The Shadow Domain: Cyber, Space, and the Architecture of Modern War
Post 6 of 12 — From Clausewitz to Orbit: Strategy, Revolution, and the Future of War
At 4:00 AM local time on February 24, 2022, one hour before Russian armor crossed into Ukraine, Russian government hackers executed a cyberattack against the KA-SAT satellite network operated by the American company Viasat. The attack used a wiper malware payload delivered through a vulnerability in the satellite’s ground network management infrastructure. Ukrainian military command and control, which relied on Viasat for communications, suffered an immediate and significant disruption in the early hours of the invasion [1]. Collateral effects reached across Europe: 5,800 wind turbines in Germany lost their satellite communications links [2], rendering them unable to report status or receive operational commands.
This was not a prelude to the space war. It was the space war — conducted entirely through cyberspace, before a single kinetic weapon had been fired in anger. The most consequential opening move of Europe’s largest land war since 1945 was not a tank column or an artillery barrage. It was code, delivered through a ground segment, targeting a commercial satellite network.
Post 5 established that space is the commanding height of modern warfare. This post establishes the corollary: the most effective way to attack that commanding height is not through kinetic weapons in orbit but through cyberspace on the ground. Cyber and space are not parallel domains. They are structurally entangled — and that entanglement is the central vulnerability of the modern military architecture.
The Structural Entanglement
Every satellite has three segments: the space segment (the satellite itself), the ground segment (the control infrastructure, antennas, and processing facilities), and the link segment (the communications path between them). Of these three, the ground segment and the link segment are accessible through cyberspace. They run on networks. Networks have vulnerabilities. Vulnerabilities are exploitable at a fraction of the cost and risk of deploying a kinetic anti-satellite weapon.
The Space Capstone Publication states this plainly: cyberspace operations are a crucial and inescapable component of military space operations and represent the primary linkage to the other warfighting domains. These dependencies can also create avenues of enemy attack that offer lower costs and higher chance of success than orbital warfare within the space domain only [3]. This is not a theoretical observation. It is a doctrinal acknowledgment that the cheapest and most effective path to degrading American spacepower runs not through the vacuum of low Earth orbit but through the internet.
Christopher Scolese, director of the National Reconnaissance Office — the agency responsible for the United States’ most sensitive intelligence satellites — has reportedly articulated this clearly: when it comes to warfare in space, many envision lasers and missiles, but Scolese isn’t worried about death rays. He’s worried about hackers [4]. The NRO director’s framing reflects a hard-won institutional understanding. Deploying kinetic or directed-energy weapons in orbit remains technically and financially daunting. Offensive cyber capabilities, by contrast, are far easier to acquire and notoriously hard to trace [4].
The Full Spectrum of Non-Kinetic Counterspace
The Viasat attack sits at one end of a broad spectrum of non-kinetic counterspace capabilities that are already being employed against American and allied space assets. In November 2021, General David Thompson, U.S. Space Force’s vice chief of space operations, confirmed that both China and Russia are regularly attacking U.S. satellites with non-kinetic means, including lasers, radio-frequency jammers, and cyber [5]. The attacks are not hypothetical future threats. They are ongoing operations.
Krepinevich’s assessment of the trajectory is equally direct: the global threat of electronic warfare attacks against space systems will expand in the coming years in both number and types of weapons, with focus on jamming against dedicated military satellite communications, synthetic aperture radar imaging satellites, and GPS. The blending of electronic warfare and cyber-attack capabilities will likely expand in pursuit of sophisticated means to deny and degrade information networks [6].
The spectrum of capabilities runs from reversible to irreversible effects. At the reversible end: GPS jamming and spoofing, communications disruption, laser dazzling of optical sensors. These degrade capability without destroying hardware, leaving the adversary uncertain whether an attack has occurred and providing plausible deniability. Further along: cyber intrusion disabling satellite operations or ground segment control. Further still: co-orbital proximity operations — satellites maneuvering to approach, surveil, and potentially physically interfere with other satellites. At the irreversible end: kinetic direct-ascent ASAT missiles and nuclear electromagnetic pulse in space. China is rapidly building out its arsenal across this entire spectrum: ground-based lasers, satellites that can grab other satellites, all of which pose a ‘grave threat’ to the U.S., according to Chief of Space Operations General Chance Saltzman [7].
A Space Force general has stated that American satellites are attacked by adversaries every day in ways that flirt with ‘acts of war’ [8]. That sentence, delivered publicly by a senior military officer, deserves to be absorbed in full. The space war is not coming. It is underway.
The Legal Gray Zone
Non-kinetic counterspace operations have a strategic advantage beyond cost and deniability: they operate in a legal vacuum. International accords including the Outer Space Treaty and the UN Charter provide no clear prohibition on non-kinetic attacks. Kinetic ASATs are attacks that apply direct physical force, creating debris and attracting international condemnation — as China’s 2007 test demonstrated when it generated thousands of debris fragments still tracked today. Non-kinetic ASATs like lasers, jammers, and cyber attacks only disable satellites without creating debris, making them less susceptible to legal regulation [9].
The result is a weapons category specifically calibrated for the legal and political environment. Non-kinetic counterspace capabilities can be employed below the threshold of armed attack as defined by international law, below the threshold of public acknowledgment, and below the threshold of alliance Article V obligations. Both kinetic and non-kinetic attacks pose substantial risk to effective satellite services, but only kinetic ASATs have met with evident international condemnation [10]. This asymmetry is not accidental. It is strategic.
The Silent Siege: Pre-Positioning for Future Disruption
The Viasat attack was a relatively blunt instrument — a disruptive strike timed to the start of a military operation. The more sophisticated version of cyber-enabled counterspace is subtler and more dangerous: pre-positioning for future exploitation rather than immediate disruption.
Incidents like Salt Typhoon illustrate how cyber infiltration is used for reconnaissance, telemetry mapping, and the prepositioning of malicious code to be activated later. These activities threaten the integrity of national security operations, defense communications, and civilian infrastructure reliant on continuous and trusted satellite services [11]. The most serious damage from a cyber intrusion against a satellite network may occur invisibly, long before any service disruption. In this phase, intrusions allow hostile actors to establish persistent access, map vulnerabilities, and quietly position themselves for future exploitation [12].
Maguire’s framing is the most pointed: a satellite without cybersecurity is already compromised. It just hasn’t failed yet [13]. When it does fail — at the moment the adversary has chosen, in the operational context the adversary has planned for — the failure will appear sudden. But the attack will have been underway for months or years.
China’s Omni-Domain Approach
China has developed the most comprehensive doctrine for exploiting the space-cyber entanglement. China’s rapid progression in space capabilities, augmented by AI and cyber integration, reflects an omni-domain approach — fusing space, cyber, and artificial intelligence — that illustrates Beijing’s ambition to command the strategic high ground of space [14].
This is not rhetorical. The PLA’s 2013 Science of Military Strategy explicitly anticipates that future wars will begin in space and cyberspace, arguing that ‘seizing command of space network dominance will become crucial for obtaining comprehensive superiority on the battlefield and conquering an enemy’ [15]. China’s military strategists have read the interwar cases. They have absorbed the lesson that the scouting advantage is decisive. And they have concluded that the most effective path to denying the United States its scouting advantage runs through the networks that connect American space assets to the forces they support.
China’s broader military strategy of ‘fighting and winning local wars under informationized conditions’ means applying information technology in all aspects of military operations, from cyber warfare on the ground to disrupting and destroying an enemy’s information technology in space, including by targeting satellites [16].
The Doctrinal Response: Dynamic Space Operations
The U.S. military is beginning to develop a conceptual response to the space-cyber threat, though the organizational adaptation — the fourth component of the RMA framework from Post 3 — has not yet fully followed.
The emerging concept is “dynamic space operations” and “sustained space maneuver” — satellites that move frequently and unpredictably rather than remaining in fixed, predictable orbits, enabling evasion, deception, and responsive actions in orbit [17]. This is the direct application of the interwar blitzkrieg lesson to the space domain: predictability is vulnerability. The satellite that stays where the adversary expects it to be is the satellite that gets attacked.
The Space Capstone’s seventh discipline — cyber operations — encompasses both defensive and offensive dimensions: the ability to employ cyber security and cyber defense of critical space networks and systems, and the skill to employ future offensive capabilities [18]. The offensive dimension remains constrained by policy, classification, and institutional caution. But the structural logic is identical to the offensive cyber operations in other domains: if the adversary is conducting persistent cyber operations against American space assets, the credible deterrent requires a demonstrated capability to do the same.
Referenced Highlights
[1] “A Russian cyberattack ahead of Russia’s 2022 invasion of Ukraine was a real-world example of hybrid space warfare, combining attacks against commercial space systems with the movement of military land forces. An hour before Russian troops crossed the border, Russian government hackers conducted cyberattacks against the American satellite company Viasat. The attack resulted in an immediate and significant loss of communication in the early days of the war for the Ukrainian military.”
Fight for the Final Frontier — John Jordan Klein. Open in Readwise
[2] “In the early days of the war, Moscow conducted several attacks against Viasat KA-SAT modems to disable satellite services in Ukraine. The attacks impacted 5,800 wind turbines in Germany, rendering them unable to communicate because of issues with their satellite communication.”
The American Edge — Seth Jones. Open in Readwise
[3] “Because of these dependencies, cyberspace operations within this network dimension are a crucial and inescapable component of military space operations and represent the primary linkage to the other warfighting domains. These dependencies can also create avenues of enemy attack that offer lower costs and higher chance of success than orbital warfare within the space domain only.”
Space Capstone Publication Spacepower — US Government United States Space Force. Open in Readwise
[4] “When it comes to warfare in space, many envision lasers, missiles and maybe a nuclear device tucked into orbit. But Christopher Scolese, who runs the National Reconnaissance Office, isn’t worried about death rays. He’s worried about hackers... Deploying kinetic or directed-energy weapons in orbit remains technically and financially daunting. Offensive cyber capabilities, by contrast, are far easier to acquire and notoriously hard to trace.”
The Real Space War Is Being Fought in Cyberspace — Sandra Erwin. Open in Readwise
[5] “In November 2021 Gen. David Thompson, U.S. Space Force’s vice chief of space operations, commented that both China and Russia are regularly attacking U.S. satellites with non-kinetic means, including lasers, radio-frequency jammers, and cyber.”
Fight for the Final Frontier — John Jordan Klein. Open in Readwise
[6] “The global threat of electronic warfare (EW) attacks against space systems will expand in the coming years in both number and types of weapons. Development will very likely focus on jamming capabilities against dedicated military satellite communications, Synthetic Aperture Radar (SAR) imaging satellites, and enhanced capabilities against Global Navigation Satellite Systems, such as GPS. Blending of EW and cyber-attack capabilities will likely expand in pursuit of sophisticated means to deny and degrade information networks.”
The Origins of Victory — Andrew F. Krepinevich. Open in Readwise
[7] “China is rapidly building out its arsenal of counterspace weapons: everything from ground-based lasers to satellites that can grab other satellites, all of which pose a ‘grave threat’ to the U.S., according to Chief of Space Operations Gen. Chance Saltzman.”
How China Is Expanding Its Anti-Satellite Arsenal — Audrey Decker. Open in Readwise
[8] “A Space Force general said American satellites are attacked by adversaries every day in ways that flirt with ‘acts of war,’ and the US will lose a space arms race if it doesn’t take action.”
Space Force General Says US Satellites Are Attacked on Daily Basis — Jesse O’Neill. Open in Readwise
[9] “A satellite could be momentarily hindered by a ground-based laser, have its signals disrupted, or be given corrupt data... Non-kinetic ASAT techniques like lasers or jammers only disable satellites without causing any debris... Kinetic ASATs are attacks that apply direct physical force to a target, turning it into fragments and creating space debris.”
When Satellites Are Hacked: The Legal Gray Zone of Non-Kinetic Space Attack — Aakansh Vijay and Udit Jain. Open in Readwise
[10] “Both kinds pose a substantial risk to effective satellite services, but only kinetic ASATs have been met with evident international condemnation.”
When Satellites Are Hacked: The Legal Gray Zone of Non-Kinetic Space Attack — Aakansh Vijay and Udit Jain. Open in Readwise
[11] “Incidents like Salt Typhoon illustrate how such infiltration is used for reconnaissance, telemetry mapping or the prepositioning of malicious code to be activated later. These activities compromise far more than service uptime, they threaten the integrity of national security operations, defense communications and civilian infrastructure reliant on continuous and trusted satellite services.”
Space Assets Are Under Silent Siege. Cybersecurity Can’t Be an Afterthought — Paul Maguire. Open in Readwise
[12] “The most serious damage may occur invisibly, long before any service disruption. In this phase, intrusions can allow hostile actors to establish persistent access, map vulnerabilities, and quietly position themselves for future exploitation.”
Space Assets Are Under Silent Siege. Cybersecurity Can’t Be an Afterthought — Paul Maguire. Open in Readwise
[13] “In space, a satellite without cybersecurity is already compromised, it just hasn’t failed yet. And when it does, the first sign won’t necessarily be a customer outage. The real damage often happens silently, when adversaries map vulnerabilities, plant hidden access and wait for the moment when disruption will hurt the most.”
Space Assets Are Under Silent Siege. Cybersecurity Can’t Be an Afterthought — Paul Maguire. Open in Readwise
[14] “China’s rapid progression in space capabilities, augmented by AI and cyber integration, helps realize a new phase in China’s military strategy. A strategy that is characterized by a very comprehensive, omni-domain approach — fusing space, cyber, and artificial intelligence — illustrates Beijing’s ambition to command the strategic high ground of space.”
China’s Fast Growing Military Space Capabilities — Amir Husain. Open in Readwise
[15] “The 2013 Science of Military Strategy anticipates that future wars will begin in space and cyberspace, arguing that ‘seizing command of space network dominance will become crucial for obtaining comprehensive superiority on the battlefield and conquering an enemy.’”
The Origins of Victory — Andrew F. Krepinevich. Open in Readwise
[16] “China’s broader military strategy of ‘fighting and winning local wars under informationized conditions.’ In layperson’s terms, that means applying information technology in all aspects of military operations, from cyber warfare on the ground to disrupting and destroying an enemy’s information technology in space, including by targeting satellites.”
The Shadow War — Jim Sciutto. Open in Readwise
[17] “As adversaries develop counterspace capabilities — from jamming and cyber attacks to co-orbital systems — U.S. planners are increasingly focused on concepts such as ‘dynamic space operations’ and ‘sustained space maneuver.’ Those terms describe satellites that can move frequently and unpredictably rather than remaining in fixed or highly predictable orbits, enabling evasion, deception and responsive actions in orbit.”
Space Command’s Case for Orbital Logistics — Sandra Erwin. Open in Readwise
[18] “Ability to employ cyber security and cyber defense of critical space networks and systems. Skill to employ future offensive capabilities.”
Space Capstone Publication Spacepower — US Government United States Space Force. Open in Readwise

