FAQ
General
Is Anomaly Federal a U.S. company?
Yes. Anomaly Federal is a U.S.-based company headquartered in New York City with additional presence in Washington DC, Denver, Austin, and San Diego. Our entire team operates within the United States, and key personnel maintain active security clearances.
What is your small business status?
Anomaly Federal maintains small business status, which can provide advantages in federal procurement processes and partnership opportunities.
How does Anomaly Federal's crowdsourced network work?
Our crowdsourced network leverages a distributed observer base of 500,000+ users who report unidentified aerial activity through mobile applications. The system operates in two modes: inbound reporting, where observers submit sightings with location, time, and visual documentation; and active alerting, where the network notifies nearby observers when potential threats are detected to drive corroboration and verification. For enterprise clients, we can deploy white-labeled versions of the mobile application tailored to specific operational needs, and can geographically target network coverage to prioritize mission-critical areas.
Does Anomaly Federal comply with data protection regulations?
Yes. We maintain strict data protection and privacy standards with security-first design principles. We're pursuing SOC 2 Type II compliance and work closely with mission partners to meet specific data handling requirements including FedRAMP, CMMC, and other frameworks as needed. All data collection, storage, and processing can be configured to align with your organization's security protocols and regulatory obligations. For classified or sensitive deployments, we support on-premises or government cloud architectures with appropriate access controls.
tech
Can Anomaly Federal's computer vision integrate with my existing optical sensors?
Yes. Our computer vision pipeline is designed to integrate with existing EO/IR optical sensors through a device-agnostic architecture. The system accepts standard video feeds and can be configured for your specific sensor types and data formats. Integration occurs via our unified API, allowing you to add automated detection capabilities without replacing current hardware. We provide technical support throughout the integration process, including sensor compatibility assessment, configuration assistance, and performance optimization. The modular design means you can deploy CV capabilities to selected sensors initially and scale as validation progresses.
Can your computer vision integrate with our existing optical sensors?
Yes. Our CV pipeline is designed to work with existing EO/IR sensors. The system is device-agnostic and integrates via API, allowing you to modernize detection capabilities without replacing current hardware. We support standard video feeds and can configure the system for your specific sensor types.
What models do you use for object detection?
Our flexible inference engine supports multiple model architectures including zero-shot models (OWLv2) for data curation and YOLO models for real-time operational deployment. Models can be swapped or reconfigured via API without system downtime, and we can train custom models for specific object classes relevant to your mission.
How accurate is the triangulation capability?
Our triangulation technology has been field-tested to achieve altitude accuracy of under 5 meters using just 3 distributed sensors in controlled drone tests. The system operates in Earth-Centered Earth-Fixed (ECEF) coordinates and can scale to unlimited sensor counts for enhanced precision.
What is the latency for real-time detection?
Our system is optimized for low-latency operation suitable for real-time C-UAS applications. Specific latency depends on deployment configuration, but the architecture is designed for resource-constrained platforms with minimal memory requirements.
How does threat scoring work?
Our threat scoring algorithm consolidates multiple factors—including credibility assessment, anomaly detection, and mission-specific parameters—into a single 0-100 measure. The scoring model is modular and transparent, with configurable weighting that can be adjusted via API to align with your specific threat criteria and operational priorities.
Integration & Deployment
How do we access Anomaly Federal capabilities?
All capabilities are accessible through a unified RESTful API. We provide comprehensive documentation and integration support to ensure seamless deployment within your existing infrastructure.
What integration support do you provide?
We offer full integration support including technical documentation, API access, configuration assistance, and ongoing technical support. Our team works directly with your engineers to ensure successful deployment.
Can the system be deployed in classified environments?
Yes. Our containerized architecture supports deployment in secure and classified environments. We work with your security team to meet specific deployment requirements and compliance standards.
What data formats do you support?
Our system supports standard video feeds, common EO/IR sensor outputs, and structured data formats (JSON, CSV). We can configure ingestion for custom formats as needed for your sensors.
Data & Security
Does Anomaly Federal comply with data protection regulations?
Yes. We maintain strict data protection and privacy standards. Our system is designed with security-first principles, and we're pursuing SOC 2 compliance. We work with mission partners to ensure compliance with specific data handling requirements.
Where is data stored?
Data storage is configurable based on mission requirements. We support on-premises deployment, government cloud environments, and hybrid architectures. All data handling follows your specified security protocols.
Do you support government cloud environments?
Yes. Our containerized architecture supports deployment in government cloud environments including AWS GovCloud and Azure Government. We're working toward Iron Bank certification for DoD deployment.
Who has access to the crowdsourced network data?
Access controls are mission-specific and configurable. For federal deployments, we implement strict access controls and can deploy dedicated network segments to ensure operational security.