Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEMS AND METHODS FOR USING A CONDUCTED ENERGY WEAPON IN CONJUNCTION WITH A NONINVASIVE DETECTION OF IMPERMISSIBLE OBJECTS
Document Type and Number:
WIPO Patent Application WO/2023/113867
Kind Code:
A1
Abstract:
A system comprises a conducted energy weapon configured to emit at least one conductive probe in substantially an aimed direction, along with a housing containing a portable radar system with both a ranging resolution and lateral resolution sufficient to detect an object concealed on a person. The housing can be rigidly mounted on or in the conducted energy weapon, and the portable radar system can, when in operation, emit a radar beam and to receive a reflection of the emitted radar beam.

Inventors:
GRAHAM HATCH (US)
AFSHARI EHSAN (US)
TRIEBES KARL (US)
KEARNY RYAN (US)
RUSHMEYER CARL (US)
Application Number:
PCT/US2022/038547
Publication Date:
June 22, 2023
Filing Date:
July 27, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
LASSEN PEAK INC (US)
International Classes:
F41H13/00; G01S13/02; G01N21/00; G01N22/00; G01S13/88
Foreign References:
US20200109926A12020-04-09
US20080304044A12008-12-11
US20210148679A12021-05-20
US20040140924A12004-07-22
Attorney, Agent or Firm:
SMOLEN, Stuart (US)
Download PDF:
Claims:
We Claim, 1. A system comprising: a conducted energy weapon configured to emit at least one conductive probe in substantially an aimed direction; and a housing containing a portable radar system with both a ranging resolution and lateral resolution sufficient to detect an object concealed on a person, the housing rigidly mounted in contact with the conducted energy weapon, the portable radar system configured to, when in operation, emit a radar beam and to receive a reflection of the emitted radar beam. 2. The system of claim 1, wherein the portable radar system includes a radar with a range of operation between approximately .1 terahertz and 1 terahertz. 3. The system of claim 2, wherein the radar includes a coherent radar system on a chip. 4. The system of claim 2, wherein the portable radar system includes processing components configured to process instructions to perform at least one of the following set of functions: alert the user to the detection of an object, alert the user to the result of a match between a detected object and an object stored in a database, render an image, display an image, initiate a scan, or process the results of the scan. 5. The system of claim 4, wherein the portable radar system is configured to, when in operation, emit the radar beam in substantially the aimed direction. 6. The system of claim 5, further comprising circuitry to facilitate communication between the conducted energy weapon and the portable radar system. 7. A system comprising: a conducted energy weapon configured to emit at least one conductive probe in substantially an aimed direction; and a portable radar system with both a ranging resolution and lateral resolution sufficient to detect an object concealed on a person, the portable radar system including a coherent radar on a chip that is configured to operate in a range between approximately .1 terahertz and 1 terahertz. 8. The system of claim 7, wherein the conducted energy weapon and the portable radar system are contained within a single housing.

9. The system of claim 8, wherein the conducted energy weapon is contained in a first housing, and the portable radar system is contained within a second housing that is not the first housing, and that is configured to be rigidly connected to the second housing. 10. The system of claim 9, where the second housing is configured to be detachable from the first housing. 11. The system of claim 11, where the portable radar system is configured to be operated as a standalone device independent of the conducted energy weapon. 12. The system of claim 11, where the conducted energy weapon and the portable radar system are in communication with each other. 13. The system of claim 7, the portable radar system being in communication with the conducted energy weapon, wherein the conducted energy weapon comprises at least one electrode, and wherein the conducted energy weapon is configured to not deploy the at least one electrode until a signal is received from the portable radar system that allows the conducted energy weapon to deploy the at least one electrode. 14. A method comprising: scanning a subject with a portable radar system in communication with a conductive energy weapon; determining, based on the results of the scan, if an impermissible object is present on the subject; sending a signal to allow the conductive energy device to fire at least one electrode when an impermissible object is determined to be present on the subject; firing the at least one electrode at the subject. 15. ,The method of claim 15, further comprising: alerting a user when the impermissible object is present. 16. The method of claim 16, further comprising sending a signal to block the conductive energy device from firing the at least one electrode when an impermissible object is determined not to be present.

Description:
Systems and Methods for Using a Conducted Energy Weapon in Conjunction with a Noninvasive Detection of Impermissible Objects CROSS REFERENCE TO RELATED APPLICATIONS [01] This application claims priority to U.S. Provisional Patent Application No. 63/288,942, filed on December 13, 2021 and titled “Systems and Methods for Using a Conducted Energy Weapon in Conjunction with a Noninvasive Detection of Impermissible Objects,” the contents of which are hereby incorporated by reference in their entirety; this application claims further priority as a continuation-in-part to U.S. Patent Application No. 63/043,779, filed on June 25, 2020 and titled “Systems and Methods for Noninvasive Detection of Impermissible Objects,” the contents of which are hereby incorporated by reference in their entirety, which claims priority to U.S. Provisional Patent Application No.63/043,799, filed on June 25, 2020 and titled “Systems and Methods for Noninvasive Detection of Impermissible Objects,” the contents of which are hereby incorporated by reference in their entirety. BACKGROUND [02] Over time, conducted energy devices (“CEWs”), also called conducted energy devices (“CEDs”), are increasingly by law enforcement as an alternative to the use of the firearms because CEWs are not considered deadly force. The safety of CEWs such as Tasers and stun guns, however, has been called into question as the link between these weapons and sudden in-custody death has been studied and adjudicated. In fact, the evolving caselaw surrounding called excessive force and its relationship to the use of CEWs have steered many agencies away from reliance on such weapons. Increasingly, law enforcement rules are proscribing the use of CEWs for controlling resisting suspects or subduing fleeing suspects in the absence of an immediate threat of physical harm to an officer or others, thus limited the use of CEWs to the same or similar use of more lethal weapons such as handguns. [03] In spite of these circumscribed uses, however, law enforcement continues to use CEWs, finding them a less lethal options to handguns or other weapons. Nevertheless, use of these devices has been controversial, given the pain and loss of control they impart, and because of the rare but real possibility of death after a CEW is used on a subject. [04] Research has revealed that improper use of a CEW — for instance, too many activations of the device, prolonged exposure, or use on the chest, thus risking heart abnormalities — can cause significant injury or be a factor in those rare occasions when death follows CEW exposure. Because of this, the Fourth Circuit has stated about CEWs that “Taser use is unreasonable force in response to resistance that does not raise a risk of immediate danger.” Even this formulation, however, can be too broad and does not account for situations where an unrestrained arrestee, though resistant, presents no serious safety threat. [05] Thus, a need exists for a way of minimizing CEW use to situations where such use is absolutely necessary, such as where a resisting subject is carrying a concealed weapon, while reducing CEW use where it is not absolutely necessary. SUMMARY [06] Embodiments of the present invention involve breakthrough innovations to revolutionize how determining the necessity of using a CEW by determining whether a subject is armed and thus presents deadly risk to law enforcement. Embodiments include a handheld CEW device such as a Taser, where the handheld device includes or is otherwise in communication with high-resolution imaging systems that are capable of detecting objects hidden under, for example, people’s clothing, or within a bag, or elsewhere. Using embodiments of the present invention, a user can safely conduct a weapons search without being in physical contact with the subject being searched, and if no weapons are determined to exist, the user may consider a reduced use-of-force, including eliminating the use of the CEW based on an assumption that less forceful means may be deployed after the device confirms the absence of weapons. [07] Embodiments of the present invention implement, on a single chip, previously bulky and expensive devices, a radar that can provide the scanning and imaging functions prior to engaging a subject with a CEW. Embodiments of these innovations include components such as a low noise, high bandwidth Voltage Controlled Oscillator (VCO) to attain a center frequency exceeding 200 MHz, a coherent mixer that improves receive sensitivity by 1000x over existing solution, and a full on-chip multi-element scanner that eliminates the need for external antennas or element arrays. Furthermore, embodiments include process innovations allowing these chips to include low-cost 55 nm CMOS or SiGe semiconductors, or other readily available processes. [08] Embodiments of the invention include a method or methods for subduing or controlling a subject after finding a concealed- object detection using one or more handheld, portable, battery operated, electromagnetic scanning apparatuses configured to operate at distance of two to ten feet. In an embodiment, the operator conducting the object search positions the subject to be scanned at a distance of up to approximately six to ten feet (or more) from the apparatus and initiates the scan. The apparatus emits non-visible electromagnetic radiation in the Terahertz (THz) frequency band between approximately .1 and 1 THz as part of the scanning process. In an embodiment, the apparatus employs a phased array antenna in conjunction with a voltage controlled oscillator (VCO) to steer the emitted beam both vertically and horizontally to transmit electromagnetic radiation and deterministically illuminate the subject of the scan. Reflected electromagnetic radiation is received by an antenna on the apparatus and coherently mixed with the transmitted signal, allowing differential phase and amplitude information to be recovered. In an embodiment, the received signal is converted from time domain to frequency domain creating data that is used to produce an image. In an embodiment, the resultant image is further processed using a pattern matching algorithm (or a combination of algorithms) to identify objects within the field of view of the apparatus. The objects can be compared against a database of known objects and the operator is alerted and/or the CEW is activated in the case of a match, or not engaged (or disabled) in the case of no match. [09] In an embodiment, the apparatus is configured to show only suspicious objects on a representation of a subject’s body, and not to provide any images of the subject’s actual body. In an embodiment, the apparatus is configured to provide a visual representation of a suspicious object. In an embodiment, the apparatus is configured to display where on a subject’s body the suspicious object can be found. In an embodiment, the apparatus is configured to provide an audible, visible, or mechanical warning that a suspicious object exists, thus allowing allow the searcher to keep their hands free during the scan. In an embodiment, the apparatus is used in a handheld mode. In an embodiment, the apparatus is used in a hands-free mode, and can be attached to the searcher’s clothing or hung from the searcher’s body, or attached to the searcher’s equipment. In an embodiment, the apparatus can be attached to airborne or terrestrial vehicles, such as, but not limited to drones, automobiles, or robotic systems. In an embodiment, the apparatus can be used in conjunction with, or as part of, a body- worn camera. In an embodiment, the apparatus can be configured to be in communication with a network, and can upload both scanned data and metadata related to the scanned data, to a cloud-based or network- based system for further analysis and storage. [10] In addition to object detection, in embodiments, the apparatus can be configured to provide an image of a scanned subject’s facial features even where the subject is wearing a mask or other clothing or covering. The resultant images can be subsequently used to determine the subject’s identity either visually or through the use of a facial recognition system. BRIEF DESCRIPTION OF THE DRAWINGS [11] The present invention is illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which: [12] FIG.1 is a block diagram of a system for providing a noninvasive imaging and detection system, according to an embodiment of the invention. [13] FIG. 2 is a flow chart of a process for noninvasive concealed-object detection, according to an embodiment of the invention. [14] FIG.3 is a flowchart of a method for creating a dataset from images taken by a non-invasive scanner, the dataset being appropriate for post processing and use in imaging and detection, according to an embodiment of the invention. [15] FIG.4 is a flowchart of a method for processing a final image, according to an embodiment of the invention. [16] FIG.5 is a block diagram of a schematic for a radar system on a chip (RSOC), according to an embodiment of the invention. [17] FIG. 6 is a block diagram of a system for providing a system for noninvasive imaging and detection, in conjunction with a CEW. [18] FIG. 7 is a flowchart of a method of using the system, according to an embodiment. DETAILED DESCRIPTION [19] One or more of the systems and methods described herein describe a way of providing a system and method for noninvasive searches. As used in this specification, the singular forms “a” “an” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, the term “a computer server” or “server” is intended to mean a single computer server or a combination of computer servers. Likewise, “a processor,” or any other computer-related component recited, is intended to mean one or more of that component, or a combination thereof. [20] FIG.1 is a block diagram of a system for providing a system for noninvasive imaging and detection. In an embodiment, the system comprises a coherent radar system on a chip 101, in communication with a core processing system 102. The core processing system 102 includes a processor 103 and custom logic 104. [21] The coherent radar system on a chip is configured to provide both range resolution and lateral resolution that is orders of magnitude greater than is found in the prior art. For a single radar chirp emitted by the chip, range resolution, which refers to the quantifiable distance to an object, is directly related to the bandwidth (fmax – fmin), where the available bandwidth is typically 5% – 15% of the transmitted center frequency. Thus, the higher the center frequency, the higher the available bandwidth, and so the higher the ranging resolution. Because the chip is designed to operate in the THz range, the ranging resolution may be used to distinguish distances in the sub-millimeter range. [22] Lateral resolution, on the other hand, relates to the quantifiable distance between samples of perpendicular cross section (e.g., side to side and top to bottom). In other words, lateral resolution relates to feature resolution of a scan. As the transmitted signal is swept across the target (i.e., the target is scanned), the resultant received signed is processed to show variations in reflectivity from the scanned target. These variations can be processed by using standard techniques such as, but not limited to, a Fast Fourier Transform (FFT) to produce an image. The feature size, or resolution of the image, is directly proportional to the wavelength of the emitted source where the shorter wavelength provides increased resolution. Another way to describe this is to say lateral resolution is a function of both beamwidth and steering. Beamwidth is a function of wavelength divided by antenna dimension. As the frequency of the beam increases, its wavelength decreases, and hence, the beamwidth decreases. In addition, the more antenna elements found on the chip, the larger the dimension, and thus the tighter the beamwidth. The tighter the beamwidth, the higher the resolution of distinguishing cross- sectional differences. Thus, in the THz range where the chip operates, the device can provide sub millimeter lateral resolution. Coherence is used to achieve high receiver sensitivity, and allows for recovery of the difference of frequency between transmit and source. This high receiver sensitivity is used to obviate the need for transmitting a signal on the order of >1,000x or 30 dB higher in power, which would not allow for a single chip implementation of the radar. [23] In an embodiment, core processing system 102 includes processor 103 and custom logic 104. Processor 103 is configured to process instructions to render or display images, initiate a scan, process the results of a scan, alert the user, and provide the results of an object match, if any, to the user. Processor 103 can be any of a variety and combination of processors, and can be distributed among various types and pieces of hardware found on the apparatus, or can include hardware distributed across a network. Processor 103 can be an ARM (or other RISC-based) processor. Additionally, such processors can be implemented, for example, as hardware modules such as embedded microprocessors, Application Specific Integrated Circuits (“ASICs”), and Programmable Logic Devices, including flash memory (“PLDs). Some such processors can have multiple instruction executing units or cores. Such processors can also be implemented as one or more software modules in programming languages as Java, C++, C, assembly, a hardware description language, or any other suitable programming language. A processor according to some embodiments includes media and program code (which also can be referred to as code) specially designed and constructed for the specific purpose or purposes. Custom logic 104 can include one or more Field Programmable Gate Array(s) (FPGA) or any type of PLD for custom logic to support processing offload from Processor 103. In an embodiment, the term “processing offload” includes digital signal processing and digital beam forming. [24] In communication with coherent radar system 101 and core processing system 102, are the systems and communications circuits 105, comprising wireless communications circuits 106, Memory 107, power source 108, and an external electrical connection 109. In an embodiment, the components may be housed within a single housing; in an embodiment, the components, including the coherent radar system on the chip 101, the memory 107, may be stored in separate housings as a need arises to separate chip 101 from memory 107. [25] Wireless communications circuits 106 can include any practicable wireless communications circuits including, but not limited to, a wireless fidelity (“Wi-Fi”) or wireless local area network (“WLAN”) connection, a wireless wide area network (“WWAN”) connection, a Bluetooth connection, an LTE/5G connection, and/or a cellular connection. [26] Memory 107 can be used to store, in computer code, artificial intelligence (“AI”) instructions, AI algorithms, a catalog of images, device configuration, an allowable, calculated, or predetermined user workflow, conditions for altering, device status, device and scanning configuration, and other metadata resulting from the scanning process. Memory 107 can be a read-only memory (“ROM”); a random-access memory (RAM) such as, for example, a magnetic disk drive, and/or solid-state RAM such as static RAM (“SRAM) or dynamic RAM (“DRAM), and/or FLASH memory or a solid-data disk (“SSD), or a magnetic, or any known type of memory. In some embodiments, a memory can be a combination of memories. For example, a memory can include a DRAM cache coupled to a magnetic disk drive and an SSD. Memory 107 can also include processor-readable media such as magnetic storage media such as hard disks, floppy disks, and magnetic tape; optical storage media such as Compact Disc/Digital Video Discs (“CD/DVDs), Compact Disc-Read Only Memories (“CD-ROMs), and holographic devices: magneto-optical storage media such as floptical disks; Solid state memory such as SSDs and FLASH memory; and ROM and RAM devices and chips. [27] Power source 108 can include any type of practicable battery, including but not limited to, Lithium-ion, Nickel Cadmium, Nickel-Metal Hydride, and alkaline. Power source 108 can comprise an external power source coupled to circuitry internal to the device. USB connection 109 can be used to put the apparatus in communication with a network, or can be used to provide an electrical connection to charge or power the apparatus. [28] In an embodiment, the apparatus further includes User Controls 110. User Controls 110 include user buttons 111 to manipulate the apparatus to turn the device on and off, to set the resolution, configure the device, or select a preconfigured setting, initiate a scan, initiate a connection with the cloud based service via one of the network interface (e.g., Wi-Fi, cellular, Bluetooth, or any other practicable interface) and control the camera functions. LEDs 115 can be used to provide feedback and information to the user about the state of the device, or about the results of a scan. Camera 112 is configured to capture optical images, and a microphone and speaker 113 are configured to facilitate communication, including communication to third parties, or communication with the device through voice or audio commands, and for the device to provide sound to the user such as one or more alarms or notifications. Display panel 114 can be an LCD or other type of display panel configured to display messages to the user, or to provide images representing the results of a scan. [29] In an embodiment, the apparatus comprises major program-code components 116 used to operate and control the device, which can include the computer instructions executed by the apparatus in performing a scan, and other functions of the apparatus. Program-code components 116 can include, but are not limited to, micro-code or micro-instructions, machine instructions (such as produced by a compiler), and files containing higher-level instructions that are executed by a computer using an interpreter. Program code can include hardware, software, firmware, and any practical way of coding. For example, an embodiment may be implemented using HTML, Java, C++, or other object-oriented programming language and development tools. Additional examples of program code include, but are not limited to, control signals, encrypted code, and compressed code. Major program code can include, but is not limited to, a standard operating system (e.g., Linux), hardware drivers for software-managed hardware elements, machine-learning inferencing, image processing, image storage and retention, cloud-service interface, scanning process, user interface, device management, cryptographic functions, user access management, and device health. [30] FIG.5 is a block diagram for a schematic of a radar system on a chip (RSOC) used in an apparatus, according to the present invention. Notwithstanding anything else in the application, one skilled in the art will understand that the RSOC includes all the elements described with regard to FIG.5 on a single chip (with the exception of ADC 509, addressed below). Generally, the RSOC transmits the high frequency signals via TX antenna 504, and receives the reflected signal via RX antenna 505, to produce a baseband analog signal that is digitized by an external analog-to-digital converter (ADC 509) and processed by digital processing logic and a CPU to product a visible image of the scanned target. The RSOC consists of two major functions; 1) A transmitter that produces the radar signal and initiates the scan and 2) a receiver that receives the reflected signal and recovers differential phase and frequency information, and provides that information to the digital processing system. [31] In an embodiment, Transmitter 520 consists of 4 major functional components: Ramp Generator 501, Wide-Band Voltage Controlled Oscillator (VCO) 502, Directional coupler 503, and a Phased-array element array 504. Ramp generator 501 is configured to provide a voltage signal to Wide Band VCO 502, which controls the center frequency of the VCO nominally centered between approximately .1 to 1 THz. Ramp Generator 501 is configured to move the center frequency of Wide Band VCO 502 over a predetermined frequency that creates a frequency sweeping action to produce the radar scan. Ramp Generator 501 can generally produce a sawtooth voltage waveform, however, other waveforms such as ramp, sinusoid, flat, or combinations thereof, may be employed as well. The Wide Band VCO 502 can be is implemented to produce low phase noise, thus improving the receiver’s receiver sensitivity. The signal from Wide Band VCO 502 can then be provided to Directional Coupler 503, which can create at least two coherently related identical versions of the input signal. One of the two versions of the input signal is provided to the sub-harmonic mixer as a coherent reference, and the other version of the input signal is provided to the phased array element antenna. Each element in the system acts as an antenna and employs a phase-locked oscillator coherently related to the signal from Wide Band VCO 502 to ensure a fixed phase relationship from adjacent transmitting elements, which can be used for, for example, to attenuate unwanted sidelobes. The high frequency energy produced by the elements is focused using an external radar lens (not shown), generally implemented as a hemispherical component of radar transmissive material, to scan the target and create the reflected high frequency energy to be received by Receiver 530. [32] Receiver 530 consists of 5 major functional elements: 1) Receive Antenna (RX Antenna) 504; 2) Sub Harmonic Mixer 505; 3) Low Noise Amplifier (LNA) 506; 4) Band Pass Active Filter 507; and 5) Variable Gain Amplifier (VGA) 508. Receive Antenna 505 is configured to receive the reflected signal broadcast by the transmitter and reflected from the target. RX Antenna 504 may be implemented as a dipole antenna, or by any other practicable antenna configuration. The signal received at RX antenna is provided to the sub-harmonic mixer, which can then create sum and difference frequencies based on the reference signal provided by the transmitter. The sum and difference frequencies are coherently related, and enable the receiver to recover differential phase and frequency, thus improving the noise figure of the receiver by up to approximately 10,000x (or 40 dB) as compared to traditional non- coherent receivers. LNA 506 is used to amplify the signal as required by Band Pass Active Filter 507. Band Pass Active Filter 507 filters off undesirable harmonics created by the Sub-Harmonic Mixer 505. The term ‘active’ refers to the use of active elements to include linearly biased transistors in conjunction with reactive and passive elements to provide the bandpass filter with minimized or reduced noise and phase distortions of the passed signal. VGA 508 receives the signal from band-pass filter and amplifies and provides the necessary impedance matching for external ADC 509. In an embodiment, ADC 509 is implemented functionally on the RSOC. In an embodiment, ADC 509 is implemented external to the RSOC. [33] FIG.2 is a flow chart of a method for using a non-invasive scanner for creating images useful for imaging and detection. Prior to use, in an embodiment, the apparatus will have, and will be in, one of a set of operational modes and or states, including a low-power or standby mode, a synching mode, and an off mode. A user can generally tell, based on the apparatus’s display, whether the apparatus is in an operational mode or not. In an embodiment, the apparatus will be able to show the local user which state the apparatus is in, via LEDs, local LCD panel, or using an audible warning. If the apparatus is in an off mode, then the apparatus is powered off and does not perform any scanning. In an embodiment, the apparatus can be in a state that requires user interaction to set up the apparatus in sync mode and connect it to an online network for backup and additional functionality such as uploading data and metadata. In an embodiment, the apparatus can be set to sync automatically through the online network. [34] In sync mode, the apparatus can send and receive operational control parameters such as a cryptographic device key for device or user login to the system, user- configuration data detailing, for example, who is using the apparatus, what organization or department the user belongs to, updates to the machine-language inferencing engine, relevant (e.g., user or departmental) policies and controls, including general policies on alert, event, and trigger actions. In addition, the operational control parameters can include information detailing how full the device disk is, and whether upload is required. In an embodiment, the machine- language inferencing engine is the process that performs the object pattern matching and subsequent identification. In an embodiment, it can be implemented in software and accelerated using and FPGA. In an embodiment, it can be implemented in hardware. In an embodiment, it can be implemented in any practicable combination of hardware and software. [35] In the low power or standby mode, in an embodiment, the apparatus is operational and ready for use. In an embodiment, network access exists, along with a live connection to any related network services. In another embodiment, no network access exists. The apparatus can include sufficient local storage and processing power for operating independent of a network. The apparatus can further include a timer along with a device key to allow a user to use the apparatus as long as the timer has not timed out, thus ending the user session on the apparatus. [36] In embodiments, other modes that can be used by the apparatus include active-target-acquisition mode, and active-non-physical-search-in-process mode. In active- target-acquisition mode, the apparatus will show or relate the field of view to the user with an active camera and preparing to go to state 5. State 5 defines the system being in the active state of a non-physical search. In this state, the apparatus imaging system pipeline and real-time alerts and notifications are active. [37] In an embodiment, if the device is ready for use, then at 201, the user initiates a non-physical search of a subject. In an embodiment, the initiation of the non-physical search can begin with a user setting up a subject between 5 and 10 feet away from the apparatus. The subject can then be asked to look at the user and/or the apparatus. The user can then point the apparatus toward the subject and turn on the scanning function of the device via a button, trigger, voice control, or other control switch. [38] At 202, in an embodiment, the apparatus scans the subject. To do this, in an embodiment, the radar system on a chip generates a radar signal and sweeps a predetermined field of view, emitting a radar signal in the .1 to 1 THz range. The apparatus employs a phased array antenna in conjunction with a voltage controlled oscillator (VCO) to steer the emitted beam to transmit electromagnetic radiation and deterministically illuminate the subject of the scan, according to an embodiment. To complete the scan, the emitted signal interacts with the subject, and a certain amount of the electromagnetic radiation is reflected back and received by an antenna on the apparatus. The received signal is coherently mixed with the transmitted signal allowing differential phase and amplitude information to be recovered. In an embodiment, the transmit signal is combined, or mixed, with the returning signal allowing for recovery of frequency and phase information in the receive signal. [39] At 203, in an embodiment, the analog signal from the scan is converted to a digital format using one or more analog-to-digital converters (ADCs) to create a digital image that can be forwarded to the processing complex of the apparatus. In an embodiment, the process of scanning and creating an image can be repeated a predetermined number of times (programmed into the apparatus or selected by the user) creating multiple digital images. [40] At 204, in an embodiment, the multiple images are sent to the processor, and in 205, the multiple images are combined in the processor to form a super image to enhance resolution, creating a super image. The steps of this super imaging process are detailed in Fig.3, discussed below. At 205, the feature resolution of the image is enhanced, thus improving the chances for object recognition in 206. [41] Once the post creation processing and sorting has been performed at 206, a determination is made at 207 as to whether an object of note is found. If an object of note is not found, the image and its corresponding data can be discarded. If an object of note is found, then at 209, the object of note is superimposed as an outline over an outline of the scanned target, and at 210, the final image is presented to the user. The image can be rendered on a screen on the device. Optionally, the image can be rendered on a smartphone or other mobile device. When rendered or displayed, the image can contain the original visual image of the target with representations of objects found. The multiple images can also be combined to create a video stream. And because the scanning process provides ranging information, the device can provide a three-dimensional rendering of the image. In an embodiment, different colors are used to indicate the threat level of the detected object. As an example (but not the only example), a red outline displayed on the apparatus can indicate the presence and position of a gun. As another example (but not the only example), a green outline can be used to indicate the presence of keys, or some other equally innocuous object. [42] In an embodiment, an image of an identified object, or a representation thereof, can be superimposed of a representation of the scanned target. In an embodiment, the representation can be an outline of the scanned target, e.g., a generic outline of a human form, over which the image representing the identified object can be placed, providing the user with information about the positioning of the object on the subject’s body, in addition to detailing the threat level of the object. In an embodiment, the representation of the scanned target can take the form of a variety of zones displayed on a screen positioned on the apparatus, or on a mobile device in communication with the apparatus. [43] Upon completion of a search, at 211, post-session processing takes place. This processing can include all or some of the following: tagging images or videos with metadata, gathering and uploading metadata, generating a report, providing a digital signature or certificate, archiving, and uploading the data (both received and processed) and metadata. In this step, images can be cryptographically tagged with various metadata and transmitted and stored on the device, or can be uploaded for further processing. If a data repository is used (e.g., a cloud-based database or an online server), the images, videos, and metadata can be stored there. Examples of metadata can include (but are not limited to) time stamps, geolocation data, device data, customer specific information (user, associated visual images), networked or connected devices, voice recordings, and session information. In an embodiment, a web-based service can be implements using public cloud infrastructure and services such as those provided by (but not limited to) AWS, Azure, and GCP. [44] Fig.3 is a flowchart of a method for creating a dataset of images to be used for imaging and detection, according to an embodiment. At 301, one or more images are taken. At 302, the images are sent to a processor for processing. The image or images received at the processor are increased in size by a predetermined amount creating a set of larger images, at 303. In an embodiment, the images are increased in size to achieve finer blending of the image stack in order to extract the high frequency data that is embedded in the low frequency data hidden in the aliasing. [45] At 304, at least a subset of images in the set of larger images are aligned, according to an embodiment. In an embodiment, at 305, the layers are averaged with linear opacity 1, .5, .25, .125, and so on, allowing images, in an embodiment, to be blended evenly, making use of the aliasing. [46] At 306, in an embodiment, the image stack, the plurality of images being combined, is sharpened using a predetermined radius. At 307, according to an embodiment, the final super image is resized. One skilled in the art will understand that the output can be resized to any desirable size using any practicable resampling method that provides an appropriate image. At 308, the super image is used to create the final image (seen in 206 from Fig.2). Once the super image is created, the image is further processed, as detailed in Fig.4, discussed below. [47] Fig.4 is a flow chart of a method for processing the existing data to create a final image. At 401, an optical image is created and mapped to the super image creating a filtered image. In an embodiment, the apparatus uses a separate camera to create an optical image used as a base image configured to be mapped to the super image, according to an embodiment. In an embodiment, the separate camera is a digital camera using a CCD sensor, or a CMOS sensor, or any practicable sensor. [48] At 402, in an embodiment, the filtered images are encrypted, while the unfiltered image data is discarded. One skilled in the art will understand that the encryption can be performed using SSL or TLS secure encryption, or any practicable encryption. In an embodiment, the apparatus stores some or all of the filtered image locally. In an embodiment, the apparatus stores some or all of the filtered image in a backend cloud service where it can be archived or undergo additional processing, or both. [49] At 403, in an embodiment, the super image is analyzed to determine whether any objects of note are present on the subject, and if so, the super image is normalized for processing. In an embodiment, normalizing the super image means preprocessing it into a format, or with information, appropriate to feed an artificial intelligence system. This preprocessing can include (but is not limited to) scaling to a fixed width and height, conversion of the bit depth, shifting and or rotation of image. The processing can be performed by an artificial intelligence (AI) system. [50] At 404, once the objects have been normalized, the resultant image is transferred to an AI engine for pattern matching against known threats and then calculating the likelihood that the input data is a threat. As part of the image processing, in an embodiment, the apparatus performs an image search to match detected shapes against a prebuilt local image threat library, or a mathematical model representing such images, and makes a threat determination using parameters such as shape type, size, type of weapon, confidence level, contrast, and other parameters. Entries in the threat library can include some or all of the following: guns, knives, bombs and bomb vests, clubs, truncheons, bottles, and other objects of interest. In an embodiment, once a preliminary determination has been made that a weapon is suspected, the apparatus will focus in on the suspected weapon(s) and providing better image resolution to improving the detection confidence. In an embodiment, privacy filtering processing is applied, thus ensuring all locally storage body images are obfuscated as part of the image processing described in Fig.3. [51] In an embodiment, the policies and control of the apparatus, the chip, and the general system, can be configured and controlled by a hierarchical set of domains allowing for different domains to grant configuration control to subordinate domains. In an embodiment, the policy and configuration control can be separated from the users of the device to ensure compliance, operational procedures, and in general simplicity of use. In an embodiment, the policy and configuration control can be performed and input by a local user. In an embodiment, the policy and configuration control and be performed and input using an AI system. [52] Users can configure policies and alerts for different actions, and to provide feedback in different forms. In an embodiment, alerts can be visual (e.g., providing an outline of an object on a screen). In an embodiment, alerts can be audible (e.g., emitted by a device speaker or through an ear-piece). In an embodiment, alerts can trigger or prompt a user for additional actions of a remote device (e.g., via call to API), or other user defined actions. [53] In general, an event that triggers a display or alert of an unwanted object (as examples) can combined with, and work with, other events using, for example, Boolean logic to form complex triggers. Examples of triggers can include: More than two unidentified objects were found that were larger than a predetermined size. Events can include but are not limited to: an object is identified via machine learning with a predetermined probability; a person is identified via facial recognition, within a predetermined probability; an object of size greater than a predetermined size is found but not identified; an object of size smaller than a predetermined size is found but not identified; a search took place at a certain time of day, or within a certain range of times; and/or whether a contactless Terry Frisk is required; and any other event that can trigger an action. [54] Examples of alerts and controls can include: logging an event locally or in the cloud; logging an event in the cloud in either real time or in a batch upload; alerting a user with local audio, vibration, light or local display; alerting a user via a headset, earbuds, glasses, or any other remote device; texting to one or more mobile phone numbers or sending an alert to a mobile app; emailing an alert to one or more email addresses; providing a suggestion to a user on what a next step is for them to take, in addition to the alert itself; communicating to other contactless search devices as a remotely generated event; and calling a custom remote API, which can prompt some other action such as unlocking or locking a door, turning lights on or off, or any other customer-defined action. [55] FIG.6 is a block diagram of a system 619 for providing a system for noninvasive imaging and detection in conjunction with a CEW 617such as a Taser. For the purposes of the present invention, the term conducted energy weapons (CEW), conducted energy device (CED), projectile electric shock weapon (PEW), are used interchangeably, and can be used to refer to the class of devices that includes Tasers and stun guns, and any other device designed deploy electrodes that transmit an electrical charge or current to temporarily disable a person. [56] Typically, a CEW is a handheld device with a trigger, a safety, probes wired to a pulse generator and pulse controller, and disposable cartridges that use compressed gas such as nitrogen to launch the probes. Once the safety is off and the trigger is depressed, the taser fires two probes into a subject’s body. The wires that connect the probes to the pulse generator transmit strong electrical pulses into the subject’s body, thus immobilizing or incapacitating the subject by interfering with the subject’s nervous system. [57] In an embodiment, as in FIG.6, imaging and detection system 619 includes coherent radar system on a chip 601, core processing the system 602, systems and communications 607, a camera 612, a display panel 614, user controls, and major program code 616. In addition, in an embodiment, the overall system includes a CEW 617 in communication with the imaging and detection system 619 via communication module 618. In an embodiment, the communication is via a wire or other electrical connection. In an embodiment, the communication is wireless. [58] In an embodiment, the CEW 617 and imaging and detection system 619 are contained in a single housing. In an embodiment, the CEW 617 and imaging and detection system 619 are contained in separate portable housings but in communication with each other by a wired communication connection. For the purposes of the present invention, the term “portable” means small enough to be transported by a user’s hand such that, if contained in a distinct housing, the term “portable” is synonymous with “handheld.” [59] The wire that provides the wired communication can be detachable from CEW 617, imaging and detection system 619, or both. In an embodiment, CEW 617 and imaging and detection system 619 are contained in separate housings configured to be rigidly attached to each other. In an embodiment, CEW 617 and imaging and detection system 619 are contained in separate housings configured to be rigidly, but not fixedly, attached to each other such that they are separable while still being used together, or are separable and are independently usable. [60] In an embodiment, CEW 617 will not be allowed to deploy until it receives an enabling signal, such as a signal to disengage a safety, or a signal that allows or causes the device to charge up, or a signal from imaging and detection system 619 that an impermissible object is present. Thus, if the system scans a subject but does not detect a weapon or other predetermined device, CEW 617 may not release the safety, or may not charge its electrodes, or may provide a signal to prevent the electrodes from being deployed. In an embodiment, if imaging and detection system 619 determine that a predetermined object or class of objects is present, it can send a signal to CEW 617 that allows CEW 617 to be used on the subject. [61] In an embodiment, processor 603 includes logic that is programmable by the user to determine whether and under what conditions to allow CEW 617 to be used on a subject. For example, a user may program the device, or may simply press a button or select from a menu on display panel 614 a condition-based choice. In an embodiment, the device can be programmed, in the event the scan does not detect a weapon, to alert the user, to alert the user and not arm the CEW, to lock the device’s safety, a choice to prevent the device from charging its electrodes, or a choice to otherwise not deploy the electrodes. In an embodiment, the device can be programmed, in the event the scan does, indeed, detect an impermissible device, to (i) alert the user; (2) alert the user and arm the CEW; or (3) alert the user and fire the CEW. [62] FIG.7 is a flowchart of a method of using the system, according to an embodiment. At 701, rules for using the CEW in conjunction with the scanning function are input into the device. For example, the rules can allow the device to automatically deploy the electrodes if a weapon is detected, or can prevent the CEW from being used unless and/or until a weapon is detected. [63] At 702, a target is selected, typically by pointing the device at a subject. At 703, the device scans the subject, and, at 704, determines if an impermissible object is detected. If an impermissible object is detected at 704, then at 705, a processor sends a signal alerting the user to the existence of the impermissible object. In an embodiment, if an impermissible object is not detected at 704, then at 706, a signal is sent to prohibit the use of the CEW. For example, a signal could be sent locking the device’s safety in place, or a signal could be sent preventing the charging system from charging the device, or sending a signal blocking the electrodes from being deployed. At 707, the processor sends a signal to allow the CEW to be used to incapacitate the subject. Finally, at 708, the user uses the CEW with the intent to incapacitate the subject without using lethal force. [64] One skilled in the art will understand, in the context of embodiments of the invention, that the term “a combination of” includes zero, one, or more, of each item in the list of items to be combined. [65] For the purposes of the present invention, the term computer program or computer code includes software, firmware, middleware, and any code in any computer language in any configuration, including any set of instructions or data intended for, and ultimately understandable by, a computing device. [66] One skilled in the art will understand that the order of elements described in each figure is given by way of example only. In an embodiment, the order of elements performed can be changed in any practicable way. [67] In some embodiments, the processes in FIGS.2 – 4 and 7, or any portion or combination thereof, can be implemented as software modules. In other embodiments, the processes in FIGS.2 – 4 and 7, or any portion or combination thereof, can be implemented as hardware modules. In yet other embodiments, FIGS.2 – 7, any portion or combination thereof, can be implemented as a combination of hardware modules, software modules, firmware modules, or any form of program code. [68] While certain embodiments have been shown and described above, various changes in form and details may be made. For example, some features of embodiments that have been described in relation to a particular embodiment or process can be useful in other embodiments. Some embodiments that have been described in relation to a software implementation can be implemented as digital or analog hardware. Furthermore, it should be understood that the systems and methods described herein can include various combinations and/or sub-combinations of the components and/or features of the different embodiments described. For example, types of verified information described in relation to certain services can be applicable in other contexts. Thus, features described with reference to one or more embodiments can be combined with other embodiments described herein. [69] Although specific advantages have been enumerated above, various embodiments may include some, none, or all of the enumerated advantages. Other technical advantages may become readily apparent to one of ordinary skill in the art after review of the following figures and description. [70] It should be understood at the outset that, although exemplary embodiments are illustrated in the figures and described above, the present disclosure should in no way be limited to the exemplary implementations and techniques illustrated in the drawings and described herein. [71] Modifications, additions, or omissions may be made to the systems, apparatuses, and methods described herein without departing from the scope of the disclosure. For example, the components of the systems and apparatuses may be integrated or separated. Moreover, the operations of the systems and apparatuses disclosed herein may be performed by more, fewer, or other components and the methods described may include more, fewer, or other steps. Additionally, steps may be performed in any suitable order. As used in this document, “each” refers to each member of a set or each member of a subset of a set.