Before I dig into the more technical details behind the quite fabulous Ukrainian attack on at least 5 Russian air bases on 1 June 2025, I would like to give an extract of a talk I had with an American drone nerd, before the Russians launched their full-scale attack on Ukraine in 2022:

“I could build a 5G drone, put it in an open cardboard box, drop it off at some remote parking lot not far from an airport, jump on a plane to the other side of the world, and then at that location, from my smartphone app, all data encrypted, I could launch the drone out of the box, fly it into the airport, or perhaps some crowded stadium, causing massive panic and chaos. Nobody would be able to stop me or the drone. It is basically just a mobile phone on the move, just like thousands and thousands of phones close by …. “

Fundamentally, it is the same strategy that the Ukrainians used June 1. But it could happen anywhere in the world, any civil or military location, crowds or not …

Before concluding what, we may have learned, let’s take the dive into some of the key elements of Operations Spider web:

The 5 Tech-Driven Keys Behind Ukraine’s Operation Spider Web Success

Ukraine’s recent Operation Spider Web marked a critical milestone in modern warfare, illustrating how innovative technology and strategic ingenuity can dramatically shift military outcomes. Here, I examine in-depth the five central tech-driven elements that enabled Ukraine’s significant tactical victory.

1. 5G-Controlled Drone Operations

Leveraging advanced 5G networks, Ukraine achieved unprecedented control and coordination of their drone fleets operating deep within Russian-controlled territory. The robust bandwidth and ultra-low latency provided by 5G allowed drone operators situated safely far behind front line positions to execute complex maneuvers with near-instant responsiveness. This high-capacity connectivity ensured drones could dynamically adapt in real-time, changing targets and attack patterns instantaneously based on updated intelligence and real-time video feeds from the drones.

Though there has not been any details available about the specific HW used in the Ukrainian drones, several chip vendors, including Qualcomm, have launched 5G chipsets specifically targeting the drone and robotics markets, boosting the performance for these applications.

Having said this, even without 5G coverage there are various ways of achieving successful missions far behind enemy lines. I will cover some of these options in a later newsletter.

2. Remotely Activated Launch Systems

A pivotal element of Spider Web involved the covert transportation and positioning of drones within civilian-style trucks and cargo containers. Utilizing remotely activated systems, Ukrainian forces could discreetly open truck hoods and container doors simultaneously across multiple locations, launching drones swiftly without direct human involvement on-site. This capability minimized personnel risk and maximized the element of surprise, making immediate and effective countermeasures virtually impossible for Russian forces.

Drones stored in the upper and hidden section of a truck. The hood was opened automatically by 5G connections.

3. Fully Time-Synchronized Execution

Operation Spider Web was orchestrated with extraordinary precision, relying heavily on synchronized digital timers that coordinated drone launches down to the second. This careful timing ensured all attacks commenced simultaneously, overwhelming Russian defenses and negating their ability to mount a timely and coordinated response. The synchronized strikes amplified psychological shock, generating widespread confusion and significantly amplifying operational effectiveness.

4. Deep Intelligence Preparation

The success of Spider Web was built upon meticulous, long-term intelligence gathering. Extensive reconnaissance missions conducted by surveillance drones, supported by satellite imaging and human intelligence networks, precisely mapped Russian airbases and critical military infrastructure. This deep intelligence allowed Ukrainian commanders to pinpoint vulnerabilities, identify high-value targets, and tailor drone payloads specifically for maximum damage, turning each drone strike into a strategic victory.

5. Absence of Effective Russian Countermeasures

Perhaps most critically, Ukrainian forces exploited a glaring deficiency in Russian defensive preparations. Russian airbases, perhaps due to their distance from the Ukrainian border, were largely unprotected against such sophisticated, multi-directional drone attacks. Notably absent were effective electronic warfare defenses, radar jamming capabilities, and rapid-response anti-drone systems. The Russian failure to anticipate or defend against this specific drone-enabled threat significantly enhanced the tactical and psychological impact of the Ukrainian assault.

Conclusion

Operation Spider Web demonstrates how cutting-edge technology, precise intelligence, and innovative tactics can transform military operations. Ukraine’s strategic use of drones, secure networks, remote activation technology, precise timing, and exploitation of enemy vulnerabilities provides a powerful lesson in modern warfare’s evolving landscape.

This operation not only marks a significant tactical success for Ukraine but also again emphasizes how impressive results that can be achieved with fairly low-cost drones.

But – and now returning to the headline of this newsletter – what have WE learned, i.e. the West? We must assume that the Russians have learned from the devastating defeat. But while the western medias in general have reported about the attack in details, the west seems low on imaginary skills in terms of setting the hypothesis “Could it happen here, even in peace time?”

Former Ukrainian chief-of-command Valerii Saluzhnyi has criticized the West for not understanding the impact of drones and for lacking behind the transformation to the new paradigm.

I think it is important to dwell with the fact that the 5 key elements above can be exploited anywhere, in any country, and by a fairly small group of people, maybe even by 1 single person. It doesn’t require a large organization, nor a large budget.

While intelligence services may be able to detect the threat in due time it could be cumbersome and difficult if not impossible. As seen in Operation Spider Web the freight people who were transporting the drones to the remote airfields were not involved directly in the operation, but just local people hired to take the containers from A to B.

Therefore precautious actions must be taken, countermeasures implemented that will be able to detect and mitigate the threat as it may arise out of the blue.

I am sure the Russians now are applying C-UAS systems also at far remote airfields and at critical infrastructure.

We should do it too …. The clock is ticking ….

Just a fun fact (at least for me) : just before finishing this newsletter, I received another newsletter in my inbox, from the media C-UAS HUB, with the tittle 5 C-UAS lessons from Ukraine’s Operation Spiderweb . You may find a few other takes here.

Also, it is worth reading this article by Valerii Zaluzhnyi, former Ukrainian commander-in-Chief:

How drones, data, and AI transformed our military—and why the US must follow suit

If you seek more information about C-UAS in general, or need help to get started with C-UAS solutions for your specific case, please do not hesitate to contact us !