Methods and apparatus for a public area defense system

ABSTRACT

A public area defense system, comprising a non-lethal reactive deterrence defense subsystem, an optical subsystem operably coupled to and in communication with the non-lethal reactive deterrence defense subsystem, and an acoustic subsystem operably coupled to and in communication with the non-lethal reactive deterrence defense subsystem. The public area defense system may further comprise a computer system in communication with each of the non-lethal reactive deterrence defense subsystem, the optical subsystem, and the acoustic subsystem, wherein each of the non-lethal reactive deterrence defense subsystem, the optical subsystem, and the acoustic subsystem are operable to interact with an actor

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of pending U.S. Non-Provisionalpatent application Ser. No. 16/691,559, filed Nov. 21, 2019, which isincorporated herein in its entirety by reference. application Ser. No.16/691,559 claims the benefit of expired U.S. Provisional PatentApplication 62/770,567, filed Nov. 21, 2018, which is incorporatedherein in its entirety by reference. application Ser. No. 16/691,559also claims the benefit of expired Provisional Patent Application62/797,443, filed Jan. 18, 2019, which is incorporated herein in itsentirety by reference.

BACKGROUND

In the last several years, there has been a large increase in the numberof mass casualty events around the world. These include terroristattacks, school shootings, church shootings, shootings at public eventssuch as concerts and gatherings, and other acts of public violence. Suchacts are difficult to defend against and may result in many injuries andfatalities.

Current active denial systems are extremely large and consume largeamounts of power. Each such system can only be transported in the backof a vehicle. Further, the systems would require approximately 15 hoursto heat to operating temperature and the temperature would then berequired to be maintained with a high level of precision. The principalpurpose of the systems was to affect crowd dispersal.

The inventor has developed a system of deterrence on an individual leveland of defending public spaces, including schools, churches, theaters,cafeterias, libraries, shops, laboratories, indoor and outdoorauditoriums, gymnasiums, and other public gathering locations forchildren and adults.

SUMMARY OF THE INVENTION

Methods and apparatus are disclosed herein for a building defense andprotection system that is intended to prevent or limit violence or harmto innocent individuals. A public area defense system, comprising anon-lethal reactive deterrence defense subsystem, an optical subsystemoperably coupled to and in communication with the non-lethal reactivedeterrence defense subsystem, and an acoustic subsystem operably coupledto and in communication with the non-lethal reactive deterrence defensesubsystem. The public area defense system may further comprise acomputer subsystem in communication with each of the non-lethal reactivedeterrence defense subsystem, the optical subsystem, and the acousticsubsystem, wherein each of the non-lethal reactive deterrence defensesubsystem, the optical subsystem, and the acoustic subsystem is operableto interact with an actor in advance of a violent attack or at leastduring the earliest possible phases in the escalation of an argument orunprovoked aggression culminating in violent actions.

Further, a method of deterring an actor in a public area is disclosed.The method may comprise receiving at least one of an optical datathrough an optical subsystem and an acoustic data through an acousticsubsystem. The method may further comprise sending the at least one ofan optical data and an acoustic data to a computer system. The methodmay further comprise receiving, at a computer system, the at least oneof an optical data and an acoustic data. Further, the method maycomprise processing the at least one of an optical data and an acousticdata. The method may also comprise determining, at a computer, a threatlevel to the public area by the at least one of an optical data and anacoustic data to the public area. Determining may comprise comparing theat least one of an optical data and an acoustic data to known opticaldata and known acoustic data stored in a database accessible by thecomputer system. Determining may further comprise recognizing anymatches between the at least one of an optical data and an acoustic dataand the known optical data and the known acoustic data stored in thedatabase accessible by the computer system. Determining may furthercomprise assigning a first threat level to the matches of the at leastone of an optical data and an acoustic data based on the recognizedmatches. The method may further comprise determining an appropriateresponse based on at least one of the first threat level or the secondthreat level, and upon determining the appropriate response, sending aninstruction, by the computer system, the instruction containing theappropriate response, to at least one of the acoustic subsystem and anon-lethal reactive deterrence subsystem to carry out the instruction.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a public area defense system.

FIG. 2 comprises a further illustration of the public area defensesystem.

FIG. 3 illustrates a further embodiment of the public area defensesystem.

FIGS. 4A-4C illustrate a detailed view of a metamaterial opticalbeam-steering layer.

FIG. 5 illustrates a flow chart of certain aspects of the method ofusing the public area defense system.

FIG. 6 illustrates a flow chart of certain aspects of the method ofusing the public area defense system.

FIG. 7 illustrates a flow chart of certain aspects of the method ofusing the public area defense system.

FIG. 8 illustrates a flow chart of certain aspects of the method ofusing the public area defense system.

FIG. 9 illustrates a flow chart of certain aspects of the method ofusing the public area defense system.

FIG. 10 illustrates a flow chart of certain aspects of the method ofusing the public area defense system.

FIG. 11 illustrates a flow chart of certain aspects of the method ofusing the public area defense system.

DETAILED DESCRIPTION OF THE DRAWINGS

A first embodiment of the public area defense system is referred to inFIG. 1 . FIG. 1 illustrates a defense system 100. Defense system 100 mayact to deter an actor 110. Actor 110 may pose some type of threat to apopulation. The threat could be violent in nature. Actor 110 may referto multiple actors in multiple locations within the public area.

Defense system 100 may comprise several subsystems that act incooperation to deter actor 110. Defense system 100 may comprise anoptical subsystem 120. Optical subsystem 120 may comprise a beam-steerer122. The beam-steerer 122 may be operable to steer the transmitted andreceived infrared beams. It will be understood that the term “beam” asused herein can refer to a beam of energy. The beam of energy may be awave, such as a millimeter wave. The beam-steerer 122 may comprise ametamaterial and may be operable to steer and direct incoming beams, aswill be explained herein below.

Optical subsystem 120 may further comprise a beam-former 126 operablycoupled with the beam-steerer 122. The beam-former may be operable toform and shape incoming beams of light or energy to a detector 130operably coupled with the beam-former 126 and beam-steerer 122. Thebeam-former 126 may comprise a metamaterial. The beam-former 126 mayreceive a signal from a control driver subsystem 200. The signal may bean electrical signal, which may change the metamaterial, causing thebeam-former 126 to form and shape a beam in a specific manner.

The beam-former 126 may, in some embodiments, be combined with thebeam-steerer 122 as integrated metamaterials in the optical subsystem120. In some embodiments, where the beam-former is not present, thedetector 130 may be operably coupled directly to the beam-steerer 122.

The optical beam-steerer 122 may comprise a metamaterial layer. In oneembodiment, the metamaterial layer may comprise a gold-coated silicondioxide layer on a silicon substrate, as illustrated in FIGS. 4A-4C. Themetamaterials may comprise different materials in different embodiments.FIG. 4A illustrates metamaterial layer 500. Metamaterial layer 500 maycomprise a silicone substrate 510. The silicone substrate 510 may beoverlaid by a vanadium dioxide layer 520. The vanadium dioxide layer 520may be overlaid by a silicon dioxide layer 530. The silicon dioxidelayer 530 may be overlaid by a gold coating 540. The gold coating 540may contain an array of apertures 550. Each aperture in the array ofapertures 550 may be in a cross-shaped form, as illustrated. FIG. 4Billustrates wave 580 intersecting gold coating 540 and array ofapertures 550. FIG. 4B further illustrates deflected wave 590 beingdeflected from the metamaterial layer 500. Cross member 570 isillustrated in expanded view in FIG. 4C. FIG. 4C illustrates anelectrical current 600 in the silicon dioxide layer 530 around theaperture 570 on the underside of the gold coating 540 may cause incidentwave 580 to be deflected as deflected wave 590 of FIG. 4B, so as to benormal to the optical detector 130 as it exits the silicon substrate510.

The beam-steerer 122 may be operable to receive incoming beams of lightor energy 121 The beam-steerer 122 may direct the optical beam 121 uponreceiving a signal from the control driver subsystem 200. The signal maybe an electrical signal which may cause the metamaterial to change andsteer the beam in a specific direction. The optical beam 121 maycomprise an image or video of the face or hands of actor 110 as a resultof threatening voice or weapon action detected and classified by thecomputer subsystem 175, as will be explained herein below.

The optical image received by the beam-steerer 122 may be deflected bythe azimuth and elevation angles of the beam-steerer 122 by anelectrical current 600 in the silicon dioxide layer 530 under the goldcoating 540. The deflection angle can be up to +/−90 degrees such thatthe deflected optical image beam 590 is normal to the optical detector130, as described in “New Metamaterial Paves Way for TerahertzTechnologies”, Matthew Chin, under Professor Mona Jarrahi, UCLA HenrySamueli School of Engineering and Applied Science, Science+Technology,Oct. 21, 2016, which is incorporated herein by reference.

Optical subsystem 120 may be used to capture and receive images in andaround a public space, including images of actor 110. The opticalsubsystem 120 may be in communication with other subsystems mentionedherein below, as will be explained later.

The optical detector 130 may comprise ultra-low-noise complimentarymetal-oxide-semiconductor (CMOS) devices with ISOs equal to or greaterthan 100,000 and followed by event-based, analog, neuromorphic imageprocessing for faster and more cost-effective analysis by the computersubsystem 175. The optical detectors 120 and processors and associatedsoftware within the computer subsystem 175 may be event-based software.This may comprise using each pixel of light collected to only reportwhat it sees when it senses a significant change in its field of view,thereby reducing the amount of redundant data transmitted by a sensorand saving processing power, bandwidth, memory, and energy.

The detector 130 and the beam-steerer 122 are each in communication withthe control driver subsystem 200 and receive inputs from the controldriver subsystem 200. The inputs received direct the orientation of theincoming incident optical beam 121 into the beam-steerer 122, enablingthe capture of optical images of interest by the optical detector 130.

The control driver subsystem 200 may comprise multiple control drivers.At least one of the multiple control drivers may be in respectivecommunication with each of the following: detectors 130 andbeam-steerers 122 to operate in an event-driven manner, which willincrease the scan rate of the optical subsystem 120. In someembodiments, this may result in more frequent scans of an area or personof interest, such as for example, actor 110.

Further, the control driver subsystem 200 may be in communication with abeam-steering computer 190. The beam-steering computer 190 may receiveinputs from the computer subsystem 175. These inputs may compriseinformation regarding the position of actor 110. The position of actor110 may comprise a geocoded location of actor 110. The beam-steeringcomputer 190 may be operable to receive the information from thecomputer subsystem 175 and may be operably coupled thereto. Further, thebeam-steering computer may be operable to subsequently process theinformation received from the computer subsystem into a form suitable toprovide instruction to the control driver subsystem 200. The commandsmay result in one or both of the detectors 130 and/or the beam-steerers122 changing orientations or adjusting in order to be in a position tocapture optical images of interest, including images of actor(s) 110.Other images of interest may include the surroundings of the area,objects such as weapons, other nearby actors or people of interest.

The control driver subsystem 200 may also be in direct communicationwith the computer subsystem 175. The computer subsystem 175 may provideinformation to the control driver subsystem 200 so as to prioritizetarget actors 110, their hands, and less frequent full-sector scans bythe optical subsystem to detect any new events.

Further the optical subsystem 120 may be in communication with imageprocessor 180. The optical subsystem 120 may transmit, through atransmitter, images captured by the detector 130 to the image processor180 in the computer subsystem 175. The image processor 120 may beoperable to process and configure the data received into variousformats. The image processor 120 may be analog and neuromorphic, i.e.using large-scale integration systems containing electronic analogcircuits to mimic neuro-biological architectures present in the nervoussystem. In further embodiments, the image processor may be incommunication with the computer subsystem 175. The image processor 180is operable to transmit, through a transmitter, the processed data fromthe image processor 180 to the computer subsystem 175. The computer 175may comprise a processor a memory, transmitters, receivers,transceivers, and a database 270. Defense system 100 may furthercomprise a non-lethal reactive deterrence (NLRD) subsystem 140. The NLRDsubsystem 140 may be operably coupled to the control driver subsystem200 and may comprise a beam-steerer 142. NLRD subsystem 140 may furthercomprise a beam-former 146 that may be operably coupled with thebeam-steerer 142, all of which may include metamaterials to reduce size,weight, power and cost at the operating frequency of approximately 95GHz in the W-band. The NLRD subsystem 140 may further comprise a source150 that may be operably coupled with the beam-former 146. The NLRDsubsystem 140 may produce a transmitted beam of energy 141 that isnon-lethal in nature. The beam of energy 141 may be directed to actor110. The beam of energy may further be directed to a specific region ofactor 110's body, such as the face, the chest, the arms, the right orleft hand, or other area of actor 110's body. The beam of energy 141 mayfurther cause actor 110 to experience pain in the region of actor 110'sbody affected by the beam of energy 141. Upon contact from the beam ofenergy 141 to the specific region of actor 110's body, actor 110 mayexperience pain in the form of extreme heat or other sharp and intensepain. In some embodiments, the NLRD subsystem 140 may produce andreproduce the beam of energy 141 one time for a period of 0.5 to 1.0second or multiple times per second or multiple times over a period ofseconds or minutes, depending upon the responses of actor 110, with thebeam of energy 141 being sustained for any length of time between 0.1second and 1 second. In further embodiments, the NLRD subsystem 140 mayproduce the beam of energy 141 for longer time spans, such as for 1second, 1.5 seconds, 2 seconds, or for any amount of time therebetweendetermined through clinical trials to be effective without causingpermanent injuries and as legally authorized by government authoritieswith jurisdiction. In further embodiments, the beam of energy 141 may besustained for longer than 2 seconds. The beam of energy 141 may bedirected or targeted to different regions of actor 110's body. The paincaused in actor 110 by the beam of energy 141 may cause actor 110 tocease whatever activity actor 110 is participating in. Further, it maycause actor 110 to retreat to an area designated by defense system 100.Further, the NLRD subsystem 140 may continue to produce the beam ofenergy 141 in order to maintain the retreated position of actor 110.

The beam-steerer 142 may comprise a metamaterial layer similar tobeam-steerer 122 but reversed in the direction that energy flows. Themetamaterial layer may be a vanadium dioxide layer coated with goldhaving a plurality of cross-shaped apertures, all on a siliconsubstrate. The metamaterial layer comprising the beam-steerer 142 may beany other composite materials functioning in a similar manner. Thebeam-steerer 142 acts to direct the beam of energy 141 to a desiredlocation. The beam-steerer 142 may be in communication with the controldrivers 200, which may be operable to provide instruction and directionas to where the beam of energy 141 should be directed. The metamateriallayer of the beam-steerer 142 may then be adjusted in order to directthe beam of energy 141 in the desired direction.

The beam-former 146 may comprise a metamaterial layer. The metamaterialbeam-former 146 layer may comprise gold or graphene metal-coatings overvanadium dioxide on a silicon substrate to couple to the source 150 andto the beam-steerer 142. The metamaterial layer comprising thebeam-former 146 may be any other composite materials functioning in asimilar manner. The beam-former 146 may be in communication with thecontrol drivers 200, which may be operable to provide instruction anddirection as to where the beam of energy 141 should be directed and theintensity of the beam.

The beam-former 146 may be operable to form the beam of energy 141 in aform specified by the computer subsystem 175 via the control drivers200. The beam-former 146 may form the beam of energy 141 such that beam141 is a focused beam capable of being directed at a specific portion ofactor 110's body.

The source and power amplifier 150 may comprise a MIMIC's array of GaNpower amplifiers conditioned by a metamaterial output network. The poweramplifier 150 may comprise gallium nitride, or other series 3 and series5 elements such as, for example, aluminum and indium. The source maycomprise a solid-state device operating in the W-band at approximately95 GHz. In other embodiments, the source may comprise a solid-statedevice operating in a range from 90-100 GHz or any frequency approved bya government with jurisdiction to produce reactive deterrence painwithout permanent injury or death. The source may, for example, comprisepower transistors. This may result in a solid-state device beingoperable to produce a FET source output of 20 Watts/MM of gate width.Such a production is adequate to produce the beam necessary to deteractor 110 from actions with negative consequences by, for example,directing a beam resulting in ½ to 1 watt per square centimeter at thetarget for ½ second to 1 second. The target may comprise the body ofactor 110 or, more particularly, the face of actor 110. The NLRD 140subsystem may further be capable of creating, forming and steering abeam at other intensities for different durations.

The metamaterials used for the source 150 may be used to condition theoutput, compare and shift phase of individual power amplifier elements,and trap spurious harmonics to maximize the power added efficiency ofthe NLRD power amplifier. The metamaterials may comprise concentricsplit-ring oscillators to trap first and third harmonics and send theenergy back to the amplifier input to improve efficiency. This isfurther described in provisional application 62/797,443 filed on Jan.28, 2019, which is incorporated herein in its entirety by reference.

The beam-steerer 142, the beam-former 146, and the source 150 may eachbe in communication with the control driver subsystem 200. The controldriver subsystem 200 may be operable to provide direction, input, andsignals received from the beam-steering computer 190 and the computersubsystem 175.

Defense system 100 may further comprise an acoustic subsystem 160.Acoustic subsystem 160 may comprise a beam-steerer 162. Acousticsubsystem 160 may further comprise a beam-former 166 that may beoperably coupled with the beam-steerer 162. Acoustic subsystem 160 mayfurther comprise a source/detector 170 that may be operably coupled withbeam-former 166. The acoustic subsystem 160 may act to receive incomingaudio information 161 a. The incoming audio information 161 a maycomprise audio from actor 110, other individuals in the area, or otheraudible noise from the area such as weapon discharges from firearms orexplosive devices. Further, the acoustic subsystem 160 may act to sendaudio signals 161 b in the form of speech from a text-to-speech computer210, which is explained in further detail herein below. Thetext-to-speech computer 210 may be operably coupled with the computersubsystem 175. Audio signals 161 b may comprise deterrent language,directions to the actor 110, information regarding the arrival of localauthorities, and other information.

The beam-steerer 162 may comprise a metamaterial layer. The metamateriallayer may comprise metals such as gold, aluminum, aerogel, plastics andgraphene of various types and geometrical shapes to steer and focus thedesired frequencies while blocking or absorbing unwanted frequencies.The metamaterial beam-steerer 162 points a narrow receiving beam 161 aat the actor 110 of interest. By directing the beam to center on thetarget actor 110, the signal-to-noise ratio for the desired acousticactor may be optimized.

The beam-former 166 may comprise a metamaterial layer. The metamateriallayer may comprise metals, plastics and graphene of various types andgeometrical shapes with cavities and shapes to optimize the specialgeometry of the receiving or projected acoustic beam to maximize thesignal-to-noise ratio. The beam-steerer 162 may receive a signal from acontrol driver, and the signal, such as an electrical signal, may causethe metamaterial to change the form of an outgoing or incoming beam. Thebeam may act to direct the audio signals 161 b to the necessarylocation, typically towards the head of actor 110. The narrowtransmitter acoustic beam is well-confined to the narrow beam and cannotbe heard throughout the area as would be the case with a standardloudspeaker. The use of such a confined beam enables the public areadefense system to be used in outdoor public areas without disturbingother parties living, working or just passing nearby.

The metamaterial layer may attenuate certain frequencies of sounds. Thismay result in varying the width of an acoustic beam, depending on thepurpose during various phases of interaction with the actor 110. A verybroad beam, such as 180 degrees in azimuthal coverage and to 45 degreesin elevation may be produced, which may then be narrowed to only a fewdegrees to focus on a particular location or person, such as actor 110.

The source/detector 170 may comprise a layer having sources anddetectors next to each other. The sources may comprise metamaterials inthe form of composite piezoelectric crystals. The detectors of thesource/detector 170 may comprise metamaterials in the form ofpiezoelectric arrays. Upon receiving a signal, the source/detector mayproduce a beam of energy used to capture or to send an acoustic signal.

The beam-steerer 162, the beam-former 166, and the source/detector 170may each be in communication with the control driver subsystem 200. Thecontrol driver subsystem 200 may be operable to provide directionreceived from the artificial intelligence subsystem 230 to thesource/detector 170, the beam-former 166, and the beam-steerer 162regarding their respective functions.

Additionally, the acoustic subsystem 160 may be in communication withacoustic processor 220 and with text-to-speech computer 210. Theacoustic subsystem 160 may transmit information received via theincoming audio information 161 a, through a transmitter, to the acousticprocessor 220. The acoustic processor 220 may be operable to process theinformation received and transmit that information, through atransmitter, to the computer subsystem 175 for processing and decisionmaking.

The text-to-speech computer 210 may contain a memory and a processor.The text-to-speech computer 210 may be operable to receive informationin the form of text from the computer subsystem 175. The text-to-speechcomputer 210 may further be operable to convert the information intoaudio signals in the form of speech in any language and dialect desiredor other specific sound, as required. The text-to-speech computer 210may further be operable to transmit the converted information to theacoustic subsystem 160. The beam-steerer 162, the beam-former 166, andthe source 170, receiving information and direction from the controldriver subsystem 200 and the text-to-speech subsystem 210, may beoperable to produce and transmit beam 161 b, providing furtherdeterrence and direction to actor 110.

Additionally, all hardware may be contained or camouflaged behind acommon piece of equipment, such as, for example, a message board, or anaudio-visual system, either of which could be protected by bullet-proofglass. Furthermore, there may be multiple optical subsystems 120, NLRDsubsystems 140, and acoustic subsystems 160 placed throughout the publicspace, giving full coverage of the space and operating together toprovide the greatest deterrent effect. The entire defense system 100 maybe augmented with “safe zones” comprising small compartments designed toisolate one or more actors who have behaved in an aggressive manner thatthreatens the life or safety of innocent subjects within the publicarea. Safe zones may comprise many fixed or portable designs and mayinclude self-locking doors, bullet-proof walls, ventilation, two-waycommunications, and other features to secure a public area until lawenforcement consisting of competent security personnel can arrive andassume command of the area and the isolated actor(s) 110.

FIG. 2 illustrates a further embodiment of the computer subsystem 175.Specifically, the computer subsystem may comprise several subsystems forprocessing the data received from the optical subsystem 120 and theacoustic subsystem 160 and for processing and preparing instruction togo to the optical subsystem 120, the acoustic subsystem 160 and the NLRDsubsystem 140.

For example, the computer subsystem 175 may comprise an artificialintelligence subsystem 230. The artificial intelligence subsystem 230may be operable to receive data from the image processor 180 and theacoustic processor 160.

The artificial intelligence subsystem 230 may be operable to receive, ata receiver, inputs from various sources, including image processor 120,which may be neuromorphic, and acoustic processor 220. The artificialintelligence subsystem 230 may further be operable to receive inputsfrom machine learning subsystem 260 and from a database 270. Theartificial intelligence subsystem 230 may be operable to use the datareceived from the machine learning subsystem 260 and the database 270 toproduce accurate data to send to the reactive deterrence subsystem 190,the control drivers 200, and the text-to-speech computer 210.

The machine learning subsystem 260 may be operable to receive data fromthe artificial intelligence subsystem 230 and from database 270.Further, as will be explained hereinafter below, the machine learningsubsystem 260 may be operable to receive data from and send data to arecognition subsystem 280. The machine learning subsystem 260 may beoperable to use the data received to automate an analytic model of thepublic space and any developing situations, identify patterns, and makedecisions as to what course of action may be necessary for a giventhreat or situation.

The database 270 may be operable to send and receive information to andfrom the artificial intelligence subsystem 230 and the machine learningsubsystem 260. The database 270 may contain information regarding theidentity of actor 110, the identification of weapons, informationregarding the public space, and information regarding the firstresponders and other local law enforcement authorities from thecommunity in which the public space is located. Further the database 270may comprise information related to the actor 110's criminal andbehavioral history. Furthermore, the database 270 may be operable toreceive information from a deep learning subsystem 290.

The recognition subsystem 280 may be operable to receive informationfrom the machine learning subsystem 260. The recognition subsystem 280may further be operable to transmit information to the machine learningsubsystem 260. The machine learning subsystem 260 may provide therecognition subsystem 280 with information from the optical subsystem120 regarding images of faces or weapons or from the acoustic subsystem160 regarding voice imprints, spoken threats and intonation or acousticeffects of a discharging weapon or weapons associated with one or moreactors 110 or others in the public area. The recognition subsystem 280can act to identify the actor(s) 110 primarily through highly accuratevoice recognition or in some cases through facial recognition or moreaccurate 3D facial recognition from the optical subsystem 120. Facialrecognition as referred to in this application may include using nodalbiometrics that may be computed in three-dimensional space and maycomprise mapping facial vein patterns in 3d. The recognition subsystem280 may identify a weapon(s) using its database. The recognitionsubsystem 280 may further be operable to provide to or transmit to, viaa transmitter, the machine learning subsystem 260 the identity of theactor 110 and/or the weapon actor 110 is using.

The new weapons and subjects subsystem 250 may be in communication withand receive data from the machine learning subsystem 260. Thisinformation may comprise images of actor 110 or images of any weaponbeing used by actor 110. The new weapons and subjects module may beoperable to log the images and audio of the actor 110 and/or the weaponin actor's 110 possession. The new weapons and subjects subsystem 250may further be operable to provide the deep learning subsystem 290 withthe images and/or audio of the actor 110 and/or the weapon actor 110 isusing.

The deep learning subsystem 290 may be operable to receive theinformation from the new weapons and subjects subsystem 250. The deeplearning subsystem 290 may further be operable to process theinformation received to find new individuals, weapons, or behaviorpatterns of actors being observed. The deep learning subsystem 290 maybe operable to provide newly classified weapons or newly identifiedsubjects to the database 270.

After the artificial intelligence subsystem 230 has processed the datafrom the database 270 and the machine learning subsystem 260 regardingthe situation and the identity of actor 110 and any weapon which theactor 110 may possess or display, the artificial intelligence subsystem230 may provide a notification 295 to law enforcement and/or schoolauthorities with the information relevant to the situation according tocommunity law enforcement protocols and requirements of the owners oroperators of the defended public space (school, theater, church, etc.).

The subsystems contained herein may further comprise neural networkhardware, data storage, rechargeable battery back-up, local area networkand internet interfaces.

FIG. 3 illustrates a further embodiment of a public area defense system.

Defense system 300 may comprise several subsystems that act incooperation to deter actor 310. Defense system 300 may comprise anoptical Light Detection and Ranging (LiDAR) subsystem 320. Optical LiDARsystem 320 may comprise multiple LiDAR units, such as two LiDAR units,as shown in FIG. 3 . Optical LiDAR subsystem 320 may comprise one moremetamaterials layers 322 to steer the transmitted and received infraredbeams, which may be referred to as beam-steerer 322. Optical LiDARsubsystem 320 may further comprise a metamaterials beam-former 326operably coupled with the beam-steerer 322. The beam-former 326 may, insome embodiments, be combined with the beam-steerer 322 as integratedmetamaterials comprising the optical LiDAR subsystem 320. The opticalsubsystem 320 may further comprise a detector 330 operably coupled withthe beam-former 326 and beam-steerer 322.

The LiDAR optical subsystem 320 may be operable to form and steer thebeam 121 a according to the disclosure herein. Further, the LiDARoptical subsystem may be operable to receive, via the beam-steerer 322,incoming optical beam 121 b, which may comprise light reflected from atarget, such as actor 310. This may then be transmitted to the computersystem 375 for further processing.

The beam-steerer 322 may direct the outgoing optical LiDAR beam 321 adirectly at the face or hands of actor 310 that is targeted as a resultof threatening voice or weapon action detected and classified by theartificial intelligence subsystem 430 from data received from theacoustic processor 420 and optical dual LiDAR 320 subsystems. The LiDARoptical image received by the beam-steerer 322 may be deflected by theazimuth and elevation angles of the beam-steerer 322 by up to +/−90degrees such that the deflected optical image beam is normal to theoptical detector 330.

The public area defense system 300 may utilize one or two optical LiDARsubsystems 330 to perform functions such as 3D facial imaging for thepurpose of enhanced facial recognition through 3D imaging that producesmore accurate facial contours through coverings of beards, hair,glasses, hats, scarves and burkas and/or 3D mapping of veins from nearIR heat patterns measured from the reflected beams. The Optical LiDARsubsystem 320 may use metasurfaces similar to liquid crystals forbeam-steering by reflecting near infrared (NIR) laser beams such thatthe reflected beams subtend a set angle. For the public area defensesystem, two small LiDAR subsystems 320 may be employed to cover acomplete half cylinder in plan view so as to obtain imagery from allportions of a rectangular area such as a classroom, church sanctuary,laboratory, auditorium, gymnasium or corridor.

Optical LiDAR subsystem 320 may be used to capture and receive images inand around a public space, including images of actor 310. The opticalLiDAR subsystem 320 may be in communication with other subsystemsmentioned herein below, as will be explained later.

The optical detector 330 may comprise ultra-low-noise CMOS devices withISOs equal to or greater than 100,000 and followed by event-based analogneuromorphic image processing for faster and more cost-effectiveanalysis by the artificial intelligence subsystem 430. The opticaldetectors 320, artificial intelligence subsystem 430 and machinelearning subsystem 460 may utilize event based software as described inthis application

The detector 330 and the beam-steerer 322 are each in communication witha control driver subsystem 200 and receive inputs from the controldriver subsystem 400. The inputs received direct the orientation of thereceived incident optical beam 321 a into the beam-steerer 322, enablingthe capture of optical images of interest by the optical detector 330.

The control driver subsystem 400 may comprise multiple control drivers.At least one of the multiple control drivers may be in respectivecommunication with each of the following: detectors 330 andbeam-steerers 322 to operate in an event-driven mode that increases thescan rate of the dual LiDAR subsystems on targets that are moving whilescan rates of the whole sector are much less frequent.

Further, the control driver subsystem 400 may be in communication withthe reactive deterrence subsystem 390. The reactive deterrence subsystem390 may receive inputs from the artificial intelligence subsystem 430.These inputs may comprise information regarding the geocoded location ofactor 310 or multiple actors. The reactive deterrence subsystem 390 maybe operable to receive the information from the artificial intelligencesubsystem 430, and to subsequently process the information received intoa form suitable to provide instruction to the control driver subsystem400. The commands may result in one or both of the detectors 330 and/orthe beam-steerers 322 changing orientations or adjusting in order to bein a position to capture optical images of interest, including images ofactor 310. Other images of interest may include the surroundings of thearea, objects such as weapons, other nearby actors or people ofinterest. The artificial intelligence subsystem 430 may control the timeeach of the two LiDAR subsystems are focused on the actor 310 versus onthe task of change detection to record any new events.

The control driver subsystem 400 may also be in direct communicationwith the artificial intelligence subsystem 430. The artificialintelligence subsystem 430 may provide information to the control driversubsystem 400 so as to prioritize target actors 310, their hands, andless frequent full-sector scans to detect any new events.

The optical dual LiDAR subsystem 320 may transmit images captured by thedetectors 330 to the image processor 320 in the computer subsystem 375.The image processor 320 is operable to process and configure the datareceived into various formats. The LiDAR image processor 320 may beanalog and neuromorphic. In further embodiments, the LiDAR imageprocessor 320 may be in communication with the artificial intelligencesubsystem 430.

The artificial intelligence subsystem 430 may be operable to receive, ata receiver, inputs from various sources, including image processor 320.which may be neuromorphic, and acoustic processor 420, as will bedescribed hereinafter below. The artificial intelligence subsystem 430may further be operable to receive inputs from machine learningsubsystem 460 and from a database 470. The artificial intelligencesubsystem 430 may be operable to use the data received from the machinelearning subsystem 460 and the database 470 to produce accurate data tosend to the reactive deterrence subsystem 390, the control drivers 400,and the text-to-speech computer 410, as will be explained hereinafterbelow.

The machine learning subsystem 460 may be operable to receive data fromthe artificial intelligence subsystem 430 and from database 470.Further, as will be explained hereinafter below, the machine learningsubsystem 460 may be operable to receive and send data from and to arecognition subsystem 480, as will be explained hereinafter below. Themachine learning subsystem 460 may be operable to use the data receivedto automate an analytic model of the public space and any developingsituations, identify patterns, and make decisions as to what course ofaction may be necessary for a given threat or situation.

The database 470 may be operable to send and receive information to andfrom the artificial intelligence subsystem 430 and the machine learningsubsystem 460. The database 470 may contain information regarding theidentify of actor 310, the identification of weapons, informationregarding the public space, and information regarding the firstresponders and other local law enforcement authorities from thecommunity in which the public space is located. Further, the database470 may comprise information related to the actor 310's criminal andbehavioral history. Furthermore, the database 470 may be operable toreceive information from a deep learning subsystem 490.

The recognition subsystem 480 may be operable to receive informationfrom the machine learning subsystem 460. The recognition subsystem 480may further be operable to transmit information to the machine learningsubsystem 460. The machine learning subsystem 460 may provide therecognition subsystem 480 with information from the dual LiDAR opticalsubsystem 320 regarding images of faces or weapons or from the acousticsubsystem 360 regarding voice imprints, spoken threats and intonation oracoustic effects of a discharging weapon or weapons associated with oneor more actors 310 or others in the public area. The recognitionsubsystem 480 can act to identify the actor(s) 310 primarily throughhighly accurate voice recognition or in some cases through facialrecognition or more accurate 3D facial recognition from the dual LiDARoptical subsystem 320. The recognition subsystem 480 may identify aweapon(s) using its database. The recognition subsystem 480 may furtherbe operable to provide to or transmit to, via a transmitter, the machinelearning subsystem 460 the identity of the actor(s) 310 and/or theweapon actor 310 is using.

The new weapons and subjects subsystem 450 may be in communication withand receive data from the machine learning subsystem 460. Thisinformation may comprise images of actor 310 or images of any weaponbeing used by actor 310. The new weapons and subjects module may beoperable to log the images and audio of the actor 310 and/or images ofthe weapon in actor's 310 possession. The new weapons and subjectssubsystem 450 may further be operable to provide the deep learningsubsystem 490 with the images and/or audio of the actor 310 and/or theweapon actor 310 is using.

The deep learning subsystem 490 may be operable to receive theinformation from the new weapons and subjects subsystem 450. The deeplearning subsystem 490 may further be operable to process theinformation received to find new individuals, weapons, or behaviorpatterns of actors being observed. The deep learning subsystem 490 maybe operable to provide newly classified weapons or newly identifiedsubjects to the database 470.

After the artificial intelligence subsystem 430 has processed the datafrom the database 470 and the machine learning subsystem 460 regardingthe situation and the identity of actor 310 and any weapon which theactor 310 may possess or display, the artificial intelligence subsystem430 may provide a notification 300 to law enforcement and/or schoolauthorities with the information relevant to the situation according tocommunity law enforcement protocols and requirements of the owners oroperators of the defended public space (school, theater, church, etc.).

Reactive deterrence subsystem 390 may be operable to process andtranslate inputs from the artificial intelligence subsystem 430 intoexecutable instructions. The reactive deterrence subsystem 390 controlsNLRD subsystem 340. NLRD subsystem 340 may further comprise a source andamplifier 350 that may be operably coupled to a beam-former 346. Thebeam-former 346 may be operably coupled to a beam-steerer 342. Each ofthese members of the NLRD subsystem 340 may comprise metamaterials toreduce size, weight, power and cost at the operating frequency ofapproximately 95 GHz in the W-band.

The NLRD subsystem 340 may produce a transmitted beam of energy 341 thatis non-lethal in nature. The beam of energy may be directed to actor310. The beam of energy may further be directed to a specific region ofactor 310's body, such as the face, the chest, the arms, the right orleft hand, or other area of actor 310's body. The beam of energy 341 mayfurther cause actor 310 to experience pain in the region of actor 310'sbody affected by the beam of energy 341. Upon contact from the beam ofenergy 341 to the specific region of actor 310's body, actor 310 mayexperience pain in the form of extreme heat or other sharp and intensepain. In some embodiments, the NLRD subsystem 340 may produce the beamof energy 341 one time for a period of 0.5 to 1.0 second or multipletimes over a period of seconds or minutes, depending upon the responsesof actor 310. In further embodiments, the NLRD subsystem 340 may producethe beam of energy 341 for longer time spans, such as for 1 second, 1.5seconds, 2 seconds, or for any amount of time therebetween determinedthrough clinical trials to be effective without causing permanentinjuries and as legally authorized by government authorities withjurisdiction. In further embodiments, the beam of energy 341 may besustained for longer than 2 seconds. The beam of energy 341 may bedirected or targeted to different regions of actor 310's body. The paincaused in actor 310 by the beam of energy 341 may cause actor 310 tocease whatever activity actor 310 is participating in. Further, it maycause actor 310 to retreat to an area designated by defense system 300or the NLRD subsystem 340 may continue to produce the beam of energy 341in order to maintain the retreated position of actor 310.

The beam-steerer 342 may comprise a metamaterial layer which may be avanadium dioxide layer coated with gold having a plurality ofcross-shaped apertures, all on a silicon substrate. The metamateriallayer comprising the beam-steerer 342 may be any other compositematerials functioning in a similar manner. The beam-steerer 342 acts todirect the beam of energy 341 to a desired location. The beam-steerer342 may be in communication with the control drivers 400, which may beoperable to provide instruction and direction as to where the beam ofenergy 341 should be directed. The metamaterial layer of thebeam-steerer 342 may then be adjusted in order to direct the beam ofenergy 341 in the desired direction.

The beam-former 346 may comprise a metamaterial layer. The metamaterialbeam-former 346 layer may comprise gold or graphene metal-coatings overvanadium dioxide on a silicon substrate to couple to the source 350 andto the beam-steerer 342. The metamaterial layer comprising thebeam-former 346 may be any other composite materials functioning in asimilar manner. The beam-former 346 may be in communication with thecontrol drivers 400, which may be operable to provide instruction anddirection as to where the beam of energy 341 should be directed and theintensity of the beam.

The beam-former 346 may be operable to form the beam of energy 341 in aform specified by the reactive deterrence subsystem 390 via the controldrivers 400. The beam-former 346 may form the beam of energy 341 suchthat beam 341 is a focused beam capable of being directed at a specificportion of actor 310's body.

The source and power amplifier 350 may comprise a MIMIC's array of GaNpower amplifiers conditioned by a metamaterial output network. The poweramplifier 350 may comprise gallium nitride, or other series 3 and series5 elements such as, for example, aluminum and indium. The source maycomprise a solid-state device operating in the W-band at approximately95 GHz. In other embodiments, the source may comprise a solid-statedevice operating in a range from 90-100 GHz or any frequency approved bya government with jurisdiction to produce reactive deterrence painwithout permanent injury or death. Such a production is adequate toproduce the beam necessary to deter actor 310 from actions with negativeconsequences by, for example, directing a beam of ½ to 1 watt per squarecentimeter for ½ to 1 second at the face of actor 310. The reactivedeterrence subsystem 340 may further be capable of creating, forming andsteering a beam at other intensities for different durations.

The beam-steerer 342, the beam-former 346, and the source 350 may eachbe in communication with the control driver subsystem 400. The controldriver subsystem 400 may be operable to provide direction received fromthe reactive deterrence subsystem 390 and the artificial intelligencesubsystem 430.

The NLRD subsystem 390 may be operable to redirect its beams to anyadditional target within a near-hemispherical volume in less than onemicrosecond and may direct the beam to many targets in a matter ofseconds.

Defense system 300 may further comprise an acoustic subsystem 360.Acoustic subsystem 360 may comprise a beam-steerer 362. Acousticsubsystem 360 may further comprise a beam-former 366 that may beoperably coupled with the beam-steerer 362. Acoustic subsystem 360 mayfurther comprise a source/detector 370 that may be operably coupled withbeam-former 366. The acoustic subsystem 360 may act to receive incomingaudio information 361 a. The incoming audio information 361 a maycomprise audio from actor 310, other individuals in the area, or otheraudible noise from the area such as weapon discharges from firearms orexplosive devices. Further, the acoustic subsystem 360 may act to sendaudio signals 361 b in the form of speech from a Text-to-Speechprocessor 410. Audio signals 361 b may comprise deterrent language,directions to the actor 310, information regarding the arrival of localauthorities, and other information.

The beam-steerer 362 may comprise a metamaterial layer. The metamateriallayer may comprise metals such as gold, aluminum, aerogel, plastics andgraphene of various types and geometrical shapes to steer and focus thedesired frequencies while blocking or absorbing unwanted frequencies.The metamaterial beam-steerer 362 points a narrow receiving beam 361 aat the actor 310 of interest. By directing the beam to center on thetarget actor 310, the signal-to-noise ratio for the desired acousticactor is optimized.

The beam-former 366 may comprise a metamaterial layer. The metamateriallayer may comprise metals, plastics and graphene of various types andgeometrical shapes with cavities and shapes to optimize the specialgeometry of the receiving or projected acoustic beam to maximize thesignal-to-noise ratio. The beam-steerer 362 acts to direct the audiosignals 361 b to the necessary location, typically towards the head ofactor 310. The narrow transmitter acoustic beam is well-confined to thenarrow beam and cannot be heard throughout the area as would be the casewith a standard loudspeaker. The use of such a confined beam enables thepublic area defense system to be used in outdoor public areas withoutdisturbing other parties living, working or just passing nearby.

The source/detector 370 may comprise a layer having sources anddetectors next to each other. The sources may comprise metamaterials inthe form of composite piezoelectric crystals. The detectors of thesource/detector 370 may comprise metamaterials in the form ofpiezoelectric arrays.

The beam-steerer 362, the beam-former 366, and the source/detector 370may each be in communication with the control driver subsystem 400. Thecontrol driver subsystem 400 may be operable to provide directionreceived from the artificial intelligence subsystem 430 to thesource/detector 370, the beam-former 366, and the beam-steerer 362regarding their respective functions.

Additionally, the acoustic subsystem 360 may be in communication withacoustic processor 420 and with text-to-speech computer 410. Theacoustic subsystem 360 may transmit information received via theincoming audio information 361 a to the acoustic processor 420. Theacoustic processor 420 may be operable to process the informationreceived and transmit that information to the artificial intelligencesubsystem 430 for processing and decision making. The artificialintelligence subsystem 430, in connection with the database 470, themachine learning subsystem 460, the new weapons and subjects subsystem450, the deep learning subsystem 490, and the recognition subsystem 480will work to process the information from the acoustic subsystem 360 ina manner similar to the processing of the information from the opticalsubsystem 320.

The text-to-speech computer 410 may contain a memory and a processor.The text-to-speech computer 410 may be operable to receive informationin the form of text from the artificial intelligence subsystem 430. Thetext-to-speech computer 410 may further be operable to convert theinformation into audio signals in the form of speech in any language anddialect desired or other specific sound, as required. The text-to-speechcomputer 410 may further be operable to transmit the convertedinformation to the acoustic subsystem 360. The beam-steerer 362, thebeam-former 366, and the source 370, receiving information and directionfrom the control driver subsystem 400 and the text-to-speech subsystem410, may be operable to produce and transmit beam 361 b, providingfurther deterrence and direction to actor 310.

Additionally, all hardware may be contained or camouflaged behind acommon piece of equipment, such as, for example, a message board, or anaudio-visual system, either of which could be protected by bullet-proofglass. Furthermore, there may be multiple optical subsystems 320, NLRDsubsystems 340, and acoustic subsystems 360 placed throughout the publicspace, giving full coverage of the space and operating together toprovide the greatest deterrent effect. The entire defense system 300 maybe augmented with “safe zones” comprising small compartments designed toisolate one or more actors who have behaved in an aggressive manner thatthreatens the life or safety of innocent subjects within the publicarea. Safe zones may comprise many fixed or portable designs and mayinclude self-locking doors, bullet-proof walls, ventilation, two-waycommunications, and other features to secure a public area until lawenforcement consisting of competent security personnel can arrive andassume command of the area and the isolated actor(s) 310.

Methods of using the hardware and systems described herein below willnow be described in detail. Reference is made to various figurespreviously described herein.

A method of deterring an actor in a public area is described. The actormay be actor 110, as referred to in FIGS. 1-3 . As previously described,the actor 110 may refer to a single actor or multiple actors. The actor110 may be a violent or a disruptive person or persons. The actor 110may be interacting with other people or with property. Making referencenow to FIG. 5 , the method may comprise step 600, observing an acousticactivity within the public area. The observation referred to in step 600may comprise making an observation by an acoustic subsystem, such as theacoustic subsystems described previously herein.

The method may further comprise, as described in step 610, receiving anacoustic data at an acoustic subsystem. The acoustic input may compriseacoustic data. The acoustic data may comprise a recording of the noiseor sounds within the acoustic area. This may include a recording ofvoices, such as the voice of the actor or actors within the public area.The acoustic data may include conversations between several actors orpeople and may include any changes in volume or intonation of speech.The acoustic input or acoustic data may further include sounds producedby any weapon within the public area and any other sound produced withinthe public area.

The method may further comprise 620 sending the acoustic data from anacoustic subsystem. The acoustic data may be sent from the acousticsubsystem via wireless transmission, wired transmission, near fieldcommunication means, or other methods.

The method may further include 625 receiving at the computer subsystemthe acoustic data.

The method may further include, as indicated by 630 processing theacoustic data at acoustic processor within the computer subsystem.Processing the acoustic data at an acoustic processor may compriseconverting the received acoustic data into a form suitable for analysis,such as into digital form. The information may be zipped or sent in datapackets to maximize efficiency and speed of data transfer.

In certain embodiments the method may further include 640 determining ata computer subsystem, a threat level to the public area that ispresented by at least one of the optical data and the acoustic data.

In certain embodiments, determining a threat level to the public areafrom at least one of an optical data and acoustic data may comprise, asrepresented by 650 in FIG. 5 , comparing the acoustic data to knownacoustic data that is stored in a database within the computersubsystem. Comparing the acoustic data may comprise comparing voiceprints to voice prints stored in the database to known individuals.These known individuals may be individuals who are members of a certaingroup, such as a group that regularly uses the public area. Such a groupmay include school faculty, school students, members of a club that ownsor frequently uses the public area, members of a religious group thatowns or frequently uses the public area. The known voice prints may begathered by recording an individual's voice in a pre-arranged settingwhere the speakers identify themselves and provide their voice andfacial identification to the public area defense system. Alternatively,the voice prints may be recorded by the computer subsystem, using theacoustic subsystem as described in other embodiments, to record voices.The optical subsystem, as described herein, can be used to obtain avisual recording of the face of the person speaking the words, and thecomputer subsystem may associate a face with a voice print. The face andvoice print may then be stored in the database within the computersubsystem to recognize if a speaker is a regular attendee to the publicarea.

Further, the acoustic subsystem may gather acoustic data related to eachindividual having a voice print recorded in the database. For example,speech patterns and normal speaking volumes may be gathered by theacoustic subsystem and recorded in the database. This information maythen be used as a baseline in determining any deviations from normalbehavior when the computer subsystem is making a threat assessment instep 650 of FIG. 5 .

In further embodiments, the database may comprise acoustic data of knownthreats. For example, the database may contain voice prints of felons orsex offenders known in the area gathered from law enforcement. Further,the database may store individual voice prints and patterns in acousticdata, such as an individual's speech, words used, volume, andintonation, gathered by the acoustic subsystem. Further, the databasemay store words and phrases typically used in altercations.

Additionally, the computer subsystem may continue to add data andinformation, such as voice prints and patterns in acoustic data, such asan individual's speech, words used, volume, and intonation, to itsdatabase to constantly improve and broaden its voice recognition andpattern recognition in determining threats and making threatassessments.

Comparing acoustic data to known acoustic data as shown in 650 maycomprise the computer subsystem comparing voice prints to known voiceprints and comparing patterns in acoustic data, such as an individual'sspeech, words used, volume, and intonation. Further comparing acousticdata to known acoustic data may further comprise comparing conversationsbetween people to known conversational elements.

In certain embodiments, the method may further comprise step 660,recognizing any matches between voice prints and patterns in acousticdata, such as an individual's speech, words used, volume, and intonationwith information stored in the database. Recognizing any matches maycomprise 665, analyzing the data for a degree of similarity, such as forexample, a 50% match, 60% match, a 70% match, an 80% match, a 90% matchor a 100% match, or any percentage between these examples.

In certain embodiments the method may further comprise 700, recognizingany non-matches between acoustic data and known acoustic data. 700 andmethods associated with non-matching data will be discussed hereinbelow.

In certain embodiments, the method may further comprise step 670,assigning a first threat level based on the recognized match from 660and 665. Assigning the first threat level may comprise assigning athreat level based on the percentage match between observed acousticdata and acoustic data in the database. Assigning the first threat levelmay further comprise assigning a threat level based on who the threat iscoming from. For example, if the actor, or the speaker who is the sourceof the acoustic data, is a known bad actor, then the computer subsystemmay use this as a factor in assigning a threat level. In some instances,this could result in a higher threat level. Assigning the first threatlevel may further comprise considering prior history of assaults, weaponpossessions, threats, drug use, family instability, etc. All thesefactors may contribute to a higher threat level being assigned and alower tolerance of observed threats before acoustic and reactivedeterrence subsystem action may be taken.

Further, the method may comprise 680, determining an appropriateresponse to the threat, based on the first threat level as determinedand assigned in 670. The appropriate response will depend on the threatlevel, including who the actor is and if the actor has violent past or apropensity for violence or violent reactions or has social or familyrelationships known or suspected to cause anti-social or aggressivebehavior. The appropriate response may comprise an audio warning via analarm sound or specific audio instruction, such as, for example,instruction to cease and desist from the threatening behavior,instruction to move to another area, or instruction to go to adesignated safe zone. In further embodiments, the appropriate responsemay comprise using a system such as a non-lethal reactive deterrencesubsystem as previously described herein, to direct a beam of energy atan actor's body or face to stop the threatening behavior.

The method may further comprise 690, upon determining the appropriateresponse, sending instruction to at least one of a beam-steeringcomputer and to control drivers containing information regardingexecuting the appropriate response.

The method may further comprise 692, wherein at least one of the controldrivers and the beam-steering computer translate the instruction to atleast one executable command. The method may further comprise sendingthe at least one executable command to at least one of the acousticsubsystem and the non-lethal reactive deterrence subsystem (NLRD) toexecute the appropriate response. As described herein related to otherembodiments, the control drivers may provide executable commands to thesources, beam-steerers, and beam formers of various subsystems. Thebeam-steering computer provides instruction and direction to thebeam-steering metamaterials.

Further as herein related to other embodiments, the artificialintelligence subsystem may determine that designated law enforcement orsecurity personnel should be notified of an escalating interactioninvolving an actor or actors and consequently notify authorities.Alternatively or simultaneously, the artificial intelligence subsystemmay activate control drivers to send a request or instruction to anactor or actors via the acoustic subsystem, or to increase or decreaseframe rates of the actor or actors by the optical subsystem, or toactivate the reactive deterrence subsystem to direct and send a 95 GHzbeam at the face of an actor or at the hand of an actor holding aweapon.

The method may further comprise 694, sending the translated instructionor executable command to the at least one of the acoustic subsystem andthe NLRD executing the command according to the command received fromthe control driver. The method may further comprise 696 the at least oneof the acoustic subsystem and the NLRD executing the command accordingto the command received. This execution may comprise executing theappropriate response, which may comprise an audio warning via an alarmsound or specific audio instruction, such as, for example, instructionto cease and desist from the threatening behavior, instruction to moveto another area, or instruction to go to a designated safe zone. Infurther embodiments, the appropriate response may comprise sending usinga system such as a non-lethal reactive deterrence subsystem aspreviously described herein, to direct a beam of energy at an actor'sbody or face to stop the threatening behavior.

In further embodiments, the method of determining a threat level to thepublic area from an acoustic data may comprise further determining asecond threat level based on acoustic data. As illustrated in FIG. 6 ,the method may comprise receiving data as described in relation to FIG.5 . The method may further comprise, after comparing the receivedacoustic data to known acoustic data in the database, recognizingnon-matching acoustic data, as in step 700. Or, in other words, asdescribed herein, comparing received acoustic data to acoustic datafound in the database and recognizing any received acoustic data thatdoes not match stored acoustic data. Non-matching data may include voiceprint data that does not match any voice prints stored in the database,words or languages not recognized in the database, intonation and speechpatterns not recognized in the database, and other non-recognized data.

In certain embodiments, the method may comprise step 700, recognizingany non-matches between voice prints and patterns in acoustic data, suchas an individual's speech, words used, volume, and intonation withinformation stored in the database. Recognizing any non-matches maycomprise recognizing a degree of dissimilarity, such as for example, amatch between certain particular received acoustic data and storedacoustic data, such as voice prints, speech volume in context of theconversation and circumstances, speech intonation, language, and otherelements. The degree of dissimilarity may, in some embodiments, beexpressed as a percentage similarity, such as for example a similaritybetween received acoustic data and stored acoustic data less than a 70%match, less than a 60% match, less than a 50% match, less than a 40%match, less than a 30% match, less than a 20% match, less than a 10%match or any percentage between these exemplary examples.

Upon recognizing non-matching data, the computer subsystem may analyzethe non-matching data. Analyzing the non-matching acoustic data maycomprise analyzing the received acoustic data. For example, Analyzingthe non-matching acoustic data may lead to comparisons of otheravailable biometrics such as facial recognition based on nodaltwo-dimensional ratios for nodal pairs for various camera aspect angles.When the facial biometrics database and real-time camera subsystem bothuse active near-infrared 3D transmitters and receivers, nodal matchingin 3D can be more accurate and facial vein patterns can also be used toachieve far greater accuracies in identification matching which isapproximately as accurate as voice recognition biometrics.

In certain embodiments, the method may further comprise step 720,assigning a second threat level based on the analysis of thenon-matching data in 710. Assigning the second threat level may compriseassigning a threat level based on analyzing non-matching data todetermine the probability of a threat. Assigning the second threat levelmay further comprise assigning a threat level based on from whom thethreat is coming. For example, if the actor, or the speaker who is thesource of the acoustic data, is a known or a discovered bad actor, thenthe computer subsystem may use this as a factor in assigning a threatlevel. In some instances, this could result in a higher threat level.Assigning the second threat level may result in a faster deployment ofthe reactive deterrence subsystem's beam based on an artificialintelligence subsystem estimate of time-to-impact of an actor'saggressive action by use of a weapon or through striking a victim byhand or with some object. Non-lethal deterrence using the reactivedeterrence subsystem becomes the primary objective whenever theestimated time-to-impact is too short for the acoustic subsystem to senda command that is likely to prevent or delay the actor from taking athreatened action.

Further, the method may comprise 730, determining an appropriateresponse to the threat, based on the second threat level as determinedand assigned in 720. The appropriate response will depend on the threatlevel, possibly including who the actor is and if the actor has aviolent past or a propensity for violence or violent reactions. Theappropriate response may comprise an audio warning via an alarm sound orspecific audio instruction, such as, for example, instruction to ceaseand desist from the threatening behavior, instruction to move to anotherarea, or instruction to go to a designated safe zone. In furtherembodiments, the appropriate response may comprise using a system suchas a non-lethal reactive deterrence subsystem as previously describedherein, to direct a beam of energy at an actor's body or face to stopthe threatening behavior.

The method may further comprise 740 upon determining the appropriateresponse, sending instruction to at least one of a beam-steeringcomputer and to control drivers containing information regardingexecuting the appropriate response.

The method may further comprise 750, wherein at least one of the controldrivers and the beam-steering computer translate the instruction to atleast one executable command. The method may further comprise sendingthe at least one executable command to at least one of the acousticsubsystem and the non-lethal reactive deterrence subsystem (NLRD) toexecute the appropriate response. As described herein related to otherembodiments, the control drivers control the sources, beam-formers, andbeam-steerers of the various subsystems within the public area defensesystem 100, including the exact beam widths and steering of the NLRDsubsystem and the acoustic subsystem. The beam-steering computerprovides instruction and direction to the beam-steering metamaterials.

The method may further comprise 760, the at least one of the acousticsubsystem and the NLRD executing the command according to the commandreceived. This execution may comprise executing the appropriateresponse, which may comprise an audio warning via an alarm sound orspecific audio instruction, such as, for example, instruction to ceaseand desist from the threatening behavior, instruction to move to anotherarea, or instruction to go to a designated safe zone. In furtherembodiments, the appropriate response may comprise sending using asystem such as a non-lethal reactive deterrence subsystem as previouslydescribed herein, to direct a beam of energy at an actor's body or faceto stop the threatening behavior.

In further embodiments, additional means of receiving data anddetermining a threat may be utilized. For example, making reference nowto FIG. 7 , the method may comprise 800, observing visual activitywithin the public area. The observation referred to in 800 may comprisemaking an observation by an optical subsystem, such as the opticalsubsystem described herein above.

The method may further comprise receiving an optical data through anoptical subsystem. As illustrated in FIG. 7 by step 810, the method maycomprise receiving an optical data from an optical subsystem. Theoptical data may be received by a computer subsystem. The optical datamay comprise any optical data gathered by an optical subsystem. Theoptical data may comprise still images. The optical data may furthercomprise video. Further, the optical data may comprise images or videoused for facial recognition. The optical data may comprise images ordata that may be used for recognition of items such as, for example,weapons. Such weapons may include guns, knives, bows and arrows,grenades, clubs, whips, and other weapons.

The method may further include 820, sending the optical data to acomputer subsystem. The optical data may be sent to the computersubsystem via wired transmission from the optical subsystem and acousticsubsystem to the computer subsystem. The method may include sending theoptical data to the computer subsystem via wireless transmission or viaother methods known in the art.

The method may further comprise 825 receiving at the computer subsystemthe optical data.

The method may further include, as indicated by 830 in FIG. 7 ,processing the optical data at an image processor. Processing theoptical data at an image processor may comprise converting the receivedoptical data into a form suitable for analysis, such as into digitalform. The information may be zipped or sent in data packets to maximizeefficiency and speed of data transfer.

In certain embodiments, as indicated by 840 in FIG. 7 , the method mayfurther include determining, at a computer subsystem, a threat level tothe public area that is presented by the optical data.

In certain embodiments, determining a threat level to the public areafrom an optical data may comprise, as represented by 850 in FIG. 7 ,comparing the optical data to known optical data that is stored in adatabase within the computer subsystem. Comparing the optical data maycomprise comparing received optical data, such as images of faces orimages of weapons, to optical data, such as images stored in thedatabase of known individuals. These known individuals may beindividuals who are members of a certain group, such as a group thatregularly uses the public area. Such a group may include school faculty,school students, members of a club that owns or frequently uses thepublic area, members of a religious group that owns or frequently usesthe public area. The known images may be gathered and stored byrecording images in advance. For example, digital pictures ofindividuals belonging to the groups discussed above or other similargroups, may be voluntarily submitted or taken in advance. Alternatively,images of individuals may be recorded by the computer subsystem, usingthe optical subsystem as described in other embodiments, to takepictures of individuals, items, settings, encounters and other images.The acoustic subsystem, as described herein, can be used to obtain anaudio recording of an individual's voice from which biometrics may becomputed. This audio recording and corresponding biometrics may bestored in the computer subsystem's database and the computer subsystemmay associate that audio recording and corresponding biometrics with theindividual's stored picture and facial biometrics. The face and voiceprint and corresponding biometrics may then be stored in the databasewithin the computer subsystem to recognize if a speaker is a regularattendee to the public area.

Further, the optical subsystem may gather optical biometric data relatedto each individual having an image stored in the database. The opticalimage may include video of an individual or a group of individuals. Forexample, behavior patterns and normal social interactions may begathered by the optical subsystem and recorded in the database. Thisinformation may then be used as a baseline in determining any deviationsfrom normal behavior when the computer subsystem is making a threatassessment in step 850 of FIG. 7 .

In further embodiments, the database may comprise optical data of knownthreats. For example, the database may contain images and facialbiometrics of felons or sex offenders known in the area gathered fromlaw enforcement. Further, the database may store individuals' pictures,biometrics, video of behavior, pictures and videos of groups of people,pictures of weapons and common objects and other images and videos foundin the public area, gathered by the optical subsystem.

Additionally, the computer subsystem may continue to add data andinformation, such as pictures and patterns in optical data, such as anindividuals' actions, interactions, objects being carried into thepublic area, changes in behavior or demeanor, and other observableimages, video, and behavior, to its database to constantly improve andbroaden its voice recognition and biometric pattern recognition indetermining threats and making threat assessments.

Comparing optical data to known optical data as shown in 850 maycomprise the computer subsystem comparing images to known images andcomparing patterns in optical data, such as an individual's behavior andinteractions.

In certain embodiments, the method may further comprise 860, recognizingany matches between the optical data received from the optical subsystemand optical data stored in the database. Recognizing any matches maycomprise recognizing a degree of similarity, such as for example, a 50%match, 60% match, a 70% match, an 80% match, a 90% match or a 100%match, or any percentage between these examples.

In certain embodiments, the method may further comprise step 870,assigning a third threat level based on the recognized match from step860. Assigning the third threat level may comprise assigning a threatlevel based on the percentage match between observed or received opticaldata and optical data in the database. Assigning the third threat levelmay further comprise assigning a threat level based on who the threat iscoming from. For example, if the actor, or the speaker who is the sourceof the acoustic data, is a known bad actor, then the computer subsystemmay use this as a factor in assigning a threat level. In some instances,this could result in a higher threat level. Assigning the third threatlevel may further comprise considering prior history of assaults, weaponpossessions, threats, drug use, family instability, etc. All thesefactors may contribute to a higher threat level being assigned and alower tolerance of observed threats before acoustic and reactivedeterrence subsystem action may be taken.

Further, the method may comprise 880, determining an appropriateresponse to the threat, based on the third threat level as determinedand assigned in 870. The appropriate response will depend on the threatlevel, including who the actor is and if the actor has a violent past ora propensity for violence or violent reactions. The appropriate responsemay comprise an audio warning via an alarm sound or specific audioinstruction, such as, for example, instruction to cease and desist fromthe threatening behavior, instruction to move to another area, orinstruction to go to a designated safe zone. In further embodiments, theappropriate response may comprise using a system such as a non-lethalreactive deterrence subsystem as previously described herein, to directa beam of energy at an actor's body or face to stop the threateningbehavior.

The method may further comprise 890, upon determining the appropriateresponse, sending instruction to at least one of a beam-steeringcomputer and to control drivers containing information regardingexecuting the appropriate response.

The method may further comprise 892, wherein at least one of the controldrivers and the beam-steering computer translate the instruction to atleast one executable command. The method may further comprise sendingthe at least one executable command to at least one of the acousticsubsystem and the non-lethal reactive deterrence subsystem (NLRD) toexecute the appropriate response. As described herein related to otherembodiments, the control drivers control beamwidths, beam shapes,intensity or power output and duration of transmitted beams as well asthe sources, beam-steerers, and beam formers of the NLRD, optical, andacoustic subsystems. The beam-steering computer provides instruction anddirection to the beam-steering metamaterials.

The method may further comprise 894, the at least one of the acousticsubsystem and the NLRD subsystem executing the command according to thecommand received. This execution may comprise executing the appropriateresponse, which may comprise an audio warning via an alarm sound orspecific audio instruction, such as, for example, instruction to ceaseand desist from the threatening behavior, instruction to move to anotherarea, or instruction to go to a designated safe zone. In furtherembodiments, the appropriate response may comprise sending using asystem such as a non-lethal reactive deterrence subsystem as previouslydescribed herein, to direct a beam of energy at an actor's body or faceto stop the threatening behavior.

In further embodiments, the method of determining a threat level to thepublic area from an optical data may comprise further determining asecond threat level based on at least one of optical data. Asillustrated in FIG. 8 , the method may comprise receiving optical dataas described in relation to FIG. 7 . The method may further comprise,after comparing the received optical data to known optical data,recognizing non-matching optical data, as in step 900. Or, in otherwords, as described herein, comparing received optical data to opticaldata found in the database and recognizing any received optical datathat does not match stored optical data. Non-matching data may includepictures of individuals that do match any images stored in the database,images of potential weapons that do not match images stored in thedatabase, behavior not recognized in the database, and othernon-recognized data.

In certain embodiments, the method may further comprise step 900,recognizing any non-matches between voice prints and patterns inacoustic data, such as an individual's speech, words used, volume, andintonation with information stored in the database. Recognizing anynon-matches may comprise recognizing a degree of dissimilarity, such asfor example, a match between certain particular received optical dataand stored optical data, such as facial identifications, behaviorpatterns, gestures, interactions between people and so forth. The degreeof dissimilarity may be best expressed as a percentage similarity, suchas for example a similarity between received acoustic data and storedacoustic data less than a 70% match, less than a 60% match, less than a50% match, less than a 40% match, less than a 30% match, less than a 20%match, less than a 10% match or any percentage between these exemplaryexamples.

Upon recognizing non-matching data, the computer subsystem may analyzethe non-matching data. Analyzing the non-matching optical data maycomprise analyzing the received optical data for potential threats andcomparing that optical data to known data in a database andcross-referencing the optical data and any matching data withpotentially corresponding acoustic data.

In certain embodiments, the method may further comprise step 920,assigning a fourth threat level based on the analysis of thenon-matching data in 910. Assigning the fourth threat level may compriseassigning a threat level based on the determination of a likely threatfrom an unknown object, interaction, or person, or drawing a conclusionbased on a combination of these factors. Assigning the fourth threatlevel may further comprise assigning a threat level based on from whomthe threat is coming. For example, if the actor, or the source of theoptical data, is a known or a discovered bad actor, then the computersubsystem may use this as a factor in assigning a threat level. In someinstances, this could result in a higher threat level. Assigning thefourth threat level may further comprise factoring in analysis from theacoustic subsystem and related analysis and/or the reaction to anyaction taken by an actor in response to activity from the reactivedeterrence subsystem.

Further, the method may comprise 930, determining an appropriateresponse to the threat, based on the fourth threat level as determinedand assigned in 920. The appropriate response will depend on the threatlevel, possibly including who the actor is and if the actor has aviolent past or a propensity for violence or violent reactions. Theappropriate response may comprise an audio warning via an alarm sound orspecific audio instruction, such as, for example, instruction to ceaseand desist from the threatening behavior, instruction to move to anotherarea, or instruction to go to a designated safe zone. In furtherembodiments, the appropriate response may comprise using a system suchas a non-lethal reactive deterrence subsystem as previously describedherein, to direct a beam of energy at an actor's body or face to stopthe threatening behavior.

The method may further comprise 940 upon determining the appropriateresponse, sending instruction to at least one of a beam-steeringcomputer and to control drivers containing information regardingexecuting the appropriate response.

The method may further comprise 950, wherein at least one of the controldrivers and the beam-steering computer translate the instruction to atleast one executable command. The method may further comprise sendingthe at least one executable command to at least one of the acousticsubsystem and the non-lethal reactive deterrence subsystem (NLRD) toexecute the appropriate response. As described herein related to otherembodiments, the control drivers control beamwidths, beam shapes,intensity or power output and duration of transmitted beams as wells asthe sources, beam-steerers, and beam formers of the NLRD, optical, andacoustic subsystems. The beam-steering computer provides instruction anddirection to the beam-steering meta materials.

The method may further comprise 960, the at least one of the acousticsubsystem and the NLRD executing the command according to the commandreceived. This execution may comprise executing the appropriateresponse, which may comprise an audio warning via an alarm sound orspecific audio instruction, such as, for example, instruction to ceaseand desist from the threatening behavior, instruction to move to anotherarea, or instruction to go to a designated safe zone. In furtherembodiments, the appropriate response may comprise sending using asystem such as a non-lethal reactive deterrence subsystem as previouslydescribed herein, to direct a beam of energy at an actor's body or faceto stop the threatening behavior.

It should be noted that the embodiments described herein above can beperformed simultaneously or concurrently. The system may analyze bothacoustic data and optical data and may use both sets of data todetermine the threat level and the appropriate response.

In some embodiments, the method may further comprise the method asillustrated in FIG. 9 . FIG. 9 provides an illustration of the of themethod of receiving acoustic data and sending acoustic data. In someembodiments, receiving the acoustic data may comprise 1000 generating ata source an acoustic beam. The acoustic beam may be generated asdescribed in previous embodiments. As previously discussed, an acousticbeam source may comprise metamaterials.

As shown in 1010, the method may further comprise, after generating abeam, forming a beam at a beam-former. The acoustic beam may be formedas described in previous embodiments. As previously discussed, anacoustic beam-former may comprise metamaterials.

As shown in 1020, the method may further comprise directing a beam usinga beam-steerer. As previously discussed, an acoustic beam-steerer maycomprise metamaterials.

After the acoustic beam is sent out, the acoustic beam may detect noisewithin the public area. The noise may be made by an actor, eithervocally by the actor, by the use of an object that the actor may hold,or by movement from the actor's body. The acoustic energy produced bythe noise may travel back to the acoustic subsystem. The method mayfurther comprise 1030 receiving an acoustic beam containing acousticdata at a detector. As previously discussed, the detector may bephysically part of the same metamaterial layer as the beam source andmay also comprise metamaterials

As shown in 1040, after receiving the beam containing acoustic data, themethod may further comprise sending the data to a computer subsystemcomprising an acoustic processor. The acoustic processor may process theacoustic data to put the data into a form suitable for analysis.

As shown in 1050, after the data has been processed by the acousticprocessor, the processed data may then be sent to a processor within thecomputer subsystem for analysis.

As shown in 1060, after the data has been sent for analysis, thecomputer subsystem may analyze the data in order to evaluate the threatpresented by the acoustic data (threat assessment) and to formulate aresponse to the threat. The threat may be analyzed and a response formedas previously described herein.

In some embodiments, the method may include 1065 the computer subsystemsending a notification to law enforcement of the threat or the potentialthreat. The notification may be via instant message, text message, phonecall, or other suitable notification.

Further, if the analysis indicates that further information is needed,the method may comprise 1070, sending an instruction to the acousticsubsystem via the control driver subsystem to narrow the outgoingacoustic beam to a more specific target.

Further, the method may comprise 1075, sending an instruction from thecomputer subsystem to the text to speech computer. The method maycomprise 1080, concurrently sending and instruction to the beam-steeringcomputer. The method may further comprise 1082 sending the instructionto the control drivers. The method may further comprise thebeam-steering computer translating its instruction and sending itsinstruction to the control drivers.

The method may further comprise 1090 the control drivers translating theinstruction received into executable commands. The executable commandsmay comprise commands to the acoustic subsystem or to the non-lethalreactive deterrence subsystem, similar to other embodiments aspreviously described herein.

The method may further comprise 1092 sending the executable instructionto the acoustic subsystem and directing the acoustic subsystem toexecute the executable instruction. The executable command may comprisecommands as previously discussed herein, including instruction to formand direct audible and acoustic instruction to the an actor to cease anddesist his actions and or to move to another location, or cause pain inor to the ears to compel the actor to stop.

The method may further comprise 1095 sending the executable instructionto the NLRD subsystem and directing the NLRD subsystem to execute theexecutable instruction. The executable command may comprise commands aspreviously discussed herein, including instruction to form and direct abeam of energy to the body or face of an actor.

The method may further comprise 1097, wherein the acoustic subsystemexecutes the executable command, similar to embodiments previouslydescribed herein.

The method may further comprise 1098, wherein the NLRD subsystemexecutes the executable command, similar to embodiments previouslydescribed herein.

The method may further comprise repeating the method steps to reevaluatethe threat.

The method may further comprise the acoustic subsystem comprising adetector operable to detect an incoming acoustic beam, a source next tothe detector, the source operable to generate an acoustic beam, abeam-former operably coupled to the detector and source, wherein thebeam-former is a metamaterial layer; and a beam-steerer operably coupledto the beam-former, wherein the beam-steerer is a metamaterial layer andis operable to direct at least one acoustic signal to the actor. Themethod may further comprise wherein an initial acoustic beam is broad,and further wherein a subsequent acoustic beam is narrowed, narrowingonto a location of a potential threat. The method may further comprisetime-sharing the narrow received acoustic beam among multiple actors.

The method may further comprise wherein the instruction comprises aninstruction to the acoustic subsystem to direct a focused narrowacoustic beam at the actor.

The method may further comprise the audio signal being operable toperform one of deterring aggressive behavior, instructing the actor tolay down all weapons, and instructing the actor(s) to move to a safezone.

In some embodiments, the method may further comprise the method asillustrated in FIG. 10 . FIG. 10 provides an illustration of the of themethod of receiving optical data and sending optical data. In someembodiments, receiving the optical data may comprise 1100 generating ata source an optical beam. The optical beam may be generated as describedin previous embodiments. As previously discussed, an optical beam sourcemay comprise metamaterials.

As shown in 1110, the method may further comprise, after generating abeam, forming a beam at a beam-former. The optical beam may be formed asdescribed in previous embodiments. As previously discussed, an opticalbeam-former may comprise metamaterials.

As shown in 1120, the method may further comprise directing the systemusing a beam-steerer. As previously discussed, an optical beam-steerermay comprise metamaterials used in connection with a Light Detection andRanging (LiDAR) system to send out a beam and receive reflections oflight from observed objects.

After the initial beam is sent out, as shown in 1130, the method mayfurther comprise receiving an optical beam containing optical data at asource. The optical data may comprise reflected light coming into theLiDAR system. As previously discussed, the optical data may be gatheredby elements that may also comprise metamaterials. In some embodiments,the optical data may be passively gathered by an optical subsystem onlyusing metamaterials for the beam-former, beam-steerer, and source.

As shown in 1140, after receiving the beam containing optical data, themethod may further comprise sending the data to a computer subsystemcomprising an image processor. The image processor may process theoptical data, such as image and video to put the data into a formsuitable for analysis.

As shown in 1150, after the data has been processed by the imageprocessor, the processed data may then be sent to a processor within thecomputer subsystem for analysis. As discussed herein related to previousembodiments, the analysis may comprise determining, by an artificialintelligence program, a threat level presented by the collected opticaldata, and a determination of an appropriate response.

As shown in 1160, after the data has been sent for analysis, thecomputer subsystem may analyze the data in order to evaluate the threatpresented by the optical data (threat assessment) and to formulate aresponse to the threat. The threat may be analyzed, and a responseformed as previously described herein.

In some embodiments, the method may include 1165 the computer subsystemsending a notification to law enforcement of the threat or the potentialthreat. The notification may be via instant message, text message, phonecall, or other suitable notification.

Further, if the analysis indicates that further information is needed,the method may comprise 1170, sending an instruction to the opticalsubsystem via the control driver subsystem to gather additionalinformation by focusing on a specific target.

Further, the method may comprise 1175, sending an instruction from thecomputer subsystem to the text to speech computer. The method maycomprise 1180, concurrently sending and instruction to the beam-steeringcomputer. The method may further comprise 1182 sending the instructionto the control drivers. The method may further comprise thebeam-steering computer translating its instruction and sending itsinstruction to the control drivers.

The method may further comprise 1190 the control drivers translating theinstruction received into executable commands. The executable commandsmay comprise commands to the acoustic subsystem or to the non-lethalreactive deterrence subsystem, similar to other embodiments aspreviously described herein.

The method may further comprise 1192 sending the executable instructionto and directing the optical subsystem to execute the executableinstruction. The executable command may comprise commands as previouslydiscussed herein, including instruction to form and direct audible andacoustic instruction to the an actor to cease and desist his actions andor to move to another location, or cause pain in or to the ears tocompel the actor to stop.

The method may further comprise 1195 sending the executable instructionto and directing the NLRD subsystem to execute the executableinstruction. The executable command may comprise commands as previouslydiscussed herein, including instruction to form and direct a beam ofenergy to the body or face of an actor.

The method may further comprise 1197, wherein the acoustic subsystemexecutes the executable command, similar to embodiments previouslydescribed herein.

The method may further comprise 1198, wherein the NLRD subsystemexecutes the executable command, similar to embodiments previouslydescribed herein.

The method may further comprise repeating the method steps to reevaluatethe threat.

The method may further comprise an instruction to the optical subsystemto direct a focused narrow optical beam at the actor.

The method may further comprise the audio signal being operable toperform one of deterring aggressive behavior, instructing the actor tolay down all weapons, and instructing the actor(s) to move to a safezone.

The method may further comprise receiving the optical data from theoptical subsystem, the optical subsystem comprising a source operable togenerate an optical beam, a beam-former operably coupled to the detectorand source, wherein the beam-former is a metamaterial layer; and abeam-steerer operably coupled to the beam-former, wherein thebeam-steerer is a metamaterial layer and is operable to direct at leastone acoustic signal to the actor.

The method may further comprise determining a threat level to the publicarea by the optical data further comprising the computer assigning athreat level by at least one of: analyzing optical data of the actorcollected from the optical subsystem; analyzing optical data of objectscollected from the optical subsystem; analyzing visual interactionsbetween multiple actors; and identifying the actor by comparing an imageof the actor's face to identified images stored in the database.

The method may further comprise wherein the NLRD subsystem comprises: asource operable to operate at 95 Gigahertz (GHz) and form a beam ofenergy at 95 GHz; a beam-former operably coupled to the source, whereinthe beam-former is a metamaterial layer; and a beam-steerer operablycoupled to the beam-former, wherein the beam-steerer is a metamateriallayer and wherein the beam-steerer is operable to direct the beam ofenergy to the actor.

The method may further comprise, wherein the instruction comprises aninstruction to the NLRD subsystem to direct a beam of energy at theactor.

FIG. 11 illustrates a receiving data and making a threat assessmentaccording to a particular embodiment. The method may comprise 1200receiving optical data at a computer subsystem. This may be done in amanner similar to those methods previously discussed herein.

The method may further comprise 1210 receiving acoustic data at acomputer subsystem. This may be done in a manner similar to thosemethods previously discussed herein.

The method may further comprise 1220 processing images and video at animage processor within the computer subsystem. This may be done in amanner similar to those methods previously discussed herein.

The method may further comprise 1230 processing acoustic data at anacoustic processor. This may be done in a manner similar to thosemethods previously discussed herein.

The method may further comprise 1240 sending the optical data and/or theacoustic data to an artificial intelligence subsystem to analyze theoptical data and/or the acoustic data. The analysis 1250 may beperformed according to methods previously described herein.

The method may further comprise 1260 sending the optical data and/or theacoustic data to the machine learning subsystem. The machine learningsubsystem may add data to its database and, based on the data andbehavior patterns, may learn and improve and make new determinationsregarding what comprises a threat.

The method may further comprise 1270 sending the optical data and/or theacoustic data to a database within the computer subsystem.

The method may further comprise the machine learning subsystem sendingthe optical data and/or the acoustic data to the database. The machinelearning subsystem may send the optical and/or acoustic data to thedatabase in order to recognize matches and non-matches between theoptical data and/or acoustic data and stored respective optical dataand/or acoustic data. Upon finding matching data, the database may sendinformation regarding matching data and non-matching data back to themachine learning subsystem.

The method may further comprise sending the optical data and/or acousticdata to a recognition subsystem that is operable to recognize weapons,voices, facial, and other body features, such as ears, eyes, lips,tattoos, scars, moles, and other distinctive features. The recognitionsubsystem may further be operable to assign a percentage match or alikely match to various objects or features that may not have a 100percent match.

The method may further comprise 1310 upon recognizing a match, therecognition subsystem may send back to the machine learning subsystemthe recognized data. Further, upon recognizing a non-match or a partialmatch, the recognition subsystem may pass this information to themachine learning subsystem.

The method may further comprise 1300 the machine learning subsystemsending the optical data and/or acoustic data to a new weapons andsubjects subsystem. This may include non-matches and partial matches.The new weapons and subjects subsystem may be operable to identify newweapons and new people that may not be in the database, and subsequentlyupdate the database with new information via the deep learningsubsystem.

The method may further comprise 1320 sending the information from thenew weapons and subjects subsystem to the deep learning subsystem. Thedeep learning subsystem may be operable to analyze objects and determineif they may be used as a weapon and may be operable to find newindividuals, weapons, or behavior patterns of actors being observed. Insome embodiments the deep learning subsystem may be connected to anexternal network to further access information about potential weaponsand people.

The method may further comprise the 1340 deep learning subsystem sendingto the database the information regarding the new weapons and subjectsit may have determined to be threatening weapons and actors such thatthe database is updated. The database may then send the updatedinformation back to the machine learning subsystem to be used in itsanalysis.

The method may further comprise 1330 sending the updated data andinformation from the machine learning subsystem to the artificialintelligence subsystem. The artificial intelligence system may thendetermine a threat level based on the information provided from themachine learning subsystem and may determine an appropriate responselevel and prepare instructions for executing that response.

The method may further comprise 1350 sending the appropriate responsefrom the artificial intelligence subsystem to the beam-steeringcomputer. The method may further comprise 1360 sending the appropriateresponse from the artificial intelligence system to the control driversubsystem and converting the appropriate response into an executablecommand. The method may further comprise 1380 sending the appropriateresponse and associated instructions from the beam-steering computer tothe control driver subsystem. The method may further comprise 1370sending appropriate response from the artificial intelligence subsystemto the text-to-speech computer and the text-to-speech computerconverting the instruction regarding the appropriate response to anexecutable command.

The method may further comprise 1390 sending the executable command fromthe text-to-speech computer to the acoustic subsystem and the acousticsubsystem executing the command. The appropriate response may be similarto those mentioned with respect to previous embodiments as discussedherein.

The method may further comprise 1400 sending the executable command fromthe control driver subsystem to the acoustic subsystem and the acousticsubsystem executing the command. The appropriate response may be similarto those mentioned with respect to previous embodiments as discussedherein.

The method may further comprise 1400 sending the executable command fromthe control driver subsystem to the NLRD subsystem and the NLRDsubsystem executing the command. The appropriate response may be similarto those mentioned with respect to previous embodiments as discussedherein.

In certain aspects, the invention may include the following embodiments:

A first embodiment may include a public area defense system that maycomprise a non-lethal Reactive deterrence subsystem. The firstembodiment may further include an optical subsystem operably coupled tothe non-lethal Reactive deterrence defense subsystem. The firstembodiment may further include an acoustic subsystem operably coupled tothe non-lethal reactive deterrence defense subsystem. The firstembodiment may further include a computer system in communication witheach of the non-lethal reactive deterrence defense subsystem, theoptical LiDAR subsystem, and the acoustic subsystem. Each of thenon-lethal reactive deterrence defense subsystem, the optical LiDARsubsystem, and the acoustic subsystem is operable to interact with anactor.

A second embodiment may include system of embodiment 1 and may furthercomprise an image processor in communication with the optical subsystem.A control driver subsystem may be in communication with each of thenon-lethal reactive deterrence defense subsystem, the optical LiDARsubsystem, and the acoustic subsystem. A beam-steering computer may bein communication with the control driver subsystem and a text-to-speechcomputer may be in communication with the acoustic subsystem. Further,an acoustic processor may be in communication with the acousticsubsystem.

A third embodiment may include system of embodiment 2 wherein thecomputer system further comprises an artificial intelligence subsystemin communication with each of the image processor, the control driversubsystem, the text-to-speech computer, and the acoustic processor.

A fourth embodiment may include the system of embodiment 3 wherein thecomputer system further comprises a machine learning subsystem incommunication with the artificial intelligence subsystem. The computersystem may further comprise a database in communication with theartificial intelligence subsystem and in communication with the machinelearning subsystem. The computer system may further comprise arecognition subsystem in communication with the machine learningsubsystem. The computer system may further comprise a new weapons andsubjects subsystem in communication with the machine learning subsystem.The computer system may further comprise a deep learning subsystem incommunication with the new weapons and subjects subsystem and incommunication with the database.

A fifth embodiment may comprise the system of embodiment 1, wherein theoptical subsystem comprises a detector and a beam-steerer operablycoupled to the detector, wherein the beam-steerer is a metamateriallayer, and a beam-former operably coupled to the detector and operablycoupled to the beam-steerer.

A sixth embodiment may comprise the embodiment of embodiment 1, whereinthe optical subsystem further comprises a Light Detection and Ranging(LiDAR) system integrated with the beam-former, the LiDAR systemoperable to send a beam generated by the optical subsystem and toreceive a reflected beam. Alternatively, the sixth embodiment maycomprise the embodiment of claim 5.

A seventh embodiment may comprise the system of embodiment 1, whereinthe NLRD subsystem comprises a source operable to operate at 95Gigahertz (GHz) and form a beam of energy at 95 GHz. The NLRD subsystemmay further comprise a beam-former operably coupled to the source,wherein the beam-former is a metamaterial layer. The NLRD subsystem mayfurther comprise a beam-steerer operably coupled to the beam-former,wherein the beam-steerer is a metamaterial layer and wherein thebeam-steerer is operable to direct the beam of energy to the actor.

An eighth embodiment may comprise the system of embodiment 1, whereinthe acoustic subsystem comprises: a detector and source, a beam-formeroperably coupled to the detector and source, wherein the beam-former isa metamaterial layer, and a beam-steerer operably coupled to thebeam-former, wherein the beam-steerer is a metamaterial layer and isoperable to direct at least one acoustic signal to the actor.

A ninth embodiment may comprise a method of deterring an actor in apublic area. The method may comprise gathering one of an optical datathrough an optical subsystem and an acoustic data through an acousticsubsystem, sending the one of an optical data and an acoustic data to acomputer system, processing the one of an optical data and an acousticdata, determining if the one of an optical data and an acoustic dataindicate a danger to the public area, and instructing, through a controlsubsystem in communication with the computer system, a non-lethalreactive deterrence defense system to direct a beam of energy to theactor's face or body.

A tenth embodiment may comprise the method of embodiment 9 may furthercomprise instructing, through the control subsystem in communicationwith the computer system, the acoustic subsystem to send an audio signalto the actor to deter aggressive behavior, to lay down any and allweapons, and, in some cases, to instruct the actor(s) to move to a safezone, which may include a specialized, self-locking containment devicethat can be opened only by authorized law enforcement or securitypersonnel.

An eleventh embodiment may comprise the method of embodiment 9, whereinthe NLRD subsystem comprises a source, a beam-former, and abeam-steerer, wherein each of the source, the beam-former, and thebeam-steerer is a metamaterial layer.

A twelfth embodiment may comprise the method of embodiment 11, whereinthe source comprises a solid-state device such as a resonator operatingat 95 Gigahertz (GHz) with a power amplifier.

A thirteenth embodiment may comprise the method of embodiment 12,wherein the power amplifier further comprises gallium nitride compositedevices combined with aluminum, indium or other series III and Velements to produce higher power output from solid state devices.

A fourteenth embodiment may comprise the method of embodiment 12,further comprising the power source generating the beam of energy at 95GHz, and further comprising a metamaterial output network that producesadded power efficiency through trapping unwanted harmonics andphase-shifting out-of-phase amplifiers to be in-phase.

A fifthteenth embodiment may comprise any of the embodiments, 1 through14, but further comprising a computer subsystem on a single siliconwafer in which all of the dielet and chiplet processors and otherdevices are mounted, interconnected, and interfaced to all input/outputdevices through silicon interconnect fabric which is comprised ofthermal connections without solder and finer traces routed in multiplelayers of the silicon wafer such that an entire computer with allprocessors and storage are integrated as aSystem-on-a-silicon-Interconnect-Fabric (SoIF) to operate at fasterspeeds, smaller size and weight, less power and much lower overall costthan traditional System-on-a-Chip mounted and interconnected on PrintedCircuit Boards.

A sixthteenth embodiment may comprise the method of embodiment 15wherein each of the subsystems within the computer subsystem may beoperably connected to an external network in order to obtain informationtherefrom

A seventeenth embodiment may comprise method of deterring an actor in apublic area, the method comprising: receiving at least one of an opticaldata through an optical subsystem and an acoustic data through anacoustic subsystem; sending the at least one of an optical data and anacoustic data to a computer system; receiving, at a computer system, theat least one of an optical data and an acoustic data; processing the atleast one of an optical data and an acoustic data; determining, at acomputer, a threat level to the public area by the at least one of anoptical data and an acoustic data to the public area, wherein thedetermining comprises: comparing the at least one of an optical data andan acoustic data to known optical data and known acoustic data stored ina database accessible by the computer system; recognizing any matchesbetween the at least one of an optical data and an acoustic data and theknown optical data and the known acoustic data stored in the databaseaccessible by the computer system; assigning a first threat level to thematches of the at least one of an optical data and an acoustic databased on the recognized matches; determining an appropriate responsebased on at least one of the first threat level or the second threatlevel; and upon determining the appropriate response, sending aninstruction, by the computer system, the instruction containing theappropriate response, to at least one of the acoustic subsystem and anon-lethal reactive deterrence subsystem to carry out the instruction

An eighteenth embodiment may comprise the method of embodiment 17,wherein sending the instruction further comprises: sending theinstruction, by the computer system, the instruction containing theappropriate response, to at least one of a control subsystem and abeam-steering computer, wherein each of the control subsystem and thebeam-steering computer is in communication with the computer system;translating the instruction, by the at least one of a control system anda beam-steering computer, to an executable command; and sending theexecutable command, by the at least one of a control subsystem and abeam-steering computer, to at least one of the acoustic subsystem and anon-lethal reactive deterrence defense system, wherein at least one ofthe acoustic subsystem and the non-lethal reactive deterrence defensesystem executes the command

A nineteenth embodiment may comprise the method of embodiment 18,wherein the determining further comprises: recognizing non-matchesbetween the at least one of an optical data and an acoustic data and theknown optical data and the known acoustic data stored in the databaseaccessible by the computer system; for any non-matches, furthercomparing non-matches to known optical data and acoustic data anddetermining a level of similarity between the non-matches and the knownoptical data and the known acoustic data; assigning a second threatlevel to the non-matches of the at least one of an optical data and anacoustic data; determining an appropriate response based on at least oneof the first threat level or the second threat level; sending aninstruction, by the computer system, the instruction containing theappropriate response, to a control subsystem in communication with thecomputer system; translating the instruction, by the control system, toan executable command; and sending the executable command, by thecontrol subsystem to at least one of the acoustic subsystem and anon-lethal reactive deterrence defense system, wherein at least one ofthe acoustic subsystem and the non-lethal reactive deterrence defensesystem executes the command

A twentieth embodiment may comprise the method of embodiment 19, whereinreceiving the acoustic data comprises: receiving the acoustic data fromthe acoustic subsystem, the acoustic subsystem comprising: a detectoroperable to detect an incoming acoustic beam; a source next to thedetector, the source operable to generate an acoustic beam; abeam-former operably coupled to the detector and source, wherein thebeam-former is a metamaterial layer; and a beam-steerer operably coupledto the beam-former, wherein the beam-steerer is a metamaterial layer andis operable to direct at least one acoustic signal to the actor; whereinan initial received acoustic beam is broad, and further wherein asubsequent received acoustic beam is narrowed, narrowing onto a locationof a potential threat

A twenty-first embodiment may comprise the method of embodiment 18,wherein determining a threat level to the public area by the acousticdata further comprises the computer assigning a threat level by at leastone of: analyzing spoken words; analyzing the volume of the spoken wordsand changes in volume of the spoken words; analyzing changes in theintonation of the spoken words and changes in the intonation of thespoken words; and identifying the actor by comparing an acoustic datacontaining the actor's voice to voice prints stored in the database.

A twenty-second embodiment may comprise the method of embodiment 21,wherein the instruction comprises an instruction to the acousticsubsystem to direct a focused narrow acoustic beam at the actor

A twenty-third embodiment may comprise the method of embodiment 22,wherein the audio signal is operable to perform one of deterringaggressive behavior, instructing the actor to lay down all weapons, andinstructing the actor(s) to move to a safe zone.

A twenty-fourth embodiment may comprise the method of embodiment 19,further comprising the computer system notifying law enforcementofficials of the threat.

A twenty-fifth embodiment may comprise generating an acoustic beam asource; forming the acoustic beam using a beam-former in the acousticsubsystem; directing the acoustic beam using a beam-steerer in theacoustic subsystem; receiving an acoustic beam comprising acoustic dataat a detector; sending acoustic data to an acoustic processor within acomputer subsystem; send the processed acoustic data to a processorwithin the computer subsystem for analysis; analyzing data at aprocessor for a threat assessment and response to a threat, sendinginstruction from a computer subsystem to a text-to-speech computer,notifying law enforcement and school authorities of threat, sendinginstruction via a control driver to an acoustic subsystem to narrow theacoustic beam to a more specific target, sending instruction to abeam-steering computer to translate instruction, and sending instructionto a control driver subsystem; sending from the text-to-speech computerinstruction to the acoustic subsystem to form an acoustic verbal messageto the actor; translate instructions at a control driver into anexecutable command; send the executable demand to one of the NLRDsubsystem and the acoustic subsystem; or send the executable command tothe optical subsystem; any of the subsystems executing the command.

A twenty-sixth embodiment may comprise generating an optical beam asource; forming the optical beam using a beam-former in the acousticsubsystem; directing the optical beam using a beam-steerer in theoptical subsystem; receiving an optical beam comprising acoustic data ata detector; sending optical data to an image processor within a computersubsystem; send the processed acoustic data to a processor within thecomputer subsystem for analysis; analyzing data at a processor for athreat assessment and response to a threat, sending instruction from acomputer subsystem to a text-to-speech computer, notifying lawenforcement and school authorities of threat, sending instruction via acontrol driver to an acoustic subsystem to narrow the acoustic beam to amore specific target, sending instruction to a beam-steering computer totranslate instruction, and sending instruction to a control driversubsystem; sending from the text-to-speech computer instruction to theacoustic subsystem to form an acoustic verbal message to the actor;translate instructions at a control driver into an executable command;send the executable demand to one of the NLRD subsystem and the acousticsubsystem; or send the executable command to the optical subsystem; anyof the subsystems executing the command.

The twenty sixth embodiment may comprise the method of embodiment 25.

A twenty-seventh embodiment may comprise the method of embodiment 26wherein the optical subsystem utilizes metamaterials.

A twenty-eight embodiment may comprise the method of embodiment 26 or27, wherein the optical system comprises the use of a Light Detectionand Ranging system.

A twenty-ninth embodiment may comprise receiving at least one of anoptical data and an acoustic data at a computer system; the optical dataand the acoustic data may have been gathered via an optical subsystemand an acoustic subsystem, respectively, wherein the subsystem mayreceive their respective information using layers of metamaterials, asdescribed herein; the at least one of an optical data and an acousticdata may be processed at respective optical processors and acousticprocessors; the method may further comprise sending at least one ofprocessed optical data and processed acoustic data to an artificialintelligence subsystem within a computer system; processing and analyzethe at least one processed optical data and processed acoustic data;sending the analyzed data to a database within the computer system, andto a machine learning subsystem; the machine learning subsystem may sendinformation to a weapons voice and feature recognition subsystem and toa new weapons and subjects subsystem; the weapons, voice, and featurerecognition subsystem may send updated data to the database and may sendinformation it has learned to the machine learning subsystem; the newweapons and subjects subsystem may send information to a deep learningsubsystem; the deep learning subsystem may update the database with newinformation; the database may send such information to the machinelearning subsystem; the machine learning subsystem may send informationto the artificial intelligence system; the artificial intelligencesystem may determine a threat level and appropriate response based onthe information received; the response may be sent to a beam-steeringcomputer, to a control driver subsystem and/or to a text-to-speechcomputer; the beam-steering computer may send instruction to the controldriver subsystem; the control driver subsystem may convert theinstruction to a set of executable commands; the executable command maybe sent at least one of the acoustic subsystem and the non-lethalreactive deterrence subsystem; the least one of the acoustic subsystemand the non-lethal reactive deterrence subsystem may execute thecommand; the text-to-speech computer may convert its instruction to anexecutable command for the acoustic subsystem and send that command tothe acoustic subsystem; the acoustic subsystem may execute the command.

A thirtieth embodiment may comprise the method of embodiment 29, furthercomprising the artificial intelligence subsystem sending an instructionfor a response directed to the optical subsystem, where the controldriver subsystem received the instruction, translates the instruction toan executable command, and sends the executable command to the opticalsubsystem; wherein the optical subsystem executes the command.

Those skilled in the art will recognize that it is common within the artto describe devices and/or processes in the fashion set forth herein,and thereafter use engineering practices to integrate such describeddevices and/or processes into data processing systems. That is, at leasta portion of the devices and/or processes described herein can beintegrated into a data processing system via a reasonable amount ofexperimentation. Those having skill in the art will recognize that atypical data processing system generally includes one or more of asystem unit housing, a video display device, a memory such as volatileand non-volatile memory, processors such as microprocessors and digitalsignal processors, computational entities such as operating systems,drivers, graphical user interfaces, and applications programs, one ormore interaction devices, such as a touch pad or screen, and/or controlsystems including feedback loops and control motors (e.g., feedback forsensing position and/or velocity; control motors for moving and/oradjusting components and/or quantities). A typical data processingsystem may be implemented utilizing any suitable commercially availablecomponents, such as those typically found in datacomputing/communication and/or network computing/communication systems.

The herein described subject matter sometimes illustrates differentcomponents contained within, or connected with, different othercomponents. It is to be understood that such depicted architectures aremerely examples, and that in fact many other architectures can beimplemented which achieve the same functionality. In a conceptual sense,any arrangement of components to achieve the same functionality iseffectively “associated” such that the desired functionality isachieved. Hence, any two components herein combined to achieve aparticular functionality can be seen as “associated with” each othersuch that the desired functionality is achieved, irrespective ofarchitectures or intermedial components. Likewise, any two components soassociated can also be viewed as being “operably connected”, or“operably coupled”, to each other to achieve the desired functionality,and any two components capable of being so associated can also be viewedas being “operably couplable”, to each other to achieve the desiredfunctionality. Specific examples of operably couplable include but arenot limited to physically mateable and/or physically interactingcomponents and/or wirelessly interactable and/or wirelessly interactingcomponents and/or logically interacting and/or logically interactablecomponents.

While various aspects and examples have been disclosed herein, otheraspects and examples will be apparent to those skilled in the art. Thevarious aspects and examples disclosed herein are for purposes ofillustration and are not intended to be limiting, with the true scopeand spirit being indicated by the following claims.

What is claimed is:
 1. A public area defense system, comprising: anon-lethal reactive deterrence defense subsystem; an optical subsystemoperably coupled to the non-lethal reactive deterrence defensesubsystem; an acoustic subsystem operably coupled to the non-lethalreactive deterrence defense subsystem; and a computer subsystem incommunication with each of the non-lethal reactive deterrence defensesubsystem, the optical subsystem, and the acoustic subsystem; whereineach of the non-lethal reactive deterrence defense subsystem, theoptical subsystem, and the acoustic subsystem is operable to interactwith an actor.
 2. The system of claim 1, further comprising: an imageprocessor in communication with the optical subsystem; a control driversubsystem in communication with each of the non-lethal reactivedeterrence defense subsystem, the optical subsystem, and the acousticsubsystem; a beam-steering computer in communication with the controldriver subsystem; a text-to-speech computer in communication with theacoustic subsystem; and an acoustic processor in communication with theacoustic subsystem.
 3. The system of claim 2, wherein the computersystem further comprises: an artificial intelligence subsystem withinthe computer subsystem, the artificial intelligence subsystem being incommunication with each of the image processor, the control driversubsystem, the beam-steering computer, the text-to-speech computer, andthe acoustic processor.
 4. The system of claim 3, wherein the computersystem further comprises: a machine learning subsystem in communicationwith the artificial intelligence subsystem; a database in communicationwith the artificial intelligence subsystem and in communication with themachine learning subsystem; a recognition subsystem in communicationwith the machine learning subsystem; a new weapons and subjectssubsystem in communication with the machine learning subsystem; and adeep learning subsystem in communication with the new weapons andsubjects subsystem and in communication with the database.
 5. The systemof claim 1, wherein the optical subsystem comprises: a detector; abeam-steerer operably coupled to the detector, wherein the beam-steereris a metamaterial layer; a beam-former operably coupled to the detectorand operably coupled to the beam-steerer
 6. The system of claim 1,wherein the optical subsystem further comprises Light Detection andRanging (LiDAR) system integrated with the beam-former, the LiDAR systemoperable to send a beam generated by the optical subsystem and toreceive a reflected beam.
 7. The system of claim 1, wherein the NLRDsubsystem comprises: a source operable to operate at 95 Gigahertz (GHz)and form a beam of energy at 95 GHz; a beam-former operably coupled tothe source, wherein the beam-former is a metamaterial layer; and abeam-steerer operably coupled to the beam-former, wherein thebeam-steerer is a metamaterial layer and wherein the beam-steerer isoperable to direct the beam of energy to the actor.
 8. The system ofclaim 1, wherein the acoustic subsystem comprises: a detector andsource, a beam-former operably coupled to the detector and source,wherein the beam-former is a metamaterial layer; and a beam-steereroperably coupled to the beam-former, wherein the beam-steerer is ametamaterial layer and is operable to direct at least one acousticsignal to the actor.
 9. A method of deterring an actor in a public area,the method comprising: receiving at least one of an optical data throughan optical subsystem and an acoustic data through an acoustic subsystem;sending the at least one of an optical data and an acoustic data to acomputer system; receiving, at a computer system, the at least one of anoptical data and an acoustic data; processing the at least one of anoptical data and an acoustic data; determining, at a computer, a threatlevel to the public area by the at least one of an optical data and anacoustic data to the public area, wherein the determining comprises:comparing the at least one of an optical data and an acoustic data toknown optical data and known acoustic data stored in a databaseaccessible by the computer system; recognizing any matches between theat least one of an optical data and an acoustic data and the knownoptical data and the known acoustic data stored in the databaseaccessible by the computer system; assigning a first threat level to thematches of the at least one of an optical data and an acoustic databased on the recognized matches; determining an appropriate responsebased on at least one of the first threat level or the second threatlevel; and upon determining the appropriate response, sending aninstruction, by the computer system, the instruction containing theappropriate response, to at least one of the acoustic subsystem and anon-lethal reactive deterrence subsystem to carry out the instruction.10. The method of claim 9, wherein sending the instruction furthercomprises: sending the instruction, by the computer system, theinstruction containing the appropriate response, to at least one of acontrol subsystem and a beam-steering computer, wherein each of thecontrol subsystem and the beam-steering computer is in communicationwith the computer system; translating the instruction, by the at leastone of a control system and a beam-steering computer, to an executablecommand; and sending the executable command, by the at least one of acontrol subsystem and a beam-steering computer, to at least one of theacoustic subsystem and a non-lethal reactive deterrence defense system,wherein at least one of the acoustic subsystem and the non-lethalreactive deterrence defense system executes the command.
 11. The methodof claim 9, wherein the determining further comprises: recognizingnon-matches between the at least one of an optical data and an acousticdata and the known optical data and the known acoustic data stored inthe database accessible by the computer system; for any non-matches,further comparing non-matches to known optical data and acoustic dataand determining a level of similarity between the non-matches and theknown optical data and the known acoustic data; assigning a secondthreat level to the non-matches of the at least one of an optical dataand an acoustic data; determining an appropriate response based on atleast one of the first threat level or the second threat level; sendingan instruction, by the computer system, the instruction containing theappropriate response, to a control subsystem in communication with thecomputer system; translating the instruction, by the control system, toan executable command; and sending the executable command, by thecontrol subsystem to at least one of the acoustic subsystem and anon-lethal reactive deterrence defense system, wherein at least one ofthe acoustic subsystem and the non-lethal reactive deterrence defensesystem executes the command.
 12. The method of claim 11, whereinreceiving the acoustic data comprises: receiving the acoustic data fromthe acoustic subsystem, the acoustic subsystem comprising: a detectoroperable to detect an incoming acoustic beam; a source next to thedetector, the source operable to generate an acoustic beam; abeam-former operably coupled to the detector and source, wherein thebeam-former is a metamaterial layer; and a beam-steerer operably coupledto the beam-former, wherein the beam-steerer is a metamaterial layer andis operable to direct at least one acoustic signal to the actor; whereinan initial received acoustic beam is broad, and further wherein asubsequent received acoustic beam is narrowed, narrowing onto a locationof a potential threat.
 13. The method of claim 10, wherein determining athreat level to the public area by the acoustic data further comprisesthe computer assigning a threat level by at least one of: analyzingspoken words; analyzing the volume of the spoken words and changes involume of the spoken words; analyzing changes in the intonation of thespoken words and changes in the intonation of the spoken words; andidentifying the actor by comparing an acoustic data containing theactor's voice to voice prints stored in the database.
 14. The method ofclaim 13, wherein the instruction comprises an instruction to theacoustic subsystem to direct a focused narrow acoustic beam at theactor.
 15. The method of claim 14, wherein the audio signal is operableto perform one of deterring aggressive behavior, instructing the actorto lay down all weapons, and instructing the actor(s) to move to a safezone.
 16. The method of claim 11, further comprising the computer systemnotifying law enforcement officials of the threat.
 17. The method ofclaim 9, wherein receiving the optical data comprises; receiving theoptical data from the optical subsystem, the optical subsystemcomprising: a source operable to generate an optical beam; a beam-formeroperably coupled to the detector and source, wherein the beam-former isa metamaterial layer; and a beam-steerer operably coupled to thebeam-former, wherein the beam-steerer is a metamaterial layer and isoperable to direct at least one acoustic signal to the actor.
 18. Themethod of claim 17, wherein determining a threat level to the publicarea by the optical data further comprises the computer assigning athreat level by at least one of: analyzing optical data of the actorcollected from the optical subsystem; analyzing optical data of objectscollected from the optical subsystem; analyzing visual interactionsbetween multiple actors; and identifying the actor by comparing an imageof the actor's face to identified images stored in the database.
 19. Themethod of claim 11, wherein the NLRD subsystem comprises: a sourceoperable to operate at 95 Gigahertz (GHz) and form a beam of energy at95 GHz; a beam-former operably coupled to the source, wherein thebeam-former is a metamaterial layer; and a beam-steerer operably coupledto the beam-former, wherein the beam-steerer is a metamaterial layer andwherein the beam-steerer is operable to direct the beam of energy to theactor.
 20. The method of claim 19, wherein the instruction comprises aninstruction to the NLRD subsystem to direct a beam of energy at theactor.