Name: ION

Text: I

/

-F,
'G,
p*S

&.g,,
[G$-

MISSION: ASSET COMMUNICATIONS
E n a b l i n g S e c u r e l n t e r n e t operations

ION"
INTERNET OPERATIONS NETWORK

7

Secure & Unbreakable
Asset Communications
*

.v3

- ..

?
$
;<
'T
,*

Protecting Penronnel, Assets, and Critical Ca
Non-Secure Environme

---

I

nications in
v.$22*:-=.

:

k@gations and helligence
ier s
con
n!anducted from

;.--

-&

'

~aagdnstbreaches of mission
p2!!t$&d
assets.

W
.:': -- .~makable
2
,
Commu
?**"

$js-

"

c

,;',&A.?

'&rgmunications. Absolute b u r i t y
if they even detect the
C--;;;
ioh
technoloaies
can cause
..
tfie~investigate
suspicious patterns or
~ ' & dU.S. &fitiies. These threats,
i2&to ,- mission objectives,
@&fal17qxqarios.
:.*is'">,
,-'kt'
operational security, only technologies that provide omplete
%kg
options will do. Clients must not only have cornplet protection
'
;foCcomparbnentalize"
assets in a manner that shields th mission,
-*

$6=66
A>.

,X=.-2

m

j

T

@?I nications from any action that could jeopardize or "roll-U ' an entire
- - F=+:-"
~~;t:sInglehmpromise
or doubled asset.
.-.
i
-Gctron requires
a
secure
and
reliable
set
of
specialized
non-attribution
F->p.y: to any mission. The provision of untraceable and innocuous Anline
-.-*z*.\+i-W
5is .imprative to the security of assets, government personnel, and operati
i

_I*

>

%

-

ION: Non-Attribution for Asset Communications
ION solutions are built on proprietary technologies that provide multiple layers of indirection,
ensuring no link exists between mission personnel and their assets, or between assets. With
technologies that transcend simple non-attribution, our hardened security leaves no trace of
operational communication. By segmenting all assets and personnel into separate access and
communications paths, propagation of a single exposure is prevented: -Yq
T

29

7

-3f

ION enables solution customization to support modes of communication that guarantee confidentiality
and security between headquarters, deployed personnel, and assets. Critical mission communications
will never be attributable to any customer, Ntrepid, or any other entity that would raise suspicion.
'

Technological Solutions

I

Custom Built Architecture for Secure
Asset Communications
ION" solutions
secure your online
missions by
providing:
Misattributed secure
email communication
Encrypted messaging
Secure VolP and chat
Disguised innocuous web
interfaces
The ability to securely send
large files such as photos
and videos
Disguised and password
protected access modes
including removable
media such as flash drives
or discs that leave no
forensics on laptops

ION, Ntrepid's collection of proprietary technologies,
is a managed, subscription-basedset of solutions
that provide complete protection for communications
between agency headquarters, deployed personnel,
and assets in the field. Users and their assets have the capability to transmit information in a variety of ways,
from anonymous VolP to protected emailviadisgui
non-attributableweb interfaces.
"

ION'S reliable and government vetted non-attrit
technologies allow clients to define custom @hp
architected specifically for thei~
needs. /%M) solutions '
are built using ION Access Modes, Cloud-ba
Technologies, and Cover & Backstopping optio
to gain a fully-managed mission-apprqxhtese~

With state-of-the-art non-aiu~don
teduldogies,
unrivaled customer support, and a teatin of
professionalswho are dedhted t
a buildinggngoin$<
em
relatioMpS, ION is a complete sokrtion
secure lntemet operations.

'

ION" solutions secure online
communications from:
Traffic analysis, suspicion,
and scrutiny from targets
Assets who may be
working as double agents

l

l
I

arn how ION can secure your lnternet
operations, contact us at 866-217-4072
Ntrepid Corporation and its ION network solutions provide leading online non-attribution
technologies. Our proprietary tools have successfully weathered hacker attacks and
government sponsored intrusion teams with no breaches in customer anonymity. Our
technologies allow government clients to maintain complete control over their online
presence, activities, and identities.

Ntrepid Corporation
12801 Worldgate Drive, Suite 800
Herndon, VA 20170

ion@ntrepidcorp.com
866-217-4072
www.ntrepidcorp.com

02011 Ntrepid Cwpmtion. All rights resewed. Nttapid, ION,and ION Secure Comma are tradmaxks af Ntfepid
Cwporatim. 0 t h product nmes, brand nemes,and company m m may be trademarks or designationsof their
respsrctiveowners. 04-11

Ifor Asset Commur::ations

r

ION Secure

-

.

~ms-Pack

Typical salutions for secure asset commb~

!Web Portal Access
Innocuous, disguised W

~terhcefor secure--to

the I

O

M

W

~

Website is gm-located wing proprtetay bac
appears to be from a speciiic region of the v\cor'ld

1

.I

7

W

ION Secure Comms
Closed kircu~t,secure messaging system w
public lnternet once entered into the system

Web-based application for encrypted email, real tirn
that can be used on any web-enabled computer or srrrartphom
Ability to uplaad and send large Mes such as photos and videos

).JuL~etailed

)

control over who users can ccm

the system
Qupervisor accounts ca

7

!8< user accounts
Zsq '"3

b~ Oobtio

!merits with

Your ION solution can t
enhancements includin,.

Custom Virkral Private Netwrk (WN)connecM$
/@l
cloud.

-

)m customer headquartersto the

-&

Rert@q&C p$mword pm
media from which users can boot their computers to
-'._ ~ t a b k ~ m , - p nconnections
~ d
with the ION cloud

-i

m norm&, are impervious to hostile scrutiny, and leave no forensic traces
Wngl u n m t e d geo-located websites can be built into the system to provide
~d:pei?bnnd
compartmentali7ati~nbased on requirements

~

ecure Messaging Syste

..:

.-

.

keeps aswt communicationssecure.
fgq-9 1
"d?dompatWmtaIizedn
through separate access
securely.rsceive information from several independent
be "doubled,"that asset will have no way of aocessing
ns, discovering the identities of other assets and mission
ple independent operations.

how ION can secure your lntemet operations, contact us at

Document Path: ["brochure526.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh