A New Autonomous Tactical Drone

No Pilot. No GPS: The Shield AI drone flies into a building and autonomously maps its interior using cameras, lasers, and inertial and ultrasonic sensors.  

In the movie Eye in the Sky, a joint US-British military operation puts an insect-sized drone inside the house of a terrorist. The live feed allows the onlookers in Washington, London, and elsewhere to verify the target and collect data that would be inaccessible from a sensor ball mounted on a Predator flying overhead. A San Diego company called Shield AI is bringing that vision to life.

Taking off with the push of a button, the Shield AI drone flies into a building and autonomously maps its interior using cameras, lasers, and inertial and ultrasonic sensors.  Unlike your average off-the-shelf drone, it requires no human piloting and doesn’t need GPS.

On Sept. 1, the company received $1 million from the Naval Special Warfare Command and the Defense Innovation Unit Experimental, or DIUX, the Pentagon’s Silicon Valley outreach office, for a nine-month prototype project.

Shield AI’s creation is not the only micro-drone on the battlefield. Norway-based Prox Dynamics makes a bug-sized reconnaissance drone called the PD 100 Black Hornet, which British special operators have used on the battlefields of Afghanistan since 2011. US special operations forces and U.S. Marines have also conducted tests with it. At a Defense One event in March, Prox Dynamics demonstrated a new version of their drone that could function without GPS.

But only the Shield AI micro-drone can fly without a human. “Our drone can operate completely autonomously (no remote pilot) inside dense urban environments and GPS-denied areas (inside buildings, tunnels, beneath heavy tree coverage),” Shield AI’s Brandon Tseng said. 

“Most commercial-off-the-shelf drones say ‘autonomous flight’ but what they mean is they can follow GPS way points. If you launch our drone outside of a building, it will fly inside without GPS, map the building, and multi-cast HD video of what’s inside to any number of users…It is the AI that makes it more suitable for all ground operations. Infantry and special operations forces need to have situational awareness at all times, and they lose it if they’re trying to pilot a drone inside. Our AI removes the requirement for a remote pilot.”

The push for drones that are GPS-independent says as much about bigger computer intelligence coming in ever-smaller packages as it does about the strategic vulnerability in relying too much on GPS. In 2014, the Defense Advanced Research Projects Agency, or DARPA, put out a request for new algorithms to help small drones navigate the same way that birds do, in other words, without receiving a spoof able signal from an aging satellite.

“Goshawks, for example, can fly very fast through a dense forest without smacking into a tree. Many insects, too, can dart and hover with incredible speed and precision,” program manager Mark Micire noted in the announcement.

The following year, the Army issued a call to “expand the capabilities of GPS Denied (GD) autonomous unmanned systems sensing and collaborating architecture and related components.”

But where nature soars, humankind can but crawl. Birds and insects come out of the egg with onboard visual sensors fully integrated into complex processors that exemplify size, weight, and power efficiency. (That is: Birds have eyes and brains.)

In this 2014 paper, a group of researchers, primarily from NASA, explain why building those same smarts into a micro drone is so hard. The human-designed platforms of 2016 can host only a small camera, computer, and battery. That puts extra pressure on the software, and the algorithms behind that software, to turn that sensor data into autonomous flying, landing, etc. (The paper also introduces the world’s smallest autonomous quadcopter drone that can fly on its own. It weighs in at less than 500g, or half the weight of the Shield AI drone.)

The good news is that the same market forces that are bringing better cameras and more processing to smartphones will also make micro drones smarter as well.

“As recent developments in multi-core smart-phone processors are driven by the same size, weight, and power constraints, micro aerial vehicles (MAVs) can directly benefit from new products in this area that provide more computational resources at lower power budgets and low weight, enabling miniaturization of aerial platforms that are able to perform navigation tasks fully autonomously,” they write.

DefenseOne:

 

« Special Report: CEOs And IT Innovation (£)
Tesla Announces Update To Self-Driving System »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Trusona

Trusona

Trusona is a pioneer and leader in passwordless two-factor authentication (2FA).

Beosin

Beosin

Beosin is a blockchain security company providing cybersecurity services including security audits, on-chain asset investigation, threat intelligence and wallet security.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Quantum Xchange

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

F1 Security

F1 Security

F1 Security provides a family of web security solutions including web application firewalls, web shell detection solutions, and web shell scanners.

vCISO Services

vCISO Services

vCISO Services is a small, specialized, veteran-owned firm focused on the needs of SMBs only.

IriusRisk

IriusRisk

IriusRisk is an open Threat Modeling platform that automates and supports creating threat models at design time.

Hartman Executive Advisors

Hartman Executive Advisors

Hartman Executive Advisors is an unbiased IT and cyber advisory firm uniquely designed to help mid-market executives maximize their IT investments.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.

Xcede

Xcede

Xcede are global technology recruitment specialists. We connect companies with exceptional professionals who empower growth.