Case Studies

At the Forefront of National Security


The Defense Advanced Research Projects Agency (DARPA) works with outside Tier I research teams on advanced research, but has no system to support storing, sharing or analyzing data that has been generated. We created a cloud system called BIFROST to address these limitations and advance science through collaboration. Our system is cloud-based and supports storage of data files plus metadata (which is vital for searching and making sense of files full of numeric data) and cloud-based analysis. Research teams on the THoR and Prometheus projects use the system.

Read More

CIAT: Combat Intelligence Augmentation Teams

CIAT is part of the overall intelligence program designed to support U.S. Forces in Afghanistan. The program was designed to provide a multi-faceted Intelligence Operations Support program consisting of (but not limited to) All-Source Intelligence Analysts, Human Intelligence (HUMINT) Analysts, Signals Intelligence (SIGINT) Analysts, Intelligence Requirements Collection Managers Special Advisors, Intelligence Analysts, Planners, Targeting Support, Counterintelligence (CI) Support, Human Intelligence (HUMINT) Collection and Debriefing Support, Signals Intelligence (SIGINT) Support, Screener Support, Multi-Media Exploitation Support, Tactical & Operational Intelligence Analysis, Intelligence Information Management, Requirements Collection Managers, and Special Security personnel. These units form teams and act independently to provide Counterintelligence support, Collection Requirements Management, analytic and target support, and other intelligence-related support services to augment assigned military units, and other intelligence staffs and organizations.

Read More


PRAEFECTUS is the core mission management software to TROJAN SWARM’s worldwide intelligence architecture. PRAEFECTUS provides a web-based common interface, giving soldiers the ability to share data, manage Signals Intelligence (SIGINT) and other Intelligence Surveillance and Reconnaissance (ISR) sensors, as well as wireless core networks. It provides soldiers with real-time situational awareness, persistent queries, real-time entity/data correlation, and analytic capabilities that extend Exploitation, Analysis and Dissemination (EAD) to the tactical edge and dramatically reduces the turn-around time on actionable intelligence.

Read More

WARLOCK: Modular Electronic Test Solutions

Counter Threat Technology Exploitation (CTTE) generates technical information that supports both Force Protection (FP), Signal detection and targeting (SD&T), and Electronic Countermeasures (ECM). WARLOCK can collect data from threat devices by collecting RF signature information and using it to identify a known IED. This provides FP by giving actionable information on precautions to take and tactics for defeating the device. A trio of WARLOCK units can use direction-finding to support SD&T. Finally, data collected by WARLOCK allows for development and testing of new ECM against realistic threat prototypes built specifically from exploited data.

Read More

Contact BTS to explore solutions for your intelligence or defense challenges.