Digital Cloaking and Surveillance

Secure communication, both digital and verbal, is key to maximising capability and resilience for several critical business functions. Leonardo’s digital cloaking and surveillance products provide risk mitigation from risks that arise when using public communications network to communicate and when discussing classified information verbally within physical locations.

Our Cloaking Firewall and Dark Cloud products both reduce an organisation’s visible public network footprint to attackers and enable greater and more resilient use of public cloud resources to store sensitive data. Our Heimdal product enables sensitive discussions to occur whilst providing continuous, visible assurance that the environment is free from eaves-dropping equipment.

Digital Cloaking

Cloaking Firewall

Cloaking Firewall is Leonardo’s solution for hiding and obfuscating systems that are exposed to the internet, to protect them from being easily discovered or targeted by potential attackers. Automated mass scanning tools scour the internet for potentially exploitable networks and systems. Cloaking Firewall counters this activity without limiting customer internet requirements and associated business functions.

Dark Cloud

Dark Cloud is Leonardo’s solution to providing secure communications using public bearers. Dark Cloud splits data into smaller manageable pieces and transmits them across many bearers. Data sharding provides resilience to attacks facilitated by cryptographically-relevant quantum computers (CRQC). The use of disparate public cloud resources prevents attribution to a single source, and shards are subsequently reconstituted into usable data for the receiver, allowing secure use of public cloud resources.

Heimdal

Heimdal is a portable, compact and scalable solution that detects, examines and notifies users of unauthorised or unexpected use of the electromagnetic spectrum associated with technical surveillance measures. Monitoring is focussed on internal surroundings, such as within a building or controlled area. The goal of this monitoring is to ensure that eavesdropping is prevented, maintaining the confidentiality of information within a specific environment. By detecting eavesdropping devices or activities, users can initiate preventive controls when confidentiality cannot be guaranteed or initiate subsequent investigations to identify the source of the threat and associated threat actors.