A Glance at Ukraine
Tactical First-Person View (FPV) Drone Tactics, Techniques, and Procedures (TTPs): Empirical Findings from the...
Solution Analysis for Procurement
Comprehensive Study and Solution Analysis Guide: Enhancing Procurement and Testing of Adversarial Unmanned Systems...
SPARC Program at DBTI
Extended SPARC Program Imagine a groundbreaking alliance where cutting-edge small businesses like 3ZeroThird, LLC...
TAK Configs for Drones
Imagine a world where your FPV drone operations soar to new heights of efficiency...
Slaughterbots and Fear-Policy
Introduction In 2017, the short film Slaughterbots captured global attention with its vision of...
Additive Manufacturing
Additive Manufacturing Additive Manufacturing (AM) is a process of creating three-dimensional objects by building...
Tactics for Swarms
Swarm Tactics and Network Resilience in Drone Warfare: An Analytical Perspective Modern drones have...
Fielding Drones in the Battlespace
Distributed Civil-Military Partnerships in Conflict Zones: A Doctoral Analysis of Crowdsourced Manufacturing, Technological Innovation,...
Attacking a Jammer via the Jammer’s Signal
“Study hard what interests you the most in the most undisciplined, irreverent, and original...
Fireside Chat with K9 Defense
An interview with a rising drone innovator! Origin and Background I remember linking up...
The Art of Warcycling
1. Introduce yourself, give us a little bit about your background, what do you...
Pentesting with Angry Oxide
Here’s your task, understand the capabilities first! Passive recon running Angry Oxide from Rage...
Long Range Hacking by Daniel Dieterle
Guest article from a great business mentor and friend Daniel Dieterle. LoRa or Long-Range...
Irregularly Supplied in the Second Cold War
Introduction Irregular Warfare (IW) campaigning encompasses the sophisticated and strategic deployment of resources by...
The Glue Logic of Choice for Drone Operators
The glue logic of choice for unmanned projects is what's known as MOSA. MOSA...
Interview with Script Tactics
How Do You See the Intersection Between Software Engineering and Cyber Tactical Operations, and...