Below is the full spoken transcript of the 33-second video above. Each line is followed by an explanation of every technical term so that any reader — regardless of background — can understand exactly what this satellite does and why it matters.
"Five hundred fifty kilometers above you, a satellite locks a beam directly to a phone in someone's hand."
550 kilometers — About 342 miles up. This altitude is called Low Earth Orbit, or LEO. It is close enough to Earth that the signal travels fast with very little delay. Older communication satellites sit roughly 22,000 miles away, which introduces noticeable lag. LEO eliminates that problem.
Locks a beam — The satellite aims a focused radio signal straight at an individual phone, the way a spotlight points at one person on a stage instead of lighting the whole room. The technical term for this is beamforming. It means stronger signal, less wasted energy, and better privacy because the transmission is directed rather than broadcast to everyone.
"NCS-19. Sixty-three simultaneous beams. Four thousand ninety-six antenna elements."
NCS-19 — The project designation. NCS stands for NewComm Satellite. 19 is the project number in the broader intellectual property catalog.
63 simultaneous beams — The satellite can point 63 separate signals at 63 different locations on the ground at the same time. Each beam serves a cluster of phone users in a geographic area. If one beam covers a city and another covers a rural county, both operate independently and simultaneously.
4,096 antenna elements — This is a phased array antenna. Instead of one large satellite dish that has to physically rotate to point in a direction, NCS-19 uses 4,096 tiny individual antennas arranged in a flat panel. By adjusting the timing of the signal at each element electronically, the antenna steers its beams instantly in any direction with no moving parts. This is the same core technology used in modern fighter jets (F-35) and Navy destroyers (Aegis combat system). It is extremely reliable because there are no mechanical components to wear out.
"Full encryption negotiation in under one second."
Encryption negotiation — Before any voice or data is sent between the phone and the satellite, the two devices agree on a secret code to scramble the conversation so that nobody listening in between can read it. This agreement process is called a handshake. On many existing systems it takes several seconds. NCS-19 completes it in under one second.
AES-256 — Advanced Encryption Standard with a 256-bit key. This is the encryption standard used by the United States government to protect classified information. The number 256 refers to the length of the secret key — the longer the key, the harder the encryption is to crack. AES-256 is considered unbreakable by any computer that exists today. Every major bank, military system, and secure messaging app uses some version of AES.
Quantum Key Distribution (QKD) — An optional additional layer of protection available in Business mode. Instead of relying on mathematical complexity alone (which a future quantum computer might theoretically break), QKD uses the laws of physics to protect the encryption keys. If anyone attempts to intercept or observe the key while it is being exchanged, the act of observation physically alters the key, which alerts both the phone and the satellite immediately. It is the most secure form of communication known to exist.
"No tower. No carrier. No middleman."
No tower — Your phone connects directly to the satellite overhead. It does not need a cell tower on the ground. This means it works in rural areas with no infrastructure, in disaster zones where towers have been destroyed, on open ocean, in mountains, and in any other location where you can see the sky. Roughly 80% of the Earth's land surface has little to no cell coverage today. NCS-19 covers all of it.
No carrier — You are not dependent on AT&T, Verizon, T-Mobile, or any traditional phone company to provide your signal. The satellite itself is the network. This eliminates carrier fees, coverage gaps, throttling, and the ability of a third-party company to control or monitor your connection.
No middleman — Your data travels from your phone to the satellite to its destination. No third party handles it, stores it, reads it, or sells it. This is called a zero data sharing architecture. Your communications are yours.
"The protocol is written. The interface is tested. The specification is complete."
Protocol — The precise language the phone and satellite use to communicate. NCS-19 defines nine specific message types that cover every interaction: establishing a connection, choosing a beam, setting the encryption mode, switching between School/Business/Play modes on the paired NewStar phone, handling satellite-to-satellite handoffs, and triggering emergency SOS services. Every message type is fully documented.
Interface — The exact point where the phone's software meets the satellite's software. A working simulator has been built that mimics real satellite behavior so the firmware can be tested without an actual satellite in orbit. 114 integration tests have been written and executed. All 114 pass. 148 communication frames were exchanged in 0.01 seconds during testing.
Specification — The complete written blueprint for how to build and operate the satellite. This includes physical dimensions, materials (aluminum 6061-T6 structure, gold multilayer insulation blankets, titanium thruster nozzles), power systems (quantum battery, 10+ year continuous operation), antenna design (400mm x 300mm phased array panel), orbit parameters (550 km sun-synchronous LEO), all 13 subsystem modules with weights, and the full communication payload. Everything an engineering team needs to begin manufacturing is documented and ready.
"What doesn't exist yet is the hardware in orbit. That's what the capital is for."
This is a fully designed, fully documented, patent-protected satellite communications system. The engineering work is done. What remains is manufacturing the physical satellite hardware, launching it into orbit, and producing the phones that connect to it.
The product is protected by 33 USPTO patent applications filed between 2012 and 2025, with the most recent (application 19/177,547) filed April 12, 2025. An additional 1,752+ copyrighted inventions underpin the technology. The implementation timeline is 48 months from contract award to operational deployment, across four phases: design and development, prototype and testing, production and integration, and deployment and operations.