8/2/20 Understanding Space Through a Cyber-Security Lens Understanding Space t e n Through a Cybersecurity Lens w w w . i t s t . Presenter and Facilitators ✦ Dr. t e n Jerry Sellers, Ph.D., University of Surrey, UK (jsellers@tsti.net) ‣ Partner and President, TSTI with over 30 years of aerospace engineering experience, including Space Shuttle Mission Controller, NASA/JSC, and Chief of Astronautics for the European Office of Aerospace Research and Development, London, UK . i t s t . ‣ Former Director of the Space Systems Research Center, USAF Academy. Responsible for designing, building, testing and operating small, scientific satellites. ‣ Author of the text Understanding Space: An Introduction to Astronautics, Editor and contributing author of the text Applied Space Systems Engineering ‣ Adjunct Professor, Stevens Institute of Technology. Adjunct Professor, Georgetown University ‣ Certified Agile/Scrum Master, Certified Scaled Agile Framework (SAFe) Program Consultant (SPC5) ‣ Corresponding Member - International Academy of Astronautics ✦ Terri Johnson, M.Sc. Cybersecurity and Information Assurance (terri.akse@gmail.com) w w ‣ Department Chair of the Computer Networking and Cybersecurity Department at Pikes Peak Community College ‣ Over 20 years of experience in Information Technology, specializing in building and securing computer networks. Terri started out working for two of the world’s largest tax and audit firms, after which she transitioned to serving several educational institutions as both IT faculty and IT staff support ‣ Lead faculty of the NSA-DHS designated Center of Academic Excellence program at PPCC ‣ Member of the Colorado Springs chapter of ISSA (Information Systems Security Association), PPCC Cyber Club Advisor, and Coach to PPCC's nationally recognized Cyber Competition Team w ‣ Industry certifications include: Cisco's CCNA Routing / Switching and CCNA Security and EC-Council’s CEH (Certified Ethical Hacker) ✦ Jason Sellers ‣ Summer intern supporting SPEC Innovations analyzing applications of model-based systems engineering simulation tools and techniques ‣ Member of Nationally-ranked FRC Robotics Team ‣ Dungeon Master ‣ Eagle Scout Course Introduction Copyright ©2020 Teaching Science and Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 1 8/2/20 Understanding Space Through a Cyber-Security Lens About TSTI A respected name in systems engineering workforce development for over 25 years. t e n ✦Teaching Science and Technology, Inc. (TSTI) is a veteran-owned small business that assists companies and organizations who wish to improve their systems engineering skills as they relate to the space and other domains. ‣ We present quality short courses and workshops in space systems engineering and program management to customers around the world. Our teaching style is highly interactive with emphasis on learning-by-doing and practical real-world examples and applications. ‣ Our systems engineering courses provide the processes, tools, and information necessary to “jump-start” new-hires to the space business or improve the performance of mid- to senior-level engineers, systems engineers, and technical program managers. ‣ In addition, we provide focused systems engineering support to organizations as they approach critical events in the development process and work as red team support. ‣ We wrote the books that describe SE in the space domain, and we’ve all had practical SE and PM experience in the development world. ✦Since . i t s t . 2010, TSTI has taught more than 500 courses to more than 20,000 students for NASA, ESA, DoD and industry around the world w w w ✦What ‣ ‣ ‣ ‣ ‣ Sets Our Courses Apart: CREDIBILITY: We wrote the books. We’ve been there, done that. We bring extensive systems engineering experience. COMPETENCE: We’re professional teachers. This is our day job. We take the complex and make it simple. We’re explainers and motivators. Hands-on exercises ensure that you learn space by doing space. No death by PowerPoint. CURRICULUM: We take you from new hire to seasoned space professional. Our on-line learning portal enables continuity through your increasing levels of expertise. COST: We’re small, with low overhead, and come to you. Your cost is 50% less – you can train twice the people for the same price. CONTRACTING: You can get on contract in minutes! We’re only a credit card purchase away. Learn more at: www.tsti.net Course Introduction Copyright ©2020 Teaching Science and Technology Inc. About TSTI ONSITE TRAINING VIRTUAL TRAINING TSTI is a premier provider of onsite space systems engineering training to NASA, DoD and Industry. Since Covid, TSTI has pivoted to providing 100% virtual training. Self-paced online courses also available. Starting a new project? Struggling with an existing one? Need integrated work force development tailored to your project? . i t s t . w w w PROJECT COACHING AND INTEGRATED PROGRAMS t e n SYSTEMS ENGINEERING CONSULTING SERVICES Project start ups. Red Team proposal review. Expertise in Model-Based Systems Engineering (MBSE). Learn more at: www.tsti.net Course Introduction Copyright ©2020 Teaching Science and Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 2 8/2/20 Understanding Space Through a Cyber-Security Lens Course Trajectory ✦ Course Threats—Natural & Human Introduction t e n ✦ Context ‣ The Space Mission Architecture ✦ Opportunities ‣ Understanding Orbits ‣ Space Mission Operations ✦ Threats w w w ‣ The Space Environment ‣ The Human Environment ✦ Vulnerabilities ‣ RF Systems ‣ Space Data Architectures . i t s t . Understanding Space Through a Cyber Lens Vulnerabilities—RF Systems & Data Architectures Opportunities—Orbits & Operations Context Course Introduction Copyright ©2020 Teaching Science and Technology Inc. Course Reference t e n ‣ The Primary Course Reference is: . i t s t . • Understanding Space: An Introduction to Astronautics (US), 4th edition, by Jerry Jon Sellers with contributions by William Astore, Robert B. Giffen and Wiley J. Larson. Published by Coyote Enterprises on the Inkling platform. ‣ Other References include: • Applied Space Systems Engineering (ASSE), by Larson, Kirkpatrick, w w Sellers, Thomas and Verma, McGraw-Hill • Human Spaceflight: Mission Analysis and Design (HSF), by Larson, Pranke, Giffen, and Connolly • Other sources as noted w • Inputs from over 20,000 space professionals who have taken our courses This book and over 20 others are part of the Space Technology Series, a government and industry sponsored project managed out of the USAF Academy Available at: www.spacetechnologyseries.com Course Introduction Copyright ©2020 Teaching Science and Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 3 8/2/20 Understanding Space Through a Cyber-Security Lens Course Objectives ✦At the end of this course you should be able to… t e n ‣ Gain Core Space Knowledge Apply Space Concepts • Describe the Space Mission Architecture, the context for all space activities . i t s t . Understand Threats Comprehend Capabilities and Limitations ‣ Comprehend space mission Capabilities, Trade-offs and Limitations specific to the cyber-security domain • Explain how orbital mechanics and operational architectures w w w constrain access to space systems ‣ Discuss natural and human-made threats to space systems Gain Core Space Knowledge Learning Trajectory. Throughout the course we’ll build your core space knowledge so you tackle ever more challenging space problems in the cyber-security domain. • Describe potential vulnerabilities to space systems through communications links and data architectures ‣ Apply Cyber/Space Concepts to real-world scenarios Course Introduction Copyright ©2020 Teaching Science and Technology Inc. Course Schedule (all times PDT) ✦Day 1 Morning Session ✦Day 1000-1030: Course Introduction and Context ‣ 0900-0930: Course Introduction and Context ‣ 1030-1045: Progress Check/Break ‣ 0930-0945: Progress Check/Break ‣ ‣ ‣ 1045-1115: Opportunities (Orbits and Ops) 1115-1130: Progress Check/Break ‣ 0945-1015: Opportunities (Orbits and Ops) 1015-1030: Progress Check/Break ‣ 1130-1200: Threats (Space and Human) ‣ 1030-1100: Threats (Space and Human) ‣ 1200-1215: Progress Check/Break ‣ 1100-1115: Progress Check/Break ‣ 1215-1245: Vulnerabilities (RF and Data) ‣ 1115-1145: Vulnerabilities (RF and Data) ‣ 1245-1315: Progress Check and Application Challenge ‣ 1145-1215: Progress Check and Application Challenge ‣ 1315-1330: Wrap-up and Close ✦Day 1 Afternoon Session ‣ 1430-1500: Course Introduction and Context ‣ ‣ 1500-1515: Progress Check/Break 1515-1545: Opportunities (Orbits and Ops) ‣ 1545-1600: Progress Check/Break ‣ 1600-1630: Threats (Space and Human) ‣ 1630-1645: Progress Check/Break w ‣ 1645-1715: Vulnerabilities (RF and Data) 1715-1745: Progress Check and Application Challenge 1745-1800: Wrap-up and Close ‣ 1215-1230: Wrap-up and Close ✦Day ‣ . i t s t . w w ‣ Course Introduction Copyright ©2020 Teaching Science and Technology Inc. 2 Afternoon Session ‣ 1330-1400: Course Introduction and Context ‣ ‣ 1400-1415: Progress Check/Break 1415-1445: Opportunities (Orbits and Ops) ‣ 1445-1500: Progress Check/Break ‣ 1500-1530: Threats (Space and Human) ‣ 1530-1545: Progress Check/Break ‣ 1545-1615: Vulnerabilities (RF and Data) ‣ 1615-1645: Progress Check and Application Challenge 1645-1700: Wrap-up and Close ‣ t e n 2/3 Morning Sessions ‣ Copyright ©2020 Teaching Science and Technology Inc. 4 8/2/20 Understanding Space Through a Cyber-Security Lens Space in Context ‣ Learning Objectives - By the end of this lesson you should be able to... t e n • List and describe the unique . i t s t . w advantages of space • Describe the basic types of space missions that leverage these advantages • Identify and describe the elements common to all space missions - the space mission architecture - and how they work together to achieve a successful mission w w ‣ References Using Space: Space in Context ‣Why Space? ‣Space Missions ‣Mission Elements Space Mission Architecture. The space mission architecture is the collection of space elements that make any mission possible. US Fig. 1-23. • US Chapter 1, HSF Chapter 15 Teaching Science & Technology Inc. Why Space? t e n ‣ Getting into space is dangerous and expensive. • So why bother? ‣ Space offers a number of compelling advantages that makes its exploitation advantageous and (sometimes) profitable - the Space Imperatives • • • • • Global Perspective Clear View of the Heavens Free Fall Environment Resources The Final Frontier! w w The single most important reason we go to space is to gain a global perspective . i t s t . w Using Space: Space in Context ‣Why Space? ‣Space Missions ‣Mission Elements A Global Perspective. Space is the ultimate high ground. From orbital altitudes we can view large parts of the Earth all at once. US Fig. 1-4. Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 5 8/2/20 Understanding Space Through a Cyber-Security Lens Global Perspective - Communications ‣ Humans have been using the high ground to relay messages for centuries (using mirrors, flags, etc.) ‣ In October 1945, scientist and science-fiction writer Arthur C. Clarke (author of classics, such as 2001: A Space Odyssey) proposed a fantastic idea - do this from space! Put satellites into geostationary orbits (“geo”) to relay communications around the globe w w w Satellite communication is the single most important application of space today ! t e n Using Space: . i t s t . Space in Context ‣Why Space? ‣Space Missions ‣Mission Elements The Geosynchronous Orbit (GEO) Belt. Today about 300 satellites in geo link civil and military users around the world. Examples include: WGS, MilStar, XM Radio, Intelsat and many, many more. Teaching Science & Technology Inc. Global Perspective - Navigation t e n ‣ From their positions in space, Global Positioning System (GPS) satellites provide world-wide position, navigation and timing (PNT) 24/7/365 • . i t s GLONASS, owned/operated by the Russian Federation, provides similar service • Europeans recently began providing equivalent services with their partially deployed Galileo constellation • The Chinese BeiDou Navigation Satellite System provides a similar, but more limited capability from geostationary orbit Originally conceived for its military applications, GPS is now critical to the world economy! w w t . w Using Space: Space in Context ‣Why Space? ‣Space Missions ‣Mission Elements Space Navigation. By using a method of trilateration a groundbased user can get a “fix” on their position by contacting four or more satellites at the same time. US Fig. 1-12. Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 6 8/2/20 Understanding Space Through a Cyber-Security Lens Global Perspective - Remote Sensing t e n ‣ Space missions take advantage of the Global Perspective for remote sensing ‣ Satellite remote sensing of the Earth is used for: • • • • . i t s t . Earth’s environment monitoring Weather monitoring, prediction City & agricultural planning w w w Using Space: Space in Context ‣Why Space? ‣Space Missions ‣Mission Elements Landsat Images of Flooding in Colorado. These Landsat 8 images are from Aug 16 (left) and Sep 17 (right) 2013. Some parts of Colorado received nearly a year’s worth of rain in one week in September. When the second image was taken, the South Platte River was about 1.8 m (~6 ft) above flood stage. The river is shown here on the right as it flows by Greeley, CO. (Courtesy of US Geological Survey (USGS)) US Fig. 12-18. Military applications—spy satellites Once the exclusive domain of the military, space-based remote sensing is fast becoming a major market for commercial space missions Teaching Science & Technology Inc. Space Mission Elements ‣ The Mission ‣ Orbits & Trajectories ‣ Spacecraft ‣ Launch Vehicles ‣ Mission Operations w w t . w . i t s t e n Using Space: Space in Context ‣Why Space? ‣Space Missions ‣Mission Elements Space Mission Architecture. The space mission architecture is the collection of space elements that make any mission possible. US Fig. 1-23. Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 7 8/2/20 Understanding Space Through a Cyber-Security Lens The Mission t e n ‣ At the heart of the space mission architecture is the mission itself. Its scope tells us: . i t s t . • The need that is being fulfilled by the capability being delivered w w w Using Space: Space in Context • The goals and objectives of the stakeholders • The concept of operations that captures how systems and users and other stakeholders will interact ‣Why Space? ‣Space Missions ‣Mission Elements The Mission! President Kennedy laid out the mission objectives for the Apollo program in 1961. Teaching Science & Technology Inc. The Spacecraft t e n ‣ The Spacecraft is divided into the payload and spacecraft bus • • The payload performs the mission, it’s the reason we’re going into space at all! - It gathers data or relays communication for users and investors back on Earth - The subject is the object the payload is focused on The Spacecraft bus provides support for the payload, e.g. Pointing, Thermal Control, Structure, Propulsion, Power, etc. The Bus. Like a school bus, the spacecraft bus includes all of the necessary support functions to keep the payload healthy and happy. US Fig. 11-22. t . w . i t s Space Payload. Mars Reconnaissance Orbiter using its Climate Sounder payload to probe Mars’ atmosphere. Courtesy NASA. w w Using Space: Space in Context ‣Why Space? ‣Space Missions ‣Mission Elements Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 8 8/2/20 Understanding Space Through a Cyber-Security Lens Trajectories and Orbits ‣ A trajectory is the path an object follows through space • The size of the racetrack depends on the energy w w w of the object in orbit t e n . i t s t . ‣ An orbit can be thought of as a fixed racetrack around a planet Using Space: Space in Context ‣Why Space? Orbit Racetrack. US Fig. 1-27. ‣Space Missions ‣Mission Elements • Orbit altitude and field of regard of the spacecraft dictate the swath width or coverage on the ground Swath. The higher the orbit the greater the swath generated by the field of regard. US Fig. 1-28. Launch Vehicles Teaching Science & Technology Inc. ‣ A launch vehicle provides the necessary velocity change to get a spacecraft into orbit. t . w . i t s • Launch vehicles are divided into stages, providing a portion of the total velocity change, before being discarded w w Bring Home Some Asteroid! Atlas V rocket carrying NASA's OSIRIS-REx Asteroid Sample Return Mission, Sept. 2016. t e n Using Space: Space in Context ‣Why Space? ‣Space Missions ‣Mission Elements • An upper stage may also be needed to transfer the spacecraft from a parking orbit to its final mission orbit Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 9 8/2/20 Understanding Space Through a Cyber-Security Lens Mission Operations ‣ The mission operations systems include all of the ground and space-based infrastructure needed to coordinate other elements of the space mission architecture—the “glue” that holds the mission together. These include: • Manufacturing and test facilities such as clean rooms and . i t s t . test chambers to build systems and ensure they’ll work in space • Launch facilities to prepare the launch vehicle and get it safely off the ground, and... • Communication networks and operations centers used by w w w t e n Using Space: Space in Context the flight-control team to coordinate activities once it’s in space. Communication Architecture. A complex ‣Why Space? infrastructure of control centers, tracking sites, satellites, and relay satellites maintains ‣Space Missions contact between spacecraft and users. US Fig. ‣Mission Elements 1-34. ‣ Mission management and operations encompasses all of the activities needed to take a mission from a blank sheet of paper to on-orbit reality • Mission management team—Defines the mission statement, lays out a workable mission architecture to make it happen • Mission operations team—Monitors the spacecraft’s health and status to ensure users get uninterrupted service Apollo Mission Control Center after the triumphant return of Apollo 13. US Fig. 1-35. Systems Engineering and Project Management Teaching Science & Technology Inc. ‣ People are the most important part of any space mission. Without people handling various jobs and services, all the expensive hardware is useless. ‣ These experts handle all of the systems engineering, project management, and mission support functions needed to go from “cradle to grave,” from a blank sheet of paper to on-orbit reality. w w • Systems engineering is the art and science of designing and building systems that deliver capabilities to meet the user’s needs. • Project management is the discipline of planning, organizing, monitoring, and controlling all resources needed to achieve the mission’s intended purpose. Copyright ©2020 Teaching Science and Technology Inc. . i t s t e n t . w Systems Engineering. The process for balancing cost, schedule, performance and along with risk to deliver the needed capability to users Using Space: Space in Context ‣Why Space? ‣Space Missions ‣Mission Elements Project Management. Leads the team to deliver on time, on budget Teaching Science & Technology Inc. 10 8/2/20 Understanding Space Through a Cyber-Security Lens Space ISAC ‣ Mission: Collaborating to Protect Our Space Assets t e n ‣ Announced in April 2019 during classified session at the 35th Space Symposium, headquartered in Colorado Springs and co-located with the National Cyber Security Center (NCC). . i t s t . ‣ An Information Sharing and Analysis Ecosystem • Space ISAC Members – including Northrop Grumman, Lockheed Martin, etc • Partner Agencies – including NASA, DHS, US Space Force, etc. w w w ‣ Focused on 3 Core Areas of Threat within the Space Sector • Supply Chain • Business Systems • Missions https://s-isac.org/ Teaching Science & Technology Inc. Review - Space in Context t e n ‣ Space offers several unique advantages - The Space Imperative - that make its exploration essential for modern society • • • • • Global perspective A clear view of the universe without the adverse effects of the atmosphere A free-fall environment Abundant resources A final frontier • • Communications satellites tie together remote regions of the globe Remote-sensing satellites observe the Earth from space, providing weather forecasts, essential military information, and valuable data to help us better manage Earth’s resources Navigation satellites revolutionize how we travel on Earth Space observatories peer to the edge of the universe and study the dynamic nature of the sun Scientific spacecraft explore the Earth and the outer reaches of the solar system and peer to the edge of the universe Manned missions provide valuable information about living and working in space and experiment with processing important materials . i t s t . ‣ Since the beginning of the space age, a wide variety of missions have evolved to take advantage of space • • • • w w ‣ Central to understanding any space mission is the mission itself, its scope tells us • • • The need describes the capability being delivered, The goals and objectives lay out the expectations of the stakeholders, The Concept of Operations or ConOps documents how systems and users will interact • The spacecraft—composed of the payload that performs the mission and the bus that provides essential housekeeping and other support functions The trajectories and orbits—the path the spacecraft follows through space. This includes the orbit (or racetrack) the spacecraft follows around the Earth. Launch vehicles—the rockets which propel the spacecraft into space and maneuver it along its mission orbit The mission operations systems—the “glue” that holds the mission together. They consist of all the infrastructure needed to get the mission off the ground, and keep it there, such as manufacturing facilities, launch sites, communications networks, and mission operations centers. Mission management and operations—the brains of a space mission. An army of people make a mission successful. From the initial idea to the end of the mission, individuals doing their jobs well ensure the mission products meet the users’ needs. w ‣ A space mission architecture includes the following elements • • • • Copyright ©2020 Teaching Science and Technology Inc. Using Space: Space in Context ‣Why Space? ‣Space Missions ‣Mission Elements Teaching Science & Technology Inc. 11 8/2/20 Understanding Space Through a Cyber-Security Lens Key Take-Aways—Through a CyberSpace Lens ‣ Satellites in space have an enormous impact on daily life. These are some examples of what could be disrupted if vulnerabilities are exploited within the satellite communication systems: • Internet traffic • Weather forecasting GPS • - Airline travel - Financial transactions - Cell phones - Power grid - Health services - Military operations Remote sensing • - • t e n Using Space: . i t s t . w Space in Context ‣Why Space? ‣Space Missions w w ‣Mission Elements Agriculture Military operations Television signals ‣ Space has become a much larger attack vector – originally satellites were mostly government-funded initiatives; now private industry has enormous numbers of satellites as well. ‣ SPACE ISAC – collaborative group across the global space industry Notes Teaching Science & Technology Inc. . i t s t . w w w t e n Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 12 8/2/20 Understanding Space Through a Cyber-Security Lens Opportunities—Orbits and Operations Opportunities: ‣ Learning Objectives - By the end of this lesson you should be able to... t e n • Understand and be able to explain what it takes to get an object into orbit • Explain the approach used to develop the restricted twobody equation of motion, including coordinate systems and assumptions • Define the two constants of orbital motion—specific mechanical energy and specific angular momentum . i t s t . • Apply the concept of conservation of specific angular w w w Orbits and Operations momentum to show an orbital plane remains fixed in space • Describe the purpose of the Concept of Operations • Describe the major space operations activities • Explain and give examples of space mission operations ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities systems currently in use • Characterize key mission operations trade-offs ‣ References • US Chapter 4 Teaching Science & Technology Inc. Racetracks in Space t e n Opportunities: Orbits and Operations ‣ Orbits can be thought of as big racetracks on which spacecraft “drive” around the Earth ‣ More Energy → Bigger Racetrack! w w . i t s t . w ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Orbits as Racetracks. Orbits are like giant racetracks on which spacecraft “drive” around Earth. US Fig. 4-1. Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 13 8/2/20 Understanding Space Through a Cyber-Security Lens Baseballs into Orbit: Basic Motion Opportunities: ‣ Imagine we could drop a baseball and throw one horizontally from the same height at exactly the same time. Which one would hit the ground first? • They both hit at the same time! • This is because horizontal and vertical motion are independent • Gravity is acting on both balls equally, pulling them to the ground with exactly the same acceleration of 9.798 m/s2 (neglecting drag) w w w This high speed video shows both a dropped ball and launched ball hitting the ground at the same time Orbits and Operations t e n . i t s t . Both Balls Hit at the Same Time. US Fig. 4-3. ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Teaching Science & Technology Inc. Bigger Picture t e n Opportunities: Orbits and Operations ‣ Look at the shape and size of the the Earth...the Earth curves or drops about 5 m vertically for every 8 km you go out horizontally . i t s t . 5m w w ‣ Imagine we build a tower 5 m tall at some point on the Earth and attach a “diving board” 8 km long (ignore the natural sag of such a long cantilever) w ‣ At the edge of the diving board the surface is 10 m below 10 m ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Earth’s Curvature. Earth’s curvature means the surface curves down about 5 m for every 8 km. US Fig. 4-4. Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 14 8/2/20 Understanding Space Through a Cyber-Security Lens Bigger Picture (cont’d) ‣ Imagine I could throw a baseball 8 km/sec! Opportunities: ‣ How far would the ball drop due to gravity in 1 sec? • Gravity at the the Earth’s surface causes objects to fall about 9.798 m/s2 • So in 1 sec an object falls about 5 m (d = 1/2 at2 = 4.905 to be exact) . i t s t . ‣ How far did the Earth curve away in 8 km? 5 m ‣ So how far above the ground is our ball after 1 sec? 5 m! ‣ What happens 1 sec later? Orbits and Operations t e n • How long would it take the ball to reach the end of the diving board? 1 sec! • The ball goes another 8 km horizontally and falls another 5 m and the Earth curves away another 5 m and the ball is still 5 m above the surface. We’re in a circular orbit! ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities w w w 5m 5m 5m Teaching Science & Technology Inc. Trajectories t e n Opportunities: Orbits and Operations ‣ As we throw baseballs faster and faster, eventually we can reach a speed at which the Earth curves away as fast as the baseball falls, placing the ball in orbit. w w ‣ At exactly the right speed it will be in a circular orbit! • • . i t s t . w A little faster and it’s in an elliptical orbit. Even faster and it can escape Earth altogether on a parabolic or hyperbolic trajectory. ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Baseballs in Orbit. US Fig. 4-5. Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 15 8/2/20 Understanding Space Through a Cyber-Security Lens Simulation Opportunities: w w w t e n Orbits and Operations . i t s t . ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Teaching Science & Technology Inc. Orbital Velocity t e n Orbits: ‣ So how fast is fast enough to achieve a circular orbit? Let’s use some math... . i t s t . km w w ‣ Where, • V = circular velocity of a satellite at radius R • G = Universal gravitational constant = 6.67 x 10-11 Nm2/kg2 • M = mass of the Earth = 5.98 x 1024 kg • R = radius of the Earth = 6378 km • Slower, and you hit the Earth; faster, and you’re in an elliptical orbit w Understanding Orbits ‣Racetracks in Space ‣Baseballs into Orbit ‣Orbital Velocity ‣The Restricted Two-Body Problem ‣Constants of Orbit Motion Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 16 8/2/20 Understanding Space Through a Cyber-Security Lens Mechanical Energy in Action Opportunities: w w w t e n Orbits and Operations . i t s t . ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Teaching Science & Technology Inc. Angular Momentum ‣ Specific angular momentum is the total angular momentum (H) divided by the mass of the spacecraft ‣ The specific angular momentum of an orbit gives us a vector perpendicular to the orbit plane ‣ Angular momentum is constant! • Therefore the orbit plane is also constant so it is fixed in inertial space Copyright ©2020 Teaching Science and Technology Inc. . i t ts The Right-hand Rule. We find the direction of the angular velocity vector, Ω, and the angular momentum vector, H, using the right-hand rule. US Fig. 4-15. . w w w US Eqn. 4-28 t e n Opportunities: Orbits and Operations Specific Angular Momentum. The specific angular momentum vector, h, is perpendicular to the orbital plane defined by R and V. US Fig. 4-38. ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Teaching Science & Technology Inc. 17 8/2/20 Understanding Space Through a Cyber-Security Lens Angular Momentum in Action Opportunities: w w w t e n Orbits and Operations . i t s t . ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Teaching Science & Technology Inc. Space Mission Geometry t e n Opportunities: Orbits and Operations . w . i t ts w w ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 18 8/2/20 Understanding Space Through a Cyber-Security Lens Satellite Ground Tracks - Introduction ‣ Most satellites are for missions focused on the Earth • Orbits: t e n Describing & Using Orbits Taking pictures, communications, navigation ‣ Need to know what path the satellite traces over the Earth’s surface ‣ As a satellite revolves around the Earth, the Earth rotates under the satellite • . i t s t . Now, try to imagine what the trace of the satellite looks like on the surface of the Earth w w w Earth and Spacecraft Motion. The Earth spins on its axis at nearly 1600 km/hr (1000 mph) at the equator, while a spacecraft orbits above it. The ground track is the trace of the satellite’s path over the surface of the Earth. ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Teaching Science & Technology Inc. Building a Ground Track t e n Orbits: ‣ Since the Earth rotates underneath the satellite orbit, each successive ground track shifts to the left and is “scrunched” by the orbital period times the Earth’s rotation rate (15 deg per hour) . i t ts . w w w Describing & Using Orbits ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities A Normal Spacecraft Ground Track. As Earth rotates, successive ground tracks appear to shift to the west from an Earth-based observer’s viewpoint. US Fig. 5-31. Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 19 8/2/20 Understanding Space Through a Cyber-Security Lens Examples Orbits: w w w t e n Describing & Using Orbits . i t s t . ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Orbital Ground Tracks. Orbit A has a period of 2.67 hours. Orbit B has a period of 8 hours. Orbit C has a period of 18 hours. Orbit D has a period of 24 hours. Orbit E has a period of 24 hours. US Fig. 5-33. Teaching Science & Technology Inc. Standard Orbits: Low Earth Orbit (LEO) ‣ A satellite in LEO, like the ISS shown here, completes ‣ 1 orbit about every 90 min or ‣ about 15 orbits per day ‣ A give ground station on Earth may only “see” the satellite for up to 10 min at a time a few times per day depending on where it is the exact orbit parameters t e n Opportunities: Orbits and Operations w w . w . i t ts ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 20 8/2/20 Understanding Space Through a Cyber-Security Lens Standard Orbits: Geostationary Orbit (GEO) Opportunities: w w w t e n Orbits and Operations . i t s t . ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Teaching Science & Technology Inc. Review - Understanding Orbits ‣ Combining Newton’s Second Law and his Law of Universal Gravitation, we form the restricted twobody equation of motion ‣ The coordinate system used to derive the two-body equation of motion is the geocentric-equatorial system • Origin—Earth’s center • Fundamental plane—equatorial plane • Direction perpendicular to the plane in the North Pole direction • Principal direction—vernal equinox direction ‣ In deriving the 2-body Equation of Motion, we assume • • . i t ts . w w w t e n Drag force is negligible; Spacecraft is not thrusting Gravitational pull of third bodies and all other forces are negligible; mEarth >> mspacecraft • Earth is spherically symmetrical and of uniform density and we can treat it mathematically as a point mass; Spacecraft mass is constant, so ∆m = 0 • The geocentric-equatorial coordinate system is sufficiently inertial for Newton’s laws to apply Opportunities: Orbits and Operations ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities ‣ Solving the restricted two-body equation of motion results in the polar equation for a conic section • This tells us that all objects moving under the influence of gravity must follow one of four paths: circle, ellipse, parabola or hyperbola Copyright ©2020 Teaching Science and Technology Inc. Teaching Science & Technology Inc. 21 8/2/20 Understanding Space Through a Cyber-Security Lens Mission Operations Systems t e n ‣ The ConOps is driven by the availability and access to operations systems ‣ Mission operations systems include any facilities or infrastructure needed to design, assemble, integrate, test, launch, or operate a space mission ‣ Some critical operations systems function during the three basic phases of a spacecraft’s life—building, launching, and operating: w w w . i t s t . • Spacecraft Manufacturing — the systems that support design, assembly, integration, and testing • Launch — the systems that bring the spacecraft and launch vehicle together and get them safely off the pad • Operations — mainly communication systems, such as the web of radio links that track and relay data to and from the spacecraft Launch Complex. Launch vehicles such as the Atlas V shown here require pads and processing equipment to operate. Courtesy ULA. Opportunities: Spacecraft Manufacturing. Specialized equipment and facilities are needed to assemble and test space systems Orbits and Operations ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Mission Control. Operators control all aspects of a mission from the control center (Courtesy ESA) Teaching Science & Technology Inc. Communication Architecture ‣ The communication architecture is the configuration of satellites and ground stations in a space system and the network that links them together. • Ground stations—Earth-based antennas, transmitters, and receivers w w • Control center—Controls the spacecraft and all other elements in the network • Relay satellites—additional spacecraft that link the primary spacecraft with ground stations . i t ts . w • Spacecraft—the in-space element t e n Opportunities: Orbits and Operations ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Communication Architecture. A communication architecture for space missions consists of ground- and space-based elements tied together through different communication paths or links. US Fig. 1524. Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 22 8/2/20 Understanding Space Through a Cyber-Security Lens Critical Mission Ops Systems - AFSCN, DSN, TDRS ‣ To manage 450+ contacts per day with 140+ operational satellites the USAF relies on the Air Force Satellite Control Network (AFSCN), a series of tracking sites around the world. t e n ‣ To link with spacecraft beyond Earth orbit, NASA relies on the Deep Space Network (DSN) consisting of three complexes controlled and monitored by the Network Operations Control Team (NOCT) at the Jet Propulsion Laboratory in Pasadena, CA • . i t s t . Complexes are spaced evenly around the globe to ensure continuous coverage of satellites anywhere in the solar system w w w Opportunities: Orbits and Operations World-wide AFSCN Locations. ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities TDRS ‣ Tracking and Data Relay Satellite (TDRS) is a type of relay satellite, that forms part of the Tracking and Data Relay Satellite System (TDRSS) • A network of 8 satellites in geostationary orbit used by NASA and other US government agencies as a spacebased communication architecture • Relays data from space systems in low-Earth orbit such as the Space Shuttle and the ISS to operations centers ‣ There are multiple commercial networks as well World-wide DSN Locations. Teaching Science & Technology Inc. Space Operations Activities t e n ‣ Operations Planning . i t ts ‣ Flight Control ‣ Mission Data Receipt/Delivery . w ‣ Tracking and Navigation ‣ Spacecraft Support and Analysis ‣ Maintenance and Support ‣ Training w w ‣ Mission Data Processing and Archiving ‣ Customer/User Support Opportunities: Orbits and Operations ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities US Fig. 15-32. Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 23 8/2/20 Understanding Space Through a Cyber-Security Lens Mission Data Receipt and Delivery/Data Processing/ User and Customer Support t e n ‣ The only reason we fly space missions is to generate data or otherwise serve the users who pay the bills! ‣ Collect, analyze and distribute mission data to users ‣ Analyzing and archiving spacecraft engineering data . i t s t . ‣ Space missions exist to support users and customers. • Principal investigators are the scientists designated to analyze and publish the results of data collected by science payloads. w w w Opportunities: Orbits and Operations Data Generators. NASA’s Aqua satellite is part of the “A-Train,” which consists of a coordinated group of satellites flying in formation around the globe. Aqua and its sister satellites generate many hundreds of megabits of data each day that needs to find its way to operators and users. (Courtesy of NASA). US Fig 15-40. ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Engineering Data. Analysis of engineering data provides insight into the health and status of the spacecraft. Teaching Science & Technology Inc. Key Space Operations Trade-offs . w ‣ Ground station staffing ‣ Anomaly response w w ‣ State-of-health monitoring ‣ New or existing hardware/software t e n . i t ts ‣ Spacecraft autonomy ‣ Ground station automation Spacecraft Autonomy. Due to its great distance from Earth real-time control wasn’t possible so the Cassini spacecraft at Saturn required a high degree of autonomy. (Courtesy NASA) Ground Staffing. People are expensive. Maintaining a large staff of operators 24/7/365 represents a large mission investment. The fewer operators needed, the less expensive the mission. (Courtesy USAF) Opportunities: Orbits and Operations ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 24 8/2/20 Understanding Space Through a Cyber-Security Lens Review - Space Operations ‣ The Concept of Operations (ConOps) describes how we plan to use the system to fulfill the mission. t e n ‣ Mission operations systems include the facilities and infrastructure to design, assemble, integrate, test, launch, and operate a space mission Opportunities: Orbits and Operations ‣ The AFSCN, DSN and other assets represent key mission operations systems that drive the mission ConOps ‣ Space operations tasks include: • Operations Planning • Flight Control, Training • Mission Data Receipt/Delivery • Tracking and Navigation • Spacecraft Support and Analysis w w w • Maintenance and Support . i t s t . • Mission Data Processing and Archiving, Customer/User Support ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities ‣ Key mission operations trade-offs include: • Spacecraft autonomy • Ground station automation • Ground station staffing • Anomaly response • State-of-health monitoring • New or existing hardware/software US Fig. 15-32. Key Take-Aways—Through a CyberSpace Lens Teaching Science & Technology Inc. . w ‣ Orbital mechanics inherently limit access to space systems from specific geographical locations w w t e n . i t ts ‣ Getting into orbit is hard ‣ Ground-based mission operations activities provide multiple attack surfaces (equipment and people) ‣Getting to Orbit ‣Standard Orbits and Ground Tracks ‣Mission Operations Systems ‣Mission Operations Activities Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 25 8/2/20 Understanding Space Through a Cyber-Security Lens Notes w w w t e n . i t s t . Teaching Science & Technology Inc. Notes . i t ts . w w w t e n Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 26 8/2/20 Understanding Space Through a Cyber-Security Lens Threats—Natural and Human t e n ‣ Objectives - At the end of this lesson you should be able to... • • • • . i t s t . Know where space is and how it’s defined List and describe the major hazards of the space environment and describe their effects on spacecraft w w w Discuss potential malicious threats to spacecraft and ground infrastructure ‣ References US Chapter 3 Threats: Natural and Human ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats Teaching Science & Technology Inc. Motivation: Why Worry about the Space Environment? t e n ‣ Approximately 25% of all spacecraft anomalies are related to the space environment. Famous examples include: • 2014: The radiation storm on Sep. 1 is likely responsible for the star tracker • reset on both STEREO A and STEREO B* (within 16 minutes of each other), IMU was triggered to power on (normally off). 2014: X1.6 flare and accompanying CME is likely the cause for the Dawn anomaly on 2014-09-11 – delayed the start of the first science orbit at Ceres by about a month. . i t s t . w • 2010: Control of Galaxy 15 lost due to electrostatic discharge cause by solar • Threats: Natural and Human flare. Satellite drifted through crowded GEO belt in full send and receive mode 2009: Iridium satellite destroyed when it collided with the dead Cosmos 2251 satellite (space debris) w w Warning- Traffic Hazard!. Iridium Collision with Cosmos 2251 • 2000: Boeing 702 satellite (Anik F-1): degraded solar array performance due to • outgassing induced fogging 2000: Stardust comet flyby spacecraft blinded and sent into safe mode by a solar flare Caution - Solar Flare. Stardust spacecraft was blinded by a solar flare ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats • 1994: Telsat Canada’s Anik E-1 and E-2 suddenly began to spin out of control due to spacecraft charging • 1990: High energy charged particles caused bit flips in HST fine guidance system electronics (FGS) passing through the South Atlantic Anomaly (SAA) causing guide star acquisition failures. Subsequently, FGS use was suspended in the SAA. • 1979: Increased solar activity heated the outer layers of the Earth's atmosphere and thereby increased drag on Skylab, leading to an early reentry. Copyright ©2020 Teaching Science and Technology Inc. Beware - Outgassing. Anik F-1 degraded performance due to outgassing Teaching Science & Technology Inc. 27 8/2/20 Understanding Space Through a Cyber-Security Lens Space is Hard w w w t e n . i t s t . Teaching Science & Technology Inc. Cosmic Perspective Where is Space? For awarding astronaut wings, NASA defines space at an altitude of 80 km (50 mi). The Karman Line is placed at an altitude of 100 km (60 mi) and is recognized by the Fédération Aéronautique Internationale (FAI) as the beginning of space. For our purposes, space begins where satellites can maintain orbit—about 130 km (81 mi). US Fig. 3-2. . i t s t . w Perspective. Imagine if Earth were the size of a peach—then the ISS orbit would be just above the fuzz. US Fig. 3-3. w w The Solar System in Perspective. If Earth were the size of a baseball, about 100 cm (~4 in) in diameter, the Moon would be only 28 mm (1 in) in diameter and about 3 m (10 ft) away. At the same scale the Sun would be a ball 10.9 m (~36 ft) in diameter (about the size and volume of a small house); it would be more than 1.2 km (about 0.75 mi) away. Again, keeping the same scale, the dwarf planet Pluto would be about the same size as Earth’sMoon, 19 mm (~0.75 in), and 46 km (~28.5 mi) away from the house-sized Sun. US Fig. 3-9. Copyright ©2020 Teaching Science and Technology Inc. t e n Threats: Natural and Human ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats Teaching Science & Technology Inc. 28 8/2/20 Understanding Space Through a Cyber-Security Lens Effects of the Space Environment ‣ The gravitational environment causes some physiological and fluid management problems, but provides opportunities for manufacturing t e n Threats: Natural and Human ‣ Earth’s atmosphere affects a spacecraft, even in orbit—primarily through drag ‣ The vacuum in space above the atmosphere gives spacecraft other challenges ‣ Natural and man-made debris in space pose collision hazards . i t s t . ‣ Radiation and charged particles can severely damage unprotected spacecraft w w w Factors Affecting Spacecraft in the Space Environment. There are six challenges unique to the space environment we deal with—gravity, the atmosphere, vacuum, micrometeoroids and debris, radiation, and charged particles. US Fig. 3-13. ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats Teaching Science & Technology Inc. Atmosphere - Drag and Atomic Oxygen ‣ Earth’s atmosphere affects a spacecraft below about 600 km, in two primary ways: Structure of Earth’s Atmosphere. The density of Earth’s atmosphere decreases exponentially as we go higher. Even in lowEarth orbit, however, spacecraft can still receive the effects of the atmosphere in the form of drag. US Fig. 3-16. • Drag—shortens orbital lifetimes, changes their attitude • Interaction with atmospheric neutrals—primarily tomic w w • Atmospheric density highly dependent on solar activity and thus very difficult to model and predict • Changes order of magnitude from solar minimum to solar maximum at altitudes from 400 km to 700 km t e n . i t s t . w oxygen—that degrade spacecraft surfaces and interfere with sensors Threats: Natural and Human ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats ‣ Radiation in the upper atmosphere causes O2 to dissociate into free oxygen atoms, atomic oxygen or AO • AO is VERY reactive and potentially damaging to spacecraft surfaces Copyright ©2020 Teaching Science and Technology Inc. Solar Cycle. The sun experiences an 11-year cycle that affects drag in LEO. Teaching Science & Technology Inc. 29 8/2/20 Understanding Space Through a Cyber-Security Lens Vacuum Effects Threats: ‣ Outgassing - the release of trapped gasses and volatiles from materials over time when exposed to a vacuum or low pressure. t e n • Called off-gassing inside a crew compartment. Natural and Human • Outgassing products can re-condense on sensitive spacecraft surfaces . i t s t . ‣ Cold-welding - metals fusing together in vacuum ‣ “Tin Whiskers” - crystalline structures of tin that sometimes grow from surfaces where tin is used as a final finish. Can lead to short circuits and system failures. w w w ‣ Heat Transfer - complicated in a vacuum. There are three ways to move heat: Vacuum Testing. Spacecraft in a thermal-vacuum chamber to simulate the effects of the space environment. US Fig. 3-21. ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats • Convection - transfer of heat from a liquid or gas medium • Conduction - transfer of heat through a solid medium • Radiation - transfer of heat energy through direct Electromagnetic radiation (infrared, IR) - Radiation is the primary way heat gets in or out of a spacecraft in a vacuum Radiators. The massive radiators on the ISS eject heat from the crew modules by radiating it into space. Courtesy NASA. Micrometeroids and Space Junk: History Teaching Science & Technology Inc. t e n Threats: Natural and Human . i t s t . w w w ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 30 8/2/20 Understanding Space Through a Cyber-Security Lens Micro-meteoroids and Space Junk: How bad is it? ‣ The Air Force Space Control Center tracks about 20,000 man-made objects, baseball sized and larger, in Earth orbit t e n • There are an estimated 40,000 golf-ball sized . i t s t . objects too small to track, plus millions of smaller objects • Chinese Fengyun-1C intercept test created over 1900 debris fragments alone! ‣ In space, chances of getting hit by something big are small, but chances of getting hit by something small are bigger and growing ‣ Numerous satellites have been damaged— CERISE, Space Shuttle, Iridium—or had to maneuver to dodge debris ‣ National efforts are aimed at decreasing the amount of debris generated—but no international laws exist w w w Threats: Natural and Human ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats Orbital Debris “Box Score.” The Orbital Debris Quarterly News, Volume 24, Issue 2 April 2020 Teaching Science & Technology Inc. EM Radiation Environment ‣ Radiation from the Sun can cause • Heating on exposed surfaces—due to infrared or thermal radiation • Prolonged exposure to ultraviolet radiation can begin to degrade spacecraft surfaces • • Bursts of radio frequency interference - Photons impart momentum, ~ 5 N of force per km 2 of surface Copyright ©2020 Teaching Science and Technology Inc. t e n Threats: Natural and Human . i t s t . w w w Solar pressure, which can change a spacecraft’s orientation Solar Radiation. The Sun emits electromagn etic energy over a wide range of the spectrum. ‣Background ‣Cosmic Solar Perspective Prominence. ‣Space NASA’s STEREO Environment (Ahead) Threats spacecraft ‣Human Threats captured this view of the Sun on Aug. 25, 2010 showing the action in an extreme UV wavelength.The video clip covers about 30 hours of activity Teaching Science & Technology Inc. 31 8/2/20 Understanding Space Through a Cyber-Security Lens Charged Particle Sources t e n ‣ Three primary sources for these particles are: . i t s t . • The solar wind and solar particle events (SPE) • Galactic cosmic rays (GCRs) • The Van Allen radiation belts w w w The Atom. The nucleus of an atom contains positively charged protons and neutral neutrons. Around the nucleus are negatively charged electrons. US Fig. 3-6. ‣ There are two separate effects to worry about • Low energy (plasma) • High energy Threats: Natural and Human Massive Eruptions. SOHO images of the “Halloween Storm” 2003. ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats Low Energy (Plasma) Effects Teaching Science & Technology Inc. t e n Threats: Natural and Human ‣ Low-energy particles can cause: • • . i t s t . w Arcing (the dominant concern) Electrostatic Discharge (point-to-point arcing) – caused by large potential differences • • Dielectric Breakdown (arcing through a material) • Re-attraction of contamination: may be significant in degrading surfaces. Coronal Mass Ejection (CME). (Courtesy SOHO/EIT/LASCO) Arcing generates electromagnetic interference (EMI) and damages surfaces (damage to solar arrays and electronics of greatest concern) w w ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats ‣ Significant issues in GEO, less so in LEO Electrostatic Discharge. Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 32 8/2/20 Understanding Space Through a Cyber-Security Lens High Energy Effects ‣ Single Event Phenomena (SEP) – Instantaneous effects due to a single particle hitting electronics. Examples include: t e n • Single Event Upset (SEU): A non-destructive bit flip • Single Event Latchup (SEL): A potentially destructive high current ‣ Dose Effects – Long-term, accumulated damage • Total Ionizing Dose (TID) – Electrostatic changes - Biological systems: DNA damage - Semiconductors: Charge trapped in dielectrics alters performance; eventual circuit failure - Materials: Darken optics. Loss of mechanical strength (e.g. embrittle PTFE Teflon) • Displacement Damage (DD) – Crystalline structure changes - Decrease minority carrier lifetime in semiconductors - Decrease efficiency of solar cells, LEDs, and CCDs - Dark-signal increases in CCDs w w w Threats: . i t s t . Natural and Human ‣ Mitigations • Spacecraft shielding – offers limited protection • Use radiation-tolerant electrical components and materials • Error detection and correction (EDAC) algorithms Solar Particle Event. This animation depicts the effect of a solar particle event that arrives at Earth. Single Event Upset. High energy charged particles penetrate into silicon memory and other devices causing immediate damage. ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats Teaching Science & Technology Inc. The Good Old Days…. w w ground 010 001 010 link 100 101 010 101 000 011 100 t e n . i t s t . w downlink uplink ground link 100 011 000 101 0 1 0 101 100 010 001 0 1 0 ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 33 8/2/20 Understanding Space Through a Cyber-Security Lens …the New Reality… t e n Spoofing uplink DDoS = Distributed Denial of Service. Examples: Type of Service (TOS) flood, Internet of Things (IoT) botnet attack, Ping flood w w w . i t s t . ground link downlink Eaves Dropping ground link ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats 0 110 001 100 0 1 0 101 010 010 101 0 0 010 010 001 010 100 101 010 101 000 011 100 Hacking Denial of Service Ransomware Teaching Science & Technology Inc. Cyber Security – Space Challenges ‣ Hard to Identify—Some attacks may be indistinguishable from natural hazards (e.g. Single Event Upsets) ‣ “It can’t happen here” mentality ‣ Conservative, inflexible, slow-changing (non-Agile) culture - Hardware and software systems in space used to be a ‘walled garden’ – completely isolated from the internet. - Procedures and Contracts have slow adoption • Complacency — Lack of security culture in civilian space - Commercial Sector - Science Sector ‣ Security is an after-thought t e n . i t s t . w • Change is measured in years w w ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats • Requirements are identified too late in the SDLC process • Security is tacked onto the system, not part of the original design ‣ Patching and upgrading existing systems is difficult and expensive (and some cases impossible) with deployed space systems Adapted from : José Pizarro – “Back of an envelope of the current civilian space security issues”; June 2019 and World Global Affairs Council, Colorado Springs, August 2019 Copyright ©2020 Teaching Science and Technology Inc. Teaching Science & Technology Inc. 34 8/2/20 Understanding Space Through a Cyber-Security Lens Cyber Security – Space Challenges (cont’d) ‣ The attack surface is increasing at all phases: t e n • Increased reliance on spacecraft autonomy and other software-intense features are requested (= more code required) • More stakeholders are involved, e.g. more international missions (= more potential attack vector) • Project Managers • Software Architects • Software Designers • Developers • Testers . i t s t . ‣ Operating Systems or other integrated software (e.g. database) are outdated ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats w w w ‣ Removing end-of-life software Teaching Science & Technology Inc. T h is P h o to b y U n kn o w n A u th o r is licen sed u n d er C C B Y -S A Review - The Space Environment t e n ‣ For our purposes, space begins at an altitude where a satellite can briefly maintain an orbit. Thus, space is close. It’s only about 130 km (81 mi) straight up. . i t s t . w ‣ Six major environmental factors affect spacecraft in Earth orbit. • Gravity - Earth exerts a gravitational pull which keeps spacecraft in orbit. We best describe the condition of spacecraft and astronauts in orbit as free-fall, because they’re falling around Earth. • Atmosphere - Earth’s atmosphere isn’t completely absent in low-Earth orbit. It can cause drag and exposure to damaging atomic oxygen • Vacuum - In the vacuum of space, spacecraft can experience: Outgassing, Cold Welding and Heat Transfer issues w w • Micrometeoroids and space junk - can damage spacecraft during a high speed impact • Radiation - from the Sun, can cause: Heating on exposed surfaces, Damage to electronic components, disruption in communication, and Solar Pressure causing a change in a spacecraft’s orientation • Charged particles - from solar wind and flares, Galactic cosmic rays (GCRs), and Van Allen radiation belts cause charging, single event phenomena (SEP) and total dose effects Threats: Natural and Human ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 35 8/2/20 Understanding Space Through a Cyber-Security Lens Key Take-Aways—Through a CyberSpace Lens t e n ‣ Space is hard (and it sucks) ‣ The natural environment is a huge threat to space activities—denying services at random times . i t s t . ‣ Some anomalies due to the natural environment may be indistinguishable from human attacks ‣Background ‣Cosmic Perspective ‣Space Environment Threats ‣Human Threats w w w ‣ Relatively minor “hacks” (e.g. causing a spacecraft to point its sensor at the sun) could have devastating impacts to operations Teaching Science & Technology Inc. Notes . i t ts . w w w t e n Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 36 8/2/20 Understanding Space Through a Cyber-Security Lens Vulnerabilities—RF and Data Systems ‣ Objectives - At the end of this lesson you should be able to... t e n • Describe the inputs, outputs, and fundamental processes within the spacecraft communication subsystem and how it fits into overall communication architecture Vulnerabilities: RF Systems and Data Systems • Explain basic principles of radio frequency (RF) communication and how they apply to developing link budgets . i t s t . • Characterize key limitations and trade-offs in communication subsystem design • Explain the vital functions performed by the data handling subsystem (DHS) • Describe how the DHS fits into the overall mission data architecture w w w • List and describe the key components of a DHS ‣RF Systems ‣Data Handling Systems • Characterize the relative importance of software to each spacecraft subsystem • Discuss the challenges and opportunities posed by the increasing reliance on spacecraft software to perform system functions • Distinguish the competing design issues faced by the DHS ‣ References • US Chapter 13.1 Teaching Science & Technology Inc. Introduction t e n ‣ The communication subsystem is the “ears and mouth” of the spacecraft ‣ The communication subsystem sends payload and subsystem information to the ground station and receives commands in return . i t ts ‣ It consists of modulators/demodulators (“MODEMs”), transmitters, receivers, and antennas • Payload and spacecraft information modulates onto the carrier signal, then is amplified and broadcast to the ground system through the antenna. . w • The spacecraft collects commands from ground stations (using its antenna), amplifies the signal, then demodulates it to produce instructions for the rest of the spacecraft. Communication Subsystem Components. The communication portion of the CDHS consists of modulators (mod), demodulators (demod), transmitters (TX), receivers (RX), and antennas. US Fig. 13-7. w w Vulnerabilities: RF Systems and Data Systems ‣RF Systems ‣Data Handling Systems Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 37 8/2/20 Understanding Space Through a Cyber-Security Lens Introduction - Communication Architecture ‣ The communication subsystem works as part of an overall communication architecture t e n ‣ The communication architecture is the configuration of satellites and ground station nodes in a space system and the network that links them together • • • • . i t s t . Spacecraft—the in-space element Ground stations—Earth-based antennas, transmitters, and receivers w w w Vulnerabilities: RF Systems and Data Systems ‣RF Systems ‣Data Handling Systems Control center—Controls the spacecraft and all other elements in the network Relay satellites—additional spacecraft that link the primary spacecraft with ground stations ‣ Communication subsystems create all of the links between these nodes Communication Architecture. A communication architecture for space missions consists of ground- and space-based elements tied together through different communication paths or links. US Fig. 15-24. Teaching Science & Technology Inc. Delivering the Message - RF Communication Basics ‣ Radio Frequency (RF) Communication is the process of modulating an information signal onto a carrier signal and then retrieving that information at the receiver • ‣ For RF communication, we “cut the string” and use a radio frequency carrier signal in its place • • . w Basic Communication. Two cans and a string provide an example of RF communication with the string taking the place of the carrier signal. US Fig. 13-4. w w For example, by laying the message signal (00101100) onto the carrier frequency, we can see a crude representation of pulse amplitude modulation in the figure shown here By changing, the pulse width (like Morse code), frequency, and other parameters of the carrier frequency, we have a wide variety of coding techniques available in addition to simple AM t e n . i t ts Like 2 cans and a string Vulnerabilities: RF Systems and Data Systems ‣RF Systems ‣Data Handling Systems Amplitude Modulation. This example provides a crude representation of pulse amplitude modulation. US Fig. 13-21. Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 38 8/2/20 Understanding Space Through a Cyber-Security Lens Key Issues ‣ In every day communication, to be heard and understood we must focus on five key issues: t e n ‣ Distance • It takes more energy to communicate over longer distances ‣ Speed . i t s t . • Receiver must be able to process the information as fast as it’s being sent • This is defined by the data rate ‣ Carrier Frequency w w w • Sound must be within the range of human hearing • The “Mosquito” ringtone on cell phones cannot be heard by most adults ‣ Language Vulnerabilities: RF Systems and Data Systems ‣RF Systems Can You Hear Me Now? For a listener to hear and understand you, five things are important: language, distance, carrier ‣Data Handling frequency, data rate and environment. US Fig. 13-3. Systems • Transmitter (speaker) and Receiver (listener) must find a common language ‣ Environment In an analog sense, to be heard and understood, your signal, S, must be greater than the noise, N • Too much background noise can swamp the signal being sent (loud room) S/N > 1 Teaching Science & Technology Inc. Delivering the Message - Link Budgets ‣ The link budget accounts for the data rate and other factors that contribute to the basic ability for the spacecraft and ground system to communicate effectively. ‣ The five key issues are still as important: • Distance - Characterized as Space Losses • Language - Characterized by Modulation method (e.g. AM or FM) • Speed - Defined to be the Data Rate • Environment - Which produces Noise • Carrier Frequency - Regulated and controlled at the national and international level ‣ Since we’re dealing with binary rather than analog communication, the primary figure-of-merit for a digital data link is: • Eb/No (“eb-no”) = the ratio of the received energy per bit (Eb) to noise density (No) ratio • Where a given minimum Eb/No is required for effective communication depending on modulation method used (“language”) ‣ Eb/No can be found using Friis’ Equation shown here derived in 1945 by Danish-American radio engineer Harald T. Friis at Bell Labs. ‣ Link Budget analysis helps us determine if there is enough energy in each bit we send so that the receiver can distinguish between a “1” and a “0” in the presence of background noise . w w w Can You Hear Me Now? For effective RF communication, five things are still important: distance (space losses), language (modulation), speed (data rate), environment (noise), and carrier frequency. US Fig. 13-11. t e n . i t ts Where: Pt = transmitter power Gt = transmit antenna gain Ll = transmitter-to-antenna line loss Ls = space loss La = atmospheric loss Gr = receive antenna gain k = Boltzmann's constant Ts = receiver system noise temperature R = data rate [EIRP] = P Ll Gt = Effective Isotropic Radiated Power = transmitter figure-of-merit Gr / Ts= receiver figure-of-merit Vulnerabilities: RF Systems and Data Systems ‣RF Systems ‣Data Handling Systems All space links are encrypted by various means Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 39 8/2/20 Understanding Space Through a Cyber-Security Lens Design Issues - Limitations ‣ Physical Limits—Atmospheric windows place physical limitations on which frequencies can pass through the atmosphere. t e n . i t s t . ‣ Technical Limits—such as antenna size, available power, data transmission rate, available technology and other spacecraft and ground system specifications constrain the range of frequencies that we can use for a given mission. w w w Vulnerabilities: RF Systems and Data Systems Crippled Antenna. When the high gain antenna on NASA’s Galileo spacecraft bound for Jupiter failed to open, they had to conduct the entire mission using the low gain antenna at a much lower data rate. Courtesy NASA. ‣RF Systems ‣ Legal Limits—National and international licensing of spacecraft frequencies by the International Telecommunications Union (ITU) and the World Administrative Radio Conference (WARC) regulate what frequencies can be used. ‣Data Handling Systems Atmospheric Windows. Earth’s atmosphere is selectively transparent to different wavelengths of EM radiation. To communicate through the atmosphere you need to use a wavelength that will get through. US Fig. 12-7. Trade-offs Teaching Science & Technology Inc. t e n ‣ Communication subsystem designers have a range of options for increasing the chance of being heard (greater Eb/No) but each option comes with its own constraints. . i t ts ‣ These trade-offs are summarized here To increase the chance of being heard you could... But You’re Constrained by... Talk Louder - Increase Transmitter Power (Pt) ⇆ Use a “Megaphone” - Increase Transmitter Gain (Gt) ⇆ Get Closer - Decrease Space Losses (Ls) ⇆ . w Available Spacecraft Power w w Limit for Onboard Antenna Size Required Mission Orbit Listen with “Bigger Ears” - Increase Receiver Gain (Gr) ⇆ Talk Slower - Reduce the Data Rate ⇆ Technology, Time Available to Transmit All Data ⇆ Technology, Existing Ground Stations ⇆ Technology, Frequency Allocation SHUT UP! - Reduce Environmental Noise Use higher carrier frequencies Size of Existing Ground Stations Vulnerabilities: RF Systems and Data Systems ‣RF Systems ‣Data Handling Systems Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 40 8/2/20 Understanding Space Through a Cyber-Security Lens Review - Communications ‣ The communication subsystem is the “ears and mouth” of the spacecraft • Sends payload and subsystem information to the ground station and receives commands in return Vulnerabilities: • Consists of modulators/demodulators (“MODEMs”), transmitters, receivers, and antennas RF Systems and ‣ The communication subsystem works as part of an overall communication architecture Data Systems • The communication architecture is the configuration of satellites and ground station nodes in a space system and the network that links them together • Communication subsystems create all of the links between these nodes ‣ Radio Frequency (RF) Communication is the process of modulating an information signal onto a carrier signal and then retrieving that information at the receiver ‣ The link budget accounts for the data rate and other factors that contribute to the basic ability for the spacecraft and ground system to communicate effectively. Five key issues are important: • Distance - Characterized as Space Losses ‣RF Systems • Language - Characterized by Modulation method (e.g. AM or FM) • Speed - Defined to be the Data Rate ‣Data Handling • Environment - Which produces Noise Systems • Carrier Frequency - Regulated and controlled at the national and international level ‣ Link Budget analysis helps us determine if there is enough energy in each bit we send so that the receiver can distinguish between a “1” and a “0” in the presence of background noise ‣ Key limitations in communication subsystem design include: • Physical limits • Technical limits • Legal limits ‣ System design must manage a variety of trade-offs to best ensure the message gets through Teaching Science & Technology Inc. w w w t e n . i t s t . Introduction - Purpose ‣ The data handling subsystem (DHS) acts as the “brains” of the spacecraft ‣ Its purpose is to manage, store and control all ground commands, payload data and telemetry during every phase of the mission ‣ The DHS “to-do” list reads like this: telemetry for transmission to the ground in real and near-real time w w • Receive and process all payload data • Autonomously Boot up and Self-test • Detect & correct errors (inherent or environmentally induced), and go into a safe mode if necessary . i t ts . w • Respond to ground commands • Collect, process, store and format subsystem health & status t e n Data Handling. The data handling portion of the CDHS is the “brains” of the spacecraft with a long “to-do” list. Vulnerabilities: RF Systems and Data Systems ‣RF Systems ‣Data Handling Systems • Control attitude, orbit, temperature, power and every other process onboard the spacecraft • Allow for on-orbit corrections, updates and upgrades to functionality ‣ And do all of this while operating in the harsh space environment Copyright ©2020 Teaching Science and Technology Inc. Teaching Science & Technology Inc. 41 8/2/20 Understanding Space Through a Cyber-Security Lens Data Architecture ‣ The DHS is one part of an integrated mission data architecture that involves both ground and space data systems t e n ‣ Recall, the whole purpose of virtually all space missions is to generate or transfer data. We’re in the data business! Vulnerabilities: RF Systems and Data Systems . i t s t . ‣ DHS interface to the ground data architecture is via the communication subsystem • These two systems are so tightly coupled that they are sometimes lumped together as the Communication and Data Handling Subsystem (CDHS) which together act as the spacecraft’s “ears,” “brain,” and “mouth.” w w w Data Architecture. The Data Handing Subsystem is the key link in the complex “data chain” that ultimately delivers payload data to users, processes onboard commands, and sends health and status telemetry (TLM) to operators. US Fig. 132. ‣RF Systems ‣Data Handling Systems Teaching Science & Technology Inc. What’s in the DHS? t e n ‣ The data handling subsystem (DHS) consists of: • Central Processing Unit (CPU) - Where the “thinking” takes place - Based on terrestrial computers, but constrained by the radiation . i t ts environment - Usually several generations behind ground computers in capability • Memory - RAM, ROM and other solid state memory devices store . w the operating system, application programs, health and status telemetry data as well as payload data - Data storage has become basically “free” as terabits can now be readily stored onboard even small satellites. w w • Input/Output - Data lines that interface to sensors and other subsystems - Typically based on some standard (e.g. MilStd-1553 or Space Wire) • Other Components - Transducers to sense temperature, pressure, etc. - Field-programmable Gate Arrays (FPGAs) - Application-specific Integrated Circuits (ASICs) • Software - To execute all key functions Copyright ©2020 Teaching Science and Technology Inc. Data Handling. The data handling subsystem components. US Fig. 13-13. Vulnerabilities: RF Systems and Data Systems ‣RF Systems ‣Data Handling Systems Teaching Science & Technology Inc. 42 8/2/20 Understanding Space Through a Cyber-Security Lens Spacecraft Software Flying Software. Spacecraft have become “flying software” in the sense that every single subsystem depends, at least to some extent, on software to perform its functions. US Fig. 13-15. w w w t e n . i t s t . Vulnerabilities: RF Systems and Data Systems ‣RF Systems ‣Data Handling Systems Teaching Science & Technology Inc. Software Growth t e n ‣ The amount of software in space and every-day systems has exploded over the last decade! ‣ Spacecraft software development essentially never ends throughout the mission life • A 2x growth in software from launch to end of mission is common . i t ts ‣ Even your car probably has nearly 100 million lines of code! ‣ The more we depend on software for every conceivable spacecraft function, the more likely we’ll experience software-related failures ‣ As space system software reaches millions of lines of code, it becomes practically impossible to fully test before launch (or ever) - a sobering thought Software Explosion. This graph shows the exponential increase in software for NASA planetary missions, from Mariner-6 in 1969 to the Mars Science Lab in 2013. Note the scale is logarithmic. (Adapted from NASA Study Flight Software Complexity, 10/09/2008). US Fig. 13-16. w w . w Copyright ©2020 Teaching Science and Technology Inc. Vulnerabilities: RF Systems and Data Systems ‣RF Systems ‣Data Handling Systems Teaching Science & Technology Inc. 43 8/2/20 Understanding Space Through a Cyber-Security Lens Software Failures t e n ‣ What Happened? • Upon arrival at Mars in September 1999, the Mars Climate Orbiter (MCO) began a scheduled 16-minute Mars orbit insertion (MOI) maneuver to achieve orbit Vulnerabilities: RF Systems and Data Systems . i t s t . • Approximately 49 seconds before the anticipated occultation by Mars, communication was lost and never reestablished • The cumulative effect of these small impulses led to a 169 km navigation error, which was catastrophic to the mission w w w ‣ Root Causes: ‣RF Systems • Root cause of mission loss was an error in the “Sm_forces” program output files, which were delivered to the navigation ‣Data Handling team in English units (pounds-force seconds) instead of the Systems specified metric units (Newton-seconds). • The "Sm_forces" software was misclassified as non-mission critical, which reduced the rigor of the review program. Death Dive. Did You Mean Pounds or Newtons? Courtesy AGI. • The Software Management and Development Plan (SMDP) was not followed in the walkthroughs of the "Sm_forces" software Teaching Science & Technology Inc. Design Issues t e n ‣ Mission needs • How smart does the satellite need to be? - Level of autonomy ‣ Spacecraft needs • What needs to get done? - Number and type of data handling tasks • Where will it get done? - Overall complexity and distribution of data handling tasks - Implement Onboard vs. On the Ground - Implement in Hardware vs. Software - Implement in Software vs. Firmware single event phenomena . w w w • How tough? - Level of radiation tolerance needed to survive ‣ Developer Needs • How to build it? - Language, development environment and tools • How to test it? - Integrated hardware-in-the-loop test beds ‣ Operational Needs - “-ilities,” e.g. flexibility, maintainability Copyright ©2020 Teaching Science and Technology Inc. . i t ts Vulnerabilities: RF Systems and Data Systems ‣RF Systems ‣Data Handling Systems DHS Design Issues. The design of the data handling subsystem hinges on how we address a number of mission, spacecraft, developer and operator needs. Teaching Science & Technology Inc. 44 8/2/20 Understanding Space Through a Cyber-Security Lens Review - Data Handling ‣ The data handling subsystem (DHS) acts as the “brains” of the spacecraft. Its purpose is to manage, store and control all ground commands, payload data and telemetry during every phase of the mission. It needs to: t e n • Respond to ground commands Collect, process, store and format subsystem telemetry and payload data • Autonomously Boot up and Self-test, Detect & Correct Errors and go into a Safe Mode if necessary • Control attitude, orbit, temperature, power and every other process onboard the spacecraft Allow for on-orbit corrections, updates and upgrades to functionality • • . i t s t . Vulnerabilities: RF Systems and Data Systems ‣ The DHS is one part of an integrated mission data architecture that involves both ground and space data systems ‣ The DHS consists of: • Central Processing Unit (CPU) - Where the “thinking” takes place w w w • Memory - RAM, ROM and other solid state memory devices store the operating system, application programs, health and status telemetry data as well as payload data • Data storage has become basically “free” as terabits can now be readily stored onboard even small satellites • • Input/Output - Data lines that interface to sensors and other subsystems Other Components such as transducers, FPGAs and ASICs • Software - To execute all key functions ‣RF Systems ‣Data Handling Systems ‣ Software drives all data handling functions - Spacecraft have become “flying software” • The amount and complexity of software in space systems (and terrestrial systems for that matter) is exploding • The more we depend on software, the more likely software will contribute to failures Teaching Science & Technology Inc. Key Take-Aways—Through a CyberSpace Lens ‣ RF security still a niche sub-field of cyber-security . w ‣ Hardware/software vendors, developments environments, legacy languages create additional vulnerabilities w w t e n . i t ts ‣ Access to RF equipment (Rx, Tx) is relatively easy, but everyone’s links are encrypted Vulnerabilities: RF Systems and Data Systems ‣RF Systems ‣Data Handling Systems ‣ The more space relies on software, the more stakeholders are involved, the more people there are working on the project, the higher the vulnerability Teaching Science & Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 45 8/2/20 Understanding Space Through a Cyber-Security Lens Cyber Challenge Scenario ‣ Background: • YLee Imaging has been operating a high resolution commercial remote sensing satellite for about 2 years. The U.S. Government is one of their largest customers. • The satellite is in a 710 km Sun-syncronous orbit with a 10:33 am southbound nodal crossing time • YLee operates their own ground station in Colorado but leases access to ground stations in Norway and Alaska. • The satellite was built by Acme Aerospace in Iowa. Two more satellites are currently in final development for launch next year. ‣ Issue • t e n . i t s t . During the last two passes (1 over Norway, 1 over Colorado) YLee operators noticed bad headers on roughly 10% of the spacecraft health and status telemetry data packets (no problems noted with payload data downloads). This is about 1000 worse than would normally be expected based on the link budget. w w w ‣ Challenge Questions 1.How would you determine if this issue was due to natural or man-made causes? 2.What would be potential reasons for natural causes? 3.Assuming the issue is due to malicious causes, what opportunities would a bad actor have? 4.Assuming the issue is due to malicious causes, what vulnerabilities could have been exploited? 5.Given there are two more satellites in development, what design or operational changes could be considered to prevent future issues of this type? Course Trajectory Review Teaching Science & Technology Inc. ✦ Course ✦ Context ‣ . i t ts The Space Mission Architecture Understanding Space ✦ Opportunities ‣ Understanding Orbits ‣ Space Mission Operations ✦ Threats ‣ The Space Environment ‣ The Human Environment ✦ Vulnerabilities ‣ RF Systems ‣ Space Data Architectures t e n Threats—Natural & Human Introduction . w w w Through a Cyber Lens Vulnerabilities—RF Systems & Data Architectures Opportunities—Orbits & Operations Course Introduction Copyright ©2020 Teaching Science and Technology Inc. Context Copyright ©2020 Teaching Science and Technology Inc. 46 8/2/20 Understanding Space Through a Cyber-Security Lens Course Objectives Review ✦At the end of this course you should be able to… t e n ‣ Gain Core Space Knowledge • Describe the Space Mission Architecture, the context for all space activities . i t s t . ‣ Comprehend space mission Capabilities, Trade-offs and Limitations specific to the cyber-security domain • Explain how orbital mechanics and operational architectures w w w constrain access to space systems ‣ Discuss natural and human-made threats to space systems Apply Space Concepts Understand Threats Comprehend Capabilities and Limitations Gain Core Space Knowledge Learning Trajectory. Throughout the course we’ll build your core space knowledge so you tackle ever more challenging space problems in the cyber-security domain. • Describe potential vulnerabilities to space systems through communications links and data architectures ‣ Apply Cyber/Space Concepts to real-world scenarios Course Introduction Copyright ©2020 Teaching Science and Technology Inc. . i t ts . w Thank you for your time and attention! w w t e n Please visit us at: www.tsti.net Course Introduction Copyright ©2020 Teaching Science and Technology Inc. Copyright ©2020 Teaching Science and Technology Inc. 47 8/2/20 Understanding Space Through a Cyber-Security Lens Notes w w w t e n . i t s t . Course Introduction Copyright ©2020 Teaching Science and Technology Inc. Notes . i t ts . w w w Course Introduction Copyright ©2020 Teaching Science and Technology Inc. t e n Copyright ©2020 Teaching Science and Technology Inc. 48