Lawmaker predicts U.S.-China space race

A space race between the United States and China will emerge in the next five to 10 years and could jeopardize U.S. national security, a key House lawmaker said Friday.

Floridian Tom Feeney, ranking Republican on the Science and Technology Space and Aeronautics Subcommittee, made the comment after the Congressional Research Service produced a report on China's space program last month.

The report concluded that the nations currently mistrust one another's space goals. The nervousness is partly due to a surprise anti-satellite weapons test that China executed last January. The test, which destroyed an inactive Chinese weather satellite, polluted the cosmos with debris that will endanger space structures owned by a couple dozen countries, including China, for years.

But CRS proposed that America could gain leverage in the relationship, if it partnered with China on technology development. "Collaborating with China -- instead of isolating it -- may keep the country dependent on U.S. technology rather than forcing it to develop technologies alone."

Furthermore, if the two nations shared the cost of joint projects, CRS said the savings could help NASA achieve its ambitious plans to send man back to the Moon and eventually to Mars.

China has publicly urged more dialogue and cooperation, but last year's test seemed to halt any U.S. support for future discussions, CRS stated.

"I would be opposed to transferring any technology to the Chinese that could potentially be used against us," Feeney said. "Almost anything that can help them launch into space and control how a vehicle operates can be used against us."

The People's Liberation Army continues to play a role in both military and civilian space operations. Feeney added: "The stakes are enormous and the Chinese know it. They teach their generals that whoever dominates space dominates the world."

Some observers say America should encourage more high-level dialogue with China to increase transparency and decrease the suspicion. While "there are members of Congress who are aware of and concerned with the lack of dialogue, the dynamics of election-year politics prohibit it becoming a priority effort at this time," Space Foundation President and CEO Elliot Pulham said.

As for making China dependent on U.S. space technology, both Pulham and Feeney say it is too late. Pulham said, "China currently has capabilities that rival those of the U.S., both in terms of launch and satellite technology." Feeney said, "The Chinese are way too sophisticated for that."

Subcommittee Chairman Mark Udall, D-Colo., commented that rather than creating dependency, working together on non-sensitive technologies could help strengthen the Chinese marketplace.

But in contemplating any such participation, he said, "we need to first ensure that U.S. national security and economic interests are adequately protected."

Full committee Chairman Bart Gordon, D-Tenn., added that international alliances don't always save money. "I don't think collaborating with the Chinese negates our responsibility to ensure that NASA has the necessary resources to do the things that the nation has asked it to do."

Feeney said, "The Chinese success, in a perverse way, is what is going to save NASA and make it the priority that it ought to be."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.