U.S. officials say Chinese and Russian spy agencies are trying to steal technology from private American space companies and preparing cyberattacks that could disable satellites in a conflict.
Chinese and Russian intelligence agencies are targeting American private space companies, attempting to steal critical technologies and preparing cyberattacks aimed at degrading U.S. satellite capabilities during a conflict or emergency, according to a new warning by American intelligence agencies.
The National Counterintelligence and Security Center, the F.B.I. and the Air Force issued a new advisory to American companies Friday morning. The broad warning to industry said that foreign intelligence services could be targeting space firms, their employees and the contractors that serve those companies.
Space companies’ data and intellectual property could be at risk from attempts to break into computer networks, moles placed inside companies and foreign infiltration of the supply chain, officials said.
“Foreign intelligence entities recognize the importance of the commercial space industry to the U.S. economy and national security, including the growing dependence of critical infrastructure on space-based assets,” the Counterintelligence Center warning said. “They see U.S. space-related innovation and assets as potential threats as well as valuable opportunities to acquire vital technologies and expertise.”
American officials also believe rendering ineffective space-based communications and imaging satellites is likely to be the opening move of any future conflict. As Moscow launched its invasion of Ukraine in February last year, hackers linked to the Russian government conducted a cyberattack against Viasat, a U.S.-based communications firm, in an attempt to disrupt Ukraine’s ability to command its troops.
As the war has gone on, Russians have focused on jamming satellites. SpaceX’s low-earth orbit satellite network Starlink has also proved critical to Ukraine’s war effort.
The warning issued Friday advises companies to track anomalous incidents on their computer networks to look for potential breaches, develop protocols to identify potential foreign agents inside the business, conduct due diligence on potential investors and prioritize the protection of the most important intellectual properties.