Robodog ECM is a research platform for defensive technologies including:
-
Electronic Countermeasures (ECM) - Signal jamming, interference detection, and spectrum management
-
Cryptographic Protocols - Secure communications for autonomous systems
-
Formation Control - Distributed coordination algorithms for robotic systems
-
Defensive Autonomy - Collision avoidance, threat detection, and safe operation
Primary Applications: - Defensive military applications (ECM, secure comms) - Search and rescue coordination - Disaster response robot swarms - Secure autonomous system research
Explicitly NOT for: - Offensive weapons systems - Surveillance or tracking of individuals - Export to restricted countries - Any use violating export control regulations
Separate from:
- anvomidav - Figure skating choreography (civilian, export-safe)
- robot-vacuum-cleaner - Domestic robot simulation (civilian)
Related to: - Formation control algorithms (defensive coordination) - Autonomous navigation (safe operation) - Cryptographic protocols (secure communications)
| Layer | Language | Purpose |
|---|---|---|
Core |
Rust |
ECM analysis, PQ crypto, formation control, autonomy |
Safety |
Ada/SPARK |
Formally verified safety-critical subsystems |
ABI |
Idris2 |
Dependent-type interface proofs |
FFI |
Zig |
C-ABI bridge between ABI and core |
API |
V-lang |
Consumer-facing API surface |
-
Cryptography: Kyber1024, Dilithium5, SPHINCS+ (NIST PQC standards)
-
ECM Simulation: Synthetic signal models (no real RF captures)
-
Coordination: Potential-field collision avoidance, formation geometry
Phase: v0.1 Foundation Completion: ~40%
Implemented: - [x] ECM signal analysis (signals, detection, FFT spectrum) - [x] Cryptographic protocol suite (Kyber1024, Dilithium5, SPHINCS+) - [x] Formation control algorithms (5 shapes, separation checks) - [x] Defensive autonomy (collision avoidance, safe-state, comms loss) - [x] Export control compliance framework (ITAR/EAR/Wassenaar) - [x] SPARK safety specs (ECM, formation, autonomy) - [x] Idris2 ABI definitions (Types, ECM, Crypto, Formation, Foreign) - [x] Zig FFI bridge (classification, distance, formation) - [x] V-lang API (full type mirror, classification, recommendations) - [x] Comprehensive Trustfile (780 lines, 18 operational checks)
This project follows strict export control policies:
-
No offensive capabilities - Defensive technologies only
-
No unauthorized export - Compliance with ITAR/EAR regulations
-
Documented use cases - All implementations have defensive justification
-
Access control - Contributors must acknowledge export restrictions
See EXPORT-CONTROL.md for full compliance requirements.
-
❏ Export control compliance framework
-
❏ Cryptographic protocol design
-
❏ ECM signal analysis basics
-
❏ Formation control primitives
-
❏ SDR integration for ECM testing
-
❏ Secure communication protocols
-
❏ Distributed coordination algorithms
-
❏ Threat detection models
Jonathan D.A. Jewell <j.d.a.jewell@open.ac.uk>
This research is conducted in accordance with international export control regulations and ethical guidelines for defensive autonomous systems.
See TOPOLOGY.md for a visual architecture map and completion dashboard.