Back to news

February 16, 2021 | International, Aerospace

Russian Company Plans New Generation Of Missiles

Piotr Butowski

Moscow-based GosMKB Vympel, which designs air-to-air missiles, is funding its own research on what appears to be the continuation of a short-range missile project that had been halted decades ago.

In late January, the company summarized its research and development work conducted in 2020. The most interesting project appears to be its research on “shaping the appearance of a future product 300M.”

This work, financed by Vympel's long-term development fund, is to lay the scientific and technical groundwork for the Russian military and increase the company's export prospects, the company says.

Undoubtedly, the current izdeliye 300M (“izdeliye” means “product” in Russian) is a further development of the K-30, or K-MD, short-range missile project, launched by Vympel in 1986 as part of its work on arming the fifth-generation MiG multirole fighter, which was halted in 1994 due to a lack of funding.

Later, Vympel offered the 300 project while working on how to arm the Sukhoi PAK FA (Su-57) fighter. In 2006, the company said the 300 missile could have been ready in 2013, if enough funding had been available. Gennady Sokolovsky, the head of Vympel at the time, said that the 300 missile would “significantly exceed foreign missiles of a similar type.”

The 300 was to be fitted with a new Merlushka, or “lambskin,” imaging infrared seeker developed by the AOMZ tactical missile company, enabling target identification and a lock-on range twice as great as its predecessors. The dual-pulse, solid-propellant motor was to provide relatively large specific impulse (about 100s), a measure of the engine's efficiency. The 300 missile was to have jet-vane gas controls instead of spoilers placed in the engine nozzle, as is the case with the current R-74 missiles. The efficiency of the variable gas nozzle is greater than that of spoilers; moreover, the presence of spoilers in the nozzle causes a loss of thrust.

Judging from the course of events, plans to resume the 300 project were not approved at the time, and the simpler R-74M2, otherwise known as izdeliye 760, was chosen as the primary close air-combat missile for the Su-57.

How the current 300M project changed compared with the previous version is not known, but most likely the modifications did not alter the overall configuration. If the changes were really significant, the project would have received a new index, not just an additional M letter.

Certainly, the element base in the seeker and control system is new; the engine also may be improved. Of course, the 300M missile remains at the conceptual research stage, which usually does not yet involve the actual construction of a missile.

According to Vympel's announcement, another short-range missile performed “about 30 firing tests” in 2020 as part of state evaluations, the final stage of tests before the missile is approved for full-scale series production. The announcement probably refers to the R-74M2, izdeliye 760, missile, which started firing tests on April 8, 2016, and in July 2019 was submitted for state evaluations on the Su-57. The Vympel R-74M2 is a further development of the in-service R-74M izdeliye 750 with the cross-section reduced so it can be fitted inside the internal quick-launch weapons bays of the Su-57.

The remaining information provided by Vympel about its 2020 research and development work is very general. The types of weapons are not named, and only the categories are defined. In the long-range air-to-air missile class, one of the missiles “completed preliminary tests to the extent sufficient for the construction documentation to be awarded the letter ‘O.'” In the parlance of the Russian defense industry, the letter “O” denotes permission to make an initial serial batch of missiles. Vympel could be referring to a new-generation heavy missile, the izdeliye 810, intended for internal carriage in the Su-57 fighter. The 810 missile, never presented to the public, began undergoing firing tests on July 6, 2017; its maximum range is estimated at 300 km (186 mi.).

https://aviationweek.com/defense-space/missile-defense-weapons/russian-company-plans-new-generation-missiles

On the same subject

  • China now has the world's 3rd-largest aviation force. Here are the combat jets it's using to catch up with the West.

    December 16, 2021 | International, Aerospace

    China now has the world's 3rd-largest aviation force. Here are the combat jets it's using to catch up with the West.

    China's air force and navy now field roughly 2,250 dedicated combat aircraft, and it's "rapidly catching up to Western air forces," the Pentagon says.

  • French Navy bets on electronic warfare to counter anti-ship threats

    October 5, 2022 | International, Naval

    French Navy bets on electronic warfare to counter anti-ship threats

    Industry is responding with technology meant to cover the entire spectrum of electronic-based ship protection, including measures of last resort.

  • 3 ways the Navy wants to protect its weapons from cyberattacks

    January 8, 2019 | International, Naval, C4ISR

    3 ways the Navy wants to protect its weapons from cyberattacks

    By: Justin Lynch They have been hacked, tricked and stolen from. Now the message is clear -- no more. The Navy is looking to support research in 36 areas that can help protect weapons systems from cyberattacks, Naval Air Systems Command said in a Jan. 7 update to a broad agency announcement. “It's not necessarily cutting edge research, but it is the first step in cybersecurity quality control that should have already been done,” said Bryson Bort, the founder and chief executive officer of Scythe, a cybersecurity platform. The Navy had admitted as much. Research into protecting the department's weapons comes amid reports that the American military suffers from sustained cyberattacks. In December, an Inspector General report found that some in the Pentagon were not taking basic cybersecurity steps to protect its ballistic missile system. Although the Pentagon's weapons are worth roughly $1.66 trillion, an October report from the Government Accountability Office found that “nearly all” American missiles, jets, ships and lethal equipment in development are vulnerable to cyberattacks. The announcement comes after Congress has mandated the Pentagon address its cyber vulnerabilities. Three of the research areas the Navy is interested are commonly described as the pillars of strong cybersecurity, no matter the institution. They include: Dynamic reconfiguration In an effort to confuse attackers, the Navy wants to research “dynamic reconfiguration.” The National Institute of Standards and Technology defines the term as “changes to router rules, access control lists, intrusion detection/prevention system parameters, and filter rules for firewalls and gateways.” "Organizations perform dynamic reconfiguration of information systems, for example, to stop attacks, to misdirect attackers, and to isolate components of systems, thus limiting the extent of the damage from breaches or compromises,” NIST officials wrote. Research by the University of Maryland's Christian Johnson found that pairing predictive analytics with dynamic reconfiguration tactics, the new approach can lead to the "successful development of learning models that identify specific classes of malware such as ransomware,” Johnson wrote in a paper for the RSA conference. Deception tactics Experts have long used strategies of physical war in digital battles, including with the use of denial and deception tactics. The Navy wants to boost understanding of this area to better secure its weapons systems. In 2015, researchers at MITRE, which conducts federally funded research, advocated for a 10-step process for planning and executing deception operations. “Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat-based cyber defense,” a team of researchers wrote. But the Intelligence Advanced Research Project Activity, the intelligence community's research arm, says that the use of deceptive software and hardware in cybersecurity is still in its infancy. “Many techniques lack rigorous experimental measures of effectiveness,” the organization said, adding that “information is insufficient to determine how defensive deception changes attacker behavior.” Artificial intelligence If there was a common denominator of the federal government's investment in cybersecurity it is the use or artificial intelligence. The Navy has embraced artificial intelligence since its Task Force Cyber Awakening project in 2015. “We see that the more we automate our networks and the more we use machines to do the heavy lifting, the better. Our brains do not have the intellectual capacity to process all of that information,” Rear Adm. Danelle Barrett, Navy Cyber Security Division Director,told Defense Systems, a trade publication, in a 2017 interview. More than half of the challenges and research opportunities announced by IARPA in 2018 involved machine learning, according to an analysis by Fifth Domain. Cyber Command has embraced the technology in a short time period, Capt. Ed Devinney, director of corporate partnerships at the body, said during the November Cyber Con conference hosted by Fifth Domain. “If you talked to anyone at the command two or three years ago about a system that would be all autonomous, you probably wouldn't get much traction. But I think there is a growing understanding and consensus that we need to operate at machine speed, especially when talking about active defense of the network,” Devinney said. He said that everyone likes to use the phrases “artificial intelligence” and “machine learning,” however “there aren't that many people who do AI very well.” https://www.fifthdomain.com/dod/2019/01/07/3-ways-the-navy-wants-to-protect-its-weapons-from-cyberattacks

All news