Why Closed Orbital Compute Will Fail Commercial Satellite Operators
Audience:
Commercial satellite operators, mission architects, chief engineers, and technical leadership
Purpose:
To examine the operational and economic risks of closed orbital compute and coordination systems as compute, autonomy, and inter-satellite connectivity become core to constellation operations.
Executive Summary
Compute is moving into orbit. This shift is not speculative. It is already underway, driven by increasing power availability, intersatellite links, autonomy requirements, and latency-sensitive operations. As this transition accelerates, commercial operators face a structural decision that will shape the next decade of space operations.
Closed orbital compute and coordination systems may appear attractive in the short term, offering integration simplicity and near-term capability gains. However, history suggests that when infrastructure layers consolidate before open coordination standards emerge, operators lose autonomy, margins compress, and operational resilience degrades. In orbit, these outcomes are amplified and may be irreversible.
This memo argues that closed orbital compute systems will ultimately fail commercial operators; not because the technology is unsound, but because the economic and operational incentives embedded in closed coordination layers conflict with operator interests over time.
1. The Shift Operators Cannot Avoid
Three trends are converging:
1. Excess Power Availability
Modern constellations increasingly operate with margin power, whether due to solar
over-provisioning, eclipse management, or conservative design assumptions.
2. Inter-Satellite Connectivity as a Baseline
ISLs are no longer exotic. They are rapidly becoming expected, even for constellations
not originally designed around distributed autonomy.
3. Operational Latency and Autonomy Requirements
Ground-mediated tasking introduces latency, fragility, and cost that increasingly
dominate mission economics, particularly under degraded communications.
Compute is becoming a coordination dependency that influences how tasks are routed, prioritized, authenticated, and executed across space assets.
2. Where Closed Orbital Compute Breaks Operator Incentives
2.1 Tasking Lock-In
In closed orbital compute and coordination systems, tasking authority gradually shifts away from the operator and toward the platform provider. This shift is rarely explicit. It emerges through control of scheduling, arbitration, degraded-mode behavior, and override mechanisms.
Scheduling and Arbitration Become Proprietary
In any constellation, multiple tasks compete for limited resources: compute cycles, crosslink bandwidth, downlink time, pointing windows, and power or thermal margin. When conflicts arise, a scheduler decides which task executes, when, and at what priority. In closed systems, this scheduling and arbitration logic is proprietary. Operators cannot inspect, modify, or audit the decision process. As a result, task execution becomes less deterministic under contention.
Real Example:
An operator offers a commercial customer a latency-bound service. During periods of network congestion, the closed coordination layer reprioritizes traffic to preserve overall platform performance. The operator’s task is delayed, the service-level agreement is breached, and the operator cannot prove why the task was deprioritized or guarantee it will not happen again [1].
Over time, this erodes the operator’s ability to offer enforceable guarantees.
2.2 Settlement and Incentive Capture
As orbital compute and coordination mature, tasking inevitably requires accounting. Systems must track who consumed resources, at what priority, and under what conditions. From accounting, economic settlement naturally follows. In closed coordination systems, settlement logic becomes embedded in the platform.
Settlement Logic Becomes Platform-Controlled
Closed systems determine:
● How compute, bandwidth, and relay time are measured
● How priority access is priced
● How cross-operator task delegation is compensated
● What constitutes “fair use” versus surcharge
Operators cannot inspect or modify these rules. Over time, the platform defines the economic reality of operating in the system.
Real example (ground analog):
AWS Ground Station operates shared antennas across customers. Access is scheduled, metered, and billed by AWS. When demand spikes, priority access is available, but at platform-defined rates and terms. Customers cannot negotiate scheduling logic or billing rules independently; they accept the platform’s settlement model as a condition of access [2,3]. The same pattern applies in orbit. Once compute coordination and task relay are platform-mediated, operators no longer negotiate economics peer-to-peer. They inherit the platform’s pricing structure.
Operators Become Price-Takers
When settlement is closed:
● Fees are opaque
● Price increases propagate unilaterally
● Cost predictability degrades over mission lifetimes
Real example (network analog):
Starlink publicly defines service tiers where traffic priority and congestion handling vary by plan. Under constrained conditions, higher-tier customers win. End users cannot audit congestion decisions or override arbitration logic; they pay for priority defined by the provider [4].
In orbital compute coordination, this same model applies to task execution and relay priority. Operators risk becoming price-takers in an economy they do not control.
Dependency Replaces Collaboration
Settlement capture does not require malicious intent. It emerges naturally from platform incentives.
Once operators depend on a closed settlement layer:
● Exiting becomes prohibitively expensive
● Alternative coordination paths atrophy
● Long-term margins compress
The result is not a cooperative ecosystem, but structural dependency.
2.3 Operational Fragility Under Degraded Conditions
Closed coordination systems are typically optimized for nominal operation: healthy links, synchronized clocks, and continuous connectivity. Space systems, however, are defined by how they behave when these assumptions break.
Decision Logic Becomes Opaque Under Stress
In closed systems:
● Task acceptance rules change dynamically
● Priority enforcement may tighten
● Safety defaults may override operator intent
Operators cannot inspect or predict these transitions.
Real example (cloud analog):
During major AWS regional disruptions, customers have encountered situations where recovery actions they assumed were available (such as launching new compute capacity or rebalancing workloads) were temporarily restricted by provider-side controls. In documented incidents, AWS has throttled control-plane operations (e.g., instance launches) as part of stabilization and recovery efforts, even while customer workloads themselves remained healthy. AWS’s own resilience guidance explicitly warns against relying on control-plane availability during recovery, noting that control-plane impairment can prevent expected remediation actions during disruptive events [5,6].
In orbit, the consequences are more severe. There is no alternate region to fail over to, no physical intervention, and no rapid redeploy. Control-plane dependency translates directly into operational immobility.
Fallback and Recovery Paths Are Externally Dictated
Closed platforms define what is allowed when connectivity degrades:
● Which commands are accepted
● Which identities are trusted
● Which tasks are dropped or deferred
Real example (satcom operations):
Operators relying on managed satcom services routinely face scenarios where provider-defined failover paths override operator priorities during outages. Emergency re-tasking may be delayed or blocked by provider-side safeguards designed for network stability, not mission urgency [7, 8].
In an orbital compute context, this means satellites may be healthy but unable to execute operator-defined recovery plans.
Resilience Is Reduced Precisely When Needed Most
Under degraded conditions, operators require:
● Predictable behavior
● Inspectable logic
● Sovereign override authority
Closed coordination systems remove these guarantees, replacing them with trust in an external platform’s decisions.
2.4 Jurisdictional and Regulatory Exposure
Orbital compute coordination is not just technical; it is regulatory, contractual, and geopolitical.
Compliance Logic Centralizes Outside the Operator
When coordination and settlement logic are centralized:
● Legal jurisdiction follows the platform
● Regulatory changes propagate across all dependent operators
● Compliance posture becomes externally dictated
Real example (export controls & cloud):
U.S. cloud providers routinely restrict access, services, or regions in response to export controls and sanctions. Customers operating globally may find services altered or suspended due to regulatory decisions unrelated to their own compliance posture [9].
In orbit, such changes cannot be mitigated by switching providers mid-mission.
Operators Inherit Risk Without Control
Commercial operators serving government, defense, or regulated customers must demonstrate:
● Deterministic control
● Auditable decision paths
● Jurisdictional clarity
Closed coordination platforms make these guarantees difficult or impossible.
Real example (government satcom procurement):
Government buyers routinely impose requirements that restrict the use of foreign-controlled communications infrastructure and third-party telecom services in mission systems. For example, federal contracting rules prohibit agencies from contracting with entities that provide systems or services using “covered telecommunications equipment or services” (commonly associated with foreign adversary supply chains) as a substantial/essential component of any system, absent a waiver. Separately, DoD cloud security requirements explicitly treat jurisdiction and location as a security requirement, stating that DoD data stored/processed by commercial providers must reside under exclusive U.S. legal jurisdiction (and, for certain impact levels, within U.S. locations), reflecting buyer sensitivity to where control and legal authority sit.
In practice, if an operator cannot demonstrate that command-and-control and management paths meet these restrictions, they risk being deemed noncompliant with solicitation requirements which will effectively disqualifying them regardless of technical performance [9,10].
3. Irreversibility in Orbit
Closed coordination systems are difficult to unwind in any domain. In orbit, they are effectively permanent.
Spacecraft are deployed for multi-year lifetimes. Coordination protocols, control-plane dependencies, and operational assumptions are embedded in flight software and procedures well before launch. Once deployed, these choices harden quickly.
Replacing a closed coordination layer in orbit typically requires new flight software baselines, requalification, and acceptance of on-orbit update risk. In practice, switching costs are measured in missions, not software releases.
As a result, early architectural decisions around coordination and compute persist for the full operational life of a constellation—even if they later conflict with operator incentives.
4. Why Regulation Will Not Save Operators
It is tempting to assume regulatory intervention can correct excessive concentration in orbital compute and coordination after the fact. This assumption does not reflect how space governance functions in practice.
Existing regulatory frameworks primarily address spectrum, licensing, debris mitigation, and export controls. They do not meaningfully regulate task scheduling logic, priority arbitration, settlement mechanisms, or control-plane dependencies—the elements that determine economic and operational power.
Jurisdiction is fragmented by design. Orbital systems span multiple national authorities and shared regimes, limiting the effectiveness of post hoc intervention. Even when concerns are identified, enforcement timelines are long and remedies are constrained. Physical architectural changes after deployment are rarely feasible.
When regulation does emerge, it often codifies existing architectures, grants waivers to incumbents, and raises compliance barriers for alternatives. By that point, coordination layers are already entrenched.
5. What an Open Coordination Layer Actually Means
Open coordination is frequently misunderstood. It is not an ideological stance; it is an architectural choice with concrete operational consequences.
Open coordination does not imply free services, the absence of commercial models, or loss of competitive advantage. Operators remain free to compete on payload capability, performance, reliability, and customer service.
It does imply:
● Publicly specified coordination protocols
● Operator-controlled identities and keys
● Cryptographically verifiable tasking and settlement
● No mandatory intermediaries in mission-critical paths
The distinction is not between open and commercial. It is between open participation, where operators retain sovereignty and leverage, and centralized control, where coordination authority accumulates at the platform layer.
Operators who engage early in open coordination architectures help shape the rules they will later depend on. Operators who defer these decisions inherit systems optimized for platform providers, not operators.
6. Why Open Coordination Aligns with Operator Economics
Open coordination aligns with operator economics because it preserves control over the variables that determine long-term value.
Operators that adopt open coordination primitives retain direct authority over tasking, priority, and recovery behavior. This preserves negotiating leverage with vendors and prevents pricing, scheduling, or arbitration rules from being unilaterally imposed over time.
Because control remains local, operators can adapt degraded-mode behavior to their own risk tolerance and contractual obligations, rather than inheriting platform-defined defaults. Collaboration with other operators remains possible, but participation does not require surrendering tasking or settlement authority.
Most importantly, open coordination prevents external rent-seeking from embedding itself in mission-critical infrastructure. Costs remain tied to resources consumed, not to platform position, preserving predictability over the full life of the constellation.
7. A Narrow Window
The industry is early enough that orbital coordination standards are not yet fixed, but late enough that the decisions made now will persist for decades.
Once coordination layers reach operational scale, they harden quickly. Procedures, contracts, and customer integrations adapt to the first workable solution, not the optimal one. Alternatives become increasingly difficult to introduce, even if they are technically superior.
Operators who engage early in shaping open coordination layers influence the rules they will later depend on. Operators who defer these decisions inherit architectures optimized for existing platforms.
Quiet interoperability experiments today are orders of magnitude cheaper than architectural reversals after deployment.
A Final Note
This memo is not an argument against orbital compute. It is an argument against ceding coordination control by default.
Commercial operators succeed when they retain operational sovereignty, even as infrastructure consolidates. The protocol layer is where that sovereignty is either preserved—or quietly transferred.
Sources
[1] Netflix ISP Speed Index (Netflix publishes throughput numbers affected by ISP policies under
congestion), accessed January 2026,
https://ispspeedindex.netflix.net/
[2] AWS Ground Station pricing, Amazon Web Services, accessed January 2026,
https://aws.amazon.com/ground-station/pricing/. Amazon Web
Services, Inc.
[3] Understand contact billing – AWS Ground Station, Amazon Web Services Documentation,
accessed January 2026,
https://docs.aws.amazon.com/ground-station/latest/ug/contacts.billing.html
[4] Starlink, “Fair Use Policy,” SpaceX, accessed January 2026,
https://starlink.com/legal/documents/DOC-1534-93560-72?srsltid=AfmBOor8zWvTw_Wqpoy4m
K3NMWq9VgG4yQxbQI5W_l023J8cK9OAL1ed&
[5] Amazon Web Services, “Update — AWS services operating normally” (AWS Service
Disruptions Outage Update), Amazon, October 22, 2025, accessed January 2026,
https://www.aboutamazon.com/news/aws/aws-service-disruptions-outage-update.
[6] Amazon Web Services, “Mitigating the risk of a global public cloud outage,” AWS Builder
Center, October 21, 2025, accessed January 2026,
https://builder.aws.com/content/34NS2tYsq5a9yWdUkfLBejlwneV/mitigating-the-risk-of-a-global-
[7] European Commission, “Mergers: Commission clears acquisition of Inmarsat by Viasat,
subject to conditions,” Press release IP/23/768, May 10, 2023,
https://ec.europa.eu/commission/presscorner/detail/en/IP_23_768.
[8] SES, “Commercial Service Overview,” SES S.A., accessed January 2026,
https://www.ses.com/services.
[9] Office of Foreign Assets Control (OFAC), “Compliance for Internet, Web Based Activities,
and ...” (FAQ topic), U.S. Department of the Treasury, accessed January 2026,
https://ofac.treasury.gov/faqs/topic/1611.
[10] Federal Acquisition Regulation, “FAR 52.204-25 — Prohibition on Contracting for Certain
Telecommunications and Video Surveillance Services or Equipment,” acquisition.gov, accessed
January 2026, https://www.acquisition.gov/far/52.204-25.
[11] Defense Information Systems Agency (DISA), “DoD Cloud Computing Security
Requirements Guide (CC SRG),” (Jurisdiction/Location Requirements section), accessed
January 2026, https://rmf.org/wp-content/uploads/2018/05/Cloud_Computing_SRG_v1r3.pdf.