The Science Behind the Signal

A detailed look at the sensor fusion pipeline, AI classification architecture, and the engineering decisions that make iSpy reliable in real operational environments.

From Raw Signal to Tactical Awareness

Step 01

Signal Acquisition

The TI IWR6843 mmWave module simultaneously transmits at 24 GHz and 60 GHz. The 24 GHz band provides deeper wall penetration through common building materials (drywall, wood, glass). The 60 GHz band provides higher resolution for fine motion detection, including breathing and micro-movements at close range. The Intel RealSense L515 LiDAR captures 23 million depth points per second across a 70° × 55° field of view.

Step 02

Geometry Mapping

LiDAR data is processed to construct a real-time 3D map of the accessible space. This geometry model provides structural context for radar signal interpretation — walls, doors, furniture, and room boundaries are identified and used to filter radar returns that originate from known static structures rather than potential targets.

Step 03

Clutter Reduction

Raw radar returns contain significant clutter from static objects, HVAC systems, appliances, and environmental vibration. iSpy's clutter reduction algorithm uses the LiDAR geometry model to mask known static surfaces and applies adaptive filtering to remove periodic interference patterns. This step is critical for reducing false positives in real-world environments.

Step 04

AI Classification

The cleaned radar signal is passed to a machine learning classifier running on the NVIDIA Jetson edge-AI platform. The classifier is trained on a dataset of human movement signatures across a range of building materials, distances, and movement types. It distinguishes human micro-movements from pets, appliances, and environmental noise, and outputs a confidence score for each detected target.

Step 05

Confidence Estimation

Each detected target is assigned a confidence level based on the consistency of the signal across multiple radar frequencies, the quality of the LiDAR geometry context, and the classifier's output probability. High-confidence detections represent strong, consistent signals across multiple sensors. Low-confidence detections flag ambiguous signals that may warrant additional caution but should not be treated as confirmed detections.

Step 06

Display and Alert

Processed detection data is transmitted wirelessly to the forearm display. The display renders a simplified tactical minimap showing the operator's position, room geometry, and target dots with confidence indicators. Haptic and audio alerts notify the operator of new high-confidence detections without requiring visual attention.

Sensor-to-Display Signal Flow

How raw radar and LiDAR data becomes actionable tactical intelligence

SENSORSPROCESSINGOUTPUT24 GHz RADARWall PenetrationTI IWR684360 GHz RADARFine MotionTI IWR6843LiDARRoom GeometryRealSense L515SENSOR FUSIONGeometry Mapping + Clutter ReductionNVIDIA Jetson Edge-AIAI CLASSIFIERHuman vs. Non-Human<200ms LatencyCONFIDENCEScore EstimationMulti-Sensor WeightingCOMPLIANCE LOGEncrypted · Tamper-EvidentOperator ID · TimestampFOREARM DISPLAYTactical MinimapHaptic + Audio AlertsALERT ENGINEHigh-Confidence TriggerRed / Orange / Grey DotsSensor InputProcessing Stage

Technical Specifications

mmWave Radar

ModuleTI IWR6843
Frequency60–64 GHz + 24 GHz
Antennas4 RX / 3 TX
Detection RangeUp to 9m (material dependent)
Motion SensitivityBreathing-level micro-movement

LiDAR

ModuleIntel RealSense L515
Depth Points23M points/second
Range0.25m – 9m
Field of View70° × 55°
Output3D point cloud + depth map

AI Processor

PlatformNVIDIA Jetson (series)
ProcessingLocal edge-AI, no cloud
Latency< 200ms target
ClassificationHuman vs. non-human
OutputConfidence score + trajectory

Forearm Display

ConnectivityWireless (encrypted)
InterfaceTactical minimap
AlertsHaptic + audio
DurabilityGlove-compatible
PowerIntegrated battery

System Hardware

Form FactorChest-mounted rig
EnclosureIP67 target
Battery Life4–6 hours target
Weight< 800g target
ConnectivityWireless to display

Data & Compliance

LoggingActivation time, operator ID, mode
StorageEncrypted local storage
Access ControlRole-based
FrequencyFCC / ISED certified components
PrivacyNo continuous recording

Material Penetration Limitations and Warning Logic

iSpy is designed to be honest about its limitations. Radar penetration is significantly reduced by reinforced concrete, metal, and dense masonry. When the system detects that it is operating in a high-attenuation environment, it alerts the operator that detection reliability may be reduced.

This degraded-material warning logic is a deliberate design choice. An operator who trusts a false negative in a reinforced concrete structure is more dangerous than an operator who knows the system's limits. iSpy communicates uncertainty rather than hiding it.

Material
Drywall / Wood
Penetration
High

Standard residential and commercial construction. Full detection capability.

Material
Brick / Concrete Block
Penetration
Medium

Reduced range and sensitivity. System alerts operator to reduced reliability.

Material
Reinforced Concrete
Penetration
Low

Significant signal attenuation. System issues degraded-material warning. Results should be treated with caution.

Material
Metal / Steel
Penetration
Very Low

Near-complete signal blockage. System alerts operator that detection is unreliable.

Logging and Compliance Architecture

Every iSpy activation event is logged with a tamper-evident record that includes the activation timestamp, operator ID, sensor mode, and duration. This log is stored in encrypted local storage with role-based access control.

The logging architecture is designed to support both internal accountability and external legal review. Agencies can export activation logs for compliance reporting, use-of-force review, and legal proceedings.

Activation Logging

Every use event recorded with timestamp, operator ID, and mode.

Encrypted Storage

AES-encrypted local storage. No cloud transmission of operational data.

Tamper Evidence

Log integrity verification to detect unauthorized modification.

Role-Based Access

Tiered access control for operators, supervisors, and administrators.

Discuss the Technology with Our Team

Our engineering team is available for technical briefings with procurement teams and agency technical staff.