Military Robots Will Predict Your Next Move

 

New research may enable robotic-armed guards, or just help self-driving cars get through a four-way stop.  The algorithm, by two University of Illinois researchers, opens the door to software that can guess where a person is headed, reaching for a gun, steering a car into armored gate, milliseconds before the act plays out. Researchers, Justin Horowitz and James Patton undertook the work under a National Institutes of Health Grant, as described in “I Meant to Do That: Determining the Intentions of Action in the Face of Disturbances” in the journal PLOS ONE.

The idea was to help robots help humans — by taking the steering wheel when a driver makes a bad decision, or perhaps activating an exoskeleton when a patient with a weak arm reaches for an object. But the algorithm, broadly speaking, might also help fly a plane or anticipate the next move by a suicide bomber or gunman.“Imagine that a terrorist runs toward a crowd of VIPs with a bomb strapped to their chest, but they’re tackled before they can succeed. This technology (alongside a good deal of supporting technology) would be able to determine who within the crowd they were aiming for,” Horowitz wrote in an email.

“We want to temper what we say about security because it has not been tested and would require some restrictions on what needs to be known, but we have also thought about applying this to dynamic security situations. An example might be understanding what a person intends to do,” Patton added.

To test the algorithm, they gave a joystick to five men and three women between the ages of 24 and 30. The subjects were instructed to reach out with the joystick 730 times under various conditions, including ones that obstructed their motion. The tests proved the algorithm’s ability to infer, within tenths of a second, where the subject was headed.

What could you use this for? If you’re Russia, which has deployed armed ground robots to monitor missile bases, your security droids just became a lot better at discerning whether or not they should shoot and at what. If the US ever puts armed robots on the ground — something Defense Department is not currently tempted to do because of the danger to friendly forces — the algorithm could make those robots safer and more capable.

When robots can detect your intent in the same way that it took us millions of years to evolve the ability to do, they may save your life, or at least give you the right-of-way.
DefenseOne:  http://bit.ly/1lixFE8

 

« What the Next 10 Years of Automation Means for Job Market
How are Businesses Responding to Cyber Risks? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

Governikus

Governikus

Governikus provides solutions for secure data transport, authentication, the use of electronic signatures and cryptography as well as for long-term storage.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

Greylock Partners

Greylock Partners

Greylock Partners is a leading venture capital firm based in Silicon Valley. We invest in all sectors of enterprise software technology including applications, cloud/SaaS, networking and security.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

A&O IT Group

A&O IT Group

A&O IT Group provide IT support and services including IT Managed Services, IT Project Services, IT Engineer Services and Cyber Security.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Oduma Solutions

Oduma Solutions

Oduma Solutions is a wholly owned Ghanaian Cybersecurity company that offers information security services to organisations seeking to improve their security posture.