Feeds

Rolls-Royce to work on electric cyber raygun aero-tech

USAF to jazz up jet juice use

High performance access to file storage

An American high-tech jet engine design bureau, owned by UK-centred firm Rolls-Royce, will design key power systems necessary for the electricity-heavy combat aircraft of tomorrow. Future fighters and bombers are expected to use huge amounts of electricity to power such things as directed-energy rayguns and/or cyberwarfare electropulse systems.

Flight International reports today that Rolls-Royce's North American Technologies unit - aka LibertyWorks - has won a $690k contract from the US Air Force Research Laboratory under the Integrated Vehicle Energy Technology (INVENT) programme. The Indianapolis-based LibertyWorks development shop was formerly the Allison Advanced Development Company, but has changed names following the acquisition of Allison by Rolls in the 1990s.

Under INVENT, the US air force is seeking various subsystem techologies which will make future aircraft far more electric in nature than they have been so far. In particular, ways are sought to generate much larger amounts of electricity from jet-engine prime movers. The USAF also wants to see better-performing electrical actuator systems, allowing planes to use electricity rather than hydraulics for working control surfaces, undercarriages and so on.

A primary driver for the electric-jet tech is the rising power requirements of modern sensor and communication systems, and the expectation that this will increase still further in future. Next-gen US combat planes are thought likely to feature high-powered radars and jammers able to reach out electronically and meddle cunningly with enemy defences - so called "cyber weapons".

Early versions of such capabilities are said to be present already, in the new generation of Active Electronically Scanned Array (AESA) radars seen on such aircraft as the F-22 Raptor superfighter. Even more power-hungry would be out-and-out directed energy microwave or laser rayguns, intended to addle the seeker heads of enemy missiles or even blast them out of the sky. Again, efforts are already underway to develop electrically powered versions of such weapons - at present, weapons-grade beams can only be generated in huge, cumbersome chemically fuelled machinery.

Obviously $690k is chickenfeed in the context of US military development funding - but the INVENT programme would seem to indicate the way the wind is blowing. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.