From the Sentinel Lab: Secure Transient Network Device

From the Sentinel Lab: Secure Transient Network Device

A central concept in the work of the Sentinel Project is the importance of security. Nowhere is this more relevant than ensuring the safety of individuals who work with us or contribute to our field operations. Because those who assist conflict prevention often face hostility and violence for their efforts it was important that they have a secure method to disseminate information, (1) through wireless means in areas with diminished communications infrastructure, (2) anonymously and, (3) across multiple platforms or operating systems.

One of our responses to this challenge is Jade, a prototype of a secure transient network device. It allows people to set up temporary, protected, offline wireless networks in order to exchange files or communicate anonymously. The network only ever exists when the device is powered up, either by its on-board battery or plugged in via micro-USB, and only within a 30-40 foot radius. This means that only those individuals with the access key can communicate and share data entirely through this temporary network. This avoids more easily traceable methods of communication such as phone calls, SMS (text) messages or e-mail. It also does not need to connect to a computer or other device because it has its own on-board data storage. Users could theoretically communicate while in separate restaurants in separate buildings and it can also act as a ‘dead drop’ where an individual simply walks through the network area and deposits a sensitive file onto the device anonymously without stopping. It works in conjunction with very standard mobile apps and computer software.
We hope to begin testing the system in the coming months with an eye towards deploying it in our field operations.


  1. Ann

    If you care about the effectiveness of this tool, you should remove this post — publicizing methods for secure communications defeats the purpose of having them in the first place. It’s like handing your adversaries a how-to guide for compromising your operations.

    • Drew Boyd

      Hello Ann,
      Contrary to popular belief, many secure communication systems have publicly available capability outlines. You will note that the vital system specifications, configurations and parts are not made available here. Furthermore, the Sentinel Project is committed to open source technology and believes that the benefits of proliferating Jade outweigh the risks of it being effectively countered. This is in large part because of the way Jade is intended to be used.


Leave a Reply to Ann Cancel reply

Your email address will not be published. Required fields are marked *