UNCLASSIFIED
UNCLASSIFIED

SHIELD/ATLAS — FEMA + TAK Bridge Adapter

ISS LLC · CAGE 9VKK3 · UEI C7YDV3P8EHL7 · Apex Accelerator brief

The brain, not the pipe.

FEMA already has the map (TAK / ATAK-CIV / Booz Allen Sit(x)). FEMA already has the boards (WebEOC). FEMA already has the framework (NIMS / ICS / NRF / 15 ESFs). What FEMA does not have is a single decision-support layer that fuses the federal data feeds, authors compliant outputs into the systems FEMA already runs, and respects the 10 Regions × 5 ICS echelons of authority. SHIELD/ATLAS is that layer.

What we feed in
  • NASA FIRMS · GOES-R FDC · NOAA HMS
  • NWS / NOAA alerts + forecasts
  • CDC SVI (AFN equity overlay)
  • FAA NOTAMs · AIS maritime
  • ATLAS cyclone / cascade / CBRN models
What we author out
  • OASIS CAP 1.2 + IPAWS profile
  • HSIN-CAP for sponsored CoIs
  • FEMA ICS-209 + WebEOC Fusion record
  • ESF-routed Resource Request Forms
  • WFDSS-compatible incident exports

Speaker notes

Open with the punchline so the room knows where you're landing. Sit(x) is the pipe; ATLAS is the brain. We are not asking FEMA to swap any tool. We are filling the analyst gap between the feeds FEMA already pays for and the boards FEMA already runs. The rest of the deck shows that gap closed at every echelon, with deep links to live working modules — not slides about future capability.

Deck map

Organized by ORG × ECHELON per Greg Funk standing rule. Every slide deep-links to the live ATLAS module that produces the data.

Speaker notes

Use this slide to set scope: fourteen content slides organized by the customer's own org chart, not ours. Every slide names the org and the ICS echelon it speaks to, so a Region IV deputy administrator and a fire IC both know which slides are for them. Two engagement tracks at the close: civil-side via Apex Accelerator into FEMA, DoD-side via CRADA into AFRL/RI or NIST PSCR. Skip slides freely; the deep links keep working out of order.

FEMA HQ / NRCCStrategic

Federal common operating picture from public feeds, on demand.

  • FIRMS + GOES-R FDC + NOAA HMS fused into a single national fire layer with ~5-min cadence over CONUS.
  • NWS active alerts and point forecasts polled on a 1-minute alert TTL, 10-minute forecast TTL.
  • Cyclone model produces TCCOR triggers, R34/R50/R64 wind radii, and storm-surge inundation against the active national track.
  • BASTION cascade flags secondary failures (power outage → wastewater → public-health) before they cross the JFO desk.

Speaker notes

NRCC's job is to maintain federal awareness, not to run the incident. ATLAS gives the watch officer a fused national picture without standing up a custom feed contract. We don't replace FEMA OCIO's ESRI infrastructure; we enrich it with three feeds OCIO doesn't have to procure.

FEMA Region (e.g., Region IV)Operational

Region-scoped fusion + WebEOC Fusion-shaped output the RRCC can ingest day one.

  • Geo-bounded queries by Region footprint return only what matters for that RRCC.
  • ATLAS publishes ICS-209s in the field shape Juvare WebEOC Fusion inbound boards typically consume; final mapping validated against the customer's WebEOC instance during pilot.
  • RRCC operators can pull or have pushed: ATLAS does not require Juvare to issue new credentials.
  • CDC SVI overlay on every shelter / staging / evacuation recommendation, so AFN populations are not an afterthought.

Speaker notes

Every RRCC runs WebEOC. We don't ask them to swap. ATLAS produces the record they were going to type by hand — already populated, already validated, ready to file. The integration is as light as paste-into-Fusion-board, and as heavy as a server-to-server inbound feed if the EOC's WebEOC operator wants it that way.

JFO ESF BranchesJoint Task

The 15 ESFs as routing infrastructure, not as posters on the wall.

  • Plain-English need ("we need 6 ALS ambulances for hospital evacuation") routes to ESF-8 with lead/support agencies and confidence score.
  • RRF (Resource Request Form) generated with escalation path — Local IC → County EM → State EOC → JFO ESF Branch → ESF Lead.
  • JFO Resource Unit Leader gets a document already aligned to the ESF lane, ready to log into WebEOC.
  • Coverage: ESF-1 (Transportation) through ESF-15 (External Affairs); lead and support agencies per the National Response Framework.

Speaker notes

The bottleneck at the JFO is not policy, it's documentation latency. Most RRFs are typed by hand, and the wrong ESF gets named because the requestor is a county EM director under pressure, not a federal-grade form-filler. ATLAS routes the request and produces the form. The JFO Liaison still owns the submission decision.

State EOCStrategic

One platform across the civilian-military seam.

  • Civilian ICS operators and military DSCA liaisons see the same Unified Command picture in /hurricane-simulation.
  • State Adjutant General's J3 staff and the State EM Director read the same map, the same TCCOR clock, the same SVI overlay.
  • Federal pre-positioning timelines display next to civilian evacuation timelines — no two-tool reconciliation.

Speaker notes

The state EOC is where DSCA goes well or poorly. The agencies that have run it well — Florida 2017 Irma, Texas 2024 Beryl — had a single COP across Title 10 and Title 32 forces, plus civilian EM. ATLAS is built so that picture exists by default, not as a one-off integration project per storm.

State EOCOperational

State-issued CAP/IPAWS messages, validated against the IPAWS profile before they go out.

  • State Warning Point composes alert; ATLAS validates against the IPAWS profile (event code, urgency/severity/certainty enums, polygon closure, headline length).
  • If the state holds a COG, ATLAS-composed CAP can be submitted unchanged to IPAWS-OPEN.
  • If the state does not, ATLAS still produces compliant CAP that the state's authorized originator can submit on the state's behalf.
  • 4 ready-built scenarios: Hurricane, Wildfire, CBRN/HAZMAT, Earthquake.

Speaker notes

Be precise here: ATLAS is not an authorized IPAWS originator and we do not claim to be. We are an authoring tool. A FEMA-designated COG (the state, the county, the tribal nation) submits. This separation is a feature — it keeps the legal authority where it belongs and reduces the customer's compliance lift.

County EM / Local ICTactical

Day-of-incident workflow without a procurement cycle.

  • Local IC drafts a CAP message in plain English; ATLAS validates and the State Warning Point sends.
  • Mass-care surge tracked in /api/ems/hospitals + /api/ems/units; reunification queries persist across shift change.
  • EMS handoffs logged for after-action review without a separate spreadsheet.
  • Free-tier on-ramp: counties without WebEOC contracts can still operate.

Speaker notes

This is the lane Apex Accelerator helps us reach: small county EM offices, tribal EM directors, regional health authorities. We don't compete with their existing tools; we fill the gap between dispatch and after-action that they currently fill with spreadsheets.

DoD DSCA LiaisonJoint

Title 10 and Title 32 forces reading the same picture as the EM director.

  • FEMA Mission Assignments and Pre-Scripted Mission Assignments tracked alongside ATLAS-flagged needs.
  • USNORTHCOM J3 sees TCCOR triggers fire at the same instant as the State EOC — no fax, no confirmation call.
  • BASTION cascade alerts arrive at the DSCA cell with named secondary impacts (power → wastewater → potable-water request likely in 18 hours).
  • National Guard CERFP / HRF tasking maps to ESF-8 / ESF-9 / ESF-10 lanes via the ESF router.

Speaker notes

The DSCA seam is where federalization disputes happen. ATLAS' contribution is removing the picture-disagreement layer of those disputes. Decisions still belong to humans; agreement on what's actually happening is now baseline.

Fire IC / NIFC GACCTactical

One detection layer; one document for WFDSS handoff.

  • FIRMS gives polar-orbiter coverage every ~3 hours; GOES-R FDC gives geostationary 5-minute cadence; HMS gives analyst-curated daily synthesis. ATLAS fuses all three.
  • Detections within ~1 km grid bucket are merged across sources; analyst sees one fused point with attribution to all sources that confirmed it.
  • WFDSS-compatible export: incident origin, date, unit ID, ownership, cause, attached detection set — JSON ready for WFDSS import.

Speaker notes

FIRMS has 3-hour latency and you can lose a fire start in that window. GOES-R FDC closes the gap to 5 minutes. The fire IC gets one fused layer instead of toggling between three browser tabs. WFDSS handoff is the moment of friction; ATLAS makes the handoff a file, not a re-key.

CISA / Lifeline OwnersSector

Cascade modeling for the seven Community Lifelines, not just one hazard layer.

  • BASTION engine maps a primary hazard (storm, earthquake, cyber event) to expected secondary failures across Lifelines: Safety & Security, Food/Water/Shelter, Health & Medical, Energy, Communications, Transportation, Hazardous Materials.
  • ESF-2 (Communications) and ESF-12 (Energy) routed automatically when cascade flags those lifelines.
  • HSIN-CAP outbox stages CRITICAL-INFRASTRUCTURE CoI messages for sector subscriber pull.

Speaker notes

CISA's Community Lifelines framework is the language federal partners now use for incident impact. ATLAS speaks that language natively. We are not replacing the Sector Risk Management Agencies; we are the analyst that spots the cascade before the SRMAs are paged.

HSIN Communities of InterestFederation

One outbox, four sponsored CoIs, sponsored DHS admin completes the link.

  • CoIs supported: EMERGENCY-MANAGEMENT, FIRE-SERVICE, PUBLIC-HEALTH, CRITICAL-INFRASTRUCTURE.
  • HSIN-CAP profile: standard CAP 1.2 + HSIN-COI / HSIN-CLASSIFICATION / HSIN-PROFILE-VERSION parameters.
  • Subscription manifest exposes the polling URL and CAP-retrieval URL pattern; DHS-sponsored HSIN admin completes the federation.
  • Classifications honored: Unclassified, Unclassified-FOUO, Unclassified-LES.

Speaker notes

HSIN is gated by sponsorship. We don't pretend otherwise. ATLAS stages the messages and exposes a manifest that an HSIN administrator can subscribe to. That is the cleanest, most boring, most defensible posture: no impersonation, no claimed credentials, no integration that breaks if DHS rotates a key.

TAK / Sit(x) operatorsTactical edge

Booz Allen Sit(x) is the pipe. ATLAS is the brain. We feed it.

  • Booz Allen Sit(x) explicitly invites bridge adapters: "third-party systems to send and receive data to Sit(x) groups via microservices."
  • ATLAS-fused detections, NWS warnings, cyclone TCCOR triggers, BASTION cascade alerts, and ESF-routed needs become tracks/overlays/chats inside the Sit(x) group the operator already has on their phone.
  • No new app on the operator's device. No re-training. No procurement cycle for tactical-edge users.
  • Multi-platform reach via Sit(x): ATAK (Android), iTAK (iOS), WinTAK (Windows), Web Dashboard.

Speaker notes

The Apex Accelerator conversation will hit this question: "we already have TAK." Excellent — that means the field is already wired. ATLAS becomes the bridge adapter that pumps decision support into the groups operators are already in. We do not compete with the COP; we are the analyst it has been waiting for.

What ATLAS is not (so we never get caught overclaiming).

We are not
  • FedRAMP-authorized, IL-5, FIPS 140-3 validated, or holding an ATO.
  • An IPAWS-OPEN authorized originator (we author, the COG submits).
  • A licensed Juvare WebEOC integration partner (we produce the Fusion record; the EOC's WebEOC operator wires the inbound).
  • A sponsored HSIN administrator (we stage; DHS sponsor completes the link).
  • A licensed WFDSS API client (we export; the fire IC imports).
We do not
  • Ask AI to author ballistic numbers.
  • Take humans out of lethal decision loops.
  • Use CAC, SIPRNET, or claim NIPRNET parity.
  • Replace TAK / WebEOC / ESRI / FEMA OCIO infrastructure.

Speaker notes

This is the trust slide. Put it in front of the audience early in any procurement conversation so they know we know our lane. Every "we are not" maps to a sponsored party that does hold that authority — FEMA-designated COG for IPAWS, Juvare for WebEOC, DHS for HSIN, USDA/NIFC for WFDSS. ATLAS doing the authoring layer means the customer keeps their authority chain intact and we don't trip a single ATO requirement.

How an Apex Accelerator + FEMA conversation moves forward.

  • Step 1 — Apex introduction to a FEMA Region Industry Liaison or ESF Branch lead. ATLAS demos the live operator surfaces (no slides required).
  • Step 2 — Region issues a no-cost Pilot Letter or Cooperative Research and Development Agreement (CRADA) for an exercise — not for live IPAWS, not for live WebEOC, just for the next FEMA Regional Exercise.
  • Step 3 — At the exercise: ATLAS feeds CAP drafts to the State Warning Point, ICS-209 records to the RRCC's Fusion board, ESF-routed RRFs to the JFO Logistics, and fused fire detections to the IC.
  • Step 4 — After-Action Report becomes the case study for a Region-funded production engagement under DHS S&T, FEMA Resilience, or a SBIR Phase II open topic.

Speaker notes

This is not an ask-for-money conversation. It is an ask-for-a-pilot conversation. The pilot is no-cost on FEMA's side, runs on FEMA's existing exercise calendar, and produces an AAR that turns into a production engagement. Apex Accelerator's value is the warm intro to the right Region Industry Liaison; we bring the working capability.

How a DoD-lab CRADA conversation moves forward.

  • Step 1 — Cold-route email to the lab's Office of Research and Technology Applications (ORTA) using the public T2 channel: AFRL/RI via AFTechConnect, NIST PSCR via the Technology Partnerships Office, USTRANSCOM T2 via Industry Engagement, DHS S&T via the Tech Transfer Program. No named-scientist cold emails — the ORTA routes inbound traffic to the right human.
  • Step 2 — 30-minute scoping call. Walk the live operator surfaces. Hand the ORTA a pre-drafted Joint Work Statement (15 U.S.C. § 3710a, 24-month period of performance, no funds requested, Unclassified only, lab-instrumented exercise as the integration milestone).
  • Step 3 — Lab counsel reviews. IP terms are standard CRADA: industry retains background IP; government gets a use-only license on joint inventions; prototype performance data is FOIA-protected up to five years under § 3710a(c)(7)(B). Target signature 6-8 weeks from initial contact.
  • Step 4 — At the lab exercise: ATLAS feeds CAP drafts, ICS-209 records, ESF-routed RRFs, and fused fire detections to the lab's instrumented test environment. Joint Test Report becomes contracting currency for a follow-on Prototype OTA, SBIR Phase III sole-source action, or Commercial Solutions Opening award.

Speaker notes

The CRADA path is parallel to, not a substitute for, the Apex Accelerator path. Civil-side moves through FEMA Region Industry Liaisons; DoD-side moves through federal lab T2 offices. Both produce the same artifact at the end — a Joint Test Report or After-Action Report that contracting officers will actually act on. Tier 1 targets are AFRL/RI (best DoD fit, software CRADAs are routine) and NIST PSCR (best civil-emergency fit, tech transfer IS NIST's mission). Tier 2 are USTRANSCOM T2 and DHS S&T FRG. Disclose SDVOSB-pending and the no-FedRAMP / no-IL-5 / no-ATO posture in the first email — the CRADA model is precisely what fits a software-only partner without those authorities, which is why the conversation works.

CHEATSHEET
ASK AI
PRESENCE
⚠ SANDBOX / TRAINING MODE — Live read-only data. Write commands are inhibited (train as you fight, missile button safed).