Robots Could Join The Ukrainian Conflict

Ukrainian military leaders and defense industry officials showed off their experimental Phantom robot recently at the Association of the recent US Army show in Washington.

It has an extendable frame that can be outfitted with treads like a tank or with six wheels, and armed with anti-tank weapons, grenade launchers, or machine guns. Currently in testing, the Phantom could be sent into action against Russian-backed forces as early as next year, they said.

Russia, too, has a wide array of ground bots it could dispatch to the conflict, though Moscow has not signaled its readiness to do that. But Russian drones of the flying variety have been used to tremendous effect there. They identify enemy positions to target fires. They hijack cell-tower signals to deliver false messages and texts, an effect experienced by Ukrainian soldiers and even NATO soldiers outside the country.

Meanwhile, the Russians have been quite up-front about using ground robots in Syria, although Russian media outlets reporting on their missions have been all over the map. Such unmanned ground vehicles, or UGVs, include the Platforma-M , the Nerehta, and the Uran-9. Still, the Russians are not known to have deployed UGVs in the destabilisation war against their Western neighbor.

“What’s interesting about the Ukrainian conflict is that it’s the Ukrainian side that is developing unmanned systems it thinks will help it fight. Phantom is one such machine,” said Samuel Bendett, an associate research analyst with the US Center for Naval Analyses’ International Affairs Group.

The Phantom, occasionally spelled “Fantom” in promotional literature, was designed with input from frontline Ukrainian troops who have been slugging it out against Russian forces.

Maj. Gen. Andriy Kovalchuk, the chief of staff and first deputy commander of Ukraine’s Airborne Armed Forces, described hard lessons about defending their products and weapons from Russian forces, and particularly highly sophisticated electronic warfare attacks.

In the early days of the conflict, “civilians were trying to make something that can stand against Russian electronic warfare systems,” he said through an interpreter. Since then, he said, scores of small business have propped up to productise hard-won info on Russian electronic warfare artifacts.

Three-plus years of those difficult experiences are embedded in the robots like the Phantom. It has a backup microwave communication link and can return to its last waypoint when the link to the operator is jammed or severed.

If all else fails, or the electronic warfare environment is too tough to allow and wireless control, you can also steer the robot with a 7-kilometer cable, like a 19th-century diver, connected to the surface via a breathing tube, which goes to show how, in warfare, every step forward can be a step back.

DefenceOne

You Might Also Read: 

'Killer Robot' Warfare Is Coming Closer:

US Military Are Doubling Down On Robot Wars:

A New Autonomous Tactical Drone:

 

 

 

« AI: Experts Talk Ethical & Security Concerns
Artificial Intelligence, Robotics & All Tomorrows Wars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Myra Security

Myra Security

Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

SecZone

SecZone

SecZone is a Chinese enterprise with a mission to "Make It Secure." We are dedicated to driving software security innovation globally.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.

Palindrome Technologies

Palindrome Technologies

Palindrome Technologies help clients defend against cyberattacks across all attack surfaces, including hardware, software, network-to-cloud, people, and emerging technologies.