UNCLASSIFIED
UNCLASSIFIED
Back to Platform
UNCLASSIFIED // FOUO

SHIELD / ATLAS

Strategic Homeland Integrated Emergency Logistics & Decision-support / All-Threat Layered Awareness System

Defense Capabilities Briefing — Software-Defined, MOSA-Compliant, JADC2-Aligned

Creator: Dr. Terry Flood, DHA, US Army Ret. Company: ISS LLC / SecureAssure (SDVOSB) Platform: 66-Module Software-Defined Dual-Use PWA Architecture: MOSA | JADC2 | DDIL | Zero-Trust Compliance: CMMC 2.0 L2 | FedRAMP Mod | NIST CSF 2.0
Section 1

Operational Problem

The Department of Defense and the civilian emergency management community operate in separate technology stacks with incompatible data architectures and siloed training pipelines. In an era of software-defined warfare and JADC2-mandated interoperability, this fragmentation degrades mission assurance. When crises bridge both domains — a hurricane hitting a military installation, GPS jamming affecting civilian aviation, a CBRN event requiring DSCA — the technology gap becomes a mission gap. Affordable mass at scale demands MOSA-compliant, composable solutions that span portfolios.

Current State

  • Stovepiped acquisition programs for each mission area create interoperability friction — antithetical to JADC2 and portfolio-level acquisition
  • Military C2 systems cannot share SA with civilian ICS/ESF counterparts without manual translation — no MOSA-compliant bridge exists
  • GPS-denied navigation, BFT, fires, and EW each require separate tools — violating composable, software-defined architecture principles
  • Exercise systems differ from operational systems, violating "train as you fight" — no congruent data architecture
  • DSCA operations require standing up new C2 architectures each time — no DDIL-capable persistent framework

SHIELD/ATLAS Solution

  • MOSA-compliant software-defined platform spans civilian EM (FEMA/NIMS) and military C2 (MDMP/Joint Ops) with congruent data architecture — JADC2-aligned interoperability
  • 66 composable modules shipping today covering fires, intel, EW, C2, training, IAMD, maritime, space, and municipal ops in one deployment — affordable mass at scale
  • Zero-trust zero-trust gate controls access while enabling cross-domain SA sharing with full-stack congruence
  • Same platform for exercises and operations — "train as you fight" with DDIL-capable persistence
  • DSCA-ready: METRO daily ops connect directly to ICS, EMS, CASCADE, and military C2 modules. Mission-based cyber risk assessment (DoWM 5000.103)
Section 2

Defense Module Inventory (18 Composable Modules)

All defense modules reside behind the zero-trust access gate. Each is MOSA-compliant and integrates with the broader 66-module platform shipping today for JADC2-aligned cross-domain situational awareness via a 17-route Event Bus mesh. DDIL-capable with full-stack congruence. Every module includes an interactive sandbox for guided training and validation.

C2 / Decision Support

ODIN — Operational Decision Intelligence Network

AI-powered COA generation: produces 2-3 courses of action with risk scoring, resource requirements, timelines, and decision points. Supports hurricane, active threat, CBRN, and infrastructure scenarios. Multi-domain analysis across all platform modules.

C2 / Operations

WARFIGHTER

Combat training center operations. Warfighting functions (movement/maneuver, intelligence, fires, sustainment, C2, protection). MDMP planning, OPORD/FRAGO generation, joint operations coordination.

Fires

FIRES

Joint fires C2 with a human-authored ballistic engine (FT-style firing tables and verified MET corrections — AI does not author ballistic numbers and does not make the call to fire). Full call-for-fire chain: Observer ID, Warning Order, Target Grid, Target Description, Munition Selection, Method of Fire, CFF Validation, VTC Camera (stays LIVE in parallel, not serial), Target Designation (paired agreement), Ballistic Solution with TITAN interop export (CoT/JSON/USMTF/VMF). BDA visual assessment. 10-step interactive sandbox with voice input and human verification. FSCM, weapons effects calculation. Lethal-effect commit is always human-in-loop.

Effects

EFFECTS

Full-spectrum effects using DIME framework (Diplomatic, Information, Military, Economic). Information operations, civil affairs, PSYOP, public affairs coordination.

IAMD / C-UAS

AIRSPACE / C-UAS

Counter-drone operations with 10-platform adversary threat library (Shahed-136, Lancet, Orlan-10, Wing Loong II, CH-5, TB2, FPV Racing, Ababil-T, KUB-BLA, Mohajer-6). Asset manager: RF jammer, laser, HPM, kinetic, net gun inventory. Detection sensor network. Engagement log with auto ammo decrement.

EW / Spectrum

SPECTRUM / EMSO

Electromagnetic Spectrum Operations (JP 3-85). RF spectrum management, EW asset inventory, jamming operations, emitter tracker, spectrum deconfliction, readiness scorecard. Electronic warfare zone management.

Force Tracking

BFT — Blue Force Tracker

Friendly unit positions, movement history, force disposition. Real-time force tracking, unit status, combat power assessment, logistics status reporting.

Space / PNT

SDA — Space Domain Awareness

GPS constellation health (32 satellites), jamming/spoofing detection, satellite pass tracker. NOAA SWPC space weather (live). PNT resilience grid with 6 backup systems: eLoran, LEO PNT, atomic clock, CSAC, inertial nav, terrain matching. 9-jammer adversary reference library.

Maritime / ASW

TRIDENT

Acoustic intelligence. Sonobuoy planning, sonar propagation modeling, submarine detection. Underwater acoustic environment analysis, ASW coordination.

Maritime / SA

NEPTUNE

Maritime common operating picture. AIS vessel tracking, anomaly detection, threat identification, vessel classification, maritime domain awareness, port security.

Maritime / Tactical

AEGIS

Tactical decision support. Search patterns (expanding square, sector, parallel), engagement planning, mission analysis, decision matrices, risk assessment.

Maritime / UxS

NEREID

Unmanned systems fleet management. UUV and USV coordination, swarm control, mission planning, autonomous operations.

Maritime / Intel

OCEANUS

Maritime intelligence. Order of battle, fleet analysis, environmental intelligence (sea state, currents, tides, bathymetry) for operational planning.

Adversary Intel

RED FORCE

Adversary C2 intelligence database. 7 preloaded OSINT systems: Svod, Polyana-D4M1, Barnaul-T, Baikal-1ME (Russia); KJCCS (China); PLA MOSIS (Iran); Sepehr (DPRK). C2 node tracker, activity timeline, doctrine patterns, Blue vs Red capability comparison. Auto-pushes to SENTINEL.

Cyber Defense Ecosystem

CYBER

Full-spectrum meshed cyber defense. CISA KEV live feed with [RANSOMWARE] tagging. WATCHTOWER insider threat detection (entity behavior tracking, anomaly scoring, risk escalation — flags for human action, never auto-punishes). Ransomware Kill Chain Defense (5-phase lifecycle: Prevent/Detect/Contain/Eradicate/Recover, 22-item checklist, FBI/CISA payment guidance, OFAC sanctions check). Asset Vulnerability Crosswalk (register organizational assets, auto-cross-reference against CISA KEV, priority: internet-facing + ransomware-tagged = CRITICAL). Network Anomaly Detection (8 armed rules: data exfil, C2 beacons, lateral movement, canary files, honeypot logins, Kerberoasting, Tor tunnels). NIST CSF 2.0 mapping (85% compliant), CNSA 2.0 post-quantum readiness, FedRAMP tracker. Everything fires through Event Bus to BASTION, SENTINEL, CASCADE, CITADEL, GUARDIAN, ALERT.

OPSEC

OPSEC

Operations security, SCIF compliance, data classification (UNCLASSIFIED through TS/SCI), insider threat detection, security protocols, need-to-know enforcement.

Coalition

CONSUL

Coalition coordination, diplomatic operations, embassy security awareness. Foreign partner liaison, NEO (Noncombatant Evacuation Operations) planning.

CBRN / WMD

CBRN

Nuclear materials monitoring, radiological detection networks. EPA RadNet, CTBTO IMS (International Monitoring System), WMD proliferation intelligence, contamination modeling, decontamination protocols.

Cross-Domain C2

JOINT DECISION SUPPORT (JOC)

Cross-domain situation aggregator pulling live SIGINT, Cyber, Logistics, METOC, and DIME data simultaneously. Correlation engine detects coordinated adversary operations across domains: COORDINATED_ATTACK (SIGINT + Cyber within 48hrs), SUPPLY_VULNERABILITY (shortages during active threats), C2_DISRUPTION_RISK (cyber events during logistics degradation). 1st/2nd/3rd order effects modeler with probability-weighted cascading impacts adjusted for real-time conditions. 6-step Joint Decision Wizard generates integrated cross-domain COAs. Commander approval before execution. 30-second auto-refresh. Full decision audit trail.

DIME / Targeting

DIME/PMESII-PT ANALYZER

Operational environment assessment with 6-step intelligent planning wizard. Pulls live weather and terrain data for target area. AI-powered CARVER targeting analysis with vulnerability scoring. COA generation across Diplomatic, Information, Military, and Economic instruments of national power. Effects tracking across Political, Military, Economic, Social, Information, Infrastructure, Physical Environment, and Time domains.

SIGINT

SIGINT OPERATIONS CENTER

5-step intercept wizard supporting COMINT, ELINT, FISINT, and MASINT signal classification. Pattern matching against known emitter databases. Automated threat analysis with analyst override at every decision point. Intercept logging with geolocation and confidence scoring. Feeds threat data to Joint Decision Support for cross-domain correlation.

Logistics / S4

LOGISTICS & SUPPLY CHAIN (S4/G4)

10 classes of supply readiness dashboard tracking unit combat power. 4-step supply planning wizard auto-identifies shortages, calculates FLASH/IMMEDIATE/PRIORITY/ROUTINE request priorities, generates resupply requests. Commander approval gate. Feeds readiness data to Joint Decision Support for operational planning and cross-domain correlation.

Section 3

POSEIDON Maritime AI Suite

Five integrated sub-modules providing full-spectrum maritime domain awareness from surface tracking through underwater acoustics to tactical engagement.

ModuleFunctionCapabilities
NEPTUNESurface SAAIS vessel tracking, anomaly detection, threat classification, port security, maritime domain awareness
TRIDENTUndersea WarfareSonobuoy planning, sonar propagation modeling, submarine detection, acoustic environment analysis
AEGISTactical DecisionSearch pattern generation, engagement planning, mission analysis, risk assessment matrices
NEREIDUnmanned SystemsUUV/USV fleet management, swarm coordination, autonomous mission planning
OCEANUSMaritime IntelOrder of battle, fleet analysis, environmental intelligence (sea state, currents, tides, bathymetry)

Integration Scenario: Suspicious Vessel

NEPTUNE detects AIS anomaly → OCEANUS provides maritime intel → TRIDENT deploys acoustic surveillance → AEGIS generates engagement options → ODIN provides AI COA analysis → AIRSPACE deploys surveillance UAS → CONSUL coordinates coalition partners → FIRES prepares fire support if needed

Section 4

Adversary Threat Libraries

Pre-loaded OSINT-derived threat databases enabling rapid threat identification and countermeasure selection.

C-UAS Adversary Drone Library (10 Platforms)

  • Shahed-136 — Iranian one-way attack drone, delta wing, 2,500km range
  • Lancet — Russian loitering munition, TV/IR guidance, 40km range
  • Orlan-10 — Russian ISR platform, most deployed drone in Ukraine
  • Wing Loong II — Chinese MALE UAV, export competitor to MQ-9
  • CH-5 Rainbow — Chinese HALE, 60hr endurance, 16 hardpoints
  • TB2 Bayraktar — Turkish MALE, proven in Libya/Ukraine/Karabakh
  • FPV Racing Drones — Modified commercial, low-cost mass attack
  • Ababil-T — Iranian delta wing, loitering munition or ISR
  • KUB-BLA — Russian Zala loitering munition, 30min, 3kg warhead
  • Mohajer-6 — Iranian tactical UAV, PGM-capable

Each entry includes: full technical specifications, combat employment history, known countermeasures, threat level assessment, radar cross-section estimates.

GNSS Adversary Jammer Library (9 Systems)

  • R-330Zh Zhitel — Russian, GPS/GLONASS/Galileo, 25km effective
  • Pole-21 — Russian area denial, 50-150km, cell tower-mounted
  • Krasukha-4 — Russian, also jams AWACS/JSTARS, 300km
  • Borisoglebsk-2 — Russian EW complex, 4 stations, multi-band
  • SPU-2 Avtobaza — Russian passive, exploits GPS signals
  • Chinese BeiDou Jammer — PLA, GPS/GLONASS/BeiDou/Galileo
  • Iranian GPS Jammer — Reverse-engineered from captured RQ-170
  • DPRK Jammer — Truck-mounted, caused 1,000+ GPS disruptions ROK 2010-2016
  • COTS Systems — Commercial off-the-shelf, sub-$100, growing threat

Each entry includes: technical specs, frequency bands, effective range, countermeasures, operational history, procurement status.

RED FORCE Adversary C2 Systems (7 Nation-State Platforms)

SystemNationFunction
SvodRussiaTheater-level integrated air defense C2
Polyana-D4M1RussiaBrigade/division automated C2 for IADS
Barnaul-TRussiaTactical-level SHORAD C2
Baikal-1MERussiaAutomated fire control for GBAD
KJCCSChinaPLA joint C2 system
PLA MOSISIranIntegrated air/maritime defense C2
SepehrDPRKStrategic-level automated C2
Section 5

Portfolio Acquisition Executive (PAE) Alignment

SHIELD/ATLAS spans multiple PAE portfolios rather than residing in a single program of record. This aligns with DOD's shift toward portfolio-driven acquisition, MOSA-compliant open architecture, and JADC2-mandated interoperability. Software-defined, composable modules deliver affordable mass at scale across acquisition boundaries. Mission-based cyber risk assessment (DoWM 5000.103/DoDI 5000.89) embedded at every tier.

Command & Control
ODIN, WARFIGHTER, BFT, EFFECTS, CONSUL
Intelligence & EW
RED FORCE, SPECTRUM/EMSO, CYBER, OPSEC, SENTINEL
Fires & IAMD
FIRES, AIRSPACE/C-UAS, SDA
Maritime
NEPTUNE, TRIDENT, AEGIS, NEREID, OCEANUS
Training & Readiness
EXERCISE, AAR, READINESS, WARFIGHTER
CBRN / WMD
CBRN, CASCADE, HEALTH
Space
SDA, NAV (GPS-denied)
DSCA / Homeland
METRO, ICS, CITADEL, BASTION, GUARDIAN, All EM modules
Section 6

GPS-Denied Navigation Capability

Comprehensive PNT resilience across DDIL (Denied, Disrupted, Intermittent, Limited) environments. MOSA-compliant navigation composable with all C2 and fires modules. Zero-trust integrity verification on all PNT sources.

12 Platform Types

  • Dismounted Infantry
  • Light Tactical Vehicle
  • Heavy Armor
  • Rotary Wing
  • Fixed Wing
  • Surface Vessel
  • Submarine
  • Small UAS
  • Large UAS
  • Special Operations
  • Maritime Special Ops
  • Civilian Emergency

9 GNSS Denial Scenarios

  • Full GPS Blackout
  • Selective Frequency Jamming
  • GPS Spoofing Attack
  • Indoor/Underground Operations
  • Dense Urban Canyon
  • Jungle/Triple Canopy
  • Arctic Magnetic Anomaly
  • Multi-Constellation Attack
  • Contested Maritime

6 PNT Backup Systems

  • eLoran — Enhanced Long Range Navigation
  • LEO PNT — Low Earth Orbit positioning
  • Atomic Clock — Chip-scale holdover
  • CSAC — Chip-Scale Atomic Clock
  • Inertial Nav — INS/IMU dead reckoning
  • Terrain Match — TERCOM/DSMAC
Section 7

ODIN AI Decision Support

Multi-domain course of action analysis with automated risk scoring, resource calculation, and timeline generation.

COA Generation Capabilities

  • Generates 2-3 courses of action per scenario
  • Advantages and disadvantages for each COA
  • Resource requirements with availability check
  • Timeline with decision points
  • Risk scoring (low/medium/high/extreme)
  • Cross-module dependency analysis
  • Historical pattern matching

Supported Scenario Types

  • Hurricane / Major Storm response
  • Active threat / Force protection
  • CBRN incident response
  • Infrastructure failure cascades
  • Maritime interdiction
  • GPS denial / PNT degradation
  • Multi-domain operations
  • DSCA (Defense Support to Civil Authorities)
Section 8

Dual-Use Software-Defined Architecture

MOSA-compliant, JADC2-aligned architecture serves civilian emergency managers and military commanders with full-stack congruence. Zero-trust zero-trust gate controls access levels while enabling authorized cross-domain data flows. DDIL-capable. Affordable mass at scale.

DSCA Scenario: Hurricane Hits Military Installation

WEATHER tracks storm approach → METRO monitors city infrastructure → GUARDIAN calculates risk for installation and surrounding community → ICS establishes unified command (military + civilian) → CASCADE maps infrastructure dependencies across both → EMS coordinates military and civilian medical assets → TRANSPORT coordinates military and civilian evacuation routes → ODIN generates joint COAs → WARFIGHTER manages military force protection → RECOVER coordinates FEMA/DOD assistance

Civilian Side (47 Modules)

FEMA/NIMS-compliant emergency management, ICS forms, HSEEP exercises, municipal operations (METRO), community resilience, interoperability exports (CAP/EDXL/NIEF), weather, fire, EMS, transport, damage assessment, mutual aid, recovery.

Defense Side (18 Modules)

MDMP/Joint Ops, AI COA generation (commander-approved, never auto-executed), fires C2 with a human-authored ballistic engine and TITAN interop — AI does not author ballistic numbers and lethal-effect commit stays human-in-loop. POSEIDON maritime suite, EMSO/EW, C-UAS, SDA/PNT resilience, adversary C2 intelligence, CBRN/WMD tracking, blue force tracking, coalition coordination, operations security.

Section 8.5

Interactive Sandbox Engine — "Prove It"

Every defense module includes an interactive sandbox with guided step-by-step walkthroughs. Operators can learn, practice, and validate workflows in a safe environment with realistic scenario data. Hand them the device. Let them do it. Reset and repeat.

Sandbox Capabilities

  • 45 module sandboxes with guided overlays, progress bars, and step instructions
  • Pre-loaded realistic scenario data (no setup required)
  • Isolated data: __SBX_ prefix separates sandbox from live data
  • Reset-to-baseline: one button clears everything back to initial state
  • "SANDBOX MODE ACTIVE" visual banner prevents confusion with live ops

Voice Input — Human Verification Mandatory

  • Voice-to-text captures spoken commands (Observer ID, target grids, BDA reports)
  • Verification modal shows transcript before any action is taken
  • Operator reads, edits if speech recognition was wrong, then confirms or rejects
  • NOTHING auto-executes. A human verifies every voice command.
  • Designed to prevent misheard commands from causing fratricide

FIRES Sandbox (10 Steps) — Full Call for Fire

Training Mode → Observer ID → Warning Order + Grid → Target Description + Munition → Method of Fire → Validate CFF → VTC Camera Start → Target Designate (paired agreement) → Ballistic Solution + Interop Export (TITAN/CoT/USMTF/VMF) → BDA Visual Assessment

Section 9

DOD Grant & Contract Alignment

VehicleRelevanceSHIELD/ATLAS Modules
DOD OTAOther Transaction Authority for rapid prototypingODIN (AI/ML), POSEIDON (maritime AI), SDA (space), SPECTRUM (EW)
SBIR/STTRSmall business innovation researchAll defense modules (VOSB eligible), GPS-denied nav, adversary threat libraries
DHS HSGPHomeland security grant programCITADEL, BASTION, C-UAS, CYBER, SENTINEL, interoperability
MTECMedical Technology Enterprise ConsortiumEMS, HEALTH, CBRN, mass casualty management
SOCOM SOFWERXSpecial operations innovationNAV (GPS-denied), ODIN, RED FORCE, OPSEC, SPECTRUM
DARPAAdvanced research projectsODIN (AI decision support), CASCADE (infrastructure modeling), SDA (PNT resilience)

VOSB Advantage

ISS LLC (Integrated Services and Solutions LLC), operating as SecureAssure, is a Service-Disabled Veteran-Owned Small Business (SDVOSB). Dr. Terry Flood (DHA, Retired U.S. Army 131A, Chief Targeting, EW, Fires & Intelligence Officer) brings decades of operational experience. SDVOSB certification provides preferential access to set-aside contracts, sole-source authority under simplified acquisition thresholds, and credibility in the defense acquisition community. CAGE: 9VKK3 | UEI: C7YDV3P8EHL7.

Section 10

Technical Architecture Summary

ComponentImplementation
ApplicationProgressive Web App (PWA) — runs in any browser, installable, offline-capable
FrontendVanilla JavaScript (~23,400+ lines), Chart.js visualization, Leaflet.js mapping with Turf.js geospatial
BackendNode.js/Express (TypeScript), PostgreSQL database, Socket.IO realtime
Service Workeratlas-v29 — network-first for JS/CSS, cache-first for assets, full offline capability
Securityzero-trust defense access gate, HTTPS, no-cache headers, SCIF compliance protocols (OPSEC module)
InteroperabilityCAP 1.2 XML (IPAWS), EDXL-RM (EMAC), EDXL-HAVE (HAvBED), NIEF 2.0, CoT/TAK
Testing950+ automated health tests covering all modules, APIs, and integrations
EcosystemThriveUp 20-platform ecosystem governed by AGOS (Adaptive Governance Operating System) — RAG AI, heartbeat (5 min), adaptive directive management, fidelity scoring, cognitive performance tracking, self-healing instructions, cross-platform orchestration. AGOS = governance brain. SHIELD/ATLAS = operational body. Force multipliers.
Section 11

Tactical Hardware Integration

SHIELD/ATLAS is software-defined — but operational deployment requires seamless connection to tactical radio systems, field sensors, and military hardware. The platform supports multiple hardware interface pathways for integration into existing tactical communication architectures. MOSA-compliant, DDIL-capable, zero proprietary lock-in.

11.1 Tactical Radio Interfaces

Interface MethodHardwareCompatible RadiosATLAS Integration Point
USB-to-Serial Adapters FTDI-chipset USB-to-RS-232 cables with MIL-STD fill connectors (U-329/U, J-137 6-pin) AN/PRC-117G, AN/PRC-152A, AN/PRC-163, SINCGARS (all variants), AN/PRC-148 MBITR COMMS module — serial data ingestion for PLI, chat, and SA updates. CoT/TAK cursor-on-target messages parsed natively.
Ethernet/USB Network Bridges Thales IMBITR (In-Band Modem for IP Tactical Radios), L3Harris USB data adapters AN/PRC-152A, AN/PRC-163, Falcon III family, AN/VRC-110 vehicular COMMS + EVENT BUS — IP data over voice channels enables full Event Bus mesh across tactical nets. ATLAS treats the radio as a network transport layer.
Mesh Network Radios Persistent Systems MPU-5 (native USB/Ethernet), Silvus StreamCaster, Rajant Kinetic Mesh Self-contained MANET radios with native IP interfaces Full ATLAS deployment — mesh radios provide the DDIL-resilient transport layer. Multiple ATLAS nodes sync via mesh with conflict resolution on reconnect.
TAK Server Bridge ATAK EUD (Android end-user device) with TAK Server, USB tethered to radio Any radio running ATAK — AN/PRC-163, Nett Warrior EUD cables BFT + TEAM modules — CoT position reports and SA data flow bidirectionally between ATAK and ATLAS. Blue force positions rendered on shared map.

11.2 Sensor Integration

Sensor TypeConnectionATLAS ModuleData Flow
RF Detection (C-UAS) USB/Ethernet to RF spectrum analyzers, DroneShield RfPatrol, Dedrone sensors AIRSPACE — EMSO overlay RF signature ingestion, auto-classification against 10-platform threat library, bearing/range plotting on common operational picture
Chemical / HAZMAT USB-connected portable chemical detectors (RAE Systems, Draeger, ChemProX) FIRE — HAZMAT panel Real-time chemical concentration data feeds plume modeling. Auto-triggers HEALTH and EMS modules on threshold exceedance.
Weather Stations USB/serial portable weather stations (Kestrel 5500, Davis Vantage) WEATHER module Local weather observations enhance NWS data in DDIL environments. Wind speed/direction critical for plume modeling and fires engagement geometry.
GPS / PNT Receivers USB GPS receivers, M-Code capable DAGR/PLGR via serial adapter NAV/PNT module Multiple PNT source ingestion with integrity scoring. GPS-denied navigation uses inertial + terrain + celestial when GPS is jammed or spoofed.

11.3 Deployment Configurations

Tactical Edge Node

Hardware: Ruggedized laptop or tablet (Panasonic Toughbook, Samsung Galaxy Tab Active, Getac) + USB-to-serial adapter + tactical radio

Software: SHIELD/ATLAS PWA running in browser, service worker caching all modules for offline operation

Data Flow: ATLAS ↔ USB adapter ↔ tactical radio ↔ higher HQ ATLAS node. CoT/TAK and Event Bus messages traverse the radio net. Full DDIL resilience — all modules functional when disconnected, auto-sync on reconnect.

Use Case: Dismounted patrol, vehicle checkpoint, FOB operations center, DSCA liaison at civilian EOC

Vehicle-Mounted Configuration

Hardware: Vehicle-mounted computing platform + AN/VRC-110 or Persistent Systems MPU-5 + USB hub for multiple sensor inputs

Sensors: RF detection, chemical detector, GPS receiver, portable weather station — all feeding ATLAS simultaneously via USB hub

Data Flow: Full sensor fusion at the vehicle level. ATLAS correlates RF signatures (AIRSPACE), chemical readings (FIRE), weather (WEATHER), and position (NAV/PNT) into a single operational picture shared via mesh radio to all connected nodes.

Use Case: Mobile command post, HAZMAT response vehicle, military convoy lead vehicle, CBRN reconnaissance

EOC / TOC Fixed Installation

Hardware: Standard workstations + Ethernet to organizational network + gateway to tactical radio net

Integration: ATLAS connects to both enterprise IT (Ethernet/fiber) and tactical nets (via radio gateway). Unified Command operators and military liaisons access the same ATLAS instance from the same room with role-based access (zero-trust gate for defense modules).

Data Flow: Full bandwidth connection for federal data feeds (NWS, EPA, USGS, etc.) + tactical radio bridge for field units operating in DDIL. The EOC/TOC serves as the data aggregation point where enterprise and tactical data merge.

Use Case: Emergency Operations Center, Tactical Operations Center, Joint Operations Center, Unified Command post

SBIR / CRADA Relevance

SHIELD/ATLAS hardware integration capability directly supports SBIR Phase II and CRADA with DEVCOM ARL objectives:

  • DoWM 5000.103 Cyber DT&E: USB-connected sensors provide the physical layer for mission-based cyber risk assessment in tactical environments. The sensor data is assessed for integrity (spoofing, injection) before entering the decision pipeline.
  • MOSA compliance: Standard USB/serial/Ethernet interfaces — zero proprietary connectors, zero vendor lock-in. Any USB-capable sensor or radio works with ATLAS.
  • JADC2 alignment: CoT/TAK interoperability with ATAK enables ATLAS to participate in the Joint All-Domain operating picture without requiring dedicated military infrastructure.
  • Affordable mass at scale: A ruggedized tablet + $15 USB-to-serial adapter + existing tactical radio = a full ATLAS node. No specialized hardware procurement. No multi-million-dollar terminal costs. Deploy to every squad, every vehicle, every EOC.
Echelon Break

Coverage by Echelon

One platform, four echelons. The same modules compose differently for the four-star, the J3 staff, the battalion S2, and the dismounted operator. No re-training, no re-licensing, no swivel-chair between layers.

Echelon Customer Surfaces Decision Cycle
StrategicCCMD / OSD / Service HQDoD COP, Intel Fusion, DIME-PMESII, SITREP synthesisHours — days
OperationalJTF / Division / Wing / FleetCommander Dashboard, Maritime, Joint Ops, Decision QueueMinutes — hours
TacticalBrigade / Squadron / BattalionCRAM, Swarm C2, Kill Chain, Sensor Lab, Peer-LocateSeconds — minutes
EdgeOperator / Squad / AircrewATAK plug-in, Mobile Hub, GPS-Denied Nav, Soldier UISub-second — seconds
Service Slide · Navy / Marine Corps

Navy & USMC — Distributed Maritime & Littoral C2

Sea Control, EABO, and Force Design 2030 demand small, lethal, networked formations operating inside contested first-island-chain ranges. SHIELD/ATLAS gives a Stand-In Force the same picture as the carrier, without the carrier's bandwidth.

Modules in Play

  • POSEIDON Maritime AI suite (AIS + radar + visual cross-cue)
  • TRIDENT Undersea (sonobuoy planning, ASW coordination)
  • Maritime COP with 12,000+ live vessel feed
  • CRAM for HVU defense against UAS swarm
  • Peer-Locate for GPS-denied littoral movement

Mission Fits

  • EABO — Expeditionary Advanced Base Operations
  • Stand-In Force ISR cueing the Joint Fires Network
  • Amphibious Ready Group surface picture
  • SOF Maritime — small-boat infiltration with terrain match
  • HADR / NEO from L-class shipping

Why Us, Why Now

  • Runs on a ruggedized tablet + commercial radio — no AEGIS workstation
  • Bandwidth-aware: degrades gracefully on narrowband HF/UHF
  • NIPR-equivalent only — we are not asking for SIPR rooms in the bush
  • Composes with NMESIS, Naval Strike Missile, MQ-9B SkyGuardian feeds
Service Slide · United States Army

U.S. Army — ADOC, JADC2, and the Brigade-Down Fight

Army G-6 calls ADOC the “9-1-1 for data.” SHIELD/ATLAS is the tactical-edge complement — the same thesis, one echelon lower. Plug into TAK, fuse the brigade picture, and shorten the targeting cycle from hours to minutes.

Modules in Play

  • Kill Web sensor-to-shooter at machine speed
  • Commander Dashboard with decision queue
  • DIME-PMESII operational environment overlay
  • GPS-Denied Nav with 6 PNT backups
  • ATAK plug-in — CoT bidirectional
  • Sensor Lab — plug-and-play acoustic, EO/IR, MWIR

Mission Fits

  • BCT and below — Stryker, IBCT, ABCT
  • SOF (1st SFG, 5th SFG, 75th RR) — F3EAD compression
  • FA / Fires — HIMARS / PrSM cue from non-Army sensors
  • SHORAD / M-SHORAD — C-UAS layered defeat
  • NG / Reserve domestic response (DSCA, hurricane, wildfire)

Why Us, Why Now

  • SDVOSB / CAGE 9VKK3 — set-aside eligible today
  • Built by a 131A — Chief Targeting / EW / Fires / Intel
  • Composes with PEO C3T, PEO IEW&S, PEO Aviation programs
  • No new training paradigm — if a soldier can use TAK they can use this
Service Slide · United States Air Force

U.S. Air Force — ABMS, ACE, and the Contested Logistics Picture

Agile Combat Employment scatters small force packages across austere fields with intermittent comms. SHIELD/ATLAS is the cheap, expendable C2 node that survives when the AOC link drops — and re-joins clean when it comes back.

Modules in Play

  • DoD COP — air, surface, sub, cyber on one screen
  • Live ADS-B 9,500+ aircraft, 31 regions, sub-minute
  • Counter-UAS / CRAM for fixed-base defense
  • Sensor Lab — perimeter acoustic / EO trip-wire
  • Intel Fusion — pattern-of-life on adversary aviation

Mission Fits

  • ABMS / CJADC2 edge node when satcom is jammed
  • ACE — austere airfield base defense and ops picture
  • AFSOC / 24th SOW — recovery, ISR, strike coordination
  • Security Forces — integrated base defense ops center
  • Mobility — AMC contested-logistics picture

Why Us, Why Now

  • Composes with Kessel Run, Platform One, Enterprise IT-as-a-Service
  • Lambda-style serverless modules — deploy a module, not a system
  • STIG-able container; auditable code; commercially licensed
  • Replaces the parts of an AOC that don’t need an AOC
Service Slide · United States Space Force

U.S. Space Force — SDA, PNT Resilience & Tactical SATCOM Integration

Space is congested, contested, and competed. SHIELD/ATLAS is the terrestrial fusion layer that turns Space Domain Awareness and LEO-PNT signals into something a Joint Force commander can act on — and survives when those signals are denied.

Modules in Play

  • GPS-Denied Nav — 6 PNT backups including LEO-PNT & eLoran
  • Intel Fusion — SDA correlation with terrestrial picture
  • Spectrum / EW Lab for jamming detection & characterization
  • Threat Library for ASAT / co-orbital indicators
  • NOTAM & Weather Alerts — live, integrated

Mission Fits

  • Delta 2 (SDA) — correlate orbital threat to terrestrial impact
  • Delta 4 (Missile Warning) — downstream cue to CRAM / Patriot picture
  • Delta 8 (SATCOM) — resilient links for ATAK / CoT in DDIL
  • STARCOM — training surfaces with real Space-aware threat lib
  • National Space Defense Center — tactical edge of strategic SDA

Why Us, Why Now

  • Built for the day GPS goes away — not a brochure, a working stack
  • Composes with Tactical SATCOM, MUOS, and commercial PNT (Xona, Satelles)
  • Open MOSA APIs — Space Force gets data in, not vendor lock-in
  • Software-defined — a Guardian patches a module, not a satellite
Interoperability · Firestorm Labs

Firestorm Labs × SHIELD/ATLAS — Mass Without a Mass-Fires Software Bill

Firestorm Labs builds additive-manufactured, mission-configurable small UAS (Tempest / xCell printable airframes) at the tactical edge. They make the mass; we make the mass actionable. Together: a brigade prints its own swarm in the morning, flies it under SHIELD/ATLAS Swarm C2 by afternoon, and feeds the Kill Web by evening.

What Firestorm Brings

  • xCell expeditionary additive-manufacturing container — print airframes forward
  • Tempest family — mission-configurable Group 2/3 UAS
  • Modular payload bays — ISR, EW, kinetic
  • Affordable mass — magazine-class numbers, not exquisite single-platform

What SHIELD/ATLAS Brings

  • Swarm C2 — 8+ ship formation control, behaviors, mesh-aware
  • Kill Web — sensor-to-shooter cueing across services
  • GPS-Denied Nav — the swarm keeps flying when GPS dies
  • Intel Fusion — payload take fused with national-level picture
  • Human-in-loop — AI never authors lethal numbers

Joint Value Proposition

  • Print-and-Fly Cycle — xCell prints airframe; ATLAS plans the mission; same day employment
  • Attritable by Design — cheap to lose, cheap to replace, cheap to coordinate
  • Mass Without Mass Software Bill — no PEO multi-year build for the C2 layer
  • Service-agnostic — USMC EABO, Army Brigade, AFSOC strike, all use the same stack
  • Replicator-aligned — DIU’s all-domain attritable autonomy thesis, executable today
Bottom line: Firestorm answers “where do the drones come from?” SHIELD/ATLAS answers “who’s flying them, what are they cueing, and who decides to fire?” A pilot pairing the xCell container with SHIELD/ATLAS Swarm C2 is a single-week stand-up — no new ATO required because we stay UNCLAS commercial.
Tactical Data Links · Link 16 / J-Series · COMSEC Posture

Link 16 & COMSEC — Plain English

Short version: we do not transmit on Link 16, and we are not the keeper of the secret keys. Link 16 is the military’s classified radio network — jets, ships, and ground units use it to share where they are and what they see. To get on it you need a special encrypted radio called a MIDS terminal and you need someone in uniform whose job is to safeguard the secret keys (the COMSEC custodian). We don’t do either of those. Instead, we sit next to a government-owned translator box that the unit already operates, and we read what it sends us in plain (unclassified) form.

1. What Link 16 actually is

  • A classified military radio network — think of it as the secure group-text everyone in the fight is on
  • It carries little messages called J-series — "I’m here," "I see this target," "shoot here," "stop shooting"
  • Only encrypted radios with the day’s secret keys can talk on it
  • Those keys come from a government office and are protected by federal law

2. What the unit already has

  • An encrypted radio (MIDS terminal) on a jet, ship, ground vehicle, or command post
  • A government-owned translator box that pulls the Link 16 messages off the secure side and rewrites them in plain unclassified form
  • A person in uniform, the COMSEC custodian, who safeguards the secret keys — that role stays exactly where it is today, untouched by us
  • An approved one-way "guard" that lets unclassified copies flow out, but never lets the secret stuff flow in

3. What ATLAS does

  • Listens on the unclassified side of the translator box — we read, we don’t broadcast
  • Mixes those Link 16 tracks with our 9,500+ aircraft + 12,000+ ship feeds onto one map
  • Turns operator-level radio chatter into a clean commander’s view with a decision queue
  • If the translator box goes dark, we keep running on commercial feeds and clearly show "Link 16 feed stale — last update X seconds ago" so nobody is fooled
Plain-English answer for the brief: "Link 16 is the military’s classified group-chat. We don’t join the chat — we read a translated, unclassified copy that a government-owned translator box hands us. The unit’s person who guards the secret keys keeps that job. Nothing about their security setup changes. We just put a smarter map and a cleaner picture in front of the commander — in days, not years."

What the Field Is Demanding — and What ATLAS Already Ships Today

Senior defense, intelligence, and industry leaders, in their own words, describing the exact gap SHIELD/ATLAS already closes — running, today, on the surfaces above.

NGA / CSIS

“There is a structural gap between what defense users want — seamless multi-int fusion — and how the commercial market actually operates.”

“What we want is machine-to-machine APIs. If an RF collection sees something, I want capacity on somebody else's satellite in 30 minutes.”

David Gauthier, CSO GXO Inc. (former NGA) — Satellite Conference, April 2026
HawkEye 360

“There's no incentive for us to build a tip and cue construct across the industry.”

Todd Probert, President Gov't Business, HawkEye 360
This is why a platform-agnostic coordination layer — not a sensor vendor — must provide integration.
Planet Federal

“Actual tipping and cueing is very difficult unless you have dedicated capacity or ubiquitous sensing.”

Jared Newton, Sr. Technology Strategist, Planet Federal
SHIELD/ATLAS’s distributed sensor mesh provides exactly the ubiquitous sensing construct needed.
Drone Industry — The New UAV Paradigm

“Not the most advanced. Just the most deployable.”

What Actually Wins: modular design, low-cost components, mass manufacturability, rapid replacement, software-driven control.

Drone Helpline (44,246 followers) — April 2026
Drone Manufacturing

“As autonomous platforms multiply, the real challenge lies in interoperability and turning raw data into actionable intelligence.”

Tempest Droneworx (manufacturer, 3,628 followers) — April 2026
DSFR / Emergency Management

“One drone is one camera, one battery, one point of failure. The swarm isn’t the future of first response — it’s the first response the future deserves.”

DSFR (Drone Swarm First Responders) validates multi-manufacturer coordination for emergency response — the civilian side of SHIELD/ATLAS’s dual-use architecture.

CIA / DIA / Pentagon — Federated AI Governance

“Who owns judgment, authority, and responsibility once AI is embedded inside intelligence, cyber, planning, and mission execution?”

SHIELD/ATLAS’s AI audit engine (Anthropic Claude; multi-provider lanes architected but currently off per program directive 2026-04-23) and human-in-the-loop kill chain gates directly address this Mission-Assurance requirement.

SpearX CTO — Architecture-First C-UAS

“The real shift isn’t in hardware — it’s in mindset. We’re moving from ‘buy and forget’ to ‘deploy and evolve.’”

Open APIs (ASTERIX, STANAG, ASTM), modular fusion upgradable without sensor replacement, edge resilience under degraded connectivity, human-AI teaming from sprint one.

SpearX CTO — April 2026
MPC Edge-AI Interceptor Guidance

“At 200 km/h, a 50ms lag means the target has moved 3 meters. You miss. The intelligence must live on the wing.”

Model Predictive Control replaces Proportional Navigation: simulates thousands of paths every 10ms, picks the mathematically optimum intercept trajectory.

Muhammad Farrukh / Matej Rajchl (Airvolute CTO) — April 2026
Taiwan: Pre-Kinetic Infrastructure Warfare

“If the public starts asking ‘Will the system hold?’ before the first major strike, then the coercion campaign is already working.”

2.6M cyberattacks/day on Taiwan infrastructure (Reuters, 2025). 121 ADIZ incursions in March. Whole-of-society Mission Assurance validates SHIELD/ATLAS dual-use architecture.

Taiwan Infrastructure Analysis — April 2026
UAV Optical Hardening — 3-Level Architecture

“Protection isn’t a feature — it’s architecture. Design it from Day One.”

Hardware: spectrum filters reduce laser attacks 70-80%. Software: multi-spectral detectors boost accuracy 40-60%. System: quad-redundancy = 95% functionality with 2 channels jammed. Cue → Slew → Verify → Decision maps to SHIELD/ATLAS kill chain.

Dmitry Nedov, SpearX CTO/RnD Lead — April 2026
Spatial RAG Architecture — 9-Layer Geospatial AI

“Not just text. Context + location.”

Multi-modal ingestion → spatial feature extraction → geo-brain indexing → vector embedding → LLM reasoning → GEOINT output. 389 reactions, 37 reposts. Validates SHIELD/ATLAS RAG-enhanced geospatial decision support.

Kanchan B., Head of AI / Former CPO — April 2026
SpearX CTO — Mitigation Is a Decision Pipeline

“Mitigation is not a button. It is a decision pipeline: detection→classification→response, with clear gates, auditable logic, human oversight.”

Layers 6-9: Soft Kill, Hard Kill, C2 Integration, Realistic Testing. Metrics: detection-to-mitigation <3 sec, false positive <1/24hr, operator workload tracked. “UX is a security feature.”

Dmitry Nedov, SpearX CTO/RnD Lead — April 2026
Army G-6: “9-1-1 for Data”

“We don’t have a data problem. We have a data management problem, and data becomes the ammunition.”

ADOC breaks down stovepipes for decision dominance. SHIELD/ATLAS = the tactical-edge complement. 66 modules shipping today, 11 event bridges. Same thesis, different echelon.

Lt. Gen. Jeth Rey, Army DCOS G-6 — April 2026
SpearX Field Doctrine: Trust > Power

“CUAS is not about powerful jammers. It is about building trust: sensors, algorithms, operators, commanders. Technology enables. Doctrine, training, rules decide success.”

Common field mistakes: mitigation as afterthought, ignoring cognitive load, testing only in ideal conditions, no feedback loop from field data.

Dmitry Nedov, SpearX CTO — April 2026
Combat Proof: Prince Sultan Air Base — March 27, 2026

6 ballistic missiles + 29 drones (est. $2-3M) destroyed one E-3 Sentry AWACS, damaged KC-135 tankers, wounded 10-12 Americans. E-3 fleet down to ~16 airframes.

Cost-exchange: $2-3M attack vs. hundreds of millions in irreplaceable assets. Third attack in recent weeks — pattern of probing with cheap, massed systems.

Justin Nerdrum, B2G Growth Strategist — April 2026
Data Flow Stability: The Real Bottleneck

“You don’t lose drones. You lose awareness. And that’s more dangerous.”

1,000-drone operation = 5,000-10,000 data points/sec. >200ms delay = lost synchronization. SHIELD/ATLAS’s sensor load manager with token-bucket shedding prioritizes critical data when bandwidth degrades.

Tarana Zarbaliyeva, Aviation Engineer — April 2026
The Coordination Thesis — Validated by Industry and Combat

Shield AI builds autonomous pilots. Anduril builds autonomous platforms. SHIELD/ATLAS coordinates everything they produce into a unified operating picture. We don’t sell sensors — we sell coordination.

$30 distributed sensor mesh vs. $270M single-point-of-failure AWACS. Prince Sultan proved the math. The future is distributed, layered, and software-defined.

Live Intelligence Synthesis

Latest cached synthesis — cross-references the internal 468-doc RAG corpus against positioning docs, competitor movements, and procurement pipeline. Live auto-refresh is currently off (pay-per-use research APIs disabled per program directive 2026-04-23).

Loading intelligence synthesis...

Threat Evolution Engine

Action → Counter-Action → Counter-Counter-Action lifecycle — intelligence drives operational platform updates, not reports

Loading threat evolution data...

Demonstration Available

SHIELD/ATLAS is available for live demonstration, pilot deployment evaluation, and partnership discussion.

Dr. Terry Flood, DHA
Retired U.S. Army 131A, Chief Targeting, EW, Fires & Intelligence Officer | ISS LLC / SecureAssure (SDVOSB)

CHEATSHEET
ASK AI
PRESENCE
⚠ SANDBOX / TRAINING MODE — Live read-only data. Write commands are inhibited (train as you fight, missile button safed).