The Military Is Creating Vampire Drones That Die in the Sun

True Blood

Like meeting the one true death, the Pentagon wants a drone that dissolves by morning light—or in 4 hours, whichever comes first.

It’s a giver’s problem. The drone you just sent to drop vital medical supplies to refuges fleeing the war is intercepted by opposing forces. Now, jihadists are making YouTube videos of themselves ripping apart your secret military equipment like they’re tearing open shiny packages. To solve the problem and address the many logistical issues that come from having to actually bring equipment home once it’s used in war, the Defense Advanced Research Projects Agency, or DARPA, is funding a new research initiative to develop aircraft that can “fully vanish within within four hours of payload delivery or within 30 minutes of morning civil twilight (assuming a night drop), whichever is earlier,” the agency posted today.

The program is called Inbound, Controlled, Air-Releasable, Unrecoverable Systems, or ICARUS, after the boy in Greek mythology who flew too close to the sun and saw his feather and wax wings melt. But the mission for this ICARUS is far simpler: the Pentagon wants to send drones on one-way trips.

DARPA is seeking to address a “capability gap in eliminating the leave-behind of air vehicles used to deliver supplies to personnel on the ground without requiring pack-out. Such pack-out of these systems is cumbersome, time-consuming, and adds significant weight to the individuals’ loads,” officials wrote in the announcement. The program will last 26 months with about $8 million in funding.

In setting the goal, the agency is building off early success with their Vanishing Programmable Resources, or VAPR, program, as well as some recent breakthroughs in advanced polymer sublimation, which, in chemistry, is the passage of a substance directly from solid form into a gas. In other words, they want a drone that disappears in a cloud of smoke—like a True Blood vampire being kissed by the sun.

The aircraft that they’re looking for will be able to travel 150 kilometers, drop a payload of up to 3 pounds within 10 meters of a pre-programmed landing spot, and be no larger than 3 meters in length.

“Achieving appropriate transience rates without degrading the structural properties may pose a significant technical challenge when engineering existing transient materials, for example sublimating polymers,” DARPA acknowledges.

In other words, making planes sturdy enough to fly and carry payloads but that can also vanish is going to be very hard. Good luck.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.