Spying With Nano Robots Disguised As Insects

Soon, spies could be using a robot that takes its cue from nature. This bee-inspired micro aerial vehicle (MAV) robot is the creation of Harvard University researchers who were out on a mission to extend tiny robot legs by imitating nature.

Hovering, like flying, is incredibly energy intensive. For a tiny robot this can be a huge issue, as with small size comes small battery capacity. This greatly reduces operational time and possible missions.

The team behind the robo-bee, who published their findings in the Journal Science, confirmed the suspicion that robots could save a lot of energy if they simply landed and perched whenever they could, much like a bee flying from flower to flower.

To achieve a workable solution, the team tried out different surface adhesion methods, finally settling on a unique combination of an electrostatic material and foam. In essence, they’ve given tiny robot built-in landing pads.

The researchers tested out their findings by building a MAV with an attached electrostatic patch made of copper electrodes over a carbon-fibre base and coated with polyamide. The whole contraption rests atop a small foam cylinder – to cushion the landing.

When charged, the electrostatic plate can adhere to most surfaces that respond to static electricity, like wood, glass, and many others. The technology works just as well on a ceiling as it does on a floor, Robert Wood, a co-author of the new study, told Mashable.

Despite needing power to stick to surfaces, the energy requirements for adhesion are significantly lower than for flight. This allows the robot to operate for far longer periods.

And what could it do? Wood says it could be useful in “basically any situation where you want to have low cost and distributed sensing [that] would be too difficult or too dangerous for a human.” But another advantage this technique provides is stealth. A tiny robot bug could land anywhere and stay out of sight for extended periods of time, only to take off when no one is around. Spies will love them.

i-HLS:

 

« Connected: The Mobile Police Station
North Korea’s Psychological Cyberwar Against Its Neighbour »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

ThreatSpike Labs

ThreatSpike Labs

ThreatSpike Labs provides the first end-to-end fully managed security service for companies of all sizes.

SwiftSafe

SwiftSafe

SwiftSafe is a cybersecurity consulting company providing auditing, pentesting, compliance and managed security services.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Electrosoft Services

Electrosoft Services

Electrosoft provide mature, innovative technology-based services and solutions to power critical IT programs and keep our nation safe from cybersecurity attacks.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.