When we ideate space warfare, we representation shattered satellites and orbital debris. The world is quieter but besides much dangerous. The markers of modern orbital struggle are awesome loss, deliberate misdirection, and abrupt strategy failures.
In the archetypal hours of Russia’s penetration of Ukraine successful 2022, a cyber-attack crippled Viasat’s KA-SAT network, severing captious communications crossed Europe. GPS spoofing incidents person likewise misled civilian craft and maritime vessels, luring ships into hazardous shoals oregon corrupting formation computers to trigger mendacious terrain alerts efficaciously weaponising a platform’s ain information logic against its operators.
The adjacent struggle successful abstraction volition statesman with silence, with jammed signals, altered coordinates, and compromised systems. Space is contiguous captious infrastructure and vulnerabilities related to abstraction are often tantamount vulnerabilities successful quality society.
This vulnerability is built into the architecture of abstraction systems. Interference leaves nary carnal hint yet it tin beryllium devastating. It operates utilizing 3 tools: jamming (or blocking signals), spoofing (sending mendacious data), and crushed presumption hacking (taking power of outer systems).
As a result, nary carnal demolition is needed to paralyse an adversary — which is an important displacement successful the mode struggle plays retired successful orbit. And due to the fact that financial, energy, and connection networks beryllium connected satellites, specified intrusions tin besides trigger cascading failures connected the earth.

Legal blindspot
This alteration exposes a deeper ineligible problem. As the Prussian subject theorist Carl von Clausewitz observed, warfare is defined by its effects. If cyber operations tin disable satellites that enactment powerfulness grids, fiscal systems oregon exigency communications, their consequences are indistinguishable from a carnal strike. However, the United Nations Charter does not intelligibly code cyber operations wrong its Article 2(4) prohibition connected the “use of force”.
A functional, effects-based trial is truthful indispensable to construe “use of force” successful the orbital domain. As of 2026, respective states person moved to the presumption that a cyber cognition does not necessitate carnal ‘smoke and fire’ to interruption Article 2(4). Instead, if a integer intrusion functionally disables a satellite, efficaciously bricking it, the strategical and economical consequences are identical to a kinetic strike. In this context, nonaccomplishment of functionality is the caller shattered glass.
However, it besides comes with a challenge, called the attribution gap. Under the International Law Commission model connected authorities responsibility, ineligible liability is contingent connected identifying the perpetrator with precocious evidentiary certainty. In the integer domain, operations routed done proxy networks and spoofed identities make a furniture of strategical anonymity that complicates accepted deterrence.
This is little a method flaw and much a structural tension: arsenic agelong arsenic evidentiary standards are based connected visible, carnal proof, the invisible quality of cyber-disruption volition proceed to connection a important strategical vantage to aggressors. In different words, existing planetary instrumentality recognises unit by its consequences — yet it remains successful a reactive posture arsenic some the enactment and the histrion stay obscured.

Collapse of civilian-military divide
The ineligible protections designed to safeguard non-combatants are deteriorating successful the look of modern technology. The Outer Space Treaty and planetary humanitarian instrumentality trust heavy connected the rule of distinction, requiring warring parties to differentiate betwixt civilian objects and subject targets.
However, modern satellites are dual-use by default. Civilian GPS networks, commercialized broadband constellations, and fiscal timestamping systems present routinely enactment quality gathering and drone targeting. Because militaries piggyback connected commercialized infrastructure, these assets often suffer their protected civilian presumption nether planetary humanitarian law.
That said, successful practice, the ‘civilian satellite’ is becoming a ineligible fiction. When commercialized constellations supply ‘space arsenic a service’ for subject kill-chains — a.k.a. the Starlink Precedent — they dissolve the favoritism entirely. In this environment, an full web tin go a morganatic grey-zone target, adjacent if it simultaneously serves schools oregon hospitals.
State of soundless conflict
Former British service serviceman and writer Emile Simpson has distinguished betwixt accepted Clausewitzian warfare and modern conflict: the erstwhile seeks a definitive subject determination portion the second functions arsenic a nonstop instrumentality of governmental connection aimed astatine fragmented audiences.
In space, cyber operations alteration ambiguous, deniable attacks that are designed to signifier perceptions of authorities powerfulness alternatively than to unafraid territorial gains. Because they debar the debris and visibility of kinetic strikes, they incentivise constant, low-level disruption. This creates a persistent authorities of friction that ne'er crosses the threshold of warfare but continuously undermines the governmental legitimacy of the targeted state.
For India, the 2026 CERT-In/SIA-India Guidelines institutionalised a “secure-by-design” doctrine for abstraction systems. They embed cybersecurity into each signifier of the outer lifecycle, from plan and motorboat to in-orbit operations and decommissioning. They besides place threats specified arsenic awesome jamming, spoofing, and unauthorised bid access, and urge layered safeguards crossed space, ground, and connection segments. However, an enforcement spread remains: India is expanding its beingness successful orbit faster than it is gathering the quality to observe and hint cyberattacks successful existent time.

Objective of disruption
The effect cannot stay reactive. States indispensable determination from advisory norms to enforceable “secure-by-design” standards, clarify erstwhile cyber operations successful abstraction represent a usage of force, and fortify cooperative attribution mechanisms. Without this, ambiguity volition proceed to favour the attacker. In a integer battlefield, if an attacker cannot beryllium identified wrong minutes, they cannot beryllium deterred astatine all.
For the Global South, this integer battlefield poses the unsocial menace of orbital dependency. When the integer backbones of processing economies are hosted connected third-party commercialized constellations, a soundless onslaught tin unsighted a subject and, much importantly, efficaciously paralyse a state’s quality to govern, disenfranchising a federation successful a azygous integer stroke.
In this caller era, the nonsubjective is nary longer to destruct a outer but to disrupt the nine that depends connected it.
Shrawani Shagun is simply a researcher focusing connected biology sustainability and abstraction governance.

2 weeks ago
1




