Tag Archive for: grey zone

A task for Trump: stop China in the South China Sea

For more than a decade, China has been using an increasingly aggressive hybrid-warfare strategy to increase its power and influence in the strategically important South China Sea. Countering it will be one of the defining challenges for US president-elect Donald Trump’s incoming administration.

Chinese President Xi Jinping’s Chinese dream of global preeminence depends significantly on achieving dominance in the South China Sea and ending America’s primacy in the Indo-Pacific region, an emerging global economic and geopolitical hub. And China has not hesitated to use coercive tactics in service of these objectives.

In recent years, boats belonging to countries whose territorial claims China disregards, such as the Philippines and Vietnam, have faced blockades, ramming, water-cannon attacks, and even bladed-weapon assaults by Chinese vessels. Offshore energy operations endure frequent harassment. Simply fishing in waters that China calls its own can expose a person to a Chinese attack with iron pipes. Such violent confrontations have heightened regional tensions and undermined stability in a crucial corridor linking the Pacific and Indian Ocean.

One might have expected the United States to take action to rein in China’s behavior, especially given its mutual defense treaty with the Philippines. And yet, three successive presidents—Barack Obama, Trump, and Joe Biden—have failed to offer anything beyond statements of support and symbolic action. In 2012, Obama allowed China’s brazen seizure of the disputed Scarborough Shoal from the Philippines to go unpunished.

This was hardly the first time the US had failed to live up to its defense commitments to the Philippines. In 1995, the Philippines requested US help to block Chinese forces from capturing Mischief Reef, just 129 nautical miles from the Philippine island of Palawan. US President Bill Clinton, smarting over the termination three years earlier of America’s right to maintain military bases in the Philippines, refused. Mischief Reef is now an important Chinese military base.

The more China has got away with, the bolder it has become. Following the capture of the Scarborough Shoal, Xi embarked on a land-reclamation frenzy, creating 1300 hectares of land in the South China Sea, including seven artificial islands that now serve as forward operating bases. China has built 27 military outposts on disputed islands, which now bristle with short-range missiles, reconnaissance gear, radar systems and laser and jamming equipment. Its larger islands also feature aircraft hangars, runways and deep-water harbors. By unilaterally redrawing South China Sea’s geopolitical map, China is ensuring that it is uniquely positioned to project power in the region.

Even as China has gradually eroded the Philippines’ security, including Philippine control of areas within its exclusive economic zone, the US has continued to underscore its ‘ironclad’ defense commitment to its ally. Late last year, the Biden administration affirmed that any armed third-party attack against the Philippine military, coast guard, aircraft or public vessels ‘anywhere in the South China Sea’ is covered by the US–Philippines Mutual Defense Treaty. Yet China remains unpunished—and undeterred.

What explains this yawning gap between rhetoric and action? First and foremost, the US fears escalation, especially when its resources and attention are being consumed by the wars in Ukraine and the Middle East. Moreover, the US prefers not to weigh in on sovereignty disputes in the South China Sea, where it has no territorial claims of its own. It has not even taken a position on the sovereignty of the Japanese-administered Senkaku Islands, which China also claims.

The US has, however, made clear that its security treaty with Japan covers those islands and cautioned against ‘any unilateral action that seeks to undermine Japan’s administration.’ It should do the same for the Philippines, stating unequivocally that its treaty commitment to the country covers any efforts to compel a change in areas currently under Philippine administrative control, including Second Thomas Shoal, which China has been attempting to besiege.

In support of this stance, the US could cite the 2016 ruling by an international arbitration tribunal that China’s territorial claims in the South China Sea have no legal basis and that Chinese actions within the Philippine exclusive economic zone violated the Philippines’ sovereignty. But China’s open contempt for that ruling should dispel any hope that the South China Sea’s future will be decided by international law, which is why the US must be prepared to back up such a statement with action.

If the US does stand up for its treaty ally, it can take advantage of the nine Philippine naval and air bases to which it has gained access within the last decade, two of which are located just across from Taiwan and southern China. If it does not, China will continue to solidify its dominance over the South China Sea, thereby cornering the region’s rich energy and fishery resources and gaining the ability to disrupt supply chains and punish countries for acts it deems unfriendly.

China will not stop at the South China Sea. Under Xi’s leadership, China has used a similar combination of deception, bullying, coercion and surprise to expand its territorial control elsewhere, from the East China Sea to the Himalayas, sparing not even the tiny country of Bhutan. As with any bully, the only way to stop China is to confront it with a credible challenger. The US must be that challenger, and it should start by defending the Philippines.

Why cyber indictments and sanctions matter

On 25 March, the US and Britain attributed malicious cyber activity to a China-based hacking group backed by the Chinese government. They issued indictments and sanctions.

The hacking was aimed at influencing opinion, at suppressing criticism of China and at stealing intellectual property. China also sought to strike at the heart of liberal democracies by attacking electoral processes, democratic institutions and political officials. In the attack on Britain, China stole the names and addresses of 40 million voters. 

The British and US responses are weak, in the sense that the consequences for China are virtually nil. Britain sanctioned two people and one front company, while the US charged seven individual hackers. The UK attacks were in 2021, and critics have complained about the lack of urgency. The US attacks took place over the past 14 years. 

Are these reprisals too little, too late? It might be easy to think so, but it must be acknowledged that attributing an attack to a particular country is bureaucratically and technically difficult and politically hazardous. Sanctions and indictments add more layers of complexity. Some countries are still developing the processes and legislative tools required. New Zealand, for example, has yet to develop an autonomous sanctions regime.  

Cyber attributions, sanctions and indictments are largely strategic communication exercises—but can shift actors’ behaviour in the right circumstances. We must maximise the power of these communications by choosing the right message, at the right time, augmented by the right partners. China is conducting hundreds of cyber attacks against Australia, the US, Britain and likeminded Asian partners like Japan every day. Putting out hundreds of attributions would only dilute the strength of our statements. We must pick our moments. 

The US and Britain have taken steps in the right direction. And despite the challenges, Australia and its partners are getting better and faster at these attributions and associated punitive measures, such as sanctions. Supportive statements have come from Australian Foreign Affairs Minister Penny Wong and Home Affairs Minister Clare O’Neil. And New Zealand is accusing China of cyber hacks against its parliament in 2021. 

There is a growing appetite for calling out China, Russia and others for their bad behaviour. In 2018, the US indicted 12 Russians for interference in the 2016 US elections. There was a series of major joint attributions by the Five Eyes and others in 2023, including of Chinese cyber campaign Volt Typhoon and the Russian snake malware. In January this year, Australia sanctioned Russian citizen Aleksandr Ermakov over a 2022 cyber attack on the Medibank health fund. Australia was soon joined by the US and Britain with their own additional sanctions.  

To repay the favour and show solidarity, Australia should now join the US and Britain in sanctioning Chinese hackers. 

Further action should also include the US, Britain, Australia and its partners sanctioning the Chinese government decisionmakers authorising these cyber operations. In the most recent case, we should target Tu Hongjian, the director of the Hubei State Security Department, who probably authorised the hacking activity. 

Democracies should signal that if China’s cyber operations continue then the sanctions regime will escalate to target CCP elites, such as Chen Yixin, China’s minister of state security, or Chen Wenqing, the secretary of the Chinese Communist Party’s Central Political and Legal Affairs Commission, who oversees China’s state security system. 

The cyber attacks described by the US and Britain did not impact Australia, but they represent a trend in Chinese cyber activity of increasingly targeting democratic institutions, social cohesion and critical infrastructure. At the same time, China continues to target Australia with cyber espionage and as part of the global effort that ASIO director Mike Burgess called in October last year “the largest theft of intellectual property in human history”. 

Australia should expect greater interference with our next elections, especially with generative AI and deepfakes. A fake, AI-generated voice from President Joe Biden has already targeted US voters this year.  

The rapid growth of generative AI capabilities will make this even easier and cheaper for any malicious actor. That’s why there have been major international efforts to combat this, including the Tech Accord to Combat Deceptive Use of AI in 2024 Elections, announced at the Munich Security Conference in February this year and signed by 20 major tech companies. 

AI-augmented information operations will be aimed at producing wide-scale fear, uncertainty and doubt about elections, along with hyper-targeting of individuals with sophisticated fake media. Australia needs to understand that this is a threat to our way of life. We can’t allow this to become normalised. It is not normal. 

Democracies run on trusted information. China’s targeting of our electoral systems are attempts to poison the well and create distrust and chaos, weakening our social cohesion. These grey zone cyber attacks may fall short of outright conflict, but they are pushing close up against it. Targeting electoral systems strikes at the heart of our liberal democratic societies, and we cannot stand idly by. 

So how can we respond? Ignoring China’s current reality won’t help. Australia, alongside its partners, needs a clear-eyed strategy. We face a China in 2024 defined by its authoritarian rule, territorial ambitions and sophisticated, industrial-scale foreign interference tactics. This China bullies both weak and strong nations, aiming to reshape the global order in its favour. 

Australia should maintain a focus on cyber sanctions and indictments, enhance international cooperation across public and private sectors and build strong coalitions to counter China’s cyber and information operations, especially those aimed at our electoral systems and social cohesion. When electoral systems are targeted, Australia has a moral imperative to respond. This approach should be deployed in the context of increasing our national cyber resilience, a never-ending job that includes better technical shields and more informed human behaviour.  

We are not at war with China, but we are not really at peace, either. These grey zone activities fall short of conventional conflict but we must take them for what they are: state-on-state attacks. 

Why cyber indictments and sanctions matter

On 25 March, the US and Britain attributed malicious cyber activity to a China-based hacking group backed by the Chinese government. They issued indictments and sanctions.

The hacking was aimed at influencing opinion, at suppressing criticism of China and at stealing intellectual property. China also sought to strike at the heart of liberal democracies by attacking electoral processes, democratic institutions and political officials. In the attack on Britain, China stole the names and addresses of 40 million voters. 

The British and US responses are weak, in the sense that the consequences for China are virtually nil. Britain sanctioned two people and one front company, while the US charged seven individual hackers. The UK attacks were in 2021, and critics have complained about the lack of urgency. The US attacks took place over the past 14 years. 

Are these reprisals too little, too late? It might be easy to think so, but it must be acknowledged that attributing an attack to a particular country is bureaucratically and technically difficult and politically hazardous. Sanctions and indictments add more layers of complexity. Some countries are still developing the processes and legislative tools required. New Zealand, for example, has yet to develop an autonomous sanctions regime.  

Cyber attributions, sanctions and indictments are largely strategic communication exercises—but can shift actors’ behaviour in the right circumstances. We must maximise the power of these communications by choosing the right message, at the right time, augmented by the right partners. China is conducting hundreds of cyber attacks against Australia, the US, Britain and likeminded Asian partners like Japan every day. Putting out hundreds of attributions would only dilute the strength of our statements. We must pick our moments. 

The US and Britain have taken steps in the right direction. And despite the challenges, Australia and its partners are getting better and faster at these attributions and associated punitive measures, such as sanctions. Supportive statements have come from Australian Foreign Affairs Minister Penny Wong and Home Affairs Minister Clare O’Neil. And New Zealand is accusing China of cyber hacks against its parliament in 2021. 

There is a growing appetite for calling out China, Russia and others for their bad behaviour. In 2018, the US indicted 12 Russians for interference in the 2016 US elections. There was a series of major joint attributions by the Five Eyes and others in 2023, including of Chinese cyber campaign Volt Typhoon and the Russian snake malware. In January this year, Australia sanctioned Russian citizen Aleksandr Ermakov over a 2022 cyber attack on the Medibank health fund. Australia was soon joined by the US and Britain with their own additional sanctions.  

To repay the favour and show solidarity, Australia should now join the US and Britain in sanctioning Chinese hackers. 

Further action should also include the US, Britain, Australia and its partners sanctioning the Chinese government decisionmakers authorising these cyber operations. In the most recent case, we should target Tu Hongjian, the director of the Hubei State Security Department, who probably authorised the hacking activity. 

Democracies should signal that if China’s cyber operations continue then the sanctions regime will escalate to target CCP elites, such as Chen Yixin, China’s minister of state security, or Chen Wenqing, the secretary of the Chinese Communist Party’s Central Political and Legal Affairs Commission, who oversees China’s state security system. 

The cyber attacks described by the US and Britain did not impact Australia, but they represent a trend in Chinese cyber activity of increasingly targeting democratic institutions, social cohesion and critical infrastructure. At the same time, China continues to target Australia with cyber espionage and as part of the global effort that ASIO director Mike Burgess called in October last year “the largest theft of intellectual property in human history”. 

Australia should expect greater interference with our next elections, especially with generative AI and deepfakes. A fake, AI-generated voice from President Joe Biden has already targeted US voters this year.  

The rapid growth of generative AI capabilities will make this even easier and cheaper for any malicious actor. That’s why there have been major international efforts to combat this, including the Tech Accord to Combat Deceptive Use of AI in 2024 Elections, announced at the Munich Security Conference in February this year and signed by 20 major tech companies. 

AI-augmented information operations will be aimed at producing wide-scale fear, uncertainty and doubt about elections, along with hyper-targeting of individuals with sophisticated fake media. Australia needs to understand that this is a threat to our way of life. We can’t allow this to become normalised. It is not normal. 

Democracies run on trusted information. China’s targeting of our electoral systems are attempts to poison the well and create distrust and chaos, weakening our social cohesion. These grey zone cyber attacks may fall short of outright conflict, but they are pushing close up against it. Targeting electoral systems strikes at the heart of our liberal democratic societies, and we cannot stand idly by. 

So how can we respond? Ignoring China’s current reality won’t help. Australia, alongside its partners, needs a clear-eyed strategy. We face a China in 2024 defined by its authoritarian rule, territorial ambitions and sophisticated, industrial-scale foreign interference tactics. This China bullies both weak and strong nations, aiming to reshape the global order in its favour. 

Australia should maintain a focus on cyber sanctions and indictments, enhance international cooperation across public and private sectors and build strong coalitions to counter China’s cyber and information operations, especially those aimed at our electoral systems and social cohesion. When electoral systems are targeted, Australia has a moral imperative to respond. This approach should be deployed in the context of increasing our national cyber resilience, a never-ending job that includes better technical shields and more informed human behaviour.  

We are not at war with China, but we are not really at peace, either. These grey zone activities fall short of conventional conflict but we must take them for what they are: state-on-state attacks. 

Why a hard-kill strategy doesn’t work against combat drones

The drone threat is finally being taken seriously. Following the relentless devastation they have caused on the battlefield, combined with the endless ways they can threaten or disrupt civilian life—at airports, public events and jails, to name a few—defence agencies and authorities around the world are now evaluating their stance on what just a few years ago were discounted as harmless consumer gadgets.

But the warning signs have been clear for years. Back in 2020, drones arguably decided the Azerbaijan–Armenia conflict, in which the former used Turkish- and Israeli-made uncrewed aerial systems to cripple the latter’s heavy armour and artillery.

Fast-forward a few years and the Russo–Ukraine war has provided countless examples of the use and impact of drones. Both sides of the conflict are dealing with drones—either monitoring their movements, using them to drop explosives or sending them to kamikaze into their targets.

Outside the battlefield, cheap, store-bought drones have brought airports to standstills, disrupted major sporting events, threatened presidential elections and even been used to hack companies and critical infrastructure.

As with most things that are perceived to do harm, the instinct of many defence agencies has been to fight fire with fire—hurt it before it hurts us. Hard-kill capabilities are at the forefront, and there’s a rising appetite to use bullets and lasers to down drones that come too close.

Unfortunately, hard-killing drones is rarely effective. The German Flakpanzer Gepard anti-aircraft gun has been successful against the Iranian HESA Shahed 136, but it remains an exception, not the norm. And despite its usefulness in the instance of the Shahed, it still suffers ammunition resupply issues, uses ‘dumb’ bullets and, ultimately, will face new challenges as foes get smarter.

The reality is that the old-hat method of shooting at anything that poses a threat is extremely difficult when the target is a small object moving at 100 kilometres an hour in often unpredictable patterns. Many militaries have tried using small arms, but it almost never works unless the drones are extremely close and there are only a few of them.

A centrepiece of Ukraine’s defence against Russia is the use of soft-kill capabilities to defeat drones. Soft kill—or smart jamming—uses radio frequency instead of bullets and lasers. It can actively monitor for drones, unlike yesteryear’s sensors, and take them down using handheld devices without explosions.

Soft kill is also free of the restrictions of ammunition. Fragmenting rounds from large turreted weapons—typically of the 25- to 35-millimetre calibre variety—can down a few drones, but large amounts of ammunition are required to deal with just a few targets. Then there’s the issue of setting up and moving the turret, alongside the logistics of resupply. In a warzone, militaries don’t have the luxury of time, or ammunition to waste.

While soft-kill capabilities such as jamming can ‘light up’ on the enemy’s electronic warfare systems, firing kinetic rounds at a target is even more obvious to everyone around, and hence offers far less stealth and protection.

With the cost of manufacturing drones consistently dropping, the appetite for using them in swarms rises. China’s People’s Liberation Army, for example, has amassed an array of drones, including Chinese drone company DJI’s consumer-off-the-shelf units, which are available on demand. If Beijing declares war on Taiwan, hoping for bullets as a primary defence mechanism would be akin to relying on a BB gun to bring down a swarm of locusts. Taiwan might destroy a few, but the thousands of others would achieve their objective, especially if they were $200 drones strapped with explosives targeting expensive tanks and civilian hotspots with kamikaze-style attacks.

Even if, by some miracle, bullets and lasers become much more effective, there’s incredible scope for collateral damage. Shooting a drone carrying explosives or biological agents will trigger those payloads, and the bullets and lasers could hit unintended targets. Bullets need to land somewhere, which make guns and turrets unsuitable outside the battlefield, and a powerful laser pointing up could damage a satellite in orbit.

As well as having unlimited ammunition, radio-frequency smart jamming is primed to affect large, targeted areas, making it a stronger option against swathes of drones. It also comes with simplicity. Firing a smart jammer is far easier than discharging a firearm, doesn’t create panic in a crowded situation, and eliminates the risk of collateral damage—in fact, it doesn’t even damage drones.

Whether it’s in a war or in a civilian scenario, downing drones only solves one part of the problem. However, a drone that has been jammed remains intact, opening the door for retrieval and forensic investigation. This gives defence forces the ability to review data, including photos, videos, flights and location information to pinpoint operators. Autonomous units can also be managed by disrupting the satellite links, and then gathering crucial information about their origins.

As drones evolve and become even more prolific on the battlefield—and outside it, as part of grey-zone warfare—it’s crucial that tactics for dealing with them mature too. We don’t need to shoot down everything that might be a threat to us. And with so many gaps in hard-kill tactics, it’s crucial to get smarter about drone defence.

Defence faces big task in dealing with tangled strategic logics

The rapidly changing strategic environment is prompting reassessments of Australia’s defence posture and capability. Rather than simply reviewing equipment purchases and stepping up training schedules, there’s cause for a deeper re-evaluation of the strategic logic that underpins power, the posture of nations and how they interact.

Most national strategies remain embedded, understandably, in the precepts of conventional warfare. Coercion remains the key dynamic: nations are interested in either persuading other nations to align with their interests or adopt their worldview or applying force to meet demands. That application of force is typically achieved through kinetic means, as is the case in Ukraine. Conventional warfare depends on being able to apply force, backed by logistics and long-term sustainment—and ensuring enough personnel, materiel and political will—at key points. Terms of engagement became codified. There are thresholds between war and peace.

A second strategic logic emerged after World War II, that of nuclear warfare. Under nuclear strategy, outcomes are achieved through the prospective use of nuclear weapons—deterrence is the central dynamic. Nuclear deterrence rests on a believable and apparent commitment to use nuclear weapons, implying possession, capability and intent. In contrast to conventional warfare, nuclear warfare was expected to be massive but short and sharp, implying less need for sustainment tails. The imperatives driving the management of nuclear strategy are risk mitigation and escalation control, which engage civilians to a much greater extent.

The existence of two distinct but interacting, and potentially catastrophic, domains of strategic logic makes the national calculus increasingly difficult. One doesn’t need nuclear weapons to wreak devastation. But the complexity of the strategic calculus rachets up with nuclear weapons.

During the Cold War, mechanisms evolved to make that complexity more manageable. Bipolarity simplified the strategic equation. Extended deterrence dissuaded allies from developing their own nuclear capabilities and assuming the associated costs necessary for meaningful deterrence.

Since the end of the Cold War, a third and markedly different strategic logic has emerged: cyber. Unlike land, sea, air and space, cyber is entirely human made, and human actions in that domain change the operating conditions in the domain. The cyber environment is dynamic, mutable and effectively infinite. Concepts intrinsic to the other domains, including deterrence and coercion, are largely meaningless in the cyber domain.

Yet the cyber environment is of concern because of the ubiquity and embeddedness of digital technologies in every facet of our society, economy, national security apparatus and personal lives. Digital systems now provide the connective tissue and allow the transmission of intent in and to the other two domains. Because of that dependency, and vulnerabilities built into networks, applications and the use of digital systems, cyber is increasingly contested and a means of international positioning and power.

The tools and guiderails that helped structure the Cold War are not fit for purpose in this new environment and in any case have eroded. Bipolarity has given way to multipolarity. The earlier rules-based order is routinely ignored by revanchist, authoritarian powers such as China and Russia—for example, China in the South China Sea and Russia in Ukraine. The rise of populist politicians, supported by conspiracy cults and shaped by active enemy disinformation—most worryingly in the United States—undermines confidence among Western allies, including on extended deterrence. Those uncertainties are exacerbated by the stresses generated through the Covid-19 pandemic, which has weakened economies, exposed the fragility of supply chains and undermined national capability.

Digitalisation has also fuelled both disruption and competition: information technologies are general purpose, enabling ongoing innovation and change across the technological spectrum. The democratisation and dissemination of technology have led to what Audrey Kurth Cronin refers to as a lethal empowerment that further destabilises the international system.

Such tumult offers both threat and opportunity. That’s most evident in the grey zone—competition and confrontation below the level of traditional military conflict—where China and Russia are already engaged. The grey zone offers an immoral or opportunistic actor many means to exert pressure on opponents and achieve both short- and long-term goals: traditional diplomacy, armed harassment, lawfare, intellectual property theft, targeted investment, disinformation campaigns and maskirovka, cyberattacks, the co-option and corruption of officials, foreign influence campaigns and infiltration of expatriate communities.

This is the new realpolitik: grey-zone or hybrid tactics that complicate and confuse decision-makers, heighten uncertainty and increase hesitancy, allowing the aggressor to force change, retain the initiative and achieve their strategic objectives at less cost. Left unchallenged, grey-zone activity raises the stakes while engaging ever riskier behaviour, heightening the prospect of conflagration. The appropriate response is not to avoid the contest; that yields ground in the face of a revanchist aggressor, weakens regional security and prosperity, and undermines national interest.

Instead, a lesson may be drawn from cyber, the youngest of the strategic logics. Grey-zone behaviours are more akin to cyber than conventional or nuclear. In the grey zone, the field of potential action is large, encompassing various combinations of physical, systemic, economic, political, social and personal means of pressure. As in cyber, actions are often pre-emptive, obscured and frequently disowned. Once targets—governments, institutions, systems—have been destabilised and a means of purchase enabled, the strategic logic switches, enabling coercion and deterrence.

The means of responding to the cyber environment is through persistent engagement. In cyber, defending perimeters alone doesn’t provide security; an adaptive, layered defence is necessary. National cyber agencies now present a proactive posture, in constant contact with adversaries: the competitive interaction helps generate restraint rather than spiralling escalation.

Applied to the grey zone, persistent engagement entails the deliberate seeking of opportunities and exploitation of advantages in diplomacy, public debates, finance and industry, in technological development and in institutions across the region. These activities cannot be left to the military alone, which has neither the remit nor the requisite skills; nor are they reducible to the precepts of conventional strategic logic. They will require new institutions, new capabilities, greater civilian capability and engagement, and a re-evaluation of how best to harness the strengths of democratic systems and agency.

The challenge for Australian policymakers is to grapple not simply with a markedly degraded security environment, but with the entanglement of three very different strategic logics. Australia needs to confront grey-zone activity with sustained intent, an appropriate (civilian) capability and societal response. The Australian Defence Force needs to arm up and stock up against the prospect of innovative and adaptive conventional, potentially major-power, war and hard thought needs to be given regarding the prospective erosion of extended deterrence. That’s going to require more than reordering planned purchases in an already outmoded and underpowered force structure.

Spy games in the grey zone of outer space

A common refrain in the space policy community is that ‘space is contested, congested and competitive’. The ‘contested’ aspect was demonstrated recently when two Russian intelligence –collection satellites closed in on, and trailed, a top-secret US KH-11 reconnaissance satellite.

It’s like something out of a technothriller novel, but it’s not fiction. Russia launched the Cosmos-2542 satellite on 25 November 2019 from its spaceport in Plesetsk using a Soyuz-2-1V rocket. The satellite is classed as a 14F150 Napryazhenie geodetic satellite and is part of Moscow’s ‘Nivelir-ZU’ (14K167) project for undertaking geodetic studies of earth’s gravitational field to enhance guidance of long-range ballistic missiles. The satellite is designed as a multi-purpose system that can also perform a ‘satellite inspector’ role. The Russian defence ministry acknowledged this as far back as August 2017.

Let’s consider the ‘orbitology’ of the event. According to the website Russian Spaceweb, Cosmos-2542 is orbiting with an orbital inclination (it’s tilt relative to the earth’s equator) of 97 degrees. That means it entered a polar orbit, with a perigee (the lowest point in its orbit) of 378 kilometres and an apogee (the highest point) of 922 kilometres.

On 6 December, Cosmos-2542 released a small subsatellite, Cosmos-2543, and on 21 January, the two Russian satellites began to alter their orbits to closely match the orbit of the US National Reconnaissance Office’s KH-11 spy satellite, which is designated ‘USA-245’. Two days later, the US decided to move USA-245 and now the US and Russian satellites are further apart, out to a distance of around 500 kilometres.

A key source on this event is amateur satellite tracker Michael Thompson. He notes that following the Russian manoeuvres on 21 January, Cosmos-2542 was able to keep USA-245 in constant view, when both satellites were in sunlight, at a distance of between 150 and 300 kilometres. That sounds a long way here on earth, but in space its close enough for valuable intelligence to be gathered, using optical and potentially electronic surveillance. Although the US moved its satellite, Thompson’s analysis suggests more close approaches could occur by late February, with the closest at less than 100 kilometres on 21 February (see here for a diagram).

Incidents like this aren’t uncommon. They’re called ‘rendezvous and proximity operations’, or RPOs, and all the major space powers have developed satellite-inspector capabilities that can undertake these tasks. The US’s X-37B reusable spaceplane is the most sophisticated vehicle for this type of mission, and its most recent assignment concluded in October 2019 after 780 days in orbit. China and Russia have both practised RPOs in geosynchronous orbit in recent years, and the US undertakes similar tasks.

Such activities can be a legitimate part of a nation’s ‘space domain awareness’ mission (the military version of civil space situational awareness). This is an essential task in both a contested and congested space domain—contested space requires early warning of potential counterspace threats, and congested space requires an understanding of the space environment to mitigate the risk posed by space debris.

So, what’s the significance of the Russian satellites’ activities?

While everyone does intelligence-gathering, this incident raises concerns about future major-power adversaries exploiting grey zone activities in orbit, either to gather intelligence or for more aggressive purposes.

Undertaking RPOs is going to be an essential requirement for orbital refuelling and repair missions, which will emerge as a lucrative commercial activity in the next decade. The ability to repair a satellite on orbit, or to de-orbit it to avoid a build-up of space debris, is a legitimate enterprise for would-be space startups, and will be an important element of a space-based economy. A commercial spacecraft will manoeuvre into close range with a target satellite, and then dock with it to carry out repairs or to refuel it. That sort of capability is going to become more commercially attractive to sustain the mega-constellations of thousands of satellites that will be deployed in low-earth orbit in the next decade.

For innocent commercial activity, this technology is highly desirable. It will allow dead satellites to be restored to operational use, generating profit for the company providing the service. But it will also lead to further development of spacecraft technology that can be applied for military purposes. And how does one distinguish an on-orbit servicing craft from a co-orbital anti-satellite weapon (ASAT)? Co-orbital ASATs would be equipped with electronic warfare capabilities, or a directed-energy weapon such as a high-powered microwave, to neutralise an adversary’s satellite in a counterspace attack at close range—precisely the type of event suggested by Cosmos-2542.

Let’s consider where that leads. A ‘soft kill’ in space warfare is infinitely preferable to a ‘hard kill’, which physically destroys a target satellite, creating clouds of space debris. China’s January 2007 ASAT test created about 40,000 pieces of space debris larger than a centimetre across, and up to two million fragments wider than a millimetre. Large-scale use of hard-kill ASATs could create enough space debris to dramatically boost the prospect of a ‘Kessler syndrome’ event that could deny humanity access to space for generations. It makes no sense to develop hard-kill ASATs.

The Russian RPOs against USA-245 with Cosmos 2542, and similar events in the past, reinforce the potential for an intelligence-collection technology to be applied for other purposes, and to further develop soft-kill co-orbital ASAT capabilities. Such technology could be hidden within intelligence collection, as part of space domain awareness, or even masked within entirely legitimate commercial activity.

The challenge of managing grey-zone activities in orbit is an issue that space policy, law and regulatory bodies must come to terms with. The University of Adelaide–led ‘Woomera manual’ and the ‘MILAMOS’ project led by Canada’s McGill University are moving in the right direction to deal with these issues, alongside international efforts within the UN Office for Outer Space Affairs. Building confidence and transparency between states about commercial companies undertaking activities that have national security implications would be a good step to avoiding suspicion and insecurity in the future.