Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 3-Feb-07
South Korea to deploy deadly robots on border with North Korea

Web Log - February, 2007

South Korea to deploy deadly robots on border with North Korea

This is the scariest video you've ever seen.

Samsung's Techwin division will shortly begin selling heavily armed robot sentries that can identify and shoot a target automatically from over two miles away. They will cost $200,000 per unit, and the company expects to sell 1,000 in the first year.

Unlike human guards who can succumb to fatigue or inclement weather, the automated system will guarantee "perfect guarding operation." The robot has two cameras, one for daytime and infrared for nighttime, along with a laser rangefinder.

The robot uses pattern-recognition technology to sort out fleshy targets from nonhuman objects. It can be programmed to recognize words of surrender from someone who doesn't want to be shot. (Hopefully, he won't accidentally cough or something.) It can be programmed to shoot automatically, or to wait for a wireless command from a remote operator.

Here's the promotional video for the product. You've gotta see this:

This is the first of what is bound to be a flood of these robots appearing on battlefields, and eventually on city street corners and even as private guards in people's homes. Every country in the world will be developing and deploying them, and we can be certain that China already has many ongoing projects.

American armed forces are already using remote controlled robots to disarm IEDs (improvised explosive devices) used in roadside bombs in Iraq.

However, the really big project is the "Future Combat System" which calls for autonomous robot soldiers by 2014.

The Army completed the first live-fire exercise earlier this week at Fort Bliss, Texas.

A platoon of 36 Soldiers tested such FCS technology as Urban and Tactical Unattended Ground Sensors and unmanned vehicles designed to clear roads and buildings, as well as detect persons and objects that may enter a building occupied by soldiers. Robotics and unmanned vehicles help clear buildings without sending actual soldiers inside. This is part of the most comprehensive Army modernization effort in more than half a century.

You're not gonna believe this, but if the above video wasn't enough excitement for you, then you can download a free PC game called F2C2 (Future Force Company Commander): "Welcome to the battlefield of the future! F2C2 was created by Science Applications International Corporation (SAIC) to help explain the Future Combat Systems (FCS) program to soldiers in an interactive environment. The game depicts the 18 FCS systems, all connected via the FCS System of Systems Common Operating Environment, supporting the 21st century soldier. Although F2C2 is best experienced when the player has a working knowledge of Army concepts and terminology, anyone can play! F2C2 may seem hard at first if you haven’t had Army training, but there are tutorials available. Prepare to be challenged!"

From the point of view of Generational Dynamics, this is one more step in the develop of super-intelligent computers that will, within ten years or so, be more intelligent than human beings. These robots will serve not only as soldiers, but also in a variety of tasks from being a plumber to being a 24 hour a day nurse. In the late 2020s, super-intelligent robots will reach the point, known as The Singularity, where they're able to do the necessary research and development to develop new versions of themselves. After that they will quickly become far more intelligent than humans, and the future existence of the human race cannot be predicted. (3-Feb-07) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.