Counter-Terrorism

Joint All-Domain Command & Control (JADC2) is the DoD initiative to replace the current domain and control systems with one that connects the existing sensors and shooters and distribute the available data to all domains (sea, air, land, cyber, and space) and forces that are part of the U.S. military. The goal is to move to a system that connects every sensor and shooter, providing...

Read More

SIX capabilities, powered by Blueforce’s edge IoT technology, that deliver immense capability to our National Security Operators and Organizations. Pervasive sensor technology presents the opportunity for operators to extend their capabilities, share information horizontally, and swarm faster than their adversaries, by communicating with devices that are installed at fixed locations, carried, mounted on manned and unmanned systems, or worn on the body, the latter of which...

Read More

With mass shootings on the rise in the United States, efforts to better understand, prevent and deter active shooter incidents are becoming the norm. There is now a heavy focus on helping organizations, agencies, and schools to implement change to prevent loss of life and decrease response time. Although every active shooter scenario varies, there is a similar pattern: the attacker gains access to a...

Read More

The internet of things (IoT) is revolutionizing the way we live and work. By connecting devices and sensors to the internet (and/or our private networks), we are able to collect and analyze incident and environmental data like never before. This data can be used to cue and orchestrate various actions and processes, which in turn enhances operational efficiency while positively impacting life safety. IoT V1 was...

Read More

Since the founding of public education, schools have been charged with the safety of children in their care – a duty to protect. Recent events have shaken the sense of serenity and security that has characterized most school campuses. While the risk of serious violence on school campuses is remarkably low, particularly in its most extreme forms, the potential consequences can be devastating and long-lasting...

Read More

Arcanum Africa and Blueforce Development Corporation have signed a reseller agreement for Arcanum to bring Blueforce into defense, public safety, personal security, and wildlife/environmental protection in South Africa. Arcanum provides a variety of products and professional services which include state of the art AI and computer vision using interior and exterior autonomous smart drones, broad area mesh communications, ruggedized surveillance systems, and now the entire...

Read More

For decades now, public safety Land Mobile Radio (LMR) systems have provided a reliable, albeit geographically limited, communications backbone and baseline for related command and control systems for public safety agencies. These legacy LMR systems are often limited to the geographic areas of the agency/agencies being served and, in many cases, there may be multiple public safety LMR systems in the same geographic area using...

Read More

The intelligence community has been warning for some time about “home made” explosive and chemical weapons, many of which can be fashioned from materials bought at Home Depot or the local pool supply store. Fast forward to Saturday March 14, 2015 when leaders in the semi-autonomous Kurdish region in Iraq provided the Reuters news organization with soil and clothing samples taken by the peshmerga from...

Read More

BlueforceTACTICAL was the first product in the world to deliver extensible, secure, and scalable body worn sensor fusion. Combined with location services, AI to the edge, PTT, live streaming video, plus unparallel extensibility, our patented edge compute application platform has proven to be the ultimate adaptive "Swiss Army Knife" for mission critical operations where situational awareness is more than just a dot on a map. While...

Read More

While cloud-based analytics and AI services can provide high-value recognitional services across imagery and data, too often data communications back to the cloud are jittery and quite often denied due to the crush of requests related to the incident, hampering access. Moving recognitional and computation services to the edge ensures access, but also delivers an ultra-low latency solution in time constrained environments. BlueforceEDGE is our autonomous...

Read More