Distributed Sensing

Not a week goes by without someone asking us if we are the "Blue Force Tracker" people. We are not. We named the company as Blueforce Development Corporation because all of the folks on our team share a common purpose in building rapidly adaptable technology for all blue force (the good guys) in all national security and public safety sectors. Yet, we do understand the...

Read More

General Stanley A. McChrystal (RET) will likely go down in history as a fundamental change agent in how we think about and organize to counter a very different 21st century threat model. His success in the US Special Operations Command (SOCOM) was rooted in seeing our enemies as decentralized and autonomous fighting forces. They are not bound by treaty nor institutional rules of engagement, but...

Read More

Sensitive Site Exploitation (SSE) has become a core focus given the potential for executing special operations missions in or near sites suspected of manufacturing, storing, or supporting weapons of mass destruction (WMD) to include chemical, biological, radiological, and nuclear (CBRN). A generation ago, regimes with access to these munitions were limited to developed and relatively stable nation states. However, the operating environment has drastically changed,...

Read More

Counter-terrorism operations take so many shapes across the national security landscape.  We have been there first hand, from Iraq to the African continent, to New York City.  Our heros in New York City present one way, while our friends who jump into new found tunnels on the border present another.  Our participation in Military Working Dog programs and how they leverage our technology never ceases...

Read More

Recent terrorist attacks and active shooter incidents have shared a common similarity: 100's of armed responders from many agencies descending on the scene to help neutralize the situation. With that comes not only a radio interoperability problem, but a command interoperability problem. Blueforce products were specifically designed to enable secure “small unit swarming”, an ability for responders from diverse agencies, to rapidly form responder networks...

Read More

Laws are not enforced from a desk. They are enforced out in the world on our streets and highways by brave men and women who face unpredictable and constantly evolving threats. The Blueforce Mobile Command & Control solution leverages Blueforce’s patented mobile and sensor fusion technology and Microsoft’s powerful Azure platform to provide the law enforcement community with an operational advantage, enabling better informed and...

Read More

Blueforce is proud to announce that we have been named one of the "Top 10 Homeland Security Solution Providers" by CIOReview magazine.  In a world dominated by asymmetric threats, a split second’s delay in command decision can drive the success or failure of a mission. In such a scenario, ensuring that the right person at the right time receives actionable information is essential for mission...

Read More

CES is the world's gathering place for all those who thrive on the business of consumer technologies. It has served as the proving ground for innovators and breakthrough technologies for 50 years — the global stage where next-generation innovations are introduced to the marketplace. Owned and produced by the Consumer Technology Association (CTA), it attracts the world's business leaders and pioneering thinkers. Blueforce is proud to...

Read More

Blueforce Development technologies have been a cornerstone for border counter-terrorism joint task forces (JTF) since 2009 here in the United States and OCONUS.  Our sensor fusion technology, found in both BlueforceEDGE and BlueforceTACTICAL, enables sensors from disparate manufacturers to be fused into a single stream of data, enabling the coveted single pane of glass common operating picture.  You can see it in action here in...

Read More

Recent terrorist attacks and active shooter incidents have shared a common similarity: 100's of armed responders from many agencies descending on the scene to help neutralize the situation. With that comes not only a radio interoperability problem, but a command interoperability problem.  Reaction time is critical during an asymmetric incident. Split second decisions are required and traditional methods of pushing decision data to higher echelons...

Read More