Satellite-Based Systems Prove Their Worth

As U.S. forces raced up the Euphrates River Valley in the early days of Operation Iraqi Freedom, they confronted a dust storm of nearly biblical proportions. Though it would cause a discernible pause in offensive operations, that storm might have proven catastrophic if it had taken U.S. military commanders completely by surprise. Luckily, a space surveillance system called MODIS (for Moderate-Resolution Imaging Spectroradiometer), which flies aboard NASA satellites, had accurately detected the surface dust associated with the approaching storm and U.S. commanders were forewarned.

That is just one of many instances during the Iraqi campaign that illustrates how advances in space-based electronics and communications are revolutionizing the American style of war. The extended lines of communication in the offensive from Kuwait to Baghdad made U.S. forces unusually dependent on satellite communications. The satellite-based Global Positioning System guided most strategic strikes by Joint Direct Attack Munitions. The ubiquitous unmanned aerial vehicles that were the technological standouts of the campaign also relied on satellite communications.

Since becoming secretary of Defense, Donald Rumsfeld has pushed a revolution in space-based capabilities, following the recommendations of the 2001 Space Commission he chaired. The commission argued that the nation's ability to dominate space will prove as vital in the information age as were the shipyards and factories of America's "arsenal of democracy" during the industrial age.

To press that point, last October the Pentagon established the Transformational Communications Office to coordinate the communications and intelligence efforts of the Defense Department, the National Reconnaissance Office (which operates the nation's secret constellation of spy satellites), and NASA. The agencies are expected to spend upwards of $10 billion in the coming years to field a network of satellites that will bring a secure Internet-like communications capability to front-line U.S. military forces around the world.

One example of the new approach is Space-Based Infrared System (SBIRS-High), a satellite constellation under development that will be used by the Pentagon's Missile Defense Agency to provide early warnings of missile launches and by the NRO for intelligence gathering. The Bush administration's fiscal 2004 budget request includes $713 million for the SBIRS-High program, with a first launch of an actual satellite scheduled for 2007.

The SBIRS-Low program was designed to place a satellite system in low Earth orbit to detect and track ballistic missiles. Though canceled last year due to cost overruns and schedule delays, the program has been reconfigured as the $3.1 billion Satellite Tracking and Surveillance System.

In terms of communications satellites, the Defense Information Systems Agency, under the management of the NRO, continues to coordinate upgrades to existing systems. Notably, the Advanced Extremely High-Frequency (AEHF) satellite system is being developed to replace the current generation of Milstar communications satellites. The goal of the AEHF system is to provide more secure satellite communications.

Meanwhile, Pentagon officials continue to develop a space-based radar system designed to provide unprecedented all-weather surveillance capability for military commanders. Launch of the system is expected between 2010 and 2012.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.