EvoDefence / Research notes / Mega-constellation vulnerabilities

Research Note · Space & Cyber Security

Mega-Constellation Vulnerabilities: Cyber-Physical Threats to Dual-Use Space Infrastructure

LEO satellite constellations are no longer commercial infrastructure that happens to have military applications. They are military infrastructure that happens to be commercially operated. The security implications of that distinction have not yet been fully absorbed.

Published July 2025 Space security Cyber-physical Dual-use Governance

Originally presented for the Freeman Air and Space Institute Post Graduate Conference, King's College London, June 2025. Reproduced here with updates.

The rapid growth of mega-constellations in low Earth orbit has transformed the security landscape in ways that neither existing legal frameworks nor current procurement doctrine have fully anticipated. This note examines three categories of cyber-physical vulnerability affecting dual-use satellite constellations, draws on the Starlink deployment in Ukraine as the defining empirical case, and sets out a framework for mitigation and governance reform.

From commercial infrastructure to strategic asset

The New Space era has produced a category of infrastructure that defies conventional classification. Mega-constellations, the large satellite networks operated by SpaceX (Starlink), OneWeb, Amazon (Project Kuiper), and their Chinese state-backed equivalents including Guowang and Qianfan, are commercially owned, globally operated, and increasingly indispensable to military operations. ⚠ figures as of July 2025

As of mid-2025, Starlink operated over 7,000 satellites, with OneWeb completing its initial 648-satellite deployment and Amazon having placed its first operational batches into orbit ahead of a planned 3,200-satellite constellation. Combined active and planned deployments across all operators are projected to exceed 20,000 satellites by the end of the decade. Chinese programmes, backed by state funding and strategic ambition, aim to match or exceed Western deployment scales.

This density creates a fundamentally different orbital environment. Each newly launched satellite intensifies collision risk, expands the potential debris field, and widens the attack surface available to state and non-state adversaries. The combination of mass deployment, dual-use function, and distributed global architecture has produced three interacting categories of vulnerability that are examined in turn below.

🔗

1. Network cascade and orbital debris risks

Compromised satellites can propagate malicious signals across mesh networks. A single kinetic or cyber-induced collision in a densely occupied shell can trigger fragmentation cascades that degrade the entire orbital band.

2. Supply chain compromise

Globally distributed manufacturing and software development pipelines create multiple ingress points for hardware implants, firmware backdoors, and compromised code libraries, often dormant until a geopolitical trigger.

🛡

3. Authentication and command and control

Scaling cryptographic key management across thousands of satellites with intermittent connectivity creates systemic weaknesses. Compromising authentication at scale offers adversaries leverage over entire constellations without kinetic action.

Cascade risks and the Kessler threshold

The Kessler Syndrome, the theoretical threshold beyond which orbital debris density triggers self-sustaining fragmentation cascades, has moved from theoretical concern to modelled risk. Research published in 2024 by Nomura et al. suggests that parts of low Earth orbit may already be approaching conditions where limited cleanup efforts would prove insufficient to prevent eventual escalation. Current debris mitigation compliance rates, estimated at 60–80%, fall well short of the 95% adherence level their model indicates would be necessary for long-term orbital stability.

ESA's Space Environment Report confirms that fragmentation events and new launches are already adding debris faster than atmospheric drag can remove it. Under current deployment trends, ESA-MASTER modelling projects a sixfold increase in potential collision scenarios by 2050. The addition of tens of thousands of further satellites in the coming decade compresses this timeline considerably.

The cyber-physical dimension compounds this risk significantly. Modern collision avoidance systems rely on automated command and control networks that are themselves potential attack vectors. A sophisticated adversary could theoretically compromise these systems to induce orbital manoeuvres that increase rather than decrease collision probabilities, deliberately triggering cascade conditions. For dual-use constellations supporting critical military and civilian functions simultaneously, such an attack would constitute an act of strategic disruption without requiring a single kinetic weapon.

Beyond deliberate attack, the sheer density of homogeneous satellites operating in similar orbital bands creates scaling challenges for collision avoidance at a level that current tracking capabilities were not designed to handle. SpaceX alone reported over 24,000 avoidance manoeuvres across a five-month period in 2023. ⚠ figures as of July 2025

Cyber attack vectors

Mega-constellations rely on software-defined radios, IP-based protocols, and globally distributed ground station networks: architectural choices that deliver flexibility and scale but expand the cyber attack surface considerably.

Commercial Off-The-Shelf hardware, widely used to meet ambitious deployment timelines, frequently lacks essential safeguards such as secure boot or encrypted communications. Research published in the "Orbital Shield" study by Yadav et al. (2024) demonstrates that this creates prime entry points for hostile actors, particularly where ground equipment is deployed in conflict-prone regions.

The 2022 Viasat KA-SAT attack provides the clearest documented case of this attack pattern. Attackers exploited a VPN misconfiguration to access the trusted management network, moved laterally, and executed legitimate management commands to render thousands of modems inoperable, without directly compromising the satellite or its encryption. The attack vector was the management layer, not the space segment. This distinction matters for mitigation strategy.

Beyond management layer attacks, three further vectors warrant attention:

  • Command injection and telemetry spoofing targeting automated collision avoidance systems, potentially inducing cascading orbital failures.
  • Advanced persistent threats against ground control infrastructure, attributed in several cases to state-aligned actors including Fancy Bear (APT28) and Lazarus Group, though attribution remains analytically complex.
  • Quantum computing risk to current encryption standards: the "harvest-now, decrypt-later" threat is particularly acute for satellite command and control traffic captured today and held for decryption once quantum capability matures.

Supply chain exposure

Mega-constellation supply chains span multiple international jurisdictions, with antennas, propulsion units, onboard computers, and flight software sourced from extensive networks of specialised subcontractors. This distributed model creates numerous potential compromise points across the hardware and software development lifecycle.

ENISA's Space Threat Landscape (2025) highlights that reliance on COTS components creates systemic risks through untrusted suppliers and inadequate vetting processes, and calls for stricter adherence to the EU Cyber Resilience Act and NIS2 Directive in supply chain security contexts.

The risk intensifies for dual-use systems, which attract a broader array of adversaries, including state-backed groups with the resources to infiltrate commercial supply chains over extended periods. The supply chain is not simply a hardware concern. Vulnerable elements include software development environments, code repositories, CI/CD pipelines, cryptographic signing mechanisms, firmware update channels, ground station infrastructure, and third-party cloud services processing telemetry and mission data. Each represents a potential attack surface.

The Space Information Sharing and Analysis Center (Space-ISAC) has developed collaborative threat intelligence mechanisms, and NASA has produced space security guidelines. Implementation across the rapidly expanding commercial sector remains, however, inconsistent.

Starlink in Ukraine: the operational case

The deployment of Starlink in Ukraine from February 2022 onward is the defining empirical case for the militarisation of commercial mega-constellations. What it illustrates is not merely the utility of satellite broadband in conflict. It is about how quickly a commercial network can become irreplaceable military infrastructure, and how complex the consequences of that transition are.

Within weeks of activation, Starlink was integrated into Ukrainian command and control through the Delta situational awareness platform, drone operations requiring real-time data relay, and encrypted battlefield communications where terrestrial networks had been degraded or destroyed. By mid-2024, approximately 42,000 terminals were in operational use. ⚠ figures as of July 2025

The cyber-physical threat picture was immediate. In early March 2022, SpaceX reported jamming attempts against Starlink terminals and deployed software countermeasures within 24 hours. Ground terminals faced geolocation risk through radio frequency emissions, physical capture, and power supply constraints in austere field environments. The decentralised nature of the constellation, which provided redundancy, simultaneously expanded the attack surface.

But the more significant finding from Ukraine is structural rather than technical. SpaceX retained ultimate authority over Starlink's operational parameters, including geographical coverage and service restrictions. In February 2023, the company restricted use of the network for drone control operations in certain areas, citing the service's intended commercial scope. Geofencing near Crimea reportedly constrained Ukrainian military options during critical periods. These decisions were made unilaterally by a private entity with no binding legal obligation to any party in the conflict.

The Ukraine case establishes a precedent: commercial satellite operators have, in practice, become decision-makers in active conflict, with control over infrastructure that national defence strategies now depend upon, and no clear legal framework governing how that control should be exercised.

Mitigation framework

Technical mitigation for mega-constellation vulnerabilities operates across four interacting domains.

Architecture-level resilience

Distributed control architectures reduce the risk of catastrophic failure from targeted attack. SpaceX's integration of inter-satellite laser links within Starlink, creating a mesh topology that enables dynamic re-routing when ground station communications are compromised, is the leading practical example. Secure boot mechanisms and hardware security modules further reduce exposure to unauthorised firmware modification.

Zero-trust security models

Zero-trust architecture, in which no user, device, or system component is treated as inherently trustworthy and all access requires continuous verification, is increasingly the framework of choice for large-scale constellation security. Compromising one satellite under a zero-trust model does not grant access to the network. The overhead in computing and bandwidth is non-trivial, but the containment benefit is well established. Implementation in satellite systems remains uneven across the industry.

Quantum-resistant cryptography

NIST has recommended a phased transition to post-quantum cryptography standards, with deprecation of current algorithms by 2030 and full transition required by 2035. The harvest-now, decrypt-later threat makes this a near-term operational concern rather than a distant planning issue. ESA's E2EQSS project and the PQC ASTrAL initiative are pioneering quantum-safe command and control systems. The timeline for broader industry adoption remains a significant vulnerability window.

Autonomous threat response

AI-based anomaly detection, monitoring unusual manoeuvres, suspicious data traffic, and unexpected power consumption across thousands of satellites simultaneously, can identify threats faster than human analysts and isolate compromised nodes before escalation. Federated learning approaches allow constellation-wide threat model improvement without requiring centralised coordination. The principal challenge is calibrating autonomous response thresholds: an oversensitive system may misinterpret benign anomalies and shut down essential communications at operationally critical moments.

Policy and governance

The 1967 Outer Space Treaty remains foundational to space governance but was not designed for an era of thousands of commercial satellites operating as de facto military infrastructure. It contains no provisions addressing conventional anti-satellite systems, private-sector liability for dual-use assets, or binding debris mitigation requirements. Supplementary instruments, including proposed Space Infrastructure Conventions and UN COPUOS voluntary guidelines, have not kept pace with the rate of deployment.

Three governance gaps are most pressing:

  • Dual-use governance protocols that address how commercial operators should behave when their assets are integrated into active military operations, including service continuity obligations, geofencing restrictions, and liability for operational decisions made under conflict conditions.
  • Standardised cybersecurity certification for constellation operators, analogous to the EU Cyber Resilience Act, covering supply chain verification, authentication and encryption standards, and mandatory incident reporting.
  • Confidence-building measures, including shared space situational awareness data, multilateral conjunction notification protocols, and simulated space emergency exercises, that allow operators to distinguish routine activities from hostile actions before incidents escalate.

The EU's IRIS² programme represents one regional approach: a 290-satellite governmental constellation incorporating enhanced cyber resilience, secure authentication, and end-of-life management provisions that go beyond existing OST requirements. Whether regional models of this kind can aggregate into genuinely international frameworks remains the central governance challenge.

The private sector cannot be left to navigate this alone. Commercial operators are not bound by international humanitarian law, yet their decisions about service availability, geographical restrictions, and operational continuity now directly influence conflict dynamics and strategic stability. Ethical frameworks for military collaboration, user data handling, and orbital stewardship need to be institutionalised, not left to corporate discretion.

Strategic outlook

Mega-constellations are already embedded in the security architecture of major powers. That is not a trend that will reverse. The question is whether the legal, technical, and governance frameworks required to manage the risks they create can develop at anything approaching the pace of deployment.

A single significant incident, whether a cyber-induced cascade, a supply chain compromise that surfaces during a crisis, or a geofencing decision that determines the outcome of a military operation, would transform the current debate into an urgent response. The time to build the frameworks is before that incident occurs.

Whether mega-constellations prove to be stabilising or destabilising infrastructure will depend substantially on decisions made in the next five years, across procurement strategy, regulatory design, and international coordination. The technical vulnerabilities are well understood. The political will to address them is not yet matched to the scale of the problem.

Key sources

  1. European Union Agency for Cybersecurity (ENISA). ENISA Space Threat Landscape 2025. March 2025. enisa.europa.eu
  2. Swope et al. Space Threat Assessment 2024. Center for Strategic and International Studies, October 2024. csis.org
  3. Secure World Foundation. Global Counterspace Capabilities: An Open Source Assessment 2025. swfound.org
  4. Cybersecurity and Infrastructure Security Agency (CISA). Space Systems Security and Resilience Landscape: Zero Trust in the Space Environment. 2024. cisa.gov
  5. European Space Agency. ESA Space Environment Report 2025. esa.int
  6. Yadav et al. Orbital Shield: Cybersecurity Vulnerabilities in Commercial Satellite Systems. 2024.
  7. Chen et al. Threat Detection Driven by Artificial Intelligence: Enhancing Cybersecurity With Machine Learning Algorithms. World Journal of Innovation and Modern Technology, 2024.
  8. NASA Office of Technology, Policy, and Strategy. Cost and Benefit Analysis of Orbital Debris Remediation. 2023. nasa.gov