Robots Could Join The Ukrainian Conflict

Ukrainian military leaders and defense industry officials showed off their experimental Phantom robot recently at the Association of the recent US Army show in Washington.

It has an extendable frame that can be outfitted with treads like a tank or with six wheels, and armed with anti-tank weapons, grenade launchers, or machine guns. Currently in testing, the Phantom could be sent into action against Russian-backed forces as early as next year, they said.

Russia, too, has a wide array of ground bots it could dispatch to the conflict, though Moscow has not signaled its readiness to do that. But Russian drones of the flying variety have been used to tremendous effect there. They identify enemy positions to target fires. They hijack cell-tower signals to deliver false messages and texts, an effect experienced by Ukrainian soldiers and even NATO soldiers outside the country.

Meanwhile, the Russians have been quite up-front about using ground robots in Syria, although Russian media outlets reporting on their missions have been all over the map. Such unmanned ground vehicles, or UGVs, include the Platforma-M , the Nerehta, and the Uran-9. Still, the Russians are not known to have deployed UGVs in the destabilisation war against their Western neighbor.

“What’s interesting about the Ukrainian conflict is that it’s the Ukrainian side that is developing unmanned systems it thinks will help it fight. Phantom is one such machine,” said Samuel Bendett, an associate research analyst with the US Center for Naval Analyses’ International Affairs Group.

The Phantom, occasionally spelled “Fantom” in promotional literature, was designed with input from frontline Ukrainian troops who have been slugging it out against Russian forces.

Maj. Gen. Andriy Kovalchuk, the chief of staff and first deputy commander of Ukraine’s Airborne Armed Forces, described hard lessons about defending their products and weapons from Russian forces, and particularly highly sophisticated electronic warfare attacks.

In the early days of the conflict, “civilians were trying to make something that can stand against Russian electronic warfare systems,” he said through an interpreter. Since then, he said, scores of small business have propped up to productise hard-won info on Russian electronic warfare artifacts.

Three-plus years of those difficult experiences are embedded in the robots like the Phantom. It has a backup microwave communication link and can return to its last waypoint when the link to the operator is jammed or severed.

If all else fails, or the electronic warfare environment is too tough to allow and wireless control, you can also steer the robot with a 7-kilometer cable, like a 19th-century diver, connected to the surface via a breathing tube, which goes to show how, in warfare, every step forward can be a step back.

DefenceOne

You Might Also Read: 

'Killer Robot' Warfare Is Coming Closer:

US Military Are Doubling Down On Robot Wars:

A New Autonomous Tactical Drone:

 

 

 

« AI: Experts Talk Ethical & Security Concerns
Artificial Intelligence, Robotics & All Tomorrows Wars »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

Heimdal Security

Heimdal Security

Heimdal Security provides proactive protection against cyber threats including ransomware, exploit kits and financial malware.

Rafael

Rafael

Rafael has more than 15 years of proven experience in the cyber arena providing solutions for national security as well as commercial applications.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Infortec

Infortec

Infortec provide consultancy and solutions for the protection of digital information and the management of computer resources.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

Charterhouse Voice & Data

Charterhouse Voice & Data

Charterhouse is your trusted technology partner - designing, provisioning and supporting the technology that underpins your operations including network security and data compliance.

Eastern Cyber Resilience Centre (ECRC)

Eastern Cyber Resilience Centre (ECRC)

The Eastern Cyber Resilience Centre is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Gutsy

Gutsy

Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.

Stern Cybersecurity

Stern Cybersecurity

Stern Cybersecurity offers a robust defense against the ever-evolving landscape of digital threats.