Tanks To Have Remote-Control

What’s the fastest way to acquire unmanned ground vehicles? Rig your manned vehicles for remote control.

General Dynamics Land Systems, the maker of the Abrams tank (pictured) and the Stryker armored fighting vehicle is teaming up with Kairos Autonomi, a company whose kits can turn virtually anything with wheels or tracks into a remote-controlled car. It’s part of a strategic play to meet the US Army’s expanding demand for unmanned ground vehicles.

Kairos, the name comes from a Greek term meaning “opportune moment”, makes two types of kits. One is basically a seat robot that works a car’s controls just as a human would, and can be installed in about 20 minutes. The other leaves the seat free but takes several hours to install. No, it’s not autonomous driving, but it is here today and the military can put it on vehicles it already owns.

“You don’t have to go into the vehicle and pull the electronics out, pull out the architecture, cut the vehicle. You don’t have to start on a new build. It gives our military customers an option for a quick install and then they’ll have a remote or unmanned capability for existing vehicles,” said Phil Skuta, director of Marine programs at General Dynamics Land Systems, at the Association of the US Army convention in Washington.

The military has already installed Kairos kits on disposable vehicles to create moving targets for shooting practice. But GDLS is now working to fit them onto heavier combat vehicles… “We’ve had these installed on LAVs, on Strykers,” Skuta said.

The US Army’s move to unmanned convoys and fighting machines is spelled out in its recent Autonomy and Robotic System Strategy, which lists semi-autonomous resupply (where trucks follow one another in a convoy) as a near-term goal and fully autonomous resupply a little later, around 2020. The eventual goal is full autonomy, but the route to that destination is unclear. Converting existing pieces of equipment into remotely driven fighting vehicles represents a step forward, one that’s achievable today at the cost of less than $30,000 per kit.

“Frankly, the technology in robotics is changing so rapidly, you can’t imagine someone building a thousand vehicles that are robots,” said Kairos founder Troy Takach, “because by the time they get the build started and the build ended, the technology will have eclipsed them.”

Takach says that the military’s fixation on achieving full autonomy has slowed progress toward deploy unmanned ground systems by pushing remote piloting efforts to the wayside.

“Everybody’s trying to have autonomy,” he said. “That’s what everybody considers the Holy Grail out there. That’s why we don’t have any robots deployed today, because if you go look at the military planning, the robots are always 20 years out.”

Indeed, the first self-driving car proof of concept arrived more than 10 years ago, in the 2005 DARPA Grand Challenge. The winning team from Stanford was quickly snatched up by Google, which has since managed to operationalize self-driving car technology funded by the military, and to do it faster than the military.

Lt. Gen. H.R. McMaster, who directs the US Army’s Capabilities Integration Center, said getting remotely piloted and unmanned fighting vehicles out into the field is “something we really want to move forward on. What we want to do is get that kind of capability into soldiers’ hands early so we can refine the tactics, techniques and procedures, and then also consider enemy countermeasures and then build into the design of units that are autonomy enabled, build in the counter to those counters.”

Once soldiers can test and drill on unmanned vehicles, McMaster said, he’ll be looking to understand how well the vehicles perform when confronted with advanced electromagnetic and Cyber weapons.

“The key is: how does it perform in a contested Cyber environment. The mission assurance has to be under consideration from the beginning,” he said.

In this way, the integrity of data communication and transmission links is as important to as any breakthrough in autonomy or machine vision. Skuta says that gives the United States a lead on Russia, which has said it will move to unmanned versions of the Armata T-14 tank.

“Our distinct advantage, with robotics in particular, is the coding and software because that’s what really makes the autonomy work; and the communications links, the ability to command and control, send data and communicate across a global network in a way that’s secure down to the point of tactical contact with the enemy. That’s a distinct advantage that we can protect.” he said.

Takach said rigging an Abrams tank for remote control would be more difficult than a standard automobile, but hardly impossible. General Dynamics was coy about the possibility. “We are looking at a competitive phase for programs coming out in 2017,” Skuta said.

DefenseOne

 

« Cybersecurity Skills Gap in India
Chatbot To Teach You A Foreign Language »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

eLearnSecurity

eLearnSecurity

eLearnSecurity is an innovator in the IT Security training market providing quality online courses paired with highly practical virtual labs.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

Elemental Cyber Security

Elemental Cyber Security

Elemental is a game changing cyber security compliance automation and enforcement technology provider.

AnaVation

AnaVation

AnaVation is a trusted partner delivering high-value, cost-effective solutions that solve the most complex technical and analytical problems for our customers.

ReasonLabs

ReasonLabs

ReasonLabs have created a next-generation anti-virus that is enterprise grade, yet accessible to any personal device around the world.

e-Xpert Solutions

e-Xpert Solutions

e-Xpert Solutions is a company specialized in the Information Security field since 2001. Our skills are strong technical expertise and the development of tailor-made solutions.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

CloudCoCo

CloudCoCo

CloudCoCo help UK businesses of all sizes and industries succeed by providing enterprise-grade technology at small-business prices.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Cyphershield

Cyphershield

Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects.

Hacker School

Hacker School

Hacker School offers technology motivated training programs that provide Cyber Security Certifications and Courses.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.

Dev Information Technology (DEV IT)

Dev Information Technology (DEV IT)

DEV IT is a leading IT solutions and services company. We deliver digital transformation and end-to-end IT services, from advisory to execution.