PhD from Nanyang Technological University, Singapore
🇺🇦Ukrainian in Singapore🇸🇬
The Ministry of State Security runs China’s most covert cyber ops. It hires contract hackers via front companies. Provincial MSS branches run ops with autonomy, making attribution nearly impossible. It’s a decentralized, deniable, and deeply embedded system.
The Ministry of State Security runs China’s most covert cyber ops. It hires contract hackers via front companies. Provincial MSS branches run ops with autonomy, making attribution nearly impossible. It’s a decentralized, deniable, and deeply embedded system.
Data is China’s strategic ammunition.
80% of Americans have had their data stolen. Not just for spying, but to train AI, identify vulnerabilities, run influence ops.
The 2014 Anthem breach used malware from a student hacking competition. The weaponization of young talent is chilling.
Data is China’s strategic ammunition.
80% of Americans have had their data stolen. Not just for spying, but to train AI, identify vulnerabilities, run influence ops.
The 2014 Anthem breach used malware from a student hacking competition. The weaponization of young talent is chilling.
Volt Typhoon is China’s silent saboteur. This APT group embedded itself in U.S. critical infrastructure - water, power, transport - not for spying, but for disruption.
It’s pre-positioning for a Taiwan contingency. A 24-hour delay in U.S. response could tip the balance.
#cyberwarfare
Volt Typhoon is China’s silent saboteur. This APT group embedded itself in U.S. critical infrastructure - water, power, transport - not for spying, but for disruption.
It’s pre-positioning for a Taiwan contingency. A 24-hour delay in U.S. response could tip the balance.
#cyberwarfare
Energy-aware AI models predict solar power availability and battery health, adjusting payload operations to maximize mission life without human intervention. AI-enhanced thermal control predicts heat loads and dynamically adjusts radiators and heaters, optimizing energy use.
Energy-aware AI models predict solar power availability and battery health, adjusting payload operations to maximize mission life without human intervention. AI-enhanced thermal control predicts heat loads and dynamically adjusts radiators and heaters, optimizing energy use.
Onboard scheduling uses AI-driven optimization to allocate observation tasks dynamically. Deep Q-Networks adapt to changing priorities and orbital constraints in real time. AI-based fault recovery employs hybrid reasoning: rule-based systems for known issues and ML model for unknown anomalies.
Onboard scheduling uses AI-driven optimization to allocate observation tasks dynamically. Deep Q-Networks adapt to changing priorities and orbital constraints in real time. AI-based fault recovery employs hybrid reasoning: rule-based systems for known issues and ML model for unknown anomalies.
AI-powered Event-Triggered Control reduces communication load. Instead of constant telemetry, satellites transmit only when anomalies or threshold events occur. Anomaly detection in spacecraft telemetry uses unsupervised learning to detect sensor drift or component failures before breakdowns.
AI-powered Event-Triggered Control reduces communication load. Instead of constant telemetry, satellites transmit only when anomalies or threshold events occur. Anomaly detection in spacecraft telemetry uses unsupervised learning to detect sensor drift or component failures before breakdowns.
Federated Learning allows satellites to train AI models collaboratively without sharing raw data, only model updates (like gradients or weights). This preserves bandwidth and security while improving onboard autonomy for heterogeneous constellations.
Federated Learning allows satellites to train AI models collaboratively without sharing raw data, only model updates (like gradients or weights). This preserves bandwidth and security while improving onboard autonomy for heterogeneous constellations.
Graph Neural Networks (GNNs) are applied to satellite constellations for distributed decision-making. Each node (satellite) shares local state, enabling coordinated collision avoidance and resource allocation. GNNs can surface which nodes/edges drove an alert, aiding root cause analysis
Graph Neural Networks (GNNs) are applied to satellite constellations for distributed decision-making. Each node (satellite) shares local state, enabling coordinated collision avoidance and resource allocation. GNNs can surface which nodes/edges drove an alert, aiding root cause analysis
Onboard AI uses reinforcement learning (RL) for autonomous navigation. RL agents optimize thrust and attitude control under uncertain dynamics, reducing reliance on ground commands. It also handles actuator failures, maintaining stability even when traditional control laws fail.
Onboard AI uses reinforcement learning (RL) for autonomous navigation. RL agents optimize thrust and attitude control under uncertain dynamics, reducing reliance on ground commands. It also handles actuator failures, maintaining stability even when traditional control laws fail.
Space Force plans to integrate cyber detection with orbital maneuvering and network segmentation. If a satellite is compromised, it can isolate itself, reroute traffic, and even reposition to avoid further risk, demonstrating a layered defense approach.
Space Force plans to integrate cyber detection with orbital maneuvering and network segmentation. If a satellite is compromised, it can isolate itself, reroute traffic, and even reposition to avoid further risk, demonstrating a layered defense approach.
AI is key to defending satellites. Machine learning models analyze telemetry for patterns that indicate cyber tampering, like unexpected power draws or command sequences, helping operators respond before damage spreads.
AI is key to defending satellites. Machine learning models analyze telemetry for patterns that indicate cyber tampering, like unexpected power draws or command sequences, helping operators respond before damage spreads.
Traditional cybersecurity tools don’t work well in orbit. US Space Force is investing in lightweight, radiation-hardened monitoring systems that can run autonomously, flag suspicious commands, and isolate compromised components in real time.
Traditional cybersecurity tools don’t work well in orbit. US Space Force is investing in lightweight, radiation-hardened monitoring systems that can run autonomously, flag suspicious commands, and isolate compromised components in real time.
Russia and China are developing co-orbital threats. A satellite that can’t move is a sitting target. Refueling and servicing enable agility giving U.S. and allies the ability to outmaneuver threats and maintain operational advantage in space.
Russia and China are developing co-orbital threats. A satellite that can’t move is a sitting target. Refueling and servicing enable agility giving U.S. and allies the ability to outmaneuver threats and maintain operational advantage in space.
Maneuvering is critical for defense: dodging debris, avoiding hostile approaches, and repositioning for better coverage. Without refueling, satellites can’t sustain these maneuvers. Investment in orbital servicing is a strategic necessity, not a luxury.
Maneuvering is critical for defense: dodging debris, avoiding hostile approaches, and repositioning for better coverage. Without refueling, satellites can’t sustain these maneuvers. Investment in orbital servicing is a strategic necessity, not a luxury.
Starlink became Ukraine’s lifeline for command, drones, and artillery. But reliance on a single commercial provider created risks - policy disputes, outages, and even geofencing. Owning satellites means control, continuity, and freedom of action in war.
Starlink became Ukraine’s lifeline for command, drones, and artillery. But reliance on a single commercial provider created risks - policy disputes, outages, and even geofencing. Owning satellites means control, continuity, and freedom of action in war.
Commercial imagery from ICEYE and Maxar helped Ukraine track Russian forces and plan strikes. But Russia also exploited open imagery for targeting. Indigenous ISR satellites would give Ukraine assured access and reduce adversary misuse of shared data.
Commercial imagery from ICEYE and Maxar helped Ukraine track Russian forces and plan strikes. But Russia also exploited open imagery for targeting. Indigenous ISR satellites would give Ukraine assured access and reduce adversary misuse of shared data.
Russia’s jamming degraded US-supplied GPS-guided munitions, dropping hit rates from 55% to 6%. Ukraine fought back with EW and tactics, but without its own secure PNT and ISR satellites, it remains vulnerable to Russia’s electronic warfare dominance.
Russia’s jamming degraded US-supplied GPS-guided munitions, dropping hit rates from 55% to 6%. Ukraine fought back with EW and tactics, but without its own secure PNT and ISR satellites, it remains vulnerable to Russia’s electronic warfare dominance.
Russia opened the war by hacking Viasat, cutting off thousands of terminals and disrupting Ukraine’s satellite communication. Later, it jammed GPS to blunt precision weapons. These attacks show why Ukraine needs sovereign, resilient space assets and not just borrowed connectivity.
Russia opened the war by hacking Viasat, cutting off thousands of terminals and disrupting Ukraine’s satellite communication. Later, it jammed GPS to blunt precision weapons. These attacks show why Ukraine needs sovereign, resilient space assets and not just borrowed connectivity.