Monday, July 21, 2025
The AI development process continues.
Sunday, July 20, 2025
Hacking threats to military and civil systems.
Hacking is the new threat in the military and civil world. We can say that the new threat is cyber warfare. And if we are not prepared, that thing can cause many problems. Cyber warfare itself is not a new phenomenon. The idea in that kind of warfare is that the enemy’s computers are infected with computer viruses. Or things. Like homepages that the opposite side uses for sharing information can be loaded with disinformation.
Cyber intelligence can search for information from enemy equipment, tactics, or key personnel's positions, so that they can be targeted for special forces attacks. Hackers can also search for the positions of important installations.
Things like energy supply systems are targets for cyber attacks. The modern military uses more and more electricity. The effective combat control systems, like radars and communication platforms, require electricity. But things like new tools, such as laser weapons and drones, also require electricity. The entire system must be protected against cyberattacks. There is a possibility that a hacker who has access to the wrong databases can simply remove those people's access to some systems. Or they can remove the data of the entire military crew. Or in some scenarios, hackers can simply report the key people, like nuclear weapon operators, as dead in an accident, into the system.
What if the system will not allow them access to the command center?
One example of a destructive cyber attack is an attack that activates power plants' emergency shutdowns. That system can close the energy production in those systems immediately. Basically, hackers can break down things like electric networks by shutting down the main energy production units, like nuclear power plants. That thing activates auxiliary power immediately. When auxiliary power is on, the main energy production units will be activated again.
Suppose the electric network is not protected against such a situation that causes an overload. So, that is the reason why the electricity must never be loaded onto the electric network from the generator. The other thing is that the electric networks must be based on many small platforms rather than one big central platform. If one of those systems is shut down, the effect on the entire network is smaller. Basically, in the case of a nuclear reactor, only anonymous phone calls to the control room can cause an emergency shutdown. The hacker can say that there is a logic bomb, which means a computer virus that destroys the control program immediately. So, would the reactor crew start to test if those computer viruses are really in the system?
We have firewalls and antivirus programs. The fact is, if we want to put the computer viruses into the systems, what is needed is a reprogrammed RFID chip or some access card whose microchip is reprogrammed. That thing can transmit a small code that can open the gate to the system. In that case, the small virus will not break the system. It just opens the path to a targeted system. And in some scenarios, the hacker could use the faked VPN connection for that operation if a hacker can somehow fake the computer’s identity to match the computer that has access to the target computer and use a trusted VPN that can allow it to inject malicious code into the system.
In hacking and computer crimes, productive thinking is the key element. If the hacker can hijack some screens, they can send fake malfunction reports. If the error level of a computer rises and the system reports a damaged hard disk, the system requires service. The attacker can simply try to put an infected hard disk in the computer center. That is one of the threats in computing. If hackers can make their own computer that has access to a targeted system, it can open the road to all data that travels through it.
The AI-based firewalls can protect military systems against traditional computer viruses and hackers. But the new threat is nanotechnology. The nanotechnical systems can slip into the computer rooms. They can search the microchips, and then those nanorobots can transmit data that travels through the processors to the controllers. Nanorobots can transmit data to the computers through those microcircuits. Or they can cut microchips off the microcircuits. And then start to transmit their own code to the system. The new tools require new resistance. The nanorobot, or maybe a matchbox-size drone, can travel to the cable connection and detonate itself. That thing can damage the power supply to the computer, or it can cut data communication outside the computer. The drone acts like an anti-radiation missile that can search the WLAN stations and detonate them.
Saturday, July 19, 2025
Secretive Soviet fighter squadrons are interesting but secretive units.
https://www.twz.com/air/f-22s-fly-alongside-migs-to-commemorate-founder-of-americas-secret-soviet-fighter-squadron
The original Soviet fighter squadron operated officially from 1977 to 1990. The aircraft used were MiG-21 and MiG-23. Officially, that unit's last mission was in 1990. But the operation "Constant Peg "was never officially disbanded. And there is data about updated squadrons that operate MiG-29, and there were images on the Internet that some Mi-17 helicopters participated in a military exercise.
Israeli and USA top secret “ghost squadrons” or flight groups of hostile fighters like MiG-29 are interesting things. The ability to test their own aircraft against real MiGs. And Sukhois, and probably Chinese fighters, should guarantee that the newest aircraft are the best in business. The USA squadron of MiG opponents' location is in AREA-51, as history tells. But the new thing in the saga of those captured fighters is the Israeli top-secret MiG-29 training and test flight program.
The MiG-29 training and test flight program. Causes thoughts that there are many other things than just test flights where those MiGs can be used. And one of them is the so-called false flag operations.
https://www.twz.com/israels-secretive-mig-29-fulcrum-test-program
That means military actions against enemies and potential enemies using systems that are not officially in the inventory. The top secret duties of the U.S. test pilots are to act as opponents against the new, maybe prototype-level aircraft. One of the things that can guarantee the ghost squadron's ability and position as the opponent in R&D work is that those aircraft can involve state-of-the-art technology that gives the best possible opponent for the next-generation fighters.
The thing is that those ghost squadrons' missions are secretive. And there is not very much information about the U.S. version operations. But the Israeli version is even more secretive than the U.S. MiG squadron’s operations. The fact is that the jet fighters are not the only flying machines. The ghost squadrons also operate with the Russian cargo planes like An-26 and An-12 transporters. Helicopters, including Mi-17, Mi-24, and various other cargo and attack helicopters.
There is also the possibility that those helicopters and cargo planes are used for agent retrieval missions for the CIA, and maybe some of those cargo planes are modified for reconnaissance missions. Precise information about those plane types is not possible to get. The Antonov aircraft information is also speculation, because the air charter company in Toronto operates them, there is a possibility that the U.S government also has those aircraft.
https://theaviationist.com/2024/10/05/rare-us-operated-mi-17-south-carolina/
https://www.twz.com/44661/the-last-time-the-united-states-got-its-hands-on-a-fleet-of-mig-29-fighters
https://www.twz.com/air/f-22s-fly-alongside-migs-to-commemorate-founder-of-americas-secret-soviet-fighter-squadron
The new heat shield material opens China's path to next-generation hypersonic flight.
"Illustration of a carbide ceramic material capable of withstanding extreme temperatures, revolutionizing hypersonic technology, generated by artificial intelligence." (Rude Baquette, “They Flew Through Hellfire”: China’s New Heat Shield Shatters Thermal Limits, Unlocking Next-Level Hypersonic Speeds)
One of the leading states in hypersonic R&D work is China. When we talk about hypersonic flight in the atmosphere, we must realize that things like pressure and heat cause problems with reusable systems like hypersonic jet fighters. The main problem with hypersonic aircraft and their heat shield is how to remove heat from the heat shield. When a heat shield stores heat energy, that thing makes its structure weaker. And if there is a hole that lets thermal energy impact the aircraft’s body. And that is a fatal case. There is one way to conduct energy out of the shell.
And that is to store liquid gas like liquid nitrogen in a thermos bottle. When the aircraft’s shell turns too hot, the system injects liquid gas into it. In some other models, some liquids like water or some hydrocarbons flow in the cooling tubes. If the shell is connected to those tubes, it can decrease the temperature. In some models, the aircraft’s fuel will travel to the engine through the cooling tube.
That increases the hydrocarbons like. Methane or hydrogen, at a higher temperature. That allows the injection of the preheated fuel into the combustion chamber of the ramjet or scramjet engines. In that case, those engines must not create as much friction heat as in the case of cold fuel for reaching the inflammation point.
Otherwise, the aircraft’s body can involve air tunnels, and the cooler elements are connected to the critical points of the hypersonic aircraft. The idea is that the ram-air that travels in those tubes conducts temperature out from the shell and conducts it to the airflow. There are multiple things. That can help keep the temperature on the aircraft’s shell low enough. The hypersonic flight is the next-generation tool in missiles, bombers, and fighters. That allows the system to travel lower than satellites but almost as fast as a ballistic missile.
Today, there are hypersonic missiles that are single-use attack weapons. But the hypersonic systems can also give new abilities to the space systems and things like attack and reconnaissance aircraft. The next-generation reusable systems can increase the air force strike capacity to a very high level. A hypersonic missile that is launched from a hypersonic aircraft can be the next-generation attack system. In the same way, if the hypersonic aircraft attacks a target using a cannon, the result is devastating.
But reusable hypersonic aircraft require a new type of advanced heat shield. The hypersonic jet fighter is much more difficult to make than a hypersonic missile. But technology is advancing. And that means that. The new hypersonic strike and reconnaissance aircraft can be airborne sooner than we expect. Or maybe they are already in service.
https://www.rudebaguette.com/en/2025/07/they-flew-through-hellfire-chinas-new-heat-shield-shatters-thermal-limits-unlocking-next-level-hypersonic-speeds/
Friday, July 18, 2025
Bitchat allows internet-free end-to-end encrypted P2P communication applications.
Bitchat is a new tool for chatting and communicating. That application offers end-to-end encryption. P2P communication.The new application for P2P messaging and maybe, quite soon, for other data sharing uses BlueTooth for communication. The BlueTooth has its limits for communication. The range for that communication tool is the main problem, and the system requires mesh technology. That means support stations for long-range communication. The other version is to use an extra power BlueTooth device or some kind of amplifier that can increase the range of the BlueTooth. The system can use a standard radio amplifier that raises the BlueTooth power.
***************************************************
Standard BlueTooth devices have the following classes and ranges.
Device Power Class Bluetooth Range
Class-1 100 meters
Class-2 10 meters
Class-3 1 meter
(https://www.rfwireless-world.com/terminology/bluetooth-range-and-coverage)
***************************************************
Or a series of mobile telephones with BlueTooth capacity. BlueTooth is a common system in wireless headphones, mice, and other kinds of wireless tools. BlueTooth allows to share an internet connection and share files between devices outside the Internet. That thing makes it possible that the data can be shared outside the network. That can cause some data security problems. The BlueTooth connection requires that the other participant of the session send the access key to the other participant. And there is a possibility to cheat a person into connecting the device to the wrong system. That means the system’s ID is easy to fake. Or there can be a router in a mesh station that sends all data to the network.
And if the hacker sends the fake ID to another participant using the stolen ID, that means those people can connect their devices to the hacker's computer. The problem is that the ID that the device uses can be stolen or even created by hackers. But the end-to-end encryption protects privacy against internet-based eavesdropping. This kind of system can be interesting. They can replace internet-based data transportation. But there are also weaknesses. And one of them is this.
Because there are no phone numbers, no internet, and no servers. That means those systems are hard to hack over the net. But there is a possibility of cheating the users into sending data to hackers’ devices. Or there can be a router in a mesh station that can double the data flow. And that can endanger data security. Because BlueTooth range is so short, the need to use mesh stations can endanger data security.
https://www.rfwireless-world.com/terminology/bluetooth-range-and-coverage
https://www.rudebaguette.com/en/2025/07/jack-dorseys-offline-messaging-bombshell-bitchat-launches-peer-to-peer-app-with-end-to-end-encryption-and-zero-tracking-for-total-privacy/
Bitchat homepage:
https://bitchat.free/
Saturday, June 28, 2025
The FRB woke up a silent satellite that had been silent since 1967.
When an FRB impacts a decades-old satellite and makes it send radio transmission, that thing can explain many things. There is a possibility that FRBs cause some strange radio signals from spacecraft. And one explanation for the Wow! The signal is that the FRB hits some target like an asteroid or satellite that was at some kind of unseen trajectory. Those FRBs also cause problems and threats. It’s possible to wake up the microchip that is removed from the system and then force it to uncover its programming. The idea is that the hackers can aim very strong radio bursts at microchips that are removed from microcircuits. That thing can also make it possible to steal data from hard disks that are removed from computers.
Normally the FRB means the powerful intergalactic radio burst. But it's possible that there can be weaker Atmospheric Radio bursts that are very powerful. The lightning itself is a powerful event. But it’s possible that in the atmosphere also high-power radio impulses can be formed. The Fast Radio Burst, FRB is one of the most powerful phenomena in the universe. The FRB is a very thin and powerful radio burst. The new observations about the effects of the FRB (or atmospheric FRB) can explain some so-called paranormal phenomena.
The FRB that hits some electric circuits can cause situations where things like electric devices can turn on without any visible outside effect. If the FRB hits the house that thing causes a very powerful electric impulse in the electric wires. That causes an electric arc that makes electricity jump over the switches. The FRB has a very similar effect as lightning. In this text, I took the freedom to use the term FRB also for electric phenomena that form in the atmosphere. Things like horizontal lightning can explain some missing cases.
https://www.iflscience.com/mysterious-powerful-radio-pulse-traced-back-to-nasa-satellite-thats-been-dead-since-1967-79712
The user determines the purpose of lasers and rockets.
"Illustration of China's groundbreaking portable laser weapon operating in extreme temperatures. Image generated by AI." (Sustainability Times, “China Stuns the World Again”: New 2.47kW Portable Laser Works in Arctic Cold and Blistering Saharan Heat)
New Chinese laser weapons can operate from arctic cold to Sahara heat. The portable 2,47 kW laser system can be used against vehicles, robots, and other military personnel. The same system can also be used to cut electric wires and cut steelworks. And that is the true advance in laser weapon development. The laser weapon can use electric systems to create light. But it is also possible to use things like acetylene lamps for that purpose. The laser weapon can also use the laser-LEDs. That pumps energy to laser rays that travel between them.
That kind of system allows developers to make new types of weapons. Or weaponized applications. The laser weapon can operate also at orbital, where even small laser weapons can cause damage to satellites and space suits.
Illustration of the HQ-29 missile defense system in action. Image generated by AI. (Sustainability Times, “China Prepares for War in Space”: HQ-29 Missile System Can Destroy Satellites and Ballistic Threats Mid-Air)
Another interesting thing is that the Chinese created a new HQ-29 missile system that can be used in anti-ballistic missile, ABM, and anti-satellite, ASAT roles. Those missiles tell that China is prepared for space warfare. But the fact is that all rockets that can carry satellites or any payload to orbiter can operate as space weapons. The critical thing is the miniature satellites that can shoot even hundreds in one launch.
Heavy booster rockets can transport those miniature satellites to orbit. And when command centers give orders, those satellites will impact other satellites. Miniature satellites that use advanced AI can also dive against incoming ASAT weapons. Those satellites can operate in other missions, and when time is up they can begin their attack procedures.
"Illustration of a solar-powered drone with a wingspan larger than a Boeing 747 designed for month-long flights. Image generated by AI." (Sustainability Times, “We Built This to Fly Forever”: Engineers Unveil Solar Drone With 224-Foot Wingspan Capable of Month-Long Flights)
The miniature satellite can recognize the target using similar technology that Javelin missiles use. The satellite recognizes its target by using the image. And if those systems are shot to high-orbiter using the heavy booster, they can attack against their targets from the higher altitudes. There is an attack variant where the small satellite pulls the large-size trawl that it uses to put satellites following it. And then that satellite just dives into the atmosphere, pulling the target satellite behind it.
Things like solar-powered aircraft that can rise about 30 km high can transport small airborne launching vehicles to the edge of space. Then those small satellite carriers like Pegasus can transport satellites to the low earth orbiter. The Pegasus-type launching vehicles can also transport ASAT and ABM weapons. After launch the unmanned launching aircraft can return home. The new solar-powered aircraft whose wingspan is the same as Helios can make this thing. The problem with Helios was that its wings were not stiff enough. So that caused a crash. The wingspan of that new system is the same as the C-5 Galaxy. And it should rise at least 29 km altitude.
https://www.sustainability-times.com/impact/china-prepares-for-war-in-space-hq-29-missile-system-can-destroy-satellites-and-ballistic-threats-mid-air/
https://www.sustainability-times.com/impact/china-stuns-the-world-again-new-2-47kw-portable-laser-works-in-arctic-cold-and-blistering-saharan-heat/
https://www.sustainability-times.com/energy/we-built-this-to-fly-forever-engineers-unveil-solar-drone-with-224-foot-wingspan-capable-of-month-long-flights/
https://en.wikipedia.org/wiki/AeroVironment_Helios_Prototype
https://en.wikipedia.org/wiki/Northrop_Grumman_Pegasus
Why is it hard to impose sanctions on Russia?
Why is it hard to impose sanctions on Russia? We always wonder why Trump hesitates to impose sanctions against Russia. The reason for t...

-
"Illustration of China's groundbreaking portable laser weapon operating in extreme temperatures. Image generated by AI." (Sust...
-
https://www.twz.com/air/f-22s-fly-alongside-migs-to-commemorate-founder-of-americas-secret-soviet-fighter-squadron The original Soviet fight...
-
When an FRB impacts a decades-old satellite and makes it send radio transmission, that thing can explain many things. There is a possibility...