UNCLASSIFIED
UNCLASSIFIED

SHIELD / ATLAS

Evaluator Quickstart — DIU / DoD / FEMA Assessment Guide

Get SHIELD/ATLAS Running in Under 2 Minutes

This is a 66-module dual-use national emergency management and defense C2 platform — shipping today. Click any button below to jump straight into a live page with real data. No login. No setup. Zero simulations.

START HERE — IF YOU ONLY HAVE 3 MINUTES

Walk The Story — 12 Stages, 3 Minutes

Lane framing in one line: We are not Palantir or Maven. We live downstream of them, at the unit edge, where the action loop has to actually close.

A docent-narrated walkthrough of what the platform actually does, in the order an operator would experience it. Real citations. Real data. Real claims, no inflation. Autoplays at 18 seconds per stage; pause anytime.

START THE WALKTHROUGH → BRIEFING RUNBOOK SOURCES & SINKS BE A SENSOR (PHONE)
READ THIS FIRST

We Are Not Competing With Palantir or Maven. We Are in Our Own Lane.

If you are about to evaluate this platform, the fastest way to save your time is to know what we are not. We are not another Palantir clone, not a Maven competitor, and not a copycat fusion vendor pitching the same enterprise data lake everyone else is pitching. Palantir Foundry / Gotham and Maven Smart System own the upstream enterprise warehouse and the J2-staff analytic workflow — and they do that work well. SHIELD/ATLAS lives downstream of them, at the unit edge, where the action loop has to actually close.

WHAT WE ARE NOT

  • − Not an enterprise data warehouse
  • − Not an FDE-driven, multi-million-dollar deployment program
  • − Not a J2-staff analytic workbench
  • − Not a competitor to anyone — we feed them and consume from them
  • − Not a copycat fusion website

WHAT WE ARE

  • + Unit-and-edge C2 / COP from a phone, no install
  • + The action loop — CFF, 9-line, MIO, ICS — closed in code
  • + $150/node distributed C-UAS, C-RAM, GPS-denied mesh
  • + DDIL-native by design, not a fallback mode
  • + MOSA — the government keeps the integration pattern

The honest one-liner

Palantir and Maven analyze. SHIELD/ATLAS analyzes for action at the unit edge and closes the loop to the next decision and the next system that has to execute it. We are additive to them, not adversarial.

Full positioning, including the 5 integration chains the event bus enforces, is on the Documents portal — see the Partner Overview and the Palantir/Maven positioning paper. Built by a retired 131A targeting officer; doctrine-matched (FM 6-40, JP 3-09.3, JP 3-85, MDMP, ICS).

REVIEWER DOCUMENTS PORTAL

Capability stories — one paragraph per feature, click to open the live page. Covers unit-to-unit lookup, COP, planning (MDMP/TLP), training, preparation, execution, logistics, maintenance, MTOE, kill web, and the full 66-module inventory. Plus capability statements, technical architecture, demo walkthrough, and pipeline documents.

OPEN DOCUMENTS PORTAL Jump to Capability Stories
Unit Lookup & Comms Common Op Picture Planning (MDMP/TLP) Training Sandboxes Preparing & Setup Execution & SITREP Logistics & Maintenance Kill Web Full 66-Module List

WHAT IS SHIELD / ATLAS?

SHIELD — Personal Safety App

A mobile-first PWA for individual protection. Panic Button with auto-911 and GPS sharing. SafeWalk with fall detection. Hidden Bluetooth tracker detection (AirTags, Tile, BLE). Anonymous "See Something, Say Something" reporting. SmokeGuard fire alarm listener. NetGuard WiFi threat scanning. No account required. Works offline. Every citizen becomes a sensor feeding data into ATLAS.

ATLAS — 66-Module C2 Console

The command & control engine. 66 modules shipping today across 7 domains: Weather/Hazards, Search & Rescue, Public Safety, Transport, Medical, Defense (kill chains, fires, maritime, cyber, EW, space), and AI/Intelligence. Serves military (Army, SOCOM, Navy, USMC), federal agencies (DHS, FEMA, FBI, CISA), and state/local emergency management. 43 sensor types, 9 integration adapters (TAK, DCGS-MC, TITAN, AFATDS, DAF Battle Network, UDL, NGA, STIX/TAXII). DDIL-capable, zero-trust, CMMC L2.

How They Connect — One Codebase, Two Faces

SHIELD is the sensor in every pocket. ATLAS is the command console. A panic alert from a SHIELD user flows into the ATLAS event bus. A drone detected by an ATLAS operator pushes a warning to every SHIELD user in range. Citizen reports become intelligence. Intelligence becomes action. The same platform serves a 911 caller and a Joint Task Force commander.

ISS LLC
SDVOSB • CAGE: 9VKK3
DIU OMEN
PROJ00662
ACC AMIC CSO
Active Evaluation
USSOCOM SOFGSD
Active Evaluation
AFRL PACER BAA
FA2391 — Resubmission

OR JUMP IN — CLICK ANY BUTTON

Every button opens a live page with real data. Start with the map.

LIVE MAP
Real aircraft tracking + weather
C-RAM DASHBOARD
Sensor fusion + kill chain
DRONE INTEL
AI-gathered threat data
MAIN APP
All 66 modules
KILL WEB
Sensor-to-shooter flow
CAPABILITIES
66-module overview
DEFENSE BRIEF
JADC2 + cost analysis
ASK AI ANYTHING
Talk to it like a program manager. It speaks the way Dr. Flood speaks.
"How does the kill chain work?" "What can a $30 sensor detect?" "How is this different from Anduril?" "What about AI governance?"

Start with LIVE MAP — you will see real aircraft moving on the map within seconds. Then explore from there.

GUIDED EVALUATION WALKTHROUGH

Follow these stops in order. Total time: 10–15 minutes. Each stop tells you exactly what to click and what to look for.

1

Common Operating Picture (COP)

2 minutes • /cop

How to get there: Click /cop or use the navigation bar at the top of any page.

What you see: A full-screen tactical map centered on the National Capital Region. Aircraft icons are moving — these are real ADS-B transponder signals from every aircraft in a 200km radius, updated every 10 seconds. This is not a replay. This is live.

What to do:

  • Click any aircraft icon — a popup shows callsign, altitude, speed, heading, aircraft type, and origin/destination if available.
  • Look at the three mode buttons in the top-right: ORGANIC (your local sensors only), WIFI (network data — ADS-B, weather, NOTAMs), TACTICAL (all overlays including sensor fusion and threat tracks). Toggle between them to see how the picture builds up.
  • In WIFI or TACTICAL mode, look for NOTAM markers — orange/red/yellow triangles on the map showing active airspace restrictions from the FAA. Click one to see the restriction details, severity, and affected altitudes.
  • If you see a colored circle around a NOTAM marker, that is a Temporary Flight Restriction (TFR) with a 5-nautical-mile radius.
What this proves: Real-time situational awareness from open-source intelligence (ADS-B + FAA NOTAMs) with zero hardware investment. Every operator on the network sees the same picture.
2

C-RAM / Sensor Fusion Dashboard

3 minutes • /cram

How to get there: Click /cram. This is the primary tactical dashboard.

What you see: A dark operational display with six main panels — kill chain pipeline, sensor fusion tracks, RF spectrum waterfall, threat library, THREATCON status, and detection log.

What to do:

  • Kill Chain Pipeline (top) — Shows the 6-stage process: Detect → Classify → Triangulate → Trajectory → Warning → Counter-Battery. When a sensor detects something, it flows left to right through these stages in real time.
  • Sensor Fusion Tracks — The fusion engine runs every 3 seconds. It correlates acoustic + RF + ADS-B + visual detections using Bayesian track association. Each track shows confidence score, contributing sensors, and classification.
  • Threat Library — Click to browse the built-in database of mortar, rocket, artillery, and drone acoustic/RF signatures. These are the reference patterns the system matches against live sensor data.
  • THREATCON Indicator — Top-left shows GREEN/AMBER/RED. This updates automatically based on detected threats. An audio alert sounds on escalation.
What this proves: Full kill chain automation from sensor detection to counter-battery fire mission generation. Multi-modal fusion (acoustic + RF + ADS-B) with Bayesian correlation — not just single-sensor alerting.
3

UAS Threat Intelligence

2 minutes • /drone-intel

How to get there: Click /drone-intel.

What you see: A dashboard showing real-world drone incidents previously gathered and stored in the database. The live OSINT fetcher is currently disabled (pay-per-use research APIs off per program directive 2026-04-23); records below are the cached corpus.

What to do:

  • Browse the incident cards — each shows date, location, threat category, and AI-generated analysis with source citations.
  • Look at the 5 threat categories: Military drone incidents, civilian airport disruptions, counter-drone technology developments, regulatory changes, and critical infrastructure threats.
  • Notice the source links on each incident — you can click through to verify every claim. Nothing is fabricated.
What this proves: AI-powered open-source intelligence collection running on a schedule, persisted to database, with verifiable sources. The system learns what threats are emerging globally and feeds that context to operators.
4

Maritime Domain Awareness

2 minutes • /maritime

How to get there: Click /maritime.

What you see: Maritime operational display with vessel tracking, port security, and coastal monitoring capabilities.

What to do:

  • View vessel tracks from AIS (Automatic Identification System) — the maritime equivalent of ADS-B for ships.
  • Check the POSEIDON AI suite — maritime-specific threat analysis and port security monitoring.
  • Look at coastal zone overlays and maritime domain boundaries.
What this proves: Multi-domain awareness. SHIELD/ATLAS is not just an air defense system — it covers maritime, ground, cyber, and space domains in a single platform.
5

Swarm C2 / Drone Dominance

2 minutes • /swarm-c2

How to get there: Click /swarm-c2.

What you see: Swarm command and control interface for coordinating autonomous drone operations.

What to do:

  • View the swarm formation display — shows how autonomous drones would be coordinated in formations.
  • Check the failsafe behavior predictor — predicts what a hostile drone swarm will do when you jam it (scatter, return-to-home, loiter, land).
  • Look at the platform database — 8 known drone platforms with their behavioral profiles, control frequencies, and vulnerabilities.
What this proves: Counter-swarm intelligence. The system doesn't just detect drones — it predicts their behavior after electronic attack, enabling informed tactical decisions.
6

Full 66-Module Overview

3 minutes • /capabilities

How to get there: Click /capabilities.

What you see: The complete module inventory organized by domain — Air, Maritime, Ground, Cyber/EW, Space, Emergency Management, C2, Training, and Support.

What to do:

  • Scroll through the module cards — each shows what it does, what data feeds it uses, and its current operational status.
  • Look at the cost tiers: Organic (~$98 per sensor node), WiFi-enabled ($0 additional), and Tactical ($0 hardware — integrates into existing military networks).
  • Check compliance status — FedRAMP, CMMC Level 2, NIST CSF 2.0, ICS/NIMS, HSEEP, CAP 1.2 all documented.
  • Look at the program alignments — how SHIELD/ATLAS maps to DIU OMEN, CDAO, ASCA, Golden Dome, and other active programs.
What this proves: This is not a demo or a prototype. 66 modules shipping today with real backend code, real APIs, real data persistence, and real compliance documentation. Every module has working endpoints you can call.
7

Defense Briefing

2 minutes • /defense

How to get there: Click /defense.

What you see: A strategic-level briefing designed for defense leadership. JADC2 alignment, MOSA compliance, integration architecture, and cost-per-unit analysis.

What to do:

  • Review the integration adapter status — 11 military systems with ready-to-connect parsers (DCGS-MC, AFATDS, TITAN, DAF Battle Network, UDL, TAK, NGA, STIX/TAXII, and more).
  • Check the cost comparison — $98 per organic sensor node vs. $15M+ for legacy C-UAS systems. Full battalion coverage for under $50K.
  • See the USEIF architecture — Universal Sensor-Effector Integration Framework: any sensor, any shooter, any domain.
What this proves: Affordable mass at scale. ISS/SDVOSB delivery model. Commercially developed, government-ready, with a clear path from NIPRNET to SIPRNET deployment.
8

Verify It Is Real — Hit the APIs Yourself

2 minutes • Browser address bar or curl

How to get there: Type any of these URLs directly into your browser address bar. You will see raw JSON data returned from real, working API endpoints.

Try these right now:

Live Air Tracks
/api/live-feed/tracks
NOTAM Feed
/api/notams/feed
Drone Intel Incidents
/api/drone-intel/feed
Sensor Fusion Tracks
/api/fusion/tracks
GPS Constellation Health
/api/adapters/udl/gps-health
DAF Battle Network ATO
/api/adapters/daf-bn/ato
Interop Matrix
/api/adapters/interop-matrix
System Health
/api/health
What this proves: Every capability shown in the UI has a working API behind it. You can call these endpoints programmatically, integrate them into your own systems, or export data in CoT/STIX/GeoJSON/KML formats. This is not a slide deck — it is running production code.

TOTAL EVALUATION TIME: 10–15 MINUTES

After completing these 8 stops, you have seen live air tracks, real-time sensor fusion, AI-powered intelligence collection, multi-domain awareness, military integration adapters, and verified working APIs.

Every operational data point is real. Every API is live. Every module has code behind it. Sandbox/training simulators are clearly labeled and use representative scenario values for safe rehearsal.

EVERY UNIT GETS THE THREAT PICTURE — EVEN WITHOUT SENSORS

A supply company, a headquarters element, a medical unit, a school, a FEMA shelter — you don't produce sensor data, but you STILL need to know when a threat is heading your way.

SHIELD/ATLAS is a networked system. When ANY sensor on the network detects a threat — a drone, a mortar launch, an RF signature — every unit connected to the dashboard sees it. Your AO shows:

THREATCON STATUS

GREEN / AMBER / RED indicator updates in real time based on threats detected anywhere in the network. Audio alert sounds on escalation so you hear it even if you're not watching the screen.

COMMON OPERATING PICTURE

Map shows all detected threats, sensor positions, air tracks, and predicted impact points. You see the same picture as the combat units who have the sensors.

INCOMING WARNINGS

When a mortar, rocket, or drone is detected, trajectory prediction calculates where it's heading. If it's heading toward YOUR position, you get a visual flash and audio warning.

AIR TRACKS

Live ADS-B aircraft tracking shows everything in the air around your AO. No radar required — pulled from the global ADS-B network and displayed on your COP automatically.

Bottom line: Open a browser, go to the dashboard, and you have threat awareness. If someone else on the network has a sensor, you see what they see.

HOW THE SENSOR NETWORK WORKS

FIELD UNITS (SENSOR NODES)
TAK Computer + USB Sensors
SDR dongle + mic plugged into the TAK laptop. Sensor bridge runs locally. Feeds data into TAK AND into the cloud simultaneously.
SHIELD/ATLAS CLOUD
Sensor Fusion Engine
Collects data from ALL sensor nodes. Correlates acoustic + RF + ADS-B. Runs threat classification. Calculates trajectories. Broadcasts shared picture.
ALL UNITS (CONSUMERS)
Any Browser — No Hardware
Supply companies, HQ, medical, FEMA — open the dashboard and see every threat detected by every sensor on the network. THREATCON alerts + audio warnings.

Example:

1. A forward recon team has a TAK laptop with a $30 SDR dongle and a $26 USB mic plugged in. The sensor bridge runs on their laptop.

2. Their sensors detect a drone's 2.4GHz control signal (RF) and motor noise (acoustic). Detection goes into their TAK display AND up to the SHIELD/ATLAS cloud.

3. The cloud engine fuses the RF + acoustic data, classifies it as a consumer drone, and calculates its heading.

4. A supply company 10 miles away opens their browser — they see the drone on their COP map, THREATCON goes AMBER, and they hear the alert tone. No sensors on their end. They just opened a browser.

5. Every other unit on the network sees the same thing at the same time.

ANY UNIT CAN BE A SENSOR NODE — AND A CONSUMER

Every unit — combat, supply, medical, HQ, FEMA — can plug in a $30 SDR dongle and a $26 USB mic to detect threats in THEIR area. And every unit sees threats detected by EVERY OTHER unit on the network. You are both a sensor and a consumer at the same time.

Minimum: Browser Only

No hardware at all? Open the dashboard and see the shared threat picture from all other sensors on the network. You still get THREATCON alerts, air tracks, and warnings.

+

Recommended: Browser + USB Sensors

Plug a USB mic ($26) and/or SDR dongle ($30) into ANY computer. Double-click the launcher. Now YOUR location is also detecting threats and feeding the network. Every unit should do this.

+

Advanced: ESP32 Perimeter Nodes

Place standalone ESP32 sensor boards ($12 each) around your perimeter. They detect threats over WiFi independently — no computer needed at each position. Just power and WiFi.

YOUR HARDWARE — WHAT EACH PIECE DOES

USB MICROPHONE (Fifine K669B)
Acoustic Threat Detection
Listens for sound signatures: drone motors, rocket launches, mortar fire, vehicle engines, gunshots. Analyzes frequency patterns to classify what it hears. Range: ~500m-2km depending on environment.
DETECTS: Drones, mortars, rockets, vehicles, aircraft, gunfire
SETUP: Plug into USB. That's it.
SDR DONGLE (NooElec NESDR Smart v5)
RF Spectrum Scanning
Scans radio frequencies from 25MHz to 1.75GHz. Detects drone control signals (2.4GHz), FPV video links (5.8GHz), walkie-talkies, remote detonation signals. Shows a waterfall display on the dashboard.
DETECTS: Drone controllers, FPV video, radios, RF triggers
SETUP: Plug into USB. Install Zadig driver (one time). Attach antenna.
CIRCUIT BOARD (ELEGOO ESP32)
Standalone WiFi Acoustic Sensor
A small microcontroller board with a microphone attached. Once flashed with firmware and connected to WiFi, it runs on its own — no computer needed. Place it anywhere with power (USB phone charger or battery pack) and WiFi. It listens for threats and sends detections to the cloud automatically.
DETECTS: Drones, motors, explosions, vehicles (acoustic only)
SETUP: Flash firmware via Arduino IDE (15 min one-time), set WiFi name/password, plug in
NEEDS: Microphone module (MAX9814 or KY-037, ~$5) wired to GPIO 34
MINI DRONE (Holy Stone HS190)
Test Target — NOT a Sensor
This is what you fly to TEST your detection system. Your mic hears its motors. Your SDR sees its 2.4GHz control signal. The dashboard should detect and classify it within seconds of takeoff.
THIS IS THE THREAT, NOT THE SENSOR
SETUP: Charge it. Fly it near your sensors. Watch the dashboard light up.

DOWNLOAD SOFTWARE FOR YOUR HARDWARE

One-Click Launcher (Mic + SDR) Sensor Bridge Script (Advanced) ESP32 Firmware (Arduino IDE) Full Setup Guide

Three Evaluation Paths

1

Browser Only

30 seconds — No hardware needed
See the full system running with built-in simulation sensors. Everything works out of the box.
  • 1. Open /cram — C-RAM kill chain, sensor fusion, threat library
  • 2. Open /cop — Map with air tracks, 3 tactical modes
  • 3. Open /swarm-c2 — Swarm C2 / drone dominance
  • 4. Open /capabilities — Full 66-module overview
  • 5. Open /drone-intel — Cached UAS threat intelligence corpus (live OSINT fetcher currently disabled)
  • 6. Open /maritime — Maritime domain awareness, vessel tracking
  • 7. Open /omen — OMEN mission engine, multi-domain threat monitoring
What you'll see: Live ADS-B air tracks from the global network. FAA NOTAM layer on the COP (active airspace restrictions). UAS threat intel with real-world drone incidents. Sensor fusion engine running. THREATCON status and kill chain pipeline all active. No hardware required — everything works from the browser.
2

Quick Hardware

5 minutes — USB mic and/or SDR dongle
Plug in real sensors and see live detections flow into the dashboard. Proves hardware-to-cloud integration.
  • 1. Plug in USB microphone (any USB mic works)
  • 2. (Optional) Plug in RTL-SDR dongle
  • 3. Download the One-Click Launcher
  • 4. Double-click the downloaded .bat file
  • 5. Pick mode 1 (Full), 2 (Mic), or 3 (SDR)
  • 6. Open /cram — Live data appears in fusion tracks
Requires: Windows PC with Python installed. The launcher will tell you if Python is missing and open the download page.
Download Launcher
3

TAK Integration

2 minutes — Requires TAK Server
If you're on a TAK network, SHIELD/ATLAS feeds directly into your existing TAK ecosystem.
  • 1. SHIELD/ATLAS broadcasts Cursor on Target (CoT) events via SSE
  • 2. Connect your TAK Server to the CoT endpoint
  • 3. Detections appear on ATAK / WinTAK maps automatically
  • 4. CoT messages include: threat type, position, confidence, classification
Endpoints:
CoT Export: /api/interop/cot/export
TAK Bridge SSE: /api/tak-bridge/events
STIX/TAXII: /api/interop/stix/export

Available Dashboards

All dashboards work in any modern browser. No installation required for viewing.

C-RAM / Counter-Indirect Fire

/cram

Kill chain pipeline (Detect > Classify > Triangulate > Trajectory > Warning > Counter-Battery), sensor fusion tracks, RF waterfall, threat library with mortar/rocket/artillery signatures, THREATCON status

Common Operating Picture (COP)

/cop

Interactive map with three modes: ORGANIC (local sensors), WIFI (network detection), TACTICAL (full overlay). Live ADS-B air tracks, sensor markers, detection locations

Swarm C2 / Drone Dominance

/swarm-c2

Swarm command and control, autonomous drone coordination, formation management, swarm behavior prediction

OMEN Threat Intelligence

/omen

Multi-domain threat monitoring, predictive risk intelligence, threat correlation across cyber/physical domains

Maritime Domain Awareness

/maritime

Vessel tracking, maritime threat detection, REEF coastal monitoring, port security

UAS Threat Intelligence

/drone-intel

Real-world drone incident intelligence persisted in the database (5 threat categories, DB-backed). Live OSINT fetcher is currently disabled per program directive 2026-04-23 — corpus shown is the most recent cached capture.

Defense Briefing

/defense

Strategic overview for defense stakeholders. JADC2 alignment, MOSA compliance, integration architecture, cost analysis.

Full Capability Statement

/capabilities

Complete 66-module system overview, architecture, integration points, compliance status

Live Data Feeds — Running Right Now

These feeds are active and pulling real data. No simulations, no mocks.

ADS-B Air Tracks

/api/live-feed/tracks

Live aircraft positions from the global ADS-B Exchange network. Updates every 10 seconds. Visible on the COP map in all three modes.

FAA NOTAMs

/api/notams/feed

Notices to Air Missions from the FAA for 30 monitored airfields (20 civilian + 10 military). Severity-classified (critical/high/medium/routine). GeoJSON overlay on COP map. 4-hour refresh cycle.

UAS Threat Intel

/api/drone-intel/feed

AI-curated drone incident intelligence corpus across 5 query categories: military incidents, civilian airport disruptions, counter-drone tech, regulatory changes, critical infrastructure threats. DB-persisted. Live OSINT fetcher is currently disabled per program directive 2026-04-23.

Sensor Fusion Engine

/api/fusion/tracks

Multi-modal sensor fusion running every 3 seconds. Correlates acoustic, RF, ADS-B, and visual detections. Bayesian track association with confidence scoring.

Military Integration Adapters

Ready-to-connect adapters for DoD systems. Parser code is built and tested — requires network access for live data.

DAF Battle Network — ATO Parser

/api/adapters/daf-bn/ato

Parses USMTF Air Tasking Orders into mission cards. Extracts callsign, TOT, ordnance, ROE, comms. Outputs COP overlays and CoT event streams. Requires SIPRNET.

DAF Battle Network — ACO/Airspace

/api/adapters/daf-bn/aco

Airspace Control Order parser. Extracts ROZs, killboxes, MEZs, WEZs, ADIZs into GeoJSON polygon overlays for COP display. Requires SIPRNET.

DAF Battle Network — RAP Feed

/api/adapters/daf-bn/rap

Recognized Air Picture from Link-16 J3.2/J3.5 air tracks. Fused with organic ADS-B via Bayesian correlation. On NIPRNET, organic ADS-B serves as the air picture.

DAF Battle Network — Retasking

POST /api/adapters/daf-bn/retask

In-flight retasking orders via CoT push and Link-16 J12.6 free-text. Generates retask IDs for tracking. Requires SIPRNET for transmission.

UDL — Space Object Catalog

/api/adapters/udl/catalog

Unified Data Library space object queries. Parses RSO data (TLE/3LE/CZML) into COP space layer tracks. Filter by object type, country, orbit regime.

UDL — GPS Constellation Health

/api/adapters/udl/gps-health

GPS constellation status: 31 SVs, signal health (L1CA/L2C/L5/L1C), PDOP/HDOP/VDOP, accuracy estimates. Baseline from public NAVCEN data; full data via UDL API.

UDL — Conjunction Assessment

/api/adapters/udl/conjunctions

Collision risk alerting from CDM data. Parses TCA, miss distance, probability of collision. Red/yellow/green thresholds for operator alerting.

UDL — Space Weather

/api/adapters/udl/space-weather

Solar flare, geomagnetic storm, and GPS scintillation monitoring. NOAA R/G/S scales. Alerts for HF blackout, navigation error, satellite anomalies.

Supported Hardware (Path 2)

Budget-friendly COTS hardware for live evaluation.

Device Role Cost Setup
Any USB Microphone
Recommended: Fifine K669B
Acoustic detection — drone motors, rockets, vehicles ~$26 Plug in USB, run launcher
RTL-SDR Dongle
Recommended: NooElec NESDR Smart v5
RF spectrum scanning — drone control signals, FPV video ~$30 Plug in USB, install Zadig driver, run launcher
ESP32 Dev Board
Recommended: ELEGOO ESP32
Remote acoustic node — standalone WiFi sensor ~$12 Flash via Arduino IDE (full guide)
Small Drone (test target)
Recommended: Holy Stone HS190
Test target for detection — not a sensor ~$25 Fly it near sensors to test detection
Full Hardware Setup Guide

TAK Integration Details (Path 3)

Cursor on Target (CoT) Export

SHIELD/ATLAS generates standard MIL-STD CoT messages for every detection. Each message includes:

CoT endpoint:

GET /api/interop/cot/export

TAK Bridge (Server-Sent Events):

GET /api/tak-bridge/events

Additional interop formats:

GET /api/interop/stix/export — STIX/TAXII cyber threat intel GET /api/interop/geojson — GeoJSON for GIS systems GET /api/interop/kml — KML for Google Earth / mapping

Supported Interoperability

SystemProtocolStatus
ATAK / WinTAK / iTAKCursor on Target (CoT) XMLREADY
TAK ServerCoT over SSE / TCPREADY
DCGS-MC / MCISREAdapter layerREADY
AFATDSVMF / Fire MissionREADY
STIX/TAXIICyber threat intelREADY
NGA / GISGeoJSON / KML / WMS / WFSREADY
DAF Battle NetworkATO / ACO / RAP / RetaskADAPTER READY
UDL (Space Force)Catalog / Conjunctions / GPS / Space WxADAPTER READY
FAA NOTAM SystemNOTAM API v1READY
TITANAdapter layerREADY

Integrated Services and Solutions LLC (ISS) — Service-Disabled Veteran-Owned Small Business (SDVOSB)

CAGE: 9VKK3  |  UEI: C7YDV3P8EHL7  |  Dr. Terry Flood, CEO

Open COP Map Open C-RAM Dashboard Open Drone Intel Maritime Domain Swarm C2 Kill Web Visualization 66-Module Overview Defense Briefing Setup Guide Back to Home
CHEATSHEET
ASK AI
PRESENCE
⚠ SANDBOX / TRAINING MODE — Live read-only data. Write commands are inhibited (train as you fight, missile button safed).