Amazon Project Kuiper satellites are operating in LEO.
ULA launches 27 Amazon Project Kuiper satellites. Firefly’s FLTA006 mission experiences an anomaly. Vega C launches ESA’s Biomass satellite. And more.
Rocket Lab successfully launches 67th Electron Mission, schedules next launch in less than 48 hours. US NSF and Amazon’s Project Kuiper establish coordination agreement to prevent satellite interference. Sidus Space picks Atomic-6 for solar arrays in $120M cislunar data mission with Lonestar. And, more.
Summary
Rocket Lab successfully launches 67th Electron Mission, schedules next launch in less than 48 hours. US NSF and Amazon’s Project Kuiper establish coordination agreement to prevent satellite interference. Sidus Space picks Atomic-6 for solar arrays in $120M cislunar data mission with Lonestar. And, more.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Be sure to follow T-Minus on LinkedIn and Instagram.
We are joined by NASASpaceflight.com with the Space Traffic Report.
Rocket Lab Successfully Launches 67th Electron Mission, Schedules Next Launch in Less Than 48 Hours (Rocket Lab)
Project Kuiper and U.S. National Science Foundation sign satellite coordination agreement (Amazon)
SpaceX says debris recovery attempts hindered after Starship explosion (Reuters)
SpaceX Polluted Border Area, Mexican President Sheinbaum Says (Bloomberg)
China's Shenzhou-20 astronauts complete second EVA (CGTN)
Scientists Are Sending Cannabis Seeds to Space (WIRED)
Complete our annual audience survey before August 31.
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
[MUSIC] Today is June 16th, 2025. I'm Maria Varmazis and this is T-minus. [MUSIC] Redwire Corporation has announced its acquisition of Edge Autonomy. >> Four. >> Starcatcher has announced a new partnership with Star Cloud. >> Three. >> Axiom's AX4 mission to the International Space Station is aiming to launch no earlier than this Thursday, June 19th. >> Two. >> UpAerospace has successfully conducted a hypersonic rocket launch at White Sands Missile Range. >> One. >> ULA scrubs the launch of the second batch of Amazon Project Kuiper satellites due to an engineering observation of an elevated hurge temperature within the booster engine. [MUSIC] And today we're talking with Brandon Karpf about agentic AI use in the space segment. And if I may say so myself, it is a fascinating chat about its potential and potential vulnerabilities in space. Definitely stick around for more on that later in the show. [MUSIC] >> Happy Monday everybody. Thanks for joining me. At the time of recording today's show, we were all eagerly awaiting the launch of the next batch of Amazon Project Kuiper satellites. But as of 1 PM Eastern time, the launch has been scrubbed due to an engineering observation of an elevated purge temperature within the booster engine. ULA says the team will evaluate the hardware and will release a new launch date when available. And ULA's CEO, Tori Runo, posted this possible issue with a GN2 purge line that cannot be resolved inside the count. We will need to stand down for today. We'll sort it and be back. Nice. ULA successfully launched Amazon's KA01 mission into space on April 28th of this year. The team quickly established contact with all 27 satellites and deployment and activation sequences proceeded nominally. The Kuiper 2 mission for Amazon's broadband constellation will see a further 27 satellites deployed in low Earth orbit. And we will bring you updates on tomorrow's show. Up Aerospace has successfully conducted a hypersonic rocket launch at White Sands Missile Range. The mission was funded by the Stockpile Responsiveness Program at Los Alamos National Laboratory and was executed with the support of the Navy White Sands Detachment. The Lannell payload test vehicle was successfully deployed in flight. Up's Spider rocket has been designed to support hypersonic missions reaching speeds of Mach 10. The launch vehicle is the result of an eight year collaboration between Up, Cesaroni Aerospace, NASA's Flight Opportunities Program, Marshall Space Flight Center, and Los Alamos National Laboratory. Jerry Larson, who is the president and CEO of Up Aerospace, shared in a press release that the successful launch of Spider 1 sets the stage for the next mission, which will integrate guidance and control systems into the Spider 2 vehicle. And that launch is scheduled for early 2026. And for our final launch update for today anyway, it seems that Axiom's AX4 mission to the International Space Station is back on the schedule. And NASA, Axiom Space and SpaceX are reviewing launch opportunities no earlier than this Thursday, June 19th, for the fourth private astronaut mission to the ISS. NASA is working with Roscosmos to understand the most recent repair efforts to seal small leaks, which caused the mission to be delayed on June 12th. And the leaks are located in the aft, or backmost segment, of the orbiting lab's Zvezda service module. And they have been monitored by flight controllers for the past few years. NASA says that after the most recent repair, pressure in the transfer tunnel has been stable, indicating that the small leaks have most likely been sealed. Additionally, SpaceX teams have repaired a liquid oxygen leak identified during post-static fire Falcon 9 rocket inspections. Following the repairs, the company completed a wet dress rehearsal of the Falcon 9, and we've got all our fingers crossed that launch will happen this week. Starcatcher has announced a new partnership with StarCloud. Starcatcher's orbital energy grid will be used to accelerate the deployment and enhance the performance of StarCloud's on-orbit data centers. StarCloud is building a network of low Earth orbit satellites to enable real-time high-performance compute initially for edge applications. According to their press release, Starcatcher will deliver dedicated solar energy to the forthcoming StarCloud constellation via the company's advanced orbital power grid. And Redwire Corporation has completed its acquisition of edge autonomy. The strategic transaction was approved by Redwire shareholders on June 13th. Edge autonomy is a provider of field-proven, uncrewed airborne system, or UAS technology. Redwire says the acquisition will elevate the company into a scaled and profitable space and defense tech organization that's focused on the convergence of integrated autonomous operations for defense and national security. They say the combined company is uniquely positioned to deliver innovative space and airborne platforms, which are two of the fastest growing trends in defense technology. And that concludes today's Intel Briefing. And 2K Senior Producer Alice Carruth is joining us now to let us know about the stories that didn't make today's Top 5. Welcome back, Alice. Thanks, Maria. I'll be joining you again after your chat with Brandon to update you on the results from the last week's IREC. But before then, the stories that we've included in today's selected reading section cover Starlink's access, which is now available in Iran, Black Sky's plan to expand its constellation, and AST Space Mobile's access to mid-band spectrum, which has been a point of contention for a while. A lot of moving pieces in those stories, so please remind us where we can find those. We include links to all the original sources of all the stories we mentioned throughout the show in the selected reading section of our show notes. Those links can also be found on our website, space.intuk.com, and I'll be seeing you again shortly. Hey, T-Minus Crew. If you'd like daily updates from us directly in your LinkedIn feed, be sure to follow the official N2K T-Minus page over on LinkedIn. And if you're more interested in the lighter side of what we do here, we are @t-daily on Instagram. And that is where we post videos and pictures from events, excursions, and even some behind-the-scenes treats. Links are in the show notes, but you'll join us there. And today we have our monthly segment with Brandon Karpf about vulnerabilities in space. I wanted to get your thoughts on Agentec AI, and you had a whole bunch of thoughts. So tell me a bit about your thinking about what we're doing here. This is sort of metagaming, but I want to hear it. Yeah, and I think this is valuable to the audience because I'm showing up in their feeds about once a month, and ostensibly to talk about the intersection of cybersecurity and space. And a pattern has emerged where we tend to have a conversation around, here's an opportunity. The first conversation we had was on accelerating the pathways for delivering software to the DoD and to Space Force. That was the first conversation. That's an opportunity. Our most recent conversation last month was around implementing DevSecOps and integrating GRC with DevSecOps, especially for the space industry and how challenging that could be, but also what that opens up. And it was a very practical recommendation for space technology companies to think about how they implement that. And so I think bouncing between, here's an interesting challenge, industry challenge or industry opportunity, and then here's a practical thing that you can do at your organization. And we'll keep bouncing between those two types of topics every single month. So today is going to be a setting the scene, describing the situation and getting some of your take, but we'll save the solutions for next time. All right, so the Agentec AI was sort of the lead-in to this because I had been noticing at all the conferences I've been to that that is the phrase everybody's using. But of course, it can mean a lot of different things and also how you implement it within the space realm can be very different depending on what you're trying to do. And you had some specific thoughts about Agentec AI and network architecture as it relates to space. Walk me through this. Sure. So obviously, Agentec and anything AI is way overhyped. And in general, I think that the large companies themselves are overhyped, but the actual implementations and uses of the technology I actually think is underhyped. The other thing that is underhyped right now is the security implications of actually applying Agentec technologies. And of course, Agentec technologies are really just allowing a computer and a model to run workloads and do things autonomously by themselves for you for a specific purpose. It's the dream. And what it's the dream, right? We all just sit back, do nothing, and AI makes all the money that we need. And although we're probably pretty far away from that future, we're not far away from a future where organizations and individuals start chaining these systems together to talk to each other at machine speeds. And I think the industry has talked a lot about the security implications of AI in general. They have not talked about the higher level security implications of what happens when we start chaining these tools together and chaining these models together in an Agentec system. And opening up APIs and other standards of communication between AI to AI systems. And that opens up a whole new can of worms that I don't think anyone in this world is prepared for. Right, because usually when that conversation starts going places, people start going, "Okay, well, we're doomed." Or they go, "Yeah, well, we just put our normal security framework on and data loss prevention systems and encryption and firewalls and just like what we've been doing for the last 30 years because that's been going so well." Because super great. It's been going super well. Yeah, there's definitely not an industry about how well it's going. So where is that middle path? Yeah, well, and I think to get to that middle path, we actually need to talk about what the risk is. And then I will relate it to the space industry. I promise this is related to the space industry. We'll get there. We'll get there, friends. We will get there. So bear with me. But the threat here isn't actually the content of those communications. Right, typically when we talk about data security and information security, we're talking about the actual content, your social security number, your bank transaction data, your private personal data, your interactions with family and friends and messages. Actually, the real risk here is the metadata of those communications. And I'll explain why. So as agentic AI and as these models are starting to accelerate, we're starting to standardize how they talk to each other. So Anthropic released a standard in the fall called MCP, Model Context Protocol, that is essentially a dynamic wrapper around the API interfaces of models and other systems that models would want to interact with that creates a standard of communication, essentially a protocol that allows those models and other models to talk to each other. It's a middleman, right? It's a middleman handling. Interoperability. Right, exactly. It's the Tower of Babel handing messages back and forth. But what that's done is it's created a standard that a lot of folks, I mean, we're talking about most of the large organizations in the world who have their own models and their own systems that want to chain to create agentic workflows. It's now a standard of how they talk to each other. And how they talk to each other is releasing a tremendous amount of information in the form of metadata. And it's not actually the details of the communication. And so it's now totally reasonable to say that an adversary who's looking at network traffic and looking at data flow from an organization out into the dirty internet could see the specific traffic going from your model, your agentic model, to all of the other agentic models and micro models and systems and microservices that that model is reaching out to at machine speed. And when we talk about machine speed, we're talking about extraordinary amounts of data every second going from your organization's model or agentic system to thousands of other systems and services on the dirty internet. And opening up what databases are being accessed, what services are being accessed, when the timing, the frequency of those things, potentially even who as an organization or an individual is using those systems. And when you start thinking about all of that metadata, it creates a very clear picture. And the clear picture it's creating is what you are doing, what your strategy is, what your agentic system is trying to achieve on your behalf, what your intent is. So the adversaries no longer need to decrypt your data to figure out what you're doing and why you're doing it. They just need to capture the traffic, which is actually a pretty trivial activity. And so that opens up a whole new set of vulnerabilities that the world is not prepared for as we implement the model context protocol and implement agentic workflows within our organizations that even if you secure all the data, the content is secure, but the context of your communication, the metadata is not secure. And the metadata becomes the message. That's interesting. So content versus context is a great framework. The devil's advocate would say, I don't know if I believe this, but I'm thinking it is, okay, but how much can you really glean from context? It really, it really, really, really is enough. And it's even enough today in a lot of use cases prior to the implementation of AI systems. I'll give you a couple of anecdotes. There's a research group out of UC San Diego called the Cata C A I D A research group. They do a lot of internet measurement activities, which essentially is the academia word for signals intelligence. And a couple of years ago, they published a paper where they were just by doing network analysis, just by looking at metadata of publicly available internet traffic, they were able to identify the physical locations of Comcast's most critical network exchange points and fiber points around the United States. And from that, you can actually determine the couple nodes that you need to knock off line with like a car accident running into a telephone pole that would drop Comcast off of the internet entirely. That was using just metadata. Wow. Another great example is this fall, Ben Gurian University released a proof of concept hack where they did a side channel attack, just measuring packets going from an individual user on chat GBT and chat GBT servers. And just by collecting that data, the packets themselves were encrypted, but just because how they knew how chat GBT tokenizes data. And again, model context protocol provides a standard for how data is transmitted between AI models are very similar. But just knowing how open AI tokenizes data, Ben Gurian University was able at a greater than 50% accuracy determine the topic of the communications between a person and chat GBT. And at a greater than 20% accuracy, get perfect word replication of the prompts and the responses from open AI. Oh, dang. The issue is there. And you can get a lot of information about metadata. And so now let's think about 10 years in the future. You've got a company that is thinking about doing M&A in your space and it's identifying M&A targets. It's finding the exact organization that you're trying to acquire and why it's developing the strategy. It's sending data to a pricing model, a very specific kind of micro model. Think about microservices, but a micro model. It's that micro model's only job is to develop a pricing model to acquire this one opportunity. There's another market analysis model that's doing your go to market once you acquire. There's another model that is out there who was whole purpose is how you integrate a company into your organization. Your agent is doing all of this analysis in real time, figuring out the IP trade secret issues, et cetera. An individual who's looking at your agent doing all of those transactions could actually figure out ahead of time what your strategy is, who your acquisition target is, what your proprietary technology is, what your go to market strategy will be, just based on the frequency of those things. And can tell that you're about to make a move. And imagine if you're a public company, that is now information that can move a stock price. Okay. So all right. I'm going to ask the obnoxious question. Yeah. How do you relate to space? Yeah. Yeah. So of course, and we'll tease this and we'll dive into this more. I think the only two viable markets in this space industry in terms of the space segment are telecommunications and Earth observation. That might change in the future. But to me, that's the only two viable markets today for the space segment. So set aside Earth observation first for a moment, but talk about the telecommunications segment, right? And the fact that communication architectures have been up there for decades now, and it's only increasing. Now we're getting the direct to sell capabilities. We're, you know, ASD, Space Mobile and SpaceX. Everyone's kind of moving in this direction of massively increasing the internet backbone capability of the space segment. And actually, the efficiency of transmitting packets from ground to space and using the space segment as part of the internet backbone and the internet exchange points for the large scale autonomous systems. I think that the fact that there's such a barrier to entry to actually getting those, essentially routers and servers and processes running on low Earth orbit or medium Earth orbit satellites, there's a huge barrier to entry. That makes it much more difficult for an adversary to get a measurement capability in a space segment, but also how the space segment functions from a telecommunications perspective. Those are essentially relays. They're a little more sophisticated than a internet based router in a large data center at an internet exchange point where you've got fiber lines coming in. It's by adopting, and we don't have time today to go into the details, but next time we talk, we should go into the details about how I think you can do this, but actually adopting a space segment component of your backbone, of your wide area network. So instead of going directly from your network to the dirty internet, you go from your network to a space segment and you essentially relay your communications into the space segment and then out into the dirty internet provides a layer of obfuscation for your metadata where it could potentially hide the true source and destination, the true frequency and velocity and activity of your data and the real metadata of what's happening inside your wide area network for your organization. And so by relaying and essentially proxying your data first through a space segment before going terrestrial into the internet backbone, I think could actually provide one layer of protection against these types of network analysis attacks and reconnaissance attacks. Okay, so we have to put a pin in that because we do have to conclude, but I'm just thinking, okay, how would that work? And why? How in the why of that will definitely be next time? We'll be right back. Welcome back. All right, so Alice, welcome back. Okay. Thank you. So IREC 2025, how was it? Amazing. It's always amazing. I get blown away every year by the creativity of these students, their engineering knowledge and their ability to come up with new ideas, so problems that have been around for ages. So it was a very rewarding, but very tiring and very hot week in the West Texas desert. Oh, how hot? Okay. How hot was it? But seriously, how hot was it? You know, day one was pretty good. It was in the 90s, so it wasn't too hot, but by day two of launches, we were over a triple digits and you know, there's not much shade out there or coverage, so it does get very uncomfortable very quickly. Oh, God. As soon as you said it's not too bad in the 90s, I was instantly like, nope, I'm out. You are tougher than me. That is for sure. All right, so this is an event I know that is very near and dear to you. So if you had to pick your favorite moments, because there's a lot of good moments in there and a lot of good human drama and good engineering, what were your faves? Yeah, you're right. It's near and dear to me and I love every single launch. I get very excited. I probably saw at least 80 of them myself. I, you know, we left earlier in the afternoons, most days just because I had to get out of the sun. But yeah, I think to me, the highlight this year was probably seeing a lot of the payloads that were designed to go into the launches. There was a lot more thought put into it this year. I saw a lot of live feeds of cameras on board launches, which was just blew my mind. The University of Arizona was the first one that came to mind. I got to see their camera that launched from the ground up and back down again, completely perfect signal the whole way. And it had graphics on screen and live telemetry. So the feed was just like watching a professional. That blew my mind. What? Because you and I know how much it has to go into all of that ahead of time. My goodness. Oh, you know, they're going to give SpaceX to run for their money with those great presentation. That's amazing. My goodness. Okay. That alone is just like kudos. There's got to be others. What else? What else caught your eye? There were others. The other payload that comes to mind, and I wish I could remember the university name. I will look it up and I'll bring it to you at some point. It was a university that had a biosciences major that designed the payload and she got, how can we put this? She was a fertility major and she decided to study what microgravity did to sperm. And so they got sea urchin sperm. Sea urchin sperm. Not human. Sea urchin. And decided to do a controlled batch, which she kept with us on the ground and then sent a batch up on the rocket launch to see how the microgravity affected the sperm count, which just amazed me that they're thinking already as students, you know, what this opportunity can present to them outside of the realm of engineering. So that one, I think, really was a highlight. That is really cool. That is just, yeah, that they're exactly what you just said, that they're thinking beyond that. And this is not just like people who like rockets, which is great. There's nothing wrong with that. But we're opening it up to thinking about that. Oh, that's a great sign of where things are going too. So that just fills me with a lot of joy to hear that. That's awesome. So when this morning, when you and I were... University of Houston. That's it. I remember there you go. University of Houston. Shout out. Nicely done. So sometimes it's not always clear who the winner is. I mean, there's multiple winners of this event. Are they still working on figuring that out right now? Because the event was last week, but I mean, how does this work? No, so they announced them on Saturday and I again missed the award so many, which always breaks my heart because I had another event I had to get back for, but I wrote them down. So 10k Cots, which is commercial off the shelf to 10,000 feet. University of Virginia, which was Team 184 won that. 30k Cots was Team 208, Mississippi State University. 10k SRAD, which is student research and design, which means that they basically built their engines. They scratch, right? Yeah. Yeah, from scratch. So the 10k category was won by the Federal University of ABC in Brazil. Wow. Amazing. Yeah. They made them and built all that. 30k SRAD was Team 410 from West Virginia University. And then we go into the more complex categories because we have SRAD hybrids. So that means when they're using the liquid and solid hybrid engines. So the 10k SRAD hybrid was won by Team 704 University of Sydney. The 30k SRAD was won by Team 800, which was Rice University again in Houston. Houston, there you go. Then they had the multi-stage category. So they had two stage rockets, which is amazing. They went to much higher altitudes. That was my thing. Yeah, me too. So the 30k category for multi-stage was won by Team 502, which is University of Laval, which is Canada. And then the 45,000 feet category, because they went above that, which is just, again, amazing, was won by Team 602 from University of Akron. So that's over here in the US again. There you go. Ohio. Nice. And then they have this new category, which is the new big cup, as it used to be. It's called the New Horizons Trophy. And so basically they pick the team that really stands out amongst all of those winning categories. And that was won by Team 704, the University of Sydney. So it went to Australia, which is amazing to see an international team come and do so well. That's so great. It is an international competition, and as it should be, that's so... Man, that's so great. The future is bright for all those students. That's just amazing. And so the sponsors, like all the people on the ground, what was it like this year? Because it's a new location, right? Yeah, it was different. We had to learn a lot on the fly. There were a couple of technical issues. We got hit by a Haboob on day one just before everything was starting. It's a dust storm, everybody. It's a great thing to deal with. Dust storm. Yeah, dust storm. But the sponsors were great. We got SpaceX came this year for the first time in a long time. Wow. Blue Origin was there. Proto Space, who I know we've spoken to before, do a lot of components. There was just a ton available to the students. And I do think they really showed themselves to be ready to be able to enter the industry. I think it really gives them this great hands-on experience. And if anybody is interested in getting involved in the IREC for 2026, they've announced the days. It's going to be June the 14th, the 19th next year. Location is still TBD. This is the first year at Midland. I think they're going to go back and sort of review, I mean, overall, an incredible experience at that location. They just want to make sure that everybody's happy before they start saying, "Yes, we're definitely coming back next year." So when we know exactly where they're going to be, we'll announce that. And I do encourage, you know, I met people there that work in the industry that work for Lockheed and Northrop Grummans and the Blue Origins and the Airbuses of the world. We encourage all these organisations to really start thinking now, get involved in it for next year because this is really your future workforce that are going through this. And you get to see them work through the whole spectrum of design, launch and recovery. And I do think seeing the ones that even don't go to plan and see how they deal with that. I mean, I was with the University of Strathclyde, which is one of the two UK universities. They were going for a 30,000 foot launch and their motor blew up as it came off the rail. And their faces, they were devastated. You know what? They recovered the vehicle and figured out that they could stick another motor in it and they were going to go and see if they could launch it again. And to see the fact that they figured it out that quickly, this is what went wrong. This is how we can correct it. And oh, look, we can actually possibly even try again. That means where you really see teamwork, which is key in space and how these students figure the problems out as a team together is just amazing. Great recruitment opportunity for a lot of companies. Absolutely. And Alice, I can tell why this is every year when you go, you have the best stories from this amazing event. So I'm glad that you were there. It sounds like it was amazing as it always has been. So thank you for sharing. That's it for T-minus for June 16th, 2025, brought to you by N2K Cyberwire. For additional resources from today's report, check out our show notes at space.n2k.com. We would love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing space industry. If you like the show, please share a rating and review in your podcast app. Please also fill out the survey in the show notes or send an email to space@n2k.com. We're privileged that N2K Cyberwire is part of the daily routine of the most influential leaders and operators in the public and private sector, from the Fortune 500 to many of the world's preeminent intelligence and law enforcement agencies. N2K makes it easy for companies to optimize your biggest investment, your people. We make you smarter about your teams while making your teams smarter. Learn how at N2K.com. N2K's senior producer is Alice Carruth. Our producer is Liz Stokes. We were mixed by Elliot Peltzman and Tre Hester, with original music by Elliot Peltzman. Our executive producer is Jennifer Eiben. Peter Kilpie is our publisher, and I am your host, Maria Varmazis. Thanks for listening. We'll see you tomorrow. [Music] [Music] [BLANK_AUDIO]
ULA launches 27 Amazon Project Kuiper satellites. Firefly’s FLTA006 mission experiences an anomaly. Vega C launches ESA’s Biomass satellite. And more.
Airbus announces over 2000 job cuts. ESA launches the Proba-3 mission from India. Arianespace postponed the VV25 mission until today. And more.
The ISS welcomes NASA’s 31st SpaceX resupply mission. Strike ended at Boeing’s West Coast facilities. Rocket Lab launches its 54th Electron mission....
Subscribe below to receive information about new blog posts, podcasts, newsletters, and product information.