Trust Is How We Operate
The Aedes Network is built on verified trust. Every builder is screened. Every access is logged. Every design package is protected. This page explains how we operate β openly, because transparency is part of what we owe Uncle Sam and our network members.
We are happy to provide additional detail on our compliance operations, vetting procedures, and security controls to government agencies, defense partners, and authorized stakeholders. Additional information is available upon request and approval by our Compliance Department.
Governing Principles
Six commitments that govern every compliance decision we make.
Trust Is Earned, Not Assumed
Every builder in the Aedes Network undergoes identity verification, background screening, and ongoing monitoring. No one receives access to design packages without first establishing a verifiable identity and passing our compliance review.
Layered Verification
We do not rely on a single check. Our vetting process is layered: who you are, what your history shows, what your intent is, and whether you continue to meet our standards over time. Every layer is independent.
Non-Weaponization Is a Bright Line
The Aedes Network produces exclusively non-weaponized uncrewed aerial systems. This is not a legal formality β it is a foundational operating principle. Any attempt to weaponize Aedes-produced systems results in immediate removal and referral to appropriate authorities.
American Builders Only
The Aedes Network is built by and for U.S. persons. We verify that builders are real, domestic individuals or entities. Access to sensitive design configurations is restricted to cleared or enhanced-screened U.S. persons only.
Compliance Is Continuous
Vetting does not end at approval. Active builders are subject to ongoing watchlist monitoring, periodic recertification, and behavioral review throughout their participation in the network.
Transparent to the Government
The Aedes Network maintains complete, auditable records of all builder vetting, access activity, and compliance decisions. We are committed to full transparency with the U.S. government and will cooperate with any lawful request for information.
Builder Trust Levels
Access to design packages is always proportional to verified trustworthiness. Builders earn their way through Trust Levels via demonstrated performance, additional screening, and β where applicable β security clearance.
Access
Standard commercial drone systems and components
Requirements
- Identity verified β real person, confirmed U.S. address
- Email and phone validated
- Background screening β no disqualifying findings
- Watchlist screening β OFAC, FBI, sex offender registry, and others
- Agreement to Terms of Service, Regulatory Disclaimer, and Non-Weaponized Use Policy
- E-signature on file
Access
Enhanced commercial systems and complex precision components
Requirements
- All TL1 requirements
- Minimum 6 months active, compliant production history
- Enhanced background investigation (7-year lookback)
- Professional reference verification
- Financial stability review
- Extended digital footprint review
- Clean compliance record
Access
Defense-adjacent systems and sensitive payload configurations
Requirements
- All TL2 requirements
- Confirmed U.S. Person status
- Active U.S. government security clearance (Secret or above) β independently verified, OR Aedes Enhanced Security Screening including in-person identity verification and counterintelligence briefing
- Signed Non-Disclosure Agreement
- Signed Enhanced Security Agreement
- Ongoing clearance status reporting obligations
Access
All design configurations β restricted program access
Requirements
- All TL3 requirements
- Top Secret clearance or deep background investigation
- Direct review and approval by Aedes Security Officer
- Additional legal framework requirements
Continuous Monitoring
Vetting does not end at approval. All active builders are subject to ongoing automated monitoring against government and international watchlists β checked daily or weekly depending on the list. Any match triggers immediate account review and human escalation.
Monitored Lists Include
Periodic Recertification
All builders must complete periodic recertification to maintain active network status. Recertification frequency increases with Trust Level. Failure to complete recertification results in account suspension.
Design Package Protection
All design packages distributed through the Aedes Network are protected through technical and operational controls. Access is strictly proportional to Trust Level, and every access event is logged and auditable.
Unique Watermarking
Every distributed design package is uniquely watermarked with the recipient's Builder ID and a distribution timestamp.
Access Controls
Design packages are only accessible to builders whose Trust Level meets or exceeds the package's minimum requirement.
Access Logging
Every view and download is logged with timestamp, IP address, and device information.
Time-Limited Links
TL3+ design packages are distributed via time-limited secure links that expire after 48 hours.
Regulatory Compliance
The Aedes Network operates in a complex regulatory environment. We take our obligations seriously and build compliance into every layer of our operations.
FAA Compliance
All production activities are required to comply with FAA Part 107 and applicable UAS regulations. Builders are responsible for their own operational compliance, and Aedes verifies awareness as part of onboarding.
Export Controls (ITAR/EAR)
Design packages are reviewed for export control classification. Foreign person access controls are enforced at every Trust Level. No design package is shared outside the United States without separate legal authorization.
Government Transparency
Aedes maintains complete vetting and access records in auditable form. We support lawful government oversight and will provide documentation to authorized government entities upon request through our Compliance Department.
Non-Weaponization Enforcement
Every builder signs a binding Non-Weaponized Use Agreement as a condition of network participation. Violations are reported to appropriate authorities. There are no exceptions.
Questions About Our Compliance Program?
We operate with full transparency toward the U.S. government, defense partners, and authorized stakeholders. If you represent a federal agency, defense contractor, oversight body, or are a network member with compliance questions, we welcome your inquiry.
Additional compliance detail β including full vetting procedures, audit records, and security control documentation β is available upon request and subject to approval by the Aedes Compliance Department.
Government agencies and defense partners are encouraged to reach out directly. We will respond within 2 business days.