Feeds

Profs design AK47-locating 'smart dust' helmets

Satnav network node-lids backtrack bullets, ID weapons

The Power of One eBook: Top reasons to choose HP BladeSystem

Acoustic gunshot detectors have become common in the past few years, and some have been reduced in size to where a single soldier can wear one on his uniform and be cued-in to an enemy's location as soon as he fires.

Engineers in Tennessee, however, are touting the idea of tieing a unit of footsoldiers' acoustic shot-spot sensors together in a wireless net. They think this would offer several benefits: the system wouldn't be confused by echoes or multiple enemies firing at once, and it would be able to locate gunmen who weren't in line-of-sight from an individual soldier. Perhaps even more impressively, the networked sonic system is able to distinguish the calibre of weapons fired, and even in some cases identify different weapons firing the same kind of ammunition.

Vanderbilt University's inhouse Exploration mag reported last week on the gunshot-locator net developed by the uni's Institute for Software Integrated Systems (ISIS). It involves mounting a small electronics package on each soldier's helmet, running on four AA batteries.

In each package is a wireless network node, of a type dubbed a "smart-dust mote" for its small size and cheapness. There are also four separated microphones, for picking up the acoustic signatures of flying bullets, and a GPS satnav location system. The GPS isn't accurate enough to act as a basis for properly pinning down opposing gunmen, so the Vanderbilt boffins added a crafty radio interferometry enhancement system of their own - apparently of such cunning that it has attracted as much interest as the rest of the system on its own.

The system works by picking up the distinctive conical shockwave trailing behind a passing supersonic bullet - the same phenomenon which produces a sonic boom behind a plane at Mach 1+. This is then related to the muzzle blast from the weapon which fired it, trailing slightly behind (the two noises are heard by people under fire as "crack-thud", or "crack-bang"). A software algorithm in the unit can work out a range and bearing to the enemy weapon's muzzle.

So far, so ordinary: a system much like the Qinetiq-America "Ears" or others already under trial with US forces.

But then various special sauces developed by ISIS prof Akos Ledeczi and his team kick in. All the smart-dust node hats in the squad or platoon net pass their information back and forth, and a special patented filter strips out false muzzle-blast reports - the great bugbear of such technology. The supersonic bullet-booms are very distinctive, it seems, but the muzzle blasts are much harder to distinguish from random banging sounds or echoes - especially with lots of guns firing at once in a built-up area.

As every node has a good idea exactly where it is, owing to its embedded radio-interferometry-enhanced GPS, the combined reports can thus be boiled down to locate all the guns firing nearby within a metre or two - enough to pinpoint which window, corner or whatever each enemy is shooting from. Apparently it still works even in the case of crafty snipers lurking well back from windows - the usual method favoured by the pros. Nor is the system bothered by guns firing out of line of sight - hidden behind walls or buildings or whatever.

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.