Counter-Terrorism

WASHINGTON, March 22, 2023 – Airbus U.S. Space & Defense, Inc., has announced new partnerships to provide powerful mission critical communications and productivity solutions for the national security, public safety and enterprise markets. Airbus is partnering with Blueforce Development Corp., Common Objects, Catalyst Communications Technologies, Inc., and Exacom to provide a complete and best-in-class solution for customers using the Airbus Agnet MCx (Mission Critical Push to...

Read More

During complex emergencies, such as natural disasters, civil unrest, or mass migration, radio communication is often a critical tool for coordinating response efforts, providing information to affected populations, and maintaining public safety. During large or complex incidents, radio traffic can become congested due to high demand, making it difficult for incident command to transmit and receive messages effectively. As well, given the crush of responding...

Read More

The Incident Command System (ICS) is a standardized, on-scene, all-hazards incident management concept. It was developed in the 1970s by firefighting agencies in the United States as a means of effectively managing incidents involving multiple agencies and organizations. The ICS provides a common structure and terminology for incident management and is designed to be scalable, so that it can be used for incidents ranging from...

Read More

Incidents and the subsequent emergency responses can be chaotic, especially when they involve multiple agencies and organizations that need to work together to respond to the crisis. In such situations, there may be confusion about roles and responsibilities, communication breakdowns, and a lack of coordination. Shortly after 9/11, the U.S. government commissioned programs that ultimately led to the National Incident Management (NIMS) framework which defines...

Read More

After Action Reports (AAR) may be one of the most important tools in emergency management and counter-terrorism operations. When used as a critical component of an agency's tactics, techniques, and procedures (TTP), AAR's can be an important litmus test which questions our assumptions about threats, which ultimately impacts training, mitigation, and response. Blueforce was used extensively over the entire Macys Thanksgiving Day parade route and...

Read More

Unattended ground sensors from multiple manufacturers, fused and normalized for sensor cueing to minimize false positives and accelerate detection time Today's unattended ground sensors (UGS) consist of various sensor technologies that are tightly integrated to deploy and perform the given task such as target detection, location, and recognition. These ground sensors are generally small, robust, and can be considered "disposable" in many cases given their low...

Read More

Force protection (FP) is a multi-dimensional pursuit, incorporating many operational concepts including prescribed personnel TTPs and multiple technology areas. The scope of facility-based FP spans a wide spectrum of activities directed toward the protection and management of personnel, assets, facilities and real property, crossing multiple functional, organizational and security domains. Security, surveillance, and intrusion detection are integrated into force protection, but their resources and infrastructure...

Read More

Joint All-Domain Command & Control (JADC2) is the DoD initiative to replace the current domain and control systems with one that connects the existing sensors and shooters and distribute the available data to all domains (sea, air, land, cyber, and space) and forces that are part of the U.S. military. The goal is to move to a system that connects every sensor and shooter, providing...

Read More

SIX capabilities, powered by Blueforce’s edge IoT technology, that deliver immense capability to our National Security Operators and Organizations. Pervasive sensor technology presents the opportunity for operators to extend their capabilities, share information horizontally, and swarm faster than their adversaries, by communicating with devices that are installed at fixed locations, carried, mounted on manned and unmanned systems, or worn on the body, the latter of which...

Read More

With mass shootings on the rise in the United States, efforts to better understand, prevent and deter active shooter incidents are becoming the norm. There is now a heavy focus on helping organizations, agencies, and schools to implement change to prevent loss of life and decrease response time. Although every active shooter scenario varies, there is a similar pattern: the attacker gains access to a...

Read More