The US Air Force Wants You to Build a Drone Engine

The US Air Force announced a $2 million prize for the US citizen who can design the best new drone engine. It’s the largest prize ever from a military service, according to Air Force Lt. Col. Aaron Tucker.

Here’s what the Air Force is looking for. “A successful 100-horsepower turbo shaft engine that operates on Jet A fuel, demonstrate a brake-specific fuel consumption greater than 0.55 pounds of fuel per horsepower per hour, and generate at least 2.0 horsepower per pound,” Tucker told drone designers at the Association for Unmanned Vehicle Systems International conference in Atlanta, Georgia. The overall goal: create a power plant with the fuel efficiency of a piston engine and the low weight of a turbine engine.

A 100-horsepower engine may sound like a small deal, and in a way it is, but that doesn’t mean it’s insignificant. It’s about the same output as the 115-hp engine that drives the General Atomics MQ-1 Predator drone.
Tucker told his audience that there’s currently no destination platform for the engine. Instead, it’s an attempt to spur innovation in the weight and horsepower class occupied by the Predator, the most significant unmanned military platform that the world has ever seen. “What we’re seeing is a lot of activity down here for small UAVs, a lot of systems that are in production up here for large drones like the MQ-9 Reaper and Global Hawk, and this seems to be a place where we can stand to get some technology investment.”

The Predator first flew in 1994 as a spy drone. It wasn’t until 2004, when the Air Force armed it with Hellfire missiles during Operation Enduring Freedom in Afghanistan, that Predator became synonymous with the US drone war and all the policy problems that have flowed from it. Long since surpassed in sophistication and capability, the MQ-1 has a range of 460 miles and endurance of 24 hours, it has nonetheless racked up more than two million hours of flight time.

The Pentagon began phasing out the Predator years ago in favor of the MQ-9 Reaper, which sports a 950-horsepower engine, a far larger payload, better electronics, and twice the speed and operating ceiling. But if the Predator has lost popularity in Washington, it’s gaining fans in militaries around the world. The Italian Air Force flies an unarmed reconnaissance version. Even the Chinese have built their own more-capable knock-off, the Cai Hong, or CS 4; it has a 2,100-mile range, almost fivefold the Predator’s. And even if the Pentagon is retiring the MQ-1, the need for drones of its size isn’t going away. “We’re not expecting too much change in the mission,” Tucker said. “We see there’s a need for increasing the fuel efficiency for that size-class engine.”

If the Air Force Prize succeeds, it could lead to UAVs that resemble the Predator but that can fly farther, carry more weapons, act like a tiny Global Hawk, or some combination of all of the above.

The announcement presents a novel workaround to the traditional acquisition process, a focus point for Air Force Secretary Deborah Lee James. “If we can align air force and commercial markets, this is how we bend the cost curve,” said Tucker. But it also suggests that the Air Force is looking to develop a new UAV, distinct from, but not dissimilar to, the one that defined how drones are used in war.


DefenseOne

 

« Data Protection Drives Cloud Security Market
Germany’s BND Intelligence Agency Has Been Spying for the NSA. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Superscript

Superscript

Superscript (formerly Digital Risks) is an insurance broker for small businesses, sole-traders, landlords and high-growth tech firms. Our services include Cyber Liability insurance.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

GreatHorn

GreatHorn

GreatHorn offers the only cloud-native security platform that stops targeted social engineering and phishing attacks on communication tools like O365, G Suite, and Slack.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

CPP Group UK

CPP Group UK

CPP Group UK develops products to help insurers add further value to their products and services through its innovative suite of new products in FinTech, InsurTech and cyber security.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

Gradient Cyber

Gradient Cyber

Gradient Cyber is a trusted cybersecurity partner specializing in small businesses and mid-market enterprises concerned about cybersecurity but lacking the staff to give it the attention it deserves.

RiskOptics

RiskOptics

RiskOptics (formerly Reciprocity) equips organizations with one of the most intuitive and powerful information security and cyber risk management solutions in the market.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.