Military Robots Will Predict Your Next Move

 

New research may enable robotic-armed guards, or just help self-driving cars get through a four-way stop.  The algorithm, by two University of Illinois researchers, opens the door to software that can guess where a person is headed, reaching for a gun, steering a car into armored gate, milliseconds before the act plays out. Researchers, Justin Horowitz and James Patton undertook the work under a National Institutes of Health Grant, as described in “I Meant to Do That: Determining the Intentions of Action in the Face of Disturbances” in the journal PLOS ONE.

The idea was to help robots help humans — by taking the steering wheel when a driver makes a bad decision, or perhaps activating an exoskeleton when a patient with a weak arm reaches for an object. But the algorithm, broadly speaking, might also help fly a plane or anticipate the next move by a suicide bomber or gunman.“Imagine that a terrorist runs toward a crowd of VIPs with a bomb strapped to their chest, but they’re tackled before they can succeed. This technology (alongside a good deal of supporting technology) would be able to determine who within the crowd they were aiming for,” Horowitz wrote in an email.

“We want to temper what we say about security because it has not been tested and would require some restrictions on what needs to be known, but we have also thought about applying this to dynamic security situations. An example might be understanding what a person intends to do,” Patton added.

To test the algorithm, they gave a joystick to five men and three women between the ages of 24 and 30. The subjects were instructed to reach out with the joystick 730 times under various conditions, including ones that obstructed their motion. The tests proved the algorithm’s ability to infer, within tenths of a second, where the subject was headed.

What could you use this for? If you’re Russia, which has deployed armed ground robots to monitor missile bases, your security droids just became a lot better at discerning whether or not they should shoot and at what. If the US ever puts armed robots on the ground — something Defense Department is not currently tempted to do because of the danger to friendly forces — the algorithm could make those robots safer and more capable.

When robots can detect your intent in the same way that it took us millions of years to evolve the ability to do, they may save your life, or at least give you the right-of-way.
DefenseOne:  http://bit.ly/1lixFE8

 

« What the Next 10 Years of Automation Means for Job Market
How are Businesses Responding to Cyber Risks? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Cyber Security & Information Systems Information Analysis Center (CSIAC) - USA

Cyber Security & Information Systems Information Analysis Center (CSIAC) - USA

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

Caveonix

Caveonix

Caveonix’s RiskForesight TM solution is an automated, proactive risk and compliance platform designed for hybrid and multi-cloud.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

ATHENE National Research Center For Applied Cybersecurity

ATHENE National Research Center For Applied Cybersecurity

ATHENE is the largest research center for cybersecurity and privacy in Europe, conducting application-oriented top-level research for the benefit of the economy, society and the state.

Millennium Corporation

Millennium Corporation

For nearly two decades, Millennium Corporation has been operating on the leading edge of cybersecurity.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.

Tracer

Tracer

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

Interpres Security

Interpres Security

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure.