Connect with us
DAPA Banner

Tech

4 Of The Weirdest Aircraft The US Air Force Has Ever Flown

Published

on





There are some aircraft that will forever be associated with the U.S. Air Force. The formidable and hugely heavy C-130 Hercules transport and the swift, deadly F-22 Raptor are both iconic examples. The planes, as dramatically different as they are, each have a critical role to play in their operations for the world’s largest air force. Every model in the USAF’s repertoire is a fascinating work of aviation engineering, but there have also been some rather outlandish designs that never saw mainstream adoption.

Not every aircraft ever flown by the U.S. Air Force was intended to serve in its ranks full time. Some of these were just experimental efforts that were never intended to reach production. Others were ambitious endeavors that seemed workable on paper, but as the project continued and prototypes took to the air, it proved impractical to continue. In the interests of pursuing new technology and advancing the course of aviation, more experimental models are often flown from time to time; some of them have been truly peculiar, but despite their odd designs, have had an important part to play in the overarching story of U.S. aviation. 

Advertisement

Some of the strangest aircraft the U.S. Air Force has ever flown include a Phoenix that was built to smell for nuclear attacks, a laser-wielding Boeing, and an aircraft with a unique, seemingly wingless design. Let’s take a closer look at some of these special aircraft, where they got some of their more outlandish qualities, and what ultimately happened to them. Sometimes, they were one-off curiosities that are largely forgotten, but others live on in current designs of aircraft that are still used today.

Advertisement

YAL-1 Airborne Laser Test Bed

It’s more jarring, perhaps, to see an aircraft that looks almost completely conventional, but which has one absolutely outlandish feature. As you’d probably guess, the YAL-1 Airborne Laser Test Bed has just that: The laser, which is unmissable there in the aircraft’s nose cone. That eye-catching facial feature, according to the Air Force Test Center, is “a megawatt-class chemical oxygen iodine laser,” and it’s built on the platform of a Boeing 747-400F. Military-grade lasers are being explored more and more today as means of tackling threats like drones, but in the early-2000s, the U.S. Air Force had different targets in mind: Missiles.

The laser on the nose of the YAL-1 went through an extensive program of experimentation at California’s Edwards Air Force Base. At the end of the testing in 2007, project manager John Kalita noted that it provided “an operationally significant range against all classes of missiles including intercontinental ballistic missiles.” It’s a unique approach to targeting these airborne threats, doing so in their post-launch boosting phase. Testing was performed using the laser within components of a 747 that were assembled at ground level; when operators were satisfied, the next stage was to incorporate the defensive weapon in a real, flying YAL-1A. 

Though there were successes in flight tests, the program was abandoned in late 2011. Even so, the utility of laser weapons continues to be explored, with China claiming in 2025 that it had a new laser weapon that could outperform the U.S. Navy’s HELIOS laser system.

Advertisement

Boeing WC-135R Constant Phoenix

The Constant Phoenix, Boeing’s WC-135R, is an adaptation of the C135b Stratolifter, a mighty U.S. Air Force transport. Its role is entirely different to those models, though. The U.S. Air Force explains that its “modifications are primarily related to its on-board atmospheric collection suite, which allows the mission crew to detect radioactive ‘clouds’ in real time”; the Constant Phoenix comes with the ability to collect airborne particulates, as well as holding tanks for collecting air samples, for later analysis. 

Flown by the 45th Reconnaissance Squadron, this aircraft has a role that’s as unique as it is crucial. Globally, it plays a part in ensuring that weapons tests are performed responsibly and accordingly to international standards. As WIOS reported when a Constant Phoenix landed in the United Kingdom in January of 2026, “the Limited Nuclear Test Ban Treaty of 1963 […] bans above-ground nuclear tests,” and so the aircraft’s appearance often coincides with efforts to detect whether this has been breached — hence the aircraft’s nickname of “nuke sniffer.”

Advertisement

There are just two of these aircraft currently active,  which is why it made the news when it made a rare journey across the Pacific to the UK. Due to its unique purpose, it has had a historically significant role in global crises. This includes its use during the aftermath of the Chernobyl disaster in 1986 where it was able to monitor the movement of radiation released into the atmosphere, providing crucial data to the effort to mitigate the effects of the nuclear explosion. The WC-135R variant, a modified version of the aircraft that was fitted with a quartet of CFM International turbofan engines, showcases the U.S. Air Force’s continued efforts to modernize the aging airframe for future operations. 

Advertisement

NT-43A RAT55

It’s easy to be wowed by speedy and deadly fighters. When it comes to military aircraft, though, the mighty workhorses that keep operations running often don’t get the appreciation they deserve. Support aircraft enable allies and help keep them safe, frequently becoming priority targets themselves in the effort. Elusive USAF planes like the RAT55 have their essential contributions to make too. These are modifications of the T-43A flight trainer (as shown here), fitted with all manner of advanced sensors.

Far from a small and subtle aircraft, this is actually a Boeing 737-200, one of the oldest still in service today. The RAT55 variant, though, has been extensively customized for a specific purpose. The War Zone dubs it “a grotesquely modified radar cross-section measurement platform.” Its origins as one of the long-lived commercial models are clear to see, but so too are its modifications. The nose and the tail sections bulge with the radar systems placed there, which allow the aircraft to serve its role of reading the radar signatures of stealth aircraft. 

This data can be very difficult to acquire from aircraft in flight through more conventional means, which is why the single RAT (Radar Airborne testbed) still in use holds such value. The more information it can glean about the movements of a stealth aircraft and the radar signatures they leave in their wake, the easier it is for aviation engineers to design aircraft that can obfuscate them further. Meanwhile, the RAT55 is all the more intriguing because so little is known about it. What is confirmed makes it an even more fascinating USAF asset, such as the fact that it has operated in the region of the Tonopah Test Range Airport near Area 51 in Nevada,.

Advertisement

HL-10 Lifting Body

Even the most unconventional of modern aircraft have certain features that are typically all but non-negotiable, such as a pair of wings. Nonetheless, sometimes engineers defy such conventions; that’s how the USAF finds itself with extraordinary machines like the conspicuously wingless HL-10 “flying bathtub” in its back catalog. 

The curious design, unsurprisingly, was created for a very specific role. NASA reports that its lifting body program, which also included models such as the X-24A and M2-F2, ran for almost a decade from 1966. Its goal was “to study and validate the concept of safely maneuvering and landing a low lift-over-drag vehicle designed for reentry from space.” Both NASA and USAF test pilots got behind the controls of the remarkable HL-10, which had a maximum weight of 9000 pounds, was just over 22 feet long, and was powered by a Chemical Reaction Motors Inc XLR-11 rocket engine. Flying it was surely a harrowing experience, beginning with release from a B-52 Stratofortress bomber, but it was all about testing for maneuverability and safety during a high-speed descent. 

Advertisement

And speed was definitely on the menu. In the hands of USAF pilot Peter Hoag, the HL-10 reached velocities as high as Mach 1.86 during test flights. It would go on to have a considerable influence on the development of future craft. In “Wingless Flight: The Lifting Body Story” from NASA’s History Series of publications, authors R. Dale Reed and Darlene Lister referred to the model as one of the “configurations with high volumetric efficiencies, best suited for shuttle-type missions in deploying satellites and in carrying cargo and people to and from earth orbit.” In a world that reached the moon during the testing period of the HL-10, these capabilities would be important. 



Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

New leash on life: Why this Tableau vet walked away from tech to roll with the dogs

Published

on

Eric Howard, founder of Dog Tired, rides his One Wheel while running Boone, a golden retriever, near Lake Tapps, Wash. (Photo courtesy of DogTired)

It’s tough to tell who has the bigger smile: the guy zipping by on the Onewheel, the dog running alongside him at full sprint, or the passersby lucky enough to witness it.

This is Eric Howard‘s dream job.

Howard is the founder and chief dog runner at Dog Tired, a dog-exercising service outside of Seattle that operates at a different speed. After stints in tech, including at data visualization company Tableau, Howard ditched the corporate leash for one he actually wanted to hold.

“I show up and I’m like the Beatles, and they’re like a teenage girl. They’re just excited to see me,” Howard said of his four-legged clients. “It’s hard to have a bad day when you go see eight dogs and they’re all just losing their mind, happy to see you.”

A longtime adventure seeker, Howard is a snowboarder and kiteboarder who fell in love the first time he stepped on a Onewheel — the self-balancing, single-wheeled electric board that riders control by shifting their weight.

Advertisement

He’s also a dog lover. When a relationship in Portland ended and the dog he’d shared with his girlfriend stayed behind, he got another one — a 15-pound poodle mix named Riley — and soon realized he was cut out for some sort of job in the pet industry.

The concept for Dog Tired came together when a friend had a high-energy rat terrier that was, in Howard’s words, bouncing off the walls. Howard tried running the dog alongside his Onewheel and it quickly became a daily — sometimes twice daily — ritual.

His friend noticed the difference immediately. The dog was more manageable and happy. And Howard saw an opportunity.

A nudge from dad

Howard graduated from the University of Washington with a degree in informatics at age 31 — a non-traditional path that he describes as a theme in his life. He joined Tableau as a senior tech support engineer when the company was still in what he considered a startup phase — long before it was acquired for $15.7 billion by San Francisco-based Salesforce in 2019.

Advertisement

He spent nearly five years across two separate stretches at Tableau, which he called the best employer he’s ever had. But as the startup atmosphere began to fade he lost his passion for data analysis, server engineering and managing a team. He needed a change.

“My dad really wanted me to do the Onewheel business. I really credit my dad with giving me that final nudge,” Howard said. “He was like, ‘You’ve got some money in your retirement and some money in savings. How long could you survive without making any money?’”

Howard figured he could make it six months or so.

“As soon as I started reaching out, spreading the word, it just caught fire,” he said. “People were just like, ‘This is a genius idea.’”

Advertisement

‘Bottomless demand’

Howard soon had 15 clients and a regular weekly routine. Within six months he was covering his bills. And five years later, Dog Tired has grown into a full-fledged operation. Howard does 50 runs a week and a part-time employee handles another dozen or more.

“I’ve got about 5,000 dog runs under my belt, about 17,000 miles total,” he said, adding that the business largely sells itself, with little turnover. “There’s a bottomless demand out there of dogs that are just waiting to get the exercise they need.”

Howard has a 100-pound-dog limit and he sticks to low-traffic areas. It helps him stay in control on the Onewheel when his clients want to chase squirrels or rabbits.

He said the work is really about relationship management, which is a lot of what he learned at Tableau. There’s plenty of troubleshooting, but in this case it’s dogs rather than computers.

Advertisement

“I’m not rich. I don’t make a fortune, but I feel very rich,” Howard said. “I look forward to every day. I get up early in the morning and the day can’t get started fast enough for me.”

Source link

Continue Reading

Tech

Save $150 on Apple's new M5 MacBook Air during Amazon's April sale

Published

on

The lowest price ever is in effect now on Apple’s M5 MacBook Air, with a weekend deal at Amazon slashing prices by $150 (and there are numerous 13-inch and 15-inch configurations to choose from).

Close-up of a MacBook Air keyboard and screen dock, with a bold banner reading Grab the lowest price ever on M5 models and a red corner label saying NEW
Grab the lowest price ever on Apple’s new M5 MacBook Air.

Apple’s brand-new M5 MacBook Air, which was released in March 2026, is on sale at Amazon today, with multiple 13-inch and 15-inch configurations to choose from.
Kicking off the sale is a $150 discount on the standard 13-inch MacBook Air with Apple’s M5 chip. Pick up the M5/16GB/512GB configuration for $949.99, the lowest price to date on the Sky Blue and Starlight models.
Continue Reading on AppleInsider | Discuss on our Forums

Source link

Continue Reading

Tech

Quordle hints and answers for Monday, April 6 (game #1533)

Published

on

Looking for a different day?

A new Quordle puzzle appears at midnight each day for your time zone – which means that some people are always playing ‘today’s game’ while others are playing ‘yesterday’s’. If you’re looking for Sunday’s puzzle instead then click here: Quordle hints and answers for Sunday, April 5 (game #1532).

Quordle was one of the original Wordle alternatives and is still going strong now more than 1,400 games later. It offers a genuine challenge, though, so read on if you need some Quordle hints today – or scroll down further for the answers.

Advertisement

Source link

Advertisement
Continue Reading

Tech

Hackers Are Posting the Claude Code Leak With Bonus Malware

Published

on

A WIRED investigation based on Department of Homeland Security records this week revealed the identities of paramilitary Border Patrol agents who frequently used force against civilians during Operation Midway Blitz in Chicago last fall. Several of the agents, WIRED found, appeared in similar operations in other states around the US.

Customs and Border Protection may want to remember to protect its sensitive facility information. Using basic Google searches, WIRED discovered flashcards made by users of the online learning platform Quizlet that contained gate codes to CBP facilities and more.

In a rare move, Apple this week released “backported” patches for iOS 18 to protect millions of people still using the older operating system from the DarkSword hacking technique that was found in use in the wild. Discovered in March, DarkSword allows attackers to infect iPhones that simply visit a website loaded with the takeover tools embedded in it. Apple initially pushed users to update to the current version of its operating system, iOS 26, but ultimately issued the iOS 18 patches after DarkSword continued to spread.

The US-Israel war with Iran careened into its second month this week, with Iran threatening to launch attacks against more than a dozen US companies, including tech giants like Apple, Google, and Microsoft, which have offices and data centers in the Gulf region. The deadly conflict, which has no clear end in sight, continues to wreak havoc on the global economy as shipping crews remain stranded in the Strait of Hormuz, a key trade route. Meanwhile, some are beginning to wonder what could happen if US strikes cause real damage to Iran’s nuclear facilities.

Advertisement

And that’s not all! Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

Earlier this week, a security researcher flagged that Anthropic accidentally made the source code for its popular vibe-coding tool, Claude Code, public. Immediately, people began reposting the code on the developer platform GitHub. But beware if you want to try to download some of those repos yourself: BleepingComputer reports that some of the posters are actually hackers who have tucked a piece of infostealer malware into the lines of code.

Anthropic, for its part, has been trying to remove copies of the leak (malware-ridden or not) by issuing copyright takedown notices. The Wall Street Journal reported that the company initially tried to remove more than 8,000 repositories on GitHub but later narrowed that down to 96 copies and adaptations.

This isn’t the first time that hackers have capitalized on interest in Claude Code, which requires users who might not be as familiar with their computer’s terminal to copy and paste install commands from a website. In March, 404 Media reported that sponsored ads on Google led to sites that were masquerading as official Claude Code installation guides, which directed users to run a command that would actually download malware.

Advertisement

The FBI formally classified a recent cyber intrusion into one of its surveillance collection systems as a “major incident” under FISMA—a legal designation reserved for breaches believed to pose serious risks to national security. The determination, reported to Congress earlier this week, is understood to be the first time since at least 2020 that the bureau has declared a major incident on its own systems. Politico, citing two unnamed senior Trump administration officials, reported that China is believed to be behind the intrusion. If confirmed, the breach could mark a significant counterintelligence failure for the FBI.

The FBI said it detected “suspicious activities” on its networks in February. In a notice to Congress on March 4, reviewed by Politico, the bureau said the compromised systems were unclassified and held “returns from legal process,” citing, as examples, phone and internet metadata collected under court orders and personal information “pertaining to subjects of FBI investigations.” The intruders reportedly gained access through a commercial internet service provider, an approach the FBI characterized as reflecting “sophisticated tactics.” In its only public statement, the bureau said it had deployed “all technical capabilities to respond.”

Source link

Advertisement
Continue Reading

Tech

NYT Connections hints and answers for Monday, April 6 (game #1030)

Published

on

Looking for a different day?

A new NYT Connections puzzle appears at midnight each day for your time zone – which means that some people are always playing ‘today’s game’ while others are playing ‘yesterday’s’. If you’re looking for Sunday’s puzzle instead then click here: NYT Connections hints and answers for Sunday, April 5 (game #1029).

Good morning! Let’s play Connections, the NYT’s clever word game that challenges you to group answers in various categories. It can be tough, so read on if you need Connections hints.

Advertisement

Source link

Advertisement
Continue Reading

Tech

NYT Strands hints and answers for Monday, April 6 (game #764)

Published

on

Looking for a different day?

A new NYT Strands puzzle appears at midnight each day for your time zone – which means that some people are always playing ‘today’s game’ while others are playing ‘yesterday’s’. If you’re looking for Sunday’s puzzle instead then click here: NYT Strands hints and answers for Sunday, April 5 (game #763).

Strands is the NYT’s latest word game after the likes of Wordle, Spelling Bee and Connections – and it’s great fun. It can be difficult, though, so read on for my Strands hints.

Advertisement

Source link

Advertisement
Continue Reading

Tech

Sony quietly removes PC mentions from PlayStation Studios pages

Published

on


On PlayStation Studios’ official site, Sony has updated the main banner to prominently feature Ghost of Yotei and Intergalactic: The Heretic Prophet, while Demon’s Souls Remake no longer appears in the lineup.
Read Entire Article
Source link

Continue Reading

Tech

The Hack That Exposed Syria’s Sweeping Security Failures

Published

on

When a wave of unusual activity swept through Syrian government accounts on X in March, it first looked like pure chaos—trolling, parody names, and even explicit content. But beneath the noise lay something far more telling: a state still struggling with the most basic layer of its cybersecurity.

In early March, several official Syrian government accounts on X—including those linked to the presidency’s General Secretariat, the Central Bank, and multiple ministries—were hacked. The compromised profiles posted “Glory to Israel,” retweeted explicit material, and briefly renamed themselves after Israeli leaders.

Authorities moved to restore control within days, with the Ministry of Communications and Information Technology announcing “urgent steps” to recover the accounts and prevent further breaches. Yet what remained unsettled was the deeper question: How secure is the state’s digital front door?

In a government now dependent on commercial platforms for communication, losing a verified account doesn’t just disrupt messaging—it silences the state’s voice.

Advertisement

When the State Stops Speaking for Itself

At first glance, the breach appeared politically charged. Pro‑Israel messages circulating on verified government accounts during a tense regional moment fueled speculation over motive and attribution. No group claimed responsibility, and officials did not clarify whether internal systems were compromised.

To analysts, the episode pointed less to a geopolitically driven hack and more to a familiar, systemic weakness.

“We still do not know exactly what happened. Whether the accounts were directly hacked or accessed through weak or reused credentials, the conclusion is much the same: very poor digital security practices,” says Noura Aljizawi, a senior researcher at the Citizen Lab, a research organization that monitors threats to civil society in the digital age.

The ministry said it had coordinated with account administrators and X to “restore control and strengthen security,” promising new regulatory measures soon. The perpetrators have not been publicly identified.

Advertisement

One Weak Link, Multiple Accounts

Before the accounts were recovered, several displayed identical pro‑Israel messaging—a detail that suggested shared credentials or centralized access, according to platform monitoring data.

That assessment was echoed across the cybersecurity community.

“The fact that several official X accounts seemed to fall in quick succession suggested some form of centralized control, possibly with the same credentials used across multiple accounts,” says Muhannad Abo Hajia, cybersecurity expert at Damascus-based group Sanad. “That kind of setup is not inherently wrong, but only if proper safeguards are in place.”

Experts say this pattern is consistent with common failures: password reuse, phishing attempts, compromised recovery channels, or the absence of multifactor authentication (MFA). In practice, one careless password or a single compromised recovery email could give outsiders control of multiple institutions.

Advertisement

“Account takeovers of this kind are common enough globally and usually result from familiar vulnerabilities: phishing, password reuse, compromised recovery emails, weak credentials, or the absence of MFA,” says Rinad Bouhadir, a cybersecurity engineer tracking the region.

A System Built on Fragile Foundations

The breach, specialists say, reflects not a targeted cyber‑offensive but deeper structural flaws.

“The current authorities inherited a near-nonexistent cybersecurity system and have yet to treat repairing it as a real priority,” says Dlshad Othman, a Syrian cybersecurity specialist.

He believes the incident likely stemmed from either a centralized unit managing several official accounts or a shared third‑party tool used across ministries—both of which create a single point of failure.

Advertisement

That design makes multiple agencies vulnerable at once. In moments of heightened tension, even one falsified post from a verified government account could stoke panic, misreporting, or escalation before correction.

A verified government account can be weaponized to spread false information in real time, particularly during periods of regional escalation, when confusion carries immediate real-world risk.

Source link

Advertisement
Continue Reading

Tech

NASA shares breathtaking images of Artemis II astronauts taking in the view from Orion’s windows

Published

on

The Artemis II crew is almost at the moon, and the astronauts spent this weekend carrying out preparations for their lunar flyby on Monday. That included manual piloting demonstrations, reviewing their science objectives for the six-hour observation period and evaluating their space suits, which are there for life support in the event of an emergency and for their return home. But, they’ve had plenty of time to take in the views, too — and those views sure are spectacular. In the latest series of images shared by the space agency, the astronauts are seen gazing at Earth through the windows of the Orion spacecraft.

Orion will reach the moon’s vicinity shortly after midnight on Monday, April 6. Later that day, the crew is expected to reach a point farther than any humans have traveled from Earth, surpassing the record of 248,655 miles from Earth set by the Apollo 13 astronauts in 1970.

NASA astronaut and Artemis II mission specialist Christina Koch peers out of one of the Orion spacecraft's main cabin windows, looking back at Earth, as the crew travels towards the Moon.

Mission specialist Christina Koch takes in the view. (NASA)

The lunar observation period will start at 2:45PM ET, and a few hours later, they’ll be behind the moon and briefly drop out of communication. The spacecraft’s closest approach to the moon is expected to occur at 7:02PM, when it will be 4,066 miles from the surface. “From that distance, the crew will see the entire disk of the Moon at once, including regions near the north and south poles,” according to NASA. The crew will later get a chance to see a solar eclipse “as Orion, the Moon, and the Sun align in such a way that the astronauts will see our star disappear behind the Moon for about an hour.” NASA will have coverage of the flyby starting at 1PM ET.

Source link

Advertisement
Continue Reading

Tech

Tiny Moves, Big Depth: An Open-Source Macro Focus Slider

Published

on

When taking macro photographs, you often need just a tiny bit of controlled motion — so little that it’s tough to pull off by hand. To address this, [Salveo] designed a small open-source macro photography slider featuring an anti-backlash handle.

Macro photography gives you an extremely shallow field of view, sometimes under 1 mm of depth, in which subjects stay in focus. To combat this, it’s common to capture multiple images while sliding the camera forward or backward, then combine them for a much larger depth of field than a single shot provides. [Salveo]’s slider gives fine control over this focus-stacking process, with the knob even marked to show every 1 mm of linear travel.

The slider is built around a 150 mm linear rail, though it could easily be lengthened or shortened to suit your needs. A T8 leadscrew, paired with anti-backlash nuts, translates the knob’s rotation into smooth linear motion. The knob itself uses a custom-designed anti-backlash mechanism to ensure the slider works cleanly in either direction.

Advertisement

You can grab all the 3D-printable files as well as the full bill of materials from the project page. Be sure to check out [Salveo]’s build video below. Thanks [Tim L.] for sending in this awesome open-source slider. Be sure to check out some of the other macro photography projects we’ve covered, too.

Advertisement

Source link

Continue Reading

Trending

Copyright © 2025