Standard analytical frameworks catalogue known attack techniques. They are structurally incapable of assigning prospective probability to threat execution under defined geopolitical and operational conditions. CCMM is designed to operate in exactly the space where those frameworks stop.
Commercial and government satcom networks operating in contested environments face threats that cross the boundary between cyber, electronic warfare, and geopolitical actor intent. No single framework addresses this boundary. CCMM does.
Orbital systems, space situational awareness networks, and inter-satellite link architectures face threat classes that are conditional on adversary orbital posture, launch activity, and frequency domain behaviour. These threats are invisible to retrospective frameworks.
MANET radio networks, military command-and-control links, and UAV data links in contested theatres face actor-specific, operationally conditioned threat chains that standard security frameworks are not designed to model prospectively.
A structural comparison against MITRE ATT&CK for Space, STRIDE, and ISM control mapping.
The companion paper applying CCMM to the 2022 KA-SAT cyberattack demonstrates five threat findings that incumbent frameworks are structurally incapable of surfacing. Read the analysis in the Intelligence Library.
The CCMM companion paper applies the methodology to the 2022 KA-SAT cyberattack against Viasat's satellite communications network. This case demonstrates the plausibility of conditional, falsifiable threat assessment in satellite communications, identifying conditions under which high-impact events become likely, including those that exist in the low-probability domain that conventional analytical models do not observe.
Applies CCMM to the Viasat KA-SAT case, demonstrating five categories of threat finding that MITRE ATT&CK for Space, STRIDE, and ISM control mapping are structurally incapable of producing. All five findings were analytically derivable before the event. None were produced by incumbent frameworks. Published under open access for academic citation and prior-art purposes.
CCMM assigned 61-74% probability to satcom interdiction as a kinetic invasion precursor, derivable from observable force posture and historical analog patterns in the 60-day pre-invasion window.
The Viasat-Eutelsat transition created a distributed accountability gap. CCMM models corporate transitions as elevated-probability attack windows. No standard framework does.
CCMM assigns 67-79% probability to civilian critical infrastructure disruption in dual-use satcom architectures with the observed segmentation characteristics.
CCMM produced a composite attribution confidence of 0.79 on Day 1. Formal government attribution confirmed the same actor 75 days later. Evidence labelling enables analysis without attribution certainty.
CCMM assigned 63-68% probability to RF jamming succession within 18 months of cyber mitigation deployment. Viasat confirmed this materialised. No standard framework models adversary vector pivots.
CCMM does not replace standard frameworks. It operates above them, as an analytical method that evaluates whether their outputs hold under real-world conditions, particularly in the low-probability, high-consequence domain where high-impact satcom events demonstrably originate.