1. Field of the Invention
This invention relates to devices whose misuse may discomfort, harm or otherwise violate the legal rights of a person, and more specifically to a safeguard system for ensuring device operation in conformance with governing laws.
2. Description of the Related Art
As technology advances, new devices are being constantly developed that provide great capability to interact with people. The sophisitcation of these devices allows them to be highly intrusive and push the envelop of what use conforms with the governing law and what use violates the legal rights of a person or persons. In many circumstances, these devices may provide a very valuable service or function to the military, law enforcement, medical community or the person themselves. However, concerns that the devices may be intentionally, negligently or accidentally misused and violate the legal rights of a person may curtail the use of such devices. Companies or countries may choose not to adopt the devices based on these concerns. Laws may be targeted at preventing the production and use of such devices or complicated and costly controls may be required. To further complicate matters, the legal and appropriate use of such devices may change with circumstances.
Raytheon Missile Systems is currently developing an ‘active denial system’ that uses a directed energy weapon to transmit a nonlethal millimeter wave beam of electromagnetic energy. The beam penetrates a person's skin to about 1/64 of an inch and has the effect of rapidly heating a person's body temperature to about 130° F. causing a very painful sensation within a few seconds of exposure. The weapon has been demonstrated to be highly effective to disperse crowds of people or individuals without causing permanent pain or harming the people in any way. The weapon provides an alternative to doing nothing, using conventional crowd control techniques that endanger US forces and risk escalation or using harmful or lethal force. However, there are serious concerns regarding the potential misuse of such a weapon that would violate the human or legal rights of people. For example, the weapon could be used in an area, at a time or at a threat level that does not warrant its use. The operator may use the weapon to deliver too much energy or to illuminate too wide an area. Furthermore, the weapon might fall into the wrong hands of those who may use it indiscriminately. The active denial system represents a great advancement in weapons technology and the possibility to be a very effective and humane weapon if the concerns regarding misuse can be addressed.
Advances in surveillance technology are providing law enforcement with a much improved and expanded capability to conduct surveillance on people (or their property) in their homes, cars, on the street or in airports. This technology may prove to be very useful in investigating criminal activity and preventing terrorists attacks. However, the technology raises questions of privacy rights, what constitutes a search and what types of surveillance techniques are justified with a warrant. General advancements in technology provide for standard audio and video surveillance from much greater distances. Furthermore, advances in imaging technology provide for IR imaging of heat signatures, wall penetrating and clothing penetrating systems, and RF imaging that can be considerably more invasive of a person's privacy or body. If these technologies cannot be implemented in a manner that guarantees that people's legal and civil rights will be protected, it is possible that the use of such technology will be banned or highly restricted.
The conflict between exploiting the benefits of new technology while ensuring people's legal rights will grow as technology advances in the areas of weapons and surveillance systems as well as public safety or health care for example. There is a need for a sophisticated safeguard system that can ensure use of the device in conformance with the governing laws based on the applicable and changing circumstances.
The present invention provides a safeguard system for ensuring device operation in conformance with governing laws for devices whose misuse may discomfort, harm or otherwise violate the legal rights of a person.
This is accomplished with a safeguard system that implements a legal protocol for using the device(s) in conformance with the governing laws. The legal protocol is defined by rules embodying the laws that govern the use of the device and require as inputs an authorization to use the device and input condition(s) relating to at least one of a use of the device, an attribute of a human target of the device and an operational environment of the device and human target. The system may include means for updating the rules from an external and possibly remote source. An authorization system provides the authorization to use the device. Authorization may require a chain of authorization including possibly remote authorization and may be multi-valued to provide different levels of authorization for using the device. The input condition related to the use of the device may, for example, be the current requested use of the device or a past use. The attribute of the human target may, for example, be the location, movement, persistence, identity, physical condition or an effect of the past use of the device on the human target. The operational environment may, for example, be the location of the device, a zone of use for the device, a time of requested use, a movement of the device or an urgency level. A variety of sensors are deployed and coupled to the safeguard system to provide the sensed input conditions. The safeguard system applies the rules to the authorization and input condition(s) to generate a control signal that ensure the device is used in conformance with the legal protocol. The control signal may simply enable/disable the device for the requested use or may configure the device so that its use conforms to the legal protocol. The safeguard system suitably includes a documentation system that records the authorization, input condition(s) applied rules, control signal and a sensed effect on the human target, which may include means for communicating the documentation to a remote location. The safeguard system also suitably includes rules for detecting tampering and for taking remedial action.
In an embodiment, the safeguard system is employed to control a directed energy weapon adapted to illuminate human targets with a directed energy beam. The beam penetrates and rapidly heats a person's skin causing them to flee the path of the beam. The rules are configured to embody, for example, the international, US, and military laws and local rules of engagement for the use of the directed energy weapon. The requested use of the device would, for example, specify a desired effect on the target. The operational environment may determine the requested zone of use and the existing threat level in that zone. The human attributes are of particular importance when considering whether use of the directed energy weapon is merited. The sensed conditions can determine how many targets are in the zone, are they moving toward a protected area, are they armed, have they been recently exposed to the beam and so forth. Whether use of the weapon is justified at all and if so at what energy level under the legal protocol will vary with the input conditions and possibly the authorization. For example, a general may have greater authority than a captain or the general may receive higher authorization by requesting remote authorization up the chain of command. A documentation system suitably records the requested use, authorization(s), input condition(s), applied rules, the control signal and the measured effect of the beam on the targets and may transmit the records to a remote location.
In another embodiment, the safeguard system is employed to control one or more surveillance devices that are used to monitor a target such as a person, a person's home or property or a specified location. The sophistication of current surveillance devices has led to uses that constitute warrantless searches that invade people's privacy and impede lawful investigations and criminal prosecutions. The safeguard system ensures that the surveillance devices conform to the governing laws and any specific court orders. For example, a court order may require certain police offers to conduct the surveillance and specify surveillance only at a specific location and day/time with certain devices. The order may also require a certain condition precedent such as the identification of a particular person(s) before using certain equipment. GPS, time and video sensors can gather this data which is then documented to verify that the court order was followed.
These and other features and advantages of the invention will be apparent to those skilled in the art from the following detailed description of preferred embodiments, taken together with the accompanying drawings, in which:
a-5b are examples of International and US laws, respectively that might govern the use of a directed energy weapon;
a-6b are a flowchart and an example of the application of one subset of rules for the directed energy weapon problem;
a and 7b are an example of authorization to use the weapon and possible authorization levels;
a-8c are examples of input conditions for the operating environment, human attributes and device use, respectively;
a-10b are diagrams illustrating conformance of the weapon's use to a zone of use;
The present invention describes a safeguard system for ensuring device operation in conformance with governing laws for devices whose illegal misuse may discomfort, harm or otherwise violate the legal rights of a person. The safeguard system will allow such devices to be used effectively in military, law enforcement, public safety, medical and other situations in which concerns over misuse may otherwise prevent their adoption. The safeguard system may be retrofitted to or integrated with weapons systems such as a directed energy weapon, shoulder launched missiles, missiles, bombs, weapons of mass destruction or land mines, surveillance systems including visible, IR, wall penetrating or RF imaging and medical devices that dispense drugs or provide other services.
As illustrated in
As illustrated in
An embodiment of safeguard system 40 includes an authorization system 42 that generates the authorization 43, a memory (storage circuit) 45 that stores the rules 10, at least one input relating to the requested use 46 of the device or a past use 47, a sensed attribute 48 of a human target of the device and a sensed operational environment 50 of the device and human target, and a controller 52 (evaluation circuit) that applies the rules 10 to the authorization 43 and input condition(s) 46,48, 50 to generate a control signal 54 that controls the device 42 in conformance with the legal protocol. In this embodiment, a memory and controller are used to store and implement the rules. In another embodiment the rules could be embodied in, for example, a logic circuit.
The control signal may be used to enable/disable the device or to configure it for an allowable use. In the case of a specific requested use, control signal 54 either enables or disables the device for the requested use. The enable/disable is depicted as a switch 56 at the output of device 42. In other instances, the enable/disable function can be integrated inside the device or may occur at multiple places to enable/disable different features of the device. A display 57 may be included as part of the system to facilitate operator I/O and to display messages that accompany control signal 54. If the requested use is not allowed and the device is disabled, the displayed message may explain why the use was not allowed and/or suggest a use that conforms to the legal protocol. Alternately, the system and rules may be configured to output an allowable or ‘optimal’ use of the device given the authorization and input condition(s). In this case, control signal 54 would include the parameters required to configure the device for the allowed or optimal use. The former approach allows an operator to request a use for the device based on different factors and verify whether the requested use conforms to the legal protocol. The latter approach allows the system itself to automatically determine an allowed and possibly optimal use under the circumstances.
Authorization system 42 provides authorization 43 for some operating entity to use the device in accordance with the rules and other input conditions. The operating entity is typically a person, maybe the human target, but the device could be configured to operate autonomously. The requested or attempted use of the device will suitably prompt the authorization system to request authorization. The authorization itself may be a single authorization by a person operating the device or directing another person to operate the device or it may be a chain of authorizations some of which may be requested and received from a remote location. Authorization may be a simple binary yes or no or it may be multi-valued providing for different levels of authorization. Local authorization may be obtained by manual entry of a code or via biometric sensors. Remote authorization may be obtained via a transceiver 58 and RF antenna 60 or over a wired or wireless Internet connection. This remote communication capability may also be used to update the rules 10 stored in memory 45 or to modify the authorization codes or levels in the rules.
The safeguard system via display 57 or other operator I/O may allow the operator to enter data on input conditions that might effect the decision on whether to enable/disable the device. This provides for some flexibility that only a human operator can provide; information for a disabled sensor or verification of sensed conditions. The system may also provide for a manual override in urgent situations.
The safeguard system may also include sensors 62 and 64 located on the device and safeguard system, respectively, and rules for detecting tampering and taking remedial action. If someone tries to tamper with the device or safeguard system or to disable the safeguard system the sensors would provide an input to the controller. The rules could than cause the device to be temporally or permanently disabled, to self-destruct and/or to transmit a message regarding the tampering. Furthermore, the rules may be written in such a way as to detect other forms of tampering or misuse. For example, if the device is expected to remain stationary and it starts moving without proper authorization, the rules may detect this as tampering.
To ensure public confidence and to protect the operator, an important additional feature of the safeguard system is a documentation system 70. The documentation system preferably records each requested use of the device and stores the data so that it cannot be destroyed or altered. As each use is recorded or at periodic intervals, the documentation may be transmitted via transceiver 58 and antenna 60 to a remote location. The system suitably records each requested use, the authorization(s), input condition(s), applied rules, control signal and any sensed effect on the human target. The documentation provides a complete record illustrating the use of the device in conformance with the legal protocol.
A safeguard system for use with a non-lethal directed energy weapon is illustrated in
Ordinarily the peacekeepers would have three choices, all of them bad. First, they could continue to observe and do nothing. Second, they could put themselves physically between the warring factions and try to hold the crowd at bay, which places the peace keepers at great risk. Thirdly, they could use deadly force to push back the crowd. However, the use of deadly force may not be authorized by their charter and specifically not justified at this point. A directed energy weapon 106 mounted on a humvee 108 provides a fourth and better option. The directed energy weapon transmits a directed energy beam 110 that penetrates the skin of anybody in its path causing their skin to get very hot very quickly. The crowd will disperse and return to their part of the city without suffering permanent harm, putting the peacekeepers at risk or risking escalation of the confrontation with either the peacekeepers or the rival faction. Other embassies 111 near by would have their coordinates protected and the system would not be allowed to fire at them.
Although the directed energy weapon is well suited for this scenario there is considerable potential for actual or alleged misuse. To achieve their mission it is important that the peace keepers treat both sides fairly in fact and in perception and be able to document this fair treatment. The directed energy weapon in normal operation leaves no visible evidence of use and thus it could be used improperly with no evidence or people could allege the weapon was used improperly when it wasn't. The directed energy beam is a very powerful weapon that if used on a person for too long or at too high a power could possibly injure the person. Furthermore, in any UN peacekeeping mission the applicable laws and rules of engagement for the use of force, particularly a ‘ray gun’, may be quite complex. Who is authorized to use the weapon? Where can the weapon be used? Under what circumstances is use justified? What energy levels are allowed? The possibility that an operator may accidentally, negligently or intentionally misuse the weapon under such complex and changing circumstances is a real and valid concern. The likelihood that the peace keepers will be accused of misusing the weapon is also a real concern. Both have presented considerable obstacles to the adoption of the directed energy weapon.
A safeguard system 112 in accordance with the present invention can be retrofitted to existing weapons or incorporated into the weapon and carried on the humvee 108. The safeguard system will automatically ensure that the weapon is used in conformance with the legal protocol and governing laws for the peacekeeping mission and that all instances of its use are securely documented.
In this one scenario a number of different factors will determine the rules and how those rules are applied under the circumstances. The rules must embody international law and any rules of engagement that may have been adopted for this particular mission. For example, the ‘rule of proportionality’ under international law calls for a reasonable relationship between the amount of destruction caused and the military significance of the attack. The rules of engagement may specify that the first shot must be at the lowest energy level, e.g. a ‘warning shot’, may limit the areas in which the weapon can be used, the times of day, the minimum or maximum size of a crowd, require that the crowd be within a certain range and moving towards a protected area, be armed, place a limit on total energy exposure to any one person or many other circumstances. The rules may require a soldier of a certain rank to operate the weapon and may only allow higher ranking soldier's to use the weapon at higher energy levels, to manually override the safeguard controls, or to use the weapon in certain sensitive areas.
The architects of the rules for the safeguard system for use with a directed energy weapon will have to synthesize all of these laws and inputs into a set of hierarchical rules that govern the use of the weapon. These rules would be legally vetted to ensure that if they are followed they use of the weapon conforms to the governing laws. For example, representing the ‘rule of proportionality’ as a rule or set of rules that can be automatically executed by a computer or logic circuit under varying battlefield conditions requires certain decisions to be made, e.g. what threat justifies what beam energy? A general set of rules that conforms weapons use to international and US law may be stored in each weapon and additional rules for a given conflict uploaded as the rules are generated and the weapon is deployed. At a minimum, the rules embody the laws that govern the use of that weapon and require as inputs an authorization and at least one sensed attribute of a human target to assess whether use of the weapon is merited. The safeguard system will not allow the weapon to be fired without proper authorization and without some condition of the human target(s) be it temperature, range, movement etc.
An embodiment of a safeguard system 112 integrated with a directed energy weapon 106 is illustrated in
In this configuration, safeguard system 112 receives an authorization and sensed conditions for at least one attribute of the target and possibly the operating environment and applies the rules to those inputs to generate control signals that control the pulse length and/or beam size input to the transmitter. The system can be configured to either generate control signals 124 and 126 that enable/disable ‘switches’ 128 and 130, respectively. If the switches are enabled, the transmitter fires beam 110. If the switches are disabled, the transmitter does not fire. Alternately, the system can be configured to output reconfigured parameters (effect on target, beam size) 132 to ensure that the beam 110 conforms to rules under the present circumstances.
Safeguard system 112 includes an evaluation logic circuit 134 that implements the rules embodying the laws governing the use of the directed energy weapon. The circuit receives requested weapon parameters (effect on target, beam size) 135, an authorization 136 from an authorization system 138 and sensed conditions 140 from one or more sensors 142 and applies those input to the logic to generate the control signals. The circuit verifies all necessary authorization, assures particular targets are not subjected to improper energy levels and prevents use in authorized areas all under varying circumstances. The circuit assures that the authorizations, input parameters, sensed conditions etc. are passed to a documentation system 144 that logs and transmits the data via a communication link 146 to a remote location for safekeeping.
Authorization system 138 may include means 148 for the operator to manually enter a code or means 150 to authorize the operator using a biometric trigger. In either case, the system verifies the operator against codes or names stored in the system to generate the authorization 136. The authorization can be a simple yes/no or it can be a multi-valued authorization that gives certain operators greater authorization to use the weapon than others. The authorization may be a single step or may require one or more persons (or computers) in the chain of command for a valid authorization. A communication link 152 can be used to request and receive proper authorization.
Sensors 142 include, for example, an IR sensor 154, a laser range finder 156 and a video camera 158 that are configured to sense attributes of the human target and, for example, a GPS sensor 160 and angle (azimuth/elevation) sensors 162 that are configured to sense conditions of the operating environment. Other sensors such as Identify Friend or Foe (IFF), RF sensors, etc. could also be incorporated. Processing algorithms 164 are then applied to the raw sensor data to extract relevant information and put it in a format for input as sensed conditions 140 to the evaluation logic circuit. For example, IR data can be processed to extract a peak skin temperature for a given target or temperatures for multiple targets. A specific range to a given target, the motion of a target and the location of a target relative to a zone of use can be extracted from the range data. Background level, target movement, estimated range, potential targets, target persistence in the field of view, targets that are carrying weapons, and aim point data can be extracted from the video signal. The GPS, angle and range information can define a very specific zone of use that allows for very tight control over the weapon. In some cases, the rules may be configured to only allow the weapon to be used within the defined zone. The evaluation logic circuit 134 applies the rules to some or all of this sensed information to generate the control signals. The rules may be configured to enable/disable the weapon if certain sensors are not functioning or if conflicting information is being report. Alternately, if the authorization is sufficiently high, the rules may allow the weapon to be fired even in the face of sensor dropout or conflicting information.
The information may also be directed to a display 166 for viewing by the operator 170. The safeguard system may be fully automated or may allow or even require an operator to assess displayed sensor information and make certain observations or decisions to augment or verify the sensed conditions input to the logic circuit and the documented record. For example, the operator may have to enter a military objection and some brief description of the situation. The display may present a menu of options for the operator to select to ensure that the military objection is in a format compatible with the rules. The operator may have to estimate the number of targets, ratio of combatants to civilians, number of armed targets from the video, if this cannot be done algorithmically. If a sensor is not working and its input is required to enable the weapon, a properly authorized operator may be allowed to observe and enter the condition. In an extreme case, the conditions may warrant using the weapon to deliver lethal force. In such a case, the legal protocol may require a highly authorized officer to verify some or all of these conditions. The allowed use of force may change with ‘threat level’. The threat level could be determined by an external source or authority and communicated to the circuit, the sensor data could be synthesized to assign a threat level or the operating officer could be charged with providing and/or verifying the threat level. The system may allow a properly authorized operator to manually override 172 the safeguards and fire the weapon. The system may limit the total energy per shot or the number of shots under a manual override condition. Any manual override is also passed through the logic circuit to the documentation system. The system also assures that the weapon is rendered either temporally or permanent inoperable if the system is tampered with, improperly used or falls into the hands of unauthorized operators. A self-destruct mechanism 174 can be controlled by an authorized operator, the logic circuit, tamper switches on the weapon or safeguard system or remotely.
For purposes of illustration, we will walk through representative international and US laws, authorization, sensed conditions, an exemplary application of a subset of rules and the documentation another simple scenario for the use of the battle field weapon as shown in
As shown in
The laws and rules of engagement for the use of a directed energy weapon must be broken down into a sequence of steps or rules to be implemented by a computer or logic circuit. Any number of different programming techniques could be used to construct a set of rules to implement the governing laws. A simplified flowchart of a possible approach is illustrated in
At this point the safeguard system has determined whether the weapon is located in an authorized area and the operator is authorized for the requested use. The next step is to gather the sensed input conditions from the various target sensors to determine whether the proposed use of the weapon is legal justified by the circumstances. In this particular embodiment, the safeguard system uses the sensed input conditions 198 of attributes of the human targets (
A simple example 199 of the application of the rules is illustrated in
a and 10b illustrate how the weapon's authorized fire pattern 201 and 202 can be controlled to an authorized zone of use 203 defined by its GPS coordinates. In the example shown in
As shown in
The safeguard system is provided with a set of rules that define any general laws for the city, state or country for each surveillance device and any specific rules such as provided in a warrant or court order for this particular surveillance. For example, the warrant may require two named police officers be present and authorized to use the equipment. The warrant may specify a particular address (zone of use) and minimum distance from the home (range). The warrant may further specify that surveillance can only occur at certain times of day for all or certain equipment, only if the target is at home, only on the curtilage 224 around the home or upon some condition precedent, e.g. the presence of another named target. The authorization system can be configured to recognize biometric IDs of the two officers and require that the biometric ID be updated every hour. A GPS sensor 226 can provide coordinates to verify the target address and possibly the range between the sensors and home. A clock 228 can provide the day and time. The safeguard system can use the surveillance devices themselves as sensors to provide sensed input conditions to verify if the target is at home or if a condition precedent has occurred. The safeguard system will then either enable/disable or configure each surveillance device in accordance with the rules and sensed conditions to execute the warrant. As before, the authorization, sensed conditions, applied rules and information gathered by the devices is recorded to provide documentation that the surveillance devices were used in accordance with the governing laws and any warrant.
As shown in
The safeguard system 300 is configured as before to include any general or state laws that govern the dispensing of prescription drugs and the specific pills. The customer's doctor transmits the prescription and a patient authorization via the Internet, wireless or a wired network to a communication link 312 coupled to the safeguard system. The customer provides some form of authorization, e.g. a code or preferably a biometric, that is checked against the authorization on the prescription. The system could require the patient to bring the prescription and scan it in to double-check against the prescription sent by the doctor. If these match, the safeguard system checks the prescription against the rules to make sure the prescription conforms to the laws and possibly any medical guidelines for dispensing prescription drugs. If everything checks out, the customer pays for the prescription and the machine dispenses the pills. The safeguard system records the transaction.
While several illustrative embodiments of the invention have been shown and described, numerous variations and alternate embodiments will occur to those skilled in the art. Such variations and alternate embodiments are contemplated, and can be made without departing from the spirit and scope of the invention as defined in the appended claims.