Tanks To Have Remote-Control

What’s the fastest way to acquire unmanned ground vehicles? Rig your manned vehicles for remote control.

General Dynamics Land Systems, the maker of the Abrams tank (pictured) and the Stryker armored fighting vehicle is teaming up with Kairos Autonomi, a company whose kits can turn virtually anything with wheels or tracks into a remote-controlled car. It’s part of a strategic play to meet the US Army’s expanding demand for unmanned ground vehicles.

Kairos, the name comes from a Greek term meaning “opportune moment”, makes two types of kits. One is basically a seat robot that works a car’s controls just as a human would, and can be installed in about 20 minutes. The other leaves the seat free but takes several hours to install. No, it’s not autonomous driving, but it is here today and the military can put it on vehicles it already owns.

“You don’t have to go into the vehicle and pull the electronics out, pull out the architecture, cut the vehicle. You don’t have to start on a new build. It gives our military customers an option for a quick install and then they’ll have a remote or unmanned capability for existing vehicles,” said Phil Skuta, director of Marine programs at General Dynamics Land Systems, at the Association of the US Army convention in Washington.

The military has already installed Kairos kits on disposable vehicles to create moving targets for shooting practice. But GDLS is now working to fit them onto heavier combat vehicles… “We’ve had these installed on LAVs, on Strykers,” Skuta said.

The US Army’s move to unmanned convoys and fighting machines is spelled out in its recent Autonomy and Robotic System Strategy, which lists semi-autonomous resupply (where trucks follow one another in a convoy) as a near-term goal and fully autonomous resupply a little later, around 2020. The eventual goal is full autonomy, but the route to that destination is unclear. Converting existing pieces of equipment into remotely driven fighting vehicles represents a step forward, one that’s achievable today at the cost of less than $30,000 per kit.

“Frankly, the technology in robotics is changing so rapidly, you can’t imagine someone building a thousand vehicles that are robots,” said Kairos founder Troy Takach, “because by the time they get the build started and the build ended, the technology will have eclipsed them.”

Takach says that the military’s fixation on achieving full autonomy has slowed progress toward deploy unmanned ground systems by pushing remote piloting efforts to the wayside.

“Everybody’s trying to have autonomy,” he said. “That’s what everybody considers the Holy Grail out there. That’s why we don’t have any robots deployed today, because if you go look at the military planning, the robots are always 20 years out.”

Indeed, the first self-driving car proof of concept arrived more than 10 years ago, in the 2005 DARPA Grand Challenge. The winning team from Stanford was quickly snatched up by Google, which has since managed to operationalize self-driving car technology funded by the military, and to do it faster than the military.

Lt. Gen. H.R. McMaster, who directs the US Army’s Capabilities Integration Center, said getting remotely piloted and unmanned fighting vehicles out into the field is “something we really want to move forward on. What we want to do is get that kind of capability into soldiers’ hands early so we can refine the tactics, techniques and procedures, and then also consider enemy countermeasures and then build into the design of units that are autonomy enabled, build in the counter to those counters.”

Once soldiers can test and drill on unmanned vehicles, McMaster said, he’ll be looking to understand how well the vehicles perform when confronted with advanced electromagnetic and Cyber weapons.

“The key is: how does it perform in a contested Cyber environment. The mission assurance has to be under consideration from the beginning,” he said.

In this way, the integrity of data communication and transmission links is as important to as any breakthrough in autonomy or machine vision. Skuta says that gives the United States a lead on Russia, which has said it will move to unmanned versions of the Armata T-14 tank.

“Our distinct advantage, with robotics in particular, is the coding and software because that’s what really makes the autonomy work; and the communications links, the ability to command and control, send data and communicate across a global network in a way that’s secure down to the point of tactical contact with the enemy. That’s a distinct advantage that we can protect.” he said.

Takach said rigging an Abrams tank for remote control would be more difficult than a standard automobile, but hardly impossible. General Dynamics was coy about the possibility. “We are looking at a competitive phase for programs coming out in 2017,” Skuta said.

DefenseOne

 

« Cybersecurity Skills Gap in India
Chatbot To Teach You A Foreign Language »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

Spanish National Cybersecurity Institute (INCIBE)

Spanish National Cybersecurity Institute (INCIBE)

INCIBE undertakes research, service delivery and coordination for building cybersecurity at the national and international levels.

Watchcom Security Group

Watchcom Security Group

Watchcom is one of Norway's foremost suppliers of information security consultancy services.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

LevelOps

LevelOps

LevelOps is an industry application security platform that tracks and develops your application security.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Securd

Securd

Securd takes opportunities away from your cyber adversaries. Cloud-delivered zero-trust DNS firewall and web filtering protection keep your business network and remote employees safe.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

TekSynap

TekSynap

TekSynap is a full spectrum Information Technology services provider to federal government agencies.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

HEQA Security

HEQA Security

HEQA Security (formerly QuantLR) offer the world’s most cost-effective, easy-to-integrate, and secure Quantum Key Distribution (QKD) solution

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

PCI Security Standards Council (PCI SSC)

PCI Security Standards Council (PCI SSC)

The PCI Security Standards Council is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.