Feeds

USAF flying deathbot power-grab rebuffed

Aerial killdroids escape military pilots' union

Protecting against web application threats using SSL

The US Air Force (USAF)'s plan to seize control of almost all American flying killbots has been rebuffed, according to reports.

At present, a wide variety of remote-controlled and/or autonomous aircraft are operated by all four branches of the US military*. The USAF has been pointing out for some time that this can lead to inefficiencies, as it might be possible to buy fewer types in larger numbers.

Strangely enough, the USAF's plan for a more efficient future involved an air force takeover of all drones/robots etc operating above an arbitrary ceiling of 3,500 feet. This could have given the men in light blue control of the navy's future carrier wings and maritime patrol planes, not to mention the many aerial flesh-harvesters so beloved of Army and Marine grunts and special ops types.

In effect, it would have been a massive skybot power grab, by a service which is institutionally far from sympathetic to aerial drones.

At first, the scheme seemed to be gaining some traction, but now it appears that Deputy Defense Secretary Gordon England has put the kibosh on it in a memo issued last week. However, he does intend that competing Army and USAF programmes involving the "Predator" drone from General Atomics should be combined and include a common datalink.

The Army Predator (or "Sky Warrior") is planned to operate without significant use of remote handling by qualified pilots, being able to land itself autonomously. Thus far, USAF Predator operations have involved a large number of wings-on-chest types, usually working in shifts. Exactly how the differing philosophies will be resolved isn't clear.

Some more detail is available from Aviation Week

*Note to non-US readers: the US Marines normally count as a separate service. Probably fair enough, as they are about the size of two British services combined.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.