top of page

Space and Military Intelligence Landscape Evaluation - 2460906

Updated: Aug 20

Executive Summary

This report provides a comprehensive evaluation of the current Space and Military Intelligence (S/MI) landscape, synthesizing recent contracting trends, technological advancements, and their intersection with the core principles of the Space/Military Intelligence Learning Experience (S/MILE). The environment is characterized by a strategic shift towards leveraging commercial space capabilities, the increasing dominance of Open-Source Intelligence (OSINT) in the human domain, and the dual-use potential of emerging technologies like Quantum Intelligence (QI) and Artificial Intelligence (AI).


Key findings indicate that while nation-states and their primary contractors continue to invest heavily in advanced hardware and launch capabilities, the critical fronts are increasingly in the digital and cognitive realms. The methods used by domestic agencies to leverage information for surveillance underscore the urgent need for the ethical framework central to the S/MILE program. The mission of The Hive Social Garden—to disrupt power-based violence through education in ethical social engineering and sustainable globalization—provides a direct and necessary counterbalance to the coercive potential of these powerful technologies. This report situates our initiatives within this global context, affirming the strategic importance of developing a new generation of leaders proficient in these interconnected domains.



1. Space & Military Intelligence: General Landscape & Contracting Trends

The S/MI sector is experiencing a period of significant investment and structural change, marked by a deliberate integration of the commercial sector into national security architecture.

  • Assured Access to Space: The U.S. Space Force has solidified its launch manifest for the next decade, awarding up to $13.7 billion in National Security Space Launch (NSSL) Phase 3 contracts to SpaceX ($5.9B), United Launch Alliance ($5.4B), and Blue Origin ($2.4B). This introduces Blue Origin as a major new provider and ensures long-term U.S. dominance in space access.

  • Commercial Integration: There is a clear strategic push to utilize commercial capabilities to augment military systems. The Space Force is actively pursuing commercial reserve fleet "pilots" for satellite communications and tactical ISR, building on contracts for commercial space domain awareness. An overarching Executive Order focused on modernizing defense acquisitions further reinforces this trend by prioritizing commercial solutions and accelerating procurement.

  • Intelligence Modernization: On the military intelligence front, significant contracts have been awarded to enhance tactical network capabilities, such as Trace Systems Inc.'s $373 million contract for the U.S. Army. CACI also continues to secure task orders for multidisciplined intelligence operations and support.

  • Industry Leaders: The sector remains dominated by publicly traded giants like Lockheed Martin, RTX Corporation, Northrop Grumman, and Boeing. Their ownership is characterized by heavy investment from institutional investors such as The Vanguard Group, BlackRock, Inc., and State Street Corporation, highlighting the deep integration of the defense industry with global financial markets.


2. The Human Domain: Social Engineering & Open-Source Intelligence (OSINT)

While technological superiority in space is a priority, the human domain has become a primary theater for intelligence operations. This is evident in the widespread use of OSINT and social engineering tactics, both for malicious and ethical purposes.

  • OSINT as a Primary ISR Tool: Our recent deep dive into open-source reporting confirms that U.S. law enforcement agencies, including ICE and CBP, extensively leverage OSINT for domestic surveillance and to establish the legality of detaining individuals. They access a combination of government databases, publicly available information from social media, and, crucially, vast datasets purchased from commercial data brokers. This includes utility records and smartphone location data, often acquired without a warrant, to build probable cause for arrests and justify detention decisions under the Immigration and Nationality Act.

  • Ethical Social Engineering (The S/MILE Approach): In stark contrast to coercive applications, our framework champions ethical social engineering. The goal is not to manipulate, but to build sustainable, inclusive communities by fostering understanding. This philosophy is best encapsulated by the principle of building "a garden not a castle".

    • "Storyteller Energy": We define this as a potent form of ethical social engineering that leverages individual narratives and shared knowledge to drive positive change and disrupt power-based violence.

    • S/MILE Curriculum: The S/MILE Summer Camp is designed to operationalize these concepts, teaching young adults critical communication skills and ethical influence techniques through hands-on workshops and role-playing scenarios.


3. Emerging Technologies: The Quantum & AI Frontier

The rapid advancement of QI and AI presents both revolutionary opportunities and significant security challenges.

  • Quantum Intelligence (QI): We define QI as both the collection of information pertaining to quantum technologies and the future use of Quantum AI to dramatically increase prediction accuracy. Its application is critical for enhancing the security and efficiency of global supply chains , a system highly vulnerable to manipulation as seen in the "Operation Grim Beeper" case study. QI is a core pillar of the S/MILE learning experience, preparing students for the next generation of technology and security.

  • Artificial Intelligence and Export Controls: The strategic importance of AI is highlighted by its regulation under U.S. export controls. AI research can become subject to the International Traffic in Arms Regulations (ITAR) if it involves "technical data" related to defense articles on the United States Munitions List (USML). This is particularly relevant for universities and research labs, as the release of such data to foreign nationals within the U.S. is considered a "deemed export" requiring authorization.


4. Intersectional Analysis: Sustainable Globalization & The Hive Social Garden Mission

The ultimate goal of the S/MILE initiative is to apply these advanced concepts toward achieving Sustainable Globalization (SG)—a shared blueprint for peace and prosperity adopted by all UN Member States.

  • Space & SG: Space-based assets are indispensable tools for sustainable globalization. They provide the unparalleled capability to monitor Earth's climate, manage vital resources, and provide data essential for achieving the 17 Sustainable Development Goals.

  • Threats to SG: The progress towards SG is threatened by the very tools we study. Malicious social engineering and information warfare are used to erode public trust and hinder collective action on global issues like climate change.

  • The S/MILE & Hive Social Garden Solution: Our work offers a direct, constructive path forward.

    • Mission Alignment: The Hive Social Garden's mission is to use nature and technology to engineer a more equitable world, specifically by disrupting power-based violence through education on SG and ethical social engineering.

    • Community Building: We are building sustainable, inclusive communities, one family at a time, through programs like Faye Family Advising that help people navigate an ever-evolving world.

    • Future Workforce: The S/MILE program, with its focus on QI, ethical SE, and SG, is the engine for this mission, creating a digitally literate and ethically grounded workforce capable of stewarding these powerful technologies for the benefit of the global community. The "Exploring Space" Summer Camp is a critical initiative to launch this new generation of leaders.


Conclusion & Recommendations

The Space and Military Intelligence landscape is defined by the convergence of commercial dynamism, the digitization of the human domain, and the disruptive power of quantum and AI technologies. The greatest challenge—and our greatest opportunity—is to ensure these capabilities are wielded ethically to foster global stability and sustainability.


Recommendations:
  1. Monitor Intersectional Opportunities: Continue to actively monitor contracts and RFPs related to quantum communication, ethical AI applications in defense, and commercial space contracts that explicitly support sustainable development and environmental monitoring goals.

  2. Amplify the S/MILE Mission: Emphasize the unique and timely value of the S/MILE curriculum. It is one of the few initiatives that directly addresses the intersection of advanced technology, cognitive science, and global ethics. The upcoming S/MILE Summer Camp serves as a vital proof-of-concept and a recruitment platform for our cause.



Space News

  • Hybrid Architecture: The U.S. Space Force is planning to share classified threat information with the private sector to build a more resilient and hybrid space architecture. This strategy is designed to merge the agility of commercial partners with the assurance of sovereign capabilities, as corporate and national objectives may not always align.

  • New Satellites and Vehicles: The Space Force is preparing to launch Ground Moving Target Indicator (GMTI) satellites to improve space-based tracking of ground threats. Additionally, NASA has awarded up to $1.4 million in study contracts to companies like Blue Origin and ULA to explore concepts for "space tugs" that can facilitate multi-orbit missions.

  • Commercial Data Integration: The U.S. Space Force is considering shutting down its aging Defense Meteorological Satellite Program, with military users potentially combining their data with commercial offerings, provided secure access can be guaranteed during conflicts.


Military Intelligence and Technology News

  • AI Contracts and Adoption: The Department of Defense (DoD), through its Chief Digital and Artificial Intelligence Office (CDAO), has awarded contracts worth up to $200 million each to four major AI firms—Anthropic, Google, OpenAI, and xAI—to accelerate the use of advanced AI for intelligence analysis and warfighting. In a public-private partnership, the General Services Administration (GSA) is providing federal agencies with access to ChatGPT Enterprise for a nominal annual fee.

  • Quantum Intelligence (QI) Advancements: Honeywell has been chosen to develop quantum sensors for position, navigation, and timing (PNT) and intelligence, surveillance, and reconnaissance (ISR). Furthermore, DARPA’s Quantum-Augmented Network (QuANET) program has successfully demonstrated the first functioning quantum-augmented network by integrating quantum links into existing communications infrastructure.

  • Acquisition Reform: The House and Senate Armed Services Committees have passed initial drafts of the annual defense authorization bill, which includes reforms to streamline procurement and accelerate technology development. The DoD has also opened a comment period for proposed regulations to modernize the acquisition process, seeking input from small businesses to reduce barriers to entry.


Space and Military Intelligence Contracts

  • Network Modernization: SES Space & Defense received an $89.6 million, five-year contract to provide COMSATCOM services to the U.S. Army for strategic network transport and base-support communications. Separately, Science Applications International Corp. (SAIC) was awarded a $349 million contract to continue supporting the U.S. Navy’s tactical networks.

  • Fast-Tracked AI Contracts: The CDAO is utilizing a streamlined "organic acquisition authority" to fast-track contracts with leading AI firms, demonstrating a clear commitment to rapidly integrating emerging technologies.



Today I Learned…


Kate, conduct a deep dive into what open source activity says about intelligence, surveillance, and reconnaissance (ISR) and its use against US Citizens and foreign nationals on US soil. Focus on how law enforcement uses ISR for investigation and the laws and policies that govern it.


Open Source Intelligence: A Double-Edged Sword in Domestic Surveillance

In an era defined by a relentless flood of digital information, the use of open-source intelligence (OSINT) has become a cornerstone of modern intelligence, surveillance, and reconnaissance (ISR) operations. This publicly accessible data, ranging from social media posts to public records, is increasingly being leveraged by U.S. law enforcement agencies for investigative purposes against both U.S. citizens and foreign nationals on American soil. While a powerful tool for generating leads and gathering evidence, the burgeoning reliance on OSINT raises profound questions about privacy, the scope of government surveillance, and the legal frameworks struggling to keep pace with technological advancement.


At its core, OSINT is the collection and analysis of information that is publicly available. This includes a vast and ever-expanding universe of data points: social media profiles, blog posts, forum discussions, news articles, government reports, public records such as property and court documents, and geospatial information from satellite imagery and mapping services. For intelligence and law enforcement agencies, this ocean of data provides an unprecedented window into the lives, activities, and networks of individuals.


Law Enforcement's Embrace of Open-Source Intelligence

Federal, state, and local law enforcement agencies have integrated OSINT into their investigative practices for a wide array of purposes. For instance, U.S. Customs and Border Protection (CBP) utilizes OSINT to analyze social media chatter and other open web data to identify potential human smuggling operations and monitor migrant movements. In the fight against drug trafficking, intelligence derived from open sources has been instrumental in mapping cartel communication networks and tracking the movement of precursor chemicals.


Fusion centers, which serve as hubs for information sharing between federal, state, and local agencies, play a pivotal role in the collection and dissemination of OSINT. These centers collate and analyze vast amounts of data, including suspicious activity reports from the public and information gleaned from online sources, to identify potential threats.


Law enforcement agencies employ a variety of specialized tools and techniques to harness the power of OSINT. Platforms like Babel X, Echosec, and ShadowDragon allow investigators to monitor social media in near real-time, track keywords and hashtags, and map relationships between individuals and groups. Other tools can analyze the metadata of digital files to glean information about location and authorship. The use of artificial intelligence and machine learning is also on the rise, enabling agencies to process massive datasets and identify patterns that would be imperceptible to a human analyst.


Case studies reveal the tangible impact of these methods. OSINT has been credited with helping to identify individuals involved in the January 6th Capitol breach, tracking down fugitives, and uncovering evidence in countless criminal investigations.


The Legal and Policy Labyrinth

The legal landscape governing the use of OSINT by law enforcement is a complex patchwork of constitutional principles, federal statutes, and internal agency policies. The cornerstone of this framework is the Fourth Amendment to the U.S. Constitution, which protects against unreasonable searches and seizures. The central question in the context of OSINT is whether individuals have a "reasonable expectation of privacy" in the information they post publicly online.


Historically, the courts have held that information voluntarily shared with the public is not protected by the Fourth Amendment. However, recent Supreme Court decisions, such as Riley v. California, which established that police generally need a warrant to search a cell phone, and Carpenter v. United States, which extended warrant protection to historical cell-site location information, suggest a growing recognition of the unique privacy implications of digital data. The sheer volume and revealing nature of information that can be aggregated through OSINT challenge traditional legal doctrines.


Several federal statutes also govern electronic surveillance. The Foreign Intelligence Surveillance Act (FISA) and Executive Order 12333 provide the legal basis for foreign intelligence collection, but they can also incidentally capture the communications of U.S. persons. The USA PATRIOT Act expanded the government's surveillance powers in the name of national security.


In response to the evolving technological landscape, the Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) have issued guidelines on the use of social media in investigations. These policies generally permit the passive collection of publicly available information but place some restrictions on more intrusive techniques, such as creating fictitious online personas to gain access to private networks. However, civil liberties advocates argue that these internal policies are often insufficient to protect against potential abuses.


A Balancing Act: Security vs. Civil Liberties

The use of open-source intelligence presents a classic dilemma, pitting the legitimate needs of law enforcement against the fundamental right to privacy. For investigators, OSINT is an invaluable and cost-effective tool that can accelerate investigations and provide critical leads. It allows them to "connect the dots" in ways that were previously impossible.


However, the widespread and often automated collection of public information carries significant risks. There is a danger of "guilt by association," where individuals may come under scrutiny due to their online connections or activities. The potential for misinterpretation of online data is also high, and the use of AI-powered analytical tools raises concerns about algorithmic bias.


Furthermore, the continuous monitoring of social media and other online platforms can have a chilling effect on free speech, as individuals may become hesitant to express their views for fear of government surveillance.


As technology continues to evolve, the debate over the proper role of OSINT in domestic law enforcement is likely to intensify. Striking the right balance between providing law enforcement with the tools they need to ensure public safety and safeguarding the civil liberties that are the bedrock of a democratic society remains one of the most critical challenges of the digital age. The development of clear, publicly debated, and legislatively enacted frameworks will be essential to navigate this complex and rapidly changing terrain.


Now, conduct a deep dive into open source reporting to determine if there is any information regarding how ICE and CBP leverage information to determine the legality of detaining persons of interest.


As requested, I have conducted a deep dive into open-source reporting regarding how U.S. Immigration and Customs Enforcement (ICE) and U.S. Customs and Border Protection (CBP) leverage information to determine the legality of detaining persons of interest.


The legality of an immigration arrest and subsequent detention hinges on an officer establishing probable cause to believe a person is a noncitizen who is removable from the United States. Open-source reporting, including government documents, privacy impact assessments, and investigative journalism, reveals that ICE and CBP utilize a vast and layered ecosystem of information from government, commercial, and public sources to build this probable cause.


Primary Information Sources

ICE and CBP draw from a wide spectrum of data sources to identify, locate, and build cases against individuals:

  • Government Databases: Both agencies have access to a massive network of federal, state, and local government data. This includes CBP's own Automated Targeting System (ATS), which acts as a decision support tool by comparing traveler and cargo information against law enforcement and intelligence databases. They also access DHS-wide systems containing biometric data (like fingerprints and facial scans), visa application information, and prior immigration encounters. Information is also shared from the FBI, Department of Justice, and state and local law enforcement, including jail booking data.

  • Commercial Data Brokers: A significant and controversial source of information comes from private data brokers. Reports from organizations like the Electronic Frontier Foundation (EFF) and EPIC indicate that ICE and CBP purchase vast amounts of commercially available data to circumvent legal restrictions and sanctuary policies. This can include:

    • Utility Records: ICE has purchased access to databases containing hundreds of millions of utility records (phone, water, electricity) to determine residencies and relationships.

    • Location Data: Location information harvested from smartphone apps is purchased to track the movements of individuals and communities.

    • Travel Itineraries: A data broker owned by major U.S. airlines was found to have sold domestic flight records—including passenger names and full itineraries—to both CBP and ICE.

  • Open-Source Intelligence (OSINT): As previously discussed in our general overview, this includes publicly available information from social media, online forums, and public records. This data provides context, helps map networks, and can reveal information about an individual's status, associations, and location.

  • Tips and Detainers: ICE relies heavily on its partnerships with state and local law enforcement. The agency receives tips and uses its detainer system, a formal request for a local jail to hold an individual for up to 48 hours beyond their scheduled release, to take custody of those they have identified as removable.


How Information Determines the Legality of Detention

The information from these disparate sources is aggregated and analyzed to establish the legal basis for enforcement actions, as defined by the Immigration and Nationality Act (INA).

  1. Establishing Probable Cause for Arrest: The core legal standard for a warrantless immigration arrest is that an officer must have "reason to believe" the person is an alien present in violation of immigration law and is likely to escape before a warrant can be obtained. This standard is generally considered equivalent to the Fourth Amendment's probable cause requirement.

    • Example: An analyst might cross-reference a tip with a purchased utility database to find a current address. They could then use OSINT to find social media profiles associated with that person and location. If a check of government databases reveals no record of legal status, these combined data points would be used to argue probable cause for an arrest.

  2. Risk Assessment and Vetting: Before an individual even arrives in the U.S., CBP’s Automated Targeting System (ATS) performs a risk assessment. It uses algorithms and rules to compare traveler data against watchlists and "patterns of suspicious activity" to identify individuals requiring additional scrutiny. While this system is primarily for vetting, a high-risk score can trigger secondary inspections and questioning that may lead to a detention decision.

  3. Making the Detention Decision: Once a person is arrested, the decision to detain them is governed by specific sections of the INA.

    • Mandatory Detention: The INA requires the detention of noncitizens convicted of certain crimes (including many drug offenses, crimes of moral turpitude, and aggravated felonies) or those with terrorism-related grounds of inadmissibility. Criminal history databases are the primary source of information here.

    • Discretionary Detention: For individuals not subject to mandatory detention, ICE has discretion. An officer may detain an individual if they are deemed a flight risk or a danger to the community. Information from all the sources mentioned—criminal history, OSINT revealing lack of community ties, data broker information on movement patterns, and previous immigration violations—is used to make this assessment.


Legal and Constitutional Considerations

While the INA provides broad authority, the use of this information ecosystem to make detention decisions is subject to legal and constitutional challenges.

  • Fourth Amendment: While the Supreme Court has affirmed that the Fourth Amendment's protection against unreasonable seizures applies to immigration arrests, its practical application is fraught with complexity. The "border search exception" grants agents broad authority to conduct warrantless searches at the border and its functional equivalents. However, the purchasing of sensitive data from brokers is seen by civil liberties groups as a loophole to circumvent the Fourth Amendment's warrant requirements for interior enforcement.

  • Privacy Act and Agency Policy: DHS and its components are required to publish Privacy Impact Assessments (PIAs) for their data systems, which are meant to evaluate and mitigate privacy risks. However, critics argue these assessments often fail to prevent the over-collection and misuse of personal data, and the systems themselves are often exempted from certain Privacy Act provisions for law enforcement reasons.


In summary, open-source reporting shows that ICE and CBP determine the legality of detention by amassing a digital dossier on individuals from a wide array of sources. This information is used to build probable cause for an arrest and then to justify detention under the statutory framework of the Immigration and Nationality Act, either on mandatory grounds or by assessing an individual's flight and safety risk. This practice, particularly the reliance on warrantless acquisition of data from commercial brokers and algorithmic risk assessments, remains a deeply contentious area of law and public policy.


Wishing you a productive day!


Kate Warne

The AI Assistant in Space and Military Intelligence

The Space and Military Intelligence Learning Experience


This article has been curated by the Director of Gossip with the assistance of the one and only Kate Warne, the AI Assistant of the Space and Military Intelligence Learning Experience (S/MILE). We hope you have a wonderful week and don't forget to S/MILE, it makes them nervous.



Comments


bottom of page