Scroll to top

WRITTENS

Tactics for Swarms

Swarm Tactics and Network Resilience in Drone Warfare: An Analytical Perspective Modern drones have...

Fielding Drones in the Battlespace

Distributed Civil-Military Partnerships in Conflict Zones: A Doctoral Analysis of Crowdsourced Manufacturing, Technological Innovation,...

Attacking a Jammer via the Jammer’s Signal

“Study hard what interests you the most in the most undisciplined, irreverent, and original...

Fireside Chat with K9 Defense

CANINE DEFENSE TECHNOLOGIES Bridging The U.S. Defense Tech Hardware Gap. For Americans By Americans....

The Art of Warcycling

1. Introduce yourself, give us a little bit about your background, what do you...

Pentesting with Angry Oxide

Here’s your task, understand the capabilities first! Passive recon running Angry Oxide from Rage...

Long Range Hacking by Daniel Dieterle

Guest article from a great business mentor and friend Daniel Dieterle. LoRa or Long-Range…

Irregularly Supplied in the Second Cold War

Irregular Warfare and the Importance of Logistics in a Deprived Battlespace The return of...

The Glue Logic of Choice for Drone Operators

The glue logic of choice for unmanned projects is what's known as MOSA. MOSA...

Interview with Script Tactics

How Do You See the Intersection Between Software Engineering and Cyber Tactical Operations, and...

Electronic Warfare of Drones

Electronic Warfare of Drones Introduction The advent of unmanned aerial vehicles (UAVs) has revolutionized...

Where’s the risk? Show me!

March Madness Hunter of drone pilots. This article is for educational purposes. A look...

Guest Article: Guerrilla Assault Medic

Guerrilla Assault Medic Hacking for Austere Medicine by Disruptor 26 “Strike an enemy once...

SCALES University: Air Recon Course

AIR RECON COURSE A NOTE FROM THE INSTRUCTOR: Elevate Your Tactical Advantage with Cutting-Edge...

ASRT Mobile Command Concept

Response Team            As urban reconnaissance professionals; it is our mission…

The Pi Telemetry

Ideally the campaign is to rig up an SDR via script in python to...

Penetration Test: Lightning

Lightning round of thought processes to Wi-Fi penetration testing. Here's a quick overview of...

Wireshark Basics

Baseline Vitals with WIRESHARK Wireshark is a popular and powerful network protocol analyzer used...

Advanced SDR for Drones

So I ended up having a deep conversation with a good friend and team...