Quotulatiousness

February 21, 2011

Facebook? Inconsistent enforcement of terms and conditions? Say it ain’t so!

Filed under: Liberty, Media, Technology — Tags: , , , , — Nicholas @ 09:05

Facebook is having another of its periodic mood swings on just what exactly their terms and conditions really mean:

Facebook has announced it is actively reviewing its policy of a total ban on all content relating to sexual activities.

The review follows the deletion on 4 February of Collared Events page following a complaint from a site user. This deletion angered and mystified many members and supporters of Collared, which operates Slaves and Masters Club Nights and which identifies itself as a community non-profit organisation with a focus on safety and socialization. It used the Facebook page merely as a means to communicate.

There was no explicit imagery or sexual content of any kind and the page was set to “secret”. The page strictly followed the Facebook Terms. Facebook initially cited its user condition (3.7) that: “You will not post content that: is hateful, threatening, or pornographic; incites violence; or contains nudity or graphic or gratuitous violence.”

However, following extensive dialogue with senior staff at the company, including Richard Allan, Facebook’s Head of Policy for Europe, Collared has apparently stirred Facebook into reviewing not just this ban but its entire policy. A wide ranging “internal dialogue” is now under way.

Simon, who runs Collared, told the Reg: “I feel that Facebook are in complete confusion on this issue. The problem is that their policy is inconsistent and whether a site survives or not depends on whether a site is able to lobby the right person in the company — and not offend the wrong one.

Last time it was non-pornographic breastfeeding information groups being banned, and now gay, lesbian, and transgender groups are worried that this new interpretation will have their Facebook pages banned without warning, too. Makes you wonder if there’s been a silent take-over by the religious right, doesn’t it?

February 19, 2011

When “hacker army” is not an exaggeration

Filed under: Britain, China, Government, Military, Russia, Technology — Tags: , , , , , — Nicholas @ 10:07

Strategy Page counts noses of the various semi-organized hacker armies out in the wild:

Despite spending over a billion dollars a year defending their government networks, Britain recently complained openly of hackers getting into the communications network of the Foreign Office. The government also warned of increasing attacks on British companies. The recent attacks government and corporations were all targeting specific people and data. While China was not mentioned in these official announcements, British officials have often discussed how investigations of recent hacking efforts tended to lead back to China. There is also a strong suspicion, backed up by hacker chatter, that governments are offering large bounties for information from foreign governments. Not information from China, but from everyone else.

China one of many nations taking advantage of the Internet to encourage, or even organize, patriotic Internet users to obtain hacking services. This enables the government to use (often informally) these thousands of hackers to attack targets (foreign or domestic.) These government organizations arrange training and mentoring to improve the skills of group members. Turkey has over 45,000 of hackers organized this way, Saudi Arabia has over 100,000, Iraq has over 40,000, Russia over 100,000 and China, over 400,000. While many of these Cyber Warriors are rank amateurs, even the least skilled can be given simple tasks. And out of their ranks will emerge more skilled hackers, who can do some real damage. These hacker militias have also led to the use of mercenary hacker groups, who will go looking for specific secrets, for a price. Chinese companies are apparently major users of such services, judging from the pattern of recent hacking activity, and the fact that Chinese firms don’t have to fear prosecution for using such methods.

It was China that really pioneered the militia activity. It all began in the late 1990s, when the Chinese Defense Ministry established the “NET Force.” This was initially a research organization, which was to measure China’s vulnerability to attacks via the Internet. Soon this led to examining the vulnerability of other countries, especially the United States, Japan and South Korea (all nations that were heavy Internet users). NET Force has continued to grow. NET Force was soon joined by an irregular civilian militia; the “Red Hackers Union” (RHU). These are nearly half a million patriotic Chinese programmers, Internet engineers and users who wished to assist the motherland, and put the hurt, via the Internet, on those who threaten or insult China. The RHU began spontaneously in 1999 (after the U.S. accidentally bombed the Chinese embassy in Serbia), but the government has assumed some control, without turning the voluntary organization into another bureaucracy. The literal name of the group is “Red Honkers Union,” with Honker meaning “guest” in Chinese. But these were all Internet nerds out to avenge insults to the motherland.

You have to wonder how many script kiddies ever thought they’d end up being government operatives.

“If you’re not embarrassed when you ship your first version you waited too long”

Filed under: Technology — Tags: , , , — Nicholas @ 00:03

An interesting look at the epic battle between the perfectionist urge and the first-mover advantage:

There is a dark time in WordPress development history, a lost year. Version 2.0 was released on December 31st, 2005, and version 2.1 came out on January 22nd, 2007. Now just from the dates, you might imagine that perhaps we had some sort of rift in the open source community, that all the volunteers left or that perhaps WordPress just slowed down. In fact it was just the opposite, 2006 was a breakthrough year for WP in many ways: WP was downloaded 1.5 million times that year, and we were starting to get some high-profile blogs switching over. The growing prominence had attracted scores of new developers to the project and we were committing new functionality and fixes faster than we ever had before.

What killed us was “one more thing.” We could have easily done three major releases that year if we had drawn a line in the sand, said “finished,” and shipped the darn thing. The problem is that the longer it’s been since your last release the more pressure and anticipation there is, so you’re more likely to try to slip in just one more thing or a fix that will make a feature really shine. For some projects, this literally goes on forever.

[. . .]

Usage is like oxygen for ideas. You can never fully anticipate how an audience is going to react to something you’ve created until it’s out there. That means every moment you’re working on something without it being in the public it’s actually dying, deprived of the oxygen of the real world. It’s even worse because development doesn’t happen in a vacuum — if you have a halfway decent idea, you can be sure that there are two or three teams somewhere in the world that independently came up with it and are working on the same thing, or something you haven’t even imagined that disrupts the market you’re working in. (Think of all the podcasting companies — including Ev Williams’ Odeo — before iTunes built podcasting functionality in.)

By shipping early and often you have the unique competitive advantage of hearing from real people what they think of your work, which in best case helps you anticipate market direction, and in worst case gives you a few people rooting for you that you can email when your team pivots to a new idea. Nothing can recreate the crucible of real usage.

February 18, 2011

The internet in China: hidden powers of persuasion

Filed under: China, Government, Technology — Tags: , , , , — Nicholas @ 08:52

A look at how the internet in China has the power to (sometimes) punish corrupt officials and influence the government:

Corruption and viral marketing has provided the Chinese government with a powerful tool for controlling public opinion. It all began when Chinese companies realized that they could hurt competitors by planting damaging rumors on the Internet. This, even in China, is illegal. But the corruption in China being what it is, there was little risk of getting the police to hunt down and punish the perpetrators. This was partly because the marketing firms, hired by companies to burnish their image, or defame competitors, was careful to have other small outfits get on the Internet to actually do the work, and be careful to not be traceable. So the cops, when forced by companies to do something (often because the owner of the offended firm was well-connected politically), were stymied at first. But the police, declaring it a national security issue, eventually discovered how this was done. But this did not stop all these negative campaigns. To defend themselves, companies that were attacked by these Internet disinformation campaigns, fought back.

This use of negative tactics soon fell out of favor, as all those tarnished companies lost sales. So these Internet based opinion manipulation turned to praising your own products. About this time, the government discovered what was going on, and began to use these marketing companies, and their subcontractors, to change opinions towards government policies. There was a pressing need for this, because all this Internet opinion manipulation had started out, over the last decade, as a popular uprising against government corruption, mistreatment and media manipulation. This “online army” was not organized, except by outrage at government, or individual, wrongdoing. For example, many government officials, and their high-spirited offspring, injure or steal from ordinary citizens, and get away with it. These officials have enough political clout to make the police leave them alone. But once the online army gets onto these stories, everyone in the country knows, and is angry. There are over 400 million Internet users in China, a country of 1,400 million. When a lot of people on the Internet get angry enough, the story, and anger, explodes through the Chinese Internet community. China carefully monitors Chinese Internet use, and tries to block unwelcome information or discussions. But when the outrage on a particular item becomes too large, it’s better to just arrest and punish the guy whose misbehavior got the online army going in the first place.

Who knew that sockpuppeting would be such a valuable online tactic in China? It might not just be limited to China, however:

If the Chinese wanted to use this tool in other countries, they would require posters who are familiar with the language and culture of the target population. That’s difficult skill to acquire, especially for at least a few hundred posters required (to hit, regularly, hundreds of message boards, chat rooms and so on). Done right, you can shift opinions among millions of people in a few days. Done wrong, you fail. And if you’re operating in a foreign country, you might get found out. But the opportunity is there.

How to view PDF documents natively in Chrome

Filed under: Technology — Tags: , , — Nicholas @ 08:42

Royce McDaniels provides step-by-step instructions for installing the PDF reader plug-in for the Chrome browser:

Hello, everyone, and welcome to today’s How To segment here at The Walrus Says! Today we’re examining another useful feature of the Chrome web browser from Google, namely the ability to display Adobe Portable Document Format (PDF) files directly in the browser rather than via an external application like Google Docs which has been necessary before. The instructions below not only show you how to activate this feature of Chrome, but show you an interesting way to access Chrome functionality not part of the standard configuration menus! (Chrome itself is an Open Source project sponsored by Google; you can get complete information about the browser’s development at The Chromium Project. Enjoy!

I’m still (barely) sticking with Firefox as my primary browser, although it’s becoming a pain to use these days: for example, as I’m typing this line, the letters I type are appearing several seconds after I type ’em. It’s a bit like using an old 300 baud line with a small buffer. If the next major release of Firefox doesn’t fix this problem, then I’ll be switching to Chrome as my primary browser.

Ron Hickman, inventor of the ubiquitous Workmate

Filed under: Randomness, Technology, Tools — Tags: , , , , — Nicholas @ 08:23

Many people have bought and used the Workmate collapsible workbench . . . 30 million or so. The inventor, Ron Hickman, Ron Hickman, died recently:

Hickman, who lived in Jersey, was 78. His design for the wood-and-steel foldable workbench and vice was rejected by several tool companies that believed the bench wouldn’t sell.

Tool company Stanley told him the device would sell in the dozens rather than hundreds, while other companies told him the design would not sell at the necessary price. It has since sold about 30 million units around the world, and 60,000 were sold in the UK last year alone.

Hickman sold the benches himself when he couldn’t find a backer through trade shows direct to professional builders. Black & Decker saw the light in 1973 and began producing them. By 1981 it had sold 10 million benches.

He came up with the design when he accidentally sawed through an expensive chair while making a wardrobe. He had been using the chair as a workbench.

His designing skill wasn’t limited to tools: he also is credited with the design of the Lotus Elan.

February 17, 2011

Building an (even better) army helmet

Filed under: Military, Technology, USA — Tags: , , — Nicholas @ 08:45

The US Army and USMC like the latest combat helmet even more than they liked the next-most recent improved model:

The U.S. Army and Marine Corps have found that their new Enhanced Combat Helmet (ECH) is even more bullet proof than expected. While testing the ECH, it was discovered that the machine firing metal fragments at the ECH (to represent shell and bomb fragments) could not fire fragments fast enough to penetrate. The ECH was supposed to be invulnerable to pistol bullets, and it was, but some types of metal fragments were expected to still be dangerous. So ECH was tested to see how well it could resist high-powered rifle bullets. ECH was not 100 percent invulnerable, but in most cases, it would stop anything fired from a sniper rifle. Overall, it was calculated that the ECH was 40 percent more resistant to projectiles and 70 percent stronger than the current ACH helmet.

The ECH is made of a new thermoplastic material (UHMWP, or Ultra-High Molecular Weight Polyethylene). It is lighter and stronger than the Kevlar used in the ACH and earlier PASGT and, it turned out, provided much better protection as well. The ECH will begin replacing the current ACH later this year, with 200,000 being eventually purchased. The ECH costs $600 each, twice as much as the ACH. But for troops under fire, the additional cost is well worth the additional protection.

Combat helmets, which appear to be low-tech, have been anything-but over the last three decades. Advances in the design and construction of helmets have been accelerating, especially in the last decade. For example, the current ACH (Advanced Combat Helmet) recently underwent some tweaks to make it more stable. That was required because more troops are being equipped with a flip down (over one eye) transparent computer screen. The device is close to the eye, so it looks like a laptop computer display to the soldier, and can display maps, orders, troop locations or whatever. If the helmet jumps around too much, it’s difficult for the solider to make out what’s on the display. This can be dangerous in combat.

The Pirates of Oz

Filed under: Australia, Media, Technology — Tags: , , , , — Nicholas @ 07:15

According to a recent study, piracy in Australia has become the biggest industry: one third of all Australians are accused of piracy in the last twelve months.

The study, released by the Australian Federation Against Copyright Theft, claims that piracy sucks $A1.37bn out of the Australian economy.

Direct effects claimed by AFACT amounted to $A575m, the study claims — including $A225m attributed to “secondary piracy”, in which an individual either “views or borrows” pirated material (presumably whether or not the viewer knows the full legal status of what they’re watching).

[. . .]

The economic multiplier effects, for those willing to get past the press release, include reduced spending on recreation, clothing, housing and household goods. So, freetards, hang your heads in shame: not only were more than 6,000 jobs lost due to piracy, but the victims of your crime are now homeless, naked, hungry and bored.

February 16, 2011

Another, safer, table saw design

Filed under: Technology, Tools, Woodworking — Tags: , , — Nicholas @ 08:31

Table saw injuries can be quite gruesome — amputation of fingers, for example — so any new technology that might make woodworkers more safe is welcome. The first innovator in the field was the SawStop, a device that could stop the spinning blade of the saw whenever it detected human skin. Mighty impressive, but none of the major manufacturers wanted to buy the technology: it increased the cost of existing saws beyond what they thought their customers would be willing to pay. The inventor had to form a company to build his own table saws instead.

A post at the Popular Woodworking blog looks at a newer device to make table saws more safe:

Ten years ago, table saws were about to change. In 2001, you could buy a cabinet saw, such as a Delta Unisaw, a Powermatic 66 or a clone of the Unisaw made in Taiwan. Or you could get a contractor’s saw, a heavy but relatively portable table saw. Benchtop saws were not a significant part of the market, and things hadn’t changed much since the end of World War II. All the saws at the time had one thing in common: awful guards that were rarely used. Things were changing on two fronts. Underwriter’s Laboratories and the Consumer Products Safety Commission (CPSC) were looking into bringing American saw’s guard systems into the modern age, spurred in large part by a pesky woodworker from Berea, Ky., named Kelly Mehler.

Mehler was the author of “The Tablesaw Book,” and he questioned why European saws had more effective and user-friendly guards. At about the same time, Stephen Gass, an amateur woodworker and patent attorney with a doctorate in physics invented the SawStop, an imaginative and revolutionary device that could stop a spinning blade in less than a heartbeat if a flesh came in contact with it. These two ideas caught the attention of CPSC, and the long saga of what to do about the problem of table saw injuries began.

A couple weeks ago, this story was mentioned in the national media, in a brief story with scary-sounding headline in USA Today. As has happened many times in the last few years, this set off a round of emotional debate among woodworkers.

[. . .]

In the next few months the discussions and meetings between manufacturers and the CPSC will probably resume. One thing that will likely factor into this round will be alternatives to SawStop’s “flesh-detecting” technology. Last spring, the joint venture of member companies of the Power Tool Institute filed patent application 12769396. This describes an electronic detection system and a mechanism to fire an explosive trigger (similar to that used in automotive airbags) that would drop the blade below the table. An important difference to this approach is that it wouldn’t force anything into the blade, thus avoiding an expensive replacement due to an incidental firing. Also interesting is the mention of this system’s ability to tell the difference between wet wood and human flesh.

And there are several new patent applications from the SawStop inventors covering detection and deployment systems for table saws, and the possibility of using similar devices in miter saws. Will this mean new, less-expensive and less-destructive systems for table saws and other tools that will make woodworking safer, or will it mean years of waiting while the lawyers battle over intellectual property issues?

February 13, 2011

More on that horrific gender imbalance at Wikipedia

Filed under: Media, Technology — Tags: , , , — Nicholas @ 11:04

In case you didn’t think this was a totally serious situation the last time the New York Times headlined it, here’s Heather Mac Donald to alert you to the real significance of the crisis:

New York Times executive editor Bill Keller announced last week at the National Press Club that news from Egypt was crowding from his paper’s front page anything that didn’t have an urgent claim on readers’ attention. So what made the cut that day, in addition to the dispatches from Cairo and Jerusalem? An article on gender imbalance among Wikipedia contributors. Barely 13 percent of the anonymous, volunteer contributors to the free online encyclopedia are female, according to a study by the Wikimedia Foundation.

The gender imbalance among Wikipedia contributors is not even news. The Wikimedia study came out in August 2009 and was covered by the Wall Street Journal at that time. In the 17 months (which the Times rounds down to “about a year”) that this report has been searing the Times‘ consciousness, the paper has come up with exactly zero new facts to explain the contributor imbalance. Instead, the paper recycles Women’s Studies bromides about a female-hostile society, providing a striking display of contemporary feminism’s intellectual decadence.

So the New York Times thinks this problem is of such seriousness that it could compete with the drama of the Egyptian non-violent revolution on the front pages. It must be pretty dramatic then:

The Times‘ next move reveals the shameless legerdemain with which contemporary feminists and their allies preserve the conceit of a sexist society. Rather than using barrier-free Wikipedia as the benchmark for measuring discrimination in the by-invitation-only world, the Times uses the invitation-only-world as the benchmark for Wikipedia. Since we already know that the low female participation rate in gatekeepered forums is the result of bias, the low female participation rate in Wikipedia must also be the result of bias. Nowhere does the article contemplate the possibility that Wikipedia may instead reveal different innate predilections for what the Times condescendingly calls “an obsessive fact-loving realm.”

Given the challenge of identifying barriers to women in a forum open to all, it is no surprise that the people quoted in the article speak in gibberish. The Times introduces the first of its experts thus:

Wikipedia shares many characteristics with the hard-driving hacker crowd, says Joseph Reagle, a fellow at the Berkman Center for Internet and Society at Harvard. This includes an ideology that resists any efforts to impose rules or even goals like diversity, as well as a culture that may discourage women.

No examples of such “discouragement” are provided, so let us move on to Reagle’s first quote: “It is ironic,” he tells the Times, “because I like these things — freedom, openness, egalitarian ideas — but I think to some extent they are compounding and hiding problems you might find in the real world.” This statement is nonsensical: How do “freedom, openness, and egalitarian ideas” both “compound and hide problems”? Does it now turn out that freedom and openness stand as barriers to the feminists’ sought-after equality of results between women and men?

Jay Rosen analyses the “Twitter Can’t Topple Dictators” meme

Filed under: Media, Technology — Tags: , , , , , — Nicholas @ 10:42

Jay Rosen has been seeing too many facile dismissals of the actual impact of Twitter and other social media tools in recent uprisings:

In other words, tools are tools, Internet schminternet. Revolutions happen when they happen. Whatever means are lying around will get used. Next question!

So these are the six signs that identify the genre, Twitter Can’t Topple Dictators. 1.) Nameless fools are staking maximalist claims. 2.) No links we can use to check the context of those claims. 3.) The masses of deluded people make an appearance so they can be ridiculed. 4.) Bizarre ideas get refuted with a straight face. 5.) Spurious historicity. 6.) The really hard questions are skirted.

If that’s the genre, what’s the appeal? Beats me. I think this is a really dumb way of conducting a debate. But I cannot deny its popularity. So here’s a guess: almost everyone who cares about such a discussion is excited about the Internet. Almost everyone is a little wary of being fooled by The Amazing and getting carried away. When we nod along with Twitter Can’t Topple Dictators we’re assuring ourselves that our excitement is contained, that we’re being realistic, mature, grown-up about it.

This feeling is fake. A real grown-up understands that the question is hard, that we need facts on the ground before we can start to answer it. Twitter brings down governments is not a serious idea about the Internet and social change. Refuting it is not a serious activity. It just feels good… for a moment.

QotD: The hardest economic question is “What comes next?”

Filed under: Economics, Quotations, Technology — Tags: — Nicholas @ 00:09

The hardest economic question is, What comes next? What, in other words, are the new sources of economic value? How can businesses grow and our standard of living rise?

Sometimes the answer is simply more of the same. Growth comes from rolling out existing goods and services to new markets, until there’s a chicken in every pot and a car in every garage. This kind of progress may be hard to achieve, but you at least start with a clear notion of what it would look like.

That’s why catch-up economies like China today or South Korea in the past can grow so fast. Their businesses don’t have to figure out what to make or sell. They know what’s possible by looking abroad, and have a reasonable idea of what consumers, local or international, want to buy. Refrigerators and air conditioning are popular; so are shampoo and disposable diapers.

At the economic frontier, the hardest question gets much harder. You no longer have a clear vision of the future. You know neither what’s possible nor what people want. You can only guess. Starbucks or FedEx may sound obvious in retrospect, but they were once crazy ideas.

Virginia Postrel, “Would Bogie Wear Gore-Tex?: The next big thing often consists of lots of little things”, Wall Street Journal, 2011-02-12

February 12, 2011

Deeper implications of the rise of “3D printing”

Filed under: Economics, Technology — Tags: , , , , — Nicholas @ 10:49

One of the most interesting things happening in the manufacturing world is the rise of a technology that may well make huge swathes of factories obsolete: practical 3D printing. What was originally just a neat way to develop small prototypes for mass production is quickly becoming a viable way to replace the entire mass production step. The technology is still limited to a small range of materials, but the price has been dropping steeply enough that small 3D printers are within the reach of hobbyists already.

The Economist points out that this will not be an unmixed blessing (as technological revolutions ever have been):

Others maintain that, by reducing the need for factory workers, 3D printing will undermine the advantage of low-cost, low-wage countries and thus repatriate manufacturing capacity to the rich world. It might; but Asian manufacturers are just as well placed as anyone else to adopt the technology. And even if 3D printing does bring manufacturing back to developed countries, it may not create many jobs, since it is less labour-intensive than standard manufacturing.

The technology will have implications not just for the distribution of capital and jobs, but also for intellectual-property (IP) rules. When objects can be described in a digital file, they become much easier to copy and distribute — and, of course, to pirate. Just ask the music industry. When the blueprints for a new toy, or a designer shoe, escape onto the internet, the chances that the owner of the IP will lose out are greater.

There are sure to be calls for restrictions on the use of 3D printers, and lawsuits about how existing IP laws should be applied. As with open-source software, new non-commercial models will emerge. It is unclear whether 3D printing requires existing rules to be tightened (which could hamper innovation) or loosened (which could encourage piracy). The lawyers are, no doubt, rubbing their hands.

Just as nobody could have predicted the impact of the steam engine in 1750 — or the printing press in 1450, or the transistor in 1950 — it is impossible to foresee the long-term impact of 3D printing. But the technology is coming, and it is likely to disrupt every field it touches. Companies, regulators and entrepreneurs should start thinking about it now. One thing, at least, seems clear: although 3D printing will create winners and losers in the short term, in the long run it will expand the realm of industry — and imagination.

So, even if you don’t have immediate plans to buy a 3D printer, you could do worse than to dust off your old drafting book and learn a bit of CAD. You may be using those skills sooner than you expect.

There’s more information (from 2009) on the 3D printing process here.

February 11, 2011

Human hacking: the overconfident CEO

Filed under: Law, Media, Technology — Tags: , , , — Nicholas @ 07:19

An interesting story at PC World talks about the methods used to get inside information on individuals and companies:

“He was the guy who was never going to fall for this,” said Hadnagy. “He was thinking someone would probably call and ask for his password and he was ready for an approach like that.”

After some information gathering, Hadnagy found the locations of servers, IP addresses, email addresses, phone numbers, physical addresses, mail servers, employee names and titles, and much more. But the real prize of knowledge came when Hadnagy managed to learn the CEO had a family member that had battled cancer, and lived. As a result, he was interested and involved in cancer fundraising and research. Through Facebook, he was also able to get other personal details about the CEO, such as his favorite restaurant and sports team.

Armed with the information, he was ready to strike. He called the CEO and posed as a fundraiser from a cancer charity the CEO had dealt with in the past. He informed him they were offering a prize drawing in exchange for donations — and the prizes included tickets to a game played by his favorite sports team, as well as gift certificates to several restaurants, including his favorite spot.

The CEO bit, and agreed to let Hadnagy send him a PDF with more information on the fund drive. He even managed to get the CEO to tell him which version of Adobe reader he was running because, he told the CEO “I want to make sure I’m sending you a PDF you can read.” Soon after he sent the PDF, the CEO opened it, installing a shell that allowed Hadnagy to access his machine.

When Hadnagy and his partner reported back to the company about their success with breaching the CEO’s computer, the CEO was understandably angry, said Hadnagy.

“He felt it was unfair we used something like that, but this is how the world works,” said Hadnagy. “A malicious hacker would not think twice about using that information against him.”

Takeaway 1: No information, regardless of its personal or emotional nature, is off limits for a social engineer seeking to do harm

Takeaway 2: It is often the person who thinks he is most secure who poses the biggest vulnerability. One security consultant recently told CSO that executives are the easiest social engineering targets.

February 10, 2011

No more manned fighters?

Filed under: Military, Technology, USA — Tags: , , , , , , , — Nicholas @ 12:24

As I said the last time this topic came up, “This is not a repost from 1957”. We may actually be looking at the last generation of manned fighters, if this update from Strategy Page is true:

On February 4th, the U.S. Navy X-47B UCAV (unmanned combat air vehicle) made its first flight. It was three years ago that the navy rolled out its first combat UAV; the 15 ton X-47B. This pilotless aircraft has a wingspan of 20 meters/62 feet (whose outer 5 meter/15 foot portions fold up to save space on the carrier). It carries a two ton payload and will be able to stay in the air for twelve hours. The U.S. is far ahead of other nations in UCAV development, and this is energizing activity in Russia, Europe and China to develop similar aircraft.

[. . .]

All of these aircraft are stealthy and can operate completely on their own (including landing and takeoff, under software control). The UCAVs would be used for dangerous missions, like destroying enemy air defenses, and reconnaissance. Even air force commanders are eager to turn over SEAD (Suppression of Enemy Air Defenses) missions to UAVs. SEAD is the most dangerous mission for combat pilots. But until quite recently, all these projects had either been cancelled, or were headed in that direction.

Now, the U.S. Department of Defense wants the new UAV combat aircraft in service by the end of the decade, some twenty years ahead of a schedule that was planned in the 1990s. The F-35 is expected to cease production in 2034, more than a decade after the first combat UAVs, that can match F-35 performance, enters service.

Unable to buy new aircraft designs (because they are too expensive, or simply take too long to get into service), and facing the prospect of unmanned aircraft (UAVs) displacing more and more manned ones, the American military is spending a growing chunk of its budgets on upgrading and refurbishing the combat aircraft they already have. This was not a deliberate, long term plan, but simply a reaction to shortages of new aircraft. A lot of the new electronics and weapons involved in these upgrades can also equip UAV designs still in development, so such efforts are a double win.

More and more, it looks like the new 36 ton F-22 and 27 ton F-35 are the end of the road for manned fighter-bombers. Not just because the F-22 and F-35 cost so much to develop, but because so much new tech has arrived on the scene that it simply makes more military, and economic, sense to go with unmanned aircraft. Meanwhile, the existing F-15s, F-16s, F-18s, A-10s and all American heavy bombers are being equipped with new targeting pods and combat Internet connections, along with new radars and all sorts of electronics. Older aircraft are having worn out structural components rebuilt or replaced. This buys time until the unmanned aircraft are ready. F-35s will also fill the gap, which may be a very small one.

Usual caveats apply of course, and you could do worse than reading the comment thread on that original post for some of the caveats spelled out.

« Newer PostsOlder Posts »

Powered by WordPress