Robots Could Join The Ukrainian Conflict

Ukrainian military leaders and defense industry officials showed off their experimental Phantom robot recently at the Association of the recent US Army show in Washington.

It has an extendable frame that can be outfitted with treads like a tank or with six wheels, and armed with anti-tank weapons, grenade launchers, or machine guns. Currently in testing, the Phantom could be sent into action against Russian-backed forces as early as next year, they said.

Russia, too, has a wide array of ground bots it could dispatch to the conflict, though Moscow has not signaled its readiness to do that. But Russian drones of the flying variety have been used to tremendous effect there. They identify enemy positions to target fires. They hijack cell-tower signals to deliver false messages and texts, an effect experienced by Ukrainian soldiers and even NATO soldiers outside the country.

Meanwhile, the Russians have been quite up-front about using ground robots in Syria, although Russian media outlets reporting on their missions have been all over the map. Such unmanned ground vehicles, or UGVs, include the Platforma-M , the Nerehta, and the Uran-9. Still, the Russians are not known to have deployed UGVs in the destabilisation war against their Western neighbor.

“What’s interesting about the Ukrainian conflict is that it’s the Ukrainian side that is developing unmanned systems it thinks will help it fight. Phantom is one such machine,” said Samuel Bendett, an associate research analyst with the US Center for Naval Analyses’ International Affairs Group.

The Phantom, occasionally spelled “Fantom” in promotional literature, was designed with input from frontline Ukrainian troops who have been slugging it out against Russian forces.

Maj. Gen. Andriy Kovalchuk, the chief of staff and first deputy commander of Ukraine’s Airborne Armed Forces, described hard lessons about defending their products and weapons from Russian forces, and particularly highly sophisticated electronic warfare attacks.

In the early days of the conflict, “civilians were trying to make something that can stand against Russian electronic warfare systems,” he said through an interpreter. Since then, he said, scores of small business have propped up to productise hard-won info on Russian electronic warfare artifacts.

Three-plus years of those difficult experiences are embedded in the robots like the Phantom. It has a backup microwave communication link and can return to its last waypoint when the link to the operator is jammed or severed.

If all else fails, or the electronic warfare environment is too tough to allow and wireless control, you can also steer the robot with a 7-kilometer cable, like a 19th-century diver, connected to the surface via a breathing tube, which goes to show how, in warfare, every step forward can be a step back.

DefenceOne

You Might Also Read: 

'Killer Robot' Warfare Is Coming Closer:

US Military Are Doubling Down On Robot Wars:

A New Autonomous Tactical Drone:

 

 

 

« AI: Experts Talk Ethical & Security Concerns
Artificial Intelligence, Robotics & All Tomorrows Wars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

Privacy Analytics

Privacy Analytics

Privacy Analytics enables healthcare organizations to unleash the value of sensitive data for secondary purposes without compromising personal health information.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

ForAllSecure

ForAllSecure

ForAllSecure’s mission is to make the world’s software safe by pioneering autonomous cybersecurity tools that automatically find and fix vulnerabilities in run-time executable software.

Cyber Polygon

Cyber Polygon

Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.

Silicon Cloud International

Silicon Cloud International

Silicon Cloud is a high performance and secure cloud computing platform for engineering and scientific applications.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

World Informatix Cyber Security (WICS)

World Informatix Cyber Security (WICS)

World Informatix Cyber Security provides a range of cyber security services to protect valuable information assets to global business and governments.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

J.S. Held

J.S. Held

J.S. Held is a global consulting firm providing technical, scientific, and financial expertise across all assets and value at risk.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.

Applaudo

Applaudo

Applaudo specializes in helping the world’s most admired brands optimize their IT solutions, reduce delivery costs, and accelerate their digital transformation.