Isometric modern cloud technology and networking concept. Web cloud technology business. Internet data services vector illustration.

Supporting Offensive Cyber Operations

Offensive Cyber

In the 2018 Department of Defense Cyber Strategy, the DoD outlined a change in cyber defense tactics. One of the new strategies is called ‘Defend Forward’  (which we explored in a previous blog post). In short, Defend Forward charges organizations to shore up their cyber defenses and not sit around waiting for someone to attack and test them – to continue to move forward, all while fully defended. Definitely a shift in cyber defense strategy, as offensive cyber operations are on the rise

offensive cyber operations
Protecting your data is important

But the Department of Defense didn’t stop there. They also stated they “will employ offensive cyber capabilities and innovative concepts that allow for the use of cyberspace operations across the full spectrum of conflict.” Yes, the DoD is actually mentioning the need of offensive cyber operations. The new future involves not only arming one’s organization with mobile cyber armor, but also searching out and destroying threats before they can become threats. Fognigma’s patented software solutions are ready to support this new cyber defense strategy. Read on to learn more!

Fognigma Makes You Invisible

We must start by saying that Fognigma is not an offensive tool. It does, however, provide a patented and proven way for you to hide your operations from spying eyes. Fognigma gives you the power to create encrypted, cloaked Mission Partner Networks (MPNs), allowing total protection and anonymity of communications. An MPN is built from strategically leased virtual machines from one or more cloud providers, which work together as one powerful network.

With Fognigma, you completely control your MPN without any third-party interference or oversight. You run it; you own it. You exist now without anyone watching over you. Fognigma also gives you full command over your online presence. By managing your online attribution, you can craft your online appearance to separate who it looks like you are, where it looks like you are, and what it looks like you’re doing from what’s actually going on.

Secure Network Infrastructure

This invisibility of network and communications is paramount for organizations who conduct offensive cyber operations. Too often, offensive ops are compromised by parts being easily discovered and/or associated. A good example (and warning for the future) involves all the new info that’s been revealed about the big 2009-2013 CIA breach. Simple Google searches by third parties revealed sites that had similar aspects to them, leading to the correct assumption that they were, in fact, operated by the same group. This was later used for interception and exfiltration of sensitive information about offensive ops.

As previously stated, Fognigma is built from various virtual machines (VMs). These VMs only know of their immediate neighbors, so the network can’t be compromised should one VM be breached (which is statistically impossible given the nature of Fognigma’s encryption technologies). Also, organizations have the option to use Fognigma’s Portal Proxy technology (also patented) which allows them to create anonymous and disposable URLs for different Fognigma components. With Portal Proxies, organizations can give users their own URLs, so even if multiple people are accessing the same component, from the outside, it will look like they are going in different directions. This disassociates the users from the organization and from each other. And the more disassociation an organization can create during offensive operations, the less chance of activity correlation which could lead to a compromise like the aforementioned CIA operations.

Fognigma Has Global Reach

In order to properly engage in offensive cyber operations, organizations need global access. This is another area where Fognigma shines. Because of Fognigma’s structural nature, all the parts of the network and internal communication components can be built in different areas of the world. If you needed a file share residing in India, you could have just that (built in a few mouse clicks). All users granted access to that file share could access it when they connect to your MPN from wherever they are in the world.

Fogngima Networks Span the Globe

Fognigma also gives you global reach in an intelligent manner. Meaning, it normally doesn’t behoove an organization involved in operations in one part of the world to appear to be coming from another part of the world. Fognigma solves this by the properties of an MPN’s exit points. Without going into too much technical detail here, users leave an MPN by going through admin-created exit points. Once a user goes through an exit point to the Internet, their IP matches the country in which the exit point is located. This is invaluable when not wanting users to appear to be foreign to the part of the world in which they are conducting operations.

Fognigma Provides the Tools for Offensive Operations

But, Fognigma isn’t just an invisible network. Inside your MPN is a suite of communication and collaboration components which allow your operations to stay in constant contact. As soon as your device connects to your MPN, you’ll have access to: traceless telephony (with a misattributable call chain feature for safely communicating with untrusted external parties), protected video conferencing, and secure chat messaging. A file share is also hidden within your MPN for the safe storage and transfer of files.

secure telephony
Secure Telephony

And then there’s Fognigma’s superpowered Virtual Desktops (VDI). Fognigma’s VDIs have all the features of normal VDIs plus many more that only Fognigma can deliver. For instance, you can now transfer files from a USB directly to your VDI, completely bypassing the host computer. If there is a file on the host computer you wish to transfer, you can copy it to your VDI as easily as dragging and dropping it. Fognigma VDIs can be used as a super anonymous and temporary way to access other MPN. For example, you could initialize a VDI, connect to a video conference inside your MPN (assured that the audio is also safe, as Fognigma ensures all audio is proxied to ensure no IP leak), communicate with your team, and then destroy the VDI when done. When any part of an MPN is destroyed, the components are wiped clean and completely overwritten by the cloud providers, eliminating all digital forensics. It’s as if none of it ever really happened.

Fognigma is the Base Offensive Operations Need

A secure cybersecurity base for offensive operations needs to be a multi-tool, a transformer, and a cloaking device which can fit in your pocket. It needs to make the world think you are doing one thing, when you are actually doing something else. It needs to separate the connected and connect the separated. And, most of all, it needs to do all of this without anyone realizing it’s doing anything at all. That list is a good summary of reasons why Fognigma was created. We wanted to give organizations that toolbox, that utility belt, that base on which to build their operational success. And more than that, Fognigma was developed (and continues to be developed) to give the US Government and its military forces the advantage on the world stage. Fognigma puts the power of cybersecurity in the hands of those who will use our technology to make the world a safer place for all of us.

Network dissociation

The Importance of Being Apart

Playing on a Team

Working for an organization means working on a team – a group of people who, even if they are working in different sections on different projects, are all contributing to a common goal. But there are many times when a mission demands the team to not seem like a team for safety, secrecy, or other reasons. That is, the team must still work like a team but not seem to be connected to each other like a team. This is a very difficult thing to achieve – unless you’re using Fognigma! Network Dissociation or generally obscuring your identity can play a big part in thwarting people from obtaining your sensitive information.

Fognigma – In Brief

With Fognigma, your organization has the power to create your own invisible, encrypted network. Fognigma networks are constructed from randomly leased virtual machines (VMs) which reside on cloud networks in five continents. These VMs are spread out over the world, however they function as one unified network. This patented process is unique to Fognigma, and what makes it the most powerful tool for secure communication and collaboration on the planet. And it’s inside this network where your telephony, file share, chat servers, etc., all live – protected and safe. The ever-changeable nature of Fognigma networks which prevents an Internet pattern-of-life from developing (i.e., the things you do every day online which can be used to identify you). You can still do these things, but they will be separated from your online identity – who and where you really are. This is called dissociation and it is very important to the success of many organizations and missions.

Fognigma Virtual Machine
Fognigma Networks are constructed rom randomly leased virtual machines

But First, An Example of Association

If you go into Store A wearing a lime green cowboy hat on Tuesday and wear it going into Store B on Thursday, an observer will definitely see a person wearing the same unique hat. It is then a pretty safe assumption that the person who was observed on Tuesday and the person who was observed on Thursday are, in fact, the same. Once this is deduced, more connections can be made. The observer could enter the stores after you and, due to their crafty nature, discover information about what you purchased. They can then draw connections between the products you bought. If you purchased eggs, flour, baking powder, and baking soda from Store A and sugar, butter, and milk from Store B, then it could be inferred you are going to bake a cake.

Association
Private and Personal information can be shared easily, just by viewing you

But let’s pretend the observer watches more. On Friday, they view a car pull up in the park and that lime green cowboy hat come out. Now they know the make and model of your car, what state it’s registered in, that you probably have two children (based on the stick figure sticker on your rear window), your license plate, and possibly your car’s VIN number (depending on their location and the zoom power of their binoculars). They also see another person exit your vehicle and observe that you are carrying a cake. (See? They were right!) The observer watches the other person blow out candles on the cake and then the two of you share a slice, sitting quite close together. As you feed each other bits of cake, the observer views similar rings on each of your left hands. Your watcher now concludes you and this other person are married – but more than that, they know what your spouse looks like and their birthdate (give or take a few days). The observer focuses on the cake and sees the worlds, “Happy Birthday, Taylor,” and now they know your spouse’s name. All this private and personal information about you and those around you, discoverable because of associating the movements of someone wearing a lime green cowboy hat.

Why Network Dissociation is Important

As you can see in the above example, associating things is how people learn about who you are, who you’re with, and what you’re doing. For organizations, businesses, and missions, having full control over what others know about you is essential. The above example also illustrates how one tiny association can be enough for a third party to learn an awful lot about you. Now imagine how much could go wrong if you were working on a top-secret development project or part of a hostage rescue mission and adversaries were able to put pieces together and figure out not only who you are, but also information about your team, organization, mission, etc. It could spell anything from a small financial loss to a major catastrophe with casualties. The best way to approach your business is to remain as separate and as dissociated as possible.

How Fognigma Dissociates

Fognigma has multiple ways to dissociates you from everything. Let’s assume your network admin has Fognigma scheduled to automatically burn down at the end of the day and rebuild the next morning. This is the first path in your journey of dissociation. Since each day your network will be made from different virtual machines in different data centers on different clouds in different parts of the world, the network you travel on is already dissociated from every previous incarnation of itself.

fognigma globe network
Fognigma Networks Span the Globe

Since you have access to multiple exit points from your Fognigma network, you can pick a new one of those each day (or change during the day with just a click) to add even more dissociation. All your traffic will appear to emanate from the exit point. So, for instance, if you are working in Ohio, but going through an exit point in Hong Kong, it will appear to anyone watching your traffic that you are in Hong Kong. And with a simple drop-down menu change, you can instantly be in Spain, South Korea, India, the US, or anywhere else you have an exit point.

But it gets better – more disassociate-y. Your network admin has also created your Fognigma with a few dissociating joints, which your traffic passes through once you enter and before you exit to the rest of the Internet. dissociating joints do just what their name describes: they obfuscate who/where/what/why you are even more. Passing through each one shatters all your details; passing through all of them cranks your dissociation level to 11.

But it gets better. Your admin is also using Portal Proxies. This gives each user a unique URL from which to access your Fognigma network, so every single user looks like they are going to a different location. No one appears to be heading to the same place. Everyone appears to be separate. No one looks like they work for the same association (i.e., dis-association).

portal proxies
Portal Proxies are a component to Fognigma

But it gets better. You click on your unique URL and access a Virtual Desktop (VDI) on your Fognigma network. You access this VDI as an anonymous entry point, and from this VDI you exit to the Internet and do your browsing. When you are done, the VDI is destroyed, leaving no forensic footprint. You have become so dissociated by now, you might not even know who you are any more.

As you can see, Fognigma is capable of many layers of network dissociation – from what is provided by the innate structure of a Fognigma network to adding on more and more layers. Sort of like peeling an onion, but instead of peeling the layers off, you are adding them on around you, forming shell after shell of Fognigma-created power, guaranteed nothing but tears for anyone attempting to figure you out. Fognigma makes sure (callback time) to hide your lime green cowboy hat in a white box in the middle of a snow drift in the dead of night: completely invisible.

 

Software, web development, programming concept. Abstract Programming language and program code on screen laptop. Laptop and icons company network . Technology process of Software development

Fognigma Version 1.4 Has Been Released

Fognigma v1.4 brings a host of new and powerful features

Herndon, VA – Dexter Edward is thrilled to announce the release of Fognigma v.1.4. Fognigma still creates invisible and encrypted cloud-based networks full of communication and collaboration components, but now it has added some important new features. Fognigma is now FIPS 140-2 Validated and has added a wolfSSL TLS 1.3 layer to its already-unprecedented level of security and anonymity. Update 1.4 gives users the power to transfer files from a USB drive directly into a Virtual Desktop (VDI) completely bypassing the host computer. Plus, with the new Active Directory integrations, admins can import users from their already existent Active Directory straight into the Fognigma Console, greatly speeding up the onboarding of users.

“We are proud to bring even more abilities and security to our customers in Fognigma v1.4. We have raised the bar once more, while continuing to enhance the utility and capability of the system for the end users,” said Cael Jacobs, Dexter Edward’s Chief Technology Officer.

These new features (along with many under-the-hood updates) mark even more leading-edge advances Fognigma is making in the realm of communication security. Fognigma is ready to give organizations the power to create encrypted and invisible networks which hide all their communications and collaboration – now with even more superpowers.

About Dexter Edward:

Dexter Edward LLC is the premier integrator of secure, encrypted, and traceless communications and collaboration systems. We provide commercially available products ready for immediate implementation. Our solutions allow organizations to create invisible network spaces for multilateral, inter-agency cooperation without the risk of intrusion by external forces; provide an encrypted means to obfuscate Internet traffic and misattribute the connectivity of users; and safeguard communications, intellectual property, users, and other organizational assets. These solutions are ready to assist agencies (within the Department of Defense, Intelligence Community, Law Enforcement, and other organizations) to achieve mission success.

We are committed to providing organizations the enterprise software solutions they need to protect their communications, users, and data. This is what drives our business. Dexter Edward’s founders, investors, and employees are all American citizens and have a combined experience of over 150 years in cybersecurity and network development.

Secure keys for office

Printers – PC Load Vulnerability

Printers Are Forgotten About

Every office has at least one printer – quite often, a multi-function machine that also scans and faxes. These machines allow us to distribute hard copies of things, print out websites for the older workers to write their comments on, create signs playing practical jokes on Joe from Accounting, and other very important office things. Everyone oohs and aahs when the new printer arrives, but after it’s installed and hooked to the network, no one thinks about it again until one of its consumables needs replacing. The printer becomes almost a piece of furniture – it has a function, but other than that it just sits there. Until it becomes a portal for intruders, that is. Printer Security may be the last thing on your entire office’s mind, but should it be?

Printers Can Be Gateways of Evil

There are many long-running Internet jokes on how printers are evil. In fact, they aren’t really. Sure, they have to be tended to now and again, but it’s normally just for the feeding of paper and ink/toner. What printers can be, though, are ignored gateways for evil to reach into your networks. Think about it: devices are added to networks all the time and we’ve been trained to properly protect and secure them (which is good). But for some reason, we often seem to forget that printers are devices existing on our network, too. We forget that printers have reach to all our computers. We forget to include printers inside our shell of cybersecurity. Many of us have grown up with printers always there (especially when compared to the vast army of IoT products that have been amassing to take money from our wallets in the last handful of years), and just trust them to be there and be safe.

Secure keys for office
How secure is your office hardware?

And this is exactly what infiltrators want us to do: forget to protect our printers. Because if our printers aren’t protected, infiltrators have a gateway from which to invade our networks.

Printers Can be Exploited – Printer Security

Printers, just like any unprotected IoT device, can be exploited in a number of ways. One of the main ways printers can be compromised is through DNS rebinding attacks. DNS rebinding allows malicious attackers to squeeze around your firewall and find and exploit unprotected devices, such as printers. According to a study by Armis, an estimated 66% of printers from all major brands are vulnerable to DNS rebinding – that’s approximately 165 million printers.

Once a printer has been perforated (old school dot matrix joke there), infiltrators can do a variety of things. The first thing they might do is download all the documents being printed, scanned, or cached on the printer. Those could be as simple as business flyer drafts and as dangerous as tax forms and contracts.

But the damage doesn’t stop there. Once they’ve pierced through your printer, evil-doers can spread throughout your network finding more to exploit. From your printer, they can spread like any other network invasion, installing ransomware, taking over systems, and every other bad thing you can imagine.

Fognigma Protects Printers

Want to make sure your printers are safe? The easiest way is to plug it into a little device called a Wicket, which pulls the printer onto your Fognigma-created network. Because your printer is now protected by Fognigma, it can’t be detected by those looking for network vulnerabilities because your entire network can’t be detected. Don’t have Fognigma yet for your cybersecurity? Well, read on to learn more and how it is a game changer in the realm of cybersecurity.

Wicket Printer Setup
A Fognigma Wicket added to a printer

Fognigma enterprise software gives you the power to create truly invisible networks. Fognigma builds secure and traceless networks by using randomly leased components spread out across multiple clouds which function together as one network. Fognigma networks are wrapped in two layers of AES-256 encryption and hide and protect your communications, files, users, network, and yes, even your printers.

Any device connected to your Fognigma-created network doesn’t seem to exist to the world, so won’t be a target for exploitation. As stated before, printers tend to be forgotten about. We plug them in, connect them to our network, and then use them until they are replaced by a new version. Lather. Rinse. Repeat. But now, just as easily as you would connect them to a regular network, you are attaching them into a Fognigma network.

And, also just to make it clear, Fognigma does in fact protect your printer, but it does secure so much more. We focused on printers as an easy-to-abuse access point for violating an organization’s network, but Fognigma protects everything your organization holds dear. It also has many other valuable features, such as obfuscating network traffic, traceless telephony, encrypted file share, and the ability to safely access your Fognigma network from anywhere in the world on any device.

 

Fognigma is ready to protect your organization’s entire network with leading-edge technology. We just wanted to make sure you knew your printers would be safe, too.

Isometric business people talking conference meeting room. Team work process. Business management teamwork meeting and brainstorming. Vector illustration

Fognigma: Protecting from the Inside

The Threat is Inside the Building!

Often, Cybersecurity is thought of as a process of looking out to the world and searching, scanning, and bracing for what might be out there. It’s an ongoing process – a valiant mission – to plan for the worst. It’s a constant battle against external threats discovering things about you and using those discoverings against you. Unfortunately, if you are only looking for and protecting against external threats, you’re only doing part of your job. Cybersecurity should always be viewed as looking in two directions at once: external and internal. It is imperative you don’t ignore the possibility of internal threats.

Internal threats, of course, come from inside your organization. They are your employees, your coworkers, and sometimes even your friends. It is hard to imagine they would willingly do anything to betray your organization. But wait! Internal threats are not always the criminal, calculated schemes that feed our movies and television shows. Many times, internal breaches are due to a variety pack of non-nefarious reasons. Let’s explore more, shall we?

Non-Malicious Insider Threats

Quite often, the employees who become non-malicious insider threats (NMIT) don’t even know they are doing anything wrong. These are the people who check work email on public computers and then forget to log out of their applications. These are the employees who do work while at coffeeshops on unsecure networks. These are the ones forwarding work emails to their personal email addresses, so they can continue working from home.

checking email

Or perhaps the employees are, in fact, willfully doing something wrong, but they justify it as necessary to get their job done.  The Government Research Council (GRC) did a study on government employees’ use of approved mobile devices. The GRC found around one-third of respondents were using personal devices to do business work on. Of that third, 94% of DoD and military employees, and 64% of civilian employees, were using personal devices that had not been approved by their agency.

Better cybersecurity education can really go a long way to stopping many NMITs from forming in any organization. Employees should be taught not only what is acceptable and what isn’t, but also why certain online behaviors are dangerous. They should be taught how immense their impact is in the organization’s cyber security plan and how cyber security is a company-wide endeavor.

There is one other way to severely hamper both malicious and non-malicious insider threats, something Fognigma excels at: granular user controls.

Fognigma Networks Protect Against Insider Threats

Fognigma gifts network administrators with granular user controls. Quite simply, granular user controls allow the admin complete control over every little aspect of a user’s permissions inside a Fognigma-created Mission Partner Network (MPN). From which components to which files to which entry and exit points, admins will be able to make sure each user has access to only those things they need to access. This method of precise control is accomplished by creating groups.

Groups exist for each part of a Fognigma network. With just a few mouse clicks, users are added to very specific groups, which give them access to specific components, features, and even entry and exit points. And just as easy as they are added, users can be removed from groups.

We can explain this better by using an example. Our example company is called The Company and boasts 400 happy (and imaginary) employees. The Company has deployed Fognigma and is enjoying the protection and anonymity it provides. A new employee is hired: Jay. The Company’s HR team is on point and have already completed an IAM (Identity and Access Management)  assessment for Jay. As a new accountant, Jay needs access to certain things and shouldn’t see other things.

Admin Controls

The network admin who handles all permissions begins adding Jay to groups inside their MPN. He gets added to the company-wide telephony system group, the company-wide message server group, and the company-wide file share group. Jay is then added to the accounting fileshare group and accounting private channel on the company-wide message server group – each consisting of the CEO and the four-person accounting department. No other employees can access these groups, which thus limits the exposure of sensitive financial data to just 1.25% of the company.

Jay is not added, however, to the dev file share or the dev private messaging channel group (which Jay doesn’t even know exists). Jay doesn’t need access to any of the development team’s research or discussion. Not that he would (he’s a good dude), but this limited access prevents Jay from even contemplating leaking company development secrets – he just can’t get to them.

And here comes the really cool part. Imagine, after a few months, Jay realizes a new computer process would greatly help accounting with their accounts payable work flow. He mentions it to the CEO, who loves the idea. A new private messaging channel group is formed. Inside that group are Jay, the CFO, and two developers assigned to the task. No one else in the company can access this messaging group. Inside, these four employees can discuss and develop the new process.

Fognigma Networks

Three months later, the process is rolled out for the company to use. The accounting department is thrilled. The private messaging group is no longer needed, so is easily  deleted. And the rest of the company? Well, they didn’t need to know about any of this, so they didn’t. Everyone is containerized within their own little spheres, preventing each user from having too much access to what goes on inside the company.

This example serves to illustrate just a fraction of how Fognigma’s use of groups can limit user access and temptation. And by limiting access, Fognigma’s granular user controls prevent problems before they even can develop.

bigstock-Isometric-Cloud-Computing-Conc-243793318-Converted-01

How Fognigma Can Aid an Elderly Network Structure

An Elderly Network Structure is Rife with Vulnerabilities

Many times, there is an inherent problem with how government and/or larger/older agencies build their infrastructure. It makes sense how it happens, so it seems like it should be able to be prevented. But alas, normally budget and time prevent the proper formation and revision of infrastructure. What are we talking about here? In a word: Frankenstein’s monster.

Frankenstein’s monster, as everyone knows, was put together by using bits from various systems (a nicer way of saying body parts, which works better for this analogy). Attached as needed and jerry-rigged together, all the components eventually formed one functioning whole. In Frankenstein, the whole (monster) worked fine, but was rejected by society. That is, it worked but was quite vulnerable to outside threats. See where we going with that?

Frankenstein Parts
Parts form to create a network infrastructure

Unfortunately, the infrastructure of many larger and older agencies has also been put together as needed over time. Also, many times software applications are built or adapted to do one task in the organization, and it’s just easier and more cost effective to continue as per (business as) usual than migrate data into new programs and processes. The longer the agency exists, the more parts might get retrofitted together in a tenuous web that works . . . but just barely.

Frankenstein in Armor

Now, try to imagine fitting Frankenstein’s monster with a custom suit of armor. It might seem easy to surround the creature’s piecemeal form, but it won’t offer all the components perfect protection. Once an enemy knows how to penetrate your armor, the whole monster is going down. It’s the same with cybersecurity for our example agencies with antiquation issues. You might be able to get some form of network security around the network, but it really won’t completely protect the components.

That’s because each component has its own unique features (read: issues) and doesn’t always talk to other programs well.  We’ve all had that experience of saving a file from one program the only way possible and then having to do a bunch of leg work to import it into the program you actually use to analyze the data. Again, it works . . . but just barely. And if anything goes wrong along the way, the whole system falls apart.

data integration
Integrating data into various programs

So, what can the Fognigma enterprise software do to help? In short, it can make sure all your processes, software, and data (no matter how antiquated and/or unique) are protected from evildoers and available to your users.

Fognigma Surrounds Your Current Network with Encryption and Invisibility

The deployment option for Fognigma we’ll feature here is the Hybrid Deployment. This takes your existing network (which you already have working and running the software you need) and surrounds it in a cloaked shield of security. Your network will now be behind an ever changeable, always adapting, cloud-based network with two layers of AES-256 encryption between components.

What makes a Fognigma Mission Partner Network (MPN) different is that it’s built in parts across multiple cloud providers, with these parts working as one network. As a result, you have an invisible network built on public cloud infrastructure. A network you can manually or schedule-y burn down and rebuild whenever you want. You are replacing the armor around Frankenstein’s monster repeatedly in different configurations.

And don’t worry about the parts after burning. An MPN is made up of randomly leased pieces across multiple cloud networks. When you burn down your MPN, those fragments get wiped and returned to the pool to be used (and further overwritten) by some other project. When you rebuild your MPN, you’re using all new, randomly leased cloud bits. This is what makes your network invisible: the parts are random, and they change to other random parts. Interlocutors won’t even know to look for something to invade and exploit.

So, does Fognigma fix your antiquated process and/or software? Nope, only your agency can do that. What Fognigma can do is make sure the old vulnerabilities of your network are enveloped in a protective coating of encrypted, traceless, random goodness. To tie this back to our original example of Frankenstein’s monster… okay, so there really isn’t a way to tie it in. Frankenstein’s monster is never given the ability to blend into normal society and become invisible. But wait! Since this is fiction and we can set our own rules, Fognigma wrapping up your network is like Frankenstein’s monster wrapping himself in ever-changing armor and then draping all that in Harry Potter’s invisibility cloak (assuming it was long enough). Boom – puttin’ on the Ritz!

bigstock-Isometric-Cloud-Computing-Conc-243793318-Converted-01

Fognigma in the Intelligence Community

Fognigma Encrypts and Protects your Inter-Agency Collaboration & Intelligence Community

Fognigma is an enterprise software product perfectly suited to enhance and protect the information and communications of those in the Intelligence Community by creating Mission Partner Networks (MPN). Not only does Fognigma shroud comms in encryption and invisibility, but it also allows for secure inter-agency collaboration on whatever the mission entails.

Inter-Agency Collaboration
Inter-Agency Collaboration

Fognigma’s MPNs are built from randomly leased virtual machines which function as one unified network. Users from multiple agencies can quickly be added to this new network, making sure missions aren’t delayed. Inside the MPN, everyone can share and communicate, accomplishing mission objectives even faster. And then, when the mission is over, the MPN can be burned down as if it never existed.

Fognigma Protects Agents at Desks and in the Field

And it goes a bit beyond thinking of an intelligence community full of people in offices on desktop computers. Agents need to be able to go into the field and still access the MPN and be secure. Fognigma MPNs easily extend their encryption powers to mobile devices. And when an untrusted person needs to communicate securely with the team, an administrator can deploy a Portal Proxy (a secure, disposable way for a user to access an MPN without ever needing to know where that MPN is) in under a minute, and then delete it just as quickly when the untrusted person no longer needs access.

Encryption on Mobile Device
Encryption on mobile device

Now think about this statistic: according to a 2017 University of Phoenix survey, 51% of vacationers think their computers are just as secure on vacation as they are at home. Not saying your team members aren’t up-to-date on the limits of some forms of cybersecurity, but it’s still a chilling warning on how many view mobile cybersecurity. It especially applies to untrusted assets.

Use Case: A Mission Partner Network In Action

Let’s examine an example, because stories are fun:

A center like the CTIIC (Cyber Threat Information Integration Center), which we’ll call The Center, needs a multinational taskforce of agencies to investigate cyberthreats in Section 31. Three agencies are involved in this collaboration: one in the US, one in the UK, and one in Japan. Fognigma creates an MPN uniting these agencies, integrating a messaging server, a secure telephony system, and virtual desktops (VDIs) for every agent (including those in the field). With the MPN active, agents can collaborate on tracking down the nature of the cyberthreats.

MPN

On day thirteen, an employee of a small delivery company is convinced by an agent to provide information he has on the threats. We’ll call him Mr. Green. Using a Portal Proxy, Mr. Green is allowed very limited and controlled access to the MPN, so he can share his information. After the intel is recorded, the Portal Proxy is burned down and ceases to exist. At no time could Mr. Green access any information on the MPN not specifically shared with him.

intelligence community collaboration with mission partner networks
MPN Agency Collaboration

Mr. Green’s information is corroborated, warrants are issued, and arrests are made. The cyberthreat is no more. All three agencies celebrate in a secure chat, thank each other for their help, and log off of the MPN. The Administrator writes a few last notes in her report and, like the Portal Proxy used to talk to Mr. Green, burns the MPN to the ground. While it was in use, The Center’s MPN was never able to be seen, never able to be traced, and now that the operation is concluded, there’s not a shred of evidence it ever existed in the first place.

Mission accomplished.

In closing, we present the words of Paulo Shakarian (Entrepreneurial Professor at Arizona State University and CEO/Founder of CYR3CON), “You can have fantastic cybersecurity, but if you’re using IT systems to share information with a partner whose cybersecurity isn’t up to snuff, then your protection measures don’t mean very much.”1 Fognigma not only protects your agency’s comms and collaboration, but also protects and secures the work you do with other organizations through the encrypted and invisible wonder: the Mission-Partner Network.

 

1 Cameron, Dell. “Top Defense Contractor Left Sensitive Pentagon Files on Amazon Server With No Password,” Gizmodo. Gizmodo Media Group, 31 May 2017. Web. 15 March 2018.

Isometric personal data protection web banner concept. Cyber security and privacy. Traffic Encryption, VPN, Privacy Protection Antivirus. Vector illustration

Fognigma: In Brief

Fognigma Makes Your Communication and Collaboration Invisible

Fognigma is a super-secure communication tool that automatically builds and creates encrypted, cloaked networks (called Mission Partner Networks, or MPNs for short), which allow total protection and anonymity of communication traffic. Basically, with Fognigma, you can communicate with your team without any worry of leaks, hacks, or traces. Fognigma turns you into a communications ninja – strong, undetectable, and able to vanish in an instant.

Your Fognigma-created MPN is a randomly generated set of components which work together and are spread out across multiple clouds. No one can tell where your network exists, because it exists in parts in many places at once. And communication between parts is secured using two layers of AES-256 encryption.

Mission Partner Network
A Mission Partner Network created by Fognigma

At the heart of your network is the Wheel. The Wheel is the central hub where all your communication tools (telephony, voice and video conferencing, chat messaging, file transfer, remote workstations, etc.) live. The Administrator has complete control over which tools are available and to whom.

Data, Users, and Traffic are All Encrypted and Disassociated

Users securely connect to the Wheel by going through an entry point of your network and then through zero to three dissociating joints (depending on how you’ve built your MPN). Dissociating joints help to anonymize your connection and can be located in a different region or cloud. Upon exiting the Wheel, users again go through one or more dissociating joints (also, possibly in different regions or clouds). This makes discovering the actual location of the user impossible.

Encrypted Traffic
Encrypted Data, Traffic, & Users

Data, video, chat, files, speech, and any other information transmitted through a Fognigma-created network go through these same dissociating joints. And the entire network is protected by cascading AES-256 encryption between components.  Also, each Wheel is uniquely keyed, so even if someone could break the encryption of one Wheel, no other Wheels would be compromised.

Fognigma Creates Secure Networks in Mere Minutes

Administrators can use Fognigma to quickly launch a network within minutes. They can monitor use and manage assets, while letting the network handle its own maintenance. The MPN can also randomly move components across regions and clouds to avoid threats. And if you have a less-than-trustworthy contact that needs to be added, it can easily and safely be done (with restrictions on access, so as not to jeopardize your data, users, or network).

And just as fog can come and go in an instant, so can a Fognigma MPN. When it has overstayed its welcome (or as a routine cybersecurity program), an MPN can be completely burned to the ground as if it never existed at all. And no one can ever find what was never there!