SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Five next-gen
UAV evolutions
every sensitive site
should open their eyes to
18th of Septembre 2020
Five next-gen UAV evolutions every sensitive site should open their eyes to
Summary
1. Introduction
2. Five modern UAV evolutions
1. Drones: ever smaller, ever bigger
2. More autonomy
3. More coordination
4. Increased ranges
5. Deception and lift technologies
3. Counter Drone security strategy
Protection des sites sensibles contre les drones malveillants3 24/09/2020
Nano-drones
• Harvard’s Microrobotic Fly
• FLIR’s Black Hornet PRS
Five next-gen UAV evolutions every sensitive site should open their eyes to
Protection des sites sensibles contre les drones malveillants4 24/09/2020
Big drones
• DJI MG-1S
• Inspection drone, used for
Easy Jet’s planes
Five next-gen UAV evolutions every sensitive site should open their eyes to
Protection des sites sensibles contre les drones malveillants5 24/09/2020
Increased
autonomy
• High Energy Mobile Laser
Test Truck (HELMTT)
• UAV Inertial Navigation
System (INS)
Five next-gen UAV evolutions every sensitive site should open their eyes to
Protection des sites sensibles contre les drones malveillants6 24/09/2020
Increased
coordination
• Perdix micro-UAV swarm
demonstration held at
China Lake, 2016
• Abstract from the
Slaughterbot video project
Five next-gen UAV evolutions every sensitive site should open their eyes to
Protection des sites sensibles contre les drones malveillants7 24/09/2020
Increased ranges
• US Air Force’s UAV remote
command centers
• IMSI Catcher
Five next-gen UAV evolutions every sensitive site should open their eyes to
Protection des sites sensibles contre les drones malveillants8 24/09/2020
New deception and
lifting technologies
• DragonflEye project, 2017
• Drone reproducing a bird’s
appearance
Five next-gen UAV evolutions every sensitive site should open their eyes to
Protection des sites sensibles contre les drones malveillants9 24/09/2020
Anti-drone
Security strategy
• Is my site a potential target ?
• Which of the four types of
attacks could I be a recipient of
?
• Which means of defense
should I employ ?
Five next-gen UAV evolutions every sensitive site should open their eyes to
CERBAIR “Kill-Chain” approach
02. Characterization
03. Neutralization
01. Detection
A combinaison of radiofrequency detection and
jamming is the most balanced technology to
counter most threats
Five next-gen UAV evolutions every sensitive site should open their eyes to
Any
questions ?
Five next-gen UAV evolutions every sensitive site should open their eyes to
Contact Us
For more information about our company
and anti-drone solutions
lucas.lebell@cerbair.com
www.cerbair.com
© 2020 CERBAIR. All rights reserved.
This material ( texts, photos and logos included ) may not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of CERBAIR.

Mais conteúdo relacionado

Mais procurados

AMPS-MV (MACS) Brochure_for_web
AMPS-MV (MACS) Brochure_for_webAMPS-MV (MACS) Brochure_for_web
AMPS-MV (MACS) Brochure_for_web
Hanan Zeltzer
 
Prop For Std UAV in CO EM [03102016]
Prop For Std UAV in CO EM [03102016]Prop For Std UAV in CO EM [03102016]
Prop For Std UAV in CO EM [03102016]
Francis Song
 
Amateur UAV - 2011 - IEEE COMSOC Presentation
Amateur UAV - 2011 - IEEE COMSOC Presentation Amateur UAV - 2011 - IEEE COMSOC Presentation
Amateur UAV - 2011 - IEEE COMSOC Presentation
Shailendra Singh
 

Mais procurados (19)

municipal_drones_FINAL
municipal_drones_FINALmunicipal_drones_FINAL
municipal_drones_FINAL
 
Drone Guardian: Countering the drone threat to commercial airports
Drone Guardian: Countering the drone threat to commercial airportsDrone Guardian: Countering the drone threat to commercial airports
Drone Guardian: Countering the drone threat to commercial airports
 
Drones
DronesDrones
Drones
 
Drone delivery project proposal
Drone delivery project proposalDrone delivery project proposal
Drone delivery project proposal
 
Drones and all about it seminar
Drones and all about it seminar Drones and all about it seminar
Drones and all about it seminar
 
Seminar on u a-v
Seminar on u a-vSeminar on u a-v
Seminar on u a-v
 
Low-altitude anti-drone solution
Low-altitude anti-drone solutionLow-altitude anti-drone solution
Low-altitude anti-drone solution
 
AMPS-MV (MACS) Brochure_for_web
AMPS-MV (MACS) Brochure_for_webAMPS-MV (MACS) Brochure_for_web
AMPS-MV (MACS) Brochure_for_web
 
final pppt
final ppptfinal pppt
final pppt
 
SMi Group's UAV Technology 2019
SMi Group's  UAV Technology 2019SMi Group's  UAV Technology 2019
SMi Group's UAV Technology 2019
 
Prop For Std UAV in CO EM [03102016]
Prop For Std UAV in CO EM [03102016]Prop For Std UAV in CO EM [03102016]
Prop For Std UAV in CO EM [03102016]
 
Amateur UAV - 2011 - IEEE COMSOC Presentation
Amateur UAV - 2011 - IEEE COMSOC Presentation Amateur UAV - 2011 - IEEE COMSOC Presentation
Amateur UAV - 2011 - IEEE COMSOC Presentation
 
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
ΕΛΙΣΜΕ ΓΕΕΘΑ 20181127 2.2 Δημήτρης Παπαγεωργίου «Χρήση ΜΕΣ από τις Ε.Δ. και τ...
 
JOSHUA - advanced threat detection system
JOSHUA - advanced threat detection systemJOSHUA - advanced threat detection system
JOSHUA - advanced threat detection system
 
Microair vehicle
Microair vehicleMicroair vehicle
Microair vehicle
 
October 2016 Newsletter
October 2016 NewsletterOctober 2016 Newsletter
October 2016 Newsletter
 
Port security
Port securityPort security
Port security
 
Drone tech course flyer
Drone tech course flyerDrone tech course flyer
Drone tech course flyer
 
Future soldier
Future soldierFuture soldier
Future soldier
 

Semelhante a Five next-gen UAV evolutions every sensitive site should open their eyes to (Lucas Le Bell) - DroneSec GDSN#2

The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
RonnyKenens
 
A Review of Stealth Technology
A Review of Stealth TechnologyA Review of Stealth Technology
A Review of Stealth Technology
ijtsrd
 

Semelhante a Five next-gen UAV evolutions every sensitive site should open their eyes to (Lucas Le Bell) - DroneSec GDSN#2 (20)

The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
The world of Unmanned Systems is Evolving. DRONES TAKE OFF !
 
From Tracker to Jammer - Navigating Drone Defense
From Tracker to Jammer - Navigating Drone DefenseFrom Tracker to Jammer - Navigating Drone Defense
From Tracker to Jammer - Navigating Drone Defense
 
Benefits of Drones Security Services.pptx
Benefits of Drones Security Services.pptxBenefits of Drones Security Services.pptx
Benefits of Drones Security Services.pptx
 
counter drone market
counter drone marketcounter drone market
counter drone market
 
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market ReportsCounter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
Counter Drone Systems Market 2022-2032 - Aviation and Defense Market Reports
 
Drone Aviation Radar System
Drone Aviation Radar SystemDrone Aviation Radar System
Drone Aviation Radar System
 
Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316Csa dar-air-pitch-deck-102316
Csa dar-air-pitch-deck-102316
 
Anti-UAV Solutions for Manufacturing Plants
Anti-UAV Solutions for Manufacturing PlantsAnti-UAV Solutions for Manufacturing Plants
Anti-UAV Solutions for Manufacturing Plants
 
SMART MINING USING UAV.pptx
SMART MINING USING UAV.pptxSMART MINING USING UAV.pptx
SMART MINING USING UAV.pptx
 
A Review of Stealth Technology
A Review of Stealth TechnologyA Review of Stealth Technology
A Review of Stealth Technology
 
Improve Commercial Drone Operations by ZenaDrone
Improve Commercial Drone Operations by ZenaDroneImprove Commercial Drone Operations by ZenaDrone
Improve Commercial Drone Operations by ZenaDrone
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021
 
Regulatory reforms for civil applications of UAVs
Regulatory reforms for civil applications of UAVsRegulatory reforms for civil applications of UAVs
Regulatory reforms for civil applications of UAVs
 
Stork Overview
Stork OverviewStork Overview
Stork Overview
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
 
Who Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfWho Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdf
 
Who Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdfWho Benefits from Advanced Anti-Drone Solutions.pdf
Who Benefits from Advanced Anti-Drone Solutions.pdf
 
The Future Drone Technology: How Drone Technology Is Changing Industries?
The Future Drone Technology: How Drone Technology Is Changing Industries?The Future Drone Technology: How Drone Technology Is Changing Industries?
The Future Drone Technology: How Drone Technology Is Changing Industries?
 
The Crucial Role of Drone Radar Detection in C-UAV Systems
The Crucial Role of Drone Radar Detection in C-UAV SystemsThe Crucial Role of Drone Radar Detection in C-UAV Systems
The Crucial Role of Drone Radar Detection in C-UAV Systems
 
Innovation In Aviation
Innovation In AviationInnovation In Aviation
Innovation In Aviation
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Five next-gen UAV evolutions every sensitive site should open their eyes to (Lucas Le Bell) - DroneSec GDSN#2

  • 1. Five next-gen UAV evolutions every sensitive site should open their eyes to 18th of Septembre 2020
  • 2. Five next-gen UAV evolutions every sensitive site should open their eyes to Summary 1. Introduction 2. Five modern UAV evolutions 1. Drones: ever smaller, ever bigger 2. More autonomy 3. More coordination 4. Increased ranges 5. Deception and lift technologies 3. Counter Drone security strategy
  • 3. Protection des sites sensibles contre les drones malveillants3 24/09/2020 Nano-drones • Harvard’s Microrobotic Fly • FLIR’s Black Hornet PRS Five next-gen UAV evolutions every sensitive site should open their eyes to
  • 4. Protection des sites sensibles contre les drones malveillants4 24/09/2020 Big drones • DJI MG-1S • Inspection drone, used for Easy Jet’s planes Five next-gen UAV evolutions every sensitive site should open their eyes to
  • 5. Protection des sites sensibles contre les drones malveillants5 24/09/2020 Increased autonomy • High Energy Mobile Laser Test Truck (HELMTT) • UAV Inertial Navigation System (INS) Five next-gen UAV evolutions every sensitive site should open their eyes to
  • 6. Protection des sites sensibles contre les drones malveillants6 24/09/2020 Increased coordination • Perdix micro-UAV swarm demonstration held at China Lake, 2016 • Abstract from the Slaughterbot video project Five next-gen UAV evolutions every sensitive site should open their eyes to
  • 7. Protection des sites sensibles contre les drones malveillants7 24/09/2020 Increased ranges • US Air Force’s UAV remote command centers • IMSI Catcher Five next-gen UAV evolutions every sensitive site should open their eyes to
  • 8. Protection des sites sensibles contre les drones malveillants8 24/09/2020 New deception and lifting technologies • DragonflEye project, 2017 • Drone reproducing a bird’s appearance Five next-gen UAV evolutions every sensitive site should open their eyes to
  • 9. Protection des sites sensibles contre les drones malveillants9 24/09/2020 Anti-drone Security strategy • Is my site a potential target ? • Which of the four types of attacks could I be a recipient of ? • Which means of defense should I employ ? Five next-gen UAV evolutions every sensitive site should open their eyes to
  • 10. CERBAIR “Kill-Chain” approach 02. Characterization 03. Neutralization 01. Detection A combinaison of radiofrequency detection and jamming is the most balanced technology to counter most threats Five next-gen UAV evolutions every sensitive site should open their eyes to
  • 11. Any questions ? Five next-gen UAV evolutions every sensitive site should open their eyes to
  • 12. Contact Us For more information about our company and anti-drone solutions lucas.lebell@cerbair.com www.cerbair.com © 2020 CERBAIR. All rights reserved. This material ( texts, photos and logos included ) may not be reproduced, distributed, transmitted, cached or otherwise used, except with prior written permission of CERBAIR.