Feeds

Manned 'Surrogate Predators' fill in for robot assassins

Humans go into simulations, but not into real world

Choosing a cloud hosting partner with confidence

Robot aircraft are in such demand for combat in Iraq and Afghanistan that the US military - in a mildly disorienting move - is using manned aeroplanes to stand in for them during military training exercises.

It seems that high demand for the services of Predator and Reaper surveillance/assassination droids overseas has meant that none can be found to take part in the US Air Force's annual "Green Flag" air bombing exercises.

“Due to the Air Force maximum surge effort to provide more MQ-1 Predator and MQ-9 Reaper support to ground units in [US Central Command, covering the southwest Asian wars] there are no Predator or Reaper forces available to support pre-deployment exercises such as Green Flag, which focuses on air-to-ground operations,” stated USAF Predator/Reaper ops honcho Major Matt Martin last month. “The Surrogate Predator is the solution.”

The Surrogate Predator consists of an electro-optical "ball" turret of the same type carried by Predators and Reapers, fitted to an ordinary human-piloted Cessna 182 operated by the USAF's auxiliary organisation the Civil Air Patrol. The Patrol teaches young Americans to fly, and helps out with missions such as searching for missing aircraft.

“We’ve seen nothing but enthusiasm and a willingness to help from the Civil Air Patrol, which is why we chose them to do this mission,” Martin added.

The Surrogate Predators will fill in for the robots during Green Flag exercises, freeing the machine warriors for combat operations. The human pilots, unlike the robotic craft, won't be allowed real weapons, however.

“Once a target is identified by the ground commander as hostile,” explains Martin, “the Surrogate Predator will dynamically re-task into the strike role and coordinate with a forward air control to simulate the delivery of precision ordnance onto a target.”

Strange days.

We learnt about the Surrogate Predator plans from Aviation Week's excellent Ares blog, but there's more from the CAP here. ®

Bootnote

As regular readers will be aware, there are also programmes under which manned aircraft help out unmanned ones in combat. And others in which such "manned unmanned" planes are modified to operate unmanned, so swinging the pendulum back again.

Secure remote control for conventional and virtual desktops

More from The Register

next story
GRAV WAVE DRAMA: 'Big Bang echo' may have been grit on the scanner – boffins
Exit Planet Dust on faster-than-light expansion of universe
Mine Bitcoins with PENCIL and PAPER
Forget Sudoku, crunch SHA-256 algos
SpaceX Dragon cargo truck flies 3D printer to ISS: Clawdown in 3, 2...
Craft berths at space station with supplies, experiments, toys
'This BITE MARK is a SMOKING GUN': Boffins probe ancient assault
Tooth embedded in thigh bone may tell who pulled the trigger
DOLPHINS SMELL MAGNETS – did we hear that right, boffins?
Xavier's School for Gifted Magnetotaceans
Big dinosaur wowed females with its ENORMOUS HOOTER
That's right, Doris, I've got biggest snout in the prehistoric world
Japanese volcano eruption reportedly leaves 31 people presumed dead
Hopes fade of finding survivors on Mount Ontake
That glass of water you just drank? It was OLDER than the SUN
One MEELLION years older. Some of it anyway
Canberra drone team dances a samba in Outback Challenge
CSIRO's 'missing bushwalker' found and watered
NASA rover Curiosity drills HOLE in MARS 'GOLF COURSE'
Joins 'traffic light' and perfect stony sphere on the Red Planet
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.