Command & Control
Unified airspace defense platform. One dashboard to monitor, detect, classify, and neutralize all aerial threats.
Platform Overview
LeC2 is the centralized command and control platform that ties together every sensor, effector, and operator into a unified defense system.
Interactive mapping with satellite and street views. Real-time zone visualization including detection zones, engagement zones, protected areas, and no-fly zones. Dynamic target tracking with trail visualization.
Integrates RF detection, radar tracking (Rada MHR, Elta ELM), optical systems (Controp, ThirdEye), and drone detection platforms (Sentrycs, D-Fend) into a single operational picture.
Trigger-based execution of multi-step response actions. Define automated defense procedures that activate based on threat type, classification, and proximity.
LLM-powered analysis with real-time capability recommendations. Intelligent threat assessment that suggests optimal countermeasure combinations for each scenario.
Integrations
LeC2 integrates the leading defense technologies into a single operational picture. No vendor lock-in - choose the best sensors and effectors for your mission.
GNSS spoofing - 1,500m range
RF protocol detection - 1,500m range
RF jamming - 500-1,000m range
Radar Systems
Multi-layer aerial tracking across short, medium, and long ranges.
Cyber Takeover
Drone detection, classification, and cyber takeover up to 1,500m.
Optical & RF Sensors
Long-range EO/IR cameras and RF detection up to 2,500m.
Effectors
Laser hard-kill up to 2,000m and RF jamming up to 1,000m.
Operational Features
Administrator, Operator, and Viewer roles with multi-factor authentication. Full audit logging and session management.
Define geographic tripwires that automatically trigger alerts and countermeasures when aerial threats cross defined boundaries.
FlightRadar integration for real-time commercial air traffic overlay, preventing false positives on legitimate aircraft.
Offline map support with configurable regions and GeoTIFF satellite imagery. Operates in fully disconnected environments.
Deployment
Access from any modern browser. No client software installation required. Responsive design for tablets and desktops.
Containerized deployment supporting Linux and Windows. Cloud-ready architecture for centralized operations centers.
WebSocket binary protocol for low-latency data streaming. REST API for integration with external systems.
JWT authentication, TOTP multi-factor authentication, encrypted communications, and comprehensive audit logging.