Blind Tiger Communications

Wireless Cyber Security against Phones and Drones

Wireless Cyber Security, Phones and Drones

Interception and Identification Not Jamming
Security against Phones, Drones: For government, public, private companies who need a ‘1-Click’ web based wireless command, control and communications solution implementing wireless cyber defense (phones, drones) in vital areas such national infrastructure/critical infrastructure, military, prisons, research and development laboratories. Blind Tiger Communication offers a wireless cyber-security solution which detects, identifies and manages wireless device access across all cellular(2G/3G/4G+), Wi-Fi and Bluetooth technologies in one system without the heavy infrastructure where all you need is to apply power and watch it self-configure then operate without the need for a wireless subject matter expert knowing you are protected - rest assured.
In its simplest application, a communication umbrella is created around your vital area allowing mobile devices that are vetted by your company access to the wireless network and work unimpeded (Cellular/Wi-Fi/Bluetooth) while denying nefarious (Phones & Drones) devices access to the network all while under the Blind Tiger security umbrella.


Drone
Beyond typical

Wireless Protection

Providing wireless security solutions for mission critical environments a multi-layered security architecture within a facility as well as perimeter protection requires a detailed look at the attack surface across both the physical and environmental landscape. Filling the wireless environmental component within the risk management framework is woefully lacking an automated, and reliable spectrum management security platform protection of wireless devices including UAS’s. Blind Tigers security platform provides the ability to detect, identify, locate and a 1 'click' denial of wireless devices providing foremost perimeter protection across areas of responsibilities.

Proven Success

Managed Access

In its simplest application, a conceptual communication umbrella is created around your vital area selectively allowing wireless devices that are vetted by your company access to the macro wireless network unimpeded while disabling unknown devices denying access to the wireless environment while under the Blind Tiger security umbrella. We act as the wireless gatekeeper to your facility.

This process is known as managed access.
  • Licensed (Cell Phone) and Unlicensed (WiFi) protection
  • Detect, Identify and Locate the devices (UAS/Phone)
  • Intelligently decipher between devices
  • Disable non-vetted devices
  • Vetted devices can operate unfettered

See the Invisible

No Wireless Experience Required

The auto-configuration nature of the system removes the need of a cellular subject matter expert. Just apply power and you are protected from Phones, Drones, and even Rogue or "Fake" Cellular base stations. As part of the overall wireless cyber protection of the spectrum, WIDDS provides both Line of Sight (LOS) and Beyond Visual Line of Sight (BVLOS) Counter UAS capabilities that provide the detection, identification and defeat of vetted and non-vetted UAS’s. As the UAS market transition from LOS command and control of the UAS to cellular controlled UAS; we have that covered across all OCONUS and CONUS frequency bands and technologies - protecting your investment in spectrum security of sensitive areas.

Drone Defense

Blind Tiger monitors the global wireless environment, detecting and identifying various protocols that are present. This include Cellular, Wi-Fi and Bluetooth protocols. Each of these well-known consumer communication protocols have command and control protocols embedded within enabling the remote control and aircraft to exchange information and operate. By monitoring the wireless communications, decoding the protocols extracting the identifiers Blind Tiger is uniquely positioned to allow the device to operate if known, otherwise initiate a kill sequence send the device back to its home, creating an umbrella around your facility.

Venues

Stadiums, Parks, Domes, Subways, Critical Infrastructure all are at risk from wireless devices. Wireless devices such as Phones and Drones are capable of transporting, detonating and triggering explosives. These events have already occurred in Venezuela with an attempted assassination the president, the Russians used a drone to set off weeks long explosions by crossing borders and dropping thermite on a Ukraine ammo depot, in U.S. and Global Prisons contraband such as knives, drugs and phones are dropped by drones. A $200 Drone in the vicinity of an airport can destroy millions of dollar's worth of airplanes and take human life.

Unfortunately for the security professionals, jamming the spectrum will do more harm than good, and wireless devices do not have tracers in which the public can see the transmission. Blind Tiger doesn't jam the spectrum to alleviate the wireless cyber security issues, jamming kills and its indiscriminate. Blind Tiger detects the devices and performs a cyber style attack against these wireless devices disabling or forcing them back to where they came from. We implement multiple "geo fences" at a staggered distance from the critical asset, providing early warning notifications, escalating notifications until the kill sequence is under way, securing your critical infrastructure and assets.

Corporate Security

SCIFs, R&D, Financials, Board Rooms, Hospitals.

Does your company have a 'No Electronics Beyond This Point' policy? How do they enforce the policy?

Blind Tigers' Board Room Assurance product enforces your corporate policies protecting against Cellular, Wi-Fi and Bluetooth wireless devices. Corporate espionage by U.S. adversaries is spiking, lurking around U.S Corporations providing unsuspecting guests, employees an unencrypted, open 'Hot Spot' masquerading as your corporate network. Your guests and employees mistakenly attach to the infected access point unknowingly downloading viruses, malware and trojans that are brought into your corporate environment.

You spend a lot of time, resources protecting and hardening your wired networks -- but do you know who your real estate next door neighbors are, and what type of wireless signals they are transmitting? How about the guy in the car across the street? Blind Tiger can detect, identify and disable the rogue, nefarious wireless servers that can and will launch a wireless cyber-attack against your assets.

Prison Systems

Blind Tiger got its start securing Georgias Urban, Max Security Facilities in which we demonstrated precise control of the wireless signal. When the Governor of Georgia gave the his approval, we took our System that was originally designed for Managed Access on the battle field protecting the war fighter into the commercial realm. As soon as we setup in the facilty we did several operations. #1 We did a monitoring operation to understand how many cellular devices where inside the facility, and found 47% of the inmates had cellular devices. #2, We did a complete shutdown of the facility, while allowing leadershp the ability to communicate. #3, In order to show that we can control behavior and modify the behavior within the facility we allowed AT&T cell phones to operate, while denying the rest. What we found was interesting. Inmates where selling their "non-operational" phones to the new inmates arriving attempting to get money back from the phones that now, somehow didnt work...And the AT&T phones, which once where seldom used due to the price point where now increasing in quantity because they where the ones that Blind Tiger allowed to work.

Avatar

Chuck Bokath

CEO Chuck Bokath, founder and subject matter expert of wireless security was a Principal Research Engineer at Georgia Tech Research Institute initially created a mobile phone system for wireless security research for the DoD and the US carriers. Bokath commercialized the system and built the technology and company to its current state, with complete ownership of the IP and source code. Blind Tiger’s Wireless Intrusion Detect Defeat System (WIDDS) creates a Cellular, Wi-Fi detection and Counter sUAS system which integrates and builds on the previous successful managed access platform creating a self-configuring, automated enterprise system that manages access of the wireless devices under the security umbrella of FOB as a complete 360-degree wireless alerting, and defense system.
Avatar

John Giatropoulos

VP Engineering John Giatropoulos, "Tropo" is a seasoned entrepreneur creating and selling his company before coming and working with Blind Tiger. Tropos mastered his engineering skills working in multiple industries in the late 90s and early 2000's eventually hired by Chuck in 2007 for another company as a Senior Engineer. Together Chuck and John increased the EBDITA of the company by a multiple of 3, positioning that company for a strong sell of the company, then on to start other bleeding edge companies.
Avatar

Gary Shotwell

Prison Market Business Development
Gary Shotwell, Warden in the Louisiana Correctional system for decades is using his managerial, financial and expertise in running large facilities to direct Blind Tigers Prison Market. Gary's understanding of how the prison system works is invaluable in helping clients find a cost effective way to battle illicit wireless communications, as he did in Louisiana. We have unearthed ways for Counties to State facilities to fund the programs, of which is less than the costs of our competitors, with drone denial includes.

Latest News

2019 DoD BAA RIF Selection For AFRICOM C-UAS and Cellular Control Drones

Blind Tiger Communications has won the Managed Access Cellular and WiFi project from the Department of Defense Rapid Innovation Fund to protect the horn of Africa. By using our award winning, patented cellular managed access tied together with our ability to Detect, Identify, and Defeat (if necessary) DJI line of, and the rest of the nuisance drone market. The next generation of Drones will be controlled by cell phones. This called Beyond Visual Line of Sight (BVLOS). This contract reaffirms Blind Tigers Architecture against ALL wireless devices.

2018 Counter UAS DoD Winner

Building on Blind Tiger expertise in wireless devices, Cellular, WiFi and Bluetooth devices the Department of Defense awarded a year program to solve the warfighter problems reported from overseas -- DJI Drones. The issue is that different from other drones, the DJI line of drones doesn't provide a clear, human discernable RF signature. Not anymore! Blind Tiger has successfully been able through AI technology to take a fine comb and parse through the wireless spectrum and using Common Off The Shelf (COTS) devices detect, and disable DJI, plus the rest of the drone market.

Managed Access for Cellular, WiFi and now BLUETOOTH

Blind Tiger is excited to introduce a needed solution for restricted areas that need to have enforcement to the corporations' policies, by not only self-configuring defending against Cellular Frequencies and WiFi, but now BLUETOOTH. Blue tooth devices such watches that use Bluetooth. This is a ground-breaking solution for the Department of Defense, Defense Contractors, and Corporations that forbid wireless devices in restricted areas such as SCIF's, Research and Development, Financials, Pharmaceuticals -- any were you have priceless intellectual property!


2018 Dynamic Protection in Hostile Cellular Environments

Blind Tiger wins an Department of Defense "OTA" Contract to Protect Convoys as they traverse through unknown cellular environments, ripe for Cellular Triggered Improvised Explosive Devices (Cellular IEDs). By using our patented technology which doesn't require ANY cellular or wireless experience, just provide power to the system, the system self-configures and immediately provides a security "bubble" around your facility, or in this case ... a Humvee.

Accepted into the 2018 Techstars Accelerator

Blind Tiger is proud to be a part of, and graduate from the Inaugural 2018 Tech Stars Accelerator in Boston, Massachusetts. The program provided invaluable vetting with a discerning eye for quality leading towards a path to secure the war fighter as wireless threats continue to amass as unvetted drones, and phones only grow in numbers and nefarious objectives

Cleaning up prisons with Mobile Soap

Blind Tiger has successfully secured prisons in CLOSED (Max Security) disabling LTE, 3G UMTS, GSM and CDMA phones across all mobile phone carriers in a URBAN environment. While detecting, identifying and disabling the inmate phones, the homes across the street where not affected, and prison leadership was able to use their state issued phones. JAMMING wireless communications is indiscriminate killing Correctional Officers and any one inside the facility acting in a law enforcement position. You need Blind Tigers' solution. Call for a 3-month pilot to see for yourself the safety and return on investment that Blind Tiger can provide for your facilities.

2017 US Southern Command Selection for Managed Access Winner

Terrorism, Narcos and Human Trafficking are main problems in Central America, US Southern Command awarded a contract to Blind Tiger -- to automate their process of Cellular Managed Access, to the end goal of widely deploying the system without the need for a Cellular expert to setup a cellular base station across 4 generations to attract, identify, vet and if necessary - disable wireless devices.