Autonomous Systems

Mission Enablement

UAS and Autonomous Cyber

The use of Unmanned Aerial Systems (UAS) has seen an unprecedented surge across various sectors, consequently expanding the potential attack vectors and exposing systemic vulnerabilities. As a DIU Blue UAS Recognized Assessor, our test teams have a deep understanding of the flight software, ground control applications, and communications protocols commonly used on UAS devices and their payloads and comprehensively assess devices used by the Department of Defense and commercial organizations. We have hosted hundreds of participants, through our “Hack Our Drone” workshop, to UAS cybersecurity at conferences such as Xponential, Black Hat, and the PX4 Developers Summit. At the intersection of our EW and UXS expertise lies our Counter-Unmanned Aerial Systems (C-UAS) capabilities.

C-UAS

Counter Unmanned Aerial Systems (C-UAS) demand and requirements have increased exponentially with the widespread adoption of UAS. At the intersection of our EW and UAS expertise lies our C-UAS capabilities. Dark Wolf’s C-UAS expertise is rooted in our deep understanding of the hardware, software, communications, and network topologies associated with UAS and connected systems. Our underlying understanding of the technology is coupled with our offensive and defensive cyber capabilities and threat insights to inform defeat capabilities

Drone Wolf Playbook

Dark Wolf’s Drone Wolf Playbook is the authoritative guide to Unmanned Aerial Systems (UAS) assessments, drawing from our deep experience assessing UAS, Ground Control Systems, Payloads, and Communications for commercial and government entities on behalf of DIU and direct to industry. We follow this playbook to assess UAS devices organizations rely upon for its critical operations. The Playbook is publicly available, and it details the methods and tools we use to assess UAS cybersecurity. This comprehensive framework facilitates efficient and accurate testing of unmanned aerial systems, empowering both professional penetration testers and general users to evaluate the security robustness of these systems effectively.

Contact us

Arne Brinck

Managing Director

Hunter Hodges

Technical Director

Jonathan Perez

Senior Manager