A New Autonomous Tactical Drone

No Pilot. No GPS: The Shield AI drone flies into a building and autonomously maps its interior using cameras, lasers, and inertial and ultrasonic sensors.  

In the movie Eye in the Sky, a joint US-British military operation puts an insect-sized drone inside the house of a terrorist. The live feed allows the onlookers in Washington, London, and elsewhere to verify the target and collect data that would be inaccessible from a sensor ball mounted on a Predator flying overhead. A San Diego company called Shield AI is bringing that vision to life.

Taking off with the push of a button, the Shield AI drone flies into a building and autonomously maps its interior using cameras, lasers, and inertial and ultrasonic sensors.  Unlike your average off-the-shelf drone, it requires no human piloting and doesn’t need GPS.

On Sept. 1, the company received $1 million from the Naval Special Warfare Command and the Defense Innovation Unit Experimental, or DIUX, the Pentagon’s Silicon Valley outreach office, for a nine-month prototype project.

Shield AI’s creation is not the only micro-drone on the battlefield. Norway-based Prox Dynamics makes a bug-sized reconnaissance drone called the PD 100 Black Hornet, which British special operators have used on the battlefields of Afghanistan since 2011. US special operations forces and U.S. Marines have also conducted tests with it. At a Defense One event in March, Prox Dynamics demonstrated a new version of their drone that could function without GPS.

But only the Shield AI micro-drone can fly without a human. “Our drone can operate completely autonomously (no remote pilot) inside dense urban environments and GPS-denied areas (inside buildings, tunnels, beneath heavy tree coverage),” Shield AI’s Brandon Tseng said. 

“Most commercial-off-the-shelf drones say ‘autonomous flight’ but what they mean is they can follow GPS way points. If you launch our drone outside of a building, it will fly inside without GPS, map the building, and multi-cast HD video of what’s inside to any number of users…It is the AI that makes it more suitable for all ground operations. Infantry and special operations forces need to have situational awareness at all times, and they lose it if they’re trying to pilot a drone inside. Our AI removes the requirement for a remote pilot.”

The push for drones that are GPS-independent says as much about bigger computer intelligence coming in ever-smaller packages as it does about the strategic vulnerability in relying too much on GPS. In 2014, the Defense Advanced Research Projects Agency, or DARPA, put out a request for new algorithms to help small drones navigate the same way that birds do, in other words, without receiving a spoof able signal from an aging satellite.

“Goshawks, for example, can fly very fast through a dense forest without smacking into a tree. Many insects, too, can dart and hover with incredible speed and precision,” program manager Mark Micire noted in the announcement.

The following year, the Army issued a call to “expand the capabilities of GPS Denied (GD) autonomous unmanned systems sensing and collaborating architecture and related components.”

But where nature soars, humankind can but crawl. Birds and insects come out of the egg with onboard visual sensors fully integrated into complex processors that exemplify size, weight, and power efficiency. (That is: Birds have eyes and brains.)

In this 2014 paper, a group of researchers, primarily from NASA, explain why building those same smarts into a micro drone is so hard. The human-designed platforms of 2016 can host only a small camera, computer, and battery. That puts extra pressure on the software, and the algorithms behind that software, to turn that sensor data into autonomous flying, landing, etc. (The paper also introduces the world’s smallest autonomous quadcopter drone that can fly on its own. It weighs in at less than 500g, or half the weight of the Shield AI drone.)

The good news is that the same market forces that are bringing better cameras and more processing to smartphones will also make micro drones smarter as well.

“As recent developments in multi-core smart-phone processors are driven by the same size, weight, and power constraints, micro aerial vehicles (MAVs) can directly benefit from new products in this area that provide more computational resources at lower power budgets and low weight, enabling miniaturization of aerial platforms that are able to perform navigation tasks fully autonomously,” they write.

DefenseOne:

 

« Special Report: CEOs And IT Innovation (£)
Tesla Announces Update To Self-Driving System »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

Willis Towers Watson

Willis Towers Watson

Willis Towers Watson is a global risk management, insurance brokerage and advisory company. Services offered include Cyber Risks insurance.

OpenSphere

OpenSphere

OpenSphere is an IT company providing security consultancy, information system risk management and security management services.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

ACPL Systems

ACPL Systems

We offer leading-edge technology solutions, expert professional and managed services and proven methodologies to ensure your data is protected and business risks are reduced.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

Cyber Pop-Up

Cyber Pop-Up

Cyber Pop-Up provide on-demand access to top security experts. No recruiting. No onboarding. No overhead costs.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.