Blind Tiger Communications

Your Cellular Firewall for Phones & Drones

Blind Tiger Logo

Your Cellular Firewall for Phones & Drones

Interception, Not Jamming

Plug in. Auto-configure. Block hostile devices instantly—without jamming or RF expertise.

See How It Works
Drone

Why Blind Tiger

Our platform acts like a firewall for the airwaves, covering cellular (2G/3G/4G/5G), Wi-Fi, and Bluetooth. Trusted phones, tablets, and radios work without interruption. Unknown or malicious devices — from contraband phones to drones — are denied access under the Blind Tiger umbrella.

Autonomous

Power on, self-configure, and adapt in real-time—no wireless SME required.

Extraction

Pull suspicious devices off incumbent networks into a controlled zone.

Seamless Integration

API/C2 ready for government and enterprise platforms (SOC, SIEM, TAK, SAPIENT, FAAD C2).

Multi-Radio Coverage

Cellular (2G/3G/4G/5G), Wi-Fi, and Bluetooth in one unified system.

How It Works

  • Survey & Self-Configure: We map the RF environment and set safe defaults in minutes.
  • Identify & Classify: Detect and fingerprint devices across cellular, Wi-Fi, and Bluetooth.
  • Enforce Policy: Allow trusted devices; quarantine or deny unknown and hostile ones.
  • Extract When Needed: AI edge device extraction selectively pulls targets off incumbent networks for control.
  • Adapt Continuously: Auto-updates as the RF environment changes—no constant re-tuning.

Watch: Blind Tiger in Action

Autonomous Intelligence, Not Jamming

Blind Tiger goes beyond detection and denial...

  • Device extraction: AI edge device extraction capability to controlled zone.
  • Continuous adaptation: Self-updates to environment.
  • Granular control: Allow, quarantine, or deny.

Integration & Interoperability

Blind Tiger plugs into government and enterprise ecosystems...

  • C2 & Mission Systems: TAK, FAAD C2.
  • Security Operations: SIEM/SOAR integrations.
  • Deployment Models: Portable, rack, or distributed.

Beyond Typical

Wireless Security for Mission-Critical Environments>

In today’s mission-critical environments, security extends beyond physical barriers. Wireless devices — including drones (UAS) and other unmanned systems (UxS) — increasingly exploit cellular and Wi-Fi networks to breach perimeters and disrupt operations.

Blind Tiger’s automated RF security platform continuously monitors these wireless environments, detecting changes, identifying devices, and adapting in real time to maintain full-spectrum protection.

With advanced capabilities to detect, locate, track, and neutralize unauthorized devices, Blind Tiger delivers real-time situational awareness and rapid response — whether via 1-click manual control or fully automated, hands-off protection.

Close the wireless security gap with Blind Tiger.

Proven Success

Managed Access

In its simplest application, a conceptual communication umbrella is created around your vital area selectively allowing wireless devices that are vetted by your company access to the macro wireless network unimpeded while disabling unknown devices denying access to the wireless environment while under the Blind Tiger security umbrella. We act as the wireless gatekeeper to your facility.
This process is known as Managed Access.

  • Licensed (Cell Phone) and Unlicensed (WiFi) protection
  • Detect, Identify and Locate the devices (UAS/Phone)
  • Intelligently decipher between devices
  • Disable non-vetted devices
  • Vetted devices can operate unfettered

See the Invisible

Automated Protection — No Expertise Required

Blind Tiger’s auto-configuration technology eliminates the need for on-site cellular experts. Simply power on the system, and it instantly scans the spectrum, configures itself, and begins protecting your facility — anywhere in the world.

Our platform defends against a full spectrum of wireless threats, from unauthorized phones and rogue cellular base stations to drones and other unmanned systems (UxS).

Drone Defense

Blind Tiger monitors the global wireless environment, detecting and identifying various protocols that are present. This include Cellular, Wi-Fi and Bluetooth protocols. Each of these well-known consumer communication protocols have command and control protocols embedded within enabling the remote control and aircraft to exchange information and operate. By monitoring the wireless communications, decoding the protocols extracting the identifiers Blind Tiger is uniquely positioned to allow the device to operate if known, otherwise initiate a kill sequence send the device back to its home, creating an umbrella around your facility.

Venues

Stadiums, Parks, Domes, Subways, Critical Infrastructure all are at risk from wireless devices. Wireless devices such as Phones and Drones are capable of transporting, detonating and triggering explosives. These events have already occurred in Venezuela with an attempted assassination the president, the Russians used a drone to set off weeks long explosions by crossing borders and dropping thermite on a Ukraine ammo depot, in U.S. and Global Prisons contraband such as knives, drugs and phones are dropped by drones. A $200 Drone in the vicinity of an airport can destroy millions of dollar's worth of airplanes and take human life.

Unfortunately for the security professionals, jamming the spectrum will do more harm than good, and wireless devices do not have tracers in which the public can see the transmission. Blind Tiger doesn't jam the spectrum to alleviate the wireless cyber security issues, jamming kills and its indiscriminate. Blind Tiger detects the devices and performs a cyber style attack against these wireless devices disabling or forcing them back to where they came from. We implement multiple "geo fences" at a staggered distance from the critical asset, providing early warning notifications, escalating notifications until the kill sequence is under way, securing your critical infrastructure and assets.

Corporate Security

SCIFs, R&D, Financials, Board Rooms, Hospitals.

Does your company have a 'No Electronics Beyond This Point' policy? How do they enforce the policy?

Blind Tiger's Board Room Assurance product enforces your corporate policies protecting against Cellular, Wi-Fi and Bluetooth wireless devices. Corporate espionage by U.S. adversaries is spiking, lurking around U.S Corporations providing unsuspecting guests, employees an unencrypted, open 'Hot Spot' masquerading as your corporate network. Your guests and employees mistakenly attach to the infected access point unknowingly downloading viruses, malware and trojans that are brought into your corporate environment.

You spend a lot of time, resources protecting and hardening your wired networks -- but do you know who your real estate next door neighbors are, and what type of wireless signals they are transmitting? How about the guy in the car across the street? Blind Tiger can detect, identify and disable the rogue, nefarious wireless servers that can and will launch a wireless cyber-attack against your assets.

Prison Systems

Blind Tiger got its start securing Georgia's Urban, Max Security Facilities in which we demonstrated precise control of the wireless signal. When the Governor of Georgia gave his approval, we took our System that was originally designed for Managed Access on the battle field protecting the war fighter into the commercial realm. As soon as we setup in the facility we did several operations. #1 We did a monitoring operation to understand how many cellular devices where inside the facility, and found 47% of the inmates had cellular devices. #2, We did a complete shutdown of the facility, while allowing leadership the ability to communicate. Suppression Image#3, In order to show that we can control behavior and modify the behavior within the facility we allowed AT&T cell phones to operate, while denying the rest. ATT Usage UpWhat we found was interesting. Inmates were selling their "non-operational" phones to the new inmates arriving attempting to get money back from the phones that now, somehow didnt work...And the AT&T phones, which once where seldom used due to the price point where now increasing in quantity because they where the ones that Blind Tiger allowed to work.

Bokath Pix

Chuck Bokath

President Chuck Bokath, founder of Blind Tiger and subject matter expert in wireless security, has 30+ years of experience spanning commercial, academic, and military organizations. Bokath's start includes working with the early USA commercial carriers, developing the features we all use today in what was then called an "Intelligent Network" with necessary network signaling, while the ten years in academia working as a Principal Research Engineer at Georgia Tech Research Institute creating the wireless security lab was filled with thought leadership experiences including chairman of TIA - the North American Standards committee on Machine to Machine (M2M) Security architecture and standards across tiny to large IOT devices with this North American standard folding into the 3GPP Global Standards. While working as a security subject matter expert for the CTIA - the cellular ecosystem representative to federal agencies involved in regulating wireless activities, Bokath created a mobile phone system (now Blind Tiger) to perform wireless security research. The efforts were the basis for vulnerability reports to the FCC and Congress to protect the US telecom critical infrastructure. Bokath, as a thought leader in the cellular ecosystem, wrote many papers on E-911 current capabilities for the FCC, FTC, "Privacy and Security Implications of the Internet of Things" and security related presentations to the US Congress, lecturing and creating security and electronic warfare curriculums for continuing education courses at Georgia Tech and the Ministry of Defenses internationally, and has been featured in the New York Times - picked up by primary news sources globally, television and radio appearances on CNN, CBS Radio and provided consulting services for wealth management firms, corporations.
John Pix

John Giatropoulos

VP Engineering John Giatropoulos, "Tropo" is a seasoned entrepreneur creating and selling his company before coming and working with Blind Tiger. Tropos mastered his engineering skills working in multiple industries in the late 90s and early 2000's eventually hired by Chuck in 2007 for another company as a Senior Engineer. Together Chuck and John increased the EBDITA of the company by a multiple of 3, positioning that company for a strong sell of the company, then on to start other bleeding edge companies.
Keith Pix

Keith Jones

Vice President Security Programs
Keith is a seasoned security professional and a national security expert. He previously led security operations for over a decade as a prime contractor for the Trident Weapons System, which is the U.S. and British's primary submarine-launched nuclear ballistic missile fleet. Throughout his career, Keith has provided security solutions for over 500 National Security programs classified up to the Top-Secret level. He has a history of delivering holistic security programs that align with company strategy and have proven to reduce and eliminate risk. These programs also derived significant bottom-line savings, added measurable business value, created the desired employee culture, and increased company prestige. Keith is a five-time nominee and recipient of the James S. Cogswell Outstanding Industrial Security Achievement Award.

Latest News

Operation Flytrap: Countering Cellular-Enabled Drones Without Breaking the Network

Nov 2025
Operation Flytrap validated cellular counter-UAS in NATO coalition environments—without jamming or disrupting lawful communications.
Blind Tiger demonstrated control-plane wireless security and SAPIENT-compatible reporting to support broader C-UAS and air-defense systems. Read more

SOFIC17: Blind Tiger Selected by IC and SOCOM as Cellular Counter-UAS SME

Sept 2025
Blind Tiger was selected by the IC and SOCOM as a subject matter expert in cellular technologies supporting counter-UAS and wireless security missions.
The selection reflects operational demand for standards-compliant, coalition-operable cellular security capabilities. Read more

Canadian Government Trial: Managed Access & Cellular Counter-UAS for Corrections

May 2025
Blind Tiger demonstrated autonomous, zero-PII cellular managed access for corrections—detecting phones and cellular-enabled drones in minutes under Canadian RF constraints.
The trial validated rapid network discovery (37 networks / 11 bands), policy-based enforcement, and privacy-preserving control without carrier integration. Read more


Silent Swarm 2024: Cellular Counter-UAS, Searching for Assets win a HAVOC USV

July 2024
Blind Tiger was selected from over 800 companies to participate in Silent Swarm 2024 demonstratng cellular counter-UAS capabilities supporting electromagnetic spectrum operations from air, land, and maritime domains.
The demonstration explored cooperative, meshed cellular operations and managed access techniques applicable to distributed and swarm-based threat environments. Read more

Trident Spectre May 2023: Cellular Counter-UAS and Managed Access Demonstration

May 2023
Blind Tiger demonstrated cellular counter-UAS and managed access capabilities at Trident Spectre 2023 in support of Special Operations and national security missions.
The assessment validated rapid “drop-and-go” cellular surveying, clandestine network operation, and selective device management without jamming or RF collateral effects. Read more

African Lion 2022: Three-Unit Meshed Cellular Counter-UAS Demonstration

Jun 2022
Blind Tiger deployed a three-unit meshed cellular counter-UAS system with NATO, U.S., and partner-nation forces during African Lion 2022.
The demonstration validated distributed, cooperative cellular protection of the area of interest, extending security beyond physical perimeters without disrupting lawful communications. Read more


U.S. Air Force Base of the Future: Cellular Wireless Security Finalist

2019
Blind Tiger was selected as a finalist in the U.S. Air Force Base of the Future challenge for its cellular-based wireless security capabilities.
The effort focused on protecting large-base perimeters from unvetted wireless threats while preserving lawful communications and supporting integrated defense effects. Read more

DoD Rapid Innovation Fund: Cellular Counter-UAS for AFRICOM Operations

2019
Blind Tiger was selected under the Department of Defense Rapid Innovation Fund to deliver cellular-based counter-UAS and managed access capabilities supporting AFRICOM missions.
The effort focused on protecting forward operating bases from cellular-enabled drones and unvetted wireless devices without jamming or disrupting lawful communications. Read more

2018 DoD Counter-UAS Award: Cellular-Based Threat Detection and Mitigation

2018
Blind Tiger received a Department of Defense Counter-UAS award for its cellular-based approach to detecting and managing unvetted drone threats.
The effort addressed cellular-enabled and commercial drone platforms using standards-compliant techniques without relying on jamming or disruptive RF effects. Read more


Managed Access for Cellular, Wi-Fi, and Bluetooth in Restricted Environments

2018
Blind Tiger expanded its managed access capabilities to include cellular, Wi-Fi, and Bluetooth—enabling enforcement of wireless security policies in restricted environments.
The solution supports secure operations in defense, government, and enterprise facilities by controlling unvetted wireless devices without jamming or RF collateral effects. Read more

2018 DoD OTA Award: Dynamic Cellular Protection for Convoy Operations

2018
Blind Tiger received a Department of Defense OTA award to deliver dynamic cellular protection for convoy operations traversing hostile and unknown wireless environments.
The capability enabled rapid, self-configuring cellular security to mitigate cellular-triggered threats and unvetted devices without requiring RF specialists or disrupting lawful communications. Read more

Techstars 2018 Selection: Defense-Focused Wireless Security Innovation

2018
Blind Tiger was selected for the 2018 Techstars Accelerator, receiving mentorship and support focused on scaling defense-relevant wireless security technologies.
The program provided early validation of Blind Tiger’s cellular managed access approach and supported its transition toward government, defense, and national security deployments. Read more


Securing Correctional Facilities with Cellular Managed Access

2018
Blind Tiger successfully deployed cellular managed access solutions to secure correctional facilities by detecting and controlling illicit wireless devices without disrupting lawful communications.
The deployments demonstrated precise control of inmate phones in dense urban environments while preserving communications for staff, first responders, and nearby communities. Read more

2017 U.S. Southern Command Selection: Cellular Managed Access

2017
Blind Tiger was selected by U.S. Southern Command to support automated cellular managed access in response to regional security challenges.
The effort focused on enabling scalable deployment of cellular security capabilities without requiring specialized cellular expertise, supporting mission needs across multiple wireless generations. Read more

Copyrights © 2018 All Rights Reserved by Blind Tiger Communications
info@blindtigercom.com ·