Redwoods Research
- Founded in 2020, Redwoods Research is an innovative systems design firm with expansive roots in pioneering technology communities.
- We architect, assemble, integrate, and deploy high performance, private, secure systems.
- Our team offers three decades of expertise drawn from successes such as:
Co-founder The Tor Project; a resilient, anonymity-oriented network infrastructure for intelligence
operations
Co-founder DarkOwl; offensive cyber security tools for threat intelligence and adversary emulation
C-Suite of TechTarget & Farsight Security (now DomainTools); enterprise-grade security analytics and
domain-intelligence platforms
Head of Engineering at Norse Federal Corporation; secure, defense-grade IT systems and services
With a consistent history of prototyping and deploying high-impact, landscape altering tools, Redwoods Research was formeto focus on continuously protecting the warfighter against the siege of 5th generation warfare.
AI - CYBERSECURITY - DARKNET - INTELLIGENCE
BUILD
Made-to-measure solutions for any problem
• Prototyping & Scaling
• Deploying AI
• Secure Communications
• Research & Development
• Anonymous & Parallel Construction
• Compartmentalized & Blind
GATHER
Mission oriented collections
• Open Source
• Encrypted Communications
• Darknet/Dark Web
• Signals
• Noise Reduction
• Active & Passive Data Collection
SECURE
Reducing threat vectors to operations
• Security Testing
• Hardening Assets
• Invent and Evolve System
• Advanced Persistent Threat Analyses
• Defensive Cyber Operations
• Offensive Cyber Operations
TRAIN
Coaching for resiliency and success
• Exploiting Existing Networks
• User Training for Redwood Products
• Sustaining Your Redwood Products
• Improving Operations
• Cyber Hygiene & SituationalAwareness
• Trends & Evolving Landscape Briefings
OFFERINGS
We build to your timeline and scale to available equipment.
IF YOU NEED IT, WE CAN MAKE IT.
SAFER Warfighter (DARPA)
Crafted comms technology to protect end users from intrusion, interruption, or exposure while supporting instant messaging, electronic mail, social networking, streaming video, voice over Internet protocol (VoIP), and video conferencing.
MEMEX (DARPA)
Created next-generation online search technology and domain-specific search paradigms for more effective, relevant, and expedient information discovery, extraction, retrieval, organization, and sharing.
SharkSEER (NSA, DISA)
Developed and deployed working, real-time analysis of incoming open source or commercial data streams to instantly judge IP's activity. Used BSD-licensed appliance running at at 40 Gbps, intercepting at the point of the 3-way TCP handshake.
Architected, developed,
maintained a vast search index to function as a "Google for the
darknet" with near real time retrieval of text, context, and
multimedia content. Separate deployment for agency-only index with
sensitive content handling.
CRISP (DOE)
Piloted the Cybersecurity Risk Information Sharing Program to deliver relevant and actionable cybersecurity information to protect the US electricity industry and protect the power supply.
Human Trafficking and Exploitation (Interpol)
Architected and built system for member countries to share Terabytes of open case data through a remote gateway, partitioning CSAM from the rest of the data.
US Army CID
Provided technical advisory services training investigators to do Deep Packet Inspection (DPI) on darknet activity pings in the network.
US Navy CIS
Assisted investigations into criminal activity within the service via technical advisory services on dark net markets and cryptocurrency
Undercover/Case Officer Training
Designed and delivered program for infiltrating, investigating, and operating a darknet marketplace. Provided safe access to the darknet via a dedicated Raspberry Pi workstation for cost efficiency.
The Tor Project
Developed an overlay network for enabling anonymous communication via multiple layers of encrypted routing built on free and open-source software hosted by volunteers.
Built data feeds for a system to monitor incoming travelers screening against known criminal elements and then provided Parallel Construction.
Architected and deployed a
global proxy network to facilitate the ex-filtration of data from
targeted countries as a prototype/proof of concept.
Architected and deployed a
global proxy network to facilitate the ex-filtration of data from
targeted countries as a prototype/proof of concept.
Researched, tested, and built a working prototype to customer specifications of an end-to-end encrypted AI/LLM inference system. Data is encrypted at rest, encrypted in RAM, and encrypted compute while running queries air gapped from the Internet.
SECURE AI
Secure AI is the world’s first and only end-to-end encrypted AI Large Language Model (LLM) inference. It runs public, open weight, read-only LLM models; like Qwen, Mistral, and GPT-OSS. These models run inside a trusted execution environment secured to each user via public key cryptography. We have a prototype available for customer demonstrations as well as operational instances deployed in air-gapped environments.
Secure AI can be built to spec, tailored to immediate needs, deployed quickly, hosted in your environment or our secure data center. From the field to headquarters, only the user account holds the private key. We store the encrypted chats and public key in our database. The user solely controls the access to the encrypted data with the ability to export the queries or results as they desire. All data is encrypted and zero logs are kept or retained about usage. The user can export their queries but otherwise everything is end-to-end encrypted. No one can steal, see, modify, lose, nor sell any of your queries, conversations, database of users, or other data. It is blind, even to us.
WHY SECURE AI?
Beyond being the only end-to-end encrypted AI, each instance is built to customer requirements, customized as desired. We can provide rapid deployment at the location, price point, and service model the mission dictates. Customers may buy the box and have us build on site, ship a finished product, have us host customer owned in a secure datacenter, or subscribe to Secure AI hosted on our hardware. We sell GOGO1, GOCO2, or COCO3.
We run everything in a Trusted Execution Environment (TEE) for encrypted computing to occur outside the normal operating system. This allows the user queries and data to be: encrypted at rest with the public key cryptography; encrypted in transit with the public key cryptography; and encrypted processing within the CPU itself, outside of the operating system. This setup provides
end-to-end security and privacy of data exchanged with the AI models. Your data is yours. It is impossible for us or anyone else to see or use your data. Your queries are not used to train our model. We train your specific instance on the data sources your mission requires, be they OSINT, private data, or a mix of both.
Redwoods Research fully supports customers wishing to sustain the tools they purchase from us. We offer training to your technical support team and users. While competitors may insist on maintaining their propriety systems, we believe you own what you buy.
Alternatively, we can offer fast, responsive, human support direct from the developer via end-to-end encrypted chat, voice, or teleconference for screensharing. Security comes with constraints; we cannot reset passwords nor rescue lost passphrases (their private key), should the user lose access or forget. On account signup, we use a wizard to walk the user through creating their passphrase/private key and a recovery phrase to regenerate their private key in the future. The wizard requires the user enter 5 random words from the recovery phrase to confirm they have it stored somewhere on their system or person.
3 Contractor Owned, Contractor Operated
"Providing quiet, custom development for any and all flavors of INT"
EXPERIENCE
We have worked with the US IC,
DoW, FVEY partners, Allies, and Interpol to develop, deploy, and
train staff to maintain fully encrypted, near-terabit networks
handling petabytes of data daily on commodity hardware hosted in
customer data centers spanning 31 countries.
Take a closer look
Download the PDF version of this informational material here
Contact Us
#DUNS Number 11-933-9939 SAM.gov Unique Entity ID: RSCXUUNXND28 SAM.gov CAGE/NCAGE: 0YGF1 #CAL E-Procure Bidder/Supplier ID: BID0118873