Feeds

Yes! It's the Reg Top 5 FUTURISTIC GUNS Thanksgiving Roundup!

Backpack raygun, portable artillery piece and MUCH MUCH MORE

New hybrid storage solutions

The in-weapon spy recorder "Black Box": It's real

The 'Black Box' gun-manager gadget. Credit: FN Herstal

We would have believed it was an accident if you hadn't reloaded. Twice.

This gadget is designed to be installed inside a weapon, where it would run on a non-replaceable battery lasting ten years or 100,000 shots - covering the weapon handily between major overhauls.

The initial uses of the Black Box would, according to makers FN, be in logistics and maintenance. The in-gun shot counter would keep track of how many rounds were being fired, updating a future soldier's digital comm/puter system - Land Warrior or some similar rig - as it went, using some form of wearable networking.

Not only would the soldier or cop then know automatically how many shots he had fired without the need to keep count or look at his magazines and pouches, but so would his team leader - and higher commanders would be warned in advance if their people seemed likely to run out of ammo. Armourers would also find repairs and maintenance easier using the records held in the gun.

So far, so uncontroversial. But FN seem to hint at other uses to which the gizmo might be put - indeed the choice of name offers a broad hint that investigations following a shooting or a firefight might make use of the records held in weapons used.

Fans of Judge Dredd will recall that his personal sidearm, the Lawgiver pistol, had capabilities akin to this in some versions - perhaps going as far as the tagging of every round fired with the user's DNA signature. (Though in the movie, even this level of record-keeping didn't suffice to protect an innocent Dredd from being busted by his fellow judges for a crime he hadn't committed.)

The introduction of such systems might be used as much to keep tabs on cops or troops as to help them out with logistics and maintenance. And Black Box guvmint gunbutt spy modules required in every licensed weapon, doubtless remotely accessible by federal busybodies, would seem like a vaguely plausible bogeyman to disturb the sleep of many a righteous, free, gun-toting American.

Even more chillingly for those who see personal weapons as a guarantee of freedom from government oppression, FN speak of the Black Box as a "weapon manager", hinting that feds, military superiors etc might even be able to disable a gun remotely.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Thought that last dinosaur was BIG? This one's bloody ENORMOUS
Weighed several adult elephants, contend boffins
Chelyabinsk-sized SURPRISE asteroid to skim Earth, satnav birds
Space rock appears out of nowhere, buzzes planet on Sunday
City hidden beneath England's Stonehenge had HUMAN ABATTOIR. And a pub
Boozed-up ancients drank beer before tearing corpses apart
'Duck face' selfie in SPAAAACE: Rosetta's snap with bird comet
Probe prepares to make first landing on fast-moving rock
Square Kilometre Array reveals its 1.6TB-a-day storage and network rigs
Boolardy Engineering Test Array - aka BETA - is about to come out of Beta
LOHAN invites ENTIRE REG READERSHIP to New Mexico shindig
Well, those of you who back our Kickstarter tin-rattling...
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.