Feeds

SpaceShipOne firm to build Stealth Bomber 4.0?

Even its raison d'être can't be detected

Intelligent flash storage arrays

The new black bomber might have new, fourth-gen technology, speculatively dubbed "Ultra Stealth" by Sweetman. This could conceivably offer a radar cross-section a thousandth of that presented by the Stealth-3.0 F-35, now in production test. Even a mosquito has a radar signature ten times larger than this.

Of course, strategic bombing is all rather out of fashion these days. Even tactical bombing tends to be a matter of hanging about for a long time in fairly safe bits of sky, dropping a few small, precise weapons on rare occasions. Opportunities to mount sneak raids into an alive-and-kicking air defence network are nowadays scarce. And when they do crop up, it seems that electronic trickery may count for more than low radar signature.

Do you need to take out the Iran's deep uranium centrifuge bunkers at Natanz, perhaps? Well, if a B-2 with a couple of Massive Ordnance Penetrators won't do, you could just put a suitable conventional warhead on an intercontinental missile. The need for a new bomber isn't immediately apparent, especially one that isn't even hypersonic.

(And no, launching a rocket won't make people think you've started a nuclear war, any more than when your nuclear-capable planes take off.)

However, the US Air Force apparently counter such arguments by saying that their new stealth planes - which in any case don't exist, so why are you even criticising them* - would also be great for spying missions. Air force men the world over tend to love bombers and strategic bombing - without these things, they might have to go and be part of the army.

The loose plan might be to keep things black until maybe 2010, then hold a competition for the production bomber fleet which Northrop/Scaled would be bound to win, having already built a secret demonstrator. This might avoid some of the messy hair-pulling by rival contractors which has made the USAF's life such a misery in recent aircraft buys.

Some versions of the plane might be manned, but for ultimate stealthiness and endurance an unmanned version would be more or less bound to appear. Read all of Bill Sweetman's crafty analysis here and here. ®

*This could be a primary reason for keeping the project secret.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Post-pub nosh neckfiller: The MIGHTY Scotch egg
Off to the boozer? This delicacy might help mitigate the effects
I'M SO SORRY, sobs Rosetta Brit boffin in 'sexist' sexy shirt storm
'He is just being himself' says proud mum of larger-than-life physicist
NASA launches new climate model at SC14
75 days of supercomputing later ...
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.