6
S -F, 'G, p*- & .g,, [G$- I MISSION: ASSET COMMUNICATIONS 7 / Enabling Secure lnternet operations ION" INTERN ET OPERATIONS NETWORK

INTERN ET OPERATIONS NETWORK

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

S -F, 'G, p*- & .g,,

[G$-

I MISSION: ASSET COMMUNICATIONS 7 / E n a b l i n g S e c u r e l n t e r n e t operations

ION" INTERN ET OPERATIONS NETWORK

Secure & Unbreakable Asset Communications

* .v3 - .. $';?<,T* I

Protecting Penronnel, Assets, and Critical Ca - - - nications in Non-Secure Environme

v.$22*:-=. : k@gations and helligence

ier sn!and con ucted from

-& ;.-- ' ~aagdnst breaches of mission

p2!!t$&d assets. ?**" " $js- -- W:':. c - ?.A&,';, .- ~makable 2 , Commu '&rgmunications. Absolute bu r i t y

$6=66 if they even detect the C--;;; A>. ioh technoloaies can cause . .

tfie~investigate suspicious patterns or ~ ' & d U.S. &fitiies. These threats,

i2&to ,X=.-2 m ,- mission objectives,

@&fal17qxqarios. :.*is'"- >, ,-'kt ' -

operational security, only technologies that provide omplete %kg options will do. Clients must not only have cornplet protection

;foCcomparbnentalize" assets in a manner that shields th mission, - * @?I T nications from any action that could jeopardize or "roll-U ' an entire

'

- - F=+:-" ~~;t:sInglehmpromise or doubled asset. i _I*

. -. j i

-Gctron requires a secure and reliable set of specialized non-attribution F->p.y: -

to any mission. The provision of untraceable and innocuous Anline - *z*.\+ .-- i-W >

5is imprative to the security of assets, government personnel, and operati .-

% -

ION: Non-Attribution for Asset Communications ION solutions are built on proprietary technologies that provide multiple layers of indirection, ensuring no link exists between mission personnel and their assets, or between assets. With technologies that transcend simple non-attribution, our hardened security leaves no trace of operational communication. By segmenting all assets and personnel into separate access and

communications paths, propagation of a single exposure is prevented: -Yq 2 -3f T 9 7

ION enables solution customization to support modes of communication that guarantee confidentiality and security between headquarters, deployed personnel, and assets. Critical mission communications will never be attributable to any customer, Ntrepid, or any other entity that would raise suspicion.

'

ION" solutions secure your online missions by providing:

Misattributed secure email communication

Encrypted messaging

Secure VolP and chat

Disguised innocuous web interfaces

The ability to securely send large files such as photos and videos

Disguised and password protected access modes including removable media such as flash drives or discs that leave no forensics on laptops

Technological Solutions

Custom Built Architecture for Secure Asset Communications

I ION, Ntrepid's collection of proprietary technologies, is a managed, subscription-based set of solutions that provide complete protection for communications between agency headquarters, deployed personnel, and assets in the field. Users and their assets have the -

capability to transmit information in a variety of ways, from anonymous VolP to protected emailviadisgui non-attributable web interfaces.

ION'S reliable and government vetted non-attrit "

technologies allow clients to define custom @hp architected specifically for thei~ needs. /%M) solutions ' are built using ION Access Modes, Cloud-ba Technologies, and Cover & Backstopping optio to gain a fully-managed mission-apprqxhte se~

With state-of-the-art non-aiu~don teduldogies, '

unrivaled customer support, and a teatin of professionals who are dedhted ta building gngoin$< relatioMpS, ION is a complete sokrtion em secure lntemet operations.

ION" solutions secure online communications from:

Traffic analysis, suspicion, and scrutiny from targets l

Assets who may be l working as double agents I

arn how ION can secure your lnternet operations, contact us at 866-21 7-4072

Ntrepid Corporation and its ION network solutions provide leading online non-attribution technologies. Our proprietary tools have successfully weathered hacker attacks and government sponsored intrusion teams with no breaches in customer anonymity. Our technologies allow government clients to maintain complete control over their online presence, activities, and identities.

Ntrepid Corporation [email protected] 12801 Worldgate Drive, Suite 800 866-21 7-4072

Herndon, VA 201 70 www.ntrepidcorp.com

02011 Ntrepid Cwpmtion. All rights resewed. Nttapid, ION, and ION Secure Comma are tradmaxks af Ntfepid Cwporatim. 0 t h product nmes, brand nemes, and company m m may be trademarks or designations of their respsrctive owners. 04-1 1

I for Asset Commur::ations

! Web Portal Access

ION Secure Comms 7

Your ION solution can t enhancements includin,.

ION Secure - . ~ms- Pack r Typical salutions for secure asset commb~

Innocuous, disguised W ~terhce for secure--to the I O M W ~ ~

Website is gm-located wing proprtetay bac

1 appears to be from a speciiic region of the v\cor'ld

W

Closed kircu~t, secure messaging system w public lnternet once entered into the system

Web-based application for encrypted email, real tirn that can be used on any web-enabled computer or srrrartphom

Ability to uplaad and send large Mes such as photos and videos )

).JuL~etailed control over who users can ccm 7 the system .I Qupervisor accounts ca

!8< user accounts

Zsq '"3

b~ Oobtio

Custom Virkral Private Netwrk (WN) connecM$ /@l cloud.

!merits with

)m customer headquarters to the

- Rert@q&C p$mword pm &- media from which users can boot their computers to -'. _ ~ t a b k ~ m , - p n ~ d connections with the ION cloud

- i m norm&, are impervious to hostile scrutiny, and leave no forensic traces

Wngl u n m t e d geo-located websites can be built into the system to provide ~d:pei?bnnd compartmentali7ati~n based on requirements

ecure Messaging Syste

..: .- .

fgq-9 1 keeps aswt communications secure. "d?dompatWmtaIizedn through separate access

securely.rsceive information from several independent be "doubled," that asset will have no way of aocessing

ns, discovering the identities of other assets and mission ple independent operations.

how ION can secure your lntemet operations, contact us at