A New Autonomous Tactical Drone

No Pilot. No GPS: The Shield AI drone flies into a building and autonomously maps its interior using cameras, lasers, and inertial and ultrasonic sensors.  

In the movie Eye in the Sky, a joint US-British military operation puts an insect-sized drone inside the house of a terrorist. The live feed allows the onlookers in Washington, London, and elsewhere to verify the target and collect data that would be inaccessible from a sensor ball mounted on a Predator flying overhead. A San Diego company called Shield AI is bringing that vision to life.

Taking off with the push of a button, the Shield AI drone flies into a building and autonomously maps its interior using cameras, lasers, and inertial and ultrasonic sensors.  Unlike your average off-the-shelf drone, it requires no human piloting and doesn’t need GPS.

On Sept. 1, the company received $1 million from the Naval Special Warfare Command and the Defense Innovation Unit Experimental, or DIUX, the Pentagon’s Silicon Valley outreach office, for a nine-month prototype project.

Shield AI’s creation is not the only micro-drone on the battlefield. Norway-based Prox Dynamics makes a bug-sized reconnaissance drone called the PD 100 Black Hornet, which British special operators have used on the battlefields of Afghanistan since 2011. US special operations forces and U.S. Marines have also conducted tests with it. At a Defense One event in March, Prox Dynamics demonstrated a new version of their drone that could function without GPS.

But only the Shield AI micro-drone can fly without a human. “Our drone can operate completely autonomously (no remote pilot) inside dense urban environments and GPS-denied areas (inside buildings, tunnels, beneath heavy tree coverage),” Shield AI’s Brandon Tseng said. 

“Most commercial-off-the-shelf drones say ‘autonomous flight’ but what they mean is they can follow GPS way points. If you launch our drone outside of a building, it will fly inside without GPS, map the building, and multi-cast HD video of what’s inside to any number of users…It is the AI that makes it more suitable for all ground operations. Infantry and special operations forces need to have situational awareness at all times, and they lose it if they’re trying to pilot a drone inside. Our AI removes the requirement for a remote pilot.”

The push for drones that are GPS-independent says as much about bigger computer intelligence coming in ever-smaller packages as it does about the strategic vulnerability in relying too much on GPS. In 2014, the Defense Advanced Research Projects Agency, or DARPA, put out a request for new algorithms to help small drones navigate the same way that birds do, in other words, without receiving a spoof able signal from an aging satellite.

“Goshawks, for example, can fly very fast through a dense forest without smacking into a tree. Many insects, too, can dart and hover with incredible speed and precision,” program manager Mark Micire noted in the announcement.

The following year, the Army issued a call to “expand the capabilities of GPS Denied (GD) autonomous unmanned systems sensing and collaborating architecture and related components.”

But where nature soars, humankind can but crawl. Birds and insects come out of the egg with onboard visual sensors fully integrated into complex processors that exemplify size, weight, and power efficiency. (That is: Birds have eyes and brains.)

In this 2014 paper, a group of researchers, primarily from NASA, explain why building those same smarts into a micro drone is so hard. The human-designed platforms of 2016 can host only a small camera, computer, and battery. That puts extra pressure on the software, and the algorithms behind that software, to turn that sensor data into autonomous flying, landing, etc. (The paper also introduces the world’s smallest autonomous quadcopter drone that can fly on its own. It weighs in at less than 500g, or half the weight of the Shield AI drone.)

The good news is that the same market forces that are bringing better cameras and more processing to smartphones will also make micro drones smarter as well.

“As recent developments in multi-core smart-phone processors are driven by the same size, weight, and power constraints, micro aerial vehicles (MAVs) can directly benefit from new products in this area that provide more computational resources at lower power budgets and low weight, enabling miniaturization of aerial platforms that are able to perform navigation tasks fully autonomously,” they write.

DefenseOne:

 

« Special Report: CEOs And IT Innovation (£)
Tesla Announces Update To Self-Driving System »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) undertakes cyber security research and plays a leading role in securing Pakistan’s Cyberspace.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

Sentrium Security

Sentrium Security

Sentrium is committed to helping organisations protect their technology, information and people. Our range of bespoke services provide solutions to tackle a broad range of cyber security challenges.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.