Spying With Nano Robots Disguised As Insects

Soon, spies could be using a robot that takes its cue from nature. This bee-inspired micro aerial vehicle (MAV) robot is the creation of Harvard University researchers who were out on a mission to extend tiny robot legs by imitating nature.

Hovering, like flying, is incredibly energy intensive. For a tiny robot this can be a huge issue, as with small size comes small battery capacity. This greatly reduces operational time and possible missions.

The team behind the robo-bee, who published their findings in the Journal Science, confirmed the suspicion that robots could save a lot of energy if they simply landed and perched whenever they could, much like a bee flying from flower to flower.

To achieve a workable solution, the team tried out different surface adhesion methods, finally settling on a unique combination of an electrostatic material and foam. In essence, they’ve given tiny robot built-in landing pads.

The researchers tested out their findings by building a MAV with an attached electrostatic patch made of copper electrodes over a carbon-fibre base and coated with polyamide. The whole contraption rests atop a small foam cylinder – to cushion the landing.

When charged, the electrostatic plate can adhere to most surfaces that respond to static electricity, like wood, glass, and many others. The technology works just as well on a ceiling as it does on a floor, Robert Wood, a co-author of the new study, told Mashable.

Despite needing power to stick to surfaces, the energy requirements for adhesion are significantly lower than for flight. This allows the robot to operate for far longer periods.

And what could it do? Wood says it could be useful in “basically any situation where you want to have low cost and distributed sensing [that] would be too difficult or too dangerous for a human.” But another advantage this technique provides is stealth. A tiny robot bug could land anywhere and stay out of sight for extended periods of time, only to take off when no one is around. Spies will love them.

i-HLS:

 

« Connected: The Mobile Police Station
North Korea’s Psychological Cyberwar Against Its Neighbour »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Vanguard Integrity Professionals

Vanguard Integrity Professionals

Vanguard Integrity Professionals is an independent provider of enterprise security software solutions that address complex security and regulatory compliance challenges.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

Dell Technologies

Dell Technologies

Dell Technologies Consulting Services enables a highly resilient business amidst the proliferation of cloud-based IT services and constant threats to your most critical information.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

Boltonshield

Boltonshield

Boltonshield provide a unique and proactive approach to cyber defence with managed security services, integrated technologies, and a team of security experts, ethical hackers and analysts.

Cyber Security Certification Australia (CSCAU)

Cyber Security Certification Australia (CSCAU)

CSCAU is the world’s first 'for mission' industry council set up to address small and medium-sized business (SMB) cyber resilience through annually updated certifiable standards.

Black Breach

Black Breach

Black Breach experts protect your organization from cyber threats with military-grade AI-tooled cybersecurity solutions.