Monday, May 18, 2026

ECM can make drones more effective and protect them against air defense.



Images: InterestingEngineering


The new ECM systems can help improve the drone's survivability. The Storm Shield system. It is an adaptable ECM system. That fits into many platforms. The system can turn drones much more dangerous than ever before. In the same way as the table-sized GPU-based computers. That can run complex codes can bring new independence to drone systems. This means that ECM and drones are the ultimate combination. And the defense is far behind what it should be. 

The problem with the defense is always simple. All defense systems are planned. To use against large targets. Small-sized drones that operate as swarms can be tools. That suppresses air defense very effectively. The drone swarms require larger carriers. So the large-sized drones can deliver those drones over the target areas. The purpose of those drones is to carry the miniature drones into strike distance. 

Similar systems, like the Storm Shield, can be modified to communicate with drone swarms. The high-flying aircraft can search for drones using AI-boosted visual, infrared, and radar scanners. In some visions, the drone-based ECM can include a miniature version of the “Doomsday Airplane”. The flying USB stick that can reprogram other drones. 

There is a possibility that Russia tries to redirect Ukrainian drones to Finland and the Baltic on purpose. That can happen by using falsified location information. This means that they replace the GPS or Starlink. By using GLONASS signals. Another way. It could be that Russia tries to hack the guidance consoles. 

So they try to take drones under their control. Or when drones turn in a certain direction. They put the jammers on. This should cause a situation. That those drones continue in a straight direction. Or in some scenarios, Russians try to slip their own drones into those drone swarms. That. Those drones seem to come from Ukraine. 

Could Russia make things like fast-reacting hacking? Maybe, maybe not. But they might try those things. 






Images (Interesting Engineering, E-Bombs: The Allure and Peril of High-Power Microwave Weapons)


The problem with drone defense is this. There are so many drones. The air defense can use all its ammunition. In some scenarios, drones are used. To force. The air defense is to shoot all its ammunition. The rockets and missiles are good tools. But the problem is. The limited number of ammunition. Laser systems and drones are the tools. That can make a better defense. 

The drone can also carry lasers. Or a so-called EMP-bomb. The EMP bomb that is installed in drones can destroy the air defense. The EMP systems don’t necessarily require explosives or nuclear blasts. The system. It can use the technology. That was created for the CERN LHC accelerator. 

The high-power microwave, HPM bomb, is the tool that can break almost all electronics in the target area. 

The system loads capacitors. And then. It releases that energy as a radio or microwave burst. In those cases, the explosives can press the battery or capacitor to maximize the energy load. But that is not necessary. 

The laser weapon can be installed on a high-flying drone. The lasers or EMP. Are tools. That can also destroy wire-optical drones. The EMP. That comes. From below. It can burn the microchips from the drones. The EMP can affect entire drone swarms. But if those beams hit the electric lines, they can cause a dangerous voltage spike. 

The high-power capacitors can be used. To create the high-power radio impulse that switches all electric systems off. The system is being used. Basically, similar technology. CERN uses its Large Hadron Collider, LHC. The system loads capacitors. And then it aims the high-power electromagnetic impulse, radio waves, or microwaves at the target. In the same way. The drone can use an EMP to shut down the defense. 


https://www.globalsecurity.org/military/systems/munitions/hpm.htm


https://interestingengineering.com/military/electronic-warfare-tech-unmanned-systems-operation


https://interestingengineering.com/innovation/e-bomb-peril-high-power-microwave-weapons


http://www.superconductors.org/emp-bomb.htm

Sunday, May 17, 2026

One of the biggest threats to data security is old-fashioned platforms.



The GPU (Graphics processing unit)  cracks passwords in minutes. The problem with commonly used protection algorithms is that hackers know their structure. This makes it possible to create a tool that can break this protection system. 

“FACEPALM: A couple of years ago, Kaspersky Lab tested the resilience of hashed passwords against a modern gaming GPU. Now, the Moscow-based security firm has updated its study and found that things are getting slightly – but undeniably – worse.” (Techspot)

“Just in time for World Password Day, Kaspersky is reminding everyone that outdated hashing algorithms such as MD5 remain among the worst choices for storing passwords. In a recent post, the security firm revisited a 2024 study examining the "crackability" of real-world passwords. The conclusion is not surprising: password cracking speeds continue to improve, which means overall security is steadily getting worse.” (Techspot)

“Hashing algorithms are designed to convert strings of arbitrary length into fixed-length hash values. Even the smallest change in the input text produces a completely different hash, meaning that a properly secured hash database should protect user passwords from crackers and cybercriminals even if the database itself is leaked.” (Techspot))

Old-fashioned algorithms and platforms pose a major security problem. Those algorithms are created for response attacks. That was made of the old-fashioned microchips. Those microchips are very slow. If. We want to make some kind of brute-force attacks against old-fashioned protection algorithms. The new processor can generate passphrases more effectively than old-fashioned computers could protect them. In normal situations, the ASCII code is the letter’s numerical representation. 


It is counted by using some binary numbers. The thing. What makes passwords more secure is the ability to use special marks like brackets. When the system starts to break the encryption. It starts to guess the most common passwords. Then it starts to replace. Letters using special marks. This makes it possible that the system will guess passwords quite easily. 

This means that if the attacking software has complete dictionary books. And then things like statistical data about the most common passwords can help those attackers. The data mass that the system can use for training. It can make those attacks more effective. The problem is: how to train the AI? The user can use the forms and then write every single word from the dictionary book. Then that person replaces every. Single letter. One by one, using some special mark. 

There are about. 250 000-100 000 words in the English language. When we want to make the form. There are special marks that replace every letter. And that process requires time. If we use only the special marks over the numbers and the question mark, we have ten replacement marks for each letter. This means that. Making those possible modes for each word requires a lot of time. In real life, there are more possibilities. 

So, if we want to make an AI-based attacking algorithm that guesses passwords. That requires a lot of. work. And in that case, we think that person uses English. The problem is that. The person can use any language in the world as a base for a password. This makes this type of attack. Very hard to make in real life. The attack tool itself is not very hard to make, but it requires a lot of crew. Training the AI is not a very simple process. 


https://www.techspot.com/news/112345-kaspersky-warns-passwords-hashed-md5-algorithm-can-cracked.html


https://en.wikipedia.org/wiki/Graphics_processing_unit

Wednesday, May 13, 2026

Two Russian satellites flew 10 ft (3m) apart.



Space.com tells that “The satellites, known as COSMOS 2581 and COSMOS 2583, got within just 10 feet (3 meters) or so of each other on April 28, according to COMSPOC, a Pennsylvania-based space situational awareness software company.” (Space.com). This means there is something going on in Orbiter. These kinds of maneuvers require very high accuracy. And there can be a couple of very considerable things that this kind of maneuver can mean. Russia is at war in Ukraine. That war doesn’t go well. So, those satellite tests must have some high-priority aspect. Because Russia needs spy satellites rather than make tests with that kind of satellite couple. There are three reasons why those tests are made. 

1) The Russians test technology that can be used to “wake up” the sleeping satellites. There is a possibility that some of those satellites are nuclear weapons that are hidden in space. Those fractional orbital bombardment systems, FOBS, can hide in a high trajectory. This scenario is based on a model. Some Soviet sea-observing radar satellites carried nuclear reactors. One of those satellites was COSMOS 954. The satellite dropped in Canada. On the ice of a frozen lake. 

Normally, those nuclear-powered satellites. Or their nuclear reactors were sent to high orbit. When their mission was over. Those nuclear reactors involved high radioactive material. It’s possible that the radiation from those nuclear reactors could cover the radioactive glow of the nuclear weapons. This means that another satellite could come close to those sleeping weapons, and then wake them up. In this scenario. The FOBS is a so-called silent satellite that plays some kind of space junk. 

The FOBS can be like a satellite that falls to the ground and detonates its warheads at the right altitude. Another version is the cannon-type system. Which pushes nuclear grenades into the atmosphere. The system can use roll-shaped drivers. Or some kind of explosives to drive those weapons to attack. The ability to return those warheads for repair and condition checks is very important. So maybe Russians simulate the warhead transfer in that operation. 



“COSMOS-954 satellite artist rendition. Note: The image is a pure fantasy depiction and has nothing in common with the real COSMOS-954 Radar Ocean Reconnaissance Satellite, RORSAT, and should not be used to illustrate articles on Cosmos-954 or RORSAT” (Wikipedia, Cosmos-954)

2) Russian plans to capture other satellites. This means that the satellite. It has a mission to capture some targeted satellites. Flies to the targeted satellite. And then it can put the net over the satellite. And pull that satellite with it. 

3) The satellite can exchange data with other satellites using the long “USB”-type system.  Data transmission can also happen by using lasers.  That allows it to change the programs of other satellites. These kinds of satellites can activate the secretive systems in other satellites. And they can also act as training tools for something bigger. 

If a satellite can fly very close to another satellite, it can capture that other satellite’s data transmissions. These kinds of systems can also download some information. Which is too risky to send over the radio waves. Some of those activation codes. It can also be meant for the Russian missile submarines. 

The satellite will get the launch code. And then the ground station sends the signal “launch” to those satellites. Then the satellite sends the recorded launching codes to missile subs. Or in the worst scenario, there could be hidden nuclear weapons in foreign territory or deep on the bottom of the ocean. This means that those satellites can send the launch codes also for those hidden nuclear weapons. The 50-100mt nuclear weapon. That launched on the ocean floor can cause a devastating tsunami. 

So,if Russians want to activate their killer satellites or FOBS systems, they can load. That activation code. To the satellite on the ground. Then that satellite transfers the action code to other satellites. The nuclear-armed killer satellites can also act as EMP weapons. 


https://www.globalsecurity.org/wmd/world/russia/fobs.htm


https://www.space.com/space-exploration/launches-spacecraft/whatever-russia-is-testing-its-sophisticated-2-russian-satellites-get-within-10-feet-of-each-other-in-orbit


https://en.wikipedia.org/wiki/Kosmos_954


https://www.globalsecurity.org/wmd/world/russia/fobs.htm


https://en.wikipedia.org/wiki/US-A


Tuesday, May 12, 2026

Quantum acoustics can revolutionize sensors and many other technologies.



“Computational modeling reveals how stretching and squeezing a diamond’s crystal lattice precisely tunes the dynamic quantum states of silicon-vacancy defects, paving the way for highly adaptive, ultra-precise quantum sensors. Credit: SUTD” (ScitechDaily, Stretching Diamonds Unlocks Powerful New Quantum Sensing Abilities)

Quantum acoustics can be the tool behind new types of sonar technology. And it can also make it possible. To create new engine systems and acoustic protective fields. Or they can move objects on a quantum scale. 

The diamond. The laser beam is put to oscillate. Can send an acoustic beam. Though the oscillation amplifier. That makes it possible to create extremely powerful acoustic waves. When the system sends laser beams to the diamond. That causes oscillation in the structure. 

Acoustic lasers. They can be used to measure gravity fields. In those cases, the acoustic lasers hover nanoparticles in the chamber. And the system can measure the behavior of those particles. But this kind of technology makes it possible to create extremely accurate sensor technology. 

The nanoparticle hovers in the chamber, and the system observes its oscillation. This system can create quantum microphones. There, those nanoparticles hover in nanotubes. And the systems can observe their oscillation. This kind of sensor technology is a new tool for ultra-accurate microphones. And maybe they are used in systems that news claims to see a human heartbeat across kilometers. 

But quantum acoustics makes it possible to create new types of sonar-systems. The quantum acoustic system. It can be the two internal fullerene balls. Or a fullerene ball that involves other particles. It can act as a sound source. When the electromagnetic system sends waves to those structures. The oscillation. Turns into wave movement. 

In some models, this kind of acoustic system can act. As coustic weapons. The DNA molecule is pulled through those nanoballs. Then that makes the DNA bites. Act like a guitar string. That puts the other DNA molecules around them to oscillate. And that can break the DNA double helix structure. 

The quantum organs. That are. The miniaturized LRAD systems can also create acoustic protective fields. The quantum acoustic system can create a powerful acoustic wave. The acoustic wave can turn the air stronger than steel. That can crush incoming objects. 

Or the system can make. The acoustic drill. The high-precision acoustic beam can drill structures. The nano diamond is in the fullerene ball. Then the system sends the acoustic wave to that diamond. The carbon chain on the diamond focuses the acoustic beam to the target. When something closes the surface, the system sends that beam to the incoming target. That can break their structures. 



“Phonon lasers are used to trap and levitate nanoparticles in the laboratory of Nick Vamivakas, the Marie C. Wilson and Joseph C. Wilson Professor of Optical Physics at the University of Rochester. Credit: University of Rochester / J. Adam Fenster” (ScitechDaily, This New “Sound Laser” Could Measure Gravity With Stunning Precision)




“A new ultra-cold device developed at McGill University can generate controlled sound-like quantum vibrations known as phonons. The discovery could open the door to future technologies that use sound in ways similar to how modern systems use light and electricity. Credit: Shutterstock” (ScitechDaily, Scientists Create “Quantum Sound” Device That Works Near Absolute Zero)

The system that we can call quantum organs can revolutionize acoustic technology. The quantum particles. Like fullerene hovers in a nanotube, which aims the sound signal. Then the system aims laser beams at those particles. Which puts them into oscillation. This makes it possible to create the quantum loudspeakers. Those systems can be the new tools in sonar technology. But the quanutum loudspeakers. It can also make the new types of engine systems possible. 

The quantum acoustic engine means the electromagnetic system. The quantum structure turns electromagnetic waves into acoustic waves. One of those systems is the so-called laser engine. The laser beam that shot through the nanotube expands the gas in that tube. And that expanding gas forms a wave movement. That pushes craft forward and makes the levitation possible. In some versions. 

This futuristic system. That is still. At a theoretical level. Uses nanoparticles to create those waves. The microwave or laser beam makes those particles oscillate. And they oscillate with a wavelength. That is the same. As their diameter is. This means that if the acoustic levitation system uses infrasound. It can make those levitating systems silent. Quantum acoustics is a multipurpose tool. 


https://scitechdaily.com/scientists-create-quantum-sound-device-that-works-near-absolute-zero/


https://scitechdaily.com/stretching-diamonds-unlocks-powerful-new-quantum-sensing-abilities/


https://scitechdaily.com/this-new-sound-laser-could-measure-gravity-with-stunning-precision/

Saturday, May 9, 2026

Without data centers, it’s impossible to compete with U.S. actors.



Without diversity. The accumulation of the AI ecosystem continues. The data center is the brain of the AI ecosystem. Without those centers, the ICT ecosystem cannot respond to the need. 

Data centers are required to guarantee diversity in the ICT ecosystem. Without data centers, we have no diversity. Our ability to choose service providers is limited. If the service provider cannot offer their services. Those services require platforms that can run them. So, that means that the data and data services start to accumulate. Into a few hands. Or. This ongoing process continues. Without data centers. There are no competitors. For big companies like Google and Apple. The competitors. Require infrastructure. That supports systems. Those are suitable. To operate and process. Large data masses.  

So, do we need more data centers? Fact. It is that. We need choices. When Apple denied access to its Vibe coding software, people must realize how much power those companies have. Big actors. In the ICT business. They can select their own customers. And that can give an advantage. For actors. With access. To those encoding software tools. This means that without choices, the power of big actors rises to the next level. The ability to select who can use the effective programming tools. And who can not use those tools gives access to other companies' products. 

What does this thing mean? Without choices, the AI markets are starting to concentrate in a few hands. And that gives. A very big power in their hands. The AI is a powerful tool in the hands of people who can and dare to use it. The professional program and application development require effective tools. The AI can make routine programming without any problems. And that means the use of effective. AI gives a very powerful advance for system development. By using remote-control applications, a single. A qualified programmer can operate even tens of independent AI agents. The AI can sniff errors very fast. And that makes R&D work more effective. 

And AI is the tool that allows 24/7 program development. The company can share its crew into morning, day, evening, and night shifts. This makes the R&D process very fast. This means that those people who operate AI chatbots in those cases can work like in all other workplaces. They can make code in three shifts. Because the AI can operate quite independently. So, who is a more effective worker: a human or an AI? The answer is simple: Who makes fewer mistakes in time units and code lines is the one who is more effective. 


People say that about 10% of the answers that AI gives are wrong. That means 90% of the answers are right. The fact is that the AI can reach. This accuracy 24/365. The AI never tired. The question is, can an average-level programmer reach an accuracy level 90 % all the time? So, what happens to workplaces? The thing is that the AI is not as effective an actor as people thought. In the same way. As the AI Internet took workplaces from people. At the dawn of the Internet. People said that. Traditional things like cash money, paper letters. And other things like that were more trusted and accurate. But the Internet stabbed those things. 

When people started to use the internet. It turned more valuable, more secure. And more effective. The next big step was the cloud-based platforms.  Those cloud-based applications outsourced the need for computing power to servers and finally to data centers. Previously, those data centers acted as servers. But then the large language models, LLM, started to run on those servers. The LLM or algorithms. Require. Lots of calculation capacity. Those systems require the ability to run. A lot of data. Through the processors. The data mass that the system must handle is exponential. To the data mass that traditional cloud services must handle. 

And the problem is that the good service needs users. Without users. There is no way to run those things. Those users bring money and data to train those applications. Without data, the AI is helpless. Without data centers, the actor cannot run the complex algorithm. And without algorithms, there are no customers. The requirement for the ICT services is that they can respond to the need. Without that ability, nobody selects an application. 

We need diversity for ICT ecosystems. Without data centers, there is no diversity. And if there is no diversity, we can be sure that the software industry. Continues to be dominated by a couple of actors. The lack of choices and diversity means. That people must. In the future. Still choose well-known actors as service providers. People and companies must take what is offered. If there is only one or two service or application providers. People must select from those actors. And this is one thing that we must realize. 



Media is secure. As its weakest link is.



Cybersecurity is the new problem. Modern society runs on computers and data-based infrastructure. This means that hackers can cause large-scale damage to the infrastructure at minimal cost. The last case . It was when a Taiwanese student halted the railroads by spoofing the bullet train emergency signals. 

Also, the attack against the Iranian regime was successful. Because hackers made the system boot just at the critical moment. This is one of the reasons. Why we should consider cybersecurity. Security means that the entire infrastructure must be protected. It’s not enough that we protect some military systems. If the hacker causes a rush. By turning the traffic lights off.  

Or raises a drawbridge at the right moment. That causes very bad problems. The big problem is the hardware. That involves malware. The microchip. Which kernel is infected with malware can turn the large-scale systems off at a critical moment. So, if the attacker gives 1000 tablet computers for free. And one of them. 

Slipped into the Pentagon. That can give all the money. That attacker invested in the operation back. Those free computers can also uncover the person’s location to an observer. This thing is possible to make. By using the application that tracks a missing phone. 

The hybrid attacks. The attacker puts the satellite transmitters. Into the network routers, and then that system transmits all data to the attacker’s computer. The attacker’s budget determines the way.  On how the intruder makes the job. And that means that the states always have very large budgets.

In the time of AI, there are no safe places. The attackers can cheat. A regular person to work with them. When we think that leaving social media is a solution for everything, we are wrong. We are naive. If we say that our children must not be in there, and deny them access to it. The denial of social media. Turns the problem. Into another place. 


That problem is that those people can still use them. And they can use them without an adult’s supervision. Young people must dare to say. If somebody is closing. Them in social media. The world is full of people who believe that denials are effective things. The social media accounts are easy to open. By using false birthdays. The big problem is that. Everybody must practice. The media use. We can deny social media to underage people. The problem is that. Those underage people someday reach the full age. 

So, nobody denies their use of social media. Nobody denies. Them. To borrow money from banks. The world is full of evil people. Could it be possible to learn to use social media at an age when parents and other adults can intervene in the actions? If a person learns to use social media as an adult. That can cause. A very big trouble. If a person borrows money at full age. Nobody stops that before it's too late. The innocent-looking question can cause very bad things to people. Big debts can drive a person into criminal gangs. And they can expose a person to blackmail. 

And ask them to make something, like open the social media account for some “nice guy”. And one social media account means that an information operator can slip into the system and deliver propaganda. The problem is this: rules are rules. But people don’t follow them. If we don’t watch our backs, nobody makes that for us. If somebody. Gets our name. 

And a photograph, so that person can open a social media account by using our name. That is the identity spoof.  This is the reason. Why we should use, or at least observe, social media. When an attacker sees. If somebody does not have a social media account. It is easy to create an account. In the name of that person. 


https://www.techspot.com/news/112328-student-brought-multiple-taiwan-high-speed-trains-standstill.html

Thursday, May 7, 2026

Hydrogen as the power for submarines and ships.



Above. The Northrop-Grumman Manta Ray

An autonomous underwater vehicle (AUV) needs. A lot of computer power. Maybe: in the future. There are also nuclear-powered versions of the AI-controlled underwater autonomous vehicles. The large-sized, almost full-sized nuclear-powered submarine drones can provide electricity for their high-capacity computers. Those computers are needed for the independent operations. 

The ship or submarine can use hydrogen as fuel for fuel cells or gas turbines. The submarine drone operates 1,257 miles using the hydrogen fuel cells. That thing can be a very impressive record. But there is a possibility of using hydrogen in the gas turbines. An electric ship. It can also use hydrogen for gas turbines. It creates hydrogen from water by using electrolysis. And those gas turbines can make the system faster. The thing is that. 

The combined nuclear and steam (CONAS) system. That used in aircraft carriers and Russian Kirov-class battlecruisers can also be combined with gas turbines. The nuclear-based. Combined steam and gas COSAG engines can be revolutionary propulsion for submarines. In those systems, the small nuclear reactors can give electricity to electrolytic systems. And then those systems can deliver hydrogen to the gas turbines. 

The supercavitation technology can also make those systems more powerful. The nuclear-powered ships that use portable nuclear reactors can operate at very high speeds for virtually unlimited time. The small nuclear reactors. That can fit into the truck containers can turn any ship in the world . Into nuclear-powered. The nuclear-powered. Systems can give. 

The aircraft carriers' unlimited operational time. And the hydrogen-powered aircraft can operate without limits. But today, those aircraft carriers can be like small underwater drones. That releases drone swarms near the coastline. The carrier drone itself. It can look like a miniature version of the ballistic missile submarine. The quadcopters can be loaded as towers behind the hatches. These are similar to missile tubes in larger submarines. 

The small nuclear reactors can turn “Orca” or “Manta Ray” class underwater drones into tools. That has an unlimited operational range. Systems like the Russian  nuclear-powered “Poseidon” (Status 6) nuclear torpedo drones can reach a speed of 100 knots. That means a combination of nuclear reactors and hydrogen-burning gas turbines can give drones speeds. Those are higher than anytime before. The nuclear-powered drones that are equipped with micro nuclear reactors can revolutionize naval technology. 



https://fortune.com/2026/02/21/us-military-airlift-small-nuclear-reactor-first-time-c-17-microreactors/


https://interestingengineering.com/energy/world-first-submarine-drone-travels-underwater


https://www.navalgazing.net/Modern-Propulsion-Part-3


 https://www.naval-technology.com/projects/kirov/


https://www.northropgrumman.com/what-we-do/mission-solutions/sensors/manta-ray


https://en.wikipedia.org/wiki/Combined_steam_and_gas


https://en.wikipedia.org/wiki/Orca_(AUV)


https://en.wikipedia.org/wiki/Poseidon_(unmanned_underwater_vehicle)

ECM can make drones more effective and protect them against air defense.

Images: InterestingEngineering The new ECM systems can help improve the drone's survivability. The Storm Shield system. It is an adaptab...