A New Autonomous Tactical Drone

No Pilot. No GPS: The Shield AI drone flies into a building and autonomously maps its interior using cameras, lasers, and inertial and ultrasonic sensors.  

In the movie Eye in the Sky, a joint US-British military operation puts an insect-sized drone inside the house of a terrorist. The live feed allows the onlookers in Washington, London, and elsewhere to verify the target and collect data that would be inaccessible from a sensor ball mounted on a Predator flying overhead. A San Diego company called Shield AI is bringing that vision to life.

Taking off with the push of a button, the Shield AI drone flies into a building and autonomously maps its interior using cameras, lasers, and inertial and ultrasonic sensors.  Unlike your average off-the-shelf drone, it requires no human piloting and doesn’t need GPS.

On Sept. 1, the company received $1 million from the Naval Special Warfare Command and the Defense Innovation Unit Experimental, or DIUX, the Pentagon’s Silicon Valley outreach office, for a nine-month prototype project.

Shield AI’s creation is not the only micro-drone on the battlefield. Norway-based Prox Dynamics makes a bug-sized reconnaissance drone called the PD 100 Black Hornet, which British special operators have used on the battlefields of Afghanistan since 2011. US special operations forces and U.S. Marines have also conducted tests with it. At a Defense One event in March, Prox Dynamics demonstrated a new version of their drone that could function without GPS.

But only the Shield AI micro-drone can fly without a human. “Our drone can operate completely autonomously (no remote pilot) inside dense urban environments and GPS-denied areas (inside buildings, tunnels, beneath heavy tree coverage),” Shield AI’s Brandon Tseng said. 

“Most commercial-off-the-shelf drones say ‘autonomous flight’ but what they mean is they can follow GPS way points. If you launch our drone outside of a building, it will fly inside without GPS, map the building, and multi-cast HD video of what’s inside to any number of users…It is the AI that makes it more suitable for all ground operations. Infantry and special operations forces need to have situational awareness at all times, and they lose it if they’re trying to pilot a drone inside. Our AI removes the requirement for a remote pilot.”

The push for drones that are GPS-independent says as much about bigger computer intelligence coming in ever-smaller packages as it does about the strategic vulnerability in relying too much on GPS. In 2014, the Defense Advanced Research Projects Agency, or DARPA, put out a request for new algorithms to help small drones navigate the same way that birds do, in other words, without receiving a spoof able signal from an aging satellite.

“Goshawks, for example, can fly very fast through a dense forest without smacking into a tree. Many insects, too, can dart and hover with incredible speed and precision,” program manager Mark Micire noted in the announcement.

The following year, the Army issued a call to “expand the capabilities of GPS Denied (GD) autonomous unmanned systems sensing and collaborating architecture and related components.”

But where nature soars, humankind can but crawl. Birds and insects come out of the egg with onboard visual sensors fully integrated into complex processors that exemplify size, weight, and power efficiency. (That is: Birds have eyes and brains.)

In this 2014 paper, a group of researchers, primarily from NASA, explain why building those same smarts into a micro drone is so hard. The human-designed platforms of 2016 can host only a small camera, computer, and battery. That puts extra pressure on the software, and the algorithms behind that software, to turn that sensor data into autonomous flying, landing, etc. (The paper also introduces the world’s smallest autonomous quadcopter drone that can fly on its own. It weighs in at less than 500g, or half the weight of the Shield AI drone.)

The good news is that the same market forces that are bringing better cameras and more processing to smartphones will also make micro drones smarter as well.

“As recent developments in multi-core smart-phone processors are driven by the same size, weight, and power constraints, micro aerial vehicles (MAVs) can directly benefit from new products in this area that provide more computational resources at lower power budgets and low weight, enabling miniaturization of aerial platforms that are able to perform navigation tasks fully autonomously,” they write.

DefenseOne:

 

« Special Report: CEOs And IT Innovation (£)
Tesla Announces Update To Self-Driving System »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

KFSensor

KFSensor

KFSensor is an advanced 'honeypot' intrusion and insider threat detection system for Windows networks.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

CyberCareers.gov

CyberCareers.gov

CyberCareers.gov is a platform for Cybersecurity Job Seekers, Federal Hiring Managers and Supervisors, Current Federal Cybersecurity Employees, Students and Universities.

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.

Ampsight

Ampsight

Ampsight specializes in enabling cloud integration, securing data, and navigating complications that drive critical-mission success.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.

CQURE

CQURE

CQURE is divided into four main cybersecurity excellence areas: CQURE Consulting, CQURE Academy, CQURE Knowledge Sharing and CQURE Cyber Lab.