PER-004: Jessica Cooper — Airspace Manager
Draft UERQ-PLANS-61 Authority Application
“If the drone flight isn’t Law Enforcement or doesn’t have an approved waiver — it shouldn’t be there. It would be nice to wipe those off the scope and focus on an actual track of interest.”
1. Identity
| Field | Value |
|---|---|
| Persona ID | PER-004 |
| Name | Jessica Cooper |
| Age | 38 |
| Job Title | Airspace Manager |
| Organization Type | State Department of Transportation, UAS Integration Office: 25-person bureau responsible for real-time airspace monitoring and compliance enforcement across a multi-county metropolitan area. Operates a centralized Tactical Operations Center (TOC) that monitors all authorized and detected drone traffic within state-managed airspace, coordinating with five county-level authorities, three airport operators, and one military installation. |
| Persona Type | Primary (Authority Application — Tactical Operations) |
2. Professional Context
Responsibilities
- Reviews and disposes the daily queue of flight authorization requests requiring manual authority decision — approving, denying, or requesting additional information.
- Monitors the live Common Operating Picture (COP) during operational hours, correlating authorized flight plans with real-time track data from the Traffic Service.
- Identifies non-conformance events (geofence breaches, altitude deviations, unauthorized vehicles) and initiates the appropriate response: operator notification, authority escalation, or emergency grounding (rescind notification).
- Exercises human judgment to override or uphold automated authorization decisions when edge cases exceed the rules engine’s coverage.
- Coordinates with county-level authorities (David Okafor’s counterparts, PER-003) during multi-jurisdiction events, emergency TFR activations, and cross-boundary compliance incidents.
Team & Reporting
- Reports to the State UAS Integration Director. Manages a shift team of 3 Tactical Controllers who share COP monitoring and manual review duties across a 12-hour operational window (6:00 AM – 6:00 PM, with on-call coverage for off-hours emergency events).
- Coordinates daily with county-level Jurisdictional Administrators (PER-003 persona) on authorization hand-offs, rule conflicts, and incident response. Works alongside 1 Traffic Data Analyst who monitors data quality, provider health, and track fusion performance.
- During emergencies, coordinates directly with law enforcement aviation units, airport tower supervisors, and fire service air operations.
Operational Environment
- Primary: Tactical Operations Center (TOC) — a dedicated facility with multi-monitor workstations (minimum three displays: COP map, authorization queue, and event/alert feed). High-bandwidth, low-latency network connection to the ATOMx platform.
- Secondary: Mobile laptop configuration for deployment to a county Emergency Operations Center (EOC) during major incidents. Requires the same operational view on a single screen.
- Does not operate from a personal mobile device; all operations require the full authority dashboard. Environmental: Climate-controlled office with controlled lighting to minimize screen glare. Noise-managed environment; critical alerts must use audible notifications that cut through ambient TOC noise.
Technical Proficiency
- Highly proficient with map-based situational awareness tools, radar/track display systems, and operational dashboards.
- Prior experience with FAA SWIM (System Wide Information Management) feeds and LAANC coordination portals. Comfortable with real-time data streaming interfaces, geographic filtering, and multi-layer map overlays.
- Not a software developer; cannot write queries, scripts, or API calls. Expects the system to surface actionable information without requiring manual data manipulation.
- Familiar with aviation terminology, airspace classification, track correlation concepts, and non-conformance assessment procedures.
Decision Authority
- Can independently approve or deny flight authorization requests within the state’s jurisdiction during manual review. Can issue a rescind notification (emergency grounding) for any active authorization within the state’s jurisdiction when an immediate safety threat is identified.
[UERQ-SYS-1419] - Can override automated rule decisions (approve a request that rules denied, or deny a request that rules approved) with documented justification.
- Cannot modify rules, jurisdiction boundaries, or delegation configurations — those are the Jurisdictional Administrator’s (PER-003) domain.
- Can suspend authorization processing for her jurisdiction for a specific date range (e.g., major public event).
- Cannot approve flights that violate active “required” category rules (per UERQ-SYS-1502: the system prevents this regardless of role).
- Must escalate to the State UAS Integration Director for: jurisdiction boundary disputes with other states, military coordination requests, and policy exceptions affecting multiple counties.
Regulatory Context
- State holds the root authority in the ATOMx tenant, with delegated authority granted to county-level jurisdictions.
- Jessica operates under the state’s UAS Integration Policy Framework, which requires documented justification for all manual overrides and rescind actions.
- Subject to state audit of authorization decisions quarterly. Must comply with FAA Part 107 operational constraints and cannot authorize operations that conflict with federal rules.
- Familiar with ASTM F3548 interoperability concepts for USS/USSP federation. Required to complete annual recurrency training on emergency airspace management and non-conformance response procedures.
3. Goals
Life Goals
- Advance to State UAS Integration Director within five years.
- Establish the state’s TOC as a model for real-time drone airspace management that other states and international authorities visit and replicate.
- Be recognized as a subject matter expert in tactical UAS conformance monitoring and non-cooperative vehicle response.
Experience Goals
- Feel confident that every blip on the COP is identified, attributed, and accounted for — no unknowns.
- Not feel overwhelmed by data volume: the system should surface “what needs my attention right now” without requiring her to scan every track manually.
- Feel that the tools support her decision speed — not slow her down with unnecessary confirmation dialogs, page loads, or context switches during time-critical events.
- Trust that when she issues a rescind notification, the operator receives it immediately and the system records every detail for the audit trail.
End Goals
- Review and dispose of all manual authorization requests in the queue within the jurisdiction SLA (4 business hours during office hours).
[UERQ-SYS-1413] - Identify a non-conformance event (geofence breach, altitude deviation, unauthorized track) and assess its severity within 30 seconds of the alert appearing on the COP.
[UERQ-SYS-1838, UERQ-SYS-1841] - Issue a rescind notification to an operator and confirm delivery within 60 seconds of the decision to rescind.
[UERQ-SYS-1419, UERQ-SYS-1474] - Correlate every active track on the COP with a valid, activated authorization — and immediately flag any track that has no matching authorization (non-cooperative/unidentified vehicle).
[UERQ-SYS-1411, UERQ-SYS-1641] - Generate a shift-end compliance summary showing all events, decisions, and overrides for handoff to the next shift team within 5 minutes.
4. Frustrations & Pain Points
Current Pain Points
- Data overload: too many tracks on the COP display without clear visual differentiation between authorized, pending, non-conforming, and unidentified traffic. Every blip looks the same, forcing Jessica to click on each one to determine its status.
- No integrated view linking the authorization queue to the live COP: she must switch between the manual review interface and the traffic map, losing situational awareness when she shifts context to approve a request.
- Non-conformance alerts arrive as undifferentiated notifications — a minor altitude deviation generates the same visual and audible alert as a complete geofence breach or an unidentified vehicle entering restricted airspace. Alert fatigue is a constant risk.
[UERQ-SYS-1840] - No way to quickly verify whether a track on the COP corresponds to an authorized flight without manually cross-referencing the authorization ID, operator identity, and operational volume. Current tools provide track data and authorization data in separate systems that do not cross-link.
- During multi-jurisdiction events, Jessica cannot see what neighboring authorities are doing in real time. She discovers conflicting actions (e.g., two authorities both responding to the same incident) through phone calls, not through the system.
- Manual authorization review queue has no prioritization: time-sensitive emergency services requests sit alongside routine commercial requests with no differentiation.
Workarounds
- Maintains a personal whiteboard listing all currently active authorizations by call sign and authorized volume, updated manually at the start of each shift, because the COP does not overlay authorization boundaries on the traffic map.
- Uses a separate messaging app (Signal group) with county counterparts for real-time coordination during incidents, because the authority dashboard has no inter-authority communication or shared status capability.
- Has created a personal severity classification spreadsheet to triage alerts, because the system does not differentiate event severity.
[UERQ-SYS-1840 addresses this gap.] - Records all rescind decisions on a paper log form (duplicate of the digital record) as a personal backup, because she does not trust the system’s audit trail completeness for post-incident investigation.
Unmet Needs
- A unified COP view that overlays authorized operational volumes on the live traffic map, with each track color-coded by conformance status: authorized-conforming, authorized-non-conforming, authorized-missing-track, and unidentified/non-cooperative.
- Intelligent, severity-tiered alerting that prioritizes critical safety events (geofence breach, unidentified vehicle in restricted airspace) over routine operational events (flight activation, normal flight termination).
[UERQ-SYS-1840] - One-click drill-down from any track on the COP to its linked authorization details: operator identity, authorized volume, conditions, remaining time, and conformance history.
- A shared situational awareness layer for multi-authority events: ability to see which authorities are actively responding to an incident, what actions they have taken, and whether a blanket denial or rescind has been issued by another authority for the same airspace.
- Real-time track-to-authorization correlation performed automatically by the system, with immediate flagging of unmatched tracks.
[UERQ-SYS-1411, UERQ-SYS-1641]
5. Safety & Operational Context
Safety-Critical Decisions — errors in non-conformance assessment, rescind decisions, or unidentified vehicle response can result in unauthorized airspace incursions, conflicts with manned aircraft, or missed security threats.
Safety-Critical Decisions
- Issuing a rescind notification (emergency grounding). Jessica decides to revoke an active authorization when she observes a safety-critical non-conformance (e.g., aircraft operating outside its authorized volume near a manned aircraft corridor). An incorrect rescind disrupts a legitimate operation; a missed or delayed rescind leaves a hazardous condition unaddressed.
[UERQ-SYS-1419, UERQ-SYS-1474] - Assessing non-conformance severity. When the system alerts a geofence breach or altitude deviation, Jessica must rapidly determine whether the deviation is a transient GPS error, a minor excursion that is self-correcting, or a genuine loss-of-control event requiring immediate response. The system must provide the data to support this assessment (position, velocity, deviation magnitude, trend).
[UERQ-SYS-1838, UERQ-SYS-1839] - Identifying and responding to non-cooperative/unidentified vehicles. A track on the COP with no matching authorization may be a data correlation failure, a hobbyist not in the system, or a genuinely hostile actor. Jessica’s response escalation — from monitoring to operator contact to law enforcement notification — depends on correct assessment.
[UERQ-SYS-1411, UERQ-SYS-1641] - Overriding an automated rule decision during manual review. When automated rules deny a request that Jessica believes should be approved (e.g., emergency services operating under unusual conditions), her override must be correct: a wrongful override grants access to restricted airspace.
[UERQ-SYS-1502, UERQ-SYS-1615] - Approving manual review requests in contested or sensitive airspace. During high-tempo operations (multiple simultaneous flights near critical infrastructure), each approval decision affects the density and complexity of the COP. Approving too many concurrent flights in a small area degrades her ability to monitor conformance.
- Approving or denying manual review requests. A wrongful denial blocks a time-sensitive public safety operation; a wrongful approval grants access to restricted airspace.
[UERQ-SYS-1413]
Time Pressure
| Context | Time Budget | Notes |
|---|---|---|
| Non-conformance assessment | 15–30 sec | Alert must display with sufficient context (position, authorized volume, deviation vector, trend). [UERQ-SYS-1841: 5-sec delivery for Critical] |
| Rescind decision and issuance | 30–60 sec | Minimal workflow: select authorization, confirm rescind, notification sent. No multi-page forms or re-authentication. [UERQ-SYS-1474: 30-sec threshold] |
| Manual review queue processing | 4 business hours SLA | Low pressure per item, but queue accumulates during high-traffic periods |
| Multi-jurisdiction emergency coordination | Minutes | Verify all affected authorities have activated restrictions, no conflicting authorizations remain |
| Shift handoff | 10–15 min | Transfer all active situation context, pending events, and open investigations |
Information Needs During Stress
Where is the aircraft right now? How far outside its authorized volume? Is the deviation increasing or decreasing (trend)? What is the aircraft’s velocity and heading? Are there other active flights in the vicinity? What are the closest conflict geometries? What is the operator’s identity and contact information (subject to tenant privacy configuration)?
[UERQ-SYS-1845] What is the authorization status — is it Activated, or has it already transitioned to another state?Jessica does not need during stress: historical analytics, rule configuration interfaces, billing data, provider health metrics, or system administration functions.
Failure Tolerance
- Traffic Service degradation (stale or missing track data): If the Traffic Service enters degraded mode
[UERQ-SYS-1680], Jessica needs an immediate, unmissable indication that the COP is operating on incomplete data. A COP that displays stale positions without warning is worse than a COP that shows “data unavailable,” because Jessica may make rescind or clearance decisions based on positions that no longer reflect reality. The staleness indicator[UERQ-SYS-1813(e)]on each track is essential. - Fusion pipeline failure: If the fusion pipeline fails completely
[UERQ-SYS-1805], the COP must clearly indicate that track data is unavailable. Jessica falls back to direct communication with county authorities and airport towers via phone/radio. The system must not display a partial COP that could be mistaken for a complete picture.[UERQ-SYS-1806] - FAS degradation: If the FAS enters degraded mode and cannot process new authorization requests
[UERQ-SYS-1515], Jessica needs to know that existing active authorizations are preserved[UERQ-SYS-1500]and that no new approvals are being issued. Her manual review queue will freeze; she needs clear indication of this state. - Loss of connectivity between TOC and ATOMx: Jessica must fall back to direct communication with field teams and county counterparts. The system should cache the last known COP state locally with a prominent timestamp. Session recovery upon reconnection must be fast — she cannot afford a full reload and re-authentication during an active incident.
Consequence of Error
- Missed non-conformance alert: An aircraft operating outside its authorized volume near a manned aircraft corridor or critical infrastructure goes undetected. Potential mid-air collision or security incident. Regulatory liability for the state.
- Incorrect rescind (false positive): A legitimate emergency services or commercial operation is grounded mid-mission unnecessarily. Service disruption; potential safety impact if the grounded flight was itself performing a safety-critical mission (e.g., medical delivery, firefighting observation).
- Unidentified vehicle not escalated: A non-cooperative drone operating in restricted airspace (military installation, airport approach path) is not flagged to law enforcement or airport authority in time. Potential collision risk with manned aircraft.
- Stale COP data trusted as current: Jessica makes a clearance or rescind decision based on track positions that are seconds or minutes old (without a staleness indicator). The consequence ranges from unnecessary action to failure to act on a real threat.
[UERQ-SYS-1813] - Override of automated denial without proper justification: If Jessica overrides an automated denial and the flight subsequently results in an incident, the override decision is subject to regulatory audit. Insufficient documentation or incorrect assessment creates personal and organizational liability.
Training & Certification
- No FAA pilot certificate required (Jessica is not an operator).
- State requires completion of ATOMx Authority Tactical Operations certification course (80 hours) before independent COP monitoring.
- Annual recurrency training on: emergency airspace management, non-conformance response procedures, rescind notification protocols, and multi-agency coordination.
- Quarterly tabletop exercises simulating non-cooperative vehicle incursions and multi-jurisdiction emergency response.
- Familiar with aviation terminology, airspace classification, radar/track display conventions, ATC coordination procedures, and ASTM F3411-22a Remote ID concepts.
- Expects the system to use standard aviation display conventions (track symbology, altitude readouts, velocity vectors) and to provide contextual help for ATOMx-specific concepts (conformance monitoring, trust scores, authorization lifecycle states).
6. Key Scenarios
Scenarios are documented as individual pages under the Key Scenarios section.
| Scenario | Status | Summary |
|---|---|---|
| SC-01: Morning Queue Review | Routine | Queue triage and COP initialization at shift start |
| SC-02: Non-Conformance Response | Emergency | Geofence breach near military restricted airspace, rescind issued |
| SC-03: Unidentified Track | Emergency | Non-cooperative vehicle detected in airport approach path |
| SC-04: Multi-Authority Emergency | Emergency | Wildfire TFR coordination across two county jurisdictions |
| SC-05: COP Data Degradation | Emergency | Traffic Service degradation during active operations |
7. System Interaction Profile
TOC: 3-display setup — COP map, authorization queue, event/alert feed. High-bandwidth, low-latency.
Single-screen layout combining COP, alert feed, and essential authorization functions for field deployment.
Session Pattern
| Phase | Platform | Duration | Activity |
|---|---|---|---|
| Shift start | TOC workstation | 30–45 min | Queue review, COP initialization, shift briefing |
| Nominal operations | TOC workstation | 10–11 hours | Continuous COP monitoring with burst activity during events |
| Shift handoff | TOC workstation | 10–15 min | Transfer active context, pending events, open investigations |
Session inactivity timeout
[UERQ-SYS-1964] is a significant concern: during passive COP monitoring, Jessica may not interact with the workstation for extended periods. Active COP streaming should prevent auto-logout. On-call after hours requires fast login and immediate session state restoration.Data Volume
- Monitors 20–60 concurrent active flights across the state during peak hours.
- Authorization queue receives 20–40 manual review requests per day across all county jurisdictions.
- Needs access to 7 days of track replay data for incident investigation.
[UERQ-SYS-1653, UERQ-SYS-1830] - Consumes real-time fused track updates at 1 Hz per active track.
[UERQ-SYS-1817] - Manages event notifications across 8 operational event types.
[UERQ-SYS-1838] - Requires track data from multiple providers (5+ concurrent data sources).
[UERQ-SYS-1640, UERQ-SYS-1642]
Notification Needs
| Priority | Delivery | Examples |
|---|---|---|
| Critical | Immediate, audible + visual override, persist until acknowledged | Geofence breach, unidentified track in restricted airspace, C2 link loss, emergency declared, rescind while flight active [UERQ-SYS-1840(a), UERQ-SYS-1841: 5-sec] |
| High | Banner, within 30 sec | Non-conformance (parameter deviation), conflict between operations, flight activation in area of interest, provider disconnection, new manual review request, auto-cancellation approaching [UERQ-SYS-1840(b)] |
| Normal | Queue/feed | Routine flight terminations, system health changes, authorization approaching expiration [UERQ-SYS-1840(c)] |
Collaboration Needs
- Needs shared situational awareness with county-level Jurisdictional Administrators (PER-003) during multi-jurisdiction events — preferably through cross-jurisdiction view
[UERQ-SYS-1591], currently supplemented by phone/messaging. - Needs to delegate individual manual review items to Tactical Controllers on the shift team and track their decisions.
- Needs to escalate unresolvable cross-jurisdiction conflicts to the State UAS Integration Director.
- Needs to share COP event data with law enforcement and airport authorities during non-cooperative vehicle incidents — currently via phone/email, ideally through webhook integration to external systems.
[UERQ-SYS-1665, UERQ-SYS-1842(b)] - Does NOT interact with operators directly through the system: denial reasons are concealed per UERQ-SYS-1509. Rescind notifications are system-generated; Jessica does not compose the message content.
8. Traceability
| Field | Value |
|---|---|
| ConOps Actor(s) | Airspace Manager, Authority Tactical Controller, Incident Monitor |
| IAM Role(s) | Authorizer (UERQ-SYS-1510a): approve/deny authorization requests, issue rescind notifications. Incident Monitor (UERQ-SYS-1510c): receive and respond to operational event notifications. Cross-Jurisdiction Viewer (UERQ-SYS-1591): view activity across county boundaries within the state tenant. |
Linked Requirements — FAS
- UERQ-SYS-1446: Authority Application Interface
- UERQ-SYS-1413: Manual Review Routing
- UERQ-SYS-1418: Flight Assessment Briefing Generation
- UERQ-SYS-1419: Manual Authorization Withdrawal (Rescind)
- UERQ-SYS-1421: Authorization State Change Notification
- UERQ-SYS-1468: Preemption Conflict Notification
- UERQ-SYS-1474: Preemption Notification Sent
- UERQ-SYS-1476–1477: Priority-based Preemption
- UERQ-SYS-1502: Authorization Decision Integrity
- UERQ-SYS-1509: Denial Reason Concealment
- UERQ-SYS-1615: Profile Action Segregation
- UERQ-SYS-1836–1846: Incident Monitoring (all)
- UERQ-SYS-1411: Missing Track Alert Enablement
- UERQ-SYS-1423: Fallback Activation via Conformance Monitoring
- UERQ-SYS-1500: State Preservation on Failure
- UERQ-SYS-1503: Maintenance Mode Notification
Linked Requirements — IAM
- UERQ-SYS-1510: Role-Based Access Control (Authority roles: Authorizer, Incident Monitor, Jurisdiction Viewer)
- UERQ-SYS-1589–1593: Authority Permissions & Capabilities
- UERQ-SYS-1591: Cross-Jurisdiction View Permission
- UERQ-SYS-1606: Authority Action Audit Trail
- UERQ-SYS-1970–1973: Organization Entitlement Framework (Authority entitlement)
Linked Requirements — Traffic Service
- UERQ-SYS-1616–1617: Real-Time Performance and End-to-End Latency
- UERQ-SYS-1638: Trust Scoring
- UERQ-SYS-1640–1641: Multi-Source Data Fusion and Track Matching
- UERQ-SYS-1643: Source Attribution
- UERQ-SYS-1648–1651: Access Control and Geographic Filtering
- UERQ-SYS-1653–1655: Historical Data, Retention, and Query
- UERQ-SYS-1662: TAK Protocol Support (CivTAK for field integration)
- UERQ-SYS-1663–1666: Notification Mechanisms (in-band, webhook, dashboard)
- UERQ-SYS-1677–1680: Degradation Detection and Degraded Mode
- UERQ-SYS-1725: Data Interface Specification
- UERQ-SYS-1734: Disconnect Detection and Alerting
- UERQ-SYS-1795–1796: MLAT and Mode S Data Ingestion
- UERQ-SYS-1805–1806: Fusion Pipeline Failure
- UERQ-SYS-1813–1817: Fused Track Output and Subscription
Linked Outcomes
To be populated during Outcome Registry development. Expected: Non-conformance detection-to-assessment time, Rescind notification issuance-to-delivery time, Manual review queue processing time (SLA compliance), Track-to-authorization correlation accuracy, COP data staleness detection time, Shift handoff completion time.
Application Screens
To be populated after Information Architecture is complete. Expected: Common Operating Picture (COP) / Live Traffic Map, Manual Review Queue, Authorization Detail Panel, Event/Alert Feed, Non-Conformance Response Workflow, Rescind Confirmation Dialog, Track Detail / Drill-Down Panel, System Status Dashboard, Shift Handoff Summary, Incident Investigation / Track Replay.
9. Revision History
This persona is hypothesis-based. It will be validated and revised when customer access becomes available per Section 3.3 of the Persona Template & Guidance document.
| Version | Date | Author | Changes |
|---|---|---|---|
| 0.2 | Apr 2026 | — | Imported from Jama. Reformatted with Hextra shortcodes, scenarios extracted to sub-pages, corrected copy errors (ther→this, Marcus→Jessica), fixed ConOps/IAM roles, renamed ATOMx→ATOMx. |
| 0.1 | Feb 2026 | — | Created from internal knowledge extraction and Airspace Manager persona snapshot. Full template compliance. Pending customer validation. |
Last updated on