An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

An MQ-9 Reaper sits on the flight line as the sun sets at Creech Air Force Base

Fact Sheets

  • Massive Ordnance Penetrator

    The Massive Ordnance Penetrator (MOP) is a weapon system designed to accomplish a difficult, complicated mission of reaching and destroying our adversaries' weapons of mass destruction located in well protected facilities.

  • MC-12W Liberty

    The MC-12W is a medium-to low-altitude, twin-engine turboprop aircraft. Its primary mission is providing intelligence, surveillance and reconnaissance support directly to ground forces.

  • MC-130H COMBAT TALON II

    The MC-130H Combat Talon II provides infiltration, exfiltration and resupply of special operations forces and equipment in hostile or denied territory. Secondary missions include psychological operations, and helicopter and vertical lift air refueling.

  • MC-130J Commando II

    The Commando II flies low visibility, single or multiship, low-level infiltration, exfiltration and resupply of special operations forces, by airdrop or airland and air refueling missions for special operations helicopters and tiltrotor aircraft, intruding politically sensitive or hostile

  • Modular Airborne Fire Fighting System

    The Modular Airborne Fire Fighting System, or MAFFS, Program provides emergency capability to supplement existing commercial tanker support on wildland fires.  MAFFS aids the U.S. Department of Agriculture's Forest Service.

  • MQ-1B Predator

    The MQ-1B Predator is an armed, multi-mission, medium-altitude, long-endurance remotely piloted aircraft that is employed primarily as an intelligence-collection asset and secondarily against dynamic execution targets.

  • MQ-9 Reaper

    The MQ-9 Reaper is employed primarily as an intelligence-collection asset and secondarily against dynamic execution targets.