Saturday, May 9, 2026

Media is secure. As its weakest link is.



Cybersecurity is the new problem. Modern society runs on computers and data-based infrastructure. This means that hackers can cause large-scale damage to the infrastructure at minimal cost. The last case . It was when a Taiwanese student halted the railroads by spoofing the bullet train emergency signals. 

Also, the attack against the Iranian regime was successful. Because hackers made the system boot just at the critical moment. This is one of the reasons. Why we should consider cybersecurity. Security means that the entire infrastructure must be protected. It’s not enough that we protect some military systems. If the hacker causes a rush. By turning the traffic lights off.  

Or raises a drawbridge at the right moment. That causes very bad problems. The big problem is the hardware. That involves malware. The microchip. Which kernel is infected with malware can turn the large-scale systems off at a critical moment. So, if the attacker gives 1000 tablet computers for free. And one of them. 

Slipped into the Pentagon. That can give all the money. That attacker invested in the operation back. Those free computers can also uncover the person’s location to an observer. This thing is possible to make. By using the application that tracks a missing phone. 

The hybrid attacks. The attacker puts the satellite transmitters. Into the network routers, and then that system transmits all data to the attacker’s computer. The attacker’s budget determines the way.  On how the intruder makes the job. And that means that the states always have very large budgets.

In the time of AI, there are no safe places. The attackers can cheat. A regular person to work with them. When we think that leaving social media is a solution for everything, we are wrong. We are naive. If we say that our children must not be in there, and deny them access to it. The denial of social media. Turns the problem. Into another place. 


That problem is that those people can still use them. And they can use them without an adult’s supervision. Young people must dare to say. If somebody is closing. Them in social media. The world is full of people who believe that denials are effective things. The social media accounts are easy to open. By using false birthdays. The big problem is that. Everybody must practice. The media use. We can deny social media to underage people. The problem is that. Those underage people someday reach the full age. 

So, nobody denies their use of social media. Nobody denies. Them. To borrow money from banks. The world is full of evil people. Could it be possible to learn to use social media at an age when parents and other adults can intervene in the actions? If a person learns to use social media as an adult. That can cause. A very big trouble. If a person borrows money at full age. Nobody stops that before it's too late. The innocent-looking question can cause very bad things to people. Big debts can drive a person into criminal gangs. And they can expose a person to blackmail. 

And ask them to make something, like open the social media account for some “nice guy”. And one social media account means that an information operator can slip into the system and deliver propaganda. The problem is this: rules are rules. But people don’t follow them. If we don’t watch our backs, nobody makes that for us. If somebody. Gets our name. 

And a photograph, so that person can open a social media account by using our name. That is the identity spoof.  This is the reason. Why we should use, or at least observe, social media. When an attacker sees. If somebody does not have a social media account. It is easy to create an account. In the name of that person. 


https://www.techspot.com/news/112328-student-brought-multiple-taiwan-high-speed-trains-standstill.html

Thursday, May 7, 2026

Hydrogen as the power for submarines and ships.



Above. The Northrop-Grumman Manta Ray

An autonomous underwater vehicle (AUV) needs. A lot of computer power. Maybe: in the future. There are also nuclear-powered versions of the AI-controlled underwater autonomous vehicles. The large-sized, almost full-sized nuclear-powered submarine drones can provide electricity for their high-capacity computers. Those computers are needed for the independent operations. 

The ship or submarine can use hydrogen as fuel for fuel cells or gas turbines. The submarine drone operates 1,257 miles using the hydrogen fuel cells. That thing can be a very impressive record. But there is a possibility of using hydrogen in the gas turbines. An electric ship. It can also use hydrogen for gas turbines. It creates hydrogen from water by using electrolysis. And those gas turbines can make the system faster. The thing is that. 

The combined nuclear and steam (CONAS) system. That used in aircraft carriers and Russian Kirov-class battlecruisers can also be combined with gas turbines. The nuclear-based. Combined steam and gas COSAG engines can be revolutionary propulsion for submarines. In those systems, the small nuclear reactors can give electricity to electrolytic systems. And then those systems can deliver hydrogen to the gas turbines. 

The supercavitation technology can also make those systems more powerful. The nuclear-powered ships that use portable nuclear reactors can operate at very high speeds for virtually unlimited time. The small nuclear reactors. That can fit into the truck containers can turn any ship in the world . Into nuclear-powered. The nuclear-powered. Systems can give. 

The aircraft carriers' unlimited operational time. And the hydrogen-powered aircraft can operate without limits. But today, those aircraft carriers can be like small underwater drones. That releases drone swarms near the coastline. The carrier drone itself. It can look like a miniature version of the ballistic missile submarine. The quadcopters can be loaded as towers behind the hatches. These are similar to missile tubes in larger submarines. 

The small nuclear reactors can turn “Orca” or “Manta Ray” class underwater drones into tools. That has an unlimited operational range. Systems like the Russian  nuclear-powered “Poseidon” (Status 6) nuclear torpedo drones can reach a speed of 100 knots. That means a combination of nuclear reactors and hydrogen-burning gas turbines can give drones speeds. Those are higher than anytime before. The nuclear-powered drones that are equipped with micro nuclear reactors can revolutionize naval technology. 



https://fortune.com/2026/02/21/us-military-airlift-small-nuclear-reactor-first-time-c-17-microreactors/


https://interestingengineering.com/energy/world-first-submarine-drone-travels-underwater


https://www.navalgazing.net/Modern-Propulsion-Part-3


 https://www.naval-technology.com/projects/kirov/


https://www.northropgrumman.com/what-we-do/mission-solutions/sensors/manta-ray


https://en.wikipedia.org/wiki/Combined_steam_and_gas


https://en.wikipedia.org/wiki/Orca_(AUV)


https://en.wikipedia.org/wiki/Poseidon_(unmanned_underwater_vehicle)

Tuesday, May 5, 2026

The ethical problem: when should authorities know? And when they should not know?




If we like somebody, we might forget to ask critical questions. In working interviews, sometimes the interviewer forgets to ask about the school history, and a person could pass the interview for a company leader without even having completed elementary school. 

The primary problem with organizations and societies is this: what if somebody breaks rules? What if somebody endangers safety? Where do we put the line? When must the authorities know about things like dangerous plans? What is the limit of suspicion about crimes, and what is unnecessary stalking? Then we must determine things like security. North Korea has a different point of view on that thing. Than Western democracies. 

But what is the limit? When should AI report to law enforcement about people who seem dangerous? If officials hit somebody’s home and find things like assault rifles. That doesn’t necessarily mean that person will do bad things. But if the authorities don’t react. That can cause problems if the person does bad things . And uses AI for planning. That means that shooting could be prevented. But otherwise. The user accounts for AI could be made by using stolen identities. Or hackers can get those passwords. 

This means: those plans can be made by other people. Or. They are made. For destroying the person’s reputation. But if authorities take guns away, nobody can be sure if the person will rule out the threat. If authorities will not do that, and something happens. That causes legal actions in court. This is the problem with predictive actions. Nobody can be sure if the person who seems to make bad things is sure about the action. But if the authorities don’t react. And a person rules out the threat. Which is also. A very bad thing. 

The AI’s ability to collect information is incredible. And that brings one. A very big ethical problem in the world of the net. People consider their privacy, but what if a person uses AI in a way that harms the state’s or a private person’s security? What if some people plan things like bank robberies or school shootings by using AI? Or what if some North Korean intelligence officers establish a company in some Western cities like Toronto, Canada, and then use AI as a hacking tool? When we read the news that the Chinese government denies firms the right to fire workers because AI replaces them. We must realize that the news can be faked. 

The Chinese government has a very big budget for that kind of project. And they give large-scale support to AI development. The main problem is this. The AI development has turned into an arms race. The AI shows its capacities. In the military and intelligence work. And that means the AI is a tool that.  Those overseas actors want to invest. The AI is a tool that allows for observation. And controlling people. The thing that makes AI powerful and effective also makes it dangerous. 

The AI has no feelings. It just sees and reports. So, it's hard to please AI. When people develop AI for observation and intelligence work, they use the same arguments as people who resist AI. The AI has no friends. That means it should be trustworthy and neutral. When AI is used to control police work, the question is, who controls the controller, who observes the observer? If humans follow people like police officers. There is always a possibility that feelings or friendships affect people’s ability to think objectively. 

When AI sees something, it just tells what it sees. It sees that the person puts something into their pocket. It doesn’t see things like clothes, age, or anything other than the action. 

When some people are handsome. That can cause a situation. Where those people can manipulate undercover officers. And this is why the machine view is a tool that can act neutrally. The AI can follow how long the judge keeps files open. If the judge doesn’t even look at the files. Those are brought into the courtroom. Or the inspector doesn’t open things like a thesis in the university, but they make decisions. Those are things that require intervention.  The problem is human, who uses tools and positions. In the wrong way. 


https://futurism.com/artificial-intelligence/two-shootings-openai-stopped


https://futurism.com/artificial-intelligence/openai-school-shooter-tumbler-ridge-lawsuits


Monday, May 4, 2026

The algorithm solved complex problems in seconds.




"A new computational method reveals a faster way to explore intricate quantum systems, pointing toward emerging applications in next-generation computing. Credit: Stock" (ScitechDaily, Quantum Breakthrough: New Algorithm Solves “Impossible” Materials in Seconds)


The quantum system can be almost anything. The quantum pattern can be the CCTV camera. It can be the computer network. And if we want to expand the morphing neural networks. We can think. That subnetworks are like atoms in molecules. The system increases the size of the network coverage. by using the models of molecular growth. The non-centralized data processing. Means that there are no limits on the size of those networks. 

The AI, along with quantum computers, will take material research to the next level. The algorithm solves molecular functions in seconds and can control reactions with greater accuracy. But then we must ask whether that technology brings the quantum encryption apocalypse. So, if we ask. Can a quantum computer-based algorithm break your password in seconds? The answer is more complex than just “yes” or “no”. 

The quantum computer cannot break your password if it doesn’t have the needed information. The system can search for things. Like names of family members.  Favourite foods, or favourite movies, and try them to that password. Those things are most often used as passwords. But. The AI. Even without a quantum computer. Cannot automatically break the password. Things like a limit, how many errors the user can make. Protects the account. 

But the AI and algorithms can open messages that travel in the air. The system captures radio transmission. And then. It tries to open it by generating binary numbers that the system used to hide the ASCII codes. So the code-breaking catastrophe happens. Through the captured messages, not through the user account. 

But the other thing is this. Quantum computers and AI can collect data from multiple sources. Things. Like one paper that. The hacked security camera sees. It can open the path to the system. The system can use face recognition to uncover. The person’s identity. The system can search for people who often visit corporations that handle. Security classified material.

Then it connects that information with the other data matrices. It can try to find. That person’s identity. From public data sources like social media. The system can map the target’s positions by using the surveillance camera networks. AI agents can follow a person stealthily. And the camera must not even turn. The system can benefit from reflections. So, it must not have a visual line to the target. 

Then it must know the place. The image is taken. And then it must search. For the way the usernames are formed. Then it can try. That world with the username. 

The system can collect data about the targeted persons. And then if the person writes. Rarely things to paper. That means there is a higher possibility. That is the thing that person writes is a password. In other cases, the security camera can see. The screen of the computer. That used to change the password. This means that any kind of error in the data security is dangerous. 


https://scitechdaily.com/quantum-breakthrough-new-algorithm-solves-impossible-materials-in-seconds/

Are drones the end of the combat helicopter?



Source: Ukrainian Defence Ministry”


“The proliferation of small, cheap, remotely guided drones has led some to question if crewed helicopters have a viable future in combat.” (FlightGlobal, How the Ukraine war has (and has not) changed the helicopter’s role in combat)

The role of the helicopter in a combat area is strong. Until drones came. And we might ask, what is the future of the helicopter? Today, helicopters are still needed for troop transportation. Cases like Maduro, the Venezuelan president’s capture, are impossible without helicopters and human operators. But helicopters require advancements. Like a higher speed to survive in a combat zone. The new anti-drone kamikaze drones can make operations like Maduro's capture impossible or more dangerous. Those drones can wait on roofs and then attack helicopters. The medium-sized kamikaze drones and cruise missiles can carry air-to-air missiles for attacking aerial targets. 

This means that the drones might not kill helicopters, but they can change the tactics and models of helicopters. But helicopters are also advancing. Active denial systems. Like lasers and microwaves can improve a helicopter’s survivability. Combat helicopters like Ka-52 “Alligator”. Faced a lot of losses in Ukraine. And the reason for that is that. Those helicopters are used near the front line. And those crews were not prepared for drones. The thing is that the tactics are also advancing. The EMP- and ECM-based denial systems can also make helicopters still valuable. Helicopters can use their machine guns, laser-guided rockets, and bullets against the drones. Intelligent ammunition increases those helicopters' abilities. 

Things like high-speed jets and missiles. These are systems that should render helicopters obsolete. Unable to operate. The missile threat caused a situation. There helicopters. Started to operate with jet fighters. The next-generation helicopters can be faster, stealthier, and equipped with multi-purpose systems. Those systems can sweep the area. And destroy the computers. Of the drones. The anti-radiation missiles can affect the drone operators or their control systems. The optical wire-control drone is problematic because the “light leak” uncovers the point. Where the operator sits. Or the location of the control system.  The laser weapon can also cut those control wires. 




Ka-52. This helicopter played a big role in the combat area. There is a possibility. The crews were not prepared for drones. It’s also possible that the lack of fire-and-forget weapons caused lots of losses. If the weapon uses traditional laser guidance. The pilot must keep those helicopters steady. And that gives the defender time to aim fire at those systems. 





“Source: Efrem Lukatsky/AP/Shutterstock

Russia is believed to have lost several Kamov Ka-52 coaxial attack helicopters during the failed air assault on Antonov airport in Hostomel, Ukraine.”(FlightGlobal, How the Ukraine war has (and has not) changed the helicopter’s role in combat)



Source: US Marine Corps

“Ukraine has expressed an interest in purchasing AH-1Z attack and UH-1Y utility helicopters from US rotorcraft manufacturer Bell” (FlightGlobal, How the Ukraine war has (and has not) changed the helicopter’s role in combat)

The helicopter can sweep the roofs by using EMP pulses. When we look at the history of warfare, the new systems cause chaos when they arrive. But then the counter-tactics. And countermeasures are advancing. Helicopters can act as platforms. For drones and counter-drones. The problem with drones is this: anyone can buy them. And anyone can turn them into weapons. A drone is more than a missile. It can be dropped from an aerial vehicle, a satellite, or from a pocket. A drone can lie on the roof of trucks. This allows it to slip into military bases. The battery capacity limits its operational radius. The new batteries. Those that can be reloaded in seconds are tools that can turn drones more capable. The futuristic drones can reload those batteries. From other drones wirelessly. Or. Using the wire that is connected to the manipulator. 

But then back to helicopters. Any protection and weapon systems are useless if they are not in use. The EMP and ECM require activation. And the new types of weapons that put operators to sleep by using signals that activate cerebral centers. In the brain. Can deny the use of drones. But the fact is that. People like drug dealers can also use drones to guard their safety. Those drones can attack competitors and officials. And they are a threat to SWAT officers. And maybe people like Putin already have drone swarms positioned on the Kremlin wall. 

When we look at systems like the Ukrainian “Sting” drone. There is a possibility. That somebody copied those drones illegally. The civilian drone can be vulnerable to ECM. But the problem is that. Those systems must be on. The drone itself can hide in places like balconies. The remote-control devices can be installed into standard internet sockets. An operator can operate them anywhere on Earth or in space. Those drones can use FPV technology, but the operator can also use normal TV screens. And the drone can attack very fast. If the operator sits somewhere other than in the front. That person doesn’t need virtual glasses. Standard computer screens or TVs can be used to control those drones. 


https://www.flightglobal.com/helicopters/2025/12/how-the-ukraine-war-has-and-has-not-changed-the-helicopters-role-in-combat/


https://en.wikipedia.org/wiki/Sting_(drone)

Sunday, May 3, 2026

Ukraine can probably jam Russian hypersonic Kinzhal missiles.




"Kh-47M2 Kinzhal. 2018 Moscow Victory Day Parades" (Wikipedia)

The jammer system called Lima has proven effective against those hypersonic missiles. Says Kyiv Independent. This is good news for defense. And another thing is that. If the system can turn hypersonic missiles off course, that could be a big step. Against things. Like kinetic energy warheads. There are claims that the Russian new “Oreshnik” intermediate-range ballistic missiles (IRBM) can have kinetic energy warheads. But the accuracy of those missiles is about 200 m, which is too low for kinetic ammunition, which requires extremely high precision. That ammunition is a terror tool. If. They do not have high enough accuracy. The kinetic energy ammunition. It could be a powerful tool. Against the aircraft carriers. If they are accurate enough. 

The kinetic ammunition is like a bullet that requires a direct hit. And that means. The kinetic energy ammunition. It cannot affect harder targets. But a hypersonic warhead can be devastating if its pressure wave hits non-armoured targets. There are actually two ways to make the jammer systems. The first one. It is. The ECM system that sends radio signals. That covers the enemy communication and tracking systems. Another version is to create a plasma cloud between the radio transmitter and receiver. The high-altitude plasma layer can deny the GPS operations. The Ukrainian “Lima” system is proven effective against Kinzhals, but also drone swarms and glide bombs.

Or. That’s what the Kyiv Independent reports. The system disturbs satellite communication. That makes it impossible to navigate drones and communicate with them using satellites. There is a possibility. To replace part of those satellite-based systems with aircraft and ground stations. But those systems are more vulnerable than satellites. But things like communication satellites are also vulnerable to ASAT systems. The system could use similar technology with AGM-88 HARM. It detects the satellite and then destroys it. The system. It can be silo-based. Or launched from high-flying aircraft. 

(ResearchGate)

(kyivindependent)


(Kyivpost)

And that requires developing the systems. that are independent of GPS and radio signals. The system can use inertial and terrain-contour matching (TERCOM) to guide an aircraft to a target. This kind of system uses visual route recognition. The system compares aerial pictures of its route. With images that are stored in its memory. The system. It operates in UV- IR. And visual wavelengths. 

Another version is the electromagnetic pulse (EMP). The EMP is sometimes connected to the nuclear explosions. And in many scenarios, nuclear attack begins when nuclear warheads are detonated. In a low Earth orbiter. This thing destroys electronics immediately. But actors like the U.S. Air Force have tested and used the conventional EMP- or “E-bomb”. The system is based. On the high-energy radio or microwave impulse. That impulse is formed by pressing the battery. By using explosives. But there is also a possibility. Of creating EMP pulses without explosives. In those cases, the radio or microwave transmitters are equipped with high-power impulse capacitors. 

The system. It loads electricity into those capacitors. When the system sends the EMP pulse. It just loads electricity from those capacitors to the radio transmitter. The big difference between the explosive and capacitor systems is that. Those capacitors can be reloaded, and the system can give EMP pulses multiple times. The explosive-based systems are always single-use. 

So, what is the EMP? It’s simply the high-power electromagnetic impulse. When high-power radio signals hit the electric circuit. It forms the surge. That destroys all electricity. In some visions, the agent can slip the high-power capacitor into the data center. And then that capacitor sends an electric impulse to the computers. Another version is that the captured power plant. It sends high-power electricity to the enemy's electric network. 

The fact is that any radio transmitter can act as an E-bomb. This means that any radar can act as this kind of system. There is a possibility. To aim the EMP pulses at the incoming missiles, which can destroy their electronics. The high-power jammer signals can also blind its altimeters. And leave detonation to less accurate barometric systems. If the missile uses a radar system. For the last-period guidance, the jammer can deny its ability to detect the target. But the EMP can destroy all the electronics. That missile needs for its operations. Without those electronics, the missile cannot find its target. Even if it uses only inertial. Or it cannot even detonate its warhead without those electric components. 

The EMP weapon can affect drone swarms. But they are also powerful tools for hypersonic warheads. Those missiles can use the high-power electromagnetic transmitters to shut down defense. 

There is also a possibility of denying the missile launch by using the EMP bombs. The high-power EMP pulse can destroy the missile’s computers, which denies its launch. But the EMP weapons are not so harmless as people might think. Crossing high-power radio impulses form electric arcs into the air. Those electric arcs can light a match. Those radio impulses can be extremely dangerous. The radio impulses jump from the ionosphere. And that means they can destroy targets behind the walls. The system bases. Two aimed radio transmitters that send crossing radio signals with opposite polarity. These kinds of systems can be dangerous. Against unprotected targets from long distances. 


https://kyivindependent.com/patriots-or-no-patriots-ukraine-may-have-solved-the-problem-of-russias-kinzhal-missiles/


https://www.kyivpost.com/post/26235


https://www.researchgate.net/publication/334070738_High-Power_Microwave_Energy_as_Weapon


https://www.sofx.com/ukraines-lima-jammer-behind-successful-disruption-of-russian-glide-bomb-strikes/

Friday, May 1, 2026

Printable neurons boost the BCI system.



“An aerosol jet printer in Hersam’s laboratory deposits electronic inks onto a flexible polymer substrate. Credit: Mark Hersam/Northwestern University” (ScitechDaily, An aerosol jet printer in Hersam’s laboratory deposits electronic inks onto a flexible polymer substrate. Credit: Mark Hersam/Northwestern University)

The new technology makes it possible to create printable artificial neurons. Those artificial neurons enable the symbiosis between living neurons and computers. This kind of system is the new tool for the BCI (Brain-Computer Interface). The old-fashioned microchips require deep-brain surgery. The goal should be in the systems that require only surface surgery. Or, they don’t need surgery at all. Those new flat microchips can be put on the skull, between skin and bone. 

And they can be put on the skull in a day surgery. These kinds of systems can make the symbiosis between AI and humans closer than ever. The ability to create such BCI systems could restore life. To people with paralysis. But otherwise, those systems can make it possible to create a system. That allows humans to jump onto the internet. Anytime they want. The ability to control computers. Using the brain waves. Makes it possible to read a person’s thoughts. 

The BCI is the most effective user interface. But it can be the worst thing in history. The ability to communicate between computers. And neurons make it possible to create things, like artificial memories. Those artificial memories. Can be used for positive. Or. Negative things. The positive way to use those systems. It is to create new ways to study things. But in a negative way, that thing makes it possible to create individuals who hate other people. 

Those systems make it possible to create the real-life Manchurian candidates. Artificial memories that seem very realistic can be tools that make humans look like clowns. There are novels there, people who want to destroy other people’s political careers create. The faked memories about heroic actions in cases that never happened. Then the person will be marked as a liar. This is one way to control people. 

In the same way, when researchers create systems that erase bad memories. That kind of therapy can turn against the justice system. There is a possibility that people who have access to that technology can erase things like memories of violence or sexual violence. In the hands of some kind of bad people, this kind of technology can also make it possible to create a hitman who doesn’t remember a thing about his dirty work. This is one thing that we must realize when we create this kind of system.  If somebody can really remove the victim’s memory. 

That can make it possible to hide even the worst crimes that we can imagine. It’s possible to create systems that deny the neurotransmitter actions in the brain’s memory cells. Nanotechnical medicines. Acoustic or photoacoustic systems can drive chemicals. Just into the wanted brain areas. Those systems could also destroy the neurotransmitters from the targeted areas. 

This makes it possible to block memory cells. And this kind of technology can make it possible. To release a person from the trauma. The same technology in the wrong hands makes it possible to hide horrible crimes. In the cases of military and dark operations, those operators will not even remember. Those things. 


https://scitechdaily.com/scientists-print-artificial-neurons-that-can-talk-to-the-brain/

Media is secure. As its weakest link is.

Cybersecurity is the new problem. Modern society runs on computers and data-based infrastructure. This means that hackers can cause large-sc...