Space Piracy
Preparing for a Criminal Crisis in Orbit
Space Piracy
Preparing for a Criminal Crisis in Orbit
by Marc Feldman and Hugh Taylor
Online Description
Space Piracy is a speculative, scenario-driven threat assessment that argues space commerce will eventually attract the same mix of predation, coercion, and deniable violence that has long followed wealth in other domains. Feldman and Taylor move from imagined attack scenarios to piracy history, commercial-space growth, cyber vulnerabilities, legal ambiguity, cartel and proxy actors, national security implications, and policy responses. The book’s real aim is agenda-setting: force governments, firms, militaries, lawyers, insurers, and intelligence communities to confront governance gaps before commercial habits and insecure architectures harden into a more dangerous status quo (pp. xvii-xxi, 181-204, 207-211).
Author Background
-
Marc Feldman: Executive director of the Center for the Study of Space Crime, Piracy, and Governance; active in aerospace/space and defense venture capital; more than thirty-five years of experience commercializing technologies and scaling startups. The introduction also notes experience in the intelligence field (pp. xxiii-xxiv, 219).
-
Hugh Taylor: Author of ten books on cybersecurity, business, and technology; Certified Information Security Manager; former executive editor of the Journal of Cyber Policy; former executive at Microsoft, IBM, and venture-backed technology firms; former lecturer at UC Berkeley’s School of Information and School of Law (pp. 219-220).
60-Second Brief
-
Core claim: As space accumulates economic value, criminals, proxies, and possibly rogue states will try to seize, ransom, jam, hack, or otherwise coerce that value; the first wave is likely cyber and ground-based disruption before cinematic boarding actions in orbit (pp. xviii-xix, 63-65, 77-79, 207-211).
-
Causal logic in a phrase: commercialization + falling barriers + vulnerable dual-use systems + weak governance + deniable actors = space piracy.
-
Why it matters for Space Power / strategy
-
It widens the threat picture beyond sovereign-state counterspace competition.
-
It treats commercial infrastructure as part of strategic infrastructure.
-
It argues law, insurance, registration, and cyber standards are not administrative details; they are strategic enablers.
-
It highlights a gray zone between crime, coercion, and warfare that current doctrine does not handle cleanly (pp. 67-71, 103-125, 139-161, 181-204).
-
-
Best single takeaway: The book’s strongest point is not that every scenario will happen soon, but that waiting for the first serious incident before building legal, technical, and institutional defenses is a bad strategy (pp. xix-xx, 97-99, 207-211).
SAASS 665 Lens
-
How does this text define or illuminate space power?
-
Indirectly, as the ability to generate, protect, and exploit value in, from, and through space.
-
Space power here is not just launch or counterspace capability; it is also governance, cyber resilience, commercial security, and the ability to suppress deniable predation.
-
-
What does it imply about policy, strategy, posture, or capability?
-
U.S. space posture may be too state-centric if it focuses only on China/Russia-style sovereign threats.
-
Strategy should include irregular, criminal, proxy, and quasi-commercial threats to dual-use infrastructure.
-
Capability questions extend beyond weapons to space domain awareness, cyber hardening, launch-site security, legal authorities, and crisis-response mechanisms (Foreword pp. ix-x; pp. 77-99, 181-204).
-
-
What does it imply about history, theory, law, commercial space, Ukraine, China, or allies?
-
History: maritime piracy is the book’s main analogy engine.
-
Theory: the book is weak as formal theory but strong as an applied threat frame.
-
Law: current space law is too vague and too weakly enforceable for the authors’ scenarios.
-
Commercial space: commercialization is both the source of wealth and the source of vulnerability.
-
Ukraine/current conflict: the Starlink/Russian hacking examples reinforce the strategic importance of commercial networks and deniable coercion.
-
China: the book treats China as relevant but resists a purely China-centric threat model.
-
Allies/partners: coalition logic is present, but ally-specific design is underdeveloped.
-
-
What type of book is this in course terms?
- Best read as an applied policy/strategy + commercial space + law/conflict book with heavy use of history and cyber risk as supporting frames.
Seminar Questions (from syllabus)
-
Is “space piracy” a useful analytical category, or does the book collapse too many different problems—hacking, privateering, smuggling, corporate coercion, and war—into one bucket?
-
Does the maritime analogy illuminate more than it distorts when applied to orbit, cislunar space, and lunar industry?
-
If the first real space piracy is cyber extortion against commercial satellites, should the U.S. treat it primarily as crime, irregular warfare, or a counterspace attack?
-
What does the book imply about the vulnerability created by U.S. reliance on commercial providers and mixed public-private space architecture?
-
Where should anti-piracy authority live: UN-led governance, Space Force/Space Command, a Space Guard, intelligence services, or an insurance-and-markets regime?
-
Does centering irregular actors sharpen U.S. preparation for China/Russia competition, or distract from it?
-
Which reform matters most before cislunar and lunar commerce scales: property rights, jurisdiction, cyber certification, insurance, or force structure?
✅ Direct Responses to Seminar Questions
Q1. Is “space piracy” a useful analytical category, or does the book collapse too many different problems into one bucket?
-
It is useful as an agenda-setting umbrella because it forces attention onto predation against commercial space value.
-
It is analytically loose because the book often groups together cyber extortion, smuggling, privateering, shell-company coercion, and state-proxy activity.
-
For seminar purposes, the term is most useful if immediately disaggregated into at least four categories: crime, piracy-for-profit, proxy coercion, and warfare-adjacent action (pp. xviii-xix, 66-69).
Q2. Does the maritime analogy illuminate more than it distorts?
-
It illuminates incentives well: valuable cargo, chokepoints, weak governance, safe havens, and buyers for stolen goods.
-
It also helps on institutions: insurance, coalition patrols, privateering, flags of convenience, and dark fleets.
-
It distorts if treated too literally because space has far higher entry costs, different geometry, stronger cyber dependence, and much thinner enforcement reach than the sea (pp. 25-42, 63-70, 114-124).
Q3. If the first real space piracy is cyber extortion against commercial satellites, should the U.S. treat it as crime, irregular warfare, or a counterspace attack?
-
The book’s implicit answer is: it depends on sponsorship and intent.
-
A profit-seeking criminal gang makes it a crime problem with strategic effects.
-
A proxy or state-protected actor turns the same act into irregular warfare/privateering.
-
The hard policy problem is attribution and response threshold, not taxonomy alone (pp. 77-99, 67-69, 139-148).
Q4. What does the book imply about the vulnerability created by U.S. reliance on commercial providers and mixed public-private space architecture?
-
The book treats commercial dependence as structural vulnerability, not as a minor side effect of innovation.
-
Commercial growth increases national power, but it also multiplies attack surfaces, insider risk, legal arbitrage, and leverage points.
-
Public-private integration therefore has to include cyber standards, contractual crisis protocols, insurance logic, and authorities for response; acquisition alone is not enough (pp. 46-58, 94-99, 144-145, 175-177, 191-195).
Q5. Where should anti-piracy authority live?
-
The book rejects any single-owner solution.
-
Internationally, it leans toward UN-centered dialogue and broader space governance.
-
Nationally, it points toward some mix of Space Force/Space Command, possibly a Space Guard, and stronger intelligence integration.
-
Practically, the likely answer is layered: norms and law internationally, response capacity nationally, and mandatory obligations for private actors (pp. 181-204, 223-227).
Q6. Does centering irregular actors sharpen U.S. preparation for China/Russia competition, or distract from it?
-
It sharpens it if used as an expansion of the threat model rather than a replacement.
-
The book’s point is not “ignore peer competitors”; it is “peer competition may arrive through proxies, fronts, cartels, and deniable coercion.”
-
For SAASS, that matters because the future threat environment is unlikely to remain neatly divided between sovereign war and apolitical commerce (Foreword pp. ix-x; pp. 65, 139-161).
Q7. Which reform matters most before cislunar and lunar commerce scales: property rights, jurisdiction, cyber certification, insurance, or force structure?
-
The book suggests a sequencing logic even if it never states one cleanly.
-
Cyber certification and secure design matter earliest because technical path dependence hardens fast.
-
Property rights and jurisdiction matter for long-run order and investment confidence.
-
Force structure matters once enough value exists in space to justify dedicated response capabilities.
-
The book names many necessary reforms, but prioritization is one of its weak points (pp. 97-99, 118-124, 181-204).
Chapter-by-Chapter Breakdown
Introduction
-
One-sentence thesis: The introduction frames space piracy as a probable byproduct of commercialization and openly presents the book as interdisciplinary “speculative nonfiction,” not settled authority (pp. xvii-xxi).
-
What happens / what the author argues
-
Defines space piracy as robbery or hijacking of value in space, while stretching the term to include related crimes like smuggling because they raise the same governance problems.
-
Argues piracy can occur across multiple domains, not just in orbit.
-
Justifies forward-looking speculation by comparing it to normal policy planning under uncertainty.
-
Maps the book as an integrative conversation across history, cyber, law, commerce, national security, and policy.
-
-
Key concepts introduced
-
Space piracy
-
Four spaces of piracy
-
Speculative nonfiction
-
Not authoritative by design
-
-
Evidence / cases used
-
Frau im Mond
-
Early popular speculation about piracy in space
-
Analogy to cybersecurity path dependence
-
-
Why it matters for SAASS 665
- It announces the book’s main intervention: space should be treated not only as sanctuary or battlefield, but also as a site of irregular criminal contestation.
-
Links to seminar questions
- Q1, Q2, Q3
Chapter 1: A Not-So-Unlikely Scenario Coming to the Space Near You
-
One-sentence thesis: Scenario planning is the book’s first method: make a vague future threat operationally concrete by walking readers through plausible attack paths (pp. 2-4, 21).
-
What happens / what the author argues
-
Uses second-person scenarios to force strategic imagination rather than passive summary.
-
Argues satellites and satcom are the most immediate targets because they are economically central and already digitally exposed.
-
Moves from present-day cyber and jamming threats to launch-site seizure, space tourism takeover, in-space servicing coercion, and lunar hijacking.
-
Suggests that early “space piracy” may be mostly terrestrial or cyber-enabled even when the victim asset is in space.
-
Uses science fiction less as evidence than as a reservoir of strategic imagination.
-
-
Key concepts introduced
-
Scenario planning
-
Present-day vs near-term vs long-term risks
-
Satcom as a critical vulnerability
-
-
Evidence / cases used
-
ORBCOMM ransomware against trucking fleet management (pp. 3-4)
-
Hypothetical nanosatellite jamming/ransom case from Air University work (pp. 5-6)
-
Maersk/NotPetya as an analogy for logistics disruption (pp. 8-9)
-
-
Why it matters for SAASS 665
- Strongest chapter for seeing how space dependence spills into maritime logistics, aviation, broadcasting, and launch infrastructure.
-
Links to seminar questions
- Q2, Q3, Q4, Q6
Chapter 2: Learning from Piracy’s Long and Rich History
-
One-sentence thesis: Piracy is not an outlier; it is a recurrent political-economic practice that appears where valuable traffic meets weak governance and willing backers (pp. 25-42).
-
What happens / what the author argues
-
Surveys piracy from ancient Mediterranean raiders to the golden age in the Caribbean.
-
Uses privateers and buccaneers to show the blurry boundary between crime and state-sanctioned predation.
-
Emphasizes the role of safe havens, land-based facilitators, and financial ecosystems.
-
Connects piracy to empire-building, state finance, and wartime strategy.
-
Highlights modern piracy off Somalia and oil theft in the Gulf of Guinea and Gulf of Mexico.
-
-
Key concepts introduced
-
Privateering
-
Buccaneers
-
Piracy-geopolitics-finance nexus
-
-
Evidence / cases used
-
English/Spanish conflict and Caribbean piracy
-
British imperial finance and pirate integration
-
Task Force 151 and anti-piracy coalitions off Somalia (pp. 33-39)
-
-
Why it matters for SAASS 665
- This is the book’s main causal bridge from maritime history to future space disorder.
-
Links to seminar questions
- Q2, Q5, Q6
Chapter 3: The Coming Multitrillion Dollar Space Economy
-
One-sentence thesis: Piracy only makes sense if there is wealth to steal, so the authors ground the threat in expected growth of commercial space markets (pp. 45-60).
-
What happens / what the author argues
-
Divides the space economy into terrestrial, Earth-to-space, space-to-Earth, and space-to-space categories.
-
Uses market projections to argue space is already large and likely to get much larger.
-
Surveys sectors: launch, satellites, servicing, tourism, robotics, imagery, satellite internet, space computing, in-space manufacturing, lunar industries, orbital energy, asteroid mining.
-
Moves from economics to geopolitics by suggesting great powers will compete over who captures space-generated value.
-
Raises the possibility that future space colonies could become political entities in their own right.
-
-
Key concepts introduced
-
Space economy categories
-
Cislunar/lunar industry
-
Great-power competition for space wealth
-
-
Evidence / cases used
-
Market projections and falling launch/satellite costs (pp. 46-48)
-
Discussion of lunar resources and industrial logic (pp. 54-56)
-
Garretson/Goswami-style great-power competition frame (pp. 57-59)
-
-
Why it matters for SAASS 665
- Useful reminder that space power is partly about economic stake, not only military hardware.
-
Links to seminar questions
- Q2, Q4, Q6, Q7
Chapter 4: Space Piracy: Overview of a Serious, Looming Threat
-
One-sentence thesis: Once motive, means, and opportunity begin to converge, the piracy problem becomes strategically plausible and the spectrum runs from crime to proxy warfare (pp. 63-76).
-
What happens / what the author argues
-
Directly asks whether space piracy is likely and answers yes, albeit with uncertainty on timing.
-
Distinguishes space crime from space piracy, though imperfectly.
-
Lists likely forms of predation: extortion, ransoming, sabotage, communications disruption, seizure of facilities, smuggling.
-
Differentiates piracy from war while also showing how piracy can become privateering.
-
Introduces the “four spaces” in which pirates can act: outer, terrestrial, digital, and false/AI-generated.
-
Suggests rogue states, fronts, and private actors may finance or shelter pirate operations.
-
-
Key concepts introduced
-
Crime vs piracy
-
Privateering in space
-
Four spaces of space piracy
-
-
Evidence / cases used
-
Congressional testimony on lunar resource/property issues (p. 65)
-
Expert commentary from intelligence and space-security interlocutors
-
Russia/privateering speculation
-
-
Why it matters for SAASS 665
- Best chapter for discussing attribution, escalation, proxy warfare, and deniable competition in space.
-
Links to seminar questions
- Q1, Q3, Q5, Q6
-
Notable quote
- “motive, means, and opportunity” (p. 64)
Chapter 5: Space Hacking: Current Realities and Future Lessons for Space Piracy
-
One-sentence thesis: Cyber is the most immediate and already partly realized pathway to space piracy, and today’s terrestrial cyber disorder is the warning signal for tomorrow’s space insecurity (pp. 77-100).
-
What happens / what the author argues
-
Reviews the miserable baseline state of cybersecurity on Earth.
-
Explains risk categories: software, data, networks, hardware, denial-of-service, and operational technology.
-
Maps the space attack surface across satellites, ground stations, networks, supply chains, and support organizations.
-
Argues satellites are hackable but not trivially so; barriers exist, but they are eroding as space systems use more standard IT.
-
Points to standards efforts such as NIST profiles and information-sharing mechanisms.
-
Uses cybersecurity as a cautionary tale about what happens when insecure architectures harden before governance catches up.
-
-
Key concepts introduced
-
Attack surface
-
Supply chain attack
-
Hybrid satellite networks
-
Data diodes
-
-
Evidence / cases used
-
NCSC warning on cyber threats to the U.S. space industry (pp. 77-78)
-
SolarWinds and Starlink/Ukraine examples (pp. 78-80)
-
Tamil Tigers/Intelsat hijacking and Moonlighter testing (pp. 89-90)
-
Discussion of why hacking satellites is “harder than it looks” (pp. 90-92)
-
-
Why it matters for SAASS 665
- Strongest chapter for linking commercial systems, military dependence, and technical architecture.
-
Links to seminar questions
- Q1, Q3, Q4, Q7
Chapter 6: The Space Law, Policy, and Treaty Landscape
-
One-sentence thesis: Space is legally populated but politically under-enforced; current law is too state-centric, too vague, and too weakly executable to manage piracy cleanly (pp. 103-125).
-
What happens / what the author argues
-
Reviews INTELSAT/ITU arrangements and the communications governance baseline.
-
Walks through the Outer Space Treaty and related agreements.
-
Explores sovereignty, jurisdiction, and registration through legal experts and the ISS example.
-
Leans heavily on maritime law as a comparable, if imperfect, legal template.
-
Shows how flags of convenience and regulatory arbitrage could migrate into space.
-
Emphasizes enforceability as the real weak point.
-
-
Key concepts introduced
-
Sovereignty and jurisdiction in space
-
Registration convention
-
Flags of convenience
-
Maritime-law analogy
-
-
Evidence / cases used
-
Anne McClain/ISS criminal-law controversy (pp. 112-113)
-
UNCLOS and maritime anti-piracy law (pp. 114-117)
-
KLEO Connect dispute and Luxembourg example (pp. 106-107, 123-124)
-
-
Why it matters for SAASS 665
- This is the core law-and-norms chapter.
-
Links to seminar questions
- Q1, Q5, Q7
Chapter 7: Criminal Organizations That Might Pursue Space Piracy
-
One-sentence thesis: If space piracy becomes a near-term organized enterprise, the likeliest perpetrators are existing transnational cartels that already combine capital, coercion, corruption, and infiltration (pp. 127-137).
-
What happens / what the author argues
-
Defines cartels and distinguishes them from smaller gangs.
-
Surveys global cartel examples and transnational cooperation among them.
-
Explains cartel operating models: extortion, territorial control, infiltration of state institutions, and corruption.
-
Extends that logic to space infrastructure, launch sites, airports, logistics, and corporate penetration.
-
Suggests cartels could hijack devices, capture personnel, infiltrate firms, or buy distressed space companies.
-
Admits the case is speculative and may overstate cartel interest in technically distant targets.
-
-
Key concepts introduced
-
Cartel as quasi-state actor
-
Infiltration/takeover of legitimate firms
-
Recruitment of space talent for crime
-
-
Evidence / cases used
-
El Chapo/Triad connections
-
Border corruption and airport infiltration
-
MSC Gayane cocaine-smuggling case (pp. 134-135)
-
-
Why it matters for SAASS 665
- Pushes seminar discussion beyond sovereign adversaries and toward hybrid state-criminal orders.
-
Links to seminar questions
- Q1, Q4, Q6
Chapter 8: The Potential Impact of Space Piracy on National Security
-
One-sentence thesis: Space piracy matters strategically because military and commercial space systems are tightly intertwined, making deniable disruption of space services a national security problem, not just a business loss (pp. 139-161).
-
What happens / what the author argues
-
Defines national security as both a condition and a set of institutions/activities.
-
Inventories military reliance on communications, navigation, surveillance, and reconnaissance satellites.
-
Shows how public-private dependence broadens the attack surface for national security.
-
Discusses great-power competition, moon conflict, private armies, and corporate power in wartime.
-
Raises the prospect that private entities or future space colonies could become coercive actors in their own right.
-
Suggests peer competition may blend with irregular and proxy activity.
-
-
Key concepts introduced
-
National security as state + activity
-
Public-private dependency in space
-
Private armies/PMCs in space
-
-
Evidence / cases used
-
Space Force/Space Command and SWAC discussion (pp. 152-155)
-
Lunar security and cislunar control concerns (pp. 155-157)
-
Musk/Starlink and Ukraine example (pp. 157-159)
-
-
Why it matters for SAASS 665
- Strongest direct link to U.S. posture, deterrence, and force-structure questions.
-
Links to seminar questions
- Q3, Q4, Q5, Q6
Chapter 9: Commercial Risks and Impacts of Space Crime and Piracy
-
One-sentence thesis: Commercial space will inherit not only profits but also the shadow ecologies of terrestrial commerce: shell companies, laundering, mercenaries, shadow transport, and insurance friction (pp. 165-180).
-
What happens / what the author argues
-
Begins with Russia’s “dark fleet” as a model of sanctions evasion and regulatory arbitrage.
-
Explores corporate malfeasance, shell companies, and deniable fronts in space business.
-
Treats money laundering as a likely growth area in space commerce.
-
Warns that mercenaries and private security can become sovereign or quasi-sovereign threats.
-
Examines space banking, crypto, blockchain, and insurance as both enablers and vulnerabilities.
-
Suggests dark-fleet logic could eventually migrate into space logistics.
-
-
Key concepts introduced
-
Dark fleets
-
Shell companies
-
Placement/layering/integration
-
Mercenary corporate protection
-
-
Evidence / cases used
-
KLEO Connect as front-like legal ambiguity (pp. 168-169)
-
Money laundering logic from Kenneth Rijock (pp. 169-170)
-
Luxembourg “black box” finance discussion (pp. 170-171)
-
Insurance practice analogies from maritime markets (pp. 175-177)
-
-
Why it matters for SAASS 665
- Best chapter for commercial-space governance, finance, and public-private integration risks.
-
Links to seminar questions
- Q1, Q4, Q5, Q7
Chapter 10: Policy Recommendations and Countermeasures to Mitigate the Risk of Space Piracy
-
One-sentence thesis: The response to space piracy cannot be purely legal, military, or commercial; it has to be a layered governance project built from shared principles, practical standards, and clearer operational ownership (pp. 181-204).
-
What happens / what the author argues
-
Argues current institutions are fragmented and not ready.
-
Says the problem must be approached as a multithreaded effort spanning governments, firms, law enforcement, diplomacy, finance, insurers, military, and intelligence.
-
Recommends principles first, then rules.
-
Calls for borrowing from maritime law while improving on it.
-
Advocates stronger space governance, updated regulatory frameworks, a possible space commodities exchange, insurance requirements, and stronger cybersecurity standards.
-
Explores whether the Space Force/Space Command, a Space Guard, or some new intelligence-centered arrangement should own response roles.
-
-
Key concepts introduced
-
Principles-first governance
-
Multithreaded response
-
Space commodities exchange
-
Space Guard
-
-
Evidence / cases used
-
Annie Pforzheimer on starting with principles (p. 184)
-
Norton Rose Fulbright on governance/property-rights gaps (pp. 188-189)
-
Kaczmarek and Caudill on cybersecurity and secure infrastructure (pp. 193-195)
-
Tyler Bates and “Bob” on force/intelligence implications (pp. 196-202)
-
-
Why it matters for SAASS 665
- Most useful chapter for translating the book into posture, capability, governance, and institutional design debates.
-
Links to seminar questions
- Q3, Q5, Q7
Conclusion: We Need to Talk
-
One-sentence thesis: The conclusion clarifies that the book is less a definitive predictive model than a call to begin institutional conversation and preparation before governance gaps become crises (pp. 207-211).
-
What happens / what the author argues
-
Recaps the core logic: piracy follows value, vulnerability, and weak governance.
-
Reasserts cyber as an early form of space piracy.
-
Reiterates legal weakness, national-security exposure, and commercial-financial risk.
-
Calls for group effort across state and private actors.
-
Suggests the UN is the likely starting venue, even if not the whole answer.
-
-
Why it matters for SAASS 665
- Useful reminder that the book’s real contribution is agenda formation rather than settled doctrine.
-
Links to seminar questions
- Q1-Q7
-
Notable quote
- “We need to talk” (p. 211)
Theory / Framework Map
-
Paradigm(s) / intellectual tradition
-
Historical analogy
-
Threat assessment / scenario planning
-
Policy design and governance reform
-
-
Level(s) of analysis
-
Systemic/international
-
State
-
Corporate/nonstate actor
-
Technical infrastructure
-
-
Main causal mechanism(s)
-
Commercialization creates value worth stealing.
-
Falling barriers to access expand the pool of capable predators.
-
Cyber and ground-segment vulnerabilities create operational opportunity.
-
Legal ambiguity and weak enforcement reduce expected costs for bad actors.
-
States and nonstate actors exploit deniability through fronts, proxies, and quasi-private actors.
-
-
View of power
-
Power is infrastructural, economic, legal, and organizational as much as kinetic.
-
Whoever can secure and sustain access to space-generated value has meaningful leverage.
-
-
View of coercion / deterrence / competition
-
Coercion often arrives below the threshold of formal war.
-
Piracy is attractive partly because it muddies attribution and lowers political clarity.
-
Deterrence therefore depends on attribution, governance, and response authority as much as on weapons.
-
-
Role of technology
-
Technology is dual-use throughout: it enables growth and creates attack surface.
-
Cyber architecture is the most immediate vulnerability story.
-
-
Role of law / norms
-
Necessary but insufficient.
-
Laws matter most when backed by enforceable jurisdiction, registration, insurance, and practical operational mechanisms.
-
-
Role of commercial actors
-
Central.
-
Firms are targets, enablers, and sometimes plausible perpetrators or fronts.
-
-
Role of allies / partners
-
Implicitly important through coalition anti-piracy analogies.
-
Underdeveloped as a concrete operational design.
-
-
Strongest analytical contribution
- It inserts irregular criminal and proxy threats into space strategy discourse, where state-centric warfighting narratives usually dominate.
Key Concepts & Definitions (author’s usage)
Space piracy
-
Definition: Robbery or hijacking of objects of value in space, analogous to piracy on the high seas; the authors also stretch the term to include adjacent crimes like smuggling and trafficking because the same sovereignty and enforcement problems arise (pp. xviii-xix).
-
Role in the argument: Umbrella concept for the book’s whole threat frame.
-
Analytical note / why it matters: Useful for forcing discussion, but broad enough to blur boundaries between crime, coercion, and war.
Privateering
-
Definition: State-authorized predation against enemy commerce under a “letter of marque”; the authors treat modern proxy actors and state-backed cyber gangs as analogous forms (pp. 27-28, 68-69).
-
Role in the argument: Bridge between criminal piracy and geopolitically useful coercion.
-
Analytical note / why it matters: One of the book’s best tools for thinking about deniability and escalation.
Buccaneers
-
Definition: Hybrid settler-raiders who moved between hunting, piracy, and privateering out of Caribbean havens (pp. 28-29).
-
Role in the argument: Historical model for entrepreneurial, semi-organized raiders exploiting weak governance.
-
Analytical note / why it matters: Helps the authors imagine future space havens and semi-private coercive actors.
Four spaces of space piracy
-
Definition: Outer space, terrestrial space, inner/digital space, and false/AI-generated space (pp. xviii-xix, 69-71).
-
Role in the argument: Expands piracy from an orbital image to a multi-domain operating concept.
-
Analytical note / why it matters: Probably the book’s sharpest original conceptual tool.
Flags of convenience
-
Definition: Registering vehicles in jurisdictions with lax oversight rather than real operational linkage, mirroring a maritime practice the authors expect to migrate into space (pp. 121-124).
-
Role in the argument: Example of legal arbitrage that weakens accountability and complicates enforcement.
-
Analytical note / why it matters: Strongly relevant for space law, norm formation, and commercial governance discussions.
Space commodities exchange
-
Definition: A proposed regulated market for standardized space commodities and associated risk instruments (pp. 191-193).
-
Role in the argument: One of the few genuinely institutional policy ideas in the book.
-
Analytical note / why it matters: Shows the authors think order in space may come as much from market architecture as from treaties.
Key Arguments & Evidence
-
Claim: Space piracy is likely once significant wealth exists in space and along space-connected infrastructure.
-
Best supporting evidence or cases: Maritime history, modern piracy examples, and projected growth in commercial space sectors (pp. 25-42, 45-60, 63-65).
-
Why the claim matters for space strategy: It reframes commercial growth as a security problem as well as an economic one.
-
-
Claim: Cyber extortion is the most plausible early form of space piracy.
-
Best supporting evidence or cases: ORBCOMM, SolarWinds, satellite-hacking demonstrations, NIST HSN work, and the argument that space systems are “orbiting computer systems” (pp. 77-100).
-
Why the claim matters for space strategy: The first decisive anti-piracy investments may need to be in standards, certification, and cyber defense rather than kinetic force.
-
-
Claim: Current space law and governance are too weakly defined and too weakly enforceable for serious anti-piracy work.
-
Best supporting evidence or cases: Outer Space Treaty limits, ISS jurisdiction example, maritime-law comparison, and flags of convenience logic (pp. 103-125).
-
Why the claim matters for space strategy: Strategy that assumes governance will “be there when needed” is operating on a false premise.
-
-
Claim: Criminal cartels, rogue states, and quasi-private proxy actors are plausible future perpetrators.
-
Best supporting evidence or cases: Cartel infiltration of firms and state institutions, oil theft, airport infiltration, Wagner-style proxy logic, and Russian-space-industry degradation as a potential enabling condition (pp. 127-137, 172-173).
-
Why the claim matters for space strategy: The threat set is broader than sovereign military competition.
-
-
Claim: Space piracy has direct national-security implications because satellites and commercial space systems underpin military and economic functions.
-
Best supporting evidence or cases: Military dependence on space systems, public-private integration, lunar competition, and Starlink/Ukraine dynamics (pp. 139-161).
-
Why the claim matters for space strategy: Anti-piracy is not just a commercial-protection issue; it touches deterrence, resilience, and escalation.
-
-
Claim: The response has to be multi-stakeholder and layered.
-
Best supporting evidence or cases: Chapter 10’s recommendations on principles-first governance, a space commodities exchange, insurance, cybersecurity certification, and expanded military/intelligence roles (pp. 181-204).
-
Why the claim matters for space strategy: No single actor—UN, Space Force, insurer, or firm—can solve the problem alone.
-
⚖️ Assumptions & Critical Tensions
-
Core assumptions
-
Commercial space will scale far enough and fast enough to create pirateable rents.
-
Maritime piracy remains a useful analogue despite major domain differences.
-
Criminal or proxy actors can acquire the technical talent and access needed to act in/against space systems.
-
Governance lag will remain severe enough to invite opportunistic predation.
-
-
Tradeoffs
-
Open commercial growth vs tighter security and certification.
-
Low regulatory friction vs anti-piracy accountability.
-
Flexible deniable competition vs clear escalation thresholds.
-
-
Unresolved tensions
-
Piracy as crime vs piracy as proxy warfare/privateering.
-
Commercial integration as source of strength vs source of vulnerability.
-
UN-centered legitimacy vs real enforcement by powerful states.
-
Governance-by-principle vs governance-by-capability.
-
-
Descriptive strength vs prescriptive weakness
-
The book is strong on problem surfacing and actor mapping.
-
It is weaker on prioritization, timelines, and implementation detail.
-
-
Conceptual ambiguity
- “Space piracy” often absorbs hacking, smuggling, shell-company coercion, corporate malfeasance, and warfare-adjacent action into one bucket.
-
Places where rhetoric may outrun empirics
-
Kinetic and lunar piracy scenarios are vivid and provocative, but the evidence base is thinner than for cyber or ground-segment coercion.
-
The cartel chapter is suggestive rather than demonstrative.
-
Critique Points
-
The book’s biggest conceptual weakness is overbreadth: it sometimes treats piracy, smuggling, hacking, privateering, and corporate coercion as if they were analytically interchangeable.
-
Its main engine is analogy rather than evidence. That is not illegitimate, but it means the book persuades more through pattern recognition than through hard demonstration.
-
The scenario-heavy opening is rhetorically effective, but the vividness can make the near-term and the far-future feel closer together than they really are.
-
The maritime analogy is productive on governance and incentives, but less convincing on operational feasibility once you move from cyber or launch-site coercion to cislunar seizure.
-
The cartel thesis is one of the book’s sharpest provocations and one of its least proven claims.
-
The book sees legal ambiguity clearly but is much less convincing on the political feasibility of fixing it.
-
It correctly identifies deniability as a strategic problem, but it underdevelops escalation pathways: when does piracy become armed attack?
-
It wants the Space Force and intelligence community to do more, but without fully grappling with authorities, budget tradeoffs, and force-design consequences.
-
The book is excellent at forcing space-security discussion beyond sovereign-state warfighting; it is much weaker as formal space power theory.
-
Allies and partners are more historical analogy than operational architecture; the book says coalition logic matters but does not really design a coalition regime.
Policy & Strategy Takeaways
-
US space strategy
-
Expand the threat model beyond sovereign counterspace competition; irregular coercion against commercial and dual-use systems belongs in strategy documents too.
-
Treat governance, cyber standards, registration, and commercial security as strategic enablers, not back-office regulation (Foreword pp. ix-x; pp. 181-204).
-
-
Military posture / capability development
-
Invest in space domain awareness, cislunar awareness, cyber hardening, launch-site and ground-segment security, and doctrine for deniable disruption.
-
Clarify whether anti-piracy missions would sit with Space Force/Space Command, a Space Guard, or some hybrid arrangement (pp. 142-154, 195-199).
-
-
China / deterrence / competition
-
The book does not ask the U.S. to ignore China; it asks the U.S. to avoid a state-only view of danger.
-
Deterrence thinking should include fronts, proxies, mercenaries, and quasi-private actors in addition to sovereign forces (pp. 145-161).
-
-
Commercial space integration
-
Public-private integration is a strategic vulnerability unless paired with security-by-design, cyber certification, insurance logic, and contractual crisis authorities.
-
Commercial providers can become single points of leverage in crisis (pp. 94-99, 157-159, 191-195).
-
-
Law / norms / escalation management
-
Property rights, jurisdiction, registration rules, anti-piracy norms, and anti–flags of convenience mechanisms are urgent governance tasks.
-
Policy doctrine needs cleaner distinctions among nuisance crime, piracy-for-profit, proxy privateering, and armed attack (pp. 103-125, 181-189, 203-204).
-
-
Allies and partners
-
Coalition logic is implicit throughout the book’s Horn-of-Africa analogy.
-
The missing next step is ally-specific design: surveillance sharing, response authorities, burden-sharing, and legitimacy in any future anti-piracy regime.
-
⚔️ Cross-Text Synthesis (SAASS 665)
Space history / sanctuary vs warfighting cluster
-
Point of agreement: Space will not remain insulated from terrestrial politics, competition, and exploitation; commercialization erodes the old heroic/sanctuary image (pp. xi-xii, xv-xvi).
-
Point of tension: This book adds a third category beyond sanctuary and overt warfighting: criminal/irregular contestation.
-
Why the contrast matters: It suggests the usual binary is incomplete unless it also accounts for order, policing, and deniable coercion.
Space law and customary norms cluster
-
Point of agreement: Law and norm formation matter early because they shape later behavior and path dependence.
-
Point of tension: The book is much more skeptical that treaties alone solve anything; it keeps dragging discussion back to enforcement, jurisdiction, insurance, and flags of convenience (pp. 103-125, 181-189).
-
Why the contrast matters: In this frame, law is strategic infrastructure rather than background context.
Space power theory cluster
-
Point of agreement: Economic value, access, and control of space systems matter for national power.
-
Point of tension: The book is not a general theory of space power; it treats power implicitly as the capacity to secure value and suppress predation.
-
Why the contrast matters: Theory readings can discipline the book’s claims and test whether these irregular threats are central or peripheral to space power.
Commercial space cluster
-
Point of agreement: Private actors and falling launch barriers are central to the next phase of space activity.
-
Point of tension: This book emphasizes the shadow side of commercialization—extortion targets, shell companies, laundering channels, mercenary markets—more than innovation or entrepreneurship (pp. 45-60, 165-180).
-
Why the contrast matters: U.S. advantage in commercial space may also be a source of strategic exposure.
Russia/Ukraine, China, and current conflict clusters
-
Point of agreement: Deniability, coercion below the threshold of open war, and dependence on dual-use commercial networks are already strategically salient.
-
Point of tension: The book argues that peer-competition frames are too narrow if they ignore proxy actors, cartels, and quasi-private coercion.
-
Why the contrast matters: Future conflict in space may look blended—part commercial, part criminal, part geopolitical—rather than neatly state-on-state.
❓ Open Questions for Seminar / Podcast
-
What empirical indicator would convince us that space piracy has moved from useful thought experiment to urgent planning problem?
-
Which targets are pirateable first: launch sites, ground stations, commercial satellites, orbital servicing platforms, or lunar logistics?
-
Should cyber extortion against a strategic commercial network count as an armed attack if the downstream effects are military?
-
Can anti-piracy law in space work without first settling property rights and jurisdiction?
-
Would cyber certification and insurance reduce risk faster than treaty revision?
-
Does a Space Guard solve a real problem, or just relabel unresolved authorities?
-
What would burden-sharing look like in a coalition-based anti-piracy regime for space?
-
Does the book identify “piracy” as the core problem, or is the deeper problem disorder in a partially commercialized, partially militarized commons?
✍️ Notable Quotes & Thoughts
-
“speculative nonfiction” — the authors are candid that this is an anticipatory argument, not a settled empirical field (p. xxi).
-
“not authoritative, by design” — a strength for agenda formation, but also a warning against reading the book as doctrine (pp. xvii-xviii).
-
“motive, means, and opportunity” — probably the book’s cleanest shorthand for when commercial growth becomes a security problem (p. 64).
-
“We need to talk” — the conclusion makes clear that the book’s real objective is to start institutional conversation before path dependence wins (p. 211).
Podcast Hooks
-
3 opening angles
-
Everyone in the course talks about China and Russia; what if the next disruptive space threat looks more like ransomware or shadow shipping than overt ASAT war?
-
Is space really heading toward a naval-history future—privateers, dark fleets, flags of convenience—or is that analogy misleading?
-
This is a commercial-space book with a dark thesis: new wealth does not just invite investment; it also invites coercion.
-
-
3 book-vs-course comparison angles
-
Use the book to complicate the sanctuary-vs-warfighting frame: where does criminality fit?
-
Put it beside the commercial-space cluster: growth story versus vulnerability story.
-
Put it beside the law/norms cluster: elegant treaty language versus messy enforcement.
-
-
3 productive disagreements or tensions worth discussing aloud
-
Are cartels plausible future space actors, or mainly a provocative narrative device?
-
Does “space piracy” clarify threat taxonomy, or blur crime, proxy war, and competition?
-
Should the Space Force police, fight, or stay focused on warfighting while another institution handles crime?
-
-
1 concise closing takeaway for the episode
- The book matters less as prediction than as early warning: space strategy without governance and commercial security is unfinished.