No-Fly Database Could Be Used For Space Flights - InformationWeek
IoT
IoT
News
News
1/12/2006
02:45 PM
50%
50%

No-Fly Database Could Be Used For Space Flights

Terrorists should not be blasted into space--at least not for recreational purposes.

Terrorists should not be blasted into space -- at least not for recreational purposes.

That's according to the Federal Aviation Administration, which is drafting rules on space tourism. The proposed rules, in published in the Federal Register in December, outline the U.S. policy on space tourism with an emphasis on security and preparedness.

The draft indicates that private companies offering space flight will be required to institute rules to protect national security and prevent dangerous in-flight situations. Operators could consult the Transportation Security Administration's "no-fly" list, which recently delayed a toddler who was flagged while his mother was trying to take him home from New York after the holidays. Passengers and crew are also likely to be governed by other airline security restrictions barring weapons and explosives.

The draft rules also state that operators must verify that their software and hardware are fullyintegrated for an operational flight environment and undergo tests to prove their safety. Tests would be used to validate analytical tools and models that operators install to predict and respond to potential problems. The levels of testing will be determined by several factors, including the vehicle's components and heritage, if the rules are adopted.

The rules also lay out flight training and medical requirements as waivers of claims against the government.

So far, the Office of Commercial Space Transportation has issued 170 licenses to private groups and individuals to exit the Earth's atmosphere. Virgin Galactic is building a spaceport in New Mexico, and the FAA reports that space tourism could generate $1 billion a year by 2021.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll