Blind Tiger was selected as a finalist in the U.S. Air Force “Base of the Future” challenge for its cellular-based wireless security approach—protecting large installation perimeters against unvetted devices while preserving lawful communications and avoiding RF collateral effects.
Why It Matters
Air bases and other critical installations increasingly face threats that exploit the same commercial wireless environment used by staff, visitors, and nearby communities. Traditional mitigation methods that rely on broad RF denial can be operationally risky. Blind Tiger’s approach instead applies policy at the network layer, enabling selective outcomes that scale across complex, real-world coverage conditions.
Selection Focus
- Installation perimeter defense against unvetted phones, modems, and wireless-enabled devices
- Policy-based device control without dependence on jamming
- Operational compatibility with mission systems and reporting workflows
Operating Principles
Blind Tiger’s model is privacy-preserving: it does not require payload access and is designed to avoid collection or storage of personally identifiable information (PII). Effects are driven by policy and observable network behavior, supporting compliance-oriented deployments in sensitive environments.