Showing posts with label target. Show all posts
Showing posts with label target. Show all posts

Friday, August 26, 2022

What does somebody do with information about how a hawk homes its prey from the chaotic swarm?

"Composite frame sequence of a Swainson’s hawk attacking swarming Mexican free-tailed bats at a bat cave in New Mexico, USA. The white lines connect the hawk to the bat that it captures, and remain parallel over time showing that the bat remains on a constant bearing. Credit: Caroline Brighton (Oxford Flight Group)"(Phys.com/ Study reveals how hunting hawks home in on prey inside a chaotic swarm)

Many swarming animals, such as insects and birds, use chaos as a shelter. Chaos makes it harder for a predator to pick a single bird or insect from that chaotic flock. Information about how animals such as hawks or dragonflies select targets and attack them makes it possible to create algorithms that are used to select the main movers from a flock of drones.

The prime mover is the drone that goes first. And the secondary drone is the backup tool. That mission is to observe the prime movers. They are forming two- or more-stage hierarchical systems that can make their mission waves. 




Flocks of drones imitate nature. They try to create chaos by hiding drones that are higher up in the hierarchy. The drone swarm is a hierarchical network of the entity, in which the main trustees and secondary movers collaborate with their pilots by sharing information across the whole, which is a combination of drones and their controllers.

Drone swarms are powerful tools and in the next-generation military systems, drone swarms are playing a vital role in aiming other weapons and attack against enemies. The drone swarms can use chaos for making the air defense harder to locate the centers of those swarms. 

In some visions, the center drones are more sophisticated, made of more expensive components, and equipped with more effective computers and they have sharper sensors than attack drones. And even if all of those drones have similar systems there must be drones that are making sure that the mission is successful. 

So there are always prime movers and then the secondary movers that are observing the mission. If the mission is not done, the secondary movers must accomplish that. 

Those centers are used to control their hench drones that are equipped with explosives and weapons. The drone swarm can use chaos for making the AA flak harder to detect the drones that are controlling the systems. But there is always a prime mover in those swarms. The prime movers are hard, but possible to detect from the drone swarms. 


https://phys.org/news/2022-08-reveals-hawks-home-prey-chaotic.html

Sunday, August 26, 2018

New recon robots look like garbage

https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

Below the text is a link to the video, where strange creature moves on the floor.  That thing might be some kind of robot, what looks like garbage. Modern intelligence robots are covered from the human eye, and they have the form of garbage. Those robots can slip in the houses, and observe any movement, what the targeted person does. Their mission is to replace conventional eavesdrop systems and hidden cameras. Those robots can also load themselves autonomously from wall plugs.


New recon robots can also taste the food and other things in the room, and they see immediately does somebody in the apartment use drugs. Those robots see also if in the targeted flat would find explosives of guns. Recon robots have very sophisticated sensors, and they can even take blood samples when their target is sleeping. That information tells about does the person use drugs or how much alcohol the target would drink.


From the samples can look for abnormal cells and the cancer test would do by using that kind of systems. They can slip in the prisons if there is suspected that some prisoner has denied getting the medical attention, by their family members or lawyers. Those robots can anesthetize the person, so the target would not even notice them. And the test would ensure by DNA test. So that kind of robots an also control the human right situation in the prisons of the world.


But those systems have their dark side. They can use in extermination missions, and that means that those robots could inject lethal chemicals into the target's body. Or they can slip in the veins, and then cause massive internal blood leak. In this case, the wire looking robot would just terminate the walls of the blood veins, and that can cause death. Then they can slip out of the body and evacuate by the sewer system, so they can be horrifying weapons in wrong hands.

Link, what is mentioned the beginning of the text

https://www.unilad.co.uk/life/bizarre-alien-creature-crawling-on-floor-leaves-everyone-baffled/

Thursday, May 10, 2018

Beware this while using some voice command program


http://crisisofdemocracticstates.blogspot.fi/p/beware-this-while-using-some-voice.html

Kimmo Huosionmaa

How easy is to use voice commands in the mobile telephone. It's like in some "Star Trek" movie. If somebody wants to make very big and easy security leak to the smartphone, would that person need only some subliminal voice generator, and if the targeted person uses the system, what records the commands, what is given by using voice, would the mobile telephone become the very big security problem. Then somebody wants to teach some own commands to the mobile telephone, must this person need only some voice, like 80's techno-hit.


And then that person need only get the targeted mobile telephone in the hands in a couple of minutes. After this, that person might tech some tricks like publishing websites or using GPS to that telephone, and then that hacker must only wait for the right place and then put the music on. After that, the mobile device would automatically make records or publish websites without that the owner would even notice that. And of course, if those commands can be taught by using remote control, would that cause the situation, that the GPS system can be activated in some particular area.


After that this mobile telephone would be very easy to track. In the remote teaching, the hacker would need only two mobile telephones, what are connected to the same account. By using another telephone, the hacker would teach voice commands to another telephone, and in this case, the hacker would activate some chat-program like What's App, and then just record every world, what is told near the telephone. Even if those records are not very clear, the voice could analyze by using computer software, that uncovers every world, that is talked near the device.


This is one threat for the people, who uses mobile telephones. And somebody can teach those commands to the telephone in the house party, where the targeted person might pump full of some drugs like Sodium Pentothal, and after that, this person would tell any password, what the people want to know. The same chemical is also used in lethal injections. But that chemical is also capacity to operate as the "truth serum", and sometimes SOCOM uses it for terrorist interrogation and that might be very effective in this role.

https://www.facebook.com/IWCsync/posts/10156613717489406


http://crisisofdemocracticstates.blogspot.fi/p/beware-this-while-using-some-voice.html

Wednesday, March 28, 2018

The risks of ultra-clean nuclear weapons




Kimmo Huosionmaa

Above the text is a mushroom-shaped cloud, what has been formed by the warm gas bubble, what has been raised from the water. The formation process of this cloud is similar to nuclear explosions. But temperature is lower. Normally nuclear explosives would be noticed by increasing level of radiation. And that would uncover the atmospheric nuclear tests. The nuclear test is prohibited in the atmosphere, undersea an Earth orbiter.


The latest fusion weapons are problematic because they would not leave radioactive fallout behind them. Ignition process of those fusion devices would happen by heating lithium pieces by using high-power laser rays. The laser would raise the temperature high enough for starting fusion reaction in the piece of lithium. Those weapons are so clean, that they would not uncover by the radioactive fallout. The ignition of that system would happen by using carbon monoxide laser, what would power by acetylene light. Those systems are extremely powerful.


Ultra clean nuclear weapons can be launched by internal or external lasers. The laser can be installed on separate aircraft, what would also drop lithium canisters. Those canisters would be equipped with targeting device, and the highly powerful chemical laser can be targeted to those pieces. Same lasers can also use for anti-satellite missions.


Also, the powerful SDI-lasers could use for that purpose. The external lasers can be done easier, because the size of the bomb would not be limit. In some scenario, the lithium canisters would be dropped from satellites, and then they would be heated by using ground-based lasers, what would target to those canisters by using mirror satellites, and those weapons can be very deadly. The used lasers might be free-electron type particle accelerators what can be kilometers long.


The problem with lithium canisters is that they would not seem in radioactive sensors. So they can be installed in the boat, any kind of aircraft and missile. Those weapons are very frightened because they would be used in the terrorist attack. The only thing what the striker needs is the powerful laser, what would make enough heat for the beginning of fusion.

http://crisisofdemocracticstates.blogspot.fi/p/the-risks-of-ultra-clean-nuclear-weapons.html

What was before the Big Bang (Part II)

 What was before the Big Bang. (Part II) "Our universe could be the mirror image of an antimatter universe extending backwards in time....