Get SHIELD/ATLAS Running in Under 2 Minutes
This is a 66-module dual-use national emergency management and defense C2 platform — shipping today. Click any button below to jump straight into a live page with real data. No login. No setup. Zero simulations.
Walk The Story — 12 Stages, 3 Minutes
Lane framing in one line: We are not Palantir or Maven. We live downstream of them, at the unit edge, where the action loop has to actually close.
A docent-narrated walkthrough of what the platform actually does, in the order an operator would experience it. Real citations. Real data. Real claims, no inflation. Autoplays at 18 seconds per stage; pause anytime.
We Are Not Competing With Palantir or Maven. We Are in Our Own Lane.
If you are about to evaluate this platform, the fastest way to save your time is to know what we are not. We are not another Palantir clone, not a Maven competitor, and not a copycat fusion vendor pitching the same enterprise data lake everyone else is pitching. Palantir Foundry / Gotham and Maven Smart System own the upstream enterprise warehouse and the J2-staff analytic workflow — and they do that work well. SHIELD/ATLAS lives downstream of them, at the unit edge, where the action loop has to actually close.
WHAT WE ARE NOT
- − Not an enterprise data warehouse
- − Not an FDE-driven, multi-million-dollar deployment program
- − Not a J2-staff analytic workbench
- − Not a competitor to anyone — we feed them and consume from them
- − Not a copycat fusion website
WHAT WE ARE
- + Unit-and-edge C2 / COP from a phone, no install
- + The action loop — CFF, 9-line, MIO, ICS — closed in code
- + $150/node distributed C-UAS, C-RAM, GPS-denied mesh
- + DDIL-native by design, not a fallback mode
- + MOSA — the government keeps the integration pattern
The honest one-liner
Palantir and Maven analyze. SHIELD/ATLAS analyzes for action at the unit edge and closes the loop to the next decision and the next system that has to execute it. We are additive to them, not adversarial.
Full positioning, including the 5 integration chains the event bus enforces, is on the Documents portal — see the Partner Overview and the Palantir/Maven positioning paper. Built by a retired 131A targeting officer; doctrine-matched (FM 6-40, JP 3-09.3, JP 3-85, MDMP, ICS).
REVIEWER DOCUMENTS PORTAL
Capability stories — one paragraph per feature, click to open the live page. Covers unit-to-unit lookup, COP, planning (MDMP/TLP), training, preparation, execution, logistics, maintenance, MTOE, kill web, and the full 66-module inventory. Plus capability statements, technical architecture, demo walkthrough, and pipeline documents.
WHAT IS SHIELD / ATLAS?
SHIELD — Personal Safety App
A mobile-first PWA for individual protection. Panic Button with auto-911 and GPS sharing. SafeWalk with fall detection. Hidden Bluetooth tracker detection (AirTags, Tile, BLE). Anonymous "See Something, Say Something" reporting. SmokeGuard fire alarm listener. NetGuard WiFi threat scanning. No account required. Works offline. Every citizen becomes a sensor feeding data into ATLAS.
ATLAS — 66-Module C2 Console
The command & control engine. 66 modules shipping today across 7 domains: Weather/Hazards, Search & Rescue, Public Safety, Transport, Medical, Defense (kill chains, fires, maritime, cyber, EW, space), and AI/Intelligence. Serves military (Army, SOCOM, Navy, USMC), federal agencies (DHS, FEMA, FBI, CISA), and state/local emergency management. 43 sensor types, 9 integration adapters (TAK, DCGS-MC, TITAN, AFATDS, DAF Battle Network, UDL, NGA, STIX/TAXII). DDIL-capable, zero-trust, CMMC L2.
How They Connect — One Codebase, Two Faces
SHIELD is the sensor in every pocket. ATLAS is the command console. A panic alert from a SHIELD user flows into the ATLAS event bus. A drone detected by an ATLAS operator pushes a warning to every SHIELD user in range. Citizen reports become intelligence. Intelligence becomes action. The same platform serves a 911 caller and a Joint Task Force commander.
OR JUMP IN — CLICK ANY BUTTON
Every button opens a live page with real data. Start with the map.
Real aircraft tracking + weather C-RAM DASHBOARD
Sensor fusion + kill chain DRONE INTEL
AI-gathered threat data
All 66 modules KILL WEB
Sensor-to-shooter flow CAPABILITIES
66-module overview DEFENSE BRIEF
JADC2 + cost analysis
Talk to it like a program manager. It speaks the way Dr. Flood speaks.
Start with LIVE MAP — you will see real aircraft moving on the map within seconds. Then explore from there.
GUIDED EVALUATION WALKTHROUGH
Follow these stops in order. Total time: 10–15 minutes. Each stop tells you exactly what to click and what to look for.
Common Operating Picture (COP)
How to get there: Click /cop or use the navigation bar at the top of any page.
What you see: A full-screen tactical map centered on the National Capital Region. Aircraft icons are moving — these are real ADS-B transponder signals from every aircraft in a 200km radius, updated every 10 seconds. This is not a replay. This is live.
What to do:
- Click any aircraft icon — a popup shows callsign, altitude, speed, heading, aircraft type, and origin/destination if available.
- Look at the three mode buttons in the top-right: ORGANIC (your local sensors only), WIFI (network data — ADS-B, weather, NOTAMs), TACTICAL (all overlays including sensor fusion and threat tracks). Toggle between them to see how the picture builds up.
- In WIFI or TACTICAL mode, look for NOTAM markers — orange/red/yellow triangles on the map showing active airspace restrictions from the FAA. Click one to see the restriction details, severity, and affected altitudes.
- If you see a colored circle around a NOTAM marker, that is a Temporary Flight Restriction (TFR) with a 5-nautical-mile radius.
C-RAM / Sensor Fusion Dashboard
How to get there: Click /cram. This is the primary tactical dashboard.
What you see: A dark operational display with six main panels — kill chain pipeline, sensor fusion tracks, RF spectrum waterfall, threat library, THREATCON status, and detection log.
What to do:
- Kill Chain Pipeline (top) — Shows the 6-stage process: Detect → Classify → Triangulate → Trajectory → Warning → Counter-Battery. When a sensor detects something, it flows left to right through these stages in real time.
- Sensor Fusion Tracks — The fusion engine runs every 3 seconds. It correlates acoustic + RF + ADS-B + visual detections using Bayesian track association. Each track shows confidence score, contributing sensors, and classification.
- Threat Library — Click to browse the built-in database of mortar, rocket, artillery, and drone acoustic/RF signatures. These are the reference patterns the system matches against live sensor data.
- THREATCON Indicator — Top-left shows GREEN/AMBER/RED. This updates automatically based on detected threats. An audio alert sounds on escalation.
UAS Threat Intelligence
How to get there: Click /drone-intel.
What you see: A dashboard showing real-world drone incidents previously gathered and stored in the database. The live OSINT fetcher is currently disabled (pay-per-use research APIs off per program directive 2026-04-23); records below are the cached corpus.
What to do:
- Browse the incident cards — each shows date, location, threat category, and AI-generated analysis with source citations.
- Look at the 5 threat categories: Military drone incidents, civilian airport disruptions, counter-drone technology developments, regulatory changes, and critical infrastructure threats.
- Notice the source links on each incident — you can click through to verify every claim. Nothing is fabricated.
Maritime Domain Awareness
How to get there: Click /maritime.
What you see: Maritime operational display with vessel tracking, port security, and coastal monitoring capabilities.
What to do:
- View vessel tracks from AIS (Automatic Identification System) — the maritime equivalent of ADS-B for ships.
- Check the POSEIDON AI suite — maritime-specific threat analysis and port security monitoring.
- Look at coastal zone overlays and maritime domain boundaries.
Swarm C2 / Drone Dominance
How to get there: Click /swarm-c2.
What you see: Swarm command and control interface for coordinating autonomous drone operations.
What to do:
- View the swarm formation display — shows how autonomous drones would be coordinated in formations.
- Check the failsafe behavior predictor — predicts what a hostile drone swarm will do when you jam it (scatter, return-to-home, loiter, land).
- Look at the platform database — 8 known drone platforms with their behavioral profiles, control frequencies, and vulnerabilities.
Full 66-Module Overview
How to get there: Click /capabilities.
What you see: The complete module inventory organized by domain — Air, Maritime, Ground, Cyber/EW, Space, Emergency Management, C2, Training, and Support.
What to do:
- Scroll through the module cards — each shows what it does, what data feeds it uses, and its current operational status.
- Look at the cost tiers: Organic (~$98 per sensor node), WiFi-enabled ($0 additional), and Tactical ($0 hardware — integrates into existing military networks).
- Check compliance status — FedRAMP, CMMC Level 2, NIST CSF 2.0, ICS/NIMS, HSEEP, CAP 1.2 all documented.
- Look at the program alignments — how SHIELD/ATLAS maps to DIU OMEN, CDAO, ASCA, Golden Dome, and other active programs.
Defense Briefing
How to get there: Click /defense.
What you see: A strategic-level briefing designed for defense leadership. JADC2 alignment, MOSA compliance, integration architecture, and cost-per-unit analysis.
What to do:
- Review the integration adapter status — 11 military systems with ready-to-connect parsers (DCGS-MC, AFATDS, TITAN, DAF Battle Network, UDL, TAK, NGA, STIX/TAXII, and more).
- Check the cost comparison — $98 per organic sensor node vs. $15M+ for legacy C-UAS systems. Full battalion coverage for under $50K.
- See the USEIF architecture — Universal Sensor-Effector Integration Framework: any sensor, any shooter, any domain.
Verify It Is Real — Hit the APIs Yourself
How to get there: Type any of these URLs directly into your browser address bar. You will see raw JSON data returned from real, working API endpoints.
Try these right now:
TOTAL EVALUATION TIME: 10–15 MINUTES
After completing these 8 stops, you have seen live air tracks, real-time sensor fusion, AI-powered intelligence collection, multi-domain awareness, military integration adapters, and verified working APIs.
Every operational data point is real. Every API is live. Every module has code behind it. Sandbox/training simulators are clearly labeled and use representative scenario values for safe rehearsal.
EVERY UNIT GETS THE THREAT PICTURE — EVEN WITHOUT SENSORS
A supply company, a headquarters element, a medical unit, a school, a FEMA shelter — you don't produce sensor data, but you STILL need to know when a threat is heading your way.
SHIELD/ATLAS is a networked system. When ANY sensor on the network detects a threat — a drone, a mortar launch, an RF signature — every unit connected to the dashboard sees it. Your AO shows:
THREATCON STATUS
GREEN / AMBER / RED indicator updates in real time based on threats detected anywhere in the network. Audio alert sounds on escalation so you hear it even if you're not watching the screen.
COMMON OPERATING PICTURE
Map shows all detected threats, sensor positions, air tracks, and predicted impact points. You see the same picture as the combat units who have the sensors.
INCOMING WARNINGS
When a mortar, rocket, or drone is detected, trajectory prediction calculates where it's heading. If it's heading toward YOUR position, you get a visual flash and audio warning.
AIR TRACKS
Live ADS-B aircraft tracking shows everything in the air around your AO. No radar required — pulled from the global ADS-B network and displayed on your COP automatically.
Bottom line: Open a browser, go to the dashboard, and you have threat awareness. If someone else on the network has a sensor, you see what they see.
HOW THE SENSOR NETWORK WORKS
Example:
1. A forward recon team has a TAK laptop with a $30 SDR dongle and a $26 USB mic plugged in. The sensor bridge runs on their laptop.
2. Their sensors detect a drone's 2.4GHz control signal (RF) and motor noise (acoustic). Detection goes into their TAK display AND up to the SHIELD/ATLAS cloud.
3. The cloud engine fuses the RF + acoustic data, classifies it as a consumer drone, and calculates its heading.
4. A supply company 10 miles away opens their browser — they see the drone on their COP map, THREATCON goes AMBER, and they hear the alert tone. No sensors on their end. They just opened a browser.
5. Every other unit on the network sees the same thing at the same time.
ANY UNIT CAN BE A SENSOR NODE — AND A CONSUMER
Every unit — combat, supply, medical, HQ, FEMA — can plug in a $30 SDR dongle and a $26 USB mic to detect threats in THEIR area. And every unit sees threats detected by EVERY OTHER unit on the network. You are both a sensor and a consumer at the same time.
Minimum: Browser Only
No hardware at all? Open the dashboard and see the shared threat picture from all other sensors on the network. You still get THREATCON alerts, air tracks, and warnings.
Recommended: Browser + USB Sensors
Plug a USB mic ($26) and/or SDR dongle ($30) into ANY computer. Double-click the launcher. Now YOUR location is also detecting threats and feeding the network. Every unit should do this.
Advanced: ESP32 Perimeter Nodes
Place standalone ESP32 sensor boards ($12 each) around your perimeter. They detect threats over WiFi independently — no computer needed at each position. Just power and WiFi.
YOUR HARDWARE — WHAT EACH PIECE DOES
DOWNLOAD SOFTWARE FOR YOUR HARDWARE
One-Click Launcher (Mic + SDR) Sensor Bridge Script (Advanced) ESP32 Firmware (Arduino IDE) Full Setup GuideThree Evaluation Paths
Browser Only
- 1. Open /cram — C-RAM kill chain, sensor fusion, threat library
- 2. Open /cop — Map with air tracks, 3 tactical modes
- 3. Open /swarm-c2 — Swarm C2 / drone dominance
- 4. Open /capabilities — Full 66-module overview
- 5. Open /drone-intel — Cached UAS threat intelligence corpus (live OSINT fetcher currently disabled)
- 6. Open /maritime — Maritime domain awareness, vessel tracking
- 7. Open /omen — OMEN mission engine, multi-domain threat monitoring
Quick Hardware
- 1. Plug in USB microphone (any USB mic works)
- 2. (Optional) Plug in RTL-SDR dongle
- 3. Download the One-Click Launcher
- 4. Double-click the downloaded .bat file
- 5. Pick mode 1 (Full), 2 (Mic), or 3 (SDR)
- 6. Open /cram — Live data appears in fusion tracks
TAK Integration
- 1. SHIELD/ATLAS broadcasts Cursor on Target (CoT) events via SSE
- 2. Connect your TAK Server to the CoT endpoint
- 3. Detections appear on ATAK / WinTAK maps automatically
- 4. CoT messages include: threat type, position, confidence, classification
CoT Export:
/api/interop/cot/exportTAK Bridge SSE:
/api/tak-bridge/eventsSTIX/TAXII:
/api/interop/stix/export
Available Dashboards
All dashboards work in any modern browser. No installation required for viewing.
C-RAM / Counter-Indirect Fire
Kill chain pipeline (Detect > Classify > Triangulate > Trajectory > Warning > Counter-Battery), sensor fusion tracks, RF waterfall, threat library with mortar/rocket/artillery signatures, THREATCON status
Common Operating Picture (COP)
Interactive map with three modes: ORGANIC (local sensors), WIFI (network detection), TACTICAL (full overlay). Live ADS-B air tracks, sensor markers, detection locations
Swarm C2 / Drone Dominance
Swarm command and control, autonomous drone coordination, formation management, swarm behavior prediction
OMEN Threat Intelligence
Multi-domain threat monitoring, predictive risk intelligence, threat correlation across cyber/physical domains
Maritime Domain Awareness
Vessel tracking, maritime threat detection, REEF coastal monitoring, port security
UAS Threat Intelligence
Real-world drone incident intelligence persisted in the database (5 threat categories, DB-backed). Live OSINT fetcher is currently disabled per program directive 2026-04-23 — corpus shown is the most recent cached capture.
Defense Briefing
Strategic overview for defense stakeholders. JADC2 alignment, MOSA compliance, integration architecture, cost analysis.
Full Capability Statement
Complete 66-module system overview, architecture, integration points, compliance status
Live Data Feeds — Running Right Now
These feeds are active and pulling real data. No simulations, no mocks.
ADS-B Air Tracks
Live aircraft positions from the global ADS-B Exchange network. Updates every 10 seconds. Visible on the COP map in all three modes.
FAA NOTAMs
Notices to Air Missions from the FAA for 30 monitored airfields (20 civilian + 10 military). Severity-classified (critical/high/medium/routine). GeoJSON overlay on COP map. 4-hour refresh cycle.
UAS Threat Intel
AI-curated drone incident intelligence corpus across 5 query categories: military incidents, civilian airport disruptions, counter-drone tech, regulatory changes, critical infrastructure threats. DB-persisted. Live OSINT fetcher is currently disabled per program directive 2026-04-23.
Sensor Fusion Engine
Multi-modal sensor fusion running every 3 seconds. Correlates acoustic, RF, ADS-B, and visual detections. Bayesian track association with confidence scoring.
Military Integration Adapters
Ready-to-connect adapters for DoD systems. Parser code is built and tested — requires network access for live data.
DAF Battle Network — ATO Parser
Parses USMTF Air Tasking Orders into mission cards. Extracts callsign, TOT, ordnance, ROE, comms. Outputs COP overlays and CoT event streams. Requires SIPRNET.
DAF Battle Network — ACO/Airspace
Airspace Control Order parser. Extracts ROZs, killboxes, MEZs, WEZs, ADIZs into GeoJSON polygon overlays for COP display. Requires SIPRNET.
DAF Battle Network — RAP Feed
Recognized Air Picture from Link-16 J3.2/J3.5 air tracks. Fused with organic ADS-B via Bayesian correlation. On NIPRNET, organic ADS-B serves as the air picture.
DAF Battle Network — Retasking
In-flight retasking orders via CoT push and Link-16 J12.6 free-text. Generates retask IDs for tracking. Requires SIPRNET for transmission.
UDL — Space Object Catalog
Unified Data Library space object queries. Parses RSO data (TLE/3LE/CZML) into COP space layer tracks. Filter by object type, country, orbit regime.
UDL — GPS Constellation Health
GPS constellation status: 31 SVs, signal health (L1CA/L2C/L5/L1C), PDOP/HDOP/VDOP, accuracy estimates. Baseline from public NAVCEN data; full data via UDL API.
UDL — Conjunction Assessment
Collision risk alerting from CDM data. Parses TCA, miss distance, probability of collision. Red/yellow/green thresholds for operator alerting.
UDL — Space Weather
Solar flare, geomagnetic storm, and GPS scintillation monitoring. NOAA R/G/S scales. Alerts for HF blackout, navigation error, satellite anomalies.
Supported Hardware (Path 2)
Budget-friendly COTS hardware for live evaluation.
| Device | Role | Cost | Setup |
|---|---|---|---|
| Any USB Microphone Recommended: Fifine K669B |
Acoustic detection — drone motors, rockets, vehicles | ~$26 | Plug in USB, run launcher |
| RTL-SDR Dongle Recommended: NooElec NESDR Smart v5 |
RF spectrum scanning — drone control signals, FPV video | ~$30 | Plug in USB, install Zadig driver, run launcher |
| ESP32 Dev Board Recommended: ELEGOO ESP32 |
Remote acoustic node — standalone WiFi sensor | ~$12 | Flash via Arduino IDE (full guide) |
| Small Drone (test target) Recommended: Holy Stone HS190 |
Test target for detection — not a sensor | ~$25 | Fly it near sensors to test detection |
TAK Integration Details (Path 3)
Cursor on Target (CoT) Export
SHIELD/ATLAS generates standard MIL-STD CoT messages for every detection. Each message includes:
- Threat type and classification (drone, mortar, rocket, vehicle)
- Position (lat/lon/alt) with accuracy estimate
- Confidence score and sensor source
- Timestamp and unique event ID
- MIL-STD-2525D symbology code (SIDC)
CoT endpoint:
TAK Bridge (Server-Sent Events):
Additional interop formats:
Supported Interoperability
| System | Protocol | Status |
|---|---|---|
| ATAK / WinTAK / iTAK | Cursor on Target (CoT) XML | READY |
| TAK Server | CoT over SSE / TCP | READY |
| DCGS-MC / MCISRE | Adapter layer | READY |
| AFATDS | VMF / Fire Mission | READY |
| STIX/TAXII | Cyber threat intel | READY |
| NGA / GIS | GeoJSON / KML / WMS / WFS | READY |
| DAF Battle Network | ATO / ACO / RAP / Retask | ADAPTER READY |
| UDL (Space Force) | Catalog / Conjunctions / GPS / Space Wx | ADAPTER READY |
| FAA NOTAM System | NOTAM API v1 | READY |
| TITAN | Adapter layer | READY |
Integrated Services and Solutions LLC (ISS) — Service-Disabled Veteran-Owned Small Business (SDVOSB)
CAGE: 9VKK3 | UEI: C7YDV3P8EHL7 | Dr. Terry Flood, CEO