Command

During complex emergencies, such as natural disasters, civil unrest, or mass migration, radio communication is often a critical tool for coordinating response efforts, providing information to affected populations, and maintaining public safety. During large or complex incidents, radio traffic can become congested due to high demand, making it difficult for incident command to transmit and receive messages effectively. As well, given the crush of responding...

Read More

The Incident Command System (ICS) is a standardized, on-scene, all-hazards incident management concept. It was developed in the 1970s by firefighting agencies in the United States as a means of effectively managing incidents involving multiple agencies and organizations. The ICS provides a common structure and terminology for incident management and is designed to be scalable, so that it can be used for incidents ranging from...

Read More

The Internet of Things (IoT), by definition, is a wide array of “things” that can connect and exchange data over a network. This “network” can take many forms to include the “big” internet, an enterprise network, and in most places where we work, a closed network “bubble”. The reality is that once many organizations begin to leverage “sensing”, it becomes clear very quickly that exchanging...

Read More

After Action Reports (AAR) may be one of the most important tools in emergency management and counter-terrorism operations. When used as a critical component of an agency's tactics, techniques, and procedures (TTP), AAR's can be an important litmus test which questions our assumptions about threats, which ultimately impacts training, mitigation, and response. Blueforce was used extensively over the entire Macys Thanksgiving Day parade route and...

Read More

Joint All-Domain Command & Control (JADC2) is the DoD initiative to replace the current domain and control systems with one that connects the existing sensors and shooters and distribute the available data to all domains (sea, air, land, cyber, and space) and forces that are part of the U.S. military. The goal is to move to a system that connects every sensor and shooter, providing...

Read More

SIX capabilities, powered by Blueforce’s edge IoT technology, that deliver immense capability to our National Security Operators and Organizations. Pervasive sensor technology presents the opportunity for operators to extend their capabilities, share information horizontally, and swarm faster than their adversaries, by communicating with devices that are installed at fixed locations, carried, mounted on manned and unmanned systems, or worn on the body, the latter of which...

Read More

Multi-variant sensing and cueing largely speaks to physical sensors interacting with each other (even sensors from disparate manufacturers) at high speeds to derive meaning and minimize “false positives”.  Adding privacy-assured artificial intelligence, in the form of cognitive services, provides additional precision for threat detection and mitigation. Recognitional support and stream analytics is an essential component of a multi-tiered approach to identify a security and/or safety...

Read More

Digital Workflows triggering Emergency Instructions via Samsung MagicINFO-enabled Displays and Axis Public Address Speakers Every day, our physical and digital worlds become increasingly intertwined, presenting opportunity for investments in a future of continuous and lasting change. This is true of Smart Cities, but also Safe Schools and Smart Campuses. This digitalization of the cyber-physical world is especially promising for schools to realize opportunities and overcome challenges...

Read More

Arcanum Africa and Blueforce Development Corporation have signed a reseller agreement for Arcanum to bring Blueforce into defense, public safety, personal security, and wildlife/environmental protection in South Africa. Arcanum provides a variety of products and professional services which include state of the art AI and computer vision using interior and exterior autonomous smart drones, broad area mesh communications, ruggedized surveillance systems, and now the entire...

Read More

The first 72 hours after a natural/manmade disaster are critical hours that make or break the speed of recovery. Power is gone. Terrestrial communications are denied if available at all. Worse, a nonpredictive inter-agency mash-up is about to hit and with it comes an interoperability nightmare. The ability to positively impact recovery requires communications and the rapid standup of mobile command in denied, disparate, and...

Read More