UNCLASSIFIED
UNCLASSIFIED

CASCADING MULTI-DOMAIN DISASTER SIMULATION

HURRICANE ATLAS
SHIELD/ATLAS Civilian + Defense Mode — 3-Minute Scripted Demonstration
Category 4 Hurricane + Coordinated Cyberattack + Chemical Release
UNCLASSIFIED // FOR DEMONSTRATION PURPOSES ONLY
WEATHER CYBER DEFENSE HAZMAT / CBRN EMS / TRIAGE SUPPLY CHAIN COMMS MESH ICS / NIMS DSCA / C2 EQUITY / SVI

Scenario Setup

Location: Port City of Bayside (fictional composite — features of Galveston, Norfolk, and Tampa). Population 340,000. Coastal urban terrain. Naval Station Bayside (3,200 personnel) is co-located on the eastern waterfront. Critical infrastructure includes the Port Authority, two hospitals, a water treatment plant, a chemical processing facility (ChemCo Industrial), and the regional power grid substation.

Date/Time: Hurricane season. Storm makes landfall at 0200 local. Cyberattack detected at 0215. Chemical release at 0245. Full cascade by 0300.

Operational Framework: FEMA NIMS/ICS for civilian response. DSCA (Defense Support to Civil Authorities) for military support. Unified Command at the Bayside EOC. SHIELD/ATLAS running in dual-use mode — civilian ICS operators and military liaison operating on the SAME platform simultaneously.

Threat 1: Hurricane MARA (Cat 4)

  • Sustained winds: 140 mph, gusts to 165 mph
  • Storm surge: 12-16 feet on eastern waterfront
  • Rainfall: 18-24 inches in 12 hours
  • Projected infrastructure impact: 60% power loss, 40% road network impassable
  • Pre-positioned shelters: 8 locations, capacity 12,000
  • Evacuation compliance: estimated 72% (95,000 remain in impact zone)

Threat 2: Coordinated Cyberattack

  • Target: City power grid SCADA systems + water treatment PLCs
  • Vector: Pre-positioned malware activated during storm confusion
  • Effect: Grid substation forced offline (cascading to hospitals on generator)
  • Water treatment plant loses automated chemical dosing
  • Attribution: Nation-state actor (APT group TEMPEST BEAR)
  • Secondary objective: Degrade military installation readiness during DSCA

Threat 3: Chemical Release

  • Source: ChemCo Industrial — chlorine gas storage compromised by storm damage + power failure
  • Release: Uncontrolled chlorine gas plume, wind-driven toward residential zone
  • Affected population: Estimated 8,000 in plume path
  • Shelter-in-place vs. evacuation decision required
  • Complication: Flood waters blocking primary evacuation routes
  • First responder PPE: Level B required (SCBA + chemical splash protection)

PHASE 1: THE CONVERGENCE

0:00 – 0:50
Narrator "Zero-two-hundred local. Hurricane MARA makes landfall at Bayside. Category 4. 140 mile-per-hour sustained winds. Twelve-foot storm surge rolling over the eastern waterfront. But SHIELD/ATLAS has been watching this storm for 72 hours — and the platform isn't reacting. It's already three steps ahead."
EOC Watch Officer (Screen: ATLAS WEATHER Module) "ATLAS WEATHER has been tracking MARA since it was a tropical depression. 72 hours ago, GUARDIAN auto-escalated our threat posture from GUARDED to HIGH based on NWS track confidence exceeding 80% for direct landfall. BASTION ran the infrastructure cascade model — predicted 60% power loss, 40% road network degradation, and flagged ChemCo Industrial as a secondary hazard because their chlorine storage is in the 12-foot surge zone. That flag went to FIRE, HEALTH, and EMS automatically."
Cyber Watch (Screen: ATLAS CYBER Module) "We have a problem. WATCHTOWER just detected anomalous network behavior on the city power grid SCADA network — pre-positioned malware activating during the storm. The Network Anomaly Detection module is showing C2 beacon traffic to a known APT TEMPEST BEAR infrastructure. This is a coordinated attack timed to the hurricane. I'm seeing the Ransomware Kill Chain at Phase 2 — they've moved from Prevent to Detect. The water treatment plant is also showing PLC anomalies."
Narrator "Two crises, one platform. The hurricane was predicted. The cyberattack was detected because WATCHTOWER was already monitoring during elevated threat posture. And the Event Bus just connected them — BASTION's infrastructure cascade model is now recalculating with the cyberattack as a compounding factor."
WEATHER:landfall_confirmedALL_MODULES { storm: "MARA", category: 4, surge_ft: 12, wind_mph: 140 }
GUARDIAN:threat_levelALL_MODULES { level: "SEVERE", triggers: ["cat4_landfall","infrastructure_cascade","population_at_risk"] }
BASTION:cascade_modelMETRO, SUPPLY, EMS, FIRE, ICS { power_loss: "60%", roads_impassable: "40%", secondary_hazard: "ChemCo_chlorine" }
WATCHTOWER:anomaly_detectedCYBER, GUARDIAN, BASTION, ICS { type: "scada_malware", target: "power_grid", attribution: "APT_TEMPEST_BEAR" }
CYBER:ransomware_phaseBASTION, GUARDIAN, COMMS { phase: "DETECT", assets_affected: ["grid_substation","water_treatment"], kill_chain_position: 2 }
BASTION:cascade_recalcALL_MODULES { power_loss_revised: "85%", hospital_generator_dependency: true, water_treatment_compromised: true }
SENTINEL:osint_surgeICS, ALERT, COMMS { social_media_volume: "spike", keywords: ["trapped","flooding","no_power","help"], geo_clusters: 14 }
SVI:equity_overlayICS, SUPPLY, EMS, AFN { high_vulnerability_zones: 6, population_at_risk: 28000, afn_population: 4200 }

What SHIELD/ATLAS Is Doing

  • WEATHER 72-hour predictive tracking auto-escalated threat posture before landfall — response was pre-staged, not reactive
  • BASTION Infrastructure cascade model predicted power loss, road degradation, AND identified ChemCo as a secondary hazard — 3 hours before the chemical release
  • WATCHTOWER Detected cyberattack during storm confusion because cyber monitoring was already elevated with the threat posture — not a separate decision
  • RANSOMWARE Kill chain automatically placed at Phase 2 (Detect) — containment playbook already queued
  • EVENT BUS Connected hurricane + cyberattack + infrastructure cascade in real-time — BASTION recalculated power loss from 60% to 85% accounting for the cyber component
  • SVI OVERLAY CDC Social Vulnerability Index automatically identified 6 high-vulnerability zones with 28,000 people + 4,200 access/functional needs population — equity-informed resource allocation from minute one
  • SENTINEL OSINT monitoring detected 14 geo-clustered social media distress signals — real people saying "trapped," "flooding," "no power"

What Other Platforms Are NOT Doing

  • No weather-to-infrastructure cascade modeling — weather app and infrastructure database are separate systems with no connection
  • No cyber monitoring during disaster response — cybersecurity team is a separate SOC, separate building, separate radio net, no shared picture
  • No automatic cascade recalculation when cyberattack compounds storm damage — power loss estimate stays at 60% even after the grid is hacked
  • No equity/SVI overlay — resource allocation is first-come-first-served, not vulnerability-informed. AFN populations are invisible
  • No OSINT integration — social media distress signals are being posted but nobody in the EOC is watching because "that's the PIO's job"
  • No secondary hazard prediction — ChemCo chlorine release will be a surprise, not a predicted event
  • No unified civilian-military picture — the military installation and the city EOC are operating from completely different systems

PHASE 2: THE CASCADE

0:50 – 1:45
EOC Watch Officer "BASTION's prediction just came true. ChemCo Industrial is reporting uncontrolled chlorine gas release — storm damage to the storage facility combined with power failure to the containment systems. ATLAS FIRE module has the plume model up already — wind is pushing it northwest toward the Riverside residential district. That's one of our SVI high-vulnerability zones — 4,800 residents, 600 with access and functional needs. And three of our evacuation routes are under water."
Incident Commander (Unified Command) "What are my options?"
TOC Operator "ODIN has three COAs for the chemical response — generated in 12 seconds. COA 1: Shelter-in-place for Riverside — IPAWS alert via ATLAS ALERT module, lowest risk to responders, but chlorine exposure continues for residents who can't seal their homes. COA 2: Partial evacuation via Route 7 — the only clear road — with ATLAS routing AFN transport resources to the SVI population first. Higher responder risk, but removes most vulnerable population from plume path. COA 3: Full evacuation with military vehicle support from Naval Station Bayside — DSCA request auto-generated, high-water vehicles from the installation can access flooded routes that civilian vehicles cannot."
Military Liaison (Same ATLAS Screen, Defense Mode Toggle) "I can confirm the installation has 12 high-water vehicles and a medical company available for DSCA. ATLAS already has them on the resource board — I can see the civilian resource request and our available assets on the same screen. Commander, I recommend COA 3. We can have vehicles at Riverside in 18 minutes."
Incident Commander "Approved. COA 3. Execute."

CIVILIAN ICS VIEW + MILITARY C2 VIEW — Same Platform, Same Data, Same Moment

ICS Operator sees: Unified Command structure, resource requests, shelter capacity, evacuation routing, IPAWS alerts, ESF assignments, ICS 201/209 forms auto-populating

Military Liaison sees: DSCA mission tasking, military asset availability, force protection status, installation readiness, OPORD-formatted taskings for vehicle dispatch

This is the dual-use moment. One platform. Two operational frameworks. Same data. Zero translation delay.

Multi-Domain Communications — Simultaneous Distribution
ATLAS → IPAWS/WEA: EMERGENCY — CHEMICAL RELEASE. CHLORINE GAS. RIVERSIDE DISTRICT. EVACUATION IN PROGRESS. MOVE TO HIGHER GROUND. AVOID ROUTE 3 AND ROUTE 12 (FLOODED).
ATLAS → SHELTERS (8): ACTIVATE CHEMICAL DECON PROTOCOLS. RIVERSIDE EVACUEES INBOUND. AFN TRANSPORT COORDINATED. ETA 25 MIN.
ATLAS → NAVAL STATION BAYSIDE: DSCA REQUEST APPROVED. DEPLOY 12X HIGH-WATER VEHICLES TO RIVERSIDE DISTRICT. GRID: [AUTO-POPULATED]. MISSION: EVACUATE CIVILIANS. ROE: SUPPORT ONLY.
ATLAS → EMS: MASS CASUALTY STAGING AT BAYSIDE MEMORIAL. TRIAGE CATEGORY: CHEMICAL EXPOSURE (CHLORINE). PRE-POSITION DECON AND ANTIDOTE.
ATLAS → FIRE/HAZMAT: LEVEL B ENTRY AUTHORIZED. PLUME MONITORING ACTIVE. CONTAINMENT TEAM TO CHEMCO INDUSTRIAL. WIND SHIFT ALERT SET.
FIRE:chemical_releaseHEALTH, EMS, ALERT, ICS, ODIN, SVI { agent: "chlorine", source: "ChemCo", plume_direction: "NW", pop_in_path: 4800 }
ODIN:coa_generatedICS, COMMS { count: 3, recommended: "COA3_full_evac_dsca", generation_time_sec: 12 }
AFN:transport_prioritySUPPLY, EMS { afn_population: 600, wheelchair_vans: 4, medical_transport: 2, priority: "FIRST" }
ICS:dsca_requestMILITARY_LIAISON, COMMS { type: "vehicle_support", vehicles: 12, mission: "civilian_evacuation" }
ALERT:ipaws_transmittedCOMMS, ICS, SENTINEL { format: "CAP_1.2", channel: "WEA+EAS", population_reached: 48000 }
EMS:mci_activatedSUPPLY, TEAM, FIRE { hospital: "Bayside_Memorial", triage_type: "chemical_exposure", decon_staged: true }
CYBER:containment_activeBASTION, GUARDIAN { scada_isolated: true, water_treatment: "manual_ops", kill_chain_phase: "CONTAIN" }

What SHIELD/ATLAS Is Doing

  • ODIN Generated 3 COAs for chemical evacuation in 12 seconds — including DSCA integration that a civilian-only system wouldn't even consider
  • AFN Automatically prioritized access/functional needs population for transport — 600 people who need wheelchair vans and medical transport moved FIRST, not last
  • ALERT IPAWS/WEA emergency alert transmitted in CAP 1.2 format — 48,000 cell phones received the warning simultaneously
  • ICS/DSCA Military DSCA request auto-generated and approved on the SAME platform the civilian IC is using — zero translation, zero delay, zero phone tag
  • EMS Mass casualty incident activated at Bayside Memorial with chemical-specific triage protocols — decon staged before patients arrive
  • CYBER Simultaneously containing the cyberattack — SCADA isolated, water treatment shifted to manual operations, ransomware kill chain moved to Phase 3 (Contain)
  • FIRE Hazmat team tasked with plume monitoring and containment, wind-shift alerts set to auto-notify if plume direction changes

What Other Platforms Are NOT Doing

  • No DSCA integration — someone has to call the military installation, explain the situation, fax a request form, wait for approval through the chain of command (hours, not minutes)
  • No AFN prioritization — wheelchair-bound residents, dialysis patients, and non-English speakers are evacuated last or not at all
  • No plume modeling integrated with evacuation routing — fire department has a plume model on one laptop, traffic management has routes on another, nobody connects them
  • No cyber awareness during disaster ops — the SOC is dealing with the cyberattack in isolation while the EOC doesn't know the power grid was hacked, not just storm-damaged
  • No auto-generated IPAWS alert — someone hand-types the alert, gets the format wrong, delays by 15-20 minutes
  • No simultaneous multi-agency tasking — fire, EMS, military, shelters, and hospitals are notified one at a time by phone
  • No ICS forms auto-populating — a planning section member is hand-writing the ICS 209 while the world is on fire

PHASE 3: THE RESPONSE

1:45 – 2:30
Narrator "Seventeen minutes after the chemical release, the response is already in motion across six agencies, two operational frameworks, and three simultaneous crises. Watch what ATLAS is doing that no one else can see."
EOC Watch Officer "SENTINEL OSINT just picked up something critical — a Reddit post with a photo showing a second chlorine tank at ChemCo that's visibly leaning. The user geo-tagged it. ATLAS cross-referenced with BASTION's infrastructure database — that's Tank 7, 2,000 gallons, and it's in the storm surge zone. If that one goes, the plume doubles. GUARDIAN just re-ran the probability model: 67% chance of secondary release within 90 minutes."
HAZMAT IC "I need to get a team to Tank 7 for emergency stabilization, but the access road is under four feet of water."
Military Liaison "ATLAS shows I have two amphibious vehicles already staged at the DSCA rally point. I can re-task them to ChemCo for your HAZMAT team. ATLAS is calculating the route now — 11 minutes through the flood zone."
EOC Watch Officer "Meanwhile — evacuation update: SUPPLY module shows Shelter 3 is at 94% capacity. ATLAS auto-redirected incoming buses to Shelter 5, which has 340 open beds and a medical staging area. AFN transport has moved 412 of the 600 access/functional needs residents. SCHOOL module confirms all three Riverside schools completed reunification — 1,200 students accounted for. And COMMS has been translating all IPAWS alerts into Spanish and Vietnamese for the Riverside community — our SVI data showed 38% non-English-speaking households."
Cyber Watch "Cyber update: Ransomware kill chain is now at Phase 4 — Eradicate. We isolated the SCADA systems, identified the malware variant, and the Asset Vulnerability Crosswalk confirmed this specific CVE was in the CISA Known Exploited Vulnerabilities catalog. Patch was available but hadn't been applied. WATCHTOWER has flagged the attack vector for the after-action review. Water treatment is stable on manual operations."
SENTINEL:osint_criticalFIRE, BASTION, GUARDIAN, ODIN { source: "reddit_geotagged", threat: "tank_7_compromised", volume_gal: 2000 }
GUARDIAN:secondary_release_probFIRE, ICS, ODIN { probability: 0.67, timeframe_min: 90, plume_impact: "doubled" }
SUPPLY:shelter_redirectCOMMS, EMS, TEAM { from: "Shelter_3_94%", to: "Shelter_5_340_beds", auto_routed: true }
AFN:transport_progressICS, EMS { moved: 412, remaining: 188, priority_medical: 23, eta_complete: "45min" }
SCHOOL:reunification_completeICS, COMMS { schools: 3, students: 1200, all_accounted: true }
CYBER:kill_chain_advanceBASTION, GUARDIAN { phase: "ERADICATE", malware_identified: true, cve: "CVE-2025-XXXX", in_kev_catalog: true }
COMMS:multilingual_alertALERT { languages: ["en","es","vi"], households_reached: 4800, method: "WEA+social+PA" }
INTEROP:edxl_resource_requestMUTUAL_AID { format: "EDXL-RM", requesting: "hazmat_teams", quantity: 2, urgency: "immediate" }

What SHIELD/ATLAS Is Doing

  • SENTINEL A Reddit post with a geo-tagged photo identified a second chlorine tank threat — OSINT saved lives by catching what physical sensors couldn't see through the storm
  • GUARDIAN Predicted 67% probability of secondary release within 90 minutes — incident commander can act on PROBABILITY, not wait for CERTAINTY
  • SUPPLY Auto-redirected shelter overflow from 94% capacity Shelter 3 to Shelter 5 — no buses circling full shelters, no confused evacuees
  • AFN Tracked every single access/functional needs evacuee by name: 412 of 600 moved, 23 medical priority remaining, ETA to completion
  • SCHOOL Reunification for 1,200 students across 3 schools confirmed complete — every child accounted for, parents notified
  • COMMS Multilingual alerts (English, Spanish, Vietnamese) auto-generated from SVI demographic data — 38% non-English households actually reached
  • CYBER Ransomware kill chain advanced to Eradicate while the disaster response continued — cyber and emergency ops running simultaneously on one platform
  • INTEROP EDXL-RM mutual aid request auto-formatted and transmitted for additional HAZMAT teams — standard format, machine-readable, instant

What Other Platforms Are NOT Doing

  • No OSINT-to-operations pipeline — the Reddit post exists but nobody in the EOC sees it for hours. Tank 7 fails. The plume doubles. People die.
  • No predictive secondary threat modeling — they'll find out about the second release when the sensors alarm, not 90 minutes early
  • No automated shelter capacity management — buses arrive at full shelters, turn around, waste 45 minutes, evacuees sit in chemical plume
  • No AFN tracking — wheelchair-bound residents, dialysis patients, and non-English speakers are a number in a spreadsheet, not a tracked mission
  • No school reunification integration — parents are calling 911 asking about their children while the EOC has no visibility
  • No multilingual capability — alerts go out in English only. 38% of Riverside households don't understand them.
  • No cyber awareness — the EOC still thinks the power outage is storm damage. They're not defending the water treatment plant because they don't know it's under attack.
  • No EDXL interoperability — mutual aid requests are made by phone, transcribed wrong, delayed by hours

PHASE 4: RECOVER & DOCUMENT

2:30 – 3:00
Narrator "Four hours after landfall. The storm is passing. The chlorine plume is contained — HAZMAT stabilized Tank 7 using military amphibious vehicles to reach the site through flood waters. The cyberattack is eradicated. 4,800 Riverside residents are safe in shelters. 1,200 students reunified with parents. Zero fatalities. And SHIELD/ATLAS is already doing what no other platform does: documenting everything for recovery, reimbursement, and the next event."
EOC Watch Officer "ATLAS has the full picture. DAMAGE module has 847 preliminary damage assessments geo-tagged and categorized. METRO dashboard shows infrastructure status across all sectors — 62% power restored, 3 of 7 water mains operational, 78% of road network passable. RECOVER module has already initiated the FEMA preliminary damage assessment workflow — ICS 209 is auto-populated and ready for submission. Grant alignment module is flagging this event against three active federal programs: FEMA EMPG, BRIC, and SHSP — documenting every dollar of cost avoidance in real-time."
Military Liaison "DSCA mission complete. 12 vehicles, 48 service members, 18 hours of support. ATLAS has the full documentation: mission authorization, resource expenditure, personnel hours, and outcome metrics — all formatted for the DSCA after-action report. And the installation maintained operational readiness throughout — GUARDIAN shows no degradation to force protection posture."
Narrator "This is what full-stack congruence looks like. One platform tracked a Category 4 hurricane, predicted infrastructure cascades 72 hours out, detected a coordinated cyberattack during the storm, managed a chemical mass casualty evacuation with equity-based prioritization, coordinated military support to civil authorities in real-time, and is now documenting every decision, every resource, every dollar for federal reimbursement and the after-action review. Thirty-two modules. Two operational frameworks. Three simultaneous crises. Zero stovepipes. Zero fatalities. That's not a product demo. That's a different category of capability."
DAMAGE:pda_completeRECOVER, ICS, METRO { assessments: 847, geo_tagged: true, categories: ["destroyed","major","minor","affected"] }
RECOVER:fema_workflowICS, GRANT { ics_209: "auto_populated", pda_submitted: true, grant_alignment: ["EMPG","BRIC","SHSP"] }
METRO:infrastructure_statusBASTION, RECOVER { power: "62%", water: "3_of_7", roads: "78%", hospitals: "2_of_2_operational" }
DSCA:mission_completeICS, TEAM { vehicles: 12, personnel: 48, hours: 18, documentation: "complete" }
GRANT:cost_avoidanceRECOVER { documented_costs: "$2.4M", programs: ["EMPG","BRIC","SHSP"], real_time: true }
CYBER:aar_readyGUARDIAN, ICS { attack_vector: "documented", kev_patch_status: "applied", lessons_learned: "queued" }

What SHIELD/ATLAS Is Doing

  • DAMAGE 847 geo-tagged damage assessments already collected, categorized, and formatted for FEMA preliminary damage assessment submission
  • RECOVER FEMA recovery workflow initiated automatically — ICS 209 auto-populated, PDA ready for submission, no manual data entry
  • GRANT $2.4M in response costs documented in real-time against three federal grant programs — reimbursement documentation happening DURING the response, not weeks later
  • METRO City-wide infrastructure dashboard showing recovery progress across all sectors — elected officials and public can see the status
  • DSCA Complete military support documentation: authorization, resources, hours, outcomes — formatted for DoD after-action reporting
  • CYBER Full cyber incident documentation: attack vector, CVE identification, KEV catalog cross-reference, patch applied, lessons learned queued for AAR
  • EXERCISE Every decision, communication, and resource movement is time-stamped in the Event Bus — the after-action review writes itself

What Other Platforms Are NOT Doing

  • No integrated damage assessment — assessments are on paper forms, entered into FEMA systems weeks later, missing geo-tags and photos
  • No auto-populated ICS forms — the planning section spent the entire incident hand-writing forms instead of planning
  • No real-time grant cost documentation — the finance section will spend 6 months reconstructing costs for FEMA reimbursement, losing 20-30% of eligible costs
  • No DSCA documentation — the military support happened but the paperwork trail is fragmented across two organizations' systems
  • No cyber-to-disaster connection in the AAR — the cyberattack and the hurricane response are reviewed by different teams as separate incidents
  • No single source of truth — the after-action review requires reconciling data from 8 different systems, 4 radio logs, and 3 agencies' notes
  • No lessons learned that actually transfer — the AAR goes in a binder on a shelf. ATLAS feeds it back into GUARDIAN's prediction models and EXERCISE scenarios for the next event

Incident Outcome Summary

0
Fatalities
4,800
Residents Evacuated
600
AFN Population Tracked
1,200
Students Reunified
32
Modules Active
3
Simultaneous Crises
72 hr
Predictive Lead Time
$2.4M
Costs Documented (Real-Time)

Full Capability Comparison

CapabilitySHIELD/ATLASLegacy / Separate Systems
Predictive weather-to-infrastructure modeling72 hours advance, auto-cascadeSeparate weather app + manual assessment
Cyber defense during disasterSame platform, simultaneous opsSeparate SOC, no shared picture
Chemical plume + evacuation integrationPlume model drives routing in real-timeTwo separate laptops, no connection
Equity-based resource allocation (SVI)Automatic, vulnerability-firstFirst-come-first-served or none
Access/functional needs trackingIndividual-level, real-time progressAggregate number, no tracking
Civilian-military dual operations (DSCA)Same platform, same data, same momentPhone call, fax, hours of delay
IPAWS/WEA alert generationAuto-formatted CAP 1.2, multi-lingualHand-typed, English only, 15-20 min delay
School reunification integrationReal-time status in EOC pictureSeparate school system, no EOC visibility
OSINT during crisis (social media)Reddit photo caught Tank 7 threatNobody watching, surprise failure
Shelter capacity managementAuto-redirect on capacity thresholdBuses arrive at full shelters, circle back
FEMA recovery documentationICS 209 auto-populated, PDA readyHand-written, weeks of data entry
Grant cost documentationReal-time, $2.4M captured during response6 months reconstruction, 20-30% loss
Multi-agency interoperability (EDXL)Machine-readable, auto-formattedPhone calls, transcription errors
After-action review dataComplete Event Bus timeline, auto-generated8 systems, 4 radio logs, 3 agencies' notes
Lessons learned transferFeeds GUARDIAN models + EXERCISE scenariosBinder on a shelf

Director's Notes — For Live Demonstration

  1. Start in civilian mode with WEATHER tab open showing the storm track. This grounds the audience in something they understand before introducing the complexity.
  2. The dual-use toggle is the signature moment. When the military liaison appears on the SAME screen the civilian IC is using — same data, different view — that's the moment nobody else can replicate. Hold that shot. Let it sink in.
  3. The SVI/equity overlay is the differentiator for civilian audiences. Federal grant reviewers and FEMA evaluators want to see equity-informed response. Nobody else has the CDC SVI data driving resource allocation in real-time.
  4. The OSINT-to-operations moment (Reddit catching Tank 7) is visceral storytelling. A civilian with a phone saved lives because ATLAS was watching social media. That's a story every audience remembers.
  5. The cyber-during-disaster narrative is the defense audience hook. Nation-state actors timing cyberattacks to natural disasters is a real and growing threat. Show that ATLAS handles both simultaneously — not as separate incidents.
  6. End with the $2.4M grant documentation number. For civilian audiences, this is the ROI. The platform pays for itself in one event through captured reimbursement that would otherwise be lost.
  7. For Sea Air Space (April 21): Emphasize the Naval Station DSCA angle and the cyber threat to port infrastructure.
  8. For PM C2 Transport (April 28-29): Emphasize the multi-domain transport coordination — evacuation routing, military vehicle dispatch, shelter logistics.

Video Producer Guide — Screen Grab Locations in ATLAS

Each shot maps to a specific ATLAS screen at https://shield-atlas-production.up.railway.app/dual-use-app. Civilian mode is default; defense mode requires gate password. Use Sandbox for synthetic data.

PHASE 1: THE CONVERGENCE (0:00 – 0:50) — 6 Screen Grabs

TimeScreenWhat to CaptureNavigation Path
0:00WEATHER ModuleHurricane track map showing MARA's path with cone of uncertainty, wind speed overlay, and 72-hour prediction arc. The platform already tracking before landfall.WEATHER tab → Storm Tracking panel
0:12BASTION Cascade ModelInfrastructure cascade visualization showing power grid, water, roads, and secondary hazards (ChemCo flagged in orange). The predictive chain: storm surge → power loss → containment failure → chemical release.INFRA tab → BASTION panel → Cascade Model view
0:22CYBER — WATCHTOWERWATCHTOWER insider/anomaly detection showing SCADA network alerts — C2 beacon traffic highlighted, APT TEMPEST BEAR attribution flag, Ransomware Kill Chain at Phase 2.CYBER tab → WATCHTOWER panel + Ransomware Kill Chain + Network Anomaly
0:30SVI Equity OverlayMap overlay showing CDC Social Vulnerability Index heat map over the city — 6 high-vulnerability zones highlighted, AFN population counts displayed. This is the equity-first visual.ANALYTICS tab → SVI Overlay → (or METRO with SVI layer)
0:38SENTINEL OSINT FeedOSINT panel showing social media distress signals — geo-clustered pins on map with keywords "trapped," "flooding," "no power." Real-time human intelligence from social media.INTEL tab → SENTINEL → OSINT Sources → Live Feed
0:45EVENT BUS CascadeEvent Bus showing 8 simultaneous cross-module events — WEATHER, GUARDIAN, BASTION, WATCHTOWER, CYBER, SENTINEL, SVI all firing in under 500ms. The visual proof of integrated architecture.Any tab → Event Bus panel (bottom) → Capture the full cascade

PHASE 2: THE CASCADE (0:50 – 1:45) — 7 Screen Grabs

TimeScreenWhat to CaptureNavigation Path
0:52FIRE — Plume ModelChemical plume overlay on city map showing chlorine dispersion path toward Riverside, wind direction indicator, population in plume path (4,800), and evacuation route overlay with flooded routes marked red.FIRE tab → HAZMAT panel → Plume Modeling view
1:00ODIN COA Generator3 COAs for chemical evacuation: shelter-in-place vs. partial evac vs. full evac with DSCA. Show the risk/impact matrix and the AFN prioritization built into COA 3. COA 3 highlighted as recommended.C2 tab → ODIN panel → COA Generator
1:08DUAL-USE TOGGLETHE MONEY SHOT: Split or toggle showing civilian ICS view (resource requests, shelter status, IPAWS) alongside military C2 view (DSCA tasking, vehicle dispatch, force protection). SAME DATA, DIFFERENT FRAMEWORK. Hold 4 seconds.Sidebar → Toggle civilian/defense mode → Show same incident from both views
1:18AFN Transport TrackerAccess and functional needs tracking panel showing individual-level progress: 412/600 moved, wheelchair vans dispatched, medical transport in route, remaining AFN population by need type.SUPPLY tab → AFN section (or dedicated AFN panel)
1:25ALERT — IPAWS PanelIPAWS alert composition showing auto-formatted CAP 1.2 message, multi-lingual versions (English/Spanish/Vietnamese side by side), WEA preview, and "48,000 reached" confirmation.ALERT tab → IPAWS panel → Active alerts
1:32ICS Forms Auto-PopulationICS 209 form auto-populated with incident data from all modules — no manual entry. Show the data flowing in from DAMAGE, EMS, SUPPLY, TEAM modules automatically filling the federal form.ICS tab → Forms section → ICS 209
1:40COMMS Multi-AgencyCommunications panel showing simultaneous message distribution to IPAWS, shelters, naval station, EMS, and HAZMAT — all from one COA approval. Timestamps showing sub-second distribution.COMMS tab → Message Queue → Outgoing

PHASE 3: THE RESPONSE (1:45 – 2:30) — 5 Screen Grabs

TimeScreenWhat to CaptureNavigation Path
1:48SENTINEL — Reddit AlertOSINT panel showing the geo-tagged Reddit post about Tank 7, cross-referenced with BASTION infrastructure database. The moment a social media post becomes actionable intelligence that prevents a secondary disaster.INTEL tab → SENTINEL → OSINT alert detail view
1:58GUARDIAN Probability ModelGUARDIAN showing secondary release probability at 67%, with time-to-failure estimate (90 min) and contributing factors. Predictive, not reactive. Commander can act on probability.INTEL tab → GUARDIAN → Risk Probability panel
2:08SUPPLY Shelter DashboardShelter capacity management showing all 8 shelters with occupancy bars — Shelter 3 at 94% (red), auto-redirect arrow to Shelter 5 (340 beds available, green). Bus routes auto-updated.SUPPLY tab → Shelter Management panel
2:18CYBER Kill Chain ProgressFull ransomware kill chain visualization showing progression through 5 phases: Prevent → Detect → Contain → Eradicate (current) → Recover. The 22-item checklist with completed items checked. CISA KEV cross-reference showing the CVE.CYBER tab → Ransomware Kill Chain panel
2:25SCHOOL ReunificationSchool reunification dashboard showing 3 schools, 1,200 students, all accounted for (green checkmarks). Parent notification status. This is the human moment — every child safe.COMMUNITY tab → SCHOOL panel → Reunification status

PHASE 4: RECOVER & DOCUMENT (2:30 – 3:00) — 4 Screen Grabs

TimeScreenWhat to CaptureNavigation Path
2:32DAMAGE Assessment MapCity map with 847 geo-tagged damage assessments — color-coded by severity (destroyed/major/minor/affected). The visual density of the assessment dots tells the story of the storm's impact.DAMAGE tab → Assessment Map view
2:40METRO Infrastructure DashboardCity-wide dashboard showing recovery progress: power 62%, water 3/7 mains, roads 78%, hospitals 2/2 operational. The recovery picture at a glance for elected officials and the public.METRO tab → Infrastructure Status dashboard
2:48GRANT Cost DocumentationGrant alignment panel showing $2.4M in documented response costs mapped to FEMA EMPG, BRIC, and SHSP programs — captured in real-time during the response, not reconstructed months later. This is the ROI moment.ANALYTICS tab → Grant Strategy section → Cost documentation
2:55Closing — Full MetricsWide shot of the outcome metrics: 0 fatalities, 4,800 evacuated, 600 AFN tracked, 1,200 students reunified, 32 modules active, 3 crises managed, $2.4M documented. Hold 5 seconds. This is the final frame.Main dashboard → Incident summary view

Production Notes for Video AI

  • All screens at https://shield-atlas-production.up.railway.app/dual-use-app — civilian mode is default, defense mode requires zero-trust access gate
  • Use ATLAS Sandbox mode for all captures to isolate from live data
  • The dual-use toggle at 1:08 is the single most important visual in this scenario — it visually proves what no competitor can claim. Give it 4+ seconds.
  • The SVI equity overlay at 0:30 is critical for civilian/FEMA audiences — this is what separates a C2 platform from an emergency management platform
  • The Event Bus cascades should show color-coded events from multiple modules firing simultaneously — this is the zero-stovepipe proof
  • Transition between phases with a brief fade and phase timer overlay to maintain the 3-minute pace
  • For the closing metrics shot (2:55), consider a slow zoom-out from the metrics to reveal the full ATLAS interface behind them — one platform, everything
  • Audio: Consider ambient storm sounds for Phase 1, escalating urgency music for Phase 2, resolving to calm for Phase 4
  • The green accent (#10b981) and storm purple (#6366f1) should be the dominant colors throughout

DSFR: Drone Swarm First Responders Integration

SHIELD/ATLAS coordinates multi-manufacturer drone swarms for emergency response — extending the hurricane scenario with autonomous aerial ISR.

Swarm Coordination Layer

  • Multi-manufacturer fleet: DJI recon + Skydio autonomous survey + thermal UAVs
  • Vendor-agnostic protocol translation via USEIF adapters
  • Automatic coverage optimization across 3+ simultaneous incident sites
  • Battery management & autonomous RTB scheduling

Single DFR vs. DSFR

  • DFR: 1 drone, 1 camera, 1 battery = single point of failure
  • DSFR: Multi-drone swarm = persistent coverage, multi-angle ISR
  • Single-brand fleets = vendor lock-in vulnerability
  • SHIELD/ATLAS = multi-manufacturer resilience coordination

Hurricane Scenario DSFR Tasks

  • Pre-landfall: Automated infrastructure survey (bridges, levees, power lines)
  • During: Chemical plume boundary mapping via thermal + gas sensor drones
  • Post: Damage assessment swarm covering 847 structures simultaneously
  • SAR: Thermal swarm searching flooded areas for survivors
Event Bus Integration: DSFR telemetry flows through the same event bus channels as military sensor data. Swarm status, coverage maps, and aerial imagery feed directly into the COP alongside ground sensors, weather data, and ICS forms. One platform, one operating picture.
CHEATSHEET
ASK AI
PRESENCE
⚠ SANDBOX / TRAINING MODE — Live read-only data. Write commands are inhibited (train as you fight, missile button safed).