Feeds

Israelis produce miniature Terminator

Pint sized robo-assassin talks the talk, can't walk the walk

SANS - Survey on application security programs

Israeli killer-robot maker Elbit Systems today unveiled the "Viper," a small ground-crawling combat machine "roughly the size of a small television".

The tiny war-bot is said to capable of engaging enemies with bursts of laser-sighted automatic fire, or even grenades.

In what can only be a remarkable, chilling coincidence the dwarvish cyber-assassin reportedly packs an Uzi nine-millimetre – one of the favourite weapons of the original, supposedly fictional Terminator.

But the diminutive droid may not be ready to step into the CyberDyne 101's leather pants quite yet. It is actually intended mainly for bomb-disposal type missions, using a disruptor rather than a submachine gun. The idea is that it might be sent in ahead of Israeli foot-soldiers to recce dangerous or booby-trapped areas or buildings. It would mostly operate undisguised under remote control rather than undercover, cloaked in a sheath of living flesh. (Presumably that of a medium-sized dog in this case, rather than that of a vast Austrian.)

And indeed a measly 9mm Uzi is scarcely going to impress the other killer droids. In former times the UK's "Wheelbarrow" bomb-disposal bot would often pack a Browning 12-bore semi-automatic, somewhat outgunning the new kid on the block. And anything along these lines pales into insignificance alongside today's Flying-HK lookalike, the General Atomics MQ-9 "Reaper" with its 14 Hellfire missiles.

One also notes that the Viper isn't yet really independent of human support. It has to be carried into battle on a soldier's back. Whether the bearer should be seen as the directing intelligence or merely the machine's fleshy slave is for history to judge. ®

Top three mobile application threats

More from The Register

next story
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.