Feeds

US killer robo-plane makes strike without remote pilot

Automated killware now handled by sergeants

5 things you didn’t know about cloud backup

A US killer drone has carried out a lethal strike from the skies above Iraq, for the first time remotely controlled entirely by non-aircrew-rated, enlisted soldiers. The milestone would seem to foreshadow redundancy for large communities of military pilots in coming years.

Corporate art of an armed Warrior-Alpha

We don't need no stinkin' pilots.

According to a release from Multinational Division North, flagged up by the Danger Room blog at Wired magazine, a US Army Warrior-Alpha delivered the strike in support of American and Iraqi troops on the ground. The Warrior-Alpha, a highly automated version of the famous Predator drone, was controlled by Staff Sergeant Jerry Rhoades, Corporal Phillip Cheng and Specialist James Pegg.

According to Rhoades:

“We neutralized both targets – [the ground forces] were satisfied... This was the first time the Warrior Alpha System engaged a target in combat.”

There have been many lethal strikes by US and British Predator and Reaper drones already, but these aircraft are controlled at all times by a fully-qualified officer pilot with flight experience in normal manned aircraft.

Although American pilots hate drone-driving duty, generally having to be ordered into it against their will, they are also very uncomfortable with the idea of mere enlisted tech specialists handling what are to all intents and purposes close air support missions using strike aircraft. This tends to call much of their raison d'etre into question.

But the latest news from Diyala Province would seem to confirm that nowadays there is no real requirement for pilots in ordinary air support roles, whether in the aircraft or in the ground control centre. Nobody would be happy without people in the loop, but there seems no real reason for these people to be expensive, privileged officers with millions of pounds' worth of flight time.

Corporals and sergeants - who, after all, are already trusted to direct very significant firepower in the ground forces - would seem to be more than capable of the decision making. As for the flying, the Warrior-Alpha can do that itself, including unassisted takeoffs and landings. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Boffins attempt to prove the UNIVERSE IS JUST A HOLOGRAM
Is this the real life? Is this just fantasy?
Our LOHAN spaceplane ballocket Kickstarter climbs through £8000
Through 25 per cent but more is needed: Get your UNIQUE rewards!
Software bug caught Galileo sats in landslide, no escape from reality
Life had just begun, code error means Russia's gone and thrown it all away
LOHAN tunes into ultra long range radio
And verily, Vultures shall speak status unto distant receivers
NASA to reformat Opportunity rover's memory from 125 million miles away
Interplanetary admins will back up data and get to work
SpaceX prototype rocket EXPLODES over Texas. 'Tricky' biz, says Elon Musk
No injuries or near injuries. Flight stayed in designated area
Galileo, Galileo! Galileo, Galileo! Galileo fit to go. Magnifico
I'm just a poor boy, nobody loves me. But at least I can find my way with ESA GPS by 2017
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.