logo
China's drone swarms just got smarter, faster and harder to kill

China's drone swarms just got smarter, faster and harder to kill

AllAfricaa day ago
This month, the South China Morning Post (SCMP) reported that Chinese aerospace engineers have proposed a breakthrough upgrade for People's Liberation Army (PLA) drones, drawing lessons from the Russia-Ukraine war, where approximately 90% of Russian unmanned aerial vehicles (UAVs) were reportedly neutralized by advanced air defenses.
Published in the July issue of Acta Armamentarii, the research—led by Bi Wenhao of Northwestern Polytechnical University—introduces a 'terminal evasion' system that equips small to medium-sized drones with compact, side-mounted rocket boosters.
These boosters enable drones to execute abrupt, high-G maneuvers in the final seconds before missile impact, disrupting tracking algorithms and causing incoming warheads to detonate in empty space.
Digital simulations cited in the study show survivability rates exceeding 87%, with evasive shifts occurring within a one-to-two-second window and lateral thrust reportedly surpassing 16Gs—far beyond conventional aerodynamic limits.
While the concept demonstrates significant promise in controlled environments, real-world implementation poses notable challenges. Synchronizing booster activation with flight controls demands precise thrust vectoring, and the integration of additional components introduces trade-offs in payload, fuel capacity, and overall flight stability.
The system's performance against faster or more adaptive interceptors remains untested, and operational deployment would require robust surveillance networks and onboard computing capable of autonomous, split-second decision-making.
Still, analysts say the innovation could shift the logic of swarm warfare. Upgrading individual drones from cheap throwaways into survivable strike platforms could allow the PLA to turn vulnerable swarms into formations capable of saturating sophisticated air defenses. The proposal underscores China's growing emphasis on survivability and agility in unmanned systems as battlefield threats evolve.
Tye Graham and Peter Singer note in a May 2025 Defense One article that PLA drone countermeasures in exercises already achieved a 40% kill rate, leaving a modest 60% survival rate for drones. The 'terminal evasion' concept aims to increase that rate by 27%, reflecting Beijing's belief that raising the survivability of individual drones enhances a swarm's ability to overwhelm enemy sensors and interceptors.
The logic is backed by battlefield precedent. Jorge Rivero writes in a March 2025 article for the Modern Warfare Institute (MWI) that drone strikes account for 70% of Russian casualties and, in some areas of the front, 90% of Russian equipment losses in engagements with Ukrainian forces. Such figures confirm the tactical potency of drones even with high attrition rates, suggesting that improving their survivability could be a force multiplier.
Yet China's military drone program faces structural weaknesses that may limit the impact of these innovations. John S Van Oudenaren points out in a May 2025 China Aeronautical Studies Institute (CASI) report that the PLA heavily relies on civilian drone manufacturers like DJI, which lack the military-grade standards and secure supply chains needed for wartime resilience.
He further highlights fragmentation among suppliers, poor coordination between commercial and defense sectors, and limited operational testing as persistent barriers to effective integration.
According to Oudenaren, China's drone industry also struggles with vulnerabilities to electronic warfare, insecure communications, and underdeveloped autonomy. Without centralized oversight or dedicated defense infrastructure, he says, these issues constrain the PLA's ability to militarize its commercial drone base fully. While Beijing's push for swarm resilience marks a doctrinal shift, these underlying gaps could blunt its operational effectiveness.
By contrast, the US approach to drone warfare has historically prioritized quality over quantity. SCMP noted in December 2024 that the US integrates high-end drones like the Predator and autonomous wingmen into its network-centric strategy, emphasizing sensor fusion and interoperability. SCMP says that China, by contrast, leans on mass production and AI-enabled autonomy to achieve asymmetric saturation.
Both sides now see drone survivability and scale not as technical details, but as the future of power projection. That dichotomy may be narrowing. In August 2023, the US Department of Defense (DoD) unveiled its Replicator Initiative to counter China's numerical advantage with a push to deploy thousands of attritable, autonomous, all-domain systems—including aerial drones and undersea vehicles—by 2025.
Spearheaded by the Defense Innovation Unit (DIU), Replicator's first phase focuses on fielding low-cost, mass-producible platforms designed to survive contested environments and complicate enemy targeting through swarming tactics and distributed autonomy.
Replicator reflects a broader shift toward disposability, scalability, and speed. Unlike legacy systems that are expensive and slow to produce, Replicator platforms are meant to operate with minimal human oversight and accept battlefield losses as a cost of saturation.
Underscoring the shift, US Secretary of Defense Pete Hegseth outlined a sweeping overhaul in a July 2025 memo to restore US drone dominance. Citing Ukraine as proof of drones' transformative lethality, the memo rescinds procurement restrictions and delegates acquisition authority directly to warfighters to accelerate deployment.
Backed by US Executive Order 14307, the plan emphasizes domestic manufacturing, streamlined acquisition, and combat-realistic training, including force-on-force drone simulations. The DoD will approve hundreds of US-made systems for frontline units, integrate emergent technologies, and break through bureaucratic inertia. Hegseth warns that outdated policies must not constrain lethality amid rapid technological change.
Despite these initiatives, the US still lags behind China in drone production scale, speed, and affordability. The New York Times reported in July 2025 that China's military drone base, built on civilian mass production, vastly outpaces US capabilities. DJI alone produces millions of low-cost drones, such as the Mavic—sold for $300 to $5,000—which has been widely weaponized in Ukraine.
The report states that while US defense contractors excel at developing sophisticated platforms like the Predator and Reaper, such systems are increasingly ill-suited for modern battlefields where mass-produced, expendable drones dominate. Even with recent policy shifts and executive orders aiming to revitalize domestic production, the US lacks the industrial scale to match China's rapid, cost-efficient output.
The US drone shortfall is not just about budgets—it's about industrial architecture. Martin Feldman and Gene Keselman delve deeper into these production gaps in a July 2025 War on the Rocks article.
They argue that although the US has industrial strengths in plastics, motor machining, and automotive-grade camera modules, it lacks a comprehensive wartime-scale mobilization strategy. While they say it's feasible to build domestic motor lines and repurpose car camera supply chains, critical bottlenecks remain in battery and circuit board capacity.
By contrast, Feldman and Keselman note that Chinese civilian factories can retool within a year to produce one billion weaponized drones annually, using under 1% of their existing assembly capacity and without significantly straining battery or circuit board output.
They warn that without major shifts in US industrial policy and long-term procurement contracts, America risks strategic vulnerability in a drone war driven not just by AI and autonomy, but by sheer output. Without bold industrial reforms and sustained procurement, the US risks losing not just the drone war but the ability to fight it at scale.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Has China just released pictures of another 6th generation stealth fighter?
Has China just released pictures of another 6th generation stealth fighter?

South China Morning Post

time2 hours ago

  • South China Morning Post

Has China just released pictures of another 6th generation stealth fighter?

Images of a previously unknown stealth aircraft have started circulating on Chinese social media, triggering a debate about whether it is a new piloted warplane or a 'loyal wingman' drone. At least two photographs of the aircraft, taken from various angles on the ground, have been circulating since Monday. It is not clear from the pictures whether the plane had a cockpit or internal weapons bay. The images reveal a slimmer fuselage and smaller size compared with images of another plane thought to be the J-36 stealth fighter, suggesting that the new aircraft might have a higher top speed. Some military analysts suggested it could be China's third distinct sixth-generation stealth combat aircraft, with the J-36 already believed to be nearly ready for pre-production testing. Some analysis, including the US-based website The War Zone argued that its streamlined design and lack of the features typical of piloted fighters suggested it may indeed be a drone optimised strictly for stealth rather than manoeuvrability. Andreas Rupprecht, an aviation analyst, wrote on social media that its shape – a lambda-wing layout reminiscent of the J-50, another Chinese stealth fighter under development – suggested it might be the design for a collaborative combat aircraft. These autonomous drones – sometimes known as 'loyal wingmen' – are designed to operate in coordination with piloted planes but are able to make their own tactical decisions using artificial intelligence.

What clues do we have about China's KJ-3000 long-range early warning and control plane?
What clues do we have about China's KJ-3000 long-range early warning and control plane?

South China Morning Post

time12 hours ago

  • South China Morning Post

What clues do we have about China's KJ-3000 long-range early warning and control plane?

China's newest airborne early warning and control (AEW&C) aircraft, the KJ-3000 could be key to the People's Liberation Army's ability to deliver lethal strikes from ultra-long ranges. Its design is based on a modified version of the country's long-serving transport plane the Y-20B, and its most distinctive addition is a radar dome on top of the fuselage that hides an array of advanced equipment. China is trying to grow rapidly its fleet of airborne information command centres with at least three new models in the pipeline: the lightweight shipborne KJ-600, the medium-sized KJ-700 , and the largest and most advanced KJ-3000 Although other militaries, including the United States, have decided the planes are not suited for modern warfare, Beijing appears committed to the strategy, with footage of the aircraft circulating on social media giving a series of clues about what the next generation of the aircraft will be able to do. Blurry footage of the KJ-3000 first emerged on social media on December 27. The aircraft, painted in the green-yellow typically used for prototypes, has a similar outline to the Y-20B – a transport plane sometimes known as the 'chubby girl' – with the addition of a rotodome, a rotating saucer-shaped fixture typically fitted with radar equipment.

China fears Nvidia chips could track, trace and shut down its AIs
China fears Nvidia chips could track, trace and shut down its AIs

AllAfrica

time13 hours ago

  • AllAfrica

China fears Nvidia chips could track, trace and shut down its AIs

Beijing has asked Nvidia to explain whether its H20 artificial intelligence chips have backdoors that could allow the United States to position and remotely shut them down. Chinese pundits said similar probes could be extended to other American-made chips. The Cyberspace Administration of China (CAC) stated on July 31 that it summoned US tech giant Nvidia over security risks related to its H20 AI chip, which had been sold to China. 'Nvidia's AI chips have been alleged to pose serious security risks, and some US lawmakers have called for advanced chips exported abroad to be equipped with 'tracking and positioning' functions,' said the CAC. The CAC said in a press release that American AI experts have confirmed that the 'tracking and positioning' and 'remote shutdown' technologies of Nvidia chips have matured. It requested that Nvidia explain and submit relevant proof materials regarding this issue. On the same day, Nvidia said its chips do not contain backdoors that would allow anyone to access or remotely control them. It said cybersecurity is critically important to the company. Beijing's summoning of Nvidia came after Reuters reported on July 29 that Nvidia had placed orders for 300,000 H20 chipsets (worth about US$3.6 billion) with the Taiwan Semiconductor Manufacturing Company (TSMC) a week earlier. It also followed the trade talks between US Treasury Secretary Scott Bessent and Chinese Vice Premier He Lifeng in Sweden on July 28-29. In April, the US government stopped Nvidia from shipping its H20 products to China. When Republican US Senator Tom Cotton introduced the 'Chip Security Act' on May 9, the bill received little to no significant media attention at the time. The bill requires AI chips to be subject to export regulations and mandates that products containing these chips be equipped with location-tracking systems to aid in detecting diversion, smuggling or other unauthorized use. It received support from bipartisan lawmakers in the House of Representatives. 'As Congress's chip designer, AI programmer and PhD physicist, I know we have the technical tools to prevent powerful AI technology from getting into the wrong hands,' said Congressman Bill Foster. 'With advanced AI chips being smuggled into China and posing a national security risk, Congress must act.' Following meetings between US and Chinese officials in London on June 9, China agreed to resume shipments of rare earth minerals to the US. In return, the US agreed to allow Chinese firms to use its electronic design automation (EDA) software and resume the shipment of H20 chips and C919 flight engine parts to China. Some commentators said the strong demand for H20 from Chinese firms may hurt Huawei Technologies' Ascend AI chips' market share. Wang Xinxi, a columnist specializing in the technology, media and telecommunications (TMT) sector, says in an article that the Ascend 910B has already surpassed H20 in terms of computing power. He says Chinese technology firms still use the H20 only because of its higher bandwidth and software support on the CUDA platform. 'Although the US Congress has not yet passed the Chip Security Act, Nvidia may have already added location-tracking functions in its chips,' he writes. 'All Nvidia computing chips have private data areas where the data is encrypted, so it is technically possible to add a backdoor.' Citing Qihoo 360 Chairperson Zhou Hongyi's recent comments, Chen claims that malicious code can be implanted in a chip during the wafer manufacturing, packaging and testing processes. He says it's difficult for Chinese end-users to identify these unsafe products within the global supply chain, which involves numerous suppliers and distributors. 'If there is any security loophole, Chinese firms must stop using H20,' he adds. 'In the end, companies that use Chinese AI chips will win.' 'Imagine if such 'backdoor' probes were expanded to other major American chip manufacturers in China like Micron, Wall Street investors would quickly sell their semiconductor stocks,' Chen Kai, a Fujian-based writer, says in an article. 'The H20 under probes is a 'freak' from the beginning as it is the downgraded version of the H100,' he writes. 'The Trump administration thought China would thank the US for relaxing its chip export control, and it would easily obtain the Chinese rare earth. It did not expect Nvidia to face security probes.' In 2019, the US banned Huawei routers due to concerns about backdoors. The US Department of Commerce added Huawei to its Entity List in May 2019. In May, Nvidia's Chief Executive Jensen Huang said that tracking massive AI servers or accelerators weighing several tons should not be difficult. However, he said, finding the AI chips after they are sold is impossible. Joseph Hoefer, a Washington, D.C.-based government relations strategist focused on AI, said the intent behind the Chip Security Act is understandable, but its approach creates more problems than it solves. 'First, real-time location tracking of chips is simply not feasible at scale,' Hoefer said. 'Attempting to derive meaningful national security insights from hardware geolocation data would require vast infrastructure, reliable international cooperation, and intensive verification protocols. That level of control does not exist in today's global tech ecosystem.' Secondly, he said, any system tracking chip locations would become an immediate cybersecurity vulnerability. Lastly, he said the compliance burden would fall on responsible US chip makers, which would have to spend time and money implementing unproven tracking systems, navigating regulatory ambiguity, and reporting false positives. Some IT experts have said that, technically, Nvidia can utilize its ecosystem of software and tools, such as the Nvidia Management Library (NVML) and Data Center GPU Manager (DCGM), to identify the locations of its AI chips, each of which has a unique serial number. It would be similar to what Google does to track and manage its AI chips. Google has centralized inventory and asset management systems that track every component, including custom chips such as Tensor Processing Units (TPUs), from manufacturing to deployment. Google's datacenter orchestration and resource management (Borg) can track the real-time performance of every chip. Others argue that even if a chip management software can determine the location of a suspicious AI chip cluster, it will be too late, as it means Chinese firms have already obtained and deployed the chips. Alphabet's Google has already started tracking the location of its in-house AI chips and others in its vast network of data centers for security purposes, Reuters reported on May 6, citing two sources familiar with the matter. Read: Chinese worry Nvidia H20 chips are poisoned wine for AI industry

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store