skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Lin, Patrick"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. This is an overview of our 17 June 2024 report on outer space cybersecurity. Published under a Creative Commons license, this overview was republished widely worldwide, such as by SF Chronicle, Ars Technica, Discover, Fast Company, Raw Story, GovExec, The Space Review, many others. 
    more » « less
    Free, publicly-accessible full text available May 28, 2026
  2. This is an overview of our ICARUS matrix that's designed to generate novel scenarios in space cybersecurity, as first presented in our 17 June 2024 report on outer space cyberattacks. 
    more » « less
  3. This article is an overview of our NSF-funded project on the same subject. Published under a Creative Commons license, this overview was republished widely worldwide, such as by Smithsonian Magazine, Discover, Fast Company, Salon, SF Chronicle, SF Gate, Seattle Post-Intelligencer, Food Manufacturing, TechXplore, Atlantico (France), Japan Today, and many others 
    more » « less
  4. Recently at Cal Poly, we released a 95-page report on outer space cyberattacks, funded by the U.S. National Science Foundation. As the first of its kind, it explains not only what is driving this growing problem, but also how to anticipate novel scenarios to avoid being taken by surprise. This article presents the 10 top findings from that report. 
    more » « less
  5. Though general awareness around it may be low, space cyberattacks are an increasingly urgent problem given the vital role that space systems play in the modern world. Open-source or public discussions about it typically revolve around only a couple generic scenarios, namely satellite hacking and signals jamming or spoofing. But there are so many more possibilities. The report offers a scenario-prompt generator—a taxonomy of sorts, called the ICARUS matrix—that can create more than 4 million unique scenario-prompts. We will offer a starting set of 42 scenarios, briefly describing each one, to begin priming the imagination-pump so that many more researchers can bring their diverse expertise and perspectives to bear on the problem. A failure to imagine novel scenarios is a major risk in being taken by surprise and severely harmed by threat actors who are constantly devising new ways, inventive and resourceful ways, to breach the digital systems that control our wired world. To stay vigilant, defenders likewise need to be imaginative to keep up in this adversarial dance between hunter and prey in cybersecurity. More than offering novel scenarios, we will also explore the drivers of the space cybersecurity problem, which include at least seven factors we have identified. For instance, the shared threat of space debris would seem to push rational states and actors to avoid kinetic conflicts in orbit, which weighs in favor of cyberoperations as the dominant form of space conflicts. Outer space is the next frontier for cybersecurity. To guard against space cyberattacks, we need to understand and anticipate them, and imagination is at the very heart of both cybersecurity and frontiers. 
    more » « less