Drone Warriors Of The US Air Force

In the past, soldiers went off to war and left their families behind. But drone pilots commute to work, and to war, each day. Vin Ray was given rare access to the only US Air Force base devoted entirely to flying drones, where he discovered the pilots' strange double life.

If you're a drone pilot, there's a strong possibility you live in Las Vegas and your commute to work is against the traffic.

We were told to drive northwest out of the city on Interstate-95. The road stretches out through the barren, inhospitable scrub of the Nevada desert.

Pay attention, we were told, because the signpost is small. In fact, it's very small. But we eventually arrived at our destination: Creech US Air Force Base, a small, flat, city in the desert. And the only air base devoted to flying drones.

Inside the base, comparisons with science fiction are hard to avoid. A drone looks like a conflation of a giant insect and a light aircraft. It's unmanned.

Standing by a runway, we watch a drone land and pass right in front of us. The camera underneath its chin, swivels quickly sideways and looks right at us, someone, somewhere on the base, is watching us. We are escorted through a non-descript door in the side of what looks like a beige metal shipping container. It's cramped inside. At the far end there's a pilot seated on the left, who flies the drone and fires the missiles.

The sensor operator sits on the right, they operate the camera and fix the laser on the target for the missile to hit. They're focused on a bank of screens, switches and buttons. This is today's kind of cockpit. But it doesn't feel like a battleground.
For a start, there's a sensory deficiency. From my experience on the ground, you can taste war, you can smell it and you can certainly hear it. In here there's a just a mute video.

But that's not the only difference. Traditionally, soldiers in a war zone are based together. They have each other’s camaraderie, and they're separated from their families. But it's not the same if you're commuting to work every day.

Obviously, the drive itself is simple. But the psychological journey is altogether different. Imagine. Between six in the evening and six in the morning you might collect your kids from school, pick up some groceries on the way home and help make dinner.

But between 6am and 6pm you have a licence to kill.

These drone pilots can sit in Nevada and watch a potential target 8,000 miles (12,000km) away for months on end, building up what they call "patterns of life", building what's been called a "remote intimacy" with their prey, all in the knowledge that, one day, they may kill them.

A conventional fighter pilot will fire missiles and then head back to base. But drone pilots are required to circle for some hours afterwards, to assess the damage. The picture they're looking at is extraordinarily clear - and the damage is often in the form of body parts.

Small wonder that Creech now employs a psychologist for drone pilots suffering stress. Drones are globalising the battlefield, blurring the boundaries between war and home.

Image: Predator sensor operator

BBC:         Drone-Visuality: The Psychology Of Killing:    US Military Are Doubling Down On Robot Wars

 

« It Was Not All Bad News In 2016
‘Magic’ Ransomware Is Based On Open-Source Code »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

OpenSphere

OpenSphere

OpenSphere is an IT company providing security consultancy, information system risk management and security management services.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Findcourses.com

Findcourses.com

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

Global Market Innovators (GMI)

Global Market Innovators (GMI)

Global Market Innovators (GMI) delivers secure technology solutions to organizations in need.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).

JLS Technology

JLS Technology

Since 2007, JLS Tech has been recognized as one of the world’s most innovative cybersecurity and technology operations leaders.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Ampsight

Ampsight

Ampsight specializes in enabling cloud integration, securing data, and navigating complications that drive critical-mission success.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.