Russia leverages European-designed satellites for military communications

April 7, 20266 min read3 sources
Share:
Russia leverages European-designed satellites for military communications

Introduction

In the high-stakes electronic warfare arena of the Russo-Ukrainian War, secure communication is paramount. Recent analysis suggests Russia is deploying a modernized satellite communication system with deep, and potentially uncomfortable, European roots. Reports indicate that Russia's military is increasingly relying on its "Gonets-M" satellite constellation, a system whose technological foundations were allegedly developed in partnership with European aerospace giants Airbus and Thales Alenia Space well before the 2014 annexation of Crimea.

This development is not about Russia stealing or illegally acquiring new technology. Instead, it’s a story of long-term strategic planning, the slow burn of pre-sanction technology transfers coming to military fruition, and Russia’s determined effort to build a sovereign communication network to counter the battlefield effectiveness of systems like SpaceX's Starlink, which has been a lifeline for Ukrainian forces.

Background: A Tale of Pre-Sanction Cooperation

The system at the heart of these reports is known as "Strela" (Arrow), with its modern incarnation being the "Gonets-M" (Messenger) constellation. This is a Russian Low Earth Orbit (LEO) satellite network with origins in Soviet-era military projects designed for data relay and messaging. Operated by a subsidiary of Russia's state space corporation, Roscosmos, the constellation has been steadily built out for years.

The controversy stems from claims, first detailed by the Ukrainian outlet Defense Express, that the satellite platforms themselves were designed with significant input from Western firms. The report alleges that Astrium (now part of Airbus Defence and Space) and Thales Alenia Space participated in developing the platforms for the Strela-3/Gonets-M satellites. This cooperation would have taken place in an entirely different geopolitical climate, before the 2014 invasion of Crimea triggered the first major wave of Western sanctions against Russia's defense and technology sectors. At the time, such partnerships in the commercial and scientific space domain were common.

While that cooperation has long since ceased due to comprehensive sanctions, the intellectual property and design principles were transferred. Russia has since been ableto indigenize and manufacture these systems, integrating them into its military apparatus. Reports indicate that the Russian state corporation Rostec is now mass-producing ground terminals for the system, signaling a push for widespread battlefield deployment.

Technical Details: A Messaging Service, Not an Internet Provider

It is vital to understand the technical differences between Russia’s Gonets-M and Ukraine’s key asset, Starlink. The headline-grabbing phrase “replacing Starlink” is a misnomer. Russia is not fielding a direct equivalent; it is deploying an alternative that serves a different, more limited purpose.

  • Starlink: A massive constellation of thousands of LEO satellites providing low-latency, high-bandwidth broadband internet. It enables real-time video conferencing, large file transfers, and broad internet access for troops and command centers.
  • Gonets-M: A smaller constellation of LEO satellites operating at a higher altitude (around 1,500 km). It functions primarily as a “store-and-forward” data relay and messaging service. A user on the ground sends a data packet to a satellite as it passes overhead. The satellite stores this message and forwards it to a ground station or another user when it comes into range.

This makes Gonets-M unsuitable for real-time, high-data-rate applications. However, it is highly effective for sending short, critical messages: coordinates for artillery strikes, brief reconnaissance reports, command-and-control instructions, and telemetry from remote sensors. For a military force, this capability is extremely valuable for coordinating units in areas with destroyed or non-existent terrestrial communications, offering a sovereign channel that is not dependent on foreign commercial providers.

Impact Assessment: A Strategic Asset, Not a Silver Bullet

The deployment of the Gonets-M system has significant implications for all parties involved in the conflict and beyond.

For the Russian Military: The system provides a resilient, state-controlled communication channel. By using a sovereign network, Russian forces can reduce their reliance on less secure civilian mobile networks or other systems that may be more vulnerable to Ukrainian electronic warfare (EW) and signals intelligence (SIGINT) efforts. This enhances operational security and improves command and control over dispersed units.

For Ukrainian Forces: The increased use of Gonets-M presents a new challenge. While Ukraine has demonstrated considerable skill in targeting Russian communications, this system adds another layer to monitor, intercept, and potentially jam. Understanding the system's frequencies, protocols, and vulnerabilities will be a priority for Ukrainian and allied intelligence agencies.

For European Aerospace Companies: For Airbus and Thales, this is a reputational minefield. Although any collaboration was legal at the time and conducted under a different political reality, the fact that their historical designs are now integral to a Russian military system is a damaging association. It raises difficult questions about due diligence in dual-use technology transfers and the long-term, unforeseen consequences of international partnerships.

For Western Governments: This development is a stark reminder of the limitations of sanctions. Technology and expertise transferred years, or even decades, ago can be weaponized much later. It demonstrates Russia's capacity for adapting and producing systems based on foundational foreign designs, highlighting the need for a long-term strategy that goes beyond simply cutting off current access to components. Numerous reports from institutions like the Royal United Services Institute (RUSI) have consistently shown how Russia continues to procure Western components through grey markets, but this case involves the much deeper issue of foundational design knowledge.

How to Protect Yourself

The threat posed by the Gonets-M system is not one that directly affects individuals or most businesses. The protective measures are primarily at the state and corporate strategic levels.

For Governments and Policymakers:

  • Strengthen and Evolve Export Controls: Sanctions regimes must be dynamic. This incident shows that controls on not just finished products but also on design expertise, software, and foundational technologies are essential.
  • Invest in Counter-Intelligence: Preventing the illicit acquisition of technology through espionage and grey-market supply chains is critical. This requires robust intelligence sharing between allied nations and with the private sector.
  • Bolster Counter-Space and EW Capabilities: Friendly forces must have the ability to deny adversaries the use of their space-based assets in a conflict. This includes developing and deploying sophisticated jamming, spoofing, and signal analysis tools.

For Technology and Aerospace Companies:

  • Implement Rigorous Due Diligence: Conduct exhaustive vetting of international partners and end-users, considering not just current regulations but potential future geopolitical shifts.
  • Secure Intellectual Property: Protect core designs and proprietary technology with state-of-the-art cybersecurity measures. Assume that state actors will attempt to acquire this information through any means necessary. Secure communication channels using strong encryption are the absolute minimum.
  • Review Historical Partnerships: Companies should conduct internal audits of past technology transfers to understand potential long-term security risks that may now exist.

Ultimately, the story of the Gonets-M system is a case study in how the seeds of today's military conflicts are often planted in yesterday's business deals. It underscores the enduring challenge of controlling dual-use technology and the reality that in modern warfare, the battle for control extends from the mud of the trenches to the cold vacuum of space.

Share:

// FAQ

Is Russia's Gonets-M system a direct replacement for Starlink?

No. It serves as a sovereign alternative but has different capabilities. Gonets-M is a low-bandwidth, store-and-forward messaging and data relay system, ideal for short tactical messages. Starlink provides high-speed, low-latency broadband internet.

Was the European involvement in this satellite technology illegal?

The alleged cooperation with firms now part of Airbus and Thales took place before the stringent sanctions imposed in 2014 and 2022. At the time, such partnerships in the space industry were common and likely legal. The current issue is the military application of that historical technology transfer.

How does this affect companies like Airbus and Thales?

It poses a significant reputational risk. Even though the companies have complied with all sanctions and ceased such cooperation, the association of their past designs with current Russian military operations is damaging and invites scrutiny over historical due diligence practices.

Can the Gonets-M satellite system be targeted by Ukraine?

Yes. Like any satellite communication system used in a conflict, it is a target for electronic warfare. This includes military efforts to jam its signals, spoof its data, or intercept its communications to gain intelligence.

What does 'store-and-forward' mean for a satellite system?

Store-and-forward means the satellite receives a message from a ground terminal, stores it onboard, and then retransmits it to the destination ground terminal when it passes into range. This method works for non-real-time communications like email or data files but is not suitable for live voice or video calls.

// SOURCES

// RELATED

Russian APT28 hackers hijack routers to steal credentials, UK security agency warns

A new advisory details how Russian state-sponsored group APT28 is compromising SOHO routers to redirect traffic and harvest sensitive login credential

7 min readApr 8

UK exposes Russian cyber unit hacking home routers to hijack internet traffic

International agencies have exposed a campaign by Russia's GRU (APT28) that targets home and small office routers to conduct espionage and build a glo

6 min readApr 8

Beyond the blast: The unseen cyber war targeting Russia's ports

A physical strike on Russia's Ust-Luga port is only half the story. Our analysis explores the coordinated cyber attacks likely used to maximize chaos

6 min readApr 8

Sabotage on the Balkan Stream: A deep dive into the foiled pipeline attack in Serbia

Serbian authorities thwarted a physical attack on a key gas pipeline. Our analysis explores the technical details, geopolitical fallout, and security

7 min readApr 8