CIS Encrypted Network (CISEN)



CISEN employs a unique infrastructure based on cutting edge encryption protocols to ensure that data in transit, data at rest, and the connection location is encrypted, protected, and obfuscated in such a manner that forensic scrutiny analysis will not reveal the true Internet Protocol (IP) signature.

Promise of Utility

Anonymous, encrypted network to obfuscate the source IP to deliver special loads.

Sensitive data in transit

Anonymous, secure connectivity between data centers

Protect and obfuscate existing network platforms

Financial transactions (ACH, B2B, etc.)

Anonymous, secure connectivity between decentralized server databases

Dark web research

Secure communication

Use as a last mile concept

Secure cryptocurrency exchange


This network design supports the concept of a decoy Obfuscation Tool and presents an attractive platform to capture, analyze, and allow reverse engineering from any cyber attacker – worldwide.

The infrastructure functionality avoids generation of any type of selectors and digital signature. The platform is dynamic in nature, adaptable to any environment, and supports the “naked man” concept.

CISEN Post-Quantum Cryptography

As cyber threats evolve, Cyber Intell Solution offers an advanced solution, CISEN, to combat encrypted data harvest attacks. With the rise of powerful quantum computers like Google’s Sycamore and China’s Jiuzhang, traditional encryption methods are vulnerable. CISEN employs CRYSTALS-KYBER encryption, a post-quantum computing resistant algorithm selected by the National Institute of Standards and Technology.

By utilizing KYBER-1024 with a 4024-bit key, CISEN ensures secure public key exchange and symmetric key derivation, while its proprietary Encrypted Networks and integrated Randomization function deliver enhanced security and obfuscation. CIS’s dedication to managed attribution services guarantees comprehensive anonymity for customers and their end users.

CISEN Multi-Dimensional Security


Every aspect of CISEN security must be redundant, because if you have one layer and it fails you have ZERO security.


Fact: data-in-motion is when data is most vulnerable. The CISEN Network security team responds to the most challenging aspects for data-in-motion:


Make the network’s data nonattributable, it must be impossible to link the end-user and their destination.


Create a true randomization protocol within the encryption itself, no proxies or ToR protocols.


Ensure full obfuscation of the of the data-in-transit on both source and destination IPs.


Make the network modular and adaptable. The network should be able to be both proactive and reactive to security threats.


Offer full oversight and compliance to the customer to trust every single bit and byte traversing the network.


Make the network as redundant and as fast as possible.

Unrivaled protection



Unique, using layers of encrypted tunnels and private networks. The CISEN network might live on the internet, but CISEN is its own private network ecosystem.


A hyper redundant network, we have selected the world’s largest interconnected network, as our home. This telecom company already protects/carries over 70% of the world’s internet traffic. Their singular focus on innovation shows the most advanced DDOS protection.


A network ecosystem is only as reliable as its weakest link. We utilize select providers, global access designed for speed, and only the most reliable infrastructure.


Introducing a randomization algorithm within the protocol, CISEN does not rely on legacy technologies like proxies or tors to mask locational and IP data.


Industry-first post-quantum attack resistant encrypted network tunnels are the first line of defense.


CIS funds security technology and encryption development from the world’s brightest minds.

The CISEN network was custom engineered to provide the highest levels of security.


The patented technology behind the CISEN Software-Defined Network was developed by Cyber Intell Solution, LLC (CIS).

CIS designs the most secure Software-Defined Network on the planet.


CIS’s Software-Defined Network technology is already fielded by the United States military and is a technology readiness Level 9 (TRL9) Platform.



Secure and complete protection of PHI and PI


The network is engineered based on the latest cryptology design capable of enabling a randomization algorithm within a VPN protocol.


CISEN does not use a proxy server for randomization, but rather generates encrypted tunnels for each individual session through an encryption protocol.


The network incorporates the newly approved encryption standardization NIST & NSA Kristal Kyber 2014 Level 5.


The network is engineered based on the latest cryptology design capable of enabling a randomization algorithm within a VPN protocol.


CISEN enables connectivity to a C2 server via a randomized algorithm or a manually choosing a desired entry location, which assumes the role of the C2 server and redirects the encrypted traffic from the first encryption protocol to a second encryption protocol via a private IP scheme.


10.x.x.x on a different port within the same VPS (not visible from the outside).


The CISEN servers and the non-routable objects servers are procured, managed, and maintained via a managed attribution mechanism and are configured with the highest security layers within the Cyber industry.


From the second encryption protocol the traffic is randomized to an Exit server E1, E2, E3, E4 (not visible from the outside) over a different encrypted tunnel through a different private IP scheme 192.x.x.x. The randomization algorithm can randomize the traffic constantly per http, https & TCP requests, or randomize the traffic to a static IP per customer request.


The network infrastructure is anonymous, encrypted, and capable of providing the absolute best obfuscation through a proprietary code. The network is based on a dynamic structure which can support configuration on the fly, as well as supporting rapid network tear down.

The randomization algorithm can generate 120 possible path (on a five nodes configuration) guaranteeing a strong pattern-of-life (POL) avoidance, implementing an ergonomic load distribution (ELD) and ergonomic load balancer (ELB) within the servers to maximize efficient data in transit.

It also incorporates a disaster backup feature within the infrastructure; in the scenario that a data center fails, the network simply bypasses the affected servers (safe backup) and continues its functionality within the remaining servers.

The CISEN network it is hardware and software agnostic and function on any type of data connectivity, cellular, WiFi and satellite links.

Unlike any other providers, the customer has full oversight and compliance over the network by having access to live logs and historical events to dedicated jail partitions within the OS.

Available with or without CIS’s proprietary Client application (i.e., GUI).

Security - Technology - Intelligence

What CIS developed not only meets all four challenges but lays the roadmap for the next major technology evolution.

The CISEN data stream has zero signatures revealing the data path’s starting and endpoints. CIS’s custom-designed protocol produces true randomization to avoid pattern of life detection.

The CISEN network is not just one network. It is a network ecosystem with VPN tunnels nested inside multiple encryption protocols. Each VPN tunnel has its own unique encryption and yes, one or both can be Post Quantum Attack Resistant.

CISEN is 100% modular and rapidly adaptable to the expanding threat environment. Both VPN tunnels can run any form of encryption. Additionally, the network can run two different VPN protocols at once. CISEN can utilize any form of VPN protocols.

CIS designed CISEN as an intelligent network. The network internal routing utilizes:

  •  Sense node outages and reroute traffic to prevent network outages
  •  Senses when a node is congested, or a route is overloaded and reroutes around the node to ensure the fastest speed.
  • Increases network resource allocation to prevent congestion and outages.

This modularity allows for features such as delegation, sidechains, subscribe checkpoints, better data structures for light clients, different forms of random number generation, and even different synchronization assumptions. As a network develops from having thousands to millions and even billions of users, the requirements of its consensus algorithm will also change. Thus, it is vital to allow enough flexibility to accommodate these changes and thereby future proof the heart of cryptocurrency and block-chain technology.