Counter-UAS Hardware Research Platform

BLADE-CUAS Governance Node

BLADE-CUAS = Beam-Layer Authority for Directed Engagements, Counter-UAS Node

A transportable governance node that arbitrates authority for Counter-Unmanned Aircraft Systems (C-UAS) operations under federal-SLTT shared jurisdiction. BLADE-CUAS does not detect, track, or mitigate drones directly: it sits between commercial detection sensors (radar, RF spectrum, EO/IR, Remote ID) and the human operators authorized to act, computing classification confidence, authority tier, engagement window, and court-admissible evidence chain.

Preliminary Design Phase (TRL 2-3 hardware / 3-4 simulation) · Sixth BLADE Platform · DOI 10.5281/zenodo.20299604

This is NOT a weapon and not a drone-mitigation effector. It is a passive governance layer, a hardware-enforced authority checkpoint between C-UAS detection sensors and the operators authorized to act. The platform extends the AUTHREX authority pipeline (validated on five operational BLADE platforms) into the multi-agency C-UAS authority structure established by Executive Order 14305 and the FY26 NDAA Title LXXXVI Safer Skies Act.

Launch Governance Simulator Zenodo Record Repository Evaluation Protocol
Type: Transportable C-UAS Governance Node Focus: Federal-SLTT Authority Arbitration · Multi-Sensor Trust Fusion · Court-Admissible Evidence Status: Preliminary Design Phase (TRL 2-3 hardware / 3-4 simulation) DOI: 10.5281/zenodo.20299604 Document ID: ICD-CUAS-001 v2.0

Key Contributions

  • Sixth BLADE platform, and the first to address the multi-agency authority arbitration mandated by Executive Order 14305 and the FY26 NDAA Title LXXXVI Safer Skies Act
  • Federal-SLTT authority handoff protocol: a formal HMAA tier extension encoding explicit T2 (SLTT-tier) and T1 (federal-tier) confirmation gates
  • Multi-modal sensor consensus for C-UAS classification: MAIVA quorum across radar, RF spectrum, EO/IR, ADS-B/Remote ID, and optional LIDAR with provenance-weighted Dempster-Shafer fusion
  • Court-admissible evidence chain design: ECDSA P-256 signed sensor inputs, prev-hash-linked audit ledger, and decision provenance aligned with the foundation requirements of Fed. R. Evid. 901, 902, and 803(6)
  • ROE-aware FLAME deliberation window that contracts under threat density and expands when classification confidence is below configurable thresholds
  • ADARA-extended spoofed Remote ID detection against RF spectrum and radar tracks, addressing documented off-the-shelf RID spoofing
  • Approximately 75% architectural reuse from the BLADE-EDGE governance core; nine-stage AUTHREX pipeline (SENSE through CARA)
  • Reference hardware approximately $43.5K typical ($35K-$55K range): Xilinx Kria K26 governance plane + NVIDIA Jetson AGX Orin fusion plane + TPM 2.0
9
Pipeline Stages
4
Authority Tiers
≤200ms
Classification Latency
4-8s
FLAME Window (T2)
≥3
Sensor Modalities
P-256
Evidence Signing
~75%
BLADE-EDGE Reuse
~$43.5K
Reference BOM
BLADE-CUAS Governance Node hardware render: a compact transportable metal enclosure with a hexagonal mesh intake, power button, three status LEDs, and a viewing window exposing the internal Jetson AGX Orin and Kria K26 compute boards.
BLADE-CUAS Governance Node: transportable MIL-STD-810G enclosure (NEMA 4X external rating), with the Jetson AGX Orin fusion plane and Kria K26 governance plane visible through the inspection window. Reference render; no hardware build is implied.

Research Mission

BLADE-CUAS is a research effort to answer a question the commercial Counter-UAS market has left open: when multiple agencies share authority over the same airspace, who decides, on what evidence, and how is that decision proven afterward? The mission of this work is to specify a passive, hardware-enforced authority-governance layer that sits between existing detection sensors and the human operators authorized to act, so that every classification and every authority handoff is deliberate, auditable, and court-admissible.

Problem

Executive Order 14305 and the FY26 NDAA Title LXXXVI Safer Skies Act created a multi-agency C-UAS authority structure (federal departments coordinating with state, local, tribal, and territorial law enforcement) but no commercial system encodes who holds authority at which geofence, what evidence chain is required before mitigation, or how federal-SLTT handoff is performed when an incident crosses jurisdiction.

Gap

Commercial C-UAS hardware is mature for detection, identification, and mitigation. None of it provides the authority arbitration layer the post-EO 14305 environment now requires: no federal-SLTT arbitration, no verifiable multi-modal consensus gate, no court-admissible evidence chain, no ROE-aware deliberation window, and no Remote ID spoofing-detection layer.

Contribution

BLADE-CUAS extends the AUTHREX governance pipeline (validated on five operational BLADE platforms) into the C-UAS domain as the sixth BLADE platform. It contributes a four-tier HMAA model with federal-SLTT handoff, MAIVA Dempster-Shafer consensus across five passive sensor modalities, an ECDSA P-256 court-admissible evidence chain aligned with Fed. R. Evid. 901/902/803(6), an ROE-aware FLAME deliberation window, and ADARA-extended Remote ID spoofing detection. The platform reuses approximately 75% of the BLADE-EDGE governance core.

Current status. Preliminary Design Phase: TRL 2-3 for hardware, TRL 3-4 for the reference simulation. All performance figures on this page are design targets for the reference simulation. Hardware build and empirical sensor calibration are post-petition deliverables.

What the C-UAS Market Does Not Provide

The commercial Counter-UAS market is well populated with detection, identification, and mitigation hardware: radars, RF spectrum analyzers, EO/IR turrets, and an emerging class of kinetic and non-kinetic interceptors. None of these platforms address the authority arbitration layer that the post-EO 14305 regulatory environment now requires.

Five Documented Authority Gaps

BLADE-CUAS addresses all five gaps as a passive governance layer that integrates with existing detection hardware via standard interfaces (Ethernet, MAVLink, ASTM F3411 Remote ID). It does not replace radars, RF analyzers, EO/IR turrets, or mitigation effectors. It mediates the authority decisions that surround them.

Three Active Federal Anchors

Executive Order 14305 - Restoring American Airspace Sovereignty

EO 14305, signed 6 June 2025, expanded the C-UAS authority framework. The order directs federal departments to coordinate on regulations governing detection, tracking, and mitigation of unauthorized UAS, and authorizes participation by state, local, tribal, and territorial (SLTT) law enforcement agencies under conditions to be specified by implementing regulations. The order frames C-UAS as a shared-authority problem that no single agency can solve alone. The coordinated-regulation requirement creates explicit demand for a governance reference architecture that encodes who has authority at which geofence, what evidence chain is required before mitigation, and how federal-SLTT handoff is performed when an incident crosses jurisdiction.

FY26 NDAA Title LXXXVI - Safer Skies Act (P.L. 119-60)

Signed 18 December 2025, the Safer Skies Act restructured the Joint Counter-Small UAS Office under section 912 into a task force with broader mitigation authorities and codified evidence-chain standards for C-UAS operations. The Act treats C-UAS evidence chains as a national-security concern: incidents that result in prosecution, civil enforcement, or international notification require a foundation of authenticated, tamper-evident records.

FEMA Counter-UAS Grant Program (P.L. 119-21 section 90005(a))

The FY26 Notice of Funding Opportunity is active with $500M authorized. Eligible recipients are SLTT agencies. Documented operational drivers include the FIFA World Cup 2026 (16 U.S. host cities), the America 250 celebrations (4 July 2026), and Super Bowl LX (Levi's Stadium, February 2026). The grant program creates immediate procurement demand for C-UAS systems whose authority models are compatible with SLTT operation and federal coordination.

Framing note. EO 14305 and the Safer Skies Act are framed throughout this work as enabling instruments that establish the multi-agency authority structure BLADE-CUAS is designed to support. No empirical claims are made about specific incidents, operations, or named officials.

National Importance

Unauthorized drone activity over airports, critical infrastructure, military installations, and mass-gathering events has moved from anomaly to routine. The detection problem is largely solved: radars, RF analyzers, EO/IR turrets, and Remote ID receivers are commercially mature. The unsolved problem is authority: across overlapping federal and state, local, tribal, and territorial jurisdictions, who is permitted to act on a given track, on what evidence, and how is that decision proven afterward.

2026 concentrates this challenge. A dense calendar of high-profile events - the FIFA World Cup across sixteen U.S. host cities, the America 250 celebrations, and Super Bowl LX - places large protected airspaces under shared federal-SLTT authority within a compressed window. Each event multiplies the number of agencies operating in the same airspace and the number of authority handoffs that must be performed correctly and on the record.

An authority-governance layer is what makes multi-agency Counter-UAS lawful, accountable, and defensible after the fact. Without it, coordinated operations rely on ad-hoc deconfliction and vendor-formatted logs that were never designed to satisfy an evidentiary standard. BLADE-CUAS is a research contribution toward closing that gap; it makes no empirical claims about specific incidents, operations, or named officials.

Cross-Domain Pipeline Portability

The BLADE-CUAS governance pipeline is architecturally the same pipeline specified for the BLADE-EDGE defense variant (DOI 10.5281/zenodo.19177472), with approximately 75% of the governance core reused unchanged. This cross-domain portability demonstrates that authority-governed autonomy - continuous sensor-trust fusion, graded authority with hysteresis, deliberation windows, and a cryptographic evidence chain - is a domain-agnostic principle rather than a domain-specific one. The C-UAS-specific work is the federal-SLTT tier extension, the multi-modal consensus weighting, the Remote ID spoofing-detection layer, and the court-admissible evidence design.

BLADE-EDGE (Defense)

Directed-energy weapon governance. EFFECTOR = weapons-release relay. Active authority over a physical effector with a hardware safety interlock. MIL-STD-810G. ~$139K reference BOM.

BLADE-CUAS (Counter-UAS)

Counter-UAS authority governance. NO EFFECTOR - passive and advisory-only. Computes authority tier, classification, and signed evidence for human and federal-SLTT decision-makers. MIL-STD-810G / NEMA 4X. ~$43.5K reference BOM.

Nine-Stage AUTHREX Pipeline, C-UAS Instantiation

BLADE-CUAS instantiates the full AUTHREX governance pipeline with C-UAS-specific roles for each stage. The pipeline runs once per detected track, with the FLAME stage opening a tier-dependent deliberation window before any mitigation authority is released.

01
SENSE
Radar, RF, EO/IR, RID, LIDAR ingest
02
SATA
Per-sensor trust scoring
03
ADARA
Spoof / decoy detection
04
IFF
Operator credentialing
05
HMAA
Tier arbitration
06
MAIVA
Multi-sensor consensus
07
FLAME
Deliberation window
08
ERAM
Engagement risk score
09
CARA
Recovery

Stage Definitions

StageRole in C-UASOutput
SENSEPassive ingestion of radar tracks, RF spectrum signatures, EO/IR object classification, ADS-B/Remote ID broadcasts, and optional LIDAR returns. Each input is timestamped and ECDSA-signed at acquisition.Provenance-tagged sensor frame
SATAPer-sensor trust scoring tau in [0,1] based on signal quality, sensor health, expected operating envelope, and recent drift. Sensors below threshold are excluded from consensus.Per-sensor tau vector
ADARAAdversarial / deception detection. Cross-checks Remote ID against RF spectrum signature and radar kinematics; flags inconsistency as spoofed RID. Detects decoy and ghost tracks.Adversarial confidence score
IFFOperator credential verification. Authenticates the human operator(s) currently logged in (federal, SLTT, dual-role) using mTLS + HSM-backed credentials. Determines authority ceiling.Operator role & ceiling
HMAATier arbitration. Combines threat classification, operator role, geofence policy, and ROE to assign the current authority tier (T3/T2/T1/T0).Active tier
MAIVAMulti-sensor consensus via Dempster-Shafer combination across sensor modalities. Requires minimum N=3 independent modalities for actionable classification.Consensus classification + confidence
FLAMEDeliberation window. Opens a tier-dependent window (4-8 s default at T2; immediate at T1 requiring explicit federal confirmation). Operator response gates downstream stages.Engagement permit / hold
ERAMEngagement Risk Assessment Model. Scores collateral risk, geofence proximity, operator certainty, and ROE compliance.Engagement risk score
CARARecovery. On misclassification (delayed sensor disagreement, post-event review, or operator override), CARA reverts state and emits a corrective audit entry.State recovery + audit entry

Federal-SLTT Tier Structure

BLADE-CUAS uses the four-tier HMAA authority model consistent with the AUTHREX reference architecture, with role bindings specific to the EO 14305 authority structure. Each tier prescribes the minimum operator credential required to release the next downstream action, and the minimum evidence chain that must be present in the audit ledger.

TierModeDescription
T3Autonomous MonitoringSystem tracks, classifies, and logs without human intervention. No mitigation authority. Used for commercial drones with valid Remote ID inside legal flight envelopes. All decisions written to audit ledger.
T2Supervised - SLTT TierSystem proposes a classification (e.g. spoofed RID, ambiguous track). SLTT operator (sheriff, state police, stadium security) acknowledges within the FLAME window (default 4-8 s). Acknowledgment releases the proposed action; non-acknowledgment defaults to no-action and a CARA recovery entry.
T1Confirmed - Federal TierMitigation requires explicit federal authority. Operator credential must validate against the federal-tier authority registry (DHS, DOJ, military per EO 14305 boundaries). FLAME window is shorter; ERAM score and full evidence chain are presented to the operator at confirmation.
T0ManualSystem halted; full human control. Used during system test, calibration, suspected compromise, or operator-initiated halt. Audit ledger continues to record sensor inputs but no automated proposals are emitted.

Geofence policy binding. Each operational geofence has a policy file specifying the default tier and the federal-SLTT handoff rules. Policy files are signed and versioned; the active policy version is recorded in every audit entry.

Reference Sensor Integration

BLADE-CUAS is passive: it consumes data from upstream detection sensors and does not transmit. The reference design integrates five sensor modalities through standard interfaces. Vendors named below are reference targets; the integration is interface-defined, not vendor-defined.

ModalityReference SensorInterfaceMAIVA Weight
RadarEchodyne EchoGuard (X-band MESA)Ethernet, UDP track stream0.30
RF SpectrumEttus B205mini-i (SDR) + directional antenna arrayUSB 3.0, IQ stream0.25
EO/IRFLIR Boson 640 + Sony IMX585 4KUSB 3.0, MIPI CSI-20.20
ADS-B / Remote IDuAvionix pingRX ProUART, ASTM F34110.15
LIDAR (optional)Livox HAPEthernet, point cloud0.10

Modality weights are reference defaults adjustable per geofence policy. MAIVA requires a minimum of three modalities to release a non-T3 classification; if fewer than three sensors report above their SATA trust threshold, the system holds at T3 and emits a degraded-input audit entry.

Court-Admissible Audit Design

The Federal Rules of Evidence, specifically the foundation requirements of Rules 901 (authentication and identification), 902 (self-authentication), and 803(6) (records of a regularly conducted activity), establish what an audit chain must demonstrate to be admissible. BLADE-CUAS is designed to satisfy these foundation requirements; final admissibility is a judicial determination, not a system property.

Per-Input Signing

Every sensor input is signed with an ECDSA P-256 signature at acquisition time, using a hardware key resident in the TPM 2.0 secure element. The signed payload includes sensor identity, acquisition timestamp (UTC via PTP), sensor health byte, and raw measurement bytes. The signature establishes the foundation for Rule 901 authentication.

Hash-Chained Audit Ledger

Every audit entry references the cryptographic hash of the previous entry (prev_hash), forming a tamper-evident chain. The ledger is written to persistent storage with append-only semantics and a periodic external anchor (signed hash exported to a separate air-gapped store).

Decision Provenance

Each classification decision records the input vector, the trust vector across sensors, the alternative classifications considered by MAIVA, the active authority tier at decision time, the operator (if any) who acted, the FLAME window boundaries, the ERAM score, and the final outcome. This decision record supports Rule 803(6).

Admissibility caveat. Admissibility under the Federal Rules of Evidence is a judicial determination that depends on the specific facts of each case. BLADE-CUAS is designed so that the foundation for Rules 901, 902, and 803(6) can be supportable; no claim is made that any specific record produced by the system is per se admissible.

Defense-in-Depth Security

BLADE-CUAS uses a three-layer security architecture anchored in hardware. Because the node is passive and advisory, the security model protects the integrity of the authority computation and the evidence chain rather than gating a physical effector.

Layer 1: Hardware Root of Trust

Infineon SLB 9670 TPM 2.0 (FIPS 140-2 Level 2) holds the ECDSA P-256 signing keys. NXP EdgeLock SE051 secure element stores operator credentialing keys and mTLS certificates. Both are hardware-isolated from the ML / fusion plane.

Layer 2: Governance Enforcement

The AUTHREX pipeline runs as deterministic logic on the Kria K26 governance plane, isolated from the Jetson ML plane. The IFF stage authenticates operators and federal-SLTT handoff via SE051-backed mTLS. No classification above T3 is released without MAIVA multi-modal consensus.

Layer 3: Audit Chain

Per-input ECDSA P-256 signatures and a hash-chained, append-only ledger with periodic air-gapped anchoring. Decision provenance is recorded to support the Fed. R. Evid. 901 / 902 / 803(6) foundation.

Transportable Governance Node - Reference Design

Form Factor and Deployment

BLADE-CUAS is designed for roll-on / roll-off deployment at stadium perimeters, motorcade staging areas, critical infrastructure access points, and federal coordination centers. The reference enclosure is a MIL-STD-810G transportable case with a NEMA 4X external rating. It accepts 12 V or 24 V vehicle bus power and includes a four-hour LiFePO4 battery backup for setup and teardown periods.

Compute and Cryptographic Subsystems

SubsystemReference ComponentRole
Governance PlaneXilinx Kria K26 SOM (Zynq UltraScale+ class FPGA + ARM Cortex-A53)Hosts the AUTHREX pipeline as deterministic logic; reuses the BLADE-EDGE governance core with ~75% architectural reuse.
ML / Fusion PlaneNVIDIA Jetson AGX Orin 64GBRuns sensor fusion, ADARA neural inference, classification ensembles. ONNX/TensorRT export from the BLADE-EDGE PyTorch toolchain.
HSMInfineon SLB 9670 TPM 2.0 (FIPS 140-2 Level 2)Houses ECDSA P-256 signing keys for sensor inputs and audit ledger entries. Hardware-isolated from the ML plane.
Secure ElementNXP EdgeLock SE051Stores operator credentialing keys and mTLS certificates. Provides cryptographic foundation for IFF stage and federal-SLTT handoff.

Power and Thermal

Typical power draw 250 W; peak 400 W. Active cooling combines forced-air with a Peltier-augmented heat exchanger rated for 50 degrees C ambient. The LiFePO4 280 Wh battery is hot-swappable for continuous operations. Power conditioning accepts MIL-STD-1275 vehicle bus, civilian 12 V automotive, and 110 / 220 VAC via an external converter.

Standards Alignment

Power & Thermal Architecture

BLADE-CUAS is built for roll-on / roll-off field deployment, so the power and thermal design prioritizes multi-source input and uninterrupted operation through setup and teardown.

Multi-Source Power

MIL-STD-1275 vehicle bus (28 V), civilian 12 / 24 V automotive, and 110 / 220 VAC via external converter. Cascaded DC-DC conversion to 24 V / 12 V / 5 V / 3.3 V rails. Typical draw 250 W; peak 400 W.

Battery Backup

280 Wh LiFePO4 pack with integrated BMS, hot-swappable for continuous operations. Automatic switchover covers setup and teardown windows when vehicle or mains power is interrupted.

Power Protection

SiC TVS network for MIL-STD-1275 transient suppression. Reverse-polarity and overvoltage protection on the DC bus. A Jetson power-isolation MOSFET provides controlled brownout behavior under load.

Thermal Management

Forced-air cooling with a Peltier-augmented heat exchanger rated for 50 degrees C ambient, sealed IP-rated intake fans, and internal temperature sensors for closed-loop thermal control.

Advisory-Only by Design - No Effector Interlock

Unlike the other BLADE platforms, BLADE-CUAS has no actuator, no effector, and no safety relay. It does not detect, track, jam, spoof, or mitigate any aircraft. It is a passive governance layer: it consumes data from upstream detection sensors, computes an authority tier, a classification, and a cryptographically signed evidence record, and presents these to authorized human and federal-SLTT decision-makers. The decision to act, and any mitigation, remains entirely with authorized operators.

Why this matters. Counter-UAS mitigation authority in the United States is tightly restricted by statute and held by specific federal agencies. A passive, advisory-only architecture deliberately stays on the correct side of that line: BLADE-CUAS governs authority and evidence, not kinetic or electronic effects. It is the inverse of the SIL-3 effector interlock found in the active BLADE variants - the safety property here is that the system can never itself take a physical action.

System Schematic

Full subsystem node graph color-coded by type (MCU, Sensor, Actuator, Power, Module, Display). Shows the Kria K26 governance plane and Jetson AGX Orin fusion plane, the five passive sensor modalities (radar, RF SDR, EO/IR, ADS-B/Remote ID, LIDAR), the TPM 2.0 and secure-element cryptographic subsystems, power conditioning (Vicor DC-DC, 280 Wh LiFePO4, MIL-STD-1275 SiC TVS), thermal management, and the MIL-DTL-38999 external connector set (J1-J12) with data and power links.

BLADE-CUAS Governance Node system schematic: node graph showing all subsystems (Jetson AGX Orin ML/fusion plane, Kria K26 governance plane, radar, RF SDR, EO/IR, Remote ID, LIDAR sensors, TPM 2.0, secure element, power, and MIL-DTL-38999 connectors), color-coded by node type.
View Full Schematic (PDF) ↓ | SVG ↓

Reference Configuration Cost

The reference bill of materials targets approximately $43.5K for a typical configuration, with a range of $35K-$55K depending on sensor selection and redundancy. The figure is a design estimate for the reference architecture, not a quoted or built price.

SubsystemReference Cost
Governance plane (Kria K26 SOM + carrier)~$4.5K
ML / fusion plane (Jetson AGX Orin 64GB)~$2.0K
Cryptographic subsystems (TPM 2.0 + secure element)~$0.4K
Reference sensor stack (radar, SDR, EO/IR, RID)~$28K
Power, thermal, enclosure, connectors~$8.6K
Typical total~$43.5K

Sensor cost dominates the BOM. The governance node itself (compute + crypto + integration) is approximately $7K; the remainder is the reference sensor suite, which a deploying agency may already own. BLADE-CUAS is interface-defined, so existing detection hardware can be reused.

Physical Specifications

ParameterValue
Components130 (reference node graph)
Electrical connections65 (33 power + 32 data)
Mechanical connections117
Power draw250 W typical / 400 W peak
Battery backup280 Wh LiFePO4, hot-swappable
Power inputMIL-STD-1275 (28 V) · 12 / 24 V automotive · 110 / 220 VAC (external converter)
Enclosure ratingMIL-STD-810G transportable case · NEMA 4X external
ThermalForced-air + Peltier heat exchanger, rated to 50 degrees C ambient
EMI / emissionsMIL-STD-461G · FCC Part 15 (receive-only sensing)
Governance planeXilinx Kria K26 SOM (Zynq UltraScale+ class)
ML / fusion planeNVIDIA Jetson AGX Orin 64GB
CryptographyInfineon SLB 9670 TPM 2.0 (FIPS 140-2 L2) · NXP EdgeLock SE051 · ECDSA P-256
Governance pipelineSENSE → SATA → ADARA → IFF → HMAA → MAIVA → FLAME → ERAM → CARA
Authority modelFour-tier HMAA (T3 / T2 / T1 / T0), federal-SLTT handoff
Reference cost$43,500 typical (range $35K-$55K)

Browser-Based Six-Scenario Simulator

The BLADE-CUAS Governance Simulator runs the full nine-stage pipeline over six scripted operational scenarios plus a free-play mode, entirely in the browser with no backend. It is fully deterministic for a given seed: a re-run reproduces an identical decision trace and audit hash chain. Across a 300-run Monte Carlo batch (six scenarios, fifty runs each) the simulator records zero false tier elevations and zero false authority releases.

IDScenarioExpected Outcome
S1Stadium - compliant commercial drone (valid Remote ID, radar-corroborated)T3 - track and log
S2Stadium - spoofed Remote ID (RID claims a position the radar does not corroborate; mild PTP clock drift)T2 - SLTT defer
S3Motorcade - fixed-wing UAS, no Remote ID broadcast, federal-tier confirmation requiredT1 - federal confirm
S4False positive - bird flock or natural-source returns; cross-modality consensus converges via CARAT3 - CARA recover
S5Coordinated swarm probe - three simultaneous tracks; FLAME contracts under densityT1 - federal confirm
S6Ambiguous track - partial credentials, mixed signals; HMAA holds at T2 pending evidenceT2 - SLTT defer
Launch Governance Simulator

Validation Metrics

130
Reference components
65
Electrical connections (33 power + 32 data)
117
Mechanical connections
9
Pipeline stages
5
Sensor modalities fused
300
Monte Carlo runs (6 scenarios x 50)

Across the 300-run Monte Carlo campaign over the six reference scenarios, the governance pipeline produced zero false tier elevations and zero false authority releases. The audit chain uses SHA-256 hashing (FIPS 180-4) with per-input ECDSA P-256 signatures. These are simulation results for a reference design; no hardware has been fabricated.

C-UAS Governance Scenarios

Each reference scenario exercises a distinct authority-arbitration path through the nine-stage pipeline. Runs are deterministic for a given seed (xoshiro128** PRNG): fifty runs per scenario form the 300-run Monte Carlo batch, and every run reproduces a bit-exact decision trace and SHA-256 audit hash chain. The measured outcomes are tier-assignment correctness, false tier-elevation rate, and false authority-release rate.

ScenarioPrimary TriggerSATA / ADARA ResponseMAIVA ConsensusHMAA TierOutcome
S1 Stadium, compliantValid Remote ID, radar-corroboratedHigh trust all modalities; no deceptionCompliant commercialT3Track and log; no mitigation
S2 Stadium, spoofed RIDRID position not corroborated by radar; mild PTP driftADARA flags RID / radar kinematic inconsistencyAmbiguous; RID down-weightedT2SLTT acknowledges in FLAME window; defer
S3 Motorcade, no RIDFixed-wing UAS, no Remote ID broadcastTrust on radar / RF; no credential presentUncredentialed UAST1Federal confirmation; full evidence chain presented
S4 False positiveBird flock / natural-source returnsLow EO/IR classifier trust; no adversaryBelow N=3 actionable thresholdT3CARA reverts; degraded-input audit entry
S5 Swarm probeThree simultaneous tracks; high densityADARA assesses coordinated patternPer-track; FLAME window contractsT1Federal confirm; per-track evidence records
S6 Ambiguous trackPartial credentials, mixed signalsSATA mixed; ADARA inconclusiveBelow confidence thresholdT2HMAA holds at T2 pending evidence

Across the 300-run batch the pipeline produced zero false tier elevations and zero false authority releases. These are simulation results for a reference design; no hardware has been fabricated and no live track data has been used.

Role in the Governance Stack

BLADE-CUAS is the sixth instantiation of the AUTHREX authority-governance framework, extending the same governance pipeline already specified across the BLADE family into the Counter-UAS domain. The seven governance architectures (SATA, HMAA, ADARA, MAIVA, FLAME, CARA, ERAM) are reused in their C-UAS-specific roles, demonstrating that the framework is domain-portable rather than domain-specific. BLADE-CUAS reuses approximately 75% of the BLADE-EDGE governance core; the C-UAS-specific work is the federal-SLTT tier extension, the multi-modal consensus weighting, the Remote ID spoofing-detection layer, and the court-admissible evidence chain.

Related platforms: Rover Testbed (~$484) · UAV Platform (~$4,200) · BLADE-EDGE (defense, ~$139K) · BLADE-AV (automotive, ~$16K) · BLADE-MARITIME (maritime, ~$43K) · BLADE-INFRA (infrastructure, ~$12K) · BLADE-SPACE (orbital, ~$505K) · BLADE-CUAS (counter-UAS, ~$43.5K) · BLADE-AGENT-HSM (agentic AI, ~$199). Nine research platforms demonstrating governance stack portability across seven domains.

SDK Integration

The BLADE Governance SDK provides a unified API across all seven BLADE domains. The same blade_governance library drives defense weapons governance (BLADE-EDGE), autonomous-vehicle authority (BLADE-AV), maritime surveillance (BLADE-MARITIME), critical-infrastructure protection (BLADE-INFRA), orbital autonomy (BLADE-SPACE), and counter-UAS authority (BLADE-CUAS). Only the domain configuration file changes; for BLADE-CUAS the effector is null because the node is advisory-only.

blade_cuas.yaml Counter-UAS (passive)
domain: counter_uas
pipeline: SENSE -> SATA -> ADARA -> IFF -> HMAA -> MAIVA -> FLAME -> ERAM -> CARA

sensors:
  - id: radar
    type: echodyne_echoguard
    weight: 0.30
  - id: rf_spectrum
    type: ettus_b205mini_sdr
    weight: 0.25
  - id: eo_ir
    type: flir_boson_640
    weight: 0.20
  - id: remote_id
    type: uavionix_pingrx_pro
    weight: 0.15
  - id: lidar
    type: livox_hap
    weight: 0.10

effector:
  type: null            # advisory-only, no effector
  mode: passive_advisory

authority:
  tiers: [T3, T2, T1, T0]   # federal-SLTT handoff
  min_modalities_for_release: 3
  evidence: ecdsa_p256_hash_chain
  fre_foundation: [901, 902, 803_6]
integration_example.py Python
import blade_governance as bg

# Initialize with counter-UAS domain config
pipeline = bg.GovernancePipeline("blade_cuas.yaml")

# In the sensor-fusion loop:
while node_active:
    tracks = get_sensor_tracks()

    result = pipeline.evaluate(tracks)
    # result.trust       -> 0.71
    # result.authority   -> "T2"
    # result.deception_p -> 0.34 (RID spoof)
    # result.execute     -> False (advisory only)

    publish_to_operators(result)
    pipeline.append_audit(result)   # ECDSA P-256

Cross-Domain Portability. The blade_governance SDK uses the same evaluate()result API across all seven domains. Moving from an active effector domain to counter-UAS requires changing only the YAML configuration: the effector is set to null and the result carries an advisory authority tier rather than an actuator command.

Companion Paper & Documentation

The BLADE-CUAS companion paper and the complete reference documentation (build guide, configuration, electrical and mechanical maps, parts list, and system schematic) are deposited on Zenodo under DOI 10.5281/zenodo.20299604 (CC BY 4.0). The full file set is browsable in the repository.

DocumentDescription
Companion PaperAuthority Governance for Counter-Unmanned Aircraft Systems Operations Under Multi-Agency Authority Structures. Formal treatment of the governance pipeline, authority model, and evidence chain.
Build & Integration GuideReference build and integration guide (blade-cuas-GUIDE.md) for the reference configuration.
Full RepositoryAll twelve deposited files: simulation, companion paper, configuration / electrical / mechanical JSON, parts CSV, system schematic, citation, license, and metadata.

Technology Readiness

BLADE-CUAS is at TRL 2-3 for hardware (Preliminary Design Phase) and TRL 3-4 for the reference simulation (analytical and experimental proof-of-concept in a browser-native environment). All performance figures on this page are design targets for the reference simulation. Hardware build, empirical sensor calibration, and field measurement are post-petition deliverables.

Hardware - TRL 2-3

Reference configuration with parts list (PARTS.csv), electrical and mechanical connection maps (JSON), build guide, and a complete system schematic. No hardware has been fabricated.

Simulation - TRL 3-4

Browser-native nine-stage pipeline, six scenarios + free-play, deterministic seeded PRNG, SHA-256 audit chain verified byte-exact against FIPS 180-4, 300-run Monte Carlo batch.

Future Work

Carrier Board Fabrication

Controlled-impedance carrier PCB design, fabrication, and integration testing across the full 130-component reference node graph.

Sensor Calibration and HIL

Hardware-in-the-loop calibration of the five sensor modalities and Dempster-Shafer weight tuning against live track data.

Formal Verification

TLA+ specification of the four-tier authority state machine and the evidence-chain invariants, extending the BLADE-EDGE proof base.

Field Pilot

Controlled-range evaluation with a participating federal-SLTT partner, focused on the authority-handoff and evidence-export workflows.

Repository & Reproducible Artifacts

BLADE-CUAS provides complete reproducible artifacts enabling independent verification of the governance pipeline behavior, the reference hardware design, and the simulator. All files are published open-access on Zenodo (DOI 10.5281/zenodo.20299604) and mirrored in the repository.

Reference Simulation

Single self-contained HTML file implementing the full nine-stage pipeline, six scenarios + free-play, deterministic seeded PRNG (xoshiro128**), and a SHA-256 audit hash chain. Re-runs reproduce a bit-exact decision trace.

Reference Hardware

CONFIG / ELECTRICAL / MECHANICAL JSON, PARTS.csv reference BOM, build guide, and the full system schematic (SVG). Interface-defined integration, not vendor-locked.

Verification

300-run Monte Carlo batch (six scenarios, fifty runs each) records zero false tier elevations and zero false authority releases. SHA-256 audit chain verifies byte-exact against FIPS 180-4 reference vectors.

Standards Alignment

RTCA DO-365, MIL-STD-461G / 810G / 1275, FCC Part 15, ASTM F3411 (Remote ID), 14 CFR Part 89, DoDD 3000.09, NIST AI RMF 1.0, and Fed. R. Evid. 901 / 902 / 803(6).

View Repository Zenodo Record

Reference Artifacts

Complete BLADE-CUAS Governance Node reference package. All files are original work by Burak Oktenli (Georgetown University, M.P.S. Applied Intelligence), published under CC BY 4.0 on Zenodo (DOI 10.5281/zenodo.20299604).

Complete Zenodo Deposit Package (ZIP) - 12 files: companion paper, simulation, build guide, configuration, schematic, and metadata Interactive Governance Simulator (HTML) Companion Paper (PDF) Full System Schematic (SVG) Full System Schematic (PDF)

About This Project

The BLADE-CUAS Governance Node is part of the authority-governed autonomy research program by Burak Oktenli at Georgetown University (M.P.S. Applied Intelligence). It is the sixth domain instantiation of the BLADE governance pipeline, demonstrating that the same architectures developed across defense (BLADE-EDGE), automotive (BLADE-AV), maritime (BLADE-MARITIME), critical infrastructure (BLADE-INFRA), and orbital (BLADE-SPACE) reference designs apply to counter-UAS authority governance under EO 14305 and the FY26 NDAA Safer Skies Act.

Related architectures: SATA · HMAA · CARA · MAIVA · FLAME · ADARA · ERAM

View full research portfolio →

Citation

If you reference BLADE-CUAS in scholarly or policy work, please cite as follows.

Oktenli, B. (2026). BLADE-CUAS Governance Node: Authority Governance for Counter-Unmanned Aircraft Systems Operations Under Multi-Agency Authority Structures. Zenodo. DOI 10.5281/zenodo.20299604. ORCID 0009-0001-8573-1667.