Feeds

New pocket-sized smartbomb - just for killer robots

Thermos-sized weapon ideal for CIA assassin droids

Providing a secure and efficient Helpdesk

US weaponry megacorp Raytheon says it has successfully tested a new, pocket-sized smartbomb specifically designed for use by killer robots.

The weapon has been rather prosaically dubbed Small Tactical Munition (STM). STM is a 13-pound guided bomb that is approximately 2 feet long, according to Raytheon. Two of the little smartbombs have now been successfully trialled at the US Army's Yuma Proving Ground in Arizona. According to a company statement, both used GPS-INS combo satnav'n' inertial guidance to get themselves to where they could see their targets: then homed in on a laser pointer dot for the final part of their descent.

According to Raytheon, this dual-mode guidance enables the STM minibombs to "enable the weapon to engage both fixed and moving targets around-the-clock, regardless of weather conditions".

At the moment the main weapon used in US (and UK) hunter-killer operations by such robots as the Predator/Reaper family is the Hellfire missile. this is quite surgical compared to typical aerial bombs used by manned aircraft (which are normally of 500lb, 1000lb or even 2000lb clout) but at 100lb it is still pretty hefty - capable of destroying a tank - and tends to cause unnecessary casualties to bystanders.

"Current combat operations have highlighted the need for extremely small, precise weapons that are optimally designed for remotely piloted aircraft," says Bob Francois, Raytheon robomissile bigwig. "STM is part of a portfolio of weapons that meets the warfighter's need in this area."

Quite apart from robotic aerial operations in Afghanistan and Iraq by the US and UK militaries, there is also a serious, notionally secret robot bombing/assassination campaign going on in the border areas of Pakistan - thought to be conducted mainly by CIA robots (it was the CIA which first used a Hellfire-equipped Predator to kill someone, in the Yemen way back in 2002). Collateral damage from these missions is causing a lot of anger in Pakistan, so Raytheon may well be right to suspect that the STM will find a ready market.

"Developing a unique weapon for today's unmanned aircraft combat operations is a natural fit," adds Francois. ®

Internet Security Threat Report 2014

More from The Register

next story
MARS NEEDS WOMEN, claims NASA pseudo 'naut: They eat less
'Some might find this idea offensive' boffin admits
LOHAN crash lands on CNN
Overflies Die Welt en route to lively US news vid
Comet Siding Spring revealed as flying molehill
Hiding from this space pimple isn't going to do humanity's reputation any good
Experts brand LOHAN's squeaky-clean box
Phytosanitary treatment renders Vulture 2 crate fit for export
No sail: NASA spikes Sunjammer
'Solar sail' demonstrator project binned
Carry On Cosmonaut: Willful Child is a poor taste Star Trek parody
Cringeworthy, crude and crass jokes abound in Steven Erikson’s sci-fi debut
Origins of SEXUAL INTERCOURSE fished out of SCOTTISH LAKE
Fossil find proves it first happened 385 million years ago
Human spacecraft dodge COMET CHUNKS pelting off Mars
Odyssey orbiter yet to report, though - comet's trailing trash poses new threat
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.