Feeds

SpaceShipOne firm to build Stealth Bomber 4.0?

Even its raison d'être can't be detected

Secure remote control for conventional and virtual desktops

The new black bomber might have new, fourth-gen technology, speculatively dubbed "Ultra Stealth" by Sweetman. This could conceivably offer a radar cross-section a thousandth of that presented by the Stealth-3.0 F-35, now in production test. Even a mosquito has a radar signature ten times larger than this.

Of course, strategic bombing is all rather out of fashion these days. Even tactical bombing tends to be a matter of hanging about for a long time in fairly safe bits of sky, dropping a few small, precise weapons on rare occasions. Opportunities to mount sneak raids into an alive-and-kicking air defence network are nowadays scarce. And when they do crop up, it seems that electronic trickery may count for more than low radar signature.

Do you need to take out the Iran's deep uranium centrifuge bunkers at Natanz, perhaps? Well, if a B-2 with a couple of Massive Ordnance Penetrators won't do, you could just put a suitable conventional warhead on an intercontinental missile. The need for a new bomber isn't immediately apparent, especially one that isn't even hypersonic.

(And no, launching a rocket won't make people think you've started a nuclear war, any more than when your nuclear-capable planes take off.)

However, the US Air Force apparently counter such arguments by saying that their new stealth planes - which in any case don't exist, so why are you even criticising them* - would also be great for spying missions. Air force men the world over tend to love bombers and strategic bombing - without these things, they might have to go and be part of the army.

The loose plan might be to keep things black until maybe 2010, then hold a competition for the production bomber fleet which Northrop/Scaled would be bound to win, having already built a secret demonstrator. This might avoid some of the messy hair-pulling by rival contractors which has made the USAF's life such a misery in recent aircraft buys.

Some versions of the plane might be manned, but for ultimate stealthiness and endurance an unmanned version would be more or less bound to appear. Read all of Bill Sweetman's crafty analysis here and here. ®

*This could be a primary reason for keeping the project secret.

Secure remote control for conventional and virtual desktops

More from The Register

next story
SCREW YOU, Russia! NASA lobs $6.8bn at Boeing AND SpaceX to run space station taxis
Musk charging nearly half as much as Boeing for crew trips
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Thought that last dinosaur was BIG? This one's bloody ENORMOUS
Weighed several adult elephants, contend boffins
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
India's MOM Mars mission makes final course correction
Mangalyaan probe will feel the burn of orbital insertion on September 24th
Cracked it - Vulture 2 power podule fires servos for 4 HOURS
Pixhawk avionics juice issue sorted, onwards to Spaceport America
City hidden beneath England's Stonehenge had HUMAN ABATTOIR. And a pub
Boozed-up ancients drank beer before tearing corpses apart
'Duck face' selfie in SPAAAACE: Rosetta's snap with bird comet
Probe prepares to make first landing on fast-moving rock
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.