Nowa wersja platformy, zawierająca wyłącznie zasoby pełnotekstowe, jest już dostępna.
Przejdź na


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2023 | 2 | 80--88
Tytuł artykułu

Space Terrorism: A Historical Study

Treść / Zawartość
Warianty tytułu
Języki publikacji
The rationale behind this article is to address a critical gap in research: the evolving threat of space terrorism. As space assets increasingly become integral components of both civilian and military security systems, their vulnerability to attacks escalates. The democratization of space weaponry, including advanced cyber technologies, signals an escalating risk to these space assets and their terrestrial infrastructure. This threat extends beyond traditional space powers to include non-state actors, such as terrorist individuals and groups or various proxy forces, who were previously considered marginal threats. This paper aims to lay a foundational framework by providing a historical overview of terrorism and security incidents involving outer space assets, their cyber systems, and ground support structures. This compilation serves as a basis for a deeper, methodological, and systematic examination of the nature and implications of space terrorism. In order to define the initial concept of space terrorism, this paper draws on an extensive literature review. The selection of security breach cases within the broad spectrum of the space sector was guided by their novelty, diversity, and relevance, offering insights into the emerging phenomenon of space terrorism.

Opis fizyczny
Bibliogr. 47 poz.
  • 1. Anonymous TV [@YourAnonTV]. (2022, March 1). JUST IN: Hacking group 'NB65', affiliated with #Anonymous has shut down the Control Center of the Russian Space Agency 'Roscosmos'. [Post]. X.
  • 2. Bender, B. (2022, March 2). Russia’s space chief says hacking satellites “a cause for war.” Politico.
  • 3. Bernat, P. (2020). Orbital Satellite Constellations and the Growing Threat of Kessler Syndrome in the Lower Earth Orbit. Safety Engineering of Anthropogenic Objects, 4. 277–90.
  • 4. Bernat, P., & Posłuszna, E. (2019). The Threat of Space Terrorism in the Context of Irregular Warfare Strategies. In L. Aydemir (Ed.), Evaluation of Social Changes and Historical Events Based on Health, Economy and Communication in a Globalizing World (pp. 25–37). Dora.
  • 5. Cain, J. R. (2016). Space Terrorism – A New Environment; New Causes. In C. S. Cockell (Ed.), Dissent, Revolution and Liberty Beyond Earth (pp. 93–110). Springer.
  • 6. Campbell, D. (1999, May 20). Cyber Sillies. The Guardian.
  • 7. CBS News (1998, May 26). Beyond The Broadcast. CBS News.
  • 8. CBS News (2013, August 9). N.J. Man In A Jam, After Illegal GPS Device Interferes With Newark Liberty Operations. CBS News.
  • 9. Cernan, E., & Davies, D. (1999). The Last Man on the Moon. St. Martin’s Griffin.
  • 10. Chicago Tribune (1999, March 1). Hackers Reportedly Seize Control of Military Satellite.
  • 11. Cyber Defense Project. (2021). Terra Calling: Defending and Securing the Space Economy: From Science to Fiction and Back to Reality. ETH Zürich.
  • 12. Daly, J. C. K. (2007, June 5). LTTE: Technologically innovative rebels. Energy Publisher.
  • 13. Dartnell, M. Y. (1995). Action Directe, Ultra-Left Terrorism in France, 1979–1987. Frank Cass.
  • 14. Department of Justice. (2000, September 21). Juvenile computer hacker sentenced to six months in detention facility. Case marks first time a juvenile hacker sentenced to serve time. Department of Justice [U.S.A.].
  • 15. Department of the Air Force. (2003). Comprehensive Strategy for the Space Force (Report to Congressional Committees). U.S. Department of the Air Force.
  • 16. Epstein, K., & Elgin, B. (2008). Network Security Breaches Plague NASA. Business Week.
  • 17. Ewalt, D. (2013, March 18). The Tale of Captain Midnight, TV Hacker And Folk Hero. Forbes.
  • 18. Forester, T., & Morrison, P. (2007). Hacking and Viruses. In K. E. Himma (Ed.), Internet Security: Hacking, Counterhacking and Society (pp. 3–28). Jones and Bartlett Publishers.
  • 19. France24 (2023, October 5). Chinese firm sold satellites for intelligence to Russia's Wagner: contract. France24.
  • 20. Freedberg, S. J., Jr. (2015, December 2). US Jammed Own Satellites 261 Times; What If Enemy Did? Breaking Defense.
  • 21. Gorman, S., Dreazen, Y. J., & Cole, A. (2009, December 17). Insurgents Hack U.S. Drones. The Wall Street Journal.
  • 22. Grossman, L. (1999, March 1). Did Hackers Hijack a British Military Satellite? Time.,9171,20673,00.html
  • 23. Harrison, T., Cooper, Z., Johnson, K., & Roberts, T. G. (2017). Escalation and Deterrence In the Second Space Age. Center for Strategic and International Studies.
  • 24. Harrison, T., Johnson, K., & Roberts, T. G. (2018). Space Threat Assessment: A Report of the CSIS Aerospace Security Project 2018. Center for Strategic and International Studies.
  • 25. IODA [@IODA_live] (2023, June 29). Follow the JSC Dozor-Teleport AS41942) outage in near realtime using IODA's dashboard. [Post]. X.
  • 26. Jayawardhana, W. (2007, April 13). Intelsat to turn off LTTE beam: Tigers’ satellite piracy bared. Daily News – Sri Lanka.
  • 27. Jordan, J. (2020). International Competition Below the Threshold of War: Toward a Theory of Gray Zone Conflict. Journal of Strategic Security, 14(1), 1–24.
  • 28. Kessler, D. J., & Cour-Palais, B. G. (1978). Collision Frequency of Artificial Satellites: The Creation of a Debris Belt. Journal of Geophysical Research, 83(A6), 2637–46.
  • 29. Laqueur, W. (2003). No End to War: Terrorism in the Twenty-first Century. Continuum.
  • 30. Leyden, J. (2014, July 15). Hamas hacks Israeli TV sat channel to broadcast pics of Gaza wounded. The Register.
  • 31. Madory, D. [@DougMadory]. (2023, June 29). We can confirm that Russian satellite operator Dozor Teleport (AS41942) left the global routing table at about 02:00 UTC earlier today. [Post]. X.
  • 32. Manulis, M., Bridges, C. P., Harrison, R., Sekar, V., & Davis, A. (2021). Cyber security in New Space: Analysis of threats, key enabling technologies and challenges. International Journal of Information Security, 20, 287–311.
  • 33. McCoy, J. J. (2007, April 27). Intelsat Shuts Down Transponder Hijacked By Terrorists. Satellite Today (Via Satellite).
  • 34. Mehmoodi, A., & Ahmed, S. (2021). Terrorism in Space: A Possibility. CISS Insight, 9(1), 90–109.
  • 35. NATO. (2023). NATO’s Approach to Space. The North Atlantic Treaty Organization.
  • 36. Nelson, A. J. & Epstein, G. L. (2022). The PLA’s Strategic Support Force and AI Innovation. Brookings.
  • 37. NetBlocks [@netblocks] (2023, June 29). Confirmed: Metrics show a disruption to satellite internet provider Dozor-Teleport which supplies Russia's FSB, Gazprom, Rosatom and military installations. [Post]. X.
  • 38. PBS Frontline. (2000). Interview: anonymous. PBS Frontline.
  • 39. Petkauskas, V. (2023, November 15). We breached Russian satellite network, say pro-Ukraine partisans. Cybernews.
  • 40. Rausch, H. (2006, April). Jamming Commercial Satellite Communications During Wartime: An Empirical Study. Proceedings of the Fourth IEEE International Workshop on Information Assurance. IEEE Satellite.
  • 41. Reuters (2022, March 2). Russia space agency head says satellite hacking would justify war -report. Reuters.
  • 42. Schlom, D. (2001). Target America 1972: When Terrorists Threatened Apollo – An Untold Story of Apollo 17. Ad Astra, (November/December 2001), 20–24.
  • 43. Schwartz, N. A., Williamsen, J. E., Heagy, J. F., & Moeller, R. A. (2021). Orbital Debris and Kinetic Anti-satellite Concerns: How a “Kessler Syndrome” Threatens U.S. Use of Space Assets. Institute for Defense Analyses.
  • 44. Stout, D. (1998, April 22). Pentagon Acknowledges Hacker Intrusion Into a Computer System. The New York Times.
  • 45. Swinhoe, D. (2023, June 30). Russian satellite comms firm Dozer taken offline by Wagner-affiliated hacker group – report. Data Center Dynamics.
  • 46. Telegraph. (1999, March 4). British hackers attack MoD satellite. The Telegraph.
  • 47. Yale Daily News. (1998, April 23). Hackers break into Pentagon system. The Yale Daily News.
Opracowanie rekordu ze środków MNiSW, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2024).
Typ dokumentu
Identyfikator YADDA
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.