The US Air Force Wants You to Build a Drone Engine

The US Air Force announced a $2 million prize for the US citizen who can design the best new drone engine. It’s the largest prize ever from a military service, according to Air Force Lt. Col. Aaron Tucker.

Here’s what the Air Force is looking for. “A successful 100-horsepower turbo shaft engine that operates on Jet A fuel, demonstrate a brake-specific fuel consumption greater than 0.55 pounds of fuel per horsepower per hour, and generate at least 2.0 horsepower per pound,” Tucker told drone designers at the Association for Unmanned Vehicle Systems International conference in Atlanta, Georgia. The overall goal: create a power plant with the fuel efficiency of a piston engine and the low weight of a turbine engine.

A 100-horsepower engine may sound like a small deal, and in a way it is, but that doesn’t mean it’s insignificant. It’s about the same output as the 115-hp engine that drives the General Atomics MQ-1 Predator drone.
Tucker told his audience that there’s currently no destination platform for the engine. Instead, it’s an attempt to spur innovation in the weight and horsepower class occupied by the Predator, the most significant unmanned military platform that the world has ever seen. “What we’re seeing is a lot of activity down here for small UAVs, a lot of systems that are in production up here for large drones like the MQ-9 Reaper and Global Hawk, and this seems to be a place where we can stand to get some technology investment.”

The Predator first flew in 1994 as a spy drone. It wasn’t until 2004, when the Air Force armed it with Hellfire missiles during Operation Enduring Freedom in Afghanistan, that Predator became synonymous with the US drone war and all the policy problems that have flowed from it. Long since surpassed in sophistication and capability, the MQ-1 has a range of 460 miles and endurance of 24 hours, it has nonetheless racked up more than two million hours of flight time.

The Pentagon began phasing out the Predator years ago in favor of the MQ-9 Reaper, which sports a 950-horsepower engine, a far larger payload, better electronics, and twice the speed and operating ceiling. But if the Predator has lost popularity in Washington, it’s gaining fans in militaries around the world. The Italian Air Force flies an unarmed reconnaissance version. Even the Chinese have built their own more-capable knock-off, the Cai Hong, or CS 4; it has a 2,100-mile range, almost fivefold the Predator’s. And even if the Pentagon is retiring the MQ-1, the need for drones of its size isn’t going away. “We’re not expecting too much change in the mission,” Tucker said. “We see there’s a need for increasing the fuel efficiency for that size-class engine.”

If the Air Force Prize succeeds, it could lead to UAVs that resemble the Predator but that can fly farther, carry more weapons, act like a tiny Global Hawk, or some combination of all of the above.

The announcement presents a novel workaround to the traditional acquisition process, a focus point for Air Force Secretary Deborah Lee James. “If we can align air force and commercial markets, this is how we bend the cost curve,” said Tucker. But it also suggests that the Air Force is looking to develop a new UAV, distinct from, but not dissimilar to, the one that defined how drones are used in war.


DefenseOne

 

« Data Protection Drives Cloud Security Market
Germany’s BND Intelligence Agency Has Been Spying for the NSA. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Irish Reporting & Information Security Service (IRISS)

Irish Reporting & Information Security Service (IRISS)

IRISS-CERT is Ireland's first CSIRT (Computer Security Incident Response Team) to provide services to all users within Ireland.

DoSarrest Internet Security Ltd

DoSarrest Internet Security Ltd

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

Cybraics

Cybraics

Cybraics nLighten platform implements a unique and sophisticated artificial intelligence engine that rapidly learns your environment and alerts security teams to threats and vulnerabilities.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

Snode Technologies

Snode Technologies

Snode's Guardian cybersecurity platform uses AI and machine learning to monitor, detect and proactively respond to all threats on every device within your network.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

IPKeys Technologies

IPKeys Technologies

IPKeys delivers innovative cybersecurity and technology solutions focused on helping the federal government reduce risk and protect the US from cyberattacks.

Infosec Institute

Infosec Institute

Infosec is a leading cybersecurity training company, we help IT and security professionals advance their careers with skills development and certifications.

Agile Defense

Agile Defense

Agile Defense is an Information Technology services provider, delivering leading-edge Digital Transformation solutions to the Federal Government.

ClearSky Cyber Security

ClearSky Cyber Security

ClearSky cyber security provides cyber solutions, focused on threat intelligence services, mainly for the financial sector, critical infrastructure, public sector and the pharma sector.

Klarytee

Klarytee

Protect your data wherever it goes. Klarytee is a SaaS platform that builds security into sensitive content to enable granular control in AI, public cloud and SaaS.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.