Feeds

US, UK deploy manned unmanned aircraft to save bandwidth

Backseaters still tolerating pilots for now

High performance access to file storage

Bandwidth-starved military spyplane chiefs are resorting to the use of humans as airborne data-processing nodes, according to reports. Difficulties in deployment of unmanned robot surveillance craft have led to the purchase of basic civilian planes for use in intelligence work above Iraq and Afghanistan.

For years now, ground commanders fighting elusive enemies in Southwest Asia have been begging for more and more long-endurance overhead surveillance, particularly that provided by the well-known Predator and Predator-B/Reaper Unmanned Air Vehicles (UAVs).

An earlier Beechcraft modified for knob-turner special missions

Yes, that one is pretty funny looking

Initially, problems in delivering more video and groundscan radar imagery were seen as following from foot-dragging by the air force. Generals were reluctant to draft jet jockeys into hated shift duties on the ground, piloting roboplanes by remote over satellite hookups from America. That logjam was resolved at least in part by sacking the boss of the US air force - his replacement has pledged to send pilots into drone duties straight from training if that's what it takes.

After that, continued slow ramp-up of the drone fleets was blamed on demand outstripping supply - there are other customers for UAVs than the military, including the CIA* and homeland-security authorities - and failures by one of the main roboplane makers, General Atomics, to scale up its manufacturing base swiftly enough.

In any case, more and more talk has been heard this year on the stateside spyplane beat of "Project Liberty" - a cheap-and-cheerful push to get more surveillance birds into the Southwest Asian skies in a hurry. The plan is to buy ordinary civilian twin-engine planes and fit them out with the lightweight sensors used by UAVs. They would of course need pilots, but in fact so do the current Predator and Reaper. The only difference is that these pilots would need to be physically in the aircraft.

This Tuesday, indeed, saw an order for 23 Beechcraft King Air 350 extended-range models for the US air force 645th Aeronautical Systems Group, aka "Big Safari", a famous secretive spyplane and electronic-trickery unit. King Airs are a very popular plane for clandestine spy work, oft-used by shadowy American and allied spy/intel and spec-ops projects and units over the years with a variety of mad equipment fitted.

Indeed, the King Air is so popular for this kind of job that there's a generic term for a spyplane-modded one. It is Funny Looking King Air (FLKA), as used by the doyen of secret-plane journalism, Bill Sweetman of Aviation Week.

For its part, the British Army ordered some King Airs last year, to be specially fitted out for Afghan spy work. The British forces have long used homegrown Islanders for this sort of thing in Northern Ireland and Iraq - and lately above certain parts of the mainland UK - but the hot-and-high conditions of Afghanistan call for a more powerful plane. The RAF ordered some Canadian-made Twin Stars this year, but the Army Air Corps favours the King Air for what it calls "Manned Airborne Surveillance".

It might seem odd that Army pilots will be flying FLKAs as well as air force people, but it's primarily the ground and special-ops forces who want these planes. The whole idea of using cheap, relatively low-performance airframes to do any task is quite unpopular among air forces. Airmen tend to describe such planes as not being "survivable" - meaning that if there were some enemy air forces or serious air defences about they'd often get shot down. Soldiers, however, who get killed frequently even when there's no enemy air threat at all, are sanguine about this.

Combat fraud and increase customer satisfaction

Next page: Bootnotes

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.