Bush orders agencies to use commercial spy satellite data

President Bush has ordered federal agencies to make greater use of private sector high-resolution imaging satellites that take detailed pictures of objects on the ground from hundreds of miles above earth. The move will greatly commercialize the government's use of spy satellites, according to administration and industry sources.

The White House on Tuesday announced a new national policy instructing agencies to utilize "to the maximum practical extent" commercial satellites. The images those satellites produce, which are fine enough to depict an object just over 1 meter wide, are used primarily by intelligence agencies and the Defense Department. Since the images are unclassified, they can be shared without security clearance among U.S. allies for intelligence analysis and battlefield planning, as they were in recent military operations in Iraq and Afghanistan.

Intelligence agencies already rely heavily on the only two U.S. firms that produce high-resolution images: Space Imaging of Denver, Colo., and DigitalGlobe of Longmont, Colo. The presidential directive instructs the agencies to use the firms even more so that they can focus more sophisticated government-owned and operated satellites on higher-priority tasks.

"There is this tremendous hunger for high-resolution imagery, and industry is now in a position to provide that," said Steven Aftergood, an intelligence expert with the Federation of American Scientists in Washington.

Now that outsourcing of intelligence collection has become policy, agencies will be expected to use their own satellites primarily for cases where more precise identification of a target is necessary. In most cases, the company-produced images meet agencies' needs, Aftergood said. Government-owned satellites are believed to be able to spot objects ten times smaller than what can be seen by satellites in orbit now, he added.

The high-resolution imaging industry was born in 1994, when President Clinton issued a national policy granting companies licenses to build and launch the satellites. The new directive presumably will go a long way toward buttressing the two U.S. companies. It's also designed to ensure the government doesn't rely on foreign firms. France, Russia, India and Israel are among the major foreign providers of high-resolution imagery, according to Mark Brender, an executive with Space Imaging.

A spokesman for the National Security Council said, "The policy [contains] an important national security component to ensure that key technological capabilities and services are protected under national security interests."

An industry analyst said that the high-resolution industry hasn't grown as much as some had hoped nearly a decade ago, despite the high demand from government. The companies hope that the new policy will create more business, said David Beachley of BRW LeGrand, a marketing firm in Denver that works for Space Imaging.

Given the large appetite agencies already have for satellite imagery, Aftergood questioned whether a presidential directive was necessary to buoy the industry, especially since a third firm now is preparing to enter the market. Growing applications for imagery include border and port security, forest fire control, geological mapping and urban planning. In that sense, "The directive ratifies a process that is already underway of acquiring commercial imagery," Aftergood said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.