A Russian-affiliated non-state developer network, operating under the name FPV_VYZOV, has engineered a sophisticated and secure first-person view (FPV) drone ecosystem. The system fields specialized hunter-killer drones designed to detect, track, and neutralize electronic warfare (EW) assets. This capability creates a direct counter to conventional defensive measures. The ecosystem utilizes custom, access-controlled firmware known as MILELRS and MILBETA, which are installed on commercially available hardware. These modifications enable complex missions, including multi-drone swarm attacks and redundant communications, which pose a significant and rapidly evolving tactical threat.
The central organizing entity is a group called “FPV_VYZOV,” which translates to “Challenge,” and its associated platform, “FPV_PLATFORM.” The name itself is a semiotic indicator of the group’s self-perception as a disruptive force. A single developer handle, @dankzb.03 on the Signal messaging application, acts as the primary point of contact for distributing new firmware versions and providing technical guidance. This structure suggests an agile and possibly small core development team that utilizes a secure, encrypted application to manage software distribution.
Distribution of the firmware is tightly controlled. Access to the activation website, milpilots.com, requires a “pilot code.” Operators must obtain this code from a specific verifier, identified as @boyun:delta.mil.gov.ua. The “.gov.ua” domain is notable- it suggests either a compromised Ukrainian government channel being used for verification or a deliberate act of misdirection. Firmware is disseminated only within verified groups and to known individuals, indicating a security-conscious strategy to prevent the tools from falling into enemy hands.
The development effort is not isolated. The documentation credits contributions from other entities, including a developer known as “olegator” for X-band support and another named “yuriy” for unlocking hardware power features. The documents also note collaboration with a team called “Barvinok-5” on security functionalities. This evidence reveals a collaborative network of independent developers contributing specialized skills to a unified project. The hardware foundation for this ecosystem consists of commercially available off-the-shelf (COTS) components. The firmware supports a wide range of transmitters and receivers from reputable brands, including HappyModel, BETAFPV, and RadioMaster. These components are readily available for purchase within Russia through online retailers such as Coptertime, Wildberries, and Ozon, facilitating a simple and robust supply chain for building and fielding these advanced drone systems.
The network structure is not a formal military-industrial complex but a decentralized collective of skilled individuals. Their actions appear bound by a shared pro-war, nationalist ideology. This conclusion stems from the use of specific naming conventions, such as “ZOV Maps,” and Wi-Fi passwords like “slavarossii” (Glory to Russia) and “pobedanasha” (victory is ours) [Initial text]. This decentralized model bypasses slow, bureaucratic military procurement and allows for the immediate integration of new ideas and hardware. The resulting threat is highly adaptive. Countering it requires disrupting this network of individuals and their access to COTS hardware, not just targeting a specific factory or military unit.
The system is built upon two core pieces of custom firmware that modify commercially available drone hardware for advanced military applications.
Core Firmware
The first component is MILELRS, a modified version of the open-source ExpressLRS radio communication firmware. MILELRS serves as the system’s backbone, adding critical military-grade features. These features include robust encryption, multi-band frequency redundancy, swarm control logic, and EW scanning functions.
The second component is MILBETA, a fork of the open-source Betaflight flight controller firmware. MILBETA’s primary purpose is to process tactical data sent from the MILELRS receiver and display it on the operator’s on-screen display- OSD. This provides the pilot with real-time, intuitive battlefield information, such as the direction and strength of a hostile EW signal.
Key Capabilities
The combination of this hardware and software creates a suite of advanced tactical capabilities.
The system’s premier function is its EW Hunter-Killer capability. Drones are equipped with dual diversity receivers and antennas precisely angled at a total of [Initial text]. This configuration allows the system to determine the direction of an EW source by measuring the difference in signal strength between the two antennas. The MILBETA firmware processes this data and presents it to the pilot as simple, intuitive arrows on the OSD, guiding the drone directly to the jammer for destruction.
A multi-layered Security Model prevents unauthorized use and reverse engineering. The firmware is cryptographically locked to a specific transmitter module via a unique hardware identifier- TX_ID- and a server-generated TX_LOCK key obtained from the milpilots.com portal. All communications are encrypted using a unique TX_KEY/RX_KEY pair, which replaces standard, insecure binding phrases and protects against hijacking and spoofing attacks.
The MULTI_BAND feature provides operational redundancy. A drone can be equipped with two or three parallel transmitter-receiver pairs, operating on different frequency bands such as 900 MHz and 2.4 GHz. If one communication link is jammed or fails, the system automatically maintains control through the remaining links.
The SWARM_ID function enables multi-drone control. A single operator can manage and actively switch control between multiple drones in the air. This capability is integrated with video channel switching, allowing the operator to select a specific drone and instantly view its video feed, enabling coordinated, multi-axis attacks.
To extend operational reach, the REPEATER function allows a standard receiver module to act as a simple, disposable signal repeater. A drone can drop the repeater in a forward position, extending the control range for other strike assets.
Finally, for operator protection, MILBETA includes an OSD Masking feature. This function blacks out the majority of the video feed during the critical launch and recovery phases of a flight. The masking conceals the pilot’s immediate surroundings, preventing enemy forces from determining the operator’s location from captured video footage.
These capabilities are supported by a broader software ecosystem that includes Russian-developed applications like “ZOV Maps” and “Groza” for mission planning, as well as a library of 3D-printable models for hardware modifications like antenna mounts and drone launch pads, facilitating rapid adaptation in the field [Initial text].
| Feature | Description | Relevant Firmware | Hardware Requirement |
| EW Direction Finding | Uses dual antennas at an angle to determine the direction of an EW source via signal strength difference, displayed as arrows on the OSD. | MILELRS & MILBETA | Drone with dual diversity receivers (e.g., Happymodel ES900 Dual RX). |
| Security (TX_LOCK) | Firmware is locked to a specific transmitter module using a hardware ID and a server-generated key from milpilots.com. | MILELRS | Any supported TX module. |
| Encryption (TX_KEY) | Communications are encrypted with a unique key pair, replacing standard binding phrases to prevent hijacking. | MILELRS | Any supported TX/RX pair. |
| MULTI_BAND | Allows parallel operation of 2-3 TX/RX pairs on different frequency bands for redundancy against jamming. | MILELRS | Multiple TX/RX modules connected in parallel. |
| SWARM_ID | Enables a single operator to control and switch between multiple drones during a single mission. | MILELRS | Multiple drones equipped with MILELRS receivers. |
| REPEATER | Allows an RX module to function as a simple, air-droppable signal repeater, extending operational range. | MILELRS | A standalone MILELRS RX module with a power source. |
| OSD Masking | Conceals the pilot’s position by blacking out the video feed during launch and recovery. | MILBETA | Flight controller running MILBETA firmware. |
These technical capabilities translate into significant tactical advantages on the battlefield. The EW hunter-killer function fundamentally alters the risk calculus for defensive forces. EW systems, traditionally protective assets, are transformed into high-value targets. This forces opponents into a difficult choice- protect their jammers, redeploy them away from the front, or risk their destruction. Losing EW cover creates “no-jam” zones where swarms of FPV drones can operate with impunity.
The system is explicitly designed to overcome countermeasures. The MULTI_BAND feature provides a direct counter to single-band jamming systems. An adversary must now have the capability to simultaneously jam multiple, and potentially unknown, frequency bands to neutralize a single drone. This action dramatically increases the complexity, power requirements, and intelligence burden of their EW strategy.
Capabilities like SWARM_ID are force multipliers. A single skilled pilot can now act as a flight lead for a group of drones, enabling complex, coordinated attacks that can saturate and overwhelm point defenses. The combination of extended range through repeaters, secure communications via encryption, and operator protection with OSD masking increases both the operational reach and the survivability of FPV teams, making them a more sustainable and lethal threat.
The developers have clearly analyzed their opponent’s defensive tactics, techniques, and procedures. They have systematically created technical solutions to defeat each defensive layer. The EW hunter-killer drone directly attacks the primary defense of jamming. The MULTI_BAND system provides a passive method to bypass that same defense. SWARM_ID allows for saturation attacks that can overwhelm any defenses that survive the initial electronic assault. This represents a doctrinal shift. The FPV drone is no longer just a “flying improvised explosive device.” It is an integral part of a sophisticated system of reconnaissance, electronic attack, and kinetic strike.
The development of this advanced ecosystem is a direct response to the escalating FPV arms race in the ongoing conflict in Ukraine. Its emergence is driven by the increasing deployment and effectiveness of Western and Ukrainian-fielded EW systems designed to counter simpler, less secure drones. Faced with a technologically superior adversary in certain conventional military domains, Russian and aligned forces are investing heavily in low-cost, high-impact asymmetric capabilities. This ecosystem represents a deliberate effort to professionalize, scale, and secure these FPV operations for long-term tactical advantage. The features included in the firmware, such as OSD masking and enhanced failsafe procedures, are not theoretical- they are direct results of operational experience and lessons learned from losing pilots and equipment in combat.
The primary impact of deploying this system will be an increased rate of attrition for high-value and scarce military assets. Expensive equipment, such as EW systems, command posts, and advanced armored vehicles — often protected by the very jammers these drones are designed to detect — is now at significantly greater risk. Successful attacks on EW systems will degrade an opponent’s overall defensive posture, creating windows of opportunity for larger-scale FPV or conventional assaults.
The ability to field swarms of intelligent, jam-resistant drones can also have a significant psychological effect on frontline troops, creating a persistent sense of being watched and vulnerable. While the current distribution is tightly controlled, the system’s reliance on COTS hardware means the knowledge and core software could proliferate to other conflicts and non-state actors. This proliferation poses a long-term global threat beyond the current theater of operations.
An analysis of the MILELRS firmware version history reveals a clear and logical development trajectory, moving from basic functionality to sophisticated, doctrine-enabling features. The developers are not merely improving a radio link- they are building a comprehensive command and control system for complex drone missions. The regular “Friday Updates” posted by the FPV_VYZOV group demonstrate a highly responsive and continuous development cycle, allowing them to push new capabilities to the field every week, keeping their tactical innovation cycle moving faster than a bureaucratic adversary’s [Initial text].
| Version | Key Feature Introduced | Functional Category |
| v1.10+ | Custom frequency and channel switching | Operational Control |
| v1.50+ | Encryption, separate telemetry band | Security & Performance |
| v2.10 | EW_SCANNER – Scanning of EW signals | EW Capability |
| v2.20 | MULTI_BAND – Redundant communication links | Security & Reliability |
| v2.30 | Advanced FAILSAFE functions | Security & Reliability |
| v2.52 | EW Bearing/Direction Finding | EW Capability |
| v2.60 | SWARM_ID – Multi-drone control | Operational Control |
| v3.00 | TX_POWER – Remote power management | Operational Control |
| v3.40 | DETECTOR – Detection of other drone signals | Situational Awareness |
| v3.50 | REPEATER – RX module as a simple repeater | Utility & Range Extension |
Based on the observed development trends, future versions of this ecosystem will likely incorporate greater autonomy. The current system still relies on a human operator for terminal guidance. Future iterations could feature “loiter and hunt” modes, where a drone autonomously searches for an EW signal without direct pilot input. The introduction of the DETECTOR function in version 3.40, designed to detect signals from other drones, is a foundational step in this direction.
The next logical evolution is the integration of machine learning for signal classification and target recognition, enabling a drone to distinguish between different types of emitters, such as a communications jammer versus an air defense radar, and automatically prioritize targets based on a predefined threat matrix.
Expect deeper integration between the various software components, such as “ZOV Maps” and the MILELRS firmware. This could enable features like automated target handoff, where a reconnaissance drone detects a target and seamlessly passes its coordinates to other kinetic assets in the swarm. As adversaries adapt their own EW tactics- for instance, using brief, highly directional transmissions to avoid detection- expect the MILELRS/MILBETA system to evolve with more sensitive receivers and faster signal processing to detect and locate these fleeting signals.
The EW Hunter-Killer Doctrine
A mission using this system begins with an operator launching a drone equipped with the EW detection suite. As the drone flies toward the suspected target area, the operator monitors the OSD. Once the drone enters the range of an enemy jammer, directional arrows and signal strength values appear on the screen, providing a transparent, unambiguous vector to the source. The pilot follows these cues. Should the enemy attempt to jam the drone’s control link, the MULTI_BAND system would automatically switch to a precise frequency, ensuring the pilot maintains control during the critical terminal phase of the attack. The mission culminates in the destruction of the high-value EW asset, clearing the way for subsequent operations.
A Closed and Secure Development Ecosystem
The entire lifecycle of this technology is governed by strict operational security. A developer, such as @dankzb.03, finalizes a new feature and compiles the firmware. The compiled files are then distributed through controlled channels, like a private Signal group, to vetted unit commanders or individual pilots. To activate the firmware on a new piece of hardware, the pilot must connect the transmitter to a computer, retrieve its unique
TX_ID, and submit it to the milpilots.com portal to receive a corresponding TX_LOCK key. This process ensures that only authorized users with approved hardware can access the advanced functionalities. This closed loop protects the technology from being easily copied or used by adversaries, allowing developers to control its proliferation.
Enabling Complex Multi-Domain Operations
The system’s advanced features enable missions far beyond simple kamikaze attacks. An operator can utilize the SWARM_ID and VX_CONTROL functions to coordinate a multi-drone attack. For instance, a single pilot could launch two drones. Using a switch on their controller, the pilot selects Drone 1, which is armed with an anti-personnel warhead, and flies it to an overwatch position. The pilot then switches control to Drone 2, an EW hunter-killer, and uses it to locate and destroy a jammer protecting an enemy trench. With the EW threat eliminated, the pilot switches back to Drone 1 and attacks the now-exposed infantry. This force-multiplying capability enables a small team to achieve effects that previously required a much larger force.
The Logistics of Rapid Innovation
The “Friday Updates” channel is the logistical heart of this agile ecosystem [Initial text]. Every week, the network releases new software, 3D-printable hardware designs, and updated strategies. This rapid tempo is sustained by the use of readily available COTS hardware from Chinese manufacturers like HappyModel and BETAFPV, which can be easily procured through Russian domestic online stores. This model of innovation —combining open-source software, commercial hardware, and rapid, iterative field testing —allows the FPV_VYZOV network to design, test, and field new solutions faster than a traditional military acquisition process can react.
The intelligence gathered reveals a mature, rapidly evolving, and hazardous tactical FPV drone system developed and fielded by a Russian-affiliated network. This ecosystem is built on customized firmware- MILELRS and MILBETA- that transforms commercially available drone hardware into potent military weapons. Its core capabilities include a specialized function for hunting and destroying electronic warfare systems, jam-resistant multi-band communications, and the ability for a single operator to control swarms of drones. The development and distribution are managed through a secure, closed network that vets users and locks firmware to specific hardware, demonstrating a sophisticated approach to operational security. The development trajectory shows a clear progression from basic enhancements to complex, doctrine-enabling features. Future developments will likely focus on increased autonomy and AI integration. This system poses a significant tactical threat, designed to systematically dismantle and overcome conventional military defenses, particularly those that rely on electronic warfare.
