Skip to main content

Laser is the next-generation tool for communication.

Laser-communication systems are the tools that can turn the race of secured communication to the next level. The laser-communication tools are the same systems. The developers planned in the Star Wars program to use ASAT (Anti-Satellite) and ABM (Anti-Ballistic Missile) systems. The difference between those systems is the laser's power. The laser communication system with power adjusting is a tool that could use to protect satellites against incoming missiles. 

When a satellite detects an incoming missile, it will adjust the power of its communication laser to the destructive module. And then the same lasers can destroy that incoming missile. The laser-communication is the system that makes it harder to detect the satellite. And the laser system that developers install on the black of aircraft can make the next-generation GPS possible. 

The idea is that the photo-recon satellite follows those aircraft and that satellite sees those planes above the ground. And then those systems can exchange information with each other. The photo-recon satellite can simply send its camera image back to those aircraft. And then the pilot can precisely see where that aircraft is. The laser communication system is not as vulnerable to jammers as radio-based systems. 


"Illustration of NASA’s Laser Communications Relay Demonstration (LCRD communicating with the International Space Station over laser links. LCRD has successfully completed its first year of experiments, offering a glimpse into the future of data transmission from space. The system uses infrared light, allowing for 10 to 100 times more data to be packed into a single transmission compared to traditional radio wave systems. Credit: NASA’s Goddard Space Flight Center. (ScitechDaily.com/NASA’s Laser Communications Relay: Showcasing the Future of Space Data Transmission)




Above: AGM-88 HARM

The AGM-88A HARM-style anti-radiation missiles can destroy things like GPS satellites, radar, and communication facilities. Those missiles can also use against any radio source in the world. Anti-radiation missiles can destroy things like internet support stations and TV network stations. So military operators can use it to deny the effect of enemy propaganda. 

When we think about jammer systems and missiles. We might think that jamming the GPS is a piece of cake. But the jammer systems have one very serious problem. The active jammer system sends electromagnetic radiation around it. So the anti-radar missiles are capable to destroy those jammer systems. And those missiles can shoot against space-borne systems. 

When a jammer operates, the ECCM (Electronic Counter-Counter Measurement) systems start their counter-actions against those jammers. When the jammer starts to send its radio transmission at a certain frequency that covers the GPS, the counter system aims things like AGM-88 HARM missiles at that jammer platform. 

The aircraft that uses jammers is the radio source. And anti-radiation missiles can aim at those aircraft. The next-generation ECM systems use the AI-based power adjustments and in those systems, the counter wave has precisely the same power and frequency as the incoming wave movement. 

The system could use drones. They are flying at a certain distance from the aircraft to detect and analyze incoming radiowaves. Then those drones send the vital information to the manned aircraft's computer that adjusts counter-waves to the precise right energy level. 

Same way anti-radiation missiles can be a threat to combat aircraft. The same system that makes them aim at enemy radars makes anti-radiation missiles aim at all radio sources. Those anti-radiation missiles can be dangerous also to things like radio operators and jammer systems. The new jammer systems are not the same way vulnerable as old fashion systems. In modern systems, the AI adjusts the radio transmission to the level that the counter-wave will not just reflect the radar. 


https://scitechdaily.com/nasas-laser-communications-relay-showcasing-the-future-of-space-data-transmission/?expand_article=1

https://www.globalsecurity.org/military/systems/munitions/agm-88-pics.htm

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-