Prevent Wireless and
Security Data Breaches

while meeting all your operational requirements and responsibilities

Flying Fox Logo
NRL's Orb Weaver

You Have Operational Requirements

that must comply with DoD and Army policies

The U.S. Government has established policies, procedures and responsibilities for cyber security, assuring protected information and regulating the use of Portable Electronic Devices (PED) in restricted spaces, such as Sensitive Compartmented Information Facilities (SCIF):

Meet Flying Fox

an integral tool for meeting those requirements

Epiq Solutions’ Flying Fox™ is an innovative, patented sensor providing real-time results for wireless intrusion detection (WIDS) with zero false positives for cellular. Sensors passively detect, identify, and locate nearby cellular, Bluetooth® and Wi-Fi® Portable Electronic Devices (PEDs) 24/7.

Fully Secure

a COTS and GOTS integrated solution

Developed in collaboration with the Naval Research Lab (NRL), Flying Fox is on the Department of Defense's Information Network Approved Products List (DoDIN APLcertified and accredited by the DISA DAA.

How It Works

Flying Fox is easy to setup and use

Flying Fox results display on the U.S. Naval Research Laboratory’s Flying Squirrel Orb-weaver user interface, allowing our Federal users to confidently observe and react to wireless intrusions as they happen.

Meet Customer Requirements

for cellular, Wi-Fi® and Bluetooth®


  • Dedicated Orb-Weaver wireless discovery network
  • Uses multiple Flying Fox sensors throughout the monitoring area
  • Sensors independently scan for wireless activity
  • OA certified and accredited


  • 24/7 passive monitoring, detection and ID
  • Detects, decodes cellular device's Mobile Subscriber Identity
  • Zero false positive detection, ID
  • Automatic cellular survey to determine cellular (2G/3G/4G) providers


  • Flying Fox sensors were developed in collaboration with the Naval Research Lab's Flying Squirrel Program Office for unparalleled passive wireless device detection, ID and location estimation capability.
  • The sensor demodulates and decodes initial messages between a handset and tower. When Flying Fox indicates a phone is active, it is 100% sure. Zero Errors! Period.
bluetooth searchingBluetooth Searching

Mobile Device Detection

Detect, identify and locate radio transmissions from cellular, Wi-Fi® and Bluetooth® (U.S. and international carriers)


Compatible with Orb-Weaver

Future-proof software defined radio (SDR) architecture, DISA-approved


Wi-Fi®/Cellular Capability

Supports 802.11 a/b/g/n for both 2.4 GHz and 5 GHz bands. Supports 4G (LTE), 3G (UMTS/WCDMA), and 2G (GSM, CDMA2000)

checkedAssignment Accomplished

Fully DoD Compliant

Flying Fox allows your facility to be fully compliant with AR 25-2 Information Assurance requirements and those of DODD 8100.02

bluetooth searchingBluetooth Searching

Complete Cellular Reporting

Cellular technology detected (GSM, CDMA2000, UMTS, or LTE) and carrier. RF channel where the detection occurred. Parametric for the connection establishment sequence

important deviceImportant Device

Information Assured

Zero false positives of cellular detection and identification

Talk to an Expert

We don't expect our customers to be wireless technology experts in order to secure their facilities with Flying Fox. Talk to our team about how Flying Fox can address your organization's needs.

Message Sent!

Showcase Events

Come see Flying Fox in action

  • AFCEA Alamo Ace / San Antonio, TX

    November 18, 2019

    An annual event with a national draw supporting the military community. We expect 2500+ attendees at the 2019 AACE. The ACE program will consist of two full days of expert panels and esteemed keynote speakers and panels, followed by a full day of acquisition updates and a half-day of classified discussions.

    Come and see us at booth #20

  • AFCEA Asia / Honolulu, HI

    November 19, 2019

    The largest event of its kind in the Indo-Pacific Rim. The conference focuses on the regional issues military leaders have identified, including full spectrum cyber operations as adversaries leverage cyberspace to conduct operations below the threshold of conflict.

    Come and see us at booth #804