🔍 150 Aircraft Deployed Over Iran
The U.S. military deployed over 150 aircraft to recover a downed aviator in Iran, according to Gen. Dan Caine. The recovery operation included tactical drones, strike aircraft, and additional assets providing overhead protection for search-and-rescue personnel on the ground.
The scale of the deployment reflects standard force-protection doctrine applied to personnel recovery in denied or contested territory — layered air cover to suppress interdiction of ground teams. Committing that volume of assets indicates the operation was conducted under conditions of active or anticipated threat, not permissive airspace.
🛰️ Open sources - closed narratives
@sitreports
The U.S. military deployed over 150 aircraft to recover a downed aviator in Iran, according to Gen. Dan Caine. The recovery operation included tactical drones, strike aircraft, and additional assets providing overhead protection for search-and-rescue personnel on the ground.
The scale of the deployment reflects standard force-protection doctrine applied to personnel recovery in denied or contested territory — layered air cover to suppress interdiction of ground teams. Committing that volume of assets indicates the operation was conducted under conditions of active or anticipated threat, not permissive airspace.
🛰️ Open sources - closed narratives
@sitreports
✈️ Air Force Requests $1B CCA Drones
The U.S. Air Force has submitted a request for nearly $1 billion in fiscal year 2027 to begin CCA procurement, marking the transition of the Collaborative Combat Aircraft program from development into initial acquisition.
The CCA program is designed to field autonomous drone wingmen capable of operating alongside crewed fighter aircraft. A dedicated FY2027 budget line indicates the Air Force is moving toward operational inventory rather than continued prototype evaluation.
🛰️ Open sources - closed narratives
@sitreports
The U.S. Air Force has submitted a request for nearly $1 billion in fiscal year 2027 to begin CCA procurement, marking the transition of the Collaborative Combat Aircraft program from development into initial acquisition.
The CCA program is designed to field autonomous drone wingmen capable of operating alongside crewed fighter aircraft. A dedicated FY2027 budget line indicates the Air Force is moving toward operational inventory rather than continued prototype evaluation.
🛰️ Open sources - closed narratives
@sitreports
🔍 Marines Award ARV Second Prototype Phase
The U.S. Marine Corps has awarded a second prototyping phase for its Advanced Reconnaissance Vehicle to two major defense contractors. The ARV program targets a next-generation ground platform optimized for reconnaissance and intelligence-gathering in contested environments.
A dual-award structure at the second prototype phase indicates the Marine Corps is sustaining competitive pressure between vendors before committing to a single production contract. This approach distributes technical risk and preserves leverage over final design requirements.
🛰️ Open sources - closed narratives
@sitreports
The U.S. Marine Corps has awarded a second prototyping phase for its Advanced Reconnaissance Vehicle to two major defense contractors. The ARV program targets a next-generation ground platform optimized for reconnaissance and intelligence-gathering in contested environments.
A dual-award structure at the second prototype phase indicates the Marine Corps is sustaining competitive pressure between vendors before committing to a single production contract. This approach distributes technical risk and preserves leverage over final design requirements.
🛰️ Open sources - closed narratives
@sitreports
🔍 Storm-1175 Chains Zero-Days to Ransomware
Storm-1175, a China-linked threat actor, has exploited over 16 CVEs since 2023 — including zero-days — to deploy Medusa ransomware within 24 hours of initial access. The operational tempo indicates a pre-staged pipeline: vulnerability exploitation feeds directly into ransomware execution with minimal dwell time, as detailed in this threat analysis.
The use of zero-days alongside known CVEs suggests tiered access to exploit inventory — high-value vulnerabilities deployed selectively, with patched CVEs used against unpatched infrastructure. Sub-24-hour ransomware deployment reduces the defensive detection window to near zero, consistent with actors prioritizing disruption over prolonged access.
🛰️ Open sources - closed narratives
@sitreports
Storm-1175, a China-linked threat actor, has exploited over 16 CVEs since 2023 — including zero-days — to deploy Medusa ransomware within 24 hours of initial access. The operational tempo indicates a pre-staged pipeline: vulnerability exploitation feeds directly into ransomware execution with minimal dwell time, as detailed in this threat analysis.
The use of zero-days alongside known CVEs suggests tiered access to exploit inventory — high-value vulnerabilities deployed selectively, with patched CVEs used against unpatched infrastructure. Sub-24-hour ransomware deployment reduces the defensive detection window to near zero, consistent with actors prioritizing disruption over prolonged access.
🛰️ Open sources - closed narratives
@sitreports
🔍 FBI Dismantles Russian DNS Hijacking Network
The FBI executed Operation Masquerade, dismantling a covert router hijacking network attributed to Russian actors. The operation targeted infrastructure used to conduct DNS hijacking attacks against high-value individuals and organizations across thousands of compromised devices.
DNS hijacking at router level allows traffic interception and credential harvesting without detectable presence on endpoint devices. Targeting routers rather than hosts indicates a collection posture optimized for persistence and broad access across networks sharing the same gateway.
🛰️ Open sources - closed narratives
@sitreports
The FBI executed Operation Masquerade, dismantling a covert router hijacking network attributed to Russian actors. The operation targeted infrastructure used to conduct DNS hijacking attacks against high-value individuals and organizations across thousands of compromised devices.
DNS hijacking at router level allows traffic interception and credential harvesting without detectable presence on endpoint devices. Targeting routers rather than hosts indicates a collection posture optimized for persistence and broad access across networks sharing the same gateway.
🛰️ Open sources - closed narratives
@sitreports
🔍 Iran-Linked Actors Hit U.S. PLCs
Iran-linked operators have disrupted U.S. critical infrastructure by targeting internet-exposed programmable logic controllers, deploying Dropbear SSH to establish persistent access across operational technology environments. The PLC campaign affected multiple sectors, indicating broad reconnaissance of exposed industrial control surfaces rather than a single-target operation.
The use of Dropbear — a lightweight SSH implementation common in embedded systems — points to a methodology optimized for low-footprint persistence on resource-constrained OT devices. Internet-exposed PLCs without segmentation or authentication controls represent a structurally persistent attack surface across U.S. industrial infrastructure.
🛰️ Open sources - closed narratives
@sitreports
Iran-linked operators have disrupted U.S. critical infrastructure by targeting internet-exposed programmable logic controllers, deploying Dropbear SSH to establish persistent access across operational technology environments. The PLC campaign affected multiple sectors, indicating broad reconnaissance of exposed industrial control surfaces rather than a single-target operation.
The use of Dropbear — a lightweight SSH implementation common in embedded systems — points to a methodology optimized for low-footprint persistence on resource-constrained OT devices. Internet-exposed PLCs without segmentation or authentication controls represent a structurally persistent attack surface across U.S. industrial infrastructure.
🛰️ Open sources - closed narratives
@sitreports
🔴 Centcom Expands Drone Strike Scale
U.S. Central Command announced Tuesday that additional one-way attack drones were launched against Iran as part of Operation Epic Fury. The Centcom commander stated that hundreds of U.S. drones are involved in the operation.
The use of one-way attack drones at this declared scale indicates a sustained attrition-based strike posture rather than a discrete strike package. Mass expendable drone employment reduces reliance on crewed aircraft and complicates adversary air defense prioritization across multiple simultaneous vectors.
🛰️ Open sources - closed narratives
@sitreports
U.S. Central Command announced Tuesday that additional one-way attack drones were launched against Iran as part of Operation Epic Fury. The Centcom commander stated that hundreds of U.S. drones are involved in the operation.
The use of one-way attack drones at this declared scale indicates a sustained attrition-based strike posture rather than a discrete strike package. Mass expendable drone employment reduces reliance on crewed aircraft and complicates adversary air defense prioritization across multiple simultaneous vectors.
🛰️ Open sources - closed narratives
@sitreports
🎯 Army Eyes Fourfold PrSM Procurement
The Trump administration's fiscal 2027 budget request allocates funds to quadruple Army procurement of the Precision Strike Missile, a long-range surface-to-surface system designed to replace the ATACMS.
The scale of the requested increase indicates a structural shift toward deep-fires capacity rather than incremental stockpile maintenance. Accelerated PrSM procurement fits a broader pattern of U.S. ground forces prioritizing long-range precision strike inventory ahead of potential high-intensity conflict scenarios.
🛰️ Open sources - closed narratives
@sitreports
The Trump administration's fiscal 2027 budget request allocates funds to quadruple Army procurement of the Precision Strike Missile, a long-range surface-to-surface system designed to replace the ATACMS.
The scale of the requested increase indicates a structural shift toward deep-fires capacity rather than incremental stockpile maintenance. Accelerated PrSM procurement fits a broader pattern of U.S. ground forces prioritizing long-range precision strike inventory ahead of potential high-intensity conflict scenarios.
🛰️ Open sources - closed narratives
@sitreports
🔍 DPRK Seeds 1,700 Malicious Packages
North Korean threat actors have distributed over 1,700 malicious packages across npm, PyPI, Go, and Rust repositories since January 2025, according to this reporting. The operation spans four major package ecosystems simultaneously, combining espionage objectives with financial theft.
The cross-ecosystem scope indicates a structured supply chain poisoning campaign rather than opportunistic package abuse. Targeting open-source registries used by developers globally maximizes downstream reach — compromised dependencies propagate automatically into production environments without direct targeting of end systems.
🛰️ Open sources - closed narratives
@sitreports
North Korean threat actors have distributed over 1,700 malicious packages across npm, PyPI, Go, and Rust repositories since January 2025, according to this reporting. The operation spans four major package ecosystems simultaneously, combining espionage objectives with financial theft.
The cross-ecosystem scope indicates a structured supply chain poisoning campaign rather than opportunistic package abuse. Targeting open-source registries used by developers globally maximizes downstream reach — compromised dependencies propagate automatically into production environments without direct targeting of end systems.
🛰️ Open sources - closed narratives
@sitreports
🔍 Japan Loosens Privacy Rules for AI
Japan's government is advancing privacy law changes intended to remove opt-out rights for personal data use in AI development. A cabinet minister framed individual opt-out mechanisms as a structural obstacle to AI adoption, signaling that regulatory acceleration takes precedence over data subject controls.
The move positions Japan in direct competition with jurisdictions offering permissive data environments for model training. Eliminating opt-out rights shifts the legal default from consent-based to use-based data access — a structural change that expands the pool of training data available to domestic and potentially foreign AI developers operating under Japanese law.
🛰️ Open sources - closed narratives
@sitreports
Japan's government is advancing privacy law changes intended to remove opt-out rights for personal data use in AI development. A cabinet minister framed individual opt-out mechanisms as a structural obstacle to AI adoption, signaling that regulatory acceleration takes precedence over data subject controls.
The move positions Japan in direct competition with jurisdictions offering permissive data environments for model training. Eliminating opt-out rights shifts the legal default from consent-based to use-based data access — a structural change that expands the pool of training data available to domestic and potentially foreign AI developers operating under Japanese law.
🛰️ Open sources - closed narratives
@sitreports
🔍 10PB Breach Claimed, Tianjin Supercomputer
Hackers have claimed a 10PB data breach at the National Supercomputing Center in Tianjin, China. The NSCC Tianjin operates as a shared infrastructure node serving thousands of client organizations, including defense contractors and advanced research institutions.
If the volume claim is accurate, the exfiltration would represent one of the larger supercomputing facility breaches on record. Supercomputing centers present high-value targets due to consolidated data holdings across multiple sensitive end-users — a single intrusion yields access to research, modeling data, and institutional records spanning many organizations simultaneously.
🛰️ Open sources - closed narratives
@sitreports
Hackers have claimed a 10PB data breach at the National Supercomputing Center in Tianjin, China. The NSCC Tianjin operates as a shared infrastructure node serving thousands of client organizations, including defense contractors and advanced research institutions.
If the volume claim is accurate, the exfiltration would represent one of the larger supercomputing facility breaches on record. Supercomputing centers present high-value targets due to consolidated data holdings across multiple sensitive end-users — a single intrusion yields access to research, modeling data, and institutional records spanning many organizations simultaneously.
🛰️ Open sources - closed narratives
@sitreports
🎯 Marines Test FPV Drone At Sea
U.S. Marines and Naval Special Warfare operators successfully struck an unmanned vessel using a small first-person view drone launched from a naval craft in the Pacific, according to a DefenseScoop report.
The exercise demonstrates integration of low-cost FPV platforms into maritime small-unit tactics. Deploying drone strikes from moving naval craft against unmanned surface targets extends a pattern established in littoral combat development — adapting commercial drone technology to naval interdiction roles.
Combining Naval Special Warfare personnel with Marine units in this test indicates a joint-force approach to unmanned surface vessel threat response, a capability with direct relevance to Pacific theater operational planning.
🛰️ Open sources - closed narratives
@sitreports
U.S. Marines and Naval Special Warfare operators successfully struck an unmanned vessel using a small first-person view drone launched from a naval craft in the Pacific, according to a DefenseScoop report.
The exercise demonstrates integration of low-cost FPV platforms into maritime small-unit tactics. Deploying drone strikes from moving naval craft against unmanned surface targets extends a pattern established in littoral combat development — adapting commercial drone technology to naval interdiction roles.
Combining Naval Special Warfare personnel with Marine units in this test indicates a joint-force approach to unmanned surface vessel threat response, a capability with direct relevance to Pacific theater operational planning.
🛰️ Open sources - closed narratives
@sitreports
🔍 Iran Drone Arsenal: Damage Assessed
Secretary Hegseth and General Caine stated that Operation Epic Fury inflicted significant damage on Iran's drone arsenal, though neither official provided a comprehensive accounting of remaining capacity. Battle Damage Assessments are ongoing, with fuller evaluations expected in the immediate post-operation period.
The gap between official claims and verified damage figures is a standard feature of post-strike reporting. BDA processes typically lag combat operations by days to weeks, and public statements from senior officials precede formal assessment cycles — a pattern that routinely produces discrepancies between initial characterizations and confirmed results.
🛰️ Open sources - closed narratives
@sitreports
Secretary Hegseth and General Caine stated that Operation Epic Fury inflicted significant damage on Iran's drone arsenal, though neither official provided a comprehensive accounting of remaining capacity. Battle Damage Assessments are ongoing, with fuller evaluations expected in the immediate post-operation period.
The gap between official claims and verified damage figures is a standard feature of post-strike reporting. BDA processes typically lag combat operations by days to weeks, and public statements from senior officials precede formal assessment cycles — a pattern that routinely produces discrepancies between initial characterizations and confirmed results.
🛰️ Open sources - closed narratives
@sitreports
🔍 APT28 Deploys PRISMEX Against Ukraine
Russia-linked APT28 has deployed a malware toolkit designated PRISMEX against Ukrainian and allied infrastructure, according to recent reporting. The operation employs stealthy execution techniques designed to maintain persistent command-and-control access while evading detection.
APT28 — attributed to Russian military intelligence — has sustained offensive cyber operations against Ukrainian state and allied targets since at least 2022. PRISMEX represents a continued investment in bespoke tooling, consistent with the group's pattern of developing dedicated malware for high-priority espionage campaigns rather than relying on commodity infrastructure.
🛰️ Open sources - closed narratives
@sitreports
Russia-linked APT28 has deployed a malware toolkit designated PRISMEX against Ukrainian and allied infrastructure, according to recent reporting. The operation employs stealthy execution techniques designed to maintain persistent command-and-control access while evading detection.
APT28 — attributed to Russian military intelligence — has sustained offensive cyber operations against Ukrainian state and allied targets since at least 2022. PRISMEX represents a continued investment in bespoke tooling, consistent with the group's pattern of developing dedicated malware for high-priority espionage campaigns rather than relying on commodity infrastructure.
🛰️ Open sources - closed narratives
@sitreports
🎯 Typhoon Tests Laser-Guided Drone Countermeasure
The Royal Air Force is evaluating laser-guided rockets fired from Typhoon jets as a lower-cost method of engaging uncrewed aerial threats, following trials conducted by BAE Systems. BAE assessed the approach as a potentially cheaper alternative to current air-to-air munitions used against drones, according to trial reporting.
The development reflects a structural shift in counter-UAS procurement logic: legacy air forces are under pressure to reduce the cost-per-kill ratio when engaging low-value drone targets with high-value fighter platforms. Laser-guided rockets occupy a cost tier below dedicated air-to-air missiles, making them operationally relevant against attritable uncrewed systems.
🛰️ Open sources - closed narratives
@sitreports
The Royal Air Force is evaluating laser-guided rockets fired from Typhoon jets as a lower-cost method of engaging uncrewed aerial threats, following trials conducted by BAE Systems. BAE assessed the approach as a potentially cheaper alternative to current air-to-air munitions used against drones, according to trial reporting.
The development reflects a structural shift in counter-UAS procurement logic: legacy air forces are under pressure to reduce the cost-per-kill ratio when engaging low-value drone targets with high-value fighter platforms. Laser-guided rockets occupy a cost tier below dedicated air-to-air missiles, making them operationally relevant against attritable uncrewed systems.
🛰️ Open sources - closed narratives
@sitreports
🎯 Army Seeks Automated Hazard Detection
The U.S. Army is conducting market research for algorithms and sensor systems capable of automated target recognition in breaching operations, with a focus on detecting explosive hazards and physical obstacles at the forward edge of battle.
The initiative follows a broader pattern of automated perception integration into ground force doctrine, where human-speed visual identification of IEDs and barriers is treated as a tactical bottleneck. Sensor-algorithm pairing in this role shifts detection from individual operator attention to persistent machine surveillance of the operational environment.
The U.S. Army is conducting market research for algorithms and sensor systems capable of automated target recognition in breaching operations, with a focus on detecting explosive hazards and physical obstacles at the forward edge of battle.
The initiative follows a broader pattern of automated perception integration into ground force doctrine, where human-speed visual identification of IEDs and barriers is treated as a tactical bottleneck. Sensor-algorithm pairing in this role shifts detection from individual operator attention to persistent machine surveillance of the operational environment.
🔍 UNC6783 Targets BPO Zendesk Access
Google has identified a threat actor designated UNC6783 conducting intrusions against business process outsourcing providers as a vector to reach high-value corporate targets across multiple sectors. The group's method exploits the trusted access BPO firms hold over client systems, specifically targeting Zendesk support ticket infrastructure to harvest sensitive communications.
According to Google's findings, the operation follows a supply-chain adjacency model: rather than targeting end organizations directly, UNC6783 compromises intermediary service providers whose credentials and access permissions extend into client environments. Support ticket systems represent a high-yield collection point, aggregating internal escalations, credentials, and operational data from multiple client organizations simultaneously.
Google has identified a threat actor designated UNC6783 conducting intrusions against business process outsourcing providers as a vector to reach high-value corporate targets across multiple sectors. The group's method exploits the trusted access BPO firms hold over client systems, specifically targeting Zendesk support ticket infrastructure to harvest sensitive communications.
According to Google's findings, the operation follows a supply-chain adjacency model: rather than targeting end organizations directly, UNC6783 compromises intermediary service providers whose credentials and access permissions extend into client environments. Support ticket systems represent a high-yield collection point, aggregating internal escalations, credentials, and operational data from multiple client organizations simultaneously.
🔎 FCC Expands Foreign Router Ban
On March 23, the FCC updated its Covered List, adding router manufacturers to the roster of entities whose equipment is barred from obtaining regulatory approval required for sale in the United States. The practical effect is a prohibition on new device sales from the listed vendors.
The Electronic Frontier Foundation argues the measure targets products rather than the structural vulnerabilities that enable compromise — specifically, the absence of mandatory security standards and software update requirements applicable to all router hardware regardless of origin.
The policy fits a broader pattern of supply-chain exclusion as a primary regulatory instrument, prioritizing vendor origin over device security architecture. Critics of this approach hold that hardware bans leave existing installed devices unaddressed and do not obligate domestic manufacturers to meet equivalent security baselines.
🛰️ Open sources - closed narratives
@sitreports
On March 23, the FCC updated its Covered List, adding router manufacturers to the roster of entities whose equipment is barred from obtaining regulatory approval required for sale in the United States. The practical effect is a prohibition on new device sales from the listed vendors.
The Electronic Frontier Foundation argues the measure targets products rather than the structural vulnerabilities that enable compromise — specifically, the absence of mandatory security standards and software update requirements applicable to all router hardware regardless of origin.
The policy fits a broader pattern of supply-chain exclusion as a primary regulatory instrument, prioritizing vendor origin over device security architecture. Critics of this approach hold that hardware bans leave existing installed devices unaddressed and do not obligate domestic manufacturers to meet equivalent security baselines.
🛰️ Open sources - closed narratives
@sitreports
☢️ DARPA Seeks Radioisotope Laptop Battery
DARPA has issued a solicitation for a compact radioisotope power source capable of sustaining laptop-class devices for months on a single charge, according to this report. The program targets energy densities far beyond conventional electrochemical batteries by converting radioactive decay into usable current.
Radioisotope power systems are an established technology in long-duration space and deep-sea applications, where resupply is operationally impossible. DARPA's solicitation extends that architecture toward field-portable computing, indicating interest in platforms that operate in environments where recharging infrastructure is unavailable or a liability.
The primary constraint remains shielding mass and regulatory handling requirements for radioactive material in forward-deployed or covert contexts.
🛰️ Open sources - closed narratives
@sitreports
DARPA has issued a solicitation for a compact radioisotope power source capable of sustaining laptop-class devices for months on a single charge, according to this report. The program targets energy densities far beyond conventional electrochemical batteries by converting radioactive decay into usable current.
Radioisotope power systems are an established technology in long-duration space and deep-sea applications, where resupply is operationally impossible. DARPA's solicitation extends that architecture toward field-portable computing, indicating interest in platforms that operate in environments where recharging infrastructure is unavailable or a liability.
The primary constraint remains shielding mass and regulatory handling requirements for radioactive material in forward-deployed or covert contexts.
🛰️ Open sources - closed narratives
@sitreports
Forwarded from DD Geopolitics
Media is too big
VIEW IN TELEGRAM
🇺🇦Ukrainian Interceptor Drones Are Useless Again
Ukraine’s much‑praised interceptor drones are running into a simple physics problem: Russia’s new jet‑powered Geran‑5s are just too fast. 😅
With reported speeds in the hundreds of kilometers per hour and a cruise‑missile‑style profile, they often outrun small Ukrainian interceptors that were tuned to hunt the older, slow Shahed‑type drones, forcing Kyiv to fall back on classic air defenses and fighters.
Meanwhile, Gulf states are using their fragile truce with Iran to shop for Ukrainian drone‑defense packages, with Kyiv floating price tags in the tens of billions of dollars for its “combat‑proven” ecosystem.
But if Moscow is already feeding its battlefield lessons back into joint drone projects with Tehran, then buying today’s Ukrainian interceptors risks becoming an investment into yesterday’s threat model—high‑tech, expensive, and already a step behind the next Shahed/Geran iteration.
🔴 @DDGeopolitics | Socials | Donate | Advertising
Ukraine’s much‑praised interceptor drones are running into a simple physics problem: Russia’s new jet‑powered Geran‑5s are just too fast. 😅
With reported speeds in the hundreds of kilometers per hour and a cruise‑missile‑style profile, they often outrun small Ukrainian interceptors that were tuned to hunt the older, slow Shahed‑type drones, forcing Kyiv to fall back on classic air defenses and fighters.
Meanwhile, Gulf states are using their fragile truce with Iran to shop for Ukrainian drone‑defense packages, with Kyiv floating price tags in the tens of billions of dollars for its “combat‑proven” ecosystem.
But if Moscow is already feeding its battlefield lessons back into joint drone projects with Tehran, then buying today’s Ukrainian interceptors risks becoming an investment into yesterday’s threat model—high‑tech, expensive, and already a step behind the next Shahed/Geran iteration.
Please open Telegram to view this post
VIEW IN TELEGRAM
In the Gulf, though, Kyiv is selling something bigger than a box of drones – it’s selling a story: “We survived Shaheds, so can you.” Ukraine is offering full-spectrum drone defense packages, from interceptors and jammers to software and training teams, pitching them as a far cheaper alternative to firing Patriot and THAAD missiles worth millions at $20,000 Iranian knock‑offs.
🤡The slightly awkward detail is that while Gulf monarchies are just learning “Shahed 101,” Russia and Iran have already moved on to the advanced course, iterating new variants and tactics that Ukraine hasn’t even faced yet—meaning today’s “combat‑proven” solution arrives pre‑loaded with yesterday’s assumptions.
@sitreports
🤡The slightly awkward detail is that while Gulf monarchies are just learning “Shahed 101,” Russia and Iran have already moved on to the advanced course, iterating new variants and tactics that Ukraine hasn’t even faced yet—meaning today’s “combat‑proven” solution arrives pre‑loaded with yesterday’s assumptions.
@sitreports
Telegram
SITREP - Independent OSINT Channel
🇺🇦Ukrainian Interceptor Drones Are Useless Again
Ukraine’s much‑praised interceptor drones are running into a simple physics problem: Russia’s new jet‑powered Geran‑5s are just too fast. 😅
With reported speeds in the hundreds of kilometers per hour and…
Ukraine’s much‑praised interceptor drones are running into a simple physics problem: Russia’s new jet‑powered Geran‑5s are just too fast. 😅
With reported speeds in the hundreds of kilometers per hour and…