News

Nations are sometimes willing to try out some wacky designs in the name of getting an edge on the enemy. These mini-aircraft ...
An unmanned MQ-1B Predator spy plane crashed Tuesday on public land 11/2 miles west of Creech Air Force Base during a routine training mission, a spokeswoman for the 432nd Wing at the base said.
A lightning strike brought down an MQ-1B Predator drone last year over Iraq, according to the Air Force.
An MQ-1 Predator drone that crashed about 8.6 miles northwest of Holloman Air Force Base in New Mexico in October lost its satellite communications link with its pilot before flipping over and ...
A pinhole leak in a coolant supply line caused an MQ-1B Predator to crash in 2015, while it was supporting the war against the Islamic State, according to an accident investigation board report ...
The MQ-1B Predator and MQ-9 Reaper drones, used for a range of missions, offer 24-hour mission support. The Predator, which entered the Air Force in 1996, retired in 2018; the Reaper entered ...
An MQ-1B Predator crashed in Iraq last year after "significant malfunctions" gradually drove the remotely-piloted aircraft into the ground.
Contract workers load a Hellfire missile onto a US Air Force MQ-1B Predator unmanned aerial vehicle at a secret air base in the Persian Gulf region. Getty Images American forces reportedly carried ...
LANGLEY AIR FORCE BASE, Va. — Loss of telemetry downlink signal and an unprogrammed pitch over caused the crash of an MQ-1B Predator 7.5 nautical miles North of Holloman Air Force Base, N.M., Oct. 30, ...
The MQ-1B Predator and MQ-9 Reaper remotely piloted aircraft reached 4 million hours of flight time, surpassing the decades-long records of the RC-135V/W Rivet Joint and U-2 Dragon Lady.
July 7, 2009: The U.S. Air Force s 432nd Air Expeditionary Wing is the main American unit operating MQ-1B Predator and the MQ-9 Reaper UAVs over Iraq, Pakistan and Afghanistan. The wing has six ...
The MQ-1B Predator is an armed, medium-altitude, long-endurance remotely piloted aircraft that is employed primarily for intelligence collection and secondarily against dynamic execution targets.