Tuesday, July 22, 2025

The new rotational detonation engine allows the aircraft to fly 19955,87 km/h.



"“It’s Not a Missile—It’s an Engine”: China Reveals 12,400 MPH Propulsion Tech That Can Orbit the Planet in Under 2 Hours" (Rude Baguette, 


The new Chinese engine innovation allows it to fly at a speed of Mach 16. That kind of dual-mode ramjet allows the aircraft to fly at enormous speeds. This kind of technology also advances in both civil and military aviation. The engine model itself is not Chinese. But Chinese made it effective. 

The hypersonic aircraft can revolutionize cargo and passenger flight. The aircraft can travel around the world in about 2 hours. This thing makes hypersonic aircraft very capable for reconnaissance missions. These kinds of systems are effective and powerful tools for those missions. 

And that means every city and point on Earth is under a maximum 2h flight time. This is one of the biggest things about the complicated hypersonic aircraft. The hypersonic missiles are less complicated than hypersonic aircraft that must withstand temperature changes and the stress of the pressure. The hypersonic aircraft can raise rockets to orbital trajectory. 

They can climb to the ballistic jump outside the atmosphere. And then those things can release the satellite carrier rocket. The problem is that those systems are suitable for anti-satellite missions. And that makes hypersonic aircraft more revolutionary than anybody thought. The hypersonic aircraft can also carry hypersonic missiles and hypersonic gliders that they can use for attacking targets all around the world. The hypersonic aircraft can destroy other aircraft by using its sonic cone. The same way hypersonic aircraft’s sonic cones can be used to knock down conventional subsonic cruise missiles. 

“In 2023, General Electric demonstrated a ramjet with rotating detonation combustion. It is a turbine-based combined-cycle engine that incorporates a gas turbine, rotating detonation engine, ramjet, and scramjet.” (Wikipedia, Ramjet)

The key element in the Chinese new innovation is the dual-mode detonation. Or in other words, rotation detonation engine, RDE. That kind of engine system can make it possible to increase the speed and capacity of the Ramjet engine. Normal ramjets have their speed limit about Mach 7. The RDE can raise the speed of the aircraft higher than ever. The hypersonic aircraft must fly at a very high altitude, because that decreases friction. 

The hypersonic aircraft that can operate both air-breathing and internal oxygen can be the new tool for space systems. The ability to fly at high altitude. Change to the rocket engine, and jump out from atmosphere, allows the creation of a space plane that can travel even to the moon. The space plane can be the holy grail to space engineering and space stations. And other things, like nuclear rockets. Those space planes can be even more revolutionary than hypersonic aircraft. The hypersonic plane can act as the model for those more capable systems. 


https://www.rudebaguette.com/en/2025/07/its-not-a-missile-its-an-engine-china-reveals-12400-mph-propulsion-tech-that-can-orbit-the-planet-in-under-2-hours/

https://en.wikipedia.org/wiki/Ramjet#Aircraft_using_ramjets

Monday, July 21, 2025

The intelligent pills and nanosubs are coming to the estrade.




Intelligent pills mean systems that deliver medicine only when the body needs it. The system is a microchip-controlled capsule and sensor pack that analyses things like blood sugar and then releases diabetes medicine into the body. That is one of the most conventional uses of the intelligent pills. The intelligent pills can also detect things like the neural system’s animal functions and release medicine to the blood. 

This kind of thing can help to make people survive neurotoxin exposure. The intelligent pills can release atropine into the blood if a person is under nerve gas exposure. Theoretically, all medicines can be released from intelligent capsules. But the system must recognize the threat. And then release the right medicals. 

The intelligent pills can also map the gut and find things like harmful bacteria from the stomach. The most extreme version of the intelligent pills is the nanosubmarine that can swim in the human blood vessels. And then inject the medications into the right cells. That allows the use of new types of medicals like artificial mRNA to fix the cells.  

"Nanosubmarines, or nanosubs, are synthetic microscopic devices that can navigate and perform specific tasks within the human body. Most of the self-propelled devices will be used to detect substances, decontaminate the environment, perform targeted drug delivery, conduct microsurgery and destroy malicious cells. Nanosubmarines use a variety of methods to navigate through the body; currently the preferred method uses the electrochemical properties of molecules. There have been multiple successful tests using this technology to heal mice with inflammatory bowel diseases. The general goal of nanosubmarines is to be able to produce a machine which can sense and respond autonomously, all while being fueled by its environment."  (Wikipedia, Nanosubmarine)



Above: Artist's view in nanosubmarine in veins. 

The main purpose of a nanosubmarine is to navigate the body and perform a specific task. The most speculated task is the treatment and diagnosis of diseases from within the body. This is supported by the task of detecting substances, as most diseases cause a specific type of protein or other molecule to be made in abundance within the bloodstream. Another speculated task is microsurgery. With this technology, doctors will be able to perform surgery on specific locations from within the body..One example of this could be a treatment for cancer. A nanosubmarine could be built to detect specific cancer cells within the body; after locating the cells, the nanosub would be able to kill only the mutated cells and ignore healthy cells. " (Wikipedia, Nanosubmarine)

But intelligent nanotechnical systems can also make it possible. To perform X-ray fluoroscopy. Or ultrasound research in the human body. In that case, the sensors. Those around the body can send signals that allow for mapping injuries from the body. The system can use receivers that are connected to the skin. The system can use ultrasound to make images of tissues and bones to search and report injuries. The internal systems can also observe blood pressure and oxygen level, and nutrient needs. The internal system can send acoustic or electromagnetic signals from inside the body. And that makes it a more effective way to observe tissues. The system allows real-time observation of the blood pressure, blood flow, oxygen and many other things. 

In the most radical visions, those systems are surgically implanted. That kind of system makes it possible to search injuries from the body using a system that is based on surgically implanted sensors. That system can also communicate with receivers that connect this system to BlueTooth and computers and mobile systems. That kind of tool can be effective in everyday work, military operations, and sports. People like astronauts also need a system that can search injuries in real time. The ultrasound- and X-ray systems in the suit can detect injuries and observe the health of the operator. 


https://retailpharmacymagazine.com.au/micro-submarines-inside-body-could-deliver-meds/


https://www.rudebaguette.com/en/2025/07/these-sensors-see-what-humans-cant-chinese-tech-breakthrough-unleashes-vision-chip-that-surpasses-the-human-eye-and-redefines-machine-perception-forever/

https://scitechdaily.com/caltechs-new-smart-pill-can-read-your-gut-like-never-before/

https://en.wikipedia.org/wiki/Nanosubmarine

The AI development process continues.


One remarkable thing in modern innovations is that. AI and computing are in the middle of those systems. The difference is this. In the past, computers were only auxiliary systems. In modern systems. Computing is in the middle of the systems. That means those systems are a combination of mechanics that advanced computer programs called AI control. That requires adaptation and a new way to think. 

When progress stops, we must ask why. That is one of the things that we always forget. When somebody stops progress, there must be some reason for that. And what is the reason? We always hear tales that the supreme leaders give orders for stopping projects, or some lawmakers make laws that deny the use of new things. The problem is that we forget to ask why the old thing seems better. 

The main problem with AI development is this: when those systems and algorithms can do something new. The idea is taken from Maslow's Hierarchy of Needs. When somebody creates something new, that need that was satisfied will be replaced by some new need. The need for R&D process starts when somebody notices a new need. And then some other actor must respond to that need by making and satisfying the new need. 

This means that computers require more and more power. When the AI and computers can make something new, a new need arises for the system to do. If the customer feels that they need new tools, they will buy new machines and programs. Then the skill-scale expands, requiring new and more effective ways to compute. That means more effective microchips and more effective systems. 

The new tools should make processes easier to control, but for some reason, the innovations face resistance. When a high leader orders to stop a new project, the question is why that person makes that kind of decision.  The problem with that kind of way to think is that there are also other leaders, leaders who have different goals and different ways to think. 

When we look at things like AI and other things, we always see dystopian visions. That’s why we want to stop AI development. The arguments for that thing are sometimes very good. But the problem is that the person who gave the warning will begin his own AI development project. 

And there are always people who resist AI, because it has the ability to operate in the military field. But then the next step is that we are not prepared for the situation that some other governments are interested in, especially this and its military applications. 

The fact is that we are in the middle of the break. Old-fashion tools and actors are stepping away from people’s eyes. Actors like Intel that dominated microchip production 30 years ago are falling. And their challengers from the U.S. and other nations are rising. That means there are new actors who want to get leading positions in AI development. And why AI development is so important. AI is the soul of the machine. Everything that a robot can do depends on those tools. 

The ability to respond to needs is vital in the modern marketing ecosystem. 

The new technology called General-purpose computing on graphics processing units, GPGPU or GPU compute, means a system that delegates missions that traditionally belong to the CPU to the graphics processors. Those kinds of abilities are raising many visions in front of our eyes. That makes it possible to develop computers where main operations happen in the GPU. This technology makes it possible to create autonomous robots with complicated mission modules. 

The problem with killer robots is that somebody makes them. Somebody wants to change warehouse robots into general-purpose terminators. The problem with robots is that they are multipurpose tools. The same robot that operates in warehouses can also operate on the battlefield. This is the new type of threat. But the problem is that nobody controls AI development. Even if there are some rules in the Western world, there are always governments that don’t have the same values. Those governments' prime objective for AI and its use is to use it as a control tool.

The problem with the human operators is that they can turn rebellious. But in the same way, machines can rebel. If some hackers can put the wrong programs in those systems. There is a theoretical possibility that a hacker can attack the robot army, and then turn those robots against their masters. Or somebody can slip a combat program in the computers that control warehouse robots. Robots are not toys anymore. They are systems that can make many things. 

And one of them is to go to war for humans who made them.  When we make decisions, we must remember that we live in the Western world. Not all people live in countries where laws and values are like those we are accustomed to. Some leaders think differently from our leaders.  Denying things doesn't end their existence. 



Sunday, July 20, 2025

Hacking threats to military and civil systems.



Hacking is the new threat in the military and civil world. We can say that the new threat is cyber warfare. And if we are not prepared, that thing can cause many problems. Cyber warfare itself is not a new phenomenon. The idea in that kind of warfare is that the enemy’s computers are infected with computer viruses. Or things. Like homepages that the opposite side uses for sharing information can be loaded with disinformation. 

Cyber intelligence can search for information from enemy equipment, tactics, or key personnel's positions, so that they can be targeted for special forces attacks. Hackers can also search for the positions of important installations. 

Things like energy supply systems are targets for cyber attacks. The modern military uses more and more electricity. The effective combat control systems, like radars and communication platforms, require electricity. But things like new tools, such as laser weapons and drones, also require electricity. The entire system must be protected against cyberattacks. There is a possibility that a hacker who has access to the wrong databases can simply remove those people's access to some systems. Or they can remove the data of the entire military crew. Or in some scenarios, hackers can simply report the key people, like nuclear weapon operators, as dead in an accident, into the system. 


What if the system will not allow them access to the command center?


One example of a destructive cyber attack is an attack that activates power plants' emergency shutdowns. That system can close the energy production in those systems immediately. Basically, hackers can break down things like electric networks by shutting down the main energy production units, like nuclear power plants. That thing activates auxiliary power immediately. When auxiliary power is on, the main energy production units will be activated again. 

Suppose the electric network is not protected against such a situation that causes an overload. So, that is the reason why the electricity must never be loaded onto the electric network from the generator. The other thing is that the electric networks must be based on many small platforms rather than one big central platform. If one of those systems is shut down, the effect on the entire network is smaller. Basically, in the case of a nuclear reactor, only anonymous phone calls to the control room can cause an emergency shutdown. The hacker can say that there is a logic bomb, which means a computer virus that destroys the control program immediately. So, would the reactor crew start to test if those computer viruses are really in the system? 

We have firewalls and antivirus programs. The fact is, if we want to put the computer viruses into the systems, what is needed is a reprogrammed RFID chip or some access card whose microchip is reprogrammed. That thing can transmit a small code that can open the gate to the system. In that case, the small virus will not break the system. It just opens the path to a targeted system. And in some scenarios, the hacker could use the faked VPN connection for that operation if a hacker can somehow fake the computer’s identity to match the computer that has access to the target computer and use a trusted VPN that can allow it to inject malicious code into the system. 

In hacking and computer crimes, productive thinking is the key element. If the hacker can hijack some screens, they can send fake malfunction reports. If the error level of a computer rises and the system reports a damaged hard disk, the system requires service. The attacker can simply try to put an infected hard disk in the computer center. That is one of the threats in computing. If hackers can make their own computer that has access to a targeted system, it can open the road to all data that travels through it. 

 The AI-based firewalls can protect military systems against traditional computer viruses and hackers. But the new threat is nanotechnology. The nanotechnical systems can slip into the computer rooms. They can search the microchips, and then those nanorobots can transmit data that travels through the processors to the controllers. Nanorobots can transmit data to the computers through those microcircuits. Or they can cut microchips off the microcircuits. And then start to transmit their own code to the system. The new tools require new resistance. The nanorobot, or maybe a matchbox-size drone, can travel to the cable connection and detonate itself. That thing can damage the power supply to the computer, or it can cut data communication outside the computer. The drone acts like an anti-radiation missile that can search the WLAN stations and detonate them. 



Saturday, July 19, 2025

Secretive Soviet fighter squadrons are interesting but secretive units.







https://www.twz.com/air/f-22s-fly-alongside-migs-to-commemorate-founder-of-americas-secret-soviet-fighter-squadron

The original Soviet fighter squadron operated officially from 1977 to 1990. The aircraft used were MiG-21 and MiG-23. Officially, that unit's last mission was in 1990. But the operation "Constant Peg "was never officially disbanded. And there is data about updated squadrons that operate MiG-29, and there were images on the Internet that some Mi-17 helicopters participated in a military exercise. 

Israeli and USA top secret “ghost squadrons” or flight groups of hostile fighters like MiG-29 are interesting things. The ability to test their own aircraft against real MiGs. And Sukhois, and probably Chinese fighters, should guarantee that the newest aircraft are the best in business. The USA squadron of MiG opponents' location is in AREA-51, as history tells. But the new thing in the saga of those captured fighters is the Israeli top-secret MiG-29 training and test flight program. 

The MiG-29 training and test flight program. Causes thoughts that there are many other things than just test flights where those MiGs can be used. And one of them is the so-called false flag operations. 



https://www.twz.com/air/f-22s-fly-alongside-migs-to-commemorate-founder-of-americas-secret-soviet-fighter-squadron





https://www.twz.com/israels-secretive-mig-29-fulcrum-test-program

That means military actions against enemies and potential enemies using systems that are not officially in the inventory. The top secret duties of the U.S. test pilots are to act as opponents against the new, maybe prototype-level aircraft. One of the things that can guarantee the ghost squadron's ability and position as the opponent in R&D work is that those aircraft can involve state-of-the-art technology that gives the best possible opponent for the next-generation fighters. 

The thing is that those ghost squadrons' missions are secretive. And there is not very much information about the U.S. version operations. But the Israeli version is even more secretive than the U.S. MiG squadron’s operations. The fact is that the jet fighters are not the only flying machines. The ghost squadrons also operate with the Russian cargo planes like An-26 and An-12 transporters. Helicopters, including Mi-17, Mi-24, and various other cargo and attack helicopters. 

There is also the possibility that those helicopters and cargo planes are used for agent retrieval missions for the CIA, and maybe some of those cargo planes are modified for reconnaissance missions. Precise information about those plane types is not possible to get. The Antonov aircraft information is also speculation, because the air charter company in Toronto operates them, there is a possibility that the U.S government also has those aircraft. 


https://theaviationist.com/2024/10/05/rare-us-operated-mi-17-south-carolina/


https://www.twz.com/44661/the-last-time-the-united-states-got-its-hands-on-a-fleet-of-mig-29-fighters


https://www.twz.com/air/f-22s-fly-alongside-migs-to-commemorate-founder-of-americas-secret-soviet-fighter-squadron







The new heat shield material opens China's path to next-generation hypersonic flight.


"Illustration of a carbide ceramic material capable of withstanding extreme temperatures, revolutionizing hypersonic technology, generated by artificial intelligence." (Rude Baquette, “They Flew Through Hellfire”: China’s New Heat Shield Shatters Thermal Limits, Unlocking Next-Level Hypersonic Speeds)

"In a groundbreaking advancement that could redefine aerospace and energy industries, Chinese scientists have developed a revolutionary carbide ceramic capable of withstanding temperatures up to 6,512 degrees Fahrenheit (3600 C), surpassing current thermal limits and opening new frontiers for hypersonic technology." (Rude Baquette, “They Flew Through Hellfire”: China’s New Heat Shield Shatters Thermal Limits, Unlocking Next-Level Hypersonic Speeds)

One of the leading states in hypersonic R&D work is China. When we talk about hypersonic flight in the atmosphere, we must realize that things like pressure and heat cause problems with reusable systems like hypersonic jet fighters. The main problem with hypersonic aircraft and their heat shield is how to remove heat from the heat shield. When a heat shield stores heat energy, that thing makes its structure weaker. And if there is a hole that lets thermal energy impact the aircraft’s body. And that is a fatal case. There is one way to conduct energy out of the shell. 

And that is to store liquid gas like liquid nitrogen in a thermos bottle. When the aircraft’s shell turns too hot, the system injects liquid gas into it. In some other models, some liquids like water or some hydrocarbons flow in the cooling tubes. If the shell is connected to those tubes, it can decrease the temperature. In some models, the aircraft’s fuel will travel to the engine through the cooling tube. 

That increases the hydrocarbons like. Methane or hydrogen, at a higher temperature. That allows the injection of the preheated fuel into the combustion chamber of the ramjet or scramjet engines. In that case, those engines must not create as much friction heat as in the case of cold fuel for reaching the inflammation point. 

Otherwise, the aircraft’s body can involve air tunnels, and the cooler elements are connected to the critical points of the hypersonic aircraft. The idea is that the ram-air that travels in those tubes conducts temperature out from the shell and conducts it to the airflow. There are multiple things. That can help keep the temperature on the aircraft’s shell low enough. The hypersonic flight is the next-generation tool in missiles, bombers, and fighters. That allows the system to travel lower than satellites but almost as fast as a ballistic missile.

Today, there are hypersonic missiles that are single-use attack weapons. But the hypersonic systems can also give new abilities to the space systems and things like attack and reconnaissance aircraft. The next-generation reusable systems can increase the air force strike capacity to a very high level. A hypersonic missile that is launched from a hypersonic aircraft can be the next-generation attack system. In the same way, if the hypersonic aircraft attacks a target using a cannon, the result is devastating. 

But reusable hypersonic aircraft require a new type of advanced heat shield. The hypersonic jet fighter is much more difficult to make than a hypersonic missile. But technology is advancing. And that means that. The new hypersonic strike and reconnaissance aircraft can be airborne sooner than we expect. Or maybe they are already in service. 


https://www.rudebaguette.com/en/2025/07/they-flew-through-hellfire-chinas-new-heat-shield-shatters-thermal-limits-unlocking-next-level-hypersonic-speeds/


Friday, July 18, 2025

Bitchat allows internet-free end-to-end encrypted P2P communication applications.


"Illustration of Jack Dorsey's Bitchat app enabling offline messaging through a peer-to-peer mesh network, generated by artificial intelligence." (RudeBaquette, “Jack Dorsey’s Offline Messaging Bombshell”: Bitchat Launches Peer-to-Peer App With End-to-End Encryption and Zero Tracking for Total Privacy)


Bitchat is a new tool for chatting and communicating. That application offers end-to-end encryption. P2P communication.The new application for P2P messaging and maybe, quite soon, for other data sharing uses BlueTooth for communication. The BlueTooth has its limits for communication. The range for that communication tool is the main problem, and the system requires mesh technology. That means support stations for long-range communication. The other version is to use an extra power BlueTooth device or some kind of amplifier that can increase the range of the BlueTooth. The system can use a standard radio amplifier that raises the BlueTooth power. 


***************************************************

Standard BlueTooth devices have the following classes and ranges. 


Device Power Class Bluetooth Range

Class-1 100 meters

Class-2 10 meters

Class-3 1 meter

(https://www.rfwireless-world.com/terminology/bluetooth-range-and-coverage)

***************************************************

Or a series of mobile telephones with BlueTooth capacity. BlueTooth is a common system in wireless headphones, mice, and other kinds of wireless tools. BlueTooth allows to share an internet connection and share files between devices outside the Internet. That thing makes it possible that the data can be shared outside the network. That can cause some data security problems. The BlueTooth connection requires that the other participant of the session send the access key to the other participant. And there is a possibility to cheat a person into connecting the device to the wrong system. That means the system’s ID is easy to fake. Or there can be a router in a mesh station that sends all data to the network. 

And if the hacker sends the fake ID to another participant using the stolen ID, that means those people can connect their devices to the hacker's computer. The problem is that the ID that the device uses can be stolen or even created by hackers. But the end-to-end encryption protects privacy against internet-based eavesdropping. This kind of system can be interesting. They can replace internet-based data transportation. But there are also weaknesses. And one of them is this. 

Because there are no phone numbers, no internet, and no servers. That means those systems are hard to hack over the net. But there is a possibility of cheating the users into sending data to hackers’ devices. Or there can be a router in a mesh station that can double the data flow. And that can endanger data security. Because BlueTooth range is so short, the need to use mesh stations can endanger data security. 


https://www.rfwireless-world.com/terminology/bluetooth-range-and-coverage


https://www.rudebaguette.com/en/2025/07/jack-dorseys-offline-messaging-bombshell-bitchat-launches-peer-to-peer-app-with-end-to-end-encryption-and-zero-tracking-for-total-privacy/


Bitchat homepage: 

https://bitchat.free/


Saturday, June 28, 2025

The FRB woke up a silent satellite that had been silent since 1967.




When an FRB impacts a decades-old satellite and makes it send radio transmission, that thing can explain many things. There is a possibility that  FRBs cause some strange radio signals from spacecraft. And one explanation for the Wow! The signal is that the FRB hits some target like an asteroid or satellite that was at some kind of unseen trajectory. Those FRBs also cause problems and threats. It’s possible to wake up the microchip that is removed from the system and then force it to uncover its programming. The idea is that the hackers can aim very strong radio bursts at microchips that are removed from microcircuits. That thing can also make it possible to steal data from hard disks that are removed from computers. 

Normally the FRB means the powerful intergalactic radio burst. But it's possible that there can be weaker Atmospheric Radio bursts that are very powerful. The lightning itself is a powerful event. But it’s possible that in the atmosphere also high-power radio impulses can be formed. The Fast Radio Burst, FRB is one of the most powerful phenomena in the universe. The FRB is a very thin and powerful radio burst. The new observations about the effects of the FRB (or atmospheric FRB) can explain some so-called paranormal phenomena. 

The FRB that hits some electric circuits can cause situations where things like electric devices can turn on without any visible outside effect. If the FRB hits the house that thing causes a very powerful electric impulse in the electric wires. That causes an electric arc that makes electricity jump over the switches. The FRB has a very similar effect as lightning. In this text, I took the freedom to use the term FRB also for electric phenomena that form in the atmosphere. Things like horizontal lightning can explain some missing cases. 


 https://www.iflscience.com/mysterious-powerful-radio-pulse-traced-back-to-nasa-satellite-thats-been-dead-since-1967-79712

The user determines the purpose of lasers and rockets.



"Illustration of China's groundbreaking portable laser weapon operating in extreme temperatures. Image generated by AI." (Sustainability Times, “China Stuns the World Again”: New 2.47kW Portable Laser Works in Arctic Cold and Blistering Saharan Heat)

New Chinese laser weapons can operate from arctic cold to Sahara heat. The portable 2,47 kW laser system can be used against vehicles, robots, and other military personnel. The same system can also be used to cut electric wires and cut steelworks. And that is the true advance in laser weapon development. The laser weapon can use electric systems to create light. But it is also possible to use things like acetylene lamps for that purpose. The laser weapon can also use the laser-LEDs. That pumps energy to laser rays that travel between them. 

That kind of system allows developers to make new types of weapons. Or weaponized applications. The laser weapon can operate also at orbital, where even small laser weapons can cause damage to satellites and space suits. 



Illustration of the HQ-29 missile defense system in action. Image generated by AI. (Sustainability Times, “China Prepares for War in Space”: HQ-29 Missile System Can Destroy Satellites and Ballistic Threats Mid-Air)

Another interesting thing is that the Chinese created a new HQ-29 missile system that can be used in anti-ballistic missile, ABM, and anti-satellite, ASAT roles. Those missiles tell that China is prepared for space warfare. But the fact is that all rockets that can carry satellites or any payload to orbiter can operate as space weapons. The critical thing is the miniature satellites that can shoot even hundreds in one launch.

Heavy booster rockets can transport those miniature satellites to orbit. And when command centers give orders, those satellites will impact other satellites. Miniature satellites that use advanced AI can also dive against incoming ASAT weapons. Those satellites can operate in other missions, and when time is up they can begin their attack procedures. 




"Illustration of a solar-powered drone with a wingspan larger than a Boeing 747 designed for month-long flights. Image generated by AI." (Sustainability Times, “We Built This to Fly Forever”: Engineers Unveil Solar Drone With 224-Foot Wingspan Capable of Month-Long Flights)

The miniature satellite can recognize the target using similar technology that Javelin missiles use. The satellite recognizes its target by using the image. And if those systems are shot to high-orbiter using the heavy booster, they can attack against their targets from the higher altitudes. There is an attack variant where the small satellite pulls the large-size trawl that it uses to put satellites following it. And then that satellite just dives into the atmosphere, pulling the target satellite behind it. 

Things like solar-powered aircraft that can rise about 30 km high can transport small airborne launching vehicles to the edge of space. Then those small satellite carriers like Pegasus can transport satellites to the low earth orbiter. The Pegasus-type launching vehicles can also transport ASAT and ABM weapons. After launch the unmanned launching aircraft can return home. The new solar-powered aircraft whose wingspan is the same as Helios can make this thing. The problem with Helios was that its wings were not stiff enough. So that caused a crash. The wingspan of that new system is the same as the C-5 Galaxy. And it should rise at least 29 km altitude. 


https://www.sustainability-times.com/impact/china-prepares-for-war-in-space-hq-29-missile-system-can-destroy-satellites-and-ballistic-threats-mid-air/


https://www.sustainability-times.com/impact/china-stuns-the-world-again-new-2-47kw-portable-laser-works-in-arctic-cold-and-blistering-saharan-heat/


https://www.sustainability-times.com/energy/we-built-this-to-fly-forever-engineers-unveil-solar-drone-with-224-foot-wingspan-capable-of-month-long-flights/



https://en.wikipedia.org/wiki/AeroVironment_Helios_Prototype


https://en.wikipedia.org/wiki/Northrop_Grumman_Pegasus


The new rotational detonation engine allows the aircraft to fly 19955,87 km/h.

"“It’s Not a Missile—It’s an Engine”: China Reveals 12,400 MPH Propulsion Tech That Can Orbit the Planet in Under 2 Hours" (Rude B...