AI

Geopolitical and even transnational shaping of highly mobile and violent burglary rings has prompted discussion and transactions across our business. These now include repeatable "method of operations" (MO's), but also alarming tactics per compound breaches, but also armed incursions and methods that include targeted communities and homes (largely, intelligence-based identification of targets of opportunities). This is not our parent's worry of threat to our families. Specifically,...

Read More

Drone incursions on stadiums, events, and even private property present a range of security issues, primarily due to their potential for unauthorized surveillance, disruption, and even use as an inexpensive means to launch an offensive attack.  One significant concern is the risk of drones being used for reconnaissance purposes, allowing individuals with malicious intent to gather intelligence on security vulnerabilities, crowd movements, signal intelligence, and even...

Read More

SOFWEEK 2024 EDITION: Imagine for a moment, that you are a 22-year-old going into harm's way. You are sent into a confined space where there is a potential of bumping into industrial gases, gamma rad, and even blister/nerve agent threats. Furthermore, you are expected to make precise decisions on response and mitigation. Any ground truth intelligence can impact your recommendations given the changing dynamics as...

Read More

Samsung SmartThings is a smart "consumer" platform that allows users to connect and control various smart devices within their homes. The SmartThings ecosystem includes a central hub known as the SmartThings Hub or Station, along with a mobile app for device control.  Most important to the SmartThings ecosystem is the hundreds of consumer sensors that can be leveraged by the hub and spoke architecture afforded...

Read More

LoRaWAN (Long Range Wide Area Network) has gained significant traction in the realm of sensor applications, offering a robust and energy-efficient solution for the Internet of Things (IoT). One of its key advantages lies in its ability to facilitate communication over long distances with minimal power consumption. This makes it particularly well-suited for scenarios where sensors need to transmit data wirelessly while maintaining extended battery...

Read More

It is most assuredly not our parent's world. We suddenly find ourselves in a new world where the pandemic and serious spikes in crime has implications to our critical infrastructure, our schools, our businesses, and our people. Cybersecurity remains a concern, but physical security in our personal and professional lives is now front and center. Recent attacks and attempted attacks internationally present a diverse and...

Read More

https://vimeo.com/835459614/c02402ee43?share=copy Incidents and the subsequent emergency responses can be chaotic, especially when they involve multiple agencies and organizations that need to work together to respond to the crisis. In such situations, there may be confusion about roles and responsibilities, communication breakdowns, and a lack of coordination. Shortly after 9/11, the U.S. government commissioned programs that ultimately led to the National Incident Management (NIMS) framework which defines...

Read More

Protective services encompass a diverse range of security measures aimed at safeguarding individuals, assets, and sensitive information. These services are tailored to the unique needs of each client, whether they are high-profile individuals, corporate executives, or public figures. Personal protective services, commonly known as bodyguards or executive protection agents, provide physical security by ensuring the safety of the client in various environments. They assess potential...

Read More

To many, sentiment analysis is known as opinion mining, a natural language processing (NLP) technique used to determine the emotional tone or sentiment expressed in a piece of text. It involves analyzing text data to identify whether the sentiment expressed is positive, negative, neutral, or sometimes even more nuanced emotions like anger, joy, sadness, etc.  The primary goal of sentiment analysis is to understand the underlying...

Read More

John Boyd, a Korean War U.S. Air Force pilot and subsequent military strategist, has been front and center in how we at Blueforce have thought about and designed our technology for use by our national security and public safety decision makers. During the Korean War, Boyd was curious as to why the F-86 Sabre was so dominant in shooting down the Russian MiG-15. He quickly...

Read More