You are about to enter a Department of Defense restricted capability area containing military command and control modules.
Ensure you have proper authorization to access defense-related tools including Joint Fires, Spectrum Operations, Counter-UAS, Naval Warfare, and Blue Force Tracking systems.
This environment is currently configured for testing and evaluation purposes. Full access control gating (CAC/PIV, SAML 2.0, RBAC) will be enforced upon operational deployment.
Record GPS positions at intervals as breadcrumb markers on the map.
Cache current map viewport tiles for offline use.
Determine position from star observations. The system automatically identifies which stars are visible from your location and guides you to find them. Based on USNO 57-star navigational catalog and spherical astronomy.
Stars currently above your horizon, sorted brightest first. Tap a star to add its observation using your device sensors.
Use the sun's calculated position + time for daytime GPS-denied navigation. Combine with a landmark bearing for a full position fix.
Point device toward sun and hold steady, or enter altitude manually. WARNING: Never look directly at the sun.
Point camera at a known landmark to determine position via bearing triangulation. Works when stars and GPS are unavailable.
Combined position estimate from all available sources, weighted by confidence.
Click two points on the map to measure distance and bearing.
Enter an address, coordinates, or right-click the map to set a destination.
Click on the map to set UAV location, or report at your current position.
Package all UAV reports, timestamps, operator data, and chain-of-custody metadata into an exportable case file.
Track airspace clearance requests and their status for coordinated operations.
Maintain a persistent log of all drone position sightings with timestamps for pattern analysis.
Track coordinated drone swarms — log formation, behavior, and countermeasures. ATP 3-01.81 / TC 3-01.60 compliant.
Countermeasure recommendations by threat level. Reference: ATP 3-01.81, TC 3-01.60, JP 3-01.
Quick reference for standard airspace coordination measures (ACMs).
Ingest external C-UAS detection feeds for unified airspace picture. Supports passive RF, radar, EO/IR, and acoustic sensor networks.
Counter-Rocket, Artillery, Mortar defense coordination. Integrates Centurion LPWS, Patriot, SHORAD, and coalition air defense systems.
Track counter-drone defensive assets, engagement envelopes, shot/charge inventory, and sensor network health. Supports RF jammers, directed energy (laser/HPM), kinetic interceptors, and detection-only sensors. ATP 3-01.81 compliant.
Track C-UAS detection sensor health and coverage gaps.
Track C-UAS legal authorities and FAA/ATC coordination status for domestic operations.
Known adversary drone platforms, specifications, operators, combat record, and recommended countermeasures. Updated from OSINT, Janes, IISS Military Balance, and field intelligence. Critical for JITF-401 alignment and C-UAS engagement planning.
Report spectrum conditions in your area. Click map to set zone center or use your position.
Log RF spectrum scan results for signal intelligence and pattern tracking.
Plan electronic warfare zones with effect type, coverage, and operating parameters.
Track assigned frequencies and detect conflicts between units operating on overlapping bands.
Emission Control (EMCON) state management. Tracks which emission sources are authorized at the current EMCON level.
JP 3-85 compliant. Track emitters, EW assets, jamming effectiveness, SIGINT indicators, and spectrum deconfliction. Integrates with SENTINEL threat timeline and IAMD.
Log friendly and threat RF emitters in the operational area.
Track friendly electronic warfare platforms and their current mission status.
Real-time overview of team readiness, personnel count, and operational status
Manage team members with roles, contact info, and status tracking
Assign and track tasks with priority, assignee, and status
Plan and manage duty shifts, rest cycles, and rotations
Track certifications, qualifications, and expiration dates for team members
Track NIMS/ICS certifications with 3-year recertification cycle, expiration alerts, and personnel cert matrix
Real-time active fire detection from NASA FIRMS satellite data (VIIRS sensor). Updated every 10 minutes.
Aggregated insights from active hotspot data — turning data into actionable information.
Worldwide natural events from NASA Earth Observatory Natural Event Tracker: wildfires, storms, volcanoes, icebergs, and more.
Active weather alerts from NOAA National Weather Service. Filter by US state code.
Aggregated insights from active weather alerts — situational awareness at a glance.
NWS point forecast for your location. Updates when position is available.
Enhanced NWS warning polygons on map with storm cell markers, movement vectors, tornado path projections, and auto-refresh.
Chronological list of active warnings with expiry countdown.
Real-time avalanche forecasts from the National Avalanche Center and NOAA winter weather alerts. Danger zones shown on map.
Monitor tracked operators in mountain terrain. If GPS signal lost for more than 5 minutes, a rescue alert is triggered with last known position.
Mark search sectors and track rescue teams on the map. Click map to place search sector markers.
Real-time earthquake data from USGS. Shows seismic events globally.
Aggregated earthquake data analysis for situational awareness.
Live federal disaster declarations and aligned contract vehicles. Disaster data sourced from FEMA OpenFEMA API v2 in real time.
30-item step-by-step path to register, certify, and submit proposals to DoD programs. Based on BlackHays DoD Small Business Guide. Track your progress — data saved locally.
📄Real-time feed from FEMA OpenFEMA API — last 30 days of disaster declarations nationwide.
IC/Defense industry developments mapped to ATLAS capabilities. Updated from IC News, Defense News, and open-source intelligence feeds. Tracks potential partners, competitors, contract vehicles, and capability gaps.
Track active contracts with FAR/DFARS references, deliverables, CLINs, funding obligations, and period of performance.
Contract Line Item Number tracking for deliverables and pricing.
Track CDRL / deliverable submissions and approval status.
Track funding obligated, expended, and remaining by contract.
What agencies need vs. what ATLAS OVERWATCH delivers. GREEN = we have it, AMBER = buildable, RED = gap to fill. Based on FEMA/DHS/NSF/NIJ/DOD grant alignment review.
Ordered by grant impact, agency demand frequency, and feasibility. Items 1-8 close identified gaps from alignment review. Items 9-15 deepen existing moats.
Export ATLAS OVERWATCH data to Cursor-on-Target (CoT) XML format for interoperability with TAK ecosystem (ATAK, WinTAK, iTAK). CoT is the MIL-STD data exchange format used by DOD, DHS, and first responders.
ATLAS OVERWATCH exposes a RESTful API for integration with external systems, SIEM platforms, and agency dashboards. All endpoints return JSON. Rate-limited to 100 requests/minute per IP.
Technical compliance documentation for federal evaluators, grant reviewers, and procurement officers. Addresses Section 508, security posture, offline capability, access control, interoperability, and adoption pathways.
role="navigation" with descriptive aria-label attributes. Tab panels implement role="tablist", role="tab", and role="tabpanel" with proper aria-controls and aria-selected states. Modal dialogs use role="dialog" and aria-modal="true". Live regions use aria-live="polite" for dynamic content updates.aria-label descriptions. Status badges and dynamic counts are announced via live regions. Category headers include aria-expanded states. Toast notifications use aria-live for screen reader announcement. Map markers include text alternatives.escapeHtml() on all user inputs). Content Security Policy prevents script injection. localStorage data is domain-isolated by browser security model. Memory-capped data stores prevent DoS via storage exhaustion (FIFO with configurable caps). Auto-reconnect with exponential backoff prevents connection flooding.sendBeacon for telemetry. Automated error buffering and batch reporting. Dependencies sourced from CDN with SRI (Subresource Integrity) hash verification.atlas-v32 — core application shell (HTML, CSS, JS, CDN libraries), (2) atlas-map-tiles — map tile cache for offline mapping (supports CartoDB, OpenStreetMap, OpenTopoMap, ArcGIS, Stadia), (3) atlas-api-cache — cached API responses from federal data feeds. Cache versioning ensures clean upgrades. Old caches automatically purged on activation.navigator.onLine and Socket.IO connection events. On reconnect: queued data automatically submitted to server in order. Successful submissions removed from queue. Failed submissions retained for retry. Operator notified of sync status via toast notifications./api/dual-use/docs — API documentation (JSON), /api/dual-use/health — system health status, /api/dual-use/events — event log retrieval, /api/dual-use/team — team position data. All endpoints return JSON with standard HTTP status codes. CORS headers configured for cross-origin integration.Create standards-based Common Alerting Protocol (CAP 1.2) messages for public warning. Export to XML for IPAWS vendor gateway submission.
Generate a preview to see CAP XML here...
Create and manage incidents with ICS forms, team tasking, resource tracking, and Incident Action Plan generation.
Auto-generates ICS-214 from platform event log entries.
Consolidated Incident Commander checklist for active threat events. NIMS/ICS-compliant, NFPA 3000 aligned. Check items as completed — progress auto-saves.
Real-time platform health monitoring and CISA Known Exploited Vulnerabilities feed. Data sourced from live server telemetry and CISA KEV catalog.
Latest Known Exploited Vulnerabilities from CISA — real-time national cyber threat intelligence.
Post-quantum cryptography readiness assessment per NSA CNSA 2.0 mandate. Required for all National Security System acquisitions after Jan 1, 2027.
SHIELD/ATLAS capabilities mapped to NIST CSF 2.0 functions. Required for SLCGP compliance and FedRAMP readiness. Controls rated: IMPLEMENTED (green), PARTIAL (amber), PLANNED (blue), GAP (red).
Track progress toward FedRAMP authorization. Current target: FedRAMP Tailored Li-SaaS (Low Impact SaaS).
Unified cyber defense with zero single points of failure. Every component feeds every other component. WATCHTOWER insider threat, ransomware kill chain defense, asset vulnerability crosswalk, and network anomaly detection — all meshed through the 17-route Event Bus.
Entity behavior tracking, anomaly scoring, access pattern analysis. Flags for human action — never auto-punishes. Feeds SENTINEL (OSINT correlation), GUARDIAN (force protection), OPSEC (operations security).
Full lifecycle defense: prevent pre-attack vectors, detect active encryption, respond with isolation playbooks, recover from validated backups. Cross-linked to BASTION (hardening), CASCADE (impact modeling), ALERT (mass notification), CITADEL (civil defense).
Inventory what you run. Cross-reference against CISA KEV. Know exactly which of YOUR systems have actively exploited vulnerabilities. Priority: internet-facing + ransomware-tagged = CRITICAL.
Baseline traffic patterns, flag deviations, detect lateral movement and data exfiltration. Canary triggers, honeypot alerts, unauthorized device detection. Feeds WATCHTOWER (entity correlation), SENTINEL (pattern convergence), CASCADE (impact modeling).
Always on. Always watching. Cannot be disabled. Protects the platform itself — honeypot traps, injection detection, rate anomaly detection, IP isolation, integrity monitoring, SBOM tracking. Wired to WATCHTOWER + Network Anomaly Detection + Event Bus.
Integrity continuity. Self-awareness. Self-healing. Adaptive. Connects to trusted partners when online, hardens when offline, runs thorough reconnection protocol on restoration — check for updates first, verify integrity second, resume operations third.
Cyber Developmental Test & Evaluation instrument per DoW Manual 5000.103 and Guidebook v3.1. Evaluates any system's cyber survivability posture. Produces formal evaluation artifacts accepted by DoW Cyber Working Groups (CyWG), program offices, and OT&E authorities. Results feed ThriveUp ecosystem via AGOS heartbeat.
Per DoDI 5000.89 — up to 10 attributes defining how the SUT resists, absorbs, and recovers from cyber attack. Grade each based on evidence.
Per DoWM 5000.103 and NIST SP 800-30. Evaluate the SUT's cyber risk posture through structured threat scenario analysis. Map adversary TTPs to system components, score by likelihood and mission impact, and generate the MBCRA report required for every milestone decision.
Per DoWM 5000.103 Appendix E. Systematically enumerate the SUT's attack surface using the Wheel of Access framework. Every entry point must be classified by exposure and mapped to mission functions. This inventory is the required input to the MBCRA above.
Per DoWM 5000.103 Section 3.3.5 — Criticality Analysis. Decompose the SUT's operational missions into critical tasks, map to system components, identify single points of failure and cascading dependencies. Evaluator must classify every component by mission criticality tier. If the evaluator cannot determine impact, the system FAILS this evaluation gate.
Cascading failure analysis — if a route fails, which modules are impacted?
Per DoWM 5000.103 CSA requirements: Resist, Absorb, Recover. The evaluator must verify the SUT has defined RTO/RPO for every mission-critical component, can demonstrate recovery procedures, and can validate system integrity post-attack. A system that cannot prove recovery capability FAILS CSA-5, CSA-9, and CSA-10.
Take modules offline to assess mission impact. See how cascading failures affect the mission capability gauge and which degradation tier activates.
| Tier | RTO | RPO | Failover | Validation |
|---|---|---|---|---|
| CRITICAL | < 5 min | Zero loss | Automatic | Continuous |
| ESSENTIAL | < 15 min | < 5 min | Manual | Hourly |
| SUPPORTING | < 60 min | < 30 min | Graceful | On demand |
Run tabletop exercises and drills with simulated event injection. All exercise data is sandboxed separately from live operations.
Click on the map to set event location.
Select a domain and scenario to load pre-built HSEEP-compliant injects with expected actions, time pressure, and evaluation criteria.
Build, test, and validate in sandbox. Promote to production upon approval. Track capability gaps for future development.
When the sandbox reveals capabilities ATLAS doesn't have yet, document them here. These feed into the development roadmap and SBIR/CRADA prioritization.
Grant-readiness documentation for federal evaluators. Section 508, security posture, offline strategy, identity management, interoperability, and adoption pathways.
ATLAS is designed and built to meet Section 508 of the Rehabilitation Act and WCAG 2.1 Level AA accessibility standards. The following features are implemented:
Compliance Posture: Self-assessed WCAG 2.1 AA conformance. Voluntary Product Accessibility Template (VPAT) available upon request. Continuous accessibility testing integrated into development cycle.
ATLAS employs a security-by-design architecture suitable for federal deployment at Impact Level 2 (IL-2) with a clear pathway to higher authorization levels.
ATLAS is built for comms-denied environments. The service worker (atlas-v32) provides full offline capability with intelligent caching and sync.
atlas-v32, atlas-map-tiles, atlas-api-cache.Role-Based Access Control (RBAC) with three defined tiers and a defense escalation gate.
| Tier | Access Level | Modules |
|---|---|---|
| Personal | Civilian community awareness | NAV, FIRE, WEATHER, QUAKE, ENV, HEALTH, RECOVER, CAMP |
| EM Professional | Emergency management operations | All civilian modules + ICS, EMS, COMMS, TEAM, FIELD, SITREP, ALERT, EXERCISE |
| Defense / Full | Authorization-gated military capabilities | All modules + FIRES, EFFECTS, ODIN, AIRSPACE, SPECTRUM, TRIDENT, BFT |
Standards-based data exchange ensuring ATLAS integrates into existing federal, state, and local technology ecosystems.
/api/dual-use/docs.Defined pilot deployment pathways with specific module mappings and grant program alignment for each target audience.
Operational metrics, incident analytics, and equity-focused outcome tracking for NSF/FEMA research compliance.
Real-time operational key performance indicators for system health and throughput.
Server-side immutable event log. All security-relevant actions are recorded.
Translate CDC Social Vulnerability Index scores into actionable planning guidance. High SVI areas need prioritized resource allocation.
Identify patterns in repeated incidents and events over time. Uses logged event data and stored incident history.
Assess capability coverage across jurisdictions. Rate capabilities per area to identify gaps and resource allocation needs.
Evaluate how well current capabilities align with federal grant program requirements (DHS SLCGP, HSGP, EMPG, TVTP, C-UAS).
Assess how emergency management actions affect underserved and vulnerable populations. Supports EJ/equity compliance for federal grants.
Export comprehensive analytics report including SVI recommendations, trends, capability heat map, grant alignment, and equity assessments.
Comprehensive physical security, access control, and communication assessment per DHS K-12 School Security Guide.
Behavioral threat assessment per NTAC/Secret Service guidelines. Track concerns, assess, and manage cases.
Real-time mass casualty incident patient tracking by triage category.
Register patients with triage tag, category, injuries, and treatment.
Track receiving facility capacity, trauma level, and distance.
Track patient transport from scene to receiving facility.
Tactical Emergency Casualty Care — civilian adaptation of TCCC. Zone-based hemorrhage control aligned with Hartford Consensus and NFPA 3000.
START triage counts to estimate required resources for mass casualty incidents.
Incoming panic events from SHIELD PWA users routed to PSAP
Maximize communications in degraded RF environments. Compresses data, queues messages for burst transmission, and provides signal acquisition guidance.
NIMS-compliant communications plan. Add, edit, and export radio channel assignments per ICS 205 format.
NIFOG national interoperability channels pre-loaded for field use
Free-space path loss estimation (FSPL)
Radio discipline and channel plan for active threat / MCI response. NIMS-compliant, aligned with SAFECOM interoperability standards.
Connect to classified and secure messaging platforms for multi-domain communications. Supports NIPRNet, SIPRNet, JWICS-level operations and coalition cross-domain messaging.
Analyze climate resilience risks for any US location using NASA POWER, NOAA NWS, and EPA data.
Multi-source health surveillance combining CDC PLACES, FluView, Census demographics, and NNDSS disease tracking.
Live air quality data from EPA AirNow monitoring stations.
Connect BLE environmental sensors via Web Bluetooth (Chrome/Edge).
Common Operating Picture with domain-level status tracking and last-update timestamps.
WHO/WHAT/WHEN/WHERE/WHY structured situation report per FM 6-99.
Size, Activity, Location, Unit/Uniform, Time, Equipment — standard tactical observation report.
Spot Report — immediate report of significant activity (USMTF format).
Observer position + OT direction + range = target grid
Draw FSCM overlays on the map
Live meteorological data for operational planning
Pre-incident site assessment for schools, workplaces, venues, and critical infrastructure. Aligned with DHS/CISA site assessment methodology and NFPA 3000.
Plan and document vehicle/personnel checkpoints, entry control points (ECPs), and traffic control points (TCPs).
Set survey discipline, units, and position source for all tools
Import coordinates from any available positioning system — works GPS-denied
Closed or open traverse with sequential course entry, Bowditch compass-rule adjustment, and precision reporting per survey standards
Compute geoid undulation and combined scale factor at a station for precise ground-to-grid distance conversions
Determine unknown station coordinates from 3 known control monuments using observed horizontal angles — Tienstra method
Determine inaccessible point from two occupied stations using angles or distances
Forward and inverse geodetic computations between coordinate pairs
Reduce slope measurements to horizontal. Apply curvature and refraction corrections.
Record instrument observations — angles, distances, rod readings. Auto-captures device sensors for environmental conditions at time of observation.
Validate device positioning accuracy against a known control monument. Quantify systematic error for correction.
Auto-generated report of current survey session — discipline, method, precision, and adjusted coordinates
Pre-built tactical scenarios with time-based injects, fog of war, and scoring. Select a scenario to begin — injects auto-populate fires parameters.
FM 6-40 format CFF entry — system validates doctrinal correctness
Standard fire command elements — know which are standard (announced only when changed) vs. always announced
Systematic methodology to achieve desired effects. Goal: first-round FFE
D3A DECIDE phase: Identify targets that, if engaged, support the commander's intent. Build and prioritize the HPTL.
Maps HPTL targets to engagement criteria: when to engage, desired effect, preferred delivery system, and restrictions
Criteria for engaging each HPTL target category. Defines accuracy requirements, BDA criteria, and engagement authority.
Joint air operations planning cycle: D-2 planning, D-1 allocation, D-Day execution
Consolidated, prioritized target list integrating component nominations. Approved by JTCB for ATO inclusion.
ATO SPINS sections: ROE, safe passage, IFF, minimum release altitudes, restricted operations zones
Select fire mission type to see the execution path, coordination requirements, and timeline
Joint fire support effects differentiated by service, with weaponeering factors and required ammunition
Match target type to weapon-target pairing based on desired effect and lethality. Computes required rounds/sorties.
Live video feed between fire controllers, FDC, and pilots for positive identification (PID). Camera shares real-time visuals for target confirmation, fire adjustment, and CDE/NSL compliance. Danger close and no-strike targets auto-flagged from database. WebRTC peer-to-peer — no server recording.
Touch-to-designate: tap the video feed to mark a target. Both fire controller and FDC/pilot can place markers and must confirm (paired agreement) before the target is locked. FDC can also enter a grid manually when not viewing video.
After engagement, use the live camera to capture post-strike imagery. The FSCoord assesses damage from the same iPhone used for targeting — closing the D3A (Decide-Detect-Deliver-Assess) cycle without handing off to another system.
Decide → Detect → Deliver → Assess. Full cycle tracked per target. The FSCoord runs the entire cycle from this panel — all modules integrated.
Targets within danger-close range or on the NSL/RTL are auto-flagged in red on the video feed.
VTC communications security posture. Current status and government integration readiness plan.
No cell signal? The targeting workflow continues. Pre-loaded NSL/CDE databases, cached target lists, and local-only fire mission processing all work offline. When connectivity returns, queued data syncs automatically.
ATLAS VTC feeds targeting data into any fire control system for independent verification and execution. The iPhone is the forward sensor — the fire control system is the authoritative processor. Export target packages in standard formats for direct import.
5-level CDE process per CJCSI 3160.01. Determines collateral risk and mitigation measures.
Select a munition and place blast/fragmentation/debris rings on the map. Overlays are draggable — reposition to evaluate effects on different targets. Multiple overlays can be placed simultaneously.
Calculate CDE level for a proposed engagement. Per CJCSI 3160.01 / JP 3-60. Determines approval authority and required mitigations.
Precise target coordinate derivation and quality assessment. Per NGA standards, target coordinates must meet mensuration accuracy for PGM employment.
Assess hardened targets, underground facilities, and fortified positions. Weapon-target pairing for structure defeat. Per JP 3-60 / FM 3-09 / DTRA hardened target defeat guidance.
Process fire mission: chart data → site → QE → charge → firing data. Identical math to live mode — training adds step-by-step validation and scoring.
Probable error, 100% rectangle, and sheaf patterns
Non-standard conditions and their impact on fires
Gun laying & positioning procedural trainer
Rule-based AI engine — works offline/degraded. Analyzes target, range, available assets, and tactical constraints to recommend optimal fire support.
60mm / 81mm / 120mm mortar FDC — compute charge, elevation, TOF from position data
JP 3-09.3 / JFIRE format — standard close air support request. Type 1/2/3 control, risk estimate distances.
M270 MLRS (12 rockets / 2 missiles) and M142 HIMARS (6 rockets / 1 missile) fire mission processing. GPS-guided precision strike.
5"/54 Mk 45 Mod 4 (DDG Arleigh Burke class) — 20 rds/min, max range 24km (37km w/ ERG)
Counter-Rocket, Artillery, Mortar — Centurion LPWS autonomous engagement
Electronic warfare and cyberspace operations — deny, degrade, disrupt without physical destruction
Aircraft capabilities, munitions, loiter time, and danger close distances
Compute staggered fire commands for multi-unit TOT. All rounds impact simultaneously regardless of TOF differences.
Compute ILLUM round intervals for continuous battlefield illumination based on burn time and overlap.
Fire support planning capabilities by echelon level per FM 3-09
FM 3-09 massing methods: converging sheaf, series, group, program, preparation fires, FPF
Build numbered target lists, assign assets, set timing, compute ammo expenditure, and generate FSEM
Generate Fire Support Execution Matrix from current fire plan. Shows targets, assets, timing, and ammo expenditure forecast.
Ammunition expenditure summary by unit based on current fire plan
Dynamic airspace coordination, FSCM enforcement, engagement timeline, and deconfliction matrix
Define airspace control measures: ROZ, WFZ, HIDACZ, ACA, LLTR, SAAFR, UAV orbit areas. Altitude/lateral separation and CAS deconfliction.
Real-time status of all fire support coordination measures and airspace control measures. Auto-deconfliction checks every fire mission against these measures.
Pre-built standard coordination measures per FM 3-09 / ATP 3-09.32. Select a template to pre-fill the FIELD tab FSCM builder.
Manual deconfliction check. Fire plan targets and CFF submissions are now auto-checked against all active FSCMs.
Compare max ordinate of surface fires vs aircraft altitude blocks. GTL buffer and MSD from trajectories.
Visual timeline with time bars for all planned fires. Conflict detection for overlapping fires in same airspace/target area.
Holding area to IP to target to egress with surface fire coordination windows
Time-space grid showing asset ownership by block. Kill box management (open/close for surface vs air). JEZ for air defense. Color-coded: red=conflict, green=clear, yellow=coordinated.
FM 2-22.3 intelligence reporting. Enter HUMINT, SIGINT, IMINT, MASINT, OSINT reports with source reliability and information confidence ratings.
PIR/CCIR/IR management. Link information requirements to NAIs/TAIs and assign ISR assets for collection.
Multiple INT sources confirming same target increase confidence. Staleness tracking based on target type mobility.
Track activity windows, movement patterns, and associated entities for pattern analysis
Order of Battle tracker: enemy unit identification, composition, strength, equipment, and disposition
Known threat systems with range capabilities for threat range fan generation
Track radar/radio emitters, build Electronic Order of Battle (EOB), SIGINT tasking, DF triangulation, signal analysis
PRF decoder, scan pattern identification, waveform classification for threat radar identification
EA (Electronic Attack) jamming planner, EP (Electronic Protection), ES (Electronic Support), EW synchronization matrix
Offensive Cyber Operations (OCO), cyber target types, cyber-kinetic integration, CEMA synchronization matrix
UAS asset manager, mission planning, UAS-fires integration, armed UAS weapon loads, status board
Threat UAS classification, C-UAS engagement matrix, layered defense (detect-track-identify-engage-assess), SHORAD integration, EW defeat
Suppression/Destruction of Enemy Air Defenses. IADS modeling, SEAD asset matching, timing coordination with CAS/strike
Space domain awareness, space-based ISR tasking, GPS/PNT contested operations, SATCOM management, ASAT threat modeling, space weather effects. Integrates with USSPACECOM / Space Deltas.
Monitor GPS constellation health, detect jamming/spoofing, manage alternate PNT sources. Ref: JP 3-14, USSF PNT Enterprise.
SHIELD/ATLAS provides GPS-denied navigation capability for maritime vessels AND land vehicles. When GPS is jammed or spoofed (Baltic Sea, Black Sea, Middle East, contested littorals), this tool assesses operational impact and activates alternate PNT sources. Ships don't have to revert to paper charts. Convoys don't have to stop. Ref: JP 3-14, USSF PNT Enterprise, IMO Resolution A.1046(27).
Adversary GPS/GNSS denial systems with known capabilities, effective ranges, and countermeasures. Intelligence-grade reference for operational planning.
Model adversary counter-space capabilities per DIA Space Threat Assessment. DA-ASAT, co-orbital, directed energy, cyber, EW.
Solar/geomagnetic effects on comms, PNT, ISR. Ref: NOAA SWPC, 557th Weather Wing.
Full-spectrum cyberspace operations: OCO, DCO, DODIN Ops. Cyber key terrain, network topology, cyber mission force integration, CESO matrix.
Critical network nodes whose loss would degrade mission capability. Map friendly and enemy CKT for offensive/defensive planning.
Synchronized non-kinetic effects across cyber, EW, and space domains. Cross-domain fire support coordination per CEMA framework.
SIPR/NIPR/JWICS classification handling, NATO STANAG compliance, national/coalition C2 system interfaces, data format standards. Ready for ATO/plug-and-play with AFATDS, GCCS-J, JADOCS, TBMCS.
Data exchange format compatibility for plug-and-play integration with national, NATO, and state emergency management systems.
RMF/ATO, FedRAMP, STIG, IL2-IL6 readiness posture for deployment on DOD/federal/state networks.
Red team self-assessment: identifies gaps, shortcomings, barriers, and mitigations across the platform. Run before any proposal submission or contract review.
JP 3-60 / FM 6-0 3-phase BDA linked to JIPTL targets. Phase 1: Physical Damage (within 15 min), Phase 2: Functional Damage (within 2 hr), Phase 3: Target System Assessment (restrike). Drives reattack recommendations via D3A cycle.
Automatic reattack criteria evaluation per JP 3-60 with escalation logic. 6-tier weapon escalation chain: Mortar -> FA (HE/Excalibur/DPICM) -> GMLRS -> CAS (JDAM/LGB/Hellfire) -> ATACMS/PrSM -> TLAM. Considers post-strike activity, confidence level, weather, and collateral damage constraints.
Track ASR (Available Supply Rate), CSR (Controlled Supply Rate), RSR (Required Supply Rate) by unit. Color-coded readiness: GREEN >75%, AMBER 50-75%, RED <50%, BLACK <25% (combat ineffective). EFC (Equivalent Full Charge) tube wear tracking.
AN/TPQ-36, AN/TPQ-37, AN/TPQ-53 — Detect incoming rounds, compute POO (Point of Origin) and POI (Point of Impact) via trajectory extrapolation. FM 3-09.12 Counter-Fire procedures.
Back-plot hostile fire origin from crater/shell-hole examination. FM 6-40 Appendix G crater analysis procedure. Determine direction and range to enemy firing position.
Theater-wide missile defense posture per FM 3-01. THAAD, Patriot, AEGIS battery status, radar health, interceptor inventory, and operational readiness. IAMD architecture visualization for CCMD/JTF staff.
Track management, engagement zones, threat identification for SHORAD/HIMAD systems. IFF processing, engagement authority, weapons-free/tight/hold status. FM 3-01 Air and Missile Defense Operations.
Reverse-trajectory computation from known impact point. Given POI and observed parameters, back-compute probable firing position. Supports mortar, cannon, and rocket threats. Uses standard ballistic trajectory physics.
Multi-radar track correlation. Fuse data from counter-fire, air defense, and EW sensors. Composite common operating picture for fires and AD. Cross-cues between systems.
Doctrinal performance analysis with error logging per JP 3-09, JP 3-60, FM 6-40. Export full AAR for external review.
Track all fire missions executed. Persists across sessions via localStorage.
Record fires deconfliction actions across FSCM, airspace, and maneuver boundaries. localStorage persistent.
Fire support coordination measures — types, purposes, and establishment authority per FM 3-09 / JP 3-09
Who can approve fires by target category, collateral concern level, and echelon. Per JP 3-60, CJCSI 3160.01
Validation evidence for procurement officers. All data is live — no simulated metrics. Export as PDF-ready documentation.
GPS-denied navigation accuracy from ground-truth comparison logs. Data populates when PATHFINDER navigation is used on the SHIELD mobile app with GPS available for comparison.
Community threat reporting signal-to-noise metrics.
Live verification of federal data source connections. Pings real endpoints and measures response time.
Real measured performance timings for key platform operations. All values are live measurements from this session — no simulated data.
Every exported report carries metadata proving origin.
Train as we fight. All 7 Warfighting Functions, Mission Command (ADP 6-0), MDMP, TLPs, Joint Operations, Task Organization, and CTC rotation management. Supports NTC, JRTC, CMTC, and live OCONUS/CONUS operations.
Status board for all 7 WfF. Each function links to its dedicated ATLAS module. Click to expand running estimate.
Commander's intent, mission orders, running estimates, and decision support.
FM 6-0 / ADP 5-0. Track each step through the planning process.
Step-by-step METT-TC walkthrough per FM 6-0. Complete each factor for thorough mission analysis.
Generate a formatted 5-paragraph operations order. Fields auto-populate from Mission Command and METT-TC data.
Rapid changes to existing OPORD. Use when time is critical and full OPORD revision is not feasible.
Structured battle update for command post briefings. Tracks mission status changes.
Company-level and below. FM 6-0.
Build and track task organization from division to team level.
Joint force structure, component commands, and joint functions.
Synchronize WfF activities across phases of the operation.
Staff running estimates by WfF per FM 6-0. Track key facts, assumptions, and recommendations.
Log key events, phase transitions, reports, and significant activities.
Track unit proficiency on mission essential tasks per FM 7-0.
Structured post-incident analysis. Captures sustains, improves, action items, and lessons learned with timeline references from the event log.
What was the event supposed to accomplish?
Events from the current session log that relate to this AAR.
Post-incident behavioral health protocol. ICISF-aligned CISM interventions for first responders, staff, and affected community members.
Rapid structured debrief immediately following an event. Captures first impressions before formal AAR.
Track improvement actions from AARs through completion. Assigns owners, due dates, and status.
Document corrective actions for deficiencies identified during exercises, incidents, or audits.
One-click AAR generation from exercise injects, event logs, and team data. Automatically calculates response times, performance metrics, and categorizes sustains/improves.
CFIR-based organizational readiness evaluation. Assess whether your agency, district, or unit is prepared for SHIELD deployment. Based on the Consolidated Framework for Implementation Research (CFIR 2.0).
Rate each factor on a 1-5 scale. These map to CFIR 2.0 constructs that predict deployment success or failure.
Rate operational capability across the 4 specialized domains. These feed into gap analysis and the aggregated readiness dashboard.
Aggregated scores across all 9 assessment domains. Green = GO (70%+), Amber = CAUTION (40-69%), Red = NO-GO (<40%).
Compare current capability ratings against requirements for each mission type. Identifies specific gaps and generates prioritized remediation actions.
Modules visited by the operator. Training completion feeds into readiness scoring. Visit modules to mark them complete.
Evaluate organizational readiness for active threat / mass casualty events. Weighted scoring across 5 domains aligned with NFPA 3000, FEMA IS-907, and DHS best practices.
Federal law enforcement, intelligence community, and homeland security system integration. Covers DEA, FBI, DHS, CIA, FEMA, ATF, USMS, and state/local fusion centers. Data standards: NIEM, LEA, CJIS, HSIN.
Track liaison officer assignments and agency connectivity status.
Systems of record used by joint agencies. Understanding these is critical for data interoperability and deconfliction.
Track information sharing with state/regional fusion centers and Joint Terrorism Task Forces.
Operational deconfliction with other agencies. Prevents blue-on-blue and ensures no operation compromises another agency's ongoing investigation or mission.
Track Memoranda of Understanding, mutual aid agreements, and task force agreements with partner agencies.
Build a unified command structure with multi-agency representation per NIMS/ICS.
Emergency Support Functions — Federal response framework (NRF).
Track mission assignments (MAs) issued under Stafford Act or mutual aid.
Track resource requests (RRF) across agencies per NIMS resource typing.
Cross-platform collaboration hub connecting SHIELD/ATLAS with the ThriveUp 24-platform ecosystem, governed by AGOS (Adaptive Governance Operating System). AGOS provides AI-driven directive management, fidelity scoring, cognitive performance tracking, self-healing instructions, and cross-platform orchestration. Share risk assessments, safety analytics, resilience scores, and threat alerts with partner platforms. Receive community health data, crisis alerts, incident reports, and screening data. AGOS is the governance brain; SHIELD/ATLAS is the operational body. Force multipliers. Grant-aligned: SSG-FOX, DFC, SAMHSA.
DIME framework analysis, PMESII-PT operational environment assessment, non-lethal fire planning, information operations, psychological operations (MISO), civil affairs, and CMOC/NGO coordination. Per JP 3-0, JP 3-13, JP 3-57, FM 3-53, FM 3-57.
Instruments of National Power: Diplomatic, Information, Military, Economic. Evaluate which instruments are appropriate for each objective. Per JP 1 / JP 3-0.
Operational Environment assessment: Political, Military, Economic, Social, Information, Infrastructure, Physical Environment, Time. Per JP 2-01.3 / ATP 2-01.3.
Plan and synchronize non-lethal effects: MISO (Military Information Support Operations), civil affairs, public affairs, CMOC, KLE (Key Leader Engagement), and NGO coordination. Per JP 3-13 / FM 3-53 / FM 3-57.
Civil-Military Operations Center tracking, humanitarian assistance coordination, Key Leader Engagements, and NGO deconfliction. Per FM 3-57.
Military Information Support Operations planning: Target Audience Analysis (TAA), product development, dissemination planning, and MOE/MOP tracking. Per FM 3-53.
Compare up to 4 courses of action across weighted criteria. localStorage persistent. Per JP 5-0, FM 6-0.
Plan and synchronize lethal and non-lethal effects across operational phases. localStorage persistent.
Quick-apply optimized settings for common field scenarios
Record field observations with timestamps, locations, and capture references
Day-after-tomorrow continuity planning: operational checklists, transition planning (JP 5-0), sustainment decision support, continuous improvement tracking, and proactive threat anticipation. All data persists locally.
20 critical items across 5 domains. Track completion for operational readiness.
Select current operational phase. View transition tasks for progressing to the next phase.
Resource tracker with days-of-supply calculator. Badges appear when any supply drops below 3 DOS.
Track observations, root causes, corrective actions. Export to CSV.
Federal Continuity Directive 1 (FCD-1) aligned. Essential function identification, delegation of authority, alternate facilities, vital records, activation checklists, reconstitution timeline, and devolution planning. All data persists locally.
Identify mission-critical vs support functions. Prioritize for continuity.
Minimum 3-deep succession for each key position per FCD-1.
Plan alternate facilities for continuity operations.
Identify and protect records essential to continuity and reconstitution.
Three-phase checklist: Activation & Relocation, Alternate Operations, Reconstitution.
Phased reconstitution plan template. Define milestones for return to normal operations.
Transfer of essential functions to alternate personnel/locations if primary and alternates are unavailable.
72-hour lookahead. Color-coded risk matrix (Likelihood x Impact).
Worldwide air, maritime, and ground traffic awareness. Live aircraft tracking (OpenSky Network), NOAA port conditions & shipping lanes, traffic incident monitoring, airport delay status (FAA). Civilian and military modes with separate classification. All layers overlay on the GIS map for integrated disaster planning and response coordination.
Real-time ADS-B aircraft positions worldwide. Toggle the Air Traffic layer on the map, then use Refresh All to load live data. Military callsign classification available in defense mode. Emergency squawk codes (7500/7600/7700) automatically highlighted.
NOAA CO-OPS real-time tide, wind, and temperature data from 21 major US ports. 13 global shipping lanes including critical chokepoints (Hormuz, Malacca, Suez, Taiwan Strait, Bab el-Mandeb). Port operability assessment based on wind speed and water level anomalies.
Track road closures, flooding, debris, evacuation routes, contraflow lanes, and hazmat incidents. Report new incidents with location and severity. All incidents persist locally and render on the GIS map.
Runway status management, NOTAM integration, ARFF pre-positioning, go-around monitoring, runway conflict detection, and FAA Part 139 Airport Emergency Plan activation.
Flag potential runway incursion scenarios by cross-referencing active runway assignments with taxiway positions.
Calculate recommended ARFF vehicle positioning and response time estimates based on aircraft mix and weather.
FAA Part 139 emergency plan activation and management with multi-agency notification.
Hazmat consist tracking, grade crossing risk scoring, PTC coverage analysis, derailment impact modeling, and FRA inspection integration for rail safety operations.
Composite risk score based on traffic volume, train frequency, sight distance, and warning devices.
Positive Train Control coverage by track segment. FRA-mandated for Class I railroads carrying passengers or TIH materials.
Model evacuation zones and affected populations for potential derailment scenarios.
Track deficiency data by segment with severity ratings from FRA inspection records.
Vision Zero crash analysis, wrong-way driver detection, work zone safety, bridge vulnerability scoring, and dynamic evacuation corridor management.
Log crash data, identify patterns, and receive evidence-based countermeasure recommendations.
Vessel-to-infrastructure alerting, under-keel clearance monitoring, port cybersecurity (MTSA), supply chain chokepoint modeling, and vessel anomaly detection rules.
Report vessel anomalies and auto-alert bridge, tunnel, and port operators.
Configure detection rules for AIS gaps, speed deviations, and route anomalies.
PHMSA incident tracking, SCADA anomaly monitoring, evacuation zone calculation, transportation crossing impact modeling, and pipeline incident logging.
Pipeline incidents by state and product type from PHMSA data with proximity alerting.
Monitor pipeline SCADA systems for pressure, flow rate, and temperature anomalies with cyber threat correlation.
When a pipeline incident occurs, identify affected road, rail, and waterway crossings with closure recommendations.
Submit and track damage assessments by county and state. Categories: infrastructure, utilities, housing, medical, environmental, transportation, communications, agriculture. Severity levels: minor, moderate, major, catastrophic. Assessments map to GIS for visualization and feed into FEMA coordination. Export as CSV for official reporting.
Request and coordinate mutual aid resources across counties and states. 15 resource types (personnel, medical supplies, food/water, shelter, generators, heavy equipment, SAR, hazmat, comms, transport, fuel, sanitation, debris removal, security, mental health). Urgency levels: immediate (life safety), urgent (24-48h), priority (3-7d), routine (1-4wk). Links to damage assessments for coordinated response. FEMA/EMAC integration framework.
Cross-jurisdiction resource exchange marketplace. Post available resources or search for needed resources across EMAC (Emergency Management Assistance Compact) member jurisdictions. Supports interstate mutual aid agreements and automatic cost-tracking for FEMA reimbursement.
Local response first. Recovery timeline, shelter finder (FEMA NSS), community reunification, FEMA/SBA/insurance guidance, state EMA directory (all 56 jurisdictions), cross-jurisdiction mutual aid (EMAC), and 2-1-1 local resources. All data persists offline.
Track costs by FEMA Category A-G for Public Assistance eligibility
Camp operations safety (ACA 300+ standards), watercraft & aquatics safety (float plans, swim zones, weather-to-water matrix), RV/trailer safety (severe weather sheltering, evacuation, propane/CO), communication redundancy planner, night operations, lightning & heat protocols. Local response first.
Route tracking, SOS alerts, and location sharing with trusted contacts. Uses device GPS for real-time position monitoring during walks, runs, or field operations.
Sends your GPS location via share sheet and triggers platform alerts
Real-time air quality monitoring for wildfire smoke. Uses EPA AirNow data to provide AQI readings, health recommendations, and mask/shelter guidance for affected communities.
Set an AQI threshold. When a checked value exceeds this, a warning will display.
State Department travel advisory levels, embassy locations, threat assessments, and risk profiles for international travel. Uses official US government travel advisory data.
Crowd density assessment, evacuation time estimation, medical staging requirements, and NFPA 3000 compliance checking for mass gatherings and large events.
Missing persons registry, shelter check-in/check-out, and family reunification tracking for disaster response. Integrates with EMS patient data and ALERT broadcasts.
Build tabletop exercises (TTX), generate MSEL injects, and run scenario simulations. All exercise data is sandboxed separately from live operations. Supports HSEEP-compliant exercise design.
Track exercise elapsed time. Use STARTEX/ENDEX to control exercise flow.
Community reporting portal, volunteer coordination, and neighborhood outreach. Submit hazard reports, infrastructure concerns, and community needs directly to emergency management.
Search military doctrine (FM, ATP, JP), emergency management standards (NIMS, CPG, NFPA), and NATO STANAGs. Quick reference for procedures, formats, and standards.
Pre-event threat assessment (elevated positions, sight lines, choke points), crowd science & crush prevention, medical pre-staging calculator, mass casualty reunification at scale, venue-specific evacuation modeling. Standards: NFPA 3000, CISA, FEMA IS-15, DHS PSA, IAVM. Route 91 lessons learned.
Advance team planning engine, route analysis (PACE: Primary/Alternate/Contingency/Emergency), kill zone & ballistic threat mapping, counter-surveillance detection, medical contingency pre-staging, protective intelligence assessment (USSS/NTAC methodology), code word system, crowd screening decision matrix.
Data classification engine (Unclass through TS/SCI), information leakage prevention, SCIF compliance (ICD 705), device detection protocols (RF/NLJD/thermal/magnetic), TSCM scheduling, PED policy, insider threat indicators (NITTF), spillage response, OPSEC 5-step process, foreign travel briefs, accreditation tracking.
Anonymous behavioral concern reporting, epidemiology-based pattern clustering, escalation thresholds aligned with DHS TVTP frameworks. No PII collected — signals only.
Epidemiology-based spatial-temporal clustering. Clusters form when 3+ signals converge within the same category and geographic area within a 14-day window.
| Level | Trigger Criteria | Response | Status |
|---|---|---|---|
| WATCH | 3+ signals, same category, 14-day window | Pattern flagged for awareness | -- |
| ADVISORY | 5+ signals, 2+ categories, geographic convergence | Community resource allocation review | -- |
| ALERT | 8+ signals, 3+ categories, escalating severity | Professional intervention recommended | -- |
| CRITICAL | 12+ signals, rapid acceleration, high severity cluster | Immediate multi-agency coordination | -- |
Structured assessment based on USSS National Threat Assessment Center research. Focus on behaviors and communications, not demographics or profiles. This tool supports multidisciplinary threat assessment teams.
Full 18-indicator checklist based on USSS National Threat Assessment Center research (2019-2024). Track observed behaviors for multidisciplinary threat assessment teams. Persisted locally.
Structured decision framework: when to report to law enforcement, when to monitor, when to refer to mental health resources. Based on DHS/CISA guidance.
Composite resilience score based on signal patterns, concern clustering, community resource availability, and response capacity. Higher = more resilient community.
Text-based heat map showing concern category density across reported locations. Darker shading = higher signal concentration.
DHS Targeted Violence and Terrorism Prevention resources for community-based prevention practitioners.
DHS national public awareness campaign integration. SENTINEL signals feed into your local prevention ecosystem while maintaining the national reporting framework.
Aggregates 22+ open sources: live news (GDACS, ReliefWeb, AP News, FEMA), Reddit communities (r/news, r/worldnews, r/BreakingNews, r/TropicalWeather, r/Earthquakes, r/CyberSecurity, r/EmergencyManagement, r/Military, regional subs), Defence.Media Telegram (global defence & geopolitics OSINT), NWS weather alerts, USGS earthquakes, NASA FIRMS fires, and CISA KEV cyber threats. Searchable unified threat timeline with auto-categorization.
Community mentorship and identity stabilization pathways. Integrated with local service providers for warm handoffs. Aligned with DHS prevention-through-connection frameworks.
SHIELD Readiness Score calculation, physical/cyber security assessment, COOP planning, first responder capability mapping. Aligned with CISA SLCGP, DHS HSGP/SHSP, UASI, and EMPG grant frameworks.
CISA-defined 16 critical infrastructure sectors. Click a sector to view hardening checklist, vulnerability templates, and incident response playbooks.
Evaluate supply chain vulnerabilities across critical infrastructure dependencies.
Critical infrastructure cascading dependency analysis. Shows how sector failures propagate across interconnected systems.
Weighted readiness score across all assessed sectors.
Based on current readiness score and assessment results, these are the grant programs your jurisdiction may be eligible for.
Municipal emergency management dashboard. Real-time NTAS threat feed, mass notification management, drill scheduling, incident heat mapping, and grant compliance tracking.
30-day incident density by type and location. Click regions to drill down.
Track compliance requirements across active homeland security grants.
Emergency Operations Center activation tracking per NIMS/ICS standards. Track staffing, activation triggers, and operational status.
Track shelter capacity, occupancy, supply levels, and operational status across the jurisdiction.
Define and manage evacuation routes with population density considerations, traffic control points, and alternate routing.
Track mutual aid agreements with neighboring jurisdictions. Monitor resource availability, activation status, and compact terms (EMAC, intrastate, bilateral).
Manage pre-designated resource staging areas (RSAs) for incident support. Track equipment, personnel, and supply pre-positioning.
AI-powered municipal emergency management dashboard. Enter any US city to generate a comprehensive emergency profile with real federal data (Census, FEMA, NOAA, EPA). Supports proactive planning, exercise design, multi-jurisdiction coordination, and grant procurement. NIMS/ICS compliant. ESF-aligned. THIRA/SPR exportable.
FEMA NRI hazard risk data, active NWS alerts, and historical disaster declarations for this jurisdiction. Auto-generates hazard-specific preparedness recommendations.
Census ACS data with Access & Functional Needs (AFN) indicators. Social Vulnerability Index composite. Identifies populations requiring targeted planning: elderly, children, disabled, limited English proficiency, no-vehicle households, below poverty line.
Emergency response resources from parent state profile, scaled to local jurisdiction. Includes hospitals, fire/EMS, law enforcement, shelters, and critical infrastructure.
Live weather, air quality, and active federal declarations. Auto-refreshes.
Interoperability, mutual aid, and cross-agency coordination. Links city to county, state, FEMA region, and neighboring jurisdictions. Tracks shared resources, data sharing agreements, and NIMS compliance.
Track resources available for mutual aid sharing or resources needed from partner jurisdictions.
Auto-populated EOP template based on this jurisdiction's hazard profile, resources, and demographics. NIMS/ICS compliant. Sections align with CPG 101 v3 (Comprehensive Preparedness Guide). Editable for local customization.
Map the 15 Emergency Support Functions to your local responsible agencies.
Homeland Security Exercise and Evaluation Program (HSEEP) compliant exercise planning. Build exercises around your specific hazards and capabilities. Proactive readiness — not just reactive response.
Federal and state grant programs matched to this jurisdiction's profile. Eligibility scores based on population, hazard risk, and capabilities. Includes HMGP, EMPG, HSGP/SHSP, SLCGP, TVTP, C-UAS, AFG, SAFER, and more.
Export comprehensive reports for partner agencies, grant applications, and compliance. All data sourced from public federal APIs with full attribution. NIEM-aligned, ICS-compatible, ESF-structured.
Compare two saved city profiles side-by-side for mutual aid planning and resource sharing decisions.
Real-world emergency operations. EOC activation, resource requests, SITREPs, shelter management, damage assessment, mission tasking, and evacuation status. Train on this system, fight on this system.
Multi-domain status at a glance. Every domain GREEN/YELLOW/RED. Updated by operational actions. This is the single source of truth for commanders at all echelons — tactical, operational, and strategic.
ICS 205 — Radio channel assignments, talkgroup monitoring, interoperability channels, and AUXCOMM tracking. Know who is on what frequency at all times.
Track what every collaborating jurisdiction has available. Mutual aid partners, resource caches, supply depots, personnel rosters. Know what is available and where before you need it.
City → County → State → FEMA Region → Federal. Track status at each echelon. EMAC requests, federal declaration status, state EOC activation. Every level reports up and supports down.
Know the history before you plan the response. Every declared disaster, every dollar of damage, every recurring threat pattern. Jarrell TX 1997 F5, Wilmington NC hurricanes — history tells you what is coming. Each jurisdiction is its own implementation project.
How often each hazard type strikes. Recurrence interval shows average years between events — lower means more frequent.
Are disasters increasing? This shows declaration counts per decade to identify if the threat environment is worsening.
Chronological record of every federal disaster declaration. Click any event to see programs activated and funding details.
Where federal dollars went. PA funding by damage category shows what infrastructure keeps getting hit. Use this for mitigation planning and grant applications.
AI-generated analysis of historical patterns. Identifies recurring vulnerabilities, damage-prone infrastructure categories, and recommended mitigation strategies based on actual disaster history.
Add local knowledge that data cannot capture — flood-prone intersections, tornado alleys, areas that always lose power, neighborhoods that refuse to evacuate. This is institutional memory.
Running operational log. Every entry timestamped. Tracks the incident from activation through demobilization. ICS-209 compatible.
Formal resource requests to mutual aid partners and higher echelons. Track request, approval, deployment, and demobilization. Every request logged with DTG and requesting authority.
Assign missions to agencies and personnel. Track status from assignment through completion. Links to ICS 204 (Assignment List).
Track shelter activation, capacity, and current population. ARC/FEMA compliant. Feeds into ESF-6 (Mass Care) reporting.
Initial Damage Assessment (IDA) and Preliminary Damage Assessment (PDA). Feeds into FEMA PA/IA declarations. Track structures assessed, damage levels, and estimated costs for federal threshold analysis.
Track evacuation routes, traffic control points, and contraflow status. Feeds into ESF-1 (Transportation) operations.
When cell towers are down, GPS is denied, and infrastructure is gone — this module keeps you operational. Bluetooth mesh messaging, offline cached data, store-and-forward queue, GPS-denied positioning, and manual grid reference. Making the difficult easy and accessible.
Device-to-device communication when cell towers are down. Each phone becomes a node — messages relay through the mesh. Range: 30-100m per hop. Chrome/Edge required.
Messages queue when offline, auto-transmit when any connection returns. Priority-based — FLASH messages transmit first. Works across Bluetooth, WiFi, and cellular.
When GPS is jammed, spoofed, or unavailable. Last known position with drift estimation, manual MGRS/UTM grid entry, dead reckoning from device sensors. Always know where you are.
Pre-cache critical data for offline operations. City profiles, historical intel, SOPs, resource lists, and map tiles. Everything you need when the network is gone.
First responder orientation, community resource mapping, mutual aid networks, and coordination tools for all 50 US states + DC + territories. Built for planners, first responders, and emergency managers responding to or coordinating in unfamiliar jurisdictions.
Emergency Support Functions (ESF), NIMS resource typing, and inter-state coordination tools.
Side-by-side comparison of two states for planning and mutual aid coordination.
Purpose-built for unrestricted military operations. No commercial AI dependencies. No content policy restrictions. Full capability retained without connectivity. Continuous learning builds knowledge from every query. All recommendations require human-in-the-loop validation.
Analyze terrain using OAKOC framework: Observation/Fields of Fire, Avenues of Approach, Key Terrain, Obstacles, Cover/Concealment.
Assess below-threshold aggression across DIME vectors. Maps hybrid threats, proxy operations, CI vulnerabilities, and influence campaigns. Cross-references BASTION, CONSUL, CYBER, and Effects modules.
Rate observed activity level per DIME vector (0=None, 1=Low, 2=Moderate, 3=High, 4=Escalatory):
Evaluate operational risk across multiple categories with weighted scoring. Generates composite risk level.
Compare up to 4 courses of action with weighted evaluation criteria. Scores calculate automatically.
Rate each COA on each criterion (1=Poor, 5=Excellent). Weight = importance (1-3).
| Criterion | Wt | C1 | C2 | C3 | C4 |
|---|---|---|---|---|---|
| Mass at Decisive Point | |||||
| Simplicity | |||||
| Surprise/Tempo | |||||
| Security/Force Protection | |||||
| Flexibility | |||||
| Sustainment Feasibility | |||||
| Risk to Mission | |||||
| Risk to Force |
Generate a structured threat assessment document. Select threat type and fill in known intelligence.
Step-by-step METT-TC walkthrough. Complete each factor for comprehensive mission analysis.
Describe your operational scenario and constraints. ODIN analyzes the situation and recommends tactical approaches across conventional doctrine, unconventional methods, and practical solutions that work with proper planning, coordination, and available assets. Think conventionally. Think unconventionally. Think about what works.
Browse proven tactical patterns. Select a pattern to see details, requirements, and cross-module links.
ODIN ADVISORY ONLY — All lethal recommendations require commander approval. AI augments human decision-making; it does not replace it. Per DoD Directive 3000.09, autonomous weapon systems require appropriate levels of human judgment.
Multi-domain submarine detection: acoustic, thermal, magnetic, chemical, biological, hydrodynamic, electromagnetic, gravimetric. All signature types processed for maximum detection probability.
Deploy sonobuoys in tactical patterns. Click map to place, or use auto-pattern generator.
Track and classify underwater contacts. AI assigns confidence scores based on multi-signature analysis.
Analyze contacts across 10 detection domains. Each signature type contributes to composite classification confidence.
Known acoustic and multi-domain signatures by submarine class. Searchable reference database.
Sound velocity profile, convergence zone estimation, and detection range prediction based on ocean conditions.
Reactor coolant discharge modeling. Nuclear submarines emit thermal plumes detectable by IR sensors and underwater thermistors.
Track contact bearing over time for target motion analysis (TMA). Used for passive ranging and course estimation.
Calculate torpedo engagement parameters including gyro angle, run time, and probability of hit.
Plan naval gunfire missions for shore bombardment and fire support.
Prioritized target list with engagement tracking.
Track post-engagement BDA with damage categories.
Fire Support Coordination Measures for maritime operations.
Mine Countermeasures coordination with autonomous underwater/surface vehicles. Import MCM survey data, mine detection positions, and clearance lane progress from REMUS UUVs and ROMULUS USVs.
Common Operating Picture fusing acoustic, AIS, radar, satellite, MAD, ESM/ELINT, thermal, and logistics intelligence into unified maritime domain awareness.
Automatic Identification System vessel traffic. Monitors commercial and military surface traffic for correlation with subsurface contacts.
Real-time monitoring of known submarine bases worldwide. Track port activity, deployment patterns, and maintenance cycles.
AI correlates contacts across all sensor domains. Identifies when AIS tracks disappear near acoustic contacts or submarine base activity.
Given last known position, course, and speed — generate probability cones for 1h, 4h, 12h, 24h future positions.
Track submarine tenders, support vessels, and resupply patterns. Nuclear subs resupply every ~90 days. Crew rotation and maintenance schedules reveal deployment windows.
Estimated global submarine positions. Blue = Friendly, Red = Hostile, Yellow = Unknown/Neutral.
Log and track vessel movements with position, course, and speed data.
Plan patrol routes with search patterns and timing.
MTSA/ISPS-aligned port security assessment checklist.
Sea state, wind, visibility conditions for maritime ops planning.
AI-driven ASW tactical advisor. Recommends search patterns, sensor placement, engagement options, and probability of detection based on environmental conditions and threat assessment.
Generate optimized search patterns based on datum, target characteristics, and available assets.
Threat assessment, ROE verification, weapon selection, and engagement recommendation. All recommendations require human-in-the-loop approval.
Calculate cumulative Pd based on sensor type, environmental conditions, target characteristics, and search effort.
Prioritized threat ranking combining all intelligence: acoustic classification, behavioral indicators, logistics patterns, and environmental context.
Deep-water sound channel creates convergence zones at predictable ranges. CZ ranges depend on water depth and sound velocity profile.
Calculate weapon engagement zones for air/missile threats.
Manage air/missile threat tracks with ID and engagement status.
Optimize weapon-to-target assignments for engagement planning.
Track engagement timeline events for missile defense.
Current air defense posture and readiness status.
Command and control for UUVs, USVs, and maritime UAVs. Mission planning, swarm coordination, edge AI model deployment, and platform health monitoring.
Register and manage unmanned platforms. Each platform has unique ID, type, sensors, and operational status.
Define waypoints, search areas, and sensor employment for autonomous missions.
Coordinate multiple platforms as a distributed sensor network. AI dynamically repositions assets based on contact reports.
Deploy and update acoustic classification models to UUV platforms. Manage model versions and performance metrics.
Underwater communications constraints. ELF/VLF for deep subs, acoustic modems for UUVs, satellite when surfaced.
Calculate optimal sonobuoy deployment patterns for ASW.
Track and classify underwater contacts.
Log prosecution events from detection through engagement.
Assess ocean depth and bottom conditions for ASW.
Strategic maritime intelligence center. Global submarine order of battle, fleet comparison, deployment analysis, environmental intelligence, wargaming, and nuclear signature database.
Estimated submarine fleet strength by nation. Data from open-source intelligence and defense publications.
Side-by-side comparison of submarine fleets. Force structure, capabilities, and production trajectory.
Reactor types, thermal signatures, radiological markers, and magnetic profiles by submarine class. Every nuclear sub is detectable through multiple domains.
Ocean conditions affecting ASW operations. Real-time data from NOAA buoys and ocean models.
Set up red/blue ASW scenarios. Define forces, environment, and objectives. AI estimates engagement outcomes.
Structured post-exercise or post-mission analysis. Captures timeline, findings, recommendations.
Organize task force composition with unit assignments.
Build operational tasking messages for fleet communications.
Manage fleet communication frequencies and circuits.
Track fleet supply status: fuel, ordnance, provisions.
Operational awareness of space-based assets, GPS constellation health, and space weather impacts on ground operations. Not full orbital mechanics — focused on what ground commanders need to know.
Report GPS interference zones. Cross-references with SPECTRUM/EMSO module emitter data.
Track relevant satellite passes over the area of operations. Know when you might be observed.
Solar activity and geomagnetic conditions affecting communications, GPS, and radar. Data from NOAA Space Weather Prediction Center.
Position, Navigation, and Timing backup systems available if GPS is degraded or denied.
Track significant space events: launches, ASAT tests, debris events, satellite maneuvers.
Know how they fight AND why they fight. C2 systems, cultural intelligence, behavioral patterns, asymmetric warfare doctrine, and campaign failure analysis. Understanding the enemy's equipment without understanding their people is what got us Vietnam, Afghanistan, Iraq, Libya, and Syria.
OSINT-sourced catalog of adversary command and control platforms. Pre-loaded with known systems.
Plot identified adversary C2 node locations on the map from SIGINT, HUMINT, or OSINT.
Track adversary C2 activity indicators: increased comms, node movements, frequency changes, or silence (possible imminent action).
Side-by-side friendly vs. adversary C2 capability assessment.
| Capability | Blue (ATLAS/ODIN) | Red (Svod/Equiv) |
|---|---|---|
| Decision Cycle | ODIN AI-augmented | AI-assisted (Svod) |
| Sensor-to-Shooter | Integrated (FIRES) | Automated (reported) |
| Comms Resilience | Multi-path / SATCOM | HF/VHF primary |
| EW Vulnerability | GPS-dependent | Freq-hop limited |
| Multi-Domain | 54-module integrated | Domain-stovepiped |
| Cyber Integration | CYBER module + CISA | GRU separate chain |
Adversary C2 doctrine patterns and decision-making characteristics from open-source analysis.
Understanding adversary culture, motivations, and behavioral patterns is the precondition for effective strategy. Systems and hardware analysis alone failed in Vietnam, Afghanistan, Iraq, Libya, and Syria. Know the people, not just the platforms.
Non-peer adversaries don't fight like near-peers. They exploit vulnerabilities conventional forces aren't trained to see. This section profiles asymmetric tactics, techniques, and procedures (TTPs) organized by warfare type.
Structured analysis of campaign failures caused by cultural and asymmetric blindness. Each case study identifies the specific failure to understand the adversary's way of war and the consequences.
Profile the human element: What motivates them to fight? How do they make decisions under pressure? What are their information sources? What would make them stop fighting?
Diplomatic Operations | Embassy Awareness | Strategic Synchronization
Implementation science meets operational planning. MOPs/MOEs, continuity checks, isolation testing, fidelity monitoring, scenario modeling, and cross-project intelligence.
Is the system being used as designed? Track implementation fidelity.
Is the system producing intended outcomes? Track operational impact.
Detect drift — gradual degradation of how the system is used vs. designed. Top reason deployments fail post-launch.
Test subsystems independently before integration. Prevent cascading failures where one error masks another.
What-if analysis: test coordination under degraded conditions (GPS denied, comms limited, partial visibility).
Track 7 relationship types: builds-on, validates, depends-on, informs, conflicts-with, replaces, extends.
Track deliverables within each deployment phase. Missed milestones propagate impact to connected projects.
Bridge military planning language and implementation science. Ensures cross-domain teams share common understanding.
Check deployment against CFIR (39 factors), RE-AIM (5 dimensions), and PAPERS criteria.
Searchable library of lessons learned. Prevent repeating mistakes across deployments.
CARVER: Criticality/Accessibility/Recuperability/Vulnerability/Effect/Recognizability. System-of-systems interdependency mapping for holistic operational assessment.
Score assets 1-5 on each CARVER factor. Higher total = higher priority for protection or targeting.
Map how ATLAS subsystems depend on and feed into each other. Identify single points of failure and critical paths.
NATO Standardization Agreements — ensure interoperability with coalition partners.
Automated checks on data completeness, logical consistency, and methodological rigor across all CONSUL modules.
Comprehensive country profiles: DIME assessment, military capabilities, alliances, trade, resources, supply chains, COG analysis, influence vectors, and asymmetric threats. Click any country for full-spectrum analysis.
Systematic COG analysis: identify the source of an adversary's power, their critical capabilities, requirements, and vulnerabilities, then map DIME response options.
Guided analysis tools: JIPOE, PMESII-PT, ASCOPE, COA Development, Influence Campaign Planner, Regional Escalation Modeler.
Side-by-side comparison of two nations across all DIME dimensions. Regional escalation modeling and what-if analysis.
First responder orientation, community resource mapping, mutual aid networks, and coordination tools for all 50 US states + DC + territories. Also available in the civilian AREA tab for non-defense users.
Emergency Support Functions (ESF), NIMS resource typing, and inter-state coordination tools.
Side-by-side comparison of two states for planning and mutual aid coordination.
Partner nation registry, burden-sharing tracker, communication matrix, ROE comparison, and STANAG reference library.
Compare national Rules of Engagement caveats side-by-side across coalition partners.
Key NATO Standardization Agreements for coalition interoperability.
Chemical, Biological, Radiological, and Nuclear threat tracking. Integrates EPA RadNet radiation monitoring, CTBTO International Monitoring System, IAEA ITDB proliferation data, and NNSA detection architecture. Critical for Iran nuclear material movement, radiological dispersal device (RDD) prevention, and WMD consequence management.
Real-time environmental radiation data from 140+ monitoring stations across all 50 states. Detects gamma radiation, gross beta, and airborne radioactive particles 24/7. Data from EPA Envirofacts API.
337 monitoring facilities across 89 countries detecting nuclear explosions worldwide. Radionuclide stations are the only technology that can confirm whether an explosion was nuclear.
Multi-layered defense-in-depth system detecting nuclear/radiological materials outside regulatory control. DHS CWMD + NNSA + CBP partnership.
Incident and Trafficking Database: 4,390 confirmed incidents since 1993 across 145 participating states. Tracks nuclear material smuggling, unauthorized possession, theft, and loss.
Open-source intelligence for nuclear facility monitoring using commercial satellite imagery, SIGINT, social media, and shipping data analysis.
Key state and non-state nuclear threats with current assessment.
Nothing happens in a silo. Every action — military, economic, environmental, political — creates secondary and tertiary effects that cascade across domains, regions, and timeframes. This tool maps the invisible connections, models cascade chains, and provides source-referenced intelligence for decision-makers. From Strait of Hormuz fertilizer disruptions to Volt Typhoon cyber pre-positioning, see how interconnected threats propagate worldwide.
Select a trigger event, configure parameters, and watch the cascade chain unfold across 10 interconnected domains with time-phased effects.
10 interconnected domains — select any to see how disruptions propagate to all connected domains.
Strategic chokepoints where disruptions have outsized global impact. Geographic, resource, financial, and cyber.
Credible sources referenced in cascade analysis. Each source is categorized and rated for reliability. Maintaining source attribution is critical for credibility with grant reviewers, policymakers, and military decision-makers.
Plot and track friendly unit positions with MIL-STD-2525 inspired symbols
Cost-avoidance calculator demonstrating SHIELD/ATLAS consolidation savings vs multi-vendor approach. Grant compliance dashboard tracking status against 11 federal grant programs. Auto-generated compliance narratives for BSIR, EMPG, HSGP investment justifications.
Compare the cost of procuring individual point solutions vs. SHIELD/ATLAS unified platform. Demonstrates TCO savings for grant reviewers and procurement officers.
Track compliance status against all federal grant programs. GREEN = fully compliant, AMBER = partially compliant (work in progress), RED = gap requiring development.
Auto-generate grant reporting documents from platform data. Templates pre-populated with SHIELD/ATLAS capabilities, metrics, and compliance evidence.
Track active grant applications, awards, and reporting deadlines.
Track critical supply chains (medical, fuel, food, water, PPE, communications equipment) with disruption modeling, vendor management, and inventory levels. Supports FEMA ESF-7 (Logistics) and ESF-11 (Agriculture/Natural Resources) reporting requirements.
Model supply chain disruptions by scenario. Calculates impact on population, estimated duration, and recommended mitigation actions.
Track critical supply chain vendors, contracts, and alternate sources.
Track current inventory levels against minimum thresholds. Supports SNS (Strategic National Stockpile) coordination and CHEMPACK tracking.
FEMA's whole-community approach requires planning for individuals with access and functional needs. Track AFN populations by category: mobility limitations, vision/hearing impairments, cognitive disabilities, medical device dependencies, language barriers, transportation-dependent, and institutionalized populations. Supports C-MIST framework (Communication, Medical, Independence, Supervision, Transportation).
Estimate AFN populations based on Census/ACS disability data and jurisdiction demographics. These estimates help size resource requirements for evacuation, shelter, and medical surge.
Communication, Medical, Independence, Supervision, Transportation — the 5 functional needs categories per FEMA guidance.
Voluntary registry of individuals with access and functional needs for emergency planning. No PII stored server-side — all data in browser localStorage.
Auto-calculated resource requirements based on registered AFN populations.
Universal municipal and county command center. Enter any US city, county, or ZIP code to generate a comprehensive operating dashboard pulling real data from Census Bureau, FBI NIBRS, DOT NHTSA, EPA, FEMA, BLS, HUD, FCC, and local open data portals. Covers public works, public safety, traffic, permits, budget, workforce, constituent services, governance, health, and community services. Integrates directly with SHIELD/ATLAS emergency response modules for seamless daily-ops-to-crisis transition.
Municipal water production, distribution, pressure monitoring, quality testing (EPA SDWIS), line break tracking, and meter operations.
Lift station status, treatment plant capacity, SSO (sanitary sewer overflow) tracking, collection system maintenance.
Functions specific to county government. Auto-populated when a county jurisdiction is queried or when city-county relationships are detected.
Interactive layered map of the entire jurisdiction. Toggle data layers to visualize crime, infrastructure, permits, 311 requests, traffic incidents, environmental hazards, schools, hospitals, fire stations, and more. All data geographically indexed.
Shows what data is available from public federal sources vs. what additional data becomes available when directly integrated with the city/county's own systems. This is both your current capability display and your sales tool.
How METRO data feeds directly into SHIELD/ATLAS emergency response modules when a crisis occurs.
574 federally recognized tribal nations. Emergency management for tribal lands involves unique sovereignty considerations, federal trust responsibilities, and specific FEMA tribal declarations authority (Sandy Recovery Improvement Act of 2013). Tribes can apply directly to FEMA for major disaster declarations.
5 permanently inhabited US territories with unique emergency management challenges: geographic isolation, limited federal resources, hurricane/typhoon/earthquake exposure, and complex jurisdictional relationships.
Your geospatial resilience platform. Real-time situational awareness across multiple domains, all in your browser.
ATLAS pulls real-time data automatically. No setup required.
Everyone on the network shares a synchronized common operating picture.
Specialized tools for complex operations. Explore at your own pace.
Start with the NAV tab to set your identity, then explore. You can re-open this guide anytime using the BRIEFING button at the bottom of the screen.