What types of domestic malicious UAV operations pose the greatest threat, and what is the likelihood of these operations?
My opinion is that ISR is the most likely type of malicious UAV operation and kinetic the least, probably by...
My opinion is that ISR is the most likely type of malicious UAV operation and kinetic the least, probably by...
Does the counter UAS system you bought work? Does it actually solve your problem?...
What If ...
RemoteID is scheduled to start rolling out in September of this year in the U.S. In very simple terms, RemoteID...
In the non-DOD environment we use the term "CUAS" without any modifiers to talk about everything from airspace awareness to...
Excel - it just does not scale. For years I've watched investigators work with large datasets using Excel, and have...
n the simplest terms we need to compare apples to apples. To accurately compare data from different sources that all...
GIGO - Garbage In, Garbage Out. - If your raw data is flawed there is little hope for meaningful analysis....
During the data analysis phase of a CUAS T&E event questions such as these often arise:...
TSPI (Time, Space, Position Information) device is a formal name for a high end GPS tracker. Like a GPS tracker,...
First through Techstars/AFWERX '18 and then using SBIR grants, revenue, and private investments URSA started developing a commercially viable unmanned...
There are at least four major methods for extracting data from a CUAS system. Which one you choose will depend...
Defining CUAS effectiveness should be simple but the effort is complicated by many factors such as use case, intended outcome,...
Digital forensics traditionally operates on the "one investigator, one system, one case" model....