Feeds

Yes! It's the Reg Top 5 FUTURISTIC GUNS Thanksgiving Roundup!

Backpack raygun, portable artillery piece and MUCH MUCH MORE

Beginner's guide to SSL certificates

The in-weapon spy recorder "Black Box": It's real

The 'Black Box' gun-manager gadget. Credit: FN Herstal

We would have believed it was an accident if you hadn't reloaded. Twice.

This gadget is designed to be installed inside a weapon, where it would run on a non-replaceable battery lasting ten years or 100,000 shots - covering the weapon handily between major overhauls.

The initial uses of the Black Box would, according to makers FN, be in logistics and maintenance. The in-gun shot counter would keep track of how many rounds were being fired, updating a future soldier's digital comm/puter system - Land Warrior or some similar rig - as it went, using some form of wearable networking.

Not only would the soldier or cop then know automatically how many shots he had fired without the need to keep count or look at his magazines and pouches, but so would his team leader - and higher commanders would be warned in advance if their people seemed likely to run out of ammo. Armourers would also find repairs and maintenance easier using the records held in the gun.

So far, so uncontroversial. But FN seem to hint at other uses to which the gizmo might be put - indeed the choice of name offers a broad hint that investigations following a shooting or a firefight might make use of the records held in weapons used.

Fans of Judge Dredd will recall that his personal sidearm, the Lawgiver pistol, had capabilities akin to this in some versions - perhaps going as far as the tagging of every round fired with the user's DNA signature. (Though in the movie, even this level of record-keeping didn't suffice to protect an innocent Dredd from being busted by his fellow judges for a crime he hadn't committed.)

The introduction of such systems might be used as much to keep tabs on cops or troops as to help them out with logistics and maintenance. And Black Box guvmint gunbutt spy modules required in every licensed weapon, doubtless remotely accessible by federal busybodies, would seem like a vaguely plausible bogeyman to disturb the sleep of many a righteous, free, gun-toting American.

Even more chillingly for those who see personal weapons as a guarantee of freedom from government oppression, FN speak of the Black Box as a "weapon manager", hinting that feds, military superiors etc might even be able to disable a gun remotely.

Internet Security Threat Report 2014

More from The Register

next story
GRAV WAVE DRAMA: 'Big Bang echo' may have been grit on the scanner – boffins
Exit Planet Dust on faster-than-light expansion of universe
SpaceX Dragon cargo truck flies 3D printer to ISS: Clawdown in 3, 2...
Craft berths at space station with supplies, experiments, toys
That glass of water you just drank? It was OLDER than the SUN
One MEELLION years older. Some of it anyway
Big dinosaur wowed females with its ENORMOUS HOOTER
That's right, Doris, I've got biggest snout in the prehistoric world
Japanese volcano eruption reportedly leaves 31 people presumed dead
Hopes fade of finding survivors on Mount Ontake
Relive the death of Earth over and over again in Extinction Game
Apocalypse now, and tomorrow, and the next day, and the day after that ...
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.