Measures designed to temporarily eliminate the use, access, or operation of a system for a period of time, usually without physical damage to the affected system. Threat actors may seek to deny ground controllers and other interested parties access to the victim spacecraft. This would be done exhausting system resource, degrading subsystems, or blocking communications entirely. This behavior is different from Disruption as this seeks to deny communications entirely, rather than stop them for a length of time.

ID: IMP-0003
Created: 2022/10/19
Last Modified: 2022/12/08


ID Name Description NIST Rev5
CM0000 Countermeasure Not Identified This technique is a result of utilizing TTPs to create an impact and the applicable countermeasures are associated with the TTPs leveraged to achieve the impact None


  • Fritz, J.: Satellite Hacking: A Guide for the Perplexed. In: Culture Mandala: Bulletin of the Centre for East-West Cultural and Economic Studies, Vol. 10, No. 1, December 2012-May 2013, pp40(1998 PANAMSAT)
  • Thuraya Telecom Services Affected by Intentional Jamming in Libya. (2011). Retrieved on February 16, 2013, from
  • Steinberger, Jessica A. (2008). A Survey of Satellite Communications System Vulnerabilities. Retrieved on February 15, 2013, from
  • The Royal Academy of Engineering: Global NavigationSpace Systems:reliance and vulnerabilities Url: March 2011 Retrieved 08/07/2019
  • Ferrazzani, M. and Zilioli, I.: ESA facing Cyber Security Concerns In: EUSpace Jean Monnet Module 2018 Url: Retrieved 08/07/2019
  • Halliday, J.: BBC fears Iranian cyber-attack over its Persian TV service Url: March 2012 Retrieved 09/07/2019
  • Pagliery, J.: U.S. weather system hacked, affecting satellites Url: December 2014 Retrieved 09/07/2019
  • Flaherty, M.P. and Samenow, J. and Rein, L.: Chinese hack U.S. weather systems, satellite network Url: November 2014 Retrieved 09/07/2019