logo

Blueforce Sidecar

The Blueforce Sidecar features new video content, media coverage, and more. Check back regularly for updates.

Surveillance

After Action Reports (AAR) may be one of the most important tools in emergency management and counter-terrorism operations. When used as a critical component of an agency's tactics, techniques, and procedures (TTP), AAR's can be an important litmus test which questions our assumptions about threats, which ultimately impacts training, mitigation, and response. Blueforce was used extensively over the entire Macys Thanksgiving Day parade route and...

Read More

Unattended ground sensors from multiple manufacturers, fused and normalized for sensor cueing to minimize false positives and accelerate detection time Today's unattended ground sensors (UGS) consist of various sensor technologies that are tightly integrated to deploy and perform the given task such as target detection, location, and recognition. These ground sensors are generally small, robust, and can be considered "disposable" in many cases given their low...

Read More

SIX capabilities, powered by Blueforce’s edge IoT technology, that deliver immense capability to our National Security Operators and Organizations. Pervasive sensor technology presents the opportunity for operators to extend their capabilities, share information horizontally, and swarm faster than their adversaries, by communicating with devices that are installed at fixed locations, carried, mounted on manned and unmanned systems, or worn on the body, the latter of which...

Read More

When an organization has IoT sensors, surveillance equipment, and even information technology gear deployed to far flung locations across the world, driving to a location to reset a router or a camera can take hours. Arcanum Africa, a Blueforce Platinum reseller based in South Africa, experiences these exact challenges with deployed security equipment as well as counter-poaching technologies designed to protect wildlife. What's needed is...

Read More

Crisis negotiation and de-escalation are law enforcement techniques used to communicate with people who are threatening violence (workplace violence, domestic violence, suicide, or terrorism) and can include barricaded subjects, stalkers, criminals attempting to escape after a botched robbery, and hostage-takers. While basic voice communications are of extreme value, understanding what is going on when the negotiator and subject are not on the phone enables better...

Read More

While cloud-based analytics and AI services can provide high-value recognitional services across imagery and data, too often data communications back to the cloud are jittery and quite often denied due to the crush of requests related to the incident, hampering access. Moving recognitional and computation services to the edge ensures access, but also delivers an ultra-low latency solution in time constrained environments. BlueforceEDGE is our autonomous...

Read More

Battlefield, disaster response, and public safety sustainment is both art and science; it's about synchronizing, integrating, and transporting commodities in a highly "just-in-time" manner to provide maneuver and incident commanders with freedom of action, extended operational reach, and prolonged endurance. As it turns out, the "science" of sustainment is not terribly difficult as it is grounded in basic math and computation, based on real-time time...

Read More

Ask any soldier or first responder and they will tell you of the importance of shared tactical video for decision-making during edge operations. Drones can now be cued to launch in real-time for overwatch. Military working dogs routinely carry low light infrared imagers that enable off-leash shared awareness for what the dog sees even though he is 200 meters forward. Video is core to intelligence...

Read More

Situational awareness is a critical component for Incident Commanders making life and death decisions in time constrained environments. As the internet has matured, and public safety IoT/sensors are deployed, the commander now has access to a wide array of data that transcends mere location and map markups. With this proliferation of public safety sensors, drones, robotics, and now smart city infrastructure, the commander has an ever...

Read More

Despite rapid advances in weapon-mounted digital optics, target acquisition through-the-optic, classification, and identification have changed very little. It comes down to the operator visually acquiring a target and assessing its friend/foe affiliation and threat potential. This “tried and true” methodology is vulnerable to several points of failure. The foremost vulnerability is reliance on the operator’s ability to classify and identify the target, which may appear...

Read More