COMPLIANCE & SECURITY

Trust Is How We Operate

The Aedes Network is built on verified trust. Every builder is screened. Every access is logged. Every design package is protected. This page explains how we operate β€” openly, because transparency is part of what we owe Uncle Sam and our network members.

We are happy to provide additional detail on our compliance operations, vetting procedures, and security controls to government agencies, defense partners, and authorized stakeholders. Additional information is available upon request and approval by our Compliance Department.

Governing Principles

Six commitments that govern every compliance decision we make.

πŸ”

Trust Is Earned, Not Assumed

Every builder in the Aedes Network undergoes identity verification, background screening, and ongoing monitoring. No one receives access to design packages without first establishing a verifiable identity and passing our compliance review.

πŸ›‘οΈ

Layered Verification

We do not rely on a single check. Our vetting process is layered: who you are, what your history shows, what your intent is, and whether you continue to meet our standards over time. Every layer is independent.

🚫

Non-Weaponization Is a Bright Line

The Aedes Network produces exclusively non-weaponized uncrewed aerial systems. This is not a legal formality β€” it is a foundational operating principle. Any attempt to weaponize Aedes-produced systems results in immediate removal and referral to appropriate authorities.

πŸ‡ΊπŸ‡Έ

American Builders Only

The Aedes Network is built by and for U.S. persons. We verify that builders are real, domestic individuals or entities. Access to sensitive design configurations is restricted to cleared or enhanced-screened U.S. persons only.

♾️

Compliance Is Continuous

Vetting does not end at approval. Active builders are subject to ongoing watchlist monitoring, periodic recertification, and behavioral review throughout their participation in the network.

πŸ“‹

Transparent to the Government

The Aedes Network maintains complete, auditable records of all builder vetting, access activity, and compliance decisions. We are committed to full transparency with the U.S. government and will cooperate with any lawful request for information.

Builder Trust Levels

Access to design packages is always proportional to verified trustworthiness. Builders earn their way through Trust Levels via demonstrated performance, additional screening, and β€” where applicable β€” security clearance.

TL1
Verified Builder

Access

Standard commercial drone systems and components

Requirements

  • Identity verified β€” real person, confirmed U.S. address
  • Email and phone validated
  • Background screening β€” no disqualifying findings
  • Watchlist screening β€” OFAC, FBI, sex offender registry, and others
  • Agreement to Terms of Service, Regulatory Disclaimer, and Non-Weaponized Use Policy
  • E-signature on file
TL2
Trusted Builder

Access

Enhanced commercial systems and complex precision components

Requirements

  • All TL1 requirements
  • Minimum 6 months active, compliant production history
  • Enhanced background investigation (7-year lookback)
  • Professional reference verification
  • Financial stability review
  • Extended digital footprint review
  • Clean compliance record
TL3
Cleared Builder

Access

Defense-adjacent systems and sensitive payload configurations

Requirements

  • All TL2 requirements
  • Confirmed U.S. Person status
  • Active U.S. government security clearance (Secret or above) β€” independently verified, OR Aedes Enhanced Security Screening including in-person identity verification and counterintelligence briefing
  • Signed Non-Disclosure Agreement
  • Signed Enhanced Security Agreement
  • Ongoing clearance status reporting obligations
TL4
Strategic Builder

Access

All design configurations β€” restricted program access

Requirements

  • All TL3 requirements
  • Top Secret clearance or deep background investigation
  • Direct review and approval by Aedes Security Officer
  • Additional legal framework requirements

Continuous Monitoring

Vetting does not end at approval. All active builders are subject to ongoing automated monitoring against government and international watchlists β€” checked daily or weekly depending on the list. Any match triggers immediate account review and human escalation.

Monitored Lists Include

OFAC Specially Designated Nationals (SDN) List
FBI Most Wanted
Interpol Red Notices
National Sex Offender Registry (NSOPW)
Federal court records
State criminal records
Additional government and international watchlists

Periodic Recertification

All builders must complete periodic recertification to maintain active network status. Recertification frequency increases with Trust Level. Failure to complete recertification results in account suspension.

TL1Annual
TL2Every 6 months
TL3Annual (enhanced)
TL4Annual (Security Officer-led)

Design Package Protection

All design packages distributed through the Aedes Network are protected through technical and operational controls. Access is strictly proportional to Trust Level, and every access event is logged and auditable.

πŸ’§

Unique Watermarking

Every distributed design package is uniquely watermarked with the recipient's Builder ID and a distribution timestamp.

πŸ”

Access Controls

Design packages are only accessible to builders whose Trust Level meets or exceeds the package's minimum requirement.

πŸ“Š

Access Logging

Every view and download is logged with timestamp, IP address, and device information.

⏱️

Time-Limited Links

TL3+ design packages are distributed via time-limited secure links that expire after 48 hours.

Regulatory Compliance

The Aedes Network operates in a complex regulatory environment. We take our obligations seriously and build compliance into every layer of our operations.

✈️

FAA Compliance

All production activities are required to comply with FAA Part 107 and applicable UAS regulations. Builders are responsible for their own operational compliance, and Aedes verifies awareness as part of onboarding.

πŸ”’

Export Controls (ITAR/EAR)

Design packages are reviewed for export control classification. Foreign person access controls are enforced at every Trust Level. No design package is shared outside the United States without separate legal authorization.

πŸ›οΈ

Government Transparency

Aedes maintains complete vetting and access records in auditable form. We support lawful government oversight and will provide documentation to authorized government entities upon request through our Compliance Department.

βš–οΈ

Non-Weaponization Enforcement

Every builder signs a binding Non-Weaponized Use Agreement as a condition of network participation. Violations are reported to appropriate authorities. There are no exceptions.

Questions About Our Compliance Program?

We operate with full transparency toward the U.S. government, defense partners, and authorized stakeholders. If you represent a federal agency, defense contractor, oversight body, or are a network member with compliance questions, we welcome your inquiry.

Additional compliance detail β€” including full vetting procedures, audit records, and security control documentation β€” is available upon request and subject to approval by the Aedes Compliance Department.

Government agencies and defense partners are encouraged to reach out directly. We will respond within 2 business days.

Contact the Compliance Department β†’
Terms of ServicePrivacy PolicyRegulatory Disclaimer