A New Heavyweight Drone

Russia lags behind the US in unmanned aircraft technology, but a new drone could help change that. The prototype of Russia’s new heavy attack drone Okhotnik (Hunter) will start test flights in 2018.

The work on the heavy long-range drone, developed by the Sukhoi Aircraft Company is at the concluding stage. “In particular, work has been completed to create a prototype that will begin test flights this year,” a source in the domestic defense industry said.

The Hunter is designed as a 20-ton combat aircraft, an impressive size considering as an unmanned aircraft it has no pilot and life support systems. Accoding to reports, a contract on developing the heavy attack drone Okhotnik was signed between Russia’s Defense Ministry and the Sukhoi Aircraft Company in 2011. A mockup of the drone was created in 2014 to hold ground tests.

The drone was reportedly developed using the ‘flying wing’ scheme, composite materials and stealth coating. It has a jet engine and is expected to develop a speed of up to 1,000 km/h. A jurnalist specilaising in unmanned aviation, Denis Fedutinov, believes that Russia is possibly developing an unmanned aerial vehicle similar to foreign analogs, such as the X-47B developed by Northrop Grumman or the Phantom Bay made by Boeing. 

“Probably, the Okhotnik has been designed to accomplish missions similar to the assignments set for US UAVs, destroying enemy air defense systems, communications, command and control posts in situations when the use of aircraft is associated with considerable risks for crews,” the expert believes.

He added that the first flights of US analogs took place in 2011 but both drones remained as prototypes and did not go into serial production due to immature technologies primarily related to the possibilities of operation in autonomous mode.

“It cannot be ruled out that the Okhotnik will also be some demonstrator of technologies to practice solutions that will eventually be used on other promising drones,” the expert added.

Russia’s United Aircraft Corporation (the parent of Sukhoi)  and the Defense Ministry declined to comment on this information.

I-HLS:       Image: Sputnik News

You Might Also Read: 

UK Army Goes High-Tech With Future Drones:

‘Eye In The Sky’: The Reality Of Drone Warfare Revealed:

Pentagon Increasing Drone Flights By 50%:

Artificial Intelligence, Automation & Drones (£):

 

 

 

« Putin Says Russia The Target Of 25m World Cup Cyber Attacks
The White House’s AI Committee's First Meeting »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

Cybercrime Investigation & Coordinating Center (CICC)

Cybercrime Investigation & Coordinating Center (CICC)

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

Hardenite

Hardenite

Hardenite solution helps R&D, DevOps and IT teams to continuously manage security risks and hardening efforts of any Linux OS – based product, throughout the product life cycle.

Crypto4A Technologies

Crypto4A Technologies

Crypto4A quantum-ready cybersecurity solutions significantly improve protection for Cloud, loT, Blockchain, V2X, government and military application deployments.

National Cybersecurity Preparedness Consortium (NCPC)

National Cybersecurity Preparedness Consortium (NCPC)

The mission of the NCPC is to provide research-based, cybersecurity-related training, exercises and technical assistance to local jurisdictions, counties, states and the private sector.

SEEK

SEEK

SEEK create world-class technology solutions to address the needs of job seekers and hirers across multiple sectors including cybersecurity.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

Cyentia Institute

Cyentia Institute

The Cyentia Institute is a research & data science firm with a mission to advance knowledge in the cybersecurity industry.

Secureframe

Secureframe

Companies from startups to enterprises use Secureframe to automate SOC 2 and ISO 27001 compliance, complete audits, and continuously monitor their security.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

WhizHack Technologies

WhizHack Technologies

WhizHack's mission is to not only create a pipeline of cyber security products but also to empower people to sustainable innovation in securing digital assets of tomorrow.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.