Feeds

Boeing shows automated spying, flying drone

Robot spyplanes deliver on Cingular

Choosing a cloud hosting partner with confidence

AW & ST reports that the process began with an email sent from the cellphone to a console of the type used aboard AWACS radar planes. Because the email was written in a NATO standard nine-line format, it was processed through the AWACS battle-management software and a time-critical target icon popped up on the AWACS display. That display was then forwarded to the Scan Eagle drone control system automatically.

"The system did a re-plan in real-time without operator intervention," Williams told AW & ST. "It created new routes for the [drones] within a second that included the time critical target. Video of the new target was sent back to the AWACS and they opened it in a normal browser to confirm it was important."

Sure enough, it was important. In true War-on-Terror style, the hammer would - in the real world - have fallen out of the sky with devastating force.

"We vectored in simulated F-18s to destroy the target," said Williams, meaning that manned jets would have blasted the vehicle to scrap with a salvo of bombs or missiles.

"Finally, that video was forwarded to the guy on the ground using a regular Cingular cell phone."

If Williams has the sequence right, it certainly seems odd that the eyeball man on the ground didn't get the video before the airstrike. All he'd be able to do after the event would be to say "aw man, the damn robots got the wrong car again", or something.

In this simulation the attack planes were human-piloted, rather as in the case of Abu Musab al-Zarqawi - al-Qaeda's then leader in Iraq - who was eliminated last year using a half-tonne of explosives delivered by F-16 jets. But, in fact, the robots can handle this part of the job too.

Consider this extract from the book Killer Elite by Times journo and former army intelligence operator Mick Smith.

"November 2, 2002 in Yemen, Bin Laden's ancestral home.

"There was little doubt that a Toyota Land Cruiser that could be seen bumping along a rocky desert road on the screens at CIA headquarters contained Qa’ed Sunyan al-Harethi, Bin Laden’s personal representative in Yemen and one of the top dozen members of Al Qaeda ... Harethi’s mobile phone was being tracked by [US special-forces techs]. They had been waiting for the moment when they could remotely programme it to switch itself on, to provide a target for an attack. Bush’s authorisation of assassination meant that the CIA and special operations commanders could kill him the moment they got eyeball on him. Now a pilotless Predator drone armed with Hellfire missiles moved into position above him. The Landcruiser and its occupants were reduced to little more than a few pieces of mangled metal..."

Since 2002, a Predator variant called Warrior has been designed, which will need no pilot even to land or take off. Add in a bit of the latest Boeing software magic to handle it on the job, and we can see that the day's coming when nothing more than a phone email - or even just the phone's presence, if it belongs to one of the unrighteous - could trigger a deadly robotic avalanche of death from the skies. More and more of the process is being automated.

It's almost not funny anymore; though it has to be said, not many of us wouldn't be interested in options to stalk people from above (or even in a few cases blow them up by email*) on our smartphones. What do we think? £30 a month?

The Boeing press release is here. ®

*Talk about your flame war. Etc.

Remote control for virtualized desktops

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?