Spying With Nano Robots Disguised As Insects

Soon, spies could be using a robot that takes its cue from nature. This bee-inspired micro aerial vehicle (MAV) robot is the creation of Harvard University researchers who were out on a mission to extend tiny robot legs by imitating nature.

Hovering, like flying, is incredibly energy intensive. For a tiny robot this can be a huge issue, as with small size comes small battery capacity. This greatly reduces operational time and possible missions.

The team behind the robo-bee, who published their findings in the Journal Science, confirmed the suspicion that robots could save a lot of energy if they simply landed and perched whenever they could, much like a bee flying from flower to flower.

To achieve a workable solution, the team tried out different surface adhesion methods, finally settling on a unique combination of an electrostatic material and foam. In essence, they’ve given tiny robot built-in landing pads.

The researchers tested out their findings by building a MAV with an attached electrostatic patch made of copper electrodes over a carbon-fibre base and coated with polyamide. The whole contraption rests atop a small foam cylinder – to cushion the landing.

When charged, the electrostatic plate can adhere to most surfaces that respond to static electricity, like wood, glass, and many others. The technology works just as well on a ceiling as it does on a floor, Robert Wood, a co-author of the new study, told Mashable.

Despite needing power to stick to surfaces, the energy requirements for adhesion are significantly lower than for flight. This allows the robot to operate for far longer periods.

And what could it do? Wood says it could be useful in “basically any situation where you want to have low cost and distributed sensing [that] would be too difficult or too dangerous for a human.” But another advantage this technique provides is stealth. A tiny robot bug could land anywhere and stay out of sight for extended periods of time, only to take off when no one is around. Spies will love them.

i-HLS:

 

« Connected: The Mobile Police Station
North Korea’s Psychological Cyberwar Against Its Neighbour »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

VinCSS

VinCSS

VinCSS Internet Security Services JSC is a leading organization working in the field of researching, developing, producing products as well as providing cyber security services.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.