The US Air Force Wants You to Build a Drone Engine

The US Air Force announced a $2 million prize for the US citizen who can design the best new drone engine. It’s the largest prize ever from a military service, according to Air Force Lt. Col. Aaron Tucker.

Here’s what the Air Force is looking for. “A successful 100-horsepower turbo shaft engine that operates on Jet A fuel, demonstrate a brake-specific fuel consumption greater than 0.55 pounds of fuel per horsepower per hour, and generate at least 2.0 horsepower per pound,” Tucker told drone designers at the Association for Unmanned Vehicle Systems International conference in Atlanta, Georgia. The overall goal: create a power plant with the fuel efficiency of a piston engine and the low weight of a turbine engine.

A 100-horsepower engine may sound like a small deal, and in a way it is, but that doesn’t mean it’s insignificant. It’s about the same output as the 115-hp engine that drives the General Atomics MQ-1 Predator drone.
Tucker told his audience that there’s currently no destination platform for the engine. Instead, it’s an attempt to spur innovation in the weight and horsepower class occupied by the Predator, the most significant unmanned military platform that the world has ever seen. “What we’re seeing is a lot of activity down here for small UAVs, a lot of systems that are in production up here for large drones like the MQ-9 Reaper and Global Hawk, and this seems to be a place where we can stand to get some technology investment.”

The Predator first flew in 1994 as a spy drone. It wasn’t until 2004, when the Air Force armed it with Hellfire missiles during Operation Enduring Freedom in Afghanistan, that Predator became synonymous with the US drone war and all the policy problems that have flowed from it. Long since surpassed in sophistication and capability, the MQ-1 has a range of 460 miles and endurance of 24 hours, it has nonetheless racked up more than two million hours of flight time.

The Pentagon began phasing out the Predator years ago in favor of the MQ-9 Reaper, which sports a 950-horsepower engine, a far larger payload, better electronics, and twice the speed and operating ceiling. But if the Predator has lost popularity in Washington, it’s gaining fans in militaries around the world. The Italian Air Force flies an unarmed reconnaissance version. Even the Chinese have built their own more-capable knock-off, the Cai Hong, or CS 4; it has a 2,100-mile range, almost fivefold the Predator’s. And even if the Pentagon is retiring the MQ-1, the need for drones of its size isn’t going away. “We’re not expecting too much change in the mission,” Tucker said. “We see there’s a need for increasing the fuel efficiency for that size-class engine.”

If the Air Force Prize succeeds, it could lead to UAVs that resemble the Predator but that can fly farther, carry more weapons, act like a tiny Global Hawk, or some combination of all of the above.

The announcement presents a novel workaround to the traditional acquisition process, a focus point for Air Force Secretary Deborah Lee James. “If we can align air force and commercial markets, this is how we bend the cost curve,” said Tucker. But it also suggests that the Air Force is looking to develop a new UAV, distinct from, but not dissimilar to, the one that defined how drones are used in war.


DefenseOne

 

« Data Protection Drives Cloud Security Market
Germany’s BND Intelligence Agency Has Been Spying for the NSA. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Skybox Security

Skybox Security

Skybox combines firewall and network device data with vulnerability and threat intelligence, putting security decisions in your unique network context.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Samoby

Samoby

Samoby provide a subscription solution for Mobile Threat Protection and usage control on Android and iOS devices.

Nuspire

Nuspire

Nuspire provide services to protect your network with best-in-class managed detection and response, allowing you to stay focused on managing your business.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Hubraum

Hubraum

Hubraum is Deutsche Telekom’s tech incubator, helping startups to create new business opportunities in areas including data analytics, AI, robot process automation and cyber security.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

Symptai Consulting

Symptai Consulting

Symptai Consulting is a leading Cyber Security, Digital Transformation and Anti-Money Laundering firm serving the Caribbean and the wider world.

Black Girls In Cyber (BGiC)

Black Girls In Cyber (BGiC)

Black Girls In Cyber's mission is to increase industry awareness and diversity in cybersecurity, privacy, and STEM for women of color.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

Saudi Information Technology Company (SITE)

Saudi Information Technology Company (SITE)

SITE is a forward-thinking enterprise, which aims at revitalizing Saudi Arabia’s digital infrastructure, cybersecurity, software development, and big data and analytics capabilities.

The Purple Guys

The Purple Guys

The Purple Guys offer Trouble-Free IT Support to businesses across the Central and Southern US. Safe and Secure, Rapid Response, Friendly Support that’s our Purple Promise.