Platform

One platform.
Two teams.
Six domains.

SafeKey Lab is built around a deliberate refusal of false choices: between offense and defense, between defense and commercial, between handheld and command-surface. Every architectural decision flows from one constraint — make it work for the operator who has to use it under stress.

Two missions. One platform.

Red team and blue team capabilities, sharing one core.

The same authorization gate, the same audit database, the same friendly-asset registry, the same effect-measurement pipeline. Red team exercises feed blue team improvement. Blue team gaps inform red team scenarios.

Red Team

Adversarial emulation, on demand.

Stress-test friendly defenses with the same toolkit a real adversary uses. Authorized. Audited. Reversible. Built for training rotations, capability evaluations, and continuous offensive validation in operational and exercise environments.

  • RT 01 / ProbeActive and passive reconnaissance across every band the platform supports.
  • RT 02 / SpoofMulti-transport identity injection. Fabricated track creation for blue-team detection validation.
  • RT 03 / DisruptAuthorized link denial under safety-locked operator control. Effect bounded in time and scope.
  • RT 04 / ValidateEffect measurement: which targets responded to which technique, with what latency, in what way.
  • RT 05 / AuditEvery red-team action recorded to a tamper-evident database. Repeatable, after-actionable, defensible.
Blue Team

Defense that proves itself in real time.

Cross-modally corroborated detection and tamper-evident response. Multi-layer authorization. Friendly-asset awareness. Built for soldiers, operators, and security teams who need decision-grade evidence at the moment that matters.

  • BT 01 / SenseMulti-modal passive detection. Operator gets evidence-grade input, not raw signal.
  • BT 02 / CorroborateCross-channel track confirmation produces an evidentiary-standard single-target track.
  • BT 03 / ClassifyFamily- and class-level identification under operator-configurable thresholds.
  • BT 04 / RespondAuthorized engagement under multi-layer safety lock. Friendly-asset aware. Reversible.
  • BT 05 / AuditTamper-evident accountability for every decision and every effect.
Shared core Audit database · Friendly registry · Authorization gate · Effect-measurement pipeline · Doctrine codification — single source of truth for both teams.
Capabilities

Built around what operators
actually need under stress.

The platform is opinionated. It refuses false binaries between offense and defense, between automation and operator control, between speed and accountability. The capability surface below describes what the operator gets — not how it works.

Decision-grade detection

Threats surface to the operator with the kind of evidence you can act on — not raw signals, not noise, not single-source guesses. The platform decides what's worth showing.

Operator-meaningful classification

Not "something detected." Threat-class taxonomy with confidence the operator can read at a glance. Built so a soldier under stress doesn't have to interpret raw machine output.

Authorization built in

Engagement requires affirmative operator action. The platform won't take active steps the operator didn't authorize. Reversible by physical control.

Friendly-asset awareness

The platform knows what's friendly before it considers what's hostile. Friendly-asset deconfliction is the floor of every active capability, not an add-on.

Authorized adversarial effect

When the rules of engagement allow it, the operator can apply effect against confirmed targets. Bounded in time. Bounded in scope. Logged in full.

Effect feedback loop

What did the action actually do? The platform observes the result and brings it back to the operator. No assumption. No hand-waving.

Cross-echelon handoff

Targets that exceed the platform's envelope hand off cleanly to higher-echelon effectors with the track payload intact. The seam is the platform.

Tamper-evident accountability

Every operator action and every autonomous decision is captured in a form that can be reconstructed after the fact. Built for organizations that have to answer for what their systems did.

Form factors

Same stack. Different shape.

An operator trained on the handheld can step into the cell or the cloud surface and recognize every concept. Doctrine codified in the cloud propagates back to the dismounted edge. The platform is one product, not three.

Edge · Handheld

Tactical handheld

Soldier-carried compute and sensing. Operates without backhaul. Engagement decisions at the tactical edge, in the operator's hand.

Carry
Sub-2 kg
Operator
One soldier
Backhaul
Optional
Authority
Tactical edge
Edge · Air-gapped

Air-gapped operations

Self-contained command surface for classified or disconnected environments. Hardened against external dependency or compromise.

Form
Rugged compute
Backhaul
None required
Operator
TOC / cell
Authority
Battalion +
Network · Cloud

Cloud command surface

Multi-mission oversight, sync, and authorization across distributed handheld units. Available to both defense and commercial customers.

Form
Web platform
Backhaul
DoW / enterprise
Operator
Multi-user
Authority
Brigade · Org +

Unified stack. The detection pipeline, audit schema, friendly-asset registry, and engagement gating are identical across all three surfaces. Operators do not retrain. Doctrine does not fork. Audit trails are interoperable.

Compliance

Built to procurement reality.

Designed for the reality of DoW acquisition and high-trust commercial deployment: ITAR registration, Section 889 supply chain, MIL-STD environmental and EMI testing, CMMC L2 self-assessed, and IL5 / IL6 deployment via Azure Government / GovCloud.

Every architectural decision was validated against an acquisition checklist before being implemented. Compliance is a design constraint, not a retrofit.

DomainStandardStatus
Export controlUSML Cat XIITAR controlled
Supply chainSection 889Compliant
EnvironmentalMIL-STD-810HIn progress
EMI / EMCMIL-STD-461GIn progress
CybersecurityCMMC L2Self-assessed
DeploymentIL5 / IL6GovCloud-ready
Intellectual propertyUSPTO 35 §111(b)Provisionals filed

Ready for the brief?

For DoW program offices and operational units, we provide a classified-friendly capability brief and field demonstration.

Request a briefing