WO2014210206A1 - Wiretapping of firearms through a wireless network - Google Patents

Wiretapping of firearms through a wireless network Download PDF

Info

Publication number
WO2014210206A1
WO2014210206A1 PCT/US2014/044166 US2014044166W WO2014210206A1 WO 2014210206 A1 WO2014210206 A1 WO 2014210206A1 US 2014044166 W US2014044166 W US 2014044166W WO 2014210206 A1 WO2014210206 A1 WO 2014210206A1
Authority
WO
WIPO (PCT)
Prior art keywords
firearm
cellular telephone
telephone call
processor
data
Prior art date
Application number
PCT/US2014/044166
Other languages
English (en)
French (fr)
Inventor
Amit Goel
Srivatsan Veeraraghavan
Original Assignee
Qualcomm Incorporated
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Incorporated filed Critical Qualcomm Incorporated
Publication of WO2014210206A1 publication Critical patent/WO2014210206A1/en

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41AFUNCTIONAL FEATURES OR DETAILS COMMON TO BOTH SMALLARMS AND ORDNANCE, e.g. CANNONS; MOUNTINGS FOR SMALLARMS OR ORDNANCE
    • F41A17/00Safety arrangements, e.g. safeties
    • F41A17/06Electric or electromechanical safeties
    • F41A17/063Electric or electromechanical safeties comprising a transponder
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F41WEAPONS
    • F41AFUNCTIONAL FEATURES OR DETAILS COMMON TO BOTH SMALLARMS AND ORDNANCE, e.g. CANNONS; MOUNTINGS FOR SMALLARMS OR ORDNANCE
    • F41A19/00Firing or trigger mechanisms; Cocking mechanisms
    • F41A19/01Counting means indicating the number of shots fired
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/302Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/04Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters

Definitions

  • the various embodiments include methods, firearm devices, and systems configured with processor-executable instructions to collect data regarding the location and use of firearms, encrypt the data, and anonymously transmit the data through a cellular telephone network from a firearm to a non-recording telephone device. Transmitting the collected data via a telephone call enables authorized law enforcement to acquire the data via a legal wiretap. Sending the collected data to a non-recording telephone device ensures that the data is not recorded for
  • a firearm may include a cellular telephone transceiver, a location sensor, a use sensor, and a processor coupled to the cellular telephone transceiver, the location sensor, and the use sensor, where the processor is configured to place a cellular telephone call with a non-recording telephone device and transmit without a user's knowledge at least one of the location of the firearm and a use of the firearm through a cellular telephone network to the non-recording telephone device.
  • the firearm may include a plurality of additional sensors configured to collect information regarding its status, ammunition level, video, audio, aiming direction, environment, a user's heart rate, etc., and the firearm may transmit the additional data through the cellular telephone network to a receiving device such as the non-recording telephone device.
  • the firearm may include a camera, and the system may transmit a video stream through the cellular telephone network to the network destination.
  • An embodiment method implemented on a firearm with a wireless communication circuit may include acquiring data including the location and use of the firearm, determining whether a wireless data communication link is available, storing the acquired data in memory in response to determining that a wireless data communication link is not available, placing a telephone call to a non-recording telephone device and transmitting the acquired data and the stored data in the memory via the telephone call in response to determining that a wireless data communication link is available.
  • the method may include encrypting the acquired data prior to transmitting it to the non-recording telephone device in the telephone call.
  • a Communications Assistance for Law Enforcement Act (CALEA) server may be configured to receive, without a firearm user's knowledge, at least one of a location of the firearm and a use of the firearm while the firearm is transmitting data by a telephone call through a wireless
  • a network server may add an opaque marker to the call originating from the selected firearm to the non-recording telephone device to mask the identity of the firearm user.
  • the network server may receive the call from the selected firearm and determine whether the call is marked for CALEA forwarding.
  • the network server may transmit a copy of the phone call and the associated sensor data (e.g., location, use, status, ammunition level, video, audio, aiming direction, environment, a user's heart rate, etc.) to the CALEA server when the call is marked for forwarding to the CALEA server.
  • the network server may end the call between the selected firearm and the non-recording telephone device to conserve battery power on the selected firearm.
  • the CALEA server may be configured to receive sensor data from the firearm through the cellular telephone network by intercepting the communication between the firearm and the non-recording telephone device.
  • the server may be configured to receive a video stream through the cellular telephone network, store the video stream in a memory, and output the video stream for viewing.
  • An embodiment method implemented at a CALEA server and/or the network server may include selecting a firearm from a plurality of firearms, initiating or accessing a legal wiretap of calls to/from the selected firearm, adding an opaque marker to the call originating from the selected firearm, receiving a call from the selected firearm, determining whether the call is marked for CALEA forwarding, transmitting a copy of the phone call and the associated data to the CALEA server while transmitting the same to a non-recording telephone device in response to determining that the call is marked for CALEA forwarding, ending the call/call attempt between the firearm and the non-recording telephone device in response to determining that the call is not marked for CALEA forwarding, receiving the firearm use data transmission by the selected firearm in telephone calls via the legal wiretap.
  • the CALEA server may decrypt the received firearm data.
  • the CALEA server may store the firearm data for future use.
  • a firearm may include means for acquiring data related to the firearm including a location and a use of the firearm, means for determining whether a cellular telephone call may be established, means for storing the acquired data in memory in response to determining that a cellular telephone call cannot be established, and means for placing a cellular telephone call to a non- recording telephone device and transmitting the acquired data and data stored in the memory via the cellular telephone call in response to determining that a cellular telephone call can be established.
  • the firearm may include means for encrypting the acquired data prior to transmitting the acquired data to the non-recording telephone device via the cellular telephone call.
  • An embodiment includes a non-transitory processor-readable storage medium having processor-executable instructions stored thereon that are configured to cause a processor of a firearm to perform operations including acquiring data related to the firearm including a location and a use of the firearm, determining whether a cellular telephone call may be established, storing the acquired data in memory in response to determining that a cellular telephone call cannot be established, and placing a cellular telephone call to a non-recording telephone device and transmitting the acquired data and data stored in the memory via the cellular telephone call in response to determining that a cellular telephone call can be established.
  • the stored processor-executable instructions may be configured to cause the processor of the firearm to perform operations further including encrypting the firearm processor acquired data prior to transmitting the acquired data to the non-recording telephone device via the cellular telephone call.
  • a cellular communication system may include a firearm with a cellular telephone transceiver, a location sensor, a use sensor, and a firearm processor coupled to the cellular telephone transceiver, the location sensor, and the use sensor.
  • the firearm processor is configured with processor-executable instructions to perform operations including acquiring sensor data from the location sensor and the use sensor, determining whether a cellular telephone call can be established, storing the acquired sensor data in memory of the firearm in response to determining that a cellular telephone call cannot be established, and placing a cellular telephone call from the firearm cellular telephone transceiver to a non-recording telephone device and transmitting the acquired sensor data and sensor data stored in the memory via the cellular telephone call in response to determining that a cellular telephone call can be established.
  • the cellular communication system may include a CALEA server configured with processor-executable instructions to perform operations including initiating a wiretap on the firearm using a telephone number of the firearms' cellular telephone transceiver, and receiving through the wiretap the sensor data sent from the firearm to the non-recording telephone device via the cellular telephone call.
  • a CALEA server configured with processor-executable instructions to perform operations including initiating a wiretap on the firearm using a telephone number of the firearms' cellular telephone transceiver, and receiving through the wiretap the sensor data sent from the firearm to the non-recording telephone device via the cellular telephone call.
  • the cellular communication system may include a network server configured with processor-executable instructions to perform operations including adding an opaque marker to the cellular telephone call originating from the firearm, determining whether the cellular telephone call from the firearm is marked for CALEA forwarding, and transmitting a copy of the sensor data sent from the firearm to the non-recording telephone device via the cellular telephone call to the CALEA server in response to determining that a cellular telephone call is marked for CALEA forwarding, and ending the cellular telephone call and data transmission to the non-recording telephone device in response to determining that a cellular telephone call is not marked for CALEA forwarding.
  • the network server may be configured with processor-executable instructions to perform operations further including transmitting the cellular telephone call and the acquired sensor data to a network destination in response to determining that a cellular telephone call is not marked for CALEA forwarding.
  • the firearm processor may be configured with processor-executable instructions to perform operations including encrypting the acquired sensor data and the sensor data stored in the memory prior to transmission via the cellular telephone call.
  • the CALEA server may be configured with processor-executable instructions to perform operations including decrypting the sensor data obtained from the firearm via the wiretap and storing the sensor data from the firearm.
  • a cellular communication system may include a firearm with means for acquiring sensor data from the location sensor and the use sensor, determining whether a cellular telephone call can be established, means for storing the acquired sensor data in memory of the firearm in response to determining that a cellular telephone call cannot be established, means for placing a cellular telephone call from the firearm cellular telephone transceiver to a non-recording telephone device and transmitting the acquired sensor data and sensor data stored in the memory via the cellular telephone call in response to determining that a cellular telephone call can be established.
  • the cellular communication system may include a CALEA server with means for initiating a wiretap on the firearm using a telephone number of the firearm's cellular telephone transceiver, and means for receiving through the wiretap the sensor data sent from the firearm to the non-recording telephone device via the cellular telephone call.
  • a CALEA server with means for initiating a wiretap on the firearm using a telephone number of the firearm's cellular telephone transceiver, and means for receiving through the wiretap the sensor data sent from the firearm to the non-recording telephone device via the cellular telephone call.
  • the cellular communication system may include a network server with means for adding an opaque marker to the cellular telephone call originating from the firearm, means for determining whether the cellular telephone call from the firearm is marked for CALEA forwarding, means for transmitting a copy of the sensor data sent from the firearm to the non-recording telephone device via the cellular telephone call to the CALEA server in response to determining that a cellular telephone call is marked for CALEA forwarding, and means for ending the cellular telephone call and data transmission to the non- recording telephone device in response to determining that a cellular telephone call is not marked for CALEA forwarding.
  • the network server may include means for transmitting the cellular telephone call and the acquired sensor data to a network destination in response to determining that a cellular telephone call is not marked for CALEA forwarding.
  • the firearm may include means for encrypting the acquired sensor data and the sensor data stored in the memory prior to transmission via the cellular telephone call.
  • the CALEA server may include means for decrypting the sensor data obtained from the firearm via the wiretap and means for storing the sensor data from the firearm.
  • FIG. 1 A is a communication system block diagram illustrating network components of an example telecommunication system suitable for use in the various embodiments.
  • FIG. IB is a communication system block diagram illustrating a CALEA server tapping a telephone call of a firearm.
  • FIG. 2 is an illustration of an example firearm suitable for use in various embodiments.
  • FIG. 3 is a component block diagram of a firearm suitable for use in various embodiments.
  • FIG. 4 is a process flow diagram illustrating an embodiment method for a firearm to collect and transmit data in a manner that enables the data to be wiretapped.
  • FIG. 5 is a process flow diagram illustrating an embodiment wiretapping method at a remote server.
  • FIG. 6 is a component block diagram of a server device suitable for use in an embodiment.
  • CALEA Communications Assistance for Law Enforcement Act
  • CALEA has been of enormous help to law enforcement agencies as it has enabled them to seamlessly and remotely tap into phone conversations.
  • CALEA Call interception point
  • CALEA is designed to intercept the communication between two devices, such as a phone call between two mobile phones or the transmission of a text message between a mobile phone and a computer.
  • devices e.g., firearms
  • the various embodiments collect location and usage data on a firearm and then cause the firearm to send that data via a telephone call that can be wiretapped by law enforcement using the CALEA system.
  • the embodiments include the firearm placing a call to or receiving a call from a non-recording telephone device, like an automatic answering machine that does not record the call or a server that just maintains the telephone call without recording data.
  • a non-recording telephone device may receive a phone call from or start a phone call with a firearm.
  • law enforcement agencies may use CALEA wiretap solutions to intercept the phone call and record any information transmitting from the firearm. Implementing wireless technology on firearms to enable wiretapping by the CALEA system may enable law
  • a typical cellular telephone network 104 includes a plurality of cellular base stations 106 coupled to a network operations center 108, which operates to connect data transmissions between mobile phones (not shown), firearms 102, a Plain Old Telephone Service (POTS) 132, a non-recording telephone device 130, the Internet 1 10, and other network destinations.
  • POTS Plain Old Telephone Service
  • Communications between the firearms 102 and the cellular telephone network 104 may be accomplished via two-way cellular telephone communication links 1 12, such as 4G, 3G, CDMA, TDMA, and other cellular telephone communication technologies.
  • the cellular telephone network 104 may also include one or more servers 1 14 coupled to or within the cellular telephone network 104 that provide connections to the Internet 1 10, and/or are used to perform various operations, such as storing and maintaining network information or removing background noises.
  • the firearms 102 may receive geo-spatial positioning signals 122 from navigation satellites 1 16 (e.g., Global Positioning System (GPS) satellites) and use the received signals to identify their geographic positions.
  • GPS Global Positioning System
  • the one or more network servers 1 14 may be coupled to a CALEA server 120, which may receive data from wiretaps supported by the network.
  • the CALEA server may intercept data transmission between a firearm 102 and the non-recording telephone device 130 through the CALEA architecture.
  • the CALEA server may store received data from the firearms 102 for law enforcement purposes.
  • FIG. IB illustrates a phone call 190 from the firearm 102 to the non- recording telephone device 130.
  • the firearm 102 may connect wirelessly to the cellular base station 106 through a two-way cellular telephone communication link 1 12.
  • the cellular base station 106 may connect the network operations center 108, which may connect to the POTS network 132 that connects the call to the non-recording telephone device 130.
  • the non-recording telephone device 130 may answer the call from the firearm 102 and keep the line open as long as the firearm remains on the line without saving the data.
  • the CALEA server 120 may initiate a wiretap 192 by following CALEA procedures, such as upon obtaining a warrant, command a network server to download all communications from calls from/to an identified telephone number of the firearm.
  • CALEA procedures such as upon obtaining a warrant, command a network server to download all communications from calls from/to an identified telephone number of the firearm.
  • the CALEA server 120 may intercept the phone call via the CALEA wiretap 192.
  • the CALEA server 120 may tap a phone call from the firearm 102 to the non-recording telephone device by a series of connections to the network operations center 108.
  • the CALEA server 120 may connect to the network operations center 108 through the network server 1 14.
  • the CALEA server 120 may connect to the network operations center 108 through the internet 1 10 and the network server to intercept the firearms' phone calls.
  • the CALEA server 120 may initiate a tap at the network server through POTS 132, directly at the non-recording telephone device, or at any location in between the phone call of the firearm and the non-recording telephone device.
  • FIG. 2 illustrates an example firearm suitable for use in the various embodiments.
  • the firearm 202 may have a safety mechanism 204 connected to the trigger 208, which may provide a mechanical lock to prevent the trigger from moving and firing the weapon.
  • the safety mechanism may also include an electrical component that may sense the position of the safety mechanism, which may allow the firearm and an associated processor to determine the firearm's status.
  • the firearm 202 may have a camera 218 with the ability to take photos and video of the nearby area. In an embodiment, the camera 218 may be mounted on the weapon in such a way that it can record video, stills, or light fields in the same direction of the firing weapon.
  • the firearm 202 may have a standard aiming mechanism 222 with the enhancement of an electronic direction detector that detects the direction the firearm is pointing in x, y, and z planes.
  • the firearm may also have a microphone 214 for recording audio in the vicinity of the firearm, such as a user's audio notes or sounds of an active crime scene.
  • the firearm barrel 220 may include a firing detector to sense when the firearm has discharged a bullet.
  • the firearm may also have an ammunition detector 206 that detects and records the number of rounds of ammunition remaining.
  • the firearm 202 may include an environment sensor 212, which may record the temperature, humidity, barometric pressure, or any other environmental condition.
  • the firearm may also include a heartbeat sensor 224, which may detect when a user is holding the weapon.
  • the heartbeat sensor 224 may be located on the butt or grip of the weapon or any other practical location so that it may detect the heartbeat of the user.
  • the firearm may include an antenna 216 coupled to a cellular telephone transceiver or airlink modem to allow the firearm to connect to a cellular telephone network (e.g., cellular, satellite, WiFi, etc.).
  • a cellular telephone network e.g., cellular, satellite, WiFi, etc.
  • the firearm 202 may have a display 210, which may indicate the current location of the device, the remaining rounds of ammunition in its magazine from the ammunition detector 206, or any other information from the various sensors on the firearm.
  • the display 210 may show that is it connected to a cellular telephone network to allow for the remote transmission of data. This may be illustrated similar to a mobile phone where bars increasing in height may indicate the signal strength of the wireless connection.
  • an indicator such as a target (e.g., a circle with a cross)
  • the display 210 may show the user's heart rate (displayed as "1 13 V").
  • FIG. 3 illustrates components of a firearm 300 suitable for use in the various embodiments.
  • the firearm 300 may include a processor 301 coupled to the memory 302, which may store data collected from the various firearm sensors 308, 314, 316, 318.
  • the memory 302 may have a secure portion that is unalterable by the user of the firearm for storing information that may be transmitted by a telephone call via a wireless transceiver 312 over a cellular telephone network.
  • the firearm 300 may include a power source (e.g., a battery) to power the various sensors, the processor, and other components.
  • a power source e.g., a battery
  • the status detector 308 may detect a number of states or changes to the firearm. For example, the status detector 308 may track the rounds of ammunition remaining in the firearm. The status detector 308 may sense when ammunition (e.g., a bullet) is loaded into the chamber of the firearm, when the firearm is reloaded and/or when the safety is off. The status detector may also detect when a user is holding the firearm such as the heartbeat sensor 224.
  • ammunition e.g., a bullet
  • the status detector may also detect when a user is holding the firearm such as the heartbeat sensor 224.
  • a video camera 314 may be any photo or video recording device.
  • the video recorder may include a light field recorder, a video recorder, or a still picture camera.
  • the video camera 314 may be mounted on the front of the firearm as shown in FIG. 2.
  • the video recorder may be manually turned on and off by the user.
  • the video recorder may be automatically turned on once the firearm is active as determined by the processor 301.
  • the processor 301 may determine that the firearm is active when the status detector detects that a round of ammunition entered the firing chamber of the weapon.
  • the processor may signal to the video camera 314 to activate and start recording video.
  • the firearm may include an audio recorder 316 that may record sounds.
  • the audio recorder may be a microphone located at the end of the firearm as illustrated in FIG. 2.
  • the firearm may include a location sensor 318 that may record, send, and receive location information regarding the position of the firearm, whether the firearm is moving, and how fast the firearm is moving.
  • the firearm may include a transceiver 312 that may connect to a cellular telephone network (e.g., LTE, GSM, UMTS, and CDMA). Through the cellular telephone network, the firearm transceiver may transmit/receive any available data through a phone call between firearms, a non-recording telephone device, or any other device. The firearm may transmit through the transceiver 312 and the cellular telephone network any and all available sensor data to the non-recording telephone device such as the firearm's current ammunition level, location, video, audio, or any other data that the firearm may have.
  • a cellular telephone network e.g., LTE, GSM, UMTS, and CDMA
  • the firearm transceiver may transmit/receive any available data through a phone call between firearms, a non-recording telephone device, or any other device.
  • the firearm may transmit through the transceiver 312 and the cellular telephone network any and all available sensor data to the non-recording telephone device such as the firearm
  • the firearm may provide no indication that it is communicating with a cellular telephone network. In this manner, the user is never aware when law enforcement may be wiretapping the firearm.
  • the firearm may include a display 306 that may display any information from the various sensors.
  • users of the firearm may be law enforcement personnel who want to connect to a cellular telephone network.
  • the display 306 may indicate that the firearm is connected to a cellular telephone network as shown by the four escalating bars on the display 210 in FIG. 2.
  • the law enforcement personnel may want to alert other nearby law enforcement personnel of his ammunition status or whether his firearm was fired by connecting his firearm to other devices and firearms through a cellular telephone network and transmitting the appropriate data.
  • Nearby law enforcement personnel may locate the fired weapon and provide strategic back-up based on the real-time information received from the connected weapon.
  • the display may also provide the law enforcement user with a visual representation of the remaining number of bullets in the weapon as well as a visual indication of whether the weapon is loaded or jammed.
  • FIG. 4 illustrates an embodiment method 400 that may be implemented on a firearm to enable law enforcement to conduct such a wiretap.
  • the method 400 may be initiated when a user enables the firearm, the firearm periodically wakes up, or a call is received by the firearm in block 402.
  • Enabling the firearm may include, but is not limited to, a user pressing a button (e.g., a button labeled "On"), toggling a switch, disengaging the safety, or simply pressing the user's hand against a heartbeat sensor on the firearm.
  • a button e.g., a button labeled "On”
  • the firearm may include a motion sensor, and may enable itself in response to detecting movement.
  • the firearm processor may be configured to periodically wake up in block 402 to perform the method 400, such as daily, weekly or monthly. Periodically enabling the firearm may allow the processor to place a call that can be detected in a wiretap to report minimal sensor data, such as its current location and state.
  • the firearm in block 402 may be configured to receive and answer a call, such as from the non-recording telephone device, with the reception of such a call initiating the method 400 for acquiring and transmitting data.
  • the firearm may not answer the incoming call, but instead place a new call to the non-recording telephone device in response to detecting the incoming call.
  • this capability may enable law enforcement to prompt the firearm to initiate and/or conduct a telephone call and transmit data so that the data can be acquired via a CALEA wiretap.
  • the firearm may activate one or more of its sensors.
  • the firearm may have a number of different sensors including a heartbeat sensor, ammo sensor, gyroscope, directional sensor, location transceiver, audio recorder, video recorder, etc. All of these sensors may be activated or they may be individually activated based on a given situation, location, operating state, or user setting. For example, a firearm may record video only during the day due light requirements of the video recorder.
  • the firearm may record video and audio when it determines that is located in a populated area, but only ammunition and usage states when it is located in remote location where hunting is authorized. In this manner, the firearm may conserve battery power by activating only those sensors that may provide relevant information to law enforcement based on the circumstances.
  • the firearm begins acquiring sensor data from its activated sensors.
  • the firearm may determine whether it is connected to a cellular telephone network. While making the determination, the firearm may consider the signal strength connected to a network (e.g., cellular signal). In an embodiment, the firearm may determine that a low cellular signal is the equivalent of not being connected to a network. This may allow the firearm to conserve battery power instead of increasing the power and strength of its transmit and receive signals in an attempt to obtain a better wireless connection.
  • the firearm may store the acquired data in memory in block 410 and continue acquiring sensor data in block 406.
  • the processor of the firearm may be configured to periodically check the firearm's connectivity to a cellular network, storing acquired sensor data so long as a connection is not available, and placing a call when cellular network connectivity becomes available.
  • the firearm may encrypt the sensor data.
  • the sensor data may be encrypted to prevent unauthorized access of the firearm data transmission from crime syndicates, foreign governments, or other criminals.
  • the data may be encrypted using a method and cipher known to law enforcement so the data can be decrypted when obtained by a wiretap.
  • the firearm may not encrypt its data to allow easy wiretapping for the CALEA server.
  • the processor of the firearm may place a telephone call to a non-recording telephone device through a cellular telephone transceiver.
  • the non- recording telephone device may automatically answer the phone call without recording the data.
  • the processor of the firearm may place a data session call to a uniform resource locator ("URL"). Similar, to the non-recording telephone device, the URL may not record the data session call, but will automatically answer a call from the firearm or call the firearm if requested to do so.
  • URL uniform resource locator
  • the processor of the firearm may determine whether it is in use. For example, if the firearm has a heartbeat monitor, the processor may receive a signal from the heartbeat monitor and determine whether the firearm is being held based upon whether a heartbeat is detected (indicating the firearm is being held) or not. In another example, if the firearm has a firing discharge sensor the processor may determine that the firearm is in use when the firing discharge sensor is triggered (e.g., a shot is fired). As another example, if the firearm has a motion sensor (e.g., an accelerometer), the processor may determine that the firearm is in use when signals from the motion sensor indicate significant movement.
  • a motion sensor e.g., an accelerometer
  • the processor of the firearm may determine that the firearm is in use when the firearm is loaded (e.g., a bullet is located in the firing chamber of the firearm). As another example, the processor of the firearm may determine that the firearm is in use when the firearm is reloaded (e.g., a new magazine is replaced). As an opposite example,iithe processor of the firearm may determine that the firearm is not in use when the safety is on (i.e., the trigger is locked). In another opposite example, the processor of the firearm may determine that the firearm is not in use when the ammo sensor senses that the magazine is empty.
  • the processor may transmit acquired and any stored sensor data (e.g., live data and cached data) to the non-recording telephone device through the
  • the transmission of data may be wiretapped and recorded by the CALEA server during the firearm's transmission since the data is being transmitted via a telephone network.
  • the firearm may transmit the acquired and stored sensor data to a network destination such as a URL through a data session call.
  • the CALEA server may wiretap and record the data call to the URL without the firearm or the user of the firearm being aware.
  • the firearm may transmit the stored sensor data to a network destination such as a URL through a data session call that automatically answers a call from the firearm or calls the firearm if requested to do so.
  • the CALEA server may wiretap and record the data call without the firearm or the user of the firearm being aware.
  • the firearm may transmit live and stored sensor data (as in block 418) or only stored sensor data (as in block 422) to the designated location with a built-in modem in the firearm that transmits data over the phone lines to the non-recording telephone device with a modem on the receiving side.
  • the firearm may transmit sensor data to a network destination, such as a URL, with wireless modem technologies such as 3G, 4G, LTE, etc., and the network destination may receive the transmitted data, which may be intercepted by the CALEA server.
  • the processor may also delete data from the memory once it has been transmitted as part of the operations in blocks 418 and 422.
  • the operations of acquiring sensor data and transmitting sensor data may continue via the established telephone call so long as the firearm is in use and/or there is data stored in memory to be transmitted.
  • FIG. 5 is a process flow diagram illustrating an embodiment method 500 of wiretapping a firearm from a remote server, such as a CALEA server 120 as well as the interactions between the CALEA server and a network server 1 14.
  • a remote server such as a CALEA server 120
  • the CALEA server may select a network identifier or telephone number of a firearm from a plurality of firearms.
  • the CALEA server may maintain a database of telephone numbers (or other network identifier) of firearms configured with the features described herein. If there is a particular firearm that the law enforcement personnel (with appropriate court orders) want to actively track or wiretap, the CALEA server may be able to select that particular firearm from the database and obtain its telephone number or network identifier.
  • the CALEA server may use the obtained firearm telephone number or network identifier to initiate a wiretap on the selected firearm using standard CALEA processes. This process may involve the CALEA server sending the obtained firearm telephone number or network identifier to the network servers 1 14 configured to initiate a CALEA wiretap. As provided in the CALEA processes, no individual in the telephone networks may be aware that such a wiretap has been initiated.
  • the network server may add an opaque marker to the call originating from the selected firearm.
  • the opaque marker may allow the data to be associated with a particular device without disclosing the owner of the device or other data necessary to connect the individual user of the gun to the call.
  • the network server may receive a call from the selected firearm.
  • the selected firearm may call the network server according to the method described above with reference to FIG. 4.
  • the firearm may have network connectivity and call a non-recording telephone device through the network server 1 14.
  • the network server may continue the call and data transfer to the non- recording telephone device without transmitting a copy of the call and the associated data to the CALEA server.
  • the network server may continue transmitting the call and the associated data to the other device without forwarding the call and the associated data to the CALEA server unless the call is marked for CALEA forwarding.
  • the CALEA server may receive a copy of the data
  • the CALEA server may simultaneously stream the information or forward the incoming call data to another device, such as a law enforcement personnel's mobile device through a telecommunication network.
  • the CALEA server may decrypt the firearm data if the data is being transmitted in encrypted format.
  • all firearm data transmission may be encrypted to prevent unauthorized parties from obtaining tracking data of the firearms.
  • the CALEA server may have a decryption key to allow it to decrypt the data from the selected firearm or all firearms.
  • the CALEA server may store the firearm data for later use or presentation.
  • the CALEA server may store in a database any data received through its wireless wiretap of a firearm for use in investigations and subsequent criminal prosecutions.
  • Portions of the embodiment methods may be accomplished in a CALEA server architecture with some of the processing occurring in a server, such as maintaining databases of normal operational behaviors.
  • a server 600 typically includes a processor 601 coupled to volatile memory 602 and a large capacity nonvolatile memory, such as a disk drive 603.
  • the server 600 may also include a floppy disc drive, compact disc (CD) or digital versatile disc (DVD) disc drive 604 coupled to the processor 601.
  • the server 600 may also include network access ports 605 coupled to the processor 601 for establishing data connections with a network 606, such as a local area network coupled to other broadcast system computers and servers.
  • the processors 301, 601 may be any programmable microprocessor, microcomputer or multiple processor chip or chips that can be configured by software instructions (applications) to perform a variety of functions, including the functions of the various embodiments described below.
  • multiple processors 301 may be provided, such as one processor dedicated to wireless communication functions and one processor dedicated to running other
  • software applications may be stored in the internal memory 302, 602, 703 before they are accessed and loaded into the processor 301, 601.
  • the processor 301, 601 may include internal memory sufficient to store the application software instructions.
  • a component may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • a component may be, but is not limited to, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a computing device and the computing device may be referred to as a component.
  • One or more components may reside within a process and/or thread of execution and a component may be localized on one processor or core and/or distributed between two or more processors or cores. In addition, these components may execute from various non-transitory computer readable media having various instructions and/or data structures stored thereon. Components may communicate by way of local and/or remote processes, function or procedure calls, electronic signals, data packets, memory read/writes, and other known network, computer, processor, and/or process related communication methodologies.
  • the hardware used to implement the various illustrative logics, logical blocks, modules, and circuits described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • a general-purpose processor may be a multiprocessor, but, in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
  • a processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a multiprocessor, a plurality of multiprocessors, one or more multiprocessors in conjunction with a DSP core, or any other such configuration. Alternatively, some steps or methods may be performed by circuitry that is specific to a given function.
  • the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored as one or more instructions or code on a non-transitory computer-readable medium or non-transitory processor-readable medium. The steps of a method or algorithm disclosed herein may be embodied in a processor-executable software module, which may reside on a non-transitory computer-readable or processor-readable storage medium. Non- transitory computer-readable or processor-readable storage media may be any storage media that may be accessed by a computer or a processor.
  • non-transitory computer-readable or processor- readable media may include RAM, ROM, EEPROM, FLASH memory, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to store desired program code in the form of instructions or data structures and that may be accessed by a computer.
  • Disk and disc includes CD, laser disc, optical disc, DVD, floppy disk, and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also included within the scope of non- transitory computer-readable and processor-readable media.
  • the operations of a method or algorithm may reside as one or any combination or set of codes and/or instructions on a non- transitory processor- readable medium and/or computer-readable medium, which may be incorporated into a computer program product.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Evolutionary Computation (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
PCT/US2014/044166 2013-06-25 2014-06-25 Wiretapping of firearms through a wireless network WO2014210206A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/926,788 2013-06-25
US13/926,788 US20140378088A1 (en) 2013-06-25 2013-06-25 Wiretapping Firearms Through a Wireless Network

Publications (1)

Publication Number Publication Date
WO2014210206A1 true WO2014210206A1 (en) 2014-12-31

Family

ID=51211349

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/044166 WO2014210206A1 (en) 2013-06-25 2014-06-25 Wiretapping of firearms through a wireless network

Country Status (2)

Country Link
US (1) US20140378088A1 (3Den)
WO (1) WO2014210206A1 (3Den)

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10477619B2 (en) 2010-01-15 2019-11-12 Colt Canada Ip Holding Partnership Networked battle system or firearm
US10477618B2 (en) 2010-01-15 2019-11-12 Colt Canada Ip Holding Partnership Networked battle system or firearm
US10470010B2 (en) 2010-01-15 2019-11-05 Colt Canada Ip Holding Partnership Networked battle system or firearm
US9823043B2 (en) 2010-01-15 2017-11-21 Colt Canada Ip Holding Partnership Rail for inductively powering firearm accessories
US20170010073A1 (en) * 2010-01-15 2017-01-12 Colt Canada Ip Holding Partnership Networked battle system with heads up display
US9921028B2 (en) 2010-01-15 2018-03-20 Colt Canada Ip Holding Partnership Apparatus and method for powering and networking a rail of a firearm
US10337834B2 (en) 2010-01-15 2019-07-02 Colt Canada Ip Holding Partnership Networked battle system or firearm
SG192749A1 (en) 2011-02-15 2013-09-30 Colt Canada Corp Apparatus and method for inductively powering and networking a rail of a firearm
AU2013302265A1 (en) 2012-08-16 2015-03-05 Colt Canada Ip Holding Partnership Apparatus and method for powering and networking a rail of a firearm
US9395132B2 (en) 2013-04-01 2016-07-19 Yardarm Technologies, Inc. Methods and systems for enhancing firearm safety through wireless network monitoring
US9958228B2 (en) 2013-04-01 2018-05-01 Yardarm Technologies, Inc. Telematics sensors and camera activation in connection with firearm activity
US9404698B2 (en) * 2013-04-01 2016-08-02 Yardarm Technologies, Inc. Methods and systems for enhancing firearm safety through wireless network monitoring
US9644915B2 (en) * 2014-03-18 2017-05-09 Robert Joe Alderman Trigger assist module for a non-fully automatic firearm
US9863731B1 (en) * 2014-03-18 2018-01-09 Robert Joe Alderman Trigger control assistance device for a non-fully automatic firearm
US10996012B2 (en) * 2014-03-21 2021-05-04 Armaments Research Company Inc. Firearm usage monitoring system
AU2015249210A1 (en) * 2014-06-18 2016-01-21 Centinel Shield, Llc Firearm-mounted camera device with networked control and administration system and method
US9175915B2 (en) * 2014-06-22 2015-11-03 Thomas Danaher Harvey Apparatus and methods for safe use and storage of firearms and weapons
US9546835B2 (en) * 2014-10-24 2017-01-17 Anastasia P. Efremkina Automatic electronic communication system for tracking firearms
US9986142B2 (en) * 2015-06-17 2018-05-29 Maria Ann Sandoval Point of view / sight picture firearm camera (P.O.V.)
US10323894B2 (en) * 2015-08-19 2019-06-18 Paul Imbriano Weapons system smart device
US9749789B1 (en) * 2015-11-18 2017-08-29 Digital Ballistics LLC Ballistics system for determining the location of a round of ammunition
US9900738B2 (en) 2015-12-22 2018-02-20 Massachusetts Institute Of Technology System and method of automatically identifying mobile communication devices within the vicinity of a gunshot
WO2017125618A1 (es) * 2016-01-19 2017-07-27 Rade Tecnologías, S. L. Culata de arma
US9846007B2 (en) * 2016-02-25 2017-12-19 Young, Jack & Wright, Inc. Firearm discharge recording and reporting system
US12018902B2 (en) * 2017-01-27 2024-06-25 Armaments Research Company Inc. Weapon usage monitoring system having shot correlation monitoring based on user fatigue
US20240068761A1 (en) 2017-01-27 2024-02-29 Armaments Research Company, Inc. Weapon usage monitoring system having predictive maintenance and performance metrics
US10962314B2 (en) 2017-04-12 2021-03-30 Laser Aiming Systems Corporation Firearm including electronic components to enhance user experience
WO2019046721A1 (en) * 2017-08-31 2019-03-07 Blocksafe Holdings, Inc. PLATFORM FOR FACILITATING THE CONNECTIVITY OF INTELLIGENT FIREARMS
US11627451B2 (en) * 2019-01-21 2023-04-11 T-Worx Holdings, LLC Rail operating system
US11543201B2 (en) * 2020-02-28 2023-01-03 Leigh M. Rothschild Firearm analytics device
US12130121B1 (en) 2020-07-21 2024-10-29 Laser Aiming Systems Corporation Data redundancy and hardware tracking system for gun-mounted recording device
US12173992B1 (en) 2020-07-21 2024-12-24 Laser Aiming Systems Corporation Gun mounted recording device with quick release battery
US11835311B2 (en) * 2020-11-13 2023-12-05 Pull Count, LLC Devices, systems, and computer program products for detecting gunshots and related methods
US11405754B2 (en) 2020-12-07 2022-08-02 T-Mobile Usa, Inc. Weapon manager
US20230273000A1 (en) * 2022-02-25 2023-08-31 Davion Pettigrew Video camera assembly for a firearm
US11940235B1 (en) * 2023-03-19 2024-03-26 Siddharth Nirgudkar SOTERIA: smart and safe add-on for firearms

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080039962A1 (en) * 2006-05-23 2008-02-14 Mcrae Michael W Firearm system for data acquisition and control
EP2282158A1 (en) * 2009-07-30 2011-02-09 Cellco Partnership D/B/A Verizon Wireless Firearm and system for notifying firearm discharge

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6889135B2 (en) * 1999-03-31 2005-05-03 C2 Global Technologies, Inc. Security and tracking system
US6823621B2 (en) * 2002-11-26 2004-11-30 Bradley L. Gotfried Intelligent weapon
US20060086032A1 (en) * 2004-10-27 2006-04-27 Joseph Valencic Weapon and input device to record information
US7974702B1 (en) * 2008-01-10 2011-07-05 Pacesetter, Inc. Communication device, communication system and communication method for an implantable medical device
US8678824B2 (en) * 2009-02-27 2014-03-25 Opto Ballistics, Llc Shooting simulation system and method using an optical recognition system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080039962A1 (en) * 2006-05-23 2008-02-14 Mcrae Michael W Firearm system for data acquisition and control
EP2282158A1 (en) * 2009-07-30 2011-02-09 Cellco Partnership D/B/A Verizon Wireless Firearm and system for notifying firearm discharge

Also Published As

Publication number Publication date
US20140378088A1 (en) 2014-12-25

Similar Documents

Publication Publication Date Title
US20140378088A1 (en) Wiretapping Firearms Through a Wireless Network
US11131522B2 (en) Associating metadata regarding state of firearm with data stream
US10816292B2 (en) Systems, methods, and apparatuses for implementing video shooting guns and personal safety management applications
US9140509B2 (en) Evidence collecting and recording apparatus for a gun
US10469792B2 (en) Emergency assistance method and device for a firearm
US9752840B1 (en) Internet of things (IoT) automated intelligence module (AIM) and management system
US10764542B2 (en) Camera activation in response to firearm activity
US9159111B2 (en) Method for reporting and relating firearm discharge data to a crime reporting database
US20150176937A1 (en) Evidence collecting and recording apparatus for a gun
US11877089B2 (en) Emergency assistance method and device for a firearm
US20230007052A1 (en) Managing lawful interception information
US20110077022A1 (en) Carrier based in-network location triggered managed processing of wireless communications
EP2070354A1 (en) Systems and methods for location related data interception
WO2008091566A1 (en) Automatic transmission and/or video content to desired recipient(s)
CN106657867A (zh) 基于视频监控系统的移动终端报警方法及其装置
US11378355B1 (en) System for providing a third-party notification of weapon danger
TW201842758A (zh) 使用實體識別符的裝置控制
US20250174110A1 (en) Detection, analysis and reporting of firearm discharge
US8750821B2 (en) Method and apparatus for reporting emergency in call state in portable wireless terminal
US10619961B2 (en) Apparatus and method for assisting law enforcement in managing crisis situations
US8344878B2 (en) Method and apparatus for the creation of an event-associated electronic device directory
Hiremath et al. Cellular network fraud & security, jamming attack and defenses
GB2456532A (en) Personal security system and method
WO2023018895A1 (en) Body or car mounted camera system
Papageorgiou The Greek wiretapping scandal and the false promise of intelligence cooperation in the information era

Legal Events

Date Code Title Description
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14741480

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14741480

Country of ref document: EP

Kind code of ref document: A1