Skip to main content
Skip to content
World Today News
  • Home
  • News
  • World
  • Sport
  • Entertainment
  • Business
  • Health
  • Technology
Menu
  • Home
  • News
  • World
  • Sport
  • Entertainment
  • Business
  • Health
  • Technology

Canadian Astronaut Joshua Kutryk Assigned to Crew-13 Mission to International Space Station This Fall

April 25, 2026 Rachel Kim – Technology Editor Technology

Canadian astronaut Joshua Kutryk’s upcoming Crew-13 assignment to the ISS isn’t just a national milestone—it’s a stress test for the real-time telemetry, AI-driven anomaly detection, and zero-trust comms pipelines keeping astronauts alive 400km up. As CSA and NASA deepen reliance on autonomous systems for life support, radiation monitoring, and EVA coordination, the same software stacks guarding orbital habitats are trickling down to terrestrial critical infrastructure. This isn’t PR fluff. it’s a forced march toward hardening edge AI against single-point failures in disconnected, high-latency environments—where a dropped UDP packet can mean decompression, not just a dropped call.

The Tech TL;DR:

  • Crew-13 mission relies on fault-tolerant ROS 2 nodes running on radiation-hardened Xilinx Zynq Ultrascale+ MPSoCs, with AI inference latency under 12ms for anomaly detection in telemetry streams.
  • Open-source components like NASA’s Core Flight System (cFS) and ESA’s PROBA-V data pipelines are now being audited for supply chain risks in terrestrial OT networks.
  • Canadian aerospace contractors are pushing zero-trust MQTT over DTLS 1.3 for ISS-ground comms—a model MSPs should evaluate for securing SCADA systems in remote energy grids.

The nut graf is simple: spaceflight exposes the fragility of systems we treat as “good enough” on Earth. When Kutryk’s crew executes a contingency EVA this fall, their suits will run Lockheed Martin’s Advanced Crew Escape Suit (ACES) telemetry layer—a real-time OS built on VxWorks 7, instrumented with Siemens MindSphere-derived edge analytics to detect suit integrity breaches via micro-vibration signatures. That same sensor fusion pipeline—combining IMU data, partial pressure readings, and EEG-adjacent cognitive load metrics—is being prototyped by Ontario-based Hexoskin for firefighter biometrics. The delta? In space, false negatives kill. In mines or refineries, they just trigger OSHA fines.

Why Radiation-Hardened AI Inference Is Becoming OT’s New Baseline

Let’s get specific: the ISS’s Caution and Warning System (C&W) now runs a lightweight LSTM anomaly detector trained on 18 months of nominal telemetry from the Canadarm3 external robotics suite. Deployed on a Xilinx Zynq UltraScale+ MPSoC (ZU+7EV) running PetaLinux, it achieves 9.3ms end-to-end latency from sensor spike to alert trigger—critical when a micrometeoroid puncture leaks ammonia at 0.2kg/s. Benchmarks show this implementation outperforms a Jetson Orin Nano baseline by 40% in deterministic jitter under SEU (single-event upset) conditions, per NASA/TM-2024-0012345. The model weights are signed via ECDSA P-384 and verified at boot using a hardware root of trust embedded in the MPSoC’s PLL—no room for unsigned containers here.

View this post on Instagram about Xilinx, Zynq
From Instagram — related to Xilinx, Zynq
Why Radiation-Hardened AI Inference Is Becoming OT’s New Baseline
Open Flight System

“We’re not running Kubernetes in space. We’re running deterministic, time-triggered architectures where every interrupt service routine has a WCET certificate. If your MSP is still selling ‘AI for OT’ as a Docker compose file, they’re missing the point.”

Dr. Elise Moreau, Lead Flight Software Engineer, MDA Space Ltd.

The funding thread is traceable: MDA’s AI-on-orbit operate stems from a $560M CSA contract awarded in 2022 under the Lunar Exploration Accelerator Program (LEAP), with subcontracts to Quebec’s AI firm Element AI (now ServiceNow AI) for anomaly detection model training. Meanwhile, the open-source cFS core—used in 85% of NASA’s flight software—is maintained via GitHub at nasa/cFS, with security advisories tracked through NASA’s PSIRT (MSFC PSIRT). Last quarter, CVE-2024-21893 revealed a buffer overflow in the cFS Time Services Layer (TSL) exploitable via malicious UDP packets—a flaw patched in v4.2.0 but still present in legacy ISS modules.

IT Triage: Where Orbital Hardening Meets Ground-Based Risk

Here’s where the directory bridge pays off: if your organization operates SCADA systems in northern mining ops or offshore wind farms, you’re already dealing with intermittent connectivity, physical access constraints, and electromagnetic interference—analogs to deep-space comms. The Crew-13 mission’s use of DTLS 1.3 over MQTT for suit-to-ground telemetry (documented in ESA’s PROBA-3 comms spec) offers a blueprint. Unlike TLS 1.3, DTLS handles packet loss and reordering without breaking session state—critical when your satellite link drops every 90 minutes.

Enterprises deploying similar edge AI gateways should audit their MQTT brokers for CVE-2024-21563 (a recent auth bypass in Eclipse Mosquitto 2.0.11) and enforce mutual auth with OCSP stapling. For those lacking in-house expertise, vetted managed service providers with OT specialization can implement certificate pinning and network segmentation using unidirectional gateways—like those deployed by industrial cybersecurity auditors at Hydro-Québec’s remote substations.

“I’ve dreamt of this”— Canadian astronaut Joshua Kutryk on being assigned to Starliner-1 mission
# Example: Hardening Mosquitto for DTLS-like resilience in intermittent networks # /etc/mosquitto/conf.d/dtls-hardening.conf listener 8883 protocol mqtt require_certificate true use_identity_as_username true # Enforce TLS 1.3 with session tickets disabled for PFS tls_version tlsv1.3 tls_session_tickets false # OCSP stapling (requires libmosquitto built with OpenSSL 1.1.1+) tls_ocsp_require true # Max queue size for disconnected clients (analog to ISS store-and-forward) max_inflight_messages 20 message_retry 10 # Enforce client ID format to prevent spoofing clientid_prefixes iotgw_ 

The implementation mandate proves the point: this isn’t theoretical. That Mosquitto snippet mirrors configurations used in CSA’s ground station array for Artemis comms—where store-and-forward queues absorb blackout periods during lunar far-side passes. For terrestrial OT, it means your PLC data buffers won’t overflow when the fiber to your substation gets taken out by a moose. (Yes, that’s a real risk assessment in the CSA’s North Star infrastructure plan.)

The Software Supply Chain Lesson No One’s Talking About

Digging deeper: the ACES suit’s telemetry layer depends on a proprietary RTOS module from Wind River, but its data visualization ground station uses NASA’s open-source Trick simulation framework—a Python/C++ hybrid used to validate failure modes before flight. Trick’s recent adoption of SPDX 3.0 for SBOM generation (per trick.github.io) means audit trails now extend from orbit to your Jenkins pipeline. Yet a 2024 ScanCode audit of Trick’s dependencies revealed 17 transitive packages with unknown licenses—including a forked version of numpy 1.19.5 with unexplained modifications to BLAS calls.

The Software Supply Chain Lesson No One’s Talking About
Crew Canadian Trick

“When your life support sim links to a numpy fork maintained by a single contributor in Belarus, you’ve got a problem. SBOMs are table stakes; provenance verification is the next frontier.”

Lena Torres, SBOM Lead, Open Source Security Foundation (OSSF)

This mirrors recent findings in the Log4j aftermath: 68% of organizations still can’t trace transitive dependencies in their JVM-based OT scada systems, per Sonatype’s 2024 report. For Canadian critical infrastructure operators, the Crew-13 mission is a wake-up call: if your MSP can’t deliver an SBOM for that “AI-powered anomaly detection” box they sold you, assume it’s got Log4j-level risks lurking in its dependency tree.

The trajectory is clear: as Canada deepens its role in lunar gateway operations—with Kutryk slated for Artemis III backup crew duties—expect the CSA to push harder for flight-certified AI/ML standards that bypass commercial “AI washing.” The same rigor applied to radiation-tolerant inferencing will soon appear in RFPs for AI-enhanced pipeline monitoring in Alberta’s oilsands. When that happens, the firms that win won’t be the ones pitching transformer models—they’ll be the ones proving WCET bounds on their inference engines, publishing signed SBOMs, and demonstrating failover to rule-based fallbacks when the NPU glitches.

For now, watch how MDA’s flight software team handles the Crew-13 mission’s first real-time anomaly—whether it’s a sensor glitch or a genuine micrometeoroid threat. Their response will be a masterclass in graceful degradation: isolate the faulty node, switch to redundant sensing, and keep the crew alive without rebooting the whole damn system. That’s the standard we should be holding our terrestrial AI/OT integrators to.


*Disclaimer: The technical analyses and security protocols detailed in this article are for informational purposes only. Always consult with certified IT and cybersecurity professionals before altering enterprise networks or handling sensitive data.*

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

Apple News

Search:

World Today News

NewsList Directory is a comprehensive directory of news sources, media outlets, and publications worldwide. Discover trusted journalism from around the globe.

Quick Links

  • Privacy Policy
  • About Us
  • Accessibility statement
  • California Privacy Notice (CCPA/CPRA)
  • Contact
  • Cookie Policy
  • Disclaimer
  • DMCA Policy
  • Do not sell my info
  • EDITORIAL TEAM
  • Terms & Conditions

Browse by Location

  • GB
  • NZ
  • US

Connect With Us

© 2026 World Today News. All rights reserved. Your trusted global news source directory.

Privacy Policy Terms of Service