ARCHON CAMO

Covert Attribution Management and Orchestration

Mask assets’ identity, location, and destination server with Archon CAMO.

Archon CAMO, for anonymization and misattribution

 

Archon CAMO is designed to prevent adversaries from associating mobile users with Commercial Solutions for Classified (CSfC) enclaves and other government servers.

Archon CAMO

Obfuscates both the user device and the destination server in two ways:

 

 

ONE: 

It makes IPsec VPN traffic look like another type of traffic, such as a YouTube video or IP camera stream.

 

TWO: 

Routing traffic through a multi-hop path that’s created exclusively for the current session. For each session, Archon CAMO randomly selects servers from hundreds of private and popular commercial services worldwide. (We can exclude specific countries or regions.) The options include major hosting providers that don’t attract attention, like Amazon Web Services (AWS) and VPN providers like NordVPN. At each hop, a VPN server is spun up just for the duration of the session. We will exclude countries or regions at your request.

The Archon CAMO difference:

lock-shield
Asset identity protection
Masks the fact that users are connecting via IPsec—a tip-off to adversaries that the user could be a high-value target.
headphones-1
Mission protection & Plausible deniability
Obfuscated traffic makes it more difficult for adversaries to identify CSfC enclaves. Private, one-time servers leave no trace
lock-secure2
Server identity protection
Masks the destination with multi-hop chains that include non-attention-getting commercial infrastructure and VPN providers.
speed2
It does not change the user experience
Just turn on the device and go. Archon is built into the Archon platform and integrated with CSfC-based architectures.
What is CAMO?
CAMO is an obfuscation and managed attribution solution that provides the ability to hide the users' presence online using a VPN-based multi-hop technology to make it more difficult for adversaries to identify CSfC enclaves.
How does CAMO hide you in plain sight?

ONE: It makes IPsec VPN traffic look like another type of traffic, such as a YouTube video or IP camera stream.


TWO: Routing traffic through a multi-hop path that’s created exclusively for the current session. For each session, Archon CAMO randomly selects servers from hundreds of private and popular commercial services worldwide. (We can exclude specific countries or regions.) The options include major hosting providers that don’t attract attention, like Amazon Web Services (AWS), and VPN providers like NordVPN. At each hop, a VPN server is spun up just for the duration of the session. We will exclude countries or regions at your request.
Why are network obfuscation and managed attribution solutions like CAMO important?
Just encrypting your data before sending it over the open internet isn’t enough anymore. An adversary might not be able to view the data, but by seeing that it's encrypted and seeing where it's coming from they can easily extrapolate that A) this is probably important and B) this person's probably important. CAMO’s obfuscated VPN service adds an extra layer of protection by making IPsec VPN traffic look like another type of traffic, such as a YouTube video or IP camera stream.
Is CAMO’s managed attribution solution configurable?
Yes.
What makes CAMO different from other managed attribution solutions?
The biggest difference is CAMO’s ability to create and break down a new dynamic connection from month to month or even daily. We have the capabilities to set up new locations on the fly, whereas other obfuscation services on the market set up the first initial network and that is it. Keeping the initial network makes it easier for someone to eventually track down where they are.
How long does it take to set up an obfuscation connection with CAMO?

Compared to other obfuscation and managed attribution services out there, CAMO is relatively fast and agile when it comes to building and tearing down connections in the field. All users have to do is follow 4 simple steps.

1. Install Archon Camo on the user's device, select countries or regions you don't want traffic to come from, and you're off.

2. The operator connects to a local Wi-Fi network

3. Archon CAMO software dynamically spins up and links temporary servers and commercial services to be used only for this session.

4. Enjoy secure access.  And when you disconnect, servers are wiped and terminated.

Is there a lot of equipment involved in setting up CAMO?
Not a lot of equipment is needed to stand up a new obfuscated network. Since we use various points of presence around the world that are already stood up and use major cloud providers, there is way less material needed to get the job done.
How user-friendly is CAMO’s interface?
Want to see the interface for yourself? Schedule a demo and get an inside look into how you can easily reshape your presence online.
What is CSfC?

The U.S. government increasingly requires the immediate use of the market’s most advanced commercial hardware and software technologies within National Security Systems (NSS) to achieve mission objectives.

That’s why NSA/CSS has established the Commercial Solutions for Classified (CSfC) program: To leverage commercial products for layered solutions that protect restricted NSS information.

Utilizing innovations from the commercial marketplace allows U.S. government agencies to securely communicate through systems that can be deployed in the field in months, not years.

Read More
What Level of Secure Connection Do I Need?

Building the right infrastructure for secure communications is never a one-size-fits-all project. The types of information, who you are, who you’re communicating to, and how secure the connection needs to be all play huge roles in determining the right blend of technology to support your needs.

Speak To An Archon Secure Solution Engineer

Contact us.

Our team of experts has configured hundreds of solutions for organizations throughout the globe. Let us help you make security simple.