recommended reading

NASA needs to clean up some space junk, report finds

NASA needs a better plan to help satellites and spacecraft avoid space junk, which has reached a "tipping point," a National Research Council committee reported on Thursday.

There are enough pieces of smashed satellites, meteroids, and trash orbiting the planet to pose a real risk, the report says, and NASA lacks the staffing to deal with it properly.

Not only does NASA need a formal strategic plan for managing the threat, but the space agency may need to launch a project to clean up some of the clutter.

"The current space environment is growing increasingly hazardous to spacecraft and astronauts," Donald Kessler, chairman of the committee that wrote the report and retired head of NASA's Orbital Debris Program Office, said in a statement.

The last time NASA looked at the issue, at the end of the 1990s, things did not look so bad.

But in 2009 two communications satellites--one owned by Iridium Communications and the other owned by the Russian Space Forces, collided and exploded over northern Siberia. It made a big mess and added 2,000 more bits to the flotsam floating in orbit. In 2007, the Chinese government destroyed a weather satellite in an anti-satellite test. Both greatly added to the space-junk problem.

At 17,000 mph, even a tiny piece of metal can penetrate a spacecraft's protective skin or tear a hole in an astronaut's space suit. And at that speed, a collision can blow apart a valuable satellite.

In June, a piece of space debris drifted to within 850 feet of the International Space Station, and the crew took shelter in Russian space capsules as a precaution.

NASA is tracking more than 500,000 of these bits and pieces--and 20,000 of them are larger than a softball.

The report says NASA has to re-think the management structure that deals with the problem.

"Nearly all of NASA's meteoroid and orbital-debris programs are only one person deep in staffing. This shortage of staffing makes the programs highly vulnerable to budget reductions or changes in personnel," the report notes.

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.