One shot, one kill at 2100 meters

Ry reports on a new Army sniping record from Afghanistan by a Arfcom member. Awesome!

If you are wondering at all the amazing sniping shots coming out of Afghanistan you aren’t alone. I knew the high altitude would make a difference but I didn’t know exactly how much until I ran some numbers through Modern Ballistics. Below you see the numbers for the .50 BMG shooting a high end bullet/cartridge with a gun zeroed at sea level for 1000 yards at a target at 2300 yards (2100 meters) away for various altitudes. Notice the difference in expected group size as the altitudes goes from 0 to 10000 feet. Notice the windage difference. All those things help but still, the shooter and spotter had to be top notch and have a little luck as well. Assuming a target of 18 inches wide and 24 inches tall the altitude difference changed the odds of a hit from about 10% to 20% (not shown).

Good job SnakeaterM24!


Modern Ballistics Data Created: 02/04/08 09:24:30

Firearm: Default
Cartridge: .50 BMG HMI with 750 gr. A-MAX
Conditions: Standard Conditions.
Range: 2300
Altitude (ft):           0   1000   2000   3000   4000   5000   6000   7000   8000  10000


Drop (inches)         2263   2193   2129   2070   2016   1966   1920   1877   1837  1765
Height (inches)      -1609  -1539  -1475  -1416  -1362  -1313  -1267  -1224  -1184 -1112
Height (moa)        -66.84 -63.93 -61.26 -58.82 -56.58 -54.52 -52.61 -50.83 -49.16 -46.17
Height (mils)       -19.44 -18.60 -17.82 -17.11 -16.46 -15.86 -15.30 -14.79 -14.30 -13.43
Windage (inches)    258.89 244.21 230.39 217.47 205.43 194.19 183.72 173.94 164.81 148.27
Windage (moa)        10.75  10.14   9.57   9.03   8.53   8.06   7.63   7.22   6.84   6.16
Windage (mils)        3.13   2.95   2.78   2.63   2.48   2.35   2.22   2.10   1.99   1.79
Mid rng Ht (in)       78.8   79.2   79.5   79.8   80.2   80.5   80.8   81.1   81.4   81.9
Midrange (yds)       532.1  535.4  538.6  541.8  544.9  547.9  550.8  553.7  556.4  561.8
Zero (yds)          1000.0 1008.1 1016.0 1023.6 1031.2 1038.7 1045.9 1053.0 1060.0 1073.4
Near zero (yds)        5.3    5.3    5.3    5.3    5.3    5.3    5.3    5.3    5.3    5.3
P.B. Size (in)      157.66 158.35 159.03 159.69 160.33 160.95 161.56 162.15 162.72 163.82
P.B. Range (yds)      1182   1192   1202   1212   1222   1231   1240   1249   1258   1275
Velocity (ft/S)       1118   1157   1200   1245   1290   1335   1380   1425   1469   1553
Energy (ft-lbs)       2082   2229   2397   2581   2772   2970   3173   3382   3593   4018
PF                     839    868    900    934    968   1002   1035   1069   1102   1165
Time (S)             3.941  3.857  3.779  3.705  3.637  3.573  3.514  3.458  3.406  3.312
Group (inches)       81.20  77.10  73.25  69.68  66.37  63.31  60.47  58.02  55.56  51.17
Group (moa)           3.37   3.20   3.04   2.89   2.76   2.63   2.51   2.41   2.31   2.12
Group (mils)          0.98   0.93   0.88   0.84   0.80   0.76   0.73   0.70   0.67   0.62
Groups <= desired    0.00%  0.00%  0.00%  0.00%  0.00%  0.20%  0.40%  0.60%  1.20%  1.20%
1 grp of <= desired    0.0    0.0    0.0    0.0    0.0  500.0  250.0  166.7   83.3   83.3
—–
Constants:
M.V. (ft/S)        2794   M.V. SDev (fps)    10.0   B.C.               1.050 
Mass (grains)      750    Sight Ht (in)      1.50   Indicated SA (moa) 27.19 
SA Offset (moa)    0.00   Incline (deg)      0      Wind (mph)         10    
Wind error (mph)   2      Wind (deg.)        90     Temp (F)           59    
Barometer          29.53  Gravity            32.17  Shots per group    5     
Bullet acc. (moa)  0.50   Desired Grp (moa)  1.00   Group Simulations  500   
—-
Firearm name: Default
Firearm notes:
Cartridge name: .50 BMG HMI with 750 gr. A-MAX
Cartridge notes: BC is for Hornady A-Max.  MV is for max load of H50BMG.
Conditions name: Standard Conditions.
Conditions notes:

Free sex in exchange for film rights

Interesting. They are making it into a chain. I wonder if they will be opening a “store” in Nevada. Not that Dr. Joe would have anything more than academic interest or maybe buying some stock.

Microsoft executive comments on rumor

Contrary to what this web page says, Craig Eisler did have something to say about the feral child they found in the Word source code.

Crag and the Mac Office team are in a different building from our son James who also works on Office but I’ll still ping him to see if he knows anything more about the incident.

Quote of the day–former Yahoo employee

Most Yahoo employees will feel that, A., we lost, and B., there is no way in hell that I am going to work for Microsoft.

Former Yahoo employee who wishes to remain anonymous
Microsoft and Yahoo!: Happily Ever After?
[After they get their Borg implants and take a couple swigs of Microsoft Brainwash they’ll be fine.–Joe]

Why do You Hate Your Customers?

We have two cell phones on the same account.  My wife lost her phone while traveling.  I told her to go to a “Big Giant Phone Company” booth in any town and get another phone.  Big Giant Phone Company calls me, with her standing there, and wants a copy of my driver’s license.  Great – they’re protecting me against fraud.  I fax them my license while on the phone with them.  All is OK.  They hand my wife her new phone and she can now make and receive calls on her old number.

But there’s a problem.  This new phone is booby-trapped.  They had all her account information, they set up her new phone and personally handed it to her after having verified my account identity.  But she can’t get any of the many voice-mail messages that are pouring in, and she’s at a Big Expensive Out-Of-Town Convention and all.

They HANDED HER a new phone IN PERSON that doesn’t work.  She the user, is forced to set up the voice mail.  But that can be done ONLY AT CERTAIN TIMES of the day and ONLY if she has my Social Security Number (already faxed them my GD driver’s license).

Dear, Big Giant Phone Company,  Why do you harass and attempt to thwart your customers with this idiocy?  What do you think WE the paying customers have to gain from being harassed and thwarted by you?  Why should I ever spend another nickel with you if I can avoid it?

And while I’m venting:  Why does Verizon need a 37 digit account number, when anyone is this country of over 300 million can reach me with my 10 digit phone number?  Can you say, DUUHH!?

 

Spy Satellite

We’ve all head the news about the satellite that’s going to make reentry some day soon.  They say it’s a spy satellite and that it contains hazardous materials.  I don’t know what that tells most people, but to me, even the term “spy satellite” says, “nuclear power on board”.  So, is that uranium or plutonium?  I guess it would have been too much trouble to go and either refuel the bird’s rockets, or at least remove the fissionable material?

 

Government is a source of insecurity

There are some aspects of security the government is and should be responsible for. But when you give the government too much “responsibility” (power) it becomes a source of insecurity. Guns are probably the example most of my readers will readily identify with. The government has a need for weapons but it must never have a monopoly on weapons. To do so would change the fundamental relationship between a free people and their government.

Information is a weapon as well. Giving the government too much information puts innocent people at risk. Read IBM and the Holocaust or for a hint read my Jews in the Attic Test and think about it a little bit.

Here we get still another glimpse of why governments collecting data on people is risky:

Here’s an ugly prediction that you can take to the bank: as the amount of data that the feds collect on innocent civilians grows, so will the number of people who are victims of crimes that were made possible by unauthorized access to a government database. I’m not just talking about identity theft, though that is a huge danger with Real ID, but violent crimes as well. As I explained in the OneDOJ post linked above, this prediction is just Metcalfe’s Law at work:

This is, of course, a fundamental problem inherent in the very nature of any massive, centralized government data-sharing plan that spans multiple agencies and connects untold numbers of state and federal law enforcement officers: the usefulness of such a system to any one individual (a white hat or a black hat) grows roughly with the square of the number of participants who are using it to share data (Metcalfe’s law). So the more white hats that any of these programs manage to connect to each other, the more useful the network as a whole will be to the small handful of black hats who gain access to it at any point.

There is another ugly prediction you can take to the bank when these incidents happen: The politicians will always propose solutions that involve more money and more power being handed over to the government.

First they came for the gun owners

Sebastian tells us about a Random Conversation About Fingerprinting. A woman (who happens to be very anti-gun) doesn’t want to get her fingerprints taken just so she can be a crossing guard near a school. Sebastian compares it to gun owners exercising constitutionally guaranteed rights having to submit fingerprints first. Which leads to his observation:

What goes around, comes around. You can’t expect to empower the state to take away liberty from people you find undesirable, and then expect the state to respect your liberty when you end up in the cross hairs. When you find yourself in that situation, the people who’s liberties have already been trampled on may not be sympathetic enough to help you.

Of course this reminded me of the famous Niemoller quote and I mentioned it in the comments and figured that will be the end of it. But then commenter ParatrooperJJ says the FBI just checks the fingerprints and discards them after they come back clean. That set off my alarms because just a few days ago this came out:

FBI effort will build biggest biometric database

The FBI is embarking on a $1 billion effort to build the world’s largest computer database of peoples’ physical characteristics, a project that would give the government unprecedented abilities to identify individuals in the United States and abroad.

Digital images of faces, fingerprints and palm patterns are flowing into FBI systems in a climate-controlled, secure basement here.

Next month, the FBI intends to award a 10-year contract that would significantly expand the amount and kinds of biometric information it receives.

And in the coming years, law enforcement authorities around the world will be able to rely on iris patterns, face-shape data, scars and perhaps even the unique ways people walk and talk to solve crimes and identify criminals and terrorists.

The FBI will also retain, upon request by employers, the fingerprints of employees who have undergone criminal background checks so the employers can be notified if employees have brushes with the law.

If the technology exists it will be used, data obtained will be kept, used, and abused. The features will creep into areas that were promised would never happen. Remember that NICS records were supposed to be destroyed and then Janet Reno kept them for “audit purposes”. Then they used those “audit records” to see if suspected terrorists had purchased firearms. My SS card says “FOR SOCIAL SECURITY AND TAX PURPOSES–NOT FOR IDENTIFICATION”. None of my childrens SS cards have any such markings. It used to be something like a $10K fine if anyone tried to use your SSN for anything other than tax purposes. No so anymore.

We are creating all the mechanisms necessary for an effective police state. Remember what Milton Friedman said.

Taking it to the limit

There are some very interesting questions brought up by David Levy’s book, Love and Sex With Robots: The Evolution of Human-Robot Relationships (see also Programmed for love). Suppose robots get so human like they are practically indistinguishable from humans in their interactions? What if they are anatomically correct enough to have sex with without you being able to easily detect they are not human?

That’s thought provoking enough but the really interesting questions are what this means to the concept of marriage fidelity as the technology is taken to the limit:

  • If you have sex with such a robot is it “cheating”?
  • Does it depend on whether you knew it was a robot or not?
  • If it is considered cheating whether you knew it was a robot or not, then is it “cheating” when a person has sex with an “adult toy” of today?
  • If it is considered cheating to have sex with the human like robot, but it’s not considered cheating to have sex with an adult toy of today’s technology then at what point in the sophistication of the technology does it become cheating?
  • If it is not considered cheating if it was a robot then what is the basis for making that distinction? Is it just because one comes with a warranty and has parts that are dishwasher safe?
  • What if certain parts of the robot are actually from human donors? How many parts need to be human before it’s not considered a robot? Or how many artificial replacement parts must a human have before they are considered a robot?
  • If it is not considered cheating if it was a robot, you think it is a robot at the time, what happens if you find out later it was not a robot?
  • If it is not considered cheating if it was a robot, you think it is a human at the time, what happens if you find out later it was a robot?

Of course all these questions will have to be answered on a case by case basis by the humans and robots involved but my interest is in the basis of how people will make these decisions. I find it all wonderfully entertaining.

Okay, so there are two full auto toys I might like to have

Full auto, recoilless, 12 gauge shotgun.

It has 20 and 32 round magazines available. I especially like the new ammo. Does Wal-Mart have the HE rounds in stock yet?

The other full auto that I would be interested in is this one.

Thanks to Joe D. on the Lewiston Pistol Club discussion list for the pointer.

Interesting questions

From Sitemeter, “can a fingerprint be recovered from a fired shell casing”? My guess is yes, at least under some circumstances. DNA from the oils left behind should be possible too.

The more interesting question is, “Who’s asking?” Is it someone on the criminal side or on the law enforcement side?

Domain Name relyonmedia.com ? (Commercial)
IP Address 204.213.246.# (Sprint)
ISP Sprint
Location
Continent  : North America
Country  : United States  (Facts)
State  : Massachusetts
City  : Easthampton
Lat/Long  : 42.2903, -72.6404 (Map)
Distance  : 2,177 miles
Language English (U.S.)
en-us
Operating System Microsoft Windows Server 2003
Browser Internet Explorer 6.0
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2;
Javascript version 1.3
Monitor
Resolution  :  1024 x 768
Color Depth  :  16 bits

Time of Visit Dec 28 2007 8:02:07 amLast Page View Dec 28 2007 8:02:07 amVisit Length 0 secondsPage Views 1Referring URL http://www.google.co…a fired shell casingSearch Engine google.comSearch Words can a fingerprint be recovered from a fired shell casingVisit Entry Page https://blog.joehuffman.org/2005/01/16/ballistic-fingerprinting-fails/ Visit Exit Page https://blog.joehuffman.org/2005/01/16/ballistic-fingerprinting-fails/ Out Click  Time Zone UTC-5:00Visitor’s Time Dec 28 2007 11:02:07 amVisit Number 225,800

The free market is a wonderful thing

The little guys try harder:

In what’s likely to be seen as a privacy-friendly move, IAC Search & Media’s Ask.com search engine Tuesday announced a new feature called AskEraser that deletes a user’s search activity data from the company’s servers.

When enabled by the user, the feature will completely delete search queries and associated cookie information from Ask.com servers — including IP addresses, user IDs, session IDs and the text of queries made, according to the company. In most cases, the deletion will take place within a few hours of the time a search is completed, the company said.

What’s bizarre is that some people want government involvement in something where the big concern is government involvement to begin with:

Ask.com has also said that it will also retain user search data in cases where it is required by law to do so, according to Chester. Formal legal requests for search data will continue to be honored, even if AskEraser is enabled.

As a result, Chester argued that Ask.com still hasn’t fully addressed consumer privacy concerns.

“Some privacy advocates will suggest that this announcement shows the ‘market’ is working,” he said. “No doubt, that’s what Google and the other online advertisers opposed to a serious privacy policy will echo, whispering it to regulators, lawmakers and journalists. That’s why a national privacy policy is required.”

Running on empty makes the news

I reported the other day that I was very, very busy at work and was putting in some very long hours on weekends and evenings/nights/early-mornings. They’ve been telling us it’s really important to get these changes done soon, we can’t miss this deadline, etc., etc. It’s not that I doubted that, but it’s interesting when aspects of the project my officemate and I have been spending unreal hours working on (she worked all day on her birthday this last Sunday) make the news.

To my Program Manager and Dev Lead who have been expressing concern; Yes, we will be code complete by Friday. There will probably still be bugs which won’t be fixed for week or two but the feature set will be there and working. Perhaps as early as tomorrow.

Bullet effects video

BulletFootage-5000.wmv (3.27 MB)

I wish I had a camera that would take video like that of my boomers.

That watermelon is pretty cool though.

[Thanks to Joe D.]

Wireless, remote control cannon hit simulator

If you are into the battle reenactment scene Ozark Pyrotechnics, Inc. now has wireless Cannon Hit Simulation kits for sale.

This might be the way to realize one of my Boomershoot fantasies. That is where I mock the people unable to connect with targets using their rifles by pulling my iron sighted pistol from it’s holster and while standing popping off targets at 375 yards away.

Clever kids lacking judgment

Clever trick–hacking a soda machine. But they qualify for an Insufficiently Myelinated Award for posting their faces along with their criminal acts.

[Via Bruce.]

Kip Hawley slap down

Nice. The TSA is a joke. Kip Hawley is the head of the TSA. He says airport security is good. Investigators do what I have been saying could be done. Hawley tries to put a spin on it in front of congress and gets slapped down:

Investigators used public information to make a liquid bomb consisting of a detonator and a liquid explosive. They made a firebomb using two common products.

To absolute silence in the hearing room, the investigators screened video footage showing tests of their homemade bombs. One clip showed the device exploding inside a car — metal flying, glass shattering, car doors buckling open and a voice, off camera, saying, “Oh!”

The investigators then designed ways to sneak the components past screeners.

The airports tested were kept classified.

The GAO recommended improvements in personnel, processes and technology; more aggressive pat-downs; and possible restrictions on carry-on luggage.

“Current policies allowing substantial carry-on luggage and related items through TSA checkpoints” increase the risk of a terrorist bringing an improvised explosive device or improvised incendiary device onto a plane, the report said.

Hawley downplayed the tests, arguing first that the components did not get on the plane. “It did get on the plane,” countered Gregory Kutz of the GAO.

Hawley then contended that the components the GAO smuggled were not the ones used in the video footage. The GAO’s Cooney corrected him.

Hawley also noted that GAO investigators did not smuggle a complete bomb past the checkpoint. Cooney, seated beside him, said: “We could simply have gone into the lavatory and constructed it there.”

They don’t arrive at the proper conclusion but they are getting the proper data–which is a start.

Hushmail whispers your secrets

If you thought your secrets were safe with Hushmail you were wrong:

Hushmail, a longtime provider of encrypted web-based email, markets itself by saying that “not even a Hushmail employee with access to our servers can read your encrypted e-mail, since each message is uniquely encoded before it leaves your computer.”

But it turns out that statement seems not to apply to individuals targeted by government agencies that are able to convince a Canadian court to serve a court order on the company.

There are methods to communicate securely (guaranteed at the theoretical level) provided your attacker never gets physical access to your computer or someone doesn’t hand over the encryption keys. It’s just that it’s very, very inconvenient to do so. There are some intermediate difficulty of use methods which are secure as long as your attacker doesn’t have millions to spend on cracking your messages. I have been wanting to implement that for a long time but always seem to find something more important to do.

One of my main reasons for not working on the problem is that I can’t guarantee “no physical access” to my computer. So it’s just doesn’t have much point. That is probably always going to be the weak link. I don’t have any secrets on my computer or in my communication that need to be kept that secure but its sort of like owning firearms that certain people in government don’t want you to have and reading banned books. “You don’t want me to have it? Then that means I must have it.”

Big brother is always watching

Just a gentle reminder that everything you say on the Internet is read by big brother. Case in point: my post comparing ATF agents to Special Olympics participants got the attention of the DOJ:

Domain Name   usdoj.gov ? (United States Government)
IP Address   149.101.1.# (US Dept of Justice)
ISP   US Dept of Justice
Location  
Continent  :  North America
Country  :  United States  (Facts)
State  :  Maryland
City  :  Potomac
Lat/Long  :  39.023, -77.1993 (Map)
Distance  :  2,059 miles
Language   English (United States)
en-us
Operating System   Microsoft WinXP
Browser   Internet Explorer 6.0
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; DOJ3jx7bf; .NET CLR 1.1.4322; InfoPath.1; .NET CLR 2.0.50727)
Javascript   version 1.3
Monitor  

Resolution  :  1024 x 768
Color Depth  :  32 bits

Time of Visit   Nov 13 2007 1:14:06 pm
Last Page View   Nov 13 2007 1:14:06 pm
Visit Length   0 seconds
Page Views   1
Referring URL http://www.google.co…i&btnG=Google Search
Search Engine google.com
Search Words ben cornali
Visit Entry Page   http://blog.joehuffm…DoToDeserveThis.aspx
Visit Exit Page   http://blog.joehuffm…DoToDeserveThis.aspx
Out Click    
Time Zone   UTC-5:00
Visitor’s Time   Nov 13 2007 4:14:06 pm
Visit Number   210,121

Redefining privacy

Uncle points us to this article:

Privacy no longer can mean anonymity, says Donald Kerr, the principal deputy director of national intelligence. Instead, it should mean that government and businesses properly safeguard people’s private communications and financial information.

[…]

Mark Klein, a retired AT&T technician, helped connect a device in 2003 that he says diverted and copied onto a government supercomputer every call, e-mail, and Internet site access on AT&T lines.

Side note: I heard of such a device from a friend in 2000.

I’ve gotten into debates with people that insisted we just needed “appropriate regulations with regards to the collection and use of personal information”. I expect Kerr, at best, would claim regulation should be in place and would protect us from the harm that might come from government abuse. That people can believe such outrageous fantasies is so mind boggling to me that I have difficulty articulating my case through my anger.

Let me put this as simply and calmly as I can. If the government has access to information that can be abused, no matter what “regulations” are in place, it will be abused. Just two quick examples; 1) Census data, supposedly “sealed” for 72 years was used by the FBI to track down “enemy aliens and foreign nationals who might be dangerous”. People of Japanese, Italian, and German descent were put in internment camps based on “sealed” information. 2) Brady records were required to be destroyed if the gun buyer passed the NCIS check. They weren’t. They were kept for at least a year “for audit purposes”. I told one gun rights leader that I thought the gun rights community should make it an issue to make sure these records were destroyed. He told me that it wasn’t that important because even if they existed they couldn’t be used in a court of law because they were “legally destroyed” even if they weren’t physically destroyed. After 9-11 those records were used to find “terrorist suspects” that might own guns. People who bought guns were found and their homes searched because those records existed. Gun owners screamed bloody-murder and the gun grabbers insisted it was entirely appropriate that the law be ignored.

A few days ago I finished listening to the book IBM and the Holocaust. Read that book and you’ll give strong consideration to being on a back-packing trip deep in the woods when the next census is done. Information is power, tremendous power. When the German “Police Battalions” moved in behind the army to “maintain order” they had lists of every Jew in the area. You couldn’t say you didn’t have any children because they knew from the census a few months or years before that you did have them. They had birth and death records, they knew who lived in which house in which town. And they were able to murder “vermin” by the millions because they had those lists.

For Kerr to say we should “redefine privacy” is an even more inflammatory statement to me than some gun grabbing politician saying they want all the guns turned in. Even if I don’t have my guns I have a chance of hiding my “Jews in the Attic“. But if I can’t buy them food or obtain medical care for them anonymously they are toast (sick pun intended).

I have yet to hear someone give me, despite my insistence they “put something on the table” to discuss, concrete examples of regulations they think would protect people from government abuse of such data. No one has ever done so. It’s always been, “those are details that need to be worked out”. I suspect Mr. Kerr is no different. In practical terms there are no regulations that will ever exist that would be adequate.

From a purely hypothetical view point I would be willing to compromise on a set of regulations that probably would be adequate but would violate several articles of the Bill of Rights and probably inspire new rights to be articulated in further amendments to our constitution. I’d explain here but you really don’t want to know how creative I am in defending this essential piece of liberty.

Hence, since there will be no practical regulations that will protect such data collections we must not allow such data to be gathered in the first place. And the data that is gathered must be of suspect quality. You and I, as liberty and freedom loving people, have a duty to withhold and corrupt as much of this data as we can. And Mr. Kerr should get a one-way ticket on a fence rail, naked, tarred, and feathered, to North Korea, Cuba, or some other police state. [See my follow up post.]

Update: I forgot to mention another important (because I was there and heard it with my own ears) example. While working for the government laboratory PNNL I had fellow “scientist” (he had a degree in computer science and was working in “cyber security” but was unable to write a computer program) Newton Brown tell another co-worker and I, “See this badge?  This means the law doesn’t apply to us.” That is the mindset of some of those in government. And for all practical purposes Newton is correct.