Android is an open source operating system based on Linux which primarily runs on mobile devices. Android apps are written primarily in Java for touchscreen devices. As of Q4 2010 Android is the most widely used smarthphone platform though recently it has seen use on televisions, game consoles, and other electronic devices.

NKI has a core team of individuals with experience working in the Android environment and developing Android applications. NKI has developed malware for DARPA, provided academic solutions and written embedded cryptographic modules for Android, giving us a breadth of understanding building custom Android applications and a deep understanding of the operating system.

Software Defined Radio
Software Defined Radio is a communications model that uses software processing to perform functions traditionally tied to specific radio hardware. Software Defined Radios are more flexible both in their use of the RF spectrum and the functions a radio can perform. By offloading the processing to general purpose processors, software can be written to emulate various, or multiple, hardware functions at once.

Software Defined Radio is a new and exciting business area for NKI. We have developed software applications for both commercial and military radio platforms and we are currently supporting multiple government customers. NKI works to expand the capabilities of hardware allowing us to collect a signal of interest and exploit its information. NKI has developed software to perform detection, monitoring, collection, processing (for data and/or metadata, direction finding and geolocation.

High Assurance Internet Protocol Encryptor (HAIPE) is a DoD and IC initiative to transform network encryption by developing interoperable network protocols and encryption schemes for 21st century networks. HAIPEs use High Assurance security techniques along with cutting edge networking making them the only IP network-layer devices trusted to protect classified traffic for Top Secret and above networks.

NKI has been the lead in providing systems and software engineering for these protocols since 2000. NKI has been a lead participant in the HAIPE Working Group (an invitation-only government/industry partnership) since its inception. NKI has worked with government agencies and industry to design high security encryption and networking techniques and has contributed to improving commercial encryption standards. NKI develops software tools to support rapid prototyping, emulation and formal compliance testing. These tools are utilized by developers of large defense systems to reduce risk during their development. NKI has also developed small form factor HAIPE implementations to demonstrate use of HAIPE as a viable solution for use by special applications and covert communication systems.

Embedded Systems
In contrast to traditional software, embedded software generally runs devices which are not usually recognized as computers. Todays embedded processors have many times the computing power and memory of the first PCs introduced in the early 1980s. The mobile revolution has spawned the development of many different embedded processors, including ARM based OMAP designs, which are capable of performing multimedia, signal processing, networking, etc.

NKI has performed development of FPGA Power PC based embedded using Real Time Operating System software, and has developed a ARM based, secure IP networking core framework for Android code named AHI. We are excited about the fast moving developments in mobile embedded computing and will be leveraging them in our research and product development.

Public Key Infrastructure
Public Key Infrastructure is the discipline involved in distributing credentials which are used to enable secure communications over insecure networks while also providing trusted authentication mechanisms. Through the use of key servers, user procedures, and cryptographic protocols a Public Key Infrastructure allows for the creation, storage and distribution of user and device credentials used in cryptographically secure communications.

NKI has been a thought leader both developing key management techniques and implementing technologies used in government grade key management infrastructures. NKI has provided systems and security engineering on the next generation of protocols which will deliver key and other cryptographic products to our warfighters. NKI also develops the software for emulation, modeling and simulation, and independent validation of these systems. NKI is looking to expand our role into Federal PKI and commercial key management systems.

Signals Intelligence
Signals Intelligence is the field of gathering intelligence by intercepting signals which can be passed from person to person, machine to machine or a combination of the two. SIGINT plays a vital role in our national security by providing America's leaders with critical information they need to defend our country, save lives, and advance U.S. goals and alliances globally. SIGINT is a rapidly changing field due to the variety of communications mechanisms available today. Working in the field of SIGINT is a challenging and very rewarding undertaking.

NKI provides software engineering, analysis, and other services to the Department of Defense and the Intelligence Community in support of their SIGINT mission.

Unmanned Aircraft Systems
Unmanned Aircraft Systems comprise more than just the aircraft. It includes Ground Control Systems, Control/Data Links, and other equipment required for the operation of the system. UAS have taken over an increasing number of roles in recent years performing everything from Reconnaissance, Logistics, and use as a Target as well as a growing use in combat roles.

United States military and law enforcement sectors have seen increasing growth in the use of UAS in recent years. NKI is participating in this technology area by developing the expertise in small radio spectrum sensors and secure data links. NKI is also developing small radio controlled drones to use for testing of UAS subsystems.

Cyber Security
Cyber security is a dynamic and complex field which involves the design, deployment, maintenance, and monitoring of secure systems and networks. The capability to accurately detect and evaluate anomalies on these systems and networks in order to determine the proper response requires a comprehensive understanding of the boundaries between networks, operating systems, applications and users.

NKI has over a decade of experience in the development and validation of network protocols. Our team possesses both offensive and defensive skills and a knowledge of the associated technologies that have allowed us to evaluate and secure computer systems and networks from the enclave to the enterprise. NKI is continuing to explore opportunities in our work with customers on cutting edge sensor and data fusion technologies.