Feeds

Summer debut for Judge Dredd computer smart-rifle

Exploding wireless mini-shell ammo hits round corners

Next gen security for virtualised datacentres

US Army officials have announced that the high-tech XM-25 computer smartgun, intended to let soldiers shoot at and hit enemies hiding around corners, will enter field trials this summer. The "counter defilade" gun, similar in size to existing infantry weapons, is expected to reduce the number of controversial airstrikes used in Afghanistan and Iraq.

An XM-25 being demo'd. Credit: PEO Soldier.

Your trench has become your grave.

Regular Reg readers will already be familiar with the XM-25 and its unique ability to strike at enemy gunmen or snipers who are protected by roof edges, corners, rock outcrops, trenches etc. This is accomplished by using a laser rangefinder to precisely measure the distance to the enemy's protection (for instance a low wall). The XM-25 smartgunner then selects how much nearer or further from that location he thinks the target is - for an enemy behind a normal wall, the soldier would choose +1 metre. If the soldier had lased the back of a room or cave through an opening, he might choose -1 or -2 metres.

Then the XM-25's computer calculates the exact angle the weapon's barrel should be elevated to in order to lob a 25mm explosive mini-shell through the selected point in space, and generates a new pipper in the gunsight accordingly. The soldier moves the pip onto his or her original point of aim, so adjusting the gunbarrel to the correct angle.

The shell in the XM-25's breech gets its electronic time fuse precisely set by a wireless transmission from the smartgun computer at the instant it is fired. It flies out on the calculated ballistic arc and explodes exactly in the chosen spot - above the head of an enemy in a trench or on a rooftop, right next to one lurking around a corner, dead in the middle of a room etc. The miniature explosive warhead sprays the target(s) with shrapnel.

Rich Audette, the US Army official in charge of the XM-25, described the weapon's usefulness in a briefing last week.

"In Iraq we had many instances where there was a sniper firing from a rooftop and you have a squad trying to engage that target, but the soldiers couldn’t get to him with the weapons they had, so they’d call in the Air Force to drop a JDAM [joint direct attack munition - a smart bomb],” he said. “We can take out the target at $25 per XM round as opposed to a $20,000 to $50,000 JDAM.”

Quite apart from saving money, less smartbombs dropped would also be a good thing in terms of winning the propaganda war - particularly in Afghanistan at the moment, where US and allied airstrikes are believed to be killing large numbers of innocent civilians.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Our LOHAN spaceplane ballocket Kickstarter climbs through £8000
Through 25 per cent but more is needed: Get your UNIQUE rewards!
LOHAN tunes into ultra long range radio
And verily, Vultures shall speak status unto distant receivers
EOS, Lockheed to track space junk from Oz
WA facility gets laser-eyes out of the fog
Volcanic eruption in Iceland triggers CODE RED aviation warning
Lava-spitting Bárðarbunga prompts action from Met Office
NASA to reformat Opportunity rover's memory from 125 million miles away
Interplanetary admins will back up data and get to work
LOHAN Kickstarter breaks NINETEEN THOUSAND of your EARTH POUNDS
That's right, OVER 9,000 beer tokens - and counting
Major cyber attack hits Norwegian oil industry
Statoil, the gas giant behind the Scandie social miracle, targeted
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.