Kirk Lippold
Space, Cyber, National Security, Defense, Satellites, United States, Russia, China, Asia-Pacific
Reflecting on the past and looking toward the future in the movie, Field of Dreams, Kevin Costner built a baseball field on the premise that, “If you build it, they will come.” That statement proved prescient for many military systems that have enriched and improved how our society and economy function. One of those key systems is the Global Positioning System (GPS).
When GPS was originally envisioned and fielded, like the Internet, very few foresaw its utility for society. Today, GPS has become so ingrained into the functioning of our society and economy that the Government Accountability Office described it as an “invisible utility” underpinning many applications critical to the nation’s security and economy.
As computer and electronic systems become more integrated and interrelated across military and civilian uses, the growing threat of cyber attacks and in some cases, warfare, has grown into a significant danger. The risk to GPS systems has long been viewed as an area of particular vulnerability as more military assets and weapons systems have come to rely on GPS signals and targeting accuracy moved to the forefront in operational planning and execution. Anticipating the requirement to adapt and overcome this and other vulnerabilities, the Air Force began development of the next generation of robust GPS satellite and ground systems.
When the U.S. Air Force launched the GPS improvement program to enhance the ground-based portion of the GPS satellite system in conjunction with a program to update and upgrade the space-based system with new satellites (GPS IIIA), it was tasked to greatly increase the accuracy of the current GPS fleet, enhance the system’s ability to withstand robust cyber threats, improve and secure more information sharing, and provide monitoring capability of civilian and military satellite systems. As the next generation satellite and ground-based system, the GPS OCX system is also being specifically designed with a more capable and robust ability to withstand the growing number and complexity of cyber intrusions and attacks.
Read full article