Where speed meets impact for defense & security
The DefTech Forges, initiated by TechHUB SVI, offer a unique opportunity to actively participate in the future of security and defense technologies - hands-on, collaborative and with real impact. Leading players from industry, research and consumers work in interdisciplinary teams on real problems and develop innovative solutions. These innovations are not only tested, but also put into practice.
Making technologies tangible
Instead of just discussing ideas, we put technologies into practice: from the initial concept idea to the development of prototypes and their use under real conditions - accompanied by experts, supported by strong partners and embedded in a real operational environment at Erding Air Base.
The aim is to jointly create solutions that close real capability gaps and quickly find their way into implementation.
22.04 - 22.05.2026
- Submit application form via "Apply now" button. Note: Please edit and submit the form together with all team participants.
- Confirmation of registration for the DefTech Forges via e-mail with upload link for application presentation + NDA
- Upload of all completed, signed NDAs and the application presentation
22.05 - 08.06.2026
- Confirmation of acceptance or rejection
- Verification of all team members
- Final admission
15.06.2026
- Start of the DefTech Forges
Interested teams can apply for a challenge during the tendering phase by submitting a short application.
- Minimum age 18 years
- Participant nationality compared with the list of countries
- In the case of organizations: Management level and shareholders compared with the list of countries; no locations in countries on the list of countries
- NDA (will be sent via email)
- Max. 5-page application presentation (in PDF format):
- Team
- Team name + contact person,
- Members (name, role, core competence, history or rough CV)
- Relevant experience & possible references (e.g. comparable industry projects, hackathons, other challenges)
- Solution concept
- Description of the solution (architecture / approach, central technology)
- Degree of innovation (TRL)
- Sketch / diagram if applicable
- State of development (idea / concept / prototype / product)
- Feasibility & roadmap
- How will the solution be implemented?
- Planned progress within the forge (scalability / market potential)
- Resources required (data / hardware / test scenarios)
- Impact & added value
- Why is this team particularly suitable? (Combination of skills and implementation experience; access to relevant stakeholders / markets; ...)
- Team
DefTech Forges and Challenges
Each Forge bundles specific challenges from the defense and security sector that have been defined together with stakeholders from the field.
The focus is on challenges with high application potential, in which innovative solutions are developed and taken forward.
Military Space
deltaVision is a German start-up based in Munich and an established supplier of propulsion system components. Building on this expertise, the company is developing the Dynamic space Operations VEhicle (DOVE) - a platform for the flexible and rapid positioning of payloads in orbit.
DOVE is designed as a dual-use system and addresses both civil and security-relevant applications in the context of the German space security strategy.
The platform offers, among other things:
- Modular payload interfaces and exchange of payloads in orbit
- Compatibility with European launcher systems (e.g. Ariane, Vega, RFA One)
- High orbital mobility (>4 km/s ΔV)
- Refueling capability in orbit
- RPOD capability (Rendezvous, Proximity Operations & Docking)
Performance data for payloads:
- Up to 5 payloads
- Up to 1000 kg total mass (max. 300 kg per payload)
- ~2000 W electrical power
- ~2000 W thermal dissipation
- Customizable downlink capacity and position control accuracy
deltaVision does not develop the payloads itself and is therefore looking for external partners. We are looking for concepts for innovative payloads that can be operated on DOVE. Participants should:
- Define an existing or own use case
- Derive end user requirements as hypotheses
- Design a suitable payload
The development process is iterative - adjustments to the platform are also possible in order to maximize the benefits.
Missiles & Munitions
Offensive hypersonic weapon systems offer great potential for effective, long-range missions. Germany already has a very good starting point thanks to intensive space and defense technology research as well as demonstrator programs and funding from the BAAINBw. Thanks to its experience with hypersonic technologies and demonstrator programs, MBDA Germany is closely networked with various players in the Bundeswehr ecosystem.
The central challenge is not only to develop technologies, but also to drive forward technology maturation and development programs in parallel. As this area has so far been rather closed and risk-averse, MBDA Germany wants to use the HI² Challenge to open up the area of technology maturation in particular to new market participants, such as start-ups and SMEs. Innovative technologies are to be further developed at an early stage and later integrated into specific programs.
- Administrative screening and contact surface of start-ups and medium-sized companies with the R&T landscape of the Bundeswehr and the industrial integrator MBDA Germany
- Identification of innovative but high-risk technological solutions in the following areas:
- GNSS-robust navigation and structure-integrated antennas
- ITAR-free energy supply
- Mechanical-thermal-logical integration of novel IMUs
- Innovative sensor integration
- Cryptographic communication technology over long distances
TRL: 3 - 5
The aim is to be able to present demonstrators of the respective sub-systems after the HI² Challenge TRL 5. Following agreement with the Bundeswehr, a roadmap should be available on how these technologies can be brought to TRL 6 so that they can then be integrated into a development program.
Unmanned Systems
- Technological maturity level from TRL 5
- The system must already be technologically validated and be able to be demonstrated in a relevant environment.
- Suitability for detecting and classifying ground-based threats
- Capability for situation picture and evaluation integration
- Willingness to participate in the standardized test format
- Participants must accept defined interfaces, security specifications and evaluation logic.
- Participation as a company or consortium
- Contributions from sensor technology, platform, AI, command and control software and data fusion are expressly desired
Cyber Protection
Standard drone communication (control links & telemetry) has historically prioritized range and low latency over security. Low-cost software-defined radios (SDR) and open source protocols with varying levels of documentation (e.g. MAVLink, CRSF) have drastically lowered the barrier to entry for signal manipulation. Furthermore, UAVs have various sensors to record the environment, which in turn can provide a vector for attack.
Concrete problem:
Insufficiently secured UAS are subject to risks of disrupting operational use through signal jamming, the manipulation of navigation data (spoofing) or the unauthorized takeover of system control (hijacking). Commercially available systems do not fully consider hardening against attacks and offer gateways for manipulation.
Two approaches will be taken:
- Team Red: Identification of vulnerabilities in the standard setups. The aim is to disrupt communication, intercept/falsify telemetry data or infiltrate commands in order to take control of the flight controller.
- Team Blue: Hardening the existing system. The aim is to develop and implement mechanisms such as secure encryption, robust authentication or anti-jamming routines without disrupting operational use.
The solutions developed are presented and validated from the table-top setup to flights under real conditions.
- Disclosure of vulnerabilities: Gaps in existing systems should be uncovered and the consequences for operational use assessed
- Real-world applicability: Software patches and security concepts resulting from this can flow directly back into industry and open source projects (ExpressLRS, Ardupilot, PX4, etc.).
- Promoting innovation: The Aurora Challenge sees itself as a practical catalyst in the field of cyber-physical systems. The aim is to further develop concepts for securing existing systems as well as for drone defense. The solutions introduced enhance security and expand the operational field of application.
Critical infrastructures and high-value targets (air defense, radar stations, etc.) are increasingly threatened by unknown or hostile unmanned systems (UxS). Early detection and effective neutralization of such threats are therefore essential and of great national interest. In addition to the possible use of effectors (artillery, jammers, high-energy lasers), a further and (cost) efficient defense must be identified and integrated into an anti-drone solution.
In addition, the targeted development of national expertise in this field of technology is of central importance in order to sustainably protect Germany against hostile activities.
Scenario:
Protection of a critical infrastructure (e.g. Bundeswehr property) against drone attacks; due to structural, operational and security-related restrictions, the use of conventional jamming systems or kinetic effectors is only possible to a limited extent or not at all
- Reliable detection of unknown UxS in the operational area using cellular and complementary approaches
- Detection of drones in the cellular network
- Detection of drones using the cellular network (e.g. ICAS, JCAS)
- Supplementary detection of non-cellularly connected systems (e.g. FPV/"dark" drones) using network-based and external methods
- Interception and analysis of communication links of unknown UxS
- Interception of cellular and non-cellular radio and data traffic (e.g. control and video connections)
- Extraction of relevant information (e.g. control commands, telemetry, video data)
- Analysis, decoding and, if necessary, decryption of this information
- Development and evaluation of procedures for taking over and neutralizing UxS
- Development of options for taking over control (collaborative and non-collaborative drones)
- AI-based generation and adaptation of takeover mechanisms
- Manipulation of communication links (cellular and non-cellular), in particular
- Feeding misinformation or targeted control of the system
- Takeover of control and transfer to a safe state (e.g. safe-spot landing)
- Impairment of guidance by:
- Manipulation of video signals (e.g. FPV/"dark" drones)
- Combination with other influencing measures
- Integration of alternative influence vectors
- Influencing navigation systems (e.g. GNSS-related measures such as spoofing)
- Combination of interventions in communication and navigation systems for effective neutralization
- Protection of own UxS and systems in the cellular environment
- Protection against external communication interference and takeover attempts
- Protection of communication through post-quantum cryptography (PQC)
- Integration of physical layer security (PLS)
- Protection against AI-based attacks and protection of own AI systems against manipulation and deception
- Research into mechanisms for detecting and neutralizing unknown or hostile unmanned systems (UxS) in the operational environment, in particular using cellular and network-based communication infrastructures
- Research into mechanisms for taking over, influencing or controlled neutralization of hostile UxS, including cyber and communication-based approaches for taking over control and influencing sensor technology (e.g. video or control data)
- Research into mechanisms to protect own UxS from external communication interference, takeover attempts and AI-based attacks
- Implementation of the developed protection and effective mechanisms in an overall radio-based system (e.g. 5G campus network)
- Demonstration and evaluation of both functional directions (attack/neutralization and protection) in a realistic radio network
- Protecting critical infrastructure (KRITIS) such as energy and water supplies, telecommunications networks, transportation hubs, government buildings, armed forces properties and industrial facilities from hostile unmanned systems (UxS) that have significant potential for physical damage, sabotage, espionage and information loss
- Providing a holistic, efficient and scalable drone defence solution that includes early detection as well as neutralization and/or takeover of UxS, thus enabling an end-to-end chain of protection for critical infrastructure
- Combination of modern key technologies, in particular
- AI-supported detection, analysis and decision support
- network-based sensor technology and communication infrastructures (e.g. 5G campus networks)
- Modular and scalable countermeasures for adaptive defense against different types of UxS
Approaches in the field of cellular network infrastructures (e.g. 5G/6G-based detection, communication, manipulation and protection mechanisms): TRL 6 and above
Other technologies and processes outside the cellular network context (e.g. alternative radio links, GNSS-based processes, FPV/video or sensor systems): open (TRL 0)
Timeline
Concept & development phase
During this period, the teams work on their solutions, further develop existing approaches and develop concepts, prototypes or demonstrators. At the same time, they receive needs-based keynote speeches from experts that are geared towards the respective stages of development.
FAQs
The DefTech Forges are an innovation format for the rapid development, testing and demonstration of new technological solutions in the security and defense context. The format represents a further development of classic challenges and hackathons and aims to not only discuss technology conceptually, but also to make it tangible and demonstrate it practically on site and then implement and scale it.
Contact us