logo
Northrop tests tech to help hypersonic vehicles maneuver without GPS

Northrop tests tech to help hypersonic vehicles maneuver without GPS

Yahoo09-05-2025

Two recent groundbreaking hypersonic test flights featured a Northrop Grumman capability designed to allow high-speed systems to navigate and maneuver when GPS isn't available.
The company told Defense News this week that its inertial measurement unit, or IMU, flew onboard Stratolaunch's Talon-A glide vehicle during its first two hypersonic flights in December and March.
The successful demonstration of IMU technology on a hypersonic aircraft — which can travel and maneuver at speeds of Mach 5 or higher — is an industry first, according to Jonathan Green, Northrop's chief technology officer for emerging capabilities development.
'It met all of our goals … and the fact that it survived throughout this first flight test — these are all incredibly positive developments for how we're maturing this technology,' he said in an interview.
The Pentagon disclosed the Talon-A tests this week, marking the first successful flights of a reusable hypersonic vehicle since the X-15 program ended in 1968. The U.S. in recent years has increased its investment in high-speed weaponry and aircraft, and Stratolaunch's testbed reflects a renewed urgency to create test opportunities for the components and subsystems needed to support major hypersonic development efforts.
Northrop's Advanced Hypersonic Technology IMU is designed to allow high-speed systems to navigate without GPS — a capability that could be disrupted by adverse weather, difficult terrain or enemy jamming and spoofing.
Using advanced sensors to understand how a platform is moving through its environment, the IMU calculates where the system has traveled and what path it needs to take to continue on its trajectory. According to Josei Chang, senior director of advanced technologies at Northrop Grumman Mission Systems, the system performed as expected during the flight tests and accurately calculated the vehicle's path.
While Northrop has developed IMUs for spacecraft, this version is a smaller, more rugged system, repackaged to fit on an air vehicle and designed to survive the harsh conditions of Mach 5 flight.
'What we have done within Northrop Grumman is to develop an inertial navigation technology that really started from our lineage in space-based inertial navigation,' Green said. 'We took that capability, that portfolio of technology, and enhanced it.'
The hypersonic flights represent a significant milestone for the system, which is still in the research and development phase. An abstract for an upcoming navigation conference notes Northrop is developing IMU technology in partnership with the Army Combat Capabilities Development Command Aviation and Missile Systems Center, but the company declined to confirm whether it has any formal development partners or contracts.
Northrop plans to test the IMU on a sounding rocket sometime this quarter and is also eyeing another test event later this year at Holloman Air Force Base in Utah. That test will focus on how the system performs in an environment with high gravitational force.
The company is also closely tracking Talon-A's test schedule, though Green wouldn't confirm whether the IMU would be on Stratolaunch's next flight, slated for this spring or summer.
'This partnership that we've had with Stratolaunch to get the system out there and get it tested was absolutely critical,' he said. 'It does speak to the importance of being able to test these things and have the resources to test these things.'

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

What We Know About Ukraine's Mass Drone Assault On Russian Bombers
What We Know About Ukraine's Mass Drone Assault On Russian Bombers

Yahoo

time4 hours ago

  • Yahoo

What We Know About Ukraine's Mass Drone Assault On Russian Bombers

A day after Ukraine's audacious attack using drones launched from trucks to strike nearby Russian bombers, the scope of the damage and how the mission was pulled off is just starting to come into focus. While there are still questions as to just how many bombers were destroyed, the attack was a major blow to Russian strategic aviation, regardless, a subject you can read more about in a separate story we posted earlier today. You can also catch up with our initial report on the attack here. Ukraine claims it struck 41 Russian aircraft in its attack on Sunday, according to Ukrainian Lt. Gen. Vasyl Malyuk, head of the Security Service of Ukraine (SBU), which carried out the attack known as Spiderweb. All told, 117 first-person view (FPV) drones struck the Belaya, Dyagilevo, Ivanovo and Olenya air bases, the SBU says. On June 1, the Security Service of Ukraine carried out a brilliant operation— on enemy territory, targeting only military objectives, specifically the equipment used to strike Ukraine. Russia suffered significant total, 117 drones were used in the operation – with a… — Defense of Ukraine (@DefenceU) June 2, 2025 'The Security Service of Ukraine conducted an unprecedented and unique special operation to simultaneously destroy four military airfields in the rear of the Russian Federation, where enemy aircraft are deployed,' the SBU stated on Telegram on Monday. 'As a result of drone strikes, 41 aircraft were hit, including the A-50, Tu-95, Tu-22M3, and Tu-160.' 'In general, we are talking about the defeat of 34% of strategic cruise missile carriers at the main airfields of the Russian Federation,' Malyuk claimed. 'This was not just a devastating blow to enemy aircraft, but a serious slap in the face of the power and terrorist essence of the Russian Federation.' Andriy Kovalenko, head of the Ukrainian government's center for counteracting disinformation, said that so far, there is evidence that 13 aircraft were destroyed. '…even more were damaged …(over 40 in total),' he claimed on Telegram, though that figure could rise. We must make clear that all of this still needs to be confirmed. Meanwhile, Russian sources discount the damage. Again, The War Zone cannot independently verify either claims. Adding to the challenges of doing so is that many of the air bases attacked are under cloud cover, making verification through traditional satellite imagery impossible. Satellite mapping images taken by synthetic aperture radar (SAR) over the Belaya airbase appear to indicate that four Tu-95s and four Tu-22M3s were destroyed at the base. There are further indications that four Tu-95s and one An-12 were destroyed at Olenya, for a total of 13 airframes. No images have yet emerged of Dyagilevo or Ivanovo, so the total number of aircraft destroyed or damaged could be higher. When it comes to SAR imagery, especially of the commercial variety, it should be treated as an indicator and not conclusive for evaluating damage like this. Pairing what is imaged with other intelligence-related products can help bridge the certainty gap. So, we will have to wait for more information. The revetted parking positions. — Chris Biggers (@CSBiggers) June 2, 2025 Olenya/Olenegorsk/Vysokiy (part two).Burning An-12: 68.146555, 33.450901Destroyed Tu-95MS from part 3 at 68.145419, 33.449928 identified as RF-94257 '22 Red' — Evergreen Intel (@ 2025-06-02T14:24:07.929Z There was also some indication that a Tu-95MS may have also been destroyed at the Ukrainka air base. Yesterday's drone attack on Ukrainka Air Base in the Amur Oblast of Russia's Far East, right on the border with China, which was initially believed to have been a total failure, with the truck and drone container seen burning on the side of the road after some kind of… — OSINTdefender (@sentdefender) June 2, 2025 There are additional suggestions that two more Tu-95s may have been damaged, as well as an Il-76 Candid transport aircraft. Updated BDA of Operation Pavutyna as of 1500 EST June 2nd 2025. Olenya Airfield 4x Destroyed TU-95 1x Likely Destroyed TU-951x Destroyed AN-12(Typo on my part kept accidentally typing AN-22) Belaya Airfield3x Destroyed TU-95 1x Damaged TU-95 4 TU-22M3 in total… — Intelschizo (@Schizointel) June 2, 2025 'At the Olenya airbase in the Murmansk region, where Pantsir was actively working, only one Tu-95MS was lost and another was seriously damaged,' the Russian Military Chronicle Telegram channel claimed. 'The only thing that saved us was that the planes were standing empty for routine maintenance, without missiles. According to other sources, 8 Tu-95MS units were partially or completely lost, including possibly an Il-76 (the pictures are not clear). Also, 4 Tu-22M units and 1 An-12 were disabled.' No imagery has yet emerged of damaged or destroyed Tu-160 Blackjack bombers, the A-50 airborne early warning and control (AEW&C) aircraft, or the transport airframes. Several videos were posted immediately after the attacks showing Russian bombers being struck, burning, as well as the drones being launched. Ukrainian drones struck Russian strategic aviation at the Belaya air base in Irkutsk – 4,800 km from Kyiv. — Michael MacKay (@mhmck) June 1, 2025 Locals filmed dozens of small FPV-like drones which reportedly struck multiple aircraft and other targets at the base. In short, a truck drove up to a gas station in the town next to the base and launched at least 20 drones.#BudanovApproves#OSINT — OSINT Intuit (@UKikaski) June 1, 2025 The Russian aviation-connected Fighterbomber Telegram channel downplayed the scope of the damage but acknowledged the seriousness of the attack. '… 34% of strategic cruise missile carriers were hit. This is pure bullshit,' Fighterbomber wrote on Monday morning. 'The number of planes hit is in the single digits. (Hit does not always mean destroyed) And our carriers are Tu-95, Tu-160 and Tu-22. But yes, even one destroyed [strategic bomber] is a huge loss for a country that does not yet make such aircraft and has nowhere to get them.' In addition to more information about the number of types of aircraft destroyed, more details are emerging about how this attack was carried out. 'First the SBU transported FPV drones to Russia, and later – mobile wooden houses,' the SBU said Monday. 'Already in the territory of the Russian Federation, drones were hidden under the roofs of houses, placed on trucks. At the right moment, the roofs of the houses were remotely opened, and the drones flew to hit the designated targets – Russian bombers.' One video shows one of the drones hovering over a bomber as it slowly approaches its point of detonation. SBU spokesman Artem Dekhtiarenko declined to offer more details, adding that for now, he can only share the information provided in the official statement. 'Some things may be told only upon approval at a determined time,' he told us. 'We disclose the details only when it will not hamper the future operations.' Footage showing a Ukrainian FPV Drone striking one of the fuel tanks on a Tu-95MS Long-Range Strategic Bomber at Olenya Airbase in Murmansk today during Operation Spiderweb. — OSINTdefender (@sentdefender) June 1, 2025 It's been a long time since I worked with ArduPilot Mission Planner, but I think this screenshot suggests this drone navigated to the airfield autonomously and then was hand-flown into the target. "PosHold", "0m>6" and the map in the upper left are the clues. 1/ — John Wiseman (@lemonodor) June 1, 2025 Spiderweb, more than 18 months in the making, was a marvel of operational security, timing and logistics. It took place in secret, in different time zones, and required the manufacture and movement of drones, the trucks they were launched from, and the structures they were launched from. The simplicity in this plan makes it. Use existing unwitting logistical avenues to drive your weapons to a location near unsuspecting enemy positions and unleash your attack.I'd love to know how they got these structures into Russia. — TheIntelFrog (@TheIntelFrog) June 2, 2025 As we mentioned yesterday, containers with the drones were assembled in Russia, according to Russian milblogger Sergey Kolyasnikov. 'We found a warehouse where containers with drones were collected, Chelyabinsk, Sverdlovsk tract 28A,' he wrote on Telegram. 'It was rented for 350,000 rubles (about $4,500). That's why the truck in the Amur region had Chelyabinsk license plates – they were leaving from there.' Russian sources claim geolocation shows Ukrainian FPV drones used in the airbase attacks were assembled inside a rented warehouse at 28A Sverdlovsky Trakt, Chelyabinsk, claimed facility lies just near the Kazakhstan border, possibly a supply route for components. — Clash Report (@clashreport) June 1, 2025 Ukrainian operatives duped those around them, the Kyiv Independent (KI) reported on Monday. Those operatives, 'likely supported by embedded agents or sympathetic locals—built First Person View (FPV) drones using materials sourced from within Russia,' the publication wrote. 'These strike platforms were hidden inside wooden modular cabins constructed to look like prefabricated houses. Beneath the roof panels, drone bays were concealed between structural beams, with remotely operated opening mechanisms to allow launch on command.' Unique footage and details of the preparation of the operation to destroy Russian air bases published by the SBU! Drones were hidden in the roofs of camouflaged cargo to SBU sources, Ukraine's Security Service conducted a special operation called… — Special Kherson Cat (@bayraktar_1love) June 1, 2025 Once sealed, 'the cabins were loaded onto civilian trucks. The vehicles were then handed over to unwitting Russian drivers, recruited by Artyom, a 37-year-old ethnic Ukrainian who coordinated logistics under the cover of a private construction job,' KI noted. 'The drivers were told they were transporting portable homes to regions like Murmansk, Irkutsk, Ryazan, and Ivanovo. Each was given a delivery plan, a route, and a schedule. During transit, a mysterious intermediary would call and issue final location instructions—always near military infrastructure.' Russia's defense ministry said it had detained an undisclosed number of 'participants in the terrorist attacks,' the Financial Times reported, citing state media. How Ukraine's Special Services conned Russian truck drivers into delivering drones that then destroyed $7 billion of Russia's most irreplaceable — Kyiv Insider (@KyivInsider) June 2, 2025 Zelensky on Sunday offered another supposed detail. 'The most interesting thing – and we can already say this publicly – is that the 'office' of our operation on Russian territory was located right next to the FSB of Russia in one of their regions,' the Ukrainian president claimed. In the aftermath of the attacks, video emerged of Russian authorities stopping trucks for inspection, creating large traffic jams across the nation as authorities try to determine if there are any more attacks in the offing. Traffic jams are being reported today all across Russia, with trucks seen backed-up for miles in the Irkutsk Oblast, as the Federal Security Service (FSB) and other law enforcement agencies frantically search for any additional drone carriers, fearing another large-scale drone… — OSINTdefender (@sentdefender) June 2, 2025 While the damage from Sunday's attack was still being assessed, both sides launched new cross-border barrages. Video emerged on social media of claimed attacks on the Lipetsk and Voronezh regions, though the results of those incidents are unclear. 'In Lipetsk Oblast, a drone crashed behind a three-story apartment building in Lebedyan, causing a fire and shattering windows from the blast wave,' Euromaidan Press reported. 'Local reports suggested drones attempted to target the Novolipetsk Metallurgical Plant NLMK industrial plant that produces steel.' 'Voronezh Oblast experienced infrastructure damage when a high-voltage wire broke on the M-4 'Don' highway,' according to Euromaidan Press. 'Governor Alexander Gusev reported broken windows in houses and vehicles but stated there were no civilian casualties among the 15 drones intercepted in the region. Local residents reported attacks on the Borisoglebsk military airfield, which houses an aviation repair plant previously targeted in January 2025, according to Russian independent media Astra.' The Russian Defense Ministry claimed that 'air defense systems on duty intercepted and destroyed 162 Ukrainian aircraft-type unmanned aerial vehicles' overnight. That included 27 UAVs over the Lipetsk region, 16 over the Voronezh region, 11 over the Bryansk region and 11 over the Ryazan region. Drones are heavily attacking Lipetsk-2 airbase, NLMK steelworks, and ammunition warehouses. — Ukraine Front Line (@EuromaidanPR) June 2, 2025 Overnight, Russia was again under a massive attack reporting downing 162 Ukrainian drones across 8 regions.A military airfield was targeted in Voronezh Oblast, according to local residents. The airfield also houses an aviation repair plant that was previously hit in January… — Euromaidan Press (@EuromaidanPress) June 2, 2025 Russia launched attacks as well, firing 80 Shahed attack drones and simulator drones of various types along with three Iskander-M/KN-23 ballistic missiles and an Iskander-K cruise missile, according to the Ukrainian Air Force. 'The main areas of the air strike are Kharkiv, Chernihiv, Donetsk and Kherson regions,' the Air Force stated on Telegram. In the morning, the enemy struck one of the enterprises of the Chernihiv region. Firefighters localized the fire to an area of ​​6800 sq. m. There is no threat of further spread. — The Ukrainian Review (@UkrReview) June 2, 2025 Meanwhile, Ukraine and Russia held the second round of talks aimed at ending the conflict, now in its fourth year. Negotiations concluded in a little more than an hour, with little additional progress made. The two sides did agree on an exchange of prisoners and remains, according to Ukrainian Defense Minister Rustem Umerov. Ukraine and Russia have agreed to an 'all-for-all' exchange of seriously wounded and ill prisoners of war, as well as all service members aged 18–25, Umerov told reporters. Both sides have also agreed to begin exchanging the bodies of 6,000 service members each, he added. Ukrainian Defense Minister Rustem Umerov states following today's peace talks in Istanbul, that Ukraine and Russia have agreed to a 'all-for-all' exchange of seriously wounded and ill prisoners of war, as well as all servicemembers aged 18–25. He adds that both sides have also… — OSINTdefender (@sentdefender) June 2, 2025 While Ukraine was seeking a full ceasefire as a starting point in negotiations, Moscow's top negotiator, Vladimir Medinsky, stated that Russia proposed a partial ceasefire at the talks in Istanbul, The Guardian reported. 'We have proposed a specific ceasefire for two to three days in certain areas of the front line,' Medinsky said, 'so that commanders can collect the bodies of their soldiers.' There was no immediate response to that from Ukrainian negotiators. Another key point that emerged was Ukraine handing Russia a list of 'several hundred' children that Kyiv wants returned from Russia, according to Umerov. These abductions were the subject of an international criminal court arrest warrant for Russian President Vladimir Putin as well as other Russian officials. It is unknown at the moment how Russia will respond to having its bombers successfully attacked on such a scale from inside its own borders, however, the devastation of even a portion of its strategic bomber fleet will likely engender a response beyond the scope of what have become almost routine drone and missile attacks. Contact the author: howard@

Elon Musk Wants You to Use XChat for Your Next Signalgate
Elon Musk Wants You to Use XChat for Your Next Signalgate

Gizmodo

time7 hours ago

  • Gizmodo

Elon Musk Wants You to Use XChat for Your Next Signalgate

Elon Musk announced on Sunday that starting soon, you will be able to chat with your friends, family, and war collaborators on X, the everything app. Now, you might be thinking, 'I could already do that, Twitter has had direct messages since basically forever.' And you would be right. But you see, this is XChat, Musk's long-promised 'secure' messaging service—though there are some questions as to just how secure it is. Per Musk, XChat (which it appears will simply replace the existing Messages feature) is rolling out with 'encryption, vanishing messages and the ability to send any kind of file,' as well as video and audio calls. It'll launch to a limited number of users, but Musk claims it'll be available to all users 'this week,' pending any scaling issues. Encryption has been a long-requested feature of Twitter's messaging feature, something that journalists wanted long ago for communicating with sources on the platform, and other users have increasingly been drawn to as encryption has become more accessible and standardized and the government has gotten more capable of prying into people's privacy. Musk previously haphazardly introduced encrypted messaging to X direct messages, a feature that was opt-in only, not end-to-end encrypted, and only available to people who pay $8 a month for the blue checkmark. But this time, he says XChat will be the real deal. 'This is built on Rust with (Bitcoin style) encryption, whole new architecture,' he explained. A problem: 'Bitcoin-style' encryption is a meaningless description. Bitcoin uses cryptography to create digital signatures for transactions, but it is not 'encrypted' itself. In fact, Bitcoin transactions are broadcast in cleartext for transparency—a thing you don't want from your private messaging service. The promotional landing page for XChat describes it as having 'end-to-end encryption' and 'state-of-the-art privacy,' so generously, let's assume that is somehow what Musk means when he says 'Bitcoin-style' security. Musk has long suggested that X should have a messaging system that could compete with Signal and other secure communications platforms. XChat looks like it'll be his shot at making that happen, though it's off to a pretty poor start, considering he can't clearly define the security protocols in place. So maybe it's not ready to compete with Signal, but it almost certainly could provide the same level of security as TeleMessage, the modified version of Signal that Trump administration officials were using until it got hacked earlier this year. It also doesn't help that he's been undermining the security of users basically since the day he took over. He removed the ability of users to make use of two-factor authentication unless they are paying for X Premium and implemented restrictions on the number of messages non-paying users can send on the platform (it's not clear if that restriction will be lifted for XChat or not) under the guise of 'spam prevention.' Under his leadership, X has also complied with the vast majority of government requests that it has received. Last week, the company announced that users would no longer be able to send new encrypted messages via its existing DM feature—likely in an effort to push people to XChat, but still cutting off a means of secure communication in the meantime.

Elon Musk's xAI reportedly looks to raise $300M in tender offer
Elon Musk's xAI reportedly looks to raise $300M in tender offer

TechCrunch

time8 hours ago

  • TechCrunch

Elon Musk's xAI reportedly looks to raise $300M in tender offer

In Brief Billionaire Elon Musk's AI startup, xAI, is reportedly launching a $300 million share sale that values the company at $113 billion. According to The Financial Times, the secondary stock offering, which comes after xAI acquired Musk's social media platform, X, for $33 billion, will allow staff to sell shares to new investors. The tender offer will likely precede a larger investment round in which xAI will offer new equity to outside backers. As The Financial Times notes, xAI is looking to raise additional cash while Musk works to shift his attention from politics to his various companies, which have suffered during the tech mogul's time in Washington. Shares of Tesla hit a six-month low in early March, while X has experienced numerous lengthy outages. Meanwhile, xAI has repeatedly missed its own deadlines to ship an upgrade to its flagship AI model, Grok.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store