When Guns And AI Work Together

In the long-running debate about gun control legislation guns have been characterized as “dumb” tools. They simply do what they are told. But as with smart lamps, TV and smart cars, technology is making guns a lot more intelligent.

Military firearms are a simple extension of previous technology; first we threw rocks. Then we used slings to send them further. We developed bows and arrows to deliver more force. Then we harnessed fire to make the first guns. Technology is ushering in the next phase, and it’s fascinating and worrying.

Take TrackingPoint, for example; the Austin-based company builds rifles that use scopes powered by Angstrom Linux distribution software to increase accuracy out to 1,000 yards by performing complex ballistic calculations. 

The scopes make shooting a gun more like a first person shooter video; targets can be tagged by the scope and will be followed by a red dot; after the trigger is pulled, the gun will fire when the scope’s crosshair and the dot are aligned.
The scope takes environmental and ballistic factors into account when calculating the trajectory of the bullet, making each shot significantly more accurate than traditional human-aimed shots. Because ballistic factors are used to predict the path of the bullet, certain ammunition must be used with the TrackingPoint guns to ensure that all of the properties of the bullets are known.

While TrackingPoint is currently building guns mostly for hunters and gun aficionados with expensive tastes (the magnum rifles start at $22,500), they are doing some work with the US military, which has already started deploying another smart weapon, the XM-25 Counter Defilade Target Engagement system. The XM-25 fires 25mm explosive shells with high accuracy up to 500 meters and “area effect” to 700. A laser rangefinder, a powerful computer-enhanced scope, and the ability to select the detonation range of the shells contributed to the XM-25’s nickname of “the Punisher.”

The weapon has proven to be very effective in supporting troops that are pinned down by enemy machine gun fire, as the shells can be set to explode once they fly over an enemy’s cover. The capability of the launcher to provide airbursts like this sets it apart from conventional weapons, and puts it in a new class; something like highly portable artillery.
DARPA has also developed a .50 caliber sniper bullet that can make course corrections mid-flight. 

In March, Russia announced that they’d be deploying tracked robots to defend a number of their missile bases; these robots are armed with 12.7-mm heavy machine guns, and can engage targets without any human intervention (unlike current US military drones, which required an actual person to pull the trigger).

However, it seems likely that the US will eventually join Russia and other countries in building fully autonomous weapons platforms, despite UN debate over whether or not robots should be banned from combat. But with DARPA’s annual Robotics Challenge, it’s clear that the US military is interested in further developing the field of robotics for its own ends.

While it seems unlikely that we’ll be seeing humanoid robots patrolling army bases or replacing soldiers anytime soon, the high-profile deployment by Russia does make US and international deployment of autonomous lethal robots seem inevitable.

MakeUseOf.com:

You Might Also Read:

'Killer Robot' Warfare Is Coming Closer.:

AI Could Lead To World War:

 

« Russian Fake Brexit Tweets & Attacks On The UK
N. Korean Hackers Plan to Devastate UK »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

CLDigital

CLDigital

CLDigital's no-code risk and resilience platform, CL360, provides leaders with risk and resilience data to make strategic and tactical continuity decisions.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

Protergo Cyber Security

Protergo Cyber Security

Protergo Cyber Security is the first integrated provider of cybersecurity solutions in Indonesia. We proactively protect our clients from cyber threats.

Canadian Institute for Cybersecurity (CIC)

Canadian Institute for Cybersecurity (CIC)

The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

CXI Solutions

CXI Solutions

CXI Solutions: Your trusted partner in cybersecurity. We offer a full range of cybersecurity solutions to protect your business from digital attacks and virtual threats.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.