Feeds

US X-37B robot minishuttle: 'Secret space warplane'?

No, but it could do some naughty orbital stuff

Top 5 reasons to deploy VMware with Tegile

Air Force 'Mission 3B' back on the cards?

The "some missions" referred to by the Columbia report were probably the so-called 3A and 3B flight plans (described here) which called for single-polar-orbit hops from Vandenberg, either deploying or recovering a spy satellite without any pass over the USSR by the shuttle. Later, even more difficult missions were specified by the Air Force, in which the shuttle would both deploy and then recover a spy satellite during a single mission.

The X-37B unmanned spaceplane being prepared for launch. Credit: USAF

A certain Shuttle-y look about the wings.

The military spy-sat requirements have been blamed by many space enthusiasts for crippling the shuttle's design. It's argued that without its large, heavy, heatshielded wings - necessary for the cross-range re-entry requirement, rather than for actually landing as such - it might have been a much more efficient machine for putting stuff into space.

In the event, by the time the Shuttle began to fly its performance was seen as deficient for polar-orbit spysat missions lifting increasingly hefty "KeyHole" payloads. High-angle launches forfeit the valuable speed boost gained by eastward takeoffs close to the Equator, as from Canaveral, and require more grunt from the launcher. Plans were developed in the 1980s for lightened solid boosters, and even extra strap-on liquid rockets, to be used on missions out of the multibillion-dollar shuttle base at Vandenberg's Space Launch Complex Six.

Then came the Challenger disaster of 1986, which imposed years more delay and still more expense. By the time the shuttle had weathered that storm, the military had mostly turned its back on the troubled spaceplane. No shuttles ever flew from Vandenberg on polar missions, and the ambitious military plans to recover and re-use colossally expensive spy sats - perhaps modifying and upgrading them, or repairing them after faults, as one might a normal aeroplane - came to nothing.

Internet Security Threat Report 2014

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Bond villains lament as Wicked Lasers withdraw death ray
Want to arm that shark? Better get in there quick
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.