Feeds

Boeing shows automated spying, flying drone

Robot spyplanes deliver on Cingular

Remote control for virtualized desktops

AW & ST reports that the process began with an email sent from the cellphone to a console of the type used aboard AWACS radar planes. Because the email was written in a NATO standard nine-line format, it was processed through the AWACS battle-management software and a time-critical target icon popped up on the AWACS display. That display was then forwarded to the Scan Eagle drone control system automatically.

"The system did a re-plan in real-time without operator intervention," Williams told AW & ST. "It created new routes for the [drones] within a second that included the time critical target. Video of the new target was sent back to the AWACS and they opened it in a normal browser to confirm it was important."

Sure enough, it was important. In true War-on-Terror style, the hammer would - in the real world - have fallen out of the sky with devastating force.

"We vectored in simulated F-18s to destroy the target," said Williams, meaning that manned jets would have blasted the vehicle to scrap with a salvo of bombs or missiles.

"Finally, that video was forwarded to the guy on the ground using a regular Cingular cell phone."

If Williams has the sequence right, it certainly seems odd that the eyeball man on the ground didn't get the video before the airstrike. All he'd be able to do after the event would be to say "aw man, the damn robots got the wrong car again", or something.

In this simulation the attack planes were human-piloted, rather as in the case of Abu Musab al-Zarqawi - al-Qaeda's then leader in Iraq - who was eliminated last year using a half-tonne of explosives delivered by F-16 jets. But, in fact, the robots can handle this part of the job too.

Consider this extract from the book Killer Elite by Times journo and former army intelligence operator Mick Smith.

"November 2, 2002 in Yemen, Bin Laden's ancestral home.

"There was little doubt that a Toyota Land Cruiser that could be seen bumping along a rocky desert road on the screens at CIA headquarters contained Qa’ed Sunyan al-Harethi, Bin Laden’s personal representative in Yemen and one of the top dozen members of Al Qaeda ... Harethi’s mobile phone was being tracked by [US special-forces techs]. They had been waiting for the moment when they could remotely programme it to switch itself on, to provide a target for an attack. Bush’s authorisation of assassination meant that the CIA and special operations commanders could kill him the moment they got eyeball on him. Now a pilotless Predator drone armed with Hellfire missiles moved into position above him. The Landcruiser and its occupants were reduced to little more than a few pieces of mangled metal..."

Since 2002, a Predator variant called Warrior has been designed, which will need no pilot even to land or take off. Add in a bit of the latest Boeing software magic to handle it on the job, and we can see that the day's coming when nothing more than a phone email - or even just the phone's presence, if it belongs to one of the unrighteous - could trigger a deadly robotic avalanche of death from the skies. More and more of the process is being automated.

It's almost not funny anymore; though it has to be said, not many of us wouldn't be interested in options to stalk people from above (or even in a few cases blow them up by email*) on our smartphones. What do we think? £30 a month?

The Boeing press release is here. ®

*Talk about your flame war. Etc.

Intelligent flash storage arrays

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.