Wednesday, April 22, 2026

Drones can be more powerful than anybody expected.



All technical systems are entire. The manufacturing process and guidance systems are things that require small. And effective microchips. High-power, small-size, low-voltage microchips allow drones to run more complex algorithms than ever before. This is one of the things that causes grey hair for defenders. Even small-sized drones may have semi-active targeting systems. The idea is that the controller aims the camera at the target. And gives the attack order. 

After that, the drone locks its seeker to the target. This system can improve the optical-wire drone’s attack capacity. The operator can keep the wire connected to the drone. And then use its target camera to point at the target. Then the image recognition system locks the system and cuts the wire. The AI-based system can help drones avoid the fire. 

And attacks it. We can see that the use of drones is very versatile. The MQ-9 “Reaper” drones faced massive losses in Iran during operation “Epic Fury”. 24 of those drones are lost. That can mean. The MQ-9 has a mission. To pull enemy fire into them. And then stealth aircraft or some other systems attack those AA batteries. When the AA crew sees the MQ-9, there is no other possibility than to shoot. If Reaper sees the AA cannon and shoots its missile, the target will be eliminated. 

But this means that the next generation of drones is coming. Those drones are stealthy and far smaller than MQ-9. Or. Otherwise, they can be faster than MQ-9. That planned to operate in the airspace. Where there is no enemy fire. The slow. Push-propelled MQ-9 lacks stealth capacity. And that makes it vulnerable. Things like Chinese inventions that can generate electricity for small drones. It can make it possible. To create plasma-jet engine-based systems. They are very fast, small, low-cost, and easy to make. 







Geran-3




MQ-9 Reaper




U.S. Aircraft losses in operation “Epic Fury”. (TWZ)


One way to improve. The range of a drone is. To connect it to another drone.  The big drone can pull a smaller drone. But another thing is that. Things like solar-powered stealth drones can carry smaller strike drones to strike distances. Electric-powered solar-powered drones can have theoretically unlimited operational range. The only thing that limits those systems is the need for light. But remote charging systems can solve that problem. The small electric-powered drone. It can also use rocket auxiliary engines. When the drone is at the right distance, the system launches a rocket engine. That accelerates its speed. 

Those small drones can act. Like a bullet swarm. The shape of those systems can be similar to Geran-3, which uses jet engines. The Geran-3 can attack both airborne and ground targets from a very long distance. And we must remember that the Ukrainian operator hit the Shahed-drones in airspace that is 500 km from Ukraine. The thing is that. The new systems. That can include an after-burner using AI-boosted drones. 

Or a plasma jet engine using systems that can operate over very long distances can turn the drone war into the next generation. Fast-flying drones can hunt enemy planes and ground targets over long distances. And that means those systems can stalk aircraft near airfields. And when aircraft are ready to lift off. Or in the landing procedure, those drones can attack. 

The drone can affect the target itself. Or it can use things. Like GPS transmitters to the decks of warships. They can also drop those GPS locators in the ammo supplies. The drone itself can glue those transmitters to the point where they are invisible. The system. It can be a radio transmitter that helps munitions home to the target. This means that drones can be more dangerous than anyone expected. A drone can also drop things like eavesdropping tools to the enemy HQ. 




https://www.thebrighterside.news/post/next-generation-jet-engine-converts-electricity-directly-into-thrust/


https://defensemirror.com/news/39493/Russia_s_Geran_3_Jet_Powered_Kamikaze_Drone_Ready_for_Operations


https://interestingengineering.com/military/china-microwave-beam-recharges-drones


https://www.sustainability-times.com/research/the-end-of-jet-fuel-next-generation-engine-uses-electricity-alone-to-generate-thrust-in-historic-aerospace-breakthrough/


https://www.twz.com/air/operation-epic-fury-u-s-aircraft-losses-visualized


https://www.wionews.com/world/ukraine-claims-it-destroyed-russian-drones-from-distance-of-500-km-a-record-in-long-range-drone-warfare-1776759639898


Sunday, April 19, 2026

A series of scientists and one general disappeared from the U.S.

 

“The 10 Scientists Who Vanished or Died from 2023-2026: (Top L-R) Steven Garcia, William McCasland, Anthony Chavez, Melissa Casias, Monica Reza, (Bottom L-R) Nuno Loureiro, Carl Grillmair, Michael Hicks, Frank Maiwald, Jason Thomas. “(https://www.ibtimes.co.uk/white-house-investigates-scientist-deaths-disappearances-1792020)

Retired Major General William Neil McCasland, 68, left his Albuquerque home on foot at approximately 11 a.m. February 27 and has not been in contact with family or friends since, the sheriff’s office said in a news release on March 6. He disappeared on February 27,2026. The position of that person was interesting. He was the head of Wright-Patterson Air Force Base research laboratory." (https://edition.cnn.com/2026/03/11/us/retired-air-force-general-fbi-search)

And he oversaw many secretive military projects. And this is why his disappearance is a risk for national security. Sometimes this case is reported as “UFO general disappearance case”. Another interesting thing is this. Another nine scientists who worked in classified projects have disappeared or died since 2023. Those people worked on. Space material research. And other kinds of research projects. Like nuclear weapon research. There is a list of those cases in the attachments. The thing. What makes those cases interesting is that. They had a connection with McCasland. 

So, does the disappearance of McCasland. And those scientists have some connection? And what is that connection? I think. That many people who worked on the military projects knew McCasland. And then we can say. It's a very low probability that those deaths and disappearances are coincidences. The work that people like Monica Reza, who worked with spacecraft materials, did. It can also connect to high-speed hypersonic aircraft. 

Monica Reza worked with a superalloy that should withstand extreme temperatures and pressures. “Monica Reza went missing on the morning of June 22, 2025, in the Angeles National Forest while hiking with two experienced companions who were exploring the popular Mount Waterman Trail, according to a Facebook page dedicated to finding her.” (NY Post). The fact is that. There are many coincidences. And those cases should be solved. The sources, like Newsweek, connected McCasland with the UFO community. So we should ask, are those disappearances some kind of abductions? And is there something that people should not know? 


https://edition.cnn.com/2026/03/11/us/retired-air-force-general-fbi-search


https://www.foxnews.com/politics/missing-general-scientist-deaths-tied-secret-us-work-prompt-white-house-probe


https://www.ibtimes.co.uk/white-house-investigates-scientist-deaths-disappearances-1792020


https://www.independent.co.uk/news/world/americas/william-neil-mccasland-missing-new-mexico-ufos-b2932511.html


https://nationaltoday.com/us/nm/albuquerque/news/2026/04/07/mysterious-disappearances-of-experts-linked-to-ufo-research/


https://www.newsweek.com/who-is-william-neil-mccasland-ex-us-general-linked-to-ufo-research-missing-11609887


https://nypost.com/2026/03/21/us-news/rocket-scientist-with-professional-ties-to-missing-gen-william-mccasland-disappeared-under-similar-circumstances/


Six clicks separate people from each other.



“A long-observed social phenomenon suggests that people across the globe are separated by surprisingly few connections. Credit: Stock” (ScitechDaily, Scientists Prove There Are Just Six Degrees of Separation in a Social Network)

“In a networked world, we are about six steps away from another individual. In the world of the Internet. That means six clicks separate us from any person who uses the internet. This is one of the most incredible ideas. The idea dates back to 1967. Harvard psychologist Stanley Milgram conducted an experiment. He sent letters to random people and then asked them to send those letters to their closest friends. This is a classic chain letter experiment. And of course, Milgram asked. People. Those who participated in that network test wrote their names on that paper. The idea was that Milgram wanted to know how far a random person was from Milgram. Most of those letters never return. But in letters. Those that returned were about five to six names. Before they returned to the hand of Milgram. 

This means that there are approximately six people between members of the same network. This causes an interesting thing about networks. People can be members of the same networks. But they ever. Head of each other. And this causes. The situation that we all know. Some people might say that somebody. That person knows, knows that third-party person, or knows somebody who has that name. Those people don’t necessarily know the person. But they know the name. 




“Milgram concluded from his small-world experiments that any two random people in the United States would be linked by a chain of (on average) six steps.” (Wikipedia, Small-world experiment)

In that image, the balls are people who are not involved in the chain. But those people transmit information to their own networks. The same models are used to track the origins of the epidemics. Or, those models can also be used. To track. Things like drug dealers. When some outside actor transfers information into their own networks. That causes a situation where information spreads to global networks. 

“The small-world experiment comprised several experiments conducted by Stanley Milgram and other researchers examining the average path length for social networks of people in the United States. The research was groundbreaking in that it suggested that human society is a small-world-type network characterized by short path lengths. The experiments are often associated with the phrase "six degrees of separation", although Milgram did not use this term himself.  (Wikipedia, Small-world experiment)

But then. We can think. About the networks and their problem. When we think that we all have two or three good friends, we must understand. A couple of things. In information networks, “friend” is not necessarily. The individual person. The friend is the thing. There, we share information. We all have more than just two relationships. If we think that we are three actors, who tell everything to each other. We forget. We can think that humans have two hands. They might all have two connections. Those two close friends are only one connection. And then we have the connection. None of our three people ring knows. When we share information with those outsiders that causes a situation, that information starts to spread in the network. 

Things like married people can use or look at each other’s Facebook accounts. The “Friend” can also be some group. Like a soccer team discussion forum. If we have two trusted fiends in the information network, we often forget that those fiends also have two trusted friends. But there is a possibility that those people or groups. That we think of as “fiend”. Might not know each other. So we might know those two people. But maybe one or both know some third-party member. This third-party member. Is the thing. That causes information to spread through the network. In the networked world. We don’t know. Who really is the person we see on the net? People can claim. That they are even the Secretary General of the U.N. 

The model. That. Between every user of the net. Cause interesting thoughts. Six clicks. Separate us from the biggest chiefs in the business world. Six clicks separate us from a serial killer. And six clicks separate us from secret agents and drug dealers. This means. That the secret agent, the biggest boss, the serial killer, and the drug dealer. They are always part of our networks. This causes an interesting thought. 



https://scitechdaily.com/scientists-prove-there-are-just-six-degrees-of-separation-in-a-social-network/


https://en.wikipedia.org/wiki/Small-world_experiment


Saturday, April 18, 2026

The new research aims to find the answer to the question: what makes matter mass?




“A new experiment offers intriguing clues about one of physics’ deepest questions: the origin of mass. By probing an exotic, short-lived nuclear state involving a heavy meson, researchers uncovered evidence that particle properties may shift inside dense nuclear matter. Credit: Stock” (ScitechDaily, Where Does Mass Come From? Scientists Find Evidence of a New Exotic Nuclear State)

The mass is one of the biggest mysteries in physics. The question of what constitutes mass is a key element in physics. The mass has a straight connection. With gravity. There is a structure that binds quantum fields. Otherwise, it affects all three other fundamental interactions. When the matter binds quantum fields, the quantum field from outside tries to fill that space. And those fields pull particles and wave movement with them. This causes a situation that. Light can travel faster in a gravitational field than outside that field. This requires that the photon travels. 

To the gravitational center. The speed of light is relative. It’s relative to the speed at which its environment travels. So if the speed of the quantum field is 20 % of the speed of light, that means the photon travels 20 % faster if we compare its speed with the speed of a photon outside the quantum field. Because a photon is inside a quantum field, it travels in a gravitational field. It doesn’t break the laws of physics. When an object falls into a black hole through the event horizon. Its speed. Comparing with the environment is zero. 

When a photon or any other particle escapes from the gravitational field, its speed decreases. The impacting quantum field forms an electromagnetic shadow behind it. So the gravity center pulls energy out of the particle. So when a particle travels to the gravitational center. It will pull energy inside it. But when it escapes from that field, it must deliver as much energy as it got. 

But then. The particle tries to escape from that field. The particle must release or transfer as much energy to the field around it. As the field transitioned into it. When the speed of the field and the particle is precisely the same. The field cannot transfer energy into a particle. That is one of the reasons why nothing can escape from a black hole. The energy transition between particle and field ends. When they travel at the same speed. 



Impression of a photon rocket that could transport people to stars somewhere in the distant future. 

What if the gravitational center suddenly disappears? The particle will not need to deliver the energy that it got when it fell to the gravitational center. 

When a particle tries to escape from a black hole, the quantum field creates a shockwave ahead of it. If a particle tries to stop and turn around, the wave forms at the front of it. Another thing is the quantum shadow behind it. And that shadow pulls energy out of it. When the field travels .To the gravity center. With a speed 20% of the speed of light, the impact speed of the static particle and field is 20% of the speed of light. 

This means that the photon’s speed is 20 % lower if we compare the escaping photon’s speed with the speed of a photon that travels outside the gravity field. The photon can travel faster than other photons when it travels to a gravitational center. So, the photon that escapes from a black hole needs to use as much energy as it had when it traveled to the gravitational center. 

This paradox causes an interesting idea about crossing the speed of light. The speed of light is the cosmic speed limit. But if the fields travel to the gravitational center. With a speed. That is about 30% of the speed of light. And the speed of the hypothetical craft. It is about 75-80% of the speed of light; there is a possibility. The craft detonates the gravitational center. This means that the gravitational effect disappears. And that thing removes the need to deliver energy for escaping the gravity center. 

The explosion forms the impacting field. That speed is near the speed of light. And that causes a situation where the impact speed with craft and field is higher than the speed of light. 

Gravitation pulls objects. Like a river pulls woods and other things with it. There is a theory. That. There is a tornado-shaped structure or a small black hole in the middle of each particle. This means that particles are the halos of the quantum-sized black holes. The thing that makes those theories interesting is that reseachers in Brookhaven National Laboratories created quarks by colliding composite particles called hyperons. 

Those impacts formed quark-antiquark pairs. And the Brookhaven staff. Can detect those particle-antiparticle pairs from debris. Those collisions formed. The thing is that hyperons form quark-antiquark pairs when. It decays into two particles. The spin of those particles is opposite. And that makes them particle-antiparticle pairs. The effect that forms matter straight from energy. Or wave movement called the Schwinger effect. 

Colliding quantum fields form the whirl that starts to condense. That whirl forms in the borders of those impacting fields. The question is, what stabilizes those whirls or balls? The thing that stabilizes them is the thing that gives mass to matter. The matter is a condensed quantum field. But what condenses it? And what binds quantum fields in matter? 

Quantum fields are the common name for the four fundamental interactions. The time dilation and its connection. Mass and gravitation are well-known. The reason for that is that gravitation condenses quantum fields. And that thing slows the particle’s evaporation. Condensed quantum fields are the result, not the reason, for something that binds those fields. This means that gravitation interacts similarly with all other fundamental interactions. And that makes mass and gravitation interesting things. 


https://interestingengineering.com/science/scientists-observe-particles-emerging-from-nothing


https://scitechdaily.com/where-does-mass-come-from-scientists-find-evidence-of-a-new-exotic-nuclear-state/


Friday, April 17, 2026

Quantum-dot-based cryptography. Brings. Quantum internet. Closer than ever before.



"Cover highlight of the experiment. Single photons emitted by a quantum dot embedded in a photonic device are coupled into a fiber and encoded by ‘Alice’ into three distinct time-bin qubits. After ‘Bob’ performs the decryption, a sequence of quantum keys is shared between the users. Credit: Credit: Light: Science & Applications (2026). DOI: 10.1038/s41377-026-02205-9. Quantum dot–based time-bin QKD achieves stable, long-distance secure communication with practical performance. (ScitechDaily, Quantum Breakthrough: Unhackable Keys Sent Over 120 km Using Quantum Dots)

Researchers transmitted a quantum key over 120 kilometers by using quantum dots. This is a remarkable thing. The unbreakable internet is becoming a reality. In quantum-dot-based systems, the system uses a tool. That is like a pixel camera. The receiving pixel is against the transmitting pixel.

And the transmitting side can be the net of the nano-lasers. In quantum cryptography, the system encodes information into a physical object. In a quantum dot-based transmitter, the transmitter is like a computer screen, but the regular image pixels are replaced with nanolasers. 

When a quantum dot-based system transmits information. It can transmit it. As in the shape of a certain image. The image can be anything. The laser beams transmit that image to the receiver. This is one of the things that the system could do. The system. It can use different radiation frequencies. Like UV, infrared, and visible light. 

Or, even X-rays. The system can use photonic solutions. Their information is stored in a single photon. Optical systems are very hard to break by using eavesdropping. The quantum system could also use coherent radio waves. Or it can use coherent acoustic waves. 

The message can be shared over multiple frequencies. The system can also use spectroscopy as the encryption tool. The system can send an image of the object. But also the spectral image of the elements that form the object. This gives depth to the encryption. The key is the weakest point in the encryption. If the eavesdropper gets the key. That actor can open messages without permission. In quantum dot-based optical encryption. The eavesdropper must cut the laser beam. 

That changes the geometry of the information. And the system detects that thing. The quantum dot-based communication can also use this method. That information. Or. The TCP/IP protocol. Data packages are shared between different communication lines. Then the system sends them. At the same time. Or it can change the data channel all the time. So, when the laser transmits critical information, the other beams can transmit unnecessary data. And the eavesdropper must find the beam that sends important data from meaningless data. 

There is a possibility. Of using the so-called switched order to exchange keys. In that system, the system that normally receives information sends the key. The BizTalk goes like this: Transmitter: “Are you ready”? The receiver: “Yes. Here is the key”. 

In some versions, there is a third party, the encryption system, or keyholder , that shares keys. To the communication system. The BizTalk begins like this: “We (System 1 and System 2) want to talk, and we need the key”. Then, the third party in the system shares the key with those participants. In that case, the third party is the keyholder. That uses different communication lines than the system that shares other information. 

When the system uses quantum encryption, the problem is with the quantum keys. The system must get the quantum key to the receiver. There is a possibility. The system uses pre-installed keys. In this version, the courier transports the USB stick. That involves the key to the receiver. The system can use numbered images as the encryption keys. There are multiple ways to secure the key. 

The system can use a method. The number of images that it uses will be sent from the receiver. The system involves trillions of keys. And then it selects which keys it uses. On a certain day. The selector can be the receiver. There are multiple ways to encode those numbers. One is that the system must send those numbers at a certain time. And it can use a series of marks. There, the opponent picks only remarkable numbers. Those numbers can be replaced by letters. Or some other marks. 


https://scitechdaily.com/quantum-breakthrough-unhackable-keys-sent-over-120-km-using-quantum-dots/


Some people are concerned about the Claude Mythos program.


The “Mythos” is Anthropic Corporation’s most powerful tool. The tool is an AI-based vulnerability testing tool. The tool is created for “Project Glasswing”. Whose purpose is to develop new tools to map vulnerabilities in systems. The problem with that project is that all vulnerability testing tools are suitable for hacking. One of the things that disturbs people is that Anthropic didn’t offer its AI to the public. 

“So rather than make it widely available to Claude users, Anthropic gave 12 tech companies access via Project Glasswing, which it described as "an effort to secure the world's most critical software". (BBC)

This means that 12 companies can have access to all data on the net. 

Vulnerability testing is vital for the systems that should be protected against hackers. The Mythos tool is not public. And I think that the users must be accepted. For the user, by using some special methods. The main problem is that hackers will not tell people that they are hackers. They might look like regular vulnerability testers.

But those people can act as real attackers. The problem with hackers is that they can look like normal people. And they can use these kinds of tools to prepare. Or make cyber attacks. In the best scenarios. Those hackers can use a firm to order those hacking tools for them. Because some firm pays the bill. The hacker’s identity is not uncovered. 

“Ciaran Martin, former head of the UK's National Cyber Security Centre, told the BBC earlier this week the claim Mythos could unearth critical vulnerabilities much more quickly than other AI models had "really shaken people". (BBC)

"The second thing is that even with existing weaknesses that we know about, but organizations might not have patched against, might not be well defended against, it's just a really good hacker." He said.” (BBC)

The main problem is this: only good hackers can find the weaknesses that other hackers can use. The same programs that uncover malware. Can turn into malware testers. Hackers can use those tools to test their code against firewalls and virus scanners. The AI is a tool that can detect vulnerabilities faster than ever before. The vulnerability means. The hackers can use vulnerabilities only. If they know about them. And if hackers know some kind of vulnerability before the “good guys”. That can open up lots of data to bad boys. Some people believe and fear. The AI development. Turns so fast that nobody can control it. 


https://www.anthropic.com/glasswing


https://www.armorcode.com/blog/anthropics-claude-mythos-and-what-it-means-for-security


https://www.bbc.com/news/articles/crk1py1jgzko


https://www.forbes.com/sites/jonmarkman/2026/04/08/what-is-claude-mythos-and-why-anthropic-wont-let-anyone-use-it/

Thursday, April 16, 2026

Quantum dot-based technology can be a new tool against stealth technology.


“Artistic rendering of scanning-exciton optical nanoscopy (SEON) showing correlative dual-parameter mapping of light-field intensity and local density of optical states (LDOS) on a single gold nanoparticle (right), a plasmonic trimer consisting of three nearly-touching gold nanoparticles (left), and a waveguide-interfaced photonic crystal nanocavity (middle). The light-field intensity and LDOS distributions are shown in red and blue colormaps, respectively. Credit: Xue-Wen Chen et al.” (ScitechDaily,Scientists Break Optical Limits With Quantum Dot-Powered Nanoscopy)

Quantum radar. It can be two-layer graphene. The system puts quantum entanglement between particles that are locked in those squares. The system should use particle pairs. In transmitting particle pairs. The outer particle is at a lower energy level. That particle transmits signals. And in receiving a particle pair, the outer particle is in the lower energy size, which allows it to transport information into the system. That kind of quantum dot-based technology can break the stealth material. In that system, the frame spins, and that makes it possible to create. The scanning Doppler radar.  

In some other versions, the system uses a cut nanotube. The nanotube forms the crown-shaped structure. And in the middle of the nanotube is the antenna that transmits. The nanotube spins around that antenna. And that allows it to create the nanotechnical Doppler radar. The main problem. With Doppler radars. The antenna must move. 

So. That it can work right. The reason for that is this. The same antenna cannot transmit. And receive at the same time. The moving antenna makes it possible. That. The angle of the receiving antenna changes. This makes it possible. To determine the location of the point where signals reflect. Normally, the radar has a light parabolic shape, which makes it possible to determine the distance to objects. Another version. It is easier to use the change of frequency when the object comes straight to the radar. 





“DTU researchers have invented a nanolaser constructed in a semiconductor membrane that causes electrons and light to gather in a small area (blue shadow). By using light instead of electrical signals on microchips, data speed can be increased and energy loss reduced. Credit: Yi Yu” (ScitechDaily, Scientists Create Tiny “Nanolaser” That Could Revolutionize Future Computers)

Those transmitter-receiver antenna pairs can have an adjustable angle. This allows them to measure distance to the target. Very accurately. In those cases, the other antennas can send plus, and the other transmitter antennas can send A minus mark. Radio signals. Those signals form an electric arc to the target. 

This is important when something comes. Straight ahead to radar. The quantum dot-based radar can also use moving structures. 

Sometimes it’s discussed. About the possibility of using things like helium atoms as quantum radars. The atom’s core acts as a transmitter. And electrons act as a receiver. The system can also use things like excitons. The hole acts as a receiver. And the electron. Which orbits the hole act as a transmitter. Those exciton-based systems are already in use. 

In the laser-based systems. They can use the one-pixel scanner. And the nano-lasers. Those one-pixel systems can be in a frame that spins around the laser. 

The new nanotechnical lasers can act as pairs with the pixels that can receive the reflection. The laser. It can have a frame. Those receiving pixels are in that frame. As a circle. This makes it possible to create optical lidar (”laser radar”) that can scan surfaces and operate over longer distances. 


https://scitechdaily.com/scientists-break-optical-limits-with-quantum-dot-powered-nanoscopy/


https://scitechdaily.com/scientists-create-tiny-nanolaser-that-could-revolutionize-future-computers/


https://en.wikipedia.org/wiki/Doppler_radar


https://en.wikipedia.org/wiki/Exciton

Drones can be more powerful than anybody expected.

All technical systems are entire. The manufacturing process and guidance systems are things that require small. And effective microchips. Hi...