Pentagon Eyes Laser-Armed Drones to Shoot Down Ballistic Missiles

The YAL-1A Airborne Laser, a modified Boeing 747-400F, takes off from Edwards Air Force Base, California, on March 15 for a five-hour test mission.

United States Air Force photo by Kellie Masters

AA Font size + Print

The YAL-1A Airborne Laser, a modified Boeing 747-400F, takes off from Edwards Air Force Base, California, on March 15 for a five-hour test mission.

The high-flying aircraft would be the unmanned successors to the Air Force’s missile-zapping jetliner.

Four years after the Air Force’s missile-zapping Boeing 747 went to its final resting place in the Arizona desert, the Pentagon is thinking anew about airborne lasers that shoot down ballistic missiles. This time, they’d be mounted on smaller, higher-flying drones.

The idea has been around for decades, but the Pentagon’s missile defense chief says its time may have come. The plan is to see how the laser technology matures over the next three years to fit it on a high-altitude drone, Vice Adm. James Syring, the Missile Defense Agency director, said Tuesday.

“We have significantly ramped up our program in terms of investment and talking about it more of what else needs to be done to mature this capability,” Syring said at a Center for Strategic and International Studies event in Washington.

Such drones would be designed to fly at 65,000 feet or higher, far above bad weather. They would stay aloft for days, even weeks, loitering around launch sites so they could fire upon enemy missiles as they lift off.

The military has long sought a way to get at ballistic missiles in their vulnerable “boost phase,” drawing a bead on them before they reach full speed, deploy decoys, or take evasive action. The Pentagon spent 16 years and $5 billion building the Airborne Laser, a heavily modified Boeing 747 jetliner with a bulbous chemical laser on its nose. In 2010, it shot down a missile in a test.

“It proved that this this concept could work,” Syring said. “It proved that, given enough power, given enough beam quality, given enough altitude, intercept of a ballistic missile … [at a] wide variety of ranges would theoretically be possible.”

But the Airborne Laser’s short range required it to be so close to a launch site that it would expose itself to enemy fighter jets or ground fire. And providing round-the-clock defense would have required small fleets of 747s plus fighter jets for protection and tanker aircraft to keep everything fueled up.

Then there was the laser itself. Powered by chemicals, the laser and its support equipment was comparable in size and weight to six Chevrolet Suburban SUVs. Each time the laser was fired, the plane would need to land to have its chemicals refueled.

It was “hard to maintain a chemical laser,” Syring said.

Pentagon officials have therefore focused their attention on other types of lasers that are lethal at longer ranges and that can be fired several times a flight. The challenge is getting more power from lighter-weight lasers.

“You’re going to need as much power as you can get to destroy as many boosters as you can,” Syring said. “If you can balance that range, altitude, power and number of boosters you need to defeat to help augment our kinetic capability, you’re thinking about the problem exactly right.”

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.