Feeds

New pocket-sized smartbomb - just for killer robots

Thermos-sized weapon ideal for CIA assassin droids

Build a business case: developing custom apps

US weaponry megacorp Raytheon says it has successfully tested a new, pocket-sized smartbomb specifically designed for use by killer robots.

The weapon has been rather prosaically dubbed Small Tactical Munition (STM). STM is a 13-pound guided bomb that is approximately 2 feet long, according to Raytheon. Two of the little smartbombs have now been successfully trialled at the US Army's Yuma Proving Ground in Arizona. According to a company statement, both used GPS-INS combo satnav'n' inertial guidance to get themselves to where they could see their targets: then homed in on a laser pointer dot for the final part of their descent.

According to Raytheon, this dual-mode guidance enables the STM minibombs to "enable the weapon to engage both fixed and moving targets around-the-clock, regardless of weather conditions".

At the moment the main weapon used in US (and UK) hunter-killer operations by such robots as the Predator/Reaper family is the Hellfire missile. this is quite surgical compared to typical aerial bombs used by manned aircraft (which are normally of 500lb, 1000lb or even 2000lb clout) but at 100lb it is still pretty hefty - capable of destroying a tank - and tends to cause unnecessary casualties to bystanders.

"Current combat operations have highlighted the need for extremely small, precise weapons that are optimally designed for remotely piloted aircraft," says Bob Francois, Raytheon robomissile bigwig. "STM is part of a portfolio of weapons that meets the warfighter's need in this area."

Quite apart from robotic aerial operations in Afghanistan and Iraq by the US and UK militaries, there is also a serious, notionally secret robot bombing/assassination campaign going on in the border areas of Pakistan - thought to be conducted mainly by CIA robots (it was the CIA which first used a Hellfire-equipped Predator to kill someone, in the Yemen way back in 2002). Collateral damage from these missions is causing a lot of anger in Pakistan, so Raytheon may well be right to suspect that the STM will find a ready market.

"Developing a unique weapon for today's unmanned aircraft combat operations is a natural fit," adds Francois. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
World Solar Challenge contender claims new speed record
One charge sees Sunswift travel 500kms at over 100 km/h
SMELL YOU LATER, LOSERS – Dumbo tells rats, dogs... humans
Junk in the trunk? That's what people have
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
BEST BATTERY EVER: All lithium, all the time, plus a dash of carbon nano-stuff
We have found the Holy Grail (of batteries) - boffins
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
Jurassic squawk: Dinos were Earth's early FEATHERED friends
Boffins research: Ancient dinos may all have had 'potential' fluff
MARS NEEDS OCEANS to support life - and so do exoplanets
Just being in the Goldilocks zone doesn't mean there'll be anyone to eat the porridge
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.