falling behind China in lunar exploration. SpaceNews. Retrieved October 10, 2025, from https://spacenews.com/duffy-pushes-back-against-testimony-that-nasa-is-falling-behind- china-in-lunar/</p><p>SPST563 China&#8217;s Space Program - Comparative Essay 1 Trevor Barnes</p><p>Horowitz, M. C., &amp; Kahn, L. (2025, September 26). The Cost of the AGI Delusion: By Chasing Superintelligence, America Is Falling Behind in the Real AI Race. Foreign Affairs. Retrieved October 10, 2025, from https://www.foreignaffairs.com/united- states/cost-delusion-artificial-general-intelligence</p><p>Husain, A. (2024, November 14). China&#8217;s Fast Growing Military Space Capabilities. Forbes. Retrieved October 3, 2025, from https://www.forbes.com/sites/amirhusain/2024/11/14/chinas-fast-growing-military-space- capabilities/</p><p>Jones, A. (2025, September 2025). spacenews.com/china-boosts-broadband-iot-and- weather-satellite-fleets-with-flurry-of-launche. SpaceNews. spacenews.com/china- boosts-broadband-iot-and-weather-satellite-fleets-with-flurry-of-launche</p><p>Miller, G. D. (2023). Sun Tzu in Space: What International Relations, History, and Science Fiction Teach Us about Our Future. Naval Institute Press.</p><p>Pillsbury, M. (2016). The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower. St. Martin's Publishing Group.</p><p>Prescott, J., &amp; Gewirtz, J. (2025, September 29). China Goes on Offense: Beijing's Plans to Exploit American Retreat. Foreign Affairs. Retrieved October 3, 2025, from https://www.foreignaffairs.com/united-states/china-goes-offense</p><p>Sciutto, J. (2020). The Shadow War: Inside Russia's and China's Secret Operations to Defeat America. HarperCollins Publishers.</p><p>Wang, D., &amp; Kroeber, A. (2025, August 19). The Real China Model: Beijing's Enduring Formula for Wealth and Power. Foreign Affairs. Retrieved October 2, 2025, from https://www.foreignaffairs.com/china/real-china-model-wang-kroeber</p><p>SPST563 China&#8217;s Space Program - Comparative Essay 1 Trevor Barnes</p><p>What Was the Space Race? | National Air and Space Museum. (2023, August 23). National Air and Space Museum. Retrieved October 1, 2025, from https://airandspace.si.edu/stories/editorial/what-was-space-race</p><p>Zhao, M. (2019). Is A New Cold War Inevitable? Chinese Perspectives On US&#8211;China Strategic Competition. The Chinese Journal of International Politics, 371-394. 10.1093/cjip/poz010</p>]]></content:encoded></item><item><title><![CDATA[Reforming NASA]]></title><description><![CDATA[This is a response to the following article:]]></description><link>https://trevor-barnes.com/p/reforming-nasa</link><guid isPermaLink="false">https://trevor-barnes.com/p/reforming-nasa</guid><dc:creator><![CDATA[Trevor Barnes]]></dc:creator><pubDate>Tue, 29 Jul 2025 22:16:57 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5051ffab-06a6-4346-8d40-69b50c768e99_2000x2778.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p>This is a response to the following article:<br>spacenews.com/nearly-4000-nasa-employees-opt-for-voluntary-buyouts/</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dApz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76c49c74-837b-4eaa-89da-0dd260224194_2000x2778.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dApz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76c49c74-837b-4eaa-89da-0dd260224194_2000x2778.jpeg 424w, https://substackcdn.com/image/fetch/$s_!dApz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76c49c74-837b-4eaa-89da-0dd260224194_2000x2778.jpeg 848w, https://substackcdn.com/image/fetch/$s_!dApz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76c49c74-837b-4eaa-89da-0dd260224194_2000x2778.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!dApz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76c49c74-837b-4eaa-89da-0dd260224194_2000x2778.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dApz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76c49c74-837b-4eaa-89da-0dd260224194_2000x2778.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/76c49c74-837b-4eaa-89da-0dd260224194_2000x2778.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Reforming NASA&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Reforming NASA" title="Reforming NASA" srcset="https://substackcdn.com/image/fetch/$s_!dApz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76c49c74-837b-4eaa-89da-0dd260224194_2000x2778.jpeg 424w, https://substackcdn.com/image/fetch/$s_!dApz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76c49c74-837b-4eaa-89da-0dd260224194_2000x2778.jpeg 848w, https://substackcdn.com/image/fetch/$s_!dApz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76c49c74-837b-4eaa-89da-0dd260224194_2000x2778.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!dApz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76c49c74-837b-4eaa-89da-0dd260224194_2000x2778.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>It would be interesting to see the breakdown of the demographics of those that have left NASA according to the article above. It mentions a significant portion of senior personnel leaving, but it would be good to see the roles and experience in an accurate breakdown. Considering NASA has been plagued by budget overruns and management challenges, this may or may not be a good thing. The performance NASA has been less than lackluster, so this may be a blessing in disguise. We have to keep in mind that the main push of NASA recently has been the Artemis program and returning man (woman?) to the moon, of which it seems we are falling behind China, and even India in this space (pardon the pun). This raises concerns about the future of the American Space program and liberal democracies place in a space-faring future. The geopolitical implications are significant. We can not have the likes of Russia and China dominating all of the prime spots on the moon, or being the first to start asteroid mining.</p><p>If NASA was supposed to be the world leader in space exploration, it might be a good thing that their funding is cut, but the question then becomes, what was cut and where will those funds go? If we are really losing top talent from NASA that are specialized in fields that are necessary for space exploration, maybe the many private corporations will pickup these talented individuals. While I do believe that the federal government should be funding and creating strategic direction for the future of space, we can also agree that the wrong people could be in place to do so, which will only exacerbate the failing NASA's programs. Strategic reforms are needed. A coherent national space strategy should be developed that breaks past NASA and military thinking.</p><p>It is important to measure the future of a space faring nation against the the Space Development Theory of Dr. Joshua Carlson as stated in his book [[Spacepower Ascendant]]. This breaks the development of national space strategy into different phases (they don't necessarily need to be concurrent but generally are); Exploration, Expansion, Exploitation, and Exclusion (Sovereignty). The issue with NASA is that it solely focuses on the exploration phase of Space Development Theory (SDT from here on out). If the exploration phase is not leading to expansion, exploitation, or exclusion then the value of the exploration is a sunk cost. We are simply throwing good after bad. The American people deserve a space program that actually benefits them. At this point in time, the molecular makeup of Pluto and studying its orbit to determine whether it is a planet or not is not a good use of resources.</p><p>This is why NASA should be focused explicitly on supporting commercial operations in space. Space companies should help guide the direction of NASA for mutual benefit of the American people. It could help to answer questions about orbital periods of asteroids and chemical compositions for mining operations, same with the moon. While projects like Voyager and the James Webb telescope help us to answer deep scientific questions, what is the real value they provide in return? NASA should act in a similar capacity to the FAA and NOAA, providing more regulatory guidance, traffic management, and operating information for commercial operations. NASA could also act as a more focused DARPA for space operations, or even be absorbed by DARPA, providing highly beneficial research for space exploration that would guide commercial company operations and strategies.</p><p>It is not a stretch to say that the American people have lost interest in NASA and landing some people on the Moon 60 years after we already did that is not going to spark any additional interest, and that is okay. NASA can fall into the background and act as a critical component for future space-faring operations as another (metaphorical) 3 letter agency.</p>]]></content:encoded></item><item><title><![CDATA[Securing Cyberspace in Space Systems -The Value of Information Security in Space Power]]></title><description><![CDATA[Securing Cyberspace in Space Systems: The Value of Information Security in Space Power]]></description><link>https://trevor-barnes.com/p/securing-cyberspace-in-space-systems-the-value-of-information-security-in-space-power</link><guid isPermaLink="false">https://trevor-barnes.com/p/securing-cyberspace-in-space-systems-the-value-of-information-security-in-space-power</guid><dc:creator><![CDATA[Trevor Barnes]]></dc:creator><pubDate>Thu, 12 Jun 2025 17:18:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2f11edfc-71df-4c43-b667-ab7330c86d65_2000x1334.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UtX-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820608ce-505b-4f2d-ba33-6ae2a5be7aa8_2000x1334.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UtX-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820608ce-505b-4f2d-ba33-6ae2a5be7aa8_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UtX-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820608ce-505b-4f2d-ba33-6ae2a5be7aa8_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UtX-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820608ce-505b-4f2d-ba33-6ae2a5be7aa8_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UtX-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820608ce-505b-4f2d-ba33-6ae2a5be7aa8_2000x1334.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UtX-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820608ce-505b-4f2d-ba33-6ae2a5be7aa8_2000x1334.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/820608ce-505b-4f2d-ba33-6ae2a5be7aa8_2000x1334.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Securing Cyberspace in Space Systems -The Value of Information Security in Space Power&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Securing Cyberspace in Space Systems -The Value of Information Security in Space Power" title="Securing Cyberspace in Space Systems -The Value of Information Security in Space Power" srcset="https://substackcdn.com/image/fetch/$s_!UtX-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820608ce-505b-4f2d-ba33-6ae2a5be7aa8_2000x1334.jpeg 424w, https://substackcdn.com/image/fetch/$s_!UtX-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820608ce-505b-4f2d-ba33-6ae2a5be7aa8_2000x1334.jpeg 848w, https://substackcdn.com/image/fetch/$s_!UtX-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820608ce-505b-4f2d-ba33-6ae2a5be7aa8_2000x1334.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!UtX-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820608ce-505b-4f2d-ba33-6ae2a5be7aa8_2000x1334.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p><strong>Securing Cyberspace in Space Systems: The Value of Information Security in Space Power</strong></p><p>Securing communications via cryptography has been around far longer than the computer has been, in fact most of the earliest documentation on ciphers and encryption are dated back to ancient history, most prominently the Caesar Cipher (Holden, 2017). The Caesar Cipher worked by shifting a letter a number of spaces in the alphabet (Military Dispatches Editorial, 2024). So a Caesar Cipher with an offset of 3 made the letter &#8216;A&#8217;&nbsp; become the letter &#8216;D&#8217;, therefor &#8216;Apple&#8217; became &#8216;Dssoh&#8217;. While this was effective in the ancient world, better techniques became required. A more modern example is during WWII where the German Enigma machines instituted a complex electro-mechanical device to encrypt their messages and made them nearly unbreakable (Military Dispatches Editorial, 2024). Assuming the historical necessity is carried forward to modern day, we would expect one of the backbones of military communications, space systems, would require the same level of secure communication.</p><p><strong>Background</strong></p><p>Clausewitz had come up with the theory around the &#8220;fog&#8221; and &#8220;friction&#8221; that is found in war (von Clausewitz, 2008). An important factor in the friction of war was the lack of information surrounding the enemy, the elements that cannot be easily measured when in the planning phase. It is what distinguishes what Clausewitz considered &#8220;real&#8221; war versus that of war &#8220;on paper&#8221;. Reducing the friction in war reduced the possibility of Clausewitz&#8217;s version of &#8220;chance&#8221; playing a part and allowing for operations to go as closed to planned as possible. To this end, Clausewitz stated that &#8220;accurate recognition&#8221; was one of the biggest frictions in war and that accurate intelligence is what increases accurate recognition (von Clausewitz, 2008).</p><p>While the &#8220;logic&#8221; of strategy used to define national power may be pointed out as a &#8220;Delta&#8221; configuration consisting of the Military, Economic, and Political points, the Pentagon has routinely used DIME (Diplomatic, Information, Military, and Economic) as a way to describe the core elements of national power (Ziarnick, 2015). Space power theorists have used DIME to extend their definition of Space Power Theory (SPT). It would be hard to find a situation in which the Military, Diplomatic, or Economic instruments of national power could exist without the Information instrument. Our modern world has made sure that the overwhelming majority of information is processed digitally, and nefarious actors look to exploit cyberspace. The complexity of cyberspace cannot be understated, the Pentagon has had 13 separate definitions (as of 2014) of cyberspace and this will likely increase as the landscape becomes ever more complex and developed (Singer, 2014). Another issue compounding this problem is the leaders responsible for creating laws and regulations around cyberspace did not grow up using computers, many don&#8217;t understand that if you have access to the internet, then it also has access to you. Adding in the complexity that is space systems on the already complex topic of cyberspace further exponentiates this problem of fundamentally grasping the various computer, electrical, physics, astronomy, engineering, mathematical, and cryptographic fundamentals needed to understand the system they are responsible for protecting.</p><p>The Gulf War in 1991 was widely believed to be the first &#8220;Space War&#8221; due to the advantages gained and the power projected through space in a foreign territory (Ahumada &amp; Del Canto Viterale, 2024). At the time, satellite communications was little understood by the Iraqi forces and thus there was no effort to intercept any communications, regardless, the going concern of satellite communications was the complexity in the system was the security, prioritizing function of the satellite instead (Ahumada &amp; Del Canto Viterale, 2024). This had drastically changed and by the time U.S. Forces had returned to Iraq, the remnants of the Iraqi Republican guard were spoofing American guided missiles to miss their targets with a decoy device built in China for only $25 (Pillsbury, 2016). One of the 5 major areas of Space Hybrid Operations is Cyber Operations (the rest being; Directed Energy Operations, Orbital Operations, Electronic Operations, and Economic Operations (Ahumada &amp; Del Canto Viterale, 2024)), yet as has been pointed out by Satellite Cybersecurity researchers, little attention is paid to the topic (Schalk et al., 2022). This has led smaller, less developed countries like Iran and North Korea have the means to attack our space systems via antagonistic cyber operations.</p><p><strong>Adversarial Threats to Space Systems</strong></p><p>Space systems as defined by space cybersecurity researcher, Gregory Falco, are &#8220;the assets that exists in suborbital or outer space or ground control systems, including launch facilities for these assets&#8221; (Falco, 2019). Space systems are the backbone of Command, Control, Communications, Computer, Intelligence, Surveillance, and Reconnaissance (C4ISR) capabilities for the military. Adversaries aiming to &#8220;level the playing field&#8221; against great powers have strong incentives to undermine these capabilities by damaging space systems (Pavur, 2021, p. 20). China has already implemented this strategy in their People&#8217;s Liberation Army (PLA) Strategic Support Forces (SSF) and have single responsibility for both counter-space weapons and offensive cyber operations (Pavur, 2021, p. 21). This is rather telling of the belief the Chinese have. This can only be interpreted as space and cyber being so necessarily interlinked that a single responsibility of command for both needs to be granted to a single authority within their military apparatus. China knows that America is highly dependent on its space systems and it is viewed as a critical system to attack to remove American power (Pillsbury, 2016). Without space systems America loses its GPS, surveillance, guided missiles, unmanned drones, and a lot more. China has even invented parasitic drone satellites that can attach to American satellites to either disable them or steal its information (Pillsbury, 2016).</p><p><strong>Table 1. Types of Counterspace Capabilities (Fanning et al., 2024)</strong></p><p>It could be stated that a cyber threat is no greater than a kinetic, non-kinetic, or electronic attack, but there is quite a large difference in the ends which leads one to believe that cyber will always be the first means of attack on a space system as viewed in Table 1. Firstly, kinetic attacks will require physical actions with known states or organizations that would be responsible for (or easily deduced as responsible) the attack and couldn&#8217;t be considered anything short of an act of war (especially when targeting a ground station). The cost to carry out these attacks would be very high, either in lives attacking ground stations, or monetarily in launch costs and space weapons development. There is also the cascade effect in which the destruction and resulting space debris from an attack could set off a chain reaction, also destroying the attackers satellites in space and even potentially making it impossible to travel to space. Secondly, Non-Kinetic attacks suffer from a lot of limitations of kinetic attacks, in which the cost is very high, especially in regards to nuclear attacks, and the cost of Directed Energy weapons is immense. Thirdly, the Electronic means while potentially harder to attribute, are not necessarily impossible, like in the case of Russia and spoofing GPS information in the Black Sea in 2017 (Falco 2019). Electronic attacks are non-permanent means of attacking a space system. This leaves the final form of attack that is arguably both quantitatively and qualitatively the best option to attacks a space system. The reason being, it is cheap, requires no domain knowledge, its very difficult to attribute the attack to a specific attacker, and you can choose how damaging the attack is. If you just need to get some information from the downlink of the satellite, the operator of the space system would be non the wiser (Pavur, 2021). Or if the space system is viewed as a threat that needs to be destroyed, you can brick the satellite to turn it into nothing more than a piece of useless space junk (Schalk et al., 2022).</p><p>With the establishment of cyber operations as the most approachable form of space systems attack and the evidence backed up in the form of PLA organizing their cyber-ops and space-ops under the SSF, it is prudent to look at the current state of the development of cyber operations in regards to developing national power in America. In fact, China disproportionately targets the cyber infrastructure of America precisely because of its reliance on critical infrastructure that depends on weakly secured cyber-physical systems (Pillsbury, 2016). China calls this their &#8220;Assassin&#8217;s Mace&#8221; and link naval power directly to space power and in the future plan on exploiting weaknesses in space systems to exploit naval operations (Pillsbury, 2016).</p><p><strong>Current State of Cyberspace in Space Systems</strong></p><p>The lack of value placed on cybersecurity for space systems is concerning considering the world is increasingly dependent on satellite communications for communication, banking, infrastructure, and much more day-to-day critical operations. The U.S. Department of Homeland Security has defined critical infrastructure across 16 different sectors, and most of this critical infrastructure relies on Space Systems. There are over 2,000 operational satellites that have a market worth of $150 billion annually, that include nearly 10 Tb/s of global internet capacity that will grow to 100 Tb/s by 2035 (Pavur, 2021). In our increasingly interconnected world, we place more and more trust into the hands of infrastructure that is facing drastically increased threats to its operations. Satellite cybersecurity doesn&#8217;t just affect the military and government, they only account for 30% of satellite operations, commercial operations account for 40% of operations and account for everything as mundane as getting the weather to broadcasting important news to over 100 million satellite TV subscribers to validating banking operations and combating fraud (Pavur, 2021). A simple way to ensure that satellite operations operate safely from a information security (InfoSec) perspective is to implement strong encryption in its communication.</p><p>Traditionally, satellites have been a closed source and proprietary system that has allowed for very little research to be conducted into the inner workings of the technology. As an example, when the Iridium satellite constellation was deployed it provided services to the Pentagon, but no cybersecurity was implemented in the system because it was believed that it was too complex to hack (Falco, 2019). While Iridium allows their users to encrypt their traffic, White Hat German hackers were able to prove that users trying to encrypt their own traffic isn&#8217;t enough and were able to get very sensitive texts and location data for high ranking DoD officials (Tereza Pultarova, 2025). There has been a rapid change with the reduced cost of space launches and increases in CubeSat manufacturing, allowing for even the most budget conscious commercial, educational, and government institutions to launch satellites into space and develop their own space systems (Pavur, 2021, p.19).</p><p>With this increase in space systems, NASA has found it amenable to create an open source software (OSS) tooling that helps users to create software for their space systems called core Flight System (cFS) (NASA&#8217;s Goddard Space Flight Center, 2017/2025). This software is a framework written in C that has been used on flagship spacecraft, human flight systems, cubesats and Raspberry PIs. While NASA does state that out of the box it is not flight ready and needs some additional programming, they also mention nothing about the cybersecurity of the framework, and it has been documented that many that use this framework do not actually implement cybersecurity (Schalk et al., 2022) and that space systems that implement this framework can easily be taken down with a couple lines of Python code, opening up major space systems attacks to &#8220;script kiddies&#8221;. At most, users were implementing simplistic encryption schemes that were easily broken and had no fallback encryption key (Oakley, 2020).</p><p>Analyzing many of the cyber attacks on space systems, researchers such as Gregory Falco at the Aerospace Adversary at Cornell University, James Pavur at Oxford, and many industry leaders that attended the Aerospace Village at DEF CON 32 (DEF CON 32, 2024) have pointed to unencrypted satellite networks that can be accessed via equipment you can buy on Amazon for a couple hundred dollars. The USSF CSO General Chance B. Saltzman is warning that the Unite States needs to prepare for a cyber conflict in space&nbsp; (Ahumada &amp; Del Canto Viterale, 2024). His belief is that space and cyber are inextricably linked and if data integrity is not ensure then all of the USSF&#8217;s systems are worthless. The major idea being pushed is that the USSF needs more cybersecurity training directed at their guardians, but humans are always prone to err and while training is beneficial, the focus should be on implementing industry standards that are already in place. Like 2 Factor Authentication (2FA), strong passwords, etc&#8230; but it is also important to build robust infrastructure and utilize modern network protocols like QUIC and Performance Enhancing Proxies (PEP) across Virtual Private Networks (VPN)</p><p><strong>Securing Communications in Satellite Operations</strong></p><p>Virtual Private Networks (VPN) make transferring data from a host machine to a server secure across the internet by creating an encrypted tunnel between the two (How Does a VPN Work?, 2025). The VPN ensures that only the users who are suppose to have access to the data or systems within a companies (or users) network do so. While describing the varying details such as protocol selections, firewall setup, NATs, OSI, and encryption schemes are out of the scope of this paper, it is necessary to define some elements in order to solidify a model to work from for this topic. Firstly, we will only be discussing UDP (User datagram Protocol) which is generally defined as an unreliable, unordered, but blazingly fast transport protocol and TCP/IP (Transmission Control Protocol/Internet Protocol) protocol. TCP requires a &#8220;3-Way Handshake&#8221; between a host and server, which given latencies in satellite communications, this would turn a https request that takes 0.5 seconds to reach the satellite 1.5 seconds in order to start the request, UDP does not require this handshake (Davies, 2020). Secondly, a Performance Enhancing Proxy (PEP), is a proxy server (essentially a computer that handles your https request for you) that allows to avoid some of the time consuming sitting and waiting for request by automatically maintaining a connection with a server and already in use by many satellite providers today. QUIC (Quick UDP Internet Connection) is a relatively new transport protocol that uses UDP, 0-RTT (Zero RoundTrip Time), TLS by default, and HTTP/3 which allows for faster connections via multiplexing.</p><p>Earlier was discussed the ability to eavesdrop on sensitive information from Iridium satellites that were managing and handling DoD data. This issue still hasn&#8217;t been fixed in a significant amount of satellite communications. The main reason for this being is because to deploy applications that encrypt data and communications requires additional CPU power and will increase latency on already latency burdened satellite data connections. This is where a novel approach has been invented by James Pavur out of Oxford University. He has combined the safety and reliability of VPN connectivity with the performance enhancing properties of PEP via a QUIC Session called QPEP (QUIC PEP). This allows for end to end secure and encrypted data to be transferred via satellite without all of the latency and insecurity.</p><p><strong>FiguRE 1: QPEP (Pavur, 2021)</strong></p><p>When engaging in this research Mr. Pavur had to alert the FBI to his findings due to the amount of encrypted traffic from the 4 largest VSAT providers. He accidentally gathered information that jeopardized national security, for example in one transmission he received the manifest of a ship that was carrying hydrogen sulfide, which the Islamic State does their best to manufacture for the development of chemical weapons (Pavur, 2021). Extremely private information was also transferred unencrypted, being of both a financial and personal nature. He was also able to access data from services that typically cost thousands a month to use, all for a couple hundred dollars in commercial off the shelf (COTS) equipment.</p><p>Without disparaging the hard work that Mr. Pavur has done to design and implement this new protocol for satellite communications, this work also highlights how far behind the United States is on taking cybersecurity seriously whilst also claiming that it is developing national space power. The reason being the code base that has been developed for QPEP is rather small and barring the research going into it, the amount of code written would be expected to be completed by a mid-level network software engineer to write over a couple of sprints (sprints are anywhere from 2-4 week cycles) (Ssloxford/Qpep, 2019/2025). An advantage of this code being opened source is that it allows users to look at the code and make an informed decision on whether or not they want to implement the protocol, versus proprietary black-boxes that operate as a take it or leave it situation. Also, one of the security flaws in proprietary tooling that was highlighted by the Salt Typhoon attacks from China (Segal, 2025), is that they have built in backdoors that are supposed to be used by law enforcement, but lead to exploits by nefarious actors.</p><p>What this provides based on benchmarking data is a much faster and secure satellite network experience. Running 100 connections to the Alexa Top 20 internet domains resulted in 54% faster load times for QPEP than the proprietary competitor, averaging 13.77 seconds to the competition&#8217;s 30.5 seconds (Pavur, 2021).</p><p>If the United States wants to continue to count itself among the space powers and prevent certain nefarious state(s) from becoming a hegemon in space, it needs to start moving towards the less focused on aspects of maintaining the infrastructure of a great space power in its cybersecurity and more explicitly investing in technologies and a workforce that develop the most advanced communications and cyber systems in the world.</p><p><strong>Works Cited</strong></p><p>Ahumada, A., &amp; Del Canto Viterale, F. (2024). Securing the Final Frontier: United States Space Force Cybersecurity Capabilities. <em>Astropolitics</em>, <em>22</em>(3), 145&#8211;169. <a href="https://doi.org/10.1080/14777622.2024.2439802?ref=trevor-barnes.com">https://doi.org/10.1080/14777622.2024.2439802</a></p><p>Davies, G. (Ed.). (2020). <em>Networking fundamentals: Develop the networking skills required to pass the microsoft MTA networking fundamentals exam 98-366</em>. Packt Publishing.</p><p><em>DEF CON 32</em>. (2024, August 11). Aerospace Village. <a href="https://www.aerospacevillage.org/defcon-32?ref=trevor-barnes.com">https://www.aerospacevillage.org/defcon-32</a></p><p>Falco, G. (2019). Cybersecurity Principles for Space Systems. <em>Journal of Aerospace Information Systems</em>, <em>16</em>(2), 61&#8211;70. <a href="https://doi.org/10.2514/1.I010693?ref=trevor-barnes.com">https://doi.org/10.2514/1.I010693</a></p><p>Fanning, E., Swope, C., Young, M., Chang, M., Songer, S., &amp; Tammelleo, J. (2024). <em>Space Threat Assessment 2024</em>.</p><p>Holden, J. (2017). Introduction to Ciphers and Substitution. In <em>The Mathematics of Secrets</em> (NED-New edition, pp. 1&#8211;28). Princeton University Press. <a href="https://doi.org/10.2307/j.ctvc775xv.5?ref=trevor-barnes.com">https://doi.org/10.2307/j.ctvc775xv.5</a></p><p>Military Dispatches Editorial. (2024, June 12). <em>Exploring Historical Cryptographic Devices in Military History&#8212;Military Dispatches</em>. <a href="https://militarydispatches.com/historical-cryptographic-devices/?ref=trevor-barnes.com">https://militarydispatches.com/historical-cryptographic-devices/</a></p><p>NASA&#8217;s Goddard Space Flight Center. (2025). <em>Core Flight System (cFS)</em> [CMake]. <a href="https://github.com/nasa/cFS?ref=trevor-barnes.com">https://github.com/nasa/cFS</a> (Original work published 2017)</p><p>Oakley, J. G. (2020). <em>Cybersecurity for Space: Protecting the Final Frontier</em>. Apress L. P.</p><p><em>How Does a VPN Work?</em> (2025). Palo Alto Networks. <a href="https://www.paloaltonetworks.com/cyberpedia/how-does-a-vpn-work?ref=trevor-barnes.com">https://www.paloaltonetworks.com/cyberpedia/how-does-a-vpn-work</a></p><p>Pavur, J. (2021). <em>Securing New Space: On Satellite Cyber-Security</em> [Oxford University]. <a href="https://www.proquest.com/docview/2647158963?pq-origsite=primo&amp;ref=trevor-barnes.com">https://www.proquest.com/docview/2647158963?pq-origsite=primo</a></p><p>Pillsbury, M. (2016). <em>The Hundred-Year Marathon: China</em>&#8217;<em>s Secret Strategy to Replace America as the Global Superpower</em>. St. Martins Griffin.</p><p>Pultarova, Tereza. (2025, February 12). <em>Hackers Expose Iridium Satellite Security Issues&#8212;IEEE Spectrum</em>. <a href="https://spectrum.ieee.org/iridium-satellite?ref=trevor-barnes.com">https://spectrum.ieee.org/iridium-satellite</a></p><p>Schalk, A., Brodnik, L., &amp; Brown, D. (2022). Analysis of Vulnerabilities in Satellite Software Bus Network Architecture. <em>MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)</em>, 350&#8211;355. <a href="https://doi.org/10.1109/MILCOM55135.2022.10017967?ref=trevor-barnes.com">https://doi.org/10.1109/MILCOM55135.2022.10017967</a></p><p>Segal, A. (2025, January 21). China Has Raised the Cyber Stakes. <em>Foreign Affairs</em>. <a href="https://www.foreignaffairs.com/united-states/china-has-raised-cyber-stakes?ref=trevor-barnes.com">https://www.foreignaffairs.com/united-states/china-has-raised-cyber-stakes</a></p><p>Singer, P. W. (2014). <em>Cybersecurity and Cyberwar: What Everyone Needs to Know</em>. Oxford University Press.</p><p><em>Ssloxford/qpep</em>. (2025). [Python]. SSL Oxford. <a href="https://github.com/ssloxford/qpep?ref=trevor-barnes.com">https://github.com/ssloxford/qpep</a> (Original work published 2019)</p><p>von Clausewitz, C. (2008). <em>On War</em> (M. E. Howard &amp; P. Paret, Eds.). Princeton University Press. <a href="https://doi.org/10.1515/9781400837403?ref=trevor-barnes.com">https://doi.org/10.1515/9781400837403</a></p><p>Ziarnick, B. D. (2015). <em>Developing national power in space: A theoretical model</em>. McFarland &amp; Company, Inc., Publishers.</p>]]></content:encoded></item><item><title><![CDATA[Attack Vectors in NASA cFS]]></title><description><![CDATA[A research paper review]]></description><link>https://trevor-barnes.com/p/attack-vectors-in-nasa-cfs</link><guid isPermaLink="false">https://trevor-barnes.com/p/attack-vectors-in-nasa-cfs</guid><dc:creator><![CDATA[Trevor Barnes]]></dc:creator><pubDate>Thu, 12 Jun 2025 17:16:49 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ee833409-8bb1-4a6b-a15d-8abb8f25bcbd_2000x1331.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Introduction</h2><h3>What is the purpose of the author?</h3><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AQ_I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90168258-d19e-4076-8209-789fc5e39fde_2000x1331.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AQ_I!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90168258-d19e-4076-8209-789fc5e39fde_2000x1331.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AQ_I!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90168258-d19e-4076-8209-789fc5e39fde_2000x1331.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AQ_I!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90168258-d19e-4076-8209-789fc5e39fde_2000x1331.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AQ_I!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90168258-d19e-4076-8209-789fc5e39fde_2000x1331.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AQ_I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90168258-d19e-4076-8209-789fc5e39fde_2000x1331.jpeg" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/90168258-d19e-4076-8209-789fc5e39fde_2000x1331.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Attack Vectors in NASA cFS&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Attack Vectors in NASA cFS" title="Attack Vectors in NASA cFS" srcset="https://substackcdn.com/image/fetch/$s_!AQ_I!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90168258-d19e-4076-8209-789fc5e39fde_2000x1331.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AQ_I!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90168258-d19e-4076-8209-789fc5e39fde_2000x1331.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AQ_I!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90168258-d19e-4076-8209-789fc5e39fde_2000x1331.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AQ_I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90168258-d19e-4076-8209-789fc5e39fde_2000x1331.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>The authors are trying to assess the vulnerabilities present in modern satellite software. There are several major concerns in regards to basic cyber-security practices that are not implemented in modern satellite systems. The authors hope to provide some basic guidance on building a robust cybersecurity process to protect the Software Bus on satellite systems from cyber attacks. In the past, security professionals believed that the obscurity of flight software and the complexity of it would deter would be bad actors from exploiting the software. This is no longer the case and poses a major security concern (Schalk et al., 2022, p. 350).</p><h3>What is being researched?</h3><p>NASA's OSS (open Source Software) cFS (core Flight System) is a generic software architecture framework used on several spacecraft, satellites, and even Raspberry Pi's. The GitHub repository consists of several submodules that anyone can use to build their own flight software with the framework already provided (https://github.com/nasa/cFS). NASA has many goals for cFS that mainly focus on efficiency and cost effectivity for anyone with an interest or goal to utilize flight software for satellites. This will increase collaboration and accelerate development for many individuals as well as businesses (Schalk et al., 2022, p. 352)[2]. It is mentioned that security is not stated anywhere in the cFS design documents, but instead it is recommended that you build your own security alongside your software (Schalk et al., 2022, p. 352)[2]. Since this is the primary software that is used on satellite Software Bus', the authors believe that this will provide the most coverage with their recommended results.</p><p>The SPP (Space Packet Protocol) was developed by the CCSDS (Consultative Committee for Space Data Systems) and was built as a reliable communication standard for satellites and is widely adopted by the industry. It does not provide any security function, but security functions can be implemented at the SDLS (Space Data Link Security) protocols at the network layer. SDLS <em>should</em> be implemented if you are aiming for secure communications (as everyone should) (Schalk et al., 2022, p. 351). This still requires cryptographic keys on both ends of the ground station and satellite to be secure.</p><p>The authors will be using a tool called OSK (OpenSatKit). OSK is an open source software package used to test out starting up new satellite missions and learning how to operate a ground station and controlling a satellite (Schalk et al., 2022, p. 351). It will be as close to implementing a cyber attack on a real satellite as possible.</p><h3>Why is researching this problem important?</h3><p>Most ASAT (Anti-Satellite) research focuses on the electronic and jamming aspects via hypothetical scenarios on unsecured satellites, but when it does focus on cyber security vulnerabilities in satellite systems has mainly focused on protocols, encryption, and credential management, which means the focus is on the <em>data-link</em> side and not in the systems architecture. There are opportunities to focus on cyber ASAT as it is cheap and can take place in "non-hypothetical" scenarios in which real satellites are accessed (Schalk et al., 2022, p. 350). The world is growing more dependent on satellites and with the rise of Reusable Rockets, CubeSats, and OSS (Open Source Software) driving down the cost of a launch, we are going to see a boom in the industry (Schalk et al., 2022, p. 350) and if we are unable to protect these extremely valuable and critical assets, we face major ramifications on national security.</p><h2>Theory</h2><h3>What is the major theory that the author is proposing?</h3><p>Up until the recent commercial boom in the space industry and the open sourcing of cFS, most of the details about satellite hardware and software was limited to the government and military. This closed system had a high barrier to entry and significantly limited the amount of research possible into satellite systems (Schalk et al., 2022, p. 351). Now, we have more open source systems that allow for more people to access space.</p><p>The Air Force's recent hackathon had a project that showed how easy it is to exploit faulty encryption schemes. Even when it was setup properly it acted as a single point of failure that could easily be exploited. More layers of security are needed than just encryption (Schalk et al., 2022, p. 350). Being able to disable a satellite by non-kinetic means can pose a significant advantage for countries with limited arsenals, but strong cyber capabilities. The threat is very cost advantageous relative to kinetic or electronic ASAT means and can be done by an individual or group of individuals (Schalk et al., 2022, p. 350). The Authors believe that this is a very possible reality in which a small group of nefarious actors with limited resources would be able to disable satellites using the cFS framework.</p><h3>What is the hypothesis?</h3><p>Putting all of that together, the authors believe that they can simulate a real satellite operation (OSK) using Open Source and extremely popular flight software (cFS) and use the basic satellite communication protocol (SPP) to do so. If they are able to show at least one exploit that allows them to simulate taken a satellite offline in the same way that a nefarious actor would, they prove the hypothesis of critical cyber-security flaws in open source software.</p><p>The authors will do this by attacking the Software Bus in the simulated system. It will be useful to understand some of the common software architecture before moving on further.</p><p>The basic architecture of a satellite system is a ground station that transmits commands via up-link and listens for satellite telemetry via down-link. The satellite in space receives the commands form the ground station and executes them then sends back the data (Schalk et al., 2022, p. 352).</p><p>Previous versions of satellites had customized and complex hardware that was used to transmit data throughout the satellite. New versions streamline the process by using a Network/Software Bus that receives the data then transmits to other systems/hardware of the satellite, which has helped streamline the satellite manufacturing process (Schalk et al., 2022, p. 351). Also, older satellites would be configured based on their mission, but the cFS allows for "plug and play" opportunities that allow for changing the software and mission via the cFS framework via the cFE. While this is very powerful in its flexibility, you are now able to move data via the Software Bus where in previous architectures you were unable, this opens the door for exploitation (Schalk et al., 2022, p. 353).</p><p>The cFE (Core Flight Executive Service) is the backbone of the cFS architecture which relies on the Software Bus. When the satellite starts a number of applications automatically subscribe to the Software Busand start to receive messages. The ground station send a command to the satellite, which then receives it via its communication application and sends the message to the Software Bus. Once all applications that are supposed to receive the message receive it, the command executes. Reverse the process to send data back to the Ground Station (Schalk et al., 2022, p. 353).</p><p>![[cFE.png]]</p><h2>Data Collection and Analysis</h2><h3>What/How was the data collected?</h3><p>Schalk, Brodnik, and Brown collected data via their testing of a simulated satellite network using NASA's open source and widely popular cFS framework. With some Python programming and computer architecture familiarity they were able to exploit and attack simulated satellite networks that currently several government, military, and commercial launch providers and satellite operators use (Schalk et al., 2022, p. 351).</p><p>The data was collected as a response to the actions of the simulated nefarious actors. If the cFS stopped responding, the logs were checked to determine what the failure issue was in the framework. It was a binary response for success criteria, either the satellite continued to work after the cyber attack or it didn't.</p><h3>What did the analysis show?</h3><p>Schalk, Brodnik, and Brown were able to simulate 4 different exploits on cFS via OSK; a Replay Attack, a cyber based DoS Satellite attack, an exploit command that deletes the ingest module, and an systematic brute force exploit that sends cFS commands to delete an application of any name (Schalk et al., 2022, p. 353).</p><p>In the "Replay" attack Schalk, et al. where able to send a <em>no-op</em> (no operation) command to the health and safety module that did nothing. They were able to repeat this process and insert their own commands into the module and the module was unable to tell a difference between the commands. This means that an adversary could attack the module be putting a nefarious script into a command sent to any module (Schalk et al., 2022, p. 354).</p><p>A DoS attack is a "Denial of Service" where you overwhelm the cpu and prevent it from being able to process all of the data coming into the satellite. This is very similar to electronic jamming of a satellite, but significantly cheaper and easier. Jamming requires big, complex equipment that requires a lot of power to jam the external systems. A DoS attack just needs to overwhelm the Software Bus and no other systems (Schalk et al., 2022, p. 354). The Python code on this was extremely simplistic and I didn't have enough room in this paper to explain it and same with the other examples.</p><p>The exploit command that deleted the ingest module vulnerability was severe enough the Schalk et al., named this the Cyber-ASAT attack. This is an exploit in the cFS command that deletes the command ingest module that is responsible for receiving commands from a ground station. There is an actual command that deletes applications running on cFS in the cFS framework. This is a major vulnerability. The only way to fix this is to manually reset the software, which is impossible unless you do it from space (Schalk et al., 2022, p. 354). It is equivalent to being able to run a command on your computer that deletes the program that reads input from your mouse and keyboard, and then the only way to reset it is to climb Mount Everest to hit a button.</p><p>Schalk et al. were able to exploit the cFS via a brute force attack that iterates through the Software Bus guessing the name and version of applications and deleting them. This is far less sophisticated than their exploit command that deletes the ingest module attack, but just as effective. Since the Software Bus can only handle so many commands at a time this will take quite. while to exploit (Schalk et al., 2022, p. 354).</p><p>When dealing with the Software Bus in a satellite, every application has the ability to send and receive commands over the Software Bus with the highest level of permissions. That means that a security exploit in say, an x-ray sensor, has the ability to access and change the software and messages sent to the avionics or data storage. Every message on the Software Bus will be assumed to be a message from an authorized ground station. Stack on-top of this issue that the satellite is using SPP, which has no built-in security mechanisms (Schalk et al., 2022, p. 353).</p><p>These 4 types of attacks were very effective against satellites where users would assume that the software was secure.</p><h2>Results</h2><h3>What were the outputs? Did it prove the authors hypothesis?</h3><p>A major vulnerability in satellite systems that are using a Software Bus for communication is the fact that if the Software Bus goes down, then the whole satellite goes down. This is also true for the command ingestion module, if that goes down, communications via uplink are unable to be received and the whole satellite is lost (Schalk et al., 2022, p. 353). Security should be developed beyond believing that the data link layer of the network architecture will always be secure (Schalk et al., 2022, p. 355).</p><p>There should be an implementation of tools that will scan for vulnerabilities on the system. There also should be command validations that verify the commands will not harm the system or that they are not malicious. Also, there should be remote reset tools that allow the system to be reset to initial mission settings in the case of a compromise (Schalk et al., 2022, p. 355). The architectures that are deployed on satellites need to have the most recent principles of cyber-security employed. They need to rely on Zero-Trust Networks and layered permissions (Schalk et al., 2022, p. p. 355).</p><h2>Critique</h2><h3>Do you agree with the conclusions drawn from the research? Why or Why Not?</h3><p>I agree that the lack of security around open source satellite systems is highly exploitable and poses a major risk to national security. This is one of the major reasons that I am in the Master's Program for Space Studies. Technological advantage means nothing if it can easily be disabled cheaply and anonymously from a computer anywhere in the world. These brilliant students in cyber security have laid a foundation for people like myself to go and deploy and simulate similar scenarios in industry. This might be a situation in which I pitch the idea in my day job to setup a simulation lab for satellite operations. The relative cost to doing this is cheaper than procuring a new coffee machine.</p><h3>Are there any other callouts? Was the data gathered correctly, too much/too little? Where the underlying principles of the research sound?</h3><p>I would have liked to see some concrete examples of applying some of their recommendations or at least a diagram. That may be a follow up item for them in their research, but just naming cyber security best practices doesn't go as far as showing them. I would say for their process it is very similar to my day to day work as a software developer. I.e. I need to create/add a feature to an application or module, I search GitHub to see if there is already open source software that is similar, if there is I pull or fork the repo into a company managed git account, then I start deploying from the cloned or forked repo. They did exactly that in their research which is highly aligned with industry standards. At bigger companies you may have to go through an additional cyber security review if you are deploying to prod, but with some fancy "word-salading" you can get around most concerns.</p><h2>Future Work</h2><h3>What future work should come from this research?</h3><p>Researchers that are leading the field in satellite cyber security are Gregory Falco, who runs Cornell's <em>Aerospace Adversary</em> group that works on research related to satellite cybersecurity and has had dozens of papers to the teams names. James Pavur is also another leading researcher and wrote his thesis on developing security for the new space race (Schalk et al., 2022, p. 351). While this is a great start, we need to have significantly more time and funding security research into open source satellite systems. While these vulnerabilities are the easiest to exploit and have a major impact, they are also the easiest and most cost effective for researching as the simulation environments that replicate the real world are nearly identical and can easily be setup. You could have fleets of university researchers with a couple grand in funding for some cloud or lab resources to constantly learn and combat new threats.</p><h3>Do I have any outstanding questions?</h3>]]></content:encoded></item></channel></rss>