Research and development of special projects in areas of operations. These operations support the warfighter in intelligence, surveillance, and reconnaissance (ISR).
Note. Voracity drone using Parrot AR drone platform.
In commercial applications, unmanned Aircraft Systems (UAS; UAV) have safety, security, privacy, and ownership challenges (Rao et al., 2016). Government agencies have enacted regulations that impact hobbyists and enthusiasts. Drone design impacts this active community, from commercial to government, that uses drones for inspecting, imaging, information gathering, and counter-measures (e.g., GPS, M-code; Rui et al., 2022).
Note. Voracity electric bicycle model Strike. Copyright 2025.
Light electric vehicle (LEV) technology is viewed as another promising pathway, as is electric vehicle (EV), to decarbonize transport systems further. In one study (Budnitz et al., 2025), based on 50 expert interviews, a novel approach compares multi-modal transportation processes horizontally between cities and vertically within levels of government. An electric bicycle with multi-modal transportation roles capable of traveling between cities using limited battery power for the competitive cyclist was designed, developed, and produced.
Note. Voracity SOC using Azure cloud with CTI monitoring end-point.
Cyberattacks on critical infrastructure can disrupt vital services with the capacity to impact human lives. Some security operations center (SOC) analysts feel overwhelmed by the influx of threat indicators from a growing threat landscape. Timely mitigation makes it challenging to discern which alerts are significant for their organization, from cyber to physical security. In John Boyd's OODA (Observe, Orient, Decide, Act) theoretical framework, we examine the relationship between cyber threat intelligence (CTI) and critical infrastructure assets on information technology critical infrastructure attacks (Su, 2024) using automated techniques (e.g., AI, algorithms).
Note. Voracity enabled telemetry simulation of communications.
As the Internet of Things (IoT), sensors, and cyber assets are used to collect data (e.g., temperature, speed, cyber) increases, the network telemetry (Sivanathan et al., 2020 ) traffic increases. Managing these devices, such as cameras, GPS, and location information, is highly complex, expensive, and challenging. One of the challenges in analyzing streaming data is selecting the proper machine learning (ML) algorithm (e.g., anomaly detection) to characterize the behavior.
Note. Voracity measurement of body activity and muscle groups .
The interaction between machines and humans in a competitive environment requires trust. In the science of autonomous human-machine systems, rational decisions are made in normal environments but not in uncertain dynamic environments (Lawless, 2022). Trusting your gear in dynamic environments impacts human performance along with physical training.
As the threat landscape increases, the resilience of computer systems that need protection increases. To test the resilience of computer systems on a drone, the Department of Homeland Security (DHS) conducted a successful cyber spoofing attack, resulting in the hijacking of the drone (Rao et al., 2016). This test challenged the navigational systems (e.g., GPS) onboard the mobile aerial platform from jamming attacks to telemetry.
Technology resources can fill the gap as the threat landscape continues to increase. Generative AI has the capability to enhance threat intelligence and cyber security knowledge so organizations can quickly identify threats. Generative AI technology provides decision support systems with the capability to automatically identify threats by malicious actors (Saddi et al., 2024).
References
Budnitz, H., Jaskólski, M., Knapskog, M., Lis-Plesińska, A., Schmidt, F., Szymanowski, R., ... & Schwanen, T. (2025). Multi-level governance and modal thinking: tensions in electric mobility transitions in European cities. Transport Policy, 160, 63-72. https://doi.org/10.1016/j.tranpol.2024.10.035
Lawless, W. F. (2022). Interdependent autonomous human–machine systems: The complementarity of fitness, vulnerability and evolution. Entropy, 24(9), 1308. https://doi.org/10.3390/e24091308
Rao, B., Gopi, A. G., & Maione, R. (2016). The societal impact of commercial drones. Technology in society, 45, 83-90. https://doi.org/10.1016/j.techsoc.2016.02.009
Rui, Z., Ouyang, X., Zeng, F., & Xu, X. (2022). Blind Estimation of GPS M‐Code Signals under Noncooperative Conditions. Wireless Communications and Mobile Computing, 2022(1), 6597297.
Saddi, V. R., Gopal, S. K., Mohammed, A. S., Dhanasekaran, S., & Naruka, M. S. (2024, March). Examine the role of generative AI in enhancing threat intelligence and cyber security measures. In 2024 2nd International Conference on Disruptive Technologies (ICDT) (pp. 537-542). IEEE. https://doi.org/10.1109/icdt61202.2024.10489766
Sivanathan, A., Gharakheili, H. H., & Sivaraman, V. (2020). Managing IoT cyber-security using programmable telemetry and machine learning. IEEE Transactions on Network and Service Management, 17(1), 60-74. https://doi.org/10.1109/aisc56616.2023.10085343
Su, A. Y. (2024). Relationship of Cyber Threat Intelligence and Critical Infrastructure Assets on Information Technology Critical Infrastructure Attacks (Doctoral dissertation, Walden University).