SecureView® is a virtualized platform solution that enables a single workstation to access multiple levels of security and different classified networks, transforming ordinary PCs and workstations into superior cyber security platforms.Learn More
SecureView® is a revolutionary new virtualized platform solution that provides state-of-the-art security, enabling a single workstation to access multiple independent levels of security, and disparate classified networks. SecureView® software transforms ordinary, commercial PCs and workstations into cyber-hardened, trusted platforms, secure enough to protect access to the U.S. Government’s most sensitive and classified information, and national security systems.
SecureView® is a hardened, client-hosted virtualization solution that enables independent and concurrent access to multiple security domains, providing performance independent of network bandwidth and server contention issues, giving analysts consistent responsiveness for visually intensive analysis and collaboration. SecureView® provides state-of-the-art security while maintaining cost effectiveness and ease of use. The platform can handle a wide variety of applications, from general office to performance-intensive 3D graphic applications, from different security environments, all running on a single virtualized platform.
SecureView® is a cross domain access solution developed by the Air Force that provides users with the ability to access Multiple Independent Levels of Security (MILS) and Operational Domains on a single workstation. “Desktop as a Service” is a transformative strategy that revolutionizes the traditional IT operating model, enabling the Intelligence Community (IC) and Department of Defense (DoD) to migrate from an agency-centric IT architecture to a common platform where the community easily and securely shares technology, information and resources.
As an integrated component of a “Desktop as a Service” architecture, SecureView® provides the DoD and IC with a common, single workstation with the agility and ﬂexibility to support legacy, agency-centric IT environments, as well as a means to provide consolidated access to over twenty different DoD or IC networks through a single SecureView® workstation.
The SecureView® project is sponsored by the Air Force Research Laboratory (AFRL).
Our Introspective Virtualization tool is a customized Xen Hypervisor and library with a VM introspection API. By looking at the memory of a virtual machine during runtime, we can reverse engineer, debug software, and secure guest VMs.Learn More
Introspective Virtualization, or IntroVirt®, is a customized Xen Hypervisor and library that provides a robust virtual machine (VM) introspection application programming interface (API). VM introspection is the process of looking at the memory contents of a virtual machine during runtime. By applying knowledge of the guest operating system, introspection can be used for a variety of applications, including reverse engineering, debugging software, and securing guest VMs by limiting access to files or limiting an executing application’s functionality.
IntroVirt consists of two components: a patched version of the Xen Hypervisor, and the IntroVirt® userland library. The Windows® IntroVirt library, WintroVirt, can be used as a userland library that sits above IntroVirt to interact with Windows®-based guests. As IntroVirt and WintroVirt are both libraries, they use the widely accepted library nomenclature, referred to as libintrovirt and libwintrovirt, respectively.
Download: IntroVirt® Technology Overview Sheet
Proven Application Areas:
- Cyber asset protection
- Malware analysis
- Reverse engineering
- Dynamic application analysis
- Dynamic forensic analysis
- Training & simulation
- Experimentation & instrumentation
- Cloud security
- Collect and analyze non-invasively, without guest cooperation
- Enable and disable event interception—context-based, with low overhead
- Enforce policy, manipulate the environment, and terminate a process
- Examine core Windows® data structures
- Trace Windows® system calls, system call returns, and arguments
Check back to this page, as we’ll be adding new content on a regular basis, along with more detailed descriptions.
If you experience any security problems or other issues with our services or products such as SecureView, OpenXT, or IntroVirt, please contact our technical team immediately.
Developed by AIS and WetStone Technologies, SearchLight improves the effectiveness and efficiency of investigative analysis of network pcap files.Learn More
Investigative analysis of network pcap files is a tedious and error-prone process. Additional challenges, such as analysis of large pcaps, multiple pcaps, and lack of a highly tuned search and filtering engine, impair the effectiveness and efficiency of investigations. SearchLight™, developed by AIS and WetStone Technologies, addresses these issues and many more.
Visit WetStone Technologies to learn more about SearchLight.
WiFi Investigator® supports the wireless security needs of military, law enforcement, intelligence, and private sector operations.Learn More
WiFi Investigator® was developed and is maintained exclusively by AIS to support the wireless security needs of military, law enforcement, intelligence, and private sector operations. Specifically, WiFi Investigator® allows you to passively detect, locate, and analyze broadcasting 802.11 devices in real-time, and at a stand-off distance, without cooperation from the target(s). These capabilities are supported for 802.11 devices communicating over 2.4GHz and 5GHz frequencies, on a/b/g/n bands. WiFi Investigator® operates in passive mode, meaning it doesn’t broadcast data, and doesn’t attempt to connect to devices. In addition, packet collection, while possible, is disabled by default. As such, detection and location capabilities use packet header data, available regardless of encryption settings. The device can be used as a hand-held direction-finding utility, as a flat directional panel is mounted to the front. If war-driving sweeps are necessary, the flat-panel antenna can be disconnected, allowing the connection of an AIS Certified Omni-Directional antenna, available within the optional WiFi Investigator® Field Accessory Kit.
- Criminal investigations
- Network and sensitive data protection
- Policy compliance
- Security assessments
- Directionally find or war-drive with seamless antenna swap
- Multiband capability covering the 2.4GHz and 5GHz bands
- Visualize captured data within Google EarthTM mapping service
- V3 Field Accessory Kits include all required war-drive hardware
For additional product information, please visit wifi-investigator.com
As cyber threats increase, we’re always innovating, and creating new tools for our customers. A number of our original solutions have been patented.Learn More
Our talented staff are continually developing original, innovative, next-gen cyber tools and capabilities. Our national recognition, and growing list of patents, is a testament to this philosophy. We’re always exploring new frontiers and patenting new products, like those listed below. Check back to this page for updates.
Product Name: Wi-Fi Investigator
Patent No. – US 8,098,155 B2
Description: System and Method for Locating a Target Wireless Device
Date of Patent: January 17, 2012
Names on Patent: Richard Michael Gloo, Jacob Miachel Baker, Alexander James Williams, Jason S. LaShure, Robert James Durham, Nicholas Lawrence Owens.
Product Name: Secure Boot
Patent No. – US 8,478,974 B2
Description: Method and System for Reducing Impact of Malware during a Booting Sequence
Date of Patent: July 2, 2013
Names on Patent: Ryan Matthew Wilson, Joseph James Sharkey, Michael Joseph Sieffert
Product Name: MoRE
Patent No. – US 8,856,789 B2
Description: Facilitating Execution of a Self-Modifying Executable
Date of Patent: October 7, 2014
Names on Patent: Jacob Torrey
Product Name: TED OS
Patent No. – US 8,996,642 B2
Description: Trust Verification of a Computing Platform Using a Peripheral Device
Date of Patent: February 24, 2015
Names on Patent: Rian Quinn, Jacob Torrey