Cybersecurity is hard enough to implement on Earth, but there are a number of added complications to securing systems in orbit. Many of the assets sent out into space over the past few decades (and the systems that support them) were primarily designed to withstand the vacuum of space, not cyber attacks from a dedicated adversary.
Last year the Trump administration put out a memo on the cybersecurity principles that should undergird future commercial and government space operations. While many cyber threats play out more or less the same as they do on Earth, the government identifies a handful that are particularly dangerous when directed at space-based or reliant systems, such as spoofing sensor data or corrupting sensor systems, hacking or jamming command and control infrastructure and unauthorized personnel leveraging insufficient physical security measures to gain access to critical hardware and software.
Maintaining digital superiority is one of five long term objectives for Space Command, and that often translates to working with other branches and agencies to better build cybersecurity into future space operations. To this end, Space Command has embedded personnel from U.S. Cyber Command and maintains a close relationship with the National Reconnaissance Office on joint operations, planning exercises and consultations on orbit and technology issues.
General James Dickinson. Commander – U.S. Space Command.
One of the biggest challenges they face is around awareness, or the lack of it. Dickinson said “most people still do not have a solid understanding of just how much we rely on systems or hardware in orbit to power our terrestrial services.”
One prime example of this is the global position, navigation and timing system, which underpins GPS apps like Google Maps that are used by businesses and individuals across the world. An executive order released last year required the Cybersecurity and Infrastructure Security Agency at DHS to identify “significant risks” to critical infrastructure due to PNT vulnerabilities. Last month, a document released by the agency underscores that the level of difficultly required to disrupt global navigation is low encompass non-state actors.
“Disrupting or corrupting PNT signals used to be the purview of nation-states. This is no longer true,” CISA wrote in June 2021 fact sheet. “With a few hundred dollars of commercially available hardware and free software, hackers can block or replace GPS signals. In addition, GPS signals may be disrupted due to system errors, user equipment failure, or environmental effects such as solar flares.”
BLAKFX has expertise with cyber-security for LEO satellite grids.
BLAKFX’s data security capabilities in relation to Low Earth Orbit (LEO) satellite networks makes us not just the best data security product on earth, but in space as well. We are also aligned with the US air force and a next generation jet fighter design group to secure their hypersonic flight objectives i.e. speeds in excess of Mach 5. It won’t be long before the Helix22 SDK is found on an even wider range of aerospace activities that include exploration missions. This is not only due to our hackproof cryptography, but also our ultra low latency.
BLAKFX provides Device-2-Device (D2D) Encryption with multi-patented DNA BindingTM cryptography that embeds with the data itself. Vast distances, 5G networks and hypersonic speeds require a data security product that is ultra-fast. The Helix22 SDK is 1000x faster than TLS.
What we understand better than anyone else is the new era of data security is one that requires new solutions. At BLAKFX, we understand that protection of your data requires that it be protected wherever it is. Whether on the cloud, in transit on a foreign network or on a trusted suppliers system. Data security cannot just be about protecting your own systems. Therefore, we know that the era of perimeter defenses is over as it is proving impossible to keep hackers from breaching the perimeter and accessing data. Also, E2E encryption based on old models of RSA cryptography will be obsolete when quantum computing becomes more widespread.
Helix22 is Quantum Immune – Start Your Integration on our Git
Helix22 delivers perfect security assurance due to our genius engineering team that has invented a new model for data security that required an innovative look at the problem. The approach we took was to protect the data itself. Almost all other data security products attempt to build a perimeter or being fanatic on user credentials. However, once the product is breached or a password is stolen, even if it is 2FA or encrypted, your firms data is in the clear.
You see, the Helix22 cryptography is embedded with the data itself through our inventive and multi-patented process of DNA BindingTM. Therefore, even if credentials are stolen the data cannot be exfiltrated. This means that all data is 100% protected regardless of the type of attack.
Another substantial advantage of Helix22, is that it protects all data whether at rest, in use or in transit. All communication apps for example, only encrypt data while in transit. Therefore, that encryption become useless for internal IT security or Artificial Intelligence or Machine Learning experimentation. All data generated during these massive computing exercises is equally protected in real time. Plus, the latency period for the Helix22 is exponentially less than any other security product, so it actually contributes to faster processing times.
The Helix22 is easy to install and runs on all platforms, programming languages, networks and devices.
Our Motto
“In Math We Trust”
In this protocol, we are truly a “zero-knowledge” server so your private communications and transmissions remain completely top secret. Even in the event that BLAKFX were subpoenaed, we can honor the request by just handing over the encrypted content…as that is literally all we have. Helix22 also only use keys just one-time and then destroys them. This way the data security is future forward prefect. Therefore, in our unique user-to-user encryption (U2U) world, there is no opportunity ever for any data leak.
The Helix22 data security SDK accomplishes the following:
- Protects all your firms data at rest, in use and in transit
- Renders ransomware threats obsolete
- Eliminates human error
- Eliminates all malicious or interior attacks
- Verifies original content i.e. minimizes the threat of impersonation attacks and deep fakes
- Reduces latency
- Installs with 5 lines of code
- Runs on any platform, network, device and in any programming language
- Provides perfect future/forward secrecy
- Delivers “zero-knowledge” encryption
- Compatible with all cloud, 3rd party and vendor services
- Ensures privacy and security for blockchain and all cryptocurrency transactions
- Is quantum ready – so there’s no need to upgrade when the time comes
- Requires no employee training
- Exceeds all gov’t and banking security standards
- Meets all international compliance regulations
D2D encryption
We can make this claim as the tech engineers at BLAKFX invented and patented a genuine device2device (D2D) encryption. We manage data security transmission through the truly brilliant and also patented universal Helix22 key service. The Helix22 encryption originates on your network or device, not just when the app is opened. This means, that when data arrives to our key server, it is already encrypted so all it needs to do is issue another key. Signal and Telegram cannot claim this level of security. This key will then only work with the intended device, which generates a matching key required to open the data. In this protocol, we are truly a “zero-knowledge” server so your communications and transmissions remain completely top secret. Even in the event that BLAKFX were subpoenaed, we can honor the request by just handing over the encrypted content…as that is literally all we have. Helix22 also only use keys just one-time and then destroys them. This way the data security is future forward prefect. Therefore, in our unique device-2-device (D2D) world, there is no opportunity at all for any data leak.
This same protocol just described, can be the same with all your 3rd party vendors and suppliers. It does not matter in the least what platform they are running or what device they are using or even the type of data, it is all 100% protected. We do however, strongly advise that all firms involved be utilizing Helix22 due to the nature of the data content. Helix22 can ensure that whatever data they are generating is protected as well.
Let’s take it a step further. Even if your organization were a victim of an internal attack or a victim of malicious open source downloads, there is no reason for concern. Any data that has been forwarded, downloaded, copied or saved cannot be exfiltrated. Period. We have the technology industries foremost data packets which are protected with multi-layered, military grade encryption algorithms that have already proven the ability to withstand penetration testing from MI5 and quantum computing attacks.
One final practical genius of DNA BindingTM is in that it is immediately compatible with whichever system or software you are utilizing. Therefore, any organization can forward information to another and then discuss it and there is immediate privacy.
BLAKFX is Based on Success
Our founders, Robert Statica PhD and Kara Coppa, also founded Wickr, which is used by the US military and has never been hacked since its inception in 2012. The Helix22 data security SDK is several generations enhanced since then. Dr. Statica also delivered the encryption for the world’s most secure phone, Katim.
Founder – Robert Statica PhD Founder – Kara Coppa Founder – Alex Maslov MS, MBA
Co-Founders of Wickr KatimTM Ultra Secure Smartphone
Finally, the Helix22 encryption is quantum computing ready so no need to redo all your data security methodologies in a couple of years when everything else becomes obsolete.
We like to refer to Helix22 as “22nd Century Data Security.”
Helix22 – Zero Risk