STARLINK
STARLINK
STARLINK
UNITED STATES
by
April 2023
UNITED STATES
Approved:
21 April 2023
____________________________________________________________
Ian McAndrew, PhD, FRAeS Date
Dean, Doctoral Programs
Capitol Technology University
ABSTRACT
The general problem is the advent of low earth orbit (LEO) satellite internet changing the surface
of internet-connected devices and users globally (Cao et al., 2020; Scanlan et al., 2019). The
specific problem is the proliferation of Starlink LEO satellite internet access in the United States,
which is changing the cybersecurity risk profile of rural American customers (Scanlan et al.,
2019; Voelsen, 2021). A pre-test and post-test design was utilized with a quantitative, quasi-
experimental approach to determine whether specific cybersecurity risk occurrences changed for
those who purchased, installed, and used Starlink. The population of this study was rural
participants in America who had pre-ordered but had not yet installed Starlink. The sample size
was 49, and participants were taken from 22 states. Four research questions were proposed, each
targeting specific Internet usage cybersecurity risks, including identity theft, data breaches,
reputational harm, malware, and virus infection. A survey instrument was used to collect pre-
and post-test data to analyze the treatment and control group participants. When comparing the
treatment group (Starlink users) to the control group (those who did not use Starlink), the
occurrence rate increased for identity theft and reputational harm, with a decrease observed for
Keywords: cybersecurity, data breach, identity theft, malware, reputational harm, risk,
DEDICATION
I dedicate this dissertation to my family—my wife, Jamie, children, parents, and siblings.
This research would not have been possible without my wife’s unwavering dedication to our
family. You have always encouraged me to maximize my life and potential; this feat is no
exception. Dylan and Briella, although you may not remember the many hours this endeavor
took away from us, I appreciate your good behavior toward your mother during this time. I hope
this serves as inspiration for you to know that anything you set your mind to can be
accomplished.
Mom and Dad, you made it your life's mission to provide for your children and
encouraged me to accomplish anything, and I am forever grateful. Todd, thank you for always
giving me a different perspective and knowledge. Most assume identical twins think and act
alike; this is simply false! Jodi, your enthusiasm and thirst for life is infectious. Thank you for
always keeping me honest. Bear, I could not have asked for a greater father-in-law and friend. I
ACKNOWLEDGMENT
First and foremost, I want to acknowledge my Chair, Dr. Mark Fearer. Sir, I appreciate
your guidance, support, and tutelage throughout this process. I am genuinely grateful for your
time reviewing, mentoring, and providing feedback. To my committee member, Dr. Timothy
Robinson, thank you for your honest feedback and quantitative mindset. Your knowledge and
review of my material gave me the data needed to make the relevant and appropriate changes
To my fellow doctoral cohort members Charles, Conner, Devlin, Johnny, Kait, Kenya,
Romeo, and Ronnie, I am grateful for your knowledge and the friendship we have gained while
pursuing our goals together. You each brought a unique perspective and approach to the ever-
TABLE OF CONTENTS
Definitions..................................................................................................................... 13
Assumptions.................................................................................................................. 15
Summary ....................................................................................................................... 16
Methodology ................................................................................................................. 18
Chapter Conclusion....................................................................................................... 66
Pilot Study..................................................................................................................... 79
Location .................................................................................................................... 84
Location .................................................................................................................... 94
LIST OF TABLES
LIST OF FIGURES
Figure 26 Identity Theft Occurrences and Percentage of Total for Groups ................................ 97
Figure 27 Data Breach Occurrences and Percentage of Total for Groups ................................. 98
Figure 28 Reputational Harm Occurrences and Percentage of Total for Groups ...................... 99
Figure 29 Malware and Virus Occurrences and Percentage of Total for Groups .................... 100
CHAPTER 1: INTRODUCTION
Society can expect a "massive impact on the security and resilience of the global
Internet" (Voelsen, 2021, p. 27) due to the advancements in low earth orbit (LEO) satellite
technology. In the United States, the first to market in a large-scale deployment of this
technology is Starlink, a subsidiary of SpaceX (Sheetz, 2021b). Elon Musk, the company's chief
executive officer, stated during the Satellite 2020 conference that the product will primarily serve
rural areas with a low population density where competitors' technologies, such as 5G and other
Scanlan et al. (2019) described internet access around the globe, especially in rural areas,
as rapidly changing and stated that this shift inevitably changes the attack surface for devices and
users previously not connected to the Internet. Specifically, the advent of LEO constellations to
provide this access must be tracked "to analyze potential security concerns related to S.I." (Cao
et al., 2020, p. 193). Companies will face several technical challenges during deployment, and
the consequences of success will significantly impact their customers (Voelsen, 2021). This
study's purpose was to determine the cybersecurity risks posed by Starlink LEO satellite Internet
effects on the primary Starlink customer base. It discusses the research problem, purpose,
significance, and nature of the study. The framework, questions, limitations, delimitations, and
administrative, instructive, and other computer systems and networks (Shirey, 2007). In 1969,
2
the United States government conceived the early version of the Internet—ARPAnet—which
1983, the widespread adoption of a standard for communication called the transmission control
protocol/internet protocol (TCP/IP) started the Internet down a path of rapid growth (Ryan,
2010). Since then, connectivity to the Internet has been commercialized, resulting in numerous
Takei and Murai (2003) described how the Union of Soviet Socialist Republics launched
the first satellite in 1957 to provide a communication medium in geostationary (GEO) orbit. In
1975, the first satellite connection to use TCP/IP was completed in a joint effort by Stanford
University, Raytheon, and the University College London (Takei & Murai, 2003). Until 1986,
the Internet, including any satellite communication, was limited to academic institutions and
government organizations. The National Science Foundation Network (NSFNET) was the first
implementation to allow internet users to conform to a standard that permitted the quickest
growth ever (National Science Foundation, 2003). The first company to have a commercial
offering for satellite internet was Hughes in 1996 with the Viasat product (Hughes Corporate,
2021). It offered a download-only service with a modem dial-up for uploads. Since then, satellite
network latency (Berlocher, 2009). Gartner (2021a) described latency as the time taken for a
packet of information to be transmitted between disparate nodes. Berlocher (2009) stated that
although many advancements have been made to increase the speed of GEO Internet offerings,
3
the distance the satellites orbit the Earth is the primary reason latency is higher than terrestrial-
based ISPs. For example, Miller (2017) stated that Viasat satellites operate approximately 22,300
miles from the Earth's surface, resulting in an average latency of 638 milliseconds (ms). In
comparison, other terrestrial-based broadband providers potentially may provide a latency of less
Voelsen (2021) described the fundamental difference between LEO and GEO satellites
providing internet access as their distance from Earth; GEO operates at 35,786 km, while LEO
operates at 160 to 2,000 km (Voelsen, 2021). Due to this distance and the Earth's rotation, GEO
satellites appear stationary, whereas objects in LEO rotate the Earth 12-16 times every 24 hours,
depending on the altitude (Borthomieu, 2014). Figure 1 represents this relative distance.
Figure 1
Orbital Distance
4
Note. From Internet from space: How new satellite connections could affect global Internet
governance, by Voelsen, D., 2021, German Institute for International and Security Affairs.
Del Portillo et al. (2021) described that during the early 1990s, several companies
submitted applications to offer telecommunications services from LEO; however, cost overruns
and lack of funding were some factors that limited their success. After 20 years of technology
improvements and cost reductions, numerous organizations have submitted new applications to
the FCC for LEO satellite deployments to service the United States (Del Portillo et al., 2021).
From a size and scope standpoint, the influential organizations are Amazon, OneWeb, SpaceX,
and Telesat (Del Portillo et al., 2021). SpaceX’s Starlink product was chosen for this study
because of its deployment size and plans. More information on this choice is found in the
importance section of this chapter. Figure 2 depicts the current and planned LEO constellation
Figure 2
Note. From Internet from space: How new satellite connections could affect global Internet
governance, by Voelsen, D., 2021, German Institute for International and Security Affairs.
Although cyber risks exist on the Internet (Federal Bureau of Investigation, n.d.), this
study focused on occurrence rates of identity theft, personal data breaches, reputational harm,
malware, and viruses for the end-users of Starlink. The United States Department of Justice
(2020) defines identity theft as the wrongful possession of a victim's data to be used for financial
gain. In 2019, the United States saw $3.5 billion in losses reported due to this crime. (Federal
unauthorized disclosure of, or access to, personal data" occurs (Information Commissioner's
Office, n.d., p. 2). These breaches include intentional and accidental causes (Information
Commissioner's Office, n.d.). In research from the North Carolina Department of Justice (2021),
a record number of 1,644 personal data breaches were reported in the United States in 2020 by
corporations, a 36% increase from the number recorded the previous year. Reputational harm is a
negative shift in an individual's perception due to an outside source (Agrafiotis et al., 2018).
Malware and viruses are software designed to cause harm to users, applications, or hardware
possible gap in the literature that will be further examined in Chapter 2. This section covers the
history and status of satellite Internet ISPs, LEO, and the cybersecurity risks of financial theft,
Problem Statement
The general problem is that the advent of low earth orbit satellite (LEO) Internet is
changing the surface of Internet-connected devices and users globally (Cao et al., 2020; Scanlan
et al., 2019). As stated in the background portion of this introduction, satellite Internet is not a
novel concept. However, the LEO market has an estimated annual growth rate above seven
percent (The Business Research Company, 2021). Starlink leads the way with over 1,000
satellites with plans to launch over 12,000 to provide Internet access anywhere (Posadzki, 2020).
With this growth comes a lack of scholarly and peer-reviewed research into the possible effects
of this technology. The specific problem is that the proliferation of Starlink LEO satellite
Internet access in the United States will change the cybersecurity risk profile of rural American
The purpose of this study was to determine the cybersecurity risks posed by Starlink LEO
satellite Internet upon rural American customers. Specifically, it focused on the incidence rates
of identity theft, personal data breaches, reputational harm, malware, and viruses for the end-
users of Starlink. This information was obtained using a pre- and post-test survey.
This study focused on data that does not exist, based on a gap in the current literature
discussed in Chapter 2. A population is "the entirety of some group" (Salkind, 2018, p. 261). The
basis of this study is the human population, specifically the rural population in the United States
that has pre-ordered but not yet installed or utilized Starlink. The results of this study will help
As of June 2021, Starlink had over 500,000 pre-orders for its service in the United States
(Sheetz, 2021b). The FCC has "approved SpaceX to launch 11,943 satellites, with the company
aiming to deploy 4,425 satellites in orbit by 2024" (Sheetz, 2021a, p. 1). In the United States
alone, approximately 14.5 million people do not have adequate access to the Internet via a
people per household (United States Census Bureau, 2020), the pre-orders in the United States
will represent over 1.3 million people directly affected by this technology. This study is unique
because it was conducted during the early stages of the product's rollout, allowing for a targeted
Preliminary research showed that a body of knowledge on this topic does not exist.
Several studies on the vulnerabilities of each satellite technology segment were found and are
described in the background section of this chapter. The end-users and organizations deploying
LEO satellite internet must understand the possible cybersecurity effects on those utilizing the
product. This study aimed to add to the technology and end-user aspect of Starlink to ensure that
all stakeholders understand the cybersecurity risks associated with the use of Starlink.
Creswell and Guetterman (2019) expressed that quantitative studies are static and
questions to determine ideas and thoughts (Creswell & Guetterman, 2019). This study used an
Pre-experimental designs anticipate the problems that causal inference may pose, and
be beneficial (Frey, 2018). In this study, the problem identified already has substantiating
evidence indicating a need for further research. Therefore, a pre-experiment design was not
considered necessary.
dependent and one independent variable. The main characteristic of this design type is the
randomization of the treatment placed upon what is being studied (Salkind, 2018). Although the
present study has a dependent and an independent variable, this design's randomization was
inappropriate. The dependent variable was the occurrence rates for each cybersecurity risk, while
the independent variable was the installation and use of Starlink. Also, this study was targeted,
meaning that only individuals who have pre-ordered Starlink but have not installed it were
"hypothesized cause of differences you might observe between groups has already occurred"
(Salkind, 2018, p. 194). A fundamental assumption of the present study was that the assignment
to groups had already occurred. Therefore, for this study, a quasi-experimental design was
utilized.
9
This study surveyed rural Americans who had pre-ordered but had yet to install and use
Starlink. The same customers from the pre-test survey were included in the post-test survey, and
both surveys were multiple choice based on the research questions to determine if a change in
utilized in this study. This method was considered most appropriate because the cause and effect
of using Starlink were to be determined. A pre- and post-test experiment was performed on a
3. Apply the treatment to the experimental group (the control group does not receive the
treatment).
4. Post-test both the experimental and control groups on the dependent variable (in
The main difference between the approach defined and the one used in this study is the treatment
administration. In this study, the researcher did not have control over Starlink's purchase,
installation, and use; therefore, the treatment was not randomized by the standard method—a
table of random numbers (Saint-Germain, n.d.). The manufacturer and customer determined the
Hypotheses/Research Questions
This quantitative research study aimed to determine the relationship between the
deployment of Starlink and the primary end-user cybersecurity risk. The four research questions
for this study, along with their appropriate alternate and null hypotheses, are as follows:
10
RQ1. Will the occurrences of identity theft change for end-users of Starlink in rural locations in
Ha1: Identity theft occurrences observed will increase between the control group and
H01: Identity theft occurrences observed will not increase between the control group and
RQ2. Will the occurrences of a personal data breach change for end-users of Starlink in rural
Ha2: Personal data breach occurrences will increase between the control group and those
H02: Personal data breach occurrences will not increase between the control group and
RQ3. Will the occurrences of reputational harm change for end-users of Starlink in rural
Ha3: Reputational harm occurrences will increase between the control group and those
H03: Reputational harm occurrences observed will not increase between the control
RQ4. Will the occurrences of malware and viruses change for end-users of Starlink in rural
Ha1: Malware and virus occurrences observed will increase between the control group
H01: Malware and virus occurrences observed will not increase between the control
With quantitative research, it is essential to prove that a relationship exists between two
or more variables (Salkind, 2018). To do this, a researcher must first prove the null hypothesis
false. This process informs the researcher about whether the results are due to chance or
The worldview approach to this study was defined as that of a postpositivist. Creswell
and Guetterman (2019) describe this philosophy as determining effects based on a cause and
state that the issues explored by postpositivists reflect the necessity to identify and evaluate the
factors that influence results, such as those discovered through experimentation (Creswell &
existed between using Starlink and security risks. This approach influences the framework as
described below.
Grant and Osanloo (2014) described a theoretical framework as the basis for an entire
dissertation. They stated that it is the foundation for constructing and supporting research and
methodological, and analytical standpoint (Grant & Osanloo, 2014). Within the realm of
cybersecurity, multiple frameworks to identify and mitigate risk exist, which was the main
purpose of this study (Blake, 2021). For example, the Federal Information Security Management
Act of 2022 is a United States Government framework designed to protect critical information
and systems against threats (Cybersecurity & Infrastructure Security Agency, 2021). The
National Institute of Standards and Technology (NIST) also developed the NIST Cybersecurity
12
2021a).
This study used a theoretical risk management framework to inform and educate Starlink
to meet the needs of the study, ISO 31000 was used as a guide to assess the associated human
risk. This standard provides management principles, processes, and definitions to identify and
remediate risk (International Organization for Standardization, 2018). Figure 3 shows the
framework at a high level. Central to the design is that the organization's leadership must be
committed to risk management, ensuring it is built into all aspects of their business (International
Figure 3
Note. Adapted from ISO 31000, by International Organization for Standardization, 2018
The International Organization for Standardization (2018) lists five steps that must be
performed continuously to identify and mitigate risk for all products. First, there must be an
understanding of the individual or group goals. Second, the context of design must also be
understood at length. Third, all stakeholders must be adequately educated on the product and
understand all associated risks. Fourth, continuous evaluation of the product risks must occur
regularly. Finally, any risks and framework identified must be monitored and adjusted
predict an outcome" (Jabareen, 2009, p. 3). As previously discussed, the researcher chose the
theoretical framework of ISO 30001 to meet risk identification needs. The choice of this method
Definitions
The following terms are used throughout this paper. Defining them is essential to
• Hacker. Information system user who gains access unauthorizedly without authorization
• Inclination. The orbital angle of an object when compared to the equator of the Earth
(Riebeek, 2009).
• Internet Service Provider. A business that provides its customers access to the Internet
(Gartner, 2021b).
14
• Internet. The global network system containing academia, commercial, civic, and various
entities that share a common technical standard (National Institute of Standards and
Technology, 2021b).
• Low earth orbit. "Encompasses Earth-centered orbits with an altitude of 2,000 km (1,200 mi)
• Network Latency. The amount of time measured for a packet of information to be transmitted
(Gartner, 2021a).
• Orbit. A curved path that one space object follows around another object due to gravity (The
• Rural. An area in the United States not designated as urban (United States Census Bureau,
2019).
• Satellite Constellation. A grouping of satellites that share common control, purpose, and
• Satellite. An object or vehicle intended to orbit the earth or another celestial body" (Dunbar,
2017).
• Sensitive Data. Data in the United States Privacy Act section 552a not listed as criteria to be
protected to aid the nation’s defense or foreign policy (National Institute of Standards and
Technology, 2021c). This includes information about United States citizens, such as their
social security numbers and financial, medical, and criminal history (Department of
• Urban. An area in the United States containing at least 50,000 people (United States Census
Bureau, 2019).
15
Assumptions
Assumptions are taken for granted as part of a study (Simon & Goes, 2010). The primary
assumption in this study was that Starlink will continue distributing its product in the United
States. If the company had paused or slowed this rollout, it may have significantly affected this
study's results. Another assumption was that the participants currently had access to the Internet
but most likely not high-speed Internet. The FCC defines high-speed Internet as "25 megabits per
second (Mbps) for downloads and 3 Mbps for uploads" (Federal Communications Commission,
2015, para. 2). It was also assumed that participants had the aptitude and knowledge to recognize
if a cybersecurity event had occurred, based on the questionnaire. Examples were given to clarify
each question to the researcher's ability. More detail on this is provided in Chapter 3.
The scope of the study was to identify whether Starlink's use caused changes to end-
users' cybersecurity risk profiles. The extent of the study intended to include representation from
all 50 of the United States. Multiple choice pre- and post-treatment surveys were the data
collection methods used. The goal was to use the information obtained to inform end-users and
SpaceX about the cybersecurity risks of the Starlink product. Because treatment administration
was being controlled by an outside entity, a control group was expected to emerge. This study's
target population was Americans living in rural areas who had pre-ordered Starlink but had not
installed or used the product. This study used a judgmental sampling technique. According to
Frey (2018), "the goal of judgment sampling is to deliberately select units (e.g., individual
people, events, objects) that are best suited to enable researchers to address their research
identifies. This study has several limitations. The dependent variable—cybersecurity risk—was
difficult to gauge based purely on survey results. Also, human factors and influences, such as
knowledge of the topic and willingness to disclose the information, had to be considered. In
addition, the researcher relied on the pre-test participants completing the post-test survey six
months later. Many issues may have arisen where the post-test may not have been completed,
Delimitations are the boundaries a researcher sets to ensure their study's goals are
reasonably met (Theofanidis & Fountouki, 2019). This study targeted United States-based
customers in rural areas. The survey was also limited to households, and no business customers
were studied. This research only included those who planned to purchase and install Starlink, as
Summary
Chapter 1 provided a background of this study, including a brief history of the Internet,
satellite technology, LEO ISPs, and the possible cybersecurity risks. The general problem was
identified as the fact that the advent of LEO satellite internet is changing the attack surface for
Internet-connected devices and users globally (Cao et al., 2020; Scanlan et al., 2019). The
specific problem was identified as the proliferation of Starlink LEO satellite internet access in
the United States, changing rural American customers' cybersecurity risk profile (Scanlan et al.,
2019; Voelsen, 2021). This study's purpose was to determine the cybersecurity risks posed by
Starlink LEO satellite internet to rural American customers. The significance of this study was
described as Starlink having over 500,000 pre-orders for its service in the United States as of
June 2021 (Sheetz, 2021b). The FCC has "approved SpaceX to launch 11,943 satellites, with the
17
company aiming to deploy 4,425 satellites in orbit by 2024" (Sheetz, 2021a, p. 1). The nature of
the study was identified to be quantitative. This method was chosen as the most appropriate
because the study aimed to determine the cause and effect of using Starlink. A pretest-posttest
design with a control group was used. Four research questions and their subsequent alternate and
null hypotheses were provided. The theoretical framework was discussed, with a risk
management approach based on ISO 31000. Essential definitions were provided in addition to
this study's assumptions, limitations, and delimitations. The next chapter is a literature review
that provides a thorough history of satellite technology, the Internet, and specific cybersecurity
risks.
18
This quantitative exploratory study’s purpose was to determine the cybersecurity risks
posed by Starlink LEO satellite Internet upon rural American customers. ISPs have provided
customers with internet access using satellite technology since 1996 (Hughes Corporate, 2021).
This chapter reviews the historical and current literature on satellite systems, the Internet, LEO
segment threats, data breaches, identity theft, reputational harm, viruses, and malware. This data
that contributes to the history and current data for a study topic. In addition, the literature review
categorizes information obtained into primary, secondary, and general sources to allow the
reader to comprehend it (Salkind, 2018). This review is divided into four sections: methodology,
Methodology
For this literature review, a systematic methodology was used. A systematic literature
review (SLR) involves collecting and analyzing data systematically (Tikito & Souissi, 2019).
by professionals with appropriate qualifications before publication. In this chapter, as many peer-
reviewed sources as possible were used for all sections except the current findings section.
An SLR involves eight steps (Figure 4): (1) problem formulation, (2) development and
validation of the review protocol, (3) search of the existing literature, (4) filtering for inclusion,
(5) quality assessment, (6) data extraction, (7) analysis and synthesis of data, and (8) report of
findings (Yu & Watson, 2019). Additionally, an SLR is iterative, meaning it potentially may be
19
completed multiple times during the process (Yu & Watson, 2019). This process was used for
Figure 4
Note. From Guidance on Conducting a Systematic Literature Review, by Yu, X., & Watson, M.,
Problem formulation is the first step, based directly on this dissertation's research
questions. According to Yu and Watson (2019), narrowing the problem to limit the amount of
data to be reviewed is essential. Next is the review protocol, which specifies the details and
protocol used. These protocols include the identification of the purpose, problem, inclusion and
exclusion criteria, data extraction, and reporting procedures (Yu & Watson, 2019). Step three in
the process is performing a literature search. It is vital to search quality library databases for
peer-reviewed documents to use as sources of information (Yu & Watson, 2019). Step four is
20
screening for inclusion, where a researcher narrows the sources based on their ability to answer
the research questions and specific problem statement (Yu & Watson, 2019). Next is quality
assessment, wherein a deeper understanding of each source is obtained based on the full text
Step six is data extraction, which, for qualitative studies, involves coding; however, for
this dissertation, it involves the summarization of critical points (Yu & Watson, 2019). Step
seven is the analysis and synthesis of data, where a more detailed analysis of sources is
conducted to build on step six (Yu & Watson, 2019). The final step is reporting, where the
process is shown visually to allow others to follow the steps and obtain the literature review data
This review focused on the peer-reviewed literature on satellite systems' space, user, and
ground segments and their associated vulnerabilities. The tool used to conduct the review was
the virtual library provided by Capitol Technology University. Several databases were used,
including the Association for Computing Machinery Digital Library, EBSCOhost Databases and
Services, Homeland Security Digital Library, IEEE Xplore, Nexis Uni, ProQuest Central, Puente
Library Online Catalog, and Wiley Online - Decision Sciences. The inclusion criterion was data
published between December 2016 and December 2021 from conference proceedings, books,
professional journals, industry papers, and government publications. An exception was made
while searching for data for the historical section, as satellite technology has existed for over 60
years and the Internet for 45 years. The keywords and phrases used to conduct this literature
search included satellite, satellite security, satellite ground segment, satellite user segment,
21
satellite space segment, low earth orbit, satellite Internet, data breach, reputational harm, and
identity theft.
The search yielded 241 sources, including peer-reviewed journals and government
documents. The researcher then exclusively chose electronic documents and current website
content due to the topic's recent history. Table 1 shows a summary of the search performed for
this study.
Table 1
Each source was examined to form the historical overview and current findings sections below.
Steps three through seven in the SLR were performed to narrow the data and body of work to
extract only relevant content. Not all sources listed within this summary were included, as some
content was deemed irrelevant to this study. The literature map used for Chapter 2 is shown in
Appendix A.
22
Historical Overview
Satellite and Internet technology have evolved from their conceptual beginnings to the
advanced technological innovations of today. To track the history, this portion of the literature
review focused on the 1940s to 2010. It is separated into decades, each with an individual focus
Sir Arthur C. Clarke envisioned early satellite communications after his publication in
Wireless World in 1945 titled "Extra-terrestrial relays" (Evans et al., 2011). Clarke proposed that
gravitational pull and speed, Clarke detailed what is now known as GEO orbit, some 22,230
miles from the surface of Earth (Pelton, 2010). Many perceived his predictions as fiction,
including the editor who relegated his work to the middle of the publication. In 1945, the
transistor had yet to be invented. Using the existing technology of vacuum tubes proved
problematic, with Clarke estimating that a full-time crew needed to replace them (Pelton, 2010).
The United States Army also had a classified study called Preliminary Design of an
satellites were used with similar technology. However, it had little impact on a global scale
(Evans et al., 2011). Clarke's early visions have become a reality, with thousands of satellites
In 1947, the transistor was invented by John Bardeen, William Shockley, and Walter
Brattain while employed at AT&T's Bell Labs (Pelton, 2010). This technological advancement
replaced the vacuum tube, eventually allowing electronics to operate in space with minimal
failures (Brinkman et al., 1997). Over the next few years, modifications culminated in a licensed
23
technology that was mass-produced and incorporated into electronic devices (Brinkman et al.,
1997).
The realization and implementation of the early visions of the 1940s characterized the
next ten years of satellite technology. In 1954, another AT&T Bell Labs employee, John Pierce,
envisioned satellites transmitting a radio signal over long distances between ground stations.
However, Pierce saw no conceivable reason to replace land-based systems such as microwaves
or cabling with satellites (Evans et al., 2011). Pierce was also the first to propose medium orbit
constellations with potentially lower latency but requiring more satellites than GEO orbits
(Evans et al., 2011). In addition to AT&T, many United States companies, including Lockheed-
Martin, Hughes Aircraft, and RCA, began investigating satellite technology to expand their
operations (Evans et al., 2011). Figure 5 shows the early pioneers within the satellite industry.
Figure 5
Note. From 65 years of satellite history from early visions to latest missions, by Evans, B.,
Thompson, P., Corazza, G., Vanelli-Coralli, A., & Candreva, E., 2011. Proceedings of the
Unknown to the United States, the Union of Soviet Socialist Republics (USSR)
government had been rapidly developing satellite technology and the rockets needed to launch
them into orbit throughout the early 1950s (Newell, 2010). On October 4, 1957, the world
changed drastically with the successful launch and orbit of the first artificial satellite—Sputnik
(Siddiqi, 2000). Before the launch, the USSR had announced plans to place a satellite into orbit
during the General Assembly of the International Union of Radio Science in Boulder, Colorado
(Swenson, 1997). Due to a large amount of USSR propaganda during this time, it was dismissed
by many in the scientific world as fictitious (Swenson, 1997). Proving them wrong, Sputnik was
launched and transmitted a simple radio signal back to Earth on the 40Mhz frequency for one
Joseph Stalin's death in 1953 was a turning point for the USSR, with Nikita Sergeyevich
with the defense industry and the inner workings of the rocket and space program allowed for a
"great degree of flux and ambiguity in the chain of command in the missile programs during the
four-year period from 1953 to the first Sputnik launch in 1957" (Siddiqi, 2000, p. 119). This
period of rapid growth allowed the USSR to outpace the United States in the satellite field.
The United States entered the satellite industry with the successful launch of Explorer 1
on January 31, 1958. A joint venture by the United States Army Ballistic Missile Agency, the Jet
Propulsion Laboratory, and the University of Iowa, Explorer 1 orbited Earth until March 31,
1958, making its final radio transmission on May 23, 1958 (Evans et al., 2011). After the launch,
the United States moved quickly to create the National Aeronautics and Space Administration
(NASA) by passing the Space Act on July 29, 1958, with an official opening on October 1, 1958.
• develop space vehicles to transport living organisms and related equipment into space;
• ensure that the United States emerges as a leader in the field of technology in space;
• create a central location to make data available for the enhancement of United States
• improve the United States' cooperation with allies to preserve peace through space.
Communications by Orbiting Relay Equipment (SCORE)—in December 1958. Its purpose was
to prove that a signal was able to be transmitted from Earth to a satellite in space and back in a
relay fashion (Brown, 1960). It proved successful, transmitting 14,000 words from ground
stations to the satellite and back, with the most famous being President Eisenhower's Christmas
holiday message to the American people (Brown, 1960). SCORE was only operational for 12
days but proved extremely valuable to future satellite telecommunication systems (Brown &
Senn, 1960). SCORE included a ground station and antenna for transmission and tracking.
Figure 6
Note. From Project SCORE, by Brown, S., & Senn, G, 1960. Proceedings of the IRE, 48(4),
624–630. (https://doi.org/10.1109/jrproc.1960.287438)
The 1960s showed rapid expansion of satellite technology, with an increase in the
number of satellites and organizations involved in the industry. In a 1960 speech, United States
The commercial application of communications satellites, hopefully within the next few
years, will bring all the nations of the world closer together in peaceful relationships as a
product of this nation's program of space applications. This nation has traditionally
regulation. I have directed the National Aeronautical and Space Administration (NASA)
to take the lead within the Executive Branch both to advance the needed research and
development and to encourage private industry to apply its resources toward the earliest
27
This statement and subsequent actions by NASA set the stage for rapid advancement from non-
due to this act, with 84 countries participating, each with a unique entity created for this purpose
(United States Accountability Office, 2004). Slotten (2015) mentioned that to accomplish the
goals listed in the Communications Satellite Act of 1962, the United States created a private
company called Comsat which served to organize and execute the following goals:
• Serve the communications needs of the United States and other countries without
discrimination.
The bill also outlined the responsibilities of NASA, the FCC, and the President of the United
States (Slotten, 2015). NASA's role was advisory, providing technical expertise where applicable
(Slotten, 2015). The FCC’s role was to ensure competition and a zero-tolerance policy for
discrimination. The President was to act in a supervisory role, overseeing the operations and
battlefield. In 1966, the Initial Defense Communication Satellite Program was created in the
United States; it launched 28 satellites into GEO orbit over ten years for the Department of
Defense. These were eventually used for surveillance during the Vietnam War (Evans et al.,
28
2011). The United States and the United Kingdom also agreed in 1966 to jointly develop and
launch satellites for military use through a program called Skynet (Evans et al., 2011). The
unique needs of the military led to numerous advancements in satellite technology and are
The 1970s were a period of rapid growth for satellite communication, with many of the
groundbreaking advancements of that time still in use today. These advancements include the
Global Positioning Service (GPS), internet transmission over satellite links, and satellite imagery
to map changes to the Earth's surface (Bonnor, 2012; Takei & Murai, 2003). This decade also
saw a dramatic uptick in the use of these systems by the military (Bonnor, 2012).
In 1972, the United States Navy launched a satellite called Timation capable of precise
timekeeping (Bonnor, 2012). Although this innovation was critical to calculating the position of
ground objects, it was limited because it only provided two dimensions. Shortly after, the United
States Air Force began researching a three-dimensional system called Project 621B (Bonnor,
2012). Bonnor (2012) also mentioned that in 1973, the United States Deputy Secretary of
Defense merged the two projects—Timation and Project 621B—into the Navstar GPS. GPS is
still in use today, with many advancements leading to its implementation in navigation systems
such as smartphone applications; it is also used for pinpoint accuracy during military operations
(Sturdevant, 2014).
The University of Hawaii was the first to use satellite technology in 1974 to connect to
what will eventually become the Internet (Seymour & Shaheen, 2011). The Aloha project started
as a simple radio network for transmitting data from one location to another, as the University
had campuses in disparate sites (Abramson, 1985). The ATS-2 satellite connected the Aloha
29
network to other universities and government sites, including NASA's Ames Research Center in
California, the University of Alaska, and Tohoku University in Japan (Abramson, 1985). The
satellite link operated at a maximum speed of 56 Kbps using a single voice channel, according to
Abramson (1985).
Another significant advancement during this decade was the first use of satellite imagery.
In 1972, the first Earth Resources Technology Satellite was launched by NASA to record the
Earth's surface (National Research Council, 2013). Later renamed Landsat, the program provided
a stream of previously unseen images. Subsequent launches in 1975 and 1978 provided the
continuity we enjoy today, with continuous operation for over 49 years (National Research
Council, 2013). The program provides critical data on changes to land due to urbanization,
weather events, and climate change and is used extensively in research (United States Geological
Survey, 2019).
The 1980s was a decade of increased satellite usage and dependency, especially in
communications capabilities. The decade also saw significantly more countries launching
satellites into orbit (Evans et al., 2011). Television broadcasting via satellite links was also
Although initially deployed in the late 1970s along with the Marisat program, satellites
used for mobile communications expanded to include commercial and military use throughout
the 1980s. The United States Navy's Fleet Satellite Communications System became operational
in 1981 and provided ship-to-land and land-to-ship communication (McGlade, 2010). Marisat’s
usage continued to expand, with significant ship carriers using it until retirement in the late
1990s (Pelton, 2010). Additional satellites also included packages for maritime use, such as
30
From the time of its inception up until 1980, only twelve countries had successfully
launched and operated satellites in orbit. These countries included The United States, the Soviet
Union, the United Kingdom, Canada, Italy, France, West Germany, Japan, China, the
Netherlands, India, and Czechoslovakia. During the 1980s, three more countries—Mexico,
Israel, and Bulgaria—and the European Space Agency, a multi-country conglomerate, joined this
satellite television services to customers (Takei & Murai, 2003). They offered customers
premium channels such as HBO, MTV, and Cinemax using analog signaling, traditionally
serviced from coaxial-based services. In 1989, the Motion Picture Expert Group released a set of
standards for digital television (Takei & Murai, 2003). This event allowed for a rapid expansion
The 1990s saw continued innovation and increased funding and participation in satellite
technology. For example, the Hubble, the first satellite to feature a telescope, was launched by
NASA in 1990 (Webb, 2015). Similarly, the first satellite constellation for GPS was completed
in 1993 (Bonnor, 2012). Although not ready for consumers, expanding the Ka frequency for
satellites in 1993 opened the door for satellite internet offerings (Yen, 2002).
The ability of satellites to view long distances changed dramatically in 1977 when NASA
embedded a telescope in a satellite (Webb, 2015). Originally called the Large Space Telescope, it
was renamed Hubble in 1983. Testing was completed in 1985, but the NASA space shuttle
31
Challenger explosion in 1986 caused a delay until 1990 when Hubble was placed in the space
shuttle Discovery and launched successfully into LEO (Webb, 2015). Hubble's contributions in
this decade include determining a more accurate universe age in 1993 and confirming the
In December 1993, GPS reached a milestone, with 24 satellites designated operational for
civilian use in a constellation in medium-Earth orbit (Bonnor, 2012). After this announcement,
the European Council passed a resolution specifying how the European Global Navigation
Overlay Service will augment GPS to provide the accuracy needed for safety systems and other
critical applications (Bonnor, 2012). Upgrades to software and ground stations continued to
improve accuracy until July 1995, when the system was deemed fully operational (Bonnor,
2012). After this point, GPS began to take over traditional location services, which previously
Satellites operate within seven frequencies (L, S, C, X, Ku, K, and Ka), offering increased
wavelength and bandwidth at each level, with L being the smallest (Rogers et al., 1997). Figure 7
details each of these frequencies, along with typical applications. Until the early part of the
decade, the use of the Ka frequency in satellites was limited, with government and military
applications being the most frequent users. With the development and launch of the Advanced
significantly impacted the future of satellite communications (Rogers et al., 1997). "It is the first
fiber-optic data rates with the same transmission quality, added performance, and cost savings
Figure 7
Note. From Satellite frequency bands, by The European Space Agency (2022).
(https://www.esa.int/Applications/Telecommunications_Integrated_Applications/Satellite_freque
ncy_bands)
The 2000s recorded several satellite changes, including increased privatization and
technological innovations (Evans et al., 2011). The first consumer satellite high-speed Internet
access in GEO was launched in 2004. In addition, investigation and testing began for satellites to
2001 (Evans et al., 2011). This event was directly correlated to the passing of an amendment to
the previously discussed Communications Satellite Act of 1962 in 2000. The amendment, titled
33
(ORBIT) Act, promoted a diverse and competitive global market for satellites (United States
Accountability Office, 2004). The United States Accountability Office (2004) argued that
although Intelsat's goal to become a private entity was realized, the amendment was not the
driving force. Global trade agreements, trends, and improvements to market access during the
In 2004, the successful launch of a GEO satellite named Anik F2 by the Canadian
company Telesat showed that consumers were able to utilize the Ka band to gain enhanced
throughput (Doan et al., 2004). Boeing Satellite Systems built it for multi-use and was "equipped
with 24 C-band, 32 Ku-band, and 38 Ka-band transponders" (Doan et al., 2004, p. 1). Due to its
size and antenna diversity, Telesat leased portions of the satellite to other companies. For
example, United States companies like Viasat and Wildblue partnered with Telesat to offer high-
speed Internet, using Anik F2 as the space component (Weiss, 2004). Anik F2 is still in service
today, with many other satellites using the Ka band based on the success of this project. The next
The 1970s was a decade that saw the excessive growth of interconnecting disparate
Protocol, and Ethernet, were created to form what eventually became the Internet (Campbell-
The Internet is a collection of networks that share a common standard. These networks
include academia, commercial, civic, and various entities (National Institute of Standards and
Technology, 2021b). Early networks, including those at universities, banks, and government
34
sites, were implemented before 1970 but were unable to communicate due to a lack of standard
protocols (Campbell-Kelly & Garcia-Swartz, 2013). For example, American Airlines had a
private network running an application named SABRE that handled their global reservation
service in 1961 (Campbell-Kelly & Garcia-Swartz, 2013). The Defense Advanced Research
Projects Agency (DARPA) also had a network called ARPANET, created in 1965, that allowed
select United States universities to participate. It was not until a universal standard was created
In 1973, two DARPA researchers, Vint Cerf, and Bob Kahn, began researching ways to
improve radio network communications (Campbell-Kelly & Garcia-Swartz, 2013). Their work,
titled Request for Comments (RFC) 675, Specification of Internet Transmission Control
Program, was published in 1974 (Vinton et al., 1974). RFC 675 detailed the technology needed
called gateways. These gateways allowed the networks to talk to each other through a standard
method (Vinton et al., 1974). The Internet is based on this RFC's standard named TCP/IP. TCP
handles data broken into small packets by the source and reassembled by the destination, and IP
Another critical standard created during this timeframe was Ethernet. This technology
allows two devices to communicate over a local area network (LAN). It was created by Bob
Metcalfe, an employee at Xerox, in 1973 (Spurgeon, 2000). In 1976, David Boggs and Bob
Metcalfe published Ethernet: Distributed Packet Switching for Local Computer Networks
(Spurgeon, 2000). This article, published in the Communications of the Association for
Computing Machinery journal, provided detail on packet switching, addressing, and reliability
35
built upon the TCP/IP standard created three years earlier (Metcalfe & Boggs, 1976). Together,
TCP/IP and Ethernet created the building blocks for what we know now as the Internet.
Connectivity to the Internet throughout the 1970s was slow compared to the 1980s and
1990s. By the decade's end, over a hundred hosts were connected to the Internet via DARPA's
backbone (Campbell-Kelly & Garcia-Swartz, 2013). Most of the users of the Internet were
universities. The operation of DARPA's network was limited to those with United States
Government grants. Because of this exclusivity, other institutions started distributed networks to
share data. In 1977, Bell Laboratories created Unix-to-Unix Copy to share files and execute
applications remotely (Campbell-Kelly & Garcia-Swartz, 2013). By 1979, it was used at over
eighty sites, including many universities. It used its dial-up service, rather than the DARPA
With the basics of connectivity established, the 1980s were defined by steady growth and
refining standards and protocols for internet use (Cohen-Almagor, 2011). This growth included
the Domain Name System (DNS) and Internet Protocol version 4 (IPv4). It also saw the birth of
commercial ISPs and focused on developing systems that utilized the Internet, such as the World
Wide Web (Campbell-Kelly & Garcia-Swartz, 2013). It also marked the first time a widespread
Ethernet, first created in 1973, continually evolved in this decade. In 1980, the need for
such as Token Ring, Token Bus, and Carrier-sense multiple access with collision detection were
created (Spurgeon, 2000). The Institute of Electrical and Electronics Engineers (IEEE), a United
States-based standards organization, launched the 802 Project to consider these technologies and
36
agree on a standard (Spurgeon, 2000). In 1983, IEEE approved the first standard for Ethernet
called 802.3.
After 802.3, TCP/IP also evolved with the release of RFCs 791 and 793 in 1981. They
represented the ninth edition of the standard initially published in 1974. These RFCs clarified
technical controls and mechanisms to enhance the protocols (University of Southern California,
1981b). Although minor changes continued to be effected throughout the 1980s, these two
standards are considered the definitive standards for TCP/IP today (Evans et al., 2011). RFC 791
also detailed an enhanced address schema with a numerical representation of Internet hosts,
commonly known as IPv4 (University of Southern California, 1981a). This RFC was the fourth
significantly after ARPANET moved to the RFC TCP/IP standards in 1983. Barely a year later,
in 1984, the number of hosts nearly doubled from 562 to 1024 (Campbell-Kelly & Garcia-
Swartz, 2013). At the time, a centralized file called HOSTS.TXT was maintained at Stanford
University, containing a list of internet hosts' names and associated IP addresses. This file was
updated anytime a new host joined and then downloaded by ARPANET sites for use (Pope et al.,
2012). Constant updates to the file caused many problems, including name duplication and
increased traffic load, resulting in its unavailability (Pope et al., 2012). To solve these issues,
Southern California, published RFCs 882 and 883 in 1983; these RFCs detailed the architecture
core systems that hold copies of data, each internet site maintains its server, with other servers
37
performing lookups of the data they control. It performs a similar function to the HOSTS.TXT
system but is more efficient and less error-prone (Mockapetris, 1983). IP addresses are translated
to domain names using DNS (Mockapetris, 1983). For example, instead of remembering
198.185.159.145, a user will enter the domain name of www.weezer.com, making it more
In 1988, the first instance of a widespread malicious attack against hosts connected to the
Internet occurred (Smith, 2015). Named the Morris worm after its creator Robert Morris, a
student at Cornell University, it was intended to map the known Internet at the time; however, its
exploits caused many hosts to crash and affected 10% of Internet devices worldwide. The worm
targeted vulnerabilities in the UNIX operating system and rapidly replicated on other hosts. It
caused what is now known as a Denial-of-Service (DoS) attack. The United States government
charged Morris with Computer Fraud and Abuse Act violations. In 1989, Morris was found
guilty and received a financial penalty, community service, and probation (Federal Bureau of
Investigation, 2018). This event forced administrators of networks to find ways to protect their
In 1989, the first commercial ISP was formed, offering fee-based services to the public.
It was called The World, and its services were tied to telephone systems in the United States and
Australia (Ryan, 2010). Before this, access to the Internet was limited to sites that DARPA and a
few other organizations had authorized. This event led to massive growth over the next decade
for other ISPs, allowing customers global access anywhere a phone line was placed (Ryan,
2010).
presented an idea allowing internet users to browse documents and other file types via a standard
38
protocol (Cohen-Almagor, 2011). Berners-Lee named the system the World Wide Web. He also
proposed and wrote the first internet browser that ran on the NeXTSTEP operating system and
detailed the Hypertext Transfer Protocol, allowing a presentation and data transfer method when
The 1990s was a period of rapid growth for the Internet. The number of clients, ISPs,
applications, and commercial Internet participation grew significantly. With this growth came an
increase in malicious activity and threats to users. It also saw the dissolution of the ARPANET
Project and a boom in personal computers used in homes to connect (Cohen-Almagor, 2011).
Cohen-Almagor (2011) found that by the end of the 1980s, internet hosts totaled 159,000.
By the end of the 1990s, that number had risen to 248,000,000, indicating a 155,875% increase.
The decentralization of the Internet was a significant catalyst in this growth (Cohen-Almagor,
2011). In 1990, the ARPANET project was officially decommissioned (Meinel & Sack, 2014),
and the National Science Foundation (NSF) had taken a more prominent role in previous years
by introducing the NSFNET project, which provided connectivity for government entities and
universities (Meinel & Sack, 2014). Responsibility for the remaining ARPANET sites was
transferred to the NSF, marking the end of the project that started the Internet (Cohen-Almagor,
2011). Vinton Cerf, who co-authored the RFC in 1973 that led to the standardization of TCP/IP,
famously stated:
It was the first, and being first, was best, but now we lay it down to ever rest. Now pause
with me a moment, shed some tears. For auld lang syne, for love, for years and years of
faithful service, duty done, I weep. Lay down thy packet, now, O friend, and sleep.
In 1991, three disparate ISPs came together in a mutual agreement called the Commercial
Internet Exchange (CIX) (Campbell-Kelly & Garcia-Swartz, 2013). CIX allowed the ISPs
PSINet, UUNET, and CERFnet to communicate, limiting the need for the NSFNET. Within a
few short years, dozens of global ISPs joined CIX, leaving the NSFNET with limited
2013). The United States remained the central hub for the Internet at the time, and it was not
until 1994 that other countries, such as the UK, started to form their connectivity to the CIX
(Campbell-Kelly & Garcia-Swartz, 2013). This connectivity led to the creation of internet
exchanges globally.
Cohen-Almagor (2011) felt that the Internet was disconnected and difficult to navigate at
the beginning of the decade. Applications developed for operation on the Internet, such as
electronic mail clients and browsers, were non-intuitive for users (Dainow, 2017). Additionally,
many applications relied on the non-graphical user interface (GUI) UNIX operating system to
function. Operating systems such as Microsoft Windows and Mac OS brought the GUI into the
hands of users and changed interoperability and use (Dainow, 2017). With the introduction of
GUIs, many applications transformed into user-friendly offerings. Nowhere was this more
In 1992, only a few websites existed, with estimates of fewer than 30 worldwide
(Campbell-Kelly & Garcia-Swartz, 2013). By 1993, 130 unique internet browsers existed,
although most were experimental and text-driven. The MOSIAC browser was launched with a
GUI-based point-and-click design. Because of its intuitive and user-friendly approach, it was
downloaded over a million times and quickly became the browser of choice (Campbell-Kelly &
Garcia-Swartz, 2013; Pope et al., 2012). According to Pope et al. (2012), the release of the
40
Netscape browser in 1994 and Internet Explorer in 1995 made the World Wide Web even more
In addition to the World Wide Web and these websites, electronic mail, commonly
known as email, went from relative obscurity to commonplace in ten years. Campbell-Kelly and
Garcia-Swartz (2013) state that before 1990, less than three percent of personal computers
globally used email. The lack of a standard protocol and interoperability between email systems
were the leading causes of this lack of adoption. X.400, an email protocol first published in 1984
and updated in 1988, became the de facto standard in the early 1990s, and by 1995, it was used
for email communication (Rotzal, 2002). Rotzal (2002) explains that X.400 is built so that any
internet user potentially may message any connected person. X.400 is a similar system to the
current postal service, with a from and to address in the form of a username and domain name.
Figure 8
X.400 Architecture
Note. From X.400 message handling system: the remote user agent, by Rotzal, P., 2022.
malicious activity and threats to the users and their data were seen. As mentioned, the Morris
worm in 1988 proved that the Internet was viable for conducting nefarious acts (Smith, 2015).
The 1990s are described by Smith (2015) as the decade of viruses. The Melissa virus was the
most notable in 1999 (Garber, 1999). The Melissa virus was propagated through email
attachments with users' address books as the mechanism (Garber, 1999). Users were encouraged
to open the attachment, which contained executable code that sent the same message to the first
50 users in the address book of the victims (Garber, 1999). The virus was meant to cause a DoS
in email servers, and it worked. Disruption was rampant, causing an estimated $561 million for
The 2000s saw unprecedented global internet use for personal, business, and
continued to evolve at an increased speed and with diversity (Takei & Murai, 2003). The 2000s
also recorded increased internet threats, with more advanced malware, viruses, and data theft
(Middleton, 2017).
In 2000, the Pew Research Center began tracking internet usage among United States
citizens and found that by 2000, 52% of American adults had used the Internet (Perrin &
Duggan, 2015). By 2010, the number had grown to 72%, representing a 24% rise over a decade.
The reasons for this sharp rise in internet use were reportedly website access and email usage
(Perrin & Duggan, 2015). According to Cohen-Almagor (2011), internet users totaled 361
million in 2000, and websites were at 50 million. By 2010, 1.9 billion people were internet users,
Conducting business on the Internet grew alongside the increase in users throughout the
2000s. Wigand (1997) described this practice as electronic commerce. He stated that, "the
bandwidth of electronic commerce spans from electronic markets to electronic hierarchies and
(Wigand, 1997, p. 2). Shortened to the term e-commerce, global transactions conducted in this
manner in 1999 were worth $150 billion (Terzi, 2011). By 2010, this number had grown to $572
billion, a 281% increase (Terzi, 2011). Most e-commerce transactions in the early decade (80%)
were between businesses (Terzi, 2011). Consumer websites such as Amazon.com already existed
and grew considerably over this period. According to Amazon, Inc. (2022), its total sales at the
end of 2000 were $2.76 billion. Ten years later (in 2010), this figure grew to $34.2 billion,
representing a growth of 1,139%. In 2000, customer item assortment was limited to books,
music, DVDs, and videos. By 2010, products were available in almost every category
imaginable, including Amazon Web Services cloud infrastructure (Amazon, Inc., 2022).
operations (Gilroy & Kruger, 2007). In addition to practical uses such as tax collection and
information storage, many governments increased regulations and laws on the Internet (Gilroy &
Kruger, 2007). As the Internet grew in size and content, censorship of the data contained therein
also did. By 2009, over sixty countries had filtered content for their citizens (Koumartzis &
Veglis, 2011). Although the United States was not one of these countries, many government
efforts were passed to regulate or expand the Internet as an industry (Gilroy & Kruger, 2007). In
2005, the FCC (2010) established four principles for what they described as open internet:
• Customers can choose what devices to connect to the Internet within legal limits.
These principles morphed into the FCC Open Internet Order 2010, a regulation that expanded on
Commission, 2010). The three basic rules put into place by this order are:
1. Transparency: Fixed and mobile broadband providers must disclose the network
broadband services.
2. No blocking: Fixed broadband providers may not block lawful content, applications,
services, or non-harmful devices; mobile broadband providers may not block lawful
websites or block applications that compete with their voice or video telephony services.
In contrast to the United States, the Communist Party of China began a campaign on internet
censorship in the 2000s that continues today (Congressional Executive Commission, 2011).
Throughout the decade, China's leadership implemented laws and policies limiting internet
access and increasing penalties for violations (Congressional Executive Commission, 2011).
They took control of ISPs in the country as part of this process. It started in 2000 when Order
No. 292 began content restriction through ISPs, giving the government access to any information
they wished (Library of Congress Archives, 2004). In 2011, China was described as the most
repressive country with its arrests and imprisonment of citizens for misusing the Internet
The number of ISP offerings in the 2000s changed through multiple mergers, including
forming the DIRECTTV Group in 2003 after News Corps purchased Hughes Network Systems
and DIRECTV (Ahrens, 2003). In 2005, Hughes Network Systems was sold to SkyTerra, which
subsequently divested and became HughesNet (Los Angeles Business Journal, 2005). As
mentioned in the satellite history section of this review, 2004 saw the first GEO satellite with
enhanced throughput using the Ka band (Doan et al., 2004). This trend continued with multiple
launches throughout the 2000s, allowing ISPs to offer higher bandwidth to more customers
globally.
As the Internet grew in the 2000s, the threats to its users also (Middleton, 2017). The
Center for Strategic and International Studies (2022) stated that in 2003, Chinese hackers gained
access and stole nuclear weapons design and test data from the United States Naval Air Weapons
Station China Lake. Another significant event occurred in 2006 when China stole 20 terabytes of
data from the United States Department of Defense (Center for Strategic and International
Studies, 2022). These threats continued throughout the decade, with attacks gaining
sophistication and scale (Middleton, 2017). For example, in 2009, hackers attacked Israeli
government websites from at least 5 million computers, causing significant disruption (Center
Non-governmental entities such as corporations were also targeted during this time. For
example, in 2001, a DoS attack against numerous online corporations was committed by a 15-
year-old student called Mafiaboy (Geers, 2011). Damage estimates for this single attack totaled
over $1 billion (Geers, 2011). In 2005, Chinese hackers stole NASA Space Shuttle data from
Lockheed Martin and Boeing networks (Center for Strategic and International Studies, 2022). In
2008, United States companies ConocoPhillips, Marathon Oil, and ExxonMobil were hacked,
45
and sensitive data were stolen with an estimated loss of millions of dollars (Center for Strategic
Computer worms continued to grow, causing increased damage throughout the Internet.
In 2001, the ILOVEYOU worm was released, infecting millions of users running Microsoft’s
Outlook, an email client for Windows computers (Committee on Government Reform, 2001). It
operated like the Morris worm, using the recipients’ address book to send many emails
worldwide. It originated in the Philippines, and the creator was never charged since there was no
local law against it (Grabosky, 2007). The Committee on Government Reform (2001) estimated
this event's damage to be $8 billion. Code Red I and II were also released in 2001 and attacked
over a million computers running a Microsoft website application called Internet Information
Services (Committee on Government Reform, 2001). The trend continued throughout the 2000s,
with MyDoom causing the most significant damage in 2004, estimated at $38 billion (Gerencer,
2020). It also relied on email to propagate, causing what is known as a distributed DoS (DDoS)
attack against websites worldwide (Conrath, 2004). Internet and satellite technology and use
continued to grow throughout the 2010s. However, the advancement most relevant to this study
was the combination of the two in the emergence of the LEO satellite internet market.
Iridium was the first company to offer internet access via LEO satellites, and it did this in
1998 (Evans et al., 2011). It provided maximum speeds of 2.4 Kb/s through its LEO
constellation of 66 satellites. The system was initially designed for satellite phone operation and
only transmitted data at very low speeds (Yu & Qian, 2010). Iridium used satellite relays and
ground stations to communicate, which improved speed compared to satellites operating in GEO
due to latency (Yu & Qian, 2010). Ultimately, Iridium was a financial failure, with the company
46
filing for bankruptcy in 1999. Yu and Qian (2010) mentioned that this was due to the high launch
cost, integrated circuit reliability, and maintenance costs. According to Iridium (2022), the
company was reorganized in 2001, and under new ownership, continued to offer services using
existing satellites until 2017. However, service was significantly degraded because most of the
Globalstar, whose service went live in February 2000, also provided internet access
(Evans et al., 2011). Like Iridium, Globalstar was designed with the primary use case of satellite
telephony. It also provided system users access to the Internet at speeds of 9.6 Kb/s (Evans et al.,
possible (Garrity & Husar, 2021). Although still in operation today, the company filed for
bankruptcy in 2003 due to high operating costs and a limited user base and was reorganized
Iridium and Globalstar's failures proved what LEO constellations' skeptics stated during
this timeframe (Garrity & Husar, 2021). Garrity and Husar (2021) stated that hundreds or
thousands of satellites are needed to achieve global and robust coverage. The financial burden of
this effort, coupled with limited demand for services, will lead to the ultimate demise of early
efforts. In addition, the connection speed of these early services was unable to match internet
In 2004, a GEO satellite was successfully launched, utilizing the Ka band to gain
broadband became a reality, with Viasat and Wildblue being the first to offer these services with
GEO satellites (Weiss, 2004). With subsequent launches of the same technology, internet access
via GEO proliferated, with services aimed primarily at rural locations unable to use land-based
47
services worldwide (Miller, 2017). The use of the Ka band was deployed to LEO satellites in the
2000s, but it was not until 2017 that companies began to attempt once again to provide LEO
Current Findings
As previously discussed, data used for this section were limited to those published
between February 2017 and February 2022, primarily from peer-reviewed sources. An exception
was made due to the ever-changing LEO space to include websites and magazine articles.
Appendix A shows that six topic areas were covered under LEO satellite internet and internet
end-user threats. The primary goal of this section was to review the current literature on the LEO
satellite internet and potential cybersecurity threats. It further narrows on Starlink to identify a
potential gap in the literature on specific cybersecurity threats to its primary user base—rural
America.
Four leading companies are participating in the current LEO satellite internet market
(Garrity & Husar, 2021). Starlink, Lightspeed, Kuiper, and OneWeb are in the process of
testing phase. Table 2 shows each product's current number of deployed, approved, and projected
satellites. It also details the number of active customers and capital expenditures per product. As
the only commercial product with an active roll-out and customer base, Starlink was chosen for
this study in order for treatment to occur. Additionally, Starlink was awarded $885.5 million in
broadband offerings to the unserved, mainly rural areas of the United States (Federal
Table 2
Note: Data from multiple sources: (Brodkin, 2018); (Federal Communications Commission,
2021b); (OneWeb, 2021); (Sheetz, 2022); (Sheetz, 2021c); (Sheetz, 2021d); (Telesat, 2020);
(Wall, 2021).
Starlink Specifications
Manulis et al. (2021) state that LEO constellations have three distinct segments that
interoperate to function, including Starlink. The space segment contains satellites launched into
orbit; the ground segment comprises launch and recovery vehicles, stations, and associated
infrastructure; and the user segment comprises each location's receivers, cabling, and router
Starlink's space segment comprises 1,469 satellites operating in LEO at or below 580 km
per FCC order (Federal Communications Commission, 2021b). Each satellite operates within the
Ku and Ka bands, with frequencies in the ranges of “10.7–12.7 GHz, 13.85–14.5 GHz, 17.8–18.6
GHz, 18.8–19.3 GHz, 27.5–29.1 GHz, and 29.5–30 GHz” (Federal Communications
Commission, 2021b, p. 3). The Space Exploration Technologies Corporation (2021) details six
individual links used to communicate between the end-user equipment, the ground station, and
the satellite. They are the user downlink, user uplink, gateway downlink, gateway uplink, and
49
downlink and uplink used for telemetry, tracking, and command. A report by the FCC (2021c)
concluded that Starlink’s multi-phased antenna uses dynamic allocation technology to ensure
According to FCC filings (2021b), Starlink's initial plans call for five different locations,
known as shells, for the constellation. The first shell consists of 1,440 satellites operating at 550
km and a 53.0-degree inclination. The second consists of another 1,440 satellites operating at
540 km and a 53.2 inclination. The third, comprising 720 satellites, will be deployed at 570 km
with a 70-degree inclination. The fourth shell, comprising 336 satellites, will be deployed at 560
km with a 97.6-degree inclination, and the fifth, comprising 172 satellites, will be deployed at
560 km with a 97.6 inclination. Due to their distance from Earth, each LEO satellite orbits
approximately 16 times in 24 hours (The European Space Agency, 2020b). Although no official
map of the Starlink constellation exists for public consumption, many non-SpaceX affiliates have
produced websites and mobile applications for tracking purposes. Figure 9 indicates the current
estimated coverage and location of Starlink satellites, focusing on the United States.
50
Figure 9
Note. A black dot represents an individual satellite, with red showing a ground station.
SpaceX, Starlink's parent company, operates the required infrastructure to launch and
recover each satellite (SpaceX, 2022). Since 2018, SpaceX has successfully deployed Starlink
satellites through 37 separate missions (SpaceX, 2022). The Falcon 9 multi-stage rocket has been
used with reusable carbon for missions to protect the satellites before deployment (SpaceX,
2022). Each mission contained approximately 60 Starlink satellites (SpaceX, 2022). Figure 10
Figure 10
Note. From First 60 @SpaceX starlink satellites loaded into falcon fairing. Tight fit. (2019, May
Starlink uses ground stations or gateways to connect each satellite to the terrestrial
internet backbone. It does not provide public information on its gateways. However, it must
submit a license application to the FCC in the United States before installation. This data shows
that Starlink has 64 gateways throughout the United States (Federal Communications
Commission, 2021b). Each gateway contains eight identical, active antennas authorized to
transmit between 27.5 and 29.1 GHz and receives between 17.8–18.6 GHz and 18.8–19.3 GHz
52
(Federal Communications Commission, 2021b). SpaceX also surveys each location to ensure the
uplink power flux density does not interfere with existing or planned radio signals (Federal
The user segment of Starlink contains a receiver, a router, and the accessories required
for it to provide service (Starlink, 2022). The receiver has been shipped in two forms. The first
was a circular dish weighing 16 lbs. and measuring 23.2 in diameter. The second generation and
current dish shipping to new customers are rectangular, measuring 19” x 12” and weighing 9.2
lbs. (Starlink, 2022). The router has also shipped in two forms alongside each of the receivers.
Both routers support 802.11a/b/g/n/ac wireless standards and only WPA2 or WPA3 for wireless
security. The first generation has two antennas for wireless coverage, while the second has three
(Starlink, 2022). They are shipped as a kit to end-users with instructions for setup and use
(Starlink, 2022).
Within each of the segments for LEO satellite internet exists specific threats that security
experts have identified (Cao et al., 2020; Scanlan et al., 2019). Published literature on space,
ground, and user segments was reviewed to determine what gaps may exist, particularly in end-
user security threats. Manulis et al. (2021) concluded that innovation and recent advancements in
satellite technology leave many information security challenges yet to be researched and
resolved.
Space Segment
The space segment, as discussed previously, comprises satellites. Manulis et al. (2021)
mentioned that vulnerabilities within the hardware and software contained within these devices
are a significant threat. These vulnerabilities may be exploited to disrupt providers' ability to
53
serve their end customers (Manulis et al., 2021). One example is jamming, where small
malformed packets are sent to a radio transmitter on the satellite, causing a DoS attack (Manulis
et al., 2021). Furthermore, many space systems, including satellites, are considered critical
infrastructures for many industries (Falco, 2018). For example, an attacker seeking to
compromise an e-commerce business may infiltrate several systems the organization uses to run
its operations. Falco (2018) argues that a more straightforward route is to attack the connectivity
method for users and the business, a space-based ISP. Figure 11 shows how attacks have
increased alongside satellite counts from 1960 to 2018 (Manulis et al., 2021). Trend data
Figure 11
Note. From cyber security in new space, by Manulis, M. et al., 2021. International Journal of
with permission.
54
manufacturers (Falco, 2018). This lack of supply-chain control allows a nefarious actor to
comprise a component via a hardware or software vulnerability (Falco, 2018). Similarly, Starlink
manufactures its satellites using numerous Taiwanese suppliers, such as Elite Material Co.,
Parpro Taiwan, and Huatong Computer Co., each participating in circuit board production
(Hung, 2021). Additionally, due to their relatively small size, LEO satellites have limited storage
and computing power, leading to a reliance on physical measures to secure components and not
Another threat within this segment is space debris (Yue et al., 2022). Frequent launches,
debris causing service disruption. This threat occurred in 2009 when an Iridium satellite collided
with a Russian military satellite in LEO (Brito et al., 2013). This event, at 800 km, generated a
debris field from 180 km to 1700 km, with approximately 1,685 individual objects (Brito et al.,
2013). Starlink has claimed, through its filing with the FCC, that its satellites potentially may
track debris and avoid it in an automated fashion without human involvement (Federal
Signal interference is another threat that must be examined (Cao et al., 2020). Unlike
jamming, where malformed data is received, interference occurs when a satellite receives a large
amount of data on the same frequency band (Cao et al., 2020). This data may potentially
transmitters are typically used to perform these attacks (Cao et al., 2020). Compared with GEO
offerings, LEO satellite ISPs are less vulnerable to signal interface due to their orbit speed. With
55
each satellite rotating the earth approximately 16 times per day, the number of times a single
Ground Segment
The ground segment of LEO satellite internet contains infrastructure that is physically
more susceptible to attack than space components (Manulis et al., 2021). Gaining access to this
infrastructure may lead to tampering or destruction, which may have a widespread effect on the
ISP’s service offering (Manulis et al., 2021). Command and control, monitoring, and user
internet traffic back to Earth are performed through the links between the ground stations and
exploitation against these links occurred in 2015 when a Russian-based group, Turla, used a
ground antenna to intercept the link between a ground station and a GEO satellite (Kaspersky,
2021). They used the data obtained to steal user IP addresses which they used to appear as
legitimate traffic while they hid cyber-espionage operations against other countries (Kaspersky,
2021).
Manulis et al. (2021) also mentioned that each ground station for LEO satellite internet
systems is connected to a network that ultimately connects to the terrestrial Internet. Well-known
exploitations of these networks are also a risk, including software and hardware vulnerabilities
(Manulis et al., 2021). Like those within the space segment, supply chain attacks are also a
threat, with unique components and multiple companies participating in manufacturing (Manulis
et al., 2021).
User Segment
User segment threats include software and hardware vulnerabilities and physical
interaction with infrastructure (Cao et al., 2020; Manulis et al., 2021). As previously mentioned
56
in the space portion of this section, the user segment devices also utilize multiple suppliers. For
2020c). The same supply chain issues observed with satellite components also exist with the end-
communication (Yue et al., 2022). Pavur and James (2020) mentioned that eavesdropping is
performed by imitating a legitimate network user. Using this method, an attacker may send
malicious data to disrupt a satellite system. Broadband internet delivered via this method is
particularly susceptible due to the number of users and associated equipment (Pavur & James,
2020). These threats exist due to the lack of encryption in the connection between the user
equipment and satellites (Cao et al., 2020). Possible attack methods described by Cao et al.
1. The attacker uses a kind of satellite data receiving card to steal data, which is similar
network attacks.
3. The attacker uses the VLEO or LEO satellite in the overseas satellite constellation
to eavesdrop on the service data on the user and feeder links of the domestic satellite
system.
4. If the satellite constellation built in a country has an ISL which uses microwave
communication, the attacker can control a foreign satellite to come as close to the target
Full-stream encryption of each link is the solution, but the overhead needed outweighs the
advantages for many satellite internet providers (Yue et al., 2022). However, Starlink uses
hardware-based encryption on user link equipment to ensure its users' privacy and mitigate
Jamming is another threat to LEO satellite internet terminals; however, unlike its threat to
the space segment, it is limited to single links, which may affect thousands of customers. A high-
profile event occurred on March 5, 2022, when Starlink terminals shipped to Ukraine were
jammed by an unknown source (Foust & Berger, 2022). These terminals were sent in response to
Russia’s shutdown of terrestrial ISPs and the GEO ISP Viasat service due to cyber events (Foust
& Berger, 2022). Although no specifics were provided, Starlink responded by pushing a software
update to resist the jamming events on the same day (Foust & Berger, 2022).
To combat these threats, the Cybersecurity and Infrastructure Security Agency (2020)
released guidelines for end-users to reduce the risk of exploitation due to vulnerabilities. The
SpaceX has set up a program for the information security community to address a few of these
concerns by submitting vulnerabilities that potentially may exploit their Starlink product,
58
including the user segment router and dish (Bugcrowd, 2022). Currently, 29 vulnerabilities have
In addition to LEO satellite-specific threats, internet use is associated with risks (Geers,
2011). This section details current findings related to data breaches, identity theft, reputational
harm, malware, and viruses. Each section focuses on the impact on end-users of the internet.
Data Breaches
losing, changing, or destroying protected data. As discussed in Chapter 1, data breaches have
increased drastically over the past decade, with a 36% increase in the United States in 2020
(North Carolina Department of Justice, 2021). Figure 12 from the Identity Theft Resource Center
(2022) shows reported data breaches in millions based on the number of records stolen globally
Figure 12
Note. From Data breach trends, by Identity Theft Resource Center, 2022.
The most significant recent event occurred in 2017 when Equifax was the target of a data
breach, where 147 million United States citizens were affected (Spinello, 2021). The data stolen
included personally identifiable information such as customers' names, addresses, and social
security numbers (Dinger & Wade, 2019). The attackers used the Internet as a transport
mechanism, exploiting a vulnerability in Equifax's online dispute system (Spinello, 2021). This
event occurred after several significant data breaches, including the theft of millions of records
from Yahoo!, LinkedIn, Target, and Home Depot, had been reported (Dinger & Wade, 2019).
Had this breach occurred before those events, the reaction from a customer and shareholder
standpoint may have been more impacting than it was (Dinger & Wade, 2019). As shown in
Figure 12, millions of customers are affected by data breaches every year, with an estimated 43%
of companies operating on the Internet experiencing a breach of some type (Dinger & Wade,
2019). As this trend continues, Dinger and Wade (2019) argue that customers have become
Spinello (2021) argues that data breaches show a lack of cybersecurity control by the
business where they occur. These controls include proper data encryption, access control,
network, and endpoint security (Spinello, 2021). Developing a framework adhering to the basic
(2021) details to achieve these controls. Lundgren and Moller (2019) describe confidentiality as
ensuring that data is only available and accessed by authorized individuals; they also define
integrity in this context as how accurate and complete the data being held by the entity is and
60
availability as ensuring that data is only in a usable state for users that have been authenticated
and authorized.
Hughes-Lartey et al. (2021) detailed the causes of data breaches in their study. They
categorized breaches reported from 2009 to 2017 as either theft, loss, improper disposal,
hacking, unauthorized access, or unknown. They describe theft as stolen physical items,
including USB drives, laptops, backup disks, and more, and loss is when data is misplaced by an
employee and compromised (Hughes-Lartey et al., 2021). They also described improper disposal
as poor handling of sensitive data by employees. For example, customer records that may have
been destroyed electronically are left on a hard drive for a nefarious actor to exploit. Hacking
and unauthorized access are similar in removing data electronically (Hughes-Lartey et al., 2021).
Hacking involves exploiting security weaknesses, where unauthorized access is typically gained
through an employee with more access than required to perform their job (Hughes-Lartey et al.,
2021). Other and unknown are breaches where the cause was never found or cannot be classified
into other listed categories (Hughes-Lartey et al., 2021). Figure 13 shows these causes in
percentages.
61
Figure 13
Note. Human factor, a critical weak point in the information security of an organization’s
Janjarasjit and Chan (2021) studied the effects of data breaches on victims and possible
preventative measures. They determined that victims experienced emotional distress after a
breach announcement; this phenomenon was associated with a victim's thoughts on whether a
perpetrator may feel shame, guilt, or regret for their actions (Janjarasjit & Chan, 2021). They
also argued that users are the weakest link in the chain of security protection and that a lack of
awareness and poor security practices increase the probability of a data breach (Janjarasjit &
Chan, 2021).
Identity Theft
identity theft as the wrongful possession of a victim's data that may be used for financial gain.
The Federal Bureau of Investigation reported a $3.5 billion loss for United States citizens in
62
2019 alone (Federal Bureau of Investigation, 2019). This section details the leading causative
Gupta and Kumar (2020) describe four factors that lead to identity theft: technological,
economic, political, and social. Technological factors involve end-users not taking safety
measures to prevent identity theft; these measures include only using secure internet websites to
conduct personal business and not saving usernames and passwords within a browser (Gupta &
Kumar, 2020). Economic and political factors also contribute to identity theft. Gupta and Kumar
(2020) gave the example of illegal immigrants purchasing stolen information for a new identity.
The social factors involve the increasing use of the Internet by developing countries for everyday
life; for example, victims who do not safeguard their use of internet social media are often
Gupta and Kumar (2020) recommended several preventive methods for identity theft for
2. Never disclose any personal information to anyone, even if the other party
3. Regularly check your credit report, and if not regularly, then at least once a year.
5. Use different passwords, and make these passwords durable and protective.
6. Companies would keep an eye on the safety precautions that they are taking into
breach should be taken seriously and divulged in time to users and employees. (p.
904-905)
63
In a study by Zou et al. (2020), prevention methods for internet users against identity theft were
a survey of 902 internet users. These recommendations included anti-virus software, password
managers, automatic software updates, and secure browsing validation. (Zou et al., 2020). Zou et
al. (2020) concluded that the recommendations made by cybersecurity experts need to be more
user-friendly. For example, they stated that most of the password management tools on the
market are difficult to use and require multiple clicks and steps to retrieve data. They found that
identity theft protection services were limited, with only 6% of the research participants paying a
one-time subscription membership. Demographics were also analyzed, with males, with a lower
household income and a higher education level showing a higher adoption rate for identity theft
prevention methods.
Burnes et al. (2020) studied additional risk factors and protective measures against
identity theft to determine what behaviors led to increased victimization. Data from the United
States Department of Justice were used. A seven-question survey related to internet protection
behavior practices was sent to victims who reported an identity theft over two years. They found
that victims who practiced protective measures such as using unique passwords and frequently
changing them were 25%–35% less likely to experience identity theft (Burnes et al., 2020). They
also found that Caucasian females living in urban areas were likelier to fall victim to theft. In
addition, those who frequently made e-commerce purchases had increased odds of their personal
bank account and credit gift card information being stolen as part of the identity theft (Burnes et
al., 2020).
64
Reputational Harm
perception due to an outside source (Agrafiotis et al., 2018). Agrafiotis et al. (2018) concluded
that reputational harm results from cybersecurity events such as a data breach, where personal
information is stolen. Other types of harm, such as physical, economic, psychological, and
social, may also stem from data breach events (Agrafiotis et al., 2018).
Hamilton (2017) stated that the consequences of reputational harm might include damage
to friendships, depression, job loss, and even suicide. He also argues that internet accessibility is
prominent in the possible damage. For example, “fully online individuals with substantive and
long histories of social media presence may defeat reputational and historical harms by simply
continuing to create content such that negative search results decrease in proportion to in their
Solove and Citron (2018) examined the legal implications of a data breach and the
reputational harm to both business and individual victims. They found that the United States
court system passes inconsistent judgments when victims allege that a corporation allowed their
data to be stolen. One case, which reached the United States Supreme Court, was examined. In
Spokeo v. Robins, the court noted that the risk of injury, even if intangible, is enough to prove
reputational harm (Solove & Citron, 2018). Solove and Citron (2018) also argued that data does
not exist independently once compromised. In other words, the collection of variable data can be
Zhong et al. (2022) defined malware and viruses as software designed to cause harm to
users, applications, or hardware. As shown in the historical overview section of this chapter, the
65
proliferation of malware and viruses has grown since the inception of the Internet (Middleton,
2017). Alenezi et al. (2020) described malware's evolution as being in its fifth and current phase.
Before the 2010s, malware, and viruses were primarily created by individuals, focusing
on organizations and personal devices (Alenezi et al., 2020). After 2010, militaries and other
government-backed entities began to develop tools focused on severe damage and data loss
(Alenezi et al., 2020). Alenezi et al. (2022) defined these attacks as advanced persistent threats
• Advanced: The attacks are goal-oriented and performed by highly organized, advanced,
• Persistent: The goal of these attacks is not rapid damage. Such attacks are persistent
and the attackers tend to stay undetected as long as possible in the system to
• Threat: The goal of these attacks is usually to get valuable data, e.g., sensitive data and
Hofer-Schmitz et al. (2021) demonstrated the impact of this type of malware on the users
affected and the damage caused. For example, Capitol One was a victim of an APT in 2019,
where 15 million customer records were stolen containing credit limits, payments, balances, and
personal information (Hofer-Schmitz et al., 2021). Another recent attack using this method was
launched against FireEye, an internet security company (Teodorescu, 2022). The Russian
government-backed group APT29 gained access via a supply-chain weakness, exposing internal
data and threatening the security of networks and FireEye products' global users (Teodorescu,
2022).
66
Chapter Summary
A detailed review of the historical and current literature was performed, and several
studies on the current LEO status, LEO segment threats, data breaches, identity theft, and
reputational harm were found. Manulis et al. (2021) described the unique corporations
participating in LEO satellite internet and reviewed the technology. The FCC (2021a) also
provided specific information on implementing the SpaceX product Starlink. The studies
conducted by Cao et al. (2020) and Yue et al. (2022) provided vital information regarding LEO
segment threats, and Hughes-Lartey et al. (2021) covered the causes and outcomes of data
breaches, with Gupta and Kumar (2020) studying the factors that lead to identity theft for
internet users. Furthermore, Solove and Citron (2018) covered the legal ramifications of
reputational harm to end users, and Alenezi et al. (2022) described the advancement of malware
Chapter Conclusion
This review covered the historical and current literature on satellite systems, the Internet,
LEO segment threats, data breaches, identity theft, reputational harm, malware, and viruses. The
eight steps detailed in the SLR methodology section were utilized throughout the review, and it
was determined that an extant gap exists in the literature. No significant work was found
detailing the cybersecurity risks associated with LEO satellite internet use for end-users,
specifically Starlink. Chapter 3 details the research method used to answer the three research
questions. It also covers the appropriateness of the present study’s design, population, sampling,
CHAPTER 3: METHOD
relationship between Starlink and end-user cybersecurity risk. A pre-test and post-test design
with a control group was used. Chapter 2 reviewed the history and current literature on satellite
systems, the Internet, LEO segment threats, data breaches, identity theft, and reputational harm.
A gap in the literature specific to Starlink end-user cybersecurity risk was found.
Chapter 3 detailed the research method used to answer the three research questions in
Chapter 1. Chapter 3 covered the appropriateness of design, population, sampling, data collection
procedures, instrumentation, validity, and data analysis for this study. The sections contributed to
effect relationship between Starlink and end-user cybersecurity risk. A pre-and post-test design
with a control group was used. This study's purpose was to determine the cybersecurity risks
posed by Starlink LEO satellite Internet upon rural American customers. Chapter 2 thoroughly
reviewed the historical and current literature on satellite systems, the Internet, LEO segment
Chapter 3 details the research method used to answer the three research questions
collection procedures, instrumentation, validity, and data analysis for this study. Each section
Creswell and Guetterman (2019) described quantitative studies as static and valuable for
methods to answer questions (Edmonds & Kennedy, 2016). Creswell (2012) further described
quantitative research as fulfilling a need for the variable relationship definition. The evaluation
criteria must be standard to ensure an unbiased data analysis (Creswell, 2012; Creswell &
Creswell, 2018). In addition, when dealing with human subjects, the data must be numeric, using
identical instrumentation and questions (Creswell, 2012). This study determines if a relationship
exists between the installation and use of Starlink and cybersecurity risks using analytical data;
this makes the quantitative method the most appropriate for this study.
quantitative study. The study design was quasi-experimental. Salkind (2018) described quasi-
experimental designs as having a single but significant difference compared to pre- and true-
differences you might observe between groups has already occurred" (Salkind, 2018, p. 194). A
crucial assumption in this study was that group assignments had already occurred; therefore, a
investigated. The non-experimental design was not considered as; according to Salkind (2018), it
is qualitative. Frey (2018) mentioned that pre-experimental designs are used to explore the
69
literature, showing a need for further research and making a pre-experiment inappropriate.
treatment, with a minimum of one independent and dependent variable present. For this study,
the treatment administration was unable to be controlled; many factors, including Starlink’s
deployment schedule, manufacturing delays, and SpaceX launch issues, played into treatment
dates. Although the study has an independent and dependent variable, the randomization needed
The pre-and post-test control group design was chosen based on Salkind’s (2018)
recommendation that both participants be equal at the start of an experiment. Salkind further
stated that the difference between the pre-and post-test directly results from the treatment or lack
thereof (Salkind, 2018). For this study, the participants were equal before the start of the
experiment based on their pre-orders for Starlink. The installation and use of Starlink was the
independent variable administered as the treatment. The dependent variables were the occurrence
rates of identity theft, data breaches, reputational harm, and malware and viruses.
Population
and Guetterman (2019) filter this to a targeted population, representing a small percentage
overall. This study targeted rural Americans who had pre-ordered but had not yet installed
SpaceX’s Starlink LEO satellite internet product. Sheetz (2021b) found that 500,000 pre-orders
had been submitted for Starlink as of June 2021. The total sample population for this study was
868; this figure represents those who participated in the pre-test, including the pilot group of 17.
70
The final number of valid participants who participated in the pre-and post-test was 46. The
control group consisted of 19 participants. Creswell and Creswell (2018) explained that this
group is vital when performing quasi-experimental research. All participants stated they were of
legal age and had pre-ordered the Starlink product. The initial goal was to have 50 states
represented by at least one participant. Although this was not reached, representation from 22
states was achieved, with a sample size to collect empirical data from the sample and control
groups.
Sampling
Once the specific population was found, sampling commenced. Creswell (2012)
described quantitative research sampling as using the probability technique, where each member
of the chosen population has a chance of being selected for treatment. This study ensured that
each participant had pre-ordered but not installed or used Starlink. The first question asked on
the survey was whether a pre-order had been placed, and any potential participants who
researcher. First is cluster sampling, used when a large area needs to be researched, with units
selected randomly and samples pulled from each unit (Neuman, 2013). The second is systematic
sampling, which uses a calculated interval to create the desired population (Neuman, 2013).
Third is stratified sampling, which identifies categories and pulls samples from each until
reaching the target number (Neuman, 2013). Last is simple sampling, which uses an entirely
random process, usually via a computer program. None of these four sampling methods was
appropriate for this study. Frey (2018) detailed the judgmental technique in which a researcher
71
deliberately selects the subjects that best answer the research questions posed. This technique
Instrumentation
The instrumentation used to collect data to determine the specific effects of Starlink on
the cybersecurity risk of end-users was a web-based survey. The application used to host the pre-
and post-test surveys was surveymonkey.com. This application was chosen based on its high-
level security, usability, and ease of data analysis criteria. The researcher also observed the
All your respondents' information is securely stored in our SOC 2 accredited data centers
that adhere to security and technical best practices. We ensure that collected data is
transmitted over a secure HTTPS connection, and user logins are protected via TLS. Data
The researcher used a strong username and password combination and multi-factor
Data Collection
Neuman (2013) described consent as vital before conducting research involving a human
subject. At a minimum, a researcher must (a) gain consent prior to data collection, (b) never
cause harm, (c) protect the data at all costs, and (d) never release harmful data about a participant
(Neuman, 2013). The consent statement for this research was placed at the beginning of the pre-
and post-survey, with each participant accepting the terms before starting. Figure 14 shows the
verbiage approved by the institutional review board (IRB) at Capitol Technology University.
72
Figure 10
Prior Consent
The data collected included an email address, zip code, number of household members,
and a series of questions to best answer the four research questions for this study. Each question
was presented on a different screen to ensure that the end-user gave each question the right
amount of focus. In addition, logic was built into the survey to display the next appropriate
question based on their response. For example, if a participant stated yes to the question “In the
past 24 months, have you been a victim of identity theft,” they were presented with the following
question: “How many incidents of identity theft have you experienced?” The next question was
skipped if they answered no to the first question. Appendices B and C show the pre- and post-
study was conducted with 17 participants. A separate survey was created containing questions
identical to those in Appendix B, along with four additional questions geared towards feedback
73
on the instrumentation and preferences of the participants. Appendix C shows the additional
questions posed. Advertisement for the pilot study was made in the same manner as described
below, with only three Facebook groups used until over 15 responses was received. After
obtaining the required responses, the survey link was disabled, and responses were collated for
analysis.
Facebook, a social media platform based in the United States, was used for advertising
for the participants (Meta Platforms, 2022). To encourage maximum participation by rural
dwellers, the researcher joined two city Facebook groups for every state with a population of less
than 50,000 between September 1, 2021, and October 25, 2021. Most of these groups required a
purpose for membership to be stated before the group administrator approved. The researcher
complete a short survey in the future based on their Internet Access. Thanks, Chris
Gerber.
The researcher also joined Starlink groups geared towards those interested in the product to drive
increased participation. In total, the researcher joined 104 groups for advertisement purposes.
Compensation for participants was advertised via Facebook. For participants who completed
both the pre-and post-survey, a $50 gift card for Amazon.com was offered for one winner drawn
at random. The researcher used the following statement in a post to each Facebook group when
attempting to recruit participants between October 26, 2021, and December 26, 2021:
74
cybersecurity. If you live in the USA, have pre-ordered but not yet installed Starlink, I
would love your help to gather data! I have a short survey that can be accessed here:
https://www.surveymonkey.com/r/Z2GX7TW
Happy to answer any/all questions via PM. The survey will ask for your email address for
a follow-up survey and Zip code for demographics. It shouldn't take more than 10
minutes of your time, and a $50 Walmart gift card will be given to a random participant.
Thanks in advance!
Six months after the close of the pretest survey, on June 26, 2022, the follow-up email was sent
to pre-test participants with the post-test survey website link. The researcher allowed 90 days for
survey completion, with two reminders sent to participants who failed to respond promptly. Once
responses were received, the researcher conducted the gift-card drawing on September 2, 2022,
using Microsoft Excel's randomization software to choose the winner, who was notified via
Salkind (2018) defines internal validity as the sustenance and quality of a design to
ensure that results are a unique representation of the independent variable change. Furthermore,
different explanations for the outcome of an experiment will prove internal validity false
(Salkind, 2018). Dimitrov and Rumrill (2003) listed the following as common factors that
statistical regression toward the mean, differential selection of participants, mortality, and
interactions of factors” (p. 159). They further described the pre-and post-test research design
75
with a control group, which this study employs, as having the factors of maturation and history,
Maturation is when a psychological or biological shift occurs between the pre- and post-
tests and affects final scoring (Dimitrov & Rumrill, 2003). In this study, the dependent
the human participants, which are unrelated to the installation and use of Starlink. For example,
reasoning, it will be challenging to determine if the results are from the treatment or injury.
Based on the questionnaire, this study assumed that participants retained the ability to recognize
if a cybersecurity event had occurred. To ensure an understanding of the survey, the researcher
added examples for each question related to the dependent variable. Appendices B and C show
these examples.
History is when participants in a study have an occurrence in their life that affects their
post-test scoring (Dimitrov & Rumrill, 2003). Wright (2001) explains that this phenomenon may
significantly obscure results, and researchers must consider possible pre- and post-test
occurrences. For this study, the duration between the two tests was six months to allow treatment
for a portion of the participants. This duration was necessary due to circumstances outside the
researcher's control, such as product delays and the contractual agreements between the end users
and Starlink. The researcher's timeframe threatened internal validity, as unforeseen events may
have changed the post-test results. Chapter 4 details the potential history-based effects that may
Another essential item to consider with internal validity is selection bias. Pannucci and
Wilkins (2010) define bias as any prejudiced decision made by a researcher that may affect the
76
outcome of a study. Selection bias relates to the participants chosen by the researcher (Pannucci
& Wilkins, 2010). The population is not chosen randomly but rather with a potential outcome in
mind based on a characteristic (Pannucci & Wilkins, 2010). For this study, the researcher only
asked that participants be of legal age and have already placed a pre-order for Starlink.
Participation was voluntary and open to anyone accessing the advertised publicly available
survey.
External validity ensures that results are generalized outside the specific setting where the
experiment was initially performed (Neuman, 2013). Creswell and Creswell (2018) detailed
three critical threats to external validity: selection and treatment, setting and treatment, and
history and treatment. They explained selection and treatment as the lack of generalizability
within the groups participating in research, such as age, race, and socioeconomic background. To
combat this threat in the present study, the researcher opened the survey to anyone accessing the
URL and did not limit it to specific groups. As discussed in this chapter's population and
sampling section, a targeted approach was used for advertising the survey but was only limited to
those of legal age who had placed a pre-order for Starlink. Creswell (2012) explains setting and
treatment as the inability of an experiment to generalize from the original location to another.
This research took place wherever the participants chose, with the only setting requirement being
a personal computer, phone, or another internet-connected device that was able to load and
interact with the web-based survey. The threat of setting and treatment was averted due to these
basic requirements. A history and treatment threat is when researchers generalize their results to
the study's timeframe (Creswell & Creswell, 2018). This study may be conducted at any time if
certain conditions are met, such as the participants needing to have ordered and not yet received
Data Analysis
Data examined in this study, described in Chapter 4, include information from the control
group and those who received the treatment. It is essential to note the differences between these
two groups, as determining an increase or decrease in cybersecurity risk depends on the accuracy
and completeness of the data obtained. The location of the participants in both groups is also
pertinent, as this study focuses on the primary end-users of the product, which, as previously
stated, were persons dwelling in rural America. Another critical piece of data analyzed was the
This study’s pre-and post-test design provided the most crucial aspect of the data
analysis—determining if the scoring changed between the two surveys and by what factor. These
differences were analyzed using Microsoft Excel’s charting feature to visualize the results. The
control and treatment groups were examined separately and then against each other. An
inferential analysis approach was used to compare the data between the groups. Creswell (2012)
described this analysis as the most appropriate when comparing groups with two or more
variables.
The researcher used the data and inferential analysis to test each of the hypotheses
presented in Chapter 1. A two-sample assuming equal variances t-test was used to determine
what differences existed between the means of the treatment and control groups. According to
Salkind (2018), this type of test is most appropriate when a researcher wishes to examine
differences between groups where the same participants are used for the pre- and post-test. An
analysis of variance test was also considered for comparing the two groups. However, Creswell
(2012) described this method as appropriate when dealing with three or more data groups.
78
Because this study only has two data groups, it was not chosen as the test for statistical
significance.
Chapter Summary
Chapter 3 discussed the methodology for this quantitative, quasi-experimental study. The
research method, design appropriateness, and rationale for this research were also explained.
Other possible methods and designs were compared to show why the researcher chose the
approaches he did. Next, population, sampling, instrumentation, and data collection procedures
were described. Further, internal and external validity was discussed, with threats in each
category analyzed against this study. Data analysis was also covered at a high level, with a two-
sample assuming equal variances t-test chosen for the statistical comparison of the pre-and post-
test data. This test allowed the researcher to compare the change between the data sets to answer
In Chapter 4, the data collected during the research will be discussed. The data were
analyzed using pre-and post-test surveys, and statistical methods were used to find correlations
between the treatment and control groups. Each hypothesis was tested to determine what if any,
changes occurred.
79
CHAPTER 4: RESULTS
This chapter provides a detailed analysis of the data obtained during this study. This
study's purpose was to determine the cybersecurity risks posed by Starlink LEO satellite Internet
upon rural American customers. First, the pilot study results are reviewed to show any changes
the researcher made to the pre-and post-test survey questions or instrumentation. Second, the
data collection process is explained in detail for pre-and post-test, focusing on omitted data.
Next, the pre-and post-test data, including the treatment and control groups' responses, are
presented and analyzed using a two-sample assuming equal variances t-test to find potential
statistical significance. Lastly, external and internal validity concerns are addressed. Chapter 5
will show the conclusions on each research question and recommendations made based on the
Pilot Study
The pilot study was conducted using the same questions used for the pre-test survey but
with the addition of four questions (Appendix C) at the end of the survey. The researcher chose
three Facebook groups in Alabama, Wyoming, and Wisconsin to advertise the survey. The
additional questions were not advertised, as the data collected was included in the pre-test
results. The researcher did not want to force a change in opinion for those completing the survey.
Seventeen responses were received within eight hours of the advertisement on October 25, 2021,
and the goal of 15 responses set by the researcher was quickly met. Two respondents answered
that they were either under 18 or had not pre-ordered Starlink; therefore, their results were
omitted. Additionally, the pilot study questions were not required, and only nine participants
The first question asked how satisfied the participants were with the look and feel of the
survey. Responses ranged from extremely satisfied to not at all satisfied; 77.77% of the
participants indicated that they were very or extremely satisfied with the look and feel of the
Figure 15
The next question was opened-ended, asking the participant what they liked about the survey.
Although responses differed, most mentioned the accessible format and easy-to-answer
Table 3
The next question asked each participant what they disliked about the survey. The majority of the
respondents answered either not sure or nothing. Table 4 shows these results.
Table 3
The last question was again open-ended, asking each participant if they had any additional
comments for the researcher. Eight participants responded, with 37.5% of them answering none.
Table 5
Because the pilot study results were primarily positive, with no changes requested, the researcher
did not change the questions, format, or instrumentation used for the pre-and post-test surveys.
The pre-test survey was launched on October 26, 2021, using a surveymonkey.com public URL.
As mentioned in Chapter 3, the researcher had joined Facebook groups created for rural dwellers
before this date to advertise the survey. The researcher randomly chose ten groups to post the
advertisement on the first day. By the end of the day, 65 responses had been received. Facebook
advertisement continued on October 27, 2021, with five groups posting to gather participants. An
additional 235 responses were received by the end of the second day, which significantly
exceeded the researcher's expectations. This process was repeated until November 1, 2021, when
Facebook suspended the researcher's account due to multiple reports to group administrators
about the account being SPAM or false advertising. Even though administrators of the groups
had approved, these reports of SPAM or false advertising to Facebook were an individual choice
and out of the researcher's control. By this time, including the pilot survey, 770 responses had
been received within seven days of the survey launch. On November 4, 2021, the researcher's
83
account was reinstated after an appeal was made; however, the permission to post to groups was
not granted until November 10, 2021. Therefore, the researcher continued advertising the pre-test
survey on November 10, 2021, at a rate of five different groups daily until groups were
completed. This slower pace of advertisement was successful, as the account was not suspended
again for the remainder of the 60-day survey period. The survey URL was closed on December
26, 2021, with 883 responses obtained, including the pilot. Figure 16 shows the responses
received by date.
Figure 16
Of the 883 responses received over the 60-day timeframe, 679 (76.89%) were completed,
meaning the participants answered all the questions on the survey. Questions 1 and 2 were
answered “yes” by 100% of respondents, indicating they were of legal age. The IRB had only
approved this research for those over 18. Question 2 asked if participants had pre-ordered but not
84
yet installed Starlink. This question ensured that the proper treatment and control groups were
created, allowing for a detailed comparison with the post-test data. Eighty-one participants
answered no to this question and were excluded from the survey. In addition, participants whose
zip code was found to be located outside the United States were also omitted. The geography
feature within Microsoft Excel was used first, with the researcher manually performing
additional validation using the United States Postal Service zip code lookup tool. Further
filtering was performed to exclude participants who incorrectly answered the questions, such as
those who put a home address in place of the email address and those who provided four-digit
zip codes instead of the required five. Finally, 630 participants were included in the pre-test data
set.
Location
This study focused on rural areas with a low population density where Starlink’s
competitors' technologies, such as 5G and other terrestrial broadband products, are unavailable
(Musk, 2020). To limit non-rural area participation in the United States, the researcher targeted
specific areas of each state with a population of less than 50,000. Of the 630 participants, 309
met the United States Census Bureau's (2019) definition of people residing in a rural location.
The population average of these participants was 11,238. The remaining 321 participants had an
average population of 1,100,391. The overall average was 504,730. Numerous high-density
urban zip codes in New York City and Los Angeles led to a higher-than-targeted population.
The pre-test did not meet the researcher's goal of having at least one participant per state.
Each state had a minimum of one participant except for Connecticut, Maine, Massachusetts, New
Hampshire, New Jersey, and Rhode Island. Figure 17 is a visual representation of the
participants’ location.
85
Figure 17
Pre-test survey question five asked for the number of people living in each participant's
household. The United States Census Bureau (2020) reports an average of 2.60 people per
household in the United States. The average for the 630 participants in the pre-test was 3.43
people per household, representing a 31.92% increase compared to the United States Census
Bureau statistic. With 500,000 pre-orders for Starlink, if the alternative hypotheses were
incorrect and statistical significance was proven, the risks may affect over 1,715,000 people.
Questions six, seven, and eight focused on whether the participant’s households had high-
speed internet access and if they expected their internet usage to increase once Starlink was
86
installed. Of the 630 participants, 516 (81.90%) answered that they currently had high-speed
internet access, defined by the Federal Communications Commission (2020a) as at least 25 Mbps
for downloads and 5 Mbps for uploads. One hundred (15.87%) participants answered no.
Fourteen (2.22%) participants said they did not know. Of the 516 who answered yes to question
six, 133 (25.77%), 227 (53.68%), and 106 (20.54%) answered that they had had access for less
than a year, less than two years, and two years or more, respectively. When asked whether they
expected an increase in their internet usage following the installation of Starlink, 533 (84.60 %)
participants answered yes, 42 (6.66%) answered no, and the remaining 55 (8.73%) answered that
Research Question 1
Research question 1 seeks to understand if the occurrences of identity theft changed for
end-users of Starlink in rural locations in the United States. Appendix A shows survey questions
nine and ten related to identity theft. Of the 630 participants who answered the pre-test survey,
382 (60.63%) answered that they had experienced an incident of identity theft within the 24
months prior. Of these participants who answered yes, 105 (27.48%) indicated that a single
incident had occurred; 132 (34.55%) said they had experienced two incidents, while 119
(31.15%) said they had experienced three. Twenty-five (6.54%) participants experienced four
incidents of identity theft, and one person (.026%) indicated that they noticed 156 occurrences.
Figure 18 shows the percentages of each occurrence for the 382 participants who answered yes
Figure 18
Research Question 2
changed for end-users of Starlink in rural locations in the United States. As shown in Appendix
A, survey questions number 11 and 12 were asked of each participant. Of the 630 participants
who answered the pre-test survey, 396 (62.85%) answered that they had experienced an incident
of a personal data breach within the 24 months prior. Of these participants who answered yes,
109 (27.59%) indicated that a single incident was observed; 137 (34.68%) experienced two
incidents, while 132 (33.42%) experienced three. Seventeen (4.30%) participants experienced
four personal data breach incidents, and one participant (.025%) indicated they noticed 420
occurrences. Figure 19 shows the percentages of each occurrence for the 396 participants who
Figure 19
Research Question 3
changed for end-users of Starlink in rural locations in the United States. As shown in Appendix
A, survey questions numbers 13 and 14 were asked of each participant. Of the 630 participants
who answered the pre-test survey, 361 (57.30%) answered that they had experienced reputational
harm in the 24 months prior. Of these participants who answered yes, 119 (32.96%) indicated
that a single incident had occurred; 107 (29.63%) stated that they had experienced two incidents,
while 115 (31.85%) participants stated that they had experienced three incidents. Nineteen
(5.26%) participants experienced four incidents of reputational harm, while one participant
(.025%) indicated that they observed 982 occurrences. Figure 20 shows the percentages of each
occurrence for the 361 participants who answered yes to survey question 13.
89
Figure 20
Research Question 4
Research question 4 seeks to understand if the occurrences of malware and viruses will
change for end-users of Starlink in rural locations in the United States. As shown in Appendix A,
survey question 15 was asked of each participant. From the 630 participants who answered the
pre-test survey, 184 (29.20%) answered that they had experienced no malware or viruses on
endpoints in their households in the 24 months prior. One hundred and forty-six (23.17%)
indicated a single incident; 248 (39.36%) indicated three incidents, while 46 (7.30%) participants
indicated four incidents. Six participants indicated more than four, with five, six, ten, ten, and
982 representing .16% of each. Figure 21 shows the percentages of each occurrence for the 630
total participants.
90
Figure 21
The post-test survey was launched on June 21, 2022, using the public URL of
surveymonkey.com. The duration between the commencement of the pre-and post-test was 238
days. The researcher chose this duration to allow ample time for treatment to occur. As
previously noted, the treatment of the installation and use of Starlink was not a controllable,
independent variable.
The researcher collected the participants’ email addresses as part of the pre-test, as shown
in question four in Appendix B. From the researchers' academic email account, 630 valid
participants from the pre-test were contacted via email on June 21, 2022. For privacy, recipients
were blind carbon copied. Figure 22 shows the message the researcher sent.
91
Figure 22
The researcher noted that of the 630 recipients, 510 were returned as invalid by the destination
email server, with the majority being rejected from gmail.com. A subsequent post-survey
reminder email, sent to the same recipients on June 26, 2022, yielded the same results. The
researcher noted this incident for further investigation and moved forward with the advertisement
By the end of the day on June 21, 2022, 46 responses had been received. On June 22,
2022, the researcher posted the following on the same rural Facebook groups previously joined
science program in cybersecurity. If you participated in the first part of my survey posted
here six months ago, the post-survey is live and can be accessed here:
https://www.surveymonkey.com/r/LXZ3HGJ
Once all responses are collected, I will draw the winners for the $50 gift cards as
June 22, 2022, yielded another 36 responses; 26 were received on June 23, 2022. The researcher
sent a reminder email to participants whose email addresses had not returned as invalid on June
Figure 11
Responses continued to be received, with a sharp drop-off observed after June 26, 2022. The
survey URL was closed on August 21, 2022, with 153 responses obtained in total. Figure 24
Figure 24
Of the 153 responses received over the 60 days, 118 (77.12%) were completed, meaning
they answered all of the questions on the survey shown in Appendix C. As with the pre-test,
question one was qualifying, with a response of no disqualifying the participant immediately. A
100% yes response was observed for Question 1, indicating that participants were of legal age.
Questions two and three asked for the participant's email address and zip code. These two
questions enabled the researcher to validate the participants by comparing the data to the pre-
survey. Of the 118 participants who completed the survey, six provided zip codes outside the
United States. These participants’ responses were excluded, leaving 112 participants. To filter
further, only those who matched email addresses and zip codes were excluded, leaving 47
participants. For these 47 participants, no change in zip code was observed between the pre-and
post-test data.
94
Location
This study focused on rural areas with a low population density. To limit non-rural area
participation in the United States, the researcher targeted specific areas within each state with the
pre-test with populations of less than 50,000. Of the 47 participants, 45 (95.74%) met the United
States Census Bureau's (2019) definition of residing in a rural location. The population average
of these participants was 9,926.61. The remaining two participants had an average population of
66,436.50. The overall average was 12,657.04. The post-test did not meet the researcher's goal of
having at least one participant per state. Figure 25 is a visual representation of the participants’
location.
Figure 25
Post-test survey question four asked about the number of people living in each
participant's household. The average for the 45 valid participants was 3.00 people per household,
representing a 13.33% increase compared to the statistical average of 2.60 (United States Census
Bureau, 2020). This question was asked to determine whether the household size for included
participants changed over the six months between the pre-and post-surveys. No change was
Post-test survey question five asked whether Starlink had been installed since the pre-test,
with question six asking for the approximate installation date. The treatment and control groups
for this study were determined using question four. Of the 45 participants, 29 (75.89%) received
the treatment of installing and using Starlink, while 17 (24.10%) did not. Each participant was
assigned an alphanumeric identifier to track their movement throughout the study. Control group
participants were assigned an 0XX-C and treatment participants a 00XX-T, with X representing
a number. For the 29 participants who received the treatment of Starlink, the average treatment
duration was 87.90 days. Participants 002-T and 027-T had the most prolonged duration, with
117 days, while 005-T had installed and started the treatment of Starlink one day before
answering the post-test survey. As described previously, the treatment variables, including
Dependent upon their response to question five, the participants were directed to either
the treatment or control group questions. Both sets of questions were identical, except for the
wording “treatment of Starlink” or “in the past six months” and two high-speed internet
questions for the control group, as seen in Appendix C. All questions were similar to the pre-test
Post-test survey questions 14 and 15 focused on whether the participant’s household had
high-speed internet access and for what length. Four (23.52%) of the 17 control group
participants answered that they currently had high-speed internet access. Eleven (64.70%)
participants answered no, while two (11.76%) answered unknown. Of the four who answered yes
to question 14, one (25.00%) answered that they had had access for less than a year; one
(25.00%) answered that they had had access for less than two years, and one (25.00%) stated that
they had had high-speed internet for two years or more. The last participant chose not to answer
question 15.
Research Question 1
changed for end-users of Starlink. Both the control and treatment groups were reviewed. As
shown in Appendix C, survey questions nine, ten, sixteen, and seventeen were asked of each
participant. Of the 17 control group participants, one (6.25%) answered that they had
experienced an identity theft incident six months prior. This participant only experienced one
event. The remaining 16 (94.11%) answered no. Of the 29 participants in the treatment group,
two (6.89%) indicated that they had experienced an identity theft incident since their installation
and use of Starlink. The remaining 26 (89.65%) experienced no incidents. One of these
participants experienced two events, while the other experienced one. Figure 26 shows the
Figure 26
Research Question 2
changed for Starlink's end-users. As shown in Appendix B, survey questions nine, 10, 18, and 19
were asked of each participant. Of the 17 control group participants, five (29.41%) answered that
they had experienced a personal data breach within the six months prior, while the remaining 12
(70.58%) had no incidents. Three (17.64%) participants experienced one event, while the
remaining two (11.76%) experienced two. Of the 29 participants in the treatment group, three
(10.34%) experienced a breach since installing and using Starlink. The remaining 26 (89.65%)
experienced no incidents. One of these participants experienced three events, one experienced
two, and the last experienced one, representing 3.44% each. Figure 27 shows the percentages of
Figure 27
Research Question 3
changed for end-users of Starlink. As shown in Appendix C, survey questions numbers 11, 12,
20, and 21 were asked of each participant. Of the 17 control group participants, three (17.64%)
answered that they had experienced reputational harm within the six months prior, while the
single event. The treatment group of 29 had one (3.44%) participant experiencing reputational
harm since their installation and use of Starlink. The remaining 28 (96.55%) experienced no
incidents. The participant experienced three events, representing 3.44% of the total. Figure 28
shows the percentages of each occurrence and count for each group.
99
Figure 28
Research Question 4
Research question 4 seeks to understand if the occurrences of malware and viruses will
change for end-users of Starlink. As shown in Appendix C, survey questions 13 and 23 were
asked of each participant. Of the 17 control group participants, two (11.76%) answered that they
had experienced an incidence of malware or viruses in the six months prior. The remaining 15
(88.23%) experienced no incidents. One (5.88%) participant experienced a single event; the
other experienced three (5.88%) events. In the treatment group of 29, two (6.89%) participants
had experienced malware or viruses since they installed and used Starlink. These participants
experienced three events each, representing 6.89% of the total, and the remaining 27 (93.10%)
experienced no incidents. Figure 29 shows the percentages of each occurrence and count for each
group.
100
Figure 29
To compare the results from the control and treatment groups, the researcher determined
the average number of events for each of the four research questions. To determine this figure,
the number of unique occurrences was divided by the number of participants for each group. The
researcher defined this as the occurrence rate. As previously discussed, the treatment length
average for those who installed and used Starlink was 87.90 days. The length for the control
group was pre-determined as 180 days based on the survey questions in Appendix C. The
disparity of 92.10 days caused the researcher to determine how to level each group to answer
Vanderweele and Arah (2011) defined this type of data disparity as an unmeasured
confounder. They determined that it must be accounted for to limit bias when comparing two
groups in a study. They also gave several examples, with the outcome of bias formulas to ensure
a constant prevalence between each group. Chiba (2012) also proposed a similar method for
101
unmeasured confounding correction by finding the average of the observed uneven variables and
remove the 92.10-day difference in treatment days. The average of each occurrence observed
was divided by the average treatment length of 87.90 to determine the per-day average. This
figure was multiplied by 92.65 and added back to each occurrence average. The formula used is
Figure 30
This formula was performed on each of the four occurrence rates prior to data comparison with
Research Questions
The occurrence rates for each research question for the 47 valid participants are shown in
Table 4
The occurrence rates for the control group, those who were not exposed to the treatment of
Starlink, are shown in Table 7. These figures are based on the post-test data set.
Table 5
The occurrence rates of each event for the treatment group exposed to Starlink are shown in
Table 6
The researcher compared the pre-and post-test occurrence rates to determine if a change was
observed between the treatment and control groups. Tables 9 and 10 show the differences
Table 7
Table 8
Table 11 shows the observed change and percentage difference per occurrence, comparing the
Table 11
T-Test
Creswell (2012) explained that proving the null hypothesis false is critical in research. In
addition to the mathematical results, the appropriate statistical significance test must be
performed on the data (Creswell, 2012). A two-sample assuming equal variances t-test was used
to determine the differences between the treatment and control groups. The researcher chose the
equal variable test because the differences observed between the pre-and post-test data are less
than 4, and according to Creswell (2012), it is the standard method. The result of this test is
known as the p-value. “A p value is the probability (p) that a result could have been produced by
chance if the null hypothesis were true” (Creswell, 2012, p. 189). The formula used to conduct
Figure 31
where
The researcher used Excel's statistical data analysis tool to compare the data sets for each
hypothesis. A significance value of .05 was chosen, indicating a 5% chance of concluding that a
difference exists when none exists. The researcher chose this level based on the small sample
size in the study. Kim and Choi (2019) explained that the significance level must be set at a
much lower value when the sample size is larger than the standard .05 or .01 measurements.
Research Question 1
An increase of .15 in identity theft occurrences per user was observed in the treatment
group compared to the control group. Results of the t-test for each group are shown in Tables 12
and 13.
106
Table 12
Table 13
The p-value of the control group t-test was .65, which is not statistically significant when
comparing the occurrence rate between the pre-and post-test. The p-value of the treatment t-test
was .83, which is not statistically significant when comparing the occurrence rate between the
Research Question 2
A .02 decrease in the occurrences of data breaches, or -4.55% per user, was observed in
the treatment group compared to the control group. Results of the t-test for each group are shown
Table 14
Table 15
The p-value of the control group t-test was .02, which is statistically significant when comparing
the occurrence rate of data breaches between the pre-and post-test. The p-value of the treatment
t-test was .11, which is not statistically significant when comparing the occurrence rate between
Research Question 3
An increase of .04 (22.22%) in the occurrence of reputational harm was observed per user
in the treatment group compared to the control group. Results of the t-test for each group are
Table 16
Table 17
The p-value of the control group t-test was .81, which is not statistically significant when
comparing the occurrence rate between the pre-test and post-test. The p-value of the treatment t-
test was .59, which is not statistically significant when comparing the occurrence rate between
Research Question 4
A decrease of .03 (-12.5%) was observed in the occurrence of malware and viruses per
user in the treatment group compared to the control group. Results of the t-test for each group are
Table 18
Table 19
The p-value of the control group t-test was .50, which is not statistically significant when
comparing the occurrence rate between the pre-test and post-test. The p-value of the treatment t-
test was .37, which is not statistically significant when comparing the occurrence rate between
Validity/Reliability
Of the 630 pre-test participants who completed the survey, only 49 were considered valid
based on their responses to the post-survey, bringing the instrument's validity and reliability into
question. The researcher first suspected that something had gone wrong when Google returned
510 of the post-survey email invitations shown in Figure 24, showing that they did not exist. To
investigate, the researcher performed a Google.com search with the survey URL and Facebook
advertisement data to determine if the survey was posted in other online locations. Nothing was
found, meaning that a nefarious actor was attempting to skew results for result manipulation or
112
financial gain. Using each participant's email address and zip code allowed the researcher to gain
confidence in the remaining 49 participants who provided accurate answers. Additionally, the
The researcher set a goal for a single participant per state; this goal was not met, with
only 22 states in the final results. However, the goal of primarily rural area participation was
met, with a population average of 12,657.04. In addition to what was described above in the pre-
test, the roll-out schedule of Starlink affected participation. The researcher placed a pre-order
Thank you for being a supporter of Starlink! Over 14 million people have inquired about
Starlink service in their area, and today, Starlink is available in over 20 countries (and
counting). The Starlink team has been working hard to expand service and increase
accommodate more users per area as we increase the number of satellites in orbit.
Silicon shortages over the last 6 months have slowed our expected production rate and
impacted our ability to fulfill many Starlink orders this year. We apologize for the delay
and are working hard across our engineering, supply chain, and production teams to
improve and streamline our product and factory to increase our production rate. (personal
Chapter Summary
Chapter 4 described the data retrieved from the pre-and post-tests. The control and
treatment groups were presented, including the occurrence rates and percentage changes for the
four research questions. The pilot study was also discussed, providing valuable feedback
regarding the validity and reliability of the instrumentation. Other pertinent data, such as
113
location, household size, and previous access to high-speed internet, were reviewed in detail. The
statistical relevance of the data for each research question was also presented using an equal
variance t-test. Finally, the validity and reliability of the study were discussed. Chapter 5 will
expand upon the data presented in Chapter 4 to draw the appropriate limitations, conclusions,
and future research recommendations. It will use the theoretical risk framework with ISO 31000
as a guide.
114
cybersecurity risks posed by Starlink LEO satellite internet to rural American customers.
Chapter 5 contains the findings and recommendations for this study based on the data presented
are covered. In addition, a final summary of each of the five chapters of this dissertation is
provided.
The limitations section reviews how this study was impacted by sample size, event
timing, and more factors. The findings section uses ISO 3100 as a guide for interpreting the
research data. Recommendations are made to end-users, SpaceX, and academia using the data
within this study. Future recommendations are also made for those who wish to further this
research.
As discussed in Chapter 2, an extant gap in the literature exists for the end-user
cybersecurity risks of Starlink usage. The researcher's original contribution to knowledge shows
increased occurrence rates of identity theft and reputational harm for Starlink end-users
compared to the control group. A decrease was observed in malware, viruses, and data breach
risks.
Limitations
cybersecurity risk. The researcher minimized this limitation by crafting survey questions with
specific examples for each participant to consider before answering the question. This method
educated the participants on the topic, even if they had previously had zero or limited exposure.
115
No negative feedback was received for the pilot study, allowing the researcher to move forward
researcher only asked for email addresses and zip codes as part of the survey, so no personally
identifiable information was collected. The researcher believes this allowed the participants to
answer truthfully, although this cannot be proven. The researcher made every effort to market the
post-test to the pre-test participants. Email and Facebook posts were created and sent to pre-test
participants. In addition, reminders were also sent over the 60-day length of the post-survey. The
data set was limited, with only 49 of the 100-participant goal of the researcher realized. The
independent variable of treatment was another limitation that was not controllable. Therefore, the
control and treatment groups were not equal in size, which was considered when determining
Chapter 4 displayed the pre-and post-test results and described the t-test performed to
determine relevance. This section examines the data to answer the research questions and
hypotheses. As discussed in previous chapters, the independent variable was Starlink installation
and use, while the dependent variable was the occurrence rate of each research question. The
differences between the control and treatment groups are reviewed to determine if Starlink use
Research Question 1
Research question 1 asked if the occurrence rate of identity theft will change for end-
users of Starlink in rural locations in the United States. The data in Table 11 shows a .15
(107.14%) increase in the occurrence rates of identity theft for Starlink users compared to those
116
in the control group. This data alone is enough to reject the null hypothesis that the difference in
the incidence of identity theft will not increase between the control group and those exposed to
the treatment of Starlink. However, the results of the two-sample assuming equal variances t-test
for the treatment group was .83, which was not statistically significant; therefore, the null
Research Question 2
Research question 2 asked if the occurrences of a personal data breach will change for
end-users of Starlink in rural locations in the United States. The data in Table 11 shows a -.02
(4.55%) decrease in the occurrence of a personal data breach for Starlink users compared to
those in the control group. The null hypothesis is that the incidence of a personal data breach will
not increase among those exposed to the treatment of Starlink compared to the control group.
Although a decrease was observed, the t-test result for the treatment group data was .11, which
was not statistically significant. Therefore, the null hypothesis was accepted, and the alternative
Research Question 3
The third research question asked if the occurrences of reputational harm will change for
end-users of Starlink in rural locations in the United States. Table 11 shows a .04 (22.22%)
increase in the incidence of reputational harm among Starlink users compared to those in the
control group. This increase supports rejecting the null hypothesis that reputational harm
occurrences will not increase among those exposed to the treatment of Starlink compared to the
control group. However, the p-value of .59 indicates that the change was not statistically
significant; therefore, the null hypothesis was accepted, and the alternate hypothesis was
rejected.
117
Research Question 4
Research question 4 seeks to understand if the occurrences of malware and viruses will
change for end-users of Starlink in rural locations in the United States. A -.03 (12.5%) decrease
in the incidence of malware and viruses was observed among the treatment compared to the
control groups. Although this change rejects the null hypothesis that malware and virus
occurrences observed will not increase between the control group and those exposed to the
treatment of Starlink, the p-value of .37 on the t-test does not support the significance of the
change. Therefore, the null hypothesis that malware and virus occurrences observed will not
increase among those exposed to the treatment of Starlink compared to the control group was
accepted.
Framework Interpretation
five steps that must be performed continuously to identify and mitigate product risk. For the
context of results interpretation, the researcher performed the third step in the process. This step
states that stakeholders must be adequately educated on the product and understand all risks
result, specific cybersecurity risk changes did occur that potentially may be used in further
research and recommendations to Starlink and their current and future customers, who are key
stakeholders.
Standardization, 2018). The following factors must be considered when performing this function:
Standardization, 2018, p. 6)
Among these factors, potential sources of risk, threats, and opportunities were the primary focus
of this study. The source of risk was shown to be the installation and use of the Starlink product.
Using control and treatment groups allowed the researcher to compare the change in the value of
the independent variable. The per-occurrence difference for each research question shows
potential threats and opportunities for change, which is covered in the recommendations section
of this chapter.
Recommendations
The researcher recommends that SpaceX reviews this data as a potential risk, threat, and
opportunity for their Starlink product. Although focused on the United States rural areas, the data
may easily be transferred to other customers in different locations globally. Opportunity exists
for the development of methods to combat this risk. For example, new customers can be offered
cybersecurity awareness training to protect themselves from identity theft, data breaches,
reputational harm, malware, and viruses before use. Another method is to offer an inline security
119
product to protect Starlink users' internet traffic, if they choose, by scanning it for common
Another potential risk for SpaceX to investigate, if they have not already done so, is the
LEO-specific risks outlined in Chapter 2. There are multiple threats to the space, ground, and
user segments, including software vulnerabilities, supply chain, eavesdropping, jamming, space
debris, signal interference, and eavesdropping. The researcher recommends that SpaceX follows
the ISO 31000 approach to these risks with the outcome of user and stakeholder education on
their findings.
While the results of this study did not show statistical significance between the control
and treatment groups, changes did occur to the cybersecurity risk occurrence scores for specific
research questions. Due to these changes and the data displayed in Chapter 2, there are multiple
recommendations for future research. First, a qualitative study can be performed on privacy laws
and regulations and how they relate to satellite internet access by country; the Chinese
government's control over ISPs and their operations is an example described in Chapter 2.
Second, the effects of using high-speed internet on the cybersecurity risk of the end-users
due to external factors must be studied. This study focused on the possibility of a risk increase
but did not discuss factors such as education, location, race, gender, or other demographics that
may contribute to a change. A country such as the United States, which has seen an increase in
racial and ethnic diversity since 2010, will be a good candidate for this type of study (United
Third, the researcher recommends broadening this research to include a larger population
sample to increase the data set. The research may also be ported to another form of emerging
120
Internet access to gain more convenience and relevant results. With an increased data set and
possible statistical significance, the results may be applied to the cost-benefit analysis calculation
to determine how the cybersecurity risk compares to the benefit of Internet access at an increased
Finally, a study can be conducted on the increased international regulation of the space
industry, particularly over satellites in LEO that provide internet access. For example, the FCC
serves as the approval authority in the United States for SpaceX to operate Starlink, with various
2020a). Currently, the United Nations oversees five international treaties regarding space
regulation through a specific committee (United Nations Committee on the Peaceful Uses of
Outer Space, 2022). Detailed research can help determine if these treaties provide adequate
coverage for the global industry and make recommendations for change.
Summary
changing the risk profile of internet-connected devices and users in the United States (Cao et al.,
2020; Scanlan et al., 2019). The researcher developed four research questions to address this
problem, with alternative and null hypotheses for each. These research questions focused on
changes in cybersecurity risk for end-users of Starlink, whose primary customer base at the time
of this study was rural populations (Musk, 2020). A risk-based theoretical methodology was
A pre-and post-test design was used on human participants to conduct the research.
Through survey instrumentation, specific questions relating to each research question were
presented. The researcher allowed six months between the pre-and post-test surveys for adequate
121
treatment for each participant. Post-data collection results were analyzed and presented in
Chapter 4 without concluding. It was found that changes did occur to the occurrence rates of
identity theft, data breaches, reputational harm, malware, and virus infection for those who
received the treatment and for the control group who did not. However, these results were
The framework related to the results was analyzed. Additionally, recommendations were
presented for SpaceX for Starlink end-user education and infrastructure threats. Specific areas
for future research were also outlined to expand the body of knowledge within this field.
122
REFERENCES
Agrafiotis, I., Nurse, J., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-
harms: Defining the impacts of cyber-attacks and understanding how they propagate.
Ahrens, F. (2003, April 10). News corp. to buy Hughes, DirecTV. The Washington Post.
https://www.washingtonpost.com/archive/business/2003/04/10/news-corp-to-buy-
hughes-directv/19a71119-fd61-4e14-8613-c17ed45d1624/
Alenezi, M., Alabdulrazzaq, H., Alshaher, A., & Alkharang, M. (2020). Evolution of malware
Amazon. (2022). Annual reports, proxies and shareholder letters. Retrieved October 26, 2022,
from https://ir.aboutamazon.com/annual-reports-proxies-and-shareholder-
letters/default.aspx
Berlocher, G. (2009, September 1). Minimizing latency in satellite networks. Via Satellite.
https://www.satellitetoday.com/telecom/2009/09/01/minimizing-latency-in-satellite-
networks/
123
Blake, T. (2021, June 21). Comparing cybersecurity frameworks. Technology News and
Information. https://seniordba.wordpress.com/2021/06/21/comparing-cybersecurity-
frameworks/
Bonnor, N. (2012). A brief history of global navigation satellite systems. The Journal of
Brinkman, W., Haggan, D., & Troutman, W. (1997). A history of the invention of the transistor
and where it will lead us. IEEE Journal of Solid-State Circuits, 32(12), 1858–1865.
https://doi.org/10.1109/4.643644
Brito, T., Celestino, C., & Moraes, R. (2013). A brief scenario about the “space pollution”
http://dx.doi.org/10.1088/1742-6596/465/1/012020
Brodkin, J. (2018, November 16). FCC tells SpaceX it can deploy up to 11,943 broadband
gets-fcc-approval-for-7500-more-broadband-satellites/
Brown, S. (1960). Project SCORE: Signal communication by orbiting relay equipment. IRE
mil.1960.5008219
Brown, S., & Senn, G. (1960). Project SCORE. Proceedings of the IRE, 48(4), 624–630.
https://doi.org/10.1109/jrproc.1960.287438
Bugcrowd. (2022, March 1). SpaceX’s bug bounty program. Retrieved October 26, 2022, from
https://bugcrowd.com/spacex
124
Burnes, D., DeLiema, M., & Langton, L. (2020). Risk and protective factors of identity theft
https://doi.org/10.1016/j.pmedr.2020.101058
Campbell-Kelly, M., & Garcia-Swartz, D. (2013). The history of the Internet: The missing
https://doi.org/10.1057/jit.2013.4
Cao, H., Wu, L., Chen, Y., Su, Y., Lei, Z., & Zhao, C. (2020). Analysis on the security of
satellite Internet [Paper presentation]. China Cyber Security Annual Conference 2020,
Beijing, China.
Center for Strategic and International Studies. (2022). Significant cyber incidents. Retrieved
program/significant-cyber-incidents
Cerf, V. (2019). In debt to the NSF. Communications of the ACM, 62(4), 5–5.
https://doi.org/10.1145/3313989
Cerf, V., Dalal, Y., & Sunshine, C. (1974). RFC 675, Specification of Internet transmission
Chiba, Y. (2012). A simple method for sensitivity analysis of unmeasured confounding. Journal
https://doi.org/10.4018/jte.2011040104
Committee on Government Reform. (2001). What can be done to reduce the threats posed by
https://www.govinfo.gov/content/pkg/CHRG-107hhrg80480/html/CHRG-
107hhrg80480.htm
https://www.govinfo.gov/content/pkg/CHRG-112hhrg72895/html/CHRG-
112hhrg72895.htm
Conrath, C. (2004, February 19). Canadian firms take on Mydoom. Network World Canada.
https://www.itworldcanada.com/article/canadian-firms-take-on-mydoom/14961
Cooper, M. (2019). GPS: The roots of its making and history. ITNOW, 61(2), 20–21.
https://doi.org/10.1093/itnow/bwz037
Creswell, J. (2014). Research design: Qualitative, quantitative, and mixed methods approaches
Creswell, J. W., & Creswell, J. D. (2018). Research design: Qualitative, quantitative, and mixed
Creswell, J., & Guetterman, T. (2018). Educational research: Planning, conducting, and
Cybersecurity & Infrastructure Security Agency. (2020, June 30). Securing network
https://www.cisa.gov/uscert/ncas/tips/ST18-001
information-security-modernization-act
126
Daehnick, C., Maritz, B., Wiseman, B., & Klinghoffer, I. (2020, May 04). Large LEO satellite
https://www.mckinsey.com/industries/aerospace-and-defense/our-insights/large-leo-
satellite-constellations-will-it-be-different-this-time
Dainow, E. (2017). A concise history of computers, smartphones, and the Internet. CreateSpace
Dimitrov, D., & Rumrill, P., Jr. (2003). Pretest-posttest designs and measurement of change.
Dinger, M., & Wade, J. T. (2019). The strategic problem of information security and data
NASA. https://www.nasa.gov/audience/forstudents/k-4/stories/nasa-knows/what-is-a-
satellite-k4.html
economy/faqs/
Evans, B., Thompson, P., Corazza, G., Vanelli-Coralli, A., & Candreva, E. (2011). 1945–2010:
65 years of satellite history from early visions to latest missions. Proceedings of the
Falco, G. (2018). The vacuum of space cyber security [Paper presentation]. 2018 AIAA Space
Federal Bureau of Investigation. (2018, November 2). The Morris worm. Retrieved October 27,
attack-on-internet-110218
https://pdf.ic3.gov/2019_IC3Report.pdf
Federal Bureau of Investigation. (n.d.). Common scams and crimes. Retrieved October 27, 2022,
from https://www.fbi.gov/scams-and-safety/common-scams-and-crimes
Federal Communications Commission (2015, February 4). 2015 broadband progress report.
https://www.fcc.gov/reports-research/reports/broadband-progress-reports/2015-
broadband-progress-report
Federal Communications Commission. (2010). FCC 10-201: In the matter of preserving the
https://apps.fcc.gov/edocs_public/attachmatch/FCC-10-201A1.pdf
https://apps.fcc.gov/oetcf/eas/reports/ViewExhibitReport.cfm?mode=Exhibits&RequestT
imeout=500&calledFromFrame=N&application_id=tiQ8pAYT94LcLqmvDwsh8A%3D
%3D&fcc_id=2AWHPR201
Federal Communications Commission. (2020, December 7). Successful rural digital opportunity
fund auction to expand broadband to over 10 million rural Americans [Press release].
https://docs.fcc.gov/public/attachments/DOC-368588A1.pdf
https://ecfsapi.fcc.gov/file/10208168836021/FBA_LEO_RDOF_Assessment_Final_Repo
rt_20210208.pdf
128
https://www.fcc.gov/reports-research/reports/broadband-progress-reports/fourteenth-
broadband-deployment-report
https://ecfsapi.fcc.gov/file/1020316268311/Starlink%20Services%20LLC%20Applicatio
n%20for%20ETC%20Designation.pdf
reconsideration. https://docs.fcc.gov/public/attachments/FCC-21-48A1.pdf
Federal Communications Commission. (2022). Application for fixed satellite service by SpaceX
Foust, J., & Berger, B. (2022, March 5). SpaceX shifts resources to cybersecurity to address
cybersecurity-to-address-starlink-jamming/
Garber, L. (1999). Melissa virus creates a new type of threat. Computer, 32(6), 16–19.
https://doi.org/10.1109/mc.1999.769438
https://www.nasa.gov/content/goddard/hubble-timeline-full-text
Garrity, J., & Husar, A. (2021). Digital connectivity and low earth orbit satellite constellations:
https://www.gartner.com/en/information-technology/glossary
Geers, K. (2011). Strategic cyber security. NATO Cooperative Cyber Defence Centre of
Excellence Publications.
Gerencer, T. (2020, November 4). The top 10 worst computer viruses in history. HP.
https://www.hp.com/us-en/shop/tech-takes/top-ten-worst-computer-viruses-in-history
Gilroy, A., & Kruger, L. (2006). Broadband Internet regulation and access: Background and
https://www.everycrsreport.com/files/20060126_IB10045_34fdbf70cdd3e1861f15cd4a3e
5c7f6d26539c7b.pdf
Grabosky, P. (2006). Editor’s introduction. Crime, Law and Social Change, 46, 185–187.
https://doi.org/10.1007/s10611-007-9062-8
Gupta, C., & Kumar, D. (2020). Identity theft: A small step towards big financial crimes. Journal
Hamilton, L. (2017). Let me tell you who I am: Establishing a federal remedy for interference
Hofer-Schmitz, K., Kleb, U., & Stojanovic, B. (2021). The influences of feature sets on the
https://doi.org/10.3390/electronics10060704
Homeland Security. (2021, August 08). What is personally identifiable information? [Video].
https://www.dhs.gov/privacy-training/what-personally-identifiable-information
https://www.proquest.com/openview/1b8585c293a3531bddee852acb9e7877/1.pdf?pq-
origsite=gscholar&cbl=40767
130
Hughes Corporate (n.d.). About Hughes. Retrieved October 27, 2022, from
https://www.hughes.com/about
Hughes-Lartey, K., Li, M., Botchey, F., & Qin, Z. (2021). Human factor, a critical weak point in
https://doi.org/10.1016/j.heliyon.2021.e06522
Hung, W. (2021, May 13). SpaceX is in search for more Taiwanese suppliers. TechTaiwan.
https://techtaiwan.com/20210513/spacex-taiwanese-suppliers/
Identity Theft Resource Center. (2022). Breach trends. Retrieved October 27, 2022, from
https://notified.idtheftcenter.org/s/
Information Commissioner’s Office. (n.d.). Personal data breaches. Retrieved October 27, 2022,
from https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-
data-protection-regulation-gdpr/personal-data-breaches/#whatisa
International Astronomical Union. (2020). Satellite constellations. Retrieved October 27, 2022,
from https://www.iau.org/public/themes/satellite-constellations/#introduction
International Organization for Standardization. (2018). ISO 31000: 2018. Retrieved October 27,
https://doi.org/10.1177/160940690900800406
131
Janjarasjit, S., & Chan, S. (2021). Reaction of users as potential victims of information security
10.1108/ICS-07-2020-0118
Jensen, E., Jones, N., Rabe, M., Pratt, B., Medina, L., Orozco, K., & Spell, L. (2021, August 12).
The chance that two people chosen at random are of different race or ethnicity groups has
increased since 2010. United States Census Bureau. Retrieved October 27, 2022, from
https://www.census.gov/library/stories/2021/08/2020-united-states-population-more-
racially-ethnically-diverse-than-2010.html
Kaspersky. (2021, May 26). Turla hiding in the sky: Russian speaking cyberespionage group
exploits satellites to reach the ultimate level of anonymity Retrieved October 27, 2022,
from https://www.kaspersky.com/about/press-releases/2015_turla-hiding-in-the-sky-
russian-speaking-cyberespionage-group-exploits-satellites-to-reach-the-ultimate-level-of-
anonymity
Kim, J., & Choi, I. (2021). Choosing the level of significance: A decision‐theoretic
Koumartzis, N., & Veglis, A. (2011, June 28–July 1). On the pursue for a fair Internet
by the Internet users [Paper presentation]. 2011 IEEE Symposium on Computers and
Le Doan, D., Amyotte, E., Mok, C., & Uher, J. (2004, July). Anik-F2 Ka-band transmit
Technology and Applied Electromagnetics and URSI Conference, Ottawa, ON, Canada.
132
http://webarchive.loc.gov/all/20040623205930/http://www.cecc.gov/pages/virtualAcad/e
xp/explaws.php
Los Angeles Business Journal (2005, November 9). DirecTV sells Hughes stake to SkyTerra.
https://labusinessjournal.com/news/2005/nov/10/directv-sells-hughes-stake-to-skyterra/
Ludvigsen, M., Hall, E., Meyer, G., Fegran, L., Aagaard, H., & Uhrenfeldt, L. (2016). Using
https://doi.org/10.1177%2F1049732315576493
Luminita, H., Mihai, N. Cristina, M., & Marin, T. (2022). Cost-benefit analysis (cba)-key factor
Lundgren, B., & Möller, N. (2019). Defining information security. Science and Engineering
Maitlo, A., Ameen, N., Peikari, H. R., & Shah, M. (2019). Preventing identity theft: Identifying
Manulis, M., Bridges, C., Harrison, R., Sekar, V., & Davis, A. (2021). Cyber security in new
https://doi.org/10.1007/s10207-020-00503-w
133
McGlade, D. (2010). Commercial operators partnering with the military to meet global
https://www.afspc.af.mil/Portals/3/documents/HF/AFD-100226-085.pdf
Meinel, C., & Sack, H. (2014). Digital communication: Communication, multimedia, security
https://about.facebook.com/technologies/facebook-app/
Metcalfe, R., & Boggs, D. (1976). Ethernet: Distributed packet switching for local computer
https://doi.org/10.1145/360248.360253
Publications.
Miller, A. (2021, Nov 30). Satellite internet latency: What's the big deal? Viasat. Retrieved
latency-whats-the-big-deal/
Musk, E. (2020, March 9-12). Keynote presentation. Satellite 2020, Washington DC, United
States.
Musk, E. [@Elonmusk]. (2019, May 11). First 60 @SpaceX starlink satellites loaded into
https://twitter.com/elonmusk/status/1127388838362378241
NASA. (2002). Switchboard in the sky. Retrieved October 27, 2022, from
https://www.nasa.gov/centers/glenn/about/fs13grc.html
134
https://www.nasa.gov/exploration/whyweexplore/Why_We_29.html
National Institute of Standards and Technology. (2018). Getting started. Retrieved October 27,
https://csrc.nist.gov/glossary
National Research Council. (2013). Landsat and beyond: Sustaining and enhancing the nation’s
National Science Foundation. (2003, August 13). A Brief History of NSF and the Internet..
https://www.nsf.gov/news/news_summ.jsp?cntn_id=103050
Neuman, W. L. (2013). Social research methods: Qualitative and quantitative approaches (7th
Newell, H. (2009). Beyond the atmosphere: Early years of space science. Dover Publications.
OneWeb. (2021, December 27). OneWeb confirms successful launch of 36 satellites, after rapid
successful-launch-of-36-satellites-after-rapid-year-of-progress
Osanloo, A., & Grant, C. (2016). Understanding, selecting, and integrating a theoretical
https://doi.org/10.5929/2014.4.2.9
Pachler, N., del Portillo, I., Crawley, E., & Cameron, B. (2021). An updated comparison of four
low earth orbit satellite constellation systems to provide global broadband [Paper
135
Pannucci, C. & Wilkins, E. (2010). Identifying and avoiding bias in research. Plastic and
Pavur, J. (2020, August 5). Whispers among the stars: Perpetrating (and preventing) satellite
eavesdropping attacks [Conference session]. Black Hat USA, Las Vegas, NV, United
States. https://i.blackhat.com/USA-20/Wednesday/us-20-Pavur-Whispers-Among-The-
Stars-Perpetrating-And-Preventing-Satellite-Eavesdropping-Attacks.pdf
https://doi.org/10.1109/mcom.2010.5434368
Perrin, A., & Duggan, M. (2015). Americans’ Internet access: 2000-2015. Pew Research Center.
https://www.pewresearch.org/internet/2015/06/26/americans-internet-access-2000-2015/
Pope, M., Warkentin, M., Mutchler, L., & Luo, X. (2012). The domain name system—past,
present, and future. Communications of the Association for Information Systems, 30.
https://doi.org/10.17705/1cais.03021
Posadzki, A. (2020, September 22). Internet everywhere, but at a cost: The race for the low-
earth satellite market. The Globe and Mail. Technology. Retrieved October 27, 2022,
from https://www.theglobeandmail.com/business/article-internet-everywhere-but-at-a-
cost-the-race-for-the-low-earth/
Riebeek, H. (2009, September 4). Catalog of earth satellite orbits. NASA Earth Observatory.
https://earthobservatory.nasa.gov/features/OrbitsCatalog#:~:text=Inclination%20is%20th
e%20angle%20of,its%20inclination%20is%2090%20degrees
Rogers, D., Ippolito, L., & Davarian, F. (1997). System requirements for Ka-band earth-satellite
https://doi.org/10.1109/5.598406
Rotzal, P. (2002). X.400 message handling system: The remote user agent [Paper presentation].
10.1109/MILCOM.1995.483504
Rueter, J. (2019, August 13). A brief history of Internet service providers. Viasat. Retrieved
internet-service-providers/
Ryan, J. (2010). From military networks to the global Internet. Reaktion Books.
Ryan, J. (2013). A history of the Internet and the digital future. Reaktion Books.
Saif, U., Chudhary, A. Butt, S., & Butt, N. (2007). Poor man’s broadband: Peer-to-peer dialup
https://doi.org/10.1145/1290168.1290170
https://homeweb.csulb.edu/%7Emsaintg/ppa696/696exper.htm
https://doi.org/10.4135/9781412961288
https://satellitemap.space/?constellation=starlink
Scanlan, J., Styles, J., Lyneham, D., & Lützhöft, M. (2019). New Internet satellite constellations
Seemma, P., Nandini, S., & Sowmiya, M. (2018). Overview of cyber security. International
https://doi.org/10.17148/ijarcee.2018.71127
Seymour, T., & Shaheen, A. (2011). History of wireless communication. Review of Business
Sheetz, M. (2021a, January 29). SpaceX looks to build next-generation Starlink internet satellites
after launching 1,000 so far. CNBC. Retrieved October 27, 2022, from
https://www.cnbc.com/2021/01/28/spacex-plans-next-generation-starlink-satellites-with-
1000-launched.html
Sheetz, M. (2021b, August 3). SpaceX says Starlink has about 90,000 users as the internet
https://www.cnbc.com/2021/08/03/spacex-starlink-satellite-internet-has-about-90000-
users.html
Sheetz, M. (2021c, February 9). Telesat to build a $5 billion global satellite network to bring
https://www.cnbc.com/2021/02/09/telesat-building-5-billion-lightspeed-global-satellite-
internet.html
138
Sheetz, M. (2021d, November 5). In race to provide internet from space, companies ask FCC for
about 38,000 new broadband satellites. CNBC. Retrieved October 27, 2022, from
https://www.cnbc.com/2021/11/05/space-companies-ask-fcc-to-approve-38000-
broadband-satellites.html
Sheetz, M. (2022, January 6). SpaceX’s Starlink Internet service has more than 145,000 users so
starlink-internet-service-has-more-than-145000-users-so-far.html
Shirey, R. (2007). Internet security glossary (Version 2). Internet Engineering Task Force.
https://doi.org/10.17487/RFC4949
Siddiqi, A. (2011). Challenge to Apollo: The Soviet Union and the space race, 1945–1974.
Military Bookshop.
Simon, M., & Goes, J. (2010). Dissertation and scholarly research: Recipes for success.
Slotten, H. R. (2015). International governance, organizational standards, and the first global
http://dx.doi.org/10.1017/S0898030615000214
Solove, D., & Citron, D. (2018). Risk and anxiety: A theory of data-breach harms. Texas Law
https://fcc.report/IBFS/SAT-MOD-20181108-00083/1569860.pdf
Spinello, R. (2021). Corporate data breaches: A moral and legal analysis. Journal of Information
Spurgeon, C. (2000). Ethernet: The definitive guide (1st ed.). O’Reilly Media.
Starlink. (2022). Specifications & Configurations. Retrieved October 27, 2022, from
https://support.starlink.com/topic?category=10
Stein, J. (2021). 2020 data breach report. North Carolina Department of Justice.
https://ncdoj.gov/wp-content/uploads/2021/01/2020-NCDOJ-Data-Breach-Report.pdf
Sturdevant, R. (2014). You are here: From the compass to GPS, the history and future of how we
my-survey-responses-anonymous-and-secure
https://doi.org/10.1109/45.565615
Takei, J., & Murai, J. (2003, January 27–31). Satellite communication on the Internet: Its history
and the technology [Conference Session]. 2003 Symposium on Applications and the
saintw.2003.1210116
Telesat (2020, May 20). Telesat lightspeed. Retrieved October 27, 2022, from
https://www.telesat.com/leo-satellites/
Teodorescu, C. (2022). Perspectives and reviews in the development and evolution of the zero-
https://doi.org/10.24818/issn14531305/26.2.2022.05
140
Terzi, N. (2011). The impact of e-commerce on international trade and employment. Procedia-
https://doi.org/10.1016/j.sbspro.2011.09.010
The Business Research Company. (2021). Low earth orbit (leo) satellites global market report.
(2021). https://www.thebusinessresearchcompany.com/report/low-earth-orbit-leo-
satellites--global-market-report
https://www.esa.int/ESA_Multimedia/Images/2020/03/Low_Earth_orbit
https://www.esa.int/Enabling_Support/Space_Transportation/Types_of_orbits
https://www.esa.int/Applications/Telecommunications_Integrated_Applications/Satellite
_frequency_bands
The United States Department of Justice. (2020). Identity theft. Retrieved October 27, 2022, from
https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud
Theofanidis, D., & Fountouki, A. (2019). Limitations and delimitations in the research process.
methods. International Journal of Modern Education and Computer Science, 11(2), 17–
25. http://dx.doi.org/10.5815/ijmecs.2019.02.03
United Nations Office for Outer Space Affairs (2022). Committee on the Peaceful Uses of Outer
Space. https://www.unoosa.org/oosa/en/ourwork/copuos/index.html
141
United States Census Bureau (2021). 2010 census urban and rural classification and urban area
areas/urban-rural/2010-urban-rural.html
https://www.census.gov/quickfacts/fact/table/US/HCN010212
United States Government Publishing Office (2022). Communications satellite act of 1962, Pub.
76/pdf/STATUTE-76-Pg419.pdf
https://datatracker.ietf.org/doc/html/rfc791
https://datatracker.ietf.org/doc/html/rfc793
https://www.usgs.gov/faqs/what-landsat-satellite-program-and-why-it-important
Vanderweele, T. J., & Arah, O. A. (2011). Bias formulas for sensitivity analysis of unmeasured
42–52. https://doi.org/10.1097/EDE.0b013e3181f74493
Voelsen, D. (2021). Internet from space: How new satellite connections could affect global
https://doi.org/10.18449/2021RP03
142
Wall, M. (2021, November 2). Amazon to launch 1st prototype Internet satellites for Kuiper
satellites-launch-2022
Webb, J. (2015). James Webb, son of Hubble. Engineering & Technology, 10(4), 66–69.
https://doi.org/10.1049/et.2015.0422
https://doi.org/10.1145/1037911.1037912
Wigand, R. (1997). Electronic commerce: Definition, theory, and context. The Information
Wright, J. (2001). International encyclopedia of the social & behavioral sciences. Pergamon
Press.
Xiao, Y., & Watson, M. (2019). Guidance on conducting a systematic literature review. Journal
http://dx.doi.org/10.1177/0739456X17723971
Yen, L. (2002). Satellite communications for the millennium. IEEE Antennas and Propagation
Millennium. 2000 Digest. Held in Conjunction with: USNC/URSI National Radio Science
Yu, W., & Qian, X. (2010, October 22–24). Communication satellite orbit and Iridium satellite
Yue, P., An, J., Zhang, J., Pan, G., Wang, S., Xiao, P., & Hanzo, L. (2022). On the security of
trends. https://doi.org/10.48550/ARXIV.2201.03063
Zhong, F., Chen, Z., Xu, M., Zhang, G., Yu, D., & Cheng, X. (2022). Malware-on-the-brain:
Illuminating malware byte codes with images for malware classification. IEEE
Zou, Y., Roundy, K., Tamersoy A., Shintre, S., Roturier, J., & Schaub, F. (2020, April 25–30).
Examining the adoption and abandonment of security, privacy, and identity theft
org./10.1145/3313831.3376570
144
This work may be used in accordance with the terms of the Creative Commons license
or other rights statement, as indicated in the copyright statement or in the metadata
associated with this work. Unless otherwise specified in the copyright statement
or the metadata, all rights are reserved by the copyright holder.
ProQuest LLC
789 East Eisenhower Parkway
P.O. Box 1346
Ann Arbor, MI 48106 - 1346 USA