FAQ

What is Data as a Service (DaaS), and how does it apply to CUAS?

DaaS is a cloud-based solution that allows users to access, manage, and analyze data in real-time without requiring extensive on-site, customer owned hardware. In CUAS systems, DaaS is used to provide continuous monitoring and threat detection in airspace, ensuring drones are tracked and mitigated effectively.

What are the benefits of using DaaS for airspace monitoring?

DaaS provides cost-effective, scalable, and low-maintenance solutions. It ensures that airspace monitoring systems remain up-to-date with no need for you to manage hardware upgrades, allows for instant deployment, and offers seamless integration with other platforms, making it a flexible and future-proof solution.

How does Hidden Level’s DaaS-powered airspace monitoring differ from other CUAS solutions?

Hidden Level’s solution offers comprehensive real-time coverage, instant identification of operator locations, and the ability to leverage both live and historical data. Additionally, it allows for easy integration with existing security systems, custom alerting zones, and no hardware maintenance costs.

How does Hidden Level’s custom zones and alerting system improve airspace security?

By allowing users to set up custom zones within their airspace, Hidden Level ensures that specific areas of concern are monitored closely. The alerting system notifies security teams in real-time when any unauthorized activity occurs in these zones, providing an additional layer of security.

What is the advantage of leveraging historical data in CUAS systems?

Analyzing historical airspace data allows security teams to identify patterns in drone activity, better predict future threats, and improve their mitigation strategies.

What is unique about our technology?

Hidden Level technology is purpose and custom-built from the ground up to be specifically adept at providing the detection and tracking of multiple types of targets using multiple types of algorithms in a single package. Sensors have continuous frequency coverage across a wide bandwidth, extending beyond the standard ISM bands.

Our processing is Software Defined and can be adapted rapidly as missions and threats evolve. The use of different and flexible detection and tracking modalities across the frequency range allow our systems to adapt to the environment in which they are used.

Our RF detection algorithms are not impacted by encrypted links and are Title 18 Privacy Compliant. Hidden Level sensors can detect all target types: Crewed and uncrewed, cooperative or non-cooperative, RF-emitting or RF-silent.

Where is your technology made?

Our technology is designed, developed, and manufactured in the US.

Do you detect beyond DJI?

Yes. Our solution can detect drones of all types and manufacturers including homemade drones, non-emitting drones, fixed and rotary wing drones and those that do not broadcast remote ID.

How do you detect the operator?

By picking up the RF signals that the controller transmits to communicate with the drone, we can locate the operator.  Signal Detection: The drone controller sends commands to the drone through a radio signal, usually on specific frequencies like 2.4 GHz or 5.8 GHz, which are commonly used for remote control communications.  

Signal Analysis: The system analyzes the characteristics of the signal, such as frequency, signal strength, modulation type, and other patterns that positively match those used by drone controllers. Location Estimation: The system triangulates the signal source by measuring the angle of arrival (AOA) or time difference of arrival (TDOA) at each receiver to determine the approximate location of the drone controller / operator.

Does your system use demodulation?

Our system does not use demodulation. We assess the physical characteristics of the RF signal (protocol layer) to determine the type of craft (i.e. drone) and other location attributes like latitude, longitude, altitude, elevation, speed, etc.

What is the detection range?

The range can vary depending on various environmental factors. However, average detection ranges are 5km in an urban setting and up to 25km in rural settings.

What is the location accuracy?

A single-sensor's accuracy can best be described as 2-degrees (RSS 1-sigma). In a typical urban scenario, average location accuracy of 50m 50% SEP (Spherical Error Probable) assuming a 5km tracking range is expected.

How many threats can Hidden Level detect simultaneously?

There is no known limit to the number of simultaneous UAS detections using a sensor network of at least 2 sensors. A single sensor can track approximately 12 targets without affecting processing speed or having to add processing resources.

Learn More
What are the electrical power requirements?

Requirements vary slightly by sensor (Breaker, Surge, Crest). For the Breaker, each sensor requires 120VAC power, and draws approximately 3A. A site with 4 sensors would require 12A service - standard 15 Amp circuit would be sufficient although we prefer 20 Amp circuit for margin.

How do you ensure FCC compliance?

The FCC (Federal Communications Commission) regulates the transmission of radio frequency signals to prevent interference with other communication systems, such as cellular networks, Wi-Fi, radio, and emergency services. Since our system relies on passive RF sensing, it does not actively transmit RF signals, only receives and analyzes ambient signals. This does not impact the licensed or unlicensed frequency bands managed by the FCC, making it exempt from the strict transmission regulations that apply to active RF devices like radars or Wi-Fi routers.

How does Hidden Level support BVLOS operations?

Beyond Visual Line of Sight (BVLOS) operations require advanced monitoring capabilities since operators cannot visually track drones. Hidden Level’s system, powered by DaaS, enhances situational awareness, providing continuous real-time data that supports these operations by keeping airspace safe and secure.

What is the range of environmental conditions within which the system can operate?

Our hardware has undergone environmental testing by certified third-party labs to qualify the system's operational thresholds. The results support operation in the following conditions (these vary slightly by system):

Breaker:
Temperature: -40 to +60°C
Wind: 100+ mph
Humidity: Aggravated Humidity and Salt Fog (higher than found in nature)
Wind Blown Rain
EMI / EMC Compliant

Surge differences:
-32 to +49C
Wind: 80+ mph

***Note Surge AMS variant will have ranges similar to Breaker above

What are the data security controls?

Commercial data is hosted on Amazon Web Services. Access to these servers is controlled with a least-privilege paradigm, such as IP-address restrictions and multi-factor authentication via FIPS 186.5 compliant public/private key exchange.
The AMS API is secured using TLS 1.3 which provides secure communication of data using exceptional cryptographic algorithms, advanced ciphers, and has functions to ensure data integrity while mitigating the risk of tampering. API access and authentication are controlled via user-specific API tokens.

What are the hardware security controls?

Access to sensors is protected using encrypted tunnels and FIPS 186.5 compliant Digital Signature Key public/private cryptographic key exchange. Additional protection provided by site-local firewalls and network intrusion defenses that enforce strict IP-based access rules.

How is the interface accessed?

Hidden Level provides multiple user interface options. Hidden Level can provide our internally developed display which consists of a modern web-based interface accessible from the internet as well as a mobile application version supported on iOS and Android devices. Alternatively, you can integrate into a GIS system of your choice via a secure API connection.

How do I integrate or ingest your data?

Integrate using our open API, secured by FIPS 140-2 compliant cryptography or use our turnkey web interface.

Are other components required to deploy the service?

*Depending on the use case, RNC may be optional*
Our sensors are deployed with a companion Remote Node Control (RNC) box that is a configurable deployment solution to meet the needs of individual site requirements. It provides networking capability and security, power to the sensors, and other features such as health monitoring and remote power-cycle capability. The RNC box can also be configured with 4G LTE internet connectivity if hardline internet access is unavailable. The RNC box connects to a power source via a standard 120VAC outlet using a custom cable and connects to hardline internet via a standard RJ45 ethernet cable. The RNC then connects to the sensors via a custom power and network cable.