Defense & Intelligence / Capability 01
01
C4ISR & Mission Systems

The force that sees
first, decides faster,
and acts with precision

We architect, integrate, and modernize the command, control, communications, computers, intelligence, surveillance, and reconnaissance systems on which joint operational advantage depends — from theater-level C2 infrastructure to tactical edge sensor networks operating in the most contested electromagnetic environments on earth.

JADC2 Architecture
Sensor-to-Shooter Integration
EW / SIGINT Modernization
Space & SATCOM Systems
TS / SCI / SAP Cleared
60%
Sensor-to-decision
cycle compression
9
JADC2 programs
supported
$480M
C4ISR acquisition
value managed
14+
Combatant Command
engagements
Our Position

Modern warfare is an information contest. The force that sees first, decides faster, and acts with precision wins — and that advantage is built or lost in the architecture of C4ISR systems long before the first shot is fired. The United States military's technological edge has always been grounded in information superiority; today that edge is contested at every layer, from GPS jamming to cyber intrusion to adversary counter-ISR operations that degrade the very systems on which joint warfighting depends.

Our C4ISR practice is staffed by cleared engineers, architects, and program managers who have built, operated, and defended these systems — not from a commercial IT background adapted to defense, but from careers in signals intelligence, electronic warfare, space operations, and joint command architecture. We operate at the technical and operational interface: understanding both the physics of RF propagation in contested environments and the command authority structures that determine how sensor data becomes a decision.

60%
Avg sensor-to-decision
cycle compression
9
JADC2 programs
supported at CCMD level
$480M
C4ISR acquisition
value managed
14+
Combatant Command
engagements
100%
Team members with
active TS/SCI clearances
Clearances & Standards
TS / SCI Cleared Staff
SAP-Eligible
ITAR / EAR Registered
MIL-STD-461G (EMI)
STANAG 4406 (Tactical Comms)
Link 16 / JREAP Certified
FedRAMP High
DFARS 252.204-7012
CMMC Level 2
VOSB Certified
Service Areas

Six capabilities across
the information domain

Every engagement is staffed by cleared engineers and architects with direct operational experience in the systems they now design — not IT generalists adapting commercial frameworks to defense requirements.

01
JADC2 Architecture & Integration
Designing and integrating the cross-domain command and control infrastructure that enables Joint All-Domain Command and Control at operationally relevant speed.

JADC2 is the DoD's most consequential and most contested modernization effort — the attempt to create a unified, resilient command and control architecture across all domains and all classification levels in time to be operationally relevant against a near-peer adversary. The technical challenges are formidable. The organizational and classification challenges are harder. We support CCMD J3 and J6 staffs in translating the JADC2 strategy into implementable architecture decisions — defining data standards, authority frameworks, and integration sequencing that produce actual decision-cycle compression, not just interoperability on a briefing chart.

Core Capabilities
Cross-Domain Solution (CDS) Architecture
Common Operational Picture (COP) Integration
Data Fabric & API Standards (ABMS / CJADC2)
Multi-Domain Operations (MDO) C2 Design
Authority Delegation & Release Frameworks
Resilient C2 (Degraded / Denied Environments)
Mission Partner Environment (MPE) Integration
C2 ATO Acceleration (cATO Pathways)
Engagement Impact
60%
Reduction in sensor-to-decision cycle time on AI-augmented C2 architectures we designed
9
JADC2-related programs supported across Pacific, European, and Cyber commands
4
Cross-domain solutions fielded in classified operational environments
Technical Note
JADC2 integration requires simultaneous fluency in: IP networking (IPv4/IPv6, BGP, OSPF), military waveforms (Link 16, JREAP-C, CDL), data standards (NATO STANAG, NGA NSDI, IC ITE), and cross-domain solutions (Type 1 crypto, NIPR/SIPR/JWICS bridging). We staff engagements with teams that hold all three competency areas — not siloed specialists who hand off across boundaries.
Governing Standards
DoD JADC2 Strategy (2022)CJCSI 6212.01FMIL-STD-6016 (Link 16)DoDI 8110.31
02
Multi-Domain ISR Architecture & Sensor Fusion
Designing the collection architecture and fusion pipelines that transform raw sensor data from space, air, surface, and cyber domains into actionable intelligence at decision-relevant speed.

Intelligence, Surveillance, and Reconnaissance has always been the foundation of military decision advantage — but the modern multi-domain ISR environment is architecturally unprecedented. Collection assets span LEO satellites, high-altitude UAS, surface radar networks, underwater acoustic sensors, and cyber collection — each operating on different timelines, producing different data formats, and governed by different classification and access control regimes. The fusion problem is as much an architecture and policy problem as a signal processing problem.

We design ISR collection architectures and fusion pipelines that account for the full complexity of multi-INT data streams — from sensor tasking and collection management through data normalization, cross-domain fusion, and delivery to analysts and decision-makers at the speed the operational environment demands.

Core Capabilities
All-Source Intelligence Fusion Architecture
Collection Management System Design
GEOINT / SIGINT / HUMINT Integration
Moving Target Indicator (MTI) Processing
Space-Based ISR Ground Segment Architecture
AI-Augmented Target Identification
Tactical SIGINT Dissemination (TED)
ISR Synchronization Matrix (ISM) Development
Engagement Impact
40%
Increase in analyst throughput on AI-augmented multi-INT fusion programs
14→1
ISR data systems consolidated into unified operational picture at a CCMD J2
Governing Standards
ICD 203 (Analytic Standards)ICD 501 (Collection Management)GEOINT StandardsNSS SIGINT Policy
03
Electronic Warfare & SIGINT Modernization
EW system architecture, SIGINT collection modernization, and spectrum management in the contested electromagnetic environment that characterizes near-peer competition.

The electromagnetic spectrum is the first domain that will be contested in any near-peer conflict — and current DoD electronic warfare capabilities reflect 20 years of investment in counterterrorism operations rather than spectrum competition against an adversary with sophisticated jamming, spoofing, and directed energy capabilities. We support EW program offices and CCMD J39 staffs in designing EW architectures, managing spectrum allocation across contested environments, and integrating SIGINT collection systems that can operate against a technically sophisticated adversary.

Core Capabilities
EW Architecture & Systems Integration
Electronic Attack (EA) / Protection (EP) Design
Spectrum Management & JRFL Deconfliction
SIGINT Collection System Architecture
Anti-Jam / LPI / LPD Waveform Integration
Directed Energy (DE) Program Support
Cognitive EW & Adaptive Jamming
EW Red Team & TEMPEST Assessment
Domain Expertise
Our EW engineers have experience across: AN/ALQ-250 (Eagle Passive Active Warning Survivability System), AN/ASQ-239 (Barracuda EW suite), AARGM-ER integration, and EMCON planning for contested Pacific theater operations. We hold the clearances required to work on special access programs in this domain.
Governing Standards
MIL-STD-461GNTIA Manual of RegulationsCJCSI 3320.02F (JRFL)EW Policy (SECDEF 3900.19)
04
Space & SATCOM Systems Architecture
Ground segment design, SATCOM architecture, and space-based ISR system integration for programs operating in an increasingly contested and congested orbital environment.

Space is no longer a sanctuary. The DoD's dependence on space-based capabilities for GPS navigation, SATCOM, missile warning, and intelligence collection creates a strategic vulnerability that near-peer adversaries are actively exploiting — with counter-space capabilities ranging from ground-based jamming to co-orbital inspection satellites to directed energy weapons. We support Space Force and Army Space programs in designing resilient ground segment architectures, redundant SATCOM access paths, and space-based ISR systems engineered for survivability in a contested orbital environment.

Core Capabilities
SATCOM Ground Segment Architecture (EHF/SHF/UHF)
Protected SATCOM (AEHF / Milstar Integration)
Commercial SATCOM (COMSATCOM) Integration
Wideband Global SATCOM (WGS) Planning
Space-Based ISR Ground Segment Design
PNT Resilience & GPS Anti-Jam Architecture
Space Domain Awareness (SDA) Integration
Multi-Orbit LEO / MEO / GEO Architecture
Engagement Impact
3
Protected SATCOM ground segment modernization programs supported
40%
Reduction in SATCOM dependency on single-orbit GEO on programs we redesigned
Governing Standards
DoDI 8420.01 (SATCOM)CJCSI 6250.01FITU Radio RegulationsSpace Policy Directive-3
05
Tactical Edge Architecture & Sensor-to-Shooter Integration
Designing the tactical network and data chain from forward sensor to weapons release — compressing the kill chain while maintaining accuracy, legality, and command oversight.

The tactical edge is where C4ISR systems encounter the hardest constraints: contested and degraded communications, size-weight-power limitations on forward platforms, latency requirements measured in milliseconds, and the legal and ethical imperative to maintain human decision authority in the kill chain regardless of engagement speed. We design tactical network architectures and sensor-to-shooter data chains that achieve the speed of machine processing while preserving the human judgment that law of armed conflict requires.

Core Capabilities
Tactical Data Link (TDL) Architecture
Sensor-to-Shooter Kill Chain Design
Time-Sensitive Targeting (TST) Systems
Unmanned System Integration (UxS C2)
Resilient Tactical Network (RTN) Design
Soldier / Marine Tactical Radio Modernization
ATAK / Tactical Assault Kit Integration
Human-Machine Teaming Frameworks (LoAC)
Engagement Impact
60%
Compression in sensor-to-release kill chain latency on JADC2-enabled programs
100%
Of architectures designed with LOAC human-in-the-loop safeguards validated by JAG
Kill Chain Latency Target
F2T2EA (Find → Fix → Track → Target → Engage → Assess) cycle time targets vary by threat class. Against time-critical mobile targets, sub-2-minute F2T2EA is operationally required. Our architectures have demonstrated sub-90-second cycles on AI-augmented programs in INDOPACOM theater testing.
06
Communications Infrastructure Modernization
Modernizing the communications backbone — from theater-level IP networks and waveform management to tactical radios and resilient communications in EMCON and communications-denied environments.

Military communications infrastructure is the connective tissue of the joint force — and much of it was designed for a communications environment that no longer exists. The assumption of relatively uncontested spectrum, persistent connectivity to theater-level networks, and reliable GPS timing has been systematically invalidated by adversary counter-communications capabilities. We modernize communications infrastructure at every echelon from theater IP backbone to dismounted soldier radio — designing for resilience in the contested, congested, and degraded environments that near-peer competition creates.

Core Capabilities
Theater Communications Network Architecture
Waveform Management & Radio Modernization
Software Defined Radio (SDR) Integration
EMCON Planning & Emissions Control
Secure Voice / KMI Key Management
SATCOM-to-Terrestrial Gateway Design
Network Management Systems (NMS)
Cyber-Resilient Network Architecture (ZTA)
Governing Standards
CJCSI 6211.02E (Defense IT Infrastructure)DoDI 8551.01 (Ports & Protocols)NIST SP 800-207 (ZTA)MIL-STD-188-220D
Technical Framework

The kill chain and the
domains we connect

C4ISR architecture must integrate across the full F2T2EA kill chain and all five operational domains simultaneously. Every system we design is evaluated against both the latency requirements of time-sensitive targeting and the resilience requirements of contested electromagnetic environments.

F2T2EA — Step 01
Find
Multi-INT collection cues target set
T+0:00
F2T2EA — Step 02
Fix
Geolocation accuracy to targeting standard
T+0:12
F2T2EA — Step 03
Track
Persistent custody maintained across ISR assets
Continuous
F2T2EA — Step 04
Target
Weapon-target pairing with effects assessment
T+0:45 (AI-augmented)
F2T2EA — Steps 05/06
Engage / Assess
Weapon release authority; BDA via ISR feedback
T+1:30 demonstrated
Land Domain
Ground C2 & Comms
Army tactical networks, WIN-T successor architecture, Nett Warrior, ATAK, and ground-based SIGINT collection integration.
WIN-T / Capability Set Integration
Tactical Radio (AN/PRC-163, SOCOM SDR)
Ground-Based SIGINT (Prophet)
Maritime Domain
Naval C4I & ISR
AEGIS combat system integration, Link 16/22 shipboard architecture, maritime ISR fusion, and undersea sensor network design.
AEGIS BMD C2 Integration
Naval Tactical Grid (NTG)
Undersea Surveillance (SOSUS successor)
Air Domain
Airborne C2 & ISR
AWACS / E-7A modernization, airborne ISR sensor integration, Link 16 architecture for mixed legacy/5th gen fleets, and ABMS data fabric.
E-3 / E-7A Architecture Transition
5th Gen / 4th Gen TDL Integration
UAS ISR Data Link (CDL / TCDL)
Space Domain
Space-Based C2 & ISR
Protected SATCOM (AEHF), space-based ISR ground segments, SDA architecture, and resilient PNT under GPS-denied conditions.
AEHF Ground Terminal Integration
Space Domain Awareness (SDA)
Alternative PNT Architecture
Cyber Domain
Cyber C2 & Resilience
USCYBERCOM C2 architecture, cyber effects integration into kill chain, zero trust network design, and cyber-resilient C4ISR engineering.
Cyber Effects Integration (Title 10)
Zero Trust Architecture (DoD ZTA)
EMCON / Cyber OPSEC Integration
How We Work

From architecture to
fielded capability

C4ISR engineering at the speed of operational need requires a methodology that can move from architectural concept through ATO and fielding faster than traditional acquisition timelines allow — without sacrificing the security rigor that classified program environments demand.

Mission Thread Analysis
Weeks 1–4

We begin with the operational mission thread — mapping every system, data flow, and decision point from sensor to commander across classification domains. This produces a visual architecture baseline that surfaces integration gaps, single points of failure, and latency bottlenecks before we write a line of specification.

Mission Thread DiagramsIntegration Gap AnalysisLatency BaselineClassification Boundary Map
Architecture Design & Trade Analysis
Weeks 4–12

We develop multiple architecture options against the operational requirements — each with explicit performance, cost, schedule, and risk profiles. Trade studies are quantitative where the data supports it, and explicitly qualitative where it does not. We document the assumptions behind every architectural choice so they can be revisited when circumstances change.

System Architecture DocumentTrade Study ReportInterface Control DocumentsSecurity Architecture
Integration & ATO Support
Ongoing

Systems integration on classified networks requires simultaneous fluency in technical integration and the RMF/ATO process. Our engineers manage both — building system security plans, supporting STIG compliance, preparing for ISSO/ISSM review, and driving toward cATO where the risk posture supports it. ATO is an engineering objective, not a compliance exercise we hand off to a separate team.

System Security Plan (SSP)STIG CompliancePOA&M ManagementcATO Pathway Prep
Operational Fielding & T&E
Program Close

Fielding C4ISR systems in operational environments surfaces issues that no integration lab can simulate — RF propagation in actual terrain, network congestion under realistic traffic loads, and operator behavior under cognitive load. We support operational test and evaluation with technical expertise, support transition to sustainment, and provide the architecture documentation that enables in-service engineering without our team.

OT&E Technical SupportAs-Built ArchitectureOperator DocumentationSustainment Handoff
Mission Outcomes

Systems we have fielded

Details modified or withheld per classification and client confidentiality.
JADC2 · INDOPACOM J3 / J6

Theater C2 Architecture Redesign for Multi-Domain Operations — Pacific Theater

The Challenge

A Pacific theater CCMD required a dramatic compression in the time from sensor detection to commander decision on time-critical targets — with a stated requirement of sub-2-minute F2T2EA against mobile targets in the first island chain. The existing architecture routed sensor data through seven discrete systems across three classification domains before it reached the watch floor, creating latency that was operationally unacceptable against the threat timeline.

Our Approach

We redesigned the data architecture to enable direct sensor-to-COP integration using a classified data fabric, implemented AI-based target cueing that replaced three manual analysis steps, and redesigned the watch floor workflow and authority delegation structure that governed engagement timing. The new architecture achieved sub-90-second F2T2EA in live testing and was deployed to the operational C2 node within 18 months of architectural approval.

60%
Kill chain latency reduction
7→1
Systems in data path reduced
18mo
Architecture to operational deployment
<90sec
F2T2EA demonstrated in live test
Multi-INT ISR Fusion · IC Collection Component

AI-Augmented All-Source Fusion Platform for an IC Collection Agency

The Challenge

An IC collection component was processing high-volume multi-INT data streams — GEOINT, SIGINT, and HUMINT reporting — through a triage process that consumed 60% of analyst time on routine data sorting and deconfliction, leaving insufficient bandwidth for substantive analysis. The component needed AI-augmented triage that could operate on the classified network, achieve ATO within program timelines, and meet the CDAO's responsible AI standards for human-supervised algorithmic operations.

Our Approach

We designed an NLP-based document triage and collection prioritization system aligned to ICD 203 analytic standards and the CDAO responsible AI framework. The system achieved classified network ATO in nine months — well inside the program timeline — and was validated by the component's ISSO and program manager before operational deployment. Analyst throughput on priority collection increased 40% in the first six months of operation.

40%
Analyst throughput increase
9mo
To ATO on classified network
60%
Reduction in manual triage time
14→1
Data feeds consolidated
EW Modernization · USAF Electronic Attack Wing

Contested Spectrum Operations Architecture for a Near-Peer Threat Environment

The Challenge

An Air Force electronic attack wing needed a modernized EW architecture capable of operating against a near-peer adversary with sophisticated adaptive jamming and spectrum management capabilities — significantly more demanding than the threat environment the wing's current systems were designed for. The modernization required both hardware upgrades and a complete redesign of the mission planning and spectrum deconfliction architecture.

Our Approach

We conducted an EW capability gap assessment against the projected threat environment, designed a cognitive EW architecture that enabled adaptive waveform selection in the operational environment, and integrated the new architecture into the existing mission planning system without requiring a complete mission planning replacement. The architecture was tested in a representative threat environment before operational fielding.

3×
Spectrum coverage increase
85%
Mission planning time reduction
0
Friendly spectrum fratricide events in test
5/5
CPARS exceptional rating
Protected SATCOM · Space Force AEHF Program

AEHF Ground Terminal Modernization for Resilient Nuclear C2

The Challenge

A critical nuclear C2 SATCOM ground terminal required modernization to support the AEHF system's full throughput capability while maintaining the extreme reliability standards of nuclear command and control. The program had to achieve ATO on a system handling the most sensitive command authority traffic in the U.S. military, within a program schedule that had no float against the operational deployment date.

Our Approach

We provided systems engineering and ATO acceleration support — developing the SSP, coordinating ISSO and DSS review, and managing the STIG compliance process across the specialized ground terminal software stack. The ATO was achieved three months ahead of the program schedule, enabling the operational deployment to proceed without schedule impact. Zero findings were assessed as High risk in the final ISSO review.

3mo
Ahead of schedule ATO achieved
0
High-risk findings at final ISSO review
100%
STIG compliance at ATO submission
5/5
CPARS exceptional rating
Client Voices

We had three previous contractors who could describe our JADC2 integration problem with great analytical precision. Meridian's team fixed it. There is a fundamental difference between people who understand C4ISR academically and people who have operated in a CCMD J6 and know exactly where the data dies and why. Meridian is the latter. The architecture they designed is now in operational use.

Rear Adm. (Ret.) Thomas Harrington
Former J6, Geographic Combatant Command
U.S. Indo-Pacific Theater

The ATO on our classified ISR platform was treated by every other vendor as an obstacle — a compliance burden that slowed down engineering. Meridian's team treated it as an engineering objective. They built the security architecture first and the capability second. We got ATO in nine months on a classified network. That is not normal. That is the result of having people who have done this before on the government side.

Maj. Gen. (Ret.) Sandra Whitmore
Director, ISR Modernization Program
Intelligence Community Component

Spectrum deconfliction for an electronic attack mission in a contested environment against a thinking adversary is not an IT problem. It is an operational problem that requires an engineering solution. Meridian understood both halves of that equation. Their EW architects had actually flown EW missions. That experience shows in the design — and it showed in the test results.

Col. (Ret.) Kevin Okafor
Former Electronic Attack Wing Commander
Air Force Special Operations Wing
Practice Leadership

Engineers who have
operated the systems

Every member of the C4ISR practice has held an operational or government engineering role in the systems they now design. We do not field systems integrators with commercial networking backgrounds adapted to defense. We field cleared engineers who have configured Link 16 for live operations, designed SIGINT collection architectures, and navigated the RMF for classified programs.

RE
Rear Adm. (Ret.) Robert Ellison
Practice Lead, C4ISR & Mission Systems
30-year Navy career as Deputy Director J6, Joint Staff. Former PEO C4I and Navy JADC2 concept lead. Directed theater C4ISR architecture for two COCOMs. Led eight JADC2-related wargames. TS/SCI/SAP cleared.
Joint Staff J6JADC2PEO C4ITS/SCI/SAP
KM
Cmdr. (Ret.) Karen Mitchell
Director, ISR Architecture & Fusion
22-year Navy intelligence career in SIGINT and all-source analysis. Former collection manager at a major IC agency. Led ISR fusion architecture design for three CCMD programs. ICD 203/501 expert. TS/SCI/SAP cleared.
SIGINTISR FusionCollection MgmtTS/SCI/SAP
DW
Col. (Ret.) David Wheeler
Director, Electronic Warfare & Spectrum
24-year Air Force EW career. Former EW wing commander and AFRL electronic warfare program manager. Flew 180+ combat hours in EA-18G-equivalent aircraft. Expert in cognitive EW and spectrum management. TS/SCI/SAP cleared.
Electronic WarfareAFRLSpectrum MgmtTS/SCI/SAP
JR
Lt. Col. (Ret.) James Reyes
Director, Space & SATCOM Systems
20-year Space Force / Air Force space career. Former MILSATCOM program manager at SMC and Space Force SATCOM operator. Expert in AEHF/WGS ground segment architecture and resilient PNT. TS/SCI cleared.
Space ForceAEHF / WGSSATCOM ArchitectureTS/SCI
100%
Cleared to TS/SCI
or above
12
SAP-eligible engineers
on staff
60+
ATO / RMF engagements
completed
9
JADC2 programs
supported at CCMD level
Technical Intelligence

C4ISR thinking from
practitioners

Featured Technical Analysis

Why JADC2 Is an Architecture Problem, Not a Technology Problem — and What That Means for the Programs Trying to Solve It

Five years into the JADC2 implementation effort, the programs making measurable progress have one thing in common: they started with command authority and data standards, not with technology selection. We examine the architectural choices that separate JADC2 programs achieving operational decision-cycle compression from those producing demonstrations and briefings.

18 min read·April 2026·JADC2 Architecture
Electronic Warfare
The Spectrum Competition Problem: Why DoD's EW Modernization Is Still Optimized for the Wrong Threat

Counter-IED jamming defined U.S. EW investment for 20 years. The PLA has been watching and designing around it. Here is the architectural gap that near-peer spectrum competition exposes.

March 2026 · 14 min read
Space & SATCOM
Protected SATCOM After AEHF: Building Resilient Nuclear C2 for a Counter-Space Threat Environment

AEHF was designed for a threat environment that has materially changed. Here is how DoD is rethinking protected SATCOM architecture for an adversary with demonstrated counter-space capabilities.

February 2026 · 12 min read
ISR Fusion
AI-Augmented ISR: The Integration Gap Between What Machine Learning Can Do and What the RMF Will Authorize

The best ISR AI systems are waiting 18 months for ATO while the data they need to process is aging on a server. Here is how the most successful programs are collapsing that gap.

January 2026 · 11 min read
Kill Chain
Sub-2-Minute F2T2EA: What It Actually Takes to Compress the Kill Chain Against Mobile Targets in a Contested Environment

The requirement is well-understood. The architecture to achieve it is not. A technical examination of the data path, authority delegation, and AI integration required to hit the operational timing standard.

December 2025 · 16 min read
Engage Our Team

Does your C4ISR architecture
perform at operational speed?

Our cleared engineers and architects are available for classified and unclassified discussions on JADC2 integration, ISR fusion architecture, EW modernization, and kill chain compression. We engage at the program office level with cleared teams that can contribute from day one.