Veteran-owned. Mission-driven. Building tactical communications technology for the warfighter and first responder.
Tactical mesh networking and encrypted communications for defense, government, and mission-critical operations.
JCAN LLC exists to solve one problem: secure, resilient communications in environments where commercial solutions fail. When cell towers are destroyed, when internet is denied, when the mission demands communications that cannot be intercepted or disrupted — that is where JC3 operates.
Our JC3 platform was born from real-world operational requirements, not theoretical exercises. Every feature, every security control, every design decision reflects the needs of operators who depend on communications to accomplish their mission and bring their people home.
We build technology that works out of the box with zero infrastructure dependency. JC3 transforms standard Android phones into encrypted mesh nodes that discover peers, establish secure links, and route traffic across multiple hops — all without cell towers, internet, or servers.
When infrastructure is available, JC3 RELAY bridges the mesh to enterprise networks, VPN tunnels, and external systems. JC3 COP gives commanders a real-time common operating picture. JC3 LINK puts secure comms in the hands of every team member, regardless of technical skill.
Founder & CEO, JCAN LLC
U.S. Army Warrant Officer
CW2 Miller is an active-duty U.S. Army Warrant Officer with deep expertise in tactical communications, network engineering, mesh networking, software-defined radio, and information security. His operational experience in environments where commercial communications fail drove the creation of JC3.
Recognizing that existing tactical communications solutions were either too expensive, too fragile, or too complex for the average operator, CW2 Miller designed JC3 from the ground up to deliver military-grade encrypted mesh networking that works out of the box on standard Android devices — no specialized hardware required.
His vision: a communications platform where the daemon is built for the engineer, but the user interface is built for your grandmother. Secure, resilient, and simple enough that any soldier, agent, or first responder can pick up a phone and communicate.
JC3 is designed from the ground up for deployment in classified and sensitive environments. Every component targets the standards required for DoD Authority to Operate.
Cryptographic module compliance path. AES-256-GCM, ChaCha20-Poly1305, ECDSA P-384, ML-KEM-768. GOEXPERIMENT=boringcrypto build configuration. Self-test procedures documented.
Compliance PathSecurity controls implemented per NIST SP 800-53 Rev. 5. Access control, audit logging, identification and authentication, system integrity, and communications protection.
ImplementedServer and application configurations aligned with Defense Information Systems Agency Security Technical Implementation Guides. Systemd sandboxing, CSP headers, hardened defaults.
AlignedDual-layer encryption architecture aligned with NSA Commercial Solutions for Classified program. Two independent cipher implementations from different algorithm families.
Architecture AlignedOWASP Top 10 mitigations across all web components. XSS prevention, injection defense, authentication hardening, input validation, secure error handling.
MitigatedDefensive coverage mapped to the MITRE ATT&CK framework. Behavioral firewall, anomaly detection, trust scoring, and automatic node isolation on compromise.
MappedJCAN LLC is a veteran-owned small business founded and operated by an active-duty U.S. Army Warrant Officer.
Interested in JC3 for your organization? Request a demo, discuss licensing, or explore partnership opportunities.