PER-002: Jason Trask — Field Awareness Officer
Draft UERQ-PLANS-62 Field / Mobile Application
“I don’t need to know who’s flying or why they were approved. I need to know: is that thing in the system, is it where it’s supposed to be, and if not, who do I call?”
1. Identity
| Field | Value |
|---|---|
| Persona ID | PER-002 |
| Name | Jason Trask |
| Age | 36 |
| Job Title | Airspace Operations Field Agent |
| Organization Type | Metropolitan Police Department, Aviation & Critical Infrastructure Unit: a 12-person specialized team embedded within a 3,000-officer department. Responsible for low-altitude airspace awareness, drone incident response, and coordination with state and county airspace authorities during major public events, dignitary visits, and critical infrastructure protection operations. The department holds an Authority entitlement on ATOMx through a data-sharing agreement with the state DOT (the root authority). |
| Persona Type | Primary (Field / Mobile Application — Situational Awareness) |
2. Professional Context
Responsibilities
- Maintains real-time situational awareness of drone activity within his assigned patrol area or event security perimeter using a mobile COP fed by Traffic Service track data.
- Identifies and classifies drone activity observed in the field: correlates visual sightings with tracks in the system to determine whether an observed aircraft is known (tracked) or unknown (not in the system).
- Reports visual sightings of unidentified drones that do not correspond to any existing track, contributing field observation data back into the Traffic Service for correlation and alerting.
- Receives and responds to pushed non-conformance alerts and operational event notifications (geofence breaches, altitude deviations, communication link losses) for aircraft operating within his area of interest.
- Escalates anomalous or threatening activity to the Airspace Operations Manager (Jessica Cooper, PER-004) at the TOC, who has authorization-level visibility and decision authority, or to the on-scene incident commander for law enforcement response.
Team & Reporting
- Reports to the Aviation & Critical Infrastructure Unit Sergeant. Works in 2-person field teams during routine patrols; scales to 4–8 agents during major events.
- Coordinates operationally with the state TOC (Jessica Cooper’s team, PER-004) via radio and TAK.
- Coordinates with on-scene patrol officers who may report drone sightings but lack ATOMx access.
- During joint operations (e.g., dignitary visit, stadium event), may work alongside Secret Service, TSA, or National Guard C-UAS teams who operate their own detection systems — Jason provides the ATOMx traffic picture as a complementary layer.
Operational Environment
- Primary: Mobile field operations — on foot, in a patrol vehicle, or at a fixed observation post within an event security perimeter. Uses a ruggedized tablet (Samsung Galaxy Tab Active or equivalent) as the primary display device. Must operate the interface one-handed or hands-free while maintaining visual contact with the sky, managing radio communications, and coordinating with patrol officers.
- Secondary: Field office or mobile command post (MCP) for pre-shift briefings, area-of-interest configuration, and post-shift reporting.
- Connectivity: Highly variable. Urban environments: generally reliable LTE/5G but with dead zones in parking garages, tunnels, and dense high-rise canyons. Event environments: cellular congestion during large public gatherings may degrade or eliminate data connectivity (may have FirstNet). Austere environments: rural critical infrastructure sites (dams, power substations) may have minimal cellular coverage.
- Weather exposure: Operates outdoors in all conditions. Screen must be readable in direct sunlight. Alerts must be audible over crowd noise, traffic, helicopter rotor wash, and radio chatter.
Technical Proficiency
- Proficient with CivTAK and similar map-based tactical awareness tools from prior military or law enforcement experience. Comfortable with ruggedized mobile devices, radio communications, and GPS-based navigation.
- Expects a map-centric interface with track symbology consistent with TAK conventions — blue for friendly/known, red for hostile/non-conforming, yellow for unknown/unverified.
- Not a software developer; cannot configure APIs, write queries, or troubleshoot data feed issues. Expects the system to surface actionable information without requiring data manipulation.
- Does not have aviation-specific training: unfamiliar with airspace classification, NOTAM formatting, or Part 107 operational rules. Needs plain-language status indicators, not aviation jargon.
Decision Authority
- Can independently define and adjust his area of interest within the jurisdiction boundary of his organization’s authority.
[UERQ-SYS-1837] - Can filter event subscriptions by type, severity, altitude band, and time window.
[UERQ-SYS-1843] - Can submit visual sighting reports into the system.
- Cannot approve, deny, modify, or rescind any flight authorization — Incident Monitor role explicitly prohibits this.
[UERQ-SYS-1836] - Cannot view operator personal data unless the tenant privacy configuration permits it (typically Limited or Anonymous for law enforcement field agents).
[UERQ-SYS-1845] - Cannot modify rules, jurisdiction boundaries, or authority configurations.
- Must escalate to the TOC (Jessica Cooper, PER-004) for any action that requires authorization-level decision authority, including requesting a rescind, but has the authority to tell an RPIC they’re shadowing to “knock it off”.
- Must escalate to the Unit Sergeant for any law enforcement response decision (detain, investigate, request FAA enforcement).
Regulatory Context
- Operates under the department’s UAS Response Protocol, which requires documented justification for all escalation actions and incident reports.
- Subject to 4th Amendment constraints: observing a drone in public airspace is lawful, but any enforcement action against the operator requires reasonable suspicion and is governed by departmental use-of-force and investigative policies.
- The department’s ATOMx access is granted through a data-sharing agreement with the state DOT authority tenant; the department’s Incident Monitor permissions are scoped to the municipality’s jurisdiction boundary.
- Jason does not hold an FAA pilot certificate and is not required to.
- Annual recurrency training on the department’s UAS Response Protocol and ATOMx field operations procedures.
3. Goals
Life Goals
- Become the department’s subject matter expert on low-altitude airspace operations and drone incident response.
- Advance to the Unit Sergeant role within the Aviation & Critical Infrastructure Unit.
- Build credibility with state and federal partners (TOC, FAA, Secret Service) as a reliable field-level information source.
Experience Goals
- Feel confident that if he can see a drone, he can determine within seconds whether it is tracked by the system and whether it is behaving normally — without needing to call the TOC.
- Never be the last to know: if a non-conformance event or geofence breach is happening in his area, the alert should reach his tablet before he hears about it on the radio.
- Not feel overwhelmed by information he cannot act on: he does not need rules, jurisdiction configurations, authorization details, or operator PII — he needs track status, position, and behavior.
- Trust that a “no tracks in area” display means no tracks, not “system disconnected and showing stale data.”
End Goals
- Correlate a visually observed drone with a system track within 15 seconds using the mobile COP: tap approximate location on the map, see if a track exists at that position and altitude.
- Receive non-conformance and geofence breach alerts on his tablet within 5 seconds of event detection
[UERQ-SYS-1841]with sufficient context to assess severity without switching screens. - Submit a visual or digital (RID) sighting report for an unidentified drone (position, approximate altitude, heading, description) in under 30 seconds using a streamlined mobile input.
- Escalate an anomalous track or unidentified sighting to the TOC with one tap, attaching the relevant track ID or sighting report.
- Know immediately when his data feed is degraded or disconnected — and clearly distinguish “no activity” from “no data.”
4. Frustrations & Pain Points
Current Pain Points
- No integrated field tool: currently juggles CivTAK for positional awareness, a separate radio for TOC coordination, and a phone for ad-hoc calls to the state aviation office — none of these systems share data.
- When a patrol officer calls in a drone sighting, Jason has no way to quickly check whether the drone is in the system without calling the TOC and waiting for a verbal response.
- Cannot determine in the field whether an observed drone is known, unknown, conforming, or non-conforming — every sighting requires a phone call to the TOC for correlation.
- No mechanism to submit field observations (visual sightings) into the system for correlation with existing tracks or for creating new track-initiation data.
- Post-shift reporting requires re-entering field observations, radio logs, and incident details into a separate reporting system — “reporting debt” that often takes 1–2 hours after an 8-hour field shift.
- Cellular congestion during large events renders the tablet useless at the moments when airspace awareness is most critical.
Workarounds
- Uses CivTAK peer-to-peer mesh networking to share position data with other field agents when cellular connectivity fails, but this does not include ATOMx track data.
- Takes photos of drones on his phone and texts them to the TOC analyst for manual correlation — a process that takes 3–5 minutes per sighting.
- Maintains a handwritten field log of drone sightings with timestamps, approximate positions, and descriptions because there is no digital reporting mechanism on the tablet.
- Pre-downloads satellite imagery of the event venue to CivTAK so he has a map even if connectivity drops — but without track data, the map is just terrain.
Unmet Needs
- A mobile COP that displays Traffic Service track data on a map interface consistent with TAK conventions, optimized for one-handed tablet operation in field conditions.
[UERQ-SYS-1730, UERQ-SYS-1662] - Track correlation capability: tap a location on the map and see whether any track exists within a configurable proximity radius, with track status (known/unknown, conforming/non-conforming, trust score).
[UERQ-SYS-1816] - Visual sighting submission: a streamlined mobile form to report an observed drone that is not correlated with any system track — position (GPS from device or map tap), approximate altitude, heading, visual description, optional photo.
- Offline resilience: the ability to cache the last known COP state, get predicted position when there are gaps, continue receiving peer-to-peer position shares, and queue sighting reports for upload when connectivity restores.
- Clear, unmissable system health indication: a persistent status bar showing data feed health, staleness, and connectivity state — so “empty map” is never ambiguous.
[UERQ-SYS-1664, UERQ-SYS-1813(e)]
5. Safety & Operational Context
Safety-Critical Decisions — errors in classification, escalation, or situational awareness can result in missed security threats, false enforcement actions, or misdirected response resources.
Safety-Critical Decisions
- Classifying a visual sighting as “known/tracked” vs. “unknown.” If Jason incorrectly correlates a visual sighting with the wrong track (or fails to identify a non-correlated drone as unknown), the threat assessment is wrong. A genuinely unidentified drone near a protected venue may not be escalated.
[UERQ-SYS-1816, UERQ-SYS-1813] - Escalating to the TOC. Jason’s escalation triggers downstream action by Jessica Cooper (PER-004), who may issue a rescind notification, coordinate with airport authorities, or alert law enforcement aviation units. A false escalation wastes TOC resources and may cause an unnecessary rescind of a legitimate flight. A missed escalation leaves an anomalous situation unaddressed.
- Assessing alert severity in the field. When Jason receives a non-conformance alert
[UERQ-SYS-1838], he must rapidly assess whether the situation requires immediate law enforcement response or continued monitoring. The alert content[UERQ-SYS-1839]must support this assessment without requiring Jason to access additional screens or systems. - Reporting an unidentified sighting. Jason’s visual sighting report may initiate a track in the Traffic Service or trigger an alert to the TOC. An inaccurate position or altitude estimate in the report could misdirect response resources.
Time Pressure
| Context | Time Budget | Notes |
|---|---|---|
| Visual sighting correlation | 10–15 sec | Every second on the interface is a second not watching the sky |
| Non-conformance alert response | 15–30 sec | Alert must display with full context on a single screen. [UERQ-SYS-1841: 5-sec delivery for Critical] |
| Sighting report submission | 30 sec | Streamlined input; may need to submit while moving |
| Escalation to TOC | 5 sec | One-tap with automatic context attachment |
| Event-driven surge | 5–10 sightings / 30 min | Must support this tempo during dignitary visits or stadium events |
Information Needs During Stress
Where is the aircraft right now? (map position, altitude, velocity vector) Is the deviation increasing or decreasing? (trend indicator) What is the track’s trust score? Is this a high-confidence track or a noisy sensor return?
[UERQ-SYS-1813(g)] Are there other tracks in the vicinity? What is the track’s conformance status?Jason does not need during stress: operator identity, authorization details, rules engine configuration, jurisdiction boundaries, billing information, audit logs, system administration functions, or aviation-specific jargon (NOTAMs, airspace class designations, Part 107 references).
Failure Tolerance
- Cellular connectivity loss: This is not an edge case — it is a routine operating condition, especially during large events. The system must degrade gracefully: cache last known track positions with timestamps, display a prominent “OFFLINE” banner with last-sync time, and queue sighting reports for upload when connectivity restores. Jason must be able to distinguish “no tracks in area” from “no data.”
[UERQ-SYS-1664, UERQ-SYS-1813(e)] - Traffic Service degradation: If the Traffic Service enters degraded mode
[UERQ-SYS-1680], Jason’s COP is operating on incomplete data. A COP that shows fewer tracks than actually exist is dangerous — Jason may classify an area as “clear” when it is not. The degradation indication must be unmissable on a mobile screen in sunlight.[UERQ-SYS-1806] - Tablet failure or battery depletion: Jason falls back to radio communication with the TOC. The system must not depend on Jason’s device being continuously connected — the TOC (Jessica Cooper) must be able to see Jason’s area of interest status independently.
- FAS degradation: If the FAS enters degraded mode
[UERQ-SYS-1515], Jason does not directly feel this — he does not interact with the FAS. However, FAS degradation may mean that non-conformance alerts stop flowing. Jason needs indication that his alert feed may be incomplete.
Consequence of Error
- Missed unidentified drone near protected venue: Unauthorized drone near a dignitary, critical infrastructure, or major public event goes unescalated. Potential security incident, collision risk with manned protective aviation, public safety risk, organizational liability.
- False escalation causing unnecessary rescind: Incorrect identification triggers TOC to rescind a legitimate emergency services or commercial operation. Service disruption; potential safety impact if the rescinded flight was safety-critical.
- Stale COP trusted as current: Jason assesses area as “clear” based on 3-minute-old data due to undetected connectivity loss. Incident commander makes deployment decisions based on this assessment.
[UERQ-SYS-1813(e)] - Inaccurate sighting report: Incorrect position estimate misdirects response resources. Actual unidentified drone is not intercepted.
Training & Certification
- No FAA pilot certificate required (Jason is not an operator).
- Department requires completion of a 40-hour UAS Field Awareness certification course covering: drone visual identification (types, sizes, flight profiles), CivTAK/ATOMx mobile COP operation, visual altitude estimation techniques, sighting report procedures, escalation protocols, and legal authorities and constraints.
- Annual recurrency training on department UAS Response Protocol and ATOMx field operations updates.
- Quarterly joint exercises with the state TOC (Jessica Cooper’s team) simulating non-cooperative drone incursions during major events.
- Expects the system to use tactical display conventions consistent with CivTAK (track symbology, color coding, map orientation). Does NOT expect aviation-specific terminology.
6. Key Scenarios
Scenarios are documented as individual pages under the Key Scenarios section.
| Scenario | Status | Summary |
|---|---|---|
| SC-01: Pre-Event Setup | Routine | Area of interest configuration and COP initialization |
| SC-02: Track Correlation | Routine | Correlating a visual sighting with a known track |
| SC-03: Unidentified Drone | Exception | Reporting a drone with no matching system track |
| SC-04: Geofence Breach | Emergency | Non-conformance alert over a stadium |
| SC-05: Connectivity Loss | Emergency | Degraded cellular during a major event |
| SC-06: Motorcade Security | Draft | Placeholder — to be developed |
7. System Interaction Profile
Field COP — ruggedized 8-10" tablet. One-handed, sunlight-readable, glove-compatible. CivTAK integration.
Pre-shift config, post-shift reporting, incident review.
Session Pattern
| Phase | Platform | Duration | Activity |
|---|---|---|---|
| Pre-shift | Field office | 30–60 min | Area-of-interest config, event subscription setup, COP verification, offline pre-caching |
| Field shift | Tablet | 8–12 hours | Continuous passive monitoring with burst activity during sightings/alerts/escalations |
| Post-shift | Field office | 30–60 min | Incident report completion, sighting log review, shift handoff notes |
Session inactivity timeout
[UERQ-SYS-1964] is a significant concern: during passive monitoring periods, Jason may not interact with the tablet for 30+ minutes. The session must NOT time out during an active field shift. Active area-of-interest subscription should prevent auto-logout.Data Volume
- Receives real-time track updates for all tracks within his area of interest (typically 5–30 active tracks during a major event, 0–5 during routine patrol). Track update rate: 1 Hz per track
[UERQ-SYS-1817]. - Receives 0–10 event notifications per shift during routine operations; 10–50 during a high-activity event.
- Submits 0–5 visual sighting reports per shift.
- Does not access historical data in the field; historical review is a post-shift office activity.
Notification Needs
| Priority | Delivery | Examples |
|---|---|---|
| Critical | Immediate, audible + haptic, must cut through ambient noise | Geofence breach, comm link loss, emergency declared, proximity conflict [UERQ-SYS-1840(a), UERQ-SYS-1841: 5-sec] |
| Warning | Banner, within 30 sec | Non-conformance (parameter deviation), new track entering area, track status change [UERQ-SYS-1840(b)] |
| Normal | Queue, review at next break | Flight activation/termination, system degradation notice, TOC broadcasts [UERQ-SYS-1840(c)] |
System status (persistent indicator): Data feed health, connectivity status, last sync timestamp. Must be always visible, never buried in a menu. [UERQ-SYS-1664]
Collaboration Needs
- Real-time coordination with the TOC (Jessica Cooper, PER-004) via escalation mechanism and radio. Escalation must be one-tap with automatic context attachment (track ID, sighting report, event details).
- Needs to share his COP view or specific track information with his field partner and with patrol officers who do not have ATOMx access (screen share or verbal description).
- During joint operations: needs ATOMx track data integrated with or overlaid on CivTAK, which is the common operating picture for multi-agency tactical operations.
[UERQ-SYS-1662, UERQ-SYS-1730] - Does NOT interact with operators, authorities, or other organizations through the ATOMx system. All coordination is through the TOC or through law enforcement channels.
8. Traceability
| Field | Value |
|---|---|
| ConOps Actor(s) | Field Observer, Incident Monitor, Law Enforcement Liaison |
| IAM Role(s) | Incident Monitor (UERQ-SYS-1510c): receive operational event notifications within area of interest, view flight authorization status for flights in area, view event details and affected aircraft information. Cannot approve, deny, or modify authorizations. [UERQ-SYS-1836] |
Linked Requirements — Traffic Service
- UERQ-SYS-1662: TAK Protocol Support (CoT protocol for field applications)
- UERQ-SYS-1664: In-Band Status Flags (system health, data freshness, source connectivity)
- UERQ-SYS-1680: Degraded Mode Declaration
- UERQ-SYS-1730: In-Field Device Data Feed (CivTAK protocol support)
- UERQ-SYS-1738: Consumer Data Synchronization
- UERQ-SYS-1745: Uncertainty Growth Model (expanding confidence ellipse during staleness)
- UERQ-SYS-1752: Stale Track Handling
- UERQ-SYS-1805: Fusion Pipeline Failure Notification
- UERQ-SYS-1806: Fusion Pipeline Failure Consumer Guidance
- UERQ-SYS-1813: Fused Track Output Schema (track ID, position, velocity, status, staleness, trust score)
- UERQ-SYS-1814: Track Subscription Interface (geographic area subscription)
- UERQ-SYS-1815: Track Subscription Push Delivery (50ms push)
- UERQ-SYS-1816: Track Query Interface (query by track ID or geographic bounds)
- UERQ-SYS-1817: Track Update Rate (1 Hz minimum)
Linked Requirements — FAS (Incident Notification)
- UERQ-SYS-1836: Incident Monitor Role
- UERQ-SYS-1837: Incident Monitor Area of Interest
- UERQ-SYS-1838: Operational Event Types
- UERQ-SYS-1839: Event Notification Content
- UERQ-SYS-1840: Event Severity Levels
- UERQ-SYS-1841: Incident Notification Latency (5 seconds for Critical)
- UERQ-SYS-1842: Incident Notification Channels
- UERQ-SYS-1843: Event Subscription Filtering
- UERQ-SYS-1844: Incident Monitor Audit Trail
- UERQ-SYS-1845: Operator Privacy in Incident Notifications
- UERQ-SYS-1846: Cross-Authority Event Visibility
Linked Requirements — IAM
- UERQ-SYS-1510: Role-Based Access Control (Incident Monitor role, Authority-entitlement-gated)
- UERQ-SYS-1589: Permission Types (Incident Monitor permission type)
- UERQ-SYS-1590: Jurisdiction-Scoped Permissions
- UERQ-SYS-1648: Access Control & Data Filtering
- UERQ-SYS-1651: Geographic Filtering
- UERQ-SYS-1729: ABAC/RBAC Feed Filtering
- UERQ-SYS-1933: Session Management
Identified Capability Gaps
| Gap ID | Description |
|---|---|
| GAP-001 | Field Observer Visual Sighting Ingestion. Traffic Service defines ingestion from operators (UERQ-SYS-1721), third-party providers (UERQ-SYS-1722), and surveillance systems (UERQ-SYS-1723), but does not define a field-observer visual sighting ingestion path. A new requirement is needed. |
| GAP-002 | Mobile Offline Caching and Queued Upload. Traffic Service defines staleness indicators (UERQ-SYS-1813(e)) and degraded mode behavior (UERQ-SYS-1680), but does not define client-side requirements for offline caching, queuing of field reports, or pre-caching of area data. |
| GAP-003 | One-Tap Escalation to TOC. FAS defines Incident Monitor notification receipt (UERQ-SYS-1836–1844) but does not define a reverse-path escalation mechanism from field Incident Monitors to authority Tactical Controllers. |
| GAP-004 | Session Timeout Exception for Active Field Shifts. UERQ-SYS-1964 defines session inactivity timeout, but there is no provision for field shift sessions where the user may be passively monitoring for extended periods. An active area-of-interest subscription should prevent auto-logout. |
Linked Outcomes
To be populated during Outcome Registry development. Expected: Visual-to-track correlation time, Sighting report submission time, Alert-to-escalation time, Offline mode transition time, COP accuracy during degraded connectivity.
Application Screens
To be populated after Information Architecture is complete. Expected: Mobile Field COP (map view with track overlay), Track Proximity Query Result, Visual Sighting Report Form, Event Alert Feed, Escalation Confirmation, Area of Interest Configuration, Offline Status Display, Post-Shift Report Summary.
9. Revision History
This persona is hypothesis-based. It will be validated and revised when customer access becomes available per Section 3.3 of the Persona Template & Guidance document.
| Version | Date | Author | Changes |
|---|---|---|---|
| 0.2 | Apr 2026 | — | Reformatted from Jama import. Hextra shortcodes, corrected persona cross-references (PER-004 for Cooper, PER-003 for Okafor), renamed ATOMx to ATOMx. No content changes. |
| 0.1 | Feb 2026 | — | Created from internal knowledge extraction and Field Agent persona snapshot. Full template compliance. Four capability gaps identified. Pending customer validation. |
Last updated on