The US Air Force Wants You to Build a Drone Engine

The US Air Force announced a $2 million prize for the US citizen who can design the best new drone engine. It’s the largest prize ever from a military service, according to Air Force Lt. Col. Aaron Tucker.

Here’s what the Air Force is looking for. “A successful 100-horsepower turbo shaft engine that operates on Jet A fuel, demonstrate a brake-specific fuel consumption greater than 0.55 pounds of fuel per horsepower per hour, and generate at least 2.0 horsepower per pound,” Tucker told drone designers at the Association for Unmanned Vehicle Systems International conference in Atlanta, Georgia. The overall goal: create a power plant with the fuel efficiency of a piston engine and the low weight of a turbine engine.

A 100-horsepower engine may sound like a small deal, and in a way it is, but that doesn’t mean it’s insignificant. It’s about the same output as the 115-hp engine that drives the General Atomics MQ-1 Predator drone.
Tucker told his audience that there’s currently no destination platform for the engine. Instead, it’s an attempt to spur innovation in the weight and horsepower class occupied by the Predator, the most significant unmanned military platform that the world has ever seen. “What we’re seeing is a lot of activity down here for small UAVs, a lot of systems that are in production up here for large drones like the MQ-9 Reaper and Global Hawk, and this seems to be a place where we can stand to get some technology investment.”

The Predator first flew in 1994 as a spy drone. It wasn’t until 2004, when the Air Force armed it with Hellfire missiles during Operation Enduring Freedom in Afghanistan, that Predator became synonymous with the US drone war and all the policy problems that have flowed from it. Long since surpassed in sophistication and capability, the MQ-1 has a range of 460 miles and endurance of 24 hours, it has nonetheless racked up more than two million hours of flight time.

The Pentagon began phasing out the Predator years ago in favor of the MQ-9 Reaper, which sports a 950-horsepower engine, a far larger payload, better electronics, and twice the speed and operating ceiling. But if the Predator has lost popularity in Washington, it’s gaining fans in militaries around the world. The Italian Air Force flies an unarmed reconnaissance version. Even the Chinese have built their own more-capable knock-off, the Cai Hong, or CS 4; it has a 2,100-mile range, almost fivefold the Predator’s. And even if the Pentagon is retiring the MQ-1, the need for drones of its size isn’t going away. “We’re not expecting too much change in the mission,” Tucker said. “We see there’s a need for increasing the fuel efficiency for that size-class engine.”

If the Air Force Prize succeeds, it could lead to UAVs that resemble the Predator but that can fly farther, carry more weapons, act like a tiny Global Hawk, or some combination of all of the above.

The announcement presents a novel workaround to the traditional acquisition process, a focus point for Air Force Secretary Deborah Lee James. “If we can align air force and commercial markets, this is how we bend the cost curve,” said Tucker. But it also suggests that the Air Force is looking to develop a new UAV, distinct from, but not dissimilar to, the one that defined how drones are used in war.


DefenseOne

 

« Data Protection Drives Cloud Security Market
Germany’s BND Intelligence Agency Has Been Spying for the NSA. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

ID Experts

ID Experts

ID Experts is a leading provider of identity protection and data breach services for companies and individuals throughout the USA.

MerlinCryption

MerlinCryption

MerlinCryption develops infrastructure security software, delivering advanced encryption, authentication, and random data generators, for Cloud, VoIP, eCommerce, M2M, and USB hardware.

VIPRE Security Group

VIPRE Security Group

VIPRE Security Group is an award-winning global cybersecurity, privacy and data protection company.

InterVision

InterVision

InterVision is a leading Strategic Services Provider, assisting businesses in driving value and gaining a competitive edge by helping IT Leaders solve the most crucial challenges they face.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

3Lines Venture Capital

3Lines Venture Capital

3Lines Venture Capital invests in exceptional founders and startups working on broad disruptive themes of Future of Work, AI enabled enterprises, and Industry 4.0.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Psybersafe

Psybersafe

Psybersafe is a hands-on, behaviour-changing training system that keeps your people and your business cyber safe.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

Digital Security by Design (DSbD)

Digital Security by Design (DSbD)

Digital Security by Design is an initiative supported by the UK government to transform digital technology and create a more resilient, and secure foundation for a safer future.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.