FIGURE 1: W.I.S.D.O.M™ Main Interface – Flight Line Tester, Video Operation, Map Assistant, Flight Data Monitor, Maintenance Assistant, Mission Manager, Crew Enrolment, Log Viewer.
NATO STANAG 4702 1) What is W.I.S.D.O.M™ ?
W.I.S.D.O.M™ (Wise Integrated System for Drone Operations & Maintenance) is a software platform developed by Baligh Ben Khalifa for TELNET (PLM), designed for PHOENIX UAV operations and maintenance. It integrates:
Field modules: Flight Line Tester (checklists), Video Operation (EO/IR streams), Map Assistant (Leaflet), Flight Data Monitor (telemetry), Log Viewer (ArduPilot analysis)
PLM AI Assistant: Multi-source chatbot (HuggingFace, DuckDuckGo, weather, geolocation, OpenSky air traffic)
Multi-layer security: runtime license, OFFLINE mode with hard blocker, admin control, biometrics (face, voice, liveness)
Avionics link governance: GlobalPixhawkSession (single-owner), PixhawkConnection, DataMonitorDialog
Fundamental rule: operational data (telemetry, ISR) stays strictly local. Online services are isolated by design.
2) Data Boundary (Network vs Local)
Service
Data sent out
Data NOT sent
License (Render)
Machine fingerprintAccount ID
UAV flight dataISR/EO‑IR
PLM AI Assistant
User text query
Telemetry / auto‑uploaded logsImages/video
Offline‑friendly: all critical modules work without internet. The hard blocker guarantees no data exfiltration.
ARCHITECTURE VIEW Professional System Architecture (NATO ADatP‑36)
Local secure zone License server PLM AI (text only) No‑egress zone
NATO ADatP‑36 compliant: clear boundaries, labeled data flows, defined security domains.
SECURITY CONTROLS Cybersecurity & Encryption Layers (Defence in Depth)
Encryption Critical control
Defence in depth: each layer is independently audited. All security events are logged.
NETWORK FLOW Authorized vs Blocked Flows (NATO AMN)
Workstation Render (authorized) PLM AI (authorized) Blocked traffic
NATO AMN compliant: all flows are documented, only essential data leaves the secure enclave.
AUDIT READY 6) Source Code & Integrity Trail
Each major module has version‑controlled and cryptographically signed source code. Click to inspect critical components: