Feeds

Mystery X-37B robot spaceplane returns to orbit on Tuesday

Second flight for small, secretive 'space warplane'

Build a business case: developing custom apps

The United States Air Force will mount the third mission into space by its small space-shuttle lookalikes, the X-37Bs (once memorably dubbed "secret space warplanes" by the Iranian government) on Tuesday if all goes to plan.

The third Orbital Test Vehicle mission, aka OTV-3, will see the same X-37B which flew the inaugural OTV mission take off from Cape Canaveral, Florida, just after 1pm EST, contractor United Launch Alliance announced.

The X-37Bs are prototype space planes that, in the vague words of the American military, supports "space experimentation". It is understood the goals of the X-37B project include aiding the development of reusable spacecraft and to test new technologies for long-duration space flight.

What distinguishes a space plane from other spacecraft is its ability to return to Earth and land on a runway. The wings, wheels and propulsion kit needed to successfully touch down in such a way make the planes significantly heavier, more expensive and harder to control than other types of craft, which either don't return in useable condition or drop in by parachute.

A rendering of the X-37B plane

The Air Force keeps the details of the space planes strictly classified, meaning that there has been no public justification of these expensive experiments, and the life and times of the X-37B planes remain something of a mystery.

The second super-secret space shuttle OTV2 returned to Earth in June after 469 days in space.

It was rumoured to be hovering over China quietly slurping in wireless data as well as other wild speculation about its possible purpose. It's likely we won't hear many more hard facts about the third plane either.

In general we here on the Reg space desk consider that the X-37B is really more or less what the US Air Force say it is - a platform for trying out new secret technologies in space quickly without the expense and delay of building a dedicated satellite, and without the downsides of capsule parachute landings which naturally would tend to involve some risk of one's top-secret spysat tech being recovered by someone else.

However the craft's shuttle-like wings do suggest that it could potentially be used for more interesting missions, which we have analysed previously here. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
World Solar Challenge contender claims new speed record
One charge sees Sunswift travel 500kms at over 100 km/h
SMELL YOU LATER, LOSERS – Dumbo tells rats, dogs... humans
Junk in the trunk? That's what people have
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Boffins discuss AI space program at hush-hush IARPA confab
IBM, MIT, plenty of others invited to fill Uncle Sam's spy toolchest, but where's Google?
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
BEST BATTERY EVER: All lithium, all the time, plus a dash of carbon nano-stuff
We have found the Holy Grail (of batteries) - boffins
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
Jurassic squawk: Dinos were Earth's early FEATHERED friends
Boffins research: Ancient dinos may all have had 'potential' fluff
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.