When Guns And AI Work Together

In the long-running debate about gun control legislation guns have been characterized as “dumb” tools. They simply do what they are told. But as with smart lamps, TV and smart cars, technology is making guns a lot more intelligent.

Military firearms are a simple extension of previous technology; first we threw rocks. Then we used slings to send them further. We developed bows and arrows to deliver more force. Then we harnessed fire to make the first guns. Technology is ushering in the next phase, and it’s fascinating and worrying.

Take TrackingPoint, for example; the Austin-based company builds rifles that use scopes powered by Angstrom Linux distribution software to increase accuracy out to 1,000 yards by performing complex ballistic calculations. 

The scopes make shooting a gun more like a first person shooter video; targets can be tagged by the scope and will be followed by a red dot; after the trigger is pulled, the gun will fire when the scope’s crosshair and the dot are aligned.
The scope takes environmental and ballistic factors into account when calculating the trajectory of the bullet, making each shot significantly more accurate than traditional human-aimed shots. Because ballistic factors are used to predict the path of the bullet, certain ammunition must be used with the TrackingPoint guns to ensure that all of the properties of the bullets are known.

While TrackingPoint is currently building guns mostly for hunters and gun aficionados with expensive tastes (the magnum rifles start at $22,500), they are doing some work with the US military, which has already started deploying another smart weapon, the XM-25 Counter Defilade Target Engagement system. The XM-25 fires 25mm explosive shells with high accuracy up to 500 meters and “area effect” to 700. A laser rangefinder, a powerful computer-enhanced scope, and the ability to select the detonation range of the shells contributed to the XM-25’s nickname of “the Punisher.”

The weapon has proven to be very effective in supporting troops that are pinned down by enemy machine gun fire, as the shells can be set to explode once they fly over an enemy’s cover. The capability of the launcher to provide airbursts like this sets it apart from conventional weapons, and puts it in a new class; something like highly portable artillery.
DARPA has also developed a .50 caliber sniper bullet that can make course corrections mid-flight. 

In March, Russia announced that they’d be deploying tracked robots to defend a number of their missile bases; these robots are armed with 12.7-mm heavy machine guns, and can engage targets without any human intervention (unlike current US military drones, which required an actual person to pull the trigger).

However, it seems likely that the US will eventually join Russia and other countries in building fully autonomous weapons platforms, despite UN debate over whether or not robots should be banned from combat. But with DARPA’s annual Robotics Challenge, it’s clear that the US military is interested in further developing the field of robotics for its own ends.

While it seems unlikely that we’ll be seeing humanoid robots patrolling army bases or replacing soldiers anytime soon, the high-profile deployment by Russia does make US and international deployment of autonomous lethal robots seem inevitable.

MakeUseOf.com:

You Might Also Read:

'Killer Robot' Warfare Is Coming Closer.:

AI Could Lead To World War:

 

« Russian Fake Brexit Tweets & Attacks On The UK
N. Korean Hackers Plan to Devastate UK »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Barracuda Networks

Barracuda Networks

Barracuda provides a range of solutions covering network security, data storage, protection and disaster recovery.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

Camel Secure

Camel Secure

Camel Secure is a company specialized in the development of products for information security and technology risk management.

CAPSLOCK

CAPSLOCK

CAPSLOCK delivers career-changing cyber training to help adults re-skill. Learn online to become a cyber security professional and pay no tuition until you land a high-paying job.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

MedSec

MedSec

MedSec is the only company of its type focused solely on cybersecurity for hospitals and medical device manufacturers, offering both a cybersecurity software solution and consulting services.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

IEC Cyber Ltd

IEC Cyber Ltd

IEC Cyber provides Cyber security consulting services for OT systems, with emphasis on process systems aligned to IEC 61508 and IEC 61511. We are a preferred consulting firm for IEC 62443 services.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.