Visual disruption network and system, method, and computer program product thereof

ABSTRACT

Aspects of the disclosed subject matter involve an airborne-based network for implementing a laser-based visual disruption countermeasure scan pattern system, method, and computer program product. The scan pattern can be comprised of a plurality of lasers each with their own scan pattern and may be used to disrupt an optical system of a weapon or an individual. One vehicle in the network can transmit target information and/or scan information to one or more other vehicles or to a non-vehicle remote location in the network.

Embodiments relate generally to systems, methods, and computer programproducts for disrupting optical systems. In particular, embodimentsinvolve systems, methods, and computer program products for optimizing alaser-based visual disruption countermeasure scan pattern. Embodimentsalso include networks involving laser-based visual disruptioncountermeasure systems, methods, and computer program products.

SUMMARY

Embodiments of the invention can include a laser-based visual disruptioncountermeasure system on-board a helicopter, the system comprising: ahostile fire indicator subsystem on-board the helicopter to identifylocations of stationary or moving ground-based threats to the helicopterand to generate respective ground-projection zones around the identifiedlocations indicative of possible error in the identified locations, eachof the zones around the identified threat locations being in the form ofan ellipse; and an eye-safe laser-based visual disruption subsystemon-board the helicopter to generate and output a plurality of laserbeams with intensities sufficient to interfere with and temporarilyimpair a human optical system, each laser beam being output so as tofollow a rectangular scan pattern completely enveloping a correspondingellipse defining the zone indicating possible error in a correspondingidentified threat location, irrespective of current position of thehelicopter, said eye-safe laser-based visual disruption subsystem beingoperative to maintain at the same time two or more of the rectangularscan patterns. The system is configured and operative to determinewhether any of the two or more rectangular scan patterns maintained atthe same time overlap, and to increase applied laser beam energy onlyfor any overlapping portion.

Increasing the applied laser beam energy for any overlapping portion mayinclude one or more of increasing scanning frequency for only theoverlapping portion or portions, and increasing intensity of one or moreof the laser beams associated with the overlapping portion or portions.Optionally, the system is configured and operative to keep a sameapplied laser intensity for any non-overlapping portion of the two ormore rectangular scan patterns while applying increased laser beamenergy for the overlapping portion or portions, to reduce applied laserintensity for any non-overlapping portion of the two or more rectangularscan patterns while applying increased laser beam energy for theoverlapping portion or portions, or to cease applied laser intensity forany non-overlapping portion of the two or more rectangular scan patternsupon application of increased laser beam energy for the overlappingportion or portions. Increasing the applied laser beam energy for anyoverlapping portion

According to the system, optionally, the around-projection zones aroundthe identified locations can be defined based on respective positionsalong a flight path of the helicopter at which hostile fire associatedwith the ground-based threats occurred. Further, the stationary ormoving ground-based threats may be human beings firing any one of arocket-propelled grenade (RPG), anti-aircraft artillery (AAA), and smallarms fire.

The present invention can also include an embodiment or embodimentsinvolving a visual acquisition disrupter scanning system, comprising:means for defining multiple distinct threat regions associated with oneor more known threats to a vehicle (e.g., an airborne vehicle); meansfor outputting a plurality of optical impairment signals that followscan patterns based on corresponding distinct threat regions defined bythe means for defining multiple distinct threat regions; and means fordetermining whether any of the defined distinct threat regions overlap.The means for outputting a plurality of optical impairment signals canbe configured and operative to supply an increased amount of energy toany portion of the defined distinct threat regions determined tooverlap.

The system can further comprise: means for identifying the one or morethreats (e.g., ground-based); and means for estimating respectivelocations of the one or more identified threats, wherein the means fordefining multiple distinct threat regions can be constructed andoperative to define an uncertainty area around the respective locationsof the one or more identified threats.

Optionally, the optical impairment signals may be output sequentiallyalong a path of the vehicle (e.g., a flight path of an airbornevehicle). Further, each of the scan patterns may be a ground projectionin the form of one of a square, a rectangle, an oval, a circle, anellipse, a triangle, an octagon, a hexagon, or an asymmetric polygon.Additionally, optionally, the means for determining whether any of thedefined distinct threat regions overlap is configured and operative toassociate any overlap as a single threat.

One or more embodiments also are directed to a visual acquisitiondisruptor scan pattern method, comprising: electronically identifying acommon portion of at least two different flash detection areas; andresponsive to said electronically identifying, automatically applying inscanning fashion an increased amount of laser energy to the commonportion.

In one or more embodiments, optionally, the automatically applying anincreased amount of laser energy can include at least one of increasingscanning frequency of one or more lasers for the common portion andincreasing intensity of one or more of lasers for the common portion.One or more methods according to embodiments may further comprisegenerating a plurality of different flash detection areas including saidat least two different flash detection areas; and deploying a pluralityof different laser scan patterns corresponding to the plurality ofdifferent flash detection areas, the number of different flash detectionareas matching the number of different laser scan patterns, and eachlaser scan pattern enveloping its corresponding flash detection area.

Optionally, the plurality of different laser scan patterns are deployedsequentially, and the plurality of different laser scan patterns aremaintained simultaneously. The automatically applying in scanningfashion an increased amount of laser energy to the common portion may beprior to any previous scan patterns for the at least two different flashdetection areas having been deployed. Further, optionally, the increasedamount of laser energy to the common portion can be of an amountsufficient to interfere with an optical system of a weapon or an opticalsystem of a person. The method may be used or implemented with aground-, water-, space, or air-based vehicle.

Embodiments of the invention also include a laser-based disruptioncountermeasure network including a first helicopter and a secondhelicopter, comprising: a hostile fire indicator subsystem on-board thefirst helicopter to identify locations of stationary or movingground-based threats to a second helicopter and to generate respectiveground-projection zones around the identified locations indicative ofpossible error in the identified locations, each of the zones around theidentified threat locations being in the form of an ellipse, saidhostile fire indicator subsystem on-board the first helicopter beingconfigured and operative to send data representative of the generatedground-projection zones to the second helicopter in a same general areaas the first helicopter; and an eye-safe laser-based visual disruptionsubsystem on-board the second helicopter to generate and output aplurality of laser beams with intensities sufficient to interfere withand temporarily impair a human optical system, each laser beam beingoutput so as to follow a rectangular scan pattern completely envelopinga corresponding ellipse defining the zone indicating possible error in acorresponding identified threat location, irrespective of currentposition of the second helicopter, said eye-safe laser-based visualdisruption subsystem being operative to maintain at the same time two ormore of the rectangular scan patterns. The network can be configured andoperative to determine whether any of the two or more rectangular scanpatterns maintained at the same time overlap, and to increase appliedlaser beam energy only for any overlapping portion.

In one or more embodiments, the network can further comprise arteye-sate laser-based risen disruption subsystem on-board the firsthelicopter to generate and output a plurality of laser beams withintensities sufficient to interfere with and temporarily impair a humanoptical system, each laser beam being output so as to fellow arectangular scan pattern completely enveloping a corresponding ellipsedefining the zone indicating possible error in a correspondingidentified threat location, irrespective of current position of thefirst helicopter, said eye-safe laser-based visual disruption subsystembeing operative to maintain at the same time two or more of therectangular scan patterns, wherein increasing applied laser beam energyfor any overlapping portion includes application of laser beam energyfrom the eye-safe laser based visual disruption subsystem on-board thefirst helicopter and the eye-safe laser-based visual disruption subsstem on-board the second helicopter at the same time.

Optionally, the increasing applied laser beam energy for any overlappingportion includes increasing scanning frequency for only the overlappingportion or portions, and/or increasing intensity of one or more of thelaser beams associated with the overlapping portion or portions.

The ground-projection zones around the identified locations may bedefined based on respective positions along a flight path of the firsthelicopter at which hostile fire associated with the ground-basedthreats occurred. Further, the stationary or moving ground-based threatscan be human beings firing any one of a rocket-propelled grenade (RPG),anti-aircraft artillery (AAA), and small arms fire at the firsthelicopter.

Optionally, in one or more embodiments, the system may be configured andoperative to keep a same amount of applied laser intensity for anynon-overlapping portion of the two or more rectangular scan patternswhile applying increased laser beam energy for the overlapping portionor portions. Alternatively, the system may be configured and operativeto reduce applied laser intensity for any non-overlapping portion of thetwo or more rectangular scan patterns while applying increased laserbeam energy for the overlapping portion or portions.

An embodiment or embodiments also include a visual acquisition disruptorscanning network, comprising: means for receiving at a vehicle (e.g., anairborne vehicle) data regarding previously defined multiple threatregions associated with one or more known threats (e.g., ground-based)to an other vehicle (e.g., airborne), the previously defined multiplethreat regions being defined with respect to previous positions of theother vehicle; and means for outputting a plurality of opticalimpairment signals from the vehicle, the plurality of optical impairmentsignals following respective scan patterns based on previous scanpatterns of the other vehicle corresponding to the previously definedmultiple threat regions, the means for outputting a plurality of opticalimpairment signals being configured and operative to supply an increasedamount of energy to any portion of the previously defined threat regionspreviously determined to overlap.

Optionally, the data regarding previously defined multiple threatregions can include an uncertainty area around respective locations ofThe one or more known threats to the another vehicle. Further, theoptical impairment signals can be output simultaneously or substantiallysimultaneously from the means for outputting a plurality of opticalimpairment signals of the vehicle. In one or more embodiments,optionally, each said scan pattern may be a ground projection in theform of one of a square, a rectangle, an oval, a circle, an ellipse, atriangle, an octagon, a hexagon or an asymmetric polygon. Optionally,the data regarding previously defined multiple threat regions associatedwith one or more known threats to another vehicle includes scan patterndata from previous scan patterns deployed by the other vehicle.

One or more embodiments can also include a visual acquisition disruptorscan pattern method, comprising: electronically receiving, from a remotelocation, information regarding a common portion of at least twodifferent previously identified flash detection areas; and responsive tosaid electronically receiving, automatically applying in scanningfashion an amount of laser energy to the common portion.

Optionally, the automatically applying an amount of laser energy caninclude applying an increased amount of laser energy relative to aninitial amount of energy applied by a vehicle at the remote location,the increased amount of laser energy including at least one ofincreasing scanning frequency of one or more lasers for the commonportion and increasing intensity of one or more of lasers for the commonportion. In one or more embodiments, the method can further compriseelectronically receiving, from the remote location, informationregarding a plurality of different flash detection areas including saidat least two different flash detection areas; and deploying a pluralityof different laser scan patterns corresponding to the plurality ofdifferent flash detection areas, the number of different flash detectionareas matching the number of different laser scan patterns, and eachlaser scan pattern enveloping its corresponding flash detection area.

For one or more embodiments, optionally, the plurality of differentlaser scan patterns may be deployed simultaneously or substantiallysimultaneously, and/or the plurality of different scan patterns can bemaintained substantially for a same amount of time. Further, optionally,the automatically applying in scanning fashion an amount of laser energyto the common portion may be prior to any previous scanning associatedwith the location of said electronically receiving from the remotelocation. In embodiments, the amount of laser energy to the commonportion is of an amount sufficient to interfere with an optical systemof a weapon or an optical system of a person. The remote location may beassociated with one of a ground-, water-, space, or air-based vehicle.

Additionally, in one or more embodiments, scan pattern and/or threatlocation data can be stored for later use, for example, during a nextmission or returning from a mission. Accordingly, scan patterns as setforth herein can be automatically deployed based on stored scan patternand/or threat location data as the vehicle reenters corresponding areasor zones where threats locations were previously identified and/or scanpatterns previously deployed.

Embodiments also include computer program products or non-transitorycomputer readable media that can perform some or all aspects orfunctionality of methods, circuitry, circuits, systems, or systemcomponents as set forth herein and according to embodiments of theinvention.

For instance, embodiments of the invention can include a computerprogram product in the form of a non transitory computer readablestorage medium having stored thereon software in that, when executed bya processor, cause the processor to perform operations comprising:electronically receiving, from a remote location, information regardinga common portion of at least two different previously identified flashdetection areas and responsive to said electronically receiving,automatically applying in scanning fashion an amount of laser energy tothe common portion. As another example, embodiments of the invention caninclude a computer program product in the form of a non-transitorycomputer readable storage medium having stored thereon softwareinstructions that, when executed by a processor, cause the processor toperform operations comprising: electronically identifying a commonportion of at least two different flash detection areas; and responsiveto said electronically identifying, automatically applying in scanningfashion an increased amount of laser energy to the common portion.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments will hereinafter be described in detail below with referenceto the accompanying drawings, wherein like reference numerals representlike elements. The accompanying drawings have got necessarily been drawnto scale. Any values dimensions illustrated in the accompanying graphsand figures are for illustration purposes only and may not representactual or preferred values or dimensions. Where applicable, somefeatures may not be illustrated to assist in the description ofunderlying features.

FIG. 1 is a block diagram a system according to one or more embodimentsof the invention.

FIGS. 2A-2F show an example of an operational situation for the systemof FIG. 1.

FIG. 3 is a flow chart for a method according to one or more embodimentsof the invention.

FIG. 4 is a block diagram of a system according to one or moreembodiments of the invention.

FIG. 5 shows a network according to one or more embodiments of theinvention involving at least two vehicles.

FIG. 6 shows an example of an operational situation for the network ofFIG. 5.

FIG. 7 is a flow chart for a method according to one or more embodimentsof the invention.

DESCRIPTION

The description set forth below in connection with the appended drawingsis intended as a description of various embodiments of the disclosedsubject matter and is not intended to represent the only embodiments inwhich the disclosed subject matter may be practiced. In certaininstances, the description includes specific details for the purpose ofproviding a thorough understanding of the disclosed subject matter.However, it will be apparent to these skilled in the art that thedisclosed subject matter may be practiced with or without these specificdetails. In some instances, structures and components may be shown inblock diagram form in order to avoid obscuring the concepts of thedisclosed subject matter.

Generally speaking, the invention relates to systems, methods, computerprogram products and networks thereof on board a vehicle, for protectingthe vehicle or other vehicles, for instance, aircraft, from optically orvisually aimed threats located on the “ground.” The terminology on theground can include on soil, grass, etc. or in or on a building or someother man-made structure, vehicle, or natural feature that extends fromthe ground, or even into the ground. The terms “visually” and“optically” can refer to the use of light in the visible and nearvisible spectrum (e.g., IR and UV).

Accordingly, an optically or visually aimed threat can be a threat to avehicle that targets the vehicle via emission or reflection of visible,IR, or UV light from the vehicle. Examples of optically or visuallyaimed threats include a human aiming small arms fire, a rocket-propelledgrenade (RPG), anti-aircraft artillery (AAA), or the like. Weapons withoptical sensors also can be considered optically aimed threats.

Thus, embodiments of the invention can include optical countermeasuresystems, methods, computer program products and networks thereof,implemented on a vehicle or vehicles, to interfere with and/or damage,one or both of optical sensors and human vision within a scan pattern orpatterns thereof. Optionally, the optical countermeasure system, method,computer program product and network thereof can be laser-based, forinstance, a dazzler or visual acquisition disrupter (VAD) that outputsone or more laser beams to engage detected or known optically orvisually trained threats.

For instance, one or more embodiments of the invention involveairborne-based systems, methods, and computer program products foroptimizing a laser-based visual disruption countermeasure scan pattern.The scan pattern can be comprised of a plurality of lasers each withtheir own scan pattern and may be used to disrupt an optical system of aweapon or an individual. Based on the scan patterns or data used togenerate the scan patterns, the scan pattern can be focused on aparticular area or zone associated with the scan patterns or data.

Additionally, one or more embodiments of the invention involve a networkfor implementing a laser-based visual disruption countermeasure scanpattern system, method, and computer program product. The scan patterncan be comprised of a plurality of lasers each with their own scanpattern and may be used to disrupt an optical system of a weapon or anindividual. One vehicle in the network can transmit target informationand/or scan information to one or more other ground- and/or air-basedvehicles or to a non-vehicle remote location in the network. Thus, thenetwork can be comprised of a plurality of scan patterns from only onevehicle, or, optionally, of one or more scan patterns from one vehicleand one or more additional scan patterns from one or more additionalvehicles.

One or more embodiments of the invention can include a method ofdetermining a scan pattern of an airborne optical disruption system,such as a Visual Acquisition Disruptor (VAD) eye-safe laser system or adazzler, to counter stationary and/or moving ground-based opticallyaimed gunfire threats in military, law enforcement, and private securityoperational environments. The method can use results of platform sensingdata, such as hostile fire indication systems or devices, to defineregions on the ground in which threats are located or are likelylocated. The location data may be imprecise location data, and, as such,the platform sensing subsystems may not define exact threat locations,but rather with error zones or areas in the form of ellipses, forinstance. Accordingly, the method can use multiple around projectedregions as the basis for the optical disruption system scan pattern toprovide threat coverage by the optical disruption system. When projectedon the ground, error zones can define potentially complex regions thatencompass all or a predetermined amount of possible threat locations.For an airborne based system, for instance, these error zones can changeorientation as the aircraft moves. In one or more embodiments of theinvention, the method can apply countermeasure resources to known threatareas while it the amount of energy in regions with the highestlikelihood of containing the threat.

In one embodiment, a visual acquisition disruptor scanning system maycomprise means for defining multiple distinct threat regions associatedwith one or more known ground-based threats to an airborne vehicle;means for outputting a plurality of optical impairment signals thatfollow scan patterns based on corresponding distinct threat regionsdefined by said means for defining multiple distinct threat regions andmeans for determining whether any of the defined distinct threat regionsoverlap. Optionally, the system may comprise means for identifying theone or more ground-based threats; and means for estimating respectivelocations of the one or more identified ground-based threats.

The means for identifying the one or more ground-based threats maycomprise one or more electronic sensors or receivers to detectthreat-related characteristics, such as a muzzle flash, an acousticsignal from a fired projectile, a heat signature of a fired projectile,etc. The means for identifying the one or more ground-based threats mayalso comprise a dedicated processor. Optionally or alternatively, themeans for identifying the one or more ground-based threats may operatewith or be comprised of a non-dedicated processor. Further, the meansfor identifying the one or more ground-based threats may be comprised ofor be operative with vehicle-specific sensors and subsystems, such asnavigation sensors and subsystems and/or communications components andcircuitry (e.g., transceivers, processors, antennas etc,).

The means for estimating respective locations of the one or moreidentified ground-based threats may comprise a dedicated and/or anon-dedicated processor. Optionally, the means for estimating respectivelocations of the one or more identified ground-based threats may becomprised of or be operative with vehicle-specific sensors andsubsystems, such as navigation sensors and subsystems, communicationscomponents and circuitry (e.g., transceivers, processors, antennas,etc), and threat location and/or hearing determining components andcircuitry.

The means for defining multiple distinct threat regions associated withone or more known ground-based threats to an airborne vehicle maycomprise a dedicated and or a non-dedicated processor and correspondingcircuitry. Optionally, the means for defining multiple distinct threatregions associated with one or more known ground-based threats to anairborne vehicle may comprise or be operative with one or more visualdisplays to show the defined threat regions.

The means for determining whether any of the defined distinct threatregions or scan patterns overlap may comprise a dedicated and/or anon-dedicated processor and corresponding circuitry. Optionally, theprocessor(s) and corresponding circuitry are the same as theprocessor(s) and circuitry of the means for defining multiple distinctthreat regions associated with one or more known ground-based threats toan airborne vehicle. Alternatively, the processor(s) and circuitry maybe different in whole or in part.

The means for outputting a plurality of optical impairment signals thatfollow scan patterns based on corresponding distinct threat regionsdefined by said means for defining multiple distinct threat regions maycomprise a dedicated and/or non -dedicated processor, an electro-opticalcomponent, and corresponding circuitry. For example, the means foroutputting a plurality of optical impairment signals may be a laser.

In one embodiment, a visual acquisition disruptor scanning system may bepart of a network composes of a plurality of vehicles, for instance, Oneof the vehicles of the network can have means for receiving at anairborne vehicle data regarding previously defined multiple threatregions associated with one or more known ground-based threats toanother airborne vehicle. Accordingly, the another vehicle can havemeans for transmitting data regarding defined multiple threat regionsassociated with one or more known ground-based threats thereto. Themeans for receiving and the means for transmitting can includecommunication system components and circuitry, such as such as one ormore transceivers (or separate transmitters and receivers), processors,antennas, etc., to receive and send, respectively, communication signalsregarding scan patterns and identified threat locations. Omni-directionand/or directional communication can be employed with correspondingcomponents and circuitry.

FIG. 1 is a block diagram a system 200 according to one or moreembodiments of the invention. System 200 in FIG. 1 is shown as beingimplemented with a helicopter 100, for instance, a military, lawenforcement, or private security helicopter. However, system 200 can beimplemented with other airborne vehicles, such as an airplane, a jet,glider, an unmanned surveillance vehicle, a blimp, or the like. Forinstance, system 200 may be used with an airplane or jet during takeoffand/or landing. Further, in one or more embodiments, system 200 can beimplemented in or in communication with land-, space-, or water-basedvehicles, such as trucks, tanks, satellites, hovercrafts, or the like.

System 200 can include a threat subsystem 202, a controller 206, and anoptical countermeasure subsystem 208, Optionally, system 200 can includevehicle-specific data subsystems 204 that can receive, process, and/oroutput various vehicle data, such as data regarding speed, acceleration,height or altitude, location, orientation, hearing, etc. of the vehicle100. In one or more embodiments of the invention, one or more componentsof the system 200 can be implemented in components already installed onthe vehicle and may not require any additional hardware.

Generally, system 200 can detect or sense one or more threats usingthreat subsystem 202, which can identify one or more threats (e.g.,ground-based), estimate respective locations of the one or moreidentified threats, and/or define multiple distinct threat regionsassociated with the estimated or known threat locations. Threatsubsystem 202

which can send corresponding signals to controller 206 and/or directlyto optical countermeasure subsystem 208. In response, opticalcountermeasure subsystem 208 can output one or more light signals, forinstance laser beams, in a predetermined scan pattern associated withthe detected threat or threats to is with the optical system of thethreat. Optionally, the scan pattern or patterns can be dynamicallyaltered in accordance with one or more parameters associated with speed,acceleration, height or altitude, location, orientation and/or bearing,etc. of the vehicle so as to maintain an effective scan pattern for theoptical countermeasures system. Further, dynamically altering the scanpattern can mean as control signals, power, etc. for the opticalcountermeasure subsystem 208 so as to keep the scan pattern the same orsubstantially the same irrespective of the position (e.g., flight path)of the vehicle with respect to the initial deployment of the scanpattern. As will be discussed in more detail below, dynamically alteringthe scan pattern can also mean changing the geometry or location of thescan pattern, or modifying the intensity of the light signal or signalsapplied used to create the scan pattern.

Threat subsystem 202 can detect or identify an indication of opticallyor visually aimed ground-based threats to a vehicle or vehicles in anetwork. In one or more embodiments, the threat subsystem 202 can be aHostile Fire Indicating (HFI) subsystem that can detect the presence ofweapons being fired in the vicinity of the aircraft and determinewhether or not the fire is hostile to the vehicle or a group or networkof vehicles. For example, the HFI subsystem can detect the firing ofbullets or other relatively small projectiles with a sensor that detectsa muzzle flash associated with the firing of the corresponding weapon,and/or with acoustic pressure sensors such as piezoelectric transducersthat detect atmospheric disturbances created by shock waves generated bythe bullet or relatively small projectile moving through the atmosphere.

The HFI system can provide bearing information, for instance, in theform of a detection line, from the vehicle to the location of the threator estimated location of the threat with respect to the vehicle at thetime of firing.

The HFI subsystem can estimate the location or position of the shooterby superimposing (e.g., plotting) the detected bearing line or angle ofarrival (AOA) of the muzzle flash on a topographical map of the terrainof the area, for instance, and estimating an initial location for theshooter from muzzle flash intensity and terrain features, for example,The HFI subsystem can update the estimated shooter location asadditional information becomes available, such as subsequent shots.

Threat subsystem 202, such as the HFI subsystem discussed above, candefine or identify regions or zones indicative of the likely orestimated threat locations. Such regions or zones can define uncertaintyor error regions or zones with respect to the identified or estimatedthreat location. The zone or region may indicate a gradient oflikelihood or probability of error in the estimated location. The zoneor region around the identified location can take a number of geometricforms including a circle, a square, a rectangle an oval, an ellipse, atriangle, an octagon, a hexagon, or an asymmetric polygon.

Data regarding the threat location or estimated threat location (e.g.,the zone or region around the threat location), the detection line,and/or position of the vehicle at the time of detection can be sent tocontroller 206 and/or directly to optical countermeasure subsystem 208for operation of the optical countermeasure subsystem 208 in response tothe threat indication and corresponding data. Optionally, controller 206can use the threat location data to generate a zone or region around theidentified threat location, Further, optionally, in one or moreembodiments, the threat location or estimated location, the detectionline, and/or the position of the vehicle at the time of firing can bestored in a non-volatile memory storage unit of system 200 (notexpressly shown). Further, optionally, some or all the aforementioneddata may be transmitted to a location remote from the vehicle, such asanother vehicle, a satellite, or a ground-based receiving station.

Controller 206 can receive data from the threat subsystem 202, thevehicle-specific data subsystems 204, and the optical countermeasuresubsystem 208. Further controller 200 can output data and/or controlsignals to one or more of the threat subsystem 202, the vehicle-specificdata subsystems 204, and the optical countermeasure subsystem 208.Incidentally, the vehicle-specific data subsystems can includenavigation communication, weapon, control (e.g., flight control), audioand visual, etc. subsystems. For instance, one or more vehicle-specificdata subsystems can provide flight parameters, such as vehicle currentposition; orientation; motion; altitude; weight; velocity; theacceleration; pitch, roll, and the yaw of the vehicle; speed;acceleration; etc. of the vehicle to controller 206 and/or other systemsor components of the vehicle.

Generally speaking, the controller 206 can execute computer executableinstructions running thereon. Controller 206 can be implemented on oneor more general purpose networked computer systems, embedded computersystems, routers, switches, server devices, client devices, variousintermediate devices/nodes and/or stand-alone computer systems.Controller 206 can be a computerized controller or microcontroller witha processor or processors. Further, controller 206 can include and/orcoupled to volatile and non-volatile memory. Dual microprocessors andother multi-processor architectures can also be utilized as theprocessor. The processor(s) and memory can be coupled by any of severaltypes of bus structures, including a memory bus or memory controller, aperipheral bus, and a local bus using any of a variety of busarchitectures. The memory can include read only memory (ROM) and randomaccess memory (RAM), for instance. Optionally, controller 206 or system200 in general can include one or more types of long-term data storageunits, including a hard disk drive, a magnetic disk drive, to read fromor write to a removable disk), and an optical disk drive, (e.g., forreading a CD-ROM or DVD disk or to read from or write to other opticalmedia). The long-term data storage can be connected to the controller byan interface. Optionally or alternatively, some or all of the datastorage may be internal of the controller 206 and can be coupled to theprocessor(s) by a drive interface or interfaces. The long-term storagecomponents can provide nonvolatile storage of data, data structures, andcomputer-executable instructions for the controller 206 and morespecifically the processor(s) of the controller 206. A number of programmodules may also be stored in one or more of the drives as well as inthe RAM, including an operating system, one or more applicationprograms, other program modules, and program data.

Optical countermeasure subsystem 208 can be an optical disruption ordisabling subsystem that can temporarily disable or disorient an opticalsystem of a threat, such as a human firing an optically aimed or trainedweapon. The optical countermeasure subsystem 208 can generate and outputa plurality of light signals, for instance, projected laser beams ofsufficient intensity to interfere with the targeting of an opticallyaimed weapon system when its associated targeting modality (e.g., asensor or human eye is within the path of the beam or scan pattern,zone, or area of the beam. Such generation and output can be based on orin response to data received from threat subsystem 202 and/or controller206. Optionally, the countermeasure subsystem 208 can output lightsignals at detected or determined or estimated threat locations or zonesonly and not at locations or zones not determined or estimated to bethreatening.

Thus, the optical countermeasure subsystem 208, optionally, may be alaser-based subsystem that can transmit one or more laser beams todisrupt or interfere with the visual targeting capability of individualsfiring small arms weapons (i.e., shooters), for instance. The laserbeams may be non-lethal and eye-safe, intended only to temporarily blindor disorient a target or targets, for example.

In one or more embodiments, the optical countermeasure subsystem 208 canbe a dazzler that emits infrared or invisible light against variouselectronic sensors and visible light against human optical systems.Optionally, the light may be emitted by a laser.

Alternatively, in one or more embodiments, the optical countermeasuresubsystem 208 can be a Visual Acuity Disruptor (VAD) subsystem.Generally speaking, the VAD subsystem can generate and output laserbeams whose energy is aimed at a hostile shooter to disrupt his abilityto aim. The VAD subsystem also can be an eye-safe system. Morespecifically, the VAD subsystem can radiate one or more laser beams(e.g., in sequence or simultaneously) with sufficient power totemporarily impair the visual acuity of a shooter, which can cause theshooter to see spots or fingering after images for a predeterminedperiod of time after being illuminated by the laser. The laser beams ofthe VAD subsystem can be moved in predetermined patterns, such as araster scan pattern, to account for errors resulting from the flightenvironment of the VAD subsystem (e.g., platform vibration and flightmaneuvers) and errors associated with the location of the shooter. Thepredetermined radiation pattern can temporarily impair the eyesight ofindividuals within an area in the vicinity of the location of theshooter, including the shooter. Thus, the VAD subsystem can engage andcounter multiple shooters (i.e., threats) at different positions becausethe temporary impairment of the shooter's visual acuity lingers. Theimpairment of visual acuity caused by the VAD subsystem can betemporary, depending upon the power level or intensity of the laser beamsignal and the amount of time exposed to the laser

As indicated earlier, the optical countermeasure subsystem 208 cangenerate and output optical impairment signals, such as light signals,in a particular scan pattern responsive to received platform sensingdata, such as data from threat subsystem 202. The scan patterns can beprojected on the ground in association with previously defined oridentified regions Of zones indicative of the likely or estimated threatlocations. Further, the corresponding scan patterns of the output lightsignals associated with the zone or region can completely envelope thezone or region, Optionally, the scan patterns can take a different shapefrom the location zone or region but can still envelope or encompass theentire zone or region, For instance the scan patterns can take a squareor rectangular shape, whereas the threat location or zones can be in theform of ellipses. The scan patterns can be controlled by opticalcountermeasure subsystem 208, informed by the controller 206, forinstance, such that each initial scan pattern is maintained in itsoriginal form irrespective of current vehicle position. Further,multiple scan patterns (e.g., two, three, four, five, ten) may bemaintained at once. Scan patterns other than square or rectangular alsocan be generated and output, including oval, circular, ellipse,triangular, octagonal, a hexagonal, or asymmetric polygonal. The scanpatterns can be maintained irrespective of aircraft parameters, such aslocation, positioning, speed, etc.

Optionally, the system 200 can be configured and operative to determinewhether any of the two or more scan patterns maintained at the same timeoverlap or have a common portion or portions, and to increase appliedlight energy for any overlapping portion. Optionally or alternatively,the system 200 may be configured and operative to determine whether anyof the two or more known threat location zones or regions overlap eithereach other or a deployed or soon-to-be deployed scan pattern of theoptical countermeasure subsystem 208. Optionally, controller 206 canperform overlapping determinations, Again, if an overlap conditionexists, the system 200, through optical countermeasure system 208 canincrease an amount of energy (e.g., light energy) for any overlappingportion. Optionally, the system 200 can increase the amount of lightenergy only for overlapping portions. Increasing the amount of lightenergy can include increasing scanning frequency of one or mere lightsignals generated and output from the optical countermeasure subsystem208 and/or increasing the intensity of one or more light signalsgenerated and output from the optical countermeasure subsystem 208,Incidentally, an overlap as set forth herein can indicate a singlethreat to the vehicle for the associated scan patterns or identifiedlocations, zones or regions.

Optionally, system 200 can be configured and operative to keep a sameamount of light energy applied to any non-overlapping portion, to reducean amount of applied light energy for any non-overlapping portion,and/or to cease application of light energy for any non-overlappingportion, effectively changing the scan pattern or patterns of theoptical countermeasure subsystem 208.

Optical impairment signals from the optical countermeasure system 208can be output sequentially or simultaneous along a travel path (e.g., aflight path) of a vehicle. That is, one or more optical impairmentsignals, such as laser light signals, can be output simultaneously atone position of the vehicle in the travel oath, and then one or moreoptical impairment signals pan be output at a later time, for instance,at a different position of the vehicle in the travel path.

Optionally, in one or more embodiments of the invention system 200 canalso include other directed-energy weapons that may be employed inconjunction with or as an alternative to the optical disruptionsubsystem 208. Such other directed-energy weapons can include sonic, orultrasonic weapons, active denial weapons (ADSs), heat rays, or thelike.

FIGS. 2A-2F show an example of an operational situation for the system200 and helicopter 100 of FIG. 1.

As shown in FIG. 2A, helicopter 100 travels along a flight path FP fromleft to right. Though the flight path FP shown in FIGS. 2A-2F is linear,other flight paths can be taken. Further flight path can also include astationary position of the helicopter 100 over time. FIG. 2A shows aplurality of positions P1-P4 of the helicopter 100 indicated by an ‘X’at which the helicopter 100, via system 200, detects hostile fire, forinstance, via a threat subsystem as shown and described herein. Thehelicopter 100 can determine a detection or flash line DL1-DL4associated with each weapon firing. Based at least on the detectionline, the helicopter 100 can determine a location or likely location forthe threat. Optionally, the helicopter 100 can generate or identifycorresponding threat location uncertainty areas or zones that introducean amount of uncertainty or error in the location of the threat. As canbe seen in FIG. 2A, for instance, the threat location uncertainty areasmay be in the form of ellipses.

Referring now to FIG. 2B, helicopter 100 travels along flight path FPwhen at P1 a threat fires an optically aimed or trained weapon at thehelicopter 100. The helicopter 100 can detect the occurrence of thethreat and ascertain a detection line DL1 for instance. The detectionline can be used to identify a position or likely position of thethreat. Alternative or additional threat detection indicators may beemployed, such as acoustical-, visual-, or heat- based threatsubsystems. The identification of the position or likely position of thethreat can include a threat uncertainty region or zone. Shortly (e.g.,almost instantaneously) after detecting the threat, and in responsethereto, helicopter 100 can deploy an optical impairment signal from anoptical countermeasure subsystem such as a VAD subsystem, onboard thehelicopter 100. The optical impairment signal can be deployed in theform of a ground-projection that completely envelopes the threatlocation uncertainty area or zone. As an example, the optical impairmentsignal can be deployed according to scan pattern 1 shown in FIG. 2B. Thehelicopter 100 may continue alone the flight path FP while continuing ormaintaining the scan pattern 1 over the corresponding threat locationuncertainty area or zone. Optionally, the shape (i.e., rectangle) ofscan pattern 1 may remain the same, irrespective of the current positionor travel characteristics of the helicopter 100.

Moving to FIGS. 2C, 2D, and 2E, the helicopter 100 continues alongflight path FP and detects additional occurrences of threats atpositions P2-P4, ascertains corresponding detection lines DL2-4, forinstance, and identifies positions or likely positions of the threatwith corresponding threat location uncertainty patterns. In response toeach detection, shortly thereafter (again, substantiallyinstantaneously) and in response thereto, helicopter 100 canautomatically deploy optical impairment signals in respective scanpatterns 2-4. The helicopter 100 may continue along the flight path FPwhile continuing or maintaining the scan patterns 1-4 over thecorresponding threat location uncertainty areas or zones. Optionally,the shape (i.e., rectangle) scan patterns 1-4 may remain the same,irrespective of the current position or travel characteristics of thehelicopter 100.

Each overlapping area or portion of the scan patterns 1-4 and/or threatlocation uncertainty area or zone might be in indication of a singlethreat. Accordingly, helicopter 100 can identify overlapping areas orportions, for instance areas 211 and 212 in FIG. 2F, and increase theamount of energy (e.g., light energy) applied to the overlapping area orportion. For instance, the amount of energy can be increased byincreasing a scanning frequency of light signals, such as laser beams,applied to the overlapping area or portion, and/or increasing theintensity of the signal or signals applied to the overlapping area orportion. As an example, overlapping areas may be scanned twice per scancycle.

Accordingly, in one or more embodiments, the helicopter 100 andcorresponding systems, methods, and computer program products canautomatically weight the area or areas of most probable threat locationor locations by scanning those areas more frequently, for example. Thus,systems, methods, computer program products, and networks thereof canapply more energy in a region or are with the highest probability ofshooter location.

In view of the foregoing structural and functional features describedabove, a method 300 in accordance with one or more embodiments of theinvention will now be described with respect to FIG. 3. While, forpurposes of simplicity of explanation, the methodology of FIG. 3 isshown and described as executing serially, it is to be understood andappreciated that the invention is not limited by the illustrated order,as some aspects or steps could, in accordance with the presentinvention, occur in different orders and/or concurrently with otheraspects from that shown and described herein. Moreover, not allillustrated features may be required to implement a method or methods inaccordance with one or more embodiments of the invention.

Generally speaking, method 300 is a visual acquisition disruption scanpattern method that can electronically identify a common or overlappingportion of at least two different flash detection areas and/or scanpatterns. Responsive to the electronic identification, the method canapply in scanning fashion, for instance, an increased amount of energyto the common or over portion.

Method 300 can continuously loop at 301 in order to detect or identifyan occurrence of a first event, such as a threat firing an opticallyaimed or trained weapon at a vehicle. The detection or identificationcan be electronically using a threat subsystem as shown and describedherein, for instance. In response to the detection of the first event,an optical impairment signal or signals can be deployed around an areaor zone associated with the determined location or likely location oftrio threat 302. Optionally, the optical impairment signal or signalscan be deployed in a scan pattern as shown and described herein.Further, the output of the optical impairment signal or signals, forinstance, the scan pattern, can be held or maintained the scanning canbe continuous) in time and/or irrespective of position of the vehicle303.

The method can further continuously monitor for subsequent events fordetection or identification 304. Responsive to detection of subsequentevents, subsequent optical impairment signals can be output, forinstance, around an area or zone associated with the determinedlocations or likely locations of the threats, optionally in associatedscan patterns 305. As with the initial optical impairment signal orsignals, subsequent optical impairment signals may be held or maintained306. At 307, the method can determine whether any of the scan patternsand/or threat uncertainty regions overlap, if so, the scan pattern maybe modified 309, otherwise, the scan patterns may be maintained as is308. Scan pattern modification can include modifying the geometry of oneor more scan patterns, for instance to reduce the scan pattern only tothe overlapping area, and/or it can mean modifying an amount of energyapplied to a particular area or region. For in the amount of energy maybe increased for any overlapping area or region, but may be held thesame, decreased, or even stopped for other, non-overlapping areas orzones. In one or more embodiments the method can output a modifiedscanning pattern (i.e., increasing the amount of energy applied to acertain area, for instance, an overlapping area) before outputting anyprevious scan patterns or only after outputting one scan pattern. Such acase may indicate that multiple threat indications were detected closein succession and rather than outputting multiple scan patterns and thenmodifying the scan pattern, the scan pattern was in effect pre-modifiedbefore being output.

FIG. 4 is a block diagram of a system 250 according to one or moreembodiments of the invention implemented with a helicopter 400. System250 is similar to system 200 associated with FIG. 1 and helicopter 100and includes a threat subsystem 252, a controller 256, an opticalcountermeasure subsystem 258, and vehicle-specific data subsystems 254.System 250, however, additionally includes a threat communicationelement 260. Threat communication element 260 can send and/or receivedata regarding detected threats, their associated locations anduncertainty areas or zones, and corresponding scan patterns, forinstance, deployed by optical countermeasure subsystem 258. Optionally,communication element 260 can send such data to another helicopter 500in a network of helicopters or other vehicles. FIG. 5 shows helicopter400 sending data regarding detected threats, their associated locationsand uncertainty areas of zones, and corresponding scan patterns, forinstance, deployed by optical countermeasure subsystem 258 on board 400.Thus, helicopter 500, which can also include at least opticalcountermeasure subsystem 258 and communication element 200 can, withouthaving to detect threat occurrences, deploy some or all of the scanpatterns or modifications already deployed by the helicopter 400. Ofcourse the second helicopter 500 also may send data regarding detectedthreats, their associated locations and uncertainty areas or zones, andcorresponding scan patterns to helicopter 400.

FIG. 6 shows an operational example for the network of helicopters 400,500 shown in FIG. 5. Though FIGS. 5 and 6 show two helicopters 400, 500,the network may be comprised of additional helicopters or other vehiclesor non-vehicles, such as a ground base station.

Helicopter 400 travels along a first flight path, deploying four scanpatterns. The helicopter 400 can transmit scan pattern data tohelicopter 500 and the helicopter 500 can output the same scan patternsas already output by helicopter 400. Thus, helicopter 500 does notnecessarily need to detect threats and identify their locations beforeoutputting one or more scan patterns. Further, helicopter 500 can outputa modified scan pattern, for instance, with increased energy for aparticular region or zone, simply based on data received from helicopter400 and optionally without any additional information. Alternatively,helicopter 500 can output optical impairment signals based or its ownthreat detection and analysis in combination with data from helicopter400. Optionally, one or more optical impairment signals output from eachhelicopter 400, 500 may be used to increase an amount of energy for aparticular area or zone.

In view of the foregoing structural and functional features describedabove, a method 700 in accordance with one or more embodiments of theinvention will now be described with respect to FIG. 7. While, forpurposes of simplicity of explanation, the methodology of FIG. 7 isshown and described as executing serially, it is to be understood andappreciated that the invention is not limited by the illustrated order,as some aspects or steps could, in accordance with the presentinvention, occur in different orders and/or concurrently with otheraspects from that shown and described herein. Moreover, not allillustrated features may be required to implement a method or methods inaccordance with one or more embodiments of the invention.

Generally speaking, method 700 can be a visual acquisition disruptionscan pattern method. The method can include electronically receivingfrom a remote location, information regarding a common or overlappingport on of at least two different previously identified flash detectionareas or scan patterns. Responsive to the electronic reception, themethod 700 can automatically apply in scanning fashion, for instance, anamount of laser enemy to the common or overlapping portion.

Method 700 can continuously loop at 701 in order to detect or identifyan occurrence of a first event, such as a threat firing an opticallyaimed or trained weapon at a vehicle. The detection or identificationcan be electronically using a threat subsystem as shown and describedherein for instance. In response to the detection of the first event, anoptical impairment signal or signals can be deployed around an area orzone associated with the determined location or likely location of thethreat 702. Optionally, the optical impairment signal or signals can bedeployed in a scan pattern as shown and described herein. Data regardingthe scan pattern, the location or likely location of the threat, and/orthe threat uncertainty area may be transmitted to a remote location orlocations, for instance, to another vehicle or vehicles in a network ofvehicles 703. Further, the output of the optical impairment signal orsignals, for instance, the scan pattern, can be held or maintained(i.e., the scanning can be continuous) in time and/or irrespective ofposition of the vehicle 704. The method can further continuously monitorfor subsequent events for detection or identification 705. Responsive todetection of subsequent events, subsequent optical impairment signalscan be output, for instance, around an area or zone associated with thedetermined locations or likely locations of the threats, optionally inassociated scan patterns 706. Data regarding the subsequent scanpatterns, the locations or likely locations of the correspondingthreats, and/or the threat uncertainty areas may be transmitted to theremote location or locations 707. As with the initial optical impairmentsignal or signals, subsequent optical impairment signals may be held ormaintained 708. At 709, the method can determine whether any of the scanpatterns and/or threat uncertainty regions overlap. If so, such overlapdata can be sent to the remote location or locations 710 in response tothe received data, vehicles at the remote locations can take furtheraction, such as taking evasive maneuvers to avoid the hostile threatlocations, deploying optical impairment signals, or even deploying“hard-kill” weaponry.

It will be appreciated that portions (i.e., some, none, or all) of thecircuits, circuitry, modules, processes, sections, systems, and systemcomponents described herein can be implemented in hardware, hardwareprogrammed by software, software instructions stored on a non-transitorycomputer readable medium or a combination of the above.

For example, the processor can include, but is not be limited to acomputing system that includes a processor, microprocessor,microcontroller device or is comprised of control logic includingintegrated circuits such as, for example, an Application SpecificIntegrated Circuit (ASIC). The instructions can be compiled from sourcecode instructions provided in accordance with a programming languagesuch as Java, C++, C#.net or the like. The instructions can alsocomprise code and data objects provided in accordance with, for example,the Visual Basic™ language, or another structured or object-orientedprogramming language. The sequence of programmed instructions and dataassociated therewith can be stored in a non-transitory computer-readablemedium such as a computer memory or storage device which may be anysuitable memory apparatus, such as, but not limited to ROM, PROM,EEPROM, RAM, flash memory, disk drive and the like.

Furthermore, the circuits, circuitry, modules processes, systems,sections, and system components can be implemented as a single processoror as a distributed processor. Further, it should be appreciated thatthe steps mentioned above may be performed on a single or distributedprocessor (single and/or multi-core). Also, the processes, modules, andsub-modules described it the various figures of and for embodimentsabove may be distributed across multiple computers or systems or may beco-located in a single processor or system. Exemplary structuralembodiment alternatives suitable for implementing the circuits,circuitry, modules, sections, systems, system components, means, orprocesses described herein are provided below.

The circuits, circuitry, modules, processors, systems, or systemcomponents described herein can be implemented as a programmed generalpurpose computer, an electronic device programmed with microcode, ahard-wired analog logic circuit, software stored on a computer-readablemedium or signal, an optical computing device, a networked system ofelectronic and/or optical devices, a special purpose computing device,an integrated circuit device, a semiconductor chip, and a softwaremodule or object stored on a computer-readable medium or signal, forexample.

Embodiments of the method and system (or their components or modules),may be implemented on a general-purpose computer, a special-purposecomputer, a programmed microprocessor or microcontroller and peripheralintegrated circuit element, an ASIC or other integrated circuit, adigital signal processor, a hardwired electronic or logic circuit suchas a discrete element circuit, a programmed logic circuit such as a PLC,PLA, FPGA, PAL, or the like. In general, any processor capable ofimplementing the functions or steps described herein can be used toimplement embodiments of the method, system, or a computer programproduct (software program stored on a non-transitory computer readablemedium).

Furthermore, embodiments of the disclosed method, system, and computerprogram product may be readily implemented, fully or partially, insoftware using, for example, object or object-oriented softwaredevelopment environments that provide portable source code that can beused on a variety of computer platforms. Alternatively, embodiments ofthe disclosed method, system, and computer program product can beimplemented partially or fully in hardware using, for example, standardlogic circuits or a VLSI design. Other hardware or software can be usedto implement embodiments depending on the speed and/or efficiencyrequirements of the systems, the particular function, and/or particularsoftware or hardware system, microprocessor, or microcomputer beingutilized. Embodiments of the method, system, and computer programproduct can be implemented in hardware and/or software using any knownor later developed systems or structures, devices and/or software bythose of ordinary skill in the applicable art from the functiondescription provided herein and with a general basic knowledge of theuser interface and/or computer programming arts.

Having now described embodiments of the disclosed subject matter, itshould be apparent to those skilled in the art that the foregoing ismerely illustrative and not limiting, having been presented by way ofexample only. Thus, although particular configurations have beendiscussed herein, other configurations can also be employed. Numerousmodifications and other embodiments (e.g., combinations, rearrangements,etc.) are enabled by the present disclosure and are within the scope ofone of ordinary skill in the art and are contemplated as falling withinthe scope of the disclosed subject matter and any equivalents thereto.Features of the disclosed embodiments can be combined, rearranged,omitted, etc., within the scope of the invention to produce additionalembodiments. Furthermore, certain features may sometimes be used toadvantage without a corresponding use of other features, Accordingly,Applicants intend to embrace all such alternatives, modifications,equivalents, and variations that are within the spirit and scope of thepresent invention.

What is claimed is:
 1. A non-transitory computer readable medium havingstored thereon instructions that, when executed by a processor, causethe processor to perform the operations comprising: receiving, from aremote location, data regarding previously defined multiple threatregions associated with one or more known threats to the remotelocation; outputting a plurality of optical impairment signals, theplurality of optical impairment signals following respective scanpatterns; and modifying each of the respective scan patterns byincreasing an amount of energy to only a portion of the previouslydefined multiple threat regions determined to overlap.
 2. Thenon-transitory computer readable medium according to claim 1, whereinthe data regarding previously defined multiple threat regions includesan uncertainty area around respective locations of the one or more knownthreats to the remote location.
 3. The non-transitory computer readablemedium according to claim 1, wherein the optical impairment signals areoutput simultaneously or substantially simultaneously.
 4. Thenon-transitory computer readable medium according to claim 1, whereineach of said scan patterns is a ground projection in the form of one ofa square, a rectangle, an oval, a circle, an ellipse, a triangle, anoctagon, a hexagon, or an asymmetric polygon.
 5. The non-transitorycomputer readable medium according to claim 1, wherein the dataregarding previously defined multiple threat regions associated with oneor more known threats to the remote location includes scan pattern datafrom previous scan patterns deployed by a second vehicle.
 6. Thenon-transitory computer readable medium according to claim 1, whereinthe increasing the amount of energy includes increasing a scanningfrequency of a first optical impairment signal to only the portion ofthe previously defined multiple threat regions determined to overlap. 7.The non-transitory computer readable medium according to claim 1,wherein the increasing the amount of energy includes increasingintensity of a first optical impairment signal.
 8. The non-transitorycomputer readable medium according to claim 1, wherein the processorfurther performs operations comprising: maintaining an amount of energyapplied to non-overlapping portions of the previously defined multiplethreat regions.
 9. The non-transitory computer readable medium accordingto claim 1, wherein the processor further performs operationscomprising: reducing an amount of energy applied to non-overlappingportions of the previously defined multiple threat regions.
 10. Thenon-transitory computer readable medium according to claim 1, whereinthe plurality of optical impairment signals are each sufficient tointerfere with an optical system of a weapon or an optical system of aperson.
 11. The non-transitory computer readable medium according toclaim 1, wherein the remote location is associated with one of aground-, water-, space-, or air-based vehicle.
 12. The non-transitorycomputer readable medium according to claim 1, wherein the threats arehuman beings firing any one of a rocket-propelled grenade (RPG),anti-aircraft artillery (AAA), and small arms fire at the remotelocation.