Sunday, April 19, 2026

A series of scientists and one general disappeared from the U.S.

 

“The 10 Scientists Who Vanished or Died from 2023-2026: (Top L-R) Steven Garcia, William McCasland, Anthony Chavez, Melissa Casias, Monica Reza, (Bottom L-R) Nuno Loureiro, Carl Grillmair, Michael Hicks, Frank Maiwald, Jason Thomas. “(https://www.ibtimes.co.uk/white-house-investigates-scientist-deaths-disappearances-1792020)

Retired Major General William Neil McCasland, 68, left his Albuquerque home on foot at approximately 11 a.m. February 27 and has not been in contact with family or friends since, the sheriff’s office said in a news release on March 6. He disappeared on February 27,2026. The position of that person was interesting. He was the head of Wright-Patterson Air Force Base research laboratory." (https://edition.cnn.com/2026/03/11/us/retired-air-force-general-fbi-search)

And he oversaw many secretive military projects. And this is why his disappearance is a risk for national security. Sometimes this case is reported as “UFO general disappearance case”. Another interesting thing is this. Another nine scientists who worked in classified projects have disappeared or died since 2023. Those people worked on. Space material research. And other kinds of research projects. Like nuclear weapon research. There is a list of those cases in the attachments. The thing. What makes those cases interesting is that. They had a connection with McCasland. 

So, does the disappearance of McCasland. And those scientists have some connection? And what is that connection? I think. That many people who worked on the military projects knew McCasland. And then we can say. It's a very low probability that those deaths and disappearances are coincidences. The work that people like Monica Reza, who worked with spacecraft materials, did. It can also connect to high-speed hypersonic aircraft. 

Monica Reza worked with a superalloy that should withstand extreme temperatures and pressures. “Monica Reza went missing on the morning of June 22, 2025, in the Angeles National Forest while hiking with two experienced companions who were exploring the popular Mount Waterman Trail, according to a Facebook page dedicated to finding her.” (NY Post). The fact is that. There are many coincidences. And those cases should be solved. The sources, like Newsweek, connected McCasland with the UFO community. So we should ask, are those disappearances some kind of abductions? And is there something that people should not know? 


https://edition.cnn.com/2026/03/11/us/retired-air-force-general-fbi-search


https://www.foxnews.com/politics/missing-general-scientist-deaths-tied-secret-us-work-prompt-white-house-probe


https://www.ibtimes.co.uk/white-house-investigates-scientist-deaths-disappearances-1792020


https://www.independent.co.uk/news/world/americas/william-neil-mccasland-missing-new-mexico-ufos-b2932511.html


https://nationaltoday.com/us/nm/albuquerque/news/2026/04/07/mysterious-disappearances-of-experts-linked-to-ufo-research/


https://www.newsweek.com/who-is-william-neil-mccasland-ex-us-general-linked-to-ufo-research-missing-11609887


https://nypost.com/2026/03/21/us-news/rocket-scientist-with-professional-ties-to-missing-gen-william-mccasland-disappeared-under-similar-circumstances/


Six clicks separate people from each other.



“A long-observed social phenomenon suggests that people across the globe are separated by surprisingly few connections. Credit: Stock” (ScitechDaily, Scientists Prove There Are Just Six Degrees of Separation in a Social Network)

“In a networked world, we are about six steps away from another individual. In the world of the Internet. That means six clicks separate us from any person who uses the internet. This is one of the most incredible ideas. The idea dates back to 1967. Harvard psychologist Stanley Milgram conducted an experiment. He sent letters to random people and then asked them to send those letters to their closest friends. This is a classic chain letter experiment. And of course, Milgram asked. People. Those who participated in that network test wrote their names on that paper. The idea was that Milgram wanted to know how far a random person was from Milgram. Most of those letters never return. But in letters. Those that returned were about five to six names. Before they returned to the hand of Milgram. 

This means that there are approximately six people between members of the same network. This causes an interesting thing about networks. People can be members of the same networks. But they ever. Head of each other. And this causes. The situation that we all know. Some people might say that somebody. That person knows, knows that third-party person, or knows somebody who has that name. Those people don’t necessarily know the person. But they know the name. 




“Milgram concluded from his small-world experiments that any two random people in the United States would be linked by a chain of (on average) six steps.” (Wikipedia, Small-world experiment)

In that image, the balls are people who are not involved in the chain. But those people transmit information to their own networks. The same models are used to track the origins of the epidemics. Or, those models can also be used. To track. Things like drug dealers. When some outside actor transfers information into their own networks. That causes a situation where information spreads to global networks. 

“The small-world experiment comprised several experiments conducted by Stanley Milgram and other researchers examining the average path length for social networks of people in the United States. The research was groundbreaking in that it suggested that human society is a small-world-type network characterized by short path lengths. The experiments are often associated with the phrase "six degrees of separation", although Milgram did not use this term himself.  (Wikipedia, Small-world experiment)

But then. We can think. About the networks and their problem. When we think that we all have two or three good friends, we must understand. A couple of things. In information networks, “friend” is not necessarily. The individual person. The friend is the thing. There, we share information. We all have more than just two relationships. If we think that we are three actors, who tell everything to each other. We forget. We can think that humans have two hands. They might all have two connections. Those two close friends are only one connection. And then we have the connection. None of our three people ring knows. When we share information with those outsiders that causes a situation, that information starts to spread in the network. 

Things like married people can use or look at each other’s Facebook accounts. The “Friend” can also be some group. Like a soccer team discussion forum. If we have two trusted fiends in the information network, we often forget that those fiends also have two trusted friends. But there is a possibility that those people or groups. That we think of as “fiend”. Might not know each other. So we might know those two people. But maybe one or both know some third-party member. This third-party member. Is the thing. That causes information to spread through the network. In the networked world. We don’t know. Who really is the person we see on the net? People can claim. That they are even the Secretary General of the U.N. 

The model. That. Between every user of the net. Cause interesting thoughts. Six clicks. Separate us from the biggest chiefs in the business world. Six clicks separate us from a serial killer. And six clicks separate us from secret agents and drug dealers. This means. That the secret agent, the biggest boss, the serial killer, and the drug dealer. They are always part of our networks. This causes an interesting thought. 



https://scitechdaily.com/scientists-prove-there-are-just-six-degrees-of-separation-in-a-social-network/


https://en.wikipedia.org/wiki/Small-world_experiment


Saturday, April 18, 2026

The new research aims to find the answer to the question: what makes matter mass?




“A new experiment offers intriguing clues about one of physics’ deepest questions: the origin of mass. By probing an exotic, short-lived nuclear state involving a heavy meson, researchers uncovered evidence that particle properties may shift inside dense nuclear matter. Credit: Stock” (ScitechDaily, Where Does Mass Come From? Scientists Find Evidence of a New Exotic Nuclear State)

The mass is one of the biggest mysteries in physics. The question of what constitutes mass is a key element in physics. The mass has a straight connection. With gravity. There is a structure that binds quantum fields. Otherwise, it affects all three other fundamental interactions. When the matter binds quantum fields, the quantum field from outside tries to fill that space. And those fields pull particles and wave movement with them. This causes a situation that. Light can travel faster in a gravitational field than outside that field. This requires that the photon travels. 

To the gravitational center. The speed of light is relative. It’s relative to the speed at which its environment travels. So if the speed of the quantum field is 20 % of the speed of light, that means the photon travels 20 % faster if we compare its speed with the speed of a photon outside the quantum field. Because a photon is inside a quantum field, it travels in a gravitational field. It doesn’t break the laws of physics. When an object falls into a black hole through the event horizon. Its speed. Comparing with the environment is zero. 

When a photon or any other particle escapes from the gravitational field, its speed decreases. The impacting quantum field forms an electromagnetic shadow behind it. So the gravity center pulls energy out of the particle. So when a particle travels to the gravitational center. It will pull energy inside it. But when it escapes from that field, it must deliver as much energy as it got. 

But then. The particle tries to escape from that field. The particle must release or transfer as much energy to the field around it. As the field transitioned into it. When the speed of the field and the particle is precisely the same. The field cannot transfer energy into a particle. That is one of the reasons why nothing can escape from a black hole. The energy transition between particle and field ends. When they travel at the same speed. 



Impression of a photon rocket that could transport people to stars somewhere in the distant future. 

What if the gravitational center suddenly disappears? The particle will not need to deliver the energy that it got when it fell to the gravitational center. 

When a particle tries to escape from a black hole, the quantum field creates a shockwave ahead of it. If a particle tries to stop and turn around, the wave forms at the front of it. Another thing is the quantum shadow behind it. And that shadow pulls energy out of it. When the field travels .To the gravity center. With a speed 20% of the speed of light, the impact speed of the static particle and field is 20% of the speed of light. 

This means that the photon’s speed is 20 % lower if we compare the escaping photon’s speed with the speed of a photon that travels outside the gravity field. The photon can travel faster than other photons when it travels to a gravitational center. So, the photon that escapes from a black hole needs to use as much energy as it had when it traveled to the gravitational center. 

This paradox causes an interesting idea about crossing the speed of light. The speed of light is the cosmic speed limit. But if the fields travel to the gravitational center. With a speed. That is about 30% of the speed of light. And the speed of the hypothetical craft. It is about 75-80% of the speed of light; there is a possibility. The craft detonates the gravitational center. This means that the gravitational effect disappears. And that thing removes the need to deliver energy for escaping the gravity center. 

The explosion forms the impacting field. That speed is near the speed of light. And that causes a situation where the impact speed with craft and field is higher than the speed of light. 

Gravitation pulls objects. Like a river pulls woods and other things with it. There is a theory. That. There is a tornado-shaped structure or a small black hole in the middle of each particle. This means that particles are the halos of the quantum-sized black holes. The thing that makes those theories interesting is that reseachers in Brookhaven National Laboratories created quarks by colliding composite particles called hyperons. 

Those impacts formed quark-antiquark pairs. And the Brookhaven staff. Can detect those particle-antiparticle pairs from debris. Those collisions formed. The thing is that hyperons form quark-antiquark pairs when. It decays into two particles. The spin of those particles is opposite. And that makes them particle-antiparticle pairs. The effect that forms matter straight from energy. Or wave movement called the Schwinger effect. 

Colliding quantum fields form the whirl that starts to condense. That whirl forms in the borders of those impacting fields. The question is, what stabilizes those whirls or balls? The thing that stabilizes them is the thing that gives mass to matter. The matter is a condensed quantum field. But what condenses it? And what binds quantum fields in matter? 

Quantum fields are the common name for the four fundamental interactions. The time dilation and its connection. Mass and gravitation are well-known. The reason for that is that gravitation condenses quantum fields. And that thing slows the particle’s evaporation. Condensed quantum fields are the result, not the reason, for something that binds those fields. This means that gravitation interacts similarly with all other fundamental interactions. And that makes mass and gravitation interesting things. 


https://interestingengineering.com/science/scientists-observe-particles-emerging-from-nothing


https://scitechdaily.com/where-does-mass-come-from-scientists-find-evidence-of-a-new-exotic-nuclear-state/


Friday, April 17, 2026

Quantum-dot-based cryptography. Brings. Quantum internet. Closer than ever before.



"Cover highlight of the experiment. Single photons emitted by a quantum dot embedded in a photonic device are coupled into a fiber and encoded by ‘Alice’ into three distinct time-bin qubits. After ‘Bob’ performs the decryption, a sequence of quantum keys is shared between the users. Credit: Credit: Light: Science & Applications (2026). DOI: 10.1038/s41377-026-02205-9. Quantum dot–based time-bin QKD achieves stable, long-distance secure communication with practical performance. (ScitechDaily, Quantum Breakthrough: Unhackable Keys Sent Over 120 km Using Quantum Dots)

Researchers transmitted a quantum key over 120 kilometers by using quantum dots. This is a remarkable thing. The unbreakable internet is becoming a reality. In quantum-dot-based systems, the system uses a tool. That is like a pixel camera. The receiving pixel is against the transmitting pixel.

And the transmitting side can be the net of the nano-lasers. In quantum cryptography, the system encodes information into a physical object. In a quantum dot-based transmitter, the transmitter is like a computer screen, but the regular image pixels are replaced with nanolasers. 

When a quantum dot-based system transmits information. It can transmit it. As in the shape of a certain image. The image can be anything. The laser beams transmit that image to the receiver. This is one of the things that the system could do. The system. It can use different radiation frequencies. Like UV, infrared, and visible light. 

Or, even X-rays. The system can use photonic solutions. Their information is stored in a single photon. Optical systems are very hard to break by using eavesdropping. The quantum system could also use coherent radio waves. Or it can use coherent acoustic waves. 

The message can be shared over multiple frequencies. The system can also use spectroscopy as the encryption tool. The system can send an image of the object. But also the spectral image of the elements that form the object. This gives depth to the encryption. The key is the weakest point in the encryption. If the eavesdropper gets the key. That actor can open messages without permission. In quantum dot-based optical encryption. The eavesdropper must cut the laser beam. 

That changes the geometry of the information. And the system detects that thing. The quantum dot-based communication can also use this method. That information. Or. The TCP/IP protocol. Data packages are shared between different communication lines. Then the system sends them. At the same time. Or it can change the data channel all the time. So, when the laser transmits critical information, the other beams can transmit unnecessary data. And the eavesdropper must find the beam that sends important data from meaningless data. 

There is a possibility. Of using the so-called switched order to exchange keys. In that system, the system that normally receives information sends the key. The BizTalk goes like this: Transmitter: “Are you ready”? The receiver: “Yes. Here is the key”. 

In some versions, there is a third party, the encryption system, or keyholder , that shares keys. To the communication system. The BizTalk begins like this: “We (System 1 and System 2) want to talk, and we need the key”. Then, the third party in the system shares the key with those participants. In that case, the third party is the keyholder. That uses different communication lines than the system that shares other information. 

When the system uses quantum encryption, the problem is with the quantum keys. The system must get the quantum key to the receiver. There is a possibility. The system uses pre-installed keys. In this version, the courier transports the USB stick. That involves the key to the receiver. The system can use numbered images as the encryption keys. There are multiple ways to secure the key. 

The system can use a method. The number of images that it uses will be sent from the receiver. The system involves trillions of keys. And then it selects which keys it uses. On a certain day. The selector can be the receiver. There are multiple ways to encode those numbers. One is that the system must send those numbers at a certain time. And it can use a series of marks. There, the opponent picks only remarkable numbers. Those numbers can be replaced by letters. Or some other marks. 


https://scitechdaily.com/quantum-breakthrough-unhackable-keys-sent-over-120-km-using-quantum-dots/


Some people are concerned about the Claude Mythos program.


The “Mythos” is Anthropic Corporation’s most powerful tool. The tool is an AI-based vulnerability testing tool. The tool is created for “Project Glasswing”. Whose purpose is to develop new tools to map vulnerabilities in systems. The problem with that project is that all vulnerability testing tools are suitable for hacking. One of the things that disturbs people is that Anthropic didn’t offer its AI to the public. 

“So rather than make it widely available to Claude users, Anthropic gave 12 tech companies access via Project Glasswing, which it described as "an effort to secure the world's most critical software". (BBC)

This means that 12 companies can have access to all data on the net. 

Vulnerability testing is vital for the systems that should be protected against hackers. The Mythos tool is not public. And I think that the users must be accepted. For the user, by using some special methods. The main problem is that hackers will not tell people that they are hackers. They might look like regular vulnerability testers.

But those people can act as real attackers. The problem with hackers is that they can look like normal people. And they can use these kinds of tools to prepare. Or make cyber attacks. In the best scenarios. Those hackers can use a firm to order those hacking tools for them. Because some firm pays the bill. The hacker’s identity is not uncovered. 

“Ciaran Martin, former head of the UK's National Cyber Security Centre, told the BBC earlier this week the claim Mythos could unearth critical vulnerabilities much more quickly than other AI models had "really shaken people". (BBC)

"The second thing is that even with existing weaknesses that we know about, but organizations might not have patched against, might not be well defended against, it's just a really good hacker." He said.” (BBC)

The main problem is this: only good hackers can find the weaknesses that other hackers can use. The same programs that uncover malware. Can turn into malware testers. Hackers can use those tools to test their code against firewalls and virus scanners. The AI is a tool that can detect vulnerabilities faster than ever before. The vulnerability means. The hackers can use vulnerabilities only. If they know about them. And if hackers know some kind of vulnerability before the “good guys”. That can open up lots of data to bad boys. Some people believe and fear. The AI development. Turns so fast that nobody can control it. 


https://www.anthropic.com/glasswing


https://www.armorcode.com/blog/anthropics-claude-mythos-and-what-it-means-for-security


https://www.bbc.com/news/articles/crk1py1jgzko


https://www.forbes.com/sites/jonmarkman/2026/04/08/what-is-claude-mythos-and-why-anthropic-wont-let-anyone-use-it/

Thursday, April 16, 2026

Quantum dot-based technology can be a new tool against stealth technology.


“Artistic rendering of scanning-exciton optical nanoscopy (SEON) showing correlative dual-parameter mapping of light-field intensity and local density of optical states (LDOS) on a single gold nanoparticle (right), a plasmonic trimer consisting of three nearly-touching gold nanoparticles (left), and a waveguide-interfaced photonic crystal nanocavity (middle). The light-field intensity and LDOS distributions are shown in red and blue colormaps, respectively. Credit: Xue-Wen Chen et al.” (ScitechDaily,Scientists Break Optical Limits With Quantum Dot-Powered Nanoscopy)

Quantum radar. It can be two-layer graphene. The system puts quantum entanglement between particles that are locked in those squares. The system should use particle pairs. In transmitting particle pairs. The outer particle is at a lower energy level. That particle transmits signals. And in receiving a particle pair, the outer particle is in the lower energy size, which allows it to transport information into the system. That kind of quantum dot-based technology can break the stealth material. In that system, the frame spins, and that makes it possible to create. The scanning Doppler radar.  

In some other versions, the system uses a cut nanotube. The nanotube forms the crown-shaped structure. And in the middle of the nanotube is the antenna that transmits. The nanotube spins around that antenna. And that allows it to create the nanotechnical Doppler radar. The main problem. With Doppler radars. The antenna must move. 

So. That it can work right. The reason for that is this. The same antenna cannot transmit. And receive at the same time. The moving antenna makes it possible. That. The angle of the receiving antenna changes. This makes it possible. To determine the location of the point where signals reflect. Normally, the radar has a light parabolic shape, which makes it possible to determine the distance to objects. Another version. It is easier to use the change of frequency when the object comes straight to the radar. 





“DTU researchers have invented a nanolaser constructed in a semiconductor membrane that causes electrons and light to gather in a small area (blue shadow). By using light instead of electrical signals on microchips, data speed can be increased and energy loss reduced. Credit: Yi Yu” (ScitechDaily, Scientists Create Tiny “Nanolaser” That Could Revolutionize Future Computers)

Those transmitter-receiver antenna pairs can have an adjustable angle. This allows them to measure distance to the target. Very accurately. In those cases, the other antennas can send plus, and the other transmitter antennas can send A minus mark. Radio signals. Those signals form an electric arc to the target. 

This is important when something comes. Straight ahead to radar. The quantum dot-based radar can also use moving structures. 

Sometimes it’s discussed. About the possibility of using things like helium atoms as quantum radars. The atom’s core acts as a transmitter. And electrons act as a receiver. The system can also use things like excitons. The hole acts as a receiver. And the electron. Which orbits the hole act as a transmitter. Those exciton-based systems are already in use. 

In the laser-based systems. They can use the one-pixel scanner. And the nano-lasers. Those one-pixel systems can be in a frame that spins around the laser. 

The new nanotechnical lasers can act as pairs with the pixels that can receive the reflection. The laser. It can have a frame. Those receiving pixels are in that frame. As a circle. This makes it possible to create optical lidar (”laser radar”) that can scan surfaces and operate over longer distances. 


https://scitechdaily.com/scientists-break-optical-limits-with-quantum-dot-powered-nanoscopy/


https://scitechdaily.com/scientists-create-tiny-nanolaser-that-could-revolutionize-future-computers/


https://en.wikipedia.org/wiki/Doppler_radar


https://en.wikipedia.org/wiki/Exciton

Monday, April 13, 2026

Could the CIA really have a sensor? That sees. A human heartbeat from 40 kilometers?



Could the quantum sensor called Ghost Murmur be real? And if it's real, could it make the TRV technical remote view possible? The answer is “yes” if that sensor is true. And it could use. The magnetic field interacts with the brain. And the brain’s electric activity. To register human thoughts. The AI decodes the EEG that the system captures. The media claimed that the fallen U.S. F-15 weapons officer was found by Iran using the mysterious Ghost Murmur sensor. The media reports that this sensor could read a human heartbeat. From a distance of 40 km. It’s possible that this sensor is disinformation.

And there is. Of course. A possibility. That. The pilot used some wearable technology. Like implanted microchips. Or simply. Some kind. An intelligent watch for location. But. If that quantum sensor is real. And it uses the EKG, which means the same system. It can. Someday, read even thoughts by observing EM fields around human brains. There is also a possibility that. This kind. Of a quantum system. It can someday transmit information into the human nervous system. The idea is that. Those systems inject information into the nervous system, benefiting the electrical activity in the brain. 

The fact is that the system could be some kind of quantum radar. Those systems can be very accurate, and perhaps they could detect the heart's electrical activity from a great distance. Another version is that this sensor could detect the heartbeat by following the acoustic waves from the target’s chest. Another version could be more traditional. The system could track the signals from the implanted microchip. Those microchips could be really flat. And installed at the points, they are almost undetected. 




Those microchips could also be GPS systems that are in the nasal cavity. It’s possible that the code from the jet fighter’s radar or from satellites can activate those sensors, which can communicate with GPS or even with a cell phone. Those sensors can be really flat. And they can be put on the skull. Of the person. That allows them to observe electric activity in the brains all the time. 

But if Ghost Murmur is real, and it's the quantum sensor that can observe interactions between brains. And their interaction with the quantum fields. Around the brain, we can say that the next stage is. It could be the system that can read thoughts from a long distance. Researchers think. That consciousness is far more than brains. The idea is that the electric activity in the brain causes interaction between quantum fields around it. 

This thing can make it possible. Quantum systems. They can detect and decode the EEG by using those quantum fields. This allows for remote mind reading. Electric activity in the brain. Causes interaction between the brains and quantum fields, mostly electromagnetic fields. There is a possibility that if the sensor is sufficiently accurate, it could detect those changes. 

But it could also make it possible to transmit data straight to the nervous system from a long distance. We know that this kind of technology fascinates people. Technical remote view. Without any implanted systems, these would be the most fundamental and dangerous ideas in the world. Technical remote view TRV bases the systems that can read EEG from a long distance. The sensor. It can be the microchip group on the skull. Or. It can be the Brain-Computer Interface. The AI can translate the EEG that the radar captures into images, and thoughts that the computer can introduce on the screen.  


https://finance.yahoo.com/sectors/technology/articles/ghost-murmur-lockheeds-quantum-heartbeat-113109106.html


https://militarymachine.com/ghost-murmur-cia-quantum-heartbeat-detection


https://scitechdaily.com/epic-brain-showdown-reveals-surprising-origins-of-human-consciousness/


https://scitechdaily.com/this-powerful-new-brain-tool-could-tell-us-how-consciousness-works/


https://scitechdaily.com/what-if-consciousness-exists-beyond-your-brain/


https://www.sofx.com/cia-deploys-ghost-murmur-quantum-sensor-to-track-airmans-heartbeat-in-iran-rescue/



A series of scientists and one general disappeared from the U.S.

  “The 10 Scientists Who Vanished or Died from 2023-2026: (Top L-R) Steven Garcia, William McCasland, Anthony Chavez, Melissa Casias, Monica...